WO2015077935A1 - Resource negotiation method, device and node - Google Patents

Resource negotiation method, device and node Download PDF

Info

Publication number
WO2015077935A1
WO2015077935A1 PCT/CN2013/087920 CN2013087920W WO2015077935A1 WO 2015077935 A1 WO2015077935 A1 WO 2015077935A1 CN 2013087920 W CN2013087920 W CN 2013087920W WO 2015077935 A1 WO2015077935 A1 WO 2015077935A1
Authority
WO
WIPO (PCT)
Prior art keywords
node
interfering
resource
information
wireless
Prior art date
Application number
PCT/CN2013/087920
Other languages
French (fr)
Chinese (zh)
Inventor
李云波
伍天宇
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Priority to PCT/CN2013/087920 priority Critical patent/WO2015077935A1/en
Priority to CN201380076354.8A priority patent/CN105191399B/en
Publication of WO2015077935A1 publication Critical patent/WO2015077935A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W16/00Network planning, e.g. coverage or traffic planning tools; Network deployment, e.g. resource partitioning or cells structures
    • H04W16/02Resource partitioning among network components, e.g. reuse partitioning
    • H04W16/10Dynamic resource partitioning

Definitions

  • the present invention relates to the field of communications, and in particular, to a resource negotiation method, apparatus, and node.
  • a frequency domain channel resource in a wireless communication system generally includes an authorized frequency domain channel resource and an unauthorised frequency domain channel resource.
  • channel resources planning for frequency domain channel resources can be used to eliminate and reduce interference between adjacent nodes, but when nodes communicate with each other through unlicensed frequency domain channel resources. Because channel resource planning cannot be performed, the interference problem caused by communication between nodes is very complicated and difficult to solve.
  • a solution to the problem of interference between adjacent nodes in the currently unlicensed frequency domain channel resources is: setting a resource management node in the wireless communication system, and maintaining a resource in the resource management node.
  • a management database configured to manage unauthorised frequency domain channel resources in the wireless communication system;
  • a node in the wireless communication system sends a frequency domain channel resource request to the resource management node; and the resource management node queries the resource management database as a transmission frequency
  • Each node of the domain channel resource request allocates available frequency domain channel resources, and transmits the allocation result to the corresponding node.
  • a third-party resource management node needs to be set in a wireless communication system, and the network architecture of the wireless communication system is highly complex;
  • the resource management node is required to manage all frequency domain channel resources of the wireless communication system, and the data is very large, which affects the efficiency of the resource management node for allocating frequency domain channel resources for each node;
  • a wireless communication system such as a wireless local area network (WLAN) may be set in a complex environment such as indoors, and the wireless management environment in which the resource management node and the node that requests the frequency domain channel resource request are not completely identical, and the resource management node is very It is difficult to accurately allocate frequency domain channel resources for each node.
  • WLAN wireless local area network
  • a resource negotiation method, device, and node are provided, which can reduce wireless communication.
  • the complexity of the network architecture of the system improves the efficiency of allocating radio resources to nodes, and can more accurately allocate radio resources to each node.
  • a resource negotiation apparatus including: a determining unit, an obtaining unit, and a negotiating unit, where
  • a determining unit configured to determine an interference node that interferes with the first node
  • an obtaining unit configured to acquire wireless environment related information of the interference node determined by the determining unit
  • a negotiating unit configured to negotiate with the interference node according to the wireless environment related information of the first node and the wireless environment related information of the interfering node acquired by the acquiring unit, Wireless resources.
  • the acquiring unit is further configured to: obtain a resource negotiation policy that is negotiated with the interfering node, and obtain the obtained resource negotiation policy Send to the negotiation unit.
  • the acquiring unit includes:
  • a first receiving subunit configured to receive a resource negotiation policy supported by the interfering node sent by the interfering node, and use the received resource negotiation policy as the resource negotiation negotiated with the interfering node.
  • the obtaining unit includes:
  • a second receiving subunit configured to receive resource negotiation policy information that is supported by the interfering node, where the resource negotiation policy information includes at least two resource negotiation policies;
  • a selection subunit configured to select, from the resource negotiation policy information received by the second receiving subunit, a resource negotiation policy supported by the first node as the resource negotiation negotiated with the interference node.
  • the first sending subunit is configured to send information about the resource negotiation policy selected by the selecting subunit to the interference node.
  • the negotiation unit includes:
  • a first determining subunit configured to determine, according to the wireless environment related information and the resource negotiation policy, a radio resource corresponding to the first node, and use the determined radio resource as the radio resource used by the first node.
  • the second sending subunit is configured to send information about the radio resource determined by the first determining subunit to each interfering node.
  • the negotiation unit includes:
  • a second determining subunit configured to determine, according to the wireless environment related information and the resource negotiation policy, a radio resource corresponding to the first node
  • a third sending subunit configured to send information about the radio resource determined by the second determining subunit to each interfering node for confirmation
  • a third receiving subunit configured to receive a consent response sent by each interfering node with respect to the acknowledgement
  • the second determining subunit is further configured to: after receiving the consent response sent by each interfering node with respect to the acknowledgement, the third receiving subunit uses the radio resource as a radio resource used by the first node.
  • the acquiring unit includes:
  • a fourth receiving subunit configured to receive radio environment related information of the interfering node sent by the interfering node.
  • the apparatus further includes:
  • the authentication unit is configured to perform security authentication with the interference node before acquiring the information about the wireless environment of the interference node. After the authentication is passed, the trigger acquiring unit acquires information about the wireless environment of the interference node.
  • the authenticating unit is specifically configured to: perform security by using a public key encryption method with the interfering node Certification.
  • a first node including a processor and a transceiver
  • a processor configured to determine an interference node that interferes with the first node; acquire wireless environment related information of the interference node; according to the wireless environment related information of the first node and the interference node Wireless environment related information, negotiated with the interference node by the transceiver, and used by the first node Wireless resources;
  • the transceiver is configured to negotiate, with the interference node, a radio resource used by the first node.
  • the processor is further configured to: obtain a resource negotiation policy that is negotiated with the interference node.
  • the processor is specifically configured to: receive, by the transceiver, the The resource negotiation policy supported by the interfering node, the received resource negotiation policy is used as a resource negotiation policy negotiated with the interfering node;
  • the transceiver is further configured to: receive a resource negotiation policy supported by the interference node sent by the interference node;
  • the processor is specifically configured to: receive, by using the transceiver, resource negotiation policy information that is supported by the interference node that is sent by the interference node, where the resource negotiation policy information includes at least two resource negotiation And selecting, by the received resource negotiation policy information, a resource negotiation policy supported by the first node as a resource negotiation policy negotiated with the interference node, and sending, by using the transceiver, the information of the selected resource negotiation policy Giving the interference node;
  • the transceiver is further configured to: receive resource negotiation policy information supported by the interference node sent by the interference node, and send information about the resource negotiation policy selected by the processor to the interference node.
  • the processor is specifically configured to: determine, according to the wireless environment related information of the first node, the wireless environment related information of the interference node, and the resource negotiation policy negotiated with the interference node to determine the first node. Corresponding radio resources; using the determined radio resource as the radio resource used by the first node, and transmitting the determined radio resource information to each interfering node by using the transceiver;
  • the transceiver is further configured to: send information about the radio resource determined by the processor to each interference node.
  • the processor is specifically configured to: determine, according to the wireless environment related information of the first node, the wireless environment related information of the interference node, and the resource negotiation policy negotiated with the interference node to determine the first node. Corresponding radio resources; transmitting the determined information of the radio resources to each interfering node through the transceiver Confirming that the radio resource is used as a radio resource used by the first node after receiving the consent response sent by each interfering node with respect to the acknowledgement;
  • the transceiver is further configured to: send, by the processor, information about the radio resource to be sent to each interfering node for confirmation; and receive, by each interfering node, a consent response for the acknowledgement, The received consent response is sent to the processor.
  • a resource negotiation method including:
  • the first node determines an interference node that interferes with the first node
  • the first node acquires information about the wireless environment of the interference node
  • the first node negotiates the radio resource used by the first node with the interfering node according to the radio environment related information of the first node and the radio environment related information of the interfering node.
  • the method further includes: before negotiating the radio resource used by the first node with the interfering node, the method further includes:
  • the first node acquires a resource negotiation policy that is negotiated with the interfering node.
  • the acquiring, by the first node, the resource negotiation policy that is negotiated with the interference node includes:
  • the first node receives the resource negotiation policy supported by the interference node sent by the interference node, and uses the received resource negotiation policy as a resource negotiation policy that is negotiated with the interference node;
  • the first node receives the resource negotiation policy information that is supported by the interference node, and the resource negotiation policy information includes at least two resource negotiation policies, and selects from the received resource negotiation policy information.
  • a resource negotiation policy supported by the first node is used as a resource negotiation policy that is negotiated with the interference node, and the information about the selected resource negotiation policy is sent to the interference node.
  • Determining, by the first node, the radio resource used by the first node by the interference node includes:
  • the first node uses the determined radio resource as a radio resource used by the first node, and sends the determined information of the radio resource to each interfering node.
  • Said first node and said The radio resources used by the interfering node to negotiate the first node include:
  • the first node sends the determined information of the radio resource to each of the interference nodes for confirmation;
  • the first node After receiving the consent response for each acknowledgement sent by each of the interfering nodes, the first node uses the radio resource as a radio resource used by the first node.
  • the acquiring, by the first node, the wireless environment related information of the interference node includes:
  • the first node receives the wireless environment related information of the interference node sent by the interference node.
  • the first node acquires the interference node Before the wireless environment related information, it also includes:
  • the first node and the interfering node perform security authentication. After the authentication is passed, the step of acquiring the radio environment related information of the interfering node by the first node is performed.
  • the performing security authentication between the first node and the interfering node includes:
  • the first node and the interfering node perform security authentication by using a public key encryption method.
  • the radio environment related information of the interfering node includes: a list of interfering nodes that interfere with the interfering node, and/or the interfering node may Obtained channel list, and/or load condition information of each channel available to the interfering node, and/or load condition information of the interfering node;
  • the wireless environment related information of the first node includes: a list of interference nodes that interfere with the first node, and/or a channel list obtainable by the first node, and/or the first node may obtain Load condition information of each channel, and/or load condition information of the first node.
  • the radio resource includes: a channel resource in a frequency domain, a time domain, or an air domain.
  • the first node determines an interference node that interferes with the first node; the first node acquires information about the wireless environment of the interference node; and the first node is related to the wireless environment of the first node itself.
  • the information and the wireless environment related information of the interfering node negotiate the radio resource used by the first node with the interfering node.
  • the first node negotiates with the interfering node the radio resources used by the first node, and does not need to additionally set the resource management node, thereby reducing the network architecture complexity of the wireless communication system; and, the first node and its own interfering node respectively Negotiating the radio resources used by the first node, and dispersing the data processing amount of the resource management node in the prior art to each node, thereby improving the efficiency of allocating radio resources to the node; the first node is based on the first node itself and the interfering node.
  • the wireless resource used by the first node is negotiated with the interference node, so that the wireless resource used by the first node can be allocated to the wireless environment of the first node and its interfering node, compared to the prior art. It can more accurately perform wireless resource allocation of nodes.
  • FIG. 1 is a schematic diagram of a network topology structure in a prior art resource negotiation method
  • FIG. 2 is a schematic flowchart of a resource negotiation method according to an embodiment of the present invention.
  • FIG. 3 is a schematic flowchart of another resource negotiation method according to an embodiment of the present invention.
  • 3A is a schematic diagram of a network topology structure between a node and a public key server according to an embodiment of the present invention
  • FIG. 4 is a schematic diagram of an implementation method for secure authentication between a first node and an interfering node according to an embodiment of the present invention
  • FIG. 5 is a schematic diagram of another implementation manner of security authentication between a first node and an interfering node according to an embodiment of the present invention
  • FIG. 6 is a schematic structural diagram of a resource negotiation apparatus according to an embodiment of the present invention
  • FIG. 7 is a schematic structural diagram of a first node according to an embodiment of the present invention. detailed description
  • the resource negotiation method of the embodiment of the present invention can be applied to any wireless communication system including at least two nodes, such as a WLAN.
  • FIG. 2 is a schematic diagram of a first embodiment of a resource negotiation method according to the present invention, where the method includes:
  • Step 201 The first node determines an interference node that interferes with the first node
  • the first node in the embodiment of the present invention may be a node in a wireless communication system, such as a WLAN, that needs to communicate with other nodes, and the interference node may be between the wireless node and the first node.
  • the first node and the interfering node may be nodes located at the network side, such as an access point (AP), a base station (Node B), etc., so as to implement negotiation of radio resources between the network side nodes.
  • AP access point
  • Node B base station
  • Step 202 The first node acquires information about the wireless environment of the interference node.
  • Step 203 The first node negotiates, according to the wireless environment related information of the first node and the wireless environment related information of the interference node, the wireless resource used by the first node with the interference node.
  • the radio resource in the embodiment of the present invention may include: a channel resource in a frequency domain, a time domain, or an air domain, such as the frequency domain channel resource in the background art.
  • FIG. 3 is a schematic diagram of a first embodiment of a resource negotiation method according to the present invention, where the method includes:
  • Step 301 The first node determines an interference node that interferes with the first node.
  • the interference node may be one or more. When the number of the interference nodes is multiple, the following steps 302 to 306 are performed between the first node and each of the interference nodes.
  • the first node may obtain information of the interference node that interferes with the first node in a passive or active manner.
  • the first node may obtain the information of the interfering node by detecting the sending address or the sending node identifier in the sending frame of the neighboring node on the working frequency domain channel resource; in the active mode, the first node may The request frame is sent on the working frequency domain channel resource, and the information of the interference node is obtained by detecting the response frame fed back by the neighbor node.
  • the request frame and the response frame may be implemented by using an existing data frame structure, or may be defined autonomously in an actual application, which is not limited herein.
  • Step 302 The first node sends a resource negotiation request frame to the interference node, where the resource negotiation request frame is used to request the interference node to perform resource negotiation with the first node.
  • Step 303 The first node receives the resource negotiation confirmation frame sent by the interference node, where the resource negotiation confirmation frame is used to indicate that the interference node of the first node agrees to perform resource negotiation.
  • the resource negotiation request frame and the resource negotiation confirmation frame may be implemented by using an existing data frame structure, or may be defined autonomously in an actual application, which is not limited herein.
  • Step 302 and step 303 are optional steps. In addition, step 302 and step 303 may also be performed before the step 305 is performed after the authentication is passed in step 304.
  • Step 304 Perform security authentication between the first node and the interfering node. After the authentication is passed, perform step 305. When the authentication fails, the processing between the first node and the interfering node ends.
  • Step 305 The first node acquires radio environment related information of the interfering node and a resource negotiation policy that is negotiated with the interfering node.
  • the wireless environment related information of the interference node may include at least one of the following information: a list of interference nodes that interfere with the interference node, a channel list obtainable by the interference node, and the interference
  • the channel list obtainable by the interfering node refers to a channel that the interfering node is currently working on and a channel that can work after being negotiated according to its capabilities and wishes.
  • the resource negotiation policy is optional information; for example, when the first node and each interfering node support only the same resource negotiation policy, for example, respectively, the first node and each interfering node are already set.
  • the resource negotiation policy is the same, the first node does not need to obtain the resource negotiation policy that is negotiated with the interfering node, and directly negotiates according to the preset resource negotiation policy in the subsequent step 306. .
  • the resource negotiation policy refers to a policy followed by radio resource negotiation between nodes.
  • the main purpose of the resource negotiation policy setting is that the first node and the interfering node negotiate according to the resource negotiation policy, and the radio resources that the first node can obtain are only allocated to the first node or are allocated to the first node and Part or all interfere with the node to avoid or reduce the occurrence of collisions.
  • the implementation of the resource negotiation policy can be implemented in many ways. Generally, the resources are negotiated according to the same resource negotiation policy to avoid unfairness between nodes and reduce the collision probability of the negotiation result.
  • the first node acquiring the wireless environment related information of the interference node may include the following possible implementation manners:
  • the radio environment related information of the interfering node may be carried in the resource negotiation acknowledgement frame sent by the interfering node to the first node, and the first node acquires the radio environment related to the interfering node.
  • Information can include:
  • the first node acquires information about the wireless environment of the corresponding interfering node from the received resource negotiation confirmation frame.
  • the information about the radio environment of the interfering node may not be carried in the resource negotiation confirmation frame sent by the interfering node to the first node, but is transmitted to the first node by other means,
  • the acquiring, by the first node, the wireless environment related information of the interference node may include:
  • the first node receives wireless environment related information of the interference node sent by the interference node.
  • the wireless environment related information may be carried in the data frame by the interfering node to the first node.
  • the resource negotiation policy that the first node obtains to negotiate with the interference node may include the following possible implementation manners:
  • the first node acquires
  • the resource negotiation policy that the interference node negotiates may include:
  • the first node obtains the resource negotiation policy supported by the corresponding interfering node from the resource negotiation confirmation frame, and uses the obtained resource negotiation policy as a resource negotiation policy that is negotiated with the interfering node;
  • the interfering node supports only one resource negotiation policy, and the resource negotiation policy is not carried in the resource negotiation acknowledgement frame sent by the interfering node, but is transmitted to the
  • a resource negotiation policy that the first node obtains to negotiate with the interfering node may include:
  • the first node receives the resource negotiation policy supported by the interference node sent by the interference node, and uses the received resource negotiation policy as a resource negotiation policy that is negotiated with the interference node.
  • the resource negotiation policy may be carried in the data frame by the interfering node to the first node.
  • the resource negotiation policy information formed by the at least two resource negotiation policies carries the resource negotiation sent by the interfering node.
  • the resource negotiation policy that the first node obtains to negotiate with the interfering node may include:
  • the first node obtains the resource negotiation policy information of the corresponding interfering node from the resource negotiation confirmation frame, and selects a resource negotiation policy supported by the first node from the voluntary negotiation policy information to negotiate with the interference node.
  • the resource negotiation policy is followed, and the information about the selected resource negotiation policy is sent to the interference node.
  • the interfering node supports the at least two resource negotiation policies, and the resource negotiation policy information that is formed by the at least two resource negotiation policies does not carry the resources sent by the interfering node
  • the negotiation confirmation frame is transmitted to the first node by other means, and the resource negotiation policy that the first node obtains to negotiate with the interference node may include:
  • the first node receives the resource negotiation policy information supported by the interference node sent by the interference node; the first node selects a resource negotiation policy supported by the first node from the received resource negotiation policy information as And the interference negotiation node negotiates the resource negotiation policy, and sends the information of the selected resource negotiation policy to the interference node.
  • the resource negotiation policy information may be carried in a data frame for transmission.
  • the information of the selected resource negotiation policy may be carried in a data frame for transmission.
  • the wireless environment related information and the resource negotiation policy or resource negotiation policy information may be carried in the same or different data frames.
  • the resource negotiation confirmation frame may also include only the radio environment related information of the interfering node, and the resource negotiation policy supported by the interfering node or the resource negotiation policy information of the interfering node may be used by the interfering node by other means, for example, other Sending a data frame to the first node; or, the resource negotiation confirmation
  • the frame may also include only the resource negotiation policy supported by the interfering node or the resource negotiation policy information of the interfering node, and the radio environment related information of the interfering node may be sent by the interfering node to the first node by other means, such as other data frames.
  • the resource negotiation request frame in step 302 may also include: information about the wireless environment of the first node and/or information of the resource negotiation policy supported by the first node, so as to interfere with the node and the interference node.
  • the own interfering node negotiates the radio resources used by itself;
  • the resource negotiation request frame may not include: the wireless environment related information of the first node and/or the information of the resource negotiation policy supported by the first node, etc., but is transmitted by the first node through other frames. Give the interference node.
  • the wireless environment related information of the first node and the resource negotiation policy supported by the first node may be transmitted using the same or different frames.
  • Step 306 The first node negotiates the radio resource used by the first node with the interfering node according to the radio environment related information of the first node, the radio environment related information of the interfering node, and the resource negotiation policy negotiated with the interfering node. .
  • the wireless environment related information of the first node may include: a list of interference nodes that interfere with the first node, and/or a channel list obtainable by the first node, and/or the first Load condition information of each channel available to the node, and/or load condition information of the first node.
  • the wireless environment related information of the first node and the specific information included in the wireless environment related information of the interference node should be consistent, for example, the first node may include the first node in the wireless environment related information.
  • the channel list, then the information about the wireless environment of the interfering node preferably includes the channel list available to the interfering node, so that the first node can obtain more comprehensive information when negotiating with the interfering node for radio resources, so that the negotiation result is obtained. More accurate.
  • the first node and the interference node may negotiate that the radio resource used by the first node may be completely distributed.
  • the first node is configured according to the wireless environment of the first node.
  • the related information, the wireless environment related information of the interfering node, and the resource negotiation policy that is negotiated with the interfering node, and the radio resource used by the first node to negotiate with the interfering node may include:
  • the first node uses the determined radio resource as the radio resource used by the first node, and sends the information of the radio resource to each interfering node.
  • the determined radio resource used by the first node may overlap with the radio resource used by the interfering node determined by the interfering node.
  • the two may share overlapping frequency domain channel resources through a contention mechanism, which is not described herein. .
  • the first node and the interference node may negotiate that the radio resource used by the first node may be interactive.
  • the first node is related to the wireless environment of the first node.
  • the information, the information about the wireless environment of the interfering node, and the resource negotiation policy that is negotiated with the interfering node, and the radio resource used by the interfering node to negotiate with the interfering node may include:
  • the first node sends the determined information of the radio resource to each interfering node for confirmation
  • the first node After receiving the consent response sent by each interfering node, the first node uses the radio resource as the radio resource used by the first node.
  • the first node sends the information of the radio resource to each interfering node, and if the interfering node agrees, replies to the acknowledgment response, and if the interfering node disagrees, replies the refusal response.
  • the first node can use the corresponding radio resource as the radio resource used by its own work only after all the interfering nodes reply the consent response. Otherwise, the radio resource corresponding to the first node needs to be re-determined and then the acknowledgement is sent to the interfering node again. request.
  • the first node negotiates with the interfering node according to the radio environment related information of the first node, the radio environment related information of the interfering node, and the resource negotiation policy negotiated with the interfering node.
  • the frequency domain channel resources used by a node may include:
  • the first node uses the determined frequency domain channel resource as the frequency domain channel resource used by the first node, and sends the information of the frequency domain channel resource to each interference node.
  • the first node since the first node can only obtain local information in the wireless communication system, the determined frequency domain channel resource used by the first node and the frequency used by the interference node determined by the interference node are determined.
  • the domain channel resources may overlap. In this case, the two can share overlapping frequency domain channel resources through the contention mechanism, which is not described here.
  • the first node negotiates with the interfering node according to the radio environment related information of the first node, the radio environment related information of the interfering node, and the resource negotiation policy negotiated with the interfering node.
  • the frequency domain channel resources used by a node may include:
  • the first node sends the determined information of the frequency domain channel resource to each interference node for confirmation;
  • the first node After receiving the consent response sent by each interfering node for the acknowledgment, the first node uses the frequency domain channel resource as the frequency domain channel resource used by the first node.
  • the first node transmits the information of the frequency domain channel resource to each interference node, and if the interference node agrees, replies to the consent response, and if the interference node does not agree, the response refusal.
  • the first node can use the corresponding frequency domain channel resource as the frequency domain channel resource used by itself only after all the interfering nodes reply the consent response. Otherwise, the frequency domain channel resource corresponding to the first node needs to be re-determined and then again. A confirmation request is sent to the interfering node.
  • the resource negotiation policy is related to specific information included in the wireless environment related information of the node, where the node may include: a first node and an interference node.
  • the resource negotiation algorithm may be set as a resource negotiation policy according to one or more information in the wireless environment related information as an input parameter, and the wireless resource is used as an output parameter, for example:
  • the resource negotiation policy may include: determining, according to the interference node list, between the first node, the interference node, and the interference node of the interference node. a topological relationship; allocating a total radio resource obtainable by the first node according to the topology relationship;
  • the resource negotiation policy may include: when determining the wireless resource for the first node, the interference node may be excluded from the channel list obtainable by the first node.
  • Channel in the channel list for example, when a channel is occupied by a radar or has been allocated to an interfering node by negotiation, the channel is not available to the first node, so the first node is in interference with The channel needs to be excluded when the node negotiates radio resources.
  • the resource negotiation policy may include: dividing the channel resources between the nodes; The channel resources available to the interfering node and the interfering node are equally divided according to the load condition information of each channel that the interfering node can obtain, and the channel resources used by the first node are negotiated with the interfering node. It should be noted that when performing channel resource division, it is generally considered that different load between channels may result in different transmission rates that the same width or number of channels can support, so as to avoid unfairness of the negotiation process.
  • the resource negotiation policy may include: allocating the total wireless resources available to the first node according to the interference node and the load of the first node. For example, if the radio resource is a frequency domain channel resource, the load of the interfering node is Pi p 2 , - pk, the load of the first node is p Q , and the total frequency domain channel resource obtainable by the first node is S, In the resource negotiation with the interfering node, the frequency domain channel resource width obtainable by the first node does not exceed
  • So S* p 0 /( po+p 1 + ⁇ +Pk).
  • the wireless environment related information of the node includes the load situation information of the node, and the resource negotiation policy is used to allocate the frequency domain channel resource according to the interference node and the load of the first node, and how to implement the determination in step 306.
  • the frequency domain channel resources corresponding to the first node are described in more detail.
  • the determining, by the first node, the frequency domain channel resource corresponding to the first node according to the wireless environment related information and the resource negotiation policy may include:
  • the first node determines, according to the load of the first node and the interfering node, and the resource negotiation policy, a frequency domain channel resource width obtainable by the first node and the interfering node;
  • the first node performs the ordering of the first node and the interfering node according to the first node and the MAC address of the interfering node;
  • the first node determines the frequency domain channel resource corresponding to the first node from the total frequency domain channel resources according to the sorting order and the frequency domain channel resource width obtainable by each node.
  • the total frequency domain channel resource may include: all frequency domain channel resources that the first node can acquire.
  • step 306 wherein the method is particularly applicable to the first possible implementation of step 306 above.
  • the frequency domain channel resource width corresponding to the first node may be determined according to the frequency domain channel resource width that can be obtained by the interfering node that is sorted by l ⁇ il.
  • the starting position of the first node, the frequency domain channel resource width obtainable by the first node may determine the end position of the frequency domain channel resource corresponding to the first node in the total frequency domain channel resource, thereby determining the frequency domain corresponding to the first node Channel resources.
  • the width of the frequency domain channel resource corresponding to the first node may be equal to or smaller than the frequency domain channel resource width obtainable by the first node.
  • the determining, by the first node, the frequency domain channel resource corresponding to the first node, according to the information about the wireless environment and the resource negotiation policy may include:
  • the first node determines, according to the load of the first node and the interfering node, and the resource negotiation policy, a frequency domain channel resource width obtainable by the first node;
  • the first node randomly selects the frequency domain channel resource corresponding to the first node from the total frequency domain channel resources according to the frequency domain channel resource width obtainable by the first node.
  • the total frequency domain channel resource may include: all frequency domain channel resources that the first node can acquire.
  • This method is particularly applicable to the second possible implementation of step 306 above.
  • the width of the frequency domain channel resource used by the first node may be less than or equal to the frequency domain channel resource width obtainable by the first node.
  • the first node negotiates with the interfering node the radio resources used by the first node, and does not need to additionally set the resource management node, thereby reducing the complexity of the network architecture of the wireless communication system;
  • the wireless resources used by the first node are negotiated with the interference nodes of the first node, and the data processing amount of the resource management node in the prior art is dispersed to each node, thereby improving the efficiency of allocating wireless resources to the nodes;
  • the related information and the resource negotiation policy information negotiate the radio resource used by the first node with the interfering node, so that the first node radio resource can be allocated to the radio environment of the first node and its interfering node, which can be more advanced than the prior art.
  • the security authentication is performed first, thereby ensuring the security of resource negotiation between the first node and the interfering node.
  • the security authentication may be performed by the public key encryption method between the first node and the interfering node of the first node.
  • the public key encryption method uses an asymmetric key, including a pair of keys, an encryption key and a decryption key. These two keys are mathematically related. When a certain information is encrypted by an encryption key, only The corresponding decryption key can be used to decrypt the information. Moreover, if one of the keys is known, and another key paired with the key cannot be calculated, if one of the pair of keys is disclosed, the other key will not be compromised. The secret nature.
  • the public key is called a public key, and the undisclosed key is called a private key.
  • a wireless communication system such as a WLAN may be used.
  • a public key server is set in the system, and the public key of each node is stored in the public key server.
  • Each node can communicate with a public key server, see for example Figure 3A. Through the public key server, each node can obtain the public key of any other node. Any form of communication connection can be used between the node and the public key server, for example, the node communicates with the public key server via Ethernet, and the like.
  • the public key server is also connected to each node, it is substantially different from the resource management node described in the prior art, that is, the resource management node maintains a resource database, and according to the database All nodes allocate resources, and the public key server is only responsible for managing the public keys of each node, and does not directly participate in the negotiation and allocation of resources.
  • the method for implementing security authentication between the first node and the interfering node may include:
  • Step 401 The first node sends, to the interfering node, the first encrypted information encrypted by using the private key of the first node;
  • Step 402 The interfering node requests the public key of the first node from the public key server;
  • Step 403 The public key server sends the public key of the first node to the interference node;
  • Step 404 The interfering node decrypts the first encrypted information by using the public key of the first node. If the decryption is unsuccessful, the interfering node fails to pass the first node security authentication; if the decryption succeeds, the interfering node pairs the first After the node security authentication is passed, step 405 is performed.
  • Step 405 The interfering node sends the second encrypted information encrypted by the private key of the interfering node to the first node.
  • Step 406 The first node requests the public key server to interfere with the public key of the node;
  • Step 407 The public key server sends the public key of the interfering node to the first node;
  • Step 408 The first node decrypts the second encrypted information by using the public key of the interfering node. If the decryption is unsuccessful, the first node does not pass the security authentication of the interfering node; if the decryption succeeds, the first node interferes with the first node. The node security certification is passed.
  • the first encryption information may be carried in the resource negotiation request frame, and the second encryption information may be carried in the resource negotiation confirmation frame.
  • the interaction of information between the interference node and the first node may be implemented by means of frame interaction.
  • the method for implementing security authentication between the first node and the interfering node may include:
  • Step 501 The first node requests the public key server to interfere with the public key of the node;
  • Step 502 The public key server sends the public key of the interfering node to the first node;
  • Step 503 The first node encrypts the first problem information by using the public key of the interfering node, and sends the obtained third encrypted information to the interfering node;
  • Step 504 The interfering node decrypts the third encrypted information by using its own private key, and solves the first problem information obtained by decrypting to obtain the first answer information.
  • Step 505 The interfering node requests the public key of the first node from the public key server;
  • Step 506 The public key server sends the public key of the first node to the interference node;
  • Step 507 The interference node encrypts the second problem information by using the public key of the first node, and sends the obtained fourth encrypted information and the first solution information to the first node.
  • Step 508 The first node verifies the first answer information. If the verification passes, step 509 is performed; if the verification fails, the security authentication between the first node and the interfering node fails, and the authentication process ends.
  • Step 509 The first node decrypts the fourth encrypted information by using its own private key, and answers the decrypted second question information to obtain second answer information, and sends the second answer information to the interference node. ;
  • Step 5 10 The interference node verifies the second solution information, if the verification passes, the security authentication between the interference node and the first node passes; if the verification fails, the first node and the interference node The security certification did not pass and the certification process ended.
  • the third encrypted information may be carried in the resource negotiation request frame, where the fourth encrypted information and the first solution information may be carried in the resource negotiation confirmation frame.
  • the security authentication between the first node and the interfering node can be achieved.
  • the security authentication method shown in FIG. 4 and FIG. 5 above is only an example. In practical applications, the security authentication method shown in FIG. 4 and FIG. 5 may be modified, or the other security authentication method may be used to implement the first method.
  • the security authentication between the node and the interfering node is not limited in the present invention.
  • the embodiment of the present invention further provides a resource negotiation apparatus, and the apparatus can be applied to the first node. Referring to Figure 6, the apparatus 600 includes:
  • determining unit 610 configured to determine an interference node that interferes with the first node
  • the obtaining unit 620 is configured to obtain wireless environment related information of the interference node determined by the determining unit 610;
  • [200] negotiating unit 630 configured to acquire information about a wireless environment according to the first node, and an acquiring unit
  • the wireless environment related information of the interfering node acquired by the 620, and the first node is negotiated with the interfering node.
  • the obtaining unit 620 is further configured to: obtain a resource negotiation policy that is negotiated with the interfering node, and send the obtained resource negotiation policy to the negotiating unit.
  • the obtaining unit 620 may include:
  • a first receiving subunit configured to receive a resource negotiation policy supported by the interfering node sent by the interfering node, and use the received resource negotiation policy as the resource negotiation negotiated with the interfering node.
  • the obtaining unit 620 may include:
  • the second receiving subunit is configured to receive the resource negotiation policy information that is supported by the interfering node, and the resource negotiation policy information includes at least two resource negotiation policies.
  • a selection subunit configured to select, from the resource negotiation policy information received by the second receiving subunit, a resource negotiation policy supported by the first node as the resource negotiation negotiated with the interference node.
  • the first sending subunit is configured to send information about the resource negotiation policy selected by the selecting subunit to the interference node.
  • the negotiating unit 630 specifically includes:
  • a first determining subunit configured to determine, according to the wireless environment related information and the resource negotiation policy, a radio resource corresponding to the first node, and use the determined radio resource as a radio resource used by the first node;
  • the second sending subunit is configured to send information about the radio resource determined by the first determining subunit to each interfering node.
  • the negotiating unit 630 specifically includes:
  • a second determining subunit configured to determine, according to the wireless environment related information and the resource negotiation policy, a radio resource corresponding to the first node
  • a third sending subunit configured to send information about the radio resource determined by the second determining subunit to each interfering node for confirmation
  • a third receiving subunit configured to receive an agreed response to the acknowledgement sent by each interfering node
  • the second determining subunit is further configured to: after receiving the consent response sent by each interfering node with respect to the acknowledgement, the third receiving subunit uses the radio resource as a radio resource used by the first node.
  • the obtaining unit 620 may include: [217] A fourth receiving subunit, configured to receive radio environment related information of the interfering node sent by the interfering node.
  • the device may further include:
  • the authentication unit is configured to perform security authentication with the interference node before acquiring the wireless environment related information of the interference node. After the authentication is passed, the trigger acquiring unit acquires the wireless environment related information of the interference node.
  • the authenticating unit may be specifically configured to: perform security authentication by using a public key encryption method with the interfering node.
  • the device and the interfering node mutually negotiate the radio resources used by the first node, and do not need to additionally set the resource management node, thereby reducing the complexity of the network architecture of the wireless communication system;
  • the wireless environment related information of the node and its interfering node negotiates with the interfering node the radio resource used by the first node, so that the radio resource of the first node and the interfering node can be allocated to the radio resource of the first node, compared to the existing The technology can more accurately perform wireless resource allocation of nodes.
  • the first node 700 includes: a processor 710, a memory 720, a transceiver 730, and a bus 740;
  • the processor 710, the memory 720, and the transceiver 730 are connected to each other through a bus 740; the bus 740 can be an ISA bus, a PCI bus, or an EISA bus.
  • the bus can be divided into an address bus, a data bus, a control bus, and the like. For ease of representation, only one thick line is shown in Figure 7, but it does not mean that there is only one bus or one type of bus.
  • Memory 720 used to store programs.
  • the program can include program code, the program code including computer operating instructions.
  • the memory 720 may include a high speed RAM memory and may also include a non-volatile memory such as at least one disk memory.
  • the processor 710 executes the program code, configured to determine an interference node that interferes with the first node, acquires wireless environment related information of the interference node, and obtains information about the wireless environment of the first node and the The wireless environment related information of the interference node is negotiated with the interference node by the transceiver 730 to negotiate the wireless resource used by the first node.
  • the transceiver 730 is used to connect to other devices and to communicate with other devices.
  • the transceiver 730 is used to: Negotiating with the interfering node the radio resources used by the first node.
  • the processor 710 is further configured to: obtain a resource negotiation policy that is negotiated with the interference node; and correspondingly, the processor 710 is configured according to the wireless environment related information of the first node, The radio environment related information of the interfering node and the resource negotiation policy are negotiated with the interfering node by the transceiver 730 to negotiate the radio resource used by the first node.
  • the processor 710 may be specifically configured to:
  • the transceiver 730 is further configured to: receive a resource negotiation policy supported by the interference node sent by the interference node; or
  • the processor 710 is specifically configured to: receive, by the transceiver 730, the resource negotiation policy information that is supported by the interference node that is sent by the interference node, where the resource negotiation policy information includes at least two resource negotiation policies; And selecting, by the received resource negotiation policy information, a resource negotiation policy supported by the first node as a resource negotiation policy that is negotiated with the interference node, and sending, by the transceiver 730, information about the selected resource negotiation policy to the interference Node
  • the transceiver 730 is further configured to: receive resource negotiation policy information supported by the interference node sent by the interference node, and send information about the resource negotiation policy selected by the processor 710 to the interference node. .
  • the processor 710 is specifically configured to: comply with the wireless environment related information of the first node, the wireless environment related information of the interference node, and the negotiation with the interference node.
  • the resource negotiation policy determines the radio resource corresponding to the first node; the determined radio resource is used as the radio resource used by the first node, and the determined information of the radio resource is sent to each interfering node through the transceiver 730;
  • the transceiver 730 is further configured to: send information about the radio resource determined by the processor 710 to each interfering node.
  • the processor 710 is specifically configured to: comply with the wireless environment related information of the first node, the wireless environment related information of the interference node, and the negotiation with the interference node.
  • the resource negotiation policy determines the radio resource corresponding to the first node; the determined information of the radio resource is sent to each interfering node through the transceiver 730 for confirmation; and the transceiver 730 receives the acknowledgement sent by each interfering node. After the consent is answered, the wireless resource is used as the first node.
  • Wireless resources
  • the transceiver 730 is further configured to: confirm, by using the information about the radio resource determined by the processor 710, by sending to each interfering node, and receiving, by each interfering node, a consent response for the acknowledgement, The received consent response is sent to the processor 710.
  • the processor 710 is specifically configured to: receive, by using the transceiver 730, wireless environment related information of the interfering node that is sent by the interfering node;
  • the transceiver 730 is further configured to: receive wireless environment related information of the interference node sent by the interference node.
  • the processor 710 is further configured to: perform security authentication between the transceiver 730 and the interfering node before acquiring the radio environment related information of the interfering node, and after the authentication is passed, Performing the step of acquiring wireless environment related information of the interference node;
  • the transceiver 730 is further configured to: perform security authentication with the interference node.
  • the transceiver 730 is specifically configured to: perform security authentication by using a public key encryption method with the interfering node.
  • the first node negotiates with the interfering node the radio resources used by the first node, and does not need to additionally set a resource management node, thereby reducing the complexity of the network architecture of the wireless communication system; Separating the radio resources used by the first node with the own interfering node, respectively, and dispersing the data processing amount of the resource management node in the prior art to each node, thereby improving the efficiency of allocating radio resources to the node; And the node and the wireless environment related information of the interfering node, and the radio resource used by the first node is negotiated with the interfering node, so that the radio resource of the first node and the radio environment of the interfering node can be allocated, compared to the existing The technology can more accurately perform wireless resource allocation of nodes.
  • the techniques in the embodiments of the present invention can be implemented by means of software plus a necessary general hardware platform.
  • the technical solution in the embodiments of the present invention may be embodied in the form of a software product in essence or in the form of a software product, and the computer software product may be stored in a storage medium such as a ROM/RAM. , a diskette, an optical disk, etc., comprising instructions for causing a computer device (which may be a personal computer, server, or network device, etc.) to perform the methods described in various embodiments of the present invention or in certain portions of the embodiments.
  • a computer device which may be a personal computer, server, or network device, etc.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

Disclosed are a resource negotiation method, device and node. The method comprises: a first node determines an interference node interfering with the first node; the first node obtains relevant wireless environment information of the interference node; the first node negotiates with the interference node about wireless resources used by the first node according to the relevant wireless environment information of the first node and the relevant wireless environment of the interference node. An embodiment of the present invention can reduce the complexity of the network architecture in a wireless communication system, improving the efficiency of allocating wireless resources for nodes and allocating wireless resources for each node more accurately.

Description

一种资源协商方法、 装置及节点  Resource negotiation method, device and node
技术领域 Technical field
[01] 本发明涉及通信领域, 尤其涉及一种资源协商方法、 装置及节点。 背景技术 [02] 对于一个无线通信系统, 系统中的节点之间进行通信时, 会对其他节点尤其 是与其相邻的节点的通信造成干扰。 以无线通信系统中的节点通过频域信道资源 进行通信为例, 无线通信系统中的频域信道资源一般包括授权的频域信道资源和 未授权的频域信道资源。 节点之间通过授权的频域信道资源通信时, 可以通过对 频域信道资源进行信道资源规划来消除和降低相邻节点之间的干扰, 但是节点之 间通过未授权的频域信道资源通信时, 由于无法进行信道资源规划, 节点之间通 信产生的干扰问题非常复杂, 解决困难。 [01] The present invention relates to the field of communications, and in particular, to a resource negotiation method, apparatus, and node. BACKGROUND OF THE INVENTION [02] For a wireless communication system, when communication between nodes in the system, communication with other nodes, especially nodes adjacent thereto, causes interference. Taking a node in a wireless communication system to communicate through a frequency domain channel resource as an example, a frequency domain channel resource in a wireless communication system generally includes an authorized frequency domain channel resource and an unauthorised frequency domain channel resource. When nodes communicate with authorized frequency domain channel resources, channel resources planning for frequency domain channel resources can be used to eliminate and reduce interference between adjacent nodes, but when nodes communicate with each other through unlicensed frequency domain channel resources. Because channel resource planning cannot be performed, the interference problem caused by communication between nodes is very complicated and difficult to solve.
[03] 参见图 1所示, 目前未授权的频域信道资源内相邻节点之间干扰问题的一种 解决方法是: 在无线通信系统中设置一资源管理节点, 资源管理节点中维护一个 资源管理数据库, 用于管理无线通信系统中未授权的频域信道资源; 无线通信系 统中的节点向所述资源管理节点发送频域信道资源请求; 资源管理节点查询所述 资源管理数据库, 为发送频域信道资源请求的各个节点分配可用的频域信道资 源, 将分配结果发送给对应的节点。  [03] Referring to FIG. 1, a solution to the problem of interference between adjacent nodes in the currently unlicensed frequency domain channel resources is: setting a resource management node in the wireless communication system, and maintaining a resource in the resource management node. a management database, configured to manage unauthorised frequency domain channel resources in the wireless communication system; a node in the wireless communication system sends a frequency domain channel resource request to the resource management node; and the resource management node queries the resource management database as a transmission frequency Each node of the domain channel resource request allocates available frequency domain channel resources, and transmits the allocation result to the corresponding node.
[04] 但是, 上述相邻节点之间干扰问题的解决方法具有如下问题:  [04] However, the solution to the above interference problem between adjacent nodes has the following problems:
[05] 第一、 需要在无线通信系统中设置第三方的资源管理节点, 无线通信系统的 网络架构复杂度高;  [05] First, a third-party resource management node needs to be set in a wireless communication system, and the network architecture of the wireless communication system is highly complex;
[06] 第二、 需要资源管理节点管理无线通信系统的所有频域信道资源, 数据非常 庞大, 影响了资源管理节点为各个节点分配频域信道资源的效率;  [06] Second, the resource management node is required to manage all frequency domain channel resources of the wireless communication system, and the data is very large, which affects the efficiency of the resource management node for allocating frequency domain channel resources for each node;
[07] 第三、无线通信系统例如无线局域网(WLAN)可能设置在室内等复杂环境, 而且资源管理节点、 发送频域信道资源请求的节点所处的无线环境不可能完全相 同, 资源管理节点很难准确的为各个节点分配频域信道资源。 发明内容 [07] Third, a wireless communication system such as a wireless local area network (WLAN) may be set in a complex environment such as indoors, and the wireless management environment in which the resource management node and the node that requests the frequency domain channel resource request are not completely identical, and the resource management node is very It is difficult to accurately allocate frequency domain channel resources for each node. Summary of the invention
[08] 本发明实施例中提供了一种资源协商方法、装置及节点, 能够降低无线通信 系统的网络架构复杂度, 提高为节点分配无线资源的效率, 且能够更加准确的为 各个节点分配无线资源。 [08] In the embodiment of the present invention, a resource negotiation method, device, and node are provided, which can reduce wireless communication. The complexity of the network architecture of the system improves the efficiency of allocating radio resources to nodes, and can more accurately allocate radio resources to each node.
[09] 第一方面,提供一种资源协商装置,包括: 确定单元、获取单元和协商单元, 其中,  [09] In a first aspect, a resource negotiation apparatus is provided, including: a determining unit, an obtaining unit, and a negotiating unit, where
[10] 确定单元, 用于确定与第一节点相互干扰的干扰节点; [10] a determining unit, configured to determine an interference node that interferes with the first node;
[11] 获取单元, 用于获取所述确定单元确定的所述干扰节点的无线环境相关信 息;  [11] an obtaining unit, configured to acquire wireless environment related information of the interference node determined by the determining unit;
[12] 协商单元,用于根据所述第一节点的无线环境相关信息以及所述获取单元获 取到的所述干扰节点的无线环境相关信息, 与所述干扰节点协商所述第一节点所 使用的无线资源。  [12] a negotiating unit, configured to negotiate with the interference node according to the wireless environment related information of the first node and the wireless environment related information of the interfering node acquired by the acquiring unit, Wireless resources.
[13] 结合第一方面,在第一方面第一种可能的实现方式中,所述获取单元还用于: 获取与所述干扰节点协商所遵照的资源协商策略, 将获取到的资源协商策略发送 给所述协商单元。  [13] In combination with the first aspect, in a first possible implementation manner of the first aspect, the acquiring unit is further configured to: obtain a resource negotiation policy that is negotiated with the interfering node, and obtain the obtained resource negotiation policy Send to the negotiation unit.
[14] 结合第一方面第一种可能的实现方式, 在第一方面第二种可能的实现方式 中, 所述获取单元包括:  [14] In combination with the first possible implementation manner of the first aspect, in the second possible implementation manner of the first aspect, the acquiring unit includes:
[15] 第一接收子单元,用于接收所述干扰节点发送的所述干扰节点所支持的资源 协商策略, 将接收到的资源协商策略作为所述与所述干扰节点协商所遵照的资源 协商策略;  [15] a first receiving subunit, configured to receive a resource negotiation policy supported by the interfering node sent by the interfering node, and use the received resource negotiation policy as the resource negotiation negotiated with the interfering node. Strategy
[16] 或者, 所述获取单元包括:  [16] Alternatively, the obtaining unit includes:
[17] 第二接收子单元,用于接收所述干扰节点发送的所述干扰节点所支持的资源 协商策略信息, 所述资源协商策略信息中包括至少两种资源协商策略; [17] a second receiving subunit, configured to receive resource negotiation policy information that is supported by the interfering node, where the resource negotiation policy information includes at least two resource negotiation policies;
[18] 选择子单元,用于从所述第二接收子单元接收到的资源协商策略信息中选择 一种第一节点支持的资源协商策略作为所述与所述干扰节点协商所遵照的资源 协商策略;  [18] a selection subunit, configured to select, from the resource negotiation policy information received by the second receiving subunit, a resource negotiation policy supported by the first node as the resource negotiation negotiated with the interference node. Strategy
[19] 第一发送子单元,用于将所述选择子单元选择的资源协商策略的信息发送给 所述干扰节点。 [19] The first sending subunit is configured to send information about the resource negotiation policy selected by the selecting subunit to the interference node.
[20] 结合第一方面, 和 /或第一方面第一种可能的实现方式, 和 /或第一方面第二 种可能的实现方式, 在第一方面第三种可能的实现方式中, 所述协商单元包括:  [20] In combination with the first aspect, and/or the first possible implementation of the first aspect, and/or the second possible implementation of the first aspect, in a third possible implementation of the first aspect, The negotiation unit includes:
[21] 第一确定子单元,用于根据所述无线环境相关信息以及所述资源协商策略确 定第一节点对应的无线资源, 将确定的无线资源作为第一节点所使用的无线资 [22] 第二发送子单元,用于将所述第一确定子单元确定的无线资源的信息发送至 各个干扰节点。 [21] a first determining subunit, configured to determine, according to the wireless environment related information and the resource negotiation policy, a radio resource corresponding to the first node, and use the determined radio resource as the radio resource used by the first node. [22] The second sending subunit is configured to send information about the radio resource determined by the first determining subunit to each interfering node.
[23] 结合第一方面, 和 /或第一方面第一种可能的实现方式, 和 /或第一方面第二 种可能的实现方式, 在第一方面第四种可能的实现方式中, 所述协商单元包括:  [23] In combination with the first aspect, and/or the first possible implementation of the first aspect, and/or the second possible implementation of the first aspect, in the fourth possible implementation of the first aspect, The negotiation unit includes:
[24] 第二确定子单元,用于根据所述无线环境相关信息以及所述资源协商策略确 定第一节点对应的无线资源; [24] a second determining subunit, configured to determine, according to the wireless environment related information and the resource negotiation policy, a radio resource corresponding to the first node;
[25] 第三发送子单元,用于将所述第二确定子单元确定的所述无线资源的信息发 送至各个干扰节点进行确认;  [25] a third sending subunit, configured to send information about the radio resource determined by the second determining subunit to each interfering node for confirmation;
[26] 第三接收子单元, 用于接收到各个干扰节点发送的关于所述确认的同意应 答;  [26] a third receiving subunit, configured to receive a consent response sent by each interfering node with respect to the acknowledgement;
[27] 第二确定子单元还用于:所述第三接收子单元接收到各个干扰节点发送的关 于所述确认的同意应答后, 将所述无线资源作为第一节点所使用的无线资源。  [27] The second determining subunit is further configured to: after receiving the consent response sent by each interfering node with respect to the acknowledgement, the third receiving subunit uses the radio resource as a radio resource used by the first node.
[28] 结合第一方面, 和 /或第一方面第一种可能的实现方式, 和 /或第一方面第二 种可能的实现方式, 和 /或第一方面第三种可能的实现方式, 和 /或第一方面第四 种可能的实现方式, 在第一方面第五种可能的实现方式中, 所述获取单元包括: [28] In combination with the first aspect, and/or the first possible implementation of the first aspect, and/or the second possible implementation of the first aspect, and/or the third possible implementation of the first aspect, And the fourth possible implementation manner of the first aspect, in the fifth possible implementation manner of the first aspect, the acquiring unit includes:
[29] 第四接收子单元,用于接收所述干扰节点发送的所述干扰节点的无线环境相 关信息。 [29] A fourth receiving subunit, configured to receive radio environment related information of the interfering node sent by the interfering node.
[30] 结合第一方面, 和 /或第一方面第一种可能的实现方式, 和 /或第一方面第二 种可能的实现方式, 和 /或第一方面第三种可能的实现方式, 和 /或第一方面第四 种可能的实现方式, 和 /或第一方面第五种可能的实现方式, 在第一方面第六种可 能的实现方式中, 该装置还包括:  [30] In combination with the first aspect, and/or the first possible implementation of the first aspect, and/or the second possible implementation of the first aspect, and/or the third possible implementation of the first aspect, And the fourth possible implementation manner of the first aspect, and/or the fifth possible implementation manner of the first aspect, in the sixth possible implementation manner of the first aspect, the apparatus further includes:
[31] 认证单元, 用于获取所述干扰节点的无线环境相关信息之前, 与所述干扰节 点之间进行安全认证, 认证通过后, 触发获取单元获取所述干扰节点的无线环境 相关信息。  [31] The authentication unit is configured to perform security authentication with the interference node before acquiring the information about the wireless environment of the interference node. After the authentication is passed, the trigger acquiring unit acquires information about the wireless environment of the interference node.
[32] 结合第一方面第六种可能的实现方式, 在第一方面第七种可能的实现方式 中, 所述认证单元具体用于: 与所述干扰节点之间通过公钥加密方法进行安全认 证。 [32] In combination with the sixth possible implementation manner of the first aspect, in the seventh possible implementation manner of the foregoing aspect, the authenticating unit is specifically configured to: perform security by using a public key encryption method with the interfering node Certification.
[33] 第二方面, 提供一种第一节点, 包括处理器和收发器; 其中,  [33] In a second aspect, a first node is provided, including a processor and a transceiver;
[34] 处理器, 用于确定与所述第一节点相互干扰的干扰节点; 获取所述干扰节点 的无线环境相关信息; 根据所述第一节点自身的无线环境相关信息以及所述干扰 节点的无线环境相关信息, 通过收发器与所述干扰节点协商所述第一节点所使用 的无线资源; [34] a processor, configured to determine an interference node that interferes with the first node; acquire wireless environment related information of the interference node; according to the wireless environment related information of the first node and the interference node Wireless environment related information, negotiated with the interference node by the transceiver, and used by the first node Wireless resources;
[35] 收发器, 用于与所述干扰节点协商第一节点所使用的无线资源。  [35] The transceiver is configured to negotiate, with the interference node, a radio resource used by the first node.
[36] 结合第二方面, 在第二方面第一种可能的实现方式中, 所述处理器还用于: 获取与所述干扰节点协商所遵照的资源协商策略。 [36] In conjunction with the second aspect, in a first possible implementation manner of the second aspect, the processor is further configured to: obtain a resource negotiation policy that is negotiated with the interference node.
[37] 结合第二方面第一种可能的实现方式, 在第二方面第二种可能的实现方式 中, 所述处理器具体用于: 通过所述收发器接收所述干扰节点发送的所述干扰节 点所支持的资源协商策略, 将接收到的资源协商策略作为与所述干扰节点协商所 遵照的资源协商策略; With the first possible implementation of the second aspect, in a second possible implementation manner of the second aspect, the processor is specifically configured to: receive, by the transceiver, the The resource negotiation policy supported by the interfering node, the received resource negotiation policy is used as a resource negotiation policy negotiated with the interfering node;
[38] 相应的, 所述收发器还用于: 接收所述干扰节点发送的所述干扰节点所支持 的资源协商策;  [38] Correspondingly, the transceiver is further configured to: receive a resource negotiation policy supported by the interference node sent by the interference node;
[39] 或者, 所述处理器具体用于: 通过所述收发器接收所述干扰节点发送的所述 干扰节点所支持的资源协商策略信息, 所述资源协商策略信息中包括至少两种资 源协商策略; 从接收到的资源协商策略信息中选择一种第一节点支持的资源协商 策略作为与所述干扰节点协商所遵照的资源协商策略, 通过所述收发器将选择的 资源协商策略的信息发送给所述干扰节点;  [39] Alternatively, the processor is specifically configured to: receive, by using the transceiver, resource negotiation policy information that is supported by the interference node that is sent by the interference node, where the resource negotiation policy information includes at least two resource negotiation And selecting, by the received resource negotiation policy information, a resource negotiation policy supported by the first node as a resource negotiation policy negotiated with the interference node, and sending, by using the transceiver, the information of the selected resource negotiation policy Giving the interference node;
[40] 相应的, 所述收发器还用于: 接收所述干扰节点发送的所述干扰节点所支持 的资源协商策略信息; 将所述处理器选择的资源协商策略的信息发送给所述干扰 节点。  [40] Correspondingly, the transceiver is further configured to: receive resource negotiation policy information supported by the interference node sent by the interference node, and send information about the resource negotiation policy selected by the processor to the interference node.
[41] 结合第二方面, 和 /或第二方面第一种可能的实现方式, 和 /或第二方面第二 种可能的实现方式,在第二方面第三种可能的实现方式中,所述处理器具体用于: 根据所述第一节点自身的无线环境相关信息、 所述干扰节点的无线环境相关信息 以及所述与所述干扰节点协商所遵照的资源协商策略确定所述第一节点对应的 无线资源; 将确定的无线资源作为所述第一节点所使用的无线资源, 将确定的无 线资源的信息通过所述收发器发送至各个干扰节点;  [41] In combination with the second aspect, and/or the first possible implementation of the second aspect, and/or the second possible implementation of the second aspect, in the third possible implementation of the second aspect, The processor is specifically configured to: determine, according to the wireless environment related information of the first node, the wireless environment related information of the interference node, and the resource negotiation policy negotiated with the interference node to determine the first node. Corresponding radio resources; using the determined radio resource as the radio resource used by the first node, and transmitting the determined radio resource information to each interfering node by using the transceiver;
[42] 相应的, 所述收发器还用于: 将所述处理器确定的无线资源的信息发送至各 个干扰节点。 [42] Correspondingly, the transceiver is further configured to: send information about the radio resource determined by the processor to each interference node.
[43] 结合第二方面, 和 /或第二方面第一种可能的实现方式, 和 /或第二方面第二 种可能的实现方式,在第二方面第四种可能的实现方式中,所述处理器具体用于: 根据所述第一节点自身的无线环境相关信息、 所述干扰节点的无线环境相关信息 以及所述与所述干扰节点协商所遵照的资源协商策略确定所述第一节点对应的 无线资源; 将确定的所述无线资源的信息通过所述收发器发送至各个干扰节点进 行确认; 所述收发器接收到各个干扰节点发送的关于所述确认的同意应答后, 将 所述无线资源作为第一节点所使用的无线资源; [43] In combination with the second aspect, and/or the first possible implementation of the second aspect, and/or the second possible implementation of the second aspect, in the fourth possible implementation of the second aspect, The processor is specifically configured to: determine, according to the wireless environment related information of the first node, the wireless environment related information of the interference node, and the resource negotiation policy negotiated with the interference node to determine the first node. Corresponding radio resources; transmitting the determined information of the radio resources to each interfering node through the transceiver Confirming that the radio resource is used as a radio resource used by the first node after receiving the consent response sent by each interfering node with respect to the acknowledgement;
[44] 相应的, 所述收发器还用于: 将所述处理器确定的所述无线资源的信息通过 发送至各个干扰节点进行确认; 接收各个干扰节点发送的关于所述确认的同意应 答, 将接收到的同意应答发送至所述处理器。  Correspondingly, the transceiver is further configured to: send, by the processor, information about the radio resource to be sent to each interfering node for confirmation; and receive, by each interfering node, a consent response for the acknowledgement, The received consent response is sent to the processor.
[45] 第三方面, 提供一种资源协商方法, 包括: [45] In the third aspect, a resource negotiation method is provided, including:
[46] 第一节点确定与所述第一节点相互干扰的干扰节点; [46] the first node determines an interference node that interferes with the first node;
[47] 第一节点获取所述干扰节点的无线环境相关信息; [47] the first node acquires information about the wireless environment of the interference node;
[48] 第一节点根据所述第一节点自身的无线环境相关信息以及所述干扰节点的 无线环境相关信息, 与所述干扰节点协商所述第一节点所使用的无线资源。  [48] The first node negotiates the radio resource used by the first node with the interfering node according to the radio environment related information of the first node and the radio environment related information of the interfering node.
[49] 结合第三方面, 在第三方面第一种可能的实现方式中, 与所述干扰节点协商 所述第一节点所使用的无线资源之前, 该方法还包括:  [49] In conjunction with the third aspect, in a first possible implementation manner of the third aspect, the method further includes: before negotiating the radio resource used by the first node with the interfering node, the method further includes:
[50] 第一节点获取与所述干扰节点协商所遵照的资源协商策略。  [50] The first node acquires a resource negotiation policy that is negotiated with the interfering node.
[51] 结合第三方面第一种可能的实现方式, 在第三方面第二种可能的实现方式 中, 所述第一节点获取与所述干扰节点协商所遵照的资源协商策略包括:  [51] In combination with the first possible implementation manner of the third aspect, in a second possible implementation manner of the third aspect, the acquiring, by the first node, the resource negotiation policy that is negotiated with the interference node includes:
[52] 第一节点接收所述干扰节点发送的所述干扰节点所支持的资源协商策略,将 接收到的资源协商策略作为与所述干扰节点协商所遵照的资源协商策略; 或者,  [52] The first node receives the resource negotiation policy supported by the interference node sent by the interference node, and uses the received resource negotiation policy as a resource negotiation policy that is negotiated with the interference node; or
[53] 第一节点接收所述干扰节点发送的所述干扰节点所支持的资源协商策略信 息, 所述资源协商策略信息中包括至少两种资源协商策略; 从接收到的资源协商 策略信息中选择一种第一节点支持的资源协商策略作为与所述干扰节点协商所 遵照的资源协商策略, 将选择的资源协商策略的信息发送给所述干扰节点。 [53] The first node receives the resource negotiation policy information that is supported by the interference node, and the resource negotiation policy information includes at least two resource negotiation policies, and selects from the received resource negotiation policy information. A resource negotiation policy supported by the first node is used as a resource negotiation policy that is negotiated with the interference node, and the information about the selected resource negotiation policy is sent to the interference node.
[54] 结合第三方面, 和 /或第三方面第一种可能的实现方式, 和 /或第三方面第二 种可能的实现方式, 在第三方面第三种可能的实现方式中, 所述第一节点与所述 干扰节点协商所述第一节点所使用的无线资源包括: [54] In combination with the third aspect, and/or the first possible implementation of the third aspect, and/or the second possible implementation of the third aspect, in a third possible implementation manner of the third aspect, Determining, by the first node, the radio resource used by the first node by the interference node includes:
[55] 第一节点根据所述第一节点自身的无线环境相关信息、所述干扰节点的无线 环境相关信息以及所述与所述干扰节点协商所遵照的资源协商策略确定所述第 一节点对应的无线资源; Determining, by the first node, the first node according to the wireless environment related information of the first node, the wireless environment related information of the interference node, and the resource negotiation policy negotiated with the interference node. Wireless resources;
[56] 第一节点将确定的所述无线资源作为第一节点所使用的无线资源,将确定的 所述无线资源的信息发送至各个干扰节点。  [56] The first node uses the determined radio resource as a radio resource used by the first node, and sends the determined information of the radio resource to each interfering node.
[57] 结合第三方面, 和 /或第三方面第一种可能的实现方式, 和 /或第三方面第二 种可能的实现方式, 在第三方面第四种可能的实现方式中, 所述第一节点与所述 干扰节点协商所述第一节点所使用的无线资源包括: [57] In combination with the third aspect, and/or the first possible implementation manner of the third aspect, and/or the second possible implementation manner of the third aspect, in the fourth possible implementation manner of the third aspect, Said first node and said The radio resources used by the interfering node to negotiate the first node include:
[58] 第一节点根据所述第一节点自身的无线环境相关信息、所述干扰节点的无线 环境相关信息以及所述与所述干扰节点协商所遵照的资源协商策略确定所述第 一节点对应的无线资源;  Determining, by the first node, the first node according to the wireless environment related information of the first node, the wireless environment related information of the interference node, and the resource negotiation policy negotiated with the interference node. Wireless resources;
[59] 第一节点将确定的所述无线资源的信息发送至各个所述干扰节点进行确认; [59] The first node sends the determined information of the radio resource to each of the interference nodes for confirmation;
[60] 第一节点接收到各个所述干扰节点发送的关于所述确认的同意应答后,将所 述无线资源作为所述第一节点所使用的无线资源。 [60] After receiving the consent response for each acknowledgement sent by each of the interfering nodes, the first node uses the radio resource as a radio resource used by the first node.
[61] 结合第三方面, 和 /或第三方面第一种可能的实现方式, 和 /或第三方面第二 种可能的实现方式, 和 /或第三方面第三种可能的实现方式, 和 /或第三方面第四 种可能的实现方式, 在第三方面第五种可能的实现方式中, 第一节点获取所述干 扰节点的无线环境相关信息包括:  [61] In combination with the third aspect, and/or the first possible implementation of the third aspect, and/or the second possible implementation of the third aspect, and/or the third possible implementation of the third aspect, And the fourth possible implementation manner of the third aspect, in the fifth possible implementation manner of the third aspect, the acquiring, by the first node, the wireless environment related information of the interference node includes:
[62] 第一节点接收所述干扰节点发送的所述干扰节点的无线环境相关信息。  [62] The first node receives the wireless environment related information of the interference node sent by the interference node.
[63] 结合第三方面, 和 /或第三方面第一种可能的实现方式, 和 /或第三方面第二 种可能的实现方式, 和 /或第三方面第三种可能的实现方式, 和 /或第三方面第四 种可能的实现方式, 和 /或第三方面第五种可能的实现方式, 在第三方面第六种可 能的实现方式中,第一节点获取所述干扰节点的无线环境相关信息之前,还包括: [63] In combination with the third aspect, and/or the first possible implementation of the third aspect, and/or the second possible implementation of the third aspect, and/or the third possible implementation of the third aspect, And a fourth possible implementation manner of the third aspect, and/or a fifth possible implementation manner of the third aspect, in a sixth possible implementation manner of the third aspect, the first node acquires the interference node Before the wireless environment related information, it also includes:
[64] 第一节点与所述干扰节点之间进行安全认证, 认证通过后, 执行所述第一节 点获取所述干扰节点的无线环境相关信息的步骤。 [64] The first node and the interfering node perform security authentication. After the authentication is passed, the step of acquiring the radio environment related information of the interfering node by the first node is performed.
[65] 结合第三方面第六种可能的实现方式, 在第三方面第七种可能的实现方式 中, 第一节点与所述干扰节点之间进行安全认证包括:  [65] In conjunction with the sixth possible implementation of the third aspect, in a seventh possible implementation manner of the third aspect, the performing security authentication between the first node and the interfering node includes:
[66] 第一节点与所述干扰节点之间通过公钥加密方法进行安全认证。  [66] The first node and the interfering node perform security authentication by using a public key encryption method.
[67] 结合第三方面, 和 /或第三方面第一种可能的实现方式, 和 /或第三方面第二 种可能的实现方式, 和 /或第三方面第三种可能的实现方式, 和 /或第三方面第四 种可能的实现方式, 和 /或第三方面第五种可能的实现方式, 和 /或第三方面第六 种可能的实现方式, 和 /或第三方面第七种可能的实现方式, 在第三方面第八种可 能的实现方式中, 所述干扰节点的无线环境相关信息包括: 与所述干扰节点相互 干扰的干扰节点列表、 和 /或所述干扰节点可以获得的信道列表、 和 /或所述干扰 节点可以获得的各个信道的负载情况信息、 和 /或所述干扰节点的负载情况信息; [67] In combination with the third aspect, and/or the first possible implementation of the third aspect, and/or the second possible implementation of the third aspect, and/or the third possible implementation of the third aspect, And/or a fourth possible implementation of the third aspect, and/or a fifth possible implementation of the third aspect, and/or a sixth possible implementation of the third aspect, and/or a seventh aspect of the third aspect A possible implementation manner, in an eighth possible implementation manner of the third aspect, the radio environment related information of the interfering node includes: a list of interfering nodes that interfere with the interfering node, and/or the interfering node may Obtained channel list, and/or load condition information of each channel available to the interfering node, and/or load condition information of the interfering node;
[68] 第一节点的无线环境相关信息包括:与所述第一节点相互干扰的干扰节点列 表、 和 /或所述第一节点可以获得的信道列表、 和 /或所述第一节点可以获得的各 个信道的负载情况信息、 和 /或所述第一节点的负载情况信息。 [69] 结合第三方面, 和 /或第三方面第一种可能的实现方式, 和 /或第三方面第二 种可能的实现方式, 和 /或第三方面第三种可能的实现方式, 和 /或第三方面第四 种可能的实现方式, 和 /或第三方面第五种可能的实现方式, 和 /或第三方面第六 种可能的实现方式, 和 /或第三方面第七种可能的实现方式, 和 /或第三方面第八 种可能的实现方式, 在第三方面第九种可能的实现方式中, 所述无线资源包括: 频域、 时域或空域的信道资源。 [68] the wireless environment related information of the first node includes: a list of interference nodes that interfere with the first node, and/or a channel list obtainable by the first node, and/or the first node may obtain Load condition information of each channel, and/or load condition information of the first node. [69] Combining the third aspect, and/or the first possible implementation of the third aspect, and/or the second possible implementation of the third aspect, and/or the third possible implementation of the third aspect, And/or a fourth possible implementation of the third aspect, and/or a fifth possible implementation of the third aspect, and/or a sixth possible implementation of the third aspect, and/or a seventh aspect of the third aspect And a third possible implementation manner of the third aspect, the radio resource includes: a channel resource in a frequency domain, a time domain, or an air domain.
[70] 本实施例中, 第一节点确定与第一节点相互干扰的干扰节点; 第一节点获取 所述干扰节点的无线环境相关信息; 第一节点根据所述第一节点自身的无线环境 相关信息以及所述干扰节点的无线环境相关信息, 与所述干扰节点协商所述第一 节点所使用的无线资源。 从而, 第一节点与其干扰节点之间相互协商第一节点所 使用的无线资源, 无需额外设置资源管理节点, 降低了无线通信系统的网络架构 复杂度;而且,第一节点分别与自身的干扰节点协商第一节点所使用的无线资源, 将现有技术中资源管理节点的数据处理量分散至各个节点, 从而提高了为节点分 配无线资源的效率; 第一节点根据第一节点自身以及干扰节点的无线环境相关信 息, 与所述干扰节点协商第一节点所使用的无线资源, 从而能够针对第一节点及 其干扰节点的无线环境进行第一节点所使用的无线资源的分配, 相对于现有技术 能够更为准确的进行节点的无线资源分配。 附图说明  [70] In this embodiment, the first node determines an interference node that interferes with the first node; the first node acquires information about the wireless environment of the interference node; and the first node is related to the wireless environment of the first node itself. The information and the wireless environment related information of the interfering node negotiate the radio resource used by the first node with the interfering node. Therefore, the first node negotiates with the interfering node the radio resources used by the first node, and does not need to additionally set the resource management node, thereby reducing the network architecture complexity of the wireless communication system; and, the first node and its own interfering node respectively Negotiating the radio resources used by the first node, and dispersing the data processing amount of the resource management node in the prior art to each node, thereby improving the efficiency of allocating radio resources to the node; the first node is based on the first node itself and the interfering node. And the wireless environment related information, the wireless resource used by the first node is negotiated with the interference node, so that the wireless resource used by the first node can be allocated to the wireless environment of the first node and its interfering node, compared to the prior art. It can more accurately perform wireless resource allocation of nodes. DRAWINGS
[71] 为了更清楚地说明本发明实施例或现有技术中的技术方案,下面将对实施例 或现有技术描述中所需要使用的附图作简单地介绍, 显而易见地, 下面描述中的 附图仅仅是本发明的一些实施例, 对于本领域普通技术人员来讲, 在不付出创造 性劳动性的前提下, 还可以根据这些附图获得其他的附图。 [71] In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the embodiments or the prior art description will be briefly described below, and obviously, in the following description The drawings are only some of the embodiments of the present invention, and other drawings may be obtained from those skilled in the art without departing from the drawings.
[72] 图 1为现有技术资源协商方法下的网络拓扑结构示意图;  [72] FIG. 1 is a schematic diagram of a network topology structure in a prior art resource negotiation method;
[73] 图 2为本发明实施例资源协商方法一种流程示意图;  2 is a schematic flowchart of a resource negotiation method according to an embodiment of the present invention;
[74] 图 3为本发明实施例资源协商方法另一种流程示意图; FIG. 3 is a schematic flowchart of another resource negotiation method according to an embodiment of the present invention; FIG.
[75] 图 3A为本发明实施例节点与公钥服务器之间的网络拓扑结构示意图;  3A is a schematic diagram of a network topology structure between a node and a public key server according to an embodiment of the present invention;
[76] 图 4 为本发明实施例第一节点与干扰节点之间安全认证的一种实现方法示 意图;  FIG. 4 is a schematic diagram of an implementation method for secure authentication between a first node and an interfering node according to an embodiment of the present invention; FIG.
[77] 图 5 为本发明实施例第一节点与干扰节点之间安全认证的另一种实现方式 示意图; [78] 图 6为本发明实施例资源协商装置结构示意图; FIG. 5 is a schematic diagram of another implementation manner of security authentication between a first node and an interfering node according to an embodiment of the present invention; FIG. 6 is a schematic structural diagram of a resource negotiation apparatus according to an embodiment of the present invention;
[79] 图 7为本发明实施例第一节点结构示意图。 具体实施方式 7 is a schematic structural diagram of a first node according to an embodiment of the present invention. detailed description
[80] 下面将结合本发明实施例中的附图, 对本发明实施例中的技术方案进行清 楚、 完整的描述, 显然, 所描述的实施例仅仅是本发明一部分实施例, 而不是全 部的实施例。 基于本发明中的实施例, 本领域普通技术人员在没有付出创造性劳 动前提下所获得的所有其他实施例, 都属于本发明保护的范围。 The technical solutions in the embodiments of the present invention are clearly and completely described in the following with reference to the accompanying drawings in the embodiments of the present invention. It is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. example. All other embodiments obtained by a person of ordinary skill in the art based on the embodiments of the present invention without the inventive effort are all within the scope of the present invention.
[81] 本发明实施例资源协商方法可以适用于任意包括至少两个节点的无线通信 系统例如 WLAN中。 The resource negotiation method of the embodiment of the present invention can be applied to any wireless communication system including at least two nodes, such as a WLAN.
[82] 参见图 2, 为本发明资源协商方法第一实施例示意图, 该方法包括: [82] FIG. 2 is a schematic diagram of a first embodiment of a resource negotiation method according to the present invention, where the method includes:
[83] 步骤 201 : 第一节点确定与所述第一节点相互干扰的干扰节点; [83] Step 201: The first node determines an interference node that interferes with the first node;
[84] 本发明实施例中所述的第一节点可以是无线通信系统例如 WLAN中的任一 个需要与其他节点进行通信的节点, 所述干扰节点可以是无线通信系统中与第一 节点之间存在相互干扰的节点; 例如所述第一节点和干扰节点可以是位于网络侧 的节点如接入点 (AP )、 基站 (Node B ) 等, 从而实现网络侧节点之间无线资源 的协商。 The first node in the embodiment of the present invention may be a node in a wireless communication system, such as a WLAN, that needs to communicate with other nodes, and the interference node may be between the wireless node and the first node. There are nodes that interfere with each other; for example, the first node and the interfering node may be nodes located at the network side, such as an access point (AP), a base station (Node B), etc., so as to implement negotiation of radio resources between the network side nodes.
[85] 步骤 202: 第一节点获取所述干扰节点的无线环境相关信息;  [85] Step 202: The first node acquires information about the wireless environment of the interference node.
[86] 步骤 203 : 第一节点根据所述第一节点自身的无线环境相关信息以及所述干 扰节点的无线环境相关信息, 与所述干扰节点协商所述第一节点所使用的无线资 源。  [86] Step 203: The first node negotiates, according to the wireless environment related information of the first node and the wireless environment related information of the interference node, the wireless resource used by the first node with the interference node.
[87] 本发明实施例所述无线资源可以包括: 频域、 时域或者空域的信道资源等, 例如背景技术中所述频域信道资源。  The radio resource in the embodiment of the present invention may include: a channel resource in a frequency domain, a time domain, or an air domain, such as the frequency domain channel resource in the background art.
[88] 本实施例中,第一节点与其干扰节点之间相互协商第一节点所使用的无线资 源, 无需额外设置资源管理节点, 降低了无线通信系统的网络架构复杂度; 而且, 第一节点分别与自身的干扰节点协商第一节点所使用的无线资源, 将现有技术中 资源管理节点的数据处理量分散至各个节点, 从而提高了为节点分配无线资源的 效率; 第一节点根据第一节点自身以及干扰节点的无线环境相关信息, 与干扰节 点协商第一节点所使用的无线资源, 从而能够针对第一节点及其干扰节点的无线 环境进行第一节点所使用的无线资源的分配, 相对于现有技术能够更为准确的进 行节点的无线资源分配。 [89] 参见图 3, 为本发明资源协商方法第一实施例示意图, 该方法包括: [88] In this embodiment, the first node and its interfering node mutually negotiate the radio resources used by the first node, and do not need to additionally set a resource management node, thereby reducing the network architecture complexity of the wireless communication system; Separating the radio resources used by the first node with the own interfering node, respectively, and dispersing the data processing amount of the resource management node in the prior art to each node, thereby improving the efficiency of allocating radio resources to the node; The wireless environment related information of the node and the interfering node negotiates with the interfering node the radio resource used by the first node, so that the radio resource used by the first node can be allocated to the radio environment of the first node and its interfering node, The prior art can more accurately perform wireless resource allocation of nodes. [89] FIG. 3 is a schematic diagram of a first embodiment of a resource negotiation method according to the present invention, where the method includes:
[90] 步骤 301 : 第一节点确定与第一节点相互干扰的干扰节点。 [90] Step 301: The first node determines an interference node that interferes with the first node.
[91] 其中, 所述干扰节点可以为一个或多个, 当所述干扰节点为多个时, 则第一 节点与各个所述干扰节点之间分别执行以下步骤 302〜步骤 306。 [91] The interference node may be one or more. When the number of the interference nodes is multiple, the following steps 302 to 306 are performed between the first node and each of the interference nodes.
[92] 其中,第一节点可以通过被动或主动的方式等获得与第一节点相互干扰的干 扰节点的信息。 被动的方式下, 第一节点可以在工作的频域信道资源上通过检测 相邻节点的发送帧中的发送地址或者发送节点标识符来获取干扰节点的信息; 主 动的方式下, 第一节点可以在工作的频域信道资源上发送请求帧, 通过检测邻居 节点反馈的响应帧来获取干扰节点的信息。  [92] The first node may obtain information of the interference node that interferes with the first node in a passive or active manner. In the passive mode, the first node may obtain the information of the interfering node by detecting the sending address or the sending node identifier in the sending frame of the neighboring node on the working frequency domain channel resource; in the active mode, the first node may The request frame is sent on the working frequency domain channel resource, and the information of the interference node is obtained by detecting the response frame fed back by the neighbor node.
[93] 所述请求帧和所述响应帧可以通过现有的数据帧结构实现,也可以在实际应 用中自主定义, 这里不限定。  [93] The request frame and the response frame may be implemented by using an existing data frame structure, or may be defined autonomously in an actual application, which is not limited herein.
[94] 步骤 302 : 第一节点向所述干扰节点发送资源协商请求帧, 所述资源协商请 求帧用于请求干扰节点与第一节点进行资源协商;  [94] Step 302: The first node sends a resource negotiation request frame to the interference node, where the resource negotiation request frame is used to request the interference node to perform resource negotiation with the first node.
[95] 步骤 303 : 第一节点接收所述干扰节点发送的资源协商确认帧, 所述资源协 商确认帧用于指示第一节点所述干扰节点同意进行资源协商。 [00] Step 303: The first node receives the resource negotiation confirmation frame sent by the interference node, where the resource negotiation confirmation frame is used to indicate that the interference node of the first node agrees to perform resource negotiation.
[96] 所述资源协商请求帧和资源协商确认帧可以通过现有的数据帧结构实现,也 可以在实际应用中自主定义, 这里不限定。 [96] The resource negotiation request frame and the resource negotiation confirmation frame may be implemented by using an existing data frame structure, or may be defined autonomously in an actual application, which is not limited herein.
[97] 其中, 步骤 302和步骤 303是可选步骤; 另外, 步骤 302和步骤 303也可以 在步骤 304中认证通过后, 执行步骤 305之前执行。  [97] Step 302 and step 303 are optional steps. In addition, step 302 and step 303 may also be performed before the step 305 is performed after the authentication is passed in step 304.
[98] 步骤 304 : 第一节点与所述干扰节点之间进行安全认证, 认证通过后, 执行 步骤 305 ; 认证不通过时, 第一节点与所述干扰节点之间的处理结束。  [98] Step 304: Perform security authentication between the first node and the interfering node. After the authentication is passed, perform step 305. When the authentication fails, the processing between the first node and the interfering node ends.
[99] 其中,本步骤中第一节点与所述干扰节点之间进行安全认证的实现方法通过 图 4和图 5进行了详细说明, 这里不赘述。 [99] The implementation method for performing security authentication between the first node and the interfering node in this step is described in detail in FIG. 4 and FIG. 5, and details are not described herein.
[100]步骤 305 : 第一节点获取所述干扰节点的无线环境相关信息以及与所述干扰 节点协商所遵照的资源协商策略。 [100] Step 305: The first node acquires radio environment related information of the interfering node and a resource negotiation policy that is negotiated with the interfering node.
[101]其中,所述干扰节点的无线环境相关信息可以包括以下信息中的至少一项信 息: 与所述干扰节点相互干扰的干扰节点列表、 所述干扰节点可以获得的信道列 表、 所述干扰节点可以获得的各个信道的负载情况信息、 所述干扰节点的负载情 况信息等。 所述干扰节点可以获得的信道列表是指干扰节点当前工作的信道以及 根据其能力和意愿协商后可以工作的信道。 [102]其中, 所述资源协商策略为可选信息; 例如, 当第一节点和各个干扰节点都 仅支持相同的一种资源协商策略, 例如分别在第一节点和各个干扰节点中已经设 置了相同的一种资源协商策略时, 第一节点无需获取所述与所述干扰节点协商所 遵照的所述资源协商策略, 直接在后续步骤 306中按照预先设置的所述资源协商 策略进行协商即可。 [101] The wireless environment related information of the interference node may include at least one of the following information: a list of interference nodes that interfere with the interference node, a channel list obtainable by the interference node, and the interference The load condition information of each channel that can be obtained by the node, the load condition information of the interfering node, and the like. The channel list obtainable by the interfering node refers to a channel that the interfering node is currently working on and a channel that can work after being negotiated according to its capabilities and wishes. [102] wherein the resource negotiation policy is optional information; for example, when the first node and each interfering node support only the same resource negotiation policy, for example, respectively, the first node and each interfering node are already set. When the resource negotiation policy is the same, the first node does not need to obtain the resource negotiation policy that is negotiated with the interfering node, and directly negotiates according to the preset resource negotiation policy in the subsequent step 306. .
[103]所述资源协商策略是指节点之间进行无线资源协商所遵照的策略。所述资源 协商策略设置的主要目的在于通过第一节点与干扰节点按照所述资源协商策略 进行协商, 将第一节点所能够获得的无线资源仅划分给第一节点或者划分给第一 节点及其部分或全部干扰节点, 以避免或者减少碰撞的发生。 资源协商策略的实 现可以有很多, 这里并不限定, 一般只要节点之间按照相同的资源协商策略进行 资源协商以避免节点之间不公平性以及降低协商结果的碰撞概率即可。  [103] The resource negotiation policy refers to a policy followed by radio resource negotiation between nodes. The main purpose of the resource negotiation policy setting is that the first node and the interfering node negotiate according to the resource negotiation policy, and the radio resources that the first node can obtain are only allocated to the first node or are allocated to the first node and Part or all interfere with the node to avoid or reduce the occurrence of collisions. The implementation of the resource negotiation policy can be implemented in many ways. Generally, the resources are negotiated according to the same resource negotiation policy to avoid unfairness between nodes and reduce the collision probability of the negotiation result.
[104]其中,第一节点获取所述干扰节点的无线环境相关信息可以包括以下可能的 实现方式:  [104] The first node acquiring the wireless environment related information of the interference node may include the following possible implementation manners:
[105]在第一种可能的实现方式中,干扰节点的无线环境相关信息可以携带在干扰 节点发送至第一节点的资源协商确认帧中, 则第一节点获取所述干扰节点的无线 环境相关信息可以包括:  In a first possible implementation manner, the radio environment related information of the interfering node may be carried in the resource negotiation acknowledgement frame sent by the interfering node to the first node, and the first node acquires the radio environment related to the interfering node. Information can include:
[106]第一节点从接收到的资源协商确认帧中获取对应干扰节点的无线环境相关 信息。  [106] The first node acquires information about the wireless environment of the corresponding interfering node from the received resource negotiation confirmation frame.
[107]在第二种可能的实现方式中,干扰节点的无线环境相关信息可以不携带在干 扰节点发送至第一节点的资源协商确认帧中, 而是通过其他方式传输给第一节 点, 则第一节点获取所述干扰节点的无线环境相关信息可以包括:  In a second possible implementation manner, the information about the radio environment of the interfering node may not be carried in the resource negotiation confirmation frame sent by the interfering node to the first node, but is transmitted to the first node by other means, The acquiring, by the first node, the wireless environment related information of the interference node may include:
[108]第一节点接收所述干扰节点发送的所述干扰节点的无线环境相关信息。 [108] The first node receives wireless environment related information of the interference node sent by the interference node.
[109]可选地,所述无线环境相关信息可以携带在数据帧中由干扰节点传输至第一 节点。 Optionally, the wireless environment related information may be carried in the data frame by the interfering node to the first node.
[110]其中,第一节点获取与所述干扰节点协商所遵照的资源协商策略可以包括以 下可能的实现方式: [110] The resource negotiation policy that the first node obtains to negotiate with the interference node may include the following possible implementation manners:
[111]在第一种可能的实现方式中, 如果干扰节点仅支持一种资源协商策略, 且, 该资源协商策略携带在干扰节点发送的所述资源协商确认帧中, 则第一节点获取 与所述干扰节点协商所遵照的资源协商策略可以包括:  In a first possible implementation, if the interfering node supports only one resource negotiation policy, and the resource negotiation policy is carried in the resource negotiation acknowledgement frame sent by the interfering node, the first node acquires The resource negotiation policy that the interference node negotiates may include:
[112]第一节点从所述资源协商确认帧中获取对应干扰节点所支持的资源协商策 略, 将获取到的资源协商策略作为与所述干扰节点协商所遵照的资源协商策略; 在第二种可能的实现方式中, 如果干扰节点仅支持一种资源协商策略, 且, 该资 源协商策略不携带在干扰节点发送的所述资源协商确认帧中, 而是通过其他方式 传输给第一节点, 则第一节点获取与所述干扰节点协商所遵照的资源协商策略可 以包括: [112] The first node obtains the resource negotiation policy supported by the corresponding interfering node from the resource negotiation confirmation frame, and uses the obtained resource negotiation policy as a resource negotiation policy that is negotiated with the interfering node; In a second possible implementation, if the interfering node supports only one resource negotiation policy, and the resource negotiation policy is not carried in the resource negotiation acknowledgement frame sent by the interfering node, but is transmitted to the A resource negotiation policy that the first node obtains to negotiate with the interfering node may include:
[113]第一节点接收所述干扰节点发送的所述干扰节点所支持的资源协商策略,将 接收到的资源协商策略作为与所述干扰节点协商所遵照的资源协商策略。 [113] The first node receives the resource negotiation policy supported by the interference node sent by the interference node, and uses the received resource negotiation policy as a resource negotiation policy that is negotiated with the interference node.
[114]可选地, 所述资源协商策略可以携带在数据帧中由干扰节点传输至第一节 点。 Optionally, the resource negotiation policy may be carried in the data frame by the interfering node to the first node.
[115]在第三种可能的实现方式中, 如果干扰节点支持至少两种资源协商策略, 且 由所述至少两种资源协商策略构成的资源协商策略信息携带在干扰节点发送的 所述资源协商确认帧中, 则第一节点获取与所述干扰节点协商所遵照的资源协商 策略可以包括:  [115] In a third possible implementation, if the interfering node supports at least two resource negotiation policies, and the resource negotiation policy information formed by the at least two resource negotiation policies carries the resource negotiation sent by the interfering node. In the acknowledgment frame, the resource negotiation policy that the first node obtains to negotiate with the interfering node may include:
[116]第一节点从所述资源协商确认帧中获取对应干扰节点的资源协商策略信息, 从所述自愿协商策略信息中选择一种第一节点支持的资源协商策略作为与所述 干扰节点协商所遵照的资源协商策略, 将选择的资源协商策略的信息发送给所述 干扰节点。  [116] The first node obtains the resource negotiation policy information of the corresponding interfering node from the resource negotiation confirmation frame, and selects a resource negotiation policy supported by the first node from the voluntary negotiation policy information to negotiate with the interference node. The resource negotiation policy is followed, and the information about the selected resource negotiation policy is sent to the interference node.
[117]在第四种可能的实现方式中, 如果干扰节点支持至少两种资源协商策略, 且 由所述至少两种资源协商策略构成的资源协商策略信息未携带在干扰节点发送 的所述资源协商确认帧中, 而是通过其他方式传输给第一节点, 则第一节点获取 与所述干扰节点协商所遵照的资源协商策略可以包括:  [117] In a fourth possible implementation, if the interfering node supports the at least two resource negotiation policies, and the resource negotiation policy information that is formed by the at least two resource negotiation policies does not carry the resources sent by the interfering node The negotiation confirmation frame is transmitted to the first node by other means, and the resource negotiation policy that the first node obtains to negotiate with the interference node may include:
[118]第一节点接收所述干扰节点发送的所述干扰节点所支持的资源协商策略信 息; 第一节点从接收到的资源协商策略信息中选择一种第一节点支持的资源协商 策略作为与所述干扰节点协商所遵照的资源协商策略, 将选择的资源协商策略的 信息发送给所述干扰节点。  [118] The first node receives the resource negotiation policy information supported by the interference node sent by the interference node; the first node selects a resource negotiation policy supported by the first node from the received resource negotiation policy information as And the interference negotiation node negotiates the resource negotiation policy, and sends the information of the selected resource negotiation policy to the interference node.
[119]可选地, 所述资源协商策略信息可以携带在数据帧中进行传输。 Optionally, the resource negotiation policy information may be carried in a data frame for transmission.
[120]可选地, 所述选择的资源协商策略的信息可以携带在数据帧中进行传输。  [120] Optionally, the information of the selected resource negotiation policy may be carried in a data frame for transmission.
[121]可选地,所述无线环境相关信息与所述资源协商策略或资源协商策略信息可 以携带在相同或者不同的数据帧中。 [121] Optionally, the wireless environment related information and the resource negotiation policy or resource negotiation policy information may be carried in the same or different data frames.
[122]其中, 所述资源协商确认帧中也可以仅包括干扰节点的无线环境相关信息, 则干扰节点所支持的资源协商策略或者干扰节点的资源协商策略信息可以由干 扰节点通过其他方式例如其他数据帧发送至第一节点; 或者, 所述资源协商确认 帧中也可以仅包括干扰节点所支持的资源协商策略或者干扰节点的资源协商策 略信息, 则干扰节点的无线环境相关信息可以由干扰节点通过其他方式例如其他 数据帧发送至第一节点。 [122] The resource negotiation confirmation frame may also include only the radio environment related information of the interfering node, and the resource negotiation policy supported by the interfering node or the resource negotiation policy information of the interfering node may be used by the interfering node by other means, for example, other Sending a data frame to the first node; or, the resource negotiation confirmation The frame may also include only the resource negotiation policy supported by the interfering node or the resource negotiation policy information of the interfering node, and the radio environment related information of the interfering node may be sent by the interfering node to the first node by other means, such as other data frames.
[123]其中, 步骤 302中的所述资源协商请求帧中也可以包括: 第一节点的无线环 境相关信息和 /或第一节点所支持的资源协商策略的信息等,以便干扰节点与干扰 节点自身的干扰节点协商自身所使用的无线资源;  [123] The resource negotiation request frame in step 302 may also include: information about the wireless environment of the first node and/or information of the resource negotiation policy supported by the first node, so as to interfere with the node and the interference node. The own interfering node negotiates the radio resources used by itself;
[124]或者, 所述资源协商请求帧中也可以不包括: 第一节点的无线环境相关信息 和 /或第一节点所支持的资源协商策略的信息等,而由第一节点通过其他帧传输给 干扰节点。 第一节点的无线环境相关信息和第一节点所支持的资源协商策略的信 息可以使用相同或不同的帧进行传输。  [124] Alternatively, the resource negotiation request frame may not include: the wireless environment related information of the first node and/or the information of the resource negotiation policy supported by the first node, etc., but is transmitted by the first node through other frames. Give the interference node. The wireless environment related information of the first node and the resource negotiation policy supported by the first node may be transmitted using the same or different frames.
[125]步骤 306 : 第一节点根据第一节点的无线环境相关信息、 干扰节点的无线环 境相关信息以及与干扰节点协商所遵照的资源协商策略, 与干扰节点协商第一节 点所使用的无线资源。  [125] Step 306: The first node negotiates the radio resource used by the first node with the interfering node according to the radio environment related information of the first node, the radio environment related information of the interfering node, and the resource negotiation policy negotiated with the interfering node. .
[126]其中, 第一节点的无线环境相关信息可以包括: 与所述第一节点相互干扰的 干扰节点列表、 和 /或所述第一节点可以获得的信道列表、 和 /或所述第一节点可 以获得的各个信道的负载情况信息、 和 /或所述第一节点的负载情况信息。  [126] The wireless environment related information of the first node may include: a list of interference nodes that interfere with the first node, and/or a channel list obtainable by the first node, and/or the first Load condition information of each channel available to the node, and/or load condition information of the first node.
[127]在实际应用中,第一节点的无线环境相关信息与干扰节点的无线环境相关信 息所包括的具体信息应该是一致的, 例如第一节点的无线环境相关信息中包括第 一节点可以获得的信道列表, 那么干扰节点的无线环境相关信息中最好也包括干 扰节点可以获得的信道列表, 以便第一节点在与干扰节点进行无线资源的协商时 可以获得更为全面的信息, 使得协商结果更为准确。 [127] In practical applications, the wireless environment related information of the first node and the specific information included in the wireless environment related information of the interference node should be consistent, for example, the first node may include the first node in the wireless environment related information. The channel list, then the information about the wireless environment of the interfering node preferably includes the channel list available to the interfering node, so that the first node can obtain more comprehensive information when negotiating with the interfering node for radio resources, so that the negotiation result is obtained. More accurate.
[128]在第一种可能的实现方式中,第一节点与所述干扰节点协商第一节点所使用 的无线资源可以是完全分布式的, 具体的, 第一节点根据第一节点的无线环境相 关信息、 干扰节点的无线环境相关信息以及与干扰节点协商所遵照的资源协商策 略, 与干扰节点协商第一节点所使用的无线资源可以包括:  [128] In a first possible implementation manner, the first node and the interference node may negotiate that the radio resource used by the first node may be completely distributed. Specifically, the first node is configured according to the wireless environment of the first node. The related information, the wireless environment related information of the interfering node, and the resource negotiation policy that is negotiated with the interfering node, and the radio resource used by the first node to negotiate with the interfering node may include:
[129]第一节点根据所述第一节点自身的无线环境相关信息、所述干扰节点的无线 环境相关信息以及所述与所述干扰节点协商所遵照的资源协商策略确定所述第 一节点对应的无线资源;  Determining, by the first node, the first node according to the wireless environment related information of the first node, the wireless environment related information of the interference node, and the resource negotiation policy negotiated with the interference node. Wireless resources;
[130]第一节点将确定的无线资源作为第一节点所使用的无线资源,将所述无线资 源的信息发送至各个干扰节点。  [130] The first node uses the determined radio resource as the radio resource used by the first node, and sends the information of the radio resource to each interfering node.
[131]这种实现方式中, 由于第一节点只能获得无线通信系统中的局部信息, 因此 确定的第一节点所使用的无线资源与其干扰节点所确定的该干扰节点所使用的 无线资源可能存在重叠, 在这种情况下两者可以通过竞争机制共享重叠的频域信 道资源, 这里不赘述。 [131] In this implementation, since the first node can only obtain local information in the wireless communication system, The determined radio resource used by the first node may overlap with the radio resource used by the interfering node determined by the interfering node. In this case, the two may share overlapping frequency domain channel resources through a contention mechanism, which is not described herein. .
[132]在第二种可能的实现方式中,第一节点与所述干扰节点协商第一节点所使用 的无线资源可以是交互式的, 具体的, 第一节点根据第一节点的无线环境相关信 息、 干扰节点的无线环境相关信息以及与干扰节点协商所遵照的资源协商策略, 与干扰节点协商第一节点所使用的无线资源可以包括:  In a second possible implementation, the first node and the interference node may negotiate that the radio resource used by the first node may be interactive. Specifically, the first node is related to the wireless environment of the first node. The information, the information about the wireless environment of the interfering node, and the resource negotiation policy that is negotiated with the interfering node, and the radio resource used by the interfering node to negotiate with the interfering node may include:
[133]第一节点根据所述第一节点自身的无线环境相关信息、所述干扰节点的无线 环境相关信息以及所述与所述干扰节点协商所遵照的资源协商策略确定所述第 一节点对应的无线资源;  Determining, by the first node, the first node according to the wireless environment related information of the first node, the wireless environment related information of the interference node, and the resource negotiation policy negotiated with the interference node. Wireless resources;
[134]第一节点将确定的所述无线资源的信息发送至各个干扰节点进行确认;  [134] The first node sends the determined information of the radio resource to each interfering node for confirmation;
[135]第一节点接收到各个干扰节点发送的同意应答后,将所述无线资源作为第一 节点所使用的无线资源。 [135] After receiving the consent response sent by each interfering node, the first node uses the radio resource as the radio resource used by the first node.
[136]在这种实现方式中, 第一节点将所述无线资源的信息发送给各个干扰节点, 如果干扰节点同意则回复同意应答, 如果干扰节点不同意则回复拒绝应答。 只有 当所有的干扰节点都回复了同意应答之后第一节点才可以将对应的无线资源作 为自身工作所使用的无线资源, 否则的话需要重新确定第一节点对应的无线资源 然后再次向干扰节点发送确认请求。  In this implementation, the first node sends the information of the radio resource to each interfering node, and if the interfering node agrees, replies to the acknowledgment response, and if the interfering node disagrees, replies the refusal response. The first node can use the corresponding radio resource as the radio resource used by its own work only after all the interfering nodes reply the consent response. Otherwise, the radio resource corresponding to the first node needs to be re-determined and then the acknowledgement is sent to the interfering node again. request.
[137]以下,以无线资源为频域信道资源为例,对本步骤的实现进行进一步的说明。  [137] Hereinafter, the implementation of this step will be further described by taking a radio resource as a frequency domain channel resource as an example.
[138]在第一种可能的实现方式中, 第一节点根据第一节点的无线环境相关信息、 干扰节点的无线环境相关信息以及与干扰节点协商所遵照的资源协商策略, 与干 扰节点协商第一节点所使用的频域信道资源可以包括: In a first possible implementation, the first node negotiates with the interfering node according to the radio environment related information of the first node, the radio environment related information of the interfering node, and the resource negotiation policy negotiated with the interfering node. The frequency domain channel resources used by a node may include:
[139]第一节点根据所述第一节点自身的无线环境相关信息、所述干扰节点的无线 环境相关信息以及所述与所述干扰节点协商所遵照的资源协商策略确定所述第 一节点对应的频域信道资源;  Determining, by the first node, the first node according to the wireless environment related information of the first node, the wireless environment related information of the interference node, and the resource negotiation policy negotiated with the interference node. Frequency domain channel resources;
[140]第一节点将确定的频域信道资源作为第一节点所使用的频域信道资源,将所 述频域信道资源的信息发送至各个干扰节点。  [140] The first node uses the determined frequency domain channel resource as the frequency domain channel resource used by the first node, and sends the information of the frequency domain channel resource to each interference node.
[141]这种实现方式中, 由于第一节点只能获得无线通信系统中的局部信息, 因此 确定的第一节点所使用的频域信道资源与其干扰节点所确定的该干扰节点所使 用的频域信道资源可能存在重叠, 在这种情况下两者可以通过竞争机制共享重叠 的频域信道资源, 这里不赘述。 [142]在第二种可能的实现方式中, 第一节点根据第一节点的无线环境相关信息、 干扰节点的无线环境相关信息以及与干扰节点协商所遵照的资源协商策略, 与干 扰节点协商第一节点所使用的频域信道资源可以包括: [141] In this implementation manner, since the first node can only obtain local information in the wireless communication system, the determined frequency domain channel resource used by the first node and the frequency used by the interference node determined by the interference node are determined. The domain channel resources may overlap. In this case, the two can share overlapping frequency domain channel resources through the contention mechanism, which is not described here. [142] In a second possible implementation, the first node negotiates with the interfering node according to the radio environment related information of the first node, the radio environment related information of the interfering node, and the resource negotiation policy negotiated with the interfering node. The frequency domain channel resources used by a node may include:
[143]第一节点根据所述第一节点自身的无线环境相关信息、所述干扰节点的无线 环境相关信息以及所述与所述干扰节点协商所遵照的资源协商策略确定所述第 一节点对应的频域信道资源;  Determining, by the first node, the first node according to the wireless environment related information of the first node, the wireless environment related information of the interference node, and the resource negotiation policy negotiated with the interference node. Frequency domain channel resources;
[144]第一节点将确定的所述频域信道资源的信息发送至各个干扰节点进行确认;  [144] The first node sends the determined information of the frequency domain channel resource to each interference node for confirmation;
[145]第一节点接收到各个干扰节点发送的关于所述确认的同意应答后,将所述频 域信道资源作为第一节点所使用的频域信道资源。 [145] After receiving the consent response sent by each interfering node for the acknowledgment, the first node uses the frequency domain channel resource as the frequency domain channel resource used by the first node.
[146]在这种实现方式中,第一节点将所述频域信道资源的信息发送给各个干扰节 点, 如果干扰节点同意则回复同意应答, 如果干扰节点不同意则回复拒绝应答。 只有当所有的干扰节点都回复了同意应答之后第一节点才可以将对应的频域信 道资源作为自身所使用的频域信道资源, 否则的话需要重新确定第一节点对应的 频域信道资源然后再次向干扰节点发送确认请求。 In this implementation, the first node transmits the information of the frequency domain channel resource to each interference node, and if the interference node agrees, replies to the consent response, and if the interference node does not agree, the response refusal. The first node can use the corresponding frequency domain channel resource as the frequency domain channel resource used by itself only after all the interfering nodes reply the consent response. Otherwise, the frequency domain channel resource corresponding to the first node needs to be re-determined and then again. A confirmation request is sent to the interfering node.
[147]以下, 对资源协商策略进行更为详细的说明。 [147] The following is a more detailed description of the resource negotiation strategy.
[148]—般的,资源协商策略与节点的无线环境相关信息中包括的具体信息是相关 的, 这里的节点可以包括: 第一节点和干扰节点。  [148] Generally, the resource negotiation policy is related to specific information included in the wireless environment related information of the node, where the node may include: a first node and an interference node.
[149]在一种可能的实现方式中,可以根据无线环境相关信息中的一项或者多项信 息作为输入参数、 无线资源作为输出参数设置资源协商算法作为资源协商策略, 例如:  [149] In a possible implementation, the resource negotiation algorithm may be set as a resource negotiation policy according to one or more information in the wireless environment related information as an input parameter, and the wireless resource is used as an output parameter, for example:
[150]如果节点的无线环境相关信息包括与节点相互干扰的干扰节点列表, 贝 1」, 资 源协商策略可以包括: 根据干扰节点列表确定第一节点、 干扰节点以及干扰节点 的干扰节点之间的拓扑关系; 以所述拓扑关系作为依据之一来分配第一节点可以 获得的总无线资源;  [150] If the wireless environment related information of the node includes an interference node list that interferes with the node, the resource negotiation policy may include: determining, according to the interference node list, between the first node, the interference node, and the interference node of the interference node. a topological relationship; allocating a total radio resource obtainable by the first node according to the topology relationship;
[151]如果节点的无线环境相关信息包括节点可以获得的信道列表,则资源协商策 略可以包括: 在为第一节点确定无线资源时, 从第一节点可以获得的信道列表中 排除干扰节点可以获得的信道列表中的信道; 例如, 当某个信道被雷达占用、 或 者已经通过协商分配给了干扰节点使用, 则该信道对于第一节点来说就是不可获 得的信道, 因此第一节点在与干扰节点协商无线资源时需要排除该信道。 [151] If the wireless environment related information of the node includes a channel list that is available to the node, the resource negotiation policy may include: when determining the wireless resource for the first node, the interference node may be excluded from the channel list obtainable by the first node. Channel in the channel list; for example, when a channel is occupied by a radar or has been allocated to an interfering node by negotiation, the channel is not available to the first node, so the first node is in interference with The channel needs to be excluded when the node negotiates radio resources.
[152]如果节点的无线环境相关信息包括节点可以获得的各个信道的负载情况信 息时, 所述资源协商策略可以包括: 节点之间平分信道资源; 贝 ij, 第一节点可以 根据自身以及干扰节点可以获得的各个信道的负载情况信息对自身以及干扰节 点可以获得的信道资源进行平分, 从而与干扰节点协商出第一节点所使用的信道 资源。 需要说明的是, 在进行信道资源的划分时, 一般需要考虑到信道之间的负 载不同会导致相同宽度或数目的信道可以支持的传输速率是不同的, 以避免协商 过程的不公平。 [152] If the wireless environment related information of the node includes the load situation information of each channel that the node can obtain, the resource negotiation policy may include: dividing the channel resources between the nodes; The channel resources available to the interfering node and the interfering node are equally divided according to the load condition information of each channel that the interfering node can obtain, and the channel resources used by the first node are negotiated with the interfering node. It should be noted that when performing channel resource division, it is generally considered that different load between channels may result in different transmission rates that the same width or number of channels can support, so as to avoid unfairness of the negotiation process.
[153]如果节点的无线环境相关信息包括所述节点的负载情况信息,则所述资源协 商策略可以包括: 依据干扰节点以及第一节点的负载来分配第一节点可以获得的 总无线资源。 例如, 假设所述无线资源为频域信道资源, 干扰节点的负载分别为 Pi p2、 - pk, 第一节点的负载为 pQ, 第一节点可以获得的总频域信道资源为 S, 则在与干扰节点的资源协商中, 第一节点可以获得的频域信道资源宽度不超过[153] If the wireless environment related information of the node includes the load situation information of the node, the resource negotiation policy may include: allocating the total wireless resources available to the first node according to the interference node and the load of the first node. For example, if the radio resource is a frequency domain channel resource, the load of the interfering node is Pi p 2 , - pk, the load of the first node is p Q , and the total frequency domain channel resource obtainable by the first node is S, In the resource negotiation with the interfering node, the frequency domain channel resource width obtainable by the first node does not exceed
So=S* p0/( po+p1+〜+Pk)。 So=S* p 0 /( po+p 1 +~+Pk).
[154]以下, 以节点的无线环境相关信息包括所述节点的负载情况信息, 资源协商 策略为依据干扰节点以及第一节点的负载来分配频域信道资源为例, 对步骤 306 中如何实现确定第一节点对应的频域信道资源进行更为具体的说明。  [154] In the following, the wireless environment related information of the node includes the load situation information of the node, and the resource negotiation policy is used to allocate the frequency domain channel resource according to the interference node and the load of the first node, and how to implement the determination in step 306. The frequency domain channel resources corresponding to the first node are described in more detail.
[155]在第一种可能的实现方式中,第一节点根据所述无线环境相关信息以及所述 资源协商策略确定第一节点对应的频域信道资源可以包括: In a first possible implementation manner, the determining, by the first node, the frequency domain channel resource corresponding to the first node according to the wireless environment related information and the resource negotiation policy may include:
[156]第一节点根据第一节点和干扰节点的负载、以及所述资源协商策略确定第一 节点和干扰节点可以获得的频域信道资源宽度;  [156] The first node determines, according to the load of the first node and the interfering node, and the resource negotiation policy, a frequency domain channel resource width obtainable by the first node and the interfering node;
[157]第一节点根据第一节点以及干扰节点的 MAC地址进行第一节点和干扰节点 的排序;  [157] The first node performs the ordering of the first node and the interfering node according to the first node and the MAC address of the interfering node;
[158]第一节点根据排序顺序以及各个节点可以获得的频域信道资源宽度,从总频 域信道资源中确定第一节点对应的频域信道资源。  [158] The first node determines the frequency domain channel resource corresponding to the first node from the total frequency domain channel resources according to the sorting order and the frequency domain channel resource width obtainable by each node.
[159]其中, 所述总频域信道资源可以包括: 第一节点能够获取到的所有频域信道 资源。  [159] The total frequency domain channel resource may include: all frequency domain channel resources that the first node can acquire.
[160]其中, 该方法尤其适用于上述步骤 306的第一种可能的实现方式。 [160] wherein the method is particularly applicable to the first possible implementation of step 306 above.
[161]例如, 第一节点的排序顺序为 i, 那么根据排序在 l~i-l 的干扰节点可以获 得的频域信道资源宽度就可以确定第一节点对应的频域信道资源在总频域信道 资源中的起始位置, 根据第一节点可以获得的频域信道资源宽度可以确定第一节 点对应的频域信道资源在总频域信道资源中的终止位置, 从而确定出第一节点对 应的频域信道资源。 其中, 第一节点对应的频域信道资源的宽度可以等于或者小 于第一节点可以获得的频域信道资源宽度。 [162]在第二种可能的实现方式中,第一节点根据所述无线环境相关信息以及所述 资源协商策略确定第一节点对应的频域信道资源可以包括: [161] For example, if the sorting order of the first node is i, then the frequency domain channel resource width corresponding to the first node may be determined according to the frequency domain channel resource width that can be obtained by the interfering node that is sorted by l~il. The starting position of the first node, the frequency domain channel resource width obtainable by the first node may determine the end position of the frequency domain channel resource corresponding to the first node in the total frequency domain channel resource, thereby determining the frequency domain corresponding to the first node Channel resources. The width of the frequency domain channel resource corresponding to the first node may be equal to or smaller than the frequency domain channel resource width obtainable by the first node. [162] In a second possible implementation, the determining, by the first node, the frequency domain channel resource corresponding to the first node, according to the information about the wireless environment and the resource negotiation policy, may include:
[163]第一节点根据第一节点和干扰节点的负载、以及所述资源协商策略确定第一 节点可以获得的频域信道资源宽度;  [163] The first node determines, according to the load of the first node and the interfering node, and the resource negotiation policy, a frequency domain channel resource width obtainable by the first node;
[164]第一节点根据第一节点可以获得的频域信道资源宽度从总频域信道资源中 随机选择第一节点对应的频域信道资源。 [164] The first node randomly selects the frequency domain channel resource corresponding to the first node from the total frequency domain channel resources according to the frequency domain channel resource width obtainable by the first node.
[165]其中, 所述总频域信道资源可以包括: 第一节点能够获取到的所有频域信道 资源。  [165] The total frequency domain channel resource may include: all frequency domain channel resources that the first node can acquire.
[166]该方法尤其适用于上述步骤 306的第二种可能的实现方式。  This method is particularly applicable to the second possible implementation of step 306 above.
[167]其中,第一节点所使用的频域信道资源的宽度可以小于等于所述第一节点可 以获得的频域信道资源宽度。 [167] wherein the width of the frequency domain channel resource used by the first node may be less than or equal to the frequency domain channel resource width obtainable by the first node.
[168]本实施例中,第一节点与其干扰节点之间相互协商第一节点所使用的无线资 源, 无需额外设置资源管理节点, 降低了无线通信系统网络架构的复杂度; 而且, 第一节点分别与自身的干扰节点协商第一节点所使用的无线资源, 将现有技术中 资源管理节点的数据处理量分散至各个节点, 从而提高了为节点分配无线资源的 效率; 第一节点根据无线环境相关信息以及资源协商策略信息, 与干扰节点协商 第一节点所使用的无线资源, 从而能够针对第一节点及其干扰节点的无线环境进 行第一节点无线资源的分配, 相对于现有技术能够更为准确的进行节点的无线资 源分配;  In this embodiment, the first node negotiates with the interfering node the radio resources used by the first node, and does not need to additionally set the resource management node, thereby reducing the complexity of the network architecture of the wireless communication system; The wireless resources used by the first node are negotiated with the interference nodes of the first node, and the data processing amount of the resource management node in the prior art is dispersed to each node, thereby improving the efficiency of allocating wireless resources to the nodes; The related information and the resource negotiation policy information negotiate the radio resource used by the first node with the interfering node, so that the first node radio resource can be allocated to the radio environment of the first node and its interfering node, which can be more advanced than the prior art. To accurately perform wireless resource allocation of nodes;
[169]而且,在第一节点与干扰节点之间传输无线环境相关信息以及所支持的资源 协商策略之前, 先进行安全认证, 从而保证了第一节点与干扰节点之间资源协商 的安全性。 [169] Moreover, before the wireless environment related information and the supported resource negotiation policy are transmitted between the first node and the interfering node, the security authentication is performed first, thereby ensuring the security of resource negotiation between the first node and the interfering node.
[170]对于步骤 302, 第一节点和第一节点的干扰节点之间可以通过公钥加密方法 进行所述安全认证。 [170] For step 302, the security authentication may be performed by the public key encryption method between the first node and the interfering node of the first node.
[171]公钥加密方法中使用非对称密钥, 包括加密密钥与解密密钥一对密钥, 这两 个密钥是数学相关的, 当某一信息通过加密密钥加密后, 只能用对应的解密密钥 才能解密得到该信息。 而且, 如果知道了其中一个密钥, 并不能计算出与该密钥 成对的另外一个密钥, 因此, 如果公开了一对密钥中的一个密钥, 并不会危害到 另外一个密钥的秘密性质。 被公开的密钥称为公钥, 不公开的密钥称为私钥。  [171] The public key encryption method uses an asymmetric key, including a pair of keys, an encryption key and a decryption key. These two keys are mathematically related. When a certain information is encrypted by an encryption key, only The corresponding decryption key can be used to decrypt the information. Moreover, if one of the keys is known, and another key paired with the key cannot be calculated, if one of the pair of keys is disclosed, the other key will not be compromised. The secret nature. The public key is called a public key, and the undisclosed key is called a private key.
[172]在本发明实施例的一种可能的实现方式中,可以在无线通信系统例如 WLAN 系统中设置公钥服务器, 所述公钥服务器中存储各个节点的公钥。 各个节点可以 与公钥服务器进行通信, 例如参见图 3A所示。 通过公钥服务器, 每个节点可以 获得任何一个其它节点的公钥。 节点与公钥服务器之间可以使用任何形式的通信 连接, 例如节点通过以太网跟公钥服务器通信连接等。 在本发明实施例中, 虽然 公钥服务器也与每个节点相连, 但是它与现有技术中所述资源管理节点有本质的 不同, 即资源管理节点维护了一个资源数据库, 并依据此数据库给所有的节点进 行资源的分配, 而公钥服务器只负责管理各个节点的公钥, 并不直接参与资源的 协商和分配。 In a possible implementation manner of the embodiment of the present invention, a wireless communication system such as a WLAN may be used. A public key server is set in the system, and the public key of each node is stored in the public key server. Each node can communicate with a public key server, see for example Figure 3A. Through the public key server, each node can obtain the public key of any other node. Any form of communication connection can be used between the node and the public key server, for example, the node communicates with the public key server via Ethernet, and the like. In the embodiment of the present invention, although the public key server is also connected to each node, it is substantially different from the resource management node described in the prior art, that is, the resource management node maintains a resource database, and according to the database All nodes allocate resources, and the public key server is only responsible for managing the public keys of each node, and does not directly participate in the negotiation and allocation of resources.
[173]在第一种可能的实现方式中, 参见图 4所示, 第一节点与干扰节点之间进行 安全认证的实现方法可以包括:  [173] In the first possible implementation manner, as shown in FIG. 4, the method for implementing security authentication between the first node and the interfering node may include:
[174]步骤 401 : 第一节点向干扰节点发送使用第一节点的私钥加密后的第一加密 信息;  [174] Step 401: The first node sends, to the interfering node, the first encrypted information encrypted by using the private key of the first node;
[175]步骤 402: 干扰节点向公钥服务器请求第一节点的公钥;  [175] Step 402: The interfering node requests the public key of the first node from the public key server;
[176]步骤 403 : 公钥服务器将第一节点的公钥发送至干扰节点; [176] Step 403: The public key server sends the public key of the first node to the interference node;
[177]步骤 404: 干扰节点使用第一节点的公钥对第一加密信息进行解密, 如果解 密不成功, 则干扰节点对第一节点安全认证不通过; 如果解密成功, 则干扰节点 对第一节点安全认证通过, 执行步骤 405。 [177] Step 404: The interfering node decrypts the first encrypted information by using the public key of the first node. If the decryption is unsuccessful, the interfering node fails to pass the first node security authentication; if the decryption succeeds, the interfering node pairs the first After the node security authentication is passed, step 405 is performed.
[178]步骤 405 : 干扰节点向第一节点发送使用干扰节点的私钥加密后的第二加密 信息。  [178] Step 405: The interfering node sends the second encrypted information encrypted by the private key of the interfering node to the first node.
[179]步骤 406: 第一节点向公钥服务器请求干扰节点的公钥; [179] Step 406: The first node requests the public key server to interfere with the public key of the node;
[180]步骤 407: 公钥服务器将干扰节点的公钥发送至第一节点;  [180] Step 407: The public key server sends the public key of the interfering node to the first node;
[181]步骤 408 : 第一节点使用干扰节点的公钥对第二加密信息进行解密, 如果解 密不成功, 则第一节点对干扰节点安全认证不通过; 如果解密成功, 则第一节点 对干扰节点安全认证通过。  [181] Step 408: The first node decrypts the second encrypted information by using the public key of the interfering node. If the decryption is unsuccessful, the first node does not pass the security authentication of the interfering node; if the decryption succeeds, the first node interferes with the first node. The node security certification is passed.
[182]可选地, 所述第一加密信息可以携带在所述资源协商请求帧中, 所述第二加 密信息可以携带在所述资源协商确认帧中。 Optionally, the first encryption information may be carried in the resource negotiation request frame, and the second encryption information may be carried in the resource negotiation confirmation frame.
[183]可选地, 干扰节点和第一节点之间信息的交互可以通过帧交互的方式实现。  [183] Optionally, the interaction of information between the interference node and the first node may be implemented by means of frame interaction.
[184]在第二种可能的实现方式中, 参见图 5所示, 第一节点与干扰节点之间进行 安全认证的实现方法可以包括: In a second possible implementation manner, as shown in FIG. 5, the method for implementing security authentication between the first node and the interfering node may include:
[185]步骤 501 : 第一节点向公钥服务器请求干扰节点的公钥; [185] Step 501: The first node requests the public key server to interfere with the public key of the node;
[186]步骤 502: 公钥服务器将干扰节点的公钥发送至第一节点; [187]步骤 503 : 第一节点使用干扰节点的公钥对第一问题信息进行加密, 将得到 的第三加密信息发送至干扰节点; [186] Step 502: The public key server sends the public key of the interfering node to the first node; [187] Step 503: The first node encrypts the first problem information by using the public key of the interfering node, and sends the obtained third encrypted information to the interfering node;
[188]步骤 504 : 干扰节点使用自身的私钥对所述第三加密信息进行解密, 对解密 得到的第一问题信息进行解答, 得到第一解答信息;  [188] Step 504: The interfering node decrypts the third encrypted information by using its own private key, and solves the first problem information obtained by decrypting to obtain the first answer information.
[189]步骤 505 : 干扰节点向公钥服务器请求第一节点的公钥; [189] Step 505: The interfering node requests the public key of the first node from the public key server;
[190]步骤 506 : 公钥服务器将第一节点的公钥发送至干扰节点; [190] Step 506: The public key server sends the public key of the first node to the interference node;
[191]步骤 507 : 干扰节点使用第一节点的公钥对第二问题信息进行加密, 将得到 的第四加密信息以及第一解答信息发送至第一节点。 [191] Step 507: The interference node encrypts the second problem information by using the public key of the first node, and sends the obtained fourth encrypted information and the first solution information to the first node.
[192]步骤 508 : 第一节点对所述第一解答信息进行验证, 如果验证通过, 执行步 骤 509 ; 如果验证不通过, 第一节点与干扰节点之间的安全认证不通过, 认证过 程结束。  [192] Step 508: The first node verifies the first answer information. If the verification passes, step 509 is performed; if the verification fails, the security authentication between the first node and the interfering node fails, and the authentication process ends.
[193]步骤 509 : 第一节点使用自身的私钥对所述第四加密信息进行解密, 对解密 得到的第二问题信息进行解答, 得到第二解答信息, 将第二解答信息发送至干扰 节点;  [193] Step 509: The first node decrypts the fourth encrypted information by using its own private key, and answers the decrypted second question information to obtain second answer information, and sends the second answer information to the interference node. ;
[194]步骤 5 10 : 干扰节点对所述第二解答信息进行验证, 如果验证通过, 则干扰 节点和第一节点之间的安全认证通过; 如果验证不通过, 第一节点与干扰节点之 间的安全认证不通过, 认证过程结束。 [194] Step 5 10: The interference node verifies the second solution information, if the verification passes, the security authentication between the interference node and the first node passes; if the verification fails, the first node and the interference node The security certification did not pass and the certification process ended.
[195]其中, 所述第三加密信息可以携带在所述资源协商请求帧中, 所述第四加密 信息和第一解答信息可以携带在所述资源协商确认帧中。  [195] The third encrypted information may be carried in the resource negotiation request frame, where the fourth encrypted information and the first solution information may be carried in the resource negotiation confirmation frame.
[196]通过以上图 4和图 5的安全认证方法,都可以实现第一节点和干扰节点之间 的安全认证。 但是, 以上图 4和图 5所示的安全认证方法仅为示例, 在实际应用 中, 还可以对图 4和图 5所示的安全认证方法进行变形、 或者使用其他的安全认 证方法实现第一节点和干扰节点之间的安全认证, 本发明并不限制。 [197]与上述方法相对应的, 本发明实施例还提供一种资源协商装置, 该装置可以 应用于第一节点。 参见图 6, 该装置 600包括: [196] Through the security authentication methods of Figures 4 and 5 above, the security authentication between the first node and the interfering node can be achieved. However, the security authentication method shown in FIG. 4 and FIG. 5 above is only an example. In practical applications, the security authentication method shown in FIG. 4 and FIG. 5 may be modified, or the other security authentication method may be used to implement the first method. The security authentication between the node and the interfering node is not limited in the present invention. Corresponding to the above method, the embodiment of the present invention further provides a resource negotiation apparatus, and the apparatus can be applied to the first node. Referring to Figure 6, the apparatus 600 includes:
[198]确定单元 610, 用于确定与第一节点相互干扰的干扰节点; [198] determining unit 610, configured to determine an interference node that interferes with the first node;
[199]获取单元 620, 用于获取确定单元 610确定的所述干扰节点的无线环境相关 信息; The obtaining unit 620 is configured to obtain wireless environment related information of the interference node determined by the determining unit 610;
[200]协商单元 630, 用于根据所述第一节点的无线环境相关信息以及获取单元[200] negotiating unit 630, configured to acquire information about a wireless environment according to the first node, and an acquiring unit
620获取的所述干扰节点的无线环境相关信息, 与所述干扰节点协商第一节点所 使用的无线资源。 The wireless environment related information of the interfering node acquired by the 620, and the first node is negotiated with the interfering node. The wireless resources used.
[201]可选地, 获取单元 620还可以用于: 获取与所述干扰节点协商所遵照的资源 协商策略, 将获取到的资源协商策略发送给所述协商单元。  Optionally, the obtaining unit 620 is further configured to: obtain a resource negotiation policy that is negotiated with the interfering node, and send the obtained resource negotiation policy to the negotiating unit.
[202]可选地, 所述获取单元 620可以包括: [202] Optionally, the obtaining unit 620 may include:
[203]第一接收子单元,用于接收所述干扰节点发送的所述干扰节点所支持的资源 协商策略, 将接收到的资源协商策略作为所述与所述干扰节点协商所遵照的资源 协商策略; [203] a first receiving subunit, configured to receive a resource negotiation policy supported by the interfering node sent by the interfering node, and use the received resource negotiation policy as the resource negotiation negotiated with the interfering node. Strategy
[204]或者, 所述获取单元 620可以包括:  [204] Alternatively, the obtaining unit 620 may include:
[205]第二接收子单元,用于接收所述干扰节点发送的所述干扰节点所支持的资源 协商策略信息, 所述资源协商策略信息中包括至少两种资源协商策略;  [205] The second receiving subunit is configured to receive the resource negotiation policy information that is supported by the interfering node, and the resource negotiation policy information includes at least two resource negotiation policies.
[206]选择子单元,用于从所述第二接收子单元接收到的资源协商策略信息中选择 一种第一节点支持的资源协商策略作为所述与所述干扰节点协商所遵照的资源 协商策略;  [206] a selection subunit, configured to select, from the resource negotiation policy information received by the second receiving subunit, a resource negotiation policy supported by the first node as the resource negotiation negotiated with the interference node. Strategy
[207]第一发送子单元,用于将所述选择子单元选择的资源协商策略的信息发送给 所述干扰节点。  [207] The first sending subunit is configured to send information about the resource negotiation policy selected by the selecting subunit to the interference node.
[208]在第一种可能的实现方式中, 协商单元 630具体包括:  In a first possible implementation manner, the negotiating unit 630 specifically includes:
[209]第一确定子单元,用于根据所述无线环境相关信息以及所述资源协商策略确 定第一节点对应的无线资源, 将确定的无线资源作为第一节点所使用的无线资 源;  [209] a first determining subunit, configured to determine, according to the wireless environment related information and the resource negotiation policy, a radio resource corresponding to the first node, and use the determined radio resource as a radio resource used by the first node;
[210]第二发送子单元,用于将所述第一确定子单元确定的无线资源的信息发送至 各个干扰节点。 [210] The second sending subunit is configured to send information about the radio resource determined by the first determining subunit to each interfering node.
[211]在第二种可能的实现方式中, 协商单元 630具体包括:  In a second possible implementation manner, the negotiating unit 630 specifically includes:
[212]第二确定子单元,用于根据所述无线环境相关信息以及所述资源协商策略确 定第一节点对应的无线资源;  [212] a second determining subunit, configured to determine, according to the wireless environment related information and the resource negotiation policy, a radio resource corresponding to the first node;
[213]第三发送子单元,用于将所述第二确定子单元确定的所述无线资源的信息发 送至各个干扰节点进行确认; [213] a third sending subunit, configured to send information about the radio resource determined by the second determining subunit to each interfering node for confirmation;
[214]第三接收子单元, 用于接收到各个干扰节点发送的关于所述确认的同意应 答;  [214] a third receiving subunit, configured to receive an agreed response to the acknowledgement sent by each interfering node;
[215]第二确定子单元还用于:所述第三接收子单元接收到各个干扰节点发送的关 于所述确认的同意应答后, 将所述无线资源作为第一节点所使用的无线资源。  [215] The second determining subunit is further configured to: after receiving the consent response sent by each interfering node with respect to the acknowledgement, the third receiving subunit uses the radio resource as a radio resource used by the first node.
[216]可选地, 获取单元 620可以包括: [217]第四接收子单元,用于接收所述干扰节点发送的所述干扰节点的无线环境相 关信息。 [216] Optionally, the obtaining unit 620 may include: [217] A fourth receiving subunit, configured to receive radio environment related information of the interfering node sent by the interfering node.
[218]可选的, 该装置还可以包括:  [218] Optionally, the device may further include:
[219]认证单元, 用于获取所述干扰节点的无线环境相关信息之前, 与所述干扰节 点之间进行安全认证, 认证通过后, 触发获取单元获取所述干扰节点的无线环境 相关信息。  [219] The authentication unit is configured to perform security authentication with the interference node before acquiring the wireless environment related information of the interference node. After the authentication is passed, the trigger acquiring unit acquires the wireless environment related information of the interference node.
[220]可选地, 所述认证单元具体可以用于: 与所述干扰节点之间通过公钥加密方 法进行安全认证。  [220] Optionally, the authenticating unit may be specifically configured to: perform security authentication by using a public key encryption method with the interfering node.
[221]本实施例中,所述装置与其干扰节点之间相互协商第一节点所使用的无线资 源, 无需额外设置资源管理节点, 降低了无线通信系统网络架构的复杂度; 而且, 所述装置分别与自身的干扰节点协商第一节点所使用的无线资源, 将现有技术中 资源管理节点的数据处理量分散至各个节点, 从而提高了为节点分配无线资源的 效率; 所述装置根据第一节点及其干扰节点的无线环境相关信息, 与干扰节点协 商第一节点所使用的无线资源, 从而能够针对第一节点及其干扰节点的无线环境 进行第一节点无线资源的分配, 相对于现有技术能够更为准确的进行节点的无线 资源分配。  [221] In this embodiment, the device and the interfering node mutually negotiate the radio resources used by the first node, and do not need to additionally set the resource management node, thereby reducing the complexity of the network architecture of the wireless communication system; Negotiating the radio resources used by the first node with the interfering node, respectively, and dispersing the data processing amount of the resource management node in the prior art to each node, thereby improving the efficiency of allocating radio resources to the node; The wireless environment related information of the node and its interfering node negotiates with the interfering node the radio resource used by the first node, so that the radio resource of the first node and the interfering node can be allocated to the radio resource of the first node, compared to the existing The technology can more accurately perform wireless resource allocation of nodes.
[222]参见图 7, 为本发明实施例第一节点结构图, 该第一节点 700包括: 处理器 710、 存储器 720、 收发器 730和总线 740; Referring to FIG. 7, a first node structure diagram of an embodiment of the present invention, the first node 700 includes: a processor 710, a memory 720, a transceiver 730, and a bus 740;
[223]处理器 710、 存储器 720、 收发器 730通过总线 740相互连接; 总线 740可 以是 ISA总线、 PCI总线或 EISA总线等。 所述总线可以分为地址总线、 数据总 线、 控制总线等。 为便于表示, 图 7中仅用一条粗线表示, 但并不表示仅有一根 总线或一种类型的总线。 The processor 710, the memory 720, and the transceiver 730 are connected to each other through a bus 740; the bus 740 can be an ISA bus, a PCI bus, or an EISA bus. The bus can be divided into an address bus, a data bus, a control bus, and the like. For ease of representation, only one thick line is shown in Figure 7, but it does not mean that there is only one bus or one type of bus.
[224]存储器 720, 用于存放程序。 具体地, 程序可以包括程序代码, 所述程序代 码包括计算机操作指令。 存储器 720可能包含高速 RAM存储器, 也可能还包括 非易失性存储器 (non- volatile memory) , 例如至少一个磁盘存储器。  [224] Memory 720, used to store programs. In particular, the program can include program code, the program code including computer operating instructions. The memory 720 may include a high speed RAM memory and may also include a non-volatile memory such as at least one disk memory.
[225]所述处理器 710执行所述程序代码,用于确定与第一节点相互干扰的干扰节 点; 获取所述干扰节点的无线环境相关信息; 根据第一节点自身的无线环境相关 信息以及所述干扰节点的无线环境相关信息, 通过收发器 730与所述干扰节点协 商第一节点所使用的无线资源。 [225] The processor 710 executes the program code, configured to determine an interference node that interferes with the first node, acquires wireless environment related information of the interference node, and obtains information about the wireless environment of the first node and the The wireless environment related information of the interference node is negotiated with the interference node by the transceiver 730 to negotiate the wireless resource used by the first node.
[226]收发器 730用于连接其他设备, 并与其他设备进行通信。 收发器 730用于: 与所述干扰节点协商第一节点所使用的无线资源。 The transceiver 730 is used to connect to other devices and to communicate with other devices. The transceiver 730 is used to: Negotiating with the interfering node the radio resources used by the first node.
[227]可选地, 所述处理器 710还可以用于: 获取与所述干扰节点协商所遵照的资 源协商策略; 相应的, 所述处理器 710根据第一节点自身的无线环境相关信息、 干扰节点的无线环境相关信息以及资源协商策略, 通过收发器 730与所述干扰节 点协商第一节点所使用的无线资源。  Optionally, the processor 710 is further configured to: obtain a resource negotiation policy that is negotiated with the interference node; and correspondingly, the processor 710 is configured according to the wireless environment related information of the first node, The radio environment related information of the interfering node and the resource negotiation policy are negotiated with the interfering node by the transceiver 730 to negotiate the radio resource used by the first node.
[228]可选地, 处理器 710具体可以用于:  [228] Optionally, the processor 710 may be specifically configured to:
[229]通过收发器 730 接收所述干扰节点发送的所述干扰节点所支持的资源协商 策略, 将接收到的资源协商策略作为与所述干扰节点协商所遵照的资源协商策 略;  Receiving, by the transceiver 730, a resource negotiation policy supported by the interfering node that is sent by the interfering node, and using the received resource negotiation policy as a resource negotiation policy that is negotiated with the interfering node;
[230]相应的, 收发器 730还可以用于: 接收所述干扰节点发送的所述干扰节点所 支持的资源协商策; 或者, [230] Correspondingly, the transceiver 730 is further configured to: receive a resource negotiation policy supported by the interference node sent by the interference node; or
[231]处理器 710具体可以用于:通过收发器 730接收所述干扰节点发送的所述干 扰节点所支持的资源协商策略信息, 所述资源协商策略信息中包括至少两种资源 协商策略; 从接收到的资源协商策略信息中选择一种第一节点支持的资源协商策 略作为与所述干扰节点协商所遵照的资源协商策略, 通过收发器 730将选择的资 源协商策略的信息发送给所述干扰节点;  The processor 710 is specifically configured to: receive, by the transceiver 730, the resource negotiation policy information that is supported by the interference node that is sent by the interference node, where the resource negotiation policy information includes at least two resource negotiation policies; And selecting, by the received resource negotiation policy information, a resource negotiation policy supported by the first node as a resource negotiation policy that is negotiated with the interference node, and sending, by the transceiver 730, information about the selected resource negotiation policy to the interference Node
[232]相应的, 收发器 730还可以用于: 接收所述干扰节点发送的所述干扰节点所 支持的资源协商策略信息; 将处理器 710选择的资源协商策略的信息发送给所述 干扰节点。  [232] Correspondingly, the transceiver 730 is further configured to: receive resource negotiation policy information supported by the interference node sent by the interference node, and send information about the resource negotiation policy selected by the processor 710 to the interference node. .
[233]可选地, 所述处理器 710具体可以用于: 根据所述第一节点自身的无线环境 相关信息、 所述干扰节点的无线环境相关信息以及所述与所述干扰节点协商所遵 照的资源协商策略确定所述第一节点对应的无线资源; 将确定的无线资源作为第 一节点所使用的无线资源, 将确定的无线资源的信息通过收发器 730发送至各个 干扰节点; Optionally, the processor 710 is specifically configured to: comply with the wireless environment related information of the first node, the wireless environment related information of the interference node, and the negotiation with the interference node. The resource negotiation policy determines the radio resource corresponding to the first node; the determined radio resource is used as the radio resource used by the first node, and the determined information of the radio resource is sent to each interfering node through the transceiver 730;
[234]相应的, 收发器 730还可以用于: 将处理器 710确定的无线资源的信息发送 至各个干扰节点。 Correspondingly, the transceiver 730 is further configured to: send information about the radio resource determined by the processor 710 to each interfering node.
[235]可选地, 所述处理器 710具体可以用于: 根据所述第一节点自身的无线环境 相关信息、 所述干扰节点的无线环境相关信息以及所述与所述干扰节点协商所遵 照的资源协商策略确定所述第一节点对应的无线资源; 将确定的所述无线资源的 信息通过收发器 730发送至各个干扰节点进行确认; 收发器 730接收到各个干扰 节点发送的关于所述确认的同意应答后, 将所述无线资源作为第一节点所使用的 无线资源; Optionally, the processor 710 is specifically configured to: comply with the wireless environment related information of the first node, the wireless environment related information of the interference node, and the negotiation with the interference node. The resource negotiation policy determines the radio resource corresponding to the first node; the determined information of the radio resource is sent to each interfering node through the transceiver 730 for confirmation; and the transceiver 730 receives the acknowledgement sent by each interfering node. After the consent is answered, the wireless resource is used as the first node. Wireless resources;
[236]相应的, 收发器 730还可以用于: 将处理器 710确定的所述无线资源的信息 通过发送至各个干扰节点进行确认; 接收到各个干扰节点发送的关于所述确认的 同意应答, 将接收到的同意应答发送至处理器 710。  [236] Correspondingly, the transceiver 730 is further configured to: confirm, by using the information about the radio resource determined by the processor 710, by sending to each interfering node, and receiving, by each interfering node, a consent response for the acknowledgement, The received consent response is sent to the processor 710.
[237]可选地, 所述处理器 710具体可以用于: 通过收发器 730接收所述干扰节点 发送的所述干扰节点的无线环境相关信息; Optionally, the processor 710 is specifically configured to: receive, by using the transceiver 730, wireless environment related information of the interfering node that is sent by the interfering node;
[238]相应的, 收发器 730还可以用于: 接收所述干扰节点发送的所述干扰节点的 无线环境相关信息。  [238] Correspondingly, the transceiver 730 is further configured to: receive wireless environment related information of the interference node sent by the interference node.
[239]可选地, 所述处理器 710还可以用于: 获取所述干扰节点的无线环境相关信 息之前, 通过所述收发器 730与所述干扰节点之间进行安全认证, 认证通过后, 执行所述获取所述干扰节点的无线环境相关信息的步骤;  [239] Optionally, the processor 710 is further configured to: perform security authentication between the transceiver 730 and the interfering node before acquiring the radio environment related information of the interfering node, and after the authentication is passed, Performing the step of acquiring wireless environment related information of the interference node;
[240]相应的, 所述收发器 730还可以用于: 与所述干扰节点之间进行安全认证。  Correspondingly, the transceiver 730 is further configured to: perform security authentication with the interference node.
[241]可选地, 所述收发器 730具体可以用于: 与所述干扰节点之间通过公钥加密 方法进行安全认证。 Optionally, the transceiver 730 is specifically configured to: perform security authentication by using a public key encryption method with the interfering node.
[242]本实施例中,第一节点与其干扰节点之间相互协商第一节点所使用的无线资 源, 无需额外设置资源管理节点, 降低了无线通信系统网络架构的复杂度; 而且, 第一节点分别与自身的干扰节点协商第一节点所使用的无线资源, 将现有技术中 资源管理节点的数据处理量分散至各个节点, 从而提高了为节点分配无线资源的 效率; 第一节点根据第一节点以及干扰节点无线环境相关信息, 与所述干扰节点 协商第一节点所使用的无线资源, 从而能够针对第一节点及其干扰节点的无线环 境进行第一节点无线资源的分配, 相对于现有技术能够更为准确的进行节点的无 线资源分配。 [242] In this embodiment, the first node negotiates with the interfering node the radio resources used by the first node, and does not need to additionally set a resource management node, thereby reducing the complexity of the network architecture of the wireless communication system; Separating the radio resources used by the first node with the own interfering node, respectively, and dispersing the data processing amount of the resource management node in the prior art to each node, thereby improving the efficiency of allocating radio resources to the node; And the node and the wireless environment related information of the interfering node, and the radio resource used by the first node is negotiated with the interfering node, so that the radio resource of the first node and the radio environment of the interfering node can be allocated, compared to the existing The technology can more accurately perform wireless resource allocation of nodes.
[243]本领域的技术人员可以清楚地了解到本发明实施例中的技术可借助软件加 必需的通用硬件平台的方式来实现。 基于这样的理解, 本发明实施例中的技术方 案本质上或者说对现有技术做出贡献的部分可以以软件产品的形式体现出来, 该 计算机软件产品可以存储在存储介质中, 如 ROM/RAM、 磁碟、 光盘等, 包括若 干指令用以使得一台计算机设备(可以是个人计算机, 服务器, 或者网络设备等) 执行本发明各个实施例或者实施例的某些部分所述的方法。 It will be apparent to those skilled in the art that the techniques in the embodiments of the present invention can be implemented by means of software plus a necessary general hardware platform. Based on such understanding, the technical solution in the embodiments of the present invention may be embodied in the form of a software product in essence or in the form of a software product, and the computer software product may be stored in a storage medium such as a ROM/RAM. , a diskette, an optical disk, etc., comprising instructions for causing a computer device (which may be a personal computer, server, or network device, etc.) to perform the methods described in various embodiments of the present invention or in certain portions of the embodiments.
[244]本说明书中的各个实施例均采用递进的方式描述,各个实施例之间相同相似 的部分互相参见即可, 每个实施例重点说明的都是与其他实施例的不同之处。 尤 其, 对于系统实施例而言, 由于其基本相似于方法实施例, 所以描述的比较简单, 相关之处参见方法实施例的部分说明即可。 The various embodiments in the present specification are described in a progressive manner, and the same or similar parts of the various embodiments may be referred to each other, and each embodiment focuses on differences from other embodiments. Especially For the system embodiment, since it is basically similar to the method embodiment, the description is relatively simple, and the relevant parts can be referred to the description of the method embodiment.
[245]以上所述的本发明实施方式, 并不构成对本发明保护范围的限定。任何在本 发明的精神和原则之内所作的修改、 等同替换和改进等, 均应包含在本发明的保 护范围之内。  The embodiments of the invention described above are not intended to limit the scope of the invention. Any modifications, equivalent substitutions and improvements made within the spirit and scope of the invention are intended to be included within the scope of the invention.

Claims

权 利 要 求 Rights request
1、 一种资源协商装置, 其特征在于, 包括: 确定单元、 获取单元和协 商单元, 其中, 1. A resource negotiation device, characterized in that it includes: a determination unit, an acquisition unit and a negotiation unit, wherein,
确定单元, 用于确定与第一节点相互干扰的干扰节点; a determining unit, used to determine the interfering node that interferes with the first node;
获取单元,用于获取所述确定单元确定的所述干扰节点的无线环境相关 信息; An acquisition unit, configured to acquire the wireless environment related information of the interfering node determined by the determination unit;
协商单元,用于根据所述第一节点的无线环境相关信息以及所述获取单 元获取到的所述干扰节点的无线环境相关信息, 与所述干扰节点协商所述第 一节点所使用的无线资源。 A negotiation unit configured to negotiate with the interfering node the wireless resources used by the first node based on the wireless environment related information of the first node and the wireless environment related information of the interfering node obtained by the acquisition unit. .
2、 根据权利要求 1所述的装置, 其特征在于, 所述获取单元还用于: 获取与所述干扰节点协商所遵照的资源协商策略, 将获取到的资源协商策略 发送给所述协商单元。 2. The device according to claim 1, characterized in that, the obtaining unit is further configured to: obtain a resource negotiation policy to be followed for negotiation with the interfering node, and send the obtained resource negotiation policy to the negotiation unit. .
3、 根据权利要求 2所述的装置, 其特征在于, 所述获取单元包括: 第一接收子单元,用于接收所述干扰节点发送的所述干扰节点所支持的 资源协商策略, 将接收到的资源协商策略作为所述与所述干扰节点协商所遵 照的资源协商策略; 3. The device according to claim 2, characterized in that, the obtaining unit includes: a first receiving subunit, configured to receive the resource negotiation policy supported by the interfering node sent by the interfering node, and receive the resource negotiation policy supported by the interfering node. The resource negotiation policy is used as the resource negotiation policy followed in the negotiation with the interfering node;
或者, 所述获取单元包括: Or, the acquisition unit includes:
第二接收子单元,用于接收所述干扰节点发送的所述干扰节点所支持的 资源协商策略信息, 所述资源协商策略信息中包括至少两种资源协商策略; 选择子单元,用于从所述第二接收子单元接收到的资源协商策略信息中 选择一种第一节点支持的资源协商策略作为所述与所述干扰节点协商所遵 照的资源协商策略; a second receiving subunit, configured to receive resource negotiation strategy information supported by the interfering node sent by the interfering node, where the resource negotiation strategy information includes at least two resource negotiation strategies; a selection subunit, configured to select from the Selecting a resource negotiation strategy supported by the first node from the resource negotiation strategy information received by the second receiving subunit as the resource negotiation strategy followed in the negotiation with the interfering node;
第一发送子单元,用于将所述选择子单元选择的资源协商策略的信息发 送给所述干扰节点。 The first sending subunit is used to send information about the resource negotiation strategy selected by the selection subunit to the interfering node.
4、 根据权利要求 1至 3任一项所述的装置, 其特征在于, 所述协商单 元包括: 4. The device according to any one of claims 1 to 3, characterized in that the negotiation unit includes:
第一确定子单元,用于根据所述无线环境相关信息以及所述资源协商策 略确定第一节点对应的无线资源, 将确定的无线资源作为第一节点所使用的 无线资源; The first determining subunit is configured to determine the wireless resource corresponding to the first node according to the wireless environment related information and the resource negotiation policy, and use the determined wireless resource as the wireless resource used by the first node;
第二发送子单元,用于将所述第一确定子单元确定的无线资源的信息发 送至各个干扰节点。 The second sending subunit is configured to send the information of the wireless resources determined by the first determining subunit to each interfering node.
5、 根据权利要求 1至 3任一项所述的装置, 其特征在于, 所述协商单 元包括: 5. The device according to any one of claims 1 to 3, characterized in that the negotiation unit includes:
第二确定子单元,用于根据所述无线环境相关信息以及所述资源协商策 略确定第一节点对应的无线资源; The second determination subunit is used to determine the wireless resource corresponding to the first node according to the wireless environment related information and the resource negotiation policy;
第三发送子单元,用于将所述第二确定子单元确定的所述无线资源的信 息发送至各个干扰节点进行确认; The third sending subunit is used to send the information of the wireless resources determined by the second determining subunit to each interfering node for confirmation;
第三接收子单元,用于接收到各个干扰节点发送的关于所述确认的同意 应答; The third receiving subunit is used to receive the consent response sent by each interfering node regarding the confirmation;
第二确定子单元还用于:所述第三接收子单元接收到各个干扰节点发送 的关于所述确认的同意应答后, 将所述无线资源作为第一节点所使用的无线 资源。 The second determination subunit is also configured to use the wireless resource as the wireless resource used by the first node after the third receiving subunit receives the consent response regarding the confirmation sent by each interfering node.
6、 根据权利要求 1至 5任一项所述的装置, 其特征在于, 所述获取单 元包括: 6. The device according to any one of claims 1 to 5, characterized in that the acquisition unit includes:
第四接收子单元,用于接收所述干扰节点发送的所述干扰节点的无线环 境相关信息。 The fourth receiving subunit is used to receive the wireless environment related information of the interfering node sent by the interfering node.
7、 根据权利要求 1至 6任一项所述的装置, 其特征在于, 该装置还包 括: 7. The device according to any one of claims 1 to 6, characterized in that the device further includes:
认证单元, 用于获取所述干扰节点的无线环境相关信息之前, 与所述干 扰节点之间进行安全认证, 认证通过后, 触发获取单元获取所述干扰节点的 无线环境相关信息。 The authentication unit is configured to perform security authentication with the interfering node before obtaining the wireless environment-related information of the interfering node. After passing the authentication, trigger the acquisition unit to obtain the wireless environment-related information of the interfering node.
8、 根据权利要求 7所述的装置, 其特征在于, 所述认证单元具体用于: 与所述干扰节点之间通过公钥加密方法进行安全认证。 8. The device according to claim 7, wherein the authentication unit is specifically configured to: perform security authentication with the interfering node through a public key encryption method.
9、 第一节点, 其特征在于, 包括处理器和收发器; 其中, 9. The first node is characterized by including a processor and a transceiver; wherein,
处理器, 用于确定与所述第一节点相互干扰的干扰节点; 获取所述干扰 节点的无线环境相关信息; 根据所述第一节点自身的无线环境相关信息以及 所述干扰节点的无线环境相关信息, 通过收发器与所述干扰节点协商所述第 一节点所使用的无线资源; A processor, configured to determine an interfering node that interferes with the first node; obtain wireless environment related information of the interfering node; and obtain wireless environment related information of the interfering node according to the wireless environment related information of the first node itself and the wireless environment related information of the interfering node. Information, negotiate with the interfering node through the transceiver the wireless resources used by the first node;
收发器, 用于与所述干扰节点协商第一节点所使用的无线资源。 A transceiver, configured to negotiate with the interfering node the radio resources used by the first node.
10、根据权利要求 9所述的第一节点, 其特征在于, 所述处理器还用于: 获取与所述干扰节点协商所遵照的资源协商策略。 10. The first node according to claim 9, characterized in that the processor is further configured to: obtain the resource negotiation policy followed for negotiation with the interfering node.
11、 根据权利要求 10所述的第一节点, 其特征在于, 所述处理器具体用 于: 通过所述收发器接收所述干扰节点发送的所述干扰节点所支持的资源协 商策略, 将接收到的资源协商策略作为与所述干扰节点协商所遵照的资源协 商策略; 11. The first node according to claim 10, characterized in that the processor specifically uses In: receiving, through the transceiver, the resource negotiation policy supported by the interfering node sent by the interfering node, and using the received resource negotiation policy as the resource negotiation policy followed for negotiation with the interfering node;
相应的, 所述收发器还用于: 接收所述干扰节点发送的所述干扰节点所 支持的资源协商策; Correspondingly, the transceiver is further configured to: receive the resource negotiation policy supported by the interfering node sent by the interfering node;
或者, 所述处理器具体用于: 通过所述收发器接收所述干扰节点发送的 所述干扰节点所支持的资源协商策略信息, 所述资源协商策略信息中包括至 少两种资源协商策略; 从接收到的资源协商策略信息中选择一种第一节点支 持的资源协商策略作为与所述干扰节点协商所遵照的资源协商策略, 通过所 述收发器将选择的资源协商策略的信息发送给所述干扰节点; Or, the processor is specifically configured to: receive, through the transceiver, the resource negotiation strategy information supported by the interfering node and sent by the interfering node, where the resource negotiation strategy information includes at least two resource negotiation strategies; from Select a resource negotiation strategy supported by the first node from the received resource negotiation strategy information as the resource negotiation strategy to be followed for negotiation with the interfering node, and send the selected resource negotiation strategy information to the interfering node through the transceiver. interference node;
相应的, 所述收发器还用于: 接收所述干扰节点发送的所述干扰节点所 支持的资源协商策略信息; 将所述处理器选择的资源协商策略的信息发送给 所述干扰节点。 Correspondingly, the transceiver is further configured to: receive the resource negotiation strategy information supported by the interfering node sent by the interfering node; and send the information of the resource negotiation strategy selected by the processor to the interfering node.
12、 根据权利要求 9至 11任一项所述的第一节点, 其特征在于, 所述处 理器具体用于: 根据所述第一节点自身的无线环境相关信息、 所述干扰节点 的无线环境相关信息以及所述与所述干扰节点协商所遵照的资源协商策略 确定所述第一节点对应的无线资源; 将确定的无线资源作为所述第一节点所 使用的无线资源, 将确定的无线资源的信息通过所述收发器发送至各个干扰 节点; 12. The first node according to any one of claims 9 to 11, characterized in that the processor is specifically configured to: according to the wireless environment related information of the first node itself, the wireless environment of the interfering node Relevant information and the resource negotiation policy followed in the negotiation with the interfering node determine the wireless resource corresponding to the first node; use the determined wireless resource as the wireless resource used by the first node, and use the determined wireless resource as the wireless resource used by the first node. The information is sent to each interfering node through the transceiver;
相应的, 所述收发器还用于: 将所述处理器确定的无线资源的信息发送 至各个干扰节点。 Correspondingly, the transceiver is further configured to: send the wireless resource information determined by the processor to each interfering node.
13、 根据权利要求 9至 11任一项所述的第一节点, 其特征在于, 所述处 理器具体用于: 根据所述第一节点自身的无线环境相关信息、 所述干扰节点 的无线环境相关信息以及所述与所述干扰节点协商所遵照的资源协商策略 确定所述第一节点对应的无线资源; 将确定的所述无线资源的信息通过所述 收发器发送至各个干扰节点进行确认; 所述收发器接收到各个干扰节点发送 的关于所述确认的同意应答后, 将所述无线资源作为第一节点所使用的无线 资源; 13. The first node according to any one of claims 9 to 11, characterized in that the processor is specifically configured to: according to the wireless environment related information of the first node itself, the wireless environment of the interfering node Relevant information and the resource negotiation policy followed in the negotiation with the interfering node determine the wireless resource corresponding to the first node; send the determined information of the wireless resource to each interfering node through the transceiver for confirmation; After receiving the consent response regarding the confirmation sent by each interfering node, the transceiver uses the wireless resource as the wireless resource used by the first node;
相应的, 所述收发器还用于: 将所述处理器确定的所述无线资源的信息 通过发送至各个干扰节点进行确认; 接收各个干扰节点发送的关于所述确认 的同意应答, 将接收到的同意应答发送至所述处理器。 Correspondingly, the transceiver is further configured to: confirm the wireless resource information determined by the processor by sending it to each interfering node; receive an agreement response regarding the confirmation sent by each interfering node, and receive the The consent response is sent to the processor.
14、 一种资源协商方法, 其特征在于, 包括: 14. A resource negotiation method, characterized by including:
第一节点确定与所述第一节点相互干扰的干扰节点; The first node determines an interfering node that interferes with the first node;
第一节点获取所述干扰节点的无线环境相关信息; The first node obtains wireless environment related information of the interfering node;
第一节点根据所述第一节点自身的无线环境相关信息以及所述干扰节 点的无线环境相关信息, 与所述干扰节点协商所述第一节点所使用的无线资 源。 The first node negotiates with the interfering node the wireless resources used by the first node based on the first node's own wireless environment related information and the interfering node's wireless environment related information.
15、 根据权利要求 14所述的方法, 其特征在于, 与所述干扰节点协商 所述第一节点所使用的无线资源之前, 该方法还包括: 15. The method according to claim 14, characterized in that before negotiating with the interfering node the radio resources used by the first node, the method further includes:
第一节点获取与所述干扰节点协商所遵照的资源协商策略。 The first node obtains the resource negotiation policy followed for negotiation with the interfering node.
16、 根据权利要求 15所述的方法, 其特征在于, 所述第一节点获取与 所述干扰节点协商所遵照的资源协商策略包括: 16. The method according to claim 15, wherein the first node obtains the resource negotiation policy followed by negotiating with the interfering node including:
第一节点接收所述干扰节点发送的所述干扰节点所支持的资源协商策 略, 将接收到的资源协商策略作为与所述干扰节点协商所遵照的资源协商策 略; 或者, The first node receives the resource negotiation policy supported by the interfering node sent by the interfering node, and uses the received resource negotiation policy as the resource negotiation policy followed for negotiation with the interfering node; or,
第一节点接收所述干扰节点发送的所述干扰节点所支持的资源协商策 略信息, 所述资源协商策略信息中包括至少两种资源协商策略; 从接收到的 资源协商策略信息中选择一种第一节点支持的资源协商策略作为与所述干 扰节点协商所遵照的资源协商策略, 将选择的资源协商策略的信息发送给所 述干扰节点。 The first node receives the resource negotiation strategy information supported by the interfering node and is sent by the interfering node. The resource negotiation strategy information includes at least two resource negotiation strategies; and selects a first one from the received resource negotiation strategy information. The resource negotiation policy supported by a node is used as the resource negotiation policy followed for negotiation with the interfering node, and the information of the selected resource negotiation policy is sent to the interfering node.
17、 根据权利要求 14至 16任一项所述的方法, 其特征在于, 所述第一 节点与所述干扰节点协商所述第一节点所使用的无线资源包括: 17. The method according to any one of claims 14 to 16, wherein the first node and the interfering node negotiate the wireless resources used by the first node including:
第一节点根据所述第一节点自身的无线环境相关信息、所述干扰节点的 无线环境相关信息以及所述与所述干扰节点协商所遵照的资源协商策略确 定所述第一节点对应的无线资源; The first node determines the wireless resources corresponding to the first node based on the wireless environment related information of the first node itself, the wireless environment related information of the interfering node, and the resource negotiation policy followed in the negotiation with the interfering node. ;
第一节点将确定的所述无线资源作为第一节点所使用的无线资源,将确 定的所述无线资源的信息发送至各个干扰节点。 The first node uses the determined wireless resources as wireless resources used by the first node, and sends information about the determined wireless resources to each interfering node.
18、 根据权利要求 14至 16任一项所述的方法, 其特征在于, 所述第一 节点与所述干扰节点协商所述第一节点所使用的无线资源包括: 18. The method according to any one of claims 14 to 16, wherein the first node and the interfering node negotiate the wireless resources used by the first node including:
第一节点根据所述第一节点自身的无线环境相关信息、所述干扰节点的 无线环境相关信息以及所述与所述干扰节点协商所遵照的资源协商策略确 定所述第一节点对应的无线资源; The first node determines the wireless resources corresponding to the first node based on the wireless environment related information of the first node itself, the wireless environment related information of the interfering node, and the resource negotiation policy followed in the negotiation with the interfering node. ;
第一节点将确定的所述无线资源的信息发送至各个所述干扰节点进行 确认; The first node sends the determined information of the wireless resources to each of the interfering nodes for confirm;
第一节点接收到各个所述干扰节点发送的关于所述确认的同意应答后, 将所述无线资源作为所述第一节点所使用的无线资源。 After receiving the consent response regarding the confirmation sent by each interfering node, the first node uses the wireless resource as the wireless resource used by the first node.
19、 根据权利要求 14至 18任一项所述的方法, 其特征在于, 第一节点 获取所述干扰节点的无线环境相关信息包括: 19. The method according to any one of claims 14 to 18, wherein the first node obtaining the wireless environment related information of the interfering node includes:
第一节点接收所述干扰节点发送的所述干扰节点的无线环境相关信息。 The first node receives the wireless environment related information of the interfering node sent by the interfering node.
20、 根据权利要求 14至 19任一项所述的方法, 其特征在于, 第一节点 获取所述干扰节点的无线环境相关信息之前, 还包括: 20. The method according to any one of claims 14 to 19, characterized in that, before the first node obtains the wireless environment related information of the interfering node, it further includes:
第一节点与所述干扰节点之间进行安全认证, 认证通过后, 执行所述第 一节点获取所述干扰节点的无线环境相关信息的步骤。 A security authentication is performed between the first node and the interfering node. After the authentication is passed, the step of obtaining the wireless environment related information of the interfering node is performed by the first node.
21、 根据权利要求 20所述的方法, 其特征在于, 第一节点与所述干扰 节点之间进行安全认证包括: 21. The method according to claim 20, wherein the security authentication between the first node and the interfering node includes:
第一节点与所述干扰节点之间通过公钥加密方法进行安全认证。 Security authentication is performed between the first node and the interfering node through a public key encryption method.
22、 根据权利要求 14至 21任一项所述的方法, 其特征在于, 所述干扰 节点的无线环境相关信息包括: 与所述干扰节点相互干扰的干扰节点列表、 和 /或所述干扰节点可以获得的信道列表、 和 /或所述干扰节点可以获得的各 个信道的负载情况信息、 和 /或所述干扰节点的负载情况信息; 22. The method according to any one of claims 14 to 21, characterized in that the wireless environment related information of the interfering node includes: a list of interfering nodes that interfere with each other and/or the interfering node The channel list that can be obtained, and/or the load situation information of each channel that the interfering node can obtain, and/or the load situation information of the interfering node;
第一节点的无线环境相关信息包括:与所述第一节点相互干扰的干扰节 点列表、 和 /或所述第一节点可以获得的信道列表、 和 /或所述第一节点可以 获得的各个信道的负载情况信息、 和 /或所述第一节点的负载情况信息。 The wireless environment related information of the first node includes: a list of interfering nodes that interfere with the first node, and/or a list of channels available to the first node, and/or each channel available to the first node. The load situation information of , and/or the load situation information of the first node.
23、 根据权利要求 14至 22任一项所述的方法, 其特征在于, 所述无线 资源包括: 频域、 时域或空域的信道资源。 23. The method according to any one of claims 14 to 22, characterized in that the wireless resources include: channel resources in the frequency domain, time domain or air domain.
PCT/CN2013/087920 2013-11-27 2013-11-27 Resource negotiation method, device and node WO2015077935A1 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
PCT/CN2013/087920 WO2015077935A1 (en) 2013-11-27 2013-11-27 Resource negotiation method, device and node
CN201380076354.8A CN105191399B (en) 2013-11-27 2013-11-27 A kind of resource negotiation method, apparatus and node

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2013/087920 WO2015077935A1 (en) 2013-11-27 2013-11-27 Resource negotiation method, device and node

Publications (1)

Publication Number Publication Date
WO2015077935A1 true WO2015077935A1 (en) 2015-06-04

Family

ID=53198184

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2013/087920 WO2015077935A1 (en) 2013-11-27 2013-11-27 Resource negotiation method, device and node

Country Status (2)

Country Link
CN (1) CN105191399B (en)
WO (1) WO2015077935A1 (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102065490A (en) * 2011-01-17 2011-05-18 大唐移动通信设备有限公司 Method and equipment for coordinating downlink transmitting power between base stations
CN102893647A (en) * 2010-05-19 2013-01-23 高通股份有限公司 Systems and methods for enhancing uplink coverage in interference scenarios
CN102907135A (en) * 2010-04-13 2013-01-30 高通股份有限公司 Adaptive resource negotiation between base stations for enhanced interference coordination

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102907135A (en) * 2010-04-13 2013-01-30 高通股份有限公司 Adaptive resource negotiation between base stations for enhanced interference coordination
CN102893647A (en) * 2010-05-19 2013-01-23 高通股份有限公司 Systems and methods for enhancing uplink coverage in interference scenarios
CN102065490A (en) * 2011-01-17 2011-05-18 大唐移动通信设备有限公司 Method and equipment for coordinating downlink transmitting power between base stations

Also Published As

Publication number Publication date
CN105191399A (en) 2015-12-23
CN105191399B (en) 2019-01-15

Similar Documents

Publication Publication Date Title
US11582230B2 (en) Dynamic MAC address change mechanism for wireless communications
CN110474875B (en) Discovery method and device based on service architecture
US8694782B2 (en) Wireless authentication using beacon messages
TWI388180B (en) Key generation in a communication system
CN101616410B (en) Access method and access system for cellular mobile communication network
KR102024653B1 (en) Access Methods, Devices, and Systems for User Equipment (UE)
US20200195445A1 (en) Registration method and apparatus based on service-based architecture
US10104546B2 (en) Systems and methods for authentication
KR100667181B1 (en) Method for allocating authorization key identifier for wireless portable internet system
JP6363716B2 (en) Position privacy protection method, apparatus and system
US9154950B2 (en) Network access method, apparatus and system
CN101635710B (en) Pre-shared-key-based method for controlling secure access to networks and system thereof
JP2017513327A (en) Safe and simplified procedure for joining a social Wi-Fi mesh network
US8661244B2 (en) Method and apparatus for establishing secured link between devices
KR20160058491A (en) Method and apparatus for providing services based on identifier of user device
US20050278532A1 (en) Method and apparatus for mutual authentication at handoff in a mobile wireless communication network
CN109314693B (en) Method and apparatus for authenticating a key requestor
WO2015058378A1 (en) Method and device for secure communication between user equipment
WO2011022950A1 (en) Service access method, system and device based on wlan access authentication
WO2008098520A1 (en) Security neighbor discovery method, network device and mobile station
KR20150095801A (en) Method and apparatus for communication security processing
WO2015192665A1 (en) Access method, apparatus and system based on temporary mac address
US20090136043A1 (en) Method and apparatus for performing key management and key distribution in wireless networks
WO2015077935A1 (en) Resource negotiation method, device and node
WO2017118269A1 (en) Method and apparatus for protecting air interface identity

Legal Events

Date Code Title Description
WWE Wipo information: entry into national phase

Ref document number: 201380076354.8

Country of ref document: CN

121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 13898313

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 13898313

Country of ref document: EP

Kind code of ref document: A1