CN101834888A - Method for remotely starting transparent computing system client through wireless local area network - Google Patents

Method for remotely starting transparent computing system client through wireless local area network Download PDF

Info

Publication number
CN101834888A
CN101834888A CN 201010139744 CN201010139744A CN101834888A CN 101834888 A CN101834888 A CN 101834888A CN 201010139744 CN201010139744 CN 201010139744 CN 201010139744 A CN201010139744 A CN 201010139744A CN 101834888 A CN101834888 A CN 101834888A
Authority
CN
China
Prior art keywords
network
client
transparent
message
test
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN 201010139744
Other languages
Chinese (zh)
Other versions
CN101834888B (en
Inventor
张尧学
刘浩
周悦芝
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hunan New Cloudnet Technology Co ltd
Original Assignee
Tsinghua University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tsinghua University filed Critical Tsinghua University
Priority to CN2010101397443A priority Critical patent/CN101834888B/en
Publication of CN101834888A publication Critical patent/CN101834888A/en
Application granted granted Critical
Publication of CN101834888B publication Critical patent/CN101834888B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Mobile Radio Communication Systems (AREA)

Abstract

The invention relates to a method for remotely starting a transparent computing system client through a wireless local area network, which belongs to the technical field of computing systems. The method comprises that: the client executes a guide code in a guide chip and searches for transparent networks in a current region according to a preset searching period; the client sequences the searched transparent networks and displays a transparent network list obtained by the sequencing to a user; the user selects to remotely start a used transparent network, and the client performs network authentication on the transparent network selected by the user and tests the transparent network which is selected by the user and passes the authentication; a starting code of the guide chip acquires an identifier of the client from a server; and the user selects an operating system to be loaded. The method has the advantage of solving the problems that the transparent networks and non-transparent networks cannot be distinguished under the wireless network by the conventional methods for remotely starting the transparent computing system, that potential safety hazard exists in network access, that the network authentication cannot be performed, that network stability cannot be detected, and the like.

Description

A kind of method by the WLAN (wireless local area network) remotely starting transparent computing system client
Technical field
The invention belongs to the computer systems technology field, particularly a kind of in computer system based on transparent computation schema, have the client of local computing capability, by the method for WLAN (wireless local area network) remote activation.
Background technology
In computation schema up to now, any computer must will and be installed corresponding operating system for its development from the beginning, calculates or the corresponding software that turns round otherwise this machine just can not carry out application corresponding.The continuous upgrading of the one-to-one relationship of this hardware system and software systems and hardware makes software systems become increasingly complex, and user's operation and maintenance cost is more and more higher.Simultaneously, the computing equipment of constantly eliminating has caused new rubbish and environmental pollution again.
Transparent calculating (referring to list of references: Zhang Yaoxue, " transparent calculating: notion, structure and example ", electronic letters, vol, VOL32, NO12A, 12,2004) is exactly a kind of new computation schema that proposes for addressing the above problem.In transparent calculating, the user can utilize employed various device (various kinds of equipment that comprises fixing, mobile and family) to obtain software services such as operating system, application program as required from server by network according to the demand of oneself.
Transparent computation schema by client, server and between communication network constitute.Client can be multiple different terminal equipment (PC, portable terminal, household electrical appliances etc.).Server can be general PC or server.The network that interconnects between the client and server is called transparent network, can be various communication networks such as Ethernet, WLAN (wireless local area network) (Wi-Fi), 3G.Client itself does not preset any operating system and application program, obtains but download from the server that stores various operating systems and application program by transparent network.As long as the hardware interface of client is to support these operating systems, the user is dynamic download, these operating systems of installation and operation and application program as required just, thereby provides the software service that comprises operating system as required for the user.In transparent computation schema, same client can and be moved different operating system by the transparent network download, thereby removed the one-to-one relationship of hardware system and software systems in the traditional calculations pattern, reduced user's operation and maintenance cost, reduced environmental pollution.
Transparent computing system based on transparent computation schema is succeeded in developing under cable LAN at present (referring to the applicant's relevant Chinese invention patent " based on the computing equipment and the method for transparent calculating ", the patent No.: ZL200510063064.7).In this system, client has the performance that is equal to common PC, is responsible for calculating and input and output, and the operating system and the application program that will be stored on the server by network downloads to local runtime as required; Server then is responsible for the storage of operating system, application program and data.Client does not have local hard drive, but server is mail in the disk read-write request, returns to client after being handled by server.This system has the anti-virus and the self-recovery mechanism of file system, and the user can select operating systems such as operation Windows, Linux on suitable client simultaneously, has plurality of advantages such as fail safe is good, management maintenance convenient, cost is low.This system is mainly used in the cable LAN environment, is widely used in fields such as E-Government, bank informationization, multi-media classrooms.
But existing transparent computing system mainly is applicable to cable LAN, has limited the further application and the popularization of transparent computation schema.In recent years, along with the development of mobile computing device, notebook computer, palmtop PC (PDA), mobile phone etc. all provide preferably Wi-Fi and have supported that Wi-Fi begins to be widely used in environment such as enterprise, university, family.This feasible network environment with transparent computing system expands to the Wi-Fi network becomes possibility.If the network environment of transparent computing system can be expanded to the Wi-Fi network, make the user can obtain the software service of transparent calculating by the Wi-Fi network, then the user can use mobile devices such as notebook computer, PDA, mobile phone, in mobile environment, obtain the software service of transparent calculating, this will expand the restriction of current transparent computing system to client device and place greatly, make user's use more convenient.
The major technique obstacle that the network environment of transparent computing system is expanded to Wi-Fi derives from the particularity of transparent computing system operation: client does not have local hard drive, operating system, application program etc. all need to obtain from server by network, therefore, client needs the remote activation chip guide that can support transparent computation schema.But existing remote activation chip guide of transparent computing system and method only are applicable to cable LAN, and do not support the Wi-Fi environment.
The existing remote start-up method of transparent computing system is (referring to the applicant's relevant Chinese invention patent " the computer remote startup method under a kind of network environment ", the patent No.: ZL01142033.2) be mainly used in cable LAN, comprise the steps:
1 client powers up, and the start-up code of chip guide obtains the sign of this client from server.
2 clients are downloaded a script interpretive program and load operating from server.
3 under the environment of above-mentioned script interpretive program operation, carries out by the explanation to language scripts, allows the user need select the operating system of loading.
4 clients are from server down operation system kernel mirror image and load operating, thereby have realized the remote activation of operating system.
But in wireless networks such as Wi-Fi, above-mentioned remote start-up method is difficult to be suitable for because of there being following problem:
One, for from the transparent network remote activation, client at first needs to be connected to transparent network.Under cable LAN, owing to can artificially the client physical connection be arrived the transparent network local area network (LAN), need only the netting twine of plugging transparent network to client, client just has been connected to transparent network.But under wireless environment, same zone may be covered by a plurality of wireless networks, wherein may comprise transparent network and nontransparent network.Present remote start-up method can't be distinguished this two kinds of networks, also just can not be directly connected to transparent network.
Two, under wireless network environment, same zone may be covered by a plurality of wireless networks.Common wireless network possible spoofing is a transparent network, for the user provides service, remote start-up method must provide associated safety mechanism to use unsafe network to obtain the transparent calculation services of forgery to prevent the user, but the startup method under the present cable LAN does not still possess this function.
Three, wireless network is generally refined net, and the user need finish network identity validation could use this wireless network.Present remote start-up method does not possess the network identity validation function, thereby can not use wireless network as transparent network.
Though four, wireless network extensive use, the unsteadiness of its bandwidth and time-delay still fail to be solved preferably.Because in transparent computing system, client need utilize transparent network to download and operation system and application program from server is instant, thereby the bandwidth and the time-delay of transparent network had higher requirement.Present remote start-up method fails to consider the unsteadiness of network, thereby is difficult to be suitable under wireless.
Therefore, the existing remote start-up method of transparent computing system is confined to the cable LAN environment, is difficult to be applied to can not satisfy the growing demands of mobile device such as notebook computer, PDA, mobile phone under the wireless environment.
Summary of the invention
In order to overcome the weak point of prior art, the present invention proposes a kind of method that starts client by the Wi-Fi network remote; Can solve that the existing remote start-up method of transparent computing system can not be distinguished transparent network under wireless network and there are potential safety hazard in nontransparent network, access to netwoks, can't carry out network identity validation, fail to detect problem such as network stabilization, this method also is applicable to similarly wireless network such as ZigBee, Bluetooth simultaneously.
The inventive method is based on the transparent computing system of being made up of client, server and wireless network, client can be the computing equipment of support of wireless communication such as notebook computer, PDA, mobile phone, server can be common PC or server, connects by wireless network between the client and server.(Access Point AP) can be wireless network card on wireless router or the server to the access point of wireless network.Server stores the client relative operation system, and client itself does not preset any operating system, realizes remote activation but utilize wireless network to obtain the corresponding operating system from server.
The present invention is provided with a chip guide of supporting client remote activation under the wireless environment in client, and this chip can be read-only memory (ROM) or EPROM (Erasable Programmable Read Only Memory) (EPROM).
The method of passing through the WLAN (wireless local area network) remotely starting transparent computing system client that the present invention proposes is characterized in that this method may further comprise the steps:
Step (1): client powers up, carry out the guidance code in the chip guide, according to the transparent network in the search cycle search current region that sets in advance, if search transparent network in the given time, the average bandwidth of the last remote activation of all operations system that the number of the operating system that the signal strength signal intensity of acquisition transparent network, transparent network are supported, transparent network are supported changes step (2), otherwise stop search, the remote activation failure;
Step (2): client sorts the transparent network that the searches average bandwidth according to the last remote activation of all operations system of the number of the operating system of the signal strength signal intensity of transparent network, transparent network support, transparent network support, and the transparent network tabulation that obtains after the ordering is shown to the user;
Step (3): the transparent network that the user selects remote activation to use, client is carried out network identity validation to the transparent network that the user selects, if be proved to be successful, then changes step (4); Otherwise change step (3);
Step (4): client is tested user's transparent network that select and that be proved to be successful, whether satisfies the demand of client remote activation with bandwidth and the time-delay that detects this transparent network; If this transparent network satisfies the demand of client remote activation, then change step (5), otherwise go back to step (3);
Step (5): the start-up code of chip guide obtains the sign of this client from server;
Step (6): client is downloaded a script interpretive program and load operating from server;
Step (7): under the environment of above-mentioned script interpretive program operation, carry out, allow the user need select the operating system of loading by explanation to language scripts;
Step (8): client is from server down operation system kernel mirror image and load operating, and each read-write requests of server record client deposits start-up course read-write daily record in, uses when having client to carry out same operating system testing later on.
(above-mentioned steps (1)~step (4) is the treatment step of distinguishing characteristics of the present invention, step (5)~step (7) is the treatment step of the existing remote start-up method of transparent computing system, and step (8) is for the present invention is based on the step that the existing remote start-up method of transparent computing system is revised.)
The present invention is applicable to the terminal equipment (notebook computer, PDA, mobile phone etc.) of radio communications such as supporting Wi-Fi, ZigBee, Bluetooth, make the user can under mobile environment, obtain the various software services that transparent calculating provides, expand the application scenarios of existing transparent computing system, had application promise in clinical practice in today of mobile Internet develop rapidly.
Description of drawings
Fig. 1 is the flow chart of present embodiment client by the wireless network remote activation.
Fig. 2 is the flow chart in network test stage in the present embodiment client remote activation process.
Embodiment
A kind of method by the WLAN (wireless local area network) remotely starting transparent computing system client that the present invention proposes reaches embodiment in conjunction with the accompanying drawings and is described in detail as follows:
The inventive method is based on the transparent computing system of being made up of client, server and wireless network, client can be the computing equipment of support of wireless communication such as notebook computer, PDA, mobile phone, server can be common PC or server, connects by wireless network between the client and server.(Access Point AP) can be wireless network card on wireless router or the server to the access point of wireless network.Server stores the client relative operation system, client itself does not preset any operating system, but utilize the chip guide (ROM or EPROM) that is provided with on the client, obtain the corresponding operating system by wireless network from server and realize remote activation.
The method of passing through the WLAN (wireless local area network) remotely starting transparent computing system client that the present invention proposes is: client utilizes chip guide to carry out remote activation by wireless network.This method flow may further comprise the steps as shown in Figure 1:
Step (1): client powers up, carry out the guidance code in the chip guide, according to the transparent network in the search cycle search current region that sets in advance, if search transparent network in the given time, the average bandwidth of the last remote activation of all operations system that the number of the operating system that the signal strength signal intensity of acquisition transparent network, transparent network are supported, transparent network are supported, change step (2), otherwise stop search, the remote activation failure;
The embodiment of this step may further comprise the steps:
Step (1.1): the guidance code among client executing chip guide ROM or the EPROM, the legitimacy and the integrality of inspection code self drive wireless network card, prepare the search wireless network;
Step (1.2): client picks up counting;
Step (1.3): client is broadcasted this network search request message insert the transparent computing system sign in the manufacturer self-defined information territory of network search request message after;
Step (1.4): after transparent network AP receives network search request message, check manufacturer self-defined information territory, the request if not transparent computing system client then abandons it; If the request of transparent computing system client, then in the manufacturer custom zone of web search response message, insert the transparent network information of the transparent network at this AP place, return the web search response message to client;
The content of said transparent network information is as shown in table 1 for example, the contents are as follows (being the length of this content in the bracket) that comprises in this table:
1) transparent computing system sign (4 byte);
2) ID of transparent network (32 byte);
3) number (2 byte) of the operating system of this transparent network support;
4) average bandwidth (8 byte) of the last remote activation of all operations system of this transparent network support;
5) ID of each operating system of Zhi Chiing (2 byte);
6) length of each operating system follow-up data of Zhi Chiing (1 byte);
7) title of each operating system of Zhi Chiing (1~50 byte);
The bandwidth (8 byte) of the last remote activation of 8) supporting of each operating system;
The content of table 1 transparent network information
Title Length (byte)
The transparent computing system sign ??4
The ID of transparent network ??32
The operating system number of network support ??2
The average bandwidth of the last remote activation of all operations system of network support ??8
The ID of first operating system ??2
The length of first operating system follow-up data ??1
The title of first operating system ??1~50
The bandwidth of the last remote activation of first operating system ??8
??......
The ID of N operating system ??2
The length of N operating system follow-up data ??1
The title of N operating system ??1~50
The bandwidth of N the last remote activation of operating system ??8
Step (1.5): after client is received the web search response message, verify the message whether this message returned for transparent network AP by manufacturer self-defined information territory; If this message is not the message that transparent network AP returns, then it is abandoned; If this message is the message that transparent network AP returns, then write down the signal strength signal intensity (signal strength signal intensity of transparent network be the client wireless network interface card obtain) of average bandwidth and this transparent network of the number of the ID of this transparent network, operating system that this transparent network is supported, the last remote activation of all operations system that this transparent network is supported according to the size of the electromagnetic amplitude of receiving of wireless signal;
Step (1.6): arrive at every turn the search cycle (the search cycle general range is 1s~5s), then client judge current search to network whether meet the following conditions simultaneously:
1) searches a transparent network at least;
2) transparent network that searches of double search cycle comes to the same thing;
If satisfy, then search procedure finishes, and forwards step (2) to; Otherwise client timing zero clearing, reclocking forwards step (1.3) to;
Step (1.7): (general range does not search any transparent network when being 10s~30s), then stops search if timing arrives the scheduled time; The search of Client-Prompt user current region can not provide transparent calculation services less than any transparent network, the failure of client remote activation;
Step (2): client sorts the transparent network that the searches average bandwidth according to the last remote activation of all operations system of the number of the operating system of the signal strength signal intensity of transparent network, transparent network support, transparent network support, and the transparent network tabulation that obtains after the ordering is shown to the user;
This step embodiment may further comprise the steps that (number of supposing the transparent network that step (1) searches is N, and N is a positive integer, and N transparent network is expressed as W respectively 1, W 2..., W N):
Step (2.1): basis signal intensity is by to weak N transparent network being sorted ordering back W by force 1, W 2..., W NRank be expressed as R successively 1,1, R 1,2..., R 1, N
Step (2.2): the number according to the operating system of supporting sorts to N transparent network from more to less, ordering back W 1, W 2..., W NRank be expressed as R successively 2,1, R 2,2..., R 2, N
Step (2.3): the average bandwidth according to the last remote activation of all operations system that supports sorts to N transparent network from high to low, ordering back W 1, W 2..., W NRank be expressed as R successively 3,1, R 3,2..., R 3, N
Step (2.4): the weight coefficient of three rank correspondences of definition is respectively α, β, γ (α>0, β>0, γ>0, alpha+beta+γ=1), calculates W 1, W 2..., W NFinal ranking coefficients R separately T, 1, R T, 2..., R T, N:
R t,i=α*R 1,1+β*R 2,i+γ*R 3,i(i=1,2,...,N);
Step (2.5): according to R T, iAscending N transparent network sorted, the transparent network tabulation that obtains after the ordering is shown to the user;
Step (3): the transparent network that the user selects remote activation to use, client is carried out network identity validation to the transparent network that the user selects, if be proved to be successful, then changes step (4); Otherwise change step (3); This step embodiment may further comprise the steps:
Step (3.1): the user selects transparent network;
Step (3.2): client is inserted transparent computing system sign in the manufacturer self-defined information territory of network authentication request message, and the AP of the transparent network of selecting to the user sends network authentication request message;
Step (3.3): after transparent network AP received network authentication request message, the manufacturer self-defined information territory in the inspection message was to judge whether this message is the request message of transparent computing system client; If not the request message of transparent computing system client, then directly this network authentication request message is abandoned; If the request message of transparent computing system client then extracts the authorization information in the message, in the manufacturer self-defined information territory of network verification response message, insert the transparent computing system sign, return the network verification response message to client;
Step (3.4): after client is received the network verification response message, verify the message whether this message returned for transparent network AP by manufacturer self-defined information territory; If this message is not the message that transparent network AP returns, then it is abandoned; If this message is the message that transparent network AP returns, then from message, extract the checking result, will verify that the result is shown to the user; If be proved to be successful, then change step (4) over to; If authentication failed then changes step (3.1) over to, the prompting user reselects transparent network;
Above-mentioned step (3.2) and step (3.3) have constituted a reciprocal process of network authentication request message and network verification response message; According to the difference of the indentification protocol of using, the mutual number of times of network authentication request message and network verification response message is different; For some agreement, may exist repeatedly reciprocal process;
Step (4): client is tested user's transparent network that select and that be proved to be successful, if transparent network satisfies the demand of client remote activation, then changes step (5), otherwise goes back to step (3);
This step prevents that transparent network that the user selects from can not effectively support the demand of client remote activation because the network bandwidth is low excessively, network delay is excessive, and this step embodiment step comprises as shown in Figure 2:
Step (4.1): the Client-Prompt user selects to test the parameter type of use, comprises two kinds of custom parameter and system default parameters; If the user selects custom parameter, then change step (4.2) over to; If user's selective system default parameters then changes step (4.3) over to;
Step (4.2): the Client-Prompt user imports following four test parameters successively: the minimum average bandwidth that the time that the ID of the operating system that test, test continue, test allow and the maximum average delay of permission; After user's input finished, four test parameters were set to user input values, change step (4.4) over to;
Step (4.3): test parameter is set to the system default parameter, comprising: the time that the ID of the operating system that test, test continue, (general range was that (general range is that (general range is 10ms~100ms) for 100Kbps~1Mbps) and the maximum average delay that allows to the minimum average bandwidth that allows of 10s~30s), test;
Step (4.4): user end to server sends test beginning request message; Include the test parameter that is provided with in step (4.2) or the step (4.3) in the message: time, the minimum average bandwidth of permission and the maximum average delay of permission that the operating system ID of test, test continue;
Step (4.5): after server is received test beginning request message, return test beginning response message; Include first read-write requests information that client will be sent in the test beginning response message; Read-write requests information comprises following content:
1) action type: read request/write request;
2) original position: the original position of the disk of read-write requests operation;
3) working length: the data length that reads or writes;
Step (4.6): client extracts read-write requests information wherein after receiving test beginning response message, in view of the above first read-write requests message is sent to server; Pick up counting simultaneously;
Step (4.7): after server is received read-write requests message, return the read-write response message; Comprised client read-write requests information next time in the read-write response message;
Step (4.8): client extracts read-write requests information wherein after receiving the read-write response message, sends read-write requests message next time to server;
In above-mentioned step (4.5) and step (4.7), server is determined client read-write requests information next time at every turn as follows:
1) in client remote activation operating system process, each read-write requests of client under the server record deposits start-up course read-write daily record successively in;
2) 1) afterwards, as client-requested test and 1) in during the identical operations system, article one recording start of reading and writing daily record from corresponding start-up course reads next bar record successively, as the read-write requests next time of client;
Step (4.9): judge whether test finishes: when timing arrived the time that the test of appointment continues, client stopped to send read-write requests message, and sends the EOT request message to server; Otherwise change step (4.8);
Step (4.10): after server is received the EOT request message, return the EOT response message;
Step (4.11): after client is received the EOT response message, send the test result request message to server; The test result request message comprises three information of operating system ID, average bandwidth, average delay of this test;
Step (4.12): after server was received the test result request message, logging test results returned the test result response message;
Step (4.13): after client is received the test result response message, judge whether whether test result satisfies the remote activation requirement, promptly meet the following conditions simultaneously:
1) average bandwidth in the test result is not less than the minimum average bandwidth of permission;
2) average delay in the test result is not higher than the maximum average delay of permission;
If satisfy, then forward step (5) to; Otherwise forward step (3.1) to, the user reselects transparent network;
Step (5): the start-up code of chip guide obtains the sign of this client from server;
Step (6): client is downloaded a script interpretive program and load operating from server;
Step (7): under the environment of above-mentioned script interpretive program operation, carry out, allow the user need select the operating system of loading by explanation to language scripts;
Step (8): client is from server down operation system kernel mirror image and load operating, each read-write requests of server record client, deposit start-up course read-write daily record in, use (in above-mentioned step (4.5) and step (4.7), read start-up course just and read and write information in the daily record) when having client carry out same operating system testing later on.
(above-mentioned steps (1)~step (4) is the treatment step of distinguishing characteristics of the present invention, step (5)~step (7) is the treatment step of the existing remote start-up method of transparent computing system, and step (8) is for the present invention is based on the step that the existing remote start-up method of transparent computing system is revised.)
The present invention is applicable to all kinds of transparent calculating client device of radio communications such as supporting Wi-Fi, ZigBee, Bluetooth, as notebook computer, PDA, mobile phone etc.The AP of wireless network can be the wireless network card of wireless router or server.Be that client, Wi-Fi are that the wireless network card of wireless network, server is that AP is elaborated as preferred embodiment below with PC.
The equipment that the embodiment of this method relates to comprises: remote activation client, remote start server and AP.Remote activation client hardware structure is identical with general PC, but does not have local hard drive, and is provided with one is used for the chip guide (adopting ROM or EPROM) that starts the operating system by the Wi-Fi network remote on mainboard.Server adopts general PC or server to get final product, and the remote activation service is installed on it.AP uses the wireless network card on the remote start server, only serves transparent network.
The equipment disposition that present embodiment adopts is as follows:
Client: Intel Celeron M 353 634MHz CPU, Intel i915GMS chipset, DDR2 667MHz512MB internal memory, Atheros AR5007EG 54Mbps wireless network card.
Server: Intel Core 2Duo T7200 2.0GHz CPU, Intel i945PM chipset, DDR2 667MHz2.0GB internal memory, HITACHI 120GB 5400RPM hard disk, Intel (R) PRO/Wireless 3945ABG 54Mbps wireless network card.
The flow process of client remote activation specifically may further comprise the steps as shown in Figure 1 in the present embodiment:
Step (1): client powers up, carry out the guidance code in the chip guide, according to the transparent network in the search cycle search current region that sets in advance, if search transparent network in the given time, the average bandwidth of the last remote activation of all operations system that the number of the operating system that the signal strength signal intensity of acquisition transparent network, transparent network are supported, transparent network are supported changes step (2), otherwise stop search, the remote activation failure.
According to IEEE 802.11 standards, the search of Wi-Fi network comprises two kinds of active searching and passive search:
(a) active searching: the searching request node is to Web broadcast Probe Request message, and AP can respond Probe Response message after receiving ProbeRequest message.The ProbeResponse message that the utilization of searching request node is received is known the network information.
(b) passive search: AP can periodically broadcast Beacon message and comes communication network information, and the searching request node is known the network information by monitoring Beacon message.
Above-mentioned Probe Request message is used for surveying the Wi-Fi network of current region, and Probe Response then is the message that AP returns to searching request side.The form of Probe Request message is as shown in table 2, comprises the information unit such as transmission rate, manufacturer's self-defined information of the SSID that will survey, this network support.The form of Probe Response message is as shown in table 2, comprise message delivery time transmitting terminal time, join the information such as functional requirement that the equipment of present networks need satisfy.The form of Beacon message and Probe Response are similar, do not do explanation here.
Table 2Probe Request message format
Sequence number Information unit Describe
??1 ??SSID The SSID of the network of surveying (value is 0 o'clock detection all-network)
??2 ??Supported?Rates The transmission rate of supporting
??3 ??Request?Information The information that will comprise among the indication Probe Response
??4 ??Extended?Supported??Rates The transmission rate of other support except Supported Rates
??Last ??Vendor?Specific Manufacturer's self-defined information
Table 3Probe Response message format
Sequence number Information unit Describe
??1 ??Timestamp The time of message delivery time transmitting terminal
??2 ??Beacon?Interval Time difference between the adjacent twice Beacon message
??3 ??Capability Indication joins the functional requirement that the equipment of present networks need satisfy
??4 ??Service?Set?Identifier??(SSID) Network identity
??5 ??Supported?Rates The transmission rate of network support
??6-22 Omit Omit
??Last-I ??Vendor?Specific Manufacturer's self-defined information
??Last-n ??Requested?Information Information requested among the corresponding Probe Request
In order only to allow transparent calculating client search transparent network, and general device can't search transparent network, and the AP of present embodiment only supports active searching.That is: the AP of present embodiment monitors Probe Request message, and returns ProbeResponse message; But active broadcast Beacon message not.
The detailed process of transparent network search is as follows:
Step (1.1): the guidance code among client executing ROM or the EPROM, the legitimacy and the integrality of inspection code self drive the Wi-Fi network interface card, prepare search Wi-Fi network.
Step (1.2): client picks up counting.
Step (1.3): client assembling Probe Request message, in the VendorSpecific information unit of Probe Request message, insert transparent computing information.The form of Vendor Specific information unit is as shown in table 4.Wherein, insert transparent network information among the Vendor-specific Content, the form of transparent network information is as shown in table 1, and the field that comprises has:
1) transparent computing system sign (4 byte);
2) ID of transparent network (32 byte);
3) number (2 byte) of the operating system of this transparent network support;
4) average bandwidth (8 byte) of the last remote activation of all operations system of this transparent network support;
5) ID of each operating system of Zhi Chiing (2 byte);
6) length of each operating system follow-up data of Zhi Chiing (1 byte);
7) title of each operating system of Zhi Chiing (1~50 byte);
The bandwidth (8 byte) of the last remote activation of 8) supporting of each operating system.
In Probe Request message, " transparent computing system sign " field is inserted " 54:72:61:6e ", other field zero setting.
Table 4Vendor Specific information unit form
The territory Length (byte) Describe
?Element?ID ??1 The ID of information unit
?Length ??1 The length of the information content (two the length sums in back)
?OUI ??3 Identification of the manufacturer
?Vendor-specific?Content ??0~252 The information content
Step (1.4): after transparent network AP receives Probe Request message, check whether the VendorSpecific information unit in the message comprises " transparent computing system sign " (54:72:61:6e), to judge that whether this request is from transparent calculating client.Request if not transparent calculating client then abandons it; If Probe Response message is then assembled in the request of transparent calculating client, the Vendor-specific Content in Vendor Specific territory inserts the transparent network information of this network in Probe Response message.Wherein, " transparent computing system sign " field is inserted " 54:72:61:6e ", " ID of transparent network " field is inserted the SSID of this transparent network, ensuing field is then inserted the operation system information of this network support respectively by form shown in the table 1, comprising: the bandwidth of the average bandwidth of the last remote activation of all operations system that the number of the operating system that this transparent network is supported, this transparent network are supported, the ID of each operating system, title, the last remote activation.After transparent network information is filled in and finished, Probe Response message is returned to client.
Step (1.5): after client is received Probe Response message, check in the message whether comprise " transparent computing system sign " (54:72:61:6e) to judge whether this network is transparent network.Message for nontransparent network directly abandons; Message for transparent network, the corresponding network information of client records comprises the average bandwidth of the number of the ID of this transparent network, operating system that this transparent network is supported, the last remote activation of all operations system that this transparent network is supported, the signal strength signal intensity of this transparent network.The average bandwidth of the last remote activation of all operations system of the number of the ID of transparent network, the operating system of support and support is that the Vendor-specific Content from the Vendor Specific unit of Probe Response message obtains.The mode that the signal strength signal intensity of transparent network obtains is: when the Wi-Fi network interface card is received message, can add that an extension header, this extension header include network signal intensity information (wireless network card obtains network signal intensity according to the size of the electromagnetic amplitude of receiving of wireless signal) in the message front; By extracting the network signal intensity information that extension header comprises, client can be known the signal strength signal intensity of this network.
Step (1.6): arrive the search cycle (default value is 2s) at every turn, then client judge current search to network whether meet the following conditions simultaneously:
1) searches a transparent network at least;
2) transparent network that searches of double search cycle comes to the same thing.
If satisfy, then search procedure finishes, and forwards step (2) to; Otherwise client timing zero clearing, reclocking forwards step (1.3) to.
Step (1.7):, then stop search if timing does not search any transparent network when arriving the scheduled time (default value is 15s).The search of Client-Prompt user current region can not provide transparent calculation services less than any transparent network, the failure of client remote activation.
Step (2): client sorts the transparent network that the searches average bandwidth according to the last remote activation of all operations system of the number of the operating system of the signal strength signal intensity of transparent network, transparent network support, transparent network support, and the transparent network tabulation that obtains after the ordering is shown to the user.The detailed process of this step is following, and (number of supposing the transparent network that step (1) searches is N, and N is a positive integer, and N transparent network is expressed as W respectively 1, W 2..., W N):
Step (2.1): basis signal intensity is by to weak N transparent network being sorted ordering back W by force 1, W 2..., W NRank be expressed as R successively 1,1, R 1,2..., R 1, N
Step (2.2): the number according to the operating system of supporting sorts to N transparent network from more to less, ordering back W 1, W 2..., W NRank be expressed as R successively 2,1, R 2,2..., R 2, N
Step (2.3): the average bandwidth according to the last remote activation of all operations system that supports sorts to N transparent network from high to low, ordering back W 1, W 2..., W NRank be expressed as R successively 3,1, R 3,2..., R 3, N
Step (2.4): the weight coefficient of three rank correspondences of definition is respectively α, β, γ (α>0, β>0, γ>0, alpha+beta+γ=1), calculates W 1, W 2..., W NFinal ranking coefficients R separately T, 1, R T, 2..., R T, N:
R t,i=α*R 1,i+β*R 2,i+γ*R 3,i(i=1,2,...,N);
The value of α, β, γ is respectively 0.3,0.4 in the present embodiment, and 0.3.
Step (2.5): according to R T, iAscending N transparent network sorted, the transparent network tabulation that obtains after the ordering is shown to the user.
Step (3): the transparent network that the user selects remote activation to use, client is carried out network identity validation to the transparent network that the user selects, if be proved to be successful, then changes step (4); Otherwise change step (3).
After step (2) is shown to the user with the transparent network tabulation, the transparent network that the user selects remote activation to use from the transparent network tabulation, the input key, client is finished network identity validation according to IEEE 802.11 standards afterwards.According to the IEEE802.11 standard, network identity validation uses Authentication message.The form of Authentication message is as shown in table 5.The client of embodiment has been inserted transparent computing information in the Vendor of Authentication message Specific information unit.Transparent network AP only provides the service for checking credentials to the request that comprises transparent computing information, and ignores other checking request message.
Concrete proof procedure is as follows:
Step (3.1): the transparent network that the user selects remote activation to use.
Step (3.2): client is inserted transparent network information according to the form assembling network authentication request message of Authentication message in the Vendor Specific information unit in message.The form of transparent network information is as shown in table 1.The same with Probe Request message, " transparent computing system sign " field is inserted " 54:72:61:6e ", other field zero setting in this transparent network information.
Step (3.3): after transparent network AP receives network authentication request message, whether the Vendor Specific information unit in the checking message comprises " transparent computing system sign " (54:72:61:6e), to judge that whether this request is from transparent computing system client.If not the message of transparent computing system client, then directly this network authentication request message is abandoned; If the request message of transparent computing system client, then extract the authorization information in the message, handle the form assembling network verification response message of back, insert transparent network information in the VendorSpecific information unit in the network verification response message according to Authentication message; " transparent computing system sign " field is inserted " 54:72:61:6e ", other field zero setting in the transparent network information; After transparent network information is filled in and finished this network verification response message is returned to client.
Step (3.4): after client is received the network verification response message, check whether the Vendor Specific information unit in the message comprises " transparent computing system sign " (54:72:61:6e), whether is transparent network to judge this network.Message for nontransparent network directly abandons; For the message of transparent network, from message, extract the checking result, will verify that the result is shown to the user.If be proved to be successful, then change step (4) over to; If authentication failed then changes step (3.1) over to, the prompting user reselects transparent network.
Above-mentioned step (3.2) and step (3.3) have constituted a reciprocal process of network authentication request message and network verification response message.According to the difference of the indentification protocol of using, the mutual number of times of network authentication request message and network verification response message is different.For some agreement, may exist repeatedly reciprocal process.
Table 5Authentication message format
Sequence number Information unit Describe
??1 ??Authentication?Algorithm?Number Identify different indentification protocols
??2 ??Authentication?Transaction?Sequence??Number The present located Qualify Phase is described
??3 ??Status?Code Whether the indication checking is successful
??4 ??Challenge?Text The challenge text that uses in the network verification process
Sequence number Information unit Describe
??Last ??Vendor?Specific Manufacturer's self-defined information
Step (4): client is tested user's transparent network that select and that be proved to be successful, if transparent network satisfies the demand of client remote activation, then changes step (5), otherwise goes back to step (3).
This step prevents that transparent network that the user selects from can not effectively support the demand of client remote activation because the network bandwidth is low excessively, network delay is excessive, and concrete steps comprise as shown in Figure 2:
Step (4.1): the Client-Prompt user selects to test the parameter type of use, comprises two kinds of custom parameter and system default parameters; If the user selects custom parameter, then change step (4.2) over to; If user's selective system default parameters then changes step (4.3) over to.
Step (4.2): the Client-Prompt user imports following four test parameters successively: the minimum average bandwidth that the time that the ID of the operating system that test, test continue, test allow and the maximum average delay of permission; After user's input finished, four test parameters were set to user input values, change step (4.4) over to.
Step (4.3): test parameter is set to the system default parameter, comprising: minimum average bandwidth (300Kbps) that the time (15s) that the ID of the operating system that test (ID of first operating system of this network support), test continue, test allow and the maximum average delay (10ms) that allows.
Step (4.4): user end to server sends test beginning request message, this message format is as shown in table 6, includes the test parameter that step (4.2) or step (4.3) are provided with in the message: time, the minimum average bandwidth of permission and the maximum average delay of permission that the operating system ID of test, test continue.
Table 6 test beginning request message
The territory Length (byte) Describe
?Type ??1 Type of message (value is 1)
?OSID ??2 The ID of the operating system of test
?Duration ??2 Time (the unit: s) that test continues
?MinThroughput ??8 Minimum average bandwidth (the unit: bit/s) that allows
?MaxDelay ??2 Maximum average delay (the unit: ms) that allows
Step (4.5): after server was received test beginning request message, the solicited message of record client was returned test beginning response message, and form is as shown in table 7.Include first read-write requests information that client will be sent in the test beginning response message, read-write requests information comprises:
1) action type: read request/write request;
2) original position: the original position of the disk of read-write requests operation;
3) working length: the data length that reads or writes.
The action type first time (NextOptType), original position (NextOffset) and working length (NextSize) in the test beginning response message is to read and write daily record from the start-up course of server to obtain, and hereinafter will be described this.
Table 7 test beginning response message
The territory Length (byte) Describe
?Type ??1 Type of message (value is 2)
?OSID ??2 The ID of the operating system of testing
?Duration ??2 Time (the unit: s) that test continues
?MinThroughput ??8 Minimum average bandwidth (the unit: bit/s) that allows
?MaxDelay ??2 Maximum average delay (the unit: ms) that allows
?NextOptType ??1 For the first time action type (value be 1 o'clock be write request, be 0 o'clock be read request)
?NextOffset ??8 The original position of the disk of read-write requests operation for the first time
?NextSize ??2 The data length that reads or writes for the first time
Step (4.6): client sends read-write requests message to server after receiving test beginning response message, picks up counting.The form of read-write requests message is as shown in table 8.The test returned by server of action type, original position, the working length of read-write requests message for the first time begins response message and obtains.For write request, according to the value of Size with the corresponding length zero setting in Data territory.
Table 8 read-write requests message format
The territory Length (byte) Describe
??Type ??1 Type of message (value is 3)
??OSID ??2 The ID of the operating system of test
??TimeStamp ??8 The time of message delivery time client
??OptType ??1 Action type (value be 1 o'clock be write request, be 0 o'clock be read request)
??Offset ??8 The original position of the disk of read-write requests operation
??Size ??2 The data length that reads or writes
The territory Length (byte) Describe
??Data ??0~1482 During write request this is arranged
Step (4.7): server returns the read-write response message to client after receiving the read-write requests message of client.The form of read-write response message is as shown in table 9.The same with test beginning response message, the next operation type (NextOptType) of read-write in the response message, original position (NextOffset) and next operation length (NextSize) are to read and write daily record from the start-up course of server to obtain next time, hereinafter will be described this.For read request, according to the value of Size with the corresponding length zero setting in Data territory.
Table 9 read-write response message
The territory Length (byte) Describe
??Type ??1 Type of message (value is 4)
??OSID ??2 The ID of the operating system of testing
??OptType ??1 This action type (value be 1 o'clock be write request, be 0 o'clock be read request)
??Offset ??8 The original position of the disk of this read-write requests operation
??Size ??2 The data length of this read-write
??NextOptType ??1 The next operation type (value be 1 o'clock be write request, be 0 o'clock be read request)
??NextOffset ??8 The original position of the disk of read-write requests operation next time
??NextSize ??2 The data length that next time reads or writes
??Data ??0~1482 The response message of read request just has this
Step (4.8): after client is received the read-write response message of server, extract the reading writing information (OptType, Offset, Size) in the message, if the read-write requests message that this reading writing information and client the last time send is different, then ignore this read-write response message, otherwise extract NextOptType, NextOffset, NextSize conduct reading writing information next time in the read-write response message, insert read-write requests message, mail to server.For write request, according to the value of Size with the corresponding length zero setting in Data territory.
For the statistical test result, embodiment has defined three variablees and has come record test data: the total amount of data of using the current success of variable TotalSize record to read and write, total time-delay of using TotalDelay to write down current read-write requests, use total number of TotalRequests record read-write requests, the initial value of above-mentioned three variablees is 0.
Client is obtained the Size value in the read-write response message when receiving each read-write response message, upgrade three variablees as follows:
TotalSize=TotalSize+Size;
TotalDelay=TotalDelay+ (current time-TimeStamp);
TotalRequests=TotalRequests+1;
TimeStamp in the following formula is the time (seeing Table the TimeStamp item in 8) of client client when sending read-write requests message corresponding to this read-write response message.
In above-mentioned step (4.5) and step (4.7), server is determined client read-write requests information next time at every turn as follows:
1) in client remote activation operating system process, each read-write requests of client under the server record deposits start-up course read-write daily record successively in, and table 10 is examples of one section start-up course read-write daily record.
2) 1) afterwards, as client-requested test and 1) in during the identical operations system, article one recording start of reading and writing daily record from corresponding start-up course reads next bar record successively, as the read-write requests next time of client.First line item of the daily record of the corresponding start-up course read-write of action type (NextOptType), original position (NextOffset) and working length (NextSize) for the first time in the step (4.5).Each in the step (4.7) determined next operation type (NextOptType), original position (NextOffset) and next operation length (NextSize) then are to begin to read successively from second line item that start-up course is read and write daily record next time.
3) if before the operating system of client-requested test not by the remote activation mistake, then server produces client read-write requests message next time at random.The distribution principle of Chan Shenging is as follows at random:
(a) action type: read request, write request respectively account for 50%;
(b) original position: the original position of read-write is evenly distributed in the disk scope;
(c) working length: the length that reads and writes data is 1KB.
Table 10 start-up course read-write daily record
Sequence number Action type Original position (byte) Working length (byte)
??1 Read ??8510485762 ??572
??2 Write ??2469852352 ??1242
??3 Write ??1323741824 ??748
??...
Step (4.9): judge whether test finishes: when timing arrived the time that the test of appointment continues, client stopped to send read-write requests message, and simultaneously, user end to server sends the EOT request message; Otherwise change step (4.8).
Table 11 EOT request message
The territory Length (byte) Describe
??Type ??1 Type of message (value is 5)
??OSID ??2 The ID of the operating system of test
Step (4.10): after server is received the EOT request message of client, send the EOT response message to client.The form of EOT response message is as shown in table 12.
Table 12 EOT response message
The territory Length (byte) Describe
??Type ??1 Type of message (value is 6)
??OSID ??2 The ID of the operating system of test
Step (4.11): after client received that server test finishes response message, the statistical test data sent the test result request message to server.The form of test result request message is as shown in table 13.
Table 13 test result request message
The territory Length (byte) Describe
??Type ??1 Type of message (value is 7)
??OSID ??2 The ID of the operating system of test
??AvgThroughput ??8 The average bandwidth of this test
??AvgDelay ??2 The average delay of this test
Averaging network bandwidth, the AvgDelay that AvgThroughput in the test result message refers to client in the test process refers to the average delay of each read-write requests message of client, three variable: TotalSize, TotalDelay in the integrating step (4.8), TotalRequests, calculate acquisition in the following way:
AvgThroughput=TotalSize/Duration;
AvgDelay=TotalDelay/TotalRequests;
(Duration in the following formula is the time that test continues, and sees Table 6.)
Step (4.12): after server is received the test result request message of client, send the test result response message to client.The form of test result response message is as shown in table 14.
Table 14 test result response message
The territory Length (byte) Describe
??Type ??1 Type of message (value is 8)
??OSID ??2 The ID of the operating system of test
?AvgThroughput ??8 The average bandwidth of this test
?AvgDelay ??2 The average delay of this test
Step (4.13): after client is received the test result response message, judge whether whether test result satisfies the remote activation requirement, promptly meet the following conditions simultaneously:
1) average bandwidth in the test result is not less than the minimum average bandwidth (AvgThroughput>=MinThroughput) of permission;
2) average delay in the test result is not higher than the maximum average delay (AvgDelay<=MaxDelay) of permission.
If satisfy, then forward step (5) to; Otherwise forward step (3.1) to, the user reselects transparent network.
Step (5): the start-up code of chip guide obtains the sign of this client from server.
Step (6): client is downloaded a script interpretive program and load operating from server.
Step (7): under the environment of above-mentioned script interpretive program operation, carry out, allow the user need select the operating system of loading by explanation to language scripts.
Step (8): client is from server down operation system kernel mirror image and load operating.In downloading process, server can write down each read-write requests of client, as start-up course read-write daily record, uses when having client to carry out same operating system testing later on.Table 10 is examples of one section start-up course read-write daily record.In above-mentioned step (4.5) and step (4.7), read the information in the start-up course read-write daily record just.In downloading process, server also can write down the bandwidth in the client terminal start-up process, and the content that record comprises is as shown in Table 15.After download finishes, calculate the average bandwidth (the startup bandwidth record of other operating system that has had before comprehensive) of all operations system remote startup of this server support according to the bandwidth in the start-up course." bandwidth of the last remote activation of each operating system of support " among the Vendor-specific Content in the ProbeResponse message that web search stage transparent network AP (wireless network card of server) sends, " average bandwidth of the last remote activation of all operations system of support " are exactly to obtain thus.Start-up course read-write daily record and startup bandwidth record can be stored in the databases such as MySQL, Oracle, also can store with document form.Present embodiment is stored in the text.
Table 15 starts the bandwidth record
Title Describe
??OSID Operating system ID
??OSName OS name
??SSID Network identity
??ClientID Client identification
??Throughput The bandwidth of start-up course
So far, all implementation steps of present embodiment all have been described in detail.The present invention is not limited to the foregoing description, and those skilled in the art all are considered as within the scope of the present invention in the technical scheme of carrying out on the basis that does not break away from the substantive thought of the present invention obtaining after various modifications and the improvement.Applicable scope of the present invention is as the criterion with claims and determines.

Claims (5)

1. method by the WLAN (wireless local area network) remotely starting transparent computing system client is characterized in that this method may further comprise the steps:
Step (1): client powers up, carry out the guidance code in the chip guide, according to the transparent network in the search cycle search current region that sets in advance, if search transparent network in the given time, the average bandwidth of the last remote activation of all operations system that the number of the operating system that the signal strength signal intensity of acquisition transparent network, transparent network are supported, transparent network are supported changes step (2), otherwise stop search, the remote activation failure;
Step (2): client sorts the transparent network that the searches average bandwidth according to the last remote activation of all operations system of the number of the operating system of the signal strength signal intensity of transparent network, transparent network support, transparent network support, and the transparent network tabulation that obtains after the ordering is shown to the user;
Step (3): the transparent network that the user selects remote activation to use, client is carried out network identity validation to the transparent network that the user selects, if be proved to be successful, then changes step (4); Otherwise change step (3);
Step (4): client is tested user's transparent network that select and that be proved to be successful, if transparent network satisfies the demand of client remote activation, then changes step (5), otherwise goes back to step (3);
Step (5): the start-up code of chip guide obtains the sign of this client from server;
Step (6): client is downloaded a script interpretive program and load operating from server;
Step (7): under the environment of above-mentioned script interpretive program operation, carry out, allow the user need select the operating system of loading by explanation to language scripts;
Step (8): client is from server down operation system kernel mirror image and load operating, and each read-write requests of server record client deposits start-up course read-write daily record in, uses when having client to carry out same operating system testing later on.
2. method according to claim 1 is characterized in that described step (1) specifically may further comprise the steps:
Step (1.1): the guidance code among client executing chip guide ROM or the EPROM, the legitimacy and the integrality of inspection code self drive wireless network card, prepare the search wireless network;
Step (1.2): client picks up counting;
Step (1.3): client is broadcasted this network search request message insert the transparent computing system sign in the manufacturer self-defined information territory of network search request message after;
Step (1.4): after transparent network AP receives network search request message, check manufacturer self-defined information territory, the request if not transparent computing system client then abandons it; If the request of transparent computing system client, then in the manufacturer custom zone of web search response message, insert the transparent network information of the transparent network at this AP place, return the web search response message to client;
Step (1.5): after client is received the web search response message, verify the message whether this message returned for transparent network AP by manufacturer self-defined information territory; If this message is not the message that transparent network AP returns, then it is abandoned; If this message is the message that transparent network AP returns, then write down the average bandwidth of the number of the ID of this transparent network, operating system that this transparent network is supported, the last remote activation of all operations system that this transparent network is supported and the signal strength signal intensity of this transparent network;
Step (1.6): arrive the search cycle at every turn, then client judge current search to network whether meet the following conditions simultaneously:
1) searches a transparent network at least;
2) transparent network that searches of double search cycle comes to the same thing;
If satisfy, then search procedure finishes, and forwards step (2) to; Otherwise client timing zero clearing, reclocking forwards step (1.3) to;
Step (1.7):, then stop search if timing does not search any transparent network when arriving the scheduled time; The search of Client-Prompt user current region can not provide transparent calculation services less than any transparent network, the failure of client remote activation.
3. method according to claim 1 is characterized in that described step (2) specifically may further comprise the steps: the number of establishing the transparent network that step (1) searches is N, and N is a positive integer, and N transparent network is expressed as W respectively 1, W 2..., W N:
Step (2.1): basis signal intensity is by to weak N transparent network being sorted ordering back W by force 1, W 2..., W NRank be expressed as R successively 1,1, R 1,2..., R 1, N
Step (2.2): the number according to the operating system of supporting sorts to N transparent network from more to less, ordering back W 1, W 2..., W NRank be expressed as R successively 2,1, R 2,2..., R 2, N
Step (2.3): the average bandwidth according to the last remote activation of all operations system that supports sorts to N transparent network from high to low, ordering back W 1, W 2..., W NRank be expressed as R successively 3,1, R 3,2..., R 3, N
Step (2.4): the weight coefficient of three rank correspondences of definition is respectively α, β, γ (α>0, β>0, γ>0, alpha+beta+γ=1), calculates W 1, W 2..., W NFinal ranking coefficients R separately T, 1, R T, 2..., R T, N:
R t,i=α*R 1,i+β*R 2,i+γ*R 3,i(i=1,2,...,N);
Step (2.5): according to R T, iAscending N transparent network sorted, the transparent network tabulation that obtains after the ordering is shown to the user.
4. method according to claim 1 is characterized in that described step (3) specifically may further comprise the steps:
Step (3.1): the user selects transparent network;
Step (3.2): client is inserted transparent computing system sign in the manufacturer self-defined information territory of network authentication request message, and the AP of the transparent network of selecting to the user sends network authentication request message;
Whether step (3.3): after transparent network AP receives network authentication request message, checking the manufacturer self-defined information territory in the message, is the request message of transparent computing system client to judge this message; If not the request message of transparent computing system client, then directly this network authentication request message is abandoned; If the request message of transparent computing system client then extracts the authorization information in the message, in the manufacturer self-defined information territory of network verification response message, insert the transparent computing system sign, return the network verification response message to client;
Step (3.4): after client is received the network verification response message, verify the message whether this message returned for transparent network AP by manufacturer self-defined information territory; If this message is not the message that transparent network AP returns, then it is abandoned; If this message is the message that transparent network AP returns, then from message, extract the checking result, will verify that the result is shown to the user; If be proved to be successful, then change step (4) over to; If authentication failed then changes step (3.1) over to, the prompting user reselects transparent network.
5. method according to claim 1 is characterized in that described step (4) specifically may further comprise the steps:
Step (4.1): the Client-Prompt user selects to test the parameter type of use, comprises two kinds of custom parameter and system default parameters; If the user selects custom parameter, then change step (4.2) over to; If user's selective system default parameters then changes step (4.3) over to;
Step (4.2): the Client-Prompt user imports following four test parameters successively: the minimum average bandwidth that the time that the ID of the operating system that test, test continue, test allow and the maximum average delay of permission; After user's input finished, four test parameters were set to user input values, change step (4.4) over to;
Step (4.3): test parameter is set to the system default parameter, comprising: the minimum average bandwidth that the time that the ID of the operating system that test, test continue, test allow and the maximum average delay of permission;
Step (4.4): user end to server sends test beginning request message; Include the test parameter that is provided with in step (4.2) or the step (4.3) in the message: time, the minimum average bandwidth of permission and the maximum average delay of permission that the operating system ID of test, test continue;
Step (4.5): after server is received test beginning request message, return test beginning response message; Include first read-write requests information that client will be sent in the test beginning response message;
Step (4.6): client extracts read-write requests information wherein after receiving test beginning response message, in view of the above first read-write requests message is sent to server; Pick up counting simultaneously;
Step (4.7): after server is received read-write requests message, return the read-write response message; Comprised client read-write requests information next time in the read-write response message;
Step (4.8): client extracts read-write requests information wherein after receiving the read-write response message, sends read-write requests message next time to server;
Step (4.9): judge whether test finishes: when timing arrived the time that the test of appointment continues, client stopped to send read-write requests message, and sends the EOT request message to server; Otherwise, change step (4.8);
Step (4.10): after server is received the EOT request message, return the EOT response message;
Step (4.11): after client is received the EOT response message, send the test result request message to server; The test result request message comprises three information of operating system ID, average bandwidth, average delay of this test;
Step (4.12): after server was received the test result request message, logging test results returned the test result response message;
Step (4.13): after client is received the test result response message, judge whether whether test result satisfies the remote activation requirement, promptly meet the following conditions simultaneously:
1) average bandwidth in the test result is not less than the minimum average bandwidth of permission;
2) average delay in the test result is not higher than the maximum average delay of permission;
If satisfy, then forward step (5) to; Otherwise the user reselects transparent network.
CN2010101397443A 2010-04-02 2010-04-02 Method for remotely starting transparent computing system client through wireless local area network Active CN101834888B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2010101397443A CN101834888B (en) 2010-04-02 2010-04-02 Method for remotely starting transparent computing system client through wireless local area network

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2010101397443A CN101834888B (en) 2010-04-02 2010-04-02 Method for remotely starting transparent computing system client through wireless local area network

Publications (2)

Publication Number Publication Date
CN101834888A true CN101834888A (en) 2010-09-15
CN101834888B CN101834888B (en) 2012-11-14

Family

ID=42718817

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2010101397443A Active CN101834888B (en) 2010-04-02 2010-04-02 Method for remotely starting transparent computing system client through wireless local area network

Country Status (1)

Country Link
CN (1) CN101834888B (en)

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101964821A (en) * 2010-10-12 2011-02-02 北京中科院软件中心有限公司 Method and system for loading operating environment of remote terminal
CN102447564A (en) * 2010-09-30 2012-05-09 株式会社东芝 Remote activating device
CN102571283A (en) * 2012-01-19 2012-07-11 神州数码网络(北京)有限公司 Method and system for testing message of wireless network device
CN102664958A (en) * 2012-04-27 2012-09-12 中山大学 Transparent computing system
WO2014198084A1 (en) * 2013-06-09 2014-12-18 中兴通讯股份有限公司 Wifi module activation method, system and mobile terminal
CN104380808A (en) * 2012-06-29 2015-02-25 微软公司 Determining availability of an access network
CN104866771A (en) * 2015-04-07 2015-08-26 国家电网公司 Transparent-computing-based integrated management method and system for information safety equipment
CN105511880A (en) * 2015-12-11 2016-04-20 中南大学 Transparent computing based intelligent software starting method
CN103853586B (en) * 2014-03-05 2017-02-08 中南大学 Method of realizing wireless card driver in UEFI (unified extensible firmware interface) layer
CN106953756A (en) * 2017-03-17 2017-07-14 腾讯科技(深圳)有限公司 The simulation time-delay method and server of a kind of business datum
US10154452B2 (en) 2012-06-29 2018-12-11 Microsoft Technology Licensing, Llc Determining suitability of an access network

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1604528A (en) * 2004-11-12 2005-04-06 清华大学 Cooperative starting method for network computer
US20060117172A1 (en) * 2004-11-12 2006-06-01 Yaoxue Zhang Method and computing system for transparence computing on the computer network
CN101232396A (en) * 2006-12-15 2008-07-30 株式会社Ntt都科摩 Remote start system, remote start server and communication terminal

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1604528A (en) * 2004-11-12 2005-04-06 清华大学 Cooperative starting method for network computer
US20060117172A1 (en) * 2004-11-12 2006-06-01 Yaoxue Zhang Method and computing system for transparence computing on the computer network
CN101232396A (en) * 2006-12-15 2008-07-30 株式会社Ntt都科摩 Remote start system, remote start server and communication terminal

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
《电子学报》 20041231 张尧学 透明计算: 概念、结构和示例 169-173页 1-5 第32卷, 第12A期 *

Cited By (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102447564A (en) * 2010-09-30 2012-05-09 株式会社东芝 Remote activating device
CN102447564B (en) * 2010-09-30 2014-11-12 株式会社东芝 Remote activating device
CN101964821A (en) * 2010-10-12 2011-02-02 北京中科院软件中心有限公司 Method and system for loading operating environment of remote terminal
CN102571283A (en) * 2012-01-19 2012-07-11 神州数码网络(北京)有限公司 Method and system for testing message of wireless network device
CN102664958A (en) * 2012-04-27 2012-09-12 中山大学 Transparent computing system
US10154452B2 (en) 2012-06-29 2018-12-11 Microsoft Technology Licensing, Llc Determining suitability of an access network
CN104380808A (en) * 2012-06-29 2015-02-25 微软公司 Determining availability of an access network
CN104380808B (en) * 2012-06-29 2019-01-04 微软技术许可有限责任公司 For determining the mobile terminal and medium of the availability of access network
WO2014198084A1 (en) * 2013-06-09 2014-12-18 中兴通讯股份有限公司 Wifi module activation method, system and mobile terminal
CN103853586B (en) * 2014-03-05 2017-02-08 中南大学 Method of realizing wireless card driver in UEFI (unified extensible firmware interface) layer
CN104866771A (en) * 2015-04-07 2015-08-26 国家电网公司 Transparent-computing-based integrated management method and system for information safety equipment
CN104866771B (en) * 2015-04-07 2017-07-07 国家电网公司 A kind of information safety devices integrated management method and system based on lucidification disposal
CN105511880A (en) * 2015-12-11 2016-04-20 中南大学 Transparent computing based intelligent software starting method
CN105511880B (en) * 2015-12-11 2019-03-26 中南大学 A kind of software intelligent starting method based on lucidification disposal
CN106953756A (en) * 2017-03-17 2017-07-14 腾讯科技(深圳)有限公司 The simulation time-delay method and server of a kind of business datum
CN106953756B (en) * 2017-03-17 2020-04-07 腾讯科技(深圳)有限公司 Simulation delay method of service data and server

Also Published As

Publication number Publication date
CN101834888B (en) 2012-11-14

Similar Documents

Publication Publication Date Title
CN101834888B (en) Method for remotely starting transparent computing system client through wireless local area network
CN105933888B (en) A kind of eSIM card method for burn-recording and device based on NFC
CN103986776B (en) A kind of router and the method for down loading based on router
EP3089484A1 (en) Device for alternately broadcasting different low-energy beacons as configured by a remote server
US10057302B2 (en) Context-based selection of instruction sets for connecting through captive portals
WO2018107593A1 (en) Method and device for sharing file between different terminals
CN109710270A (en) A kind of security application delivery method, device and storage medium
CN103281673A (en) Business information push service system and method
CN103415014B (en) The method and apparatus authenticated is carried out for mobile terminal
CN103596177A (en) Method for making mobile terminal get access to public WiFi in one-key mode
CN103857007A (en) Wireless local area network access system and method
CN102710634A (en) Intelligent WIFI (Wireless Fidelity) sharing system
CN105912419A (en) Backup method and device for application programs
CN103139137A (en) Method and device for providing network service
CN105357224B (en) A kind of registration of intelligent domestic gateway, removing method and system
CN106921460A (en) Signal shielding system and method based on wireless network
CN104320863A (en) Wireless network access method applied to mobile terminal and mobile terminal
CN104185195A (en) Mobile web performance measuring method, device and system
CN105873180B (en) Method and apparatus for setting up wireless connection
CN103973343A (en) Communication method and system
CN102685155B (en) The method that content transmits, content delivering server and content transmit proxy server
CN105871851B (en) Based on SaaS identity identifying method
CN104301419A (en) Non-local-machine remote download control system and method
CN106413001A (en) Flow control method and device of wireless network connection
CN101350020A (en) Method, apparatus and system for verifying embedded type file system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20210408

Address after: 410000 Yuelu District Yuelu street, Changsha, Hunan Province, 5 left 101 rooms of R & D headquarters of Central South University Science Park.

Patentee after: HUNAN NEW CLOUDNET TECHNOLOGY Co.,Ltd.

Address before: 100084 No. 1 Tsinghua Yuan, Beijing, Haidian District

Patentee before: TSINGHUA University