WO2020037990A1 - 实现数据传输的冲突检测方法及装置 - Google Patents

实现数据传输的冲突检测方法及装置 Download PDF

Info

Publication number
WO2020037990A1
WO2020037990A1 PCT/CN2019/081311 CN2019081311W WO2020037990A1 WO 2020037990 A1 WO2020037990 A1 WO 2020037990A1 CN 2019081311 W CN2019081311 W CN 2019081311W WO 2020037990 A1 WO2020037990 A1 WO 2020037990A1
Authority
WO
WIPO (PCT)
Prior art keywords
data packet
receiving end
sending
information
conflict detection
Prior art date
Application number
PCT/CN2019/081311
Other languages
English (en)
French (fr)
Inventor
梁丹丹
淦明
左鑫
李云波
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Priority to EP19852367.2A priority Critical patent/EP3829091A4/en
Publication of WO2020037990A1 publication Critical patent/WO2020037990A1/zh
Priority to US17/181,536 priority patent/US11589389B2/en
Priority to US18/164,278 priority patent/US12028901B2/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W74/00Wireless channel access
    • H04W74/08Non-scheduled access, e.g. ALOHA
    • H04W74/0833Random access procedures, e.g. with 4-step access
    • H04W74/0841Random access procedures, e.g. with 4-step access with collision treatment
    • H04W74/0858Random access procedures, e.g. with 4-step access with collision treatment collision detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W74/00Wireless channel access
    • H04W74/08Non-scheduled access, e.g. ALOHA
    • H04W74/0808Non-scheduled access, e.g. ALOHA using carrier sensing, e.g. carrier sense multiple access [CSMA]
    • H04W74/0825Non-scheduled access, e.g. ALOHA using carrier sensing, e.g. carrier sense multiple access [CSMA] with collision detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L1/00Arrangements for detecting or preventing errors in the information received
    • H04L1/12Arrangements for detecting or preventing errors in the information received by using return channel
    • H04L1/16Arrangements for detecting or preventing errors in the information received by using return channel in which the return channel carries supervisory signals, e.g. repetition request signals
    • H04L1/1607Details of the supervisory signal
    • H04L1/1657Implicit acknowledgement of correct or incorrect reception, e.g. with a moving window
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L1/00Arrangements for detecting or preventing errors in the information received
    • H04L1/12Arrangements for detecting or preventing errors in the information received by using return channel
    • H04L1/16Arrangements for detecting or preventing errors in the information received by using return channel in which the return channel carries supervisory signals, e.g. repetition request signals
    • H04L1/18Automatic repetition systems, e.g. Van Duuren systems
    • H04L1/1829Arrangements specially adapted for the receiver end
    • H04L1/1864ARQ related signaling
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L1/00Arrangements for detecting or preventing errors in the information received
    • H04L1/12Arrangements for detecting or preventing errors in the information received by using return channel
    • H04L1/16Arrangements for detecting or preventing errors in the information received by using return channel in which the return channel carries supervisory signals, e.g. repetition request signals
    • H04L1/18Automatic repetition systems, e.g. Van Duuren systems
    • H04L1/1867Arrangements specially adapted for the transmitter end
    • H04L1/189Transmission or retransmission of more than one copy of a message
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
    • H04L69/22Parsing or analysis of headers
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W72/00Local resource management
    • H04W72/12Wireless traffic scheduling
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W74/00Wireless channel access
    • H04W74/08Non-scheduled access, e.g. ALOHA
    • H04W74/0808Non-scheduled access, e.g. ALOHA using carrier sensing, e.g. carrier sense multiple access [CSMA]
    • H04W74/0816Non-scheduled access, e.g. ALOHA using carrier sensing, e.g. carrier sense multiple access [CSMA] with collision avoidance

Definitions

  • Embodiments of the present application relate to the field of communications, and in particular, to a conflict detection method and device for implementing data transmission.
  • the sending end can be The access point (Access Point, AP) can also be a station (Station, STA) in half-duplex mode, that is, the sender adopts the method of listening first and sending later, wherein the sender does not receive the data within a preset time.
  • STA station
  • the Acknowledgement (ACK) message is received, it can be determined that a conflict occurs at the receiving end, and then the retransmission process is started. Obviously, because the transmitting end cannot sense in time whether the receiving end has a conflict, the data packet transmission efficiency is low.
  • the sender is in half-duplex mode, and the protocol is implemented as follows: listen first and then send, that is, the sender first determines that the channel is idle before sending data packets, and then waits for the receiver to return an ACK message to ensure that the receiver receives the data correctly. package. If the sender does not receive the ACK message within a predetermined time, it can be determined that the receiver has a conflict event for the data packet, and then the sender starts the retransmission process.
  • the transmitting end cannot sense in time whether there is a conflict at the receiving end, the transmitting end needs to wait for a predetermined time before entering the retransmission process, resulting in low data packet transmission efficiency and low channel utilization.
  • the present application provides a method and a device for detecting conflicts in data transmission, which can avoid, to a certain extent, the problems that a transmitting end cannot sense whether a receiving end has a conflict and causes low data packet transmission efficiency and low channel utilization.
  • an embodiment of the present application provides a conflict detection method for implementing data transmission.
  • the method includes:
  • the sending end sends a data packet containing conflict detection information to the receiving end, and the receiving end performs conflict detection on the data packet according to the conflict detection information. And, while sending a data packet, the sending end can receive a status indication message sent by the receiving end. Subsequently, the transmitting end parses the received status indication message, and executes a retransmission operation corresponding to the data packet if the status indication message contains conflict information.
  • the sending end can be notified of the collision event for the data packet at the receiving end in time, and immediately perform the retransmission operation, thereby reducing the waiting time and improving the channel utilization rate and data transmission efficiency.
  • the collision detection information may be located in a physical preamble of the data packet.
  • the receiving end preferentially decodes the conflict detection information, so that the receiving end can detect the conflict event corresponding to the data packet in time, and notify the sending end to perform the retransmission operation of the data packet in time, thereby improving the data packet Transmission efficiency.
  • the conflict detection information includes identity detection information and parameter detection information.
  • the identity detection information can be used to enable the receiving end to detect whether a data packet is sent to the receiving end according to the identity detection information.
  • the parameter detection information can be used to make the receiver detect conflicts based on the parameter detection information in the case that the result of the identity detection is successful.
  • the receiver can verify the identity and parameters preferentially, so that the receiver can detect the conflict event corresponding to the data packet in time, and notify the sender to perform the retransmission operation of the data packet in time, thereby improving the data. Packet transmission efficiency.
  • the status indication message includes at least one retransmission parameter information, and the at least one retransmission parameter information is used to instruct the sending end to perform a retransmission operation according to the at least one retransmission parameter information.
  • the transmitting end can perform a retransmission operation according to the retransmission parameters, thereby improving the success rate of data packet retransmission and further improving the data transmission efficiency.
  • the manner in which the sending end performs a retransmission operation corresponding to the data packet may be: stopping sending the data packet and sending the data packet to the receiving end again.
  • the transmitting end After the transmitting end learns that the receiving end has a conflict event corresponding to the data packet, it immediately stops the transmission of the data packet and enters the retransmission process, thereby reducing the waiting time and further improving the channel utilization and data transmission effectiveness.
  • the manner in which the sending end performs a retransmission operation corresponding to the data packet may be: continue to send the data packet to the receiving end, and after the sending of the data packet is completed, the sending end sends data to the receiving end again package.
  • the receiving end can decode the retransmitted data packet together with the previously failed transmission data packet, thereby improving the decoding success rate of the data packet by the receiving end, and further improving the overall system throughput and data transmission efficiency.
  • the method when the sending end sends the data packet to the receiving end again may be: the sending end determines the backoff duration of the data packet based on the transmission information of the previous data packet, where the previous data packet is the distance data The last data packet successfully sent by the sender to the receiver, and the transmission information includes the number of times the sender repeatedly sent the previous data packet to the receiver and the transmission efficiency value of the previous data packet. Subsequently, the sender sends a data packet to the receiver after a backoff period.
  • the transmitting end uses the transmission information of the previous data packet to calculate the backoff duration, thereby being able to solve the issue of fairness between devices.
  • an embodiment of the present application provides a conflict detection method for implementing data transmission.
  • the method includes:
  • the receiving end receives a data packet sent by the sending end, where the data packet includes conflict detection information. Subsequently, the receiving end may perform collision detection on the data packet according to the collision detection information. And, the receiving end may send a status indication message to the sending end, where the status indication message includes a result of conflict detection.
  • the collision detection information is located in a physical preamble of the data packet.
  • the conflict detection information includes identity detection information and parameter detection information.
  • the identity detection information is used to enable the receiving end to detect whether a data packet is sent to the receiving end according to the identity detection information. And, when the parameter detection information is used to make the receiving end determine that the result of the identity detection is successful, conflict detection is performed on the data packet according to the parameter detection information.
  • the status indication message includes at least one retransmission parameter information, and the at least one retransmission parameter information is used to instruct the sending end to perform a retransmission operation according to the at least one retransmission parameter information.
  • an embodiment of the present application provides a conflict detection device for implementing data transmission, for performing the first aspect or a method in any possible implementation manner of the first aspect.
  • the conflict detection apparatus includes a module for executing the method in the first aspect or any possible implementation manner of the first aspect.
  • an embodiment of the present application provides a conflict detection device for implementing data transmission, for performing the second aspect or a method in any possible implementation manner of the second aspect.
  • the conflict detection apparatus includes a module for executing the method in the second aspect or any one of the possible implementation manners of the second aspect.
  • an embodiment of the present application provides a conflict detection device for implementing data transmission, including a transceiver / transceiving pin and a processor, and optionally, a memory.
  • the transceiver / transceiver pin, the processor, and the memory communicate with each other through an internal connection path; the processor is configured to execute instructions to control the transceiver / transceiver pin to send or receive signals; the The memory is used to store instructions.
  • the processor executes instructions, the processor executes the method according to the first aspect or any one of the possible implementation manners of the first aspect.
  • an embodiment of the present application provides a conflict detection device for implementing data transmission, including a transceiver / transceiving pin and a processor, and optionally, a memory.
  • the transceiver / transceiver pin, the processor, and the memory communicate with each other through an internal connection path; the processor is configured to execute instructions to control the transceiver / transceiver pin to send or receive signals; the The memory is used to store instructions.
  • the processor executes instructions, the processor executes the method according to the second aspect or any one of the possible implementation manners of the second aspect.
  • an embodiment of the present application provides a computer-readable medium for storing a computer program, the computer program including instructions for executing the first aspect or a method in any possible implementation manner of the first aspect.
  • an embodiment of the present application provides a computer-readable medium for storing a computer program, the computer program including instructions for executing the method in the second aspect or any possible implementation manner of the second aspect.
  • an embodiment of the present application provides a computer program including instructions for executing the first aspect or a method in any possible implementation manner of the first aspect.
  • an embodiment of the present application provides a computer program, and the computer program includes instructions for executing the second aspect or a method in any possible implementation manner of the second aspect.
  • an embodiment of the present application provides a chip including a processing circuit and a transceiver pin.
  • the transceiver pin and the processor communicate with each other through an internal connection path.
  • the processor executes the method in the first aspect or any possible implementation manner of the first aspect to control the receiving pin to receive a signal, and Control the transmit pin to send signals.
  • an embodiment of the present application provides a chip including a processing circuit and a transceiver pin.
  • the transceiver pin and the processor communicate with each other through an internal connection path, and the processor executes the method in the second aspect or any possible implementation manner of the second aspect to control the receiving pin to receive a signal, Control the transmit pin to send signals.
  • an embodiment of the present application provides a conflict detection system for implementing data transmission.
  • the system includes a sending end and a receiving end related to the first aspect and the second aspect.
  • FIG. 1 is a schematic diagram of an application scenario provided by an embodiment of the present application.
  • FIG. 2 is one of the schematic flowcharts of a method for implementing a conflict detection method for data transmission according to an embodiment of the present application
  • FIG. 3 is a schematic diagram of a frame structure of a physical preamble of a data packet according to an embodiment of the present application
  • FIG. 4 is a second schematic flowchart of a method for implementing a conflict detection method for data transmission according to an embodiment of the present application
  • FIG. 5 is a third schematic flowchart of a conflict detection method for implementing data transmission according to an embodiment of the present application.
  • FIG. 6 is a schematic structural diagram of a transmitting end according to an embodiment of the present application.
  • FIG. 7 is a schematic block diagram of a transmitting end according to an embodiment of the present application.
  • FIG. 8 is a schematic structural diagram of a receiving end according to an embodiment of the present application.
  • FIG. 9 is a schematic block diagram of a receiving end according to an embodiment of the present application.
  • first and second in the description and claims of the embodiments of the present application are used to distinguish different objects, rather than to describe a specific order of the objects.
  • first target object and the second target object are used to distinguish different target objects, rather than to describe a specific order of the target objects.
  • words such as “exemplary” or “for example” are used as examples, illustrations or illustrations. Any embodiment or design described as “exemplary” or “for example” in the embodiments of the present application should not be construed as more preferred or more advantageous than other embodiments or designs. Rather, the use of the words “exemplary” or “for example” is intended to present the relevant concept in a concrete manner.
  • multiple processing units refer to two or more processing units; multiple systems refer to two or more systems.
  • FIG. 1 is a schematic diagram of an application scenario according to an embodiment of the present application.
  • This application scenario includes AP1 and AP2, and the numbers in the figure are 11, 12 in order.
  • STA1-3 (where STA1-3 refers to: STA1, STA2, and STA3), the reference numbers in the figure are: 13, 14, and 15, in order.
  • the AP may be a device such as a router, a switch, and the STA may be a computer, a vehicle-mounted device, or a mobile terminal.
  • the number of APs and STAs may be one or more, and the number of APs and STAs in the application scenario shown in FIG. 1 is only a schematic example.
  • the sending end may be an AP or a STA
  • the receiving end may be an AP or a STA. That is, the conflict detection method in this application may be applicable to communication between an AP and an AP, and may also be applicable to communication between an AP and an STA, and may also be applicable to communication between an STA and an STA.
  • only AP1 is used as the sending end and STA1 is used as the receiving end as an example for detailed description.
  • FIG. 2 is a schematic flowchart of a conflict detection method for implementing data transmission according to an embodiment of the present application.
  • FIG. 2 is a schematic flowchart of a conflict detection method for implementing data transmission according to an embodiment of the present application.
  • the sending end sends a data packet containing conflict detection information to the receiving end.
  • the sending end may send a data packet containing conflict detection information to the receiving end, so that after receiving the data packet, the receiving end conflicts the data packet according to the conflict detection information therein.
  • Detection Referring to FIG. 2, taking AP1 as a sending end and STA1 as a receiving end as an example for detailed examples. Specifically, AP1 sends a data packet to STA1, and a physical preamble in the data packet may include conflict detection information.
  • FIG. 3 which is a schematic diagram of a frame structure of a physical preamble of a data packet according to an embodiment of the present application. In FIG.
  • the physical preamble includes a traditional physical layer preamble (Legacy-preamble) and a repeat traditional signaling field (Repeat Legacy-Signal).
  • RL-SIG signaling indication field 1 and signaling indication field 2
  • next-generation short training field Next-Generation-Short Training Field, NG-STF
  • next-generation long training field Next Generation-Long training field, NG-LTF.
  • the signaling indication field 1 may include at least one identity detection information, and the identity detection information may be used to enable the receiving end to perform identity detection according to the identity detection information to determine whether the data packet is sent to the receiving end.
  • the identity detection information includes, but is not limited to, information such as an application identifier (AID), a service set identifier (Basic Service Set Identifier, BSSID), and the like used to uniquely identify the receiving end.
  • the signaling indication field 2 may include at least one reference detection information, and the parameter detection information may be used to enable the receiving end to perform a conflict detection according to the parameter detection information to determine whether there is a presence if the identity detection result of the identity detection information is successful.
  • the parameter detection information includes, but is not limited to, transmission opportunity limit parameters, bandwidth parameters, and the like.
  • the receiving end decodes the parameters in the parameter detection information, if there is interference or collision (collision means that while the receiving end receives the data packet sent by the sending end, another sending end is also receiving data from the receiving end. Sending a data packet), the receiving end will not be able to successfully decode the parameter detection information.
  • collision means that while the receiving end receives the data packet sent by the sending end, another sending end is also receiving data from the receiving end. Sending a data packet
  • the receiving end will not be able to successfully decode the parameter detection information.
  • the signaling indication field 1 and the signaling indication field 2 respectively use different CRCs, so that the receiving end can detect the signaling indication field 1 and the signaling indication field 2 respectively, so that the receiving end After the detection of the signaling indication field 1 fails, the parameter detection information in the signaling indication field 2 will no longer be decoded, thereby further improving the detection efficiency of the receiver for conflict detection.
  • the receiving end successfully detects the identity detection information in the signaling indication field 1, that is, the data sent to the receiving end when the data packet is determined.
  • the receiving end if the receiving end fails to decode the signaling indication field 2, the receiving end can determine that it is a collision event corresponding to the data packet.
  • the conflict detection information in the embodiment of the present application is located in the preamble of the physical layer. Compared with the identity detection information and parameter detection information in the prior art, it is located in the middle position of the Media Access Control (MAC) layer.
  • the terminal can preferentially decode the identity detection information and parameter detection information to determine as early as possible whether there is a conflict corresponding to the data packet, so that the sending end can enter the retransmission stage based on the feedback from the receiving end in time, thereby improving the channel utilization and data. Transmission efficiency.
  • the receiving end receives a data packet sent by the sending end.
  • the receiving end after receiving the data packet sent by the sending end, the receiving end analyzes the physical preamble, and proceeds to step 103.
  • the receiving end performs conflict detection on the data packet according to the conflict detection information.
  • the receiving end performs conflict detection on the data packet according to the conflict detection information contained in the data packet.
  • the receiving end performs identity detection on the identity detection information in the signaling indication field 1, the detection result is failure, that is, the data packet is not a data packet sent to the receiving end, then the receiving end determines that a corresponding packet exists.
  • Conflict event If the receiver performs identity detection on the identity detection information in the signaling indication field 1 and determines that the detection result is successful, the receiver continues to decode the parameter detection information. If the decoding is successful, the receiver continues to decode other information in the data packet. Partial parsing.
  • the way for the receiver to perform collision detection on the data packet may also be: determining whether there is a collision event corresponding to the data packet by calculating a signal to interference plus noise ratio (SINR) value . That is, if the receiving end receives a data packet, the calculated SINR value has a larger fluctuation than the previous SINR value, it can be determined that there is interference, that is, there is a collision event corresponding to the data packet.
  • SINR signal to interference plus noise ratio
  • the receiving end sends a status indication message to the sending end, where the status indication message includes a result of conflict detection.
  • the receiving end may do nothing and wait until the data packet is received before sending an ACK message to the sending end.
  • the receiving end may also report to the receiving end when the current channel quality is detected to be poor.
  • Send a status indication message that includes a modulation and coding strategy (MCS) or a channel quality indicator (CQI) to instruct the sender to transmit according to the instruction information in the MCS or CQI in the next transmission .
  • MCS modulation and coding strategy
  • CQI channel quality indicator
  • the receiving end if the receiving end detects that there is a conflict event corresponding to the data packet, the receiving end immediately sends a status indication message containing the conflict information to the sending end.
  • the receiving end if the receiving end is in full-duplex mode, the receiving end can continue to receive data packets (provided that the sending end continues to send data packets) and, at the same time as receiving, send a status indication message containing conflict information to the sending end . If the receiving end is in half-duplex mode, the receiving end immediately stops receiving data packets and sends a status indication message containing conflict information to the sending end.
  • the status indication message sent to the sending end may include, in addition to the conflict information, at least one retransmission parameter information,
  • the retransmission parameter information may be MCS or CQI, so that the transmitting end retransmits the data packet according to the retransmission parameter information, thereby improving the transmission quality and success rate when the transmitting end retransmits the data packet, and further improves the data transmission efficiency.
  • the form of the status indication message sent by the receiving end may be a Not Acknowledge (NACK) message.
  • NACK Not Acknowledge
  • the NACK message contains information indicating a failure to receive a data packet, that is, collision information.
  • the form of the status indication message sent by the receiving end may be a wireless transceiver status indication (Transceiver Status Indicator (TSI)).
  • TSI Transceiver Status Indicator
  • the TSI also includes a length of A 1-bit conflict indication field.
  • the conflict information is located in this field.
  • the conflict information can be represented by 0 or 1. For example, 0 means no conflict exists, and 1 means conflict exists.
  • TSI has the advantage of simpler structure than NACK, so that after receiving the TSI, the sender can learn whether there is a conflict event corresponding to the data packet by reading the information in the conflict indication field. Instruct the retransmission operation to further improve the transmission efficiency of the data packet.
  • the sending end While sending the data packet, the sending end receives the status indication message sent by the receiving end.
  • the transmitting end is in a full-duplex mode. Therefore, the transmitting end can monitor the same channel transmitted by the data packet while transmitting the data packet, or whether there is a status returned by the receiving end on different channels. Indication message.
  • the transmitting end parses the status indication message. If the status indication message contains conflict information, a retransmission operation corresponding to the data packet is performed.
  • the sending end after the sending end receives the status indication message sent by the receiving end, it analyzes the status indication message.
  • the parsing is performed. The process is to first determine whether the NACK message is sent by the receiving end to the sending end according to the destination address information and the source address information. Then, the NACK message is analyzed layer by layer to obtain the conflict information contained in the NACK message, or the conflict information and retransmission parameter information.
  • the parsing process is to directly obtain the information in the conflict indication field after verifying the destination address information and the source address information.
  • the receiving end parses the status as a message, it is determined that the status is only that the message contains conflict information indicating that the receiving end has a conflict event corresponding to the data packet, and then retransmission corresponding to the data packet is performed. operating.
  • the retransmission operation of the data packet by the sending end may be: after stopping sending the data packet, sending the data packet to the receiving end again.
  • the receiver can be in full-duplex mode or half-duplex mode.
  • the local configuration of the sending end is configured with the working modes of all receiving ends that communicate with it, that is, the sending end can obtain the receiving end working in full-duplex mode or half-duplex by querying the local configuration. Work mode. For specific details in this embodiment, reference may be made to the specific description in the second scenario.
  • the retransmission operation of the data packet by the sending end may be: continue to send the data packet, and after the data packet is sent, send the data packet to the receiving end again.
  • the receiving end is in full-duplex mode, that is, the receiving end can return a status indication message while receiving the data packet, and continue to receive the data packet.
  • steps S101-S106 are repeated until the data packet is successfully transmitted, that is, the transmitting end receives the ACK message returned by the receiving end.
  • the sender discards the data packet, and an operator may set the threshold according to actual requirements, which is not limited herein.
  • the sender sends a data packet containing conflict detection information to the receiver, so that the receiver determines that there is a conflict corresponding to the data packet according to the conflict detection information.
  • a status indication message containing conflict information can be sent to the sender immediately, so that the sender can learn about the conflict event that exists at the receiver in time, and immediately perform a retransmission operation, which shortens the waiting time and improves the channel Utilization and data transmission efficiency.
  • FIG. 4 is a schematic flowchart of a conflict detection method for implementing data transmission according to an embodiment of the present application.
  • FIG. 4 :
  • the sending end sends a data packet containing conflict detection information to the receiving end.
  • the receiving end receives a data packet sent by the sending end.
  • the receiving end performs conflict detection on the data packet according to the conflict detection information.
  • the receiving end sends a status indication message to the sending end, where the status indication message includes a result of conflict detection.
  • the sending end While sending the data packet, the sending end receives the status indication message sent by the receiving end.
  • steps S201-S205 For details of steps S201-S205, refer to S101-S105, and details are not described herein.
  • the sending end parses the status indication message. If the status indication message includes conflict information, the sending end stops sending data packets.
  • the transmitting end parses the status indication message, and if after analysis, determines that the status indication message contains conflict information, it stops sending data packets.
  • S207 Send the data packet to the receiving end again.
  • the sending end after the sending end stops sending the data packet, it sends the data packet to the receiving end again.
  • the sending end may directly perform a retransmission operation after stopping sending the data packet, that is, directly sending the data packet to the receiving end again without a backoff period, so that the sending end may directly perform retransmission without waiting for competition Transmission to further improve data packet transmission efficiency.
  • the sending end may send a data packet to the receiving end after the backoff period has elapsed after the data end is stopped.
  • the method for determining the backoff duration may refer to the backoff mechanism specified in (IEEE) 802.11, which is not described herein.
  • the sending end may determine the backoff duration according to the transmission information of the previous data packet.
  • the previous data packet is the last data packet successfully transmitted by the sender.
  • the transmission information includes, but is not limited to, the number of repetitions of the previous data packet sent by the sender, and the transmission efficiency value of the previous data packet.
  • the sender can calculate a contention window (CW) by using the following formula.
  • the size of the contention window is the backoff duration in the embodiment of the present application. For example, if the CW is 3, the sender sends a data packet. Backoff 3 times before, the time taken is the backoff time.
  • CW1 is the competition window value corresponding to the current data packet to be sent
  • CW2 is the randomly selected competition window value.
  • a in the formula is a calculation coefficient
  • the calculation coefficient the number of repeated transmissions of the previous data packet * (the ideal transmission time of the previous data packet / the actual transmission time of the previous data packet).
  • the calculation coefficient is an integer, for example, rounding up, and the value obtained from the ideal transmission time of the previous data packet / the actual transmission time of the previous data packet is the transmission of the previous data packet in the embodiment of the present application.
  • Efficiency value is the calculation coefficient
  • the ideal transmission time of the previous data packet can be calculated according to the actual bandwidth size, data packet size, and other values. For specific calculation methods, refer to the prior art embodiments, which are not described in this application.
  • the method for calculating the backoff duration can also be used before the steps of “sending a data packet containing conflict detection information to the receiver” described in S101, S201, and S301, that is, after the backoff duration is passed to the receiver End sends data packets.
  • the transmitting end after the transmitting end learns that the receiving end has a conflict event corresponding to the data packet, it immediately stops the transmission of the data packet and enters the retransmission process, thereby shortening the waiting time, and
  • the transmission information of a data packet is used to calculate the back-off time to increase the back-off time, that is, to implement a punishment measure on the data packet to perform a retransmission operation after the back-off time, thereby solving the issue of fairness between devices (fairness issue).
  • the sender that is not in the full-duplex mode still uses the conflict detection method in the prior art, that is, the retransmission operation is performed after the ACK is not received within a predetermined time, and the sender in this application can The receiver is aware of the conflict in time and enters retransmission. Therefore, the sender in this application can get multiple retransmission opportunities, so that the sender that uses the existing technology for conflict detection is always in a waiting state, resulting in fairness.
  • FIG. 5 is a schematic flowchart of a conflict detection method for implementing data transmission according to an embodiment of the present application.
  • FIG. 5 is a schematic flowchart of a conflict detection method for implementing data transmission according to an embodiment of the present application.
  • the sending end sends a data packet containing conflict detection information to the receiving end.
  • the receiving end receives a data packet sent by the sending end.
  • the receiving end performs conflict detection on the data packet according to the conflict detection information.
  • the receiving end sends a status indication message to the sending end, where the status indication message includes a result of conflict detection.
  • the sending end parses the status indication message. If the status indication message contains conflict information, it continues to send a data packet to the receiving end.
  • the sending end parses the status indication message. If the status indication message is determined to contain conflict information after parsing, the sending end determines whether the receiving end is full duplex by detecting the local configuration. Working mode, if yes, the sending end can continue to send data packets to the receiving end. The receiving end continues to receive data packets and buffers the data packets.
  • the status indication message when the receiving end returns the status indication message, the status indication message may also carry information instructing the sending end to continue transmitting the data packet, so that after receiving the status indication message, the sending end may send the The receiver continues to send data packets.
  • the sending end After sending the data packet, the sending end sends the data packet to the receiving end again.
  • the sending end After sending the data packet, the sending end sends the data packet to the receiving end again.
  • S207 For details, refer to S207, and details are not described herein.
  • the receiving end after the receiving end receives the data packet retransmitted by the transmitting end, if the collision event corresponding to the data packet is not detected, the receiving end buffers the retransmitted data packet and stores the retransmitted data packet in S106.
  • the data packet is decoded together with the retransmitted data packet, thereby improving the processing efficiency of the data packet at the receiving end, and then improving the overall data transmission efficiency.
  • decoding the two data packets together reference may be made to the prior art embodiment, which is not described in this application.
  • the options of “Stop data packet transmission and then perform retransmission operation” in scenario 2 and “Continue to transmit data packets and perform retransmission operation after transmission completion” can be selected during transmission.
  • the sender can retrieve the local configuration to determine whether to select "stop” or “not stop” to send the data packet.
  • the sending end if the sending end is configured to “not stop” sending data packets, the sending end also needs to determine that the receiving end is in a full-duplex mode before performing a continuous sending action of the data packet.
  • the transmitting end and the receiving end include a hardware structure and / or a software module corresponding to each function.
  • the embodiments of the present application can be implemented in the form of hardware or a combination of hardware and computer software. Whether a certain function is performed by hardware or computer software-driven hardware depends on the specific application of the technical solution and design constraints. Professional technicians can use different methods to implement the described functions for each specific application, but such implementation should not be considered to be beyond the scope of this application.
  • the sending end and the receiving end may be divided into functional modules according to the foregoing method examples.
  • each functional module may be divided corresponding to each function, or two or more functions may be integrated into one processing module.
  • the above integrated modules may be implemented in the form of hardware or software functional modules. It should be noted that the division of the modules in the embodiments of the present application is schematic, and is only a logical function division. In actual implementation, there may be another division manner.
  • FIG. 6 shows a possible structural diagram of the sending end 200 involved in the foregoing embodiment, such as
  • the sending end 200 may include: a sending module 21, a receiving module 22, and a processing module 23.
  • the sending module 21 may be configured to send a data packet containing conflict detection information to a receiving end, where the conflict detection information is used by the receiving end to perform conflict detection on the data packet.
  • the sending module 21 may be configured to support the sending end to perform S101, S201, and S301 in the foregoing method embodiments.
  • the receiving module 22 may be configured to receive a status indication message sent by a receiving end while sending a data packet.
  • the receiving module 22 may be used to support the sending end to perform S105, S205, and S305 in the foregoing method embodiments.
  • the processing module 23 may be configured to parse the status indication message, and if the status indication message contains conflict information, control the execution of a retransmission operation corresponding to the data packet.
  • the processing module 23 may be configured to support the sending end to execute S106, S206, S207, S306, and S307 in the foregoing method embodiments.
  • FIG. 7 shows a schematic block diagram of another sending end 300 according to an embodiment of the present application.
  • the transmitting end may include a processor 31 and a transceiver / transceiving pin 32, and optionally, a memory 33.
  • the processor 31 may be configured to execute the parsing of the status indication message in the foregoing method embodiment, and control the execution of a retransmission operation corresponding to the data packet if the status indication message includes conflict information.
  • the processor 31 may be configured to support the sending end to execute S106, S206, S207, S306, and S307 in the foregoing method embodiment.
  • the transceiver / transceiving pin 32 may be used to receive the signaling or data sent in steps S105, S205, and S305 in the foregoing method embodiment. It can also be used to perform steps S101, S201, and S301 in the foregoing method embodiment.
  • the various components of the transmitting end 300 are coupled together by a bus 34.
  • the bus system 34 includes a power bus, a control bus, and a status signal bus in addition to a data bus. However, for the sake of clarity, various buses are marked as the bus system 34 in the figure.
  • the memory 33 may be used for storing instructions in the foregoing method embodiments.
  • the sending end 300 may correspond to the sending end in each method of the foregoing embodiment, and the above and other management operations and / or functions of each element in the sending end 300 are respectively to achieve the foregoing The corresponding steps of the method are not repeated here for brevity.
  • FIG. 8 is a schematic diagram of a possible structure of the receiving end 400 involved in the foregoing embodiment.
  • the receiving end 400 may include a receiving module 41, a processing module 42, and a sending module 43.
  • the receiving module 41 may be configured to receive a data packet sent by a sending end, where the data packet includes conflict detection information.
  • the receiving module 41 may be configured to support the receiving end to perform S102, S202, and S302 in the foregoing method embodiments.
  • the processing module 42 may be configured to perform conflict detection on the data packet according to the conflict detection information.
  • the processing module 42 may be configured to support the receiving end to perform S103, S203, and S303 in the foregoing method embodiments.
  • the sending module 43 may be configured to send a status indication message to the sending end, where the status indication message includes a result of conflict detection.
  • the sending module 43 may be configured to support the sending end to perform S104, S204, and S304 in the foregoing method embodiments.
  • FIG. 9 shows a schematic block diagram of another receiving end 500 according to an embodiment of the present application.
  • the receiving end 500 may include: a processor 51 and a transceiver / transceiving pin 52, and optionally, a memory 53.
  • the processor 51 may be configured to perform the steps of performing conflict detection on the data packet according to the conflict detection information in the foregoing method embodiments.
  • the processor 51 may be configured to support the execution of the sending end S103, S203, and S303 in the foregoing method embodiment.
  • the transceiver / transceiving pin 52 may be used to receive the signaling or data sent in steps S102, S202, and S302 in the foregoing method embodiment. It can also be used to perform steps S104, S204, and S304 in the foregoing method embodiments.
  • the various components of the receiving end 500 are coupled together through a bus 54.
  • the bus system 54 includes a power bus, a control bus, and a status signal bus in addition to the data bus. However, for the sake of clarity, various buses are marked as the bus system 54 in the figure.
  • the memory 53 may be used for storing instructions in the foregoing method embodiments.
  • the receiving end 500 may correspond to the transmitting end in each method of the foregoing embodiment, and the above and other management operations and / or functions of each element in the receiving end 500 are respectively to implement the foregoing each.
  • the corresponding steps of the method are not repeated here for brevity.
  • an embodiment of the present application further provides a computer-readable storage medium.
  • the computer-readable storage medium stores a computer program, where the computer program includes at least one piece of code, and the at least one piece of code can be received and / or received by a sending end.
  • the terminal executes to control the sending end and / or the receiving end to implement the foregoing method embodiments.
  • an embodiment of the present application further provides a computer program, which is used to implement the foregoing method embodiment when the computer program is executed by a sending end and / or a receiving end.
  • the program may be stored in whole or in part on a storage medium packaged with the processor, or may be partially or entirely stored in a memory not packaged with the processor.
  • an embodiment of the present application further provides a processor, which is configured to implement the foregoing method embodiments.
  • the processor may be a chip.
  • the steps of the method or algorithm described in connection with the disclosure of the embodiments of the present application may be implemented in a hardware manner, or may be implemented in a manner that a processor executes software instructions.
  • Software instructions can be composed of corresponding software modules.
  • Software modules can be stored in Random Access Memory (RAM), flash memory, Read Only Memory (ROM), erasable programmable read-only memory (ROM Erasable (Programmable ROM, EPROM), electrically erasable programmable read-only memory (EPROM), registers, hard disks, removable hard disks, read-only optical disks (CD-ROMs), or any other form of storage medium known in the art.
  • An exemplary storage medium is coupled to the processor such that the processor can read information from, and write information to, the storage medium.
  • the storage medium may also be an integral part of the processor.
  • the processor and the storage medium may reside in an ASIC.
  • the ASIC can reside in a network device.
  • the processor and the storage medium may also exist as discrete components in a network device.
  • the functions described in the embodiments of the present application may be implemented by hardware, software, firmware, or any combination thereof.
  • the functions may be stored on a computer-readable medium or transmitted as one or more instructions or code on a computer-readable medium.
  • Computer-readable media includes computer storage media and communication media including any medium that facilitates transfer of a computer program from one place to another.
  • a storage media may be any available media that can be accessed by a general purpose or special purpose computer.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

本申请实施例提供了一种实现数据传输的冲突检测方法及装置,涉及通信领域,该方法包括:向接收端发送包含冲突检测信息的数据包,其中,冲突检测信息用于接收端对数据包进行冲突检测;在发送数据包的同时,接收接收端发送的状态指示消息;对状态指示消息进行解析,若状态指示消息中包含有冲突信息,则执行对应于数据包的重传操作。从而使发送端能够及时获知接收端存在的对于数据包的冲突事件,并立即执行重传操作,进而缩短了等待时间,并提升了信道的利用率以及数据传输效率。

Description

实现数据传输的冲突检测方法及装置 技术领域
本申请实施例涉及通信领域,尤其涉及一种实现数据传输的冲突检测方法及装置。
背景技术
当前,采用载波侦听多址接入/碰撞避免(Carrier Sense Multiple Access with Collision Avoidance,CSMA/CA)协议的场景中(例如:无线局域网(Wireless Local Area Networks,WLAN)),发送端(可以为接入点(Access Point,AP),也可以为站点(Station,STA))为半双工模式,即,发送端采用先听后发的方式,其中,发送端在预设时间内未接收到确认(Acknowledgement,ACK)消息后,才能确定接收端发生冲突,随后启动重新发送流程,显然,由于发送端无法及时感知接收端是否存在冲突,导致数据包传输效率低。
发送端为半双工模式,协议的实现方式为:先听后发,即,发送端先确定信道空闲后,再发送数据包,然后,等待接收端返回ACK消息,以确定接收端正确接收数据包。如果发送端在预定时间内未接收到ACK消息,即可确定接收端存在对于数据包的冲突事件,随后,发送端再启动重新发送流程。
显然,由于发送端无法及时感知接收端是否存在冲突,使发送端需要等待预定时长后才进入重新发送流程,导致了数据包传输效率低以及信道利用率低。
发明内容
本申请提供一种实现数据传输的冲突检测方法及装置,能够在一定程度上避免发送端无法感知接收端是否存在冲突而导致数据包传输效率低和信道利用率低的问题。
为达到上述目的,本申请采用如下技术方案:
第一方面,本申请实施例提供一种实现数据传输的冲突检测方法,所述方法包括:
发送端向接收端发送包含有冲突检测信息的数据包,接收端对依据冲突检测信息对数据包进行冲突检测。以及,发送端在发送数据包的同时,可接收接收端发送的状态指示消息。随后,发送端对接收到的状态指示消息进行解析,并且在解析出状态指示消息中包含有冲突信息的情况下,执行对应于数据包的重传操作。
通过上述方法,使发送端能够及时获知接收端存在的对于数据包的冲突事件,并立即执行重传操作,进而缩短了等待时间,并提升了信道的利用率以及数据传输效率。
在一种可能的实现方式中,冲突检测信息可以位于数据包的物理前导中。
通过上述方式,实现了接收端对冲突检测信息的优先解码,从而使接收端能够及时检测出对应于数据包的冲突事件,并通知发送端及时进行数据包的重传操作,进而提升了数据包的传输效率。
在一种可能的实现方式中,冲突检测信息包括身份检测信息和参数检测信息。其中,身份检测信息可用于使接收端依据身份检测信息检测数据包是否发送给接收端。参数检测信息可用于使接收端确定身份检测的结果为成功的情况下,依据参数检测信息对数据包进行冲突检测。
通过上述方式,实现了接收端能够优先对身份及参数进行校验,使接收端能够及时检测出对应于数据包的冲突事件,并通知发送端及时进行数据包的重传操作,进而提升了数据包的传输效率。
在一种可能的实现方式中,状态指示消息包含至少一个重传参数信息,至少一个重传参数信息用于指示发送端依据至少一个重传参数信息,执行重传操作。
通过上述方式,实现了发送端能够依据重传参数进行重传操作,从而提升了数据包重传的成功率,进一步提升了数据传输效率。
在一种可能的实现方式中,发送端执行对应于数据包的重传操作的方式可以为:停止发送数据包,再次向接收端发送数据包。
通过上述方式,实现了发送端在获知接收端存在对应于数据包的冲突事件后,即刻停止数据包的传输,并进入重传流程,从而缩短了等待时间,进一步提升了信道利用率和数据传输效率。
在一种可能的实现方式中,发送端执行对应于数据包的重传操作的方式可以为:继续向接收端发送数据包,并且,发送端在数据包发送完成后,再次向接收端发送数据包。
通过上述方式,实现了接收端可将重传的数据包与之前传输失败的数据包一起进行解码,从而提升接收端对数据包的解码成功率,进一步提升系统整体的吞吐量以及数据传输效率。
在一种可能的实现方式中,发送端再次向接收端发送数据包时的方法,可以为:发送端基于前数据包的传输信息,确定数据包的退避时长,其中,前数据包为距数据包最近一次发送端成功发送给接收端的数据包,以及,传输信息包括发送端向接收端重复发送前数据包的次数以及前数据包的传输效率值。随后,发送端经过退避时长后,向接收端发送数据包。
通过上述方式,实现了发送端利用前一个数据包的传输信息,计算退避时长,从而能够解决设备之间的公平性问题。
第二方面,本申请实施例提供一种实现数据传输的冲突检测方法,所述方法包括:
接收端接收发送端发送的数据包,其中,数据包中包含冲突检测信息。随后,接收端可依据冲突检测信息,对数据包进行冲突检测。以及,接收端可向发送端发送状态指示消息,其中,状态指示消息中包含冲突检测的结果。
在一种可能的实现方式中,冲突检测信息位于数据包的物理前导中。
在一种可能的实现方式中,冲突检测信息包括身份检测信息和参数检测信息。其中,身份检测信息用于使接收端依据身份检测信息检测数据包是否发送给接收端。以及,参数检测信息用于使接收端确定身份检测的结果为成功的情况下,依据参数检测信息对数据包进行冲突检测。
在一种可能的实现方式中,状态指示消息包含至少一个重传参数信息,至少一个重传参数信息用于指示发送端依据至少一个重传参数信息,执行重传操作。
第三方面,本申请实施例提供一种实现数据传输的冲突检测装置,用于执行第一方面或第一方面任意可能的实现方式中的方法。具体地,该冲突检测装置包括用于执行上述第一方面或第一方面的任一种可能的实现方式中的方法的模块。
第四方面,本申请实施例提供一种实现数据传输的冲突检测装置,用于执行第二方面 或第二方面任意可能的实现方式中的方法。具体地,该冲突检测装置包括用于执行上述第二方面或第二方面的任一种可能的实现方式中方法的模块。
第五方面,本申请实施例提供一种实现数据传输的冲突检测设备,包括:收发器/收发管脚和处理器,可选地,还包括存储器。其中,所述收发器/收发管脚、所述处理器和所述存储器通过内部连接通路互相通信;所述处理器用于执行指令以控制所述收发器/收发管脚发送或者接收信号;所述存储器用于存储指令。所述处理器执行指令时,所述处理器执行第一方面或第一方面中任一种可能实现方式所述的方法。
第六方面,本申请实施例提供一种实现数据传输的冲突检测设备,包括:收发器/收发管脚和处理器,可选地,还包括存储器。其中,所述收发器/收发管脚、所述处理器和所述存储器通过内部连接通路互相通信;所述处理器用于执行指令以控制所述收发器/收发管脚发送或者接收信号;所述存储器用于存储指令。所述处理器执行指令时,所述处理器执行第二方面或第二方面中任一种可能实现方式所述的方法。
第七方面,本申请实施例提供了一种计算机可读介质,用于存储计算机程序,该计算机程序包括用于执行第一方面或第一方面的任意可能的实现方式中的方法的指令。
第八方面,本申请实施例提供了一种计算机可读介质,用于存储计算机程序,该计算机程序包括用于执行第二方面或第二方面的任意可能的实现方式中的方法的指令。
第九方面,本申请实施例提供了一种计算机程序,该计算机程序包括用于执行第一方面或第一方面的任意可能的实现方式中的方法的指令。
第十方面,本申请实施例,提供了一种计算机程序,该计算机程序包括用于执行第二方面或第二方面的任意可能的实现方式中的方法的指令。
第十一方面,本申请实施例提供了一种芯片,该芯片包括处理电路、收发管脚。其中,该收发管脚、和该处理器通过内部连接通路互相通信,该处理器执行第一方面或第一方面的任一种可能的实现方式中的方法,以控制接收管脚接收信号,以控制发送管脚发送信号。
第十二方面,本申请实施例提供了一种芯片,该芯片包括处理电路、收发管脚。其中,该收发管脚、和该处理器通过内部连接通路互相通信,该处理器执行第二方面或第二方面的任一种可能的实现方式中的方法,以控制接收管脚接收信号,以控制发送管脚发送信号。
第十三方面,本申请实施例提供一种实现数据传输的冲突检测系统,该系统包括上述第一方面和第二方面涉及的发送端和接收端。
附图说明
为了更清楚地说明本申请实施例的技术方案,下面将对本申请实施例的描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本申请的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动性的前提下,还可以根据这些附图获得其他的附图。
图1是本申请一个实施例提供的一种应用场景示意图;
图2是本申请一个实施例提供的实现数据传输的冲突检测方法的流程示意图之一;
图3是本申请一个实施例提供的数据包的物理前导的帧结构示意图;
图4是本申请一个实施例提供的实现数据传输的冲突检测方法的流程示意图之二;
图5是本申请一个实施例提供的实现数据传输的冲突检测方法的流程示意图之三;
图6是本申请一个实施例提供的发送端的结构示意图;
图7是本申请一个实施例提供的发送端的示意性框图;
图8是本申请一个实施例提供的接收端的结构示意图;
图9是本申请一个实施例提供的接收端的示意性框图。
具体实施方式
下面将结合本申请实施例中的附图,对本申请实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例是本申请一部分实施例,而不是全部的实施例。基于本申请中的实施例,本领域普通技术人员在没有作出创造性劳动前提下所获得的所有其他实施例,都属于本申请保护的范围。
本文中术语“和/或”,仅仅是一种描述关联对象的关联关系,表示可以存在三种关系,例如,A和/或B,可以表示:单独存在A,同时存在A和B,单独存在B这三种情况。
本申请实施例的说明书和权利要求书中的术语“第一”和“第二”等是用于区别不同的对象,而不是用于描述对象的特定顺序。例如,第一目标对象和第二目标对象等是用于区别不同的目标对象,而不是用于描述目标对象的特定顺序。
在本申请实施例中,“示例性的”或者“例如”等词用于表示作例子、例证或说明。本申请实施例中被描述为“示例性的”或者“例如”的任何实施例或设计方案不应被解释为比其它实施例或设计方案更优选或更具优势。确切而言,使用“示例性的”或者“例如”等词旨在以具体方式呈现相关概念。
在本申请实施例的描述中,除非另有说明,“多个”的含义是指两个或两个以上。例如,多个处理单元是指两个或两个以上的处理单元;多个系统是指两个或两个以上的系统。
在对本申请实施例的技术方案说明之前,首先结合附图对本申请实施例的应用场景进行说明。参见图1,为本申请实施例提供的一种应用场景示意图。该应用场景中包括AP1和AP2,在图中的标号依次为11、12。以及,STA1-3(其中,STA1-3指的是:STA1、STA2、STA3),在图中的标号依次为:13、14、15。在本申请实施例具体实施的过程中,AP可以为路由器、交换机等设备,STA可以为计算机、车载设备、移动终端等设备。需要说明的是,在实际应用中,AP和STA的数量均可以为一个或多个,图1所示应用场景的AP和STA的数量仅为示意性举例。
结合上述如图1所示的应用场景示意图,下面介绍本申请的具体实施方案,在本申请的实施例中,发送端可以为AP也可以为STA,接收端可以为AP也可以为STA。即,本申请中的冲突检测方法可以适用于AP与AP之间的通信,也可以适用于AP与STA之间的通信,还可以适用于STA与STA之间的通信。在本申请下面的实施例中,仅以AP1作为发送端,STA1作为接收端为例进行详细说明。
场景一
结合图1,如图2所示为本申请实施例中的实现数据传输的冲突检测方法的流程示意图,在图2中:
S101,发送端向接收端发送包含冲突检测信息的数据包。
具体的,在本申请的实施例中,发送端可向接收端发送包含有冲突检测信息的数据包,以使接收端在接收到该数据包后,依据其中的冲突检测信息对数据包进行冲突检测。参照 图2,以AP1为发送端、STA1为接收端为例进行详细举例,具体的,AP1向STA1发送数据包,数据包中的物理前导中可包含有冲突检测信息。参照图3,为本申请实施例中的数据包的物理前导的帧结构示意图,在图3中:物理前导包含传统物理层前导码(Legacy-preamble)、重复传统信令字段(Repeat Legacy-Signal,RL-SIG)、信令指示字段1和信令指示字段2、以及下一代短训练域(Next Generation-Short Training Field,NG-STF)、下一代长训练域(Next Generation-Long Training Field,NG-LTF)。其中,信令指示字段1中可包含至少一个身份检测信息,该身份检测信息可用于使接收端依据身份检测信息进行身份检测,以确定数据包是否为发送给接收端的。在一个实施例中,身份检测信息包括但不限于:应用标识(Application Identifier,AID),服务集标识(Basic Service Set Identifier,BSSID)等用于唯一标识接收端的信息。信令指示字段2中可包含至少一个参照检测信息,参数检测信息可用于使接收端在对身份检测信息进行身份检测的结果为成功的情况下,依据参数检测信息进行冲突检测,以确定是否存在对应于数据包的冲突。在一个实施例中,参数检测信息包括但不限于:发送机会限制参数、带宽参数等。需要说明的是,接收端对参数检测信息中的参数进行解码时,如果存在干扰或碰撞(碰撞是指,在接收端接收发送端发送的数据包的同时,有另一个发送端也在向接收端发送数据包),则接收端将无法成功对参数检测信息进行解码,具体解码过程可参照已有技术中实施例中,本申请不再赘述。在本申请的实施例中,信令指示字段1与信令指示字段2分别使用不同的CRC,使接收端可以分别对信令指示字段1与信令指示字段2进行检测,从而使接收端在对信令指示字段1检测失败后,不会再对信令指示字段2中的参数检测信息进行解码,进而进一步提升接收端对冲突检测的检测效率。并且,通过对信令指示字段1和信令指示字段2使用不同的CRC,使接收端在对信令指示字段1中的身份检测信息进行检测成功,即,确定数据包时发送给本接收端的情况下,如果接收端对信令指示字段2进行解码失败,则接收端能够判定为是一种对应于数据包的冲突事件。此外,本申请实施例中的冲突检测信息位于物理层前导中,较之已有技术中的身份检测信息以及参数检测信息位于媒体介入控制(Media Access Control,MAC)层的中间位置,能够使接收端能够优先对身份检测信息与参数检测信息进行解码,以尽早确定是否存在对应于数据包的冲突,从而使发送端能够及时的根据接收端的反馈进入重传阶段,进而提升了信道利用率与数据传输效率。
S102,接收端接收发送端发送的数据包。
具体的,在本申请的实施例中,接收端接收发送端发送的数据包后,对物理前导进行解析,进入步骤103。
S103,接收端依据冲突检测信息,对数据包进行冲突检测。
具体的,在本申请的实施例中,接收端依据数据包中包含的冲突检测信息,对数据包进行冲突检测。举例说明:如果接收端对信令指示字段1中的身份检测信息进行身份检测后,检测结果为失败,即,该数据包不是发送给接收端的数据包,则接收端确定存在对应于数据包的冲突事件。如果接收端对信令指示字段1中的身份检测信息进行身份检测后,确定检测结果为成功,则接收端继续对参数检测信息进行解码,如果解码成功,则接收端继续对数据包中的其它部分进行解析。在一个实施例中,接收端对数据包进行冲突检测的方式还可以为:通过计算信号与干扰加噪声比(Signal to Interference plus Noise Ratio,SINR)值,确定是否存在对应于数据包的冲突事件。即,如果接收端在接收到数据包后,计算出 的SINR值较之之前的SINR值出现较大波动,即可确定存在干扰,即存在对应于数据包的冲突事件。具体检测方法可参照已有技术实施例,本申请不再赘述。接收端还可以利用其它检测方式结合本申请实施例中的依据冲突检测信息对数据包进行冲突检测的方式,以进一步提升冲突检测的效率及准确性。
S104,接收端向发送端发送状态指示消息,其中,状态指示消息中包含冲突检测的结果。
在一个实施例中,如果接收端未检测到对应于数据包的冲突事件,则接收端可以不做任何处理,等到数据包接收完毕后,向发送端发送ACK消息。
在另一个实施例中,如果接收端为全双工模式,并且接收端未检测到对应于数据包的冲突事件,则接收端也可以在检测到当前信道质量较差的情况下,向接收端发送包含有调制与编码策略(Modulation and Coding Scheme,MCS)或信道质量指示(Channel Quality Indicator,CQI)的状态指示消息,以指示发送端在下次传输时,依据MCS或CQI中的指示信息进行传输。
在又一个实施例中,如果接收端检测到存在对应于数据包的冲突事件,则接收端立即向发送端发送包含有冲突信息的状态指示消息。其中,如果接收端为全双工模式,则接收端可以继续接收数据包(前提是发送端仍在继续发送数据包),并在接收的同时,向发送端发送包含有冲突信息的状态指示消息。如果接收端为半双工模式,则接收端立即停止接收数据包,并向发送端发送包含有冲突信息的状态指示消息。
在又一个实施例中,如果接收端检测到存在对应于数据包的冲突事件,在向发送端发送的状态指示消息中,除包含有冲突信息外,还可以包含有至少一个重传参数信息,重传参数信息可以为MCS,也可以为CQI,以使发送端按照重传参数信息重传数据包,从而提升发送端重传数据包时的传输质量和成功率,以进一步提升数据传输效率。
此外,在一个实施例中,接收端发送的状态指示消息的形式可以为非确认(Not Acknowledge,NACK)消息。NACK消息中包含有指示数据包接收失败的信息,即冲突信息。在另一个实施例中,接收端发送的状态指示消息的形式可以为无线收发状态指示(Transceiver Status Indicator,TSI),TSI中除包含有目的地址信息和源地址信息之外,还包括有长度为1bit的冲突指示字段,冲突信息位于该字段中,冲突信息可以以0或1进行表示,例如:0即可表示不存在冲突,1即可表示存在冲突。需要说明的是,如果冲突指示字段中的信息为0,即不存在冲突,接收端仍可以向发送端发送TSI信息,该TSI信息中可包括MCS或CQI,即指示发送端在下次传输时,根据TSI中的MCS或CQI进行传输。显然,TSI较之NACK具有结构简单的优点,使发送端在接收到TSI后,仅通过读取冲突指示字段中的信息即可获知当前是否存在对应于数据包的冲突事件,并可及时的根据指示进行重传操作,从而进一步提升了数据包的传输效率。
S105,发送端在发送数据包的同时,接收接收端发送的状态指示消息。
具体的,在本申请的实施例中,发送端处于全双工模式,因此,发送端可在发送数据包的同时,监听数据包传输的相同信道,或者不同信道上是否存在接收端返回的状态指示消息。
S106,发送端对状态指示消息进行解析,若状态指示消息中包含有冲突信息,则执行对应于数据包的重传操作。
具体的,在本申请的实施例中,发送端接收到接收端发送的状态指示消息后,对状态指示消息进行解析,在一个实施例中,如果状态指示消息是以NACK形式进行传输,则解析过程即为先根据目的地址信息和源地址信息确定该NACK消息是否是接收端发送给本发送端的。然后,再对NACK消息进行逐层解析,以获取NACK消息中包含的冲突信息,或者是冲突信息和重传参数信息。在另一个实施例中,如果状态指示消息是以TSI形式进行传输,则解析过程即为对目的地址信息和源地址信息进行验证后,直接获取冲突指示字段中的信息。
在本申请的实施例中,如果接收端对状态只是消息进行解析后,确定状态只是消息中包含有指示接收端存在对应于数据包的冲突事件的冲突信息,则执行对应于数据包的重传操作。
在一个实施例中,发送端对于数据包的重传操作可以为:停止发送数据包后,再次向接收端发送该数据包。在该种情况下,接收端可以为全双工模式,也可以为半双工模式。在本申请的实施例中,发送端的本地配置中配置有与其进行通信连接的所有接收端的工作模式,即,发送端可通过查询本地配置即可获取接收端是工作于全双工模式或半双工模式。本实施例中的具体细节可参照场景二中的具体描述。
在另一个实施例中,发送端对于数据包的重传操作可以为:继续发送数据包,并在数据包发送完毕后,再次向接收端发送该数据包。在该种情况下,接收端为全双工模式,即接收端可在接收数据包的同时,返回状态指示消息,并且继续接收数据包。本实施例中的具体细节可参照场景三中的具体描述。
此外,在本申请的实施例中,发送端将数据包重传后,重复步骤S101-S106,直至数据包传输成功,即,发送端接收到接收端返回的ACK消息。在一个实施例中,如果发送端重传次数大于阈值,则发送端丢弃该数据包,操作人员可根据实际需求设置阈值,此处不限定。
综上所述,本申请实施例中的实现数据传输的冲突检测方法,发送端通过向接收端发送包含冲突检测信息的数据包,使接收端依据冲突检测信息,确定存在对应于数据包的冲突事件后,能够立即向发送端发送包含有冲突信息的状态指示消息,从而使发送端能够及时获知接收端存在的冲突事件,并立即执行重传操作,进而缩短了等待时间,并提升了信道的利用率以及数据传输效率。
场景二
结合图1,如图4所示为本申请实施例中的实现数据传输的冲突检测方法的流程示意图,在图4中:
S201,发送端向接收端发送包含冲突检测信息的数据包。
S202,接收端接收发送端发送的数据包。
S203,接收端依据冲突检测信息,对数据包进行冲突检测。
S204,接收端向发送端发送状态指示消息,其中,状态指示消息中包含冲突检测的结果。
S205,发送端在发送数据包的同时,接收接收端发送的状态指示消息。
步骤S201-S205的具体细节可参照S101-S105,此处不赘述。
S206,发送端对状态指示消息进行解析,若状态指示消息中包含有冲突信息,则停止发送数据包。
具体的,在本申请的实施例中,发送端对状态指示消息进行解析,如果经解析后,确定状态指示消息中包含有冲突信息,则停止发送数据包。
具体解析过程可参照S106,此处不赘述。
S207,再次向接收端发送数据包。
具体的,在本申请的实施例中,发送端停止发送数据包后,再次向接收端发送数据包。
在一个实施例中,发送端可以在停止发送数据包后,直接进行重传操作,即,不经过退避时长,直接向接收端再次发送数据包,从而使发送端可以不用等待竞争,直接进行重传,以进一步提高数据包的传输效率。
在另一个实施例中,发送端可以在停止发送数据包后,经过退避时长,再向接收端发送数据包。其中,在一个实施例中,退避时长的确定方法可参照(IEEE)802.11中规定的退避机制,此处不赘述。在一个实施例中,发送端可以依据前一个数据包的传输信息,确定退避时长。其中,前一个数据包即为发送端前一次传输成功的数据包,传输信息包括但不限于发送端发送前一个数据包的重复次数,以及,前一个数据包的传输效率值。需要说明的是,发送端利用前一个数据包的传输信息计算退避时长的前提是:前一个数据包是利用本申请所涉及的冲突检测方法经过多次传输,并已经成功传输到接收端。具体的,发送端可通过下列公式计算竞争窗口(contention window,CW),其中,竞争窗口的大小即为本申请实施例中的退避时长,举例说明:若CW为3,则发送端发送数据包之前退避3次,所用时长即为退避时长。
CW1=(CW2+(1+A))*2-1
其中,CW1即为对应于当前待发送的数据包的竞争窗口值,CW2即为随机选择的竞争窗口值,对于随机选择竞争窗口的相关细节,可参照已有技术实施例,本申请对此不做限定。以及,公式中的A为计算系数,该计算系数=前一个数据包的重复发送次数*(前一个数据包的理想传输所用时长/前一个数据包实际传输所用时长)。其中,计算系数取整数,例如:向上取整,以及,前一个数据包的理想传输所用时长/前一个数据包实际传输所用时长所得值,即为本申请实施例中的前一个数据包的传输效率值。前一个数据包的理想传输所用时间可根据实际带宽大小、数据包大小等数值进行计算,具体计算方法可参照已有技术实施例,本申请不再赘述。在一个实施例中,该退避时长计算方法还可以用于S101、S201以及S301所述“向接收端发送包含冲突检测信息的数据包”的步骤之前,即,发送端经过退避时长后,向接收端发送数据包。
综上,本申请实施例中,发送端在获知接收端存在对应于数据包的冲突事件后,即刻停止数据包的传输,并进入重传流程,从而缩短了等待时间,以及,发送端利用前一个数据包的传输信息,计算退避时长,以增加退避时长,即,向数据包实施惩罚措施,使其经过退避时长后,再执行重传操作,从而解决设备间的公平性问题(公平性问题是指:未处于全双工模式的发送端由于仍采用已有技术中的冲突检测方法,即,在预定时间内未接收到ACK后,再执行重传操作,而本申请中的发送端可以及时感知到接收端的冲突,并进入重传,因此,使本申请中的发送端能够获得多次重传的机会,使利用已有技术中进行冲突检测的发送端始终处于等待状态,从而产生公平性问题)
场景三
结合图1,如图5所示为本申请实施例中的实现数据传输的冲突检测方法的流程示意图,在图5中:
S301,发送端向接收端发送包含冲突检测信息的数据包。
S302,接收端接收发送端发送的数据包。
S303,接收端依据冲突检测信息,对数据包进行冲突检测。
S304,接收端向发送端发送状态指示消息,其中,状态指示消息中包含冲突检测的结果。
S305,发送端在发送数据包的同时,接收接收端发送的状态指示消息。
S306,发送端对状态指示消息进行解析,若状态指示消息中包含有冲突信息,则继续向接收端发送数据包。
具体的,在本申请的实施例中,发送端对状态指示消息进行解析,如果经解析后,确定状态指示消息中包含有冲突信息,则发送端通过检测本地配置,确定接收端是否为全双工模式,若是,则发送端可继续向接收端发送数据包。接收端继续接收数据包,并对数据包进行缓存。
在一个实施例中,接收端在返回状态指示消息时,状态指示消息中也可以携带有指示发送端继续传输数据包的信息,以使发送端在接收到状态指示消息后,可依据指示,向接收端继续发送数据包。
具体解析过程可参照S106,此处不赘述。
S307,在数据包发送完成后,再次向接收端发送数据包。
发送端在数据包发送完成后,再次向接收端发送数据包的具体细节可参照S207,此处不赘述。
在本申请的实施例中,接收端接收到发送端重传的数据包后,如果未检测到对应于数据包的冲突事件,则接收端缓存重传后的数据包,并将S106中缓存的数据包与重传后的数据包一起进行解码,从而提升接收端对数据包的处理效率,进而提升整体的数据传输效率。将两个数据包一起进行解码的具体细节可参照已有技术实施例,本申请不再赘述。
需要说明的时,场景二中的“停止数据包传输,再执行重发操作”以及场景三中的“继续传输数据包,并在传输完成后,再执行重发操作”的选择,可在发送端的本地配置中进行配置。即,发送端在确定接收端存在对应于数据包的冲突事件后,可检索本地配置以确定选择“停止”或“不停止”发送数据包。其中,如果发送端配置为“不停止”发送数据包,则,发送端还需确定接收端为全双工模式后,再进行数据包的持续发送动作。
上述主要从各个网元之间交互的角度对本申请实施例提供的方案进行了介绍。可以理解的是,发送端和接收端为了实现上述功能,其包含了执行各个功能相应的硬件结构和/或软件模块。本领域技术人员应该很容易意识到,结合本文中所公开的实施例描述的各示例的单元及算法步骤,本申请实施例能够以硬件或硬件和计算机软件的结合形式来实现。某个功能究竟以硬件还是计算机软件驱动硬件的方式来执行,取决于技术方案的特定应用和设计约束条件。专业技术人员可以对每个特定的应用来使用不同方法来实现所描述的功能,但是这种实现不应认为超出本申请的范围。
本申请实施例可以根据上述方法示例对发送端和接收端进行功能模块的划分,例如,可以对应各个功能划分各个功能模块,也可以将两个或两个以上的功能集成在一个处理模块中。上述集成的模块既可以采用硬件的形式实现,也可以采用软件功能模块的形式实现。需要说明的是,本申请实施例中对模块的划分是示意性的,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式。
在采用对应各个功能划分各个功能模块的情况下,在采用对应各个功能划分各个功能模块的情况下,图6示出了上述实施例中所涉及的发送端200的一种可能的结构示意图,如图6所示,发送端200可以包括:发送模块21、接收模块22、处理模块23。其中,发送模块21可用于向接收端发送包含冲突检测信息的数据包,其中,冲突检测信息用于接收端对数据包进行冲突检测。例如该发送模块21可以用于支持发送端执行上述方法实施例中的S101、S201、S301。接收模块22可用于在发送数据包的同时,接收接收端发送的状态指示消息。例如该接收模块22可以用于支持发送端执行上述方法实施例中的S105、S205、S305。处理模块23可用于对状态指示消息进行解析,若状态指示消息中包含有冲突信息,则控制执行对应于数据包的重传操作。例如该处理模块23可以用于支持发送端执行上述方法实施例中的S106、S206、S207、S306、S307。
在另一个示例中,图7示出了本申请实施例的另一种发送端300的示意性框图。发送端可以包括:处理器31和收发器/收发管脚32,可选地,还包括存储器33。在本申请的实施例中,处理器31可以用于执行前述方法实施例中对状态指示消息进行解析,并在状态指示消息中包含冲突信息的情况下,控制执行对应于数据包的重传操作的步骤,例如:处理器31可以用于支持发送端执行上述方法实施例中的S106、S206、S207、S306、S307。
收发器/收发管脚32,可以用于接收前述方法实施例中的步骤S105、S205、S305中发送的信令或数据。还可以用于执行前述方法实施例中的步骤S101、S201、S301。
发送端300的各个组件通过总线34耦合在一起,其中总线系统34除包括数据总线之外,还包括电源总线、控制总线和状态信号总线。但是为了清楚说明起见,在图中将各种总线都标为总线系统34。
可选地,存储器33可以用于前述方法实施例中的存储指令。
应理解,根据本申请实施例的发送端300可对应于前述的实施例的各方法中的发送端,并且发送端300中的各个元件的上述和其它管理操作和/或功能分别为了实现前述各个方法的相应步骤,为了简洁,在此不再赘述。
如图8所示为上述实施例中所涉及的接收端400的一种可能的结构示意图,如图8所示,接收端400可以包括:接收模块41、处理模块42、发送模块43。其中,接收模块41可用于接收发送端发送的数据包,其中,数据包中包含冲突检测信息。例如该接收模块41可以用于支持接收端执行上述方法实施例中的S102、S202、S302。处理模块42可用于依据冲突检测信息,对数据包进行冲突检测。例如该处理模块42可以用于支持接收端执行上述方法实施例中的S103、S203、S303。发送模块43可用于向发送端发送状态指示消息,其中,状态指示消息中包含冲突检测的结果。例如该发送模块43可以用于支持发送端执行上述方法实施例中的S104、S204、S304。
在另一个示例中,图9示出了本申请实施例的另一种接收端500的示意性框图。接收端500可以包括:处理器51和收发器/收发管脚52,可选地,还包括存储器53。在本申请 的实施例中,处理器51可以用于执行前述方法实施例中依据所述冲突检测信息,对所述数据包进行冲突检测的步骤,例如:处理器51可以用于支持发送端执行上述方法实施例中的S103、S203、S303。
收发器/收发管脚52,可以用于接收前述方法实施例中的步骤S102、S202、S302中发送的信令或数据。还可以用于执行前述方法实施例中的步骤S104、S204、S304。
接收端500的各个组件通过总线54耦合在一起,其中总线系统54除包括数据总线之外,还包括电源总线、控制总线和状态信号总线。但是为了清楚说明起见,在图中将各种总线都标为总线系统54。
可选地,存储器53可以用于前述方法实施例中的存储指令。
应理解,根据本申请实施例的接收端500可对应于前述的实施例的各方法中的发送端,并且接收端500中的各个元件的上述和其它管理操作和/或功能分别为了实现前述各个方法的相应步骤,为了简洁,在此不再赘述。
其中,上述方法实施例涉及的各步骤的所有相关内容均可以援引到对应功能模块的功能描述,在此不再赘述。
基于相同的技术构思,本申请实施例还提供一种计算机可读存储介质,该计算机可读存储介质存储有计算机程序,该计算机程序包含至少一段代码,该至少一段代码可由发送端和/或接收端执行,以控制发送端和/或接收端用以实现上述方法实施例。
基于相同的技术构思,本申请实施例还提供一种计算机程序,当该计算机程序被发送端和/或接收端执行时,用以实现上述方法实施例。
所述程序可以全部或者部分存储在与处理器封装在一起的存储介质上,也可以部分或者全部存储在不与处理器封装在一起的存储器上。
基于相同的技术构思,本申请实施例还提供一种处理器,该处理器用以实现上述方法实施例。上述处理器可以为芯片。
结合本申请实施例公开内容所描述的方法或者算法的步骤可以硬件的方式来实现,也可以是由处理器执行软件指令的方式来实现。软件指令可以由相应的软件模块组成,软件模块可以被存放于随机存取存储器(Random Access Memory,RAM)、闪存、只读存储器(Read Only Memory,ROM)、可擦除可编程只读存储器(Erasable Programmable ROM,EPROM)、电可擦可编程只读存储器(Electrically EPROM,EEPROM)、寄存器、硬盘、移动硬盘、只读光盘(CD-ROM)或者本领域熟知的任何其它形式的存储介质中。一种示例性的存储介质耦合至处理器,从而使处理器能够从该存储介质读取信息,且可向该存储介质写入信息。当然,存储介质也可以是处理器的组成部分。处理器和存储介质可以位于ASIC中。另外,该ASIC可以位于网络设备中。当然,处理器和存储介质也可以作为分立组件存在于网络设备中。
本领域技术人员应该可以意识到,在上述一个或多个示例中,本申请实施例所描述的功能可以用硬件、软件、固件或它们的任意组合来实现。当使用软件实现时,可以将这些功能存储在计算机可读介质中或者作为计算机可读介质上的一个或多个指令或代码进行传输。计算机可读介质包括计算机存储介质和通信介质,其中通信介质包括便于从一个地方向另一个地方传送计算机程序的任何介质。存储介质可以是通用或专用计算机能够存取的任何可用介质。
上面结合附图对本申请的实施例进行了描述,但是本申请并不局限于上述的具体实施方式,上述的具体实施方式仅仅是示意性的,而不是限制性的,本领域的普通技术人员在本申请的启示下,在不脱离本申请宗旨和权利要求所保护的范围情况下,还可做出很多形式,均属于本申请的保护之内。

Claims (16)

  1. 一种实现数据传输的冲突检测方法,其特征在于,所述方法包括:
    向接收端发送包含冲突检测信息的数据包,其中,所述冲突检测信息用于所述接收端对所述数据包进行冲突检测;
    在发送所述数据包的同时,接收所述接收端发送的状态指示消息;
    对所述状态指示消息进行解析,若所述状态指示消息中包含有冲突信息,则执行对应于所述数据包的重传操作。
  2. 一种实现数据传输的冲突检测方法,其特征在于,所述方法包括:
    接收发送端发送的数据包,其中,所述数据包中包含冲突检测信息;
    依据所述冲突检测信息,对所述数据包进行冲突检测;
    向所述发送端发送状态指示消息,其中,所述状态指示消息中包含所述冲突检测的结果。
  3. 根据权利要求1或2所述的方法,其特征在于,所述冲突检测信息位于所述数据包的物理前导中。
  4. 根据权利要求1或2所述的方法,其特征在于,所述冲突检测信息包括身份检测信息和参数检测信息;
    所述身份检测信息用于使所述接收端依据所述身份检测信息检测所述数据包是否发送给所述接收端;
    所述参数检测信息用于使所述接收端确定所述身份检测的结果为成功的情况下,依据所述参数检测信息对所述数据包进行冲突检测。
  5. 根据权利要求1或2所述的方法,其特征在于,所述状态指示消息包含至少一个重传参数信息,所述至少一个重传参数信息用于指示所述发送端依据所述至少一个重传参数信息,执行所述重传操作。
  6. 根据权利要求1所述的方法,其特征在于,所述执行对应于所述数据包的重传操作的步骤,具体包括:
    停止发送所述数据包;
    再次向所述接收端发送所述数据包。
  7. 根据权利要求1所述的方法,其特征在于,所述执行对应于所述数据包的重传操作的步骤,具体包括:
    继续向所述接收端发送所述数据包;
    在所述数据包发送完成后,再次向所述接收端发送所述数据包。
  8. 根据权利要求6或7所述的方法,其特征在于,所述发送端再次向所述接收端发送所述数据包的步骤,具体包括:
    基于前数据包的传输信息,确定所述数据包的退避时长,其中,所述前数据包为距所述数据包最近一次所述发送端成功发送给所述接收端的数据包,以及,所述传输信息包括所述发送端向所述接收端重复发送所述前数据包的次数以及所述前数据包的传输效率值;
    经过所述退避时长后,向所述接收端发送所述数据包。
  9. 一种实现数据传输的冲突检测装置,其特征在于,所述装置包括:
    发送模块,用于向接收端发送包含冲突检测信息的数据包,其中,所述冲突检测信息用于所述接收端对所述数据包进行冲突检测;
    接收模块,用于在发送所述数据包的同时,接收所述接收端发送的状态指示消息;
    处理模块,用于对所述状态指示消息进行解析,若所述状态指示消息中包含有冲突信息,则控制执行对应于所述数据包的重传操作。
  10. 一种实现数据传输的冲突检测装置,其特征在于,所述装置包括:
    接收模块,用于接收发送端发送的数据包,其中,所述数据包中包含冲突检测信息;
    处理模块,用于依据所述冲突检测信息,对所述数据包进行冲突检测;
    发送模块,用于向所述发送端发送状态指示消息,其中,所述状态指示消息中包含所述冲突检测的结果。
  11. 根据权利要求9或10所述的装置,其特征在于,所述冲突检测信息位于所述数据包的物理前导中。
  12. 根据权利要求9或10所述的装置,其特征在于,所述冲突检测信息包括身份检测信息和参数检测信息;
    所述身份检测信息用于使所述接收端依据所述身份检测信息检测所述数据包是否发送给所述接收端;
    所述参数检测信息用于使所述接收端确定所述身份检测的结果为成功的情况下,依据所述参数检测信息对所述数据包进行冲突检测。
  13. 根据权利要求9或10所述的装置,其特征在于,所述状态指示消息包含至少一个重传参数信息,所述至少一个重传参数信息用于指示所述发送端依据所述至少一个重传参数信息,执行所述重传操作。
  14. 根据权利要求9所述的装置,其特征在于,所述处理模块具体用于控制:
    停止发送所述数据包;
    再次向所述接收端发送所述数据包。
  15. 根据权利要求9所述的装置,其特征在于,所述处理模块具体用于控制:
    继续向所述接收端发送所述数据包;
    在所述数据包发送完成后,再次向所述接收端发送所述数据包。
  16. 根据权利要求14或15所述的装置,其特征在于,所述处理模块具体用于:
    基于前数据包的传输信息,确定所述数据包的退避时长,其中,所述前数据包为距所述数据包最近一次所述发送端成功发送给所述接收端的数据包,以及,所述传输信息包括所述发送端向所述接收端重复发送所述前数据包的次数以及所述前数据包的传输效率值;
    经过所述退避时长后,向所述接收端发送所述数据包。
PCT/CN2019/081311 2018-08-24 2019-04-03 实现数据传输的冲突检测方法及装置 WO2020037990A1 (zh)

Priority Applications (3)

Application Number Priority Date Filing Date Title
EP19852367.2A EP3829091A4 (en) 2018-08-24 2019-04-03 CONFLICT DETECTION METHOD AND DEVICE FOR CARRYING OUT DATA TRANSMISSION
US17/181,536 US11589389B2 (en) 2018-08-24 2021-02-22 Method and apparatus for implementing collision detection in data transmission
US18/164,278 US12028901B2 (en) 2018-08-24 2023-02-03 Method and apparatus for implementing collision detection in data transmission

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201810975646.XA CN110859010B (zh) 2018-08-24 2018-08-24 实现数据传输的冲突检测方法及装置
CN201810975646.X 2018-08-24

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US17/181,536 Continuation US11589389B2 (en) 2018-08-24 2021-02-22 Method and apparatus for implementing collision detection in data transmission

Publications (1)

Publication Number Publication Date
WO2020037990A1 true WO2020037990A1 (zh) 2020-02-27

Family

ID=69592256

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2019/081311 WO2020037990A1 (zh) 2018-08-24 2019-04-03 实现数据传输的冲突检测方法及装置

Country Status (4)

Country Link
US (1) US11589389B2 (zh)
EP (1) EP3829091A4 (zh)
CN (2) CN118215150A (zh)
WO (1) WO2020037990A1 (zh)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112601283A (zh) * 2020-11-03 2021-04-02 浙江华云信息科技有限公司 一种应用于电力物联网的数据传输方法及系统

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10892858B2 (en) * 2018-09-28 2021-01-12 At&T Intellectual Property I, L.P. Chain broadcasting in vehicle-to-everything (V2X) communications
US10972958B1 (en) 2020-03-05 2021-04-06 At&T Intellectual Property I, L.P. Location-based route management for vehicle-to-everything relay communications
CN112180837A (zh) * 2020-08-31 2021-01-05 深圳市优必选科技股份有限公司 一种设备冲突检测方法、装置及机器人
CN113520393B (zh) * 2021-06-08 2022-01-21 深圳市镜象科技有限公司 冲突事件的检测方法、装置、可穿戴设备及存储介质

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103220081A (zh) * 2012-01-21 2013-07-24 华为技术有限公司 冲突检测方法、网络侧设备及用户设备
CN103516472A (zh) * 2012-06-27 2014-01-15 华为技术有限公司 一种上行数据传输方法及通信设备、移动台
WO2015009499A1 (en) * 2013-07-17 2015-01-22 Board Of Trustees Of Michigan State University Dynamic channel bonding in multicarrier wireless networks
CN106658609A (zh) * 2015-11-03 2017-05-10 电信科学技术研究院 一种数据传输资源预约方法及装置
CN107567106A (zh) * 2016-07-01 2018-01-09 中兴通讯股份有限公司 一种碰撞避免的传输方法、装置及站点

Family Cites Families (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6606341B1 (en) * 1999-03-22 2003-08-12 Golden Bridge Technology, Inc. Common packet channel with firm handoff
US6920121B2 (en) * 2003-03-17 2005-07-19 Qprs Limited Quality packet radio service for a general packet radio system
US8779899B2 (en) * 2008-03-12 2014-07-15 Electronics And Telecommuncations Research Institute RFID interrogator retransmitting command depending on collision situation and control method thereof
KR101815946B1 (ko) * 2011-09-26 2018-01-18 삼성전자주식회사 동작 주파수 대역과 다른 주파수 대역에서의 충돌을 검출하는 통신 장치 및 그 통신 방법
GB2496627A (en) * 2011-11-16 2013-05-22 Renesas Mobile Corp Identifying Selected Core Network in a wireless communication system
KR101272292B1 (ko) * 2012-07-10 2013-06-07 한국과학기술원 패킷 충돌 감시 방법
US9084141B2 (en) * 2013-03-14 2015-07-14 Qualcomm Incorporated Systems and methods for grouping nodes to reduce collisions
US8837515B1 (en) * 2013-06-06 2014-09-16 Futurewei Technologies, Inc. System and method for collision resolution
US20150263877A1 (en) * 2014-03-11 2015-09-17 Electronics And Telecommunications Research Institute Method and apparatus for transmitting and receiving preamble
CN108886769B (zh) * 2016-04-08 2021-05-18 华为技术有限公司 一种通信资源协调方法及装置
CN109792772A (zh) * 2016-08-09 2019-05-21 瑞典爱立信有限公司 传输活动的双向全双工知晓检测

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103220081A (zh) * 2012-01-21 2013-07-24 华为技术有限公司 冲突检测方法、网络侧设备及用户设备
CN103516472A (zh) * 2012-06-27 2014-01-15 华为技术有限公司 一种上行数据传输方法及通信设备、移动台
WO2015009499A1 (en) * 2013-07-17 2015-01-22 Board Of Trustees Of Michigan State University Dynamic channel bonding in multicarrier wireless networks
CN106658609A (zh) * 2015-11-03 2017-05-10 电信科学技术研究院 一种数据传输资源预约方法及装置
CN107567106A (zh) * 2016-07-01 2018-01-09 中兴通讯股份有限公司 一种碰撞避免的传输方法、装置及站点

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112601283A (zh) * 2020-11-03 2021-04-02 浙江华云信息科技有限公司 一种应用于电力物联网的数据传输方法及系统
CN112601283B (zh) * 2020-11-03 2023-11-17 浙江华云信息科技有限公司 一种应用于电力物联网的数据传输方法及系统

Also Published As

Publication number Publication date
CN118215150A (zh) 2024-06-18
US20230262775A1 (en) 2023-08-17
EP3829091A1 (en) 2021-06-02
CN110859010A (zh) 2020-03-03
CN110859010B (zh) 2024-04-16
US20210176786A1 (en) 2021-06-10
EP3829091A4 (en) 2021-06-02
US11589389B2 (en) 2023-02-21

Similar Documents

Publication Publication Date Title
US11658843B2 (en) System and method for full-duplex media access control using request-to-send signaling
US11064526B2 (en) Wireless communication apparatus and method
WO2020037990A1 (zh) 实现数据传输的冲突检测方法及装置
US8274992B2 (en) Communication method for wireless lans
US10231218B2 (en) Method for transmitting a response request frame and a response frame in a multi-user based wireless communication system
JP4561630B2 (ja) 通信方法及び通信装置、並びにコンピュータプログラム
US9295074B2 (en) Acknowledgement, error recovery and backoff operation of uplink multi-user multiple-input-multiple-output communication in wireless networks
US7697491B2 (en) Retransmission control of burst transmission by wireless communication apparatus
JP4799396B2 (ja) 無線通信装置
EP3288331A1 (en) Method and apparatus for transmitting control frame to hidden node in wireless lan
KR20170137763A (ko) 무선 네트워크들에서 충돌들을 감소시키기 위한 시스템 및 방법
US10306602B2 (en) Data transmission method and apparatus
EP4123968A1 (en) Delay performance evaluation method and apparatus, and storage medium
Garcia-Luna-Aceves CTMA: A More Efficient Channel Access Method for Networks with Hidden Terminals
US12028901B2 (en) Method and apparatus for implementing collision detection in data transmission
US20230096640A1 (en) Time delay performance evaluation method and apparatus, and storage medium
US20230231664A1 (en) Communication devices and methods

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 19852367

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

ENP Entry into the national phase

Ref document number: 2019852367

Country of ref document: EP

Effective date: 20210224