Mining communication network maintenance protocol, system and design method thereof

文档序号:1942080 发布日期:2021-12-07 浏览:32次 中文

阅读说明:本技术 矿用通信网络维护协议、系统及其设计方法 (Mining communication network maintenance protocol, system and design method thereof ) 是由 谷志茹 陈顺科 于 2020-06-03 设计创作,主要内容包括:本发明公开了一种矿用通信网络维护协议、系统及其设计方法,所述矿用通信网络维护协议设计方法包括以下步骤:在矿井中布置通信节点,所述通信节点包括主节点和从节点,建立所述主节点和所述从节点之间的通信网络,所述通信网络的通信协议包括应用层、网络层、链路层、MAC层以及物理层,其中,所述通信协议的网络层具有主节点控制规则和从节点重置规则以实现矿用通信网络的自维护功能。采用本发明的方法使得当从节点接入错误网络,可以自动脱离现网络,并自主加入正确网络;当从节点故障,主节点可以在线监测并定位到相应节点,并把损坏节点踢出网络,并且主节点能够自主维护从节点档案,并更新路由,且以上过程完全不需要人员干预。(The invention discloses a mining communication network maintenance protocol, a mining communication network maintenance system and a design method thereof, wherein the design method of the mining communication network maintenance protocol comprises the following steps: arranging communication nodes in a mine, wherein the communication nodes comprise a master node and slave nodes, establishing a communication network between the master node and the slave nodes, and the communication protocol of the communication network comprises an application layer, a network layer, a link layer, a MAC layer and a physical layer, wherein the network layer of the communication protocol has master node control rules and slave node reset rules to realize the self-maintenance function of the mine communication network. The method of the invention can automatically separate from the current network and automatically join the correct network when the slave node is accessed to the wrong network; when the slave node fails, the master node can monitor and locate the corresponding node on line and kick the damaged node out of the network, and the master node can autonomously maintain the slave node file and update the route without human intervention.)

1. A mining communication network maintenance protocol design method is characterized by comprising the following steps:

arranging communication nodes in a mine, wherein the communication nodes comprise a master node and slave nodes, establishing a communication network between the master node and the slave nodes, and the communication protocol of the communication network comprises an application layer, a network layer, a link layer, an MAC layer and a physical layer;

the network layer of the communication protocol is provided with a master node control rule and a slave node reset rule to realize the self-maintenance function of the mining communication network.

2. The design method of the mining communication network self-maintenance protocol according to claim 1, wherein the master node control rule includes:

and the master node queries the state of the slave node in the MAT, and if the state of the slave node is '1', the master node kicks the slave node out of the communication network.

3. The mining communication network self-maintenance protocol design method according to claim 1, wherein the slave node resetting rule comprises:

the master node queries the status of the slave node in the SIB, and if the status of the slave node is "1", sets an nxp model type attribute of an NIB attribute to undefined, and the slave node leaves the communication network.

4. The mining communication network maintenance protocol design method according to claim 2, wherein the step of the master node kicking the slave node out of the communication network in the master node control rule is:

the application layer of the main node sends a deletion command to inform the network layer of the main node to delete the slave node;

the network layer of the main node sends a Kick command to the MAC layer of the main node after receiving the deletion command;

the MAC layer of the main node transmits a Kick command to the MAC layer of the slave node through a wireless network;

after receiving the Kick command, the MAC layer of the slave node sends an off-network and reset command to the network layer of the slave node;

after receiving the off-network and reset commands, the network layer of the slave node notifies the application layer of the slave node to perform off-network operation and notifies the MAC layer of the slave node to perform reset operation;

the application layer of the slave node performs off-network operation; and the MAC layer of the slave node performs reset operation and returns reset operation completion information to the network layer of the slave node.

5. The mining communication network maintenance protocol design method according to claim 4, wherein the MAC layer of the master node notifies the network layer of the master node that kicking out is completed after sending a Kick command; and after receiving the kick-out completion information, the network layer of the master node informs an application layer of the master node to delete the corresponding entry of the slave node in the MAT, thereby maintaining the MAT.

6. The mining communication network maintenance protocol design method according to claim 3, wherein the step of the slave node leaving the communication network in the slave node reset rule is:

the application layer of the slave node sends a reset command to inform the network layer of the slave node of resetting;

after receiving a reset command, the network layer of the slave node sets the NXPMODULETYPE attribute in NIB to be undefined and sends an off-network command to the MAC layer of the slave node;

the MAC layer of the slave node receives the off-network command to perform off-network operation and returns off-network completion information to the network layer of the slave node;

the network layer of the slave node receives the off-network completion information and then sends a reset command to the MAC layer of the slave node;

after receiving a reset command to perform reset operation, the MAC layer of the slave node returns reset completion information to the network layer of the slave node;

and after receiving the reset completion information, the network layer of the slave node informs the application layer of the slave node of the completion of the reset operation.

7. The mining communication network maintenance protocol design method of claim 6, wherein the MAC layer of the master node notifies the network layer of the master node of the off-network status of the slave node after acquiring the off-network completion information through a wireless network, and the network layer of the master node notifies the application layer of the master node of deleting the corresponding entry of the slave node in the MAT after receiving the off-network status of the slave node.

8. The mining communication network maintenance protocol design method according to claim 7, wherein the state of the slave node includes: "0" means invalid; "1" means not activated; "2" means activation; "3" means valid;

the slave node state rule is as follows:

the status of the slave node is "3" when the slave node is not accessing the network but is present in the MAT;

when the network layer is in normal communication with the application terminal, the state of the slave node is '2';

when the abnormal communication time between the network layer and the application terminal exceeds 240MIN and is reduced to 0MIN according to the preset step length, the initial state of the slave node is '1';

when the slave node is not present in the MAT, the status of the slave node is "0".

9. A mining communication network maintenance protocol, characterized in that rules designed by the mining communication network maintenance protocol design method according to any one of claims 1-8 are adopted in the network layer of the mining communication network maintenance protocol.

10. A mining communication system, characterized in that the mining communication system communicates using a mining communication network maintenance protocol, which employs the mining communication network maintenance protocol of claim 9.

Technical Field

The invention relates to the field of communication, and particularly discloses a mining communication network maintenance protocol, a mining communication network maintenance system and a design method of the mining communication network maintenance protocol.

Background

The underground mine is a special working environment, and a wireless channel under the mine is different from a general ground wireless communication channel and has the following characteristics:

(1) the underground space is narrow, radio electromagnetic waves propagate in the space and encounter multiple reflections, so that signals reach a receiving end through multiple paths, and frequency selective fading exists.

(2) The longitudinal and transverse directions of the mine can reach dozens of kilometers and hundreds of kilometers, the space is narrow, the roadway is inclined, the roadway has turning and branching, and the surface of the roadway is rough, so that the maintenance and the maintenance of the network with multiple communication nodes are difficult.

(3) The underground space is limited, the electromechanical equipment is relatively centralized, and the power is large, so the electromagnetic interference is serious, so the working frequency of the mine wireless communication system should be selected by considering the interference sources, and the high frequency or the very high frequency should be selected as the working frequency of the system as much as possible.

Due to the particularity of the underground wireless channel, the development of the mine wireless communication system is restricted. So far, the underground mine in China mainly adopts a wired communication mode. The wireless communication modes of mines at home and abroad mainly comprise leakage communication, induction communication, through-the-earth communication, PHS communication, 3G communication system and the like. The through-the-earth communication system has the problems of large equipment volume, heavy weight, small channel capacity, high ground equipment power, difficult ground antenna arrangement, one-way communication and the like, so the through-the-earth communication system is not suitable for being used as a wireless communication system in a coal mine; the leakage communication system has the problems of narrow bandwidth, poor anti-disaster capability, poor reliability caused by a large number of series relays, no redundancy function and the like, so the leakage communication system is not suitable for being used as a wireless communication system in a coal mine; the PHS communication system and the 3G communication system have the problems that a base station controller and a base station are not intrinsically safe and explosion-proof, the system does not have a redundancy function, the anti-disaster capability is poor, the bandwidth is narrow, the maximum communication distance from an underground base station to the ground does not meet the requirement that the underground communication is more than 10 kilometers, and the like.

There is a need for a wireless communication protocol that accommodates the use of a mineral channel.

Disclosure of Invention

In order to solve the problems in the prior art, the invention provides a mining communication network maintenance protocol design method, which at least partially solves the problems in the prior art.

In order to achieve the purpose, the invention provides a mining communication network maintenance protocol design method, which comprises the following steps:

arranging communication nodes in a mine, wherein the communication nodes comprise a master node and slave nodes, establishing a communication network between the master node and the slave nodes, and the communication protocol of the communication network comprises an application layer, a network layer, a link layer, an MAC layer and a physical layer;

the network layer of the communication protocol is provided with a master node control rule and a slave node reset rule to realize the self-maintenance function of the mining communication network.

Preferably, the master node control rule includes:

and the master node queries the state of the slave node in the MAT, and if the state of the slave node is '1', the master node kicks the slave node out of the communication network.

Preferably, the slave node resetting rule includes:

the master node queries the status of the slave node in the SIB, and if the status of the slave node is "1", sets an nxp model type attribute of an NIB attribute to undefined, and the slave node leaves the communication network.

Preferably, the step of kicking the slave node out of the communication network by the master node in the master node control rule is:

the application layer of the main node sends a deletion command to inform the network layer of the main node to delete the slave node;

the network layer of the main node sends a Kick command to the MAC layer of the main node after receiving the deletion command;

the MAC layer of the main node transmits a Kick command to the MAC layer of the slave node through a wireless network;

after receiving the Kick command, the MAC layer of the slave node sends an off-network and reset command to the network layer of the slave node;

after receiving the off-network and reset commands, the network layer of the slave node notifies the application layer of the slave node to perform off-network operation and notifies the MAC layer of the slave node to perform reset operation;

the application layer of the slave node performs off-network operation; and the MAC layer of the slave node performs reset operation and returns reset operation completion information to the network layer of the slave node.

Preferably, after the MAC layer of the master node sends a sock command, the MAC layer of the master node notifies the network layer of the master node that the kicking-out is completed; and after receiving the kick-out completion information, the network layer of the master node informs an application layer of the master node to delete the corresponding entry of the slave node in the MAT, thereby maintaining the MAT.

Preferably, the step of the slave node leaving the communication network in the slave node reset rule is:

the application layer of the slave node sends a reset command to inform the network layer of the slave node of resetting;

after receiving a reset command, the network layer of the slave node sets the NXPMODULETYPE attribute in NIB to be undefined and sends an off-network command to the MAC layer of the slave node;

the MAC layer of the slave node receives the off-network command to perform off-network operation and returns off-network completion information to the network layer of the slave node;

the network layer of the slave node receives the off-network completion information and then sends a reset command to the MAC layer of the slave node;

after receiving a reset command to perform reset operation, the MAC layer of the slave node returns reset completion information to the network layer of the slave node;

and after receiving the reset completion information, the network layer of the slave node informs the application layer of the slave node of the completion of the reset operation.

Preferably, the MAC layer of the master node notifies the network layer of the master node of the off-network status of the slave node after acquiring the off-network completion information through the wireless network, and the network layer of the master node notifies the application layer of the master node of deleting the corresponding entry of the slave node in the MAT after receiving the off-network status of the slave node.

Preferably, the state of the slave node comprises: "0" means invalid; "1" means not activated; "2" means activation; "3" means valid;

the slave node state change rule is as follows:

the status of the slave node is "3" when the slave node is not accessing the network but is present in the MAT;

when the network layer is in normal communication with the application terminal, the state of the slave node is '2';

when the abnormal communication time between the network layer and the application terminal exceeds 240MIN and is reduced to 0MIN according to the preset step length, the initial state of the slave node is '1';

when the slave node is not present in the MAT, the status of the slave node is "0"

In addition, in order to achieve the above object, the present invention further provides a mining communication network maintenance protocol, wherein a rule designed by the mining communication network maintenance protocol design method is inserted into a network layer of the mining communication network maintenance protocol.

In addition, in order to achieve the above purpose, the present invention further provides a mining communication system, where the mining communication system uses a mining communication network for communication, and the mining communication network uses the mining communication network as described above.

The invention has the following advantages:

1. the slave node accesses the error network, can automatically leave the current network and autonomously join the correct network.

2. And when the slave node fails (is damaged or loses power), the master node can monitor and locate the corresponding node on line and kick the damaged node out of the network.

3. The master node autonomously maintains the slave node profile and updates the route.

The above procedure requires no human intervention at all.

Drawings

Fig. 1 is a flowchart of a mining communication network maintenance protocol design method according to a preferred embodiment of the present invention;

FIG. 2 is a diagram of a network protocol architecture;

FIG. 3 is a timing diagram illustrating master node control rules in accordance with a preferred embodiment of the present invention;

FIG. 4 is a timing diagram of a slave node reset rule in accordance with a preferred embodiment of the present invention.

Detailed Description

The embodiments of the present disclosure are described in detail below with reference to the accompanying drawings.

The embodiments of the present disclosure are described below with specific examples, and other advantages and effects of the present disclosure will be readily apparent to those skilled in the art from the disclosure in the specification. It is to be understood that the described embodiments are merely illustrative of some, and not restrictive, of the embodiments of the disclosure. The disclosure may be embodied or carried out in various other specific embodiments, and various modifications and changes may be made in the details within the description without departing from the spirit of the disclosure. It is to be noted that the features in the following embodiments and examples may be combined with each other without conflict. All other embodiments, which can be derived by a person skilled in the art from the embodiments disclosed herein without making any creative effort, shall fall within the protection scope of the present disclosure.

It is noted that various aspects of the embodiments are described below within the scope of the appended claims. It should be apparent that the aspects described herein may be embodied in a wide variety of forms and that any specific structure and/or function described herein is merely illustrative. Based on the disclosure, one skilled in the art should appreciate that one aspect described herein may be implemented independently of any other aspects and that two or more of these aspects may be combined in various ways. For example, an apparatus may be implemented and/or a method practiced using any number of the aspects set forth herein. Additionally, such an apparatus may be implemented and/or such a method may be practiced using other structure and/or functionality in addition to one or more of the aspects set forth herein.

It should be noted that the drawings provided in the following embodiments are only for illustrating the basic idea of the present disclosure, and the drawings only show the components related to the present disclosure rather than the number, shape and size of the components in actual implementation, and the type, amount and ratio of the components in actual implementation may be changed arbitrarily, and the layout of the components may be more complicated.

In addition, in the following description, specific details are provided to facilitate a thorough understanding of the examples. However, it will be understood by those skilled in the art that the aspects may be practiced without these specific details.

The embodiment of the disclosure provides a mining communication network maintenance protocol design method.

Referring to fig. 2, fig. 2 is a typical network protocol structure diagram, in order to improve the reliability of the mine communication network and reduce the maintenance workload of field personnel on the communication network, the master node control rule and the slave node reset rule are inserted into the network layer, and the problem of self-maintenance of the mine communication node network is managed and solved in a centralized manner, so that a fault node in the network can be automatically positioned and reported, and the fault node is removed from the network, thereby greatly improving the reliability of the mine communication network and reducing the difficulty and workload of manual maintenance. The physical layer is mainly responsible for the work of the radio frequency part, and converts an electric signal into an electromagnetic wave suitable for being transmitted in a wireless channel through an antenna after being coded and modulated, or converts the electromagnetic wave into the electric signal after being received by the antenna and carries out opposite processing. The MAC layer is a medium access control layer and is mainly responsible for informing the physical layer of the method and time for transmitting data in the radio channel, controlling the access of the spectrum and assembling data packets for transmission. The link layer is responsible for controlling and managing the communication link and shielding the upper layer from the specific implementation of the lower layer. The network layer is the key point of the invention, mainly completes the establishment of the network and the discovery of the route, and is responsible for establishing the communication route from the source node to the destination node, quickly diagnosing and repairing the node of the communication fault and constructing the maintenance-free multi-hop ad hoc network.

Referring to fig. 1, the mining communication network maintenance protocol design method of the present invention includes the following steps:

s10: the method comprises the steps of arranging a master node and a slave node in a mine, establishing a communication network between the master node and the slave node and acquiring a maintenance protocol of the communication network.

The positions of the master node and the slave nodes can be arranged according to actual requirements, and the network communication between the master node and the slave nodes and the routing between the nodes adopt the existing communication network protocol. Master node (Master): powering up to build and maintain a network; slave node (Slave): and the network is powered on to join the network and has a relay function.

S20: and inserting a master node control rule and a slave node reset rule in a network layer of the maintenance protocol so as to establish the mining communication network maintenance protocol.

The network layer frame formats and fields of the mining communication network maintenance protocol are shown in table 1 and table 2 below.

TABLE 1

TABLE 2

The hierarchy of the mining communication network maintenance protocol is used to indicate which Layer field of the mining communication protocol the message is for, as shown in table 3 below.

TABLE 3

Value of Description of the invention
0x01 Physical layer (PHY layer)
0x02 MAC layer (MAC layer)
0x03 Link layer (Link layer)
0x04 Network layer (Network layer)
0x05 Application layer (Application layer)
0x06-0xFF Retention

The network layer primitive list is shown in table 4 below.

TABLE 4

The data type of the structure parameter of the primitive is defined as follows:

unsigned char(8bits);unsigned short(16bits);unsigned int(32bits)。

NXP-GET.request

structure(size(2));

{

AttributeId unsigned char(8bits),

AttributeIndex unsigned short(16bits)

}

NXP-GET.confirm

structure(size(4))

{

Status unsigned char(8bits),

AttributeId unsigned char(8bits),

AttributeIndex unsigned short(16bits),

AttributeValue octet-string

}

NXP-SET.request

structure(size(3))

{

AttributeId unsigned char(8bits),

AttributeIndex unsigned short(16bits),

AttributeValue octet-string

}

NXP-SET.confirm

structure(size(3))

{

Status unsigned char(8bits),

AttributeId unsigned char(8bits),

AttributeIndex unsigned short(16bits)

}

NXP-STATUS.indication

structure(size(2))

{

Status unsigned char(8bits),

AdditionalInfo octet-string

}

table 5 below lists possible states

TABLE 5

Status of state
SLAVE_JOINED
SLAVE_left
MODEM_IS_READY
MODEM_ERROR

The NIB (Network Layer information base) shows the IB attribute of the Network Layer, and is accessed using NXP-GET and NXP-SET primitives (the Layer field in the interface frame is SET to 0x 04). NXP network layer attributes are shown in Table 6 below

TABLE 6

The MAT (Master-Archive-Table) is created by the Master node when the networking is powered on, and obtains the state of the Slave node in SIB (Slave-IB) through an NXP-GET primitive, and updates the state of the Slave node in the MAT Table through the NXP-SET primitive, where MAT is shown in Table 7 below.

TABLE 7

SIB (Slave-IB, Slave node information Table) is shown in Table 8 below

TABLE 8

Created by the slave node network layer in the process of joining the network.

Wherein the slave node states are defined as follows.

The state is "0", indicating that the slave node is "invalid"; its address has been deleted from the master node archive table and this corresponding slave node information is considered empty.

The state is "1", indicating that the slave node is "inactive"; the node has access to the network but does not communicate within a limited time, and the node is considered to have the following three situations

1) The access to the wrong network is made,

2) failure of the meter

3) The node removal

And detach it from the network.

The state is "2", indicating that the slave node is "active"; and the node has access to the network and communicates normally.

The state is "3", indicating that the slave node is "active"; the address of the node to be accessed is in the SIB, but the network has not been accessed yet.

The slave node address index is utilized as the node device ID corresponding to the slave node address.

The principle of the master node control rule is as follows: and the master node calls the NXP-GET primitive to inquire the state of the slave node in the MAT, and if the state of the slave node is '1', the master node kicks the slave node out of the communication network. Referring to fig. 3, the steps of the master node control rule are: the application layer of the master node calls an NXP-SET request primitive to inform a network layer of the master node to carry out the reset operation of the slave node;

after receiving the reset operation information, the network layer of the main node calls an ADPM-LBP request primitive to send a Kick command to the MAC layer of the main node;

the MAC layer of the master node transmits the Kick command to the MAC layer of the slave node through a wireless network;

receiving a Kick command from the MAC layer of the slave node to call an ADPM-NETWORK _ LEAVE.indication primitive to inform the NETWORK layer of the slave node to reset;

after receiving the reset request information, the network layer of the slave node calls an NXP-STATUS.indication primitive to inform an application layer of the slave node of off-network operation and calls an ADPM-reset.request primitive to inform an MAC layer of the slave node of resetting operation;

carrying out off-network operation on an application layer of the slave node; and carrying out reset operation on the MAC layer of the slave node and calling the ADPM-reset.confirm primitive and the ADPM-buffer.indication primitive to inform the network layer of the slave node that the reset operation is completed.

After the MAC layer of the main node sends a Kick command, the MAC layer informs the network layer of the main node of completing the reset; and after receiving the reset completion information, the network layer of the master node calls the NXP-SET.

The principle of the slave node resetting rule is as follows: the slave node leaves the communication network when the nxp model attribute in the NIB attribute is set to be not triggered. Referring to fig. 4, the steps of the master node controlling the rules are: the application layer of the slave node calls an NXP-SET request primitive to inform the network layer of the slave node to reset;

after receiving the reset request, the NETWORK layer of the slave node sets the NXPMODULETYPE attribute in the NIB to be not triggered and calls ADPM-NETWORK-LEAVE.request primitive to inform the MAC layer of the slave node to carry out off-NETWORK operation;

after the MAC layer of the slave node performs NETWORK disconnection operation, an ADPM-NETWORK-LEAVE.confirm primitive is called to inform the NETWORK layer of the slave node of completing NETWORK disconnection;

after receiving the completion of the off-network, the network layer of the slave node calls an ADPM-RESET request primitive to inform the MAC layer of the slave node to carry out reset operation;

after the MAC layer of the slave node performs reset operation, an ADPM-RESET.confirm primitive and an ADPM-RESET.indication primitive are called to inform the network layer of the slave node that the reset operation is completed;

the network layer of the slave node calls the NXP-set. confirm primitive to notify the application layer of the slave node that the reset operation is complete.

The MAC layer of the main node acquires the off-network state of the slave node through a wireless network and calls an ADPM-LBP.indication primitive to inform the network layer of the main node of the off-network state of the slave node, and the network layer of the main node receives the off-network state of the slave node and calls an NXP-STATUS.indication primitive to inform the application layer of the main node of deleting a corresponding entry of the slave node in the MAT.

The above is only a preferred embodiment of the present invention, and is not intended to limit the present invention, and various modifications and changes will occur to those skilled in the art. Any modification, equivalent replacement, or improvement made within the spirit and principle of the present invention should be included in the protection scope of the present invention.

16页详细技术资料下载
上一篇:一种医用注射器针头装配设备
下一篇:基于基本服务集(BSS)颜色的限制和缓解

网友询问留言

已有0条留言

还没有人留言评论。精彩留言会获得点赞!

精彩留言,会给你点赞!