Industrial field weak network environment optimization method
Technical Field
The invention belongs to the technical field of networks, and particularly relates to a weak network environment optimization method in the industrial field.
Background
With the development of internet technology, wireless Local Area Network (WLAN) networking technology has been developed rapidly, and an individual WLAN Network is established by deploying a plurality of Access Points (APs), and then Wireless Access service is provided. At present, a wireless network is generally applied to an office system, but no good solution is provided for the application in the industrial field, particularly for the optimization of the weak network environment of the vehicle-mounted layer.
Disclosure of Invention
In order to overcome the defects in the prior art, the invention provides a weak network environment optimization method in the industrial field.
In order to solve the technical problems, the invention provides the following technical scheme:
the invention provides a weak network environment optimization method in the industrial field, which comprises the following steps:
s1, each industrial device deploys an access point, and the access points and adjacent access points form a wireless local area network;
s2, the access equipment acquires the addresses of all access points covered by the current wireless local area network, and then manually or automatically selects one access point to access according to the signal intensity of each access point;
s3, the industrial equipment acquires the identity ID of the access equipment, the authorization level module carries out authorization level identification on the identity ID, and if the identification is successful, the authority function of the corresponding level is opened to the access equipment; if the identification fails, an alarm is given out, and an early warning event is generated and stored by the identity ID of the access equipment and the access operation record; the authorization level module is internally provided with at least one authorization level from top to bottom, and the authorization level is from top to bottom;
and S4, the access equipment uses each authority function opened to the access equipment, and the industrial equipment generates and stores the identity ID and the use operation record of the access equipment into an access equipment operation event.
As a preferred technical solution of the present invention, when an access point is manually selected to access in step S2, if the number of access devices connected to the access point is within a set threshold, the access will be successful; if the number of the access devices connected with the access point exceeds a set threshold value, a prompt is sent out, and the access point is reselected until the access is successful.
As a preferred technical solution of the present invention, when one access point is automatically selected to access in step S2, the access point with the strongest signal and the number of access devices connected to the access point within the set threshold is selected to access.
As a preferred technical solution of the present invention, when the authorization level module performs authorization level identification on the identity ID in step S3, the identity ID is sequentially identified according to the levels from bottom to top, and the business event data is recorded and stored for later analysis. The method can identify and filter illegal access or network attack.
As a preferred technical solution of the present invention, the authority function in step S4 includes a viewing function, a demonstration function, and an operation function, the industrial device generates an access device viewing operation event, an access device demonstration operation event, and an access device operation event from the identification ID of the access device and the viewing operation record, the demonstration operation record, and the operation record, and stores the access device viewing operation event, the access device demonstration operation event, and the access device operation event, the viewing operation record including a viewing operation action and each action duration, the demonstration operation including a demonstration operation action and each action duration, and the operation including an operation action and each action duration.
Compared with the prior art, the invention has the following beneficial effects:
in the invention, each industrial device establishes a wireless local area network, when the access device selects an access point to access, the authorization level module carries out authorization level identification on the identity ID, then the authority function of the corresponding level is opened to the access device, and finally the identity ID and the use operation record of the access device are generated into an access device operation event and stored. The invention can quickly and effectively realize the manual and automatic access of the network, and identify the authorization level according to the ID, thereby developing the corresponding authority function, ensuring the network security, storing the operation event of the access equipment, realizing the mark positioning, and counting various industrial production data.
Drawings
FIG. 1 is a flowchart illustrating a method for optimizing an industrial field weak network environment according to the present invention.
Detailed Description
The preferred embodiments of the present invention will be described in conjunction with the accompanying drawings, and it will be understood that they are described herein for the purpose of illustration and explanation and not limitation.
In order to achieve the object of the present invention, as shown in fig. 1, in one embodiment of the present invention, there is provided an industrial field weak network environment optimization method, including the steps of:
s1, each industrial device deploys an access point, and a wireless local area network is established between each industrial device and an adjacent access point;
s2, the access equipment acquires the address of each access point covered by the current wireless local area network, and then manually or automatically selects one access point to access according to the signal intensity of each access point;
specifically, when an access point is manually selected for access, if the number of access devices connected to the access point is within a set threshold, the access is successful; if the number of the access devices connected with the access point exceeds a set threshold value, sending a prompt, and reselecting the access point until the access is successful;
specifically, when an access point is automatically selected for access, the access point with the number of access devices connected with the access point within a set threshold and the strongest signal is selected for access;
s3, the industrial equipment acquires the identity ID of the access equipment, the authorization level module carries out authorization level identification on the identity ID, and if the identification is successful, the authority function of the corresponding level is opened to the access equipment; if the identification fails, an alarm is given out, and an early warning event is generated and stored by the identity ID of the access equipment and the access operation record; the authorization level module is internally provided with at least one authorization level from top to bottom, the level of the authorization level is from top to bottom, and the authorization level module sequentially identifies the identity ID according to the level from bottom to top when identifying the authorization level;
s4, the access equipment uses each authority function opened to the access equipment, and the industrial equipment generates and stores the identity ID and the use operation record of the access equipment into an access equipment operation event;
specifically, the authority function comprises a viewing function, a demonstration function and an operation function, the industrial equipment generates and stores an identity ID of the access equipment, a viewing operation record, a demonstration operation record and an operation record of the access equipment, the viewing operation record comprises viewing operation actions and duration of each action, the demonstration operation comprises demonstration operation actions and duration of each action, and the operation comprises operation actions and duration of each action.
The invention can quickly and effectively realize the manual and automatic access of the network, and identify the authorization level according to the ID, thereby developing the corresponding authority function, ensuring the network security, storing the operation event of the access equipment, realizing the mark positioning, and counting various industrial production data.
Finally, it should be noted that: although the present invention has been described in detail with reference to the foregoing embodiments, it will be apparent to those skilled in the art that changes may be made in the embodiments and/or equivalents thereof without departing from the spirit and scope of the invention. Any modification, equivalent replacement, or improvement made within the spirit and principle of the present invention should be included in the protection scope of the present invention.