CN114205843B - Control method, device and equipment for association of wireless terminal and virtual access point - Google Patents

Control method, device and equipment for association of wireless terminal and virtual access point Download PDF

Info

Publication number
CN114205843B
CN114205843B CN202111302185.8A CN202111302185A CN114205843B CN 114205843 B CN114205843 B CN 114205843B CN 202111302185 A CN202111302185 A CN 202111302185A CN 114205843 B CN114205843 B CN 114205843B
Authority
CN
China
Prior art keywords
access point
wireless terminal
virtual access
wireless
service set
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202111302185.8A
Other languages
Chinese (zh)
Other versions
CN114205843A (en
Inventor
李晓华
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ruijie Networks Co Ltd
Original Assignee
Ruijie Networks Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ruijie Networks Co Ltd filed Critical Ruijie Networks Co Ltd
Priority to CN202111302185.8A priority Critical patent/CN114205843B/en
Publication of CN114205843A publication Critical patent/CN114205843A/en
Application granted granted Critical
Publication of CN114205843B publication Critical patent/CN114205843B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W24/00Supervisory, monitoring or testing arrangements
    • H04W24/02Arrangements for optimising operational condition
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/60Context-dependent security
    • H04W12/69Identity-dependent
    • H04W12/73Access point logical identity
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The embodiment of the application provides a control method, a device and equipment for associating a wireless terminal with a virtual access point, wherein the method comprises the following steps: and aiming at the first virtual access point with the created signal transmitting power smaller than the configuration value and the service set identifier as the target service set identifier, after the wireless terminal is associated with the first virtual access point, setting the signal transmitting power of the first virtual access point as the configuration value, prohibiting other wireless terminals except the wireless terminal from being associated with the first virtual access point, creating a second virtual access point with the signal transmitting power smaller than the configuration value and the service set identifier as the target service set identifier, wherein the second virtual access point is used for associating other wireless terminals except the target wireless terminal, and the target wireless terminal refers to the wireless terminal associated with any virtual access point with the service set identifier created by the wireless access point as the target service set identifier. The method can reduce the probability that the wireless terminal needs to start scanning to roam to other APs, thereby reducing the packet loss of the wireless terminal.

Description

Control method, device and equipment for association of wireless terminal and virtual access point
Technical Field
The present invention relates to the field of wireless local area networks, and in particular, to a method, an apparatus, and a device for controlling association between a wireless terminal and a virtual access point.
Background
Wireless local area networks (Wireless Local Area Network, WLANs) are network systems that employ wireless communication technologies to interconnect computer devices to form a network system that can communicate with each other and realize resource sharing, and wireless terminals (STAs) can Access the WLAN through wireless Access Points (APs).
In the prior art, when service set identifiers (Service Set Identifier, SSID) of a plurality of APs are the same and coverage areas overlap, a wireless terminal can wirelessly roam between the plurality of APs. Specifically, when the wireless terminal determines that the signal strength of its associated AP (e.g., AP 1) is weak, it searches for the wireless network again (the process of searching for the wireless network is referred to as scanning), and when it searches for an AP (e.g., AP 2) with a strong signal strength, it can roam from AP1 to AP2. In general, due to reasons of signal interference, unstable signal transmitting power and the like, fluctuation of signal intensity of the same AP received by the wireless terminal at the same position may occur, the fluctuation of signal intensity is likely to cause frequent roaming of the wireless terminal, and a large probability of scanning performed by roaming of the wireless terminal may cause a small amount of packet loss, so that frequent roaming of the wireless terminal may cause a problem that the packet loss of the wireless terminal is large.
Disclosure of Invention
The embodiment of the application provides a control method, a device and equipment for associating a wireless terminal with a virtual access point, which are used for solving the problem of more packet loss of the wireless terminal due to frequent roaming of the wireless terminal in the prior art.
In a first aspect, an embodiment of the present application provides a control method for associating a wireless terminal with a virtual access point, where the control method is applied to the wireless access point, and includes:
aiming at a first virtual access point with the created signal transmitting power smaller than a configuration value and the service set identification as a target service set identification, after the first virtual access point is associated with a wireless terminal, setting the signal transmitting power of the first virtual access point as the configuration value, and prohibiting other wireless terminals except the wireless terminal from being associated with the first virtual access point;
after the first virtual access point is associated with a wireless terminal, a second virtual access point with signal transmitting power smaller than the configuration value and the service set identification being the target service set identification is created; the second virtual access point is used for associating other wireless terminals except for a target wireless terminal, and the target wireless terminal refers to a wireless terminal associated with any virtual access point of which the service set identifier created by the wireless access point is the target service set identifier.
Optionally, the prohibiting the other wireless terminals except the wireless terminal from accessing the first virtual access point includes: setting a state of the first virtual access point broadcasting a beacon frame to be non-broadcast; and/or the first virtual access point does not answer the detection request message which is sent by other wireless terminals except the wireless terminal and used for detecting the target service set identifier.
Optionally, before the first virtual access point is associated with a wireless terminal, the method further comprises:
receiving a detection request message sent by a first wireless terminal and used for detecting the target service set identifier;
when the service set identifier created by the first wireless terminal and the wireless access point is not associated with any virtual access point identified by the target service set identifier, judging whether the first wireless terminal belongs to a forbidden response range of the first virtual access point;
if not, the first virtual access point returns a corresponding detection response message to the first wireless terminal.
Optionally, the method further comprises: and if the first wireless terminal belongs to the forbidden response range of the first virtual access point, the first virtual access point does not respond to the detection request message sent by the first wireless terminal.
Optionally, the forbidden response range is configured by the wireless controller according to the requirement.
Optionally, after the setting the signal transmission power of the first virtual access point to the configuration value and prohibiting other wireless terminals except the wireless terminal from associating with the first virtual access point, the method further includes: and deleting the first virtual access point after the wireless terminal associated with the first virtual access point does not exist.
Optionally, after the creating the second virtual access point whose signal transmission power is smaller than the configuration value and whose service set is identified as the target service set, the method further includes:
receiving parameter information of a third virtual access point associated with a second wireless terminal issued by a wireless controller, wherein the third virtual access point is a virtual access point of which a service set identifier created by other wireless access points is the target service set identifier;
and correspondingly setting the parameter information into the second virtual access point so as to switch the virtual access point associated with the second wireless terminal from the third virtual access point to the second virtual access point.
In a second aspect, an embodiment of the present application provides a control device for associating a wireless terminal with a virtual access point, where the control device is applied to the wireless access point, including:
The control module is used for setting the signal transmission power of the first virtual access point to the configuration value and prohibiting other wireless terminals except the wireless terminal from being associated with the first virtual access point after the wireless terminal is associated with the first virtual access point aiming at the first virtual access point which is created and has the signal transmission power smaller than the configuration value and the service set identifier is the target service set identifier;
the creating module is used for creating a second virtual access point with signal transmitting power smaller than the configuration value and the service set identification being the target service set identification after the first virtual access point is associated with the wireless terminal; the second virtual access point is used for associating other wireless terminals except for a target wireless terminal, and the target wireless terminal refers to a wireless terminal associated with any virtual access point of which the service set identifier created by the wireless access point is the target service set identifier.
In a third aspect, embodiments of the present application provide a wireless access point, including: a memory and a processor;
the memory is used for storing a computer program;
the processor, coupled to the memory, is configured to execute the computer program for:
Aiming at a first virtual access point with the created signal transmitting power smaller than a configuration value and the service set identification as a target service set identification, after the first virtual access point is associated with a wireless terminal, setting the signal transmitting power of the first virtual access point as the configuration value, and prohibiting other wireless terminals except the wireless terminal from being associated with the first virtual access point;
after the first virtual access point is associated with a wireless terminal, a second virtual access point with signal transmitting power smaller than the configuration value and the service set identification being the target service set identification is created; the second virtual access point is used for associating other wireless terminals except for a target wireless terminal, and the target wireless terminal refers to a wireless terminal associated with any virtual access point of which the service set identifier created by the wireless access point is the target service set identifier.
In a fourth aspect, embodiments of the present application provide a computer-readable storage medium storing a computer program which, when executed by a processor, causes the processor to implement the steps of the method of any one of the first aspects.
Embodiments of the present application also provide a computer program for implementing the method according to any of the first aspects when the computer program is executed by a computer.
In the embodiment of the application, the AP creates the VAP with the signal transmitting power lower than the configuration value, and is used for the wireless terminal to associate with the VAP, after the created VAP is associated with the wireless terminal, the signal transmitting power of the VAP is increased, so that after the wireless terminal is associated with the AP, the signal transmitting power of the associated AP of the wireless terminal is increased, and the signal intensity of the associated AP received by the wireless terminal fluctuates, but the probability that the wireless terminal frequently detects that the signal intensity of the associated AP is weaker is reduced due to the increase of the signal transmitting power of the associated AP, thereby improving the stability of the association state after the wireless terminal roams, reducing the probability that the wireless terminal needs to start scanning to roam to other APs, and reducing the packet loss quantity of the wireless terminal.
Drawings
The accompanying drawings, which are included to provide a further understanding of the application and are incorporated in and constitute a part of this application, illustrate embodiments of the application and together with the description serve to explain the application and do not constitute an undue limitation to the application. In the drawings:
fig. 1 is a schematic diagram of signal coverage of a single AP in the prior art;
fig. 2 is a schematic diagram of signal coverage of a plurality of APs in the prior art;
Fig. 3 is a flow chart of a control method for associating a wireless terminal with a virtual access point according to an embodiment of the present application;
FIGS. 4A-4C are schematic diagrams illustrating providing signal coverage according to embodiments of the present application;
fig. 5 is a schematic structural diagram of a control device associated with a virtual access point by a wireless terminal according to an embodiment of the present application;
fig. 6 is a schematic structural diagram of a wireless access point according to an embodiment of the present application.
Detailed Description
For the purposes, technical solutions and advantages of the present application, the technical solutions of the present application will be clearly and completely described below with reference to specific embodiments of the present application and corresponding drawings. It will be apparent that the described embodiments are only some, but not all, of the embodiments of the present application. All other embodiments, which can be made by one of ordinary skill in the art without undue burden from the present disclosure, are within the scope of the present disclosure.
In order to facilitate understanding of the technical solutions provided by the embodiments of the present application by those skilled in the art, a technical environment in which the technical solutions are implemented is described below.
In the prior art, an AP may create a virtual access point (Virtual Access Point, VAP) and release a wireless signal of the created VAP, the VAP may announce its SSID to the outside through the wireless signal, and a wireless terminal (e.g., a cell phone, a tablet computer, etc.) may select a corresponding VAP to associate according to the SSID of the VAP, and access the WLAN. The signal coverage of a single VAP created by a single AP may be as shown in fig. 1, and the wireless terminal 1 (i.e., STA 1) and the wireless terminal 2 (i.e., STA 2) in the signal coverage of fig. 1 may be associated with any one VAP created by the single AP, to implement association with the single AP.
When the number of APs in the WLAN is plural, signal coverage of the plural APs may overlap, and if the SSID of the plural APs is the same, a wireless terminal in the overlapping area may roam between the APs. For example, in fig. 2, the coverage corresponding to the AP21 may represent the signal coverage of one VAP created by the AP21, the coverage corresponding to the AP22 may represent the signal coverage of one VAP created by the AP22, the coverage corresponding to the AP23 may represent the signal coverage of one VAP created by the AP23, and the areas 1 to 4 are overlapping areas of the signal coverage of multiple APs, where the wireless terminal may roam between the AP21 and the AP23 when the wireless terminal is located in the area 3.
The signal coverage of the VAP may be determined by the signal transmission power of the VAP, the AP may release the wireless signal of the VAP by using the signal transmission power of the VAP, and the signal transmission power of the VAP may be configured by the user through the management interface.
In general, the signal transmission power of the VAP is fixed to a configuration value, for example, it is assumed that the configuration value of the signal transmission power of the VAP is-20 db, and the ap is a wireless signal releasing the VAP with-20 db as the signal transmission power. Although the signal transmission power of the wireless signal of the VAP released by the AP is fixed, due to signal interference, unstable signal transmission power and the like, there may occur fluctuations in signal strength of the same AP received by the wireless terminal at the same location, and roaming of the terminal may be triggered by the wireless terminal receiving weaker signal strength of its associated AP, so that the fluctuations in signal strength are likely to occur that the signal strength of the associated AP frequently detected by the wireless terminal is weaker, resulting in frequent roaming of the wireless terminal.
Because the scanning can be started in the roaming process of the wireless terminal, the scanning needs the wireless terminal to switch different channels, and therefore, the scanning probability of the wireless terminal in roaming can cause a small amount of packet loss, and the problem of more packet loss of the wireless terminal caused by frequent roaming of the wireless terminal exists in the prior art.
In order to solve the technical problem that wireless terminals frequently roam and cause more packet loss of the wireless terminals, in the embodiment of the application, the AP creates a VAP with signal transmitting power lower than a configuration value for the wireless terminals to associate with, after the created VAP is associated with the wireless terminals, the signal transmitting power of the VAP is increased, after the wireless terminals are associated with the APs, the signal transmitting power of the associated APs of the wireless terminals is increased, so that although the signal intensity of the associated APs received by the wireless terminals fluctuates, the probability that the wireless terminals frequently detect the weaker signal intensity of the associated APs can be reduced, and therefore the stability of association states after the wireless terminals roam can be improved, the probability that the wireless terminals need to start scanning to roam to other APs is reduced, and the packet loss amount of the wireless terminals is reduced.
The following describes in detail the technical solutions provided by the embodiments of the present application with reference to the accompanying drawings.
Fig. 3 is a flow chart of a control method for associating a wireless terminal with a virtual access point according to an embodiment of the present application, where the method provided by the embodiment may be applied to a wireless access point, as shown in fig. 3, and the method of the embodiment may include:
step 31, for a first virtual access point (first VAP) whose signal transmission power is smaller than a configuration value and whose service set identifier is a target service set identifier, after the first virtual access point is associated with a wireless terminal, setting the signal transmission power of the first virtual access point to the configuration value, and prohibiting other wireless terminals except the wireless terminal from associating with the first virtual access point;
step 32, after the first virtual access point is associated with a wireless terminal, creating a second virtual access point (second VAP) whose signal transmission power is smaller than the configuration value and whose service set identifier is the target service set identifier; the second virtual access point is used for associating other wireless terminals except for a target wireless terminal, and the target wireless terminal refers to a wireless terminal associated with any virtual access point of which the service set identifier created by the wireless access point is the target service set identifier.
The first VAP may be any VAP that the signal transmitting power created by the wireless access point is smaller than the configuration value and the SSID is a target SSID. It should be noted that, setting the signal transmission power of the first VAP to a value smaller than the configuration value may be performed during the process of creating the first VAP, or may be performed after the first VAP is created; setting the SSID of the first VAP to the target SSID may be performed during or after the first VAP is created.
Before the first VAP is associated with the wireless terminal, the signal transmission power of the first VAP is smaller than the configuration value, and the SSID of the first VAP is a target SSID; after the first VAP is associated with the wireless terminal, the SSID of the first VAP may also be the target SSID, but the signal transmission power of the first VAP is modified to a configuration value by performing step 31. That is, before the first VAP associates with the wireless terminal, the SSID of the first VAP may be unchanged, but the signal transmission power of the wireless signal of the first VAP is increased, so that the signal transmission power of the associated AP (i.e., the wireless access point) of the wireless terminal associated with the first VAP is increased.
It should be understood that, before the first VAP is associated with the wireless terminal, the closer the signal transmission power of the first VAP is set to the configuration value, the larger the signal coverage of the first VAP when the wireless terminal is not associated with the first VAP, and the greater the probability that the signal strength of the first VAP received by the wireless terminal is weaker due to signal fluctuation after the wireless terminal associates the first VAP; the further away from the configuration value the signal transmission power of the first VAP is set before the first VAP is associated with the wireless terminal, the smaller the signal coverage of the first VAP when the wireless terminal is not associated with the first VAP, and the lower the probability that the signal strength of the first VAP received by the wireless terminal is weaker due to signal fluctuation after the wireless terminal is associated with the first VAP. Thus, the signal coverage size of the first VAP when the wireless terminal is not associated with the signal, and the probability size that the signal strength of the first VAP received by the wireless terminal is weaker due to signal fluctuations may be both compromised to account for the signal transmit power of the first VAP created.
In this embodiment of the present application, one VAP created by the AP and having a signal transmission power smaller than the configuration value and an SSID being the target SSID may be used to associate with one wireless terminal, so after the first VAP is associated with the wireless terminal, other wireless terminals except the wireless terminal associated with the first VAP may be prohibited from associating with the first VAP, and another VAP (i.e., the second VAP) having a signal transmission power smaller than the configuration value and an SSID being the target SSID is created. The second virtual access point is used for associating other wireless terminals except for the target wireless terminal, and the target wireless terminal refers to a wireless terminal associated with any VAP with the SSID created by the wireless access point as a target SSID.
The BSSID of the second VAP is different from that of the first VAP because the basic service set identifiers (Basic Service Set Identifier, BSSID) of the plurality of VAPs having the same SSID created by the wireless access point are different.
For example, assuming that the first transmission power created after the wireless access point is started is smaller than the configuration value and the VAP with the SSID being the target SSID is VAP1, for VAP1, after the wireless terminal is associated with VAP1, the signal transmission power of VAP1 may be set to the configuration value, other wireless terminals than VAP1 are prohibited from being associated with VAP1, and VAP2 with the signal transmission power smaller than the configuration value and the SSID being the target SSID is created, and VAP2 may be used for other wireless terminals than the wireless terminal associated with VAP1 to be associated, where VAP1 may be understood as a first VAP and VAP2 may be understood as a second VAP; then, for VAP2 created by the AP, after the VAP2 is associated with the wireless terminal, the signal transmission power of the VAP2 may be set to the configuration value, other wireless terminals except for the VAP2 are prohibited from being associated with the VAP2, and VAP3 with the signal transmission power smaller than the configuration value and the SSID being the target SSID is created, and the VAP3 may be used for association between the wireless terminal associated with the VAP1 and other wireless terminals except for the wireless terminal associated with the VAP2, where the VAP2 may be understood as a first VAP and the VAP3 may be understood as a second VAP.
In practical applications, since the number of VAPs that can be supported by the radio frequency port of the wireless access point is generally limited, the signal transmission power that can be created by the wireless access point is smaller than the configuration value, and the number of virtual access points whose SSID is the target SSID is also limited, in order to avoid an abnormality caused by the creation of the virtual access point that continues to execute the target SSID when the number of virtual access points whose SSID is the target SSID that is already present in the wireless access point has reached the maximum, before the second virtual access point is created, it may be determined whether the number of virtual access points whose SSID is the target SSID that is already present reaches the number threshold, if not, the second virtual access point may be created, and if so, the second virtual access point may not be created.
The specific manner of prohibiting the wireless terminals other than the wireless terminal from associating with the first VAP may correspond to the manner in which the first VAP allows the wireless terminal to associate with the first VAP before the first VAP associates with the wireless terminal.
For example, when the state of the first VAP broadcast beacon frame is broadcast before the first VAP is associated with the wireless terminal, the prohibiting the wireless terminal other than the wireless terminal from accessing the first VAP may specifically include: the status of the first VAP broadcast beacon frame is set to non-broadcast. That is, the first VAP may broadcast a beacon (beacon) frame before the first VAP is associated with the wireless terminal, and the first VAP may not broadcast the beacon frame after the first VAP is associated with the wireless terminal. So that the wireless terminal can be prevented from perceiving the presence of the signal of the first VAP through the beacon frame.
And/or, when the first VAP supports the response of the Probe Request (Probe Request) message before the first VAP is associated with the wireless terminal, the prohibiting the other wireless terminals except the wireless terminal from accessing the first VAP may specifically include: the first VAP does not answer the detection request message for detecting the target SSID, which is sent by other wireless terminals except the wireless terminal. That is, before the first VAP is associated with the wireless terminal, the first VAP may answer a probe request message for a target SSID sent by any wireless terminal; after the first VAP is associated with the wireless terminal, the first VAP may not answer to a probe request message for probing the target SSID sent by other wireless terminals except the wireless terminal. So that other wireless terminals can be prevented from scanning for wireless signals accessing the first VAP.
After the first VAP is associated with the wireless terminal, the first VAP may respond to the probe request message for probing the target SSID sent by the wireless terminal associated with the first VAP, but not respond to other VAPs having the created SSID as the target SSID, so as to avoid the wireless terminal switching between different VAPs having the SSID created by the same AP as the target SSID. That is, after receiving a probe request message for probing a target SSID sent by a wireless terminal, if the wireless terminal is associated with a VAP that is created by the AP and has an SSID that is a target SSID, the AP may answer the probe request message for probing the target SSID by the wireless terminal with the VAP; if the wireless terminal is not associated with any VAP with the SSID being the target SSID created by the AP, the detection request message of the wireless terminal for detecting the target SSID can be responded by the VAP with the signal transmitting power of the wireless terminal not associated with the VAP being smaller than the configuration value and with the SSID being the target SSID.
It should be understood that if a plurality of APs in the WLAN each perform the method provided in the embodiments of the present application, at the same time, each AP in the plurality of APs may create a VAP with a signal transmission power less than the configuration value and an SSID that is the target SSID. Assuming that the number of APs is 3, and that the 3 APs are the AP41, the AP42, and the AP43, respectively, at a certain time, the signal coverage area of each of the VAP (hereinafter referred to as VAPa) in which the signal transmission power created by the AP41 is smaller than the configuration value and the SSID is the target SSID, the VAP (hereinafter referred to as VAPb) in which the signal transmission power created by the AP42 is smaller than the configuration value and the SSID is the target SSID, and the VAP (hereinafter referred to as VAPc) in which the signal transmission power created by the AP43 is smaller than the configuration value and the SSID is the target SSID may be as shown in fig. 4A. In fig. 4A, since the signal transmission power of the VAP is smaller than the configuration value, the signal coverage is smaller, the signal strength of the AP detected by the wireless terminal is also weaker, and the areas 1 to 4 are overlapping areas.
On the basis of fig. 4A, assuming that a wireless terminal uses a target SSID to associate with VAPa, after association, the signal coverage that can be perceived by the wireless terminal may be as shown in fig. 4B. In fig. 4B, since VAPa is changed from an unassociated wireless terminal to an associated wireless terminal, the signal transmission power of VAPa is set to a configuration value from less than the configuration value, so that the wireless terminal can sense a signal coverage of VAPa that is greater than that of VAPb and VAPc. After the VAPa is associated with the wireless terminal, the AP41 may create a VAP (hereinafter referred to as VAPd) having a signal transmission power smaller than the configuration value and an SSID of a target SSID.
On the basis of fig. 4B, assuming that the wireless terminal moves from AP41 to AP42 and enters an overlapping area (e.g., area 1), since the signal transmission power of VAPa is higher than that of VAPb, the wireless terminal may roam to AP42 from AP41 when the overlapping area is closer to AP42, and after roaming to AP42, the signal coverage that the wireless terminal can perceive may be as shown in fig. 4C. In fig. 4C, since VAPb is changed from an unassociated wireless terminal to an associated wireless terminal, the signal transmission power of VAPb is set to a configuration value from less than the configuration value, so that the wireless terminal can sense a signal coverage of VAPb greater than that of VAPd and VAPc. After the VAPb is associated with the wireless terminal, the AP42 may recreate a VAP with a signal transmission power less than the configuration value and an SSID that is the target SSID.
It should be noted that, assuming that the position of the wireless terminal from the AP41 to the AP42 is the position x by associating with and disassociating from the VAPb, if the difference between the signal strength of the VAPb detected at the position x before the wireless terminal roams to the AP42 and the signal strength of the VAPb detected at the position x after the wireless terminal roams to the AP42 is higher than the fluctuation value of the signal strength, the wireless terminal may not roam any more at the position x, so that the wireless terminal may be in a stable association state after roaming, thereby improving the stability of the association state after roaming of the wireless terminal, and delaying the roaming handover of the wireless terminal.
According to the method provided by the embodiment, after the wireless terminal is associated with the AP, the signal transmission power of the first VAP is set to be the configuration value, other wireless terminals except the wireless terminal are forbidden to be associated with the first VAP, and the second VAP with the signal transmission power smaller than the configuration value and the SSID being the target SSID is created, so that the VAP with the signal transmission power lower than the configuration value is created by the AP and is used for the wireless terminal to associate with the wireless terminal, after the created VAP is associated with the wireless terminal, the signal transmission power of the VAP is increased, and therefore the signal transmission power of the associated AP of the wireless terminal is increased after the wireless terminal is associated with the AP, and the signal intensity of the associated AP received by the wireless terminal fluctuates, but the probability that the wireless terminal frequently detects the weaker signal intensity of the associated AP is increased can be reduced, the stability of the association state after the wireless terminal roams can be improved, the probability that the wireless terminal needs to start to scan to other APs is reduced, and the packet loss of the wireless terminal is reduced.
In the foregoing embodiment, optionally, before the first VAP associates with the wireless terminal, for any wireless terminal that is not associated with any virtual access point having the SSID created by the wireless access point as the target SSID, the first VAP may respond to a probe request packet sent by the wireless terminal for probing the target SSID.
Or alternatively, before the first VAP is associated with the wireless terminal, the first VAP may also select whether to answer a probe request message for a target SSID sent by a certain wireless terminal, so as to implement roaming guidance for the wireless terminal. For example, in fig. 4B, assuming that the wireless terminal associated with VAPa moves from AP41 to AP42, and enters an overlapping area (e.g., area 2), if the load of AP42 is higher than that of AP43, the VAPb of AP42 may be controlled not to answer the probe request message of the wireless terminal, so that the wireless terminal may be guided to roam into AP43, and accurate guidance of the wireless terminal may be achieved.
Based on this, before the first VAP is associated with the wireless terminal, the foregoing method may further include: receiving a detection request message which is sent by a first wireless terminal and used for detecting a target SSID; when the SSID created by the first wireless terminal and the AP is not associated with any virtual access point with the target SSID, judging whether the first wireless terminal belongs to a forbidden response range of the first VAP; if not, the first VAP returns a corresponding detection response message to the first wireless terminal. The forbidden response range may be set according to needs, and in one embodiment, the wireless local area network may further include a wireless controller for controlling the AP, where the forbidden response range may be configured by the wireless controller according to needs, for example, the wireless controller may be configured according to needs of load balancing of different APs. It should be appreciated that the configuration of the forbidden response range can be flexibly adjusted according to real-time requirements.
Further, the method may further include: if the first wireless terminal belongs to the forbidden response range of the first VAP, the first VAP does not respond to a detection request message sent by the first wireless terminal and used for detecting the target SSID, so that the first VAP can be forbidden to be associated with the first wireless terminal.
Optionally, on the basis of the foregoing embodiment, after setting the signal transmission power of the first VAP to a configuration value and prohibiting other wireless terminals than the wireless terminal from associating the first VAP, the method may further include: the first VAP is deleted after there is no wireless terminal associated with the first VAP. For example, in a scenario where the VAP associated with the wireless terminal is changed from the VAPa created by the AP41 to the VAPb created by the AP42 in fig. 4C, the AP41 may delete the VAPa after the wireless terminal is disassociated from the VAPa. By deleting the first VAP after the wireless terminal associated with the first VAP does not exist, the recovery of the resources occupied by the first VAP can be realized, and the resource utilization rate is improved.
Optionally, after creating the second VAP with the signal transmission power smaller than the configuration value and the SSID being the target SSID, the method may further include: receiving parameter information of a third VAP (virtual service set point) associated with a second wireless terminal issued by a wireless controller, wherein the third VAP is a VAP with the SSID created by other APs as the target SSID; and correspondingly setting the parameter information into the second VAP to switch the VAP associated with the second wireless terminal from the third VAP to the second VAP. The parameter information may be information about parameters related to the second wireless terminal accessing the WLAN through the third VAP, and may include, for example, a rate, a channel, and an encryption algorithm of transmission data between the second wireless terminal and the third VAP.
Due to the existence of delay time caused by roaming switching of the delay wireless terminal, the AP side can actively complete switching of the wireless terminal associated with the AP before the wireless terminal actively roams and switches, which is beneficial to further reducing the roaming times of the wireless terminal, thereby further reducing the packet loss of the wireless terminal.
It should be noted that, in some of the above embodiments and the flows described in the drawings, a plurality of operations appearing in a specific order are included, but it should be clearly understood that the operations may be performed out of the order in which they appear herein or performed in parallel, the sequence numbers of the operations, such as step 31, step 32, etc., are merely used to distinguish between the various operations, and the sequence numbers themselves do not represent any execution sequence. In addition, the flows may include more or fewer operations, and the operations may be performed sequentially or in parallel. It should be noted that, the descriptions of "first" and "second" herein are used to distinguish different messages, devices, modules, etc., and do not represent a sequence, and are not limited to the "first" and the "second" being different types.
Fig. 5 is a schematic structural diagram of a control device for associating a wireless terminal with a virtual access point according to an embodiment of the present application. As shown in fig. 5, the apparatus may include: a control module 51 and a creation module 52.
A control module 51, configured to set, for a first virtual access point whose signal transmission power is smaller than a configuration value and whose service set identifier is a target service set identifier, the signal transmission power of the first virtual access point to the configuration value after the first virtual access point is associated with a wireless terminal, and prohibit other wireless terminals except the wireless terminal from associating with the first virtual access point;
a creating module 52, configured to create, after the first virtual access point is associated with a wireless terminal, a second virtual access point whose signal transmission power is smaller than the configuration value and whose service set identifier is the target service set identifier; the second virtual access point is used for associating other wireless terminals except for a target wireless terminal, and the target wireless terminal refers to a wireless terminal associated with any virtual access point of which the service set identifier created by the wireless access point is the target service set identifier.
Optionally, the control module 51 is configured to prohibit other wireless terminals except the wireless terminal from accessing the first virtual access point, and specifically includes: setting a state of the first virtual access point broadcasting a beacon frame to be non-broadcast; and/or the first virtual access point does not answer the detection request message which is sent by other wireless terminals except the wireless terminal and used for detecting the target service set identifier.
Optionally, the control module 51 is further configured to:
receiving a detection request message sent by a first wireless terminal and used for detecting the target service set identifier;
when the service set identifier created by the first wireless terminal and the wireless access point is not associated with any virtual access point identified by the target service set identifier, judging whether the first wireless terminal belongs to a forbidden response range of the first virtual access point;
if not, the first virtual access point returns a corresponding detection response message to the first wireless terminal.
Optionally, the control module 51 is further configured to:
and if the first wireless terminal belongs to the forbidden response range of the first virtual access point, the first virtual access point does not respond to the detection request message sent by the first wireless terminal.
Optionally, the forbidden response range is configured by the wireless controller according to the requirement.
Optionally, the control module 51 is further configured to: and deleting the first virtual access point after the wireless terminal associated with the first virtual access point does not exist.
Optionally, the control module 51 is further configured to:
receiving parameter information of a third virtual access point associated with a second wireless terminal issued by a wireless controller, wherein the third virtual access point is a virtual access point of which a service set identifier created by other wireless access points is the target service set identifier;
And correspondingly setting the parameter information into the second virtual access point so as to switch the virtual access point associated with the second wireless terminal from the third virtual access point to the second virtual access point.
The apparatus shown in fig. 5 may perform the method provided by the foregoing method embodiment, and reference is made to the relevant description of the foregoing method embodiment for a part of this embodiment that is not described in detail. The implementation process and the technical effect of the technical scheme refer to the description in the foregoing method embodiment, and are not repeated here.
Fig. 6 is a schematic structural diagram of a wireless access point according to an embodiment of the present application. As shown in fig. 6, the wireless access point may include: a memory 61 and a processor 62.
Memory 61 is used to store computer programs and may be configured to store various other data to support operation on the wireless access point. Examples of such data include instructions for any application or method operating on the wireless access point.
The memory 61 may be implemented by any type or combination of volatile or non-volatile memory devices, such as Static Random Access Memory (SRAM), electrically erasable programmable read-only memory (EEPROM), erasable programmable read-only memory (EPROM), programmable read-only memory (PROM), read-only memory (ROM), magnetic memory, flash memory, magnetic or optical disk.
A processor 62 coupled to the memory 61 for executing the computer program in the memory 61 for: for a first virtual access point of which the created signal transmission power is smaller than a configuration value and the service set identifier is a target service set identifier, after the first virtual access point is associated with a wireless terminal, setting the signal transmission power of the first virtual access point to the configuration value, prohibiting other wireless terminals except the wireless terminal from being associated with the first virtual access point, and creating a second virtual access point of which the signal transmission power is smaller than the configuration value and the service set identifier is the target service set identifier; the second virtual access point is used for associating other wireless terminals except for a target wireless terminal, and the target wireless terminal refers to a wireless terminal associated with any virtual access point of which the service set identifier created by the wireless access point is the target service set identifier.
Optionally, the processor 62 is configured to prohibit other wireless terminals except the wireless terminal from accessing the first virtual access point, specifically including: setting a state of the first virtual access point broadcasting a beacon frame to be non-broadcast; and/or the first virtual access point does not answer the detection request message which is sent by other wireless terminals except the wireless terminal and used for detecting the target service set identifier.
Optionally, the processor 62 is further configured to:
receiving a detection request message sent by a first wireless terminal and used for detecting the target service set identifier;
when the service set identifier created by the first wireless terminal and the wireless access point is not associated with any virtual access point identified by the target service set identifier, judging whether the first wireless terminal belongs to a forbidden response range of the first virtual access point;
if not, the first virtual access point returns a corresponding detection response message to the first wireless terminal.
Optionally, the processor 62 is further configured to:
and if the first wireless terminal belongs to the forbidden response range of the first virtual access point, the first virtual access point does not respond to the detection request message sent by the first wireless terminal.
Optionally, the forbidden response range is configured by the wireless controller according to the requirement.
Optionally, the processor 62 is further configured to: and deleting the first virtual access point after the wireless terminal associated with the first virtual access point does not exist.
Optionally, the processor 62 is further configured to:
receiving parameter information which is issued by a wireless controller and used for acquiring a third virtual access point associated with a second wireless terminal, wherein the third virtual access point is a virtual access point of which a service set identifier created by other wireless access points is the target service set identifier;
And correspondingly setting the parameter information into the second virtual access point so as to switch the virtual access point associated with the second wireless terminal from the third virtual access point to the second virtual access point.
In the embodiment of the application, after the wireless terminal is associated with the AP, the signal transmission power of the first VAP is set to the configuration value, the wireless terminal is forbidden to be associated with the first VAP except the wireless terminal, and a second VAP with the signal transmission power smaller than the configuration value and the SSID being the target SSID is created, so that the VAP with the signal transmission power lower than the configuration value is created by the AP and is used for the wireless terminal to associate with the wireless terminal, after the wireless terminal is associated with the created VAP, the signal transmission power of the VAP is increased, so that the signal transmission power of the associated AP of the wireless terminal is increased after the wireless terminal is associated with the AP, and the signal intensity of the associated AP received by the wireless terminal fluctuates.
Further, as shown in fig. 6, the wireless access point may further include: communication component 63, power supply component 64, and the like. Only some of the components are schematically shown in fig. 6, which does not mean that the wireless access point only comprises the components shown in fig. 6.
Accordingly, the embodiments of the present application also provide a computer readable storage medium storing a computer program, where the computer program when executed can implement the steps that can be performed by the wireless access point in the above method embodiments.
The communication assembly of fig. 6 is configured to facilitate wired or wireless communication between the device in which the communication assembly is located and other devices. The device where the communication component is located can access a wireless network based on a communication standard, such as a mobile communication network of WiFi,2G, 3G, 4G/LTE, 5G, etc., or a combination thereof. In one exemplary embodiment, the communication component receives a broadcast signal or broadcast-related information from an external broadcast management system via a broadcast channel. In one exemplary embodiment, the communication component further comprises a Near Field Communication (NFC) module to facilitate short range communications. For example, the NFC module may be implemented based on Radio Frequency Identification (RFID) technology, infrared data association (IrDA) technology, ultra Wideband (UWB) technology, bluetooth (BT) technology, and other technologies.
The power supply assembly shown in fig. 6 provides power for various components of the device in which the power supply assembly is located. The power components may include a power management system, one or more power sources, and other components associated with generating, managing, and distributing power for the devices in which the power components are located.
It will be appreciated by those skilled in the art that embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment, or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems) and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flowchart illustrations and/or block diagrams, and combinations of flows and/or blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
In one typical configuration, a computing device includes one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
The memory may include volatile memory in a computer-readable medium, random Access Memory (RAM) and/or nonvolatile memory, such as Read Only Memory (ROM) or flash memory (flash RAM). Memory is an example of computer-readable media.
Computer readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of storage media for a computer include, but are not limited to, phase change memory (PRAM), static Random Access Memory (SRAM), dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), read Only Memory (ROM), electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape magnetic disk storage or other magnetic storage devices, or any other non-transmission medium, which can be used to store information that can be accessed by a computing device. Computer-readable media, as defined herein, does not include transitory computer-readable media (transmission media), such as modulated data signals and carrier waves.
It should also be noted that the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of other like elements in a process, method, article or apparatus that comprises the element.
The foregoing is merely exemplary of the present application and is not intended to limit the present application. Various modifications and changes may be made to the present application by those skilled in the art. Any modifications, equivalent substitutions, improvements, etc. which are within the spirit and principles of the present application are intended to be included within the scope of the claims of the present application.

Claims (10)

1. A control method for associating a wireless terminal with a virtual access point, applied to the wireless access point, comprising:
aiming at a first virtual access point with the created signal transmitting power smaller than a configuration value and the service set identification as a target service set identification, after the first virtual access point is associated with a wireless terminal, setting the signal transmitting power of the first virtual access point as the configuration value, and prohibiting other wireless terminals except the wireless terminal from being associated with the first virtual access point;
after the first virtual access point is associated with a wireless terminal, a second virtual access point with signal transmitting power smaller than the configuration value and the service set identification being the target service set identification is created; the second virtual access point is used for associating other wireless terminals except for a target wireless terminal, and the target wireless terminal refers to a wireless terminal associated with any virtual access point of which the service set identifier created by the wireless access point is the target service set identifier.
2. The method of claim 1, wherein the prohibiting access to the first virtual access point by wireless terminals other than the wireless terminal comprises: setting a state of the first virtual access point broadcasting a beacon frame to be non-broadcast; and/or the first virtual access point does not answer the detection request message which is sent by other wireless terminals except the wireless terminal and used for detecting the target service set identifier.
3. The method of claim 2, wherein before the first virtual access point is associated with a wireless terminal, the method further comprises:
receiving a detection request message sent by a first wireless terminal and used for detecting the target service set identifier;
when the service set identifier created by the first wireless terminal and the wireless access point is not associated with any virtual access point identified by the target service set identifier, judging whether the first wireless terminal belongs to a forbidden response range of the first virtual access point;
if not, the first virtual access point returns a corresponding detection response message to the first wireless terminal.
4. A method according to claim 3, characterized in that the method further comprises: and if the first wireless terminal belongs to the forbidden response range of the first virtual access point, the first virtual access point does not respond to the detection request message sent by the first wireless terminal.
5. A method according to claim 3, wherein the forbidden response range is configured by the wireless controller as required.
6. The method according to any of claims 1-5, wherein after setting the signal transmission power of the first virtual access point to the configuration value and prohibiting other wireless terminals than the wireless terminal from associating with the first virtual access point, the method further comprises:
and deleting the first virtual access point after the wireless terminal associated with the first virtual access point does not exist.
7. The method of any of claims 1-5, wherein after the creating a second virtual access point having a signal transmission power less than the configuration value and a service set identification of the target service set, the method further comprises:
receiving parameter information of a third virtual access point associated with a second wireless terminal issued by a wireless controller, wherein the third virtual access point is a virtual access point of which a service set identifier created by other wireless access points is the target service set identifier;
and correspondingly setting the parameter information into the second virtual access point so as to switch the virtual access point associated with the second wireless terminal from the third virtual access point to the second virtual access point.
8. A control device for associating a wireless terminal with a virtual access point, applied to the wireless access point, comprising:
the control module is used for setting the signal transmission power of the first virtual access point to the configuration value and prohibiting other wireless terminals except the wireless terminal from being associated with the first virtual access point after the wireless terminal is associated with the first virtual access point aiming at the first virtual access point which is created and has the signal transmission power smaller than the configuration value and the service set identifier is the target service set identifier;
the creating module is used for creating a second virtual access point with signal transmitting power smaller than the configuration value and the service set identification being the target service set identification after the first virtual access point is associated with the wireless terminal; the second virtual access point is used for associating other wireless terminals except for a target wireless terminal, and the target wireless terminal refers to a wireless terminal associated with any virtual access point of which the service set identifier created by the wireless access point is the target service set identifier.
9. A wireless access point, comprising: a memory and a processor;
the memory is used for storing a computer program;
The processor, coupled to the memory, is configured to execute the computer program for:
aiming at a first virtual access point with the created signal transmitting power smaller than a configuration value and the service set identification as a target service set identification, after the first virtual access point is associated with a wireless terminal, setting the signal transmitting power of the first virtual access point as the configuration value, and prohibiting other wireless terminals except the wireless terminal from being associated with the first virtual access point;
after the first virtual access point is associated with a wireless terminal, a second virtual access point with signal transmitting power smaller than the configuration value and the service set identification being the target service set identification is created; the second virtual access point is used for associating other wireless terminals except for a target wireless terminal, and the target wireless terminal refers to a wireless terminal associated with any virtual access point of which the service set identifier created by the wireless access point is the target service set identifier.
10. A computer readable storage medium storing a computer program, characterized in that the computer program, when executed by a processor, causes the processor to carry out the steps of the method according to any one of claims 1-7.
CN202111302185.8A 2021-11-04 2021-11-04 Control method, device and equipment for association of wireless terminal and virtual access point Active CN114205843B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111302185.8A CN114205843B (en) 2021-11-04 2021-11-04 Control method, device and equipment for association of wireless terminal and virtual access point

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111302185.8A CN114205843B (en) 2021-11-04 2021-11-04 Control method, device and equipment for association of wireless terminal and virtual access point

Publications (2)

Publication Number Publication Date
CN114205843A CN114205843A (en) 2022-03-18
CN114205843B true CN114205843B (en) 2024-04-16

Family

ID=80646900

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111302185.8A Active CN114205843B (en) 2021-11-04 2021-11-04 Control method, device and equipment for association of wireless terminal and virtual access point

Country Status (1)

Country Link
CN (1) CN114205843B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114599071A (en) * 2022-04-25 2022-06-07 中国电信股份有限公司 Wireless access method, device, system, wireless controller and wireless access point

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102098752A (en) * 2011-02-25 2011-06-15 中国人民解放军国防科学技术大学 Wireless mesh network (WMN)-based association and seamless handover method
CN103733715A (en) * 2011-05-06 2014-04-16 汤姆逊许可公司 Method of establishing a first and a second association which are decoupled
CN103781165A (en) * 2012-10-26 2014-05-07 华为技术有限公司 Transmit power control method for wireless local area network , controller and access point
CN104023364A (en) * 2014-05-28 2014-09-03 北京邮电大学 Virtual access point-based wireless local area network seamless switching method
CN104159273A (en) * 2014-08-01 2014-11-19 深圳市江波龙电子有限公司 System and method for network access of WiFi equipment for Internet of things
CN108235395A (en) * 2018-01-10 2018-06-29 重庆邮电大学 It is a kind of to realize wireless terminal in a wlan across the method for channel roaming switch
CN110461035A (en) * 2019-08-15 2019-11-15 上海寰创通信科技股份有限公司 A kind of method of wireless network roaming

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8699456B2 (en) * 2010-10-26 2014-04-15 Blackberry Limited Methods and apparatus for use in improving network coverage for voice or data calls
US10602379B2 (en) * 2014-05-19 2020-03-24 Industrial Technology Research Institute Wireless communication method, wireless communication device and non-transitory computer readable recording medium thereof

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102098752A (en) * 2011-02-25 2011-06-15 中国人民解放军国防科学技术大学 Wireless mesh network (WMN)-based association and seamless handover method
CN103733715A (en) * 2011-05-06 2014-04-16 汤姆逊许可公司 Method of establishing a first and a second association which are decoupled
CN103781165A (en) * 2012-10-26 2014-05-07 华为技术有限公司 Transmit power control method for wireless local area network , controller and access point
CN104023364A (en) * 2014-05-28 2014-09-03 北京邮电大学 Virtual access point-based wireless local area network seamless switching method
CN104159273A (en) * 2014-08-01 2014-11-19 深圳市江波龙电子有限公司 System and method for network access of WiFi equipment for Internet of things
CN108235395A (en) * 2018-01-10 2018-06-29 重庆邮电大学 It is a kind of to realize wireless terminal in a wlan across the method for channel roaming switch
CN110461035A (en) * 2019-08-15 2019-11-15 上海寰创通信科技股份有限公司 A kind of method of wireless network roaming

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
WLAN中基于OpenFlow的无缝切换机制设计与实现;开彩红;胡欣岳;;电子学报;20180215(第02期);全文 *
WLAN无漫游组网方式设计与实现;郭猷敏;肖根福;郑大腾;陈华伦;;井冈山大学学报(自然科学版);20200315(02);全文 *
软件定义无线局域网的切换接入机制;王明芬;;计算机应用;20200910(09);全文 *

Also Published As

Publication number Publication date
CN114205843A (en) 2022-03-18

Similar Documents

Publication Publication Date Title
US11723085B2 (en) Service carrier frequency selecting method and apparatus
US20190082355A1 (en) Method and device for configuring cell in wireless communication system
US9706588B2 (en) Method, device and system for device to device (D2D) resource acquisition
WO2017135455A1 (en) User equipment, and random access method
EP3048748A1 (en) Mobile terminal communication method, device and related equipment
US11218944B2 (en) Communication method, device and computer readable storage medium for relay device
WO2016192225A1 (en) Roaming handoff control method and central control unit
US10342020B2 (en) Responding to paging requests while waiting to request a connection to a wireless network
US11057802B2 (en) Wireless client STA roaming
US11122628B2 (en) User equipment apparatus, base station, and random access method
US20180020486A1 (en) Wireless communications system, wireless apparatus, and processing method
CN109362110B (en) Roaming switching method, equipment, network and storage medium
US11323903B2 (en) Connection state-dependent channel measurement
US9883439B2 (en) Offloading method and apparatus
EP3979688A1 (en) Method and apparatus for determining inter-frequency adjacent area
US10334487B2 (en) Device-to-device resource configuration information processing method, apparatus and system
KR20180058753A (en) Methods for processing access information, network nodes and wireless devices
CN111918350A (en) Wireless roaming method, device, equipment and storage medium
CN114205843B (en) Control method, device and equipment for association of wireless terminal and virtual access point
US20200404545A1 (en) Method for restricting capability of terminal device, terminal device, and network device
US20210153244A1 (en) User equipment and random access control method
US9948534B2 (en) Access point resource consumption management
US20160316499A1 (en) Identification of a broadband connection
US11452008B2 (en) Wireless roaming method, access point device, and mobile station
US11323925B2 (en) Resource selection method, device and computer storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant