Wireless communication method, device, equipment and readable storage medium

文档序号:1835051 发布日期:2021-11-12 浏览:24次 中文

阅读说明:本技术 一种无线通信方法、装置、设备及可读存储介质 (Wireless communication method, device, equipment and readable storage medium ) 是由 王澍 赵广智 龚伟 袁晓露 陈铁义 缪宁杰 谢知寒 魏文力 田梁玉 于 2021-08-25 设计创作,主要内容包括:本申请公开了一种无线通信方法、装置、设备及可读存储介质,该方法包括:无源节点设备捕获能量后,检测激励源发出的消息;在检测到有效消息后,对激励源发出的应答回复进行突发传输标识检测;若未检测到其他无源节点设备的突发传输标识,则向激励源发送自身的突发传输标识;在发送自身的突发传输标识后,若从激励源的应答回复中检测到自身的突发传输标识,则向激励源发送数据信息。本申请能够有效提高突发传输的整体吞吐量,能够满足无源节点的数据传输需求。(The application discloses a wireless communication method, a device, equipment and a readable storage medium, wherein the method comprises the following steps: after the passive node equipment captures energy, detecting a message sent by an excitation source; after the effective message is detected, carrying out burst transmission identification detection on a response reply sent by the excitation source; if the burst transmission identifier of other passive node equipment is not detected, sending the burst transmission identifier of the passive node equipment to the excitation source; after sending the own burst transmission identifier, if the own burst transmission identifier is detected from the response reply of the excitation source, the data information is sent to the excitation source. The method and the device can effectively improve the overall throughput of burst transmission and can meet the data transmission requirement of the passive node.)

1. A method of wireless communication, comprising:

after the passive node equipment captures energy, detecting a message sent by an excitation source;

after the effective message is detected, carrying out burst transmission identification detection on the response reply sent by the excitation source;

if the burst transmission identifier of other passive node equipment is not detected, sending the burst transmission identifier of the passive node equipment to the excitation source;

and after the own burst transmission identifier is sent, if the own burst transmission identifier is detected from the response reply of the excitation source, sending data information to the excitation source.

2. The wireless communication method of claim 1, wherein sending data information to the excitation source comprises:

acquiring an available time slot;

and transmitting the data information to the excitation source by utilizing the available time slot.

3. The wireless communication method of claim 2, wherein the obtaining the available time slot comprises:

the acquisition is based on the initial interrogation, the repeated interrogation and the adjusted interrogation initiating each available time slot.

4. The wireless communication method of claim 2, wherein transmitting the data information to the excitation source using the available time slot comprises:

and transmitting the data information to the excitation source by utilizing the available time slot in one burst transmission period.

5. The wireless communication method according to claim 4, further comprising:

after a specified time period after the end of one of the burst transmission periods, the step of detecting a message from the stimulus is performed.

6. The wireless communication method according to claim 1, further comprising, after sending the own burst transmission identifier:

and if the burst transmission identification of other passive node equipment is detected from the response reply of the excitation source, or the response reply of the excitation source is not received after a specified number of time slots, executing the step of detecting the message sent by the excitation source.

7. The wireless communication method according to any one of claims 1 to 6, wherein sending the own burst transmission identifier to the excitation source comprises:

and sending a burst transmission identifier which is represented in a data form to the excitation source.

8. A wireless communication device applied to a passive node device, comprising:

the message detection module is used for detecting the message sent by the excitation source after capturing energy;

the burst transmission identifier detection module is used for carrying out burst transmission identifier detection on the response reply sent by the excitation source after the effective message is detected;

the burst transmission identifier sending module is used for sending the own burst transmission identifier to the excitation source if the burst transmission identifiers of other passive node devices are not detected;

and the burst transmission module is used for sending data information to the excitation source if the own burst transmission identifier is detected from the response reply of the excitation source after the own burst transmission identifier is sent.

9. An electronic device, comprising:

a memory for storing a computer program;

a processor for implementing the steps of the wireless communication method according to any of claims 1 to 7 when executing the computer program.

10. A readable storage medium, having stored thereon a computer program which, when being executed by a processor, carries out the steps of the wireless communication method according to any one of claims 1 to 7.

Technical Field

The present application relates to the field of communications technologies, and in particular, to a wireless communication method, apparatus, device, and readable storage medium.

Background

Miniature ultra-low power passive node devices have been widely used in urban building rooms and indoor areas. In particular, these passive nodes may be deployed on everyday items such as books, furniture, walls, agricultural products, and the like. The user can track and detect the target object by using the passive nodes. These passive node devices are capable of extracting energy from light or radio frequency signals in the environment and using backscatter communications for data transmission with an excitation source.

When the passive node device moves near an excitation source, two communication states can occur in a short time: and connecting and disconnecting. As passive nodes traverse their environment, they perform a series of sensing and computing operations. When away from the excitation source, the passive node may become disconnected. Over time, these passive node devices may buffer some data during the disconnected state. When they again encounter the stimulus, a variable connection interval is created, and burst transmission takes place. Because the passive node needs to capture energy and can communicate within an effective distance, the connection interval between the passive node and the excitation source is limited in time, and burst transmission is required to complete data transmission within a limited time.

In summary, how to effectively improve the overall throughput of the burst transmission of the passive node is a technical problem that needs to be solved by those skilled in the art.

Disclosure of Invention

The application aims to provide a wireless communication method, a wireless communication device, a wireless communication equipment and a readable storage medium, so as to improve the transmission efficiency of burst transmission.

In order to solve the technical problem, the application provides the following technical scheme:

a method of data communication, comprising:

after the passive node equipment captures energy, detecting a message sent by an excitation source;

after the effective message is detected, carrying out burst transmission identification detection on the response reply sent by the excitation source;

if the burst transmission identifier of other passive node equipment is not detected, sending the burst transmission identifier of the passive node equipment to the excitation source;

and after the own burst transmission identifier is sent, if the own burst transmission identifier is detected from the response reply of the excitation source, sending data information to the excitation source.

Preferably, sending data information to the excitation source includes:

acquiring an available time slot;

and transmitting the data information to the excitation source by utilizing the available time slot.

Preferably, the acquiring the available time slot includes:

the acquisition is based on the initial interrogation, the repeated interrogation and the adjusted interrogation initiating each available time slot.

Preferably, the transmitting the data information to the excitation source by using the available time slot includes:

and transmitting the data information to the excitation source by utilizing the available time slot in one burst transmission period.

Preferably, the method further comprises the following steps:

after a specified time period after the end of one of the burst transmission periods, the step of detecting a message from the stimulus is performed.

Preferably, after sending the own burst transmission identifier, the method further includes:

and if the burst transmission identification of other passive node equipment is detected from the response reply of the excitation source, or the response reply of the excitation source is not received after a specified number of time slots, executing the step of detecting the message sent by the excitation source.

Preferably, sending the own burst transmission identifier to the excitation source includes:

and sending a burst transmission identifier which is represented in a data form to the excitation source.

A wireless communication device is applied to a passive node device and comprises:

the message detection module is used for detecting the message sent by the excitation source after capturing energy;

the burst transmission identifier detection module is used for carrying out burst transmission identifier detection on the response reply sent by the excitation source after the effective message is detected;

the burst transmission identifier sending module is used for sending the own burst transmission identifier to the excitation source if the burst transmission identifiers of other passive node devices are not detected;

and the burst transmission module is used for sending data information to the excitation source if the own burst transmission identifier is detected from the response reply of the excitation source after the own burst transmission identifier is sent.

An electronic device, comprising:

a memory for storing a computer program;

a processor for implementing the steps of the above-described wireless communication method when executing the computer program.

A readable storage medium having stored thereon a computer program which, when executed by a processor, carries out the steps of the above-mentioned wireless communication method.

By applying the method provided by the embodiment of the application, after the passive node equipment captures energy, the passive node equipment detects the message sent by the excitation source; after the effective message is detected, carrying out burst transmission identification detection on a response reply sent by the excitation source; if the burst transmission identifier of other passive node equipment is not detected, sending the burst transmission identifier of the passive node equipment to the excitation source; after sending the own burst transmission identifier, if the own burst transmission identifier is detected from the response reply of the excitation source, the data information is sent to the excitation source.

After the passive node equipment captures energy, the information sent by the excitation source is detected, and after the effective information is detected, the burst transmission identification detection can be carried out. And under the condition that the burst transmission identification of other passive node equipment is not detected, sending the burst transmission identification of the passive node equipment to the excitation source. And the data information can be sent to the excitation source by detecting the burst transmission identification of the excitation source in the response reply of the subsequent excitation source. That is to say, in the process of initiating burst transmission, the passive node does not need to actively inquire the excitation source, but passively detects the message to enter the burst transmission, so that a large amount of energy consumption can be saved. Meanwhile, the burst transmission is determined by adopting a message mechanism, and the message transmission has the characteristic of fixed byte length, so that the communication negotiation efficiency can be effectively improved, more transmission time can be strived for the burst transmission, the transmission quantity of the burst transmission is improved, and the passive node equipment is ensured to transmit data information to the excitation source within limited time.

Accordingly, embodiments of the present application further provide a wireless communication apparatus, a device and a readable storage medium corresponding to the wireless communication method, which have the above technical effects and are not described herein again.

Drawings

In order to more clearly illustrate the technical solutions in the embodiments or related technologies of the present application, the drawings needed to be used in the description of the embodiments or related technologies are briefly introduced below, it is obvious that the drawings in the following description are only some embodiments of the present application, and for those skilled in the art, other drawings can be obtained according to these drawings without creative efforts.

Fig. 1 is a flowchart illustrating an implementation of a wireless communication method according to an embodiment of the present application;

FIG. 2 is a schematic diagram illustrating a comparison of different communication interaction processes;

FIG. 3 is a diagram of a state machine according to an embodiment of the present application;

fig. 4 is a schematic structural diagram of a wireless communication device according to an embodiment of the present application;

fig. 5 is a schematic structural diagram of an electronic device in an embodiment of the present application;

fig. 6 is a schematic structural diagram of an electronic device in an embodiment of the present application.

Detailed Description

In order that those skilled in the art will better understand the disclosure, the following detailed description will be given with reference to the accompanying drawings. It is to be understood that the embodiments described are only a few embodiments of the present application and not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.

Referring to fig. 1, fig. 1 is a flowchart illustrating a wireless communication method according to an embodiment of the present application, the method including:

s101, detecting a message sent by an excitation source after the passive node equipment captures energy.

The passive node device may be any device that has no energy source (such as a power source, a battery, etc.) of its own, and is hereinafter referred to as a passive node.

The passive node device may capture energy by capturing optical energy or radio frequency signals emanating from the excitation source.

When the passive receiving device captures energy, the message sent by the excitation source can be detected.

For the sake of understanding, the following explains the communication negotiation using the message mechanism in the present embodiment.

There are two possible options for implementing a communication negotiation for a large data transmission from a passive node to an excitation source. The first option is to use a read command that allows a variable amount of data to be transferred from the passive node to the stimulus, but has the problem of inefficiency. The second method is to use communication messages.

The power consumption of the read command and message is first checked using a set of reference values as shown in the table below.

Name of operation Number of bits Length of validity (us) Idle time (us) Consumed energy (nJ)
Initial query (RX) 22 983 52 648
Repeat query (RX) 1 273 50 210
Adjustment query (RX) 9 415 51 319
Read command (RX) 52 2100 50 1615
Random number response (TX) 16 641 2390 422
Answer Reply (RX) 18 660 36 508
Reading state order (RX) 40 1616 51 1241
Node identification code (TX) 128 2450 2360 1615
Cyclic check code - 452 - 307

In the table, RX identifies the operation performed by the excitation source and TX identifies the operation performed by the passive node. The power consumption of a read command varies as the length of data sent by a read command request varies, while a message is always 12 bytes in length.

By means of experimental reference values, the energy consumed per byte in the data transmission can be calculated. Each read command generates the power consumption overhead of steps 1 through 8 of fig. 2 before reading the data.

Assuming that there are 4 time slots in one communication round of the passive node and the active source, when using the messaging approach, this would result in 12 bytes of data per time slot from the passive node to the active source for a total of 48 bytes of data, which would require 39.77 mus (microseconds).

Assuming the read command mode is used, this means that data is requested from the memory of the passive node device. Since passive nodes must be designated for subsequent read commands, more energy is required to compensate for the additional energy overhead of this approach than a single read command. Both the previously calculated time delay and steps 5-8 of fig. 2 become overhead for the read command approach when based on the same assumption (4 slots for one communication round of the passive node and the active source). To match the throughput of an equivalent message-based approach, in this case, a read command request of at least 116 bytes is required while the message-based approach requires only 48 bytes.

The results show that for fast, high throughput passive networks, the read command approach is not a good choice for communication from the passive node to the stimulus. In the present exemplary embodiment, the messages are therefore selected as basic modules of the bulk transport protocol.

And S102, after the effective message is detected, carrying out burst transmission identification detection on the response reply sent by the excitation source.

In this embodiment, the excitation source and the passive node device perform communication negotiation in a message manner. Specifically, as shown in fig. 2, the communication negotiation process is initiated by the excitation source, that is, the excitation source sends an initial inquiry to the passive node, the passive node performs a random number response, then the excitation source replies to the random number response, and the passive node further feeds back the node identification code (i.e., the burst transmission identifier) based on the response reply.

That is, if the passive node wants to perform burst transmission, it needs to perform burst transmission identifier detection on the reply sent by the excitation source under the condition that the valid message can be detected, so as to determine whether burst transmission with the excitation source is currently possible.

S103, if the burst transmission identification of other passive node equipment is not detected, sending the burst transmission identification of the passive node equipment to the excitation source.

If the burst transmission identifier of other passive node devices is not detected in the response reply sent by the excitation source, it indicates that no other passive node device needs to perform data transmission with the excitation source currently, and thus, the burst transmission identifier of the passive node device can be sent to the excitation source.

Preferably, a burst transmission identification, which is itself represented in data form, may be sent to the stimulus. Characterizing the burst transmission identity in data form may assign a burst transmission representation to more passive node devices, thereby accommodating more passive node devices.

And S104, after sending the own burst transmission identification, if the own burst transmission identification is detected from the response reply of the excitation source, sending the data information to the excitation source.

After sending the own burst transmission identifier to the excitation source, if the excitation source can normally receive the burst transmission identifier, the corresponding response reply is fed back according to the actual communication situation. For example, to which passive node device the current channel is allocated, the feedback carries the burst transmission identifier of which passive node device.

Therefore, if the own burst transmission identifier can be detected from the response reply of the excitation source, it indicates that the burst transmission with the excitation source is currently possible. That is, data information may be sent to the stimulus.

In transmitting data information to the excitation source, a time slot may be randomly selected to transmit data information to the excitation source in one communication round. Preferably, a plurality of time slots can be selected from available time slots in one communication round to transmit data information to the excitation source, so that communication throughput is improved, and communication efficiency is improved. Specifically, the sending of the data information to the excitation source in step S104 includes:

step one, acquiring available time slots;

and step two, sending data information to the excitation source by using the available time slot.

Wherein, the first step may specifically include: the acquisition is based on the initial interrogation, the repeated interrogation and the adjusted interrogation initiating each available time slot.

That is, if a relevant protocol is followed, data transmission will require more than several tens or hundreds of communication rounds, with only one slot of data being received in each round. Because the number of time slots in a communication round depends on the choice of Q value (the number of time slots is 2)Q-1), and a poor Q value will necessarily make the communication inefficient.

In this embodiment, a burst transmission approach is used to solve this problem, and its central idea is to ignore the communication rounds in the relevant protocol, and simply treat the protocol as a sequence of unallocated request/response time slots. Each time slot may be initiated by an initial challenge, a repeat challenge, and an adjust challenge, rather than only by the initial challenge.

The initial query, the repeated query and the adjustment query are all messages in a relevant protocol, and the initial query represents initiating a communication return and specifies parameters, such as a Q value and the like; the repeated interrogation designates successive time slots following the initial interrogation in the communication round; the adjustment query additionally changes the current Q value in addition to specifying successive time slots following the initial query in this communication round.

In this embodiment, the passive node may transmit its own data burst in each of the slots where it can acquire it, and transmit the data continuously in the slots that are acquired continuously. The key benefits of the burst transfer approach to a single passive node: the poor choice of Q value for the excitation source is no longer limited, i.e., the present embodiment can turn the disadvantages into advantages. In order to fully gain the benefit of burst transmission, it is desirable that the incentive source choose a large Q value. In the related protocol, 1 communication round can be initiated only by initial inquiry, and others (2)Q-1) time slots are determined by repeated interrogation and some time slots are processed by adjusting interrogation for the purpose of adjusting the Q value in one communication round. One subtle advantage of repeated interrogation and adjusted interrogation compared to the initial interrogation is their relatively short length. According to the protocol specification, the initial query, the repeated query and the adjusted query are 22 bits, 4 bits and 9 bits, respectively. As the Q increases, the energy consumed during communication is largely determined by repeated interrogation and adjustment interrogation. The relationship between throughput and power consumption and Q is shown in the following equation:

Eround=Equery+(2Q+A-1)·Erep+n·Eadjust (1)

wherein, formula (1) shows the total power consumption of a communication round, including listening and replying to the power consumption of the first time slot initiated by the initial inquiry, and listening and replying to the power consumption of the time slot determined by the subsequent repeated inquiry and the power consumption of the n adjustment inquiries. In the formula (1), the Q value is an initial Q value, and a is an adjustment parameter during communication. Equation (2) shows the relationship between the three messages (i.e., initial query, repeat query, and adjusted query adj) and throughput. Using the measurements in the table above, it was found that Q15 versus Q0 resulted in a 10% gain in both power consumption and throughput. Therefore, the burst transmission mode adopted in the embodiment has obvious advantages.

It is considered that in a scenario where a plurality of passive nodes are deployed, a communication method of a burst transmission mode may be affected by communication collision between each other, thereby reducing energy utilization and throughput. In order to solve this problem, a burst transmission period of a fixed length may be set for each burst transmission, that is, the second step may specifically include: and transmitting data information to the excitation source by using the available time slot in one burst transmission period. And after a specified time period after the burst transmission period is used up, the step of detecting the message sent by the excitation source is executed. Specifically, 1 second may be selected as the length of the burst transmission, because it is long enough to obtain the substantial benefit of the burst transmission (of course, in practical applications, other time lengths may be selected as a burst transmission period according to practical requirements). After running out of one burst, a passive node pauses for a specified duration (e.g., 250ms) before attempting to acquire the channel of another burst. This specified duration may provide a window for other passive nodes to capture the channel.

In order to avoid the collision of multiple passive nodes, after sending the own burst transmission identifier, if the burst transmission identifier of other passive node devices is detected from the response reply of the excitation source, or the response reply of the excitation source is not received after a specified number of time slots, the step of detecting the message sent by the excitation source may be executed.

That is, after sending the own burst transmission identifier, if the burst transmission identifiers of other passive nodes are detected, it indicates that the communication with the excitation source cannot be performed currently; if the response reply of the excitation source cannot be received after the specified number of timeslots, it indicates that the current distance from the excitation source is too far or the response reply cannot be received due to other reasons, or the burst transmission identifier is not successfully sent to the excitation source, and at this time, the initial state can be recovered, that is, step S101 is executed again.

By applying the method provided by the embodiment of the application, after the passive node equipment captures energy, the passive node equipment detects the message sent by the excitation source; after the effective message is detected, carrying out burst transmission identification detection on a response reply sent by the excitation source; if the burst transmission identifier of other passive node equipment is not detected, sending the burst transmission identifier of the passive node equipment to the excitation source; after sending the own burst transmission identifier, if the own burst transmission identifier is detected from the response reply of the excitation source, the data information is sent to the excitation source.

After the passive node equipment captures energy, the information sent by the excitation source is detected, and after the effective information is detected, the burst transmission identification detection can be carried out. And under the condition that the burst transmission identification of other passive node equipment is not detected, sending the burst transmission identification of the passive node equipment to the excitation source. And the data information can be sent to the excitation source by detecting the burst transmission identification of the excitation source in the response reply of the subsequent excitation source. That is to say, in the process of initiating burst transmission, the passive node does not need to actively inquire the excitation source, but passively detects the message to enter the burst transmission, so that a large amount of energy consumption can be saved. Meanwhile, the burst transmission is determined by adopting a message mechanism, and the message transmission has the characteristic of fixed byte length, so that the communication negotiation efficiency can be effectively improved, more transmission time can be strived for the burst transmission, the transmission quantity of the burst transmission is improved, and the passive node equipment is ensured to transmit data information to the excitation source within limited time.

In order to facilitate understanding of the wireless communication method provided in the embodiments of the present application, the following explains the related art in the embodiments of the present application.

Generally, in an active passive network, a monitoring method such as a control message of RTS/CTS or CSMA is usually adopted to coordinate nodes to avoid collision. However, none of these methods is suitable for passive networks that backscatter communications. Since the passive nodes cannot decode message information from each other. Another conceivable approach is for the stimulus to select a passive node for communication in a time slot using an initial inquiry, a repeat inquiry, and an adjusted inquiry, while ignoring the communication requests of other passive nodes in this time slot. However, the repeated interrogation is only 4 bits long and there is not enough address space to solve this problem. More importantly, the stimulus is not allowed to modify the initial challenge, and therefore this method is also unusable.

By carefully observing the communication interaction process of the passive node and the excitation source, the method is found to be a two-way handshake process, which makes it possible to solve the collision problem. As shown in step 3 of fig. 2, the stimulus replies a random number reply (i.e., a reply message composed of a 16-bit random number) to the passive node, thereby selecting to occupy one time slot. In the embodiment of the application, the random number response field is extended to indicate that the passive node is bursty in communication. The space for random number acknowledgement is divided by 0< n <2^16, n is the deployment number of passive nodes, and a value less than n is considered as the identification of acknowledgement burst communication. Considering the actual application requirements, n is statically selected at compile time and is determined according to the desired maximum deployment number. It is noted that the passive node is statically selected from the range of available random number response burst notification identifiers for burst transmission, rather than randomly selected. In addition, each passive node selects the random number acknowledgment burst notification identifier only once per communication round rather than once per slot.

Wherein, the random number response burst notification identifier is used according to the following procedures: before initiating a burst communication, the passive node listens to the channel and decodes the initial inquiry, repeat the inquiry, and adjust the inquiry messages. If it detects a notification indicator value in the range of the used random number response burst notification indicator, it will remain silent and continue listening to avoid collisions. If the observed range is beyond the random number response burst notification flag, then the own burst notification flag can be selected and the own burst transmission can be performed in this time slot. Of course, there is also a case where the detected value is not received at the burst notification flag just in the middle of another passive node preparing a burst transmission procedure or due to a channel error or the like. In both cases, the passive node may misunderstand that the current time slot is idle, and may perform its own burst transmission, thereby causing a collision. While the stimulus will typically receive the stronger of the passive node signals in a transmission collision. Thus, the stimulus will reply to the stronger signal passive node, which can continue the burst transfer. Of course, the excitation source may not receive any signal. In this case, the stimulus is caused to reply with a randomly backed-off response. To prevent a single passive node from holding the channel indefinitely, burst transmission will terminate after a small, fixed time, which is large enough to accommodate the overhead of coordination, but small enough to allow passive nodes with limited communication opportunities the opportunity to transmit burst data to the stimulus.

Fig. 3 shows a state machine for implementing a bulk transfer protocol corresponding to the wireless communication method in the embodiment of the present application. When the passive node captures enough energy, it will enter an initial state ready to transmit data. The passive node then activates its comparator 1 and enters frame detection of the message. When the passive node receives a valid message (e.g., any of the initial challenge, the repeat challenge, and the adjustment challenge is detected), the detection state of the random number is entered while timer 1 is initialized and comparator 2 is activated.

If the passive node does not detect the valid value of the random number response, the passive node returns to the initial state after the timer is overtime; if the passive node does not listen for other passive node burst transmission identification (statically selected from available space in random number response range) messages after at least one frame of the over-excitation source is blank, it will send its own burst transmission identification message in response to the initial query, the repeat query and the adjustment query. If the passive node listens for its own burst transmission identity, it will enter the burst transmission state and initialize timer 2. If the burst transmission identification information of other passive nodes is monitored after an idle time slot, or after the timer 2 is overtime or no response is carried out after more than 4 time slots, the passive nodes return to the initial state.

In the state machine, the timeout value is used as a comparison value for timer A1 on the MSP430 microcontroller. A set of timeout values must also be selected to avoid generating excessive interrupts when considering hardware constraints and initialization overhead, thereby affecting the ability of passive nodes to respond to stimulus messages in a timely manner. In practice, a timeout of >2ms (milliseconds) provides the passive node with enough time to listen for messages, while also providing the time needed for timer initialization. 1 second is chosen as the length of the burst transmission because it is long enough to obtain substantial benefits of the burst transmission. After running out of one burst, a passive node pauses for 250ms before attempting to acquire the channel of another burst. This duration provides a window for other passive nodes to capture the channel.

Corresponding to the above method embodiments, the present application further provides a wireless communication apparatus applied to a passive node device, and the wireless communication apparatus described below and the wireless communication method described above may be referred to correspondingly.

Referring to fig. 4, the apparatus includes the following modules:

the message detection module 101 is configured to detect a message sent by an excitation source after capturing energy;

a burst transmission identifier detection module 102, configured to perform burst transmission identifier detection on a response reply sent by an excitation source after detecting a valid message;

a burst transmission identifier sending module 103, configured to send a burst transmission identifier of the excitation source to the excitation source if the burst transmission identifier of the other passive node device is not detected;

and the burst transmission module 104 is configured to, after sending the own burst transmission identifier, send the data information to the excitation source if the own burst transmission identifier is detected from the response reply of the excitation source.

By applying the device provided by the embodiment of the application, after the passive node equipment captures energy, the passive node equipment detects the message sent by the excitation source; after the effective message is detected, carrying out burst transmission identification detection on a response reply sent by the excitation source; if the burst transmission identifier of other passive node equipment is not detected, sending the burst transmission identifier of the passive node equipment to the excitation source; after sending the own burst transmission identifier, if the own burst transmission identifier is detected from the response reply of the excitation source, the data information is sent to the excitation source.

After the passive node equipment captures energy, the information sent by the excitation source is detected, and after the effective information is detected, the burst transmission identification detection can be carried out. And under the condition that the burst transmission identification of other passive node equipment is not detected, sending the burst transmission identification of the passive node equipment to the excitation source. And the data information can be sent to the excitation source by detecting the burst transmission identification of the excitation source in the response reply of the subsequent excitation source. That is to say, in the process of initiating burst transmission, the passive node does not need to actively inquire the excitation source, but passively detects the message to enter the burst transmission, so that a large amount of energy consumption can be saved. Meanwhile, the burst transmission is determined by adopting a message mechanism, and the message transmission has the characteristic of fixed byte length, so that the communication negotiation efficiency can be effectively improved, more transmission time can be strived for the burst transmission, the transmission quantity of the burst transmission is improved, and the passive node equipment is ensured to transmit data information to the excitation source within limited time.

In an embodiment of the present application, the burst transmission module 104 is specifically configured to obtain an available timeslot; and transmitting data information to the excitation source by using the available time slot.

In one embodiment of the present application, the burst transmission module 104 is specifically configured to acquire each available time slot initiated based on the initial inquiry, the repeated inquiry, and the adjusted inquiry.

In one embodiment of the present application, the burst transmission module 104 is specifically configured to transmit data information to the excitation source by using available time slots during a burst transmission period.

In one embodiment of the present application, the method further includes: and the burst transmission acquisition interval control module is used for detecting the message sent by the excitation source after a specified time length when one burst transmission time interval is used up.

In one embodiment of the present application, the method further includes: and the state rollback module is used for executing the step of detecting the message sent by the excitation source if the burst transmission identifiers of other passive node equipment are detected from the response replies of the excitation source or the response replies of the excitation source are not received after a specified number of time slots after the self burst transmission identifiers are sent.

In an embodiment of the present application, the burst transmission identifier sending module 103 is specifically configured to send a burst transmission identifier, which is represented in a data form, to the excitation source.

Corresponding to the above method embodiment, the present application further provides an electronic device, and a wireless communication method described above may be referred to in correspondence with an electronic device described below.

Referring to fig. 5, the electronic device includes:

a memory 332 for storing a computer program;

a processor 322 for implementing the steps of the wireless communication method of the above-described method embodiments when executing the computer program.

Specifically, referring to fig. 6, fig. 6 is a schematic structural diagram of an electronic device provided in this embodiment, which may generate relatively large differences due to different configurations or performances, and may include one or more processors (CPUs) 322 (e.g., one or more processors) and a memory 332, where the memory 332 stores one or more computer applications 342 or data 344. Memory 332 may be, among other things, transient or persistent storage. The program stored in memory 332 may include one or more modules (not shown), each of which may include a sequence of instructions operating on a data processing device. Still further, the central processor 322 may be configured to communicate with the memory 332 to execute a series of instruction operations in the memory 332 on the electronic device 301.

The electronic device 301 may also include one or more power sources 326, one or more wired or wireless network interfaces 350, one or more input-output interfaces 358, and/or one or more operating systems 341.

The steps in the wireless communication method described above may be implemented by the structure of an electronic device.

Corresponding to the above method embodiment, this application embodiment also provides a readable storage medium, and a readable storage medium described below and a wireless communication method described above may be referred to correspondingly.

A readable storage medium, having stored thereon a computer program which, when executed by a processor, carries out the steps of the wireless communication method of the above-described method embodiments.

The readable storage medium may be a usb disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and various other readable storage media capable of storing program codes.

Those of skill would further appreciate that the various illustrative components and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware, computer software, or combinations of both, and that the various illustrative components and steps have been described above generally in terms of their functionality in order to clearly illustrate this interchangeability of hardware and software. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the implementation. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.

16页详细技术资料下载
上一篇:一种医用注射器针头装配设备
下一篇:一种防止信息重复发送方法、装置及存储介质

网友询问留言

已有0条留言

还没有人留言评论。精彩留言会获得点赞!

精彩留言,会给你点赞!

技术分类