Background
An AC (Access Controller) or Wireless Access Point Controller is a network device responsible for managing APs in a Wireless network in a certain area. The main functions include configuration issuing to different APs, configuration modification, radio frequency intelligent management, user access control and the like.
The city range of China is large, the occupied area is wide, and the overall network environment is complex. The network equipment of different manufacturers can be adopted due to various reasons, such as different construction time of the network, and the like, but communication between different manufacturers AC cannot be realized, and only communication between the manufacturers AC can be realized. For example, the CAPWAP protocol is adopted for roaming among Huache ACs, and the IACTP protocol is adopted for roaming among Huasan ACs. Communication between ACs using different protocols is not possible. Therefore, the user can only realize roaming in a limited area at present and can not realize cross-area roaming.
Disclosure of Invention
The invention aims to provide a method for realizing data sharing of wireless controllers of different manufacturers, which realizes roaming between two areas using different manufacturers AC and avoids excessive flooding of information in the roaming process.
In order to achieve the purpose, the invention provides the following technical scheme:
a method for realizing AC data sharing of different manufacturers is characterized by comprising a synchronization mechanism and a query mechanism,
the content of the synchronization mechanism is as follows: carrying out partition management on the AC according to manufacturers to form a plurality of sub-areas, wherein the AC from the same manufacturer is distributed in the sub-areas; sharing the user information of the sub-area where the mobile terminal is currently located with the user information of the sub-area adjacent to the mobile terminal, and shielding the user information of the sub-area where the mobile terminal is currently located with the user information of the sub-area not adjacent to the mobile terminal;
the contents of the query mechanism are as follows: when the mobile terminal is on line, firstly, sending a broadcast packet to the AC in the current subregion to request user information; if the current sub-area does not feed back the corresponding user information, the mobile terminal further requests the user information from the adjacent sub-area; if the adjacent sub-areas still do not feed back the corresponding user information, the mobile terminal is used as a new user to be on-line after user authentication, and the user information is stored; and if any one of the current sub-area and the adjacent sub-area feeds back the corresponding user information, the mobile terminal is directly on line.
Further, the user information sharing is realized by the following steps: at least one shared AC is arranged in each sub-region, and two adjacent sub-regions are respectively connected through a protocol converter to form a communication bridge for connecting the adjacent sub-regions; and the current sub-area actively sends a data packet with user information to the adjacent sub-area to realize user information sharing.
Further, the user information shielding is realized by the following steps: writing a label corresponding to a sub-area where the mobile terminal is currently located in the data packet; before user information sharing, whether the shared AC is in a sub-region corresponding to the label is verified, if the verification result is yes, a data packet is sent, otherwise, the data packet is not sent, and user information shielding of non-adjacent sub-regions is achieved.
Further, the active sending time of the data packet is the idle time of the AC operation.
Further, the idle time is 3 am each day.
Compared with the prior art, the invention has the beneficial effects that: according to the invention, the AC is partitioned according to manufacturers, and two sharing ACs are connected between adjacent subareas through the protocol converter to be responsible for communication of the adjacent subareas, so that centralized sharing of user information data between the subareas is realized; on the other hand, the invention also shields the information of non-adjacent sub-areas, thereby preventing the data flooding caused by excessive network data.
Detailed Description
The technical solutions in the embodiments of the present invention are clearly and completely described below, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
FIG. 1 shows an AC profile of an embodiment; where ACij represents the AC produced by vendor i and j represents the ordinal number of the AC in the region. In this embodiment, the ACs of the same manufacturer use the same communication protocol, and can communicate with each other to realize data sharing. However, it is possible that other manufacturers may use another protocol for the AC, and two ACs using different protocols cannot communicate with each other, so that data sharing cannot be achieved. It should be noted that in the figure, the area where the manufacturer 1 is located may have the AC of another manufacturer, or the area where the ACs produced by two manufacturers intersect, and this is omitted here for convenience of explanation. For example, in the case of the manufacturer 1, when the user is first on-line in the area via the AC14, the user needs to perform user authentication first and then on-line. Meanwhile, the AC14 shares the user information to the AC produced by the same manufacturer in the adjacent area, and when the user moves in the area, the user can directly surf the internet through other ACs sharing the user information, so that the step of user authentication is omitted, repeated login verification is not needed, and seamless roaming is realized; the same applies to the other vendors (i.e., vendor 2 through vendor 9). However, in the prior art, after the user moves out of the area, the user needs to go online through the AC of another manufacturer, for example, the area where the AC produced by the manufacturer 1 is located moves to the area where the AC produced by the manufacturer 2 is located, and the manufacturer 2 does not enjoy the corresponding user information, so that login verification needs to be performed again, and a short network terminal is accompanied in the process, which brings a very bad experience to some users who use APP with a high requirement on smooth network.
The embodiment provides a method for realizing the sharing of AC data of different manufacturers, which is characterized by comprising a synchronization mechanism and a query mechanism,
the content of the synchronization mechanism is as follows: referring to fig. 1, the AC is partitioned and managed by the manufacturer to form a plurality of sub-regions, for example, the region where the AC produced by the manufacturer 1 is located is denoted as sub-region 1, and the same applies to sub-regions 2 to 9. The home sub-area is distributed with ACs from the same manufacturer. When the mobile terminal of the user is on line in the area through any AC in the sub-area, the user authentication is only needed to be carried out when the user is on line for the first time, and then the user is on line. And simultaneously, the AC can share the user information to other ACs in the subarea, so that the user can directly connect to the internet without user authentication when the user is at any position in the subarea. If the mobile terminal is first on-line with the AC44 in the corresponding sub-area 4, the user authentication is performed first and then on-line, and all the ACs (AC 41-AC 49) in the area share the user information, so that the user authentication step can be omitted and the direct on-line can be avoided no matter the mobile terminal moves to any position in the area, and the network interruption can be avoided.
Sharing user information of the sub-area where the mobile terminal is located and the adjacent sub-area, specifically: at least one shared AC is arranged in each sub-region, and two adjacent sub-regions are respectively connected through a protocol converter to form a communication bridge for connecting the adjacent sub-regions; and the current sub-area actively sends a data packet with user information to the adjacent sub-area to realize user information sharing. As shown in fig. 2, AC42, AC46, and AC48 in sub-region 4 are shared ACs, corresponding to sub-region 1, sub-region 5, and sub-region 7, respectively. Similarly, AC52, AC54, AC56, and AC58 in the sub-region 5 are shared ACs, corresponding to the sub-region 2, the sub-region 4, the sub-region 6, and the sub-region 8, respectively; two corresponding shared ACs in adjacent sub-regions are connected via a protocol converter, such as AC46 and AC54, to form the communication bridge. The AC46 can pack the user information into data packets and send the data packets to the AC54, and the user information is shared by the AC54 in the corresponding sub-area 5, so that the user information sharing from the sub-area 4 to the sub-area 5 is realized. And after the user information is shared. When the mobile terminal moves from the subarea 4 to the subarea 5, the mobile terminal can be directly on-line, so that the step of user authentication is omitted, and the network terminal is avoided in the process that the user terminal is connected with the AC across manufacturers. The information of any other two adjacent sub-regions share the same principle. The time for the shared AC to transmit the data packet is the idle time of the AC operation, such as 3 am every day, or the time specified by other users.
If all sub-areas share the user information, after the user comes online from any one AC, the user information is synchronously shared on all the ACs, which may cause excessive network data, information flooding, and influence on normal work due to multiple AC loads. Therefore, the user information shielding of the sub-area where the mobile terminal is currently located and the sub-area not adjacent to the current sub-area is specifically as follows: writing a label corresponding to a sub-area where the mobile terminal is currently located in a data packet sent by the shared AC; before user information sharing, whether the shared AC is in a sub-region corresponding to the label is verified, if the verification result is yes, a data packet is sent, otherwise, the data packet is not sent, and user information shielding of non-adjacent sub-regions is achieved. If the mobile terminal is still within the sub-area 4, such as when the AC46 sends a data packet to the AC54, the data packet contains a tag corresponding to the sub-area 4. When the shared AC52 in the sub-area 5 wants to send the user information to the sub-area 2, it is verified that the shared AC52 itself is not in the sub-area 4 corresponding to the tag, and therefore the data packet corresponding to the user information is no longer sent to the sub-area 2; after the mobile terminal moves from the sub-area 4 to the sub-area 5, the tag corresponding to the sub-area 5 is written into the data packet corresponding to the user information, the shared AC52 verifies that the shared AC52 is in the sub-area 5 corresponding to the tag, and sends the data packet corresponding to the user information to the sub-area 2, so that sharing is achieved, and the shared AC56 and the shared AC58 are the same. It should be noted that the tag written in the data packet is not deleted, and all the sub-areas traversed by the mobile terminal can be known through the tag. The user information shielding is equivalent to adding a layer of limitation while sharing, and only one layer of limitation is spread outwards on a path moved by the user terminal, so that the information flooding is prevented.
The contents of the query mechanism are as follows: when the mobile terminal is on line, firstly, sending a broadcast packet to the AC in the current subregion to request user information; if the current sub-area does not feed back the corresponding user information, the mobile terminal further requests the user information from the adjacent sub-area; if the adjacent sub-areas still do not feed back the corresponding user information, the mobile terminal is used as a new user to be on-line after user authentication, and the user information is stored; and if any one of the current sub-area and the adjacent sub-area feeds back the corresponding user information, the mobile terminal is directly on line. Such as: the mobile terminal of the user logs in from the subarea 4 at 9, 12 arrives at the subarea 5, and the updating time is set to be 3 in the morning, so that even if the subarea 4 takes the user information, the subarea 5 cannot obtain the user information, at this time, the AC (such as AC52, AC54, AC56 and AC 56) of the subarea 5 which is responsible for sharing the information sends a request message to the surroundings, the AC54 requests the AC46, and the AC46 feeds back a corresponding data packet containing the user information, so that the subarea 5 can also obtain the user information, and the mobile terminal can directly surf the internet in the subarea 5. If the feedback of the user information is not obtained, the user information is used as a new user login verification, the user information is stored locally, and the user information is shared with the adjacent sub-area at regular time. Therefore, the mobile terminal can roam among different sub-areas and the ACs of different manufacturers, so that the whole area (such as a city) is connected with the network, and the data flooding is prevented.
It will be evident to those skilled in the art that the invention is not limited to the details of the foregoing illustrative embodiments, and that the present invention may be embodied in other specific forms without departing from the spirit or essential attributes thereof. The present embodiments are therefore to be considered in all respects as illustrative and not restrictive, the scope of the invention being indicated by the appended claims rather than by the foregoing description, and all changes which come within the meaning and range of equivalency of the claims are therefore intended to be embraced therein.