CN117336893A - One-to-one wireless transmission method, system, electronic device and storage medium - Google Patents

One-to-one wireless transmission method, system, electronic device and storage medium Download PDF

Info

Publication number
CN117336893A
CN117336893A CN202311276418.0A CN202311276418A CN117336893A CN 117336893 A CN117336893 A CN 117336893A CN 202311276418 A CN202311276418 A CN 202311276418A CN 117336893 A CN117336893 A CN 117336893A
Authority
CN
China
Prior art keywords
target
target terminal
terminal
wireless
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202311276418.0A
Other languages
Chinese (zh)
Inventor
石冬雪
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou Ruisike Technology Co ltd
Original Assignee
Hangzhou Ruisike Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou Ruisike Technology Co ltd filed Critical Hangzhou Ruisike Technology Co ltd
Priority to CN202311276418.0A priority Critical patent/CN117336893A/en
Publication of CN117336893A publication Critical patent/CN117336893A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/20Manipulation of established connections
    • H04W76/25Maintenance of established connections
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B17/00Monitoring; Testing
    • H04B17/30Monitoring; Testing of propagation channels
    • H04B17/309Measuring or estimating channel quality parameters
    • H04B17/318Received signal strength
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B17/00Monitoring; Testing
    • H04B17/30Monitoring; Testing of propagation channels
    • H04B17/309Measuring or estimating channel quality parameters
    • H04B17/345Interference values
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup
    • H04W76/14Direct-mode setup

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Quality & Reliability (AREA)
  • Physics & Mathematics (AREA)
  • Electromagnetism (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The application relates to a one-to-one transmission method provided by the embodiment of the application, wherein a workstation supporting one-to-one communication is obtained through characteristic elements in a PROBE frame, and a one-to-one transmission channel is established. Furthermore, the address and the signal strength of both communication parties are determined by adopting the confirmed one-to-one transmission mechanism, so that the frame header can be compressed based on the preset rule, the ED threshold value is considered when busy judgment is performed, and whether the signal is a real signal is considered, thereby reducing useless data and further improving the stability under the condition of abnormal factor interference.

Description

One-to-one wireless transmission method, system, electronic device and storage medium
Technical Field
The present application relates to the field of data communications, and in particular, to a one-to-one wireless transmission method, system, computer device, and storage medium.
Background
In a one-to-one enterprise conference communication scenario, the quality of the screen throw depends on the wireless throughput performance. Although many APs (Access points) are deployed in a scene, there are still great difficulties in providing stable wireless performance for electronic devices requiring important quality assurance, and in the case where interference signals are all around.
The wireless screen-throwing device and the wireless router are connected by adopting a standard 802.11 protocol, and DCF (distributed coordination function) is adopted for mutual transmission. Before any data is transmitted, the wireless screen-throwing device needs to check whether the data transmission channel is in an idle state, and if the data transmission channel is in a busy state, the workstation needs to delay access and avoid collision by using an exponential back-off algorithm. It is due to this backoff behavior that the communication between the screen-casting device and the wireless AP becomes unstable.
Disclosure of Invention
The embodiment of the application provides a one-to-one wireless transmission method, a one-to-one wireless transmission device, a one-to-one wireless transmission system, computer equipment and a computer readable storage medium, so as to at least solve the problem of poor communication stability between a terminal and AP equipment in the related technology.
In a first aspect, an embodiment of the present application provides a one-to-one wireless transmission method, which is applied in a scenario based on a target communication protocol, where the scenario includes at least one terminal and an AP device, and the target communication protocol is a wireless communication protocol based on a positive acknowledgement mechanism, where the method is applied to the AP device, and includes:
establishing a wireless transmission channel communicated with a target terminal;
determining a target rate according to the sum of the transmitting power of the target terminal and the supportable rate set;
based on the RTS/CTS mechanism, locking the wireless medium of the RTS/CTS mechanism and the target terminal, and exchanging data with the target terminal at the target rate through the transmission channel; wherein the target rate is maintained in the event of an erroneous frame during the data exchange process.
In some of these embodiments, locking the own wireless medium with the target terminal based on the RTS/CTS mechanism includes:
after a wireless transmission channel is established with the target terminal, the wireless medium of the wireless medium and the target terminal are locked by setting the communication state to be RTS/CTS clear.
In some of these embodiments, setting the communication state to RTS/CTS clear after establishing the wireless transmission channel with the target terminal includes:
by sending an RTS frame of a target NAV length to the target terminal based on the basic access rules of the target communication protocol at the start of the data frame exchange,
and receiving a CTS frame with the target NAV length returned by the target terminal, and setting the communication state as RTS/CTS clear.
In some embodiments, the establishing a wireless transmission channel that communicates with the target terminal includes:
under the condition that a PROBE request sent by a terminal is received, acquiring a characteristic element from the PROBE request;
and judging whether the terminal is a target terminal supporting one-to-one transmission according to the characteristic elements, if so, returning a PROBE request response to the target terminal, and establishing a wireless transmission channel with the target terminal.
In some of these embodiments, the target power is a power of the AP device greater than a preset threshold in an adjustable power range, the method further comprising:
under the target power, acquiring a first RSSI value of the target terminal, and receiving a second RSSI value of the target terminal;
determining threshold background noise of data to be received according to the second RSSI value;
and sending the first RSSI value to the target terminal to instruct the target terminal to determine the threshold background noise of the data to be received according to the first RSSI value.
In some embodiments, in the transmission channel, in completing data exchange with the target terminal at the target rate, the method further includes:
acquiring the signal strength of real-time data sent by the target terminal;
and judging whether the signal strength is higher than the threshold noise, if so, receiving the real-time data, and if not, ignoring the real-time data.
In some of these embodiments, the method further comprises:
compressing the frame header of the data frame based on a preset rule, and completing data exchange with the target terminal at the target rate according to the compressed data frame;
and outputting the channel idle information under the condition that the effective one-to-one transmission signal sent by the target terminal is not found in the preset time period.
In a second aspect, an embodiment of the present application provides another one-to-one transmission method, which is characterized in that the method is applied in a scenario based on a target communication protocol, where the scenario includes at least one terminal and an AP device, and the target communication protocol is a wireless communication protocol based on a positive acknowledgement mechanism, and the method is applied to the terminal, and specifically includes:
establishing a transmission channel communicated with the AP equipment;
determining a target rate according to a sum of the transmitting power of the AP equipment and a supportable rate set;
and locking the wireless medium of the AP equipment based on the RTS/CTS mechanism, and completing data exchange with the target terminal at the target rate in the transmission channel, wherein the target rate is maintained under the condition that error frames occur in the data exchange process.
In a third aspect, an embodiment of the present application provides a one-to-one wireless transmission system, which is applied in a data transmission scenario based on a positive acknowledgement mechanism, where the scenario includes at least one terminal, and the system includes: the AP device and the target terminal,
the AP device is configured to:
establishing a wireless transmission channel with a target terminal;
determining a target rate according to the sum of the transmitting power of the target terminal and the supportable rate set;
the target terminal is used for:
and locking the wireless medium of the AP equipment based on the RTS/CTS mechanism of the target protocol, and finishing data exchange with the target terminal at the target rate through the transmission channel, wherein the target rate is maintained under the condition that error frames occur in the data exchange process.
In a fourth aspect, embodiments of the present application provide a computer device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, the processor implementing the method according to the first or second aspect described above when executing the computer program.
In a fifth aspect, embodiments of the present application provide a computer readable storage medium having stored thereon a computer program which when executed by a processor implements a method as described in the first or second aspects above.
Compared with the related art, the one-to-one transmission method provided by the embodiment of the application acquires the workstation supporting one-to-one communication through the characteristic elements in the PROBE frame, establishes the one-to-one transmission channel, and further, enables the target terminal to lock the channel of the AP equipment for a long time through setting the threshold value and elongating the RTS/CTS, so that the interference of abnormal information is avoided to a great extent, and the stability of one-to-one transmission is improved.
Drawings
The accompanying drawings, which are included to provide a further understanding of the application and are incorporated in and constitute a part of this application, illustrate embodiments of the application and together with the description serve to explain the application and do not constitute an undue limitation to the application. In the drawings:
fig. 1 is a schematic diagram of an application environment of a one-to-one wireless transmission method in the related art;
FIG. 2 is a flow chart of a one-to-one data transmission method according to an embodiment of the present application;
fig. 3 is a flow chart of establishing a wireless transmission channel according to an embodiment of the present application;
FIG. 4 is a schematic diagram of determining a target rate according to an embodiment of the present application;
FIG. 5 is a schematic illustration of a communication scheme of a communication protocol based on a positive acknowledgement mechanism according to an embodiment of the present application;
fig. 6 is a flow chart of another one-to-one wireless transmission method according to an embodiment of the present application;
fig. 7 is a block diagram of a one-to-one transmission system according to an embodiment of the present application;
fig. 8 is a block diagram of another one-to-one transmission system according to an embodiment of the present application;
fig. 9 and 10 are schematic structural diagrams of a PROBE frame, respectively;
fig. 11 is a schematic diagram of an internal structure of an electronic device according to an embodiment of the present application.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the present application is described and illustrated below with reference to the accompanying drawings and examples. It should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the present application. All other embodiments, which can be made by one of ordinary skill in the art without undue burden on the person of ordinary skill in the art based on the embodiments provided herein, are intended to be within the scope of the present application.
It is apparent that the drawings in the following description are only some examples or embodiments of the present application, and it is possible for those of ordinary skill in the art to apply the present application to other similar situations according to these drawings without inventive effort. Moreover, it should be appreciated that while such a development effort might be complex and lengthy, it would nevertheless be a routine undertaking of design, fabrication, or manufacture for those of ordinary skill having the benefit of this disclosure, and thus should not be construed as having the benefit of this disclosure.
Reference in the specification to "an embodiment" means that a particular feature, structure, or characteristic described in connection with the embodiment may be included in at least one embodiment of the application. The appearances of such phrases in various places in the specification are not necessarily all referring to the same embodiment, nor are separate or alternative embodiments mutually exclusive of other embodiments. It is to be expressly and implicitly understood by those of ordinary skill in the art that the embodiments described herein can be combined with other embodiments without conflict.
Unless defined otherwise, technical or scientific terms used herein should be given the ordinary meaning as understood by one of ordinary skill in the art to which this application belongs. Reference to "a," "an," "the," and similar terms herein do not denote a limitation of quantity, but rather denote the singular or plural. The terms "comprising," "including," "having," and any variations thereof, are intended to cover a non-exclusive inclusion; for example, a process, method, system, article, or apparatus that comprises a list of steps or modules (elements) is not limited to only those steps or elements but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus. The terms "connected," "coupled," and the like in this application are not limited to physical or mechanical connections, but may include electrical connections, whether direct or indirect. The term "plurality" as used herein refers to two or more. "and/or" describes an association relationship of an association object, meaning that there may be three relationships, e.g., "a and/or B" may mean: a exists alone, A and B exist together, and B exists alone. The character "/" generally indicates that the context-dependent object is an "or" relationship. The terms "first," "second," "third," and the like, as used herein, are merely distinguishing between similar objects and not representing a particular ordering of objects.
Herein, it is to be understood that the terms involved may be technical means for realizing a part of the present invention or other summarized technical terms, for example, the terms may include:
AP: access point, wireless Access point;
CTS, clear to send;
CLEAR TO SEND: this is a true master that notifies the counterpart that the request to send RTS information has been received and can start transmitting data;
RTS, REQUEST TO SEND. And (5) request transmission. Is a frame used to initiate the RTS/CTS clear procedure;
BEACON: a wireless Beacon frame is a periodic frame in 802.11, and sends a Beacon signal to the outside at intervals to announce the existence of an 802.11 network;
SSID-SSID is an abbreviation for Service Set Identifier, meaning: service set identification. The SSID technology can divide a wireless local area network into a plurality of sub-networks requiring different identity verification, each sub-network requires independent identity verification, and only users passing the identity verification can enter the corresponding sub-network to prevent unauthorized users from entering the network;
NAV network allocation vector (NETWORK ALLOCAION VECTOR) NAV is mainly used to implement virtual carrier sense functions. If the transmission medium is busy, the station delays access.
DCF, distributed protocol function; DISTRIBUTED COORDINATION FUNCTION is an access rule for wireless media in 802.11 contention based services. In the face of contention, DCF uses the rules of exponential backoff delay access, frame acknowledgement, and when to exchange a specific frame or when to split a frame as the basis for medium access.
MAC: media Access Control, medium access control, generally referred to as a sub-layer of the data link layer, is used to control the physical medium.
Fig. 1 is a schematic view of an application environment of a one-to-one wireless transmission method in the related art, as shown in fig. 1, in an enterprise conference room wireless network, a one-to-one communication system is formed by a wireless screen-throwing device and a wireless router. In this usage scenario, the quality of the screen projection depends on the wireless throughput performance. Although enterprises deploy many wireless routers, there are still great difficulties in providing stable wireless communication performance for the quality-guaranteed screening device, and in the case of interference signals around the device.
The connection between the wireless screen-casting device and the wireless router is usually made by adopting standard 802.11 protocol. The mutual transmission is based on DCF (distributed coordination function). Before any data is transmitted, the screen-throwing device must check whether the router media is in an idle state, and if so, the screen-throwing device needs to delay access and utilize an exponential backoff algorithm to avoid collision.
Therefore, due to the existence of the interference signal and the existence of the backoff behavior of the screen throwing device, the communication between the screen throwing device and the wireless AP becomes unstable. The related art generally relates to how to avoid peripheral interference, such as staggering channels, and specifically: comprises the following steps of
(1) Scanning a WIFI channel;
(2) Acquiring a working channel of a peripheral neighbor AP;
(3) And further calculates non-overlapping channel numbers to select non-overlapping channels for operation.
In the above manner, although the channel is avoided, the stability of communication between the screen-throwing device and the AP device is still poor because the interference always exists and changes at any time.
Based on the above situation, the embodiments of the present application provide a one-to-one transmission method, a one-to-one transmission system, an electronic device, and a storage medium, which can negotiate optimal transmission parameters, realize stable high-performance wireless communication, and eliminate the influence of interference.
Fig. 2 is a flowchart of a one-to-one data transmission method according to an embodiment of the present application, where the method is applied in a scenario based on a target communication protocol, which is a wireless communication protocol based on a positive acknowledgement mechanism, such as an 802.11 protocol, and an AP device, and the flowchart includes the following steps, as shown in fig. 2:
s201, establishing a wireless transmission channel communicated with a target terminal;
it should be noted that the application scenario may be a screen-projection application scenario in an office environment, where the scenario includes at least one terminal, and the terminal includes, but is not limited to: a mobile phone, a tablet computer, a PC computer, a large screen display and the like.
In this embodiment, an AP device establishes a wireless transmission channel with a terminal supporting one-to-one transmission, where fig. 3 is a flowchart for establishing a wireless transmission channel according to an embodiment of the present application, and as shown in fig. 3, the flowchart includes the following steps:
s301, under the condition that a PROBE request sent by a terminal is received, acquiring a characteristic element from the PROBE request;
in this embodiment, the PROBE request is a PROBE request, which is sent by a terminal to find a nearby wireless Access Point (AP). In the field of wireless communication, the main function of the AP device is to connect the wireless device to a wired network or the internet, which serves as a bridge, so that the wireless device can access network resources and the internet.
It should be noted that, if the terminal is a device supporting one-to-one transmission, the PROBE request should include a specific feature element.
S302, the AP equipment judges whether the terminal is a target terminal supporting one-to-one transmission according to the characteristic elements, if so, the AP equipment returns a PROBE request response to the target terminal, and a wireless transmission channel is established with the target terminal.
It can be understood that if the AP device obtains the characteristic element by parsing the PROBE request, it can determine that the terminal is a target terminal supporting one-to-one wireless transmission. Further, the AP device adjusts the power to the maximum, and replies a PROBE request response to the target terminal to indicate that the target terminal can start one-to-one transmission.
Through the steps S301 to S302, a new device discovery mechanism is introduced, and an access point with one-to-one communication capability is searched by scanning a PROBE REQUEST, so as to search and acquire an AP device with one-to-one transmission capability, thereby avoiding interference of other irrelevant signals in a scene.
S202, the AP equipment sets a threshold background noise, confirms whether to accept the data frame transmitted by the terminal according to the threshold background noise, instructs the target terminal to set the threshold background noise, and judges whether to accept the data frame transmitted by the AP equipment according to the threshold background noise;
specifically, the method comprises the following specific steps:
step1, under the target power, the AP equipment acquires a first RSSI value of the AP equipment and receives a second RSSI value of a target terminal;
the target power is the power of the AP equipment which is larger than a preset threshold value in the adjustable power range, and the target power is kept to be high power by setting the preset threshold value.
It should be noted that the RSSI value is the intensity or power level of a radio frequency signal, and is generally used to evaluate the signal quality in a wireless communication system, and the RSSI is generally expressed in decibels (dB).
Step2, the AP equipment determines threshold bottom noise of data to be received according to the second RSSI value; in addition, a first RSSI value is sent to the target terminal so as to instruct the target terminal to determine the threshold noise of the data to be received according to the first RSSI value.
Where the threshold floor noise is a threshold value of signal-to-noise ratio (SNR), typically expressed in decibels (dB). The threshold determines how much signal-to-noise ratio the received signal must have to be considered strong enough to be correctly decoded and processed.
Step3, the AP equipment acquires the signal intensity of real-time data sent by the target terminal; and judging whether the signal strength is higher than the threshold background noise, if so, receiving the real-time data, and if not, ignoring the real-time data.
Correspondingly, it can be understood that the terminal may also determine whether the signal strength of the AP device is lower than the threshold noise floor, and further determine whether to ignore the signal.
Specifically, an exemplary embodiment includes: the terminal and the AP device respectively adjust the background noise based on the signal intensity of the opposite side, wherein the specific background noise is 5DB lower than the RSSI value of the opposite side, and if the signal intensity of the actually received opposite side is-50 DB, the set threshold background noise is-55 DB, so that frames weaker than-55 DB are discarded.
Further, the method further comprises the following steps: both the terminal and the AP operate at high power and raise their respective threshold floor noise, which in turn makes it easier for the terminal to take exclusive use of the radio medium.
Through the step S202, the AP device and the terminal respectively set their own threshold noise, determine whether to ignore the signal based on the threshold noise, and ignore the data frame if the signal strength of the data frame sent by the other party is lower than the threshold noise, so that the interference signal outside the link boundary can be ignored, and the stability of one-to-one transmission is improved.
S203, the AP equipment determines a target rate according to the sum of the transmitting power of the target terminal and the supportable rate set;
wherein, the AP device and the terminal respectively determine the optimal speed under ideal conditions according to the transmitting power of the opposite side and the supported speed set.
Specifically, the target rate is the highest rate without interference from the physical layer. If the opposite device supports 5g 11ac, the rate set has multiple levels, and ideally, the highest level is selected for data transmission rate.
Fig. 4 is a schematic diagram of determining a target rate according to an embodiment of the present application, as shown in fig. 4, 11AC (IEEE 802.11AC, a wireless communication standard) is selected to use 866M in a 1X1 spatial stream scenario.
Through the steps, the target rate in an ideal state is determined, and the high efficiency in the subsequent data transmission process is ensured.
S204, the AP equipment locks the wireless medium of the AP equipment and the target terminal based on an RTS/CTS mechanism, and completes data exchange with the target terminal at a target rate in a transmission channel, wherein the target rate is maintained under the condition that error frames occur in the data exchange process.
After the wireless transmission channel is established between the AP equipment and the terminal, the communication state of the AP equipment is set to be RTS/CTS clear for a long time, so that the long-time channel locking of the AP equipment and the target terminal is realized, and the interference of other signals is avoided.
For ease of understanding, the positive acknowledgement mechanism is described herein as follows:
fig. 5 is a schematic diagram of a communication manner of a communication protocol based on a positive acknowledgement mechanism according to an embodiment of the present application, in which the 802.11 protocol is taken as an example, as shown in fig. 5, unlike other link layer protocols, the 802.11 employs a positive acknowledgement (POSITIVE ACKNOWLEDGMENT) mechanism, that is, all transmitted frames must be responded to.
As long as any link fails, the frame is regarded as lost, and the whole frame sending and confirming steps are used as an atomic operation and become an inseparable single transaction unit. Thus, the entire transaction is divided into two steps: i.e. the AP device sends a frame and the terminal returns a signal to the AP device ACK (ACKNOWLEDGMENT), both steps being controlled by two different workstations, respectively. During a transaction, the two workstations must cooperate with each other to sequentially take control of the network medium for transmission operations.
Further, 802.11 allows the station to lock the medium during such basic operations as sending frames + receiving ACKs, avoiding disruption of the basic operation by other stations attempting to contend for the transmission medium.
In this embodiment, by using this mechanism, at the beginning of frame exchange, an RTS frame with a target NAV length is sent to the target terminal based on the basic access rule of the target communication protocol at the beginning of data frame exchange;
the NAV is NETWORK ALLOCAION VECTOR, which is a network allocation vector, and is mainly used for implementing a virtual carrier sense function, and if a transmission medium is in a busy state, a workstation delays access, and in this embodiment, the value of the NAV needs to be long enough, and the specific value can be determined by a person skilled in the art in combination with an actual scenario and experience knowledge in the art.
Further, the target terminal side returns a CTS frame with the target NAV length, and the communication state is set to be RTS/CTS clear.
It can be understood that, based on the basic access rule of the MAC, since the RTS/CTS is elongated in this embodiment, for other terminals in the scene, the AP device may keep a long RTS/CTS clear period, during which other stations in the scene must defer from accessing the medium, and at this time, both parties may use a modulation scheme that cannot be understood by the old station to complete exchange of data frames at a higher rate.
After the transmission starts, the AP device and the terminal respectively transmit at the target rates, and even if an error frame is encountered, the AP device and the terminal do not slow down all the time, thereby preventing the occurrence of the probability of occurrence of the slow down and maintaining the efficiency of one-to-one transmission all the time.
Further, in some embodiments, because the AP device and the terminal in the present solution are one-to-one transmitted, considering that simplifying the data frame, further improving the data transmission performance, optionally, compressing the frame header of the data frame based on a preset rule, and transmitting the data frame after compressing the frame header to the target terminal at the target rate;
specifically, header compression is performed to greatly reduce the amount of wasted data, especially for the MAC address of the packet, due to the fixed source and destination of the one-to-one transmission. The combination of 3 MAC addresses with multiple inclusion of the MAC frame can be omitted, and the burden caused by the MAC address can be reduced by more than half compared with the transmission of the complete frame header.
In addition, considering that there is one-to-one transmission in the present embodiment, synchronization can be improved from a busy judgment perspective; specifically, the AP device searches for a real signal while determining whether the detected signal energy exceeds the ED threshold by setting a timer, and if a one-to-one valid signal is searched for simultaneously in a preset period of time, the medium of the AP device may be regarded as a limit state.
In this way, compared with the method of determining whether the medium (communication channel) is busy by detecting ED (Energy Detection) in the related art, the signal is reported to the upper layer protocol as busy when the detected signal has enough energy and is a real signal supporting one-to-one transmission.
In particular, in a one-to-one communication scenario, since the positions of both parties are relatively fixed and the power is known, the ED threshold can be set very close to the true value, so that the channel busy judgment is further simplified to judge whether the counterpart is transmitting a signal, thereby reducing the interference of surrounding abnormal information.
Through the steps S201 to S204, compared with the problem of poor communication stability caused by more interference in the wireless transmission method in the related art, in the embodiment of the present application, first, a workstation supporting one-to-one communication is acquired based on the feature elements in the PROBE frame, and a one-to-one transmission channel is established, further, by setting a threshold value, and by elongating RTS/CTS, the target terminal locks the channel of the AP device for a long time, so that interference of abnormal information is avoided to a great extent, and stability of one-to-one transmission is improved.
Furthermore, the address and the signal strength of both communication parties are determined by adopting the confirmed one-to-one transmission mechanism, so that the frame header can be compressed based on the preset rule, the ED threshold value is considered when busy judgment is performed, and whether the signal is a real signal is considered, thereby reducing useless data and further improving the stability under the condition of abnormal factor interference.
Fig. 6 is a flowchart of another one-to-one wireless transmission method according to an embodiment of the present application, where the method is applied in a scenario based on a target communication protocol, which is a wireless communication protocol based on a positive acknowledgement mechanism, such as an 802.11 protocol, and an AP device, and the method is applied to a terminal, as shown in fig. 6, and the flowchart includes the following steps:
s601, establishing a wireless transmission channel communicated with pre-AP equipment;
s602, determining a target rate according to a sum of the transmitting power of the AP equipment and a supportable rate set;
s603, locking the wireless medium of the AP equipment based on an RTS/CTS mechanism, and sending the data frame to the AP equipment at a target rate in a transmission channel, wherein the target rate is maintained under the condition that error frames occur in the data exchange process.
The present process is the same as the implementation concept of steps S201 to S204, and the main difference is that the present process is only applied to the terminal side, and steps S201 to S204 are implemented at the AP device side. Similar to the technical effects achieved in steps S201 to S204, compared with the problem of poor communication stability caused by more interference in the wireless transmission method in the related art, the interference of abnormal information is avoided to a great extent, and the stability of one-to-one transmission is improved.
The present embodiment also provides a one-to-one transmission system, which is used to implement the foregoing embodiments and preferred embodiments, and will not be described in detail. As used below, the terms "module," "unit," "sub-unit," and the like may be a combination of software and/or hardware that implements a predetermined function. While the means described in the following embodiments are preferably implemented in software, implementation in hardware, or a combination of software and hardware, is also possible and contemplated.
Fig. 7 is a block diagram of a one-to-one transmission system according to an embodiment of the present application, which is applied in a data transmission scenario based on a positive acknowledgement mechanism, the scenario including at least one terminal, as shown in fig. 7, and includes: AP device 70 and target terminal 71, specifically:
the AP device 70 is configured to establish a wireless transmission channel with the target terminal 71;
it should be noted that the method is applied in a scenario based on a target communication protocol, further, the scenario includes at least one terminal, and the target communication protocol is a wireless communication protocol based on a positive acknowledgement mechanism, for example, an 802.11 protocol;
further, the application scene may be a screen-projection application scene in an office environment, where the scene includes at least one terminal, and the terminal includes but is not limited to: cell phones, tablet computers, PC computers, etc.
The system introduces a new device discovery mechanism, and searches for an access point with one-to-one communication capability by scanning a PROBE REQUEST so as to search for and acquire the AP device with one-to-one capability, thereby avoiding the interference of irrelevant devices.
The AP device 70 is further configured to determine a target rate according to the sum of the transmission powers of the target terminals and the supportable rate set;
wherein the optimal speed in the ideal case is determined by the AP device 70 and the target terminal 71 based on the transmit power of the other party and the supported set of rates, respectively.
Specifically, the target rate is the highest rate without interference from the physical layer. If the opposite device supports 5g 11ac, the rate set has multiple levels, and ideally, the highest level is selected for data transmission rate. For example: 11AC (IEEE 802.11AC, a wireless communication standard) in a 1X1 spatial stream scenario, the highest rate will choose to use 866M. The AP equipment can determine the target rate in an ideal state and ensure the high efficiency in the subsequent data transmission process.
The target terminal 71 is configured to lock the wireless medium of the AP device based on the RTS/CTS mechanism of the target protocol, and transmit the data frame to the AP device at the target rate through the transmission channel, where the target rate is maintained in the case that an error frame occurs in the data exchange process.
Through the steps S201 to S204, compared with the problem of poor communication stability caused by more interference in the wireless transmission method in the related art, in the embodiment of the present application, first, a workstation supporting one-to-one communication is acquired based on the feature elements in the PROBE frame, and a one-to-one transmission channel is established, further, by setting a threshold value, and by elongating RTS/CTS, the target terminal locks the channel of the AP device for a long time, so that interference of abnormal information is avoided to a great extent, and stability of one-to-one transmission is improved.
In addition, fig. 8 is a block diagram of another one-to-one transmission system according to an embodiment of the present application, and as shown in fig. 8, the system includes a wireless private negotiation communication module, a wireless interference filtering module, and a rate selection module, where:
1. the wireless private negotiation communication module can be realized by the following steps:
1) First, defining an Ethernet message type
#define ETH_P_ECONET 0x0018
#define ETH_P_80211_RAW(ETH_P_ECONET+1)
2) Secondly, the received message is set as packet_otherhead and the protocol is set as eth_p_80211_raw before being thrown to the application layer
The PROBE REQUEST belongs to a management FRAME that follows the general format of a management FRAME, but differs in that the FRAME BODY of different management FRAMEs is different;
fig. 9 and 10 are schematic diagrams of structures of a PROBE frame, respectively, and most of the data in the frame body is called fixed bits if bits of fixed length are used, as shown in fig. 9 and 10. If the bit length is not constant, it is called an information element (information element). The information element is a data block of an indefinite length. Each data block will be marked
The type number and size are noted, and the data bits of various information elements have specific interpretation modes.
Specifically, when the wireless network card receives the management frame, the process is as follows:
1) If the request belongs to the PROBE request, the fixed 11-byte content of the FRAME BODY part of the wireless message data is acquired and is used for being compared with a fixed 11-byte memory area, and if the data are not equal, the flow is ended. If so, it means that this is a probe request of the recognized one-to-one wireless transmission device, and execution continues with 3.
The 11-byte fixed content is: 0x00,0x09,0x42,0x52,0x4f,0x41,0x44,0x4c,0x49,0x4e,0x4b;
2) And acquiring the type of the message, if the message is ONE2ONE_MSG_BRIDGE_DISCOVER_REQ ONE-to-ONE discovery wireless BRIDGE request, acquiring whether further content is legal or not, and if the message is legal, releasing the message.
If not from the given radio interface RA0, processing the message as normal; if the message does not belong to the wireless bridge discovery request, cloning the message and delivering the message to an application layer for processing.
The specific receiving method of the message comprises the following steps:
changing the message type into other host messages so as to be used only by the interception process; changing the protocol of the message into a self-defined protocol so that the local interception process can receive the self-defined protocol; the custom protocol is a protocol type of a protocol level with the Ethernet, and optionally, the type value is: 0x0019
3) Application layer receiving radio
And the application layer acquires all data of RA0 by monitoring the RAW SOCKET, so that private data content is obtained.
According to the private data, maintaining one-to-one communication list items; the private communication module completes one-to-one connection establishment through the steps.
2. A wireless rate selection module: because both parties of the one-to-one communication are in a stable position, the wireless rate selection module adopts a state of stable operation at the highest rate.
3. Interference filtering module: for further performing radio interference filtering after the one-to-one connection is successful by:
a) Firstly, the power of the other party is obtained
b) Adjusting the lowest acceptable power according to the power of the other party, and determining the link boundary
c) Interfering signals outside the link boundaries are ignored.
d) And the channel is monopolized for a long time, no third party is communicated, and other signal interference is avoided through the RTS/CTS locking channel for a long time.
e) The frame header is compressed, eliminating unnecessary MAC addresses in one-to-one communication. And improves the transmission performance.
f) The improved CCA idle channel assessment not only judges the ED energy value, but also judges whether the ED energy value is a real signal, so that interference influence is reduced.
In one embodiment, fig. 11 is a schematic diagram of an internal structure of an electronic device according to an embodiment of the present application, as shown in fig. 11, and an electronic device, which may be a server, may be provided, and an internal structure diagram thereof may be as shown in fig. 11. The electronic device includes a processor, a network interface, an internal memory, and a non-volatile memory connected by an internal bus, where the non-volatile memory stores an operating system, computer programs, and a database. The processor is used for providing computing and control capabilities, the network interface is used for communicating with an external terminal through a network connection, the internal memory is used for providing an environment for the operation of the operating system, and the computer program is executed by the processor in a one-to-one transmission method, and the database is used for storing data.
It will be appreciated by those skilled in the art that the structure shown in fig. 11 is merely a block diagram of a portion of the structure associated with the present application and is not limiting of the electronic device to which the present application is applied, and that a particular electronic device may include more or fewer components than shown, or may combine certain components, or have a different arrangement of components.
Those skilled in the art will appreciate that implementing all or part of the above described methods may be accomplished by way of a computer program stored on a non-transitory computer readable storage medium, which when executed, may comprise the steps of the embodiments of the methods described above. Any reference to memory, storage, database, or other medium used in the various embodiments provided herein may include non-volatile and/or volatile memory. The nonvolatile memory can include Read Only Memory (ROM), programmable ROM (PROM), electrically Programmable ROM (EPROM), electrically Erasable Programmable ROM (EEPROM), or flash memory. Volatile memory can include Random Access Memory (RAM) or external cache memory. By way of illustration and not limitation, RAM is available in a variety of forms such as Static RAM (SRAM), dynamic RAM (DRAM), synchronous DRAM (SDRAM), double Data Rate SDRAM (DDRSDRAM), enhanced SDRAM (ESDRAM), synchronous Link DRAM (SLDRAM), memory bus direct RAM (RDRAM), direct memory bus dynamic RAM (DRDRAM), and memory bus dynamic RAM (RDRAM), among others.
The foregoing examples represent only a few embodiments of the present application, which are described in more detail and are not to be construed as limiting the scope of the invention. It should be noted that it would be apparent to those skilled in the art that various modifications and improvements could be made without departing from the spirit of the present application, which would be within the scope of the present application. Accordingly, the scope of protection of the present application is to be determined by the claims appended hereto.

Claims (10)

1. A one-to-one wireless transmission method, which is applied in a scenario based on a target communication protocol, wherein the scenario includes at least one terminal and an AP device, the target communication protocol is a wireless communication protocol based on a positive acknowledgement mechanism, and the method is applied to the AP device, and includes:
establishing a wireless transmission channel communicated with a target terminal;
determining a target rate according to the sum of the transmitting power of the target terminal and the supportable rate set;
based on the RTS/CTS mechanism, locking the wireless medium of the RTS/CTS mechanism and the target terminal, and exchanging data with the target terminal at the target rate through the transmission channel; wherein the target rate is maintained in the event of an erroneous frame during the data exchange process.
2. The method of claim 1, wherein locking the own wireless medium with the target terminal based on the RTS/CTS mechanism comprises:
after a wireless transmission channel is established with the target terminal, the wireless medium of the wireless medium and the target terminal are locked by setting the communication state to be RTS/CTS clear.
3. The method of claim 2, wherein setting the communication state set to RTS/CTS clear after establishing a wireless transmission channel with the target terminal comprises:
by sending an RTS frame of a target NAV length to the target terminal based on the basic access rules of the target communication protocol at the start of the data frame exchange,
and receiving a CTS frame with the target NAV length returned by the target terminal, and setting the communication state as RTS/CTS clear.
4. The method of claim 1, wherein the establishing a wireless transmission channel in communication with the target terminal comprises:
under the condition that a PROBE request sent by a terminal is received, acquiring a characteristic element from the PROBE request;
and judging whether the terminal is a target terminal supporting one-to-one transmission according to the characteristic elements, if so, returning a PROBE request response to the target terminal, and establishing a wireless transmission channel with the target terminal.
5. The method of claim 4, wherein the target power is a power of the AP device greater than a preset threshold in an adjustable power range, the method further comprising:
under the target power, acquiring a first RSSI value of the target terminal, and receiving a second RSSI value of the target terminal;
determining threshold background noise of data to be received according to the second RSSI value;
and sending the first RSSI value to the target terminal to instruct the target terminal to determine the threshold background noise of the data to be received according to the first RSSI value.
6. The method of claim 5, wherein during the completion of the data exchange with the target terminal at the target rate in the transmission channel, the method further comprises:
acquiring the signal strength of real-time data sent by the target terminal;
and judging whether the signal strength is higher than the threshold noise, if so, receiving the real-time data, and if not, ignoring the real-time data.
7. The method according to claim 1, wherein the method further comprises:
compressing the frame header of the data frame based on a preset rule, and completing data exchange with the target terminal at the target rate according to the compressed data frame;
and outputting the channel idle information under the condition that the effective one-to-one transmission signal sent by the target terminal is not found in the preset time period.
8. The one-to-one transmission method is characterized by being applied to a scene based on a target communication protocol, wherein the scene comprises at least one terminal and AP equipment, the target communication protocol is a wireless communication protocol based on a positive acknowledgement mechanism, and the method is specifically applied to the terminal and comprises the following steps:
establishing a transmission channel communicated with the AP equipment;
determining a target rate according to a sum of the transmitting power of the AP equipment and a supportable rate set;
and locking the wireless medium of the AP equipment based on the RTS/CTS mechanism, and completing data exchange with the target terminal at the target rate in the transmission channel, wherein the target rate is maintained under the condition that error frames occur in the data exchange process.
9. A one-to-one wireless transmission system for use in a data transmission scenario based on a positive acknowledgement mechanism, the scenario including at least one terminal therein, the system comprising: the AP device and the target terminal,
the AP device is configured to:
establishing a wireless transmission channel with a target terminal;
determining a target rate according to the sum of the transmitting power of the target terminal and the supportable rate set;
the target terminal is used for:
and locking the wireless medium of the AP equipment based on the RTS/CTS mechanism of the target protocol, and finishing data exchange with the target terminal at the target rate through the transmission channel, wherein the target rate is maintained under the condition that error frames occur in the data exchange process.
10. A computer device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, wherein the processor implements the method of any one of claims 1 to 8 when executing the computer program.
CN202311276418.0A 2023-09-28 2023-09-28 One-to-one wireless transmission method, system, electronic device and storage medium Pending CN117336893A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311276418.0A CN117336893A (en) 2023-09-28 2023-09-28 One-to-one wireless transmission method, system, electronic device and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311276418.0A CN117336893A (en) 2023-09-28 2023-09-28 One-to-one wireless transmission method, system, electronic device and storage medium

Publications (1)

Publication Number Publication Date
CN117336893A true CN117336893A (en) 2024-01-02

Family

ID=89289785

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311276418.0A Pending CN117336893A (en) 2023-09-28 2023-09-28 One-to-one wireless transmission method, system, electronic device and storage medium

Country Status (1)

Country Link
CN (1) CN117336893A (en)

Similar Documents

Publication Publication Date Title
US8446907B2 (en) Medium access control method and apparatus in wireless distributed network
JP6392338B2 (en) System, method, and device for dynamically setting a response indication deferral in a wireless network
US9544904B2 (en) Systems and methods for reuse of a wireless medium for high efficiency wifi
US9918342B2 (en) Method and device for transmitting/receiving frame in accordance with bandwidth thereof in WLAN system
US20220279375A1 (en) Multiplex transmission method and apparatus in multi-link wireless lan
KR101764955B1 (en) Method and apparatus for performing channel aggregation and medium access control retransmission
US9369951B2 (en) Methods, access point and wireless device for reducing overhead when transmitting signaling messages relating to link establishment between an access point and a wireless device
US9578663B2 (en) Method and apparatus for setting up link at high-speed in wireless communication system
JP2016536903A (en) Adaptive RTS / CTS in high efficiency wireless communication
US9813938B2 (en) Systems and methods for dynamic adaptation of channel access or transmission parameters
US20150063251A1 (en) Methods and apparatus for extending a reverse direction grant on a wireless network
JP2016540421A (en) Wireless communication postponement based on transmission opportunities
JP2014528665A (en) Collision reduction mechanisms for wireless communication networks
JP2016541158A (en) System and method for improving communication efficiency in a high efficiency wireless network
JP2022540631A (en) MULTI-LINK COMMUNICATION METHOD AND RELATED APPARATUS
US9609667B2 (en) Procedure for setting threshold for accessing channel
WO2016136724A1 (en) Wireless communication system and wireless communication method
US20210136599A1 (en) Coordinated Multi-Access-Point AP Transmission Method, Related Apparatus, and System
US20150257116A1 (en) Methods, apparatus and computer programs for operating a wireless communications device
CN111757533A (en) Method and equipment for sending PPDU (PPDU) in wireless local area network
WO2023197782A1 (en) Channel access method and apparatus, device, and storage medium
WO2016011337A1 (en) Methods and procedures for wifi sticky client and peer-to-peer client interference mitigation (wispim)
US11558759B2 (en) Systems and methods for minimizing latency and contention using QoS frame scheduling information
CN117336893A (en) One-to-one wireless transmission method, system, electronic device and storage medium
CN112292907B (en) Data transmission method, device, equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination