CN110662226A - Novel networking protocol method based on ubiquitous power Internet of things - Google Patents

Novel networking protocol method based on ubiquitous power Internet of things Download PDF

Info

Publication number
CN110662226A
CN110662226A CN201910800769.4A CN201910800769A CN110662226A CN 110662226 A CN110662226 A CN 110662226A CN 201910800769 A CN201910800769 A CN 201910800769A CN 110662226 A CN110662226 A CN 110662226A
Authority
CN
China
Prior art keywords
frame
definition
network
terminal
domain
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910800769.4A
Other languages
Chinese (zh)
Inventor
吴玉成
周力
盛机华
刘巧
余海飞
余盼龙
熊灿云
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chongqing University
Original Assignee
Chongqing University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chongqing University filed Critical Chongqing University
Priority to CN201910800769.4A priority Critical patent/CN110662226A/en
Publication of CN110662226A publication Critical patent/CN110662226A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W16/00Network planning, e.g. coverage or traffic planning tools; Network deployment, e.g. resource partitioning or cells structures
    • H04W16/24Cell structures
    • H04W16/26Cell enhancers or enhancement, e.g. for tunnels, building shadow
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L1/00Arrangements for detecting or preventing errors in the information received
    • H04L1/004Arrangements for detecting or preventing errors in the information received by using forward error control
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L1/00Arrangements for detecting or preventing errors in the information received
    • H04L1/0078Avoidance of errors by organising the transmitted data in a format specifically designed to deal with errors, e.g. location
    • H04L1/0083Formatting with frames or packets; Protocol or part of protocol for error control
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W28/00Network traffic management; Network resource management
    • H04W28/02Traffic management, e.g. flow control or congestion control
    • H04W28/06Optimizing the usage of the radio link, e.g. header compression, information sizing, discarding information
    • H04W28/065Optimizing the usage of the radio link, e.g. header compression, information sizing, discarding information using assembly or disassembly of packets
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W74/00Wireless channel access
    • H04W74/08Non-scheduled access, e.g. ALOHA
    • H04W74/0833Random access procedures, e.g. with 4-step access

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention relates to a novel networking protocol method based on a ubiquitous power Internet of things, which solves the technical problems of no data communication and weak sharing real-time performance, and adopts the frame format definition, the network message type definition and the networking process definition; the frame format definition comprises overall definition, length domain definition, state domain definition, address domain definition, frame check domain definition, frame control domain definition, fragmentation mark definition, priority definition, encryption and power control definition and retransmission mark definition; the overall definition comprises the technical scheme that the whole frame format uses a unified MAC frame format and is divided into a length domain, a destination address domain, a source address domain, a state domain, a check domain, a data domain and a frame control domain, so that the problem is well solved, and the method can be used in a power private network or the Internet of things.

Description

Novel networking protocol method based on ubiquitous power Internet of things
Technical Field
The invention relates to the field of power internet of things/power wireless private networks, in particular to a novel networking protocol method based on a ubiquitous power internet of things.
Background
The wireless private network communication of the electric power working on the discrete frequency point bears the data communication resource based on the analog wireless communication technology, and the wireless private network communication is used by most provincial power networks as the electric power information acquisition and monitoring of the large private power transformer users in the past. The traditional electric power wireless private network communication system is strong in communication error correction capacity and high in data processing efficiency, solves the problem of high cost of an optical fiber communication mode, and plays a positive role in the construction of the past power utilization information acquisition system.
However, with the development of society, the demand for electric power is more vigorous, the power grid is more and more complex, the types and the number of access devices are more and more, the form of the power grid is changed, and the safe operation pressure of the power grid is increased. In the aspect of power grid operation, when a traditional electric power wireless private network communication system operates, data is not communicated, sharing instantaneity is not strong, the value of the data in the aspects of improving the safe operation level, efficiency benefit, working quality and the like of a power grid is not fully played, and an obvious effect is not obtained; the resource capacity of large-scale and large-scale energy optimization allocation is not fully embodied. In the aspect of infrastructure, the coverage of terminal acquisition and monitoring is insufficient, unified planning design and standard are lacked, and unified internet of things management is not realized; the communication access network has insufficient coverage depth and insufficient bandwidth; the utilization rate of software and hardware resources of the platform is low, the flexibility of data storage, processing and application is low, and the capability of quickly responding to the change of the demand is insufficient.
The invention provides a novel networking protocol method based on a ubiquitous power internet of things, which is based on a novel networking protocol of the ubiquitous power internet of things and can solve the technical problems.
Disclosure of Invention
The invention aims to solve the technical problems of non-through data and weak sharing instantaneity in the prior art. The novel networking protocol method based on the ubiquitous power Internet of things has the characteristics of unified interactive interface, good error control and high confidentiality.
In order to solve the technical problems, the technical scheme is as follows:
a novel networking protocol method based on a ubiquitous power Internet of things comprises a base station and a terminal, wherein the protocol method comprises a frame format definition, a network message type definition and a networking process definition;
the frame format definition comprises overall definition, length domain definition, state domain definition, address domain definition, frame check domain definition, frame control domain definition, fragmentation mark definition, priority definition, encryption and power control definition and retransmission mark definition;
the overall definition comprises that the whole frame format uses a MAC frame format with unified standard and is divided into a length field, a destination address field, a source address field, a state field, a check field, a data field and a frame control field.
In the foregoing solution, for optimization, the frame control domain further includes a control function for implementing a frame header, where the control function includes power control, intelligent relay, error retransmission, service classification, encryption, and data fragmentation encapsulation, and the corresponding frame control domain includes a fragmentation flag, a priority, a frame type, an intelligent relay flag, an encryption flag, a power control flag, and a retransmission flag.
Further, the fragmentation mark is used for realizing the encapsulation/de-encapsulation function of the data frame, and the fragmentation mark comprises four states of non-fragmentation, a first fragment, a middle fragment and a last fragment.
Further, the length field is defined to define a length exceeding a maximum length of the application frame as a length field length;
the address domain definition comprises a destination address domain and a source address domain which can meet the maximum capacity of the network and can establish ID (identity) relation between upper and lower layers of equipment; the destination address field and the source address field are both established with an association function of the MAC address and the terminal serial number;
the state field is coded by adopting a one-hot coding method of a state machine;
the check domain is used for providing data space for error control and is divided into a frame header check domain and a whole frame check domain.
Further, the network message type definition comprises defining the network message as a network management frame and a data frame;
the network management frame is defined according to different scenes of a networking process, a communication mode of sending and receiving is adopted, the sending of each frame is defined with the reply of a corresponding frame type, and the representation shows that the communication is successful;
the data frame comprises a data frame representing the active downlink of the master station and an emergency report message representing the active uplink of the terminal.
Further, the network management frame includes:
a signal description message frame DCD for characterizing a message broadcasted by a base station to a neighboring terminal, the signal description message frame DCD including 1 count defined in a data link layer, the count being incremented by 1 whenever the physical layer should be interacted with no matter whether the data is actually interacted with at that time;
and a network access time node message Send _ slot for characterizing the network access permission state.
Further, the networking process definition comprises direct connection networking process design and relay networking process design.
Further, the direct connection networking process design comprises direct connection network access, direct connection on-line and direct connection off-line;
the direct connection network access comprises a search base station and a registration network access, wherein the registration network access comprises a network access application, identity authentication and network access success authentication;
the base station searching comprises initializing, entering an interception state, searching a signal description message frame DCD of the base station, and judging that the base station is a hidden terminal or the downlink synchronization is completed according to the result of searching the signal description message frame DCD of the base station.
Further, the relay networking process design comprises relay network access, relay on-line network and relay off-line network; the relay network access comprises a base station search and a registered network access;
the searching base station comprises that in a searching base station directly connected to a network, after a terminal judges and defines the terminal as a hidden terminal, the terminal sends a Detect frame to an adjacent terminal, waits for a reply frame Detect _ RSP, and screens out a relay terminal according to field intensity or reply time and hop count if a plurality of reply frames Detect _ RSP are searched;
and the registration network access comprises the step that the hidden terminal performs relay networking with the base station through the screened relay terminal.
Further, the relay on-line comprises a hidden terminal, and the hidden terminal performs step-by-step data interaction with the base station through the screened relay terminal;
the relay network quitting comprises that after the subordinate terminal of the terminal intending to quit the network quits the network in advance, the terminal intending to quit the network quits the network again.
The novel networking protocol based on the ubiquitous power Internet of things realizes a unified interactive interface: the data link layer is the second layer in the OSI seven layer model, located between the physical layer and the network layer. The core function is to shield the difference of physical layer and provide uniform standard interface for network layer. After the data arrives at the data link layer, the data is collectively referred to as a frame.
The internal part has the functions of error control and certain error correction: the physical interface layer of the lower layer inevitably has errors due to the influence of electromagnetic interference, terrain and the like, so that certain error control capability is required. In addition, errors of the physical interface layer are generally errors of individual bits, and the overall performance can be improved by adopting an error correction coding mode, but the effective data rate can also be reduced by adopting the error correction coding mode.
Data frame packing/unpacking function: the maximum length of the TCP packet of the upper layer is 1500 bytes, and the maximum length of the physical frame of the lower layer is 128 bytes. The data frame packing/unpacking function can complete the mutual conversion of upper and lower data.
Conflict detection and conflict resolution: the reason that the traditional electric power wireless private network equipment does not support active reporting is that the conflict cannot be solved, and because the protocol layer is newly divided in the second chapter, the network resource management function of the base station is increased, and the conflict solution is possible.
Identity authentication management of the network, encryption and decryption of key data: the electric power information has certain confidentiality and is far beyond public network communication, so that identity authentication is required and certain support is provided for encryption on a protocol level.
And realizing networking function at a data link layer: after the base station is defined with the network management function, nodes need to be integrated together in a networking mode, and each node is managed through the network, so that reasonable distribution of network resources is realized.
Intelligent relay function: in order to solve the problems of dead angles and blind areas in the communication process and improve the wireless coverage range, the intelligent relay function can be realized by utilizing the mutual communication between terminal nodes.
Service type shunting: different service priorities are set for different service types, so that the data with priority and emergency can be processed preferentially.
The novel networking protocol based on the ubiquitous power Internet of things comprises but is not limited to frame format design, network message type design and networking process design.
The novel networking protocol based on the ubiquitous power Internet of things can be used for designing a frame format required by networking communication according to functional requirements; designing the network message type in the frame format according to the scene in the networking process; and designing a networking process by using the designed network message type frame, wherein the networking process is divided into a direct connection networking process design and a relay networking process design.
The invention has the beneficial effects that: the invention discloses a system constructed based on a novel networking protocol of a ubiquitous power Internet of things, which solves a plurality of defects in a traditional power wireless private network system, improves the working state of the system, such as a unified interactive interface, a function of controlling errors in the system and a certain error correction function, a data frame packaging/disassembling function and a network resource management function of a base station, provides possibility for conflict solution, identity authentication management of the network, encryption and decryption of key data, management of each node through the network, reasonable distribution of network resources, utilization of mutual communication among terminal nodes, realization of an intelligent relay function, setting of different service priorities for different service types and priority processing of priority urgent data.
Drawings
The invention is further illustrated with reference to the following figures and examples.
Fig. 1 is a schematic diagram of a direct access network process.
Fig. 2 is a schematic diagram of a process of searching for a base station in a direct access network.
Fig. 3 is a schematic diagram of registering network access in a direct network access.
Fig. 4 is a schematic diagram of an online data interaction process in a direct access network.
Fig. 5 is a schematic diagram of an active network logout message flow of a terminal in a direct access network.
Fig. 6 is a schematic diagram of active network quitting of a terminal in a direct access network.
Fig. 7 is a schematic diagram of a process of waiting for a response at the middle side of the direct access network.
Fig. 8 is a schematic diagram of the operation of the SS on the BS side of the direct access network.
Fig. 9 is a schematic diagram of a hidden terminal in a relay networking process.
Fig. 10 is a schematic diagram of a hidden terminal searching for a base station in a relay networking process.
Fig. 11 is a schematic diagram of a terminal registration network access process in a relay networking process.
Fig. 12 is a schematic diagram of a data flow after a hidden terminal accesses a network in a relay networking process.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention is further described in detail with reference to the following embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
Example 1
The embodiment provides a novel networking protocol method based on a ubiquitous power internet of things, which comprises a base station and a terminal, wherein the novel networking protocol method based on the ubiquitous power internet of things comprises a frame format definition, a network message type definition and a networking process definition;
the frame format definition comprises overall definition, length domain definition, state domain definition, address domain definition, frame check domain definition, frame control domain definition, fragmentation mark definition, priority definition, encryption and power control definition and retransmission mark definition;
the overall definition comprises that the whole frame format uses a MAC frame format with unified standard and is divided into a length field, a destination address field, a source address field, a state field, a check field, a data field and a frame control field.
In this embodiment, the frame format definition is completed by adopting a design sequence of the total score.
And overall definition, firstly, overall design is carried out on a frame format, and contents required to be contained in the frame format are analyzed and determined according to functional requirements. Firstly, the present embodiment needs to unify the standard MAC frame format; aiming at the requirement of controlling error codes, a check code needs to be designed; the power information needs to be kept secret, and the embodiment provides an encryption flag to indicate whether the content of the current frame is encrypted; since the whole communication process is one transmission and one reception, and the information transmitted and received is different in different periods, in order to better separate scenes, the present embodiment adopts a state machine method, so that a state flag domain is required. In addition, the frame format of the basic transceiving communication needs a length field, a destination address field and a source address field, and realizes the basic functions of identifying each other and judging whether complete receiving of one frame is completed by the transceiving parties.
Therefore, the present embodiment divides the entire frame format into a length field, a destination address field, a source address field, a status field, a check field, a data field, and a frame control field.
This embodiment places a unity of space requiring one or several bits in the frame control field. In addition, because the correctness of the frame header relates to whether the whole frame is correctly identified, the embodiment divides the check domain into two parts, namely a frame header check domain and a whole frame check domain, and the format of the whole frame obtained by integrating the two parts is shown in table 1.
TABLE 1 Overall frame Format
Figure BDA0002182245480000091
In table 1, the size of one MAC frame is designed to be 256 bytes, where 10 bytes are the header, the last byte of the header is the CRC check code of the header, the data part is behind the header, and then the last two bytes are the CRC check code of the entire frame.
Length field design: the length field is mainly the length of the length field, enabling the length to express a sufficiently long frame type. The value of the length field is used to express the length of the application frame, the present embodiment uses two bytes, 16 bits, and the power of 2 is 16, and the size of the length field exceeds the maximum length 1500 of the application frame, which can satisfy the application.
Designing a state domain: the state field is used to indicate the state in which the device is currently located within the network. Because the networking is realized on the data link layer, each terminal has respective state, the current state of the terminal can be judged, if the state is abnormal, the network can be recovered by re-accessing the network, and the self-healing capability of the network is improved. The state field value of this embodiment is defined as 1 byte, and can support 256 states, and a one-hot encoding mode of a state machine is adopted, so that the fault tolerance is improved.
Because the base station communicates with the terminal, the embodiment uses a uniform MAC frame format, the state of the base station is forced to be 0, and the logic analysis and judgment are not performed on the state of the base station, so that even if an abnormal state occurs, no influence is caused. And for the terminal communication module, five states are divided in total. The state is respectively an initialization state, a downlink synchronization success state, a network access in-process state, a network access success state and a network quitting deadlock state. The codes are shown in Table 2. The specific state jumps are described in detail later.
TABLE 2 State field (Unit: bit)
Value of 1 10 100 1000 10000
Of significance Initialization Success of downlink synchronization In the network access process Success of network access Back net (deadlock)
The address domain design needs to be able to meet the maximum capacity of the network and to establish the association between the IDs of the upper and lower devices. When the MAC address is set, the length of the address domain is designed to be two bytes, namely 16 bits, the maximum 65536 devices can be supported, and the maximum supported number of terminals by a base station is 2048.
In the power system, the host of the grid company server stores information of the terminal, not the base station. On the service logic, the server is directly sent to the terminal equipment through the LAN port, and the MAC address of the base station is not influenced. For the flag, the MAC address of the base station is set to the first bit 0 in this embodiment.
Due to the communication of the MAC layer, the MAC address is used, and the existing server of the grid company stores only the terminal serial number of the corresponding terminal. In this embodiment, an association function is established, so that the MAC addresses correspond to the terminal serial numbers one to one, and the base station resolves the target terminal device after receiving the upper application frame.
The communication mode of the communication system is logically divided into broadcast and point-to-point communication, and when the communication is broadcast, the destination address needs to be set to FFFF.
The frame check field is designed to provide data space for error control, and the embodiment adopts two CRC check codes to guarantee data analysis.
In practical tests, it is found that once a frame header has an error, there is a great risk in analyzing the whole frame. Therefore, in the embodiment, the data of the frame header is independently checked, and once the data of the frame header is checked to be wrong, the frame is immediately discarded without performing subsequent work, so that the workload is reduced.
The control function of the frame header is realized in the frame control part, and the design length is two bytes. According to the functional requirements, the functions of power control, intelligent relay, error retransmission, service classification, encryption, data fragment encapsulation and the like need to be met, so that the contents of fragment marks, priority, frame types, intelligent relay marks, encryption marks, power control marks, retransmission marks and the like are needed. The specific byte divisions are as in table 3.
TABLE 3 frame control Format
Figure BDA0002182245480000111
The fragmentation mark is designed to realize the encapsulation/de-encapsulation function of the data frame, and the fragmentation mark is realized by adopting two bits according to a sequential coding method. The specific byte divisions are shown in table 4.
TABLE 4 fragmentation marks
Value of 00 01 10 11
Definition of Not dividing into pieces First sheet Intermediate sheet Last sheet
The slice flag of the present embodiment is divided into four states shown in table 4, so that the assembling can be performed correctly. Since the length inside the header is the length of the entire application frame, the length of one MAC frame is generally 256 bytes by default. Therefore, the frame length of the last MAC can be calculated, and the number of MAC frames allowed to be divided by one application frame can be calculated, and finally, the bytes of the upper bits or the bytes of the lower bits can be directly obtained. In addition, the loss of the middle slice can be avoided through statistics.
The priority allocation needs to be divided for specific services, and in the design of the frame format, this embodiment uses 3 bits. Frame type design, the present embodiment performs a type and subtype division. When the type is 0, the frame type is mainly a frame designed for inter-working within the MAC layer at this time. When the type is 1, the frame type is mainly the frame related to the upper and lower layer interaction. The embodiment distinguishes the frames of two different environments, obtains the corresponding operation which can be carried out more quickly when the frames are processed, and has the clear technical effect of thinking when the logic design and the function are divided.
Since the data of the power grid is sensitive data, the required confidentiality is high. The data of the communication system itself, according to the power protocol, is encrypted. After re-encryption during wireless communication causes encryption, it is inconvenient to observe the operating state of the system. Therefore, the embodiment designs an encrypted tag, so that the system can operate in an encrypted environment or an unencrypted environment.
The power management flag is enabled in case the physical layer provides an interface for power control, and according to this flag, power management of the physical layer is achieved.
The retransmission flag bit is used for an error control function, and once the retransmission flag bit of a frame is 1, it is defined that the frame is received through retransmission. At this time, the logic needs to count the retransmission times, that is, when the retransmission times of a frame reach a threshold, the system abandons the retransmission and abandons the connection, and the punch starter sub-beacon communication module re-accesses the network and reselects a link with a good channel.
The network message type definition of this embodiment divides the message types into two types, which are a network management frame and a data frame.
The main feature of this embodiment is to optimally define the management frame, because the management frame is related to the inside of the data link layer, and the requirement is relatively stable.
The coding mode of the management frame adopts a sequential coding mode, and the type design follows a communication mode of sending and receiving. Each frame is sent with a reply of the corresponding frame type to indicate the success of the communication. The management frame type is designed according to different scenes of a networking process.
In the network access phase, the present embodiment defines two frames, namely a signal description message frame DCD and a Send _ slot, to perform a broadcast description on the information of the current base station. Defining the Random Access and the REG _ REQ is that the terminal sends a network Access application to a proper base station. The frame types designed for defining two frame types of Route _ update and Detect to realize the relay routing function include the functions of finding a path and sharing a path. RTS, CTS and ACK are defined to ensure the transmission quality through the three frame types when data interaction is carried out in the network after network access is successful. The RTS and CTS apply for channels, reduce interference of side nodes, improve communication quality, and the ACK frame is checked to determine whether packet loss occurs or not to ensure quality of the last step.
The design definition of the data frame of the embodiment is realized according to the upper layer application, and the requirement is unstable. In this embodiment, the two types of messages are divided, where the primary station actively downlinks and the terminal actively uplinks and is called an emergency report message, as shown in table 5.
TABLE 5 message types
Figure BDA0002182245480000131
Figure BDA0002182245480000141
The signal description message frame DCD is a message broadcasted by the base station to the surrounding terminals. The frame entity content is as shown in table 6.
TABLE 6 channel description signal
Figure BDA0002182245480000142
Because the physical layer is TDD communication, the physical layer is in continuous operation, transmitting for a period of time and receiving for a period of time, in order to reduce mutual interference, only when data interaction exists, the radio frequency circuit can operate, and is in a sleep state at ordinary times, but the physical layer is in continuous operation. Therefore, the present embodiment designs a count in the data link layer, and adds 1 to the count whenever it should interact with the physical layer, regardless of whether there is actually data to interact at that time. Such a counting frame has the advantage that the physical frames of the terminals located under the same base station can be calibrated, so as to achieve the effect of network synchronization.
The network access time node message Send _ slot is a message broadcasted by the base station to the surrounding terminals. The physical layer is TDD communication, and is used for ensuring system operation and simultaneously considering data transmission and proxy of network access request. In this embodiment, a network access time node message Send _ slot is defined, that is, the time allowed for network access is defined and a terminal intending to access the network is notified, and Fram _ NUM in a frame entity of a signal description message frame DCD is used for representation.
The frame entity of the network entry time node message Send _ slot is shown in table 7.
TABLE 7 network entry time node information
Figure BDA0002182245480000151
The networking process definition of the embodiment includes a direct connection networking process design and a relay networking process design. The direct connection networking process is designed to be the situation that the base station and the terminal can be in direct connection communication, and the relay networking process is designed to be the situation that the terminal needs to communicate with the base station after being relayed by other terminals.
The direct connection networking process design comprises three parts of direct connection networking, direct connection networking and direct connection network quitting.
Direct access network as shown in fig. 1, from the viewpoint of a terminal, analysis is mainly divided into four parts, and the four parts can be divided into two parts, namely base station search and network registration.
Search for a base station, as in fig. 2. Firstly, a terminal is powered on and started, then data is initialized, the terminal starts to enter an interception state, a broadcast message signal description message frame DCD of a base station is searched, if the signal description message frame DCD of the base station is not searched after two physical frame periods (maximum 216 physical frames), the terminal judges that the terminal is a hidden terminal (a terminal which can not directly communicate with the base station) at the moment, and the terminal enters an intelligent routing state.
And recording the searched signal description message frame DCD, analyzing and judging the collected signal description message frame DCD information after a physical layer period, selecting the signal description message frame DCD with better physical channel, and selecting the first received signal description message frame DCD by default under the condition that the physical channel is not provided in the signal description message frame DCD. After selecting the signal description message frame DCD, firstly, the physical frame number of the terminal itself needs to be synchronized, then the state of the terminal itself is set to 10(bit), and the downlink synchronization is successful. Then start waiting to listen for the corresponding Send slot.
If the Send _ slot of the corresponding base station is not searched after two physical frame periods, the currently selected base station needs to be pulled into a blacklist of the currently selected base station, then the state is reset to 1, the signal description message frame DCD is intercepted again, and the state returns to the initial state.
As shown in fig. 3, after the base station search is completed and the downlink synchronization is completed, a network access application is performed.
And according to the time interval given in the Send _ slot, randomly selecting a physical frame time to Send a network Access application to be defined as a Random _ Access frame. And when receiving the Random _ Access frame, the base station replies to the Random _ Access RSP. If the terminal does not receive the base station reply within the preset threshold time, the terminal needs to retransmit, and when the retransmission times reach 3 times, the terminal abandons the base station, returns to the initial state, shields the current base station, and searches a new base station again.
After the terminal receives the reply of the base station, the terminal can send a registration application, after the base station receives the application of the terminal, the identity of the terminal needs to be verified, and if the system gives information which can be verified, illegal access can be effectively avoided.
After the identity is verified, the base station replies the REG _ RSP frame, if the REG _ RSP frame is successfully verified, the frame entity is marked as successful, and the key distributed to the terminal by the base station follows, each terminal has an independent key, the base station needs to record the terminal and the corresponding key one by one, and the terminal is successfully accessed to the network at this time, and the base station also adds the terminal to the surface and the inside of the terminal in the network. If the authentication fails, the terminal returns to the original state directly, and the base station is added to the blacklist in the same way.
Directly connecting to the network, as shown in fig. 4, after the terminal successfully accesses the network, the terminal enters the network state. The main service in the network state is data communication, the data interaction amount is large, one-time application interaction is realized, and the lower layer has communication of at least a plurality of physical frames. In the process, once the interference is received, the calling and testing are defined as unsuccessful, and the CSMA/CA technology is designed in the networking protocol of the embodiment to ensure the stability of communication.
The direct connection network quitting is divided into two conditions of active network quitting and forced network quitting. The active network quitting is the network quitting application sent by the terminal to the base station, and the forced network quitting is the network quitting action which is carried out by the base station and the terminal due to the fact that the base station and the terminal cannot communicate due to the instability of a wireless network or equipment failure.
As shown in fig. 5, when entering the network management stage, the base station periodically sends the nodes for the new user to enter the network and part of the time for the network exit processing of the network user. When the terminal needs to actively quit the network, the terminal sends a network quitting request to the base station, the base station sends a removing instruction to the terminal after receiving the network quitting request of the terminal, then the connection with the terminal is disconnected, the wireless resource occupied by the terminal is released, the wireless resource is convenient to be distributed to other new terminals in the later frame, and then the base station deletes the information of the terminal in the network management information table. Meanwhile, the terminal only responds to the broadcast of the base station (except the synchronous information) after receiving the rejection instruction.
In this embodiment, the whole network quitting process is described in detail through three steps, namely, an SS active network quitting process, an SS response waiting process, and a base station network quitting process.
Fig. 6 shows the process of active network resignation of the SS: and when the terminal obtains the time node, selecting a random time node, sending a network quitting request to the base station, and waiting for the reply of the base station.
Fig. 7 shows the process of SS waiting for acknowledgement: in the process of waiting for the reply of the base station, if the reply is received within a limited time, the terminal performs network quitting operation; if the reply is not received in the specified time, the network quitting request is sent to the base station again, and if the reply is not received in 3 continuous times, the network quitting operation is directly executed.
Fig. 8 shows the network logout processing of the base station: aiming at the process of terminal active network quitting, after receiving a request, a base station terminal firstly carries out network quitting operation on a network quitting user, deletes network information, releases resources and the like, and returns the corresponding network quitting success to the terminal after the processing is finished.
And when the network is forcibly quitted, after the communication between the terminal and the base station is lost, the base station and the terminal respectively carry out processing. When the base station receives the on-network information of a certain terminal for 3 times continuously, an error occurs or the response of the terminal is not obtained. The base station can forcibly disconnect the connection with the terminal, delete the terminal management parameters of the terminal in the network management information table, release the wireless resources occupied by the terminal and set the time slot state to be idle, thereby facilitating the resource allocation of a new access terminal.
When the terminal does not receive the instruction of the base station for transmitting the terminal management parameters within 15 minutes, the terminal can disconnect from the base station and then re-contend for access to the system when receiving the instruction of the base station for allowing a new terminal to access the system.
When the network is directly organized, the terminal enters a hidden terminal state after long-term interception of a signal description message frame DCD. To solve the problem of blind spots, it is often necessary to spend a lot of effort and cost. For this problem, the present embodiment adds a routing function in the communication system, so that the terminal can perform relay communication with the base station with the help of other terminals without directly communicating with the base station, as shown in fig. 9.
The relay networking process design of the embodiment is divided into three parts, namely relay network access, relay network on and relay network off. The relay access is similar to the direct access of the direct networking process, and is also divided into two steps of searching for a base station and registering for access.
As shown in fig. 10, a specific procedure for searching for a base station is to send a Detect frame to the periphery after the terminal has determined itself to be a hidden terminal, then wait for a reply frame Detect _ RSP, and screen out a relay terminal if there are multiple terminals to reply. And the terminal receiving the Detect frame can reply only by the terminal after successfully accessing the network, and the replied message entity contains the information of the base station to which the current terminal belongs and has the same content as the content in the signal description message frame DCD. In addition, the number of hops from the current terminal to the base station to which the terminal belongs is also included, the number of hops directly connected with the terminal is 1, and the number of hops is increased by one every time one terminal is added on a communication link with the base station.
The hidden terminal screens the factors of the relay terminal, the first is field intensity, the second is hop count, the hop count determines the distance from the base station, and the waste of the whole network resource is multiplied every time one hop is added. Weighting the factors to obtain a value, wherein the terminal with the highest score is the selected relay terminal.
The physical equipment can not provide field intensity, and judgment can be carried out according to the speed of each terminal replying to the hidden terminal. Then. If the hidden terminal still does not receive the reply after sending the Detect, the sending power is increased, the hidden terminal continues sending, and when the sending power reaches the maximum, the hidden terminal still does not receive the reply, and the hidden terminal carries out system alarm.
Fig. 11 shows the registration. After the hidden terminal selects the relay terminal, a network access application is sent to the relay terminal, after the relay terminal receives the network access application, a Route _ update is sent to the base station, the Route _ update is a Route connection relation between the terminal and the hidden terminal, and meanwhile, the hidden terminal is added to an agent list of the relay terminal.
And the base station receives the updated routing table and replies a Route _ update _ rsp message of the relay terminal, wherein the inside of the frame entity is empty. And after receiving the Route _ update _ rsp replied by the base station, the relay terminal replies to the hidden terminal Random _ access RSP. The hidden terminal needs to send a registration application message REG _ REQ to the base station, the destination address is the base station, the source address is the hidden terminal, and 1 is set on the label of the intelligent route.
The relay terminal receives the registration application message REG _ REQ, and first gradually checks whether the hidden terminal exists in its own proxy list. If yes, forwarding to the base station of the user, wherein the destination address and the source address are unchanged; if not, the frame is discarded.
After receiving the REG _ REQ, the base station firstly stores the relay terminal into the netlist according to networking protocol logic, sets an intelligent routing flag to be 1 according to a routing table of the relay terminal, replies the REG _ RSP, after receiving the data frame, the relay terminal inquires an agent table of the relay terminal again and retransmits the data frame, and if not, the frame is abandoned.
Fig. 12 shows a relay network. After the hidden terminal is in the network, the flow of data interaction is substantially the same as that of the directly connected terminal of the embodiment. The difference is that the data needs to be forwarded from the hidden terminal to the base station one level at a time. In the continuous forwarding process, even if the terminal process has a problem, retransmission is carried out between the adjacent upper and lower levels, interference is not required by other equipment, the logic complexity is reduced, and the hierarchy of the system is improved.
In the relay network quitting process, under the condition that no intelligent route exists, the network quitting sends an application, and the network quitting is completed after a reply is obtained.
After adding the routing function, the network quit needs to consider the route clearing. Especially in the case where there are other terminals under the control of the network-exiting terminal, the logic becomes complicated.
When a terminal needs to quit the network, the terminal firstly checks whether other terminals exist in the subordinate, preferentially enables the subordinate terminal to quit the network, and then applies for quitting the network.
When the subordinate terminal finishes network quitting, the data frame passes through the terminal, and the specific frame needs to be analyzed at this time, and then the terminal is deleted on the own subordinate table and the routing table. The false appearance of virtual online of the terminal is reduced, the logic is simple, and the hidden trouble of network disorder is solved. The parts not disclosed in this embodiment all use prior art modules or protocols.
Although the illustrative embodiments of the present invention have been described above to enable those skilled in the art to understand the present invention, the present invention is not limited to the scope of the embodiments, and it is apparent to those skilled in the art that all the inventive concepts using the present invention are protected as long as they can be changed within the spirit and scope of the present invention as defined and defined by the appended claims.

Claims (10)

1. A novel networking protocol method based on ubiquitous power Internet of things is characterized by comprising the following steps: the protocol method comprises a frame format definition, a network message type definition and a networking process definition;
the frame format definition comprises overall definition, length domain definition, state domain definition, address domain definition, frame check domain definition, frame control domain definition, fragmentation mark definition, priority definition, encryption and power control definition and retransmission mark definition;
the overall definition comprises that the whole frame format uses a MAC frame format with unified standard and is divided into a length field, a destination address field, a source address field, a state field, a check field, a data field and a frame control field.
2. The novel networking protocol method based on the ubiquitous power internet of things according to claim 1, wherein: the frame control domain comprises a control function for realizing the frame header, the control function comprises power control, intelligent relay, error retransmission, service classification, encryption and data fragmentation packaging, and the corresponding frame control domain comprises a fragmentation mark, a priority, a frame type, an intelligent relay mark, an encryption mark, a power control mark and a retransmission mark.
3. The novel networking protocol method based on the ubiquitous power internet of things according to claim 2, wherein: the fragment mark is used for realizing the encapsulation/uninstallation function of the data frame, and the fragment mark comprises four states of non-fragment, a first fragment, a middle fragment and a last fragment.
4. The novel networking protocol method based on the ubiquitous power internet of things according to any one of claims 1 to 3, wherein: the length field is defined as a length field length which is defined as a length exceeding the maximum length of the application frame;
the address domain definition comprises a destination address domain and a source address domain which can meet the maximum capacity of the network and can establish ID (identity) relation between upper and lower layers of equipment; the destination address field and the source address field are both established with an association function of the MAC address and the terminal serial number;
the state field is coded by adopting a one-hot coding method of a state machine;
the check domain is used for providing data space for error control and is divided into a frame header check domain and a whole frame check domain.
5. The novel networking protocol method based on the ubiquitous power internet of things according to claim 4, wherein: the network message type definition comprises the definition of a network message as a network management frame and a data frame;
the network management frame is defined according to different scenes of a networking process, a communication mode of sending and receiving is adopted, the sending of each frame is defined with the reply of a corresponding frame type, and the representation shows that the communication is successful;
the data frame comprises a data frame representing the active downlink of the master station and an emergency report message representing the active uplink of the terminal.
6. The novel networking protocol method based on the ubiquitous power internet of things according to claim 5, wherein: the network management frame includes:
a signal description message frame DCD for characterizing a message broadcasted by a base station to a neighboring terminal, the signal description message frame DCD including 1 count defined in a data link layer, the count being incremented by 1 when the data link layer performs data interaction with a physical layer;
and a network access time node message Send _ slot for characterizing the network access permission state.
7. The novel networking protocol method based on the ubiquitous power internet of things according to claim 5, wherein: the networking process definition comprises direct connection networking process design and relay networking process design.
8. The novel networking protocol method based on the ubiquitous power internet of things according to claim 7, wherein: the direct connection networking process design comprises direct connection networking, direct connection networking and direct connection network quitting;
the direct connection network access comprises a search base station and a registration network access, wherein the registration network access comprises a network access application, identity authentication and network access success authentication;
the base station searching comprises initializing, entering an interception state, searching a signal description message frame DCD of the base station, and judging that the base station is a hidden terminal or the downlink synchronization is completed according to the result of searching the signal description message frame DCD of the base station.
9. The novel networking protocol method based on the ubiquitous power internet of things according to claim 7, wherein: the relay networking process design comprises relay network access, relay on-line and relay off-line; the relay network access comprises a base station search and a registered network access;
the searching base station comprises that in a searching base station directly connected to a network, after a terminal judges and defines the terminal as a hidden terminal, the hidden terminal sends a Detect frame to other adjacent terminals, a reply frame Detect _ RSP is waited, and if a plurality of reply frames Detect _ RSP are received, the hidden terminal screens out a relay terminal according to field intensity or reply time and hop count;
and the registration network access comprises the step that the hidden terminal performs relay networking with the base station through the screened relay terminal.
10. The novel networking protocol method based on the ubiquitous power internet of things according to claim 9, wherein: the relay on-line comprises a hidden terminal and performs step-by-step data interaction with a base station through the screened relay terminal;
the relay network quitting comprises that after the subordinate terminal of the terminal intending to quit the network quits the network in advance, the terminal intending to quit the network quits the network again.
CN201910800769.4A 2019-08-28 2019-08-28 Novel networking protocol method based on ubiquitous power Internet of things Pending CN110662226A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910800769.4A CN110662226A (en) 2019-08-28 2019-08-28 Novel networking protocol method based on ubiquitous power Internet of things

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910800769.4A CN110662226A (en) 2019-08-28 2019-08-28 Novel networking protocol method based on ubiquitous power Internet of things

Publications (1)

Publication Number Publication Date
CN110662226A true CN110662226A (en) 2020-01-07

Family

ID=69036523

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910800769.4A Pending CN110662226A (en) 2019-08-28 2019-08-28 Novel networking protocol method based on ubiquitous power Internet of things

Country Status (1)

Country Link
CN (1) CN110662226A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112492669A (en) * 2020-11-06 2021-03-12 国网江苏省电力有限公司电力科学研究院 Wireless communication method and system for node equipment of power transmission and transformation equipment internet of things
CN113489794A (en) * 2021-07-07 2021-10-08 智洋创新科技股份有限公司 Communication interaction method for intelligent identification master station and intelligent station end equipment of transformer substation
CN116886730A (en) * 2023-08-07 2023-10-13 广东龙泉科技有限公司 Internet of things data acquisition method

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030123484A1 (en) * 2001-12-28 2003-07-03 David Harriman Communicating message request transaction types between agents in a computer system using multiple message groups
CN103716411A (en) * 2014-01-07 2014-04-09 国家电网公司 230MHz power utilization information collecting terminal remote communication method based on SGWM
CN105763410A (en) * 2014-12-18 2016-07-13 国家电网公司 HomePlug AV standard-based automatic relay networking method for power line broadband carrier band
CN107483436A (en) * 2017-08-14 2017-12-15 重庆邮电大学 A kind of physical layer dual-mode design method of communication module in Internet of Things

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030123484A1 (en) * 2001-12-28 2003-07-03 David Harriman Communicating message request transaction types between agents in a computer system using multiple message groups
CN103716411A (en) * 2014-01-07 2014-04-09 国家电网公司 230MHz power utilization information collecting terminal remote communication method based on SGWM
CN105763410A (en) * 2014-12-18 2016-07-13 国家电网公司 HomePlug AV standard-based automatic relay networking method for power line broadband carrier band
CN107483436A (en) * 2017-08-14 2017-12-15 重庆邮电大学 A kind of physical layer dual-mode design method of communication module in Internet of Things

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
李伟琪: "《电力负控无线专网组网设计与实现》", 《重庆大学硕士学位论文》 *

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112492669A (en) * 2020-11-06 2021-03-12 国网江苏省电力有限公司电力科学研究院 Wireless communication method and system for node equipment of power transmission and transformation equipment internet of things
CN113489794A (en) * 2021-07-07 2021-10-08 智洋创新科技股份有限公司 Communication interaction method for intelligent identification master station and intelligent station end equipment of transformer substation
CN116886730A (en) * 2023-08-07 2023-10-13 广东龙泉科技有限公司 Internet of things data acquisition method

Similar Documents

Publication Publication Date Title
US11968543B2 (en) Methods and apparatus for dynamic control and utilization of quasi-licensed wireless spectrum
US11134543B2 (en) Interworking LPWAN end nodes in mobile operator network
CN113812126B (en) Message transmission method, device and system, and readable storage medium
RU2636753C1 (en) Method for configuring mac pdu for d2d communication system and device for its implementation
CN1659899B (en) Virtual switch
CN110662226A (en) Novel networking protocol method based on ubiquitous power Internet of things
WO2019015472A1 (en) Communication method, device and system
CN110167199B (en) Wireless backhaul communication processing method and related equipment
KR20200019044A (en) Method and apparatus for providing 5g ethernet service
CN107005430B (en) Communication method, device and system based on data link layer
CN109152065A (en) A kind of safe method of network entry of industry wireless network multinode based on IPv6
CN101651536A (en) Method and system for realizing synchronization of control sequence numbers
US11877251B2 (en) Time synchronization method, electronic device and storage medium
US20230156833A1 (en) Packet Forwarding Method, Apparatus, and System
US20090044280A1 (en) Proxy server, method for realizing proxy, and secure communication system and method thereof
CN113573408A (en) Resource coordination method and device
Lodhi et al. ND‐ADR: Nondestructive adaptive data rate for LoRaWAN Internet of Things
EP4021123A1 (en) Communication method, communication apparatus, and system
CN102378164B (en) Method for configuring ECGI (evolution cell global identification) of terrestrial radio access network for relay node
CN101601324B (en) Wireless non-cellular network
CN110601893B (en) Data transmission system, method and device
US8625477B2 (en) Multicast grouping
CN115412925B (en) Network security protection method and device and network element with security protection function
CN113258958B (en) Power line carrier communication method based on OFDM and communication node
WO2012176179A1 (en) Multicast grouping

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20200107

RJ01 Rejection of invention patent application after publication