WO2025168105A1 - Procédé et appareil de transmission de données, dispositif électronique, et support de stockage - Google Patents
Procédé et appareil de transmission de données, dispositif électronique, et support de stockageInfo
- Publication number
- WO2025168105A1 WO2025168105A1 PCT/CN2025/076449 CN2025076449W WO2025168105A1 WO 2025168105 A1 WO2025168105 A1 WO 2025168105A1 CN 2025076449 W CN2025076449 W CN 2025076449W WO 2025168105 A1 WO2025168105 A1 WO 2025168105A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- message
- protocol
- queue
- tcp
- electronic device
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W72/00—Local resource management
- H04W72/50—Allocation or scheduling criteria for wireless resources
- H04W72/56—Allocation or scheduling criteria for wireless resources based on priority criteria
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L47/00—Traffic control in data switching networks
- H04L47/50—Queue scheduling
- H04L47/62—Queue scheduling characterised by scheduling criteria
- H04L47/625—Queue scheduling characterised by scheduling criteria for service slots or service orders
- H04L47/6275—Queue scheduling characterised by scheduling criteria for service slots or service orders based on priority
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L47/00—Traffic control in data switching networks
- H04L47/50—Queue scheduling
- H04L47/62—Queue scheduling characterised by scheduling criteria
- H04L47/6295—Queue scheduling characterised by scheduling criteria using multiple queues, one for each individual QoS, connection, flow or priority
Definitions
- the application relates to the field of terminal technology, and in particular to a data transmission method and device, electronic equipment and storage medium.
- the air interface signal may be interfered with or the air interface signal is poor, resulting in a poor Internet experience for the users.
- the embodiments of the present application provide a data transmission method and apparatus, an electronic device, and a storage medium, which can improve the user experience of using an electronic device to access the Internet through a Wi-Fi network.
- the electronic device includes a Wi-Fi driver.
- a first protocol message to be sent is a signaling message of a preset protocol
- the electronic device adds the first protocol message to a first priority transmission queue, including: the Wi-Fi driver parses the first protocol message, and when determining, based on a parsing result, that the first protocol message is a signaling message of the preset protocol, adds the first protocol message to the first priority transmission queue.
- the signaling message can be sent out more reliably (it can be understood that the recipient can receive the signaling message with a greater probability), avoiding the signaling message from being successfully sent due to the air interface environment not being good enough (it can be understood that the recipient failed to successfully receive the signaling message), resulting in the user experiencing connection jams, delays or failures when using the electronic device to surf the Internet through the Wi-Fi network, thereby ensuring the user's experience of surfing the Internet through the Wi-Fi network.
- the first priority transmission queue includes a voice-optimized VO queue; and the ability of the first priority transmission queue to seize a channel is greater than that of transmission queues other than the first priority transmission queue.
- the transmission queues other than the first priority transmission queue include: a video optimization VI queue, a best effort BE queue, and a background optimization BK queue.
- protocol messages other than signaling messages in the preset protocol can be sent in a queue that does not have the strongest channel seizure capability, so that the signaling messages of the preset protocol can be promptly placed in the VO queue with the strongest channel seizure capability for transmission, thereby better ensuring that electronic devices can access the Internet through the Wi-Fi network and guaranteeing the user's Internet experience.
- the third TCP handshake message when the third TCP handshake message carries service data, it can contain multiple data packets. That is, after receiving the third TCP handshake message, even if it contains missing data, the TCP server can promptly determine which sequence numbers are missing based on the sequence numbers of the received messages and promptly notify the mobile phone to resend the data. Therefore, when the third TCP handshake message carries service data, it cannot be simply considered a signaling message and can be treated as a signaling message for the default protocol. Even if a transmission issue occurs, the peer device can promptly detect the issue and notify the mobile phone to resend the missing data, eliminating the need to prioritize its transmission using the default protocol's signaling message transmission priority. This allows signaling messages for the default protocol that significantly impact the Wi-Fi network experience to be promptly routed to the VO queue with the strongest channel preemption capability for transmission, thereby better ensuring Wi-Fi access for electronic devices and guaranteeing a secure user experience.
- the electronic device can successfully send the first protocol message to the target device.
- embodiments of the present application further provide a data transmission device that can be applied to an electronic device.
- the functions of the device can be implemented in hardware or by executing corresponding software on the hardware.
- the hardware or software includes one or more modules corresponding to the above functions, such as a processing module and a sending module.
- the processing module is used to add the first protocol message to the first priority transmission queue when the first protocol message to be sent is a signaling message; the processing module is also used to add the first protocol message to the second priority transmission queue when the first protocol message is not a signaling message of the preset protocol; the second priority transmission queue is different from the first priority transmission queue; the preset protocol includes any one or more of the following: EAPOL, DHCP, ARP, DNS or TCP; the sending module is used to send the first protocol message to the target device through the Wi-Fi network according to the preset queue message sending rule; the preset queue message sending rule includes that the transmission priority of the first priority transmission queue is higher than the transmission priority of the second priority transmission queue.
- the present application provides an electronic device comprising a display screen, a memory, and one or more processors; the display screen, the memory, and the processor are coupled; wherein the memory stores computer program code, and the computer program code comprises computer instructions, which, when executed by the processor, enable the electronic device to execute the data transmission method provided in the first aspect and any possible design thereof.
- the present application provides an electronic device, including a TCP/IP protocol stack, a Wi-Fi driver, and a Wi-Fi chip; when the Wi-Fi driver executes computer instructions, the electronic device executes the data transmission method provided in the first aspect and any one of its design methods.
- the present application provides a computer-readable storage medium, which includes computer instructions.
- the computer instructions When the computer instructions are executed on an electronic device, the electronic device executes the data transmission method provided in the first aspect and any possible design thereof.
- FIG2 is a schematic diagram showing the principle of a data transmission method provided in an embodiment of the present application.
- FIG8 is a fourth flow chart of a data transmission method provided in an embodiment of the present application.
- FIG9 is a fifth flow chart of a data transmission method provided in an embodiment of the present application.
- Frequency band In the field of communications, frequency band refers to the frequency range of electromagnetic waves.
- DHCP Dynamic Host Configuration Protocol
- RFC 1541 Superseded by RFC 2131. It allows a DHCP server to dynamically assign network configuration information, such as Internet Protocol (IP) addresses, subnet masks, and gateway addresses, to clients (e.g., mobile phones and other electronic devices).
- IP Internet Protocol
- DHCP is typically used in large local area networks, primarily to centrally manage and allocate IP addresses, thereby increasing address utilization.
- the DHCP server (usually a router or a network device connected to the router) will assign an available IP address to the mobile phone and provide the IP address of the gateway at the same time.
- the gateway is a router connected to a Wi-Fi network.
- the router is responsible for forwarding messages from the internal network to the external network, and also forwarding messages from the external network to the internal network.
- the gateway IP address obtained by the mobile phone is the IP address pointing to the router.
- the router can perform network address translation (NAT), routing selection and other operations, thereby realizing communication between the mobile phone and the external network.
- NAT network address translation
- the electronic device can send an ARP request message in the broadcast domain of the Wi-Fi local area network.
- the ARP request message contains the target IP address (i.e. the IP of the gateway) and the IP address of the electronic device, as well as an empty MAC address field.
- Other devices in the Wi-Fi local area network will receive this ARP request packet and check whether their IP address matches the target IP address in the ARP request message. If it matches, the device will reply its MAC address to the sender. In this way, the electronic device can convert the IP address into the corresponding MAC address, thereby achieving network communication.
- host B, host C and host D will all receive the ARP request message and identify whether the target IP address in the ARP request message is the same as or matches their own IP address. If Host B and Host D determine that the target IP address in the ARP request message is different from or does not match their own IP address, they will discard the ARP request message. If Host C determines that the target IP address in the ARP request message is the same as or matches its own IP address, it will return its MAC address to Host A. Host A will associate the received MAC address with the gateway's ID address and store it in the ARP table entry. Host A will then use this MAC address to send messages.
- DNS Domain Name System
- DNS Domain Name System
- electronic devices can convert the host name of an application server (e.g., www.example.com) to the corresponding IP address (e.g., 192.0.2.1).
- an application server e.g., www.example.com
- the corresponding IP address e.g., 192.0.2.1
- the electronic device can also use DNS to convert it into the corresponding IP address to complete the corresponding communication.
- WMM defines four transmission queues with different priorities: voice optimized queue (VO), video optimized queue (VI), best effort queue (BE), and background optimized queue (BK).
- VO voice optimized queue
- VI video optimized queue
- BE best effort queue
- BK background optimized queue
- the VO queue is primarily used for voice data, with low latency as its primary goal; the VI queue focuses on video data, aiming to ensure smooth video streaming; the BE queue meets best-effort service requirements without strict QoS guarantees; and the BK queue targets background applications, with a certain tolerance for delay and loss.
- EDCA enhanced distributed channel access
- AIFS defines the time each priority message needs to wait before starting to send on the contention medium, that is, AIFS includes a priority-related timer.
- Messages with higher transmission priorities can be configured with a shorter AIFS so that they can participate in the competition earlier, thereby increasing their probability of obtaining a transmission opportunity on the contention medium (i.e., channel), which also helps meet the requirements of applications with higher real-time performance.
- the higher the transmission priority of the transmission queue the shorter the AIFS parameter time, so that the higher the transmission priority of the transmission queue, the higher the probability of competing for the channel.
- the transmission queues with AIFS parameters from small to large are VO, VI, BE, and BK.
- the AIFS parameter of the VO queue can be 24us
- the AIFS parameter of the VI queue can be 34us
- the AIFS parameter of the BE queue can be 43us
- the AIFS parameter of the BK queue can be 79us.
- the random backoff parameter is a range, specifically [CWmin, CWmax].
- the random backoff mechanism is to derive CW from [CWmin, CWmax].
- the initial value CW CWmin.
- After a contention failure, it is doubled, and then updated to CW 2CW until CW reaches CWmax.
- CW returns to CWmin.
- the random backoff parameter ranges, from smallest to largest, are for the following transmission queues: VO, VI, BE, and BK.
- TXOP Limit refers to the maximum duration that a given electronic device or station (STA) can transmit during a competitive or non-competitive transmission in a wireless local area network.
- STA electronic device or station
- TXOP Limit refers to the maximum amount of time that a STA obtains a transmission opportunity and continuously transmits data on the shared medium of the network.
- TXOP Limit has different configuration methods for different QoS categories. By allowing STAs to transmit for a longer time during the transmission opportunity, TXOP Limit can improve the quality of service for high transmission priority messages, such as voice and video messages. For messages with low transmission priority, the TXOP Limit is smaller to give more stations the opportunity to transmit. In other words, the TXOP Limit of the transmission queue with a higher transmission priority is larger, and the TXOP Limit of the transmission queue with a lower transmission priority is smaller.
- these four transmission queues compete for the channel. They compete by counting down based on the AIFS parameter plus the random backoff parameter. If the channel is still idle after the countdown reaches 0, the queue will occupy it. If the channel is already occupied, the queue will restart the countdown after the channel becomes idle. After a transmission queue wins the channel, it can use the channel for the duration of the TXOP limit.
- some embodiments of the present application can improve the user's Internet experience by prioritizing the transmission of signaling messages of important protocols in the TCP/IP (Transmission Control Protocol/Internet Protocol) protocol stack (some protocols that are strongly related to the user's Internet experience) and improving the transmission reliability of the signaling messages of these important protocols.
- TCP/IP Transmission Control Protocol/Internet Protocol
- signaling message is responsible for completing tasks such as establishing, maintaining, and terminating network connections, as well as managing and resolving network addresses. In other words, this type of signaling message is used to ensure that users can access the Internet and then successfully use electronic devices to complete the services required by users.
- the sender For signaling messages, the sender only sends one message at a time. If the air interface signal is interfered with or poor, and the receiver fails to receive the signaling message, it cannot determine whether the sender has sent the message and cannot promptly notify the sender to resend the message. Subsequently, based on the retransmission mechanism, if the sender does not receive a response (e.g., an acknowledgment (ACK) message) from the receiver after a preset duration (retransmission interval) has passed after sending the signaling message, the sender can determine that the signaling message has failed and can resend the message.
- ACK acknowledgment
- a signaling message can be understood as a protocol message sent through only one message, and a data message can be understood as a protocol message sent through multiple messages at the same time.
- the first protocol message is placed in a first transmission queue. If the first protocol message is determined not to be a signaling message, the first protocol message is placed in a second transmission queue.
- the first transmission queue is a VO queue
- the second transmission queue is a VI queue, a BE queue, or a BK queue.
- the electronic device may transmit the first protocol message in the first transmission queue or the second transmission queue based on a specific queue scheduling rule, wherein the preset queue message sending rule includes that the transmission priority of the first priority transmission queue is higher than the transmission priority of the second priority transmission queue.
- the electronic device when sending protocol messages, the electronic device can place the signaling messages closely related to the user's Internet access in the VO queue.
- the VO queue is the queue with the strongest channel seizure capability for electronic devices in Wi-Fi scenarios.
- the signaling message can be sent out more reliably (it can be understood that the receiver can receive the signaling message with a greater probability), avoiding the signaling message from being successfully sent due to the air interface environment not being good enough (it can be understood that the receiver failed to successfully receive the signaling message), resulting in the user using the electronic device to access the Internet through the Wi-Fi network. Connection jams, delays or failures, ensuring the user's experience of accessing the Internet through the Wi-Fi network.
- FIG3 shows a schematic structural diagram of an electronic device provided in an embodiment of the present application.
- the electronic device may include a processor 110, an external memory interface 120, an internal memory 121, a universal serial bus (USB) interface 130, a charging management module 140, a power management module 141, a battery 142, an antenna 1, an antenna 2, a mobile communication module 150, a wireless communication module 160, an audio module 170, a speaker 170A, a receiver 170B, a microphone 170C, an earphone interface 170D, a sensor module 180, a button 190, a motor 191, an indicator 192, a display 193, a subscriber identification module (SIM) card interface 194, and a camera 195.
- a processor 110 an external memory interface 120, an internal memory 121, a universal serial bus (USB) interface 130, a charging management module 140, a power management module 141, a battery 142, an antenna 1, an antenna 2, a mobile communication module 150, a wireless communication module 160, an audio module 170, a speaker 170A, a receiver 170B, a microphone 1
- the processor 110 may include one or more processing units.
- the processor 110 may include an application processor (AP), a modem processor, a graphics processing unit (GPU), an image signal processor (ISP), a controller, a memory, a video codec, a digital signal processor (DSP), a baseband processor, and/or a neural-network processing unit (NPU).
- AP application processor
- GPU graphics processing unit
- ISP image signal processor
- DSP digital signal processor
- NPU neural-network processing unit
- the different processing units may be independent devices or integrated into one or more processors.
- the processor may include a system-on-chip (SoC).
- SoC system-on-chip
- the controller can be the nerve center and command center of the electronic device.
- the controller can generate operation control signals based on the instruction opcode and timing signals to complete the control of instruction fetching and execution.
- Processor 110 may also include a memory for storing instructions and data.
- the memory in processor 110 is a cache memory. This memory can store instructions or data that have just been used or are being recycled by processor 110. If processor 110 needs to use the same instruction or data again, it can directly access the memory. This avoids duplicate accesses, reduces processor 110 latency, and thus improves system efficiency.
- the processor 110 may include one or more interfaces.
- the interfaces may include an inter-integrated circuit (I2C) interface, an inter-integrated circuit sound (I2S) interface, a pulse code modulation (PCM) interface, a universal asynchronous receiver/transmitter (UART) interface, a mobile industry processor interface (MIPI), a general-purpose input/output (GPIO) interface, a subscriber identity module (SIM) interface, and/or a universal serial bus (USB) interface.
- I2C inter-integrated circuit
- I2S inter-integrated circuit sound
- PCM pulse code modulation
- UART universal asynchronous receiver/transmitter
- MIPI mobile industry processor interface
- GPIO general-purpose input/output
- SIM subscriber identity module
- USB universal serial bus
- the external memory interface 120 can be used to connect to an external non-volatile memory device to expand the storage capacity of the electronic device.
- the external non-volatile memory device communicates with the processor 110 via the external memory interface 120 to implement data storage. For example, files such as music and videos can be stored in the external non-volatile memory device.
- Internal memory 121 may include one or more random access memories (RAMs) and one or more non-volatile memories (NVMs).
- RAMs can be directly read and written by processor 110 and can be used to store executable programs (e.g., machine instructions) for an operating system or other running programs, as well as user and application data.
- executable programs e.g., machine instructions
- NVMs can also store executable programs and user and application data, and can be preloaded into RAMs for direct reading and writing by processor 110.
- the display screen 193 can be used to display pages required by the electronic device (for example, wizard pages (including highlight recommendation pages and external module access pages), etc.), and display images captured by any one or more cameras 195 in the interface.
- pages required by the electronic device for example, wizard pages (including highlight recommendation pages and external module access pages), etc.
- display images captured by any one or more cameras 195 in the interface for example, wizard pages (including highlight recommendation pages and external module access pages), etc.
- the wireless communication function of the electronic device can be implemented through antenna 1, antenna 2, mobile communication module 150, wireless communication module 160, modem and baseband processor.
- Antenna 1 and Antenna 2 are used to transmit and receive electromagnetic wave signals.
- Each antenna in an electronic device can be used to cover a single or multiple communication frequency bands. Different antennas can also be reused to improve antenna utilization.
- the mobile communication module 150 can provide solutions for wireless communications including 2G/3G/4G/5G, etc., applied to electronic devices.
- the mobile communication module 150 can receive electromagnetic waves through the antenna 1, filter, amplify, and perform other processing on the received electromagnetic waves, and transmit them to the modulation and demodulation processor for demodulation.
- the mobile communication module 150 can also amplify the signal modulated by the modulation and demodulation processor, and convert it into electromagnetic waves for radiation through the antenna 1.
- at least some of the functional modules of the mobile communication module 150 can be set in the processor 110.
- at least some of the functional modules of the mobile communication module 150 can be set in the same device as at least some of the modules of the processor 110.
- the SIM card interface 194 is used to connect a SIM card.
- the SIM card can be connected to and disconnected from the electronic device by inserting or removing it from the SIM card interface 194.
- the electronic device may support one or more SIM card interfaces.
- the SIM card interface 194 may support Nano SIM cards, Micro SIM cards, SIM cards, and the like. Multiple cards can be inserted into the same SIM card interface 194 at the same time.
- the SIM card interface 194 is also compatible with external memory cards. Electronic devices interact with the network through the SIM card to implement functions such as calls and data communications.
- One SIM card corresponds to one user number.
- the software system of the electronic device can adopt a layered architecture, event-driven architecture, micro-core architecture, micro-service architecture, or cloud architecture. Taking the system as an example, the software structure of the electronic device is illustrated.
- the software system on the application processor (AP) in the system-on-chip (SOC) of an electronic device is divided into five layers: the application layer, the framework layer (or application framework layer), the system library and Android runtime (Android runtime), the HAL layer (hardware abstraction layer), and the kernel layer (or driver layer).
- the system library and Android runtime can also be referred to as the native framework layer or the native layer.
- the framework layer provides an application programming interface (API) and programming framework for applications in the application layer.
- the application framework layer includes some predefined functions or services.
- the application framework layer may include an activity manager, a window manager, a content provider, an audio service, a view system, a telephony manager, a resource manager, a notification manager, a package manager, etc., which are not limited in this embodiment of the application.
- the window manager is used to manage window programs.
- the window manager can obtain the display size, determine whether there is a status bar, lock the screen, take screenshots, etc.
- Content providers are used to store and retrieve data and make it accessible to applications.
- This data can include videos, images, audio, calls made and received, browsing history and bookmarks, phone books, etc.
- the view system includes visual controls, such as those for displaying text and images.
- the view system is used to build applications.
- a display interface can consist of one or more views.
- a display interface containing a text notification icon might include a view for displaying text and a view for displaying images.
- the resource manager provides various resources for applications, such as localized strings, icons, images, layout files, video files, and so on.
- the Notification Manager allows applications to display notifications in the status bar. These messages can be displayed briefly and then disappear automatically without user interaction. For example, the Notification Manager is used to notify users of completed downloads and message reminders.
- the Notification Manager can also display notifications in the top status bar of the system as icons or scrolling text, such as notifications from background applications, or as dialog windows on the screen. Examples include text messages in the status bar, beeps, vibrations on electronic devices, and flashing indicator lights.
- Package Manager in The system is used to manage application packages. It allows applications to obtain detailed information about installed applications and their services, permissions, etc.
- the package manager is also used to manage events such as application installation, uninstallation, and upgrades.
- the system library can include multiple functional modules. For example: surface manager, media libraries, open graphics library embedded systems (OpenGL ES), SGL, etc.
- the surface manager is used to manage the display subsystem and provides the fusion of 2D and 3D layers for multiple applications.
- the media library supports playback and recording of a variety of common audio and video formats, as well as static image files.
- the media library can support a variety of audio and video encoding formats, such as MPEG4, H.264, MP3, AAC, AMR, JPG, PNG, etc.
- OpenGL ES is used to implement 3D graphics drawing, image rendering, synthesis, and layer processing.
- SGL is a drawing engine for 2D drawing.
- the Android runtime consists of the core library and the ART virtual machine.
- the Android runtime is responsible for scheduling and management of the Android system.
- the core library consists of two parts: one for the Java language's function calls and the other for the Android core library.
- the application layer and the application framework layer run in the ART virtual machine.
- the ART virtual machine executes the Java files in the application layer and application framework layer as binary files.
- the ART virtual machine is responsible for performing functions such as object lifecycle management, stack management, thread management, security and exception management, and garbage collection.
- the HAL layer is an interface layer located between the operating system kernel and the hardware circuit. Its purpose is to abstract the hardware. It hides the hardware interface details of a specific platform and provides a virtual hardware platform for the operating system, making it hardware-independent and portable across multiple platforms.
- the HAL layer provides a standard interface to display device hardware capabilities to the higher-level Java API framework (i.e., the framework layer).
- the HAL layer contains multiple library modules, each of which implements an interface for a specific type of hardware component, such as the audio HAL audio module, the bluetooth HAL Bluetooth module, the camera HAL camera module (also known as the camera HAL or camera hardware abstraction module), the sensors HAL sensor module (or Isensor service, sensor service), the Wi-Fi HAL (Wi-Fi module), etc.
- the kernel layer is the layer between hardware and software. It contains at least various drivers and the TCP/IP protocol stack. These drivers can include display drivers, camera drivers, audio drivers, sensor drivers, battery drivers, Wi-Fi drivers, and more, though this application does not limit these.
- the TCP/IP protocol stack is a collection of network communication protocols whose primary function is to ensure the correct and efficient transmission of data across a network. It provides a set of standardized protocols that enable different types of hosts, routers, and other devices to communicate and exchange data. By using the TCP/IP protocol stack, various devices can find paths between each other, exchange data, send and receive information, and ensure reliable and secure data transmission within complex networks.
- the TCP/IP protocol stack typically consists of multiple layers, such as the physical layer, data link layer, network layer, transport layer, and application layer. Each layer has specific functions, such as the network layer responsible for addressing and routing, and the transport layer responsible for data segmentation and transmission control.
- the transport layer in a TCP/IP protocol stack typically includes a TCP/UDP (user datagram protocol) protocol stack; the network layer in a TCP/IP protocol stack may include an IP protocol stack.
- the TCP/UDP protocol stack is responsible for data transmission at the transport layer.
- the transport layer is primarily responsible for breaking application layer data into smaller data blocks and passing these blocks to the network layer for reliable transmission across the network.
- the IP protocol stack is responsible for the network layer, which is the foundation of data transmission on the internet.
- the IP protocol stack uses IP addresses to identify and address devices on the network, thereby routing data between different network nodes.
- the business data that needs to be sent by various applications in the application layer will first be encapsulated by the TCP/IP protocol stack, and then sent through the Wi-Fi driver to control the Wi-Fi chip.
- the TCP/IP protocol stack When an electronic device uses a Wi-Fi network to access the Internet in a Wi-Fi scenario, when the TCP/IP protocol stack generates a protocol message, the TCP/IP protocol stack sends the message to the Wi-Fi driver, so that the Wi-Fi driver sends the protocol message to the corresponding recipient.
- the Wi-Fi driver is used to drive the Wi-Fi module (or Wi-Fi chip) to establish a Wi-Fi connection so that the electronic device can access the Internet through the Wi-Fi network.
- the Wi-Fi driver may include a message parsing module, a queue allocation module and a data sending module.
- the message parsing module is used to parse the protocol message from the TCP/IP protocol stack, and determine whether the protocol message is a signaling message of the preset protocol based on the parsing result.
- the queue allocation module is used to allocate queues to the protocol messages from the TCP/IP protocol stack according to the judgment of the message parsing module on the parsing result.
- the queue allocation message allocates the protocol message to the VO queue; when the message parsing module determines that the protocol message is not a signaling message of the preset protocol, the queue allocation message allocates the protocol message to a transmission queue other than the VO queue.
- the data sending module can send the protocol message according to a specific queue message sending rule based on the allocation result of the queue allocation message to the protocol message.
- the electronic device needs to complete the EAPOL interaction process with the AP to complete identity authentication. If the user's network environment is very poor (i.e., the air interface signal is interfered with or the air interface signal is poor), the electronic device fails to successfully send the signaling message that needs to be sent to the AP during the EAPOL interaction process, and identity authentication cannot be completed. The electronic device will also be unable to access the Internet through the AP.
- DHCP is an important protocol for obtaining the IP of a mobile phone.
- the signaling message sent by the DHCP server - DHCP OFFER (DHCP offer) provides the IP to the electronic device. If the user's network environment is very poor (that is, the air interface signal is interfered with or the air interface signal is poor), the DHCP server does not receive the DHCP DISCOVER (DHCP discovery) signaling message sent by the electronic device.
- the electronic device After the electronic device obtains its own IP address and the IP address of the gateway, considering that the electronic device accesses the Internet through the Wi-Fi network, it must forward the corresponding message to the gateway in the Wi-Fi local area network.
- the data transmission in the Wi-Fi local area network is through the data link layer, so at this time the electronic device needs to obtain the MAC address of the gateway through ARP interaction to facilitate the subsequent forwarding of the data to the Internet by the gateway.
- the user's network environment is very poor (that is, the air interface signal is interfered with or the air interface signal is poor)
- the ARP request message sent by the electronic device is not received by the gateway for a long time, which will cause the ARP table on the mobile phone to age. After that, the electronic device will not be able to send any protocol message to the gateway, resulting in the user being completely unable to access the Internet.
- the electronic device After the electronic device obtains the IP address of the application server, it can complete the establishment of a TCP connection (or TCP stream) through TCP interaction with the application server. After the TCP connection is established, the electronic device can normally exchange data with the application server to achieve the purpose of Internet access.
- the electronic device and the TCP server will establish a TCP connection through a three-way handshake. Among them, the Transmission Control Protocol Synchronization Sequence Number (TCP SYN) message is the first handshake message. If the user's network environment is very poor (that is, the air interface signal is interfered or the air interface signal is poor), resulting in the loss of the signaling message, the TCP server will be completely unable to perceive that there is an electronic device trying to access.
- TCP SYN Transmission Control Protocol Synchronization Sequence Number
- the data transmission method provided by the present application may include five corresponding processes, which may be: EAPLO data transmission process, DHCP data transmission process, ARP data transmission process, DNS data transmission process and TCP data transmission process.
- EAPLO data transmission process in the data transmission method provided by the embodiment of the present application is introduced below in conjunction with FIG5.
- FIG5 is a schematic diagram of the EAPLO data transmission process provided by the embodiment of the present application. Referring to FIG5, taking the electronic device (i.e., the client STA (station)) as a mobile phone and the AP as a router as an example, the EAPLO data transmission process may include S501-S516:
- the router sends the first handshake message to the mobile phone.
- the Wi-Fi chip of the mobile phone receives the first handshake message from the router, and sends the first handshake message to the TCP/IP protocol stack through the Wi-Fi driver.
- the preset algorithm may be a pseudo-random function (PRF) algorithm.
- PRF pseudo-random function
- PTK PRF (Snonce + Anonce + PMK + AA + SA).
- the MIC key is determined during the authentication process between the mobile phone and the router before the EAPOL interaction.
- the MIC key can be the first 16 bytes of the PTK.
- the Wi-Fi driver of the mobile phone parses the first message and determines whether the first message is a signaling message of a preset protocol based on the parsing result.
- the transmission queue other than the VO queue can be referred to as the second priority transmission queue.
- the second priority transmission queue is different from the first priority transmission queue. The same applies to the subsequent embodiments.
- the Wi-Fi driver of the mobile phone may place the first message that is not a signaling message of the preset protocol in the BE queue.
- the preset queue message sending rule includes that the transmission priority of the first priority transmission queue is higher than the transmission priority of the second priority transmission queue.
- the router receives the first message from the mobile phone, and generates a third handshake message based on the SNonce and MIC1(sta) carried in the first message.
- the router can generate a PTK and MIC1(ap) in the same way as the mobile phone generates the PTK and MIC(sta). If MIC1(sta) and MIC1(ap) are the same, the PTK calculated by the router can be determined to be correct. If MIC1(sta) and MIC1(ap) are different, it can be assumed that the PTK calculated by the mobile phone and the PTK calculated by the router are different. The router can then discard the first message and return an authentication failure message to the mobile phone, ending the entire EAPOL interaction process.
- the router can generate a group temporal key (GTK) based on the group master key (GMK), Anonce, and AA.
- GTK group temporal key
- GMK group master key
- Anonce AA
- the GMK may be calculated based on secret information pre-configured by the router, authentication credentials, or other security factors. This application does not impose any specific restrictions on this.
- the router can also use the first 16 bytes of the PTK and the first message to generate MIC2 (ap).
- the specific generation method can refer to the generation method of MIC1 (ap).
- the router can also encrypt the GTK using a preset encryption method and generate a third handshake message Message3 carrying MIC2(ap) and the encrypted GTK.
- the third handshake message can specifically be an EAPOL-Key message carrying MIC2(ap) and the encrypted GTK.
- the preset encryption method can be to use the middle 16 bytes of the PTK to encrypt the GTK using any feasible encryption method (such as counter cipher mode with block chaining message authentication code protocol (CCMP)).
- CCMP block chaining message authentication code protocol
- S509 The router sends a third handshake message to the mobile phone.
- the Wi-Fi chip of the mobile phone receives the third handshake message from the router, and sends the third handshake message to the TCP/IP protocol stack through the Wi-Fi driver.
- the TCP/IP protocol stack of the mobile phone decrypts the encrypted GTK carried in the third handshake message, installs the PTK and GTK, generates a second message, and sends the second message to the Wi-Fi driver.
- the TCP/IP protocol stack first generates MIC2(sta) in the same way as the router generates MIC2(ap), and then determines whether MIC2(sta) is the same as MIC2(ap).
- the third handshake message can be considered unmodified and the GTK calculated by the router is correct.
- the mobile phone can then use the PTK to decrypt the encrypted GTK to obtain the GTK, install the PTK and GTK, and generate the second message.
- the third handshake message can be considered modified or the GTK calculated by the router is incorrect.
- the third handshake message can be discarded and an authentication failure message can be returned to the router, ending the entire EAPOL interaction process.
- Installing the PTK and the GTK may refer to subsequently using the PTK to encrypt unicast data frames between the mobile phone and the router, and using the GTK to encrypt multicast data frames and broadcast data frames between the mobile phone and the router.
- the second message can be the fourth handshake message, Message 4, specifically an EAPOL-Key Ack message carrying an ACK and MIC3(sta).
- the mobile phone can use the first 16 bytes of the PTK and the third handshake message to generate MIC3(sta).
- the specific generation method can refer to the generation method of MIC1(sta).
- S512 The Wi-Fi driver of the mobile phone parses the second message, and determines whether the second message is a signaling message of a preset protocol based on the parsing result.
- the Wi-Fi driver may parse the second message in any feasible manner. By parsing the second message, the Wi-Fi driver may determine the specific protocol message of the second message and the number of the protocol message interaction process, i.e., the parsing result. For example, after parsing the second message, it may be determined that the second message is an EAPOL protocol message and is the fourth EAPOL protocol message in the EAPOL protocol message interaction process.
- the Wi-Fi driver determines that the second message is a signaling message of a preset protocol, it can be considered that the receiving method cannot promptly determine whether the second message is received. Once the second message is lost, it is necessary to wait for the sender to retransmit it based on the retransmission mechanism after a long time. During this waiting time, the user cannot access the Internet normally. In other words, the reliable transmission of the second message has a greater impact on whether the user can access the Internet normally. Based on this, in order to ensure that the second message that has a greater impact on the user's Internet access is reliably sent and that the user can access the Internet normally through the Wi-Fi network, the second message can be placed in the VO queue, that is, S513 is executed.
- the Wi-Fi driver determines that the second message is not a signaling message for the preset protocol, then even if the second message is lost, the receiver can promptly detect it and notify the sender to resend it, without causing the user's Internet access to stall. Based on this, in this case, the second message can be placed in a transmission queue other than the VO queue (e.g., the BE queue, the VI queue, or the BK queue), executing S514.
- the VO queue e.g., the BE queue, the VI queue, or the BK queue
- S514 The Wi-Fi driver of the mobile phone puts the second message into a transmission queue other than the VO queue.
- the Wi-Fi driver of the mobile phone may place the second message that is not a signaling message of the preset protocol in the BE queue.
- S515 The Wi-Fi driver of the mobile phone sends the second message to the router through the Wi-Fi chip according to the preset queue message sending rule.
- the router after receiving the second message, the router first generates MIC3(ap) in the same manner as the mobile phone generates MIC3(ap), and then determines whether MIC3(sta) and MIC3(ap) are the same.
- MIC3(sta) and MIC3(ap) are the same, it can be assumed that the second message has not been modified and the mobile phone has successfully installed the PTK and GTK. The router can then install the PTK and GTK and end the entire EAPOL interaction process. If MIC3(sta) and MIC3(ap) are different, it can be assumed that the second message has been modified or the mobile phone has failed to successfully install the PTK and GTK. The router can then discard the second message and return an authentication failure message to the mobile phone, ending the entire EAPOL interaction process.
- the mobile phone can place all EAPOL signaling messages in the first-priority transmission queue with a higher transmission priority, such as the VO queue, for transmission.
- a higher transmission priority such as the VO queue
- the highest priority transmission queue is used, and messages in this queue have a stronger ability to seize the channel and a higher transmission success rate. This allows signaling messages placed in the first-priority transmission queue in the EAPOL data transmission process to be transmitted more reliably (i.e., with interference or poor signal quality), even in less-than-optimal air interface conditions (i.e., with a higher probability of successful reception at the receiver), allowing the mobile phone and router to successfully complete the EAPOL data transmission process.
- the mobile phone can then proceed to the subsequent internet access process through the router, ensuring a smooth internet access experience, ensuring a better Wi-Fi experience.
- FIG6 is a schematic diagram of the DHCP data transmission process provided by the embodiment of the present application.
- the DHCP data transmission process may include S601-S618:
- S601 The TCP/IP protocol stack of the mobile phone generates a third message and sends the third message to the Wi-Fi driver.
- the TCP/IP protocol stack can generate a DHCP Discover message.
- S604 The Wi-Fi driver of the mobile phone puts the third message into a transmission queue other than the VO queue.
- the Wi-Fi driver of the mobile phone may place the third message that is not a signaling message of the preset protocol in the BE queue.
- each interactive DHCP protocol message is a data message that the recipient cannot promptly determine has not been received when it is missing, and is strongly related to the user's ability to access the Internet normally. Therefore, based on the parsing result of the third message, the Wi-Fi driver here can determine that the third message is a signaling message of the preset protocol. Therefore, S604 will not be executed in practice.
- the description of S604 in the embodiment of this application is only to illustrate the specific possible actions of the Wi-Fi driver in the technical solution provided by this application.
- the Wi-Fi driver may send the third message in the broadcast domain of the Wi-Fi network through the Wi-Fi chip, so that the DHCP server can receive the third message.
- the DHCP server may be pre-installed in a router that provides a Wi-Fi network, or may be a device connected to the router in a Wi-Fi local area network. If the DHCP server and the router are different devices, the Wi-Fi chip may send the third message to the router, which then sends it to the DHCP server.
- the DHCP server receives a third message from the mobile phone, selects an unassigned first IP address from the IP address pool in response to the third message, and generates a DHCP OFFER message carrying the first IP address.
- the DHCP server sends the DHCP OFFER message to the mobile phone.
- the DHCP server can send the DHCP Offer message in the broadcast domain of the Wi-Fi network. After sending the third message, the mobile phone can obtain the DHCP Offer message by monitoring the broadcast address (i.e., monitoring messages in the broadcast domain).
- the DHCP server unicasts the DHCP Offer message to the mobile phone.
- the DHCP server can use the mobile phone's MAC address or other identifier carried in the third message to unicast the DHCP Offer message to the mobile phone.
- the DHCP server can specifically send the DHCP OFFER message to the mobile phone through the router.
- the Wi-Fi chip of the mobile phone receives the DHCP OFFER message from the DHCP server and sends the DHCP OFFER message to the TCP/IP protocol stack through the Wi-Fi driver.
- the TCP/IP protocol stack of the mobile phone applies the first IP address carried in the DHCP OFFER message to the network configuration of the mobile phone and generates a fourth message.
- Applying the first IP address to the mobile phone's network configuration refers to configuring the first IP address as the mobile phone's IP address. Furthermore, the TCP/IP protocol stack is used to apply information such as the lease period of the first IP address, subnet mask, gateway IP address, and DNS server IP address carried in the DHCP OFFER message to the mobile phone's network configuration in a similar manner.
- the TCP/IP protocol stack will also determine whether the first IP address is valid through any available method. If the first IP address is determined to be valid, the TCP/IP protocol stack will apply the first IP address to the phone's network configuration and generate the fourth message. If the first IP address is determined to be invalid, the phone can perform any available processing action, such as resending a DHCP DISCOVER message to the DHCP server.
- the fourth message may specifically be a DHCP REQUEST message.
- the DHCP REQUEST message is used to instruct the mobile phone to accept the first IP address assigned by the DHCP server.
- S610 The TCP/IP protocol stack of the mobile phone sends a fourth message to the Wi-Fi driver.
- the Wi-Fi driver of the mobile phone parses the fourth message, and determines whether the fourth message is a signaling message of a preset protocol based on the parsing result.
- the Wi-Fi driver determines that the fourth message is a signaling message of a preset protocol based on the parsing result of the fourth message
- the fourth message may be placed in a VO queue for sending, ie, S612 is executed.
- the Wi-Fi driver determines that the fourth message is not a signaling message of the preset protocol based on the parsing result of the fourth message
- the fourth message may be placed in a transmission queue other than the VO queue for sending, that is, S613 is executed.
- S611 can refer to the relevant description of S504 in the above embodiment, and will not be repeated here.
- the target domain name can be a domain name entered by the user in the browser, or it can be a domain name transmitted by the application to the TCP/IP protocol stack when the user triggers an application to open. This application does not make specific restrictions on this.
- the Wi-Fi driver can determine that the seventh message is a signaling message of the preset protocol based on the parsing result of the seventh message. Therefore, S804 will not be executed in practice.
- the description of S804 in the embodiment of this application is only to illustrate the specific possible actions of the Wi-Fi driver in the technical solution provided by this application.
- the Wi-Fi driver may send the seventh message to the DNS server using the IP address of the DNS server carried in the DHCP OFFER message previously provided by the DHCP server.
- the DNS server may be pre-installed in a router that provides a Wi-Fi network, or may be a device connected to the router in a Wi-Fi local area network. If the DNS server and the router are different devices, the Wi-Fi chip may send the seventh message to the router, which then sends it to the DNS server.
- the DNS server receives the seventh message from the mobile phone, determines the second IP address corresponding to the target domain name in the seventh message in response to the seventh message, and generates a DNS response message carrying the second IP address.
- the DNS server will determine the second IP address corresponding to the target domain name in any feasible manner, such as obtaining the second IP address from the local cache of the DNS server.
- the DNS server sends a DNS response message to the mobile phone.
- the DNS server unicasts the DNS response message to the mobile phone.
- the source IP address in the DNS request message is the IP address of the mobile phone.
- the DNS server After obtaining the domain name resolution result (i.e., the second IP address), the DNS server sends a DNS response message carrying the domain name resolution result to the mobile phone based on the source IP address.
- the Wi-Fi chip of the mobile phone receives the DNS response message from the router, and sends the DNS response message to the TCP/IP protocol stack through the Wi-Fi driver.
- the TCP/IP protocol stack of the mobile phone stores the second IP address carried in the DNS response message.
- the mobile phone After obtaining the second IP address corresponding to the target domain name, the mobile phone can use the second IP address as the destination address to access the Internet.
- the mobile phone can place all signaling messages corresponding to the DNS in the VO queue for transmission. Since the VO queue is the queue with the strongest channel preemption capability for electronic devices in Wi-Fi scenarios, even in poor air interface conditions (i.e., interference or poor air interface signals), the signaling messages in the DNS data transmission process can be sent more reliably (this can be understood as a higher probability that the receiver will successfully receive the signaling message). This allows the mobile phone and the DNS server to successfully complete the DNS data transmission process. The mobile phone can then use the destination IP address corresponding to the web page or application that the user needs to log in to, obtained through this process, to proceed with the subsequent Internet access process and successfully access the Internet.
- the ninth message is a signaling message
- the signaling message may carry a message containing business data.
- the signaling message may be regarded as a data message. Therefore, the ninth message is not a signaling message in the strict sense mentioned in this application and does not necessarily need to be placed in the VO queue to be sent.
- the Wi-Fi driver of the mobile phone parses the ninth message and determines whether the ninth message is a signaling message of a preset protocol based on the parsing result.
- the ninth message may be placed in a VO queue for sending, ie, S912 is executed.
- the Wi-Fi driver of the mobile phone puts the ninth message into the VO queue.
- the Wi-Fi driver of the mobile phone puts the ninth message into a transmission queue other than the VO queue.
- the Wi-Fi driver of the mobile phone sends the ninth message to the TCP server through the Wi-Fi chip according to the preset queue message sending rule.
- the mobile phone and the TCP server can be considered to have established a TCP connection, and the Wi-Fi chip of the mobile phone can send the ninth message to the TCP server according to the TCP protocol.
- the mobile phone After the mobile phone sends the ninth message to the TCP server, it enters the ESTABLISHED state, which indicates that the client has received the SYN+ACK message (i.e., the TCP response message) sent by the server and sent an ACK message (i.e., the ninth message) as confirmation.
- the connection between the client and the server has been successfully established, and both parties can begin data transmission.
- the TCP server After receiving the ninth message from the mobile phone, the TCP server is also in the ESTABLISHED (connection established) state.
- the first message, the second message, the third message, the fourth message, the fifth message, the sixth message, the seventh message, the eighth message, and the ninth message generated by the mobile phone may all be referred to as first protocol messages to be sent.
- the router acting as an AP, the DHCP server, the router acting as a gateway, the DNS server, and the TCP server may be referred to as target devices.
- the embodiment of the present application further provides a data transmission device, which can be applied to an electronic device in a Wi-Fi network.
- the device can include a processing module and a sending module.
- the processing module is used to add the first protocol message to the first priority transmission queue when the first protocol message to be sent is a signaling message; the processing module is also used to add the first protocol message to the second priority transmission queue when the first protocol message is not a signaling message of the preset protocol; the second priority transmission queue is different from the first priority transmission queue; the preset protocol includes any one or more of the following: EAPOL, DHCP, ARP, DNS or TCP; the sending module is used to send the first protocol message to the target device through the Wi-Fi network according to the preset queue message sending rule; the preset queue message sending rule includes that the transmission priority of the first priority transmission queue is higher than the transmission priority of the second priority transmission queue.
- the cooperation between the processing module and the sending module can also enable the data transmission device to complete all the steps of the data transmission method provided in the aforementioned embodiment.
- each module performs operations has been described in detail in the embodiment of the data transmission method in the above embodiment, and will not be further elaborated here.
- the relevant beneficial effects thereof can also be referred to the relevant beneficial effects of the above data transmission method, and will not be repeated here.
- An embodiment of the present application further provides an electronic device comprising: a display screen, a memory, and one or more processors; the display screen, the memory, and the processors being coupled; wherein the memory stores computer program code, the computer program code comprising computer instructions, which, when executed by the processor, causes the electronic device to execute the frame loss fault determination method provided in the aforementioned embodiment.
- the specific structure of the electronic device can be referenced with reference to the electronic device structure shown in FIG3 .
- the present application also provides an electronic device comprising a TCP/IP protocol stack, a Wi-Fi driver, and a Wi-Fi chip.
- the Wi-Fi driver executes computer instructions
- the electronic device executes the data transmission method provided in the aforementioned embodiment.
- the TCP/IP protocol stack and the Wi-Fi driver may be software modules within an AP within a SOC within the electronic device.
- An embodiment of the present application further provides a computer-readable storage medium, which includes computer instructions.
- the computer instructions When the computer instructions are executed on an electronic device, the electronic device executes the data transmission method provided in the aforementioned embodiment.
- the present application also provides a chip system, as shown in FIG10 .
- the chip system 1000 includes at least one processor 1001, a memory, and at least one interface circuit 1002.
- the processor 1001 and the interface circuit 1002 can be interconnected via a line.
- the interface circuit 1002 can be used to receive signals from another device (e.g., a target device).
- the interface circuit 1002 can be used to send signals to another device (e.g., a target device).
- the interface circuit 1002 can read instructions or computer programs stored in the memory and send the instructions or computer programs to the processor 1001.
- the various steps of the data transmission method provided in the above embodiment can be implemented.
- the chip system can also include other discrete components, which are not specifically limited in the embodiments of the present application.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
La présente demande se rapporte au domaine technique des communications, et concerne un procédé de transmission de données, un dispositif électronique et un support de stockage, dans lesquels un message de signalisation important peut être envoyé de manière fiable, de façon à améliorer l'expérience d'un utilisateur à l'aide d'un dispositif électronique pour accéder à Internet au moyen d'un réseau Wi-Fi. Le procédé comprend les étapes suivantes : lorsqu'un premier message de protocole à envoyer est un message de signalisation d'un protocole prédéfini, un dispositif électronique ajoute le premier message de protocole à une première file d'attente de transmission prioritaire ; lorsque le premier message de protocole n'est pas un message de signalisation du protocole prédéfini, le dispositif électronique ajoute le premier message de protocole à une seconde file d'attente de transmission prioritaire, la seconde file d'attente de transmission prioritaire étant différente de la première file d'attente de transmission prioritaire, et le protocole prédéfini comprenant un ou plusieurs des éléments suivants : EAPOL, DHCP, ARP, DNS ou TCP ; et, selon une règle d'envoi de message de file d'attente prédéfinie, le dispositif électronique envoie le premier message de protocole à un dispositif cible au moyen d'un réseau Wi-Fi, la règle d'envoi de message de file d'attente prédéfinie comprenant la priorité de transmission de la première file d'attente de transmission prioritaire étant supérieure à la priorité de transmission de la seconde file d'attente de transmission prioritaire.
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN202410179000.6 | 2024-02-09 | ||
| CN202410179000.6A CN120512765A (zh) | 2024-02-09 | 2024-02-09 | 一种数据传输方法和装置、电子设备和存储介质 |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| WO2025168105A1 true WO2025168105A1 (fr) | 2025-08-14 |
Family
ID=96699241
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/CN2025/076449 Pending WO2025168105A1 (fr) | 2024-02-09 | 2025-02-08 | Procédé et appareil de transmission de données, dispositif électronique, et support de stockage |
Country Status (2)
| Country | Link |
|---|---|
| CN (1) | CN120512765A (fr) |
| WO (1) | WO2025168105A1 (fr) |
Citations (7)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20080318630A1 (en) * | 2007-06-25 | 2008-12-25 | Qualcomm Incorporated | Graceful coexistence for multiple communication protocols |
| CN108990115A (zh) * | 2018-07-16 | 2018-12-11 | 鼎桥通信技术有限公司 | 一种在集群通信系统多核心网组网下保证QoS的方法 |
| CN111131061A (zh) * | 2019-12-30 | 2020-05-08 | 中国联合网络通信集团有限公司 | 一种数据传输方法及网络设备 |
| CN111328148A (zh) * | 2020-03-11 | 2020-06-23 | 展讯通信(上海)有限公司 | 数据传输方法及装置 |
| CN114430591A (zh) * | 2020-10-14 | 2022-05-03 | 华为技术有限公司 | Wi-Fi芯片、Wi-Fi设备及队列调度方法 |
| CN114501532A (zh) * | 2020-10-28 | 2022-05-13 | 华为技术有限公司 | 一种业务报文发送方法及装置 |
| CN114979023A (zh) * | 2022-07-26 | 2022-08-30 | 浙江大华技术股份有限公司 | 一种数据传输方法、系统、电子设备及存储介质 |
-
2024
- 2024-02-09 CN CN202410179000.6A patent/CN120512765A/zh active Pending
-
2025
- 2025-02-08 WO PCT/CN2025/076449 patent/WO2025168105A1/fr active Pending
Patent Citations (7)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20080318630A1 (en) * | 2007-06-25 | 2008-12-25 | Qualcomm Incorporated | Graceful coexistence for multiple communication protocols |
| CN108990115A (zh) * | 2018-07-16 | 2018-12-11 | 鼎桥通信技术有限公司 | 一种在集群通信系统多核心网组网下保证QoS的方法 |
| CN111131061A (zh) * | 2019-12-30 | 2020-05-08 | 中国联合网络通信集团有限公司 | 一种数据传输方法及网络设备 |
| CN111328148A (zh) * | 2020-03-11 | 2020-06-23 | 展讯通信(上海)有限公司 | 数据传输方法及装置 |
| CN114430591A (zh) * | 2020-10-14 | 2022-05-03 | 华为技术有限公司 | Wi-Fi芯片、Wi-Fi设备及队列调度方法 |
| CN114501532A (zh) * | 2020-10-28 | 2022-05-13 | 华为技术有限公司 | 一种业务报文发送方法及装置 |
| CN114979023A (zh) * | 2022-07-26 | 2022-08-30 | 浙江大华技术股份有限公司 | 一种数据传输方法、系统、电子设备及存储介质 |
Also Published As
| Publication number | Publication date |
|---|---|
| CN120512765A (zh) | 2025-08-19 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| EP4007374B1 (fr) | Procédé et appareil de traitement d'informations, dispositif de communication et support d'enregistrement | |
| AU2014269271B2 (en) | Electronic device using logical channels for communication | |
| CN114697929B (zh) | 连接建立方法及电子设备 | |
| CN113014483B (zh) | 一种多路径传输的方法及设备 | |
| CN111447678B (zh) | 通信方法和通信装置 | |
| TWI836053B (zh) | 用於使用選擇性中繼來構造協定資料單元的系統和方法 | |
| WO2021104448A1 (fr) | Procédé de synchronisation d'informations de clé, système et dispositif | |
| AU2020470364B2 (en) | Method and apparatus for establishing secure communication | |
| CN113938880B (zh) | 一种应用的验证方法及装置 | |
| JP6149591B2 (ja) | 無線中継装置、通信システム、及び、通信方法 | |
| CN106714170A (zh) | 投影设备、用户终端和投影设备接入局域网的方法 | |
| US20220286731A1 (en) | Multimedia apparatus and cast method | |
| WO2023273464A1 (fr) | Procédé de transmission de données et dispositif électronique | |
| CN115529255A (zh) | 一种连接探测方法、客户端与服务器 | |
| WO2025168105A1 (fr) | Procédé et appareil de transmission de données, dispositif électronique, et support de stockage | |
| CN115696463B (zh) | 多终端联合会话管理方法、网络侧设备及终端 | |
| CN114095524B (zh) | 传输报文的方法和设备,中枢设备,可读存储介质 | |
| CN113891310B (zh) | 协作通信方法、用户设备及系统 | |
| WO2023124258A1 (fr) | Procédé et appareil d'accès à distance à une carte de module d'identité d'abonné (sim) | |
| CN117939406A (zh) | 组播通信方法及相关装置 | |
| CN119922042B (zh) | 数据传输方法、装置、介质、设备及产品 | |
| JP2014112370A (ja) | メッセージのルーティング方法 | |
| CN120434449A (zh) | 投屏方法及终端设备 | |
| WO2025025875A1 (fr) | Procédé et appareil d'établissement de connexion poste à poste wi-fi | |
| CN119835003A (zh) | IPSec流量触发方法、装置、电子设备及存储介质 |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| 121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 25751715 Country of ref document: EP Kind code of ref document: A1 |