Nothing Special   »   [go: up one dir, main page]

CN113596896A - Method and device for detecting Wi-Fi equipment - Google Patents

Method and device for detecting Wi-Fi equipment Download PDF

Info

Publication number
CN113596896A
CN113596896A CN202010367214.8A CN202010367214A CN113596896A CN 113596896 A CN113596896 A CN 113596896A CN 202010367214 A CN202010367214 A CN 202010367214A CN 113596896 A CN113596896 A CN 113596896A
Authority
CN
China
Prior art keywords
duration
specified
service type
parameter value
equipment
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010367214.8A
Other languages
Chinese (zh)
Inventor
赵望生
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Technologies Co Ltd
Original Assignee
Huawei Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co Ltd filed Critical Huawei Technologies Co Ltd
Priority to CN202010367214.8A priority Critical patent/CN113596896A/en
Publication of CN113596896A publication Critical patent/CN113596896A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W24/00Supervisory, monitoring or testing arrangements
    • H04W24/08Testing, supervising or monitoring using real traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W74/00Wireless channel access
    • H04W74/08Non-scheduled access, e.g. ALOHA
    • H04W74/0833Random access procedures, e.g. with 4-step access
    • H04W74/0841Random access procedures, e.g. with 4-step access with collision treatment
    • H04W74/085Random access procedures, e.g. with 4-step access with collision treatment collision avoidance

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The application provides a method and a device for detecting Wi-Fi equipment, wherein the method comprises the following steps: monitoring a data transmission process on the air interface resource, and acquiring a plurality of detection results corresponding to a plurality of first sending records of data of a specified service type sent by specified Wi-Fi equipment; wherein each of the detection results comprises: on the air interface resource, before the first sending record, the air interface resource is continuously in a first time length Tn of an idle state; and if the first duration Tn is less than the first preset duration, indicating that the fixed back-off time parameter value corresponding to the specified service type on the specified Wi-Fi equipment is an unreasonable parameter value. The embodiment of the application can detect whether the designated Wi-Fi equipment adopts the unreasonable time parameter value on the designated service type, has high detection precision, simple operation and strong applicability, and is beneficial to optimizing the network environment.

Description

Method and device for detecting Wi-Fi equipment
Technical Field
The present application relates to the field of communications technologies, and in particular, to a method and an apparatus for detecting Wi-Fi devices.
Background
When the Wi-Fi (Wireless Fidelity) equipment sends information, whether an air interface is idle or not needs to be detected, if the air interface is busy, the information cannot be sent, and if the air interface is idle, the Wi-Fi equipment needs to wait for a period of time until no other Wi-Fi equipment occupies the air interface in the waiting period of time.
In order to meet the priority requirements of different services, the current protocol defines that a service with a high priority has less waiting time, so that the service with the high priority can be sent before the service with the low priority after an air interface is idle. Specifically, the waiting time is determined by an inter-frame interval and a random back-off time corresponding to different services defined by a protocol.
At present, some Wi-Fi devices can modify their own competition time parameters by illegal setting, so that the inter-frame interval and/or random backoff time of the Wi-Fi devices are determined to be shorter, and empty resources can be preempted by other nodes to send data, thereby affecting timeliness and fairness of other Wi-Fi devices for sending service data, and affecting service processing performance of other Wi-Fi devices for processing high-priority services.
In summary, how to detect whether there is an air interface resource shared by improper competition among Wi-Fi devices due to malicious modification of a random competition time parameter of the Wi-Fi devices is a problem to be solved.
Disclosure of Invention
The application provides a method and a device for detecting Wi-Fi equipment, which are used for detecting whether the Wi-Fi equipment uses an illegal random competition time parameter.
In a first aspect, an embodiment of the present application provides a method for detecting a Wi-Fi device, where the method may be implemented by a terminal device, or may be implemented by a component inside the terminal device, such as a processing device, a circuit, and a chip in the terminal device. The method comprises the following steps: monitoring a data transmission process on the air interface resource, and acquiring a plurality of detection results corresponding to a plurality of first sending records of data of a specified service type sent by specified Wi-Fi equipment; wherein each of the detection results comprises: on the air interface resource, before the first sending record, the air interface resource is continuously in a first time length Tn of an idle state; and if the first duration Tn is less than the first preset duration, indicating that the fixed back-off time parameter value corresponding to the specified service type on the specified Wi-Fi equipment is an unreasonable parameter value.
By the method, the embodiment of the application judges whether the fixed back-off time parameter value corresponding to the specified service type of the specified Wi-Fi equipment adopts an unreasonable parameter value or not by detecting the specified Wi-Fi equipment for multiple times, is simple and convenient to operate, high in precision and strong in applicability, and is beneficial to optimizing the network environment.
In one possible design, each of the detection results may further include: between the first sending record and the last sending record of the designated Wi-Fi device, the interval air interface resource is a first time length Ti which lasts in an idle state, wherein i is any integer in (1,2.. n), and n is the number of times the air interface resource is in the idle state; determining a second time length corresponding to each detection result in the plurality of detection results, wherein the second time length is according to the first time length T contained in the corresponding detection resultiAnd determining the first preset time length; and if the determined average value of the plurality of second time lengths is less than a second preset time length, indicating that the random back-off time range value corresponding to the specified service type on the specified Wi-Fi equipment is an unreasonable parameter value.
By the method, whether the random back-off time parameter value corresponding to the specified service type of the specified Wi-Fi equipment adopts an unreasonable parameter value or not is judged by detecting the specified Wi-Fi equipment for multiple times, so that the method is simple and convenient to operate, high in applicability and beneficial to optimizing the network environment.
In a possible design, the second duration corresponding to each of the detection results may conform to the following formula:
Figure BDA0002476919040000021
where max (Ti — first preset time period, 0) represents taking the larger of (Ti — first preset time period) and 0.
By the method, if the interval duration Ti is less than the first preset duration, 0 is selected in the interval, so that data which can be used for calculating the second duration are screened, and the accuracy of calculating the second duration is improved.
In a possible design, the second preset duration may be determined according to the specified service type; the second preset time duration may also be determined according to the specified service type and the sent times when the sent times of the data sent by the specified Wi-Fi device recorded in the first sending record are the same in any two times. Optionally, the number of PPDUs sent by the designated Wi-Fi device recorded in the first sending record is one or more, and the number of times that the first PPDU sent by the designated Wi-Fi device recorded in any two times of the first sending records has been sent is the same.
By the method, the second preset time length is determined by the appointed service type, the second preset time length can be used for judging whether the random back-off time range corresponding to the appointed service type on the appointed Wi-Fi equipment is an unreasonable parameter value or not, and the second preset time length can be determined according to the service type of the data sent by the appointed Wi-Fi equipment and the sent times of the data because the random back-off time ranges corresponding to the different sent times are possibly different, so that the detection precision is improved.
In one possible design, further comprising: if the first sending record records that the designated Wi-Fi device sends at least two Presentation Protocol Data Units (PPDUs), and the interval duration between any two adjacent PPDUs in the at least two PPDUs is not greater than the first preset duration, determining that the first sending record is a continuous sending operation.
By the method, after the continuous sending operation of the designated Wi-Fi equipment is determined, the duration length parameter value corresponding to the continuous sending operation can be detected so as to judge whether the duration length parameter value corresponding to the designated service type on the designated Wi-Fi equipment is an unreasonable parameter value.
In one possible design, if the first transmission record is a continuous transmission operation; the detection result may further include: a third duration for the continuous sending operation to send multiple PPDUs; if the third duration is longer than the third preset duration, the duration length parameter value corresponding to the specified service type on the specified Wi-Fi device may also be indicated as an unreasonable parameter value.
By the method, whether the duration length parameter value corresponding to the specified service type of the specified Wi-Fi equipment adopts an unreasonable parameter value or not is judged by detecting the third time length for sending the plurality of PPDUs through the continuous sending operation of the specified Wi-Fi equipment, so that the method is high in applicability, wide in detection range and beneficial to optimizing the network environment.
In one possible design, the detection result may further include: the fourth time length for the designated Wi-Fi equipment to send any PPDU recorded in the first sending record; and according to the fourth duration and a fourth preset duration corresponding to the service type, whether a single PPDU duration value corresponding to the service type on the specified Wi-Fi equipment is an unreasonable parameter value can be judged.
Illustratively, the determining, according to the fourth duration and a fourth preset duration corresponding to the service type, whether a single PPDU duration value corresponding to the service type on the specified Wi-Fi device is an unreasonable parameter value may be that, when the fourth duration is longer than the fourth preset duration, the single PPDU duration value corresponding to the specified service type on the specified Wi-Fi device is indicated as an unreasonable parameter value.
By the method, whether the single PPDU time length parameter value corresponding to the specified service type of the specified Wi-Fi equipment adopts an unreasonable parameter value or not is judged by detecting the fourth time length of the single PPDU sent in the first sending record of the specified Wi-Fi equipment, and the method is wide in detection range, high in detection precision and strong in applicability.
In a second aspect, an embodiment of the present application provides an apparatus for detecting a Wi-Fi device, where the apparatus has a function of a terminal device in any possible implementation method for implementing the foregoing aspects and aspects. The functions can be realized by hardware, and the functions can also be realized by executing corresponding software by hardware. The hardware or software includes one or more modules corresponding to the above-described functions.
In one possible implementation, the apparatus may be a chip or an integrated circuit.
In one possible implementation, the apparatus includes: a memory, a transceiver, and a processor; the memory stores one or more sets of programs or instructions, and the processor is used for calling one or more sets of programs or instructions to execute the operation of the terminal device in any possible implementation method of the aspects through the transceiver.
In a third aspect, a computer-readable storage medium is provided, which stores computer-readable instructions that, when read and executed by a computer, enable the computer to perform the operations of the terminal device in any of the possible implementations of the above aspects and aspects.
In a fourth aspect, a computer program product is provided, which when read and executed by a computer, enables the computer to perform the operations of the terminal device in any of the possible implementations of the above aspects and aspects.
In a fifth aspect, a chip is provided, which is coupled to a memory and configured to read and execute a software program stored in the memory so as to implement the operation of the terminal device in any one of the above-mentioned first aspect and possible implementations of the first aspect.
In addition, for technical effects brought by any one implementation manner of the second aspect to the fifth aspect, reference may be made to technical effects brought by different implementation manners of the first aspect, and details are not described here.
Drawings
Fig. 1 is a schematic diagram of a system architecture according to an embodiment of the present application;
FIG. 2 is a schematic diagram of an application of a partial interframe space provided in the present application;
FIG. 3 is a schematic view of an application scenario of Wi-Fi communication in a distributed network according to the present application;
FIG. 4 is a schematic diagram of an application scenario of an AIFS [ AC ] provided in the present application;
FIG. 5 is a schematic view of a scenario of a Wi-Fi device continuously transmitting operation provided in the present application;
fig. 6 is a schematic view illustrating a value of a backoff window during data retransmission according to the present application;
fig. 7 is a flowchart illustrating a method for detecting a Wi-Fi device according to an embodiment of the present application;
FIG. 8 is a schematic diagram of a data transmission process of a specific Wi-Fi device according to an embodiment of the present disclosure;
FIG. 9 is a flowchart illustrating another method for detecting a Wi-Fi device according to an embodiment of the present disclosure;
fig. 10 is a schematic structural diagram of an apparatus for detecting a Wi-Fi device according to an embodiment of the present application;
fig. 11 is a schematic structural diagram of an apparatus for detecting a Wi-Fi device according to an embodiment of the present application.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more clear, the present application will be further described in detail with reference to the accompanying drawings. The particular methods of operation in the method embodiments may also be applied in device embodiments or system embodiments.
Please refer to fig. 1, which is a schematic diagram of a communication system according to the present application. The communication system may include one or more wireless Access Points (APs) and one or more wireless Stations (STAs). The connection mode between the wireless station and the wireless access point is Wireless Local Area Network (WLAN) connection. Wherein the wireless local area network connection may comprise a WiFi connection.
The AP may be a router, or may be other terminals or electronic devices with WiFi access functionality.
The STA may also be a terminal device having a wireless transceiving function. The terminal device may be simply referred to as a terminal. The terminal device may be a User Equipment (UE) including a handheld device, a vehicle-mounted device, a wearable device, or a computing device having wireless communication capabilities. Illustratively, the UE may be a mobile phone (mobile phone), a tablet computer, or a computer with wireless transceiving function. The terminal device may also be a Virtual Reality (VR) terminal device, an Augmented Reality (AR) terminal device, a wireless terminal in industrial control, a wireless terminal in unmanned driving, a wireless terminal in telemedicine, a wireless terminal in smart grid, a wireless terminal in smart city (smart city), and/or a wireless terminal in smart home (smart home), and so on.
The AP in the WLAN communication system is adjacent to the AP, and 1 AP may access 1 or more STAs. Between the STA and the STA, and between the AP and the AP, it is necessary to acquire air interface resources for data transmission in a contention mode based on contention time parameters specified by a standard, where this data transmission mode may also be referred to as contention-based transmission.
Hereinafter, some terms in the embodiments of the present application are explained to facilitate understanding by those skilled in the art.
A transmission medium
The transmission medium refers to a carrier for transmitting information in a network, and may also be referred to as a transmission medium, specifically, a channel, and may also be referred to as an air interface resource. For example, the air interface resource may be divided into an "idle" state and a "busy" state according to whether the air interface resource is used for information transmission, where the idle state refers to that the air interface resource is not used for information transmission, and the busy state refers to that the air interface resource is being used for information transmission or during a period in which the node uses the air interface resource to perform a continuous transmission operation. Optionally, "busy" may be simply referred to as "busy", and both are the same concept, and the two terms may be interchanged. The way for the Wi-Fi device to monitor the air interface may be to detect whether air interface resources are idle through direct carrier sensing of a physical layer, which is implemented based on the prior art and is not described in detail herein.
Competitive transmission between two, Wi-Fi devices
For example, according to the standard (e.g., IEEE802.11), all Wi-Fi devices in the WLAN communication system that want to send data need to wait for a period of time, and the Wi-Fi devices monitor whether an air interface resource is continuously idle during the waiting period of time, and can use the air interface resource to send data only if the air interface resource is continuously idle, and the waiting period of time is determined by an Inter Frame Space (IFS) and a random back-off time (backoff time).
Where IFS is expressed in units of time, several inter-frame spaces are exemplarily listed below:
SIFS (short IFS), DIFS (distributed inter frame space), AIFS (arbitrated inter frame space).
Referring to fig. 2, a schematic view of an application scenario of the partial inter-frame interval provided in the present application is shown, and the following describes the partial inter-frame interval in reference to fig. 2:
(1) SIFS, which is suitable for high priority transmission scenarios, may be used to space frames that require immediate response, e.g., control frames (RTS, CTS, ACK, etc.).
(2) DIFS, which is suitable for contention based transmission, may be used by nodes operating in a Distributed Coordination Function (DCF) mode, in a DCF operating mode, because each node does not know whether another node has data to send, and the time lengths of the DIFS of each node in the operating mode are the same, when sending data, collision may occur, in order to reduce collision, each node enters a backoff window (or referred to as a contention window) after waiting for one DIFS, the time length of the backoff window may be referred to as a random backoff time, that is, after waiting for one DIFS, a node to send data needs to wait for a random backoff time, which is randomly generated by each node itself, so that the probability of each node colliding again is greatly reduced.
For example, referring to fig. 3, fig. 3 is a schematic view of an application scenario of SIFS and DIFS provided in the present application, and in fig. 3, a source node contends to an air interface resource to send a first frame (data) to a target node. Accordingly, after the destination node correctly receives the data frame, it may send an acknowledgement frame ACK to the source node after waiting for a SIFS. In fact, the SIFS duration is the time required for the source node to switch from the transmitting state to the receiving state and for the target node to decode the received data correctly.
In fig. 3, when other nodes have a data transmission requirement, they also need to detect the air interface resource, and when other nodes detect that the air interface resource is converted from a busy state to an idle state, if the other nodes monitor that the air interface resource is continuously in the idle state within DIFS and random backoff time (backoff window), the node may send the next frame after the random backoff time expires.
The DIFS is a fixed back-off time, the time corresponding to the back-off window is a random back-off time, and in the DCF working mode, the DIFS used by each node is the same, and cannot meet the access requirements of data services with different priorities, so the AIFS is generated at the discretion.
(3) The AIFS is suitable for competitive transmission and is used by nodes in a hybrid coordination working mode. Illustratively, the AIFS has four Access Categories (AC) to provide prioritized access support for different data services, respectively: AC _ VO, AC _ VI, AC _ BE and AC _ BK, wherein AC _ VO represents a voice class, AC _ VI represents a video class, AC _ BE represents a best effort class and AC _ BK represents a background class.
As shown in fig. 4, AIFS [ AC ] has different lengths according to the types of AC, and has different priorities for each service type, with the length of the corresponding AIFS being shorter as the priority is higher.
Similarly, in this operation mode, when detecting that the air interface resource is changed from a busy state to an idle state, the node to send data needs to wait for a random backoff time in addition to the AIFS [ AC ] (fixed backoff time).
It should be noted that SIFS is an inter-frame interval of continuous transmission, and during a period of continuous transmission operation by a node, other nodes all consider that the air interface resource is busy, and the continuous transmission operation is described below.
Four, continuous send operation
As shown in fig. 5, one continuous transmission operation refers to that the Wi-Fi device continuously transmits at least two Presentation Protocol Data Units (PPDUs), and, for example, a process of continuously transmitting a plurality of PPDUs may include: the sending node sends the 1 st PPDU, receives feedback information (ACK shown in fig. 5) from the opposite node after an SIFS interval, and if the sending node has data to be transmitted, the sending node may continue to send a second PPDU after the SIFS interval until the total duration for sending the multiple PPDUs reaches a total duration value of continuous sending operation defined by a standard.
Wherein a duration for which the continuous transmission operation transmits the plurality of PPDUs is determined by a TXOPlimit (TXOP duration) parameter value. Specifically, when TXOPlimit is 0, the Wi-Fi device can only transmit one PPDU at a time in a continuous transmission operation. If the TXOPLimit is not 0, the number of PPDUs transmitted by the Wi-Fi device in one continuous transmission operation is not limited, but the total duration of the one continuous transmission operation cannot exceed the corresponding value of the TXOPLimit. For example, with reference to table 1 below, TXOPLimit corresponding to AC _ BE is 2.528ms, and the total duration of one continuous transmission operation of the Wi-Fi device is 2.528ms at most.
It should be noted that the above is only an example, and not all Wi-Fi devices have the capability of continuously transmitting data frames after an interval of SIFS, and the interval between actually performing continuous transmission operations may be a duration slightly longer than SIFS. It can be understood that, if the duration of the interval between the two PPDUs sent by the Wi-Fi device is greater than the fixed inter-frame distance, it may be considered that the Wi-Fi device performs two air interface competitions to obtain the air interface resource for sending the PPDU, and the Wi-Fi device is not a continuous sending operation. In other words, if it is detected that the interval duration between two adjacent PPDUs transmitted by the Wi-Fi device should not be greater than the fixed backoff time, it is determined that the two adjacent PPDUs belong to the PPDU transmitted by the node through one continuous transmission operation. That is, if the interval duration between the two adjacent PPDUs is greater than the fixed backoff time, that is, the air interface resource of the last PPDU sent by the Wi-Fi device may be obtained by contention in a manner of waiting for the fixed backoff time and the random backoff time. It is understood that if the transmission operation is not a continuous transmission operation, it may be referred to as a discontinuous transmission operation.
It should be noted that the discontinuous transmission operation refers to a relationship between the two PPDUs, and after the Wi-Fi device performs the continuous transmission operation, the Wi-Fi device may contend for the air interface resource again in a contention manner, and after contending for the air interface resource again, the Wi-Fi device may still use the air interface resource to transmit 1 or continuously transmit multiple PPDUs.
It should be noted that, no matter the continuous transmission operation or the discontinuous transmission operation is performed, the time duration for the node to transmit one PPDU should not exceed the preset time duration for transmitting one PPDU defined by the standard.
Fifthly, competition time parameter
The contention time parameter refers to a time parameter for determining an inter-frame interval, a random backoff time, a total duration of continuous transmission, or a duration of transmitting a single PPDU, and includes, but is not limited to: AIFSN [ AC ], Cwmin [ AC ], CWmax [ AC ], and TXOPlimit.
Examples of partial contention time parameters are provided for the present application, as shown in tables 1 and 2 below.
TABLE 1
AC CWmin CWmax AIFSN TXOPlimit
AC_BK aCWmin aCWmax 7 2.528ms
AC_BE aCWmin aCWmax 3 2.528ms
AC_VI (aCWmin+1)/2-1 aCWmax 2 4.096ms
AC_VO (aCWmin+1)/4-1 (aCWmax+1)/2-1 2 2.080ms
TABLE 2
Characteriostic (parameter) Value
aSlotTime 2.4G is 20us or 9 us; 9us in 5G
aSIFSTime 2.4G for 10us and 5G for 16us
aCWmin
15
aCWmax 1023
The manner in which the AIFS [ AC ] and the random back-off time are determined is described below in conjunction with the contention time parameter values shown in tables 1 and 2 above.
(1) AIFS [ AC ] satisfies the following formula 1:
AIFS [ AC ] ═ AIFSN [ AC ] asslottime + aSIFSTime equation 1
As can be seen from table 2, in different communication systems (or frequency bands), aSlotTime and aSIFSTime have different time length values.
For example, assuming that a node a has a data transmission requirement, the node a operates in a 5G communication system (aSlotTime is 9us), and a traffic type of data sent by the node a is AC _ BE, a fixed backoff time for the node a to wait for sending the data of the traffic type is AIFS [ AC _ BE ] ═ 3 × 9+16 — 43 us.
Assuming that the random backoff time is 10 slots, before sending data, a node a needs to detect an air interface resource, when detecting that the air interface resource is in an idle state, the node a enters an AIFS, after waiting for the AIFS, that is, after 43us, the node a enters a backoff window, and after entering the backoff window, a backoff timer starts to time, illustratively, the backoff timer adopts a countdown mode, that is, in a scene, an initial value of the backoff timer is 10 slots, and every 1slot is counted, the backoff timer is decremented by 1slot, and when assuming that the backoff timer times to 8 slots, the air interface resource is preempted by a node B to send data, that is, when the node a detects that the air interface resource is in a busy state, the backoff timer of the node a stops timing.
Then, when waiting for the air interface resource to enter the idle state again, the node a still needs to monitor a DIFS again and then can enter the backoff window, and after entering the backoff window again, the backoff timer of the node a recovers the previous timing, that is, the duration of the backoff window at this time is the remaining duration (8 slots) of the previous timing, that is, when the node a needs to use the air interface resource, it needs to monitor a DIFS each time, but the random backoff time is an accumulated value, and after entering the backoff window again, the backoff timer of the node a recovers the previous timing, that is, in the above example, the backoff timer of the node a starts to continue timing from 8 slots until reaching 0, and if the air interface resource is continuously in the idle state within the 8 slots, the node a can preempt the air interface resource to send data.
In summary, when the node enters the backoff window, the backoff timer starts to count, and when the air interface resource is converted into the busy state, the backoff timer stops counting until the time when the air interface resource is converted into the idle state again reaches DIFS, and the backoff timer resumes counting. That is, if the air interface resource is occupied in the process of waiting for the random backoff time by the node, that is, the node does not compete for the air interface resource, when the air interface resource is released again, the node needs to wait for a DIFS again, then the backoff timer resumes timing, when the backoff timer completes timing, the node can use the air interface resource to send information, and when the backoff timer completes timing, the backoff timer is cleared.
The procedure for determining the random back-off time is described below.
(2) The random back-off time satisfies the following equation 2:
backoff Time () aSlotTime equation 2
And the Random generated by the node is a Random value. Illustratively, the range of the random value is [0, CW ], that is, the random value generated by the node is any value n in [0, CW ], and the corresponding random back-off time is a duration of n slots, and the random back-off time is described below in units of slots, that is, the range of the random back-off time is also [0, CW ].
Specifically, the CW is initially taken as CWmin, and is not increased until (CW +1) × 2-1 during retransmission until the CW is equal to CWmax; after successful transmission, the CW returns to CWmin. For example, taking AC _ BE as an example, for a sending node, when data to BE sent is first transmitted, CW takes CWmin, and as can BE known from table 1 and table 2, CWmin is acwmmin, acwmmin is 15, and a value range of a random value is [0, 15 ]; if the data needs to be retransmitted, when the data is transmitted for the second time, the CW takes (CW +1) × 2-1 ═ 15+1) × 2-1 ═ 31, that is, the range of the random value is [0, 31], and so on until the CW occupies the air interface resource before reaching CWmax, or the CW reaches CWmax, if the CW reaches CWmax, the value CWmax is repeated, and the CW returns to CWmin after the data is retransmitted successfully. As shown in fig. 6, CW is 15 for data transmission 1, 31 for data transmission 2 (retransmission), 63 for data transmission 3 (retransmission), and so on until CWmax is reached, where CWmax is assumed to be 255. It should be noted that 255 is merely an example, and the data is not the value of CWmax in table 1.
For the doubling reason, it can be understood that the reason that the node needs to retransmit may be a collision with another node, and the reason that the collision occurs may be that the random back-off time generated by the node and the node that has collided is the same, so after the value range of the random back-off time of the node is expanded, the probability that the node and the other node generate the same random number may be reduced, and the occurrence of the collision is reduced.
It should be noted that the above explanation is for the purpose of making the embodiments of the present application easier to understand, and should not be construed as limiting the scope of protection claimed in the present application.
At present, some Wi-Fi equipment can modify the self competition time parameter value through illegal setting, so that the Wi-Fi equipment can compete to an air interface resource to send data before other nodes, and the timeliness and fairness of other Wi-Fi equipment for sending service data are influenced. Therefore, detecting whether the contention time parameter value of the Wi-Fi device adopts an unreasonable parameter value is an urgent problem to be solved.
In view of this, the present application provides a method for detecting a Wi-Fi device, which may be used to simultaneously detect one Wi-Fi device or multiple Wi-Fi devices, and if multiple Wi-Fi devices are simultaneously detected, each Wi-Fi device may be independently detected by using the method in the embodiment of the present application.
[ EXAMPLES one ]
Fig. 7 is a flowchart illustrating a method for detecting a Wi-Fi device according to an embodiment of the present application, where as shown in fig. 5, the method includes the following steps:
step S701: monitoring a data transmission process on the air interface resource, and acquiring a plurality of detection results corresponding to a plurality of first sending records of data of a specified service type sent by specified Wi-Fi equipment; each detection result of the plurality of detection results comprises: on the air interface resource, before the first sending record, the air interface resource is continuously in the first duration Tn of the idle state.
Here, the transmission record may be understood that the Wi-Fi device performs one transmission operation, and the transmission operation may be a continuous transmission operation and does not indicate an operation of any PPDU transmitted in the continuous transmission operation. The sending operation may also be a discontinuous sending operation performed after contending for a single air interface resource, specifically, the first sending record is a sending operation and a sending record in the following text, which are the same concept, and both the sending operations may be replaced by sending records, which is not described repeatedly in the following embodiments.
As shown in fig. 8, a scene diagram for performing data transmission by competing for the same air interface resource for a plurality of Wi-Fi devices (including a designated Wi-Fi device) is provided in this embodiment of the present application.
Fig. 8 shows a schematic diagram of a part of a transmission operation of a specific Wi-Fi device, and for convenience of description, the transmission operation of the specific Wi-Fi device in fig. 8 is numbered, and includes, for example, a transmission operation 1, a transmission operation 2, a transmission operation 3, and a transmission operation 4, where, for example, each transmission operation of the specific Wi-Fi device in fig. 8 may transmit one or more PPDUs, specifically, a PPDU may include a frame header and a data part, and for example, the frame header may be used to carry information about parameters of a device identifier of the Wi-Fi device, a traffic type (e.g., an AC type) of data, a number of times the data has been transmitted, or TXOPLimit.
For convenience of introduction, assuming that the service types of the data sent by each sending operation in fig. 8 are all specified service types, the multiple sending operations of the specified Wi-Fi device in fig. 8 are detected, and the obtained multiple detection results include, but are not limited to: before the designated Wi-Fi device performs a sending operation, the air interface resource continues to be the first time length Tn of the idle state. That is, the test result of the transmission operation 1 includes T0, the test result 2 of the transmission operation 2 includes T3, the test result 3 of the transmission operation 3 includes T5, and the test result 3 of the transmission operation 4 includes T6.
Step S702: and if the first duration Tn is less than the first preset duration, indicating that the fixed back-off time parameter value corresponding to the specified service type on the specified Wi-Fi equipment is an unreasonable parameter value.
As described above, before sending data, the Wi-Fi device may send data only by continuously detecting that an air interface resource is in an idle state within a fixed back-off time (inter-frame interval) and a random back-off time.
For example, if the traffic type of the data sent by each sending operation of the specified Wi-Fi device shown in fig. 8 is AC _ BE, in one possible scenario, the random back-off time may BE 0. If the waiting time duration of the specified Wi-Fi device before the sending operation is less than a first preset time duration, for example, the first preset time duration is a fixed backoff time (e.g., AIFS [ AC _ BE ]) corresponding to a specified service type (e.g., AC _ BE) on the Wi-Fi device, and then the fixed backoff time parameter value corresponding to the specified service type on the specified Wi-Fi device is indicated as an unreasonable parameter value. As described above, in the 5G communication system, the AIFS [ AC _ BE ] is 43us, and if any one of the time durations of T0, T3, T5, or T6 is less than 43us, it indicates that the fixed back-off time corresponding to the traffic type AC _ BE on the Wi-Fi device is an unreasonable parameter value.
For example, the detection result may BE prompted by text, music, an indicator light, and the like, for example, when it is detected that Tn of the specified Wi-Fi device is smaller than AIFS [ AC ], a word such as "unreasonable fixed backoff time parameter value corresponding to the service type (e.g., AC _ BE)" is displayed, or a preset alarm music corresponding to unreasonable fixed backoff time parameter value corresponding to the service type is sent, and the like, which is not limited in this embodiment of the present application.
By the method, the embodiment of the application judges whether the fixed back-off time parameter value corresponding to the specified service type of the specified Wi-Fi equipment adopts an unreasonable parameter value or not by detecting the specified Wi-Fi equipment for multiple times, is simple and convenient to operate, high in precision and strong in applicability, and is beneficial to optimizing the network environment.
[ example two ]
In the second embodiment, the detection between the first sending operation for sending the specified service type and the last sending operation will be described as an example, and the times of sending the data sent in the first sending operation may be the same or different.
Referring to fig. 9, a flowchart corresponding to another method for detecting a Wi-Fi device according to an embodiment of the present application is shown in fig. 9, where the method includes the following steps:
step S901: monitoring the data transmission process on the air interface resource, detecting the first sending record and the last sending record of the designated Wi-Fi equipment to obtain a plurality of detection results, wherein each detection result comprises: and sending a first time length Ti for which the idle resource between two sending records is in an idle state continuously, wherein i is an arbitrary integer in the step (1,2.. n), and n is the total times of idle state occurrence of the idle resource.
With reference to fig. 8, a flow of detecting a transmission operation of a designated Wi-Fi device for transmitting data of a designated service type and a last transmission operation is described below, it should be understood that each of the diagonal boxes shown in fig. 8 represents a transmission operation of other Wi-Fi devices by using an air interface resource obtained by one contention, and the transmission operation may transmit one or more PPDUs, that is, the transmission operation represented by one diagonal box may be a discontinuous transmission operation or a continuous transmission operation, and the flow includes:
(1) detection of transmission operation 1 and transmission operation 2: between the sending operation 1 and the sending operation 2, the number of times that the air interface resources are in the idle state at intervals is 3, the duration of each time is T1, T2, and T3, and the detection result 1 includes T1, T2, and T3.
(2) Detection of transmission operation 2 and transmission operation 3: between the sending operation 2 and the sending operation 3, the number of times that the air interface resource is in the idle state is 2 times, the duration of each time is T4 and T5, respectively, and the detection result 2 includes T4 and T5.
(3) Detection of transmission operation 3 and transmission operation 4: between the sending operation 3 and the sending operation 4, the number of times that the air interface resource at the interval is in the idle state is 1 time, the corresponding duration is T6, and the detection result 3 includes T6.
Step S902: and determining a second time length corresponding to each detection result in the plurality of detection results.
Illustratively, the second time length corresponding to each of the detection results satisfies the following formula 3:
Figure BDA0002476919040000101
where max (Ti — first preset time period, 0) represents taking the larger of (Ti — first preset time period) and 0.
Illustratively, the second duration may be a random back-off time, and the first preset duration may be an interframe space AIFS [ AC ] corresponding to the specified traffic type [ AC ].
It can be understood that different types of ACs correspond to different AIFS [ ACs ], and a Wi-Fi device may be preempted air interface resources by other Wi-Fi devices (e.g., Wi-Fi devices with higher priority of a traffic type of transmitted data) during waiting for the AIFS [ AC ], in this scenario, the designated Wi-Fi device has not entered the backoff window, that is, the random backoff time has not started counting, and therefore, if the time that the air interface resources of an interval are in an idle state is less than the AIFS [ AC ], the entry is taken as 0 when calculating the second duration (random backoff time).
Taking the first preset time length as AIFS [ AC ] and the second time length as random back-off time as an example, a process of determining the random back-off time corresponding to the detection result is illustrated.
Assuming that the specified traffic type is AC _ BE, as mentioned above, the inter-frame space 43us corresponding to the specified traffic type is used. Suppose T1 is 60us, T2 is 79us, T3 is 58us, T4 is 56us, T5 is 68us, and T6 is 71 us.
The random Backoff Time corresponding to the detection result 1 is Max ((60-43),0) + Max ((79-43),0) + Max ((58-43),0) ═ 17+36+15 is 68 us.
The random back-off Time Backoff Time Max ((56-43),0) + Max ((68-43) ═ 13+25 ═ 38us corresponding to the detection result 2.
The random Backoff Time corresponding to the detection result 3 equals Max (71-43, 0) equals 28 us.
Step S903: and judging whether the random back-off time range value corresponding to the specified service type on the specified Wi-Fi equipment is an unreasonable parameter value or not according to a second time length and a second preset time length corresponding to a plurality of detection results.
The embodiment of the present application specifically describes a manner of determining a second duration and a second preset duration corresponding to a plurality of detection results.
The judgment method is as follows: judging according to the average value of the second time length corresponding to the plurality of detection results and a second preset time length;
according to the embodiment of the application, whether the random back-off time range value corresponding to the specified service type of the specified Wi-Fi equipment adopts an unreasonable parameter value or not can be judged according to the average value of the plurality of second time lengths and the second preset time length. Illustratively, if the determined average value of the plurality of second durations is smaller than a second preset duration, the random back-off time range value corresponding to the specified service type on the specified Wi-Fi device is indicated as an unreasonable parameter value. For convenience of understanding, the second duration is described as a random back-off time.
In a first optional implementation manner, in the embodiment of the present application, the second preset duration may be determined according to the specified service type. Taking AC _ BE as an example, the range of the random back-off Time Backoff Time [ AC _ BE ] of the data of the service type at the Time of the first transmission is [0, 15] (unit slot), and correspondingly, in the 5G communication system, the range of the duration (unit us) of the back-off window is [0, 135], and then the second preset duration may BE (1+2+3+ … +135)/135 ═ 68 and the following values. And if the average value of the second time lengths corresponding to the detection results is less than 68us, indicating that an unreasonable parameter value is adopted in the random backoff time range corresponding to the service type of the AC _ BE on the specified Wi-Fi equipment. For example, in the above example, the average value of the plurality of second time periods corresponding to the detection result 1 to the detection result 3 is: and (68+38+ 28)/3-44.67 us, assuming that the second preset duration is 68us and 44.67us < 68us, indicating that the random backoff time range corresponding to the AC _ BE service type on the specified Wi-Fi device adopts unreasonable parameter values.
It should be understood that the second preset time duration in the embodiment of the present application may be determined by monitoring and counting according to multiple sending operations of sending data of the specified service type by the Wi-Fi device without being tampered with the contention time parameter value, or may be determined by calculation, technical experience, or big data statistics, which is not limited in the embodiment of the present application.
It should be noted that, the above is only an example, in the present application, when detecting the transmission operation of the specified Wi-Fi device, the detection times may be preset, for example, 1000 times and 10000 times, and may also be set by the user, and may also be determined in other manners, for example, determined by the detection time, for example, the user sets a detection time, detects two adjacent transmission operations of the specified Wi-Fi device within the detection time, and stops the detection when the detection time expires. The setting mode and the detection times of the detection times are not limited in the embodiment of the application. It should be understood that within a certain range, the more times of detection, the higher the accuracy of the detection result.
In a second optional implementation manner, since the random back-off time range is also related to the number of times data has been sent, optionally, in order to improve the detection accuracy, the embodiment of the present application may further detect the number of times data has been sent in the first sending operation, and correspondingly, the second preset time duration may be determined according to the specified service type and the number of times data has been sent.
For example, the detection results may be divided according to the number of times that data has been sent by the first sending operation, the detection results with the same number of times that data has been sent are put together (referred to as a same group), a second duration corresponding to a plurality of detection results of the same group is determined, and an average value of the second duration is compared with a second preset duration corresponding to a random backoff time range corresponding to the same number of times that data has been sent and a specified service type. The sent times can be identified by numbers, letters, symbols, characters, or the like, taking numbers as an example, when the data is sent for the first time, the sent times of the data can be represented by 0 or 1, and the repeated sending times is added by 1 on the basis of the numerical value of the sent times sent for the first time.
For the determination of the second preset duration corresponding to the different sent times, please refer to the detailed description of the first determination method, which is not described herein again.
In another example, the second preset duration may be obtained by performing weighted calculation according to the number of times that the plurality of detection results include that the detection results have been sent and the number corresponding to the number of times, and a random back-off time range that is defined by a standard and corresponds to a specified service type and the number of times that the detection results have been sent.
And a second judgment mode: judging according to the distribution probability values of the second time length corresponding to the detection results;
the embodiment of the application can also judge that the designated Wi-Fi equipment adopts unreasonable parameter values in the range of the random back-off time corresponding to the designated service type according to the distribution probability of the random back-off time corresponding to the plurality of detection results and the value range of the random back-off time corresponding to the designated service type defined by the standard.
For example, the random back-off time range of data transmitted based on AIFS [ AC _ BE ] is [0, 15], and the probability of random to each value should BE the same. Correspondingly, the range of the duration (unit us) of the backoff window is [0, 135] us, the preset threshold range is assumed to BE [0, 63) us, the preset ratio is 0.5, and if the ratio of the number of the second durations in the [0, 63) us interval to the total number of the second durations in the plurality of second durations is greater than 0.5, the designated Wi-Fi device is indicated to adopt the unreasonable random backoff time range for the AC _ BE.
By the method, whether the random back-off time parameter value corresponding to the specified service type of the specified Wi-Fi equipment adopts an unreasonable parameter value or not is judged by detecting the specified Wi-Fi equipment for multiple times, so that the method is simple and convenient to operate, high in applicability and beneficial to optimizing the network environment.
[ EXAMPLE III ]
If the first sending operation of the designated Wi-Fi equipment sends at least two PPDUs and the interval duration between any two adjacent PPDUs in the at least two PPDUs is not greater than a first preset duration, determining that the first sending operation is a one-time continuous sending operation.
The embodiment of the application can also detect the continuous sending operation of the specified Wi-Fi equipment, and determine a third time length (total time length) for sending a plurality of PPDUs by the specified Wi-Fi equipment through one-time continuous sending operation.
And if the third duration is longer than a third preset duration, indicating that the duration length parameter value corresponding to the specified service type on the specified Wi-Fi equipment is an unreasonable parameter value.
For example, taking table 1 as an example, if the value of TXOPlimit corresponding to AC _ BE is 2.528ms, the third preset time duration may BE 2.528 ms. For example, referring to fig. 8, if the sending operation 1 in fig. 8 is a continuous sending operation, if the duration of the sending operation 1 is greater than 2.528ms, it indicates that the duration length parameter value corresponding to the AC _ BE service type on the specified Wi-Fi device is an unreasonable parameter value.
By the method, whether the duration length parameter value corresponding to the specified service type of the specified Wi-Fi equipment adopts an unreasonable parameter value or not is judged by detecting the third time length for sending the plurality of PPDUs through the continuous sending operation of the specified Wi-Fi equipment, so that the method is high in applicability, wide in detection range and beneficial to optimizing the network environment.
The method and the device for detecting the PPDU sent by the designated Wi-Fi equipment can also detect any one PPDU sent by the designated Wi-Fi equipment recorded in the first sending record of the designated Wi-Fi equipment, and obtain the fourth time length, recorded in the first sending record of the designated Wi-Fi equipment, of any one PPDU sent by the designated Wi-Fi equipment.
And if the fourth time length is longer than a fourth preset time length, indicating that a time length parameter value for sending a single PPDU corresponding to the specified service type on the specified Wi-Fi equipment is an unreasonable parameter value.
And the fourth preset time length is determined according to a time length parameter value of a single PPDU sent by the specified service type determined by the protocol standard.
By the method, whether the single PPDU time length parameter value corresponding to the specified service type of the specified Wi-Fi equipment adopts an unreasonable parameter value or not is judged by detecting the fourth time length of the single PPDU sent in the first sending record of the specified Wi-Fi equipment, and the method is wide in detection range, high in detection precision and strong in applicability.
The method in the foregoing embodiments may be implemented by a terminal device, and may also be implemented by a component of the terminal device, such as a processing device, a circuit, a chip, and the like in the terminal device. For ease of understanding, the terminal device will be referred to hereinafter as a detection device.
In the embodiments provided in the present application, the method provided in the embodiments of the present application is introduced from the perspective of interaction between the devices. In order to implement the functions in the method provided by the embodiment of the present application, the first terminal, the second terminal and the network device may include a hardware structure and/or a software module, and the functions are implemented in the form of a hardware structure, a software module, or a hardware structure and a software module. Whether any of the above-described functions is implemented as a hardware structure, a software module, or a hardware structure plus a software module depends upon the particular application and design constraints imposed on the technical solution.
The division of the modules in the embodiment of the present application is schematic, and is only a logic function division, and there may be another division manner in actual implementation. In addition, functional modules in the embodiments of the present application may be integrated into one processor, may exist alone physically, or two or more modules are integrated into one module. The integrated module can be realized in a hardware mode, and can also be realized in a software functional module mode.
Similar to the above concept, as shown in fig. 10, an embodiment of the present application further provides an apparatus 1000 for implementing the function of the first vehicle or the first terminal device in the above method. The device may be a software module or a system-on-a-chip, for example. In the embodiment of the present application, the chip system may be composed of a chip, and may also include a chip and other discrete devices. The apparatus 1000 may include: a processing unit 1001 and a transceiving unit 1002.
Hereinafter, a communication device according to an embodiment of the present application will be described in detail with reference to fig. 10 to 11. It should be understood that the description of the apparatus embodiments corresponds to the description of the method embodiments, and therefore, for brevity, details are not repeated here, since the details that are not described in detail may be referred to the above method embodiments.
In one possible design, the apparatus 1000 may implement steps or flows corresponding to those performed by the detection device in the above method embodiments, which are described separately below.
Illustratively, when the apparatus 1000 implements the functionality of the detection device in the preceding flow:
the receiving and sending unit 1002 is configured to monitor a data transmission process on an air interface resource, and obtain a plurality of detection results corresponding to a plurality of first sending records of data of a specified service type sent by a specified Wi-Fi device; wherein each of the detection results comprises: on the air interface resource, before the first sending record, the air interface resource is continuously in a first time length Tn of an idle state;
and the processing unit 1001 is configured to indicate that the fixed back-off time parameter value corresponding to the specified service type on the specified Wi-Fi device is an unreasonable parameter value when the first time length Tn is smaller than the first preset time length.
In a possible implementation, each of the detection results further includes: between the first sending record and the last sending record of the designated Wi-Fi device, the interval air interface resource is a first time length Ti which lasts in an idle state, wherein i is any integer in (1,2.. n), and n is the number of times the air interface resource is in the idle state;
the processing unit 1001 is further configured to determine a second duration corresponding to each of the plurality of detection results, where the second duration is according to the first duration T included in the corresponding detection resultiAnd determining the first preset time length; and if the determined average value of the plurality of second time lengths is less than a second preset time length, indicating that the random back-off time range value corresponding to the specified service type on the specified Wi-Fi equipment is an unreasonable parameter value.
In a possible implementation manner, the second duration corresponding to each of the detection results conforms to the following formula:
Figure BDA0002476919040000131
where max (Ti — first preset time period, 0) represents taking the larger of (Ti — first preset time period) and 0.
In a possible implementation manner, the second preset duration is determined according to the specified service type; or the sent times of the data sent by the specified Wi-Fi device in the first sending record in any two times are the same, and the second preset time length is determined according to the specified service type and the sent times.
In a possible implementation manner, the processing unit 1001 is further configured to determine that the designated Wi-Fi device sends the at least two PPDUs in the first sending record as a continuous sending operation if the first sending record records that the Wi-Fi device sends the at least two PPDUs and an interval duration between any two adjacent PPDUs in the at least two PPDUs is not greater than the first preset duration.
In a possible implementation manner, when the designated Wi-Fi device recorded in the first sending record sends the at least two PPDUs as a continuous sending operation; the detection result further comprises: a third duration for the continuous sending operation to send multiple PPDUs;
the processing unit is further to: and when the third duration is longer than the third preset duration, indicating that the duration length parameter value corresponding to the specified service type on the specified Wi-Fi equipment is an unreasonable parameter value.
In a possible implementation, the detection result further includes: the fourth time length for the designated Wi-Fi equipment to send any PPDU recorded in the first sending record;
the processing unit 1001 is further configured to determine, according to the fourth duration and a fourth preset duration corresponding to the service type, whether a single PPDU duration value corresponding to the service type on the specified Wi-Fi device is an unreasonable parameter value.
In a possible implementation manner, the processing unit 1001 is specifically configured to indicate, when the fourth duration is longer than the fourth preset duration, that a single PPDU duration value corresponding to the specified service type on the specified Wi-Fi device is an unreasonable parameter value.
As shown in fig. 11, which is a device 1100 provided in the embodiment of the present application, the device shown in fig. 11 may be implemented as a hardware circuit of the device shown in fig. 10. The communication device can be applied to the flow charts shown in fig. 7 and 9, and executes the functions executed by the main body in the method embodiment. For convenience of explanation, fig. 11 shows only the main components of the communication apparatus.
The apparatus 1100 shown in fig. 11 includes at least one processor 1120 for implementing any one of the methods of fig. 7 and 9 provided by the embodiments of the present application.
The apparatus 1100 may also include at least one memory 1130 for storing program instructions and/or data. A memory 1130 is coupled to the processor 1120. The coupling in the embodiments of the present application is an indirect coupling or a communication connection between devices, units or modules, and may be an electrical, mechanical or other form for information interaction between the devices, units or modules. The processor 1120 may operate in conjunction with the memory 1130. Processor 1120 may execute program instructions stored in memory 1130. At least one of the at least one memory may be included in the processor.
In implementation, the steps of the above method may be performed by integrated logic circuits of hardware in a processor or instructions in the form of software. The steps of the method disclosed in connection with the embodiments of the present application may be embodied as hardware processor, or may be implemented as a combination of hardware and software modules in a processor. The software module may be located in ram, flash memory, rom, prom, or eprom, registers, etc. storage media as is well known in the art. The storage medium is located in a memory, and a processor reads information in the memory and completes the steps of the method in combination with hardware of the processor. To avoid repetition, it is not described in detail here.
It should be noted that the processor in the embodiments of the present application may be an integrated circuit chip having signal processing capability. In implementation, the steps of the above method embodiments may be performed by integrated logic circuits of hardware in a processor or instructions in the form of software. The processor may be a general purpose processor, a Digital Signal Processing (DSP), an Application Specific Integrated Circuit (ASIC), a Field Programmable Gate Array (FPGA) or other programmable logic device, discrete gate or transistor logic device, or discrete hardware components. The various methods, steps, and logic blocks disclosed in the embodiments of the present application may be implemented or performed. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like. The steps of the method disclosed in connection with the embodiments of the present application may be embodied as being performed by a hardware decoding processor, or may be performed by a combination of hardware and software modules in the decoding processor. The software module may be located in ram, flash memory, rom, prom, or eprom, registers, etc. storage media as is well known in the art. The storage medium is located in a memory, and a processor reads information in the memory and completes the steps of the method in combination with hardware of the processor.
It will be appreciated that the memory in the embodiments of the subject application can be either volatile memory or nonvolatile memory, or can include both volatile and nonvolatile memory. The non-volatile memory may be a read-only memory (ROM), a Programmable ROM (PROM), an Erasable PROM (EPROM), an electrically Erasable EPROM (EEPROM), or a flash memory. Volatile memory can be Random Access Memory (RAM), which acts as external cache memory. By way of example, but not limitation, many forms of RAM are available, such as Static Random Access Memory (SRAM), Dynamic Random Access Memory (DRAM), Synchronous Dynamic Random Access Memory (SDRAM), double data rate SDRAM, enhanced SDRAM, SLDRAM, Synchronous Link DRAM (SLDRAM), and direct rambus RAM (DR RAM). It should be noted that the memory of the systems and methods described herein is intended to comprise, without being limited to, these and any other suitable types of memory.
Apparatus 1100 may also include a communication interface 1110 for communicating with other devices over a transmission medium such that the apparatus used in apparatus 1100 may communicate with other devices. In embodiments of the present application, the communication interface may be a transceiver, circuit, bus, module, or other type of communication interface. In the embodiment of the present application, when the communication interface is a transceiver, the transceiver may include an independent receiver and an independent transmitter; a transceiver that integrates transceiving functions, or an interface circuit may be used.
The apparatus 1100 may also include communication lines 1140. The communication interface 1110, the processor 1120, and the memory 1130 may be connected to each other via a communication line 1010; the communication line 1140 may be a Peripheral Component Interconnect (PCI) bus, an Extended Industry Standard Architecture (EISA) bus, or the like. The communication lines 1140 may be divided into an address bus, a data bus, a control bus, and the like. For ease of illustration, only one thick line is shown in FIG. 11, but this is not intended to represent only one bus or type of bus.
Other methods performed by the processor 1120 and the communication interface 1110 may refer to the description in the method flow shown in fig. 7 or fig. 9, and are not described herein again.
It should be noted that, in the embodiments of the present application, the processor may be a general processor, a digital signal processor, an application specific integrated circuit, a field programmable gate array or other programmable logic device, a discrete gate or transistor logic device, or a discrete hardware component, and may implement or execute the methods, steps, and logic blocks disclosed in the embodiments of the present application. A general purpose processor may be a microprocessor or any conventional processor or the like. The steps of a method disclosed in connection with the embodiments of the present application may be directly implemented by a hardware processor, or may be implemented by a combination of hardware and software modules in a processor.
In the embodiment of the present application, "and/or" describes an association relationship of an associated object, indicating that three relationships may exist, for example, a and/or B may indicate: a exists alone, A and B exist simultaneously, and B exists alone, wherein A and B can be singular or plural. The character "/" generally indicates that the former and latter associated objects are in an "or" relationship. "at least one of the following" or similar expressions refer to any combination of these items, including any combination of the singular or plural items. For example, at least one (one) of a, b, or c, may represent: a, b, c, a-b, a-c, b-c, or a-b-c, wherein a, b, c may be single or multiple. Wherein "plurality" means two or more.
In the embodiments of the present application, the word "exemplary" is used to mean serving as an example, instance, or illustration. Any embodiment or design described herein as "exemplary" is not necessarily to be construed as preferred or advantageous over other embodiments or designs. Rather, the term using examples is intended to present concepts in a concrete fashion.
Optionally, the ordinal numbers such as "first", "second", etc. mentioned in the embodiments of the present application may be used to distinguish a plurality of objects, and are not used to limit the order, sequence, priority, or importance of the plurality of objects. For example, the first information and the second information are only for distinguishing different signaling, and do not indicate the difference in content, priority, transmission order, importance, or the like of the two information.
In the embodiment of the present application, the memory may be a nonvolatile memory, such as a Hard Disk Drive (HDD) or a solid-state drive (SSD), and may also be a volatile memory, for example, a random-access memory (RAM). The memory is any other medium that can be used to carry or store desired program code in the form of instructions or data structures and that can be accessed by a computer, but is not limited to such. The memory in the embodiments of the present application may also be circuitry or any other device capable of performing a storage function for storing program instructions and/or data.
The method provided by the embodiment of the present application may be implemented in whole or in part by software, hardware, firmware, or any combination thereof. When implemented in software, may be implemented in whole or in part in the form of a computer program product. The computer program product includes one or more computer instructions. When loaded and executed on a computer, cause the processes or functions described in accordance with the embodiments of the invention to occur, in whole or in part. The computer may be a general purpose computer, a special purpose computer, a computer network, a network appliance, a user device, or other programmable apparatus. The computer instructions may be stored on a computer readable storage medium or transmitted from one computer readable storage medium to another, for example, the computer instructions may be transmitted from one website, computer, server, or data center to another website, computer, server, or data center via wire (e.g., coaxial cable, fiber optic, Digital Subscriber Line (DSL)), or wireless (e.g., infrared, wireless, microwave, etc.). The computer-readable storage medium can be any available medium that can be accessed by a computer or a data storage device, such as a server, a data center, etc., that incorporates one or more of the available media. The usable medium may be a magnetic medium (e.g., a floppy disk, a hard disk, a magnetic tape), an optical medium (e.g., a Digital Video Disk (DVD)), or a semiconductor medium (e.g., an SSD), among others.
In the embodiments of the present application, the embodiments may refer to each other, for example, methods and/or terms between the embodiments of the method may refer to each other, for example, functions and/or terms between the embodiments of the apparatus and the embodiments of the method may refer to each other, without logical contradiction.
Various modifications and alterations to this application may occur to those skilled in the art without departing from the scope of this application. Thus, if such modifications and variations of the present application fall within the scope of the claims of the present application and their equivalents, the present application is intended to include such modifications and variations as well.

Claims (18)

1. A method of detecting a wireless fidelity Wi-Fi device, comprising:
monitoring a data transmission process on the air interface resource, and acquiring a plurality of detection results corresponding to a plurality of first sending records of data of a specified service type sent by specified Wi-Fi equipment; wherein each of the detection results comprises:
on the air interface resource, before the first sending record, the air interface resource is continuously in a first time length Tn of an idle state;
and if the first duration Tn is less than the first preset duration, indicating that the fixed back-off time parameter value corresponding to the specified service type on the specified Wi-Fi equipment is an unreasonable parameter value.
2. The method of claim 1, wherein each of said detection results further comprises:
between the first sending record and the last sending record of the designated Wi-Fi device, the interval air interface resource is a first time length Ti which lasts in an idle state, wherein i is any integer in (1,2.. n), and n is the number of times the air interface resource is in the idle state;
the method further comprises the following steps:
determining a second time length corresponding to each detection result in the plurality of detection results, wherein the second time length is according to the first time length T contained in the corresponding detection resultiAnd determining the first preset time length;
and if the determined average value of the plurality of second time lengths is less than a second preset time length, indicating that the random back-off time range value corresponding to the specified service type on the specified Wi-Fi equipment is an unreasonable parameter value.
3. The method of claim 2, wherein the second duration corresponding to each of the detection results satisfies the following formula:
Figure FDA0002476919030000011
where max (Ti — first preset time period, 0) represents taking the larger of (Ti — first preset time period) and 0.
4. The method according to claim 2 or 3, wherein the second preset duration is determined according to the specified service type; or
And when the sent times of the data sent by the specified Wi-Fi equipment recorded in the first sending record in any two times are the same, determining the second preset time according to the specified service type and the sent times.
5. The method of any one of claims 1-4, further comprising:
if the designated Wi-Fi equipment sends at least two PPDUs (protocol data units) indicating protocol data units (PPDUs) and the interval duration between any two adjacent PPDUs in the at least two PPDUs is not greater than the first preset duration, the designated Wi-Fi equipment, which is recorded in the first sending record, sends the at least two PPDUs continuously.
6. The method of claim 5, wherein when the designated Wi-Fi device recorded in the first transmission record transmits the at least two PPDUs as a continuous transmission operation, the detection result further comprises: a third duration for the continuous sending operation to send multiple PPDUs;
the method further comprises the following steps:
and if the third duration is longer than a third preset duration, indicating that the duration length parameter value corresponding to the specified service type on the specified Wi-Fi equipment is an unreasonable parameter value.
7. The method of any one of claims 1-6, wherein the detection result further comprises: the designated Wi-Fi equipment recorded in the first sending record sends a fourth time length representing any protocol data unit PPDU;
the method further comprises the following steps:
and judging whether the single PPDU duration value corresponding to the service type on the specified Wi-Fi equipment is an unreasonable parameter value or not according to the fourth duration and a fourth preset duration corresponding to the service type.
8. The method of claim 7, wherein the determining whether the single PPDU duration value corresponding to the service type on the specified Wi-Fi device is an unreasonable parameter value according to the fourth duration and a fourth preset duration corresponding to the service type comprises:
and if the fourth time length is longer than the fourth preset time length, indicating whether a single PPDU time length value corresponding to the specified service type on the specified Wi-Fi equipment is an unreasonable parameter value.
9. An apparatus for detecting Wi-Fi devices, the apparatus comprising a transceiver unit and a processing unit;
the processing unit is used for monitoring the data transmission process on the air interface resource through the receiving and sending unit and acquiring a plurality of detection results corresponding to a plurality of times of first sending records of data of a specified service type sent by specified Wi-Fi equipment; wherein each of the detection results comprises: on the air interface resource, before the first sending record, the air interface resource is continuously in a first time length Tn of an idle state; and
and when the first time Tn is less than the first preset time, indicating that the fixed back-off time parameter value corresponding to the specified service type on the specified Wi-Fi equipment is an unreasonable parameter value.
10. The apparatus of claim 9, wherein each of the detection results further comprises: between the first sending record and the last sending record of the designated Wi-Fi device, the interval air interface resource is a first time length Ti which lasts in an idle state, wherein i is any integer in (1,2.. n), and n is the number of times the air interface resource is in the idle state;
the processing unit is further configured to determine a second duration corresponding to each of the plurality of detection results, where the second duration is according to the first duration T included in the corresponding detection resultiAnd determining the first preset time length; and when the determined average value of the plurality of second time lengths is smaller than a second preset time length, indicating that the random back-off time range value corresponding to the specified service type on the specified Wi-Fi equipment is an unreasonable parameter value.
11. The apparatus of claim 10, wherein the second duration corresponding to each of the detection results satisfies the following formula:
Figure FDA0002476919030000021
where max (Ti — first preset time period, 0) represents taking the larger of (Ti — first preset time period) and 0.
12. The apparatus according to claim 10 or 11, wherein the second preset duration is determined according to the specified service type; or the sent times of the data sent by the specified Wi-Fi device recorded in the first sending record of any two times are the same, and the second preset time length is determined according to the specified service type and the sent times.
13. The apparatus according to any one of claims 9 to 12, wherein the processing unit is further configured to record, in the first transmission record, that the designated Wi-Fi device has transmitted at least two PPDUs representing protocol data units, and a duration of an interval between any two adjacent PPDUs of the at least two PPDUs is not greater than the first preset duration, and determine that the designated Wi-Fi device recorded in the first transmission record transmits the at least two PPDUs as a continuous transmission operation.
14. The apparatus of claim 13, wherein when the designated Wi-Fi device recorded in the first transmission record transmits the at least two PPDUs as a continuous transmission operation, the detection result further comprises: a third duration for the continuous sending operation to send multiple PPDUs;
the processing unit is further configured to indicate that the duration length parameter value corresponding to the specified service type on the specified Wi-Fi device is an unreasonable parameter value when the third duration is longer than the third preset duration.
15. The apparatus of any one of claims 9-14, wherein the detection result further comprises: the designated Wi-Fi equipment recorded in the first sending record sends a fourth time length representing any protocol data unit PPDU;
and the processing unit is further configured to determine whether a single PPDU duration value corresponding to the service type on the specified Wi-Fi device is an unreasonable parameter value according to the fourth duration and a fourth preset duration corresponding to the service type.
16. The apparatus according to claim 15, wherein the processing unit, according to the fourth duration and a fourth preset duration corresponding to the service type, is configured to, when determining whether a single PPDU duration value corresponding to the service type on the specified Wi-Fi device is an unreasonable parameter value, specifically:
and when the fourth time length is longer than the fourth preset time length, indicating that a single PPDU time length value corresponding to the specified service type on the specified Wi-Fi equipment is an unreasonable parameter value.
17. An apparatus for detecting Wi-Fi devices, the apparatus comprising:
a memory for storing program instructions and data;
a processor for invoking the program instructions and data stored by the memory to perform the method of any of claims 1-8.
18. A computer-readable storage medium comprising instructions that, when executed, implement the method of any of claims 1 to 8.
CN202010367214.8A 2020-04-30 2020-04-30 Method and device for detecting Wi-Fi equipment Pending CN113596896A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010367214.8A CN113596896A (en) 2020-04-30 2020-04-30 Method and device for detecting Wi-Fi equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010367214.8A CN113596896A (en) 2020-04-30 2020-04-30 Method and device for detecting Wi-Fi equipment

Publications (1)

Publication Number Publication Date
CN113596896A true CN113596896A (en) 2021-11-02

Family

ID=78237028

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010367214.8A Pending CN113596896A (en) 2020-04-30 2020-04-30 Method and device for detecting Wi-Fi equipment

Country Status (1)

Country Link
CN (1) CN113596896A (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2002054671A2 (en) * 2001-01-02 2002-07-11 At & T Corp. Random medium access methods with backoff adaptation to traffic
US20020110085A1 (en) * 2000-12-18 2002-08-15 Jin-Meng Ho Adaptive algorithms for optimal control of contention access
US20030174664A1 (en) * 2001-11-02 2003-09-18 At&T Corp. Preemptive packet for maintaining contiguity in cyclic prioritized multiple access (CPMA) contention-free sessions
US20160066208A1 (en) * 2014-08-28 2016-03-03 Canon Kabushiki Kaisha Method and device for data communication in a network
CN105682239A (en) * 2015-12-31 2016-06-15 宇龙计算机通信科技(深圳)有限公司 Channel detection configuration method and apparatus for listen before talk mechanism on unlicensed spectrum
US20170079068A1 (en) * 2015-09-14 2017-03-16 Nokia Technologies Oy Fairness In Wireless Networks With Adaptive Clear Channel Assessment Thresholds
CN109644502A (en) * 2016-12-13 2019-04-16 华为技术有限公司 A kind of point-to-multipoint method for channel allocation, apparatus and system

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020110085A1 (en) * 2000-12-18 2002-08-15 Jin-Meng Ho Adaptive algorithms for optimal control of contention access
WO2002054671A2 (en) * 2001-01-02 2002-07-11 At & T Corp. Random medium access methods with backoff adaptation to traffic
US20030174664A1 (en) * 2001-11-02 2003-09-18 At&T Corp. Preemptive packet for maintaining contiguity in cyclic prioritized multiple access (CPMA) contention-free sessions
US20160066208A1 (en) * 2014-08-28 2016-03-03 Canon Kabushiki Kaisha Method and device for data communication in a network
US20170079068A1 (en) * 2015-09-14 2017-03-16 Nokia Technologies Oy Fairness In Wireless Networks With Adaptive Clear Channel Assessment Thresholds
CN105682239A (en) * 2015-12-31 2016-06-15 宇龙计算机通信科技(深圳)有限公司 Channel detection configuration method and apparatus for listen before talk mechanism on unlicensed spectrum
CN109644502A (en) * 2016-12-13 2019-04-16 华为技术有限公司 A kind of point-to-multipoint method for channel allocation, apparatus and system

Non-Patent Citations (4)

* Cited by examiner, † Cited by third party
Title
MAXIM RAYA: "DOMINO: Detecting MAC Layer Greedy Behavior in IEEE 802.11 Hotspots", IEEE TRANSACTIONS ON MOBILE COMPUTING, pages 4 *
吴春辉;郑淑丽;侯整风;: "无线网络中MAC层违规行为的检测和惩罚", 计算机技术与发展, no. 11, pages 2 *
宋军;黄剑;金艳华;: "IEEE802.11 DCF及其改进方案性能分析与比较", 重庆大学学报, no. 04 *
王瑞芝;李鸥;杨白薇;: "一种新的无线局域网节点自私行为检测算法", 电路与系统学报, no. 03, pages 3 *

Similar Documents

Publication Publication Date Title
US10674539B2 (en) System and method for managing contention in a wireless communications system
US7974302B2 (en) Hybrid implicit token carrier sensing multiple access/collision avoidance protocol
CN110381601B (en) Communication method, communication device, computer readable medium and electronic equipment
JP5880540B2 (en) Wireless LAN communication device, communication method and program for wireless LAN communication device
JP7532648B2 (en) Channel contention method and related device
US20230121480A1 (en) Channel access method for multi-link device, and related apparatus
CN104219017A (en) A method for transmitting a data packet in a physical layer and an access point
Muir et al. Supporting real-time multimedia traffic in a wireless LAN
KR101544819B1 (en) Data transmission method and apparatus for avoiding collision in ad-hoc network
CN113596896A (en) Method and device for detecting Wi-Fi equipment
KR101169993B1 (en) Apparatus and method for media access control based on competition of csma/ca
CN114916085A (en) Channel access method, device, equipment and storage medium
CN111031525A (en) Beacon frame sending method and device
JP5855551B2 (en) Wireless communication system and wireless communication method
CN115734380A (en) Adjustment method, device, equipment and storage medium of backoff window
CN118540735A (en) Communication method and communication device
CN118714668A (en) Channel access method, device and storage medium
CN117939691A (en) Method and device for transmitting data
CN114390597A (en) Data transmission method and device
WO2020109648A1 (en) Channel contention and resource management in wireless network
US20180176908A1 (en) Transmission control method intended for being implemented by a station in a telecommunications network

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20211102