CN114466411B - Wireless private networking communication method based on beacon classification - Google Patents
Wireless private networking communication method based on beacon classification Download PDFInfo
- Publication number
- CN114466411B CN114466411B CN202210097577.3A CN202210097577A CN114466411B CN 114466411 B CN114466411 B CN 114466411B CN 202210097577 A CN202210097577 A CN 202210097577A CN 114466411 B CN114466411 B CN 114466411B
- Authority
- CN
- China
- Prior art keywords
- data
- beacon
- node
- nid
- master node
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000004891 communication Methods 0.000 title claims abstract description 42
- 238000000034 method Methods 0.000 title claims abstract description 39
- 230000006855 networking Effects 0.000 title claims abstract description 18
- 230000003993 interaction Effects 0.000 claims abstract description 34
- 230000005540 biological transmission Effects 0.000 claims description 15
- 230000030279 gene silencing Effects 0.000 claims description 7
- 230000007246 mechanism Effects 0.000 claims description 6
- 230000008569 process Effects 0.000 claims description 6
- 239000000523 sample Substances 0.000 claims description 4
- 238000005538 encapsulation Methods 0.000 claims description 2
- 230000004069 differentiation Effects 0.000 claims 1
- 238000012545 processing Methods 0.000 abstract description 5
- 230000002452 interceptive effect Effects 0.000 abstract description 4
- 230000000737 periodic effect Effects 0.000 abstract description 3
- 238000005516 engineering process Methods 0.000 description 6
- 239000007789 gas Substances 0.000 description 6
- 238000007796 conventional method Methods 0.000 description 4
- 238000010586 diagram Methods 0.000 description 4
- 238000010295 mobile communication Methods 0.000 description 3
- 230000009471 action Effects 0.000 description 2
- 238000004364 calculation method Methods 0.000 description 2
- QVFWZNCVPCJQOP-UHFFFAOYSA-N chloralodol Chemical compound CC(O)(C)CC(C)OC(O)C(Cl)(Cl)Cl QVFWZNCVPCJQOP-UHFFFAOYSA-N 0.000 description 2
- 230000006872 improvement Effects 0.000 description 2
- VNWKTOKETHGBQD-UHFFFAOYSA-N methane Chemical compound C VNWKTOKETHGBQD-UHFFFAOYSA-N 0.000 description 2
- 238000012360 testing method Methods 0.000 description 2
- UGFAIRIUMAVXCW-UHFFFAOYSA-N Carbon monoxide Chemical compound [O+]#[C-] UGFAIRIUMAVXCW-UHFFFAOYSA-N 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 229910002091 carbon monoxide Inorganic materials 0.000 description 1
- 230000000052 comparative effect Effects 0.000 description 1
- 238000010276 construction Methods 0.000 description 1
- 230000000875 corresponding effect Effects 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 238000001514 detection method Methods 0.000 description 1
- 230000000977 initiatory effect Effects 0.000 description 1
- 238000012423 maintenance Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 239000003345 natural gas Substances 0.000 description 1
- 239000000779 smoke Substances 0.000 description 1
- 239000000126 substance Substances 0.000 description 1
- 230000001960 triggered effect Effects 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W28/00—Network traffic management; Network resource management
- H04W28/02—Traffic management, e.g. flow control or congestion control
- H04W28/10—Flow control between communication endpoints
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L47/00—Traffic control in data switching networks
- H04L47/10—Flow control; Congestion control
- H04L47/24—Traffic characterised by specific attributes, e.g. priority or QoS
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L47/00—Traffic control in data switching networks
- H04L47/10—Flow control; Congestion control
- H04L47/24—Traffic characterised by specific attributes, e.g. priority or QoS
- H04L47/2441—Traffic characterised by specific attributes, e.g. priority or QoS relying on flow classification, e.g. using integrated services [IntServ]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L47/00—Traffic control in data switching networks
- H04L47/70—Admission control; Resource allocation
- H04L47/80—Actions related to the user profile or the type of traffic
- H04L47/805—QOS or priority aware
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W84/00—Network topologies
- H04W84/18—Self-organising networks, e.g. ad-hoc networks or sensor networks
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D30/00—Reducing energy consumption in communication networks
- Y02D30/70—Reducing energy consumption in communication networks in wireless communication networks
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The invention provides a wireless private networking communication method based on beacon classification, which is used for solving the problems of low success rate and long uploading time of uploading important information of multiple nodes. The invention takes the wireless communication gateway as a master node and takes the detector terminal as a slave node; the interactive data between the master node and the slave node are divided into important and urgent data and important non-urgent data, the important and urgent data are called A-class data, the important non-urgent data are called B-class data, and the A-class data are preferentially sent. According to the method for synchronizing the beacon classification and the interaction information classification, the important information of the terminal is reliably interacted within the specified time, the information interaction efficiency is improved, and the integrity and timeliness of data interaction are ensured; the uploading time of the data packet with the periodic uploading in the B-class data is subjected to full-network discrete processing, so that the situation that an air bus is occupied and node collision occurs is greatly reduced; the ad hoc network method has high flexibility.
Description
Technical Field
The invention relates to the technical field of wireless ad hoc network communication, in particular to a wireless private networking communication method based on beacon classification.
Background
With the continuous improvement of the living standard of people, the quality requirements of people on wireless communication are increasingly improved, and the wireless communication technology is promoted to be rapidly developed. In areas where the network is difficult to cover and areas where the infrastructure is relatively simple, the wireless communication signal quality is intersected, the communication speed is extremely low, and the requirements of daily life of people cannot be met. In order to meet the high demands of people on mobile communication and improve the living demands of people, wireless communication technology is rapidly developed, and at present, mobile communication networks, bluetooth, wiFi and the like become indispensable wireless communication technologies in daily life. However, most of the current mobile communications require a wired infrastructure such as a base station to be supported, and wireless ad hoc network technology is necessary to enable wireless communications in places where the base station is not covered.
The wireless ad hoc network is a technology which is widely applied in wireless communication at present, particularly in the fields of intelligent home, smart cities and the like, and is independent of wired infrastructure, and equipment autonomous management and information autonomous maintenance in a networking area are realized through data transmission between a gateway and a node.
The wireless ad hoc network can be used for better connecting the terminal nodes, for example, in the field of gas detection, when detected gas leaks, the wireless ad hoc network can be used for linking each unit mechanism to process, such as a gas company, a user family, a chemical enterprise and the like. Therefore, the wireless ad hoc network method is particularly important, meanwhile, the traditional wireless ad hoc network method is generally frequency division transmission or time slice transmission, and when the number of devices is large, important information cannot be transmitted to the gateway in time, so that the important information may be lost. Based on the above scenes, the invention provides a wireless private ad hoc network method based on beacon classification, which can ensure timely transmission of information.
Disclosure of Invention
Aiming at the technical problem that important information cannot be transmitted to a gateway in time and can be lost in the prior communication method, the invention provides a wireless private networking communication method based on beacon classification, which is used for solving the problems of low success rate and long uploading time of uploading important information of multiple nodes.
In order to achieve the above purpose, the technical scheme of the invention is realized as follows: a wireless private networking communication method based on beacon classification takes a wireless communication gateway as a master node and a detector terminal as a slave node; the method comprises the steps of dividing interaction data between a master node and a slave node into important and urgent type data and important non-urgent type data, wherein the important and urgent type data is called as type A data, and the important non-urgent type data is called as type B data; preferentially transmitting class a data or transmitting data by adopting a contention mechanism.
The number of the detector terminals is multiple, and the detector terminals are connected with the wireless communication gateway through the wireless private networking.
The A-type data comprise alarm, warning and silencing data, and the B-type data comprise heartbeat and self-checking data.
The data interaction of the master node and the slave nodes is distinguished through grid numbers, the grid numbers are allocated to the master node when the slave nodes enter the network for pairing, the slave nodes do power-down storage after acquiring the grid numbers, and the pairing flow is not changed until the slave nodes are restarted.
The master node actively initiates and the slave node passively replies to perform wireless data receiving and transmitting interaction, and the whole receiving and transmitting time sequence of the master node and the slave node comprises 3A periods and 1B period, wherein the A period is used for sending and receiving A-type data, and the B period is used for sending and receiving B-type data. I.e. data interaction is done using AAAB.
The A period comprises an A command, an A beacon, A data and A data ACK, and the A data receiving and transmitting steps are as follows:
when the period A starts, the master node judges whether an A command is issued according to the current task requirement, if so, the content of the A command is assembled according to the format of a private protocol, then the A command is broadcast through wireless hardware, and if not, the master node omits the step; after the command A is sent, the main node sends a beacon A, the beacon A content is assembled according to the format of a private protocol, and then the beacon A is broadcast out through wireless hardware; after the sending of the A beacon is finished, the master node sets the wireless hardware as a receiving mode, all the slave nodes start counting after receiving the broadcast of the A beacon, and reply to the A data of the master node after timing the time of NID by Ta according to the grid number NID when the master node accesses the network; the master node combines the time slices Ta of the data replied by the single slave node according to the number N of the slave nodes in the current equipment library, and closes the receiving window after waiting for N times Ta; then the master node analyzes all the received A-type data to obtain an NID list of the A-type data, and broadcasts the grid number NID of the received data to all the slave nodes according to the protocol encapsulation data, namely, sends the A-type data ACK; after receiving the broadcast of the A data ACK, the slave node analyzes an NID list, and if the NID list has own grid number NID, the transmission is successful; if the network number NID of the slave node does not exist in the NID list, the slave node retransmits the own data in the next A period.
The B period consists of a B command, a B beacon, B data and B data ACK, and the B data receiving and transmitting method comprises the following steps:
When the B period starts, the master node judges whether a B command is issued according to the current task requirement, if so, the content is assembled according to the format of the private protocol, then the B command is broadcasted through wireless hardware, and if not, the master node omits the step; after the B command is sent, the main node starts to send a B beacon, and after the B beacon is sent, the main node sets the wireless hardware into a receiving mode; after receiving the broadcast of the B beacon, all slave nodes acquire an air bus according to a bus safety competition mechanism according to own business logic if B data is to be replied, and continuously broadcast own data for 3 times to a master node when the air bus is acquired; the main node closes the receiving window after waiting for the time of opening the receiving window of the B beacon according to the protocol rule; the master node analyzes all the received data to obtain a NID list of the B data, encapsulates the data according to a protocol, and sends the B data ACK to broadcast the grid number NID of the received data to all the slave nodes; after receiving the broadcast of the B data ACK from the node, analyzing an NID list, and if the NID list has own grid number NID, then retransmission is not needed; if the NID list has no NID with the grid number, the slave node retransmits the own data in the next B period.
The bus safety competition mechanism is to detect whether the air bus is occupied or not by the slave node before sending the B data, if so, randomly delaying M milliseconds to detect again until the time exceeds the open receiving window time of the B beacon, and if the air bus is occupied in the open receiving window time of the B beacon, continuing to wait for the next B period to interact.
The slave node obtains the current time from the B beacon and checks the real-time clock of the slave node, and the reporting time is averagely scattered into one period of the B data according to the grid number NID, wherein the reporting time is equal to the total number of NID/terminal equipment.
Compared with the prior art, the invention has the beneficial effects that:
1. According to the invention, the interactive information is correspondingly classified by the beacon classification method, so that the integrity and timeliness of data interaction are ensured, and compared with the traditional method, the timeliness is improved by more than 70%.
2. The invention carries out full-network discrete processing on the longer periodical uploading B-type data, such as heartbeat and the like, and can greatly reduce the situation that an air bus is occupied and node collision occurs.
3. The beacon-based ad hoc network method has high flexibility, and can be suitable for private networking communication such as LORA, GFSK, FSK, ASK in any SUB-1G field through simple configuration.
Drawings
In order to more clearly illustrate the embodiments of the invention or the technical solutions in the prior art, the drawings that are required in the embodiments or the description of the prior art will be briefly described, it being obvious that the drawings in the following description are only some embodiments of the invention, and that other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
Fig. 1 is a schematic structural diagram of an information interaction system according to the present invention.
Fig. 2 is a flow chart of a transceiving sequence according to embodiment 1 of the present invention.
FIG. 3 is a schematic diagram of the data interaction of the period A of FIG. 2 according to the present invention.
FIG. 4 is a schematic diagram of the data interaction of the B cycle of FIG. 2 according to the present invention.
Fig. 5 is a timing chart of the whole cycle of embodiment 1 of the present invention.
Fig. 6 is a comparative diagram of node data interaction, wherein (a) is a conventional method and (b) is example 1.
Fig. 7 is a flow chart of the air bus contention procedure of the B cycle of the present invention.
Detailed Description
The following description of the embodiments of the present invention will be made clearly and completely with reference to the accompanying drawings, in which it is apparent that the embodiments described are only some embodiments of the present invention, but not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without any inventive effort, are intended to be within the scope of the invention.
A wireless private networking communication method based on beacon classification comprises the following steps: taking the wireless communication gateway as a master node and the detector terminal as a slave node; the interaction data between the master node and the slave node is divided into important and urgent class data and important non-urgent class data, wherein the important and urgent class data is called class A data, and the non-urgent class data is called class B data; and the interaction of wireless data receiving and transmitting is carried out through active initiation of the master node and passive reply of the slave node, and the master node preferentially transmits the class A data.
As shown in fig. 1, the wireless ad hoc network interaction system based on beacon classification used in the present invention includes a plurality of probe terminals 1 and an integrated wireless communication gateway 2. The detector terminal senses whether the surrounding gas environment (smoke concentration, natural gas concentration and carbon monoxide concentration) is safe or not, and if not, sends an alarm message to the wireless communication gateway through a wireless private protocol. The wireless communication gateway collects wireless data of the detector terminal, and performs corresponding actions such as dialing an alarm call, sending an alarm short message, and an action-related relay through edge calculation logic processing.
The plurality of detector terminals 1 upload information to a wireless communication gateway through a wireless private networking technology, the wireless communication gateway firstly transmits the information to the linkage terminal, then transmits the information to a cloud platform through 4G communication, and the cloud platform stores and processes the information and then transmits the information to a user application end.
The invention mainly refers to the information interaction between a plurality of probe terminals 1 and a wireless communication gateway 3. In the general intelligent fire and security fields, the information exchanged between a master node and a slave node basically contains alarms, warnings, heartbeats, silences, self-tests and other private control actions. According to application scenes, interactive data are divided into important and urgent and important non-urgent categories, wherein the important and urgent categories are called A categories for short and B categories for short. Then, according to the classification, the class a data includes alarm, warning, silencing, and the class B data includes heartbeat, self-test, and the like. The type A data is sent randomly, such as alarm information in the type A data, when the node detects that the surrounding gas environment changes, the gas changes are random; the warning in the class A data is sent from the node itself after the fault, and the self fault comprises the dismantling of the shell, low electric quantity and the like, and is random; the silencing command in the class A data is a command actively sent by the master node, but only when the alarm information comes, the silencing command is random because the alarm information is random. The heartbeat in the B-class data is periodic, and one heartbeat is sent in 24 hours; the self-checking in the type B data is random, when the self-checking button of the slave node is triggered by external personnel, the slave node sends self-checking information, and the self-checking information is random because the external personnel trigger is random at random.
In the construction of the wireless ad hoc network between the master node and the slave node, the data interaction between the master node and the slave node is distinguished by a network number, which is abbreviated as NID in the invention. The NID is allocated to the master node when the slave node performs network pairing, and the slave node performs power-down storage after acquiring the NID until the pairing process is restarted, so that the network number NID can not be changed.
In the whole wireless receiving and transmitting interaction process, the method is carried out in a mode that a master node actively initiates and a slave node passively replies. In order to ensure that the A-type data can be responded quickly and reliably, the whole receiving and transmitting time sequence consists of 3A periods and 1B period. Specific implementation of the a-cycle and the B-cycle as shown in fig. 2, 3 a-cycles are consecutively performed every time the execution is performed, and then 1B-cycle is performed. A full cycle interaction sequence is shown in fig. 5.
As shown in fig. 2, the time between each a period is TA, the value of TA is related to the number M of instruction bytes of the interaction information, the communication rate P and the number N of slave nodes, "the transmission time ta=mx 8*1/P can be calculated according to the number of bytes of the interaction information and the communication rate, so the required interval time TA is equal to or greater than N x TA; for example, when the number of transmission instruction bytes is m=10 bytes, the rate is p=10 Kbps, and the number of slave nodes is n=100, the transmission time Ta is m× 8*1/p=10×8/10000=8 ms, and the interval time Ta is equal to or greater than n×ta=800 ms. The B period time is 1 second to ensure that 3 slave node interactions can be satisfied, considering that the previous two nodes resend their B data. For example, the rate is 10Kbps calculated by using 100 bytes of B data, the single transmission time is tb=100×8/10000=0.08 s, the continuous three transmissions are tb=3×tb=0.24 s, and the number of nodes nb=1/tb=4.17 >3 which can be satisfied in 1s, thereby satisfying the design requirement.
As shown in fig. 3, the period a is composed of a command a, a beacon a, a data a and a data ACK, and the specific transceiving steps are as follows:
And when the period A starts, the master node judges whether an A command is issued according to the current task requirement. The A command is a remote silencing command and the like, if the A command is a remote silencing command and the like, the A command content is assembled according to a format of a private protocol, data is filled according to a protocol rule, then the A command is broadcast out through wireless hardware, and the wireless hardware is a radio frequency module and comprises the FSK module, the ASK module, the LoRA module and the like. After the command A is sent, the beacon A starts to be sent. The a-beacon content is assembled in a proprietary protocol format and then broadcast out over the wireless hardware. After the beacon is sent, the master node sets the wireless hardware into a receiving mode to receive the data replied by the slave node. All the slave nodes start counting after receiving the broadcast of the A beacon, when the slave nodes judge that data to be transmitted exist and the data are the A type data, according to the grid number NID when the slave nodes access the network, the time of NID is counted, namely, the time axis is waited until the time slice of the slave nodes starts to reply the A type data. And the master node takes out the data of the slave node after receiving the data of the slave node, sends the data of the slave node into a receiving queue, combines the time slices Ta of the data replied by the single slave node according to the number N in the current equipment library, and judges whether a time axis reaches the time slices of the N.Ta after waiting for N.Ta times, and closes a receiving window. And then analyzing all the received data, taking out the grid number NID of the received slave node, obtaining an NID list of the A data, encapsulating the data according to a protocol, broadcasting the grid number NID of the received data to all the slave nodes according to a data flow with a certain rule, namely, transmitting the A data ACK. After receiving the broadcast of the A data ACK, the slave node analyzes the NID list, and if the self NID exists in the NID list, the slave node indicates that the data is successfully transmitted without retransmission. If there is no own NID in the NID list, it is considered to retransmit own data in the next a period.
The master node judges whether the A period is transmitted for 3 times, if yes, the master node enters the B period, otherwise, the master node returns to the A period to continue transmitting the A period.
As shown in fig. 4, the B period is composed of a B command, a B beacon, B data, and B data ACK. And when the B period starts, the master node judges whether a B command is issued according to the current task requirement. If so, the content (a string of data streams) is assembled according to the proprietary protocol format, and then the master node broadcasts the B command out through the wireless hardware. And after the B command is sent, starting to send the B beacon. After the B beacon is sent, the master node sets the wireless hardware into a receiving mode to receive the data replied by the slave node. After receiving the broadcast of the B beacon, all slave nodes judge whether data are transmitted or not according to own business logic, the data belong to B type data, and if the B data are replied, the air bus is required to be acquired according to the air bus safety competition. When the air bus is obtained, the B-class data of the user is continuously sent to the main node for 3 times. And the master node receives the B-class data replied by the slave node, takes out the slave node data and sends the slave node data into a receiving queue, and closes the receiving window after waiting for 1s according to the protocol. Then analyzing all the received data, taking out the grid number NID of the received slave node, obtaining a NID list of the B data, encapsulating the data according to the protocol, broadcasting the NID of the received data to all the slave nodes, and sending the B data ACK. After receiving the broadcast of the B data ACK, the slave node analyzes the NID list, if there is an own NID in the NID list, retransmission is not needed, and if there is no own NID in the list, retransmission of own data in the next B period is considered.
The bus safety competition is to detect whether the bus is occupied before sending the B data, if so, randomly delaying M milliseconds to detect whether the air bus is idle again until the time is out by 1s, namely the time of opening the receiving window of the B beacon, if the bus is occupied in 1s, continuing to wait for the next B period to carry out interaction.
To solve the B data congestion, discrete processing is performed on the B periodic data, such as heartbeat data. Assuming that the period of the heartbeat of the wireless device is typically 24 hours, the slave node is able to acquire the current time from the B-beacon and then calibrate its own real time clock RTC while dispersing its own reporting time to within 24H of the heartbeat on average according to the grid number NID. The calculation method is reporting time=nid/total number of terminal devices. For example, the number of slave nodes with nid=6 and terminal devices is 24, and the heartbeat reporting time is 6 points, 0 minutes and 0 seconds, so that after the slave nodes are scattered, at most one device is interacted in the B period at the same time, and the situation that an air bus is occupied is reduced as much as possible. The terminal device refers to a slave node.
Compared with the conventional master-slave node one-time and one-time data interaction method, the method ensures timeliness of class A data interaction. For example, in a normal interactive data packet, the data state and data information should be included. According to the communication rate of 10Kbps, from 200 nodes, the number of conventional transmission bytes is 40 bytes, then a single interaction of a node is completed to be 2×40×8/10000=64 ms, including uninterrupted 3 retransmissions, then the time is 64×3=192 ms, and 192×200=38.4 s are needed for completing the interaction of 200 detector terminals; according to the method of the invention, the beacon classification is carried out, the class A data and the state data are classified, the number of alarm bytes is 20 bytes, the single transmission of one node is 20 x 8/10000=16 ms, the transmission of 200 terminal devices is 3.2s, and according to the condition that all terminal nodes successfully receive the beacon in an interval time TA, the reply bytes of the wireless communication gateway are 200 bytes, the time is 200 x 8/10000=160 ms, and 3 times of A period continuous transmission is set by the invention, so that 3 times of retransmission of the class A data can be ensured, and the total time is (3200+160) x 3=10.08 s. Compared with the conventional method, under the condition of 3 times of retransmission of the same alarm data, the interaction time of the method is advanced by 70%, and the timeliness of the alarm data is ensured. Meanwhile, the communication time is too long, so that the terminal equipment can go through an alarm-normal process, and alarm data cannot be uploaded. The simple interactions of the a-cycle are shown in fig. 3.
Compared with the conventional method, the method is characterized in that the B-class data is important non-urgent data, is part of conventional alarm information data, is uploaded in the B period, does not compete with the alarm data for an air bus, and can ensure reliable interaction of the B-class data after the B-class data is subjected to discrete processing. And the number of bytes sent by the B type data is 20 bytes, and under the condition of three uninterrupted retransmissions, the maximum requirement of node interaction completion (10.08+1) =11.08 s is increased by 70% compared with 38.4s of the conventional method. Embodying the advantages of the present invention.
The foregoing description of the preferred embodiments of the invention is not intended to be limiting, but rather is intended to cover all modifications, equivalents, alternatives, and improvements that fall within the spirit and scope of the invention.
Claims (6)
1. A wireless private networking communication method based on beacon classification is characterized in that a wireless communication gateway is used as a master node, and a detector terminal is used as a slave node; the method comprises the steps that interaction data between a master node and a slave node are divided into important and urgent data and important non-urgent data, the important and urgent data are called A-class data, the important non-urgent data are called B-class data, and the A-class data are sent preferentially;
the A-type data comprise alarm, warning and silencing data, and the B-type data comprise heartbeat and self-checking data;
The master node actively initiates and the slave node passively replies to perform wireless data receiving and transmitting interaction, and the whole receiving and transmitting time sequence of the master node and the slave node comprises 3A periods and 1B period, wherein the A period is used for sending and receiving A-type data, and the B period is used for sending and receiving B-type data;
The A period comprises an A command, an A beacon, A data and A data ACK, and the A data receiving and transmitting steps are as follows:
When the period A starts, the master node judges whether an A command is issued according to the current task requirement, if so, the content of the A command is assembled according to the format of a private protocol, then the A command is broadcast through wireless hardware, and if not, the master node omits the step; after the command A is sent, the main node sends a beacon A, the beacon A content is assembled according to the format of a private protocol, and then the beacon A is broadcast out through wireless hardware; after the sending of the A beacon is finished, the master node sets the wireless hardware as a receiving mode, all the slave nodes start counting after receiving the broadcast of the A beacon, and reply to the A data of the master node after timing the time of NID by Ta according to the grid number NID when the master node accesses the network; the master node combines the time slices Ta of the data replied by the single slave node according to the number N of the slave nodes in the current equipment library, and closes the receiving window after waiting for N times Ta; then the master node analyzes all the received A-type data to obtain an NID list of the A-type data, and broadcasts the grid number NID of the received data to all the slave nodes according to the protocol encapsulation data, namely, sends the A-type data ACK; after receiving the broadcast of the A data ACK, the slave node analyzes an NID list, and if the NID list has own grid number NID, the transmission is successful; if the NID list does not have the grid number NID, the slave node resends the data in the next A period;
The B period consists of a B command, a B beacon, B data and B data ACK.
2. The wireless private networking communication method based on beacon classification according to claim 1, wherein the number of the probe terminals is plural, and the plurality of probe terminals are connected with the wireless communication gateway through the wireless private networking.
3. The wireless private networking communication method based on beacon classification according to claim 1 or 2, wherein the differentiation of data interaction between the master node and the slave nodes is achieved through grid numbers, the grid numbers are allocated to the master node when the slave nodes pair in the network, the slave nodes do power-down storage after acquiring the grid numbers, and the pairing process is not changed until the slave nodes restart.
4. The wireless private networking communication method based on beacon classification according to claim 3, wherein the method for receiving and transmitting B-class data is as follows:
When the B period starts, the master node judges whether a B command is issued according to the current task requirement, if so, the content is assembled according to the format of the private protocol, then the B command is broadcasted through wireless hardware, and if not, the master node omits the step; after the B command is sent, the main node starts to send a B beacon, and after the B beacon is sent, the main node sets the wireless hardware into a receiving mode; after receiving the broadcast of the B beacon, all slave nodes acquire an air bus according to a bus safety competition mechanism according to own business logic if B data is to be replied, and continuously broadcast own data for 3 times to a master node when the air bus is acquired; the main node closes the receiving window after waiting for the time of opening the receiving window of the B beacon according to the protocol rule; the master node analyzes all the received data to obtain a NID list of the B data, encapsulates the data according to a protocol, and sends the B data ACK to broadcast the grid number NID of the received data to all the slave nodes; after receiving the broadcast of the B data ACK from the node, analyzing an NID list, and if the NID list has own grid number NID, then retransmission is not needed; if the NID list has no NID with the grid number, the slave node retransmits the own data in the next B period.
5. The beacon classification based wireless private networking communication method according to claim 4, wherein the bus security contention mechanism is to detect whether the air bus is occupied by a slave node before sending B data, if so, randomly delay M milliseconds to detect again until the B beacon open receive window time is exceeded, and if the air bus is occupied in the B beacon open receive window time, continue waiting for the next B period to interact.
6. The wireless private networking communication method based on beacon classification according to claim 4, wherein the slave node obtains the current time from the B beacon and checks its own real-time clock, and the reporting time is evenly scattered into one period of the B data according to the grid number NID, and the reporting time is equal to the NID/terminal equipment total number.
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN202210097577.3A CN114466411B (en) | 2022-01-27 | 2022-01-27 | Wireless private networking communication method based on beacon classification |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN202210097577.3A CN114466411B (en) | 2022-01-27 | 2022-01-27 | Wireless private networking communication method based on beacon classification |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| CN114466411A CN114466411A (en) | 2022-05-10 |
| CN114466411B true CN114466411B (en) | 2024-06-18 |
Family
ID=81411429
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN202210097577.3A Active CN114466411B (en) | 2022-01-27 | 2022-01-27 | Wireless private networking communication method based on beacon classification |
Country Status (1)
| Country | Link |
|---|---|
| CN (1) | CN114466411B (en) |
Families Citing this family (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN115276935B (en) * | 2022-07-14 | 2023-04-07 | 深圳鹏龙通科技有限公司 | Signal frame sending method and device |
| CN115551092B (en) * | 2022-09-20 | 2025-07-01 | 重庆邮电大学 | A wireless node communication management method for field construction monitoring |
Family Cites Families (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN104254983B (en) * | 2012-03-02 | 2017-08-04 | 交互数字专利控股公司 | Method and system for providing beacon information |
| CN103701694A (en) * | 2012-09-27 | 2014-04-02 | 株式会社日立制作所 | Gateway device and data processing method |
| CN203433667U (en) * | 2013-09-18 | 2014-02-12 | 国家电网公司 | Broadband carrier meter-reading module based on power line carrier communication |
| CN110312313B (en) * | 2019-05-21 | 2023-04-07 | 河南科技大学 | Wireless body area network MAC protocol based on multiple channels, communication method and system |
| CN113794530B (en) * | 2021-09-09 | 2023-12-01 | 深圳市力合微电子股份有限公司 | TDMA-based low-power consumption micropower wireless communication method |
-
2022
- 2022-01-27 CN CN202210097577.3A patent/CN114466411B/en active Active
Non-Patent Citations (2)
| Title |
|---|
| 多总线控制的无线传感器网络;孔源;杨艳;王亚菲;;电子设计工程;20100505(05);全文 * |
| 无线多媒体传感器网络QoS区分服务路由机制;李方敏;方艺霖;;电子学报;20101015(10);全文 * |
Also Published As
| Publication number | Publication date |
|---|---|
| CN114466411A (en) | 2022-05-10 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| JP7512531B2 (en) | Wireless communication method and system for node equipment in the Internet of Things for power transmission and transformation equipment | |
| US9432898B2 (en) | Unscheduled messages | |
| CN110381467B (en) | Internet of vehicles emergency communication method, device and system | |
| US20220361032A1 (en) | Micro-power wireless access method and apparatus for internet of things for power transmission and transformation equipment | |
| CN114466411B (en) | Wireless private networking communication method based on beacon classification | |
| US9408251B2 (en) | Transmitting data within a mesh network | |
| JP2024095669A (en) | SYSTEM AND METHOD FOR PROVIDING COMMUNICATIONS WITH AN IMPROVED NETWORK FRAME STRUCTURE ARCHITECTURE IN A WIRELESS SENSOR NETWORK - Patent application | |
| CN116803203A (en) | Method and system for receiving broadcast and multicast services in 5G | |
| CN112995937A (en) | DRX mechanism method of power equipment Internet of things field terminal side | |
| CN112367407A (en) | Control method, control device and computer storage medium | |
| CN108650688A (en) | A kind of method and Lora gateways of sweep check | |
| CN108898814A (en) | Electric power data acquisition transmission method and its system | |
| Farag et al. | A TETRA-based system for remote health monitoring of first responders: Peak AoI assessment in direct and trunked mode | |
| Valle et al. | Experimental evaluation of multiple retransmission schemes in IEEE 802.15. 4 wireless sensor networks | |
| CN111462461B (en) | Synchronous alarming and resetting method for receiving end in multi-transmitting and one-receiving internet of things | |
| CN117652201A (en) | Overload of broadcast dwell intervals in an asynchronous channel hopping mesh network | |
| CN119155575B (en) | Electricity meter data reporting method and system | |
| US12041638B2 (en) | Method and device for sidelink communication | |
| CN117119609A (en) | Equipment scheduling method, device, equipment, storage medium and computer program | |
| CN116761264B (en) | Uplink resource allocation method and device, base station and relay terminal | |
| CN116866883B (en) | Method and system for improving timeliness of data transmission | |
| CN104782224B (en) | Uplink data transmission method, terminal and wireless communication node | |
| CN114268979A (en) | Safe communication method for north interface of network management terminal | |
| Zhong | Analysis and simulations of a novel media access control protocol for lora/submitted by Chen Zhong | |
| CN118450547A (en) | LoRa-based wireless local area networking method |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| PB01 | Publication | ||
| PB01 | Publication | ||
| SE01 | Entry into force of request for substantive examination | ||
| SE01 | Entry into force of request for substantive examination | ||
| GR01 | Patent grant | ||
| GR01 | Patent grant |