CN101594693B - Access method for access point and access controller - Google Patents

Access method for access point and access controller Download PDF

Info

Publication number
CN101594693B
CN101594693B CN2009101578963A CN200910157896A CN101594693B CN 101594693 B CN101594693 B CN 101594693B CN 2009101578963 A CN2009101578963 A CN 2009101578963A CN 200910157896 A CN200910157896 A CN 200910157896A CN 101594693 B CN101594693 B CN 101594693B
Authority
CN
China
Prior art keywords
access point
capacity data
access
oneself
access controller
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN2009101578963A
Other languages
Chinese (zh)
Other versions
CN101594693A (en
Inventor
刘靖非
范成龙
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Autelan Technology Co ltd
Beijing Hua Xinaotian Network Technology Co ltd
Original Assignee
AUTELAN TECHNOLOGY Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by AUTELAN TECHNOLOGY Inc filed Critical AUTELAN TECHNOLOGY Inc
Priority to CN2009101578963A priority Critical patent/CN101594693B/en
Publication of CN101594693A publication Critical patent/CN101594693A/en
Application granted granted Critical
Publication of CN101594693B publication Critical patent/CN101594693B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

The invention discloses an access method for an access point and an access controller, which comprises the following: discovery step, in which the access point discovers the access controller; negotiation step in which the access point and the access controller mutually exchange respective capacity data comprising functional models or corresponding characteristic specifications, and if the capacity data of the access point is not matched with that of the access control, the capability negotiation fails, otherwise, the capability negotiation is successful; and accessing step, if the capability negotiation is successful, the access point has an access to the access controller.

Description

The cut-in method of access point and access controller
Technical field
The present invention relates to the cut-in method of access point and access controller in the radio communication, the access point of particularly different manufacturer production and the cut-in method between the access controller.
Background technology
WLAN (Wireless Local Area Network, WLAN (wireless local area network)) product architecture is from AP (the Access Point of single autonomy, access point) evolves to by the hierarchy of control in AC (Access Controller, access controller) and the common access set that constitutes of AP.The purpose of this evolution is with access control, comprises that discriminating, secure communication, mobile management and Radio Frequency Management etc. separate from single AP, by AC centralized control in addition.
CAPWAP (Control And Provisioning of Wireless Access Points, the control of WAP (wireless access point) and configuration) be IETF (The Internet Engineering Task Force, the Internet engineering duty group) the structural framing agreement of the hierarchy of control in a kind of WLAN access set of Ti Chuing makes the AC can centralized control AP.But CAPWAP has only defined protocol frame and basic wireless associative operation, does not have concrete agreement regulation for concrete functional mode and characteristic specifications etc.Control type wlan product in the access set in the market, AP and AC are by the supporting exploitation of producer, and a large amount of functional modes and characteristic specifications etc. are all defined privately by producer, realize the expansion of CAPWAP, make the AC of own producer can manage the AP of own producer.And producer considers based on own interest protection, can not disclose the AP of own producer and the agreement between the AC and realize, thereby can't realize intercoming mutually between the AP that causes different manufacturers production and the AC (below, be called for short intercommunication).
But along with the wlan product application and development, can new functional requirement constantly occur,, may have different functional modes, and a kind of functional mode might be supported different characteristic specifications again corresponding to a kind of functional requirement.Continuous appearance along with new functional requirement, the privately owned separately realization AP of present this different manufacturers and the various functional modes of AC and the way of characteristic specifications, the AP and the incompatible property between the AC that will cause different manufacturers to be produced are more and more obvious, thereby bring bigger inconvenience to the user.
Summary of the invention
The object of the present invention is to provide the cut-in method of a kind of AP and AC, can realize compatible between AP that different manufacturers is produced and the AC, thereby realize the AP of different manufacturers production and the intercommunication between the AC, reduce the dependence of user, and then play the effect that prevents technical monopoly WLAN manufacturer.
To achieve these goals, the cut-in method according to access point of the present invention and access controller comprises: find step, the access point discovery access controller; Negotiation step, described access point and described access controller exchange the capacity data that comprises functional mode and corresponding characteristic specifications separately mutually, if the capacity data of described access point and described access controller does not match, then capability negotiation failure, otherwise the success of described capability negotiation; Insert step, if the success of described capability negotiation, then described access point is linked into described access controller.
In above-mentioned cut-in method, before described access step, also comprise again:
Recording step, if the success of described capability negotiation, then described access point and described access controller write down the other side's described capacity data mutually.
Again, in above-mentioned cut-in method, described negotiation step comprises: first negotiation step, described access point send the described capacity data of oneself to described access controller; Second negotiation step, described access controller receives the described capacity data that described access point sends, and judge whether and the described capacity data of oneself is complementary, if do not match, then described capability negotiation failure, otherwise described access controller sends the described capacity data of oneself to described access point; The 3rd negotiation step, described access point receive the described capacity data that described access controller sends, and judge whether with oneself described capacity data is complementary, if do not match, then described capability negotiation is failed, otherwise described capability negotiation successfully.
Again, in above-mentioned cut-in method, in described second negotiation step, described access controller checks also whether the residue performance of oneself allows the access of described access point, if do not allow, and then described capability negotiation failure.
Again, in above-mentioned cut-in method, in described the 3rd negotiation step, described access point checks also whether the residue of described access control point allows the access of oneself, if do not allow, and then described capability negotiation failure.
Again, in above-mentioned cut-in method, described discovery step comprises: first finds step, and described access point sends the described capacity data of oneself by the broadcast or multicast mode; Second finds step, whether the capacity data that the one or more candidate access controllers that receive the described capacity data that described access point sends are judged described access point is complementary with oneself capacity data, if all judging, one or more candidate access controllers do not match then described discovery failure; The 3rd finds step, if find to find not fail described in the step described second, the capacity data of the described access point of judgement and the capacity data of oneself are complementary among then described one or more candidate access controller, send the capacity data of oneself respectively to described access point; The 4th finds that step, described access point receive the described capacity data that described one or more candidate access controller sends, and judges whether that with the capacity data of oneself is complementary if all do not match, then described discovery is failed; The 5th finds step, if find step the described the 4th, described ability discovery is not failed, and then described access point is from described one or more candidate access controllers that the capacity data with oneself is complementary, select one as the described access controller of finding, described discovery success; Described negotiation step comprises that described first finds step to the five discovery steps, if find in step to the five discovery steps described first, and described discovery failure, then described capability negotiation failure, otherwise described capability negotiation is successful.
Again, in above-mentioned cut-in method, described access point and described access controller, be suitable for IETF (Internet Engineering Task Force, the Internet engineering duty group) CAPWAP (ControlAnd Provisioning of Wireless Access Points, the control of WAP (wireless access point) and configuration) structural framing agreement; Find step in described first negotiation step or described first, described access point carries the capacity data that sends oneself by Discovery Request message; Find step in described second negotiation step or the described the 3rd, described access controller carries the capacity data that sends oneself by Discovery Response message.
Because according to the cut-in method of AP of the present invention and AC, AP and AC carry out capability negotiation, according to negotiation result, determine whether to insert, can realize the AP of different manufacturers production and the intercommunication between the AC, reduce the dependence of user to wlan product manufacturer.Improve the compatibility of AP and AC product simultaneously.
Description of drawings
By the description of carrying out below in conjunction with accompanying drawing, above-mentioned and other purposes of the present invention and characteristics will become apparent, wherein:
Fig. 1 is the expression access point according to the embodiment of the present invention and the sequential chart of the cut-in method of access controller.
Fig. 2 is the sequential chart of expression according to the cut-in method of the access point of embodiments of the invention 1 and access controller.
Fig. 3 is the sequential chart of expression according to the cut-in method of the access point of embodiments of the invention 2 and access controller.
Main symbol description: S1010-S1040, S1110-S1160, S1210-S1260 are step.
Embodiment
Below, describe embodiments of the present invention and embodiment in detail with reference to accompanying drawing.
(execution mode)
Fig. 1 is the expression access point according to the embodiment of the present invention and the sequential chart of the cut-in method of access controller.
Among Fig. 1, AP represents the access point according to present embodiment, and AC represents the access controller according to present embodiment.
At step S1010, AP finds AC.In this step, AP can know the existence of AC in advance by static configuration, also can dynamically find AC by other mechanism, and the present invention does not limit this.
Then, at step S1020, AP is to AC transmitting capacity data.Here, capacity data comprises functional mode and the correlation properties specification that AP oneself is supported.
Then, at step S1030, AC is according to the capacity data that receives from AP, judge whether the functional mode that AP supports mates with oneself, if do not match, perhaps functional mode corresponding characteristics specification and own not matching then send expression to AP and consult the information of failing.Otherwise, the capacity data of record AP, and send oneself capacity data to AP.Here, capacity data comprises functional mode and the correlation properties specification that AC oneself is supported.AP then receives this capacity data from AC, the line item of going forward side by side.
Then, at step S1040, AP sends expression to AC and accepts the AC information of managing.AC receives this information, then so far finishes access.The user can pass through AC, the concrete function of configuration and management AP.
As shown in the above description, the cut-in method according to AP of the present invention and AC can be divided into three phases.Above-mentioned steps S1010 constitutes the phase I, and in this stage, AP finds AC.
Step S1020 and step S1030 constitute second stage, and in this stage, AP and AC carry out capability negotiation.
Particularly, which functional mode and correlation properties specification are supported in each self-described of AP and AC oneself.By mutual interchange, AP and AC know the other side's concrete ability mutually, know that promptly the other side supports which functional mode and correlation properties specification.If AP or AC find functional mode that the other side supports and oneself do not match, perhaps functional mode corresponding characteristics specification and oneself not matching, then capability negotiation is failed.Otherwise the capability negotiation success, AP and AC record the other side's ability enters the phase III;
In the phase III, i.e. step S1040, AP inserts AC and also accepts its management.This stage of entering means the capability negotiation success of AP and AC, and AC knew and write down the AP ability this moment, and the user can pass through AC, configuration and manage the concrete function of AP, and promptly AP declares the functional mode supported in capability negotiation.
As mentioned above,,,, determine whether to insert, can realize the AP of different manufacturers production and the intercommunication between the AC, reduce the dependence of user wlan product manufacturer according to negotiation result because AP and AC carry out capability negotiation according to present embodiment.Improve the compatibility of AP and AC product simultaneously, producer can be according to the progressive increase product function of own situation, do not worry with market on the compatibling problem of product of other producer.
In addition, in the present embodiment, the situation that is made of step S1020 and S1030 with second stage is that example is illustrated, but the capability negotiation process of second stage is not limited thereto.Be that the present invention does not limit the capability negotiation process, its step is not limited yet.
For example, though in the present embodiment, if fail with capability negotiation in step S1030, then AC sends expression to AP to consult the situation of failure signal is that example is illustrated, but the present invention is not and be limited to this, during the capability negotiation failure, AC can not send any signal to AP yet, but wait for time of pre-fixed length by AP, and do not receive any signal that sends from AC, then be defined as the capability negotiation failure.
According to the AP of present embodiment and the cut-in method of AC, can formulate new agreement, also can expand existing protocol, realize the AP of different manufacturers production and the intercommunication between the AC.The embodiment 1 that cut-in method according to the AP of present embodiment and AC is carried out the expansion of CAPWAP describes below.
(embodiment 1)
In CAPWAP, AP finishes AC by Discovery Request message and Discovery Response message and finds, finishes registration by Join Request message and Join Response message.Under the prerequisite that does not influence the original flow process of CAPWAP, in the present embodiment, define new message element and usually describe AP and AC ability, and by making Discovery Request message and Join Request message carry the message element that this describes the AP ability, Discovery Response message and Join Response message are carried this message element of describing the AC ability and are usually finished capability negotiation between AP and the AC.Concrete steps are as follows.
Fig. 2 is the sequential chart of expression according to the cut-in method of the access point of embodiments of the invention 1 and access controller.
In Fig. 2, AP1 represents the access point according to present embodiment, and AC1 represents the access controller according to present embodiment.And, in the present embodiment, suppose that AP1 has found AC1 by static configuration or DHCP discovery mechanism, DNS discovery mechanism etc., and obtained the address of AC1.
Shown in Fig. 2 constitute second stage in the embodiment of the present invention in steps, promptly the capability negotiation process between AP1 and the AC1 is specific as follows.
At step S1110, AP sends the Discovery Request message of the AP capacity data carry oneself by clean culture to AC, and the AP capacity data is described AP and supported which functional mode and correlation properties specification here.
Then, at step S1120, after AC1 receives Discovery Request message,, check the ability of AP1, and according to own strategy, whether decision accepts this AP1 is inserted according to the AP capacity data of wherein carrying.Such as checking whether AP1 ability and the ability of oneself mate, check whether allow AP1 insert, determine whether allowing the access of this AP1 if oneself remaining performance.
Insert if AC1 accepts AP1 in step S1120 decision,, send the Discovery Response message of the AC capacity data that carries oneself to AP1 then at step S1130.Here the AC capacity data is described AC and is supported which functional mode and correlation properties specification.
Then, at step S1140, after AP1 receives Discovery Response message,, check the ability of AC1, and according to own strategy, whether decision is linked into this AC1 according to the AC capacity data of wherein carrying.Such as checking whether AC1 ability and the ability of oneself mate, check that whether AC1 residue performance can allow oneself to insert, and determines whether being linked into this AC1.
If at step S1140, the AP1 decision is linked into this AC1, and then at step S1150, AP1 writes down the capacity data of this AC1, and sends the JoinRequest message of the AP capacity data that carries oneself to AC1.The AP capacity data that Discovery Request message is carried among the AP capacity data of carrying here, and the step S1110 is consistent.
Then, at step S1160, AC1 receives Join Request message, according to the AP capacity data of wherein carrying, and the ability of record AP1, and to AP1 transmission Join Response message.At this moment, JoinResponse message carries the AC capacity data of oneself or does not carry and also can.If it is carry, then consistent with the entrained AC capacity data of Discovery Response message among the step S1130.So far finish capability negotiation.
In the explanation of above-mentioned sequential chart,, omitted explanation to the situation of capability negotiation failure in order to be illustrated more clearly in the situation of capability negotiation success.Below several possible situation of capability negotiation failure is illustrated.
For example, at step S1120, the access of AP1 is not accepted in the AC1 decision, then capability negotiation failure.AC1 sends expression capability negotiation failure signal to AP1.Perhaps AC1 does not send any signal to AP1, but waits for time of pre-fixed length by AP1, does not receive any signal that sends from AC1, then is defined as the capability negotiation failure.The capability negotiation failure then stops step follow-up in the above-mentioned sequential chart.
Again for example, at step S1140, the AP1 decision is not linked into this AC1, then capability negotiation failure.AP1 sends expression capability negotiation failure signal to AC1.Perhaps AP1 does not send any signal to AC1, but waits for time of pre-fixed length by AC1, does not receive any signal that sends from AP1, then is defined as the capability negotiation failure.The capability negotiation failure then stops step follow-up in the above-mentioned sequential chart.
As mentioned above, according to present embodiment, in CAPWAP, carry the message element of describing the AP ability by making Discovery Request message and Join Request message, Discovery Response message and Join Response message are carried the message element of describing the AC ability and are usually finished capability negotiation between AP and the AC, can under the prerequisite that does not influence the original flow process of CAPWAP, the AP of different manufacturers production and the CAPWAP agreement between the AC be expanded, and realize intercommunication.
In addition, in the present embodiment, though the situation of finding AC1 by static configuration or DHCP discovery mechanism, DNS discovery mechanism and obtaining the address of AC1 with AP1 is an example, be illustrated, but the present invention is not limited thereto, and AP also can find AC by CAPWAP discovery mechanism itself.Below, AP is found that by CAPWAP discovery mechanism itself situation of AC describes.
(embodiment 2)
Fig. 3 is the sequential chart of expression according to the cut-in method of the access point of embodiments of the invention 2 and access controller.
In Fig. 3, AP2 is the access point according to present embodiment, and AC2-1, AC2-2, AC2-3 are the candidate access controllers according to present embodiment, and promptly AP2 selects one and inserts from these three candidate access controllers.Below, all or part of summary with AC2-1, AC2-2, AC2-3 is called AC2 sometimes.
Embodiments of the invention 2 are with the difference of embodiment 1, in embodiment 1, AP1 finds AC1 by static configuration or DHCP discovery mechanism, DNS discovery mechanism and obtains the address of AC1, and in embodiment 2, the AC2 that AP2 will insert by the discovery of CAPWAP discovery mechanism own also obtains its address.Concrete steps are as follows.
At step S1210, AP2 sends the Discovery Request message of the AP capacity data that carries oneself in the broadcast or multicast mode.Here, the AP capacity data is described AP and is supported which functional mode and correlation properties specification.
Then, at step S1220, whether a plurality of AC2 in the network after promptly AC2-1, AC2-2, AC2-3 receive Discovery Request message, according to the AP capacity data of wherein carrying, check the ability of AP2, and allow this AP2 to insert according to own strategy decision.Whether mate such as ability and the own ability of checking AP2, check whether oneself remain performance can allow AP2 to insert.
For example, in this figure, AC2-1, AC2-2, AC2-3 have received the DiscoveryRequest message that AP2 sends, and AC2-1 finds the ability of AP2 and oneself do not match, and selects not respond; AC2-2 and AC2-3 find the ability and oneself coupling of AP2, select to respond Discovery Response message.
If at step S1220, the AC2 decision allows AP2 to insert, and then at step S1230, AC2 sends the Discovery Response message of the AC capacity data that carries oneself to AP.Here the AC capacity data is described AC and is supported which functional mode and correlation properties specification.
For example, in this figure, AC-2, AC-3 have determined permission AP2 to insert, and send the Discovery Response message of the AC capacity data that carries oneself respectively to AP2.
Then, at step S 1240, after AP2 receives Discovery Response message,, check the ability of AC2, and according to own strategy, whether decision is linked into this AC2 according to the AC capacity data of wherein carrying.Whether mate such as ability and the own ability of checking AC2, check whether the residue performance of AC2 allows oneself to insert.
For example, in this figure, AP2 receives AC2-2, the Discovery Response message that AC2-3 sends respectively according to the AC capacity data separately of wherein carrying, is checked AC2-2, the ability of AC2-3, and selected AC2-3 as the access controller that oneself will insert, and write down its address.
Then, in step 1250, AP2 is recorded in the capacity data of selected AC2 among the step S1240, and sends the Join Request message of the AP capacity data that carries oneself to this AC2.The entrained AP capacity data of DiscoveryRequest message is consistent among the entrained AP capacity data of Join Request message and the step S1210 in this step.
For example, in this figure, AP2 writes down the capacity data of AC2-3, and sends the Join Request message of the AP capacity data that carries oneself to AC2-3.
Then, at step S1260, AC2 receives the Join Request message that AP2 sends, according to the AP capacity data of wherein carrying, and the ability of record AP2, and to AP2 transmission Join Response message.At this moment, Join Response message carries the AC capacity data of oneself or does not carry and also can.If it is carry, then consistent with the entrained AC capacity data of Discovery Response message among the step S1230.
For example, in this figure, the capacity data of AC2-3 record AP2, and to AP2 transmission JoinResponse message.So far finish capability negotiation.
In the explanation of above-mentioned sequential chart,, omitted explanation to the situation of capability negotiation failure in order to be illustrated more clearly in the situation of capability negotiation success.Below several possible situation of capability negotiation failure is illustrated.
For example, at step S1220, by the inspection of Discovery Request message that AP2 is sent and to the own inspection that remains performance, if AC2-1, AC2-2, AC2-3 all determine not respond AP1, then capability negotiation failure stops step follow-up in the above-mentioned sequential chart.
Again for example, at step S1240, the inspection by Discovery Request message that AC2 is sent and to the inspection of own residue performance, the AP2 decision is not linked into any AC2, and then capability negotiation is failed, and stops step follow-up in the above-mentioned sequential chart.
As seen from the above description, the step S1210-S1240 of present embodiment constitutes the phase I in the embodiments of the present invention, and promptly in this stage, AP2 finds AC2.Simultaneously, step S1210-S1260 constitutes the second stage in the embodiments of the present invention, and promptly in this stage, AP2 and AC2 carry out capability negotiation.
As mentioned above, according to present embodiment, except can reaching the effect that embodiments of the invention 1 are had, the AC2 that can also will insert by the discovery of CAPWAP discovery mechanism own also obtains its address.And, can find in the AC2 process at AP2, carry out the capability negotiation between AP2 and the AC2 simultaneously, thereby can improve the efficient that the access between access point and the access controller is consulted.
More than embodiments of the present invention and embodiment are illustrated.
But among above-mentioned execution mode and the embodiment, the division in each stage is not limited thereto, such as, to carry out in the second stage of capability negotiation, the step that access point and access controller write down the other side's capacity data mutually extracts from this second stage, form a new stage in addition, promptly before the phase III of inserting, increase new stage of writing down of definition also can again.
In addition, in making process of the present invention, the inventor imagined two kinds of following replacement schemes.
(replacement scheme 1)
By a certain producer, provide the primary development bag as the A of producer, other producers carry out secondary development based on the kit of the A of producer on AP or AC, thus AP or the AC intercommunication of realization and the A of producer.
But there is following deficiency in this replacement scheme.
At first, because kit is controlled by the A of producer, the fairness of kit can't guarantee, may form technical monopoly.And other producers consider based on own long-term interest, also are unwilling to be limited by the A of producer.
Secondly, based on the mode of kit, because the operating system of different manufacturers product is inconsistent, the A of producer need provide the kit that is fit to various operating systems, and this has increased the difficulty that the A of producer provides kit.
Again secondly,, other producers are low based on the efficient that the kit of the A of producer carries out secondary development, and the product operational efficiency can't guarantee.
(replacement scheme 2)
A certain producer, the agreement that discloses its AC management AP as the A of producer realizes that other producers realize AC or AP according to the agreement of the A of producer, thereby realizes intercommunication.
But there is following deficiency in this replacement scheme.That is, agreement is formulated and is controlled by the A of producer, and the fairness of agreement can't guarantee, may form technical monopoly, and other producers considers based on own long-term interest, and it is under one's control also to be unwilling.
In order to solve two kinds of deficiencies that replacement scheme exists as mentioned above, the inventor has made the present invention.
Utilizability on the industry
Carry out capability negotiation between the AP that access point of the present invention and the cut-in method of access controller are applicable in different manufacturer production and the AC, realize intercommunication.

Claims (6)

1. the cut-in method of access point and access controller comprises:
Find step, the access point discovery access controller;
Negotiation step, described access point and described access controller exchange the capacity data that comprises functional mode and corresponding characteristic specifications separately mutually, if the capacity data of described access point and described access controller does not match, then capability negotiation failure, otherwise the success of described capability negotiation;
Insert step, if the success of described capability negotiation, then described access point is linked into described access controller,
Wherein, described negotiation step comprises:
First negotiation step, described access point send the described capacity data of oneself to described access controller;
Second negotiation step, described access controller receives the described capacity data that described access point sends, and judge whether and the described capacity data of oneself is complementary, if do not match, then described capability negotiation failure, otherwise described access controller sends the described capacity data of oneself to described access point;
The 3rd negotiation step, described access point receive the described capacity data that described access controller sends, and judge whether with oneself described capacity data is complementary, if do not match, then described capability negotiation is failed, otherwise described capability negotiation successfully.
2. the cut-in method of access point as claimed in claim 1 and access controller wherein, before described access step, also comprises:
Recording step, if the success of described capability negotiation, then described access point and described access controller write down the other side's described capacity data mutually.
3. the cut-in method of access point as claimed in claim 1 and access controller, wherein,
In described second negotiation step, described access controller checks also whether the residue performance of oneself allows the access of described access point, if do not allow, and then described capability negotiation failure.
4. the cut-in method of access point as claimed in claim 1 and access controller, wherein,
In described the 3rd negotiation step, described access point checks also whether the residue performance of described access controller allows the access of oneself, if do not allow, and then described capability negotiation failure.
5. the cut-in method of access point as claimed in claim 1 and access controller, wherein, described discovery step comprises:
First finds step, and described access point sends the described capacity data of oneself by the broadcast or multicast mode;
Second finds step, whether the capacity data that the one or more candidate access controllers that receive the described capacity data that described access point sends are judged described access point is complementary with oneself capacity data, if all judging, one or more candidate access controllers do not match then described discovery failure;
The 3rd finds step, if find to find not fail described in the step described second, the capacity data of the described access point of judgement and the capacity data of oneself are complementary among then described one or more candidate access controller, send the capacity data of oneself respectively to described access point;
The 4th finds that step, described access point receive the described capacity data that described one or more candidate access controller sends, and judges whether that with the capacity data of oneself is complementary if all do not match, then described discovery is failed;
The 5th finds step, if find step the described the 4th, described ability discovery is not failed, and then described access point is from described one or more candidate access controllers that the capacity data with oneself is complementary, select one as the described access controller of finding, described discovery success;
Described negotiation step comprises that described first finds step to the five discovery steps, if find in step to the five discovery steps described first, and described discovery failure, then described capability negotiation failure, otherwise described capability negotiation is successful.
6. as the cut-in method of claim 1 or 5 described access points and access controller, wherein,
Described access point and described access controller, the control and the configuration structure framework agreement of the CAPWAP WAP (wireless access point) of suitable IETF the Internet engineering duty group;
Find step in described first negotiation step or described first, described access point carries the capacity data that sends oneself by Discovery Request message;
Find step in described second negotiation step or the described the 3rd, described access controller carries the capacity data that sends oneself by Discovery Response message.
CN2009101578963A 2009-07-10 2009-07-10 Access method for access point and access controller Active CN101594693B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2009101578963A CN101594693B (en) 2009-07-10 2009-07-10 Access method for access point and access controller

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2009101578963A CN101594693B (en) 2009-07-10 2009-07-10 Access method for access point and access controller

Publications (2)

Publication Number Publication Date
CN101594693A CN101594693A (en) 2009-12-02
CN101594693B true CN101594693B (en) 2010-11-10

Family

ID=41409059

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2009101578963A Active CN101594693B (en) 2009-07-10 2009-07-10 Access method for access point and access controller

Country Status (1)

Country Link
CN (1) CN101594693B (en)

Families Citing this family (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101826982B (en) * 2010-03-30 2012-01-25 北京傲天动联技术有限公司 Statistical method for wireless local area network
CN102547583B (en) * 2010-12-17 2016-01-06 上海贝尔股份有限公司 Multicast service transmission control method, Apparatus and system in wireless local area network (WLAN) system
US8582422B2 (en) 2011-04-05 2013-11-12 Hewlett-Packard Development Company, L.P. Access point configuration propagation
CN102821401B (en) * 2012-09-06 2015-06-17 北京傲天动联技术股份有限公司 Method for controlling wireless mesh network with wireless access controller
CN104125568B (en) * 2014-08-11 2018-09-07 湖南恒茂高科股份有限公司 Wireless access point safety certifying method and system
WO2017070817A1 (en) 2015-10-26 2017-05-04 华为技术有限公司 Method of selecting negotiation object, method of responding discovery message, and associated device
CN105682184A (en) * 2016-04-12 2016-06-15 上海斐讯数据通信技术有限公司 Method and system for discovering cloud access controller via access point
CN108924953B (en) * 2018-07-05 2020-06-26 新华三技术有限公司 AP management method and device

Also Published As

Publication number Publication date
CN101594693A (en) 2009-12-02

Similar Documents

Publication Publication Date Title
CN101594693B (en) Access method for access point and access controller
CN101873695B (en) Wireless communication device, wireless communication system, wireless communication method, and program
EP2503840B1 (en) Wireless communication device for determining a master unit and corresponding wireless communication method, program, and wireless communication system
CN101252498B (en) Access point, access controller and communication method thereof
CN102026306B (en) Channel selection method, channel selection device and mesh node physical device
CN102364923B (en) Communication apparatus and control method thereof
KR20040107833A (en) Coordinator switching method in ad-hoc network environment and communication of using the same
US20130235774A1 (en) Energy-saving mobile node control method using wireless multi-interfaces
US20050075084A1 (en) Method and system for supporting residual energy awareness in an ad hoc wireless communications network
JP2002044003A (en) Communication method, radio and hoc network, communication terminal, and bluetooth terminal
CN105340328A (en) Method and apparatus for performing wireless docking service
CN101138173B (en) Wireless communication apparatus and wireless communication method
CN101521895A (en) Forwarding method used for constructing multi-hop routing in wireless self-organizing network
CN102301762A (en) Distributed ip address assignment protocol for a multi-hop wireless home mesh network with collision detection
CN102026363B (en) Base station internal synchronization method of hierarchical system and base station
KR20070036388A (en) Wireless usb host, wireless usb device, method for providing function of drd host and functioning as drd host
WO2004054177A1 (en) Communication processing apparatus, communication processing method, and computer program
CN108366438B (en) Generating cluster networking method and generating cluster network for large-scale self-organizing wireless communication
CN100391185C (en) Wireless network device and method for reassociation bwteen wireless networks using the wireless network device
CN102684966B (en) Equipment method of network entry, Apparatus and system
CN104918302A (en) Method for constructing mesh network and wireless sound box
JP2006513623A (en) Dynamic network formation for wireless ad hoc networks
JP2006513628A (en) A network and terminal forming an ad hoc network by responding to a query transferred by a slave terminal, wherein the master unit sets up a connection with the terminal to be incorporated in the network
US7801097B2 (en) Setting up of a wireless network by determining and utilizing local topology information
CN105703806A (en) Bluetooth module control method and apparatus of playing equipment, and audio-video playing system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
C56 Change in the name or address of the patentee

Owner name: BEIJING AUTELAN TECHNOLOGY CO., LTD.

Free format text: FORMER NAME: AUTELAN TECHNOLOGY INC.

CP03 Change of name, title or address

Address after: 100193 Beijing city Haidian District Dongbeiwang West Road No. 8 Zhongguancun Software Park Building 5 Building 2 layer Hanvon Technology

Patentee after: BEIJING AUTELAN TECHNOLOGY Co.,Ltd.

Address before: 100084, 2B-517, bright city, No. 1, Nongda South Road, Beijing, Haidian District

Patentee before: Beijing AUTELAN Technology Co.,Ltd.

C41 Transfer of patent application or patent right or utility model
C56 Change in the name or address of the patentee
CP03 Change of name, title or address

Address after: 100193, No. 1, building three, zone 9, Zhongguancun Software Park, 8 West Wang Xi Road, Beijing, Haidian District

Patentee after: Beijing AUTELAN Technology Co.,Ltd.

Address before: 100193 Beijing city Haidian District Dongbeiwang West Road No. 8 Zhongguancun Software Park Building 5 Building 2 layer Hanvon Technology

Patentee before: BEIJING AUTELAN TECHNOLOGY Co.,Ltd.

TR01 Transfer of patent right

Effective date of registration: 20151125

Address after: 100085 Beijing, East Road, No. 1, building on the north side of the building, room 313, room 3

Patentee after: Beijing Hua Xinaotian network technology Co.,Ltd.

Address before: 100193, No. 1, building three, zone 9, Zhongguancun Software Park, 8 West Wang Xi Road, Beijing, Haidian District

Patentee before: Beijing AUTELAN Technology Co.,Ltd.

PE01 Entry into force of the registration of the contract for pledge of patent right

Denomination of invention: Access method for access point and access controller

Effective date of registration: 20190816

Granted publication date: 20101110

Pledgee: Beijing first financing Company limited by guarantee

Pledgor: Beijing Hua Xinaotian network technology Co.,Ltd.

Registration number: Y2019990000088

PE01 Entry into force of the registration of the contract for pledge of patent right
PC01 Cancellation of the registration of the contract for pledge of patent right

Date of cancellation: 20220329

Granted publication date: 20101110

Pledgee: Beijing first financing Company limited by guarantee

Pledgor: Beijing Hua Xinaotian network technology Co.,Ltd.

Registration number: Y2019990000088

PC01 Cancellation of the registration of the contract for pledge of patent right