CN114554436A - Passive Internet of things node medium access control method, system, device and medium - Google Patents

Passive Internet of things node medium access control method, system, device and medium Download PDF

Info

Publication number
CN114554436A
CN114554436A CN202210023586.8A CN202210023586A CN114554436A CN 114554436 A CN114554436 A CN 114554436A CN 202210023586 A CN202210023586 A CN 202210023586A CN 114554436 A CN114554436 A CN 114554436A
Authority
CN
China
Prior art keywords
node
priority
wireless sensor
things
nodes
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210023586.8A
Other languages
Chinese (zh)
Inventor
官权升
陈昊
陈伟琦
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
South China University of Technology SCUT
Original Assignee
South China University of Technology SCUT
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by South China University of Technology SCUT filed Critical South China University of Technology SCUT
Priority to CN202210023586.8A priority Critical patent/CN114554436A/en
Publication of CN114554436A publication Critical patent/CN114554436A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/30Services specially adapted for particular environments, situations or purposes
    • H04W4/38Services specially adapted for particular environments, situations or purposes for collecting sensor information
    • GPHYSICS
    • G16INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
    • G16YINFORMATION AND COMMUNICATION TECHNOLOGY SPECIALLY ADAPTED FOR THE INTERNET OF THINGS [IoT]
    • G16Y10/00Economic sectors
    • G16Y10/75Information technology; Communication
    • GPHYSICS
    • G16INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
    • G16YINFORMATION AND COMMUNICATION TECHNOLOGY SPECIALLY ADAPTED FOR THE INTERNET OF THINGS [IoT]
    • G16Y40/00IoT characterised by the purpose of the information processing
    • G16Y40/10Detection; Monitoring
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W72/00Local resource management
    • H04W72/12Wireless traffic scheduling
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W72/00Local resource management
    • H04W72/50Allocation or scheduling criteria for wireless resources
    • H04W72/56Allocation or scheduling criteria for wireless resources based on priority criteria
    • H04W72/566Allocation or scheduling criteria for wireless resources based on priority criteria of the information or information source or recipient
    • H04W72/569Allocation or scheduling criteria for wireless resources based on priority criteria of the information or information source or recipient of the traffic information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W74/00Wireless channel access
    • H04W74/08Non-scheduled access, e.g. ALOHA
    • H04W74/0808Non-scheduled access, e.g. ALOHA using carrier sensing, e.g. carrier sense multiple access [CSMA]
    • H04W74/0816Non-scheduled access, e.g. ALOHA using carrier sensing, e.g. carrier sense multiple access [CSMA] with collision avoidance
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W84/00Network topologies
    • H04W84/18Self-organising networks, e.g. ad-hoc networks or sensor networks
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computing Systems (AREA)
  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • General Business, Economics & Management (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a passive Internet of things node medium access control method, a system, a device and a medium, wherein the method comprises the following steps: s1, when the wireless sensor node has a data transmission requirement, initializing the conflict times i to be 0; s2, updating the priority K of node data transmission according to the current residual energy E of the node; initializing a fixed waiting duration T1 and a random backoff duration T2 of the node according to the priority K; s3, monitoring the channel state, and executing if the channel is idle in the time length of T1Step S4; s4, the wireless sensor node retreats for a time length of T2 and waits; s5, data is sent, if the confirmation signal of the receiving end is received, the data is sent successfully, otherwise, the step S6 is executed; s6, the wireless sensor node updates the self collision frequency i to i +1, and if i is larger than the preset collision upper limit imaxIf the data transmission fails, the data transmission fails. The method solves the problem of channel allocation when the terminal nodes are simultaneously accessed to the reader, and can be widely applied to the field of passive Internet of things.

Description

Passive Internet of things node medium access control method, system, device and medium
Technical Field
The invention relates to the field of passive internet of things, in particular to a method, a system, a device and a medium for controlling medium access of nodes of the passive internet of things.
Background
In recent years, wireless sensor networks are widely applied to the fields of smart home, environmental monitoring, intelligent control, medical health and the like. Because the terminal node has small volume and convenient deployment, the terminal node and nearby wireless equipment form a self-organizing wireless network to realize the monitoring of surrounding environment information.
However, the volume of the terminal node limits the capacity of its battery. The battery replacement for a large number of nodes has high cost, and even cannot be done, which brings great challenges to the deployment and the later maintenance of the wireless sensor network. The problem is well solved by the passive Internet of things, the terminal node is not connected with an external power supply or a battery, and the node is supplied with the radio frequency energy in the environment to work. The environment backscattering communication is used as an ultra-low power consumption communication mode and becomes a preferred communication mode of the passive internet of things.
A Medium Access Control (MAC) protocol determines the use mode of a wireless channel, and limited wireless communication resources are distributed among wireless sensor nodes to construct the underlying infrastructure of the wireless sensor network system. The traditional wireless sensor network is mostly powered by a battery, and the research of a medium access control protocol focuses on reducing network energy consumption and prolonging the survival time of nodes. However, the terminal node adopting the environmental backscatter communication maintains the normal operation of the node by acquiring the radio frequency energy in the environment, and the residual energy of the node has a dynamically changing characteristic. In addition, the terminal node should reduce the collision probability and reduce the energy loss caused by node collision. The focus of attention at this point has become how to take advantage of the energy available to the nodes to reduce the collision probability of the nodes. Therefore, it is urgently needed to design a passive internet of things node medium access control protocol based on environment backscatter communication.
Disclosure of Invention
To solve at least to some extent one of the technical problems of the prior art, the present invention aims to:
the technical scheme adopted by the invention is as follows:
a passive Internet of things node medium access control method comprises the following steps:
s1, when the wireless sensor node has a data transmission demand, initializing the conflict times i to be 0, and then executing the step S2;
s2, the wireless sensor node updates the priority K of node data transmission according to the current residual energy E of the node; initializing a fixed waiting duration T1 and a random backoff duration T2 of the node according to the priority K, and then executing a step S3;
s3, the wireless sensor node monitors the channel state, if the channel is idle in the time length of T1, the step S4 is executed, otherwise, the step S2 is continuously executed;
s4, the wireless sensor node retreats for a time length of T2 and waits, and after the retreat phase is finished, the step S5 is executed;
s5, the wireless sensor node sends data, if receiving the confirmation signal of the receiving end, the data is sent successfully, otherwise, the step S6 is executed;
s6, the wireless sensor node updates the self collision frequency i to i +1, and if i is larger than the preset collision upper limit imaxIf the data transmission fails, otherwise, step S2 is executed.
Further, in step S2, the priority K of node data transmission is designed with the following characteristics: the node K with higher residual energy is smaller, the priority of the node is higher, the minimum value of the K is 1, and the maximum value is the granularity n of the node priority classification.
Further, the priority K is calculated as follows:
Figure BDA0003463482200000021
wherein E ismaxUpper limit of energy available to the node, EminTo maintain the energy threshold of the node working normally, n is the granularity of the node priority classification.
Further, in step S2, the node fixed wait duration T1 has the following characteristics:
t1 is determined by the formula T1 ═ g (k) × Δ T, g (k) is a single increasing function and returns an integer value, Δ T is the duration of a unit time slot;
based on this design, it can be seen that nodes with different priorities have different fixed wait durations T1, and that nodes with higher priorities T1 have higher transmission opportunities than nodes with lower priorities.
Further, in step S2, the design scheme of the node random backoff duration T2 has the following characteristics:
t2 is determined by the formula T2 ═ Rand (a, B) × Δ T, Rand (a, B) returns a random integer in the range of [ a, B ], all nodes a ═ g (K), the node B with the lowest non-priority level ═ g (K +1), and the node B with the lowest priority level has to take a value greater than g (K).
Further, when the node monitors the channel in step S3 and the node backs off in step S4, the remaining energy of the radio frequency energy supplementary node in the environment can be obtained, so that the priority of the node with low priority is gradually increased in multiple monitoring and back off processes, the probability of node transmission is greatly increased, and the fairness of the node is ensured.
The other technical scheme adopted by the invention is as follows:
an environment backscattering passive internet of things system comprises a wireless sensor node and receiving equipment, wherein the wireless sensor node is controlled by the passive internet of things node medium access control method.
Further, the receiving device is a reader.
The other technical scheme adopted by the invention is as follows:
a passive Internet of things node medium access control device comprises:
at least one processor;
at least one memory for storing at least one program;
when executed by the at least one processor, cause the at least one processor to implement the method described above.
The other technical scheme adopted by the invention is as follows:
a computer readable storage medium in which a processor executable program is stored, which when executed by a processor is for performing the method as described above.
The invention has the beneficial effects that: the invention introduces two concepts of fixed waiting time and random backoff time, and reduces the collision probability of nodes between different priorities by distinguishing different fixed waiting time. By distinguishing different random back-off durations, the collision probability of nodes with the same priority is reduced. In addition, the invention provides a priority mechanism, so that nodes with higher residual energy have higher priority to access a channel, and the risk of communication failure is reduced.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the following description is made on the drawings of the embodiments of the present invention or the related technical solutions in the prior art, and it should be understood that the drawings in the following description are only for convenience and clarity of describing some embodiments in the technical solutions of the present invention, and it is obvious for those skilled in the art that other drawings can be obtained according to these drawings without creative efforts.
Fig. 1 is a topological structure diagram of an environmental backscatter passive internet of things according to an embodiment of the present invention;
fig. 2 is a passive internet of things node medium access control protocol algorithm flow based on environmental backscatter communication in the embodiment of the present invention.
Detailed Description
Reference will now be made in detail to embodiments of the present invention, examples of which are illustrated in the accompanying drawings, wherein like or similar reference numerals refer to the same or similar elements or elements having the same or similar function throughout. The embodiments described below with reference to the accompanying drawings are illustrative only for the purpose of explaining the present invention, and are not to be construed as limiting the present invention. The step numbers in the following embodiments are provided only for convenience of illustration, the order between the steps is not limited at all, and the execution order of each step in the embodiments can be adapted according to the understanding of those skilled in the art.
In the description of the present invention, it should be understood that the orientation or positional relationship referred to in the description of the orientation, such as the upper, lower, front, rear, left, right, etc., is based on the orientation or positional relationship shown in the drawings, and is only for convenience of description and simplification of description, and does not indicate or imply that the device or element referred to must have a specific orientation, be constructed and operated in a specific orientation, and thus, should not be construed as limiting the present invention.
In the description of the present invention, the meaning of a plurality of means is one or more, the meaning of a plurality of means is two or more, and larger, smaller, larger, etc. are understood as excluding the number, and larger, smaller, inner, etc. are understood as including the number. If there is a description of first and second for the purpose of distinguishing technical features only, this is not to be understood as indicating or implying a relative importance or implicitly indicating the number of technical features indicated or implicitly indicating the precedence of technical features indicated.
In the description of the present invention, unless otherwise explicitly limited, terms such as arrangement, installation, connection and the like should be understood in a broad sense, and those skilled in the art can reasonably determine the specific meanings of the above terms in the present invention in combination with the specific contents of the technical solutions.
Fig. 1 shows an environment reflection scattering passive internet of things which is composed of wireless sensor nodes and a reader. In order to access a plurality of terminal nodes based on environmental backscatter communication to a reader and reduce the collision probability of the nodes by using the energy available to the nodes, the embodiment provides a passive internet of things node medium access control protocol based on environmental backscatter communication, which is shown in fig. 2 and includes the following steps:
s101, when the wireless sensor node has a data transmission requirement, initializing that the collision frequency i is 0, and then executing a step S102;
s102, the wireless sensor node remains according to the current nodeResidual energy E updates the priority of node data transmission
Figure BDA0003463482200000041
Figure BDA0003463482200000042
Wherein EmaxUpper limit of energy available to the node, EminTo maintain the energy threshold of the node working normally, n is the granularity of the node priority classification. Finally, initializing a fixed waiting time T1 and a random backoff time T2 of the node according to K, and then executing the step S103;
s103, monitoring the channel state by the wireless sensor node, executing a step S104 if the channel is free within the time length of T1, and otherwise, continuing to execute the step S102;
s104, the wireless sensor node retreats for T2 time length and waits, and step S105 is executed after the retreat stage is finished;
s105, the wireless sensor node sends data, if the confirmation signal of the receiving end is received, the data is successfully sent, and if the confirmation signal of the receiving end is not received, the step S106 is executed;
s106, the wireless sensor node updates the self collision frequency i to i +1, and if i is larger than the allowed collision upper limit i of the nodemaxIf not, the data transmission is failed, otherwise, step S102 is executed.
Further as an optional implementation manner, in step S102, the design scheme of the priority K of node data transmission has the following characteristics: the node K with higher residual energy is smaller, the priority of the node is higher, the minimum value of the K is 1, and the maximum value is the granularity n of the node priority classification.
Further as an optional implementation manner, in step S102, the design scheme of the node fixed waiting duration T1 has the following characteristics: t1 is determined by the formula T1 ═ g (k) × Δ T, g (k) is a single increasing function and returns an integer value, Δ T being the duration of the unit backoff slot. It can be seen from this design that nodes with different priorities have different fixed wait durations T1, and that nodes with higher priorities T1 have higher transmission opportunities than nodes with lower priorities.
Further as an optional implementation manner, in step S102, the design scheme of the node random backoff duration T2 has the following characteristics: t2 is determined by the formula T2 ═ Rand (a, B) × Δ T, Rand (a, B) returns a random integer in the range of [ a, B ], all nodes a ═ g (K), the node B with the lowest non-priority level ═ g (K +1), and the node B with the lowest priority level has to take a value greater than g (K).
Further as an optional implementation manner, when the node in step S103 monitors the channel and the node in step S104 waits for backoff, both the node can obtain the remaining energy of the radio frequency energy supplement node in the environment, so that the priority of the node with low priority is gradually increased in multiple monitoring and backoff processes, thereby greatly increasing the probability of node transmission and ensuring the fairness of the node.
From the above, the method of the present embodiment has the following features: and the terminal node self-adaptively adjusts the fixed waiting time and the random backoff time of the node according to the residual energy of the node. The higher the remaining energy, the higher the transmission priority. The nodes with high priority have smaller fixed waiting time than the nodes with low priority, and the collision probability among the nodes with different priorities is reduced by distinguishing the fixed waiting time of the nodes with different priorities. The nodes with the same priority have the same fixed waiting time, and the random back-off time is randomly selected from a certain same range, so that the collision probability among the nodes with the same priority is further reduced.
The above method is explained in detail with reference to specific examples below.
Consider a wireless sensor network comprising a reader, four wireless sensor nodes. Residual energy of node 1>Residual energy of node 2>Residual energy of node 3>The remaining energy of node 4. Wherein the residual energy of the node 1 is E1=0.92(Emax-Emin) The remaining energy of node 2 is E2=0.85(Emax-Emin) The remaining energy of the node 3 is E3=0.51(Emax-Emin) The remaining energy of the node 4 is E4=0.43(Emax-Emin) The granularity n of the protocol instance node priority ranking is 5,the duration of a unit time slot is Δ t. Node T1 with priority 1, node T1 with priority 2, node T3558, node T2, node (0,16), node T1 with priority 3, node T2 with priority 3, node T1, node T57, node T2, node T0,128, node T1 with priority 5, and node T1 with priority 121, node T2 387. Assuming that all four nodes have data transmission requirements, the operation steps of the protocol when applied to the passive internet of things are as follows:
s201, initializing collision times i of nodes 1, 2, 3, and 4 to be 0;
and S202, the node updates the node data transmission priority according to the current residual energy, wherein the priority K of the node 1 is 1, the fixed waiting time T1 is delta T, and the random backoff time T2 is 6. The priority K of the node 2 is 1, the fixed wait duration T1 is Δ T, and the random backoff duration T2 is 4 Δ T. The priority K of the node 3 is 3, the fixed wait duration T1 is 25 Δ T, and the random backoff duration T2 is 17 Δ T. The priority K of the node 4 is 3, the fixed wait duration T1 is 25 Δ T, and the random backoff duration T2 is 26 Δ T.
S203, node 1, node 2, node 3, and node 4 monitor the channel state, where the fixed waiting time of both node 1 and node 2 is T1 ═ Δ T, the channel is idle within the Δ T time, and step S204 is executed. The fixed waiting time of each of the nodes 3 and 4 is T1 ═ 25 × Δ T, and when the nodes 1 and 2 finish sending data in step S204, the nodes 3 and 4 still monitor the channel, and the channel is busy at this time, so the nodes 1 and 2 execute step S202 instead.
S204, the random backoff duration T2 of the node 1 is 6 × Δ T, and the random backoff duration T2 of the node 2 is 4 × Δ T, so that the node 2 ends the backoff stage before the node 1, when the node 2 executes step S205, the node 1 freezes its backoff timer, and at this time, the backoff duration of the node 1 remains 2 × Δ T.
S205, the node 2 sends data, the confirmation signal of the receiving end is successfully received, and the node 2 successfully sends the data.
At this time, the nodes 1, 3, and 4 are not yet left to successfully transmit data, the remaining time of the backoff timer of the node 1 is 2 × Δ T, and is less than the fixed waiting time T1 of the nodes 3 and 4 by 25 × Δ T, so that the node 1 transmits data after the timer is finished, successfully receives the acknowledgement signal of the receiving end, and successfully transmits the data of the node 1.
Finally, the nodes 3 and 4 are not successful in sending data, and since the nodes 3 and 4 collect the radio frequency energy in the environment in the cycles of the steps S202 and S203, an updated priority, a fixed waiting time and a random back-off time are calculated according to the latest remaining energy state of the nodes. Then the data transmission process of the nodes 3 and 4 is similar to the transmission example of the nodes 1 and 2.
In summary, compared with the prior art, the method of the embodiment has the following beneficial effects:
(1) compared with the prior art, the passive internet of things node medium access control protocol based on environment backscattering communication can well reduce the probability of collision among nodes without strict time synchronization. The embodiment of the invention introduces two concepts of fixed waiting time and random backoff time, and reduces the collision probability of nodes between different priorities by distinguishing different fixed waiting time. By distinguishing different random back-off durations, the collision probability of nodes with the same priority is reduced.
(2) Because the wireless sensor node adopting the environment backscatter communication usually adopts a super capacitor to store the radio frequency energy in the environment, the magnitude of the stored energy is far smaller than that of the traditional wireless sensor node adopting a battery energy storage scheme, and the node with lower residual energy bears higher risk of communication failure. Therefore, the embodiment of the invention provides a priority mechanism, so that nodes with higher residual energy have higher priority to access a channel, and the risk of communication failure is reduced.
The embodiment also provides an environmental reflection scattering passive internet of things system, which comprises a wireless sensor node and receiving equipment, wherein the wireless sensor node is controlled by adopting the control method shown in fig. 2.
The environment backscatter passive internet of things system of the embodiment has a corresponding relationship with the passive internet of things node medium access control method provided by the embodiment of the method of the invention, so that the environment backscatter passive internet of things system has corresponding functions and beneficial effects of the method.
The present embodiment further provides a passive internet of things node media access control device, including:
at least one processor;
at least one memory for storing at least one program;
when executed by the at least one processor, cause the at least one processor to implement the method described above.
The passive internet of things node medium access control device of the embodiment can execute the passive internet of things node medium access control method provided by the embodiment of the method of the invention, can execute any combination implementation steps of the embodiment of the method, and has corresponding functions and beneficial effects of the method.
The embodiment of the application also discloses a computer program product or a computer program, which comprises computer instructions, and the computer instructions are stored in a computer readable storage medium. The computer instructions may be read by a processor of a computer device from a computer-readable storage medium, and executed by the processor to cause the computer device to perform the method illustrated in fig. 2.
The embodiment also provides a storage medium, which stores instructions or programs capable of executing the passive internet of things node medium access control method provided by the embodiment of the method of the invention, and when the instructions or the programs are run, the steps can be implemented by any combination of the embodiment of the method, so that the method has corresponding functions and beneficial effects.
In alternative embodiments, the functions/acts noted in the block diagrams may occur out of the order noted in the operational illustrations. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality/acts involved. Furthermore, the embodiments presented and described in the flow charts of the present invention are provided by way of example in order to provide a more thorough understanding of the technology. The disclosed methods are not limited to the operations and logic flows presented herein. Alternative embodiments are contemplated in which the order of various operations is changed and in which sub-operations described as part of larger operations are performed independently.
Furthermore, although the present invention is described in the context of functional modules, it should be understood that, unless otherwise stated to the contrary, one or more of the described functions and/or features may be integrated in a single physical device and/or software module, or one or more functions and/or features may be implemented in a separate physical device or software module. It will also be appreciated that a detailed discussion of the actual implementation of each module is not necessary for an understanding of the present invention. Rather, the actual implementation of the various functional modules in the apparatus disclosed herein will be understood within the ordinary skill of an engineer, given the nature, function, and internal relationship of the modules. Accordingly, those skilled in the art can, using ordinary skill, practice the invention as set forth in the claims without undue experimentation. It is also to be understood that the specific concepts disclosed are merely illustrative of and not intended to limit the scope of the invention, which is defined by the appended claims and their full scope of equivalents.
The functions may be stored in a computer-readable storage medium if they are implemented in the form of software functional units and sold or used as separate products. Based on such understanding, the technical solution of the present invention may be embodied in the form of a software product, which is stored in a storage medium and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present invention. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes.
The logic and/or steps represented in the flowcharts or otherwise described herein, e.g., an ordered listing of executable instructions that can be considered to implement logical functions, can be embodied in any computer-readable medium for use by or in connection with an instruction execution system, apparatus, or device, such as a computer-based system, processor-containing system, or other system that can fetch the instructions from the instruction execution system, apparatus, or device and execute the instructions. For the purposes of this description, a "computer-readable medium" can be any means that can contain, store, communicate, propagate, or transport the program for use by or in connection with the instruction execution system, apparatus, or device.
More specific examples (a non-exhaustive list) of the computer-readable medium would include the following: an electrical connection (electronic device) having one or more wires, a portable computer diskette (magnetic device), a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber device, and a portable compact disc read-only memory (CDROM). Additionally, the computer-readable medium could even be paper or another suitable medium upon which the program is printed, as the program can be electronically captured, via for instance optical scanning of the paper or other medium, then compiled, interpreted or otherwise processed in a suitable manner if necessary, and then stored in a computer memory.
It should be understood that portions of the present invention may be implemented in hardware, software, firmware, or a combination thereof. In the above embodiments, the various steps or methods may be implemented in software or firmware stored in memory and executed by a suitable instruction execution system. For example, if implemented in hardware, as in another embodiment, any one or combination of the following techniques, which are known in the art, may be used: a discrete logic circuit having a logic gate circuit for implementing a logic function on a data signal, an application specific integrated circuit having an appropriate combinational logic gate circuit, a Programmable Gate Array (PGA), a Field Programmable Gate Array (FPGA), or the like.
In the foregoing description of the specification, reference to the description of "one embodiment/example," "another embodiment/example," or "certain embodiments/examples," etc., means that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the invention. In this specification, schematic representations of the above terms do not necessarily refer to the same embodiment or example. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples.
While embodiments of the present invention have been shown and described, it will be understood by those of ordinary skill in the art that: various changes, modifications, substitutions and alterations can be made to the embodiments without departing from the principles and spirit of the invention, the scope of which is defined by the claims and their equivalents.
While the preferred embodiments of the present invention have been illustrated and described, it will be understood by those skilled in the art that various changes in form and details may be made therein without departing from the spirit and scope of the invention as defined by the appended claims.

Claims (10)

1. A passive Internet of things node medium access control method is characterized by comprising the following steps:
s1, when the wireless sensor node has a data transmission demand, initializing that the number of collisions i is equal to 0, and then executing step S2;
s2, the wireless sensor node updates the priority K of node data transmission according to the current residual energy E of the node; initializing a fixed waiting duration T1 and a random backoff duration T2 of the node according to the priority K, and then executing a step S3;
s3, the wireless sensor node monitors the channel state, if the channel is idle in the time length of T1, the step S4 is executed, otherwise, the step S2 is continuously executed;
s4, the wireless sensor node retreats for a time length of T2 and waits, and step S5 is executed after the retreat phase is finished;
s5, the wireless sensor node sends data, if receiving the confirmation signal of the receiving end, the data is sent successfully, otherwise, the step S6 is executed;
s6, the wireless sensor node updates the self collision frequency i to i +1, and if i is larger than the preset collision upper limit imaxIf the data transmission fails, otherwise, step S2 is executed.
2. The medium access control method of the passive internet of things node of claim 1, wherein in step S2, the priority K of node data transmission is designed according to the following characteristics: the node K with higher residual energy is smaller, the priority of the node is higher, the minimum value of the K is 1, and the maximum value is the granularity n of the node priority classification.
3. The passive internet of things node medium access control method according to claim 2, wherein the priority K is calculated in the following manner:
Figure FDA0003463482190000011
wherein E ismaxUpper limit of energy available to the node, EminTo maintain the energy threshold of the node working normally, n is the granularity of the node priority classification.
4. The medium access control method of the passive internet of things node of claim 1, wherein in the step S2, the node fixed wait duration T1 is designed to have the following characteristics:
t1 is determined by the formula T1 ═ g (k) × Δ T, g (k) is a single increasing function and returns an integer value, Δ T is the duration of a unit time slot;
based on this design, it can be seen that nodes with different priorities have different fixed wait durations T1, and that nodes with higher priorities T1 have higher transmission opportunities than nodes with lower priorities.
5. The method as claimed in claim 4, wherein in step S2, the node random back-off duration T2 is designed to have the following characteristics:
t2 is determined by the formula T2 ═ Rand (a, B) × Δ T, Rand (a, B) returns a random integer in the range of [ a, B ], all nodes a ═ g (K), the node B with the lowest non-priority level ═ g (K +1), and the node B with the lowest priority level has to take a value greater than g (K).
6. The passive internet of things node medium access control method according to claim 1, wherein when the node monitors the channel in step S3 and the node backs off in step S4 for waiting, both the remaining energy of the radio frequency energy supplementing node in the environment can be obtained, so that the priority of the node with low priority is gradually increased in multiple monitoring and back off processes, the probability of node transmission is greatly increased, and the fairness of the node is ensured.
7. An environmental backscatter passive internet of things system, comprising wireless sensor nodes and receiving devices, wherein the wireless sensor nodes are controlled by a passive internet of things node medium access control method as claimed in any one of claims 1 to 6.
8. The ambient reflection scattering passive internet of things system of claim 7, wherein the receiving device is a reader.
9. A passive Internet of things node medium access control device is characterized by comprising:
at least one processor;
at least one memory for storing at least one program;
when executed by the at least one processor, cause the at least one processor to implement the method of any one of claims 1-6.
10. A computer-readable storage medium, in which a program executable by a processor is stored, wherein the program executable by the processor is adapted to perform the method according to any one of claims 1 to 6 when executed by the processor.
CN202210023586.8A 2022-01-10 2022-01-10 Passive Internet of things node medium access control method, system, device and medium Pending CN114554436A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210023586.8A CN114554436A (en) 2022-01-10 2022-01-10 Passive Internet of things node medium access control method, system, device and medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210023586.8A CN114554436A (en) 2022-01-10 2022-01-10 Passive Internet of things node medium access control method, system, device and medium

Publications (1)

Publication Number Publication Date
CN114554436A true CN114554436A (en) 2022-05-27

Family

ID=81670012

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210023586.8A Pending CN114554436A (en) 2022-01-10 2022-01-10 Passive Internet of things node medium access control method, system, device and medium

Country Status (1)

Country Link
CN (1) CN114554436A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115038192A (en) * 2022-08-10 2022-09-09 中南民族大学 Improved non-time slot CSMA/CA optimization method and evaluation method

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115038192A (en) * 2022-08-10 2022-09-09 中南民族大学 Improved non-time slot CSMA/CA optimization method and evaluation method
CN115038192B (en) * 2022-08-10 2022-11-08 中南民族大学 Improved non-time slot CSMA/CA optimization method and evaluation method

Similar Documents

Publication Publication Date Title
US10334530B2 (en) Access and power management for centralized networks
US9154382B2 (en) Information processing system
CN101589577B (en) Method for allocating a beacon slot using a beacon table in wireless personal area network (wpan) and WPAN device
Rismanian Yazdi et al. A priority-based MAC protocol for energy consumption and delay guaranteed in wireless body area networks
CN106376054B (en) Dual-wifi system of mobile device and network connection control method
US20090216349A1 (en) Method and system for extending lifetime of sensor nodes in wireless sensor network
US20100027449A1 (en) Transmitting apparatus, transmitting method, receiving apparatus, receiving method and channel status information updating method of sensor node based on multiple channels
US10070287B2 (en) Method and apparatus for energy adaptive resource allocation in energy harvesting network
EP2337271A1 (en) Network mode switching method and serial data communication network
CN103687045A (en) Method and device for service sending
CN102859904A (en) Methods and device of managing resources in a wireless communication network
CN114554436A (en) Passive Internet of things node medium access control method, system, device and medium
US20240196332A1 (en) Wireless communication method and related apparatus
CN102163272B (en) Method and device for improving performance efficiency of reader
US20040208154A1 (en) Network reconfiguration method, node and link change method, network reconfiguration program, link change program, and recording medium recording the program
CN102026292A (en) Resource management method and equipment
CN107820277B (en) Parent node device for wireless network, terminal device and data transmission method thereof
CN110582060B (en) Communication method, communication device, node equipment and storage medium thereof
KR20090022366A (en) The backoff time decision method and the channel access method in wireless sensor network
CN104796973A (en) Wireless access device control method and wireless access device
Kim et al. Energy-aware medium access control for energy-harvesting machine-to-machine networks
CN110119111B (en) Communication method and device, storage medium, and electronic device
KR101234588B1 (en) RFID tag collection system using tag numbering and the method thereof
CN113242537A (en) Infrared image transmission method based on Bluetooth intelligent networking
CN111835609A (en) Bus resource allocation method and device and air conditioning system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination