CN107911787B - Coverage hole detection method and system - Google Patents

Coverage hole detection method and system Download PDF

Info

Publication number
CN107911787B
CN107911787B CN201711140659.7A CN201711140659A CN107911787B CN 107911787 B CN107911787 B CN 107911787B CN 201711140659 A CN201711140659 A CN 201711140659A CN 107911787 B CN107911787 B CN 107911787B
Authority
CN
China
Prior art keywords
client
signal strength
coverage hole
signal
coverage
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201711140659.7A
Other languages
Chinese (zh)
Other versions
CN107911787A (en
Inventor
王红雷
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
CHENGDU SKSPRUCE TECHNOLOGY Inc
Original Assignee
CHENGDU SKSPRUCE TECHNOLOGY Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by CHENGDU SKSPRUCE TECHNOLOGY Inc filed Critical CHENGDU SKSPRUCE TECHNOLOGY Inc
Priority to CN201711140659.7A priority Critical patent/CN107911787B/en
Priority to PCT/CN2017/117345 priority patent/WO2019095498A1/en
Publication of CN107911787A publication Critical patent/CN107911787A/en
Application granted granted Critical
Publication of CN107911787B publication Critical patent/CN107911787B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W24/00Supervisory, monitoring or testing arrangements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W64/00Locating users or terminals or network equipment for network management purposes, e.g. mobility management

Abstract

The invention provides a method and a system for detecting a coverage hole. The method comprises the following steps: the method comprises the steps that the AP acquires signal intensity between the AP and each client, and sends the acquired signal intensity to the AC; the AC compares the signal intensity between the same client and each AP with a preset signal intensity threshold value, judges that suspected coverage holes exist in the corresponding positions of the clients when the signal intensity corresponding to the clients is smaller than the preset signal intensity threshold value, and sends the signal intensity corresponding to the clients with the suspected coverage holes in the corresponding positions to a positioning server; and the positioning server positions the position of the client according to the position of each AP and the signal intensity corresponding to the client, detects the number of the clients at the position, and judges whether the position has a coverage hole according to the detection result. The method is high in detection precision, low in misjudgment rate and short in time consumption, and the specific position of the coverage hole can be accurately determined.

Description

Coverage hole detection method and system
Technical Field
The invention relates to the technical field of data communication, in particular to a method and a system for detecting a coverage hole.
Background
The method for detecting the wireless network coverage holes mainly adopted in the current data communication industry is a method for detecting the coverage holes by recording the number of clients which work at low RSSI for a long time and do not roam around some APs in the network coverage range and judging that the coverage holes exist around the APs when the recorded number exceeds a certain limit value. However, the detection precision of this method is not high, erroneous judgment is easy to occur, and the detection time is too long, so that the specific position of the coverage hole cannot be accurately determined.
Disclosure of Invention
In order to overcome the defects in the prior art, the invention aims to provide a method and a system for detecting a coverage hole.
As for the method for detecting a coverage hole, a preferred embodiment of the present invention provides a method for detecting a coverage hole, where the method includes:
the method comprises the steps that the AP acquires signal intensity between the AP and each client, and sends the acquired signal intensity to the AC;
the AC compares the signal intensity between the same client and each AP in the signal coverage range with a preset signal intensity threshold value, judges that a suspected coverage hole exists in the position corresponding to the client when the signal intensity between the client and each AP is smaller than the preset signal intensity threshold value, and sends the signal intensity between the client with the suspected coverage hole in the corresponding position and each AP to a positioning server;
and the positioning server positions the position of the client according to the position of each AP and the signal strength between the client and each AP, detects the number of the clients at the position, and judges whether coverage holes exist in the position according to the detection result.
As for the coverage hole detection system, a preferred embodiment of the present invention provides a coverage hole detection system, which includes:
the wireless access equipment AP is used for acquiring the signal intensity between the wireless access equipment AP and each client and sending the acquired signal intensity to the wireless controller AC;
the wireless controller AC is used for comparing the signal strength between the same client and each AP in the signal coverage range with a preset signal strength threshold value, judging that the position corresponding to the client has a suspected coverage hole when the signal strength between the client and each AP is smaller than the preset signal strength threshold value, and sending the signal strength between the client having the suspected coverage hole and each AP in the corresponding position to the positioning server
And the positioning server is used for positioning the position of the client according to the position of each AP and the signal strength between the client and each AP, detecting the number of the clients at the position, and judging whether coverage holes exist in the position according to the detection result.
Compared with the prior art, the coverage hole detection method and the system provided by the preferred embodiment of the invention have the following beneficial effects: the coverage hole detection method is high in detection precision, low in misjudgment rate and short in time consumption, and can accurately determine the specific position of the coverage hole. Firstly, the method acquires signal intensity between the wireless access device AP and each client, and sends the acquired signal intensity to a wireless controller AC; then, the method compares the signal intensity between the same client and each AP in the signal coverage range with a preset signal intensity threshold value through the AC, judges that a suspected coverage hole exists in a position corresponding to the client when the signal intensity between the client and each AP is smaller than the preset signal intensity threshold value, and sends the signal intensity between the client and each AP of which the corresponding position has the suspected coverage hole to a positioning server; and finally, the method positions the position of the client through the positioning server according to the position of each AP and the signal strength between the client and each AP, detects the number of the clients at the position, and judges whether the position has a coverage hole according to the detection result, thereby realizing the coverage hole detection which has high detection precision, low misjudgment rate, short time consumption and can accurately position the coverage hole.
In order to make the aforementioned and other objects, features and advantages of the present invention comprehensible, preferred embodiments accompanied with figures are described in detail below.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings needed to be used in the embodiments are briefly described below, it should be understood that the following drawings only illustrate some embodiments of the present invention, and therefore should not be considered as limiting the scope of the claims of the present invention, and it is obvious for those skilled in the art that other related drawings can be obtained according to the drawings without inventive efforts.
Fig. 1 is an interaction diagram between a coverage hole detection system and at least one client according to a preferred embodiment of the present invention.
Fig. 2 is a flowchart illustrating a coverage hole detection method according to a preferred embodiment of the present invention.
Fig. 3 is a flowchart illustrating the sub-steps included in step S210 shown in fig. 2.
Fig. 4 is another flow chart illustrating the sub-steps included in step S210 shown in fig. 2.
Fig. 5 is a flowchart illustrating the sub-steps included in step S220 shown in fig. 2.
Icon: 10-a coverage vulnerability detection system; 11-AP; 12-AC; 13-a location server; 20-client side.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, but not all, embodiments of the present invention. The components of embodiments of the present invention generally described and illustrated in the figures herein may be arranged and designed in a wide variety of different configurations.
Thus, the following detailed description of the embodiments of the present invention, presented in the figures, is not intended to limit the scope of the invention, as claimed, but is merely representative of selected embodiments of the invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
It should be noted that: like reference numbers and letters refer to like items in the following figures, and thus, once an item is defined in one figure, it need not be further defined and explained in subsequent figures.
In the description of the present invention, it should be noted that, unless otherwise explicitly specified or limited, the terms "disposed," "mounted," "connected," and "connected" are to be construed broadly, e.g., as meaning either a fixed connection, a removable connection, or an integral connection; can be mechanically or electrically connected; they may be connected directly or indirectly through intervening media, or they may be interconnected between two elements. The specific meanings of the above terms in the present invention can be understood in specific cases to those skilled in the art.
Some embodiments of the invention are described in detail below with reference to the accompanying drawings. The embodiments described below and the features of the embodiments can be combined with each other without conflict.
Referring to fig. 1, an interaction diagram between a coverage hole detection system 10 and at least one client 20 according to a preferred embodiment of the present invention is shown. In the embodiment of the present invention, the coverage hole detection system 10 is in communication connection with the at least one client 20, and is configured to perform wireless network coverage on the at least one client 20, provide a network communication service for the at least one client 20, and perform detection on a coverage hole that may exist in a wireless network coverage range of the coverage hole detection system 10 by using the at least one client 20, where the detection is high in detection accuracy, low in false judgment rate, and short in time consumption, so as to perform accurate positioning on the coverage hole. In this embodiment, the coverage hole detection system 10 may include at least one wireless access device AP11, a wireless controller AC12, and a positioning server 13, where the wireless access device AP11 is configured to perform communication connection with a corresponding client 20, so as to provide a network communication service for the client 20 through a wireless network, and accordingly obtain signal strength between the corresponding client 20 and each wireless access device AP11 within a coverage area of the wireless network; the wireless controller AC12 is in communication connection with the at least one wireless access device AP11, and is configured to control communication power of the at least one wireless access device AP11, and process signal strength between each client 20 and each wireless access device AP11, which is sent by the at least one wireless access device AP11, so as to determine whether a suspected coverage hole exists at a position corresponding to each client 20; the positioning server 13 is used to further determine the location where the suspected coverage hole exists, so as to detect the real coverage hole. Wherein the wireless access device AP11 may be an electronic device with wireless access function; the positioning server 13 may be, but is not limited to, a cloud server, a cluster server, a distribution server, etc.; the client 20 may be, but is not limited to, a smart phone, a Personal Computer (PC), a tablet PC, a Personal Digital Assistant (PDA), a Mobile Internet Device (MID), and the like.
Fig. 2 is a schematic flow chart of a coverage hole detection method according to a preferred embodiment of the present invention. In the embodiment of the present invention, the coverage hole detection method is applied to the coverage hole detection system 10 shown in fig. 1, and specific flows and steps of the coverage hole detection method shown in fig. 2 are described in detail below.
In the embodiment of the invention, the method for detecting the coverage loophole comprises the following steps:
in step S210, the wireless access device AP11 acquires signal strength with each client 20, and transmits the acquired signal strength to the wireless controller AC 12.
Fig. 3 is a schematic flow chart illustrating the sub-steps included in step S210 shown in fig. 2. In this embodiment, the step S210 may include a sub-step S211 and a sub-step S212, wherein the sub-step S211 and the sub-step S212 are as follows:
in the substep S211, the AP11 sends a beacon-report message acquisition request to the client 20 communicatively connected to the AP11 according to a preset time interval.
In this embodiment, the beacon-report message acquisition request is used to acquire the beacon-report message corresponding to the client 20, the beacon-report message includes the signal strength between the client 20 and each AP11 within the signal scanning range thereof, where the beacon-report message may be a message meeting the 802.11K communication standard, and then the client 20 may be a smartphone or other mobile terminal supporting the 802.11K communication standard correspondingly. After receiving the beacon-report message acquisition request from the AP11, the client 20 responds to the beacon-report message acquisition request, and sends the beacon-report message of the client 20 to the AP 11. The preset time interval may be 30s, 50s, or 70s, and the specific time interval value may be set differently according to actual requirements.
In the substep S212, the AP11 receives the beacon-report packet corresponding to the beacon-report packet acquisition request sent by the client 20, analyzes the beacon-report packet to obtain the signal strength between the client 20 and each AP11, and sends the obtained signal strength between the client 20 and each AP11 to the AC 12.
In this embodiment, the AP11 obtains the signal strength between the corresponding client 20 and each AP11 within its signal scanning range by analyzing the received beacon-report message, and sends the signal strength between the client 20 and each AP11 within its signal scanning range to the AC12 through the network, so that the AC12 determines whether there is a suspected coverage hole at the position corresponding to the client 20 according to the signal strength between each client 20 and each corresponding AP 11.
Fig. 4 is a schematic flow chart illustrating the sub-steps included in step S210 shown in fig. 2. In this embodiment, the step S210 may further include a sub-step S213 and a sub-step S214, wherein the sub-step S213 and the sub-step S214 are as follows:
in the substep S213, the AP11 collects and receives the probe request messages broadcast by the clients 20, and obtains the signal strength between the AP11 and each client 20 based on the probe request messages.
In this embodiment, when the client 20 is not in communication connection with each AP11, the client 20 sends a probe request message to each AP11 in a broadcast manner, so as to access a wireless network corresponding to each AP 11. The AP11 correspondingly collects probe request messages broadcast by each client 20, and obtains the signal strength between the AP11 and the corresponding client 20 based on the RSSI in the received probe request messages.
In sub-step S214, the AP11 sends the obtained signal strength between the AP11 and each client 20 to the AC12 according to a preset time interval.
In this embodiment, after acquiring the signal strengths between the AP11 and the clients 20 in the signal coverage area thereof, the AP11 stores the acquired signal strengths, and correspondingly transmits the signal strengths between the AP11 and the clients 20 in the signal coverage area thereof to the AC12 at preset time intervals. The preset time interval may be 20s, 40s, or 80s, and the specific time interval value may be set differently according to actual requirements.
Referring to fig. 2 again, in step S220, the AC12 compares the signal strength between the same client 20 and each AP11 within the signal coverage with a preset signal strength threshold, determines that a suspected coverage hole exists in a location corresponding to the client 20 when the signal strength between the client 20 and each AP11 is smaller than the preset signal strength threshold, and sends the signal strength between the client 20 and each AP11 in the corresponding location where the suspected coverage hole exists to the location server 13.
In this embodiment, when the client 20 wants to access the wireless network corresponding to the AP11, the client 20 needs to be located within the signal coverage of the AP11, so that the client 20 can perform communication connection with the corresponding AP 11.
Optionally, please refer to fig. 5, which is a flowchart illustrating the sub-steps included in step S220 shown in fig. 2. In this embodiment, the step of comparing, by the AC12, the signal strength between the same client 20 and each AP11 in the signal coverage range with the preset signal strength threshold in the step S220 may include a sub-step S221 and a sub-step S222, where the sub-steps S221 and S222 are as follows:
sub-step S221, the AC12 obtains the signal strength between each client 20 and the APs 11 within the signal coverage.
In this embodiment, the AC12 may obtain the signal strength between the APs 11 of each client 20 within the signal coverage of the coverage hole detection system 10 by sorting the signal strength between the AP11 and the clients 20.
In sub-step S222, the AC12 compares the signal strength between each client 20 and each AP11 with a preset signal strength threshold respectively.
In this embodiment, the AC12 may determine whether there is a suspected coverage hole at the location of the corresponding client 20 by comparing the signal strength between the corresponding client 20 and each AP11 with a preset signal strength threshold.
In this embodiment, if the signal strength between the same client 20 and each AP11 in the signal coverage range of the coverage hole detection system 10 is smaller than the preset signal strength threshold, the AC12 may determine that a suspected coverage hole exists at the location where the corresponding client 20 is located, and at this time, the AC12 sends the signal strength between the client 20 corresponding to the suspected coverage hole at the location and each AP11 to the location server 13, so that the location server 13 further determines and detects the corresponding suspected coverage hole to determine whether the suspected coverage hole is a real coverage hole.
Step S230, the positioning server 13 positions the location of the client 20 according to the location of each AP11 and the signal strength between the client 20 and each AP11, detects the number of the clients 20 at the location, and determines whether a coverage hole exists in the location according to the detection result.
In this embodiment, the client 20 located by the location server 13 is the client 20 that has the suspected coverage hole at the corresponding location determined by the AC 12. The positioning server 13 may position the location of the client 20 according to the location of each AP11 in the signal coverage of the coverage hole detection system 10 and the signal strength between the client 20 and each AP11, of which the corresponding location is determined to have suspected coverage holes.
Optionally, in this embodiment, the step of the positioning server 13 positioning the location of the client 20 according to the location of each AP11 and the signal strength between the client 20 and each AP11 may include:
the positioning server 13 positions the position of the client 20 in the map by a triangulation algorithm or a signal fingerprint algorithm according to the distribution of the APs 11 in the map and the signal strength between the client 20 and each AP11, the corresponding position of which has a suspected coverage hole.
The location of the client 20 in the map is the location of the suspected coverage hole in the map.
In this embodiment, after the positioning server 13 positions the clients 20 having the suspected coverage holes in the corresponding positions, the number of the clients 20 in the positions corresponding to the suspected coverage holes is detected, and whether the suspected coverage holes in the corresponding positions are real coverage holes is determined according to the detection result.
Optionally, the step of detecting the number of the clients 20 at the location and determining whether the location has a coverage hole according to the detection result includes:
and if the existence of at least two positioned clients 20 at the position is detected, judging that the position has the coverage hole.
In this embodiment, the client 20 detected by the positioning server 13 at the position corresponding to the suspected coverage hole is the client 20 positioned by the positioning server 13.
Referring to fig. 1 again, in the embodiment of the present invention, the wireless access device AP11 is configured to acquire signal strength between the wireless access device AP and each client 20, and send the acquired signal strength to the wireless controller AC 12; the wireless controller AC12 is configured to compare signal strengths between the same client 20 and each AP11 within a signal coverage range with a preset signal strength threshold, determine that a suspected coverage hole exists in a position corresponding to the client 20 when the signal strengths between the client 20 and each AP11 are all smaller than the preset signal strength threshold, and send the signal strengths between the client 20 and each AP11 in the corresponding position where the suspected coverage hole exists to the positioning server 13; the positioning server 13 is configured to position the location of the client 20 according to the location of each AP11 and the signal strength between the client 20 and each AP11, detect the number of the clients 20 at the location, and determine whether a coverage hole exists in the location according to a detection result.
In an implementation manner of this embodiment, the manner in which the wireless access device AP11 acquires signal strength with each client 20 and sends the acquired signal strength to the wireless controller AC12 includes:
the AP11 sends a beacon-report message acquisition request to the client 20 in communication connection with the AP11 according to a preset time interval, wherein the beacon-report message includes the signal strength between the client 20 and each AP11 within a signal scanning range;
the AP11 receives the beacon-report message corresponding to the beacon-report message acquisition request sent by the client 20, analyzes the beacon-report message, obtains the signal strength between the client 20 and each AP11, and sends the obtained signal strength between the client 20 and each AP11 to the AC 12.
In another implementation manner of this embodiment, the manner in which the wireless access device AP11 acquires signal strength with each client 20 and sends the acquired signal strength to the wireless controller AC12 includes:
the AP11 collects and receives probe request messages broadcast by the clients 20, and obtains the signal strength between the AP11 and the clients 20 based on the probe request messages;
the AP11 sends the obtained signal strength between the AP11 and each client 20 to the AC12 at preset time intervals.
In this embodiment, the way for the wireless controller AC12 to compare the signal strength between the same client 20 and each AP11 within the signal coverage with the preset signal strength threshold includes:
the AC12 obtains signal strength between each client 20 and APs 11 within signal coverage;
the AC12 compares the signal strength of each client 20 with the APs 11 to preset signal strength thresholds, respectively.
In this embodiment, the method for the positioning server 13 to position the location of the client 20 according to the location of each AP11 and the signal strength between the client 20 and each AP11 includes:
the positioning server 13 positions the position of the client 20 in the map by a triangulation algorithm or a signal fingerprint algorithm according to the distribution of the APs 11 in the map and the signal strength between the client 20 and each AP11, the corresponding position of which has a suspected coverage hole.
The method for detecting the number of the clients 20 at the position by the positioning server 13 and determining whether the position has a coverage hole according to the detection result includes:
and if the existence of at least two positioned clients 20 at the position is detected, judging that the position has the coverage hole.
In summary, in the coverage hole detection method and system provided in the preferred embodiment of the present invention, the coverage hole detection method has high detection precision, low false positive rate and short time consumption, and can accurately determine the specific location of the coverage hole. Firstly, the method acquires signal intensity between the wireless access device AP and each client, and sends the acquired signal intensity to a wireless controller AC; then, the method compares the signal intensity between the same client and each AP in the signal coverage range with a preset signal intensity threshold value through the AC, judges that a suspected coverage hole exists in a position corresponding to the client when the signal intensity between the client and each AP is smaller than the preset signal intensity threshold value, and sends the signal intensity between the client and each AP of which the corresponding position has the suspected coverage hole to a positioning server; and finally, the method positions the position of the client through the positioning server according to the position of each AP and the signal strength between the client and each AP, detects the number of the clients at the position, and judges whether the position has a coverage hole according to the detection result, thereby realizing the coverage hole detection which has high detection precision, low misjudgment rate, short time consumption and can accurately position the coverage hole.
The above description is only a preferred embodiment of the present invention and is not intended to limit the present invention, and various modifications and changes may be made by those skilled in the art. Any modification, equivalent replacement, or improvement made within the spirit and principle of the present invention should be included in the protection scope of the present invention.

Claims (8)

1. A method for detecting a coverage hole is characterized by comprising the following steps:
the method comprises the steps that the AP acquires signal intensity between the AP and each client, and sends the acquired signal intensity to the AC;
the AC compares the signal intensity between the same client and each AP in the signal coverage range with a preset signal intensity threshold value, judges that a suspected coverage hole exists in the position corresponding to the client when the signal intensity between the client and each AP is smaller than the preset signal intensity threshold value, and sends the signal intensity between the client with the suspected coverage hole in the corresponding position and each AP to a positioning server;
the positioning server positions the position of the client according to the position of each AP and the signal strength between the client and each AP, detects the number of the clients at the position, and judges whether a coverage hole exists in the position according to a detection result, wherein the client positioned by the positioning server is the client judged by the AC and having a suspected coverage hole in the corresponding position;
the step of detecting the number of the clients at the position and judging whether the position has a coverage hole according to a detection result comprises the following steps:
and if the existence of at least two positioned clients at the position is detected, judging that the position has a coverage hole.
2. The method according to claim 1, wherein the step of the wireless access device AP acquiring signal strength with each client and sending the acquired signal strength to the wireless controller AC comprises:
the AP sends a beacon-report message acquisition request to a client side in communication connection with the AP according to a preset time interval, wherein the beacon-report message comprises the signal strength between the client side and each AP in a signal scanning range;
and the AP receives a beacon-report message which is sent by the client and corresponds to the beacon-report message acquisition request, analyzes the beacon-report message, obtains the signal strength between the client and each AP, and sends the obtained signal strength between the client and each AP to the AC.
3. The method according to claim 1, wherein the step of the wireless access device AP acquiring signal strength with each client and sending the acquired signal strength to the wireless controller AC comprises:
the AP collects and receives detection request messages broadcast and sent by each client, and obtains the signal strength between the AP and each client based on the detection request messages;
and the AP sends the obtained signal strength between the AP and each client to the AC according to a preset time interval.
4. The method according to any one of claims 1-3, wherein the step of comparing, by the AC, the signal strength between the same client and each AP in the signal coverage with a preset signal strength threshold comprises:
the AC acquires the signal strength between each client and each AP in the signal coverage range;
the AC compares the signal strength between each client and each AP with a preset signal strength threshold respectively.
5. The method according to any one of claims 1-3, wherein the step of the positioning server positioning the location of the client according to the location of each AP and the signal strength between the client and each AP comprises:
and the positioning server positions the position of the client in the map through a triangulation positioning algorithm or a signal fingerprint algorithm according to the distribution condition of each AP in the map and the signal strength between the client with suspected coverage holes at the corresponding position and each AP.
6. A coverage hole detection system, the system comprising:
the wireless access equipment AP is used for acquiring the signal intensity between the wireless access equipment AP and each client and sending the acquired signal intensity to the wireless controller AC;
the wireless controller AC is used for comparing the signal strength between the same client and each AP in the signal coverage range with a preset signal strength threshold value, judging that the position corresponding to the client has a suspected coverage hole when the signal strength between the client and each AP is smaller than the preset signal strength threshold value, and sending the signal strength between the client having the suspected coverage hole and each AP in the corresponding position to the positioning server
The positioning server is used for positioning the position of the client according to the position of each AP and the signal strength between the client and each AP, detecting the number of the clients at the position, and judging whether the position has a coverage hole or not according to a detection result, wherein the client positioned by the positioning server is the client judged by the AC to have a suspected coverage hole at the corresponding position;
the method for detecting the number of the clients at the position by the positioning server and judging whether the position has the coverage hole according to the detection result comprises the following steps:
and if the existence of at least two positioned clients at the position is detected, judging that the position has a coverage hole.
7. The system according to claim 6, wherein the manner of acquiring the signal strength with each client by the wireless access device AP and sending the acquired signal strength to the wireless controller AC includes:
the AP sends a beacon-report message acquisition request to a client side in communication connection with the AP according to a preset time interval, wherein the beacon-report message comprises the signal strength between the client side and each AP in a signal scanning range;
and the AP receives a beacon-report message which is sent by the client and corresponds to the beacon-report message acquisition request, analyzes the beacon-report message, obtains the signal strength between the client and each AP, and sends the obtained signal strength between the client and each AP to the AC.
8. The system according to claim 6, wherein the manner of acquiring the signal strength with each client by the wireless access device AP and sending the acquired signal strength to the wireless controller AC includes:
the AP collects and receives detection request messages broadcast and sent by each client, and obtains the signal strength between the AP and each client based on the detection request messages;
and the AP sends the obtained signal strength between the AP and each client to the AC according to a preset time interval.
CN201711140659.7A 2017-11-16 2017-11-16 Coverage hole detection method and system Active CN107911787B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201711140659.7A CN107911787B (en) 2017-11-16 2017-11-16 Coverage hole detection method and system
PCT/CN2017/117345 WO2019095498A1 (en) 2017-11-16 2017-12-20 Coverage hole detection method and system, positioning server, and readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711140659.7A CN107911787B (en) 2017-11-16 2017-11-16 Coverage hole detection method and system

Publications (2)

Publication Number Publication Date
CN107911787A CN107911787A (en) 2018-04-13
CN107911787B true CN107911787B (en) 2020-04-28

Family

ID=61846020

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711140659.7A Active CN107911787B (en) 2017-11-16 2017-11-16 Coverage hole detection method and system

Country Status (2)

Country Link
CN (1) CN107911787B (en)
WO (1) WO2019095498A1 (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116506932B (en) * 2023-06-28 2023-09-26 新华三技术有限公司 Power adjustment method, device, equipment and storage medium

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101420711A (en) * 2007-10-22 2009-04-29 华为技术有限公司 Method, the Apparatus and system of metrical information, detection covering problem are provided
CN101299867B (en) * 2007-12-27 2012-06-20 华为技术有限公司 Method, apparatus and system for detecting network cover
US8526368B2 (en) * 2011-05-17 2013-09-03 Qualcomm Incorporated Wi-Fi access point characteristics database
CN102905304B (en) * 2012-10-30 2016-08-03 中国联合网络通信集团有限公司 network coverage detection method and device
EP3025540A4 (en) * 2013-07-26 2017-03-15 Intel IP Corporation Signaling interference information for user equipment assistance
CN103634810B (en) * 2013-12-24 2017-04-12 英国Ranplan无线网络设计公司 Method of positioning problem regions covered with indoor wireless network
KR102284451B1 (en) * 2014-11-17 2021-08-02 삼성전자 주식회사 Method and apparatus for controlling operation of a access point in a wireless communication system

Also Published As

Publication number Publication date
WO2019095498A1 (en) 2019-05-23
CN107911787A (en) 2018-04-13

Similar Documents

Publication Publication Date Title
US10009718B2 (en) Sign-in method and device, sign-in server, and storage medium
US20120208549A1 (en) Automatic check-out upon location departure
CN106028279B (en) Network registration method and device
KR20130107267A (en) Agent-based bandwidth monitoring for predictive network selection
KR101360250B1 (en) Apparatus and method for reporting and perceiving a neighborhood object
US8539579B2 (en) Detecting spam short messages based on sending characteristics
CN106998554B (en) Pseudo base station identification method and device
CN107911787B (en) Coverage hole detection method and system
CN106604316B (en) Method, device and system for positioning fault of wireless access equipment
US11368846B2 (en) Threat detection apparatus and threat detection method therefor for wireless communication system
CN112419681B (en) Target early warning method, electronic device, and medium
EP3467547B1 (en) Service provision device, service provision method, and program recording medium
CN104572105B (en) Data-updating method and device
CN104348655A (en) Method and device for determining degree of safety and health of system
KR102333866B1 (en) Method and Apparatus for Checking Problem in Mobile Communication Network
CN113645625A (en) Pseudo base station positioning method and device, electronic equipment and readable medium
CN107071778A (en) Pseudo-base station recognition methods and data analysing method
CN107087076B (en) Position information transmission method, transmission device, computer device, and readable medium
KR20190089697A (en) Method for network state identification and electronic device thereof
CN109699041A (en) A kind of RRU channel failure diagnosis processing method and RRU device
CN105988835B (en) Software upgrading method and terminal
CN113923667A (en) Control method, device, equipment and medium for terminal equipment
CN108848508B (en) Pseudo base station identification method, mobile terminal and background system
CN114257573B (en) Method and device for detecting VOLTE voice function abnormality
CN111176868A (en) Abnormal information monitoring method, device, equipment and computer readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
PE01 Entry into force of the registration of the contract for pledge of patent right

Denomination of invention: Coverage vulnerability detection method and system

Effective date of registration: 20230920

Granted publication date: 20200428

Pledgee: Chengdu Rural Commercial Bank Co.,Ltd. high tech sub branch

Pledgor: CHENGDU SKSPRUCE TECHNOLOGY, Inc.

Registration number: Y2023510000220

PE01 Entry into force of the registration of the contract for pledge of patent right