Nothing Special   »   [go: up one dir, main page]

CN102036255A - Packet sending method based on prediction in communication channel - Google Patents

Packet sending method based on prediction in communication channel Download PDF

Info

Publication number
CN102036255A
CN102036255A CN2010105711938A CN201010571193A CN102036255A CN 102036255 A CN102036255 A CN 102036255A CN 2010105711938 A CN2010105711938 A CN 2010105711938A CN 201010571193 A CN201010571193 A CN 201010571193A CN 102036255 A CN102036255 A CN 102036255A
Authority
CN
China
Prior art keywords
mrow
msub
packet
msup
math
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2010105711938A
Other languages
Chinese (zh)
Inventor
杨双懋
郭伟
余敬东
刘军
苏俭
刘伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
University of Electronic Science and Technology of China
Original Assignee
University of Electronic Science and Technology of China
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by University of Electronic Science and Technology of China filed Critical University of Electronic Science and Technology of China
Priority to CN2010105711938A priority Critical patent/CN102036255A/en
Publication of CN102036255A publication Critical patent/CN102036255A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Data Exchanges In Wide-Area Networks (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention provides a packet sending method capable of predicting the arrival time of user business packet accurately so as to effectively resolve the packet collision in a communication channel. The packet sending method is as follows: in order to resolve the collision better in the packet sending process, establishing a mathematical model described by time for an arrival time sequence of the user business packet by user business modeling, facilitating the prediction on the arrival time sequence of the user business packet in future, and when a plurality of packets need to be sent and generate collision, and the packets can be decomposed according to the predicted result. The key points in the invention are as follows: an assignment interval for packet transmission in the current time slot is determined by predicting the arrival time of next user business packet, and decides the packet which is sent in the current time slot and arrives in the time duration of the assignment interval. In the invention, the adopted fractal autoregressive integrated moving average (FARIMA) model can be well matched with the current wireless network environment, and by combination with the whole packet transmission method, the packet time delay can be effectively reduced and the network throughput rate can be improved.

Description

Prediction-based packet transmission method in communication channel
Technical Field
The invention belongs to the field of wireless network technology, such as wireless sensor network, wireless self-organizing network, wireless local area network, satellite network and the like, and particularly relates to a multiple access technology of wireless shared channels.
Background
A wireless channel is a shared transmission medium. Therefore, a collision will inevitably occur when a plurality of users communicate on the channel at the same time, thereby reducing the throughput of the system. How to avoid collision of data on the broadcast channel and improve the utilization of the link is a core problem of multiple access. Currently, the multiple access algorithm mainly includes: fixed allocation, on-demand allocation, and random contention 3 types. Due to the distributed nature and the temporary nature of the network and the burstiness of the traffic, neither the fixed allocation multiple access protocol nor the demand allocation multiple access protocol can effectively function. The random contention multiple access algorithm can effectively occupy channel resources under certain conditions, and the technology of reducing the switching delay is widely applied. The systems adopting the random contention multiple access algorithm have a common characteristic that users in the systems randomly occupy channel resources and transmit information packets, and when the transmitted information packets collide, collision resolution is required. The system has the advantages of no need of centralized control, easy increase and decrease of terminal stations, simple operation, small transmission delay and the like. In light load situations, there is less probability of collisions of packets of information in the system, and each station can efficiently utilize the channel as needed. However, with the load increasing, collisions will increase, and since the collided information packets need to be retransmitted, the delay will increase and the throughput will decrease, so that the adoption of a reasonable collision resolution algorithm becomes a key problem for improving the performance of the random contention multiple access system.
The basic idea of conflict resolution is: if the packet in the system is collided, the newly arrived user service packet is made to wait outside the system, and after the successful transmission of the packets participating in collision is finished, the new packet is made to be transmitted. At present, the classical conflict resolution algorithms include a tree conflict resolution Algorithm and an FCFS (First-com First-service Splitting Algorithm) conflict resolution Algorithm.
The existing conflict resolution method comprises the following steps:
1. and (3) tree conflict decomposition: the binary tree decomposition algorithm is mainly used, the groups participating in collision in the binary tree decomposition algorithm are randomly selected to enter a left set or a right set with a certain probability, the priority of the left set is higher than that of the right set, and the decomposition of the right set can be entered only after the left set is successfully decomposed. See J I patent Algorithms for packet slots Channels [ J ], IEEE Transactions on Information Theory, September1979, volume.25, No.5, page(s) (505) 515. tree collision resolution treats collision messages, based on a random manner, and when the number of packets colliding is large, the slot utilization of the system will decrease.
2. FCFS conflict resolution: the packets which are collided are frozen in the collision window, and then the collision packets are decomposed in sequence according to the generation time, so that the packets which arrive first are successfully transmitted first. See documents D Bertsekas, R gallager. datanets [ M ], 2nd Edition, precision-Hall, USA, 1992, page(s): scheduling according to the arrival time of the packet, the FCFS conflict resolution algorithm can reduce idle time slots, but when there are packets with relatively close intervals in the collision packets, resolution with time conditions will need to be performed for multiple times, and especially when the user traffic has self-similarity, the time burst of the traffic is very strong, and the efficiency of the FCFS will be significantly reduced.
3. HSA (Hybrid Splitting Algorithm): the advantages of the tree decomposition algorithm and the FCFS conflict decomposition algorithm are inherited, the generation time of the collision grouping is considered, the generated grouping is served first, and meanwhile when the grouping with the relatively close generation intervals exists in the system, the tree decomposition algorithm is adopted, the whole decomposition process is not limited to the generation time of the grouping any more, and therefore the total time slot number required by decomposition is reduced. See documents Min Sheng, Jiandong land fire, hybrid splitting algorithm for wireless MAC, IEEE Communications Letters, vol.9, Issue 5, May 2005 page(s): 468-470, the key of HSA algorithm is to calculate the optimal time point for switching from tree decomposition algorithm to FCFS conflict decomposition algorithm, and the obtaining of the optimal time point requires that the user service model is assumed to be poisson process, so when the real user service model does not meet the assumption, the optimal time point cannot be obtained, and the performance of the algorithm will be consistent with the tree decomposition algorithm.
The above conflict resolution algorithm has the following disadvantages: the tree conflict decomposition is purely based on a random decomposition mode, and when a large number of groups collide, the performance of the algorithm is obviously reduced; the FCFS decomposes the collision message too much depending on the time condition, and when the time burst of the user service is very strong, the algorithm efficiency is reduced; HSA is too limited, requiring an assumption that the user service model is a poisson process, and its application scope is limited when real user services do not meet this assumption.
Disclosure of Invention
The technical problem to be solved by the invention is to provide a packet transmission method which can accurately predict the arrival time of user service packets so as to effectively decompose packet collisions in a communication channel.
The technical scheme adopted by the invention for solving the technical problems is that the packet sending method based on prediction in the communication channel comprises the following steps:
a packet transmission step based on prediction:
the A1 system has sent out the user traffic packets that arrived before time T (k);
the a2 system builds a FARIMA (autoregressive score integration moving average) model for the arriving time series of user traffic packets that have been sent out before time t (k);
a3 predicting arrival time of next user service packet by the FARIMA model
Figure BDA0000035850380000021
The A4 system is transmitted in [ T (k), T (k) + a (k) in the current time slot k]User traffic packets arriving in-bound, wherein the assignment interval is
Figure BDA0000035850380000022
If packet collision occurs in the current time slot k, entering a collision resolution packet sending step; otherwise, return to step A1;
b, a collision resolution packet sending step:
the B1 system checks the packet transmission status in slot k, if a packet collision occurs, executes step B2; if the transmission is successful or the transmission packet is empty and the indicator is in the left set, go to step B3, if empty and the indicator is in the left set, go to step B3, if the transmission is successful and the indicator is in the right set, go to step B4;
b2 sets k to k +1, continues to transmit the first half of the last unsuccessfully transmitted packet in the current time slot k, sets T (k) to T (k-1), α (k) to α (k-1)/2, sets the indicator to left set, the system transmits the user traffic packets arriving in [ T (k), T (k) + a (k) ] in the current time slot k, and then returns to step B1;
b3 sets k to k +1, continues to transmit the second half of the last unsuccessfully transmitted packet in the current time slot k, sets T (k) to T (k-1) + α (k-1), α (k) to α (k-1), sets the indicator to right set, the system transmits the user traffic packets arriving in [ T (k), T (k) + a (k) ] in the current time slot k, and then returns to step B1;
b4 sets k to k +1 and sets the indicator to the right set, and returns to step a 1.
In order to better perform conflict resolution in the packet sending process, the invention establishes a mathematical model described by time for the arrival time sequence of the user service packet by user service modeling, thereby being convenient to predict the arrival time of the future user service packet.
The key point of the invention is that the time of arrival of the next user service packet is predicted
Figure BDA0000035850380000031
To determine the assignment interval for packet transmission in the current time slot
Figure BDA0000035850380000032
The assignment interval determines the length of time a (k) the packet arrives in the current slot. The assignment interval a (k) is an arrival time following the next user traffic packet
Figure BDA0000035850380000033
But the value of is changed in order to guarantee
Figure BDA0000035850380000034
The prediction is accurate, and the invention adopts a FARIMA (fractional autoregressive integrated moving average) model which is a mathematical model working under the self-similarity and long-correlation conditions. In the traditional conflict resolution, the operation mechanism and the selection of parameters of the algorithm are considered in an MAC layer (a media access control sublayer), different requirements of user services are not considered, a service model of a user is assumed to be Poisson arrival, and the self-similarity and long-term correlation presented by the user services in the current wireless network are inconsistent, so that the actual service is not well fitted, and the practicability of the conflict resolution algorithm is reduced. Different from the prior art, the FARIMA model adopted by the invention can be well matched with the current wireless network environment, the FARIMA model is used for fitting with the current user service group, and the whole group transmission method is combined, so that the group delay can be effectively reduced, and the network throughput rate can be improved.
The invention adopts the mathematical expression of a FARIMA (p, d, q) model as follows:
<math><mrow><mi>&Phi;</mi><mrow><mo>(</mo><mi>B</mi><mo>)</mo></mrow><msup><mo>&dtri;</mo><mi>d</mi></msup><msub><mi>X</mi><mi>t</mi></msub><mo>=</mo><mi>&Theta;</mi><mrow><mo>(</mo><mi>B</mi><mo>)</mo></mrow><msub><mi>a</mi><mi>t</mi></msub></mrow></math>
wherein, XtThe user service packet arrival time sequence is represented by t, d is a difference order, d belongs to (-0.5, 0.5), p is an autoregressive order, q is a moving average order, p and q are non-negative integers, atIs a zero mean and has a variance of σ2And additionally:
Φ(B)=1-φ1B-φ2B2...-φpBp
Θ(B)=1-θ1B-θ2B2-...-θqBq
where Φ (B) and Θ (B) are complex variable polynomials with no common solution, and in addition Φ (B) is represented on the unit disk { B: no solution exists in the condition that B is less than or equal to 1. B is a backward shift operator, i.e. BXt=Xt-1. Definition of
Figure BDA0000035850380000041
In order to be a difference operator, the difference operator,
Figure BDA0000035850380000042
is a fractional difference operator, the binomial expansion of which is:
<math><mrow><msup><mo>&dtri;</mo><mi>d</mi></msup><mo>=</mo><msup><mrow><mo>(</mo><mn>1</mn><mo>-</mo><mi>B</mi><mo>)</mo></mrow><mi>d</mi></msup><mo>=</mo><munderover><mi>&Sigma;</mi><mrow><mi>n</mi><mo>=</mo><mn>0</mn></mrow><mo>&infin;</mo></munderover><mfenced open='|' close='|'><mtable><mtr><mtd><mi>d</mi></mtd></mtr><mtr><mtd><mi>n</mi></mtd></mtr></mtable></mfenced><msup><mrow><mo>(</mo><mo>-</mo><mi>B</mi><mo>)</mo></mrow><mi>n</mi></msup></mrow></math>
wherein, <math><mrow><mfenced open='|' close='|'><mtable><mtr><mtd><mi>d</mi></mtd></mtr><mtr><mtd><mi>n</mi></mtd></mtr></mtable></mfenced><mo>=</mo><mi>&Gamma;</mi><mrow><mo>(</mo><mi>d</mi><mo>+</mo><mn>1</mn><mo>)</mo></mrow><mo>/</mo><mo>[</mo><mi>&Gamma;</mi><mrow><mo>(</mo><mi>n</mi><mo>+</mo><mn>1</mn><mo>)</mo></mrow><mi>&Gamma;</mi><mrow><mo>(</mo><mi>d</mi><mo>-</mo><mi>n</mi><mo>+</mo><mn>1</mn><mo>)</mo></mrow><mo>]</mo></mrow></math>
where n is a temporary variable, and Γ represents a gamma function, defined as:
<math><mrow><mi>&Gamma;</mi><mrow><mo>(</mo><mi>x</mi><mo>)</mo></mrow><mo>=</mo><msubsup><mo>&Integral;</mo><mn>0</mn><mo>&infin;</mo></msubsup><msup><mi>e</mi><mrow><mo>-</mo><mi>t</mi></mrow></msup><msup><mi>t</mi><mrow><mi>x</mi><mo>-</mo><mn>1</mn></mrow></msup><mi>dt</mi><mo>=</mo><mrow><mo>(</mo><mi>x</mi><mo>-</mo><mn>1</mn><mo>)</mo></mrow><mi>&Gamma;</mi><mrow><mo>(</mo><mi>x</mi><mo>-</mo><mn>1</mn><mo>)</mo></mrow><mo>,</mo><mi>x</mi><mo>></mo><mn>0</mn><mo>,</mo></mrow></math> then, it is possible to obtain:
<math><mrow><msup><mo>&dtri;</mo><mi>d</mi></msup><mo>=</mo><msup><mrow><mo>(</mo><mn>1</mn><mo>-</mo><mi>B</mi><mo>)</mo></mrow><mi>d</mi></msup><mo>=</mo><msubsup><mi>&Sigma;</mi><mrow><mi>n</mi><mo>=</mo><mn>0</mn></mrow><mo>&infin;</mo></msubsup><mi>g</mi><mrow><mo>(</mo><mi>n</mi><mo>)</mo></mrow><msup><mi>B</mi><mi>n</mi></msup><mo>,</mo></mrow></math> wherein g (n) is defined as:
g(0)≡1,g(1)=-d,g(n)=g(n-1)*(n-1-d)/n
when 0 < d < 0.5, the FARIMA (p, d, q) model exhibits long-term correlation, and its parameter describing autocorrelation, Hurst parameter H, is 0.5+ d; when d is 0, FARIMA (p, d, q) degenerates into ARMA (p, q).
The parameters p, q and theta are difficult to calculate due to long-term correlation1,θ2,...,θq,φ1,φ2,...,φp,σ2Therefore, it is necessary to obtain the parameters p, q, θ by calculating an ARMA (p, q) model (autoregressive moving average) exhibiting a short-time correlation1,θ2,...,θq,φ1,φ2,...,φp,σ2The value of (c).
Specifically, the specific method for the system to establish the autoregressive score integration moving average model by using the time sequence of arrival of the user service group that has been sent before time t (k) in step a2 includes:
a2-1 sent user service packet XtPerforming a de-averaging operation, i.e. performing XtMu, where a zero mean traffic data sequence X is obtainedt- μ, wherein μ ═ E [ Xt]Is an expectation of a traffic sequence;
a2-2 adopts a regulated Adjusted Range Statistics algorithm to estimate a Hurst (Hurst) parameter H of the sequence, and a parameter d is H-0.5;
a2-3 is an autoregressive moving average model ARMA (p, q) sequence Wt
Figure BDA0000035850380000051
A2-4 pairs sequence W with AIC (Akaike Information Criterion, Chikuchi Information content) CriteriontDetermining order to obtain values of p and q;
a2-5 obtains the sequence W by approximate maximum likelihood estimationtAll parameters theta of1,θ2,...,θq,φ1,φ2,...,φp,σ2
A2-6 reaction of d, p, q, theta1,θ2,...,θq,φ1,φ2,...,φp,σ2And substituting the mathematical expression of the FARIMA (p, d, q) model to obtain the FARIMA (p, d, q) model of the user service.
Specifically, in step a3, the arrival time of the next user traffic packet is predicted by the FARIMA (p, d, q) model
Figure BDA0000035850380000052
The method comprises the following steps:
using the obtained
Figure BDA0000035850380000053
Can obtain
Figure BDA0000035850380000054
<math><mrow><msub><mover><mi>X</mi><mo>^</mo></mover><mi>t</mi></msub><mrow><mo>(</mo><mn>1</mn><mo>)</mo></mrow><mo>=</mo><mo>-</mo><msubsup><mi>&Sigma;</mi><mrow><mi>m</mi><mo>=</mo><mn>1</mn></mrow><mo>&infin;</mo></msubsup><mi>g</mi><mrow><mo>(</mo><mi>k</mi><mo>)</mo></mrow><msub><mover><mi>X</mi><mo>^</mo></mover><mi>t</mi></msub><mrow><mo>(</mo><mn>1</mn><mo>-</mo><mi>m</mi><mo>)</mo></mrow><mo>+</mo><msubsup><mi>&Sigma;</mi><mrow><mi>i</mi><mo>=</mo><mn>1</mn></mrow><mi>p</mi></msubsup><msub><mi>&phi;</mi><mi>i</mi></msub><msub><mover><mi>W</mi><mo>^</mo></mover><mrow><mi>t</mi><mo>+</mo><mn>1</mn><mo>-</mo><mi>i</mi></mrow></msub><mo>+</mo><msubsup><mi>&Sigma;</mi><mrow><mi>j</mi><mo>=</mo><mn>1</mn></mrow><mi>q</mi></msubsup><msub><mi>&theta;</mi><mi>j</mi></msub><msub><mi>a</mi><mrow><mi>t</mi><mo>+</mo><mn>1</mn><mo>-</mo><mi>j</mi></mrow></msub></mrow></math>
Wherein m, i and j are temporary variables;
W ^ t ( 1 ) = E ( W t + 1 )
<math><mrow><mo>=</mo><mi>E</mi><mrow><mo>(</mo><msub><mi>&phi;</mi><mn>1</mn></msub><msub><mi>W</mi><mi>t</mi></msub><mo>+</mo><msub><mi>&phi;</mi><mn>2</mn></msub><msub><mi>W</mi><mrow><mi>t</mi><mo>-</mo><mn>1</mn></mrow></msub><mo>+</mo><mi>L</mi><mo>+</mo><msub><mi>&phi;</mi><mi>p</mi></msub><msub><mi>W</mi><mrow><mi>t</mi><mo>-</mo><mi>p</mi><mo>+</mo><mn>1</mn></mrow></msub><mo>+</mo><msub><mi>a</mi><mrow><mi>t</mi><mo>+</mo><mn>1</mn></mrow></msub><mo>-</mo><msub><mi>&theta;</mi><mn>1</mn></msub><msub><mi>a</mi><mi>t</mi></msub><mo>-</mo><msub><mi>&theta;</mi><mn>2</mn></msub><msub><mi>a</mi><mrow><mi>t</mi><mo>-</mo><mn>1</mn></mrow></msub><mo>-</mo><mi>L</mi><mo>-</mo><msub><mi>&theta;</mi><mi>q</mi></msub><msub><mi>a</mi><mrow><mi>t</mi><mo>-</mo><mi>q</mi><mo>+</mo><mn>1</mn></mrow></msub><mo>)</mo></mrow></mrow></math>
<math><mrow><mo>=</mo><msub><mi>&phi;</mi><mn>1</mn></msub><msub><mi>W</mi><mi>t</mi></msub><mo>+</mo><msub><mi>&phi;</mi><mn>2</mn></msub><msub><mi>W</mi><mrow><mi>t</mi><mo>-</mo><mn>1</mn></mrow></msub><mo>+</mo><mi>L</mi><mo>+</mo><msub><mi>&phi;</mi><mi>p</mi></msub><msub><mi>W</mi><mrow><mi>t</mi><mo>-</mo><mi>p</mi><mo>+</mo><mn>1</mn></mrow></msub><mo>-</mo><msub><mi>&theta;</mi><mn>1</mn></msub><msub><mi>a</mi><mi>t</mi></msub><mo>-</mo><msub><mi>&theta;</mi><mn>2</mn></msub><msub><mi>a</mi><mrow><mi>t</mi><mo>-</mo><mn>1</mn></mrow></msub><mo>-</mo><mi>L</mi><mo>-</mo><msub><mi>&theta;</mi><mi>q</mi></msub><msub><mi>a</mi><mrow><mi>t</mi><mo>-</mo><mi>q</mi><mo>+</mo><mn>1</mn></mrow></msub></mrow></math>
the method has the advantages that the method predicts the future actual user service, guides the later conflict resolution by using the prediction result, dynamically adjusts the distribution interval according to the conflict situation of the transmitted packet service, improves the conflict resolution efficiency, adopts a self-similarity FARIMA model to fit the actual service, and improves the accuracy of the prediction result compared with the fitting degree of simulating the actual service by adopting a Poisson model.
Drawings
Fig. 1 is a schematic diagram of an assignment interval when a current transmission timeslot k is 4000 in the embodiment;
fig. 2 is a schematic diagram of an assignment interval when the current transmission timeslot is k 4001 in the embodiment;
fig. 3 is a diagram illustrating an assignment interval when the current transmission timeslot is k 4002 in the embodiment;
fig. 4 is a diagram illustrating an assignment interval when the current transmission timeslot is k 4003 in the embodiment;
fig. 5 is a diagram illustrating an assignment interval when the current transmission timeslot is k 4004 in the embodiment;
FIG. 6 is a comparison graph of throughput simulation results of sending packets using the method of the present embodiment and FCFS;
FIG. 7 is a diagram illustrating comparison between the average delay simulation results of the FCFS and the method of the present embodiment;
fig. 8 is a comparison graph of simulation results of average conflict resolution cycles of FCFS and the method according to this embodiment.
Detailed Description
The following provides a specific implementation method of the patent in the wireless ad hoc network:
each node in the single-hop wireless ad hoc network system can model services, the service model adopts an anonymous grouping track collected from an SIGCOMM' 04 (from http:// www.crawdad.org/data. php) conference, service groups are sent according to the track, the system is operated for a period of time, and the nodes are convenient to model the services in the past period of time. After the modeling is successful, the system starts to operate normally until the packet track is completely sent, and the sending process is as follows:
the A1 system has sent out the user traffic packets that arrived before time T (k);
the a2 system builds a FARIMA (autoregressive score integration moving average) model for the arriving time series of user traffic packets that have been sent out before time t (k);
a3 predicting arrival time of next user service packet by the FARIMA model
Figure BDA0000035850380000061
The A4 system is transmitted in [ T (k), T (k) + a (k) in the current time slot k]The user service packet of the inner arrival is assigned with the interval of
Figure BDA0000035850380000062
If packet collision occurs in the current time slot k, entering a collision resolution packet sending step; otherwise, return to step A1;
a collision resolution packet transmission step:
the B1 system checks the packet transmission status in slot k, if a packet collision occurs, executes step B2; if the transmission is successful or the transmission packet is empty and the indicator is in the left set, go to step B3, if empty and the indicator is in the left set, go to step B3, if the transmission is successful and the indicator is in the right set, go to step B4;
b2 sets k to k +1, continues to transmit the first half of the last unsuccessfully transmitted packet in the current time slot k, sets T (k) to T (k-1), α (k) to α (k-1)/2, sets the indicator to left set, the system transmits the user traffic packets arriving in [ T (k), T (k) + a (k) ] in the current time slot k, and then returns to step B1;
b3 sets k to k +1, continues to transmit the second half of the last unsuccessfully transmitted packet in the current time slot k, sets T (k) to T (k-1) + α (k-1), α (k) to α (k-1), sets the indicator to right set, the system transmits the user traffic packets arriving in [ T (k), T (k) + a (k) ] in the current time slot k, and then returns to step B1;
b4 sets k to k +1 and sets the indicator to the right set, and returns to step a 1.
As shown in fig. 1, the system has already transmitted the user traffic packet that has reached at time 2000s (t (k) ═ 2000), and predicts the arrival time of the next user traffic packet by the established FARIMA model to be 2000.5s
Figure BDA0000035850380000071
The assignment interval is
Figure BDA0000035850380000072
Then, the system transmits the user traffic packet arriving in [2000, 2000.5] s in the current time slot k (k is 4000), wherein the assigned interval is 0.5s, if packet collision occurs in the current time slot k (k is 4000), then the system enters the collision resolution packet transmission step:
when the system checks that a packet collision occurs in time slot k (k is 4000) and the indicator is set as the left set, k is set to k +1, the first half of the last unsuccessfully transmitted packet is continuously transmitted in the current time slot k (k is 4001), T (k) is set to T (k-1), i.e., T (k) is 2000, and α (k) is 0.5/2, and the indicator is set as the left set, the system transmits the user traffic packet arriving in [2000, 2000.25] s in the current time slot k, as shown in fig. 2;
after that, the system checks that packet collision occurs in time slot k (k ═ 4001), sets k ═ k +1, continues to transmit the first half of the last unsuccessfully transmitted packet in the current time slot k (k ═ 4002), sets T (k) ═ T (k-1), i.e., T (k) ═ 2000, α (k) ═ 0.25/2, and sets the indicator to the left set, and the system transmits the user traffic packet arriving in [2000, 2000.125] s in the current time slot k, as shown in fig. 3;
after that, the system checks that no packet collision occurs in time slot k (k ═ 4002), and the user traffic packet arriving in [2000, 2000.125] s is successfully transmitted, then k ═ k +1 is set, the last half of the last unsuccessfully transmitted packet is continuously transmitted in the current time slot k (k ═ 4003), T (k) ═ T (k-1) + α (k-1), i.e. T (k) ═ 2000.125, α (k) ═ α (k-1), i.e. α (k) ═ 0.25/2, and the indicator is set as the right set, and the system transmits the user traffic packet arriving in [2000.125, 2000.25] s in the current time slot k, as shown in fig. 4;
the system checks that the transmission is in [2000.125, 2000.25] in time slot k (k ═ 4003)]If the user service packet arrived within s is successfully sent and the indicator is the right set, the indicator is continuously set as the right set, and the FARIMA model is established through the user service packet arrived within 2000.25s to predict the arrival time of the next user service packet within 2000.5s
Figure BDA0000035850380000073
Then the system transmits in [2000.25, 2000.5] in the current time slot k (k ═ 4004)]s, where the assignment interval is 0.25s, as shown in fig. 5. If packet collision occurs in the current time slot k (k is 4004), entering a collision resolution packet transmission step again, and if the packet collision occurs in the current time slot k (k is 4004), continuing to determine a new assignment interval by predicting the arrival time of the next user traffic packet.
The specific method for the system to establish the FARIMA model by the time sequence of arrival of the user service packet that has been sent before time t (k) in step a2 is as follows:
a2-1 sentUser traffic packet XtPerforming a de-averaging operation, i.e. performing XtMu, where a zero mean traffic data sequence X is obtainedt- μ, wherein μ ═ E [ Xt]Is an expectation of a traffic sequence;
a2-2 adopts a regulated Adjusted Range Statistics algorithm to estimate a Hurst parameter H of the sequence, and a parameter d is H-0.5;
a2-3 is an autoregressive moving average model ARMA (p, q) sequence Wt
Figure BDA0000035850380000081
A2-4 uses AIC (Akaike Information criterion) criterion to sequence WtDetermining order to obtain values of p and q;
a2-5 obtains the sequence W by approximate maximum likelihood estimationtAll parameters theta of1,θ2,...,θq,φ1,φ2,...,φp,σ2
A2-6 reaction of d, p, q, theta1,θ2,...,θq,φ1,φ2,...,φp,σ2And substituting the mathematical expression of the FARIMA (p, d, q) model to obtain the FARIMA (p, d, q) model of the user service.
Specifically, in step a3, the arrival time of the next user traffic packet is predicted by the FARIMA (p, d, q) model
Figure BDA0000035850380000082
The method comprises the following steps:
using the obtained
Figure BDA0000035850380000083
Can obtain
Figure BDA0000035850380000084
<math><mrow><msub><mover><mi>X</mi><mo>^</mo></mover><mi>t</mi></msub><mrow><mo>(</mo><mn>1</mn><mo>)</mo></mrow><mo>=</mo><mo>-</mo><msubsup><mi>&Sigma;</mi><mrow><mi>m</mi><mo>=</mo><mn>1</mn></mrow><mo>&infin;</mo></msubsup><mi>g</mi><mrow><mo>(</mo><mi>m</mi><mo>)</mo></mrow><msub><mover><mi>X</mi><mo>^</mo></mover><mi>t</mi></msub><mrow><mo>(</mo><mn>1</mn><mo>-</mo><mi>m</mi><mo>)</mo></mrow><mo>+</mo><msubsup><mi>&Sigma;</mi><mrow><mi>i</mi><mo>=</mo><mn>1</mn></mrow><mi>p</mi></msubsup><msub><mi>&phi;</mi><mi>i</mi></msub><msub><mover><mi>W</mi><mo>^</mo></mover><mrow><mi>t</mi><mo>+</mo><mn>1</mn><mo>-</mo><mi>i</mi></mrow></msub><mo>+</mo><msubsup><mi>&Sigma;</mi><mrow><mi>j</mi><mo>=</mo><mn>1</mn></mrow><mi>q</mi></msubsup><msub><mi>&theta;</mi><mi>j</mi></msub><msub><mi>a</mi><mrow><mi>t</mi><mo>+</mo><mn>1</mn><mo>-</mo><mi>j</mi></mrow></msub></mrow></math>
Wherein m, i and j are temporary variables;
W ^ t ( 1 ) = E ( W t + 1 )
<math><mrow><mo>=</mo><mi>E</mi><mrow><mo>(</mo><msub><mi>&phi;</mi><mn>1</mn></msub><msub><mi>W</mi><mi>t</mi></msub><mo>+</mo><msub><mi>&phi;</mi><mn>2</mn></msub><msub><mi>W</mi><mrow><mi>t</mi><mo>-</mo><mn>1</mn></mrow></msub><mo>+</mo><mi>L</mi><mo>+</mo><msub><mi>&phi;</mi><mi>p</mi></msub><msub><mi>W</mi><mrow><mi>t</mi><mo>-</mo><mi>p</mi><mo>+</mo><mn>1</mn></mrow></msub><mo>+</mo><msub><mi>a</mi><mrow><mi>t</mi><mo>+</mo><mn>1</mn></mrow></msub><mo>-</mo><msub><mi>&theta;</mi><mn>1</mn></msub><msub><mi>a</mi><mi>t</mi></msub><mo>-</mo><msub><mi>&theta;</mi><mn>2</mn></msub><msub><mi>a</mi><mrow><mi>t</mi><mo>-</mo><mn>1</mn></mrow></msub><mo>-</mo><mi>L</mi><mo>-</mo><msub><mi>&theta;</mi><mi>q</mi></msub><msub><mi>a</mi><mrow><mi>t</mi><mo>-</mo><mi>q</mi><mo>+</mo><mn>1</mn></mrow></msub><mo>)</mo></mrow></mrow></math>
<math><mrow><mo>=</mo><msub><mi>&phi;</mi><mn>1</mn></msub><msub><mi>W</mi><mi>t</mi></msub><mo>+</mo><msub><mi>&phi;</mi><mn>2</mn></msub><msub><mi>W</mi><mrow><mi>t</mi><mo>-</mo><mn>1</mn></mrow></msub><mo>+</mo><mi>L</mi><mo>+</mo><msub><mi>&phi;</mi><mi>p</mi></msub><msub><mi>W</mi><mrow><mi>t</mi><mo>-</mo><mi>p</mi><mo>+</mo><mn>1</mn></mrow></msub><mo>-</mo><msub><mi>&theta;</mi><mn>1</mn></msub><msub><mi>a</mi><mi>t</mi></msub><mo>-</mo><msub><mi>&theta;</mi><mn>2</mn></msub><msub><mi>a</mi><mrow><mi>t</mi><mo>-</mo><mn>1</mn></mrow></msub><mo>-</mo><mi>L</mi><mo>-</mo><msub><mi>&theta;</mi><mi>q</mi></msub><msub><mi>a</mi><mrow><mi>t</mi><mo>-</mo><mi>q</mi><mo>+</mo><mn>1</mn></mrow></msub></mrow></math>
in practice, where infinite summation is involved (e.g., m in step a 3), the larger value is used instead of converting infinite summation into summation of larger value.
It can be seen from the computer simulation result that the conflict resolution of the present embodiment can efficiently and quickly resolve conflict packets under the self-similar service stream, and the system throughput rate, average delay, and average packet conflict resolution period are all obviously superior to the FCFS algorithm:
as shown in fig. 6, the throughput simulation results of this embodiment and the FCFS algorithm are compared: predition _ CRA refers to this embodiment, FCFS refers to the FCFS algorithm, Sig04_ ver01, Sig04_ ver02 and Sig04_ ver03 represent three segments of traffic flows collected from sigcomp' 04 conference, each segment containing 10000 packets. The abscissa is the arrival rate of the packet, the unit is the number of packets/time slot, the ordinate is the throughput rate, and the unit is the number of packets/time slot. As can be seen from fig. 6, the maximum throughput rate of FCFS is only 0.37, whereas the maximum throughput rate of the present embodiment is 0.4.
As shown in fig. 7, the simulation results of the average delay of the FCFS algorithm are compared with each other: predition _ CRA refers to this embodiment, FCFS refers to FCFS, Sig04_ ver01, Sig04_ ver02 and Sig04_ ver03 represent three segments of traffic flows collected from sigcomp' 04 conference, each segment containing 10000 packets. The horizontal coordinate is the arrival rate of the message, the unit is the number of the message/time slot, the vertical coordinate is the average time delay, the unit is the time slot, and the scaling mode is the logarithmic coordinate. As can be seen from fig. 7, the average delay of this embodiment is smaller than the FCFS algorithm by about 5%.
As shown in fig. 8, the simulation results of the average collision resolution cycle of the FCFS algorithm are compared: predition _ CRA refers to this embodiment, FCFS refers to FCFS, Sig04_ ver01, Sig04_ ver02 and Sig04_ ver03 represent three segments of traffic flows collected from sigcomp' 04 conference, each segment containing 10000 packets. The abscissa is the arrival rate of the packet, the unit is the number of packets/time slot, and the ordinate is the average collision resolution period, the unit is the number of times. In the context of traffic flow of Sig04_ ver03 in fig. 8, the average collision resolution period of this embodiment is only about 70% of the FCFS algorithm.

Claims (4)

1. A method for prediction-based packet transmission in a communication channel, comprising the steps of:
a packet transmission step based on prediction:
the A1 system has sent out the user traffic packets that arrived before time T (k);
the a2 system establishes a FARIMA model by establishing an arriving time series of user traffic packets that have been sent completed before time t (k);
a3 predicting arrival time of next user service packet by the FARIMA model
Figure FDA0000035850370000011
The A4 system is transmitted in [ T (k), T (k) + a (k) in the current time slot k]User traffic packets arriving in-bound, wherein the assignment interval is
Figure FDA0000035850370000012
If packet collision occurs in the current time slot k, entering a collision resolution packet sending step; otherwise, return to step A1;
b, a collision resolution packet sending step:
the B1 system checks the packet transmission status in slot k, if a packet collision occurs, executes step B2; if the transmission is successful or the transmission packet is empty and the indicator is in the left set, go to step B3, if empty and the indicator is in the left set, go to step B3, if the transmission is successful and the indicator is in the right set, go to step B4;
b2 sets k to k +1, continues to transmit the first half of the last unsuccessfully transmitted packet in the current time slot k, sets T (k) to T (k-1), α (k) to α (k-1)/2, sets the indicator to left set, the system transmits the user traffic packets arriving in [ T (k), T (k) + a (k) ] in the current time slot k, and then returns to step B1;
b3 sets k to k +1, continues to transmit the second half of the last unsuccessfully transmitted packet in the current time slot k, sets T (k) to T (k-1) + α (k-1), α (k) to α (k-1), sets the indicator to right set, the system transmits the user traffic packets arriving in [ T (k), T (k) + a (k) ] in the current time slot k, and then returns to step B1;
b4 sets k to k +1 and sets the indicator to the right set, and returns to step a 1.
2. The prediction-based packet transmission method in communication channel of claim 1, wherein the specific method for the system to build the autoregressive score integrated moving average model for the time sequence of arrival of the user traffic packets that have been transmitted before time t (k) in step a2 is:
a2-1 sent user service packet XtPerforming a de-averaging operation, i.e. performing XtMu, where a zero mean traffic data sequence X is obtainedt- μ, wherein μ ═ E [ Xt]Is an expectation of a traffic sequence;
a2-2 adopts a re-standard polar difference method to estimate a hester parameter H of the sequence, and a parameter d is H-0.5;
a2-3 is an autoregressive moving average model ARMA (p, q) sequence Wt
A2-4 sequence W using Chichi information criteriontDetermining order to obtain values of p and q;
a2-5 obtains the sequence W by approximate maximum likelihood estimationtAll parameters theta of1,θ2,...,θq,φ1,φ2,...,φp,σ2
A2-6 reaction of d, p, q, theta1,θ2,...,θq,φ1,φ2,...,φp,σ2And (4) substituting the FARIMA (p, d, q) model to obtain the FARIMA (p, d, q) model of the user service.
3. The prediction-based packet transmission method in a communication channel of claim 2, wherein the FARIMA (p, d, q) model is:
<math><mrow><mi>&Phi;</mi><mrow><mo>(</mo><mi>B</mi><mo>)</mo></mrow><msup><mo>&dtri;</mo><mi>d</mi></msup><msub><mi>X</mi><mi>t</mi></msub><mo>=</mo><mi>&Theta;</mi><mrow><mo>(</mo><mi>B</mi><mo>)</mo></mrow><msub><mi>a</mi><mi>t</mi></msub></mrow></math>
wherein, XtThe user service packet arrival time sequence is represented by t, d is a difference order, d belongs to (-0.5, 0.5), p is an autoregressive order, q is a moving average order, p and q are non-negative integers, atIs one zeroMean and variance σ2And:
Φ(B)=1-φ1B-φ2B2...-φpBp
Θ(B)=1-θ1B-θ2B2-...-θqBq
where Φ (B) and Θ (B) are complex variable polynomials with no common solution, and in addition Φ (B) is represented on the unit disk { B: no solution exists in the condition that B is less than or equal to 1; b is a backward shift operator, i.e. BXt=Xt-1(ii) a Definition of
Figure FDA0000035850370000023
In order to be a difference operator, the difference operator,
Figure FDA0000035850370000024
is a fractional difference operator, the binomial expansion of which is:
<math><mrow><msup><mo>&dtri;</mo><mi>d</mi></msup><mo>=</mo><msup><mrow><mo>(</mo><mn>1</mn><mo>-</mo><mi>B</mi><mo>)</mo></mrow><mi>d</mi></msup><mo>=</mo><munderover><mi>&Sigma;</mi><mrow><mi>n</mi><mo>=</mo><mn>0</mn></mrow><mo>&infin;</mo></munderover><mfenced open='|' close='|'><mtable><mtr><mtd><mi>d</mi></mtd></mtr><mtr><mtd><mi>n</mi></mtd></mtr></mtable></mfenced><msup><mrow><mo>(</mo><mo>-</mo><mi>B</mi><mo>)</mo></mrow><mi>n</mi></msup></mrow></math>
wherein, <math><mrow><mrow><mfenced open='|' close='|'><mtable><mtr><mtd><mi>d</mi></mtd></mtr><mtr><mtd><mi>n</mi></mtd></mtr></mtable></mfenced><mo>=</mo><mi>&Gamma;</mi><mrow><mo>(</mo><mi>d</mi><mo>+</mo><mn>1</mn><mo>)</mo></mrow><mo>/</mo><mo>[</mo><mi>&Gamma;</mi><mrow><mo>(</mo><mi>n</mi><mo>+</mo><mn>1</mn><mo>)</mo></mrow><mi>&Gamma;</mi><mrow><mo>(</mo><mi>d</mi><mo>-</mo><mi>n</mi><mo>+</mo><mn>1</mn><mo>)</mo></mrow><mo>]</mo></mrow><mo>;</mo></mrow></math>
where n is a temporary variable and Γ represents a gamma function, defined as:
<math><mrow><mi>&Gamma;</mi><mrow><mo>(</mo><mi>x</mi><mo>)</mo></mrow><mo>=</mo><msubsup><mo>&Integral;</mo><mn>0</mn><mo>&infin;</mo></msubsup><msup><mi>e</mi><mrow><mo>-</mo><mi>t</mi></mrow></msup><msup><mi>t</mi><mrow><mi>x</mi><mo>-</mo><mn>1</mn></mrow></msup><mi>dt</mi><mo>=</mo><mrow><mo>(</mo><mi>x</mi><mo>-</mo><mn>1</mn><mo>)</mo></mrow><mi>&Gamma;</mi><mrow><mo>(</mo><mi>x</mi><mo>-</mo><mn>1</mn><mo>)</mo></mrow><mo>,</mo><mi>x</mi><mo>></mo><mn>0</mn><mo>,</mo></mrow></math> thus:
<math><mrow><msup><mo>&dtri;</mo><mi>d</mi></msup><mo>=</mo><msup><mrow><mo>(</mo><mn>1</mn><mo>-</mo><mi>B</mi><mo>)</mo></mrow><mi>d</mi></msup><mo>=</mo><msubsup><mi>&Sigma;</mi><mrow><mi>n</mi><mo>=</mo><mn>0</mn></mrow><mo>&infin;</mo></msubsup><mi>g</mi><mrow><mo>(</mo><mi>n</mi><mo>)</mo></mrow><msup><mi>B</mi><mi>n</mi></msup><mo>,</mo></mrow></math> wherein g (n) is defined as:
g(0)≡1,g(1)=-d,g(n)=g(n-1)*(n-1-d)/n。
4. the prediction-based packet transmission method in a communication channel of claim 3, wherein the arrival time of the next user traffic packet is predicted in step a3 by a FARIMA (p, d, q) model
Figure FDA0000035850370000032
The method comprises the following steps:
using the obtained
Figure FDA0000035850370000033
Can obtain
Figure FDA0000035850370000034
<math><mrow><msub><mover><mi>X</mi><mo>^</mo></mover><mi>t</mi></msub><mrow><mo>(</mo><mn>1</mn><mo>)</mo></mrow><mo>=</mo><mo>-</mo><msubsup><mi>&Sigma;</mi><mrow><mi>m</mi><mo>=</mo><mn>1</mn></mrow><mo>&infin;</mo></msubsup><mi>g</mi><mrow><mo>(</mo><mi>k</mi><mo>)</mo></mrow><msub><mover><mi>X</mi><mo>^</mo></mover><mi>t</mi></msub><mrow><mo>(</mo><mn>1</mn><mo>-</mo><mi>m</mi><mo>)</mo></mrow><mo>+</mo><msubsup><mi>&Sigma;</mi><mrow><mi>i</mi><mo>=</mo><mn>1</mn></mrow><mi>p</mi></msubsup><msub><mi>&phi;</mi><mi>i</mi></msub><msub><mover><mi>W</mi><mo>^</mo></mover><mrow><mi>t</mi><mo>+</mo><mn>1</mn><mo>-</mo><mi>i</mi></mrow></msub><mo>+</mo><msubsup><mi>&Sigma;</mi><mrow><mi>j</mi><mo>=</mo><mn>1</mn></mrow><mi>q</mi></msubsup><msub><mi>&theta;</mi><mi>j</mi></msub><msub><mi>a</mi><mrow><mi>t</mi><mo>+</mo><mn>1</mn><mo>-</mo><mi>j</mi></mrow></msub></mrow></math>
Wherein m, i and j are temporary variables;
W ^ t ( 1 ) = E ( W t + 1 )
<math><mrow><mo>=</mo><mi>E</mi><mrow><mo>(</mo><msub><mi>&phi;</mi><mn>1</mn></msub><msub><mi>W</mi><mi>t</mi></msub><mo>+</mo><msub><mi>&phi;</mi><mn>2</mn></msub><msub><mi>W</mi><mrow><mi>t</mi><mo>-</mo><mn>1</mn></mrow></msub><mo>+</mo><mi>L</mi><mo>+</mo><msub><mi>&phi;</mi><mi>p</mi></msub><msub><mi>W</mi><mrow><mi>t</mi><mo>-</mo><mi>p</mi><mo>+</mo><mn>1</mn></mrow></msub><mo>+</mo><msub><mi>a</mi><mrow><mi>t</mi><mo>+</mo><mn>1</mn></mrow></msub><mo>-</mo><msub><mi>&theta;</mi><mn>1</mn></msub><msub><mi>a</mi><mi>t</mi></msub><mo>-</mo><msub><mi>&theta;</mi><mn>2</mn></msub><msub><mi>a</mi><mrow><mi>t</mi><mo>-</mo><mn>1</mn></mrow></msub><mo>-</mo><mi>L</mi><mo>-</mo><msub><mi>&theta;</mi><mi>q</mi></msub><msub><mi>a</mi><mrow><mi>t</mi><mo>-</mo><mi>q</mi><mo>+</mo><mn>1</mn></mrow></msub><mo>)</mo></mrow></mrow></math>
<math><mrow><mo>=</mo><msub><mi>&phi;</mi><mn>1</mn></msub><msub><mi>W</mi><mi>t</mi></msub><mo>+</mo><msub><mi>&phi;</mi><mn>2</mn></msub><msub><mi>W</mi><mrow><mi>t</mi><mo>-</mo><mn>1</mn></mrow></msub><mo>+</mo><mi>L</mi><mo>+</mo><msub><mi>&phi;</mi><mi>p</mi></msub><msub><mi>W</mi><mrow><mi>t</mi><mo>-</mo><mi>p</mi><mo>+</mo><mn>1</mn></mrow></msub><mo>-</mo><msub><mi>&theta;</mi><mn>1</mn></msub><msub><mi>a</mi><mi>t</mi></msub><mo>-</mo><msub><mi>&theta;</mi><mn>2</mn></msub><msub><mi>a</mi><mrow><mi>t</mi><mo>-</mo><mn>1</mn></mrow></msub><mo>-</mo><mi>L</mi><mo>-</mo><msub><mi>&theta;</mi><mi>q</mi></msub><msub><mi>a</mi><mrow><mi>t</mi><mo>-</mo><mi>q</mi><mo>+</mo><mn>1</mn></mrow></msub></mrow></math>
CN2010105711938A 2010-12-02 2010-12-02 Packet sending method based on prediction in communication channel Pending CN102036255A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2010105711938A CN102036255A (en) 2010-12-02 2010-12-02 Packet sending method based on prediction in communication channel

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2010105711938A CN102036255A (en) 2010-12-02 2010-12-02 Packet sending method based on prediction in communication channel

Publications (1)

Publication Number Publication Date
CN102036255A true CN102036255A (en) 2011-04-27

Family

ID=43888418

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2010105711938A Pending CN102036255A (en) 2010-12-02 2010-12-02 Packet sending method based on prediction in communication channel

Country Status (1)

Country Link
CN (1) CN102036255A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109525366A (en) * 2018-11-12 2019-03-26 内蒙古方向图科技有限公司 A method of transmission data

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101232438A (en) * 2007-01-26 2008-07-30 华为技术有限公司 Method for implementing outburst packet delay and core node
EP2061174A1 (en) * 2006-09-06 2009-05-20 Sony Corporation Data communication system, data sending apparatus, data sending method, data receiving apparatus, and data receiving method
CN101599871A (en) * 2009-05-27 2009-12-09 南京欣网视讯科技股份有限公司 A kind of SFARIMA network flow prediction method
CN101682401A (en) * 2007-05-11 2010-03-24 微软公司 Channel control based on error correction values
CN101742570A (en) * 2009-12-29 2010-06-16 浙江大学 Distributed packet access method based on no-rate codes in cognitive radio

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2061174A1 (en) * 2006-09-06 2009-05-20 Sony Corporation Data communication system, data sending apparatus, data sending method, data receiving apparatus, and data receiving method
CN101232438A (en) * 2007-01-26 2008-07-30 华为技术有限公司 Method for implementing outburst packet delay and core node
CN101682401A (en) * 2007-05-11 2010-03-24 微软公司 Channel control based on error correction values
CN101599871A (en) * 2009-05-27 2009-12-09 南京欣网视讯科技股份有限公司 A kind of SFARIMA network flow prediction method
CN101742570A (en) * 2009-12-29 2010-06-16 浙江大学 Distributed packet access method based on no-rate codes in cognitive radio

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109525366A (en) * 2018-11-12 2019-03-26 内蒙古方向图科技有限公司 A method of transmission data
CN109525366B (en) * 2018-11-12 2021-02-26 内蒙古方向图科技有限公司 Method for transmitting data

Similar Documents

Publication Publication Date Title
Ni et al. Q-CSMA: Queue-length-based CSMA/CA algorithms for achieving maximum throughput and low delay in wireless networks
Malone et al. Modeling the 802.11 distributed coordination function in nonsaturated heterogeneous conditions
Chung et al. Performance analysis of HomePlug 1.0 MAC with CSMA/CA
Tadayon et al. Modeling and analysis of cognitive radio based IEEE 802.22 wireless regional area networks
Barcelo et al. Towards a collision-free WLAN: Dynamic parameter adjustment in CSMA/E2CA
Huang et al. Multi-hop D2D communications with network coding: From a performance perspective
Kafaie et al. Performance analysis of network coding with IEEE 802.11 DCF in multi-hop wireless networks
Chen et al. Digital network coding aided two-way relaying: Energy minimization and queue analysis
Kosek-Szott A comprehensive analysis of IEEE 802.11 DCF heterogeneous traffic sources
Kim et al. Design and analysis of medium access protocol: Throughput and short-term fairness perspective
Kuo et al. A CSMA-based MAC protocol for WLANs with automatic synchronization capability to provide hard quality of service guarantees
Li et al. Analysis of the IEEE 802.11 DCF with service differentiation support in non-saturation conditions
Khodaian et al. Delay-constrained utility maximisation in multi-hop random access networks
CN102036255A (en) Packet sending method based on prediction in communication channel
Murad et al. Collision tolerance and throughput gain in full-duplex IEEE 802.11 DCF
Ali et al. Delay-oriented spectrum sharing and traffic offloading in coexisting UAV-enabled cellular and WiFi networks
Kim et al. Adaptive transmission control for uplink/downlink fairness in unsaturated CSMA networks
Zhang et al. Performance analysis of IEEE 802.11 DCF under different channel conditions
Li et al. Opportunistic broadcast of emergency messages in vehicular ad hoc networks with unreliable links
Vishnevsky et al. Estimation of IEEE 802.11 DCF access performance in wireless networks with linear topology using PH service time approximations and MAP input
Mirrezaei et al. Performance analysis of network coding based two-way relay wireless networks deploying IEEE 802.11
Sagduyu et al. Throughput and stability of digital and analog network coding for wireless networks with single and multiple relays
Torabkhani et al. Delay analysis of bursty traffic in finite-buffer disruption-tolerant networks with two-hop routing
Chao et al. Energy-efficient broadcast in multihop cognitive radio networks
Liu et al. A dynamic admission control scheme for QoS supporting in IEEE 802.11 e EDCA

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20110427