CN115767513A - Data networking mode of WiFi Mesh - Google Patents

Data networking mode of WiFi Mesh Download PDF

Info

Publication number
CN115767513A
CN115767513A CN202211397493.8A CN202211397493A CN115767513A CN 115767513 A CN115767513 A CN 115767513A CN 202211397493 A CN202211397493 A CN 202211397493A CN 115767513 A CN115767513 A CN 115767513A
Authority
CN
China
Prior art keywords
wifi
node
networking
network
mesh
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202211397493.8A
Other languages
Chinese (zh)
Inventor
董钢辉
邱海一
谢森
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai High Flying Electronics Technology Co ltd
Original Assignee
Shanghai High Flying Electronics Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai High Flying Electronics Technology Co ltd filed Critical Shanghai High Flying Electronics Technology Co ltd
Priority to CN202211397493.8A priority Critical patent/CN115767513A/en
Publication of CN115767513A publication Critical patent/CN115767513A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Abstract

The invention relates to the technical field of Internet of things, in particular to a data networking mode of WiFimesh. A data networking mode of WiFimesh comprises a network end, a gateway end and a plurality of WiFimesh networking ends, wherein the network end is connected with the gateway end through a transmission protocol, and the gateway end is connected with the plurality of WiFi Mesh networking ends through a WiFi access protocol; the WiFimesh networking end is a to-be-networked Mesh network which accords with the WiFimesh networking standard, and comprises a WiFi root node and a plurality of WiFi nodes; the WiFi root node selects a gateway closest to the gateway end as the WiFi root node of the second layer network networking; and the WiFi node is a WiFi node of a plurality of layers of WiFiMesh networking end networking accessed under the WiFi root node. Compared with the prior art, the invention has the following advantages: in the networking mode, a probreq signal in a WiFi standard is borrowed, each node in a WiFimesh networking end sends data through the probreq, and other nodes receive data packets for management by capturing messages in the air.

Description

Data networking mode of WiFi Mesh
Technical Field
The invention relates to the technical field of Internet of things, in particular to a data networking mode of WiFi Mesh.
Background
Nowadays, with the expansion and extension of internet application, the internet of things industry has been greatly developed, and particularly under the addition of a new generation of information technology represented by 5G, a large number of new modes and new services represented by intelligent agriculture, intelligent health, intelligent logistics, industrial internet and intelligent retail emerge, the gate of intelligent interconnection of everything is formally opened to us, and the living, working and traveling modes of people are changed again by turning the world.
From the application field, the internet of things today can be roughly divided into a consumer-level internet of things and an industrial-level internet of things, wherein the consumer-level internet of things comprises some smart homes, shared bicycles or smart wearing which are familiar with people, and the industrial-level internet of things mainly relates to some industries with mature business models, such as manufacturing industry, transportation industry and building industry. With the leap-type promotion of new generation information technologies such as 5G, AI, big data and the like, the Internet of things also meets a new development opportunity.
The intelligent home generally comprises equipment such as a single-path or multi-path intelligent switch, an intelligent on-off device, an intelligent remote controller, an intelligent gateway, intelligent voice and the like, the number of general networking equipment is between several and dozens, and the workload of engineering installation and networking debugging is large. The WiFi has the advantages of being convenient to access the network, being relatively convenient to BLE and zigbee, being convenient to apply and develop, being low in cost and being relatively 4G/Cat 1, but the number of the access which can be carried by the connection gateway router is limited, and the access cannot be used as an access end of the whole Internet of things; when the access number of the routers is excessive, the stability of the network is influenced; the networking distance between WiFi is limited; when the number of nodes of the internet of things is too large, network management is complicated due to the problem of network coding addresses.
Therefore, a data networking mode of the WiFi Mesh is needed to meet the construction requirements of intelligent systems in some occasions and industries.
Disclosure of Invention
In order to overcome the defects of the prior art, the invention provides a data networking mode of a WiFi Mesh, and in the networking mode, the WiFi Mesh borrows a prob request signal in a WiFi standard. Each node sends data through prob request, and other nodes receive data through capturing air messages.
In order to achieve the purpose, the invention adopts the following technical scheme to realize the purpose: a data networking mode of WiFi Mesh comprises a network end, a gateway end and a plurality of WiFi Mesh networking ends, wherein the network end is connected with the gateway end through a transmission protocol, and the gateway end is connected with the plurality of WiFi Mesh networking ends through a WiFi access protocol;
the WiFi Mesh networking end is a to-be-networked Mesh network which meets the WiFi Mesh networking standard, and comprises a WiFi root node and a plurality of WiFi nodes;
the WiFi root node selects a gateway closest to the gateway end as a WiFi root node of the second-layer network, and the gateway end is connected with the WiFi root node through a WiFi access protocol;
the WiFi nodes are WiFi nodes of a plurality of layers of WiFi Mesh networking end networking accessed under the WiFi root node, the WiFi root node and the WiFi nodes are connected after interactive negotiation through WiFi management messages, and the WiFi nodes are connected after interactive negotiation through WiFi management messages;
when the WiFi nodes and the WiFi root nodes are connected in a networking mode through WiFi management messages, wiFi and BLE broadcasting functions are started by the WiFi nodes and the WiFi root nodes of a WiFi Mesh networking end, the WiFi root nodes are connected with a gateway end to determine channels, other WiFi nodes to be accessed receive BLE broadcasting packets in the WiFi Mesh networking end in the three determined channels through BLE broadcasting characteristics, wiFi channels of a Mesh network, signal intensity and other information are obtained, a BLE auxiliary networking method based on the WiFi Mesh is applied to networking connection, and coding operation is carried out by the WiFi Mesh-based address coding method when the WiFi nodes are networked;
in the networking data transmission process, a data encryption method based on WiFi Mesh is applied to data transmission;
when the WiFi Mesh networking end is upgraded, an upgrading instruction is sent to the WiFi Mesh networking end through the network end, and the WiFi root node and the plurality of WiFi nodes of the WiFi Mesh networking end are upgraded on line by adopting an OTA mode upgrading method for WiFi Mesh online upgrading.
Preferably, the scheme applies a BLE auxiliary networking method based on WiFi Mesh, including setting a network access judgment time To, setting a network switching judgment time Ts, defining a signal strength of a WiFi node as Eo, defining a signal strength of other WiFi nodes obtained from node access information as Es, defining a signal strength as Δ E, timing time as T, and starting a BLE auxiliary networking process, including the following steps:
s101, wiFi and BLE broadcasting functions are all started by the WiFi Mesh networking end, a WiFi root node of the WiFi Mesh networking end is connected with a gateway end to determine a channel, and node access information is broadcasted through the BLE broadcasting function;
s102, after the WiFi node which is accessed to the network is started, T starts to time;
s103, the WiFi node to be accessed to the network acquires node access information broadcasted by BLE of nearby nodes on a plurality of broadcast channels through the broadcast characteristics of the BLE;
s104, judging whether T is larger than To;
if the judgment result of the step S104 is yes, executing the step S105, otherwise, executing the step S103;
s105, the WiFi node performs networking connection according to an access priority standard method, broadcasts node access information of the current WiFi node through BLE after connection, resets timing time T and starts timing at the same time;
s106, judging whether T is larger than Ts;
if the judgment result of the step S106 is yes, executing the step S107, otherwise executing the step S106;
s107, the WiFi node scans node access information of BLE broadcast in a nearby WiFi Mesh networking end through BLE;
s108, judging Eo < Emin and Es > Emin;
if the judgment result in the step S108 is yes, executing the step S105, otherwise executing the step S109;
s109, judging whether Eo is in the range of Emin to Emax, and Es-Eo > Delta E;
if the determination result in the step S109 is yes, performing the step S105, otherwise performing the step S110;
s110, resetting the timing time T, timing again T, and executing S106;
the node access information mainly comprises signal strength E, signal layer number F and signal strength grade G;
wherein the signal strength E is a signal strength value of a current channel;
the number F of the signal layers is the number of the layers of the WiFi node accessed to the WiFi Mesh networking end;
the signal intensity grade G is divided into three grades according to the intensity range of the signal intensity E, a first boundary point of the signal intensity division is set as Emin, a second boundary point of the signal intensity division is set as Emax, when E > Emax is the first-level signal intensity, E is the second-level signal intensity between Emin and Emax, and E < Emin is the third-level signal intensity.
Preferably, the access priority standard method includes the following steps:
when networking connection is carried out on the WiFi nodes to be accessed to the network, the signal intensity level G is taken as a priority judgment basis, and the WiFi nodes to be accessed to the network with the signal intensity level G higher in the node access information are preferentially connected;
under the condition that the signal strength levels G are the same, the number F of signal layers is taken as a secondary judgment basis, and the prior connection with the accessed WiFi node with the small number F of signal layers in the node access information is carried out;
and under the condition that the signal strength grade G is the same as the signal layer number F, preferentially connecting the node access information with the accessed WiFi node with high signal strength E by taking the signal strength E as a judgment basis.
Preferably, said Emin = -90dbm, emax = -60dbm, Δ E =10dbm, to =1s, ts =300s. Preferably, the scheme applies a WiFi Mesh-based address coding method, which includes the following steps: s201, when networking is accessed, a WiFi Mesh networking end is accessed to a gateway end, the node which is accessed first is defined as a WiFi root node, and the coding address of the node is determined to be 0-0-0-0 at the current WiFi Mesh networking end;
s202, layer 1 coding, layering other WiFi nodes to be coded according to the number of access layers, when the layer 1 WiFi node to be coded is accessed to a WiFi root node of which the WiFi Mesh networking end determines coding, the WiFi root node codes the WiFi node to be coded on the basis of a self coding address, and sequentially codes the data A of the 1 st bit of the coding address according to the access sequence and the data range of 1-250;
s203, sequentially coding according to the sequential coding, coding the N +1 layer, when the N +1 layer WiFi node to be coded accesses the WiFi node of which the WiFi Mesh networking end determines the coding address, coding the WiFi node to be coded by taking the self coding address as the basis, and sequentially coding the coded N +1 bit data according to the data range of 1-250, wherein N is a positive integer.
Preferably, N is 1, 2, 3, the 1 st bit number of the coded address is a, the 2 nd bit number is B, the 3 rd bit number is C, and the 4 th bit number is D.
Preferably, the scheme applies a data encryption method based on WiFi Mesh, and includes the following steps:
s301, in a key exchange stage, a non-network-accessing node sends a networking request to a network-accessed node of a WiFi Mesh networking end, and the network-accessed node generates a pair of a public key A and a private key a through an asymmetric encryption algorithm;
s302, the accessed node sends the public key A to the node which is not accessed to the network, the node which is not accessed to the network generates a random key B through a random number, and the random key B is encrypted through the public key A to obtain a ciphertext B;
s303, the node which does not access the network sends the ciphertext B to the node which has accessed the network, and the node which has accessed the network decrypts the ciphertext B by the private key a to obtain a random key B;
s304, the accessed network node generates a broadcast key E and a unicast key F through random numbers, encrypts the broadcast key E and the unicast key F through a random key B by adopting a symmetric encryption algorithm, and obtains a calculated ciphertext E spliced by E + F;
s305, the accessed node sends the ciphertext E to the non-accessed node, the non-accessed node decrypts the ciphertext E through the random key B and recovers according to a set splicing method to obtain a broadcast key E and a unicast key F;
s306, the non-network-accessing node generates a random number H through a random number, and encrypts the random number H through a broadcast key E and a unicast key F by adopting a symmetric encryption algorithm to obtain a ciphertext H1 and a ciphertext H2;
s307, the node which does not access the network sends the ciphertext H1 and the ciphertext H2 to the node which has accessed the network, the node which has accessed the network decrypts the ciphertext H1 and the ciphertext H2 through the broadcast key E and the unicast key F, the same plaintext data H is obtained, and therefore whether the broadcast key E and the unicast key F which are received by the node which does not access the network are correct is checked;
s308, after the exchange step, the network-accessed node and the network-non-accessed node obtain a broadcast key E and a unicast key F through negotiation, and in the data exchange stage, the internal node of the WiFi Mesh networking end encrypts and decrypts the transmission content through the broadcast key E and the unicast key F respectively;
the broadcast key E is generated by a WiFi root node through random numbers initially, and the same broadcast key E is uniformly used by the WiFi Mesh networking end; the unicast key F is randomly generated by the networked node.
Preferably, the asymmetric encryption algorithm is RSA, and the symmetric encryption algorithm is AES128.
Preferably, the non-network-accessing node is a WiFi node that does not access the network, and the network-accessed node is a WiFi root node and a WiFi node that have accessed the network.
Preferably, the scheme applies an OTA mode upgrading method for WiFi Mesh online upgrading, which includes the following steps:
s401, a WiFi root node of a WiFi Mesh networking end receives an upgrading instruction sent by a network end, and a complete upgrading packet and corresponding MD5 information are obtained from the network end, wherein the complete upgrading packet comprises a complete upgrading file;
s402, informing all WiFi nodes of the WiFi Mesh networking end to enter an OTA upgrading mode through Mesh broadcasting by the WiFi root node, sending the length of an upgrading file and MD5 information, and receiving and storing the length of the upgrading file and the MD5 information by the WiFi node; the MD5 information is used for verifying that the upgrade file information is kept complete and consistent before and after transmission.
S403, splitting the upgrade file according to an OTA mode fragmentation method, firstly splitting the upgrade file according to a fixed length to obtain a data packet, if the data packet of the last packet does not reach the fixed length, zero padding is carried out on the data packet which does not reach the fixed length to enable the data packet to reach the fixed length, then a packet header and a packet tail are respectively added to the front and the back of each data packet to generate a data frame, wherein the content of the packet header comprises: the total fragment number, the fragment ID, the effective length and the packet tail content are CRC check values;
s404, sending the fragmented data frame to all WiFi nodes of the WiFi Mesh networking end through Mesh broadcasting;
s405, the WiFi node acquires data frames from other nodes of the WiFi Mesh networking end and checks whether the data frames are complete through a CRC algorithm;
if the determination result in the step S405 is yes, performing a step S407, otherwise performing a step S406;
s406, discarding the incomplete data frame;
s407, storing the data packet information in the data frame according to the fragment ID;
s408, checking whether the sequence and the total number of the data frame fragment ID information are complete or not;
if the determination result in the step S408 is yes, performing a step S409, otherwise performing a step S405;
s409, integrating all the data packets into a complete upgrade file, and checking whether the MD5 information is correct for the upgrade file of the WiFi node;
if the determination result in the step S409 is yes, performing a step S410, otherwise performing a step S411;
s410, the WiFi node sends upgrade file receiving completion information to the WiFi root node, and step S412 is executed;
s411, the WiFi node sends upgrading failure information to the WiFi root node;
s412, the WiFi root node judges whether all the WiFi nodes send upgrade file receiving completion information or upgrade failure information;
if the determination result in the step S412 is yes, then step S413 is executed, otherwise step S405 is executed;
s413, the WiFi root node sends an instruction for exiting the OTA upgrading mode through Mesh broadcasting, and restarts after the upgrading file is transported to an operation area;
s414, after receiving the instruction of quitting the OTA upgrading mode, other WiFi nodes carry the upgrading file to an operation area and restart the upgrading file;
s415, after the WiFi node is restarted and upgraded, reporting the version number to the WiFi root node;
s416, the WiFi root node judges whether the version number reported by the WiFi node is correct or not;
if the determination result in the step S416 is yes, performing the step S417, otherwise performing the step S418;
s417, the WiFi root node registers information that the WiFi node is successfully upgraded;
and S418, the WiFi root node registers the information of upgrading failure of the WiFi node.
Compared with the prior art, the invention has the following advantages:
1) The networking mode borrows a prob request signal in a WiFi standard. Each node in the WiFi Mesh networking end sends data through a prob request, and other nodes receive data packets for management by capturing air messages;
2) By applying the BLE auxiliary networking method, the broadcast characteristics of BLE are used, data are transmitted on a plurality of broadcast channels at the same time, and a receiving end also receives data on 3 broadcast channels. Therefore, the WiFi network can be prevented from switching channels, and nodes which have accessed the network can find better connection points through BLE broadcast packets, so that the network is optimized;
3) By applying the address coding method based on the WiFi Mesh, data forwarding calculation can be conveniently carried out according to the coding mode, and the data forwarding efficiency is improved;
4) By applying a data encryption method based on WiFi Mesh, the security of data can be ensured, and third parties are prevented from eavesdropping or injecting false data;
5) By applying the OTA mode upgrading method, the upgrading can be faster and more accurate, and the OTA efficiency can be improved.
Drawings
Fig. 1 is a conceptual diagram of a data networking mode of a WiFi Mesh according to the present invention.
Figure 2 is a BLE assisted networking flow diagram of a WiFi Mesh data networking mode of the present invention.
Fig. 3 is a conceptual diagram of address coding of the WiFi Mesh data networking mode of the present invention.
Fig. 4 is a flowchart of address coding of the WiFi Mesh data networking mode of the present invention.
Fig. 5 is a data encryption flow chart of the WiFi Mesh data networking mode of the present invention.
Fig. 6 is a flowchart of an OTA mode upgrade of a WiFi Mesh data networking mode according to the present invention.
Detailed Description
Example 1:
as shown in fig. 1, a data networking mode of WiFi Mesh includes a network terminal 1, a gateway terminal 2, and a plurality of WiFi Mesh networking terminals 3, where the network terminal 1 is connected to the gateway terminal 2 through a transmission protocol, and the gateway terminal 2 is connected to the WiFi Mesh networking terminals 3 through a WiFi access protocol;
the WiFi Mesh networking end 3 is a Mesh network to be networked, which meets the WiFi Mesh networking standard, and the WiFi Mesh networking end 3 comprises a WiFi root node 4 and a plurality of WiFi nodes 5;
the WiFi root node 4 selects a gateway closest to the gateway end as the WiFi root node 4 of the second-layer network, and the gateway end is connected with the WiFi root node 4 through a WiFi access protocol;
the WiFi nodes 5 are WiFi nodes 5 which are connected with a plurality of layers of WiFi Mesh networking ends 3 accessed under the WiFi root nodes 4, the WiFi root nodes 4 and the WiFi nodes 5 are connected after interactive negotiation through WiFi management messages, and the WiFi nodes 5 are connected after interactive negotiation through the WiFi management messages; when the WiFi node 5 and the WiFi root node 4 are connected in a networking mode through WiFi management messages, the WiFi node 5 and the WiFi root node 4 of the WiFi Mesh networking end 3 both start WiFi and BLE broadcasting functions, the WiFi root node 4 is connected with a gateway end to determine channels, other WiFi nodes 5 to be accessed receive BLE broadcasting packets in the WiFi Mesh networking end 3 in the three determined channels through BLE broadcasting characteristics, wiFi channels, signal intensity and other information of the Mesh network are obtained, a BLE auxiliary networking method based on the WiFi Mesh is applied to networking connection, and when the WiFi node 5 is in the networking mode, coding operation is carried out through an address coding method based on the WiFi Mesh; in the networking data transmission process, a data encryption method based on WiFi Mesh is applied to data transmission;
when the WiFi Mesh networking end 3 is upgraded, an upgrading instruction is sent to the WiFi Mesh networking end 3 through the network end, and the WiFi root node 4 and the plurality of WiFi nodes 5 of the WiFi Mesh networking end 3 are upgraded on line by adopting an OTA mode upgrading method for WiFi Mesh on-line upgrading.
The WiFi management message mainly receives and transmits data through WiFi Beacon according to a Mesh protocol, and comprises the following contents:
and (4) MID: meshrid, with BLE broadcast description;
flag: the default of the undefined bits of the data packet mark is 0;
bit7:1- -management message, PDU of the management message should meet the defined format, 0- -data message, PDU is self-defined;
bit6: 1-OTA message, and sub-packet bit7=0 of OTA; other management commands bit7=1;
SN: a counter, which is increased by 1 every time a command is sent;
TTL: and the hop count is reduced by 1 once per forwarding, and the hop count is not forwarded when the hop count is reduced to 0.
Resv:reserved;
NxtNet ID: next hop network addresses, which need to be changed every time they are forwarded;
DesNetID: the destination network address is unchanged during forwarding;
SrcNetID: a source network address, unchanged during forwarding;
head CRC: MID to SrcNetID CRC16;
PDULen: PDU length;
PDU: a data payload;
CRC16: CRC16 for PDULen + PDU portion;
the current WiFi module in IOT field is usually provided with BLE function.
The WiFi needs to determine a channel when operating, so the WiFi Mesh networking end 3 which has accessed the network can only be kept in the channel, and the stability of the network is affected during switching.
The mode applies a BLE auxiliary networking method based on WiFi Mesh, mainly uses the broadcasting characteristic of BLE, simultaneously transmits data on a plurality of broadcasting channels, and a receiving end also receives data on the plurality of broadcasting channels. This avoids the WiFi network switching channels.
And the nodes which are already connected to the network can find better connection points through BLE broadcast packets, so that the network is optimized.
As shown in fig. 2, the method for BLE assisted networking based on WiFi Mesh is applied in this mode, and includes setting a network access determination time To, setting a network switching determination time Ts, defining a signal strength of a WiFi node 5 as Eo, defining a signal strength of other WiFi nodes 5 obtained from node access information as Es, defining a signal strength as Δ E, and timing a time T, and starting a BLE assisted networking process, including the following steps:
s101, the WiFi Mesh networking end 3 starts WiFi and BLE broadcasting functions, a WiFi root node 4 of the WiFi Mesh networking end 3 is connected with a gateway end to determine a channel, and node access information is broadcasted through the BLE broadcasting function;
s102, after the WiFi node 5 for network access is started, starting timing by T;
s103, the WiFi node 5 to be networked acquires node access information broadcasted by nearby nodes BLE on a plurality of broadcast channels through the broadcast characteristics of BLE;
s104, judging whether T is larger than To;
if the judgment result in the step S104 is yes, performing a step S105, otherwise performing a step S103;
s105, the WiFi node 5 conducts networking connection according to an access priority standard method, after connection, node access information of the current WiFi node 5 is broadcasted through BLE, timing time T is reset, and timing is started at the same time;
s106, judging whether T is larger than Ts;
if the judgment result of the step S106 is yes, executing the step S107, otherwise, executing the step S106;
s107, the WiFi node 5 scans node access information broadcasted by BLE in the WiFi Mesh networking end 3 nearby through BLE;
s108, judging Eo < Emin and Es > Emin;
if the determination result in the step S108 is yes, performing a step S105, otherwise performing a step S109;
s109, judging whether Eo is in the range of Emin to Emax, and Es-Eo > delta E;
if the determination result in the step S109 is yes, performing a step S105, otherwise performing a step S110;
s110, resetting the timing time T, timing again T, and executing S106;
the node access information mainly comprises signal strength E, signal layer number F and signal strength grade G;
the signal strength E is a signal strength value of a current channel;
the number of signal layers F is the number of layers of the WiFi node 5 accessing the WiFi Mesh networking end 3;
the signal intensity grade G is divided into three grades according to the intensity range of the signal intensity E, a first boundary point of the signal intensity division is set as Emin, a second boundary point of the signal intensity division is set as Emax, when E > Emax is the first-level signal intensity, E is the second-level signal intensity between Emin and Emax, and E < Emin is the third-level signal intensity.
The access priority standard method comprises the following steps:
when networking connection is performed on the WiFi nodes 5 to be accessed, the signal strength grade G is used as a priority judgment basis to be preferentially connected with the WiFi nodes 5 which are accessed to the network and have high signal strength grade G in the node access information;
under the condition that the signal strength grades G are the same, the signal layer number F is used as a secondary judgment basis, and the prior connection with the accessed WiFi node 5 with the small signal layer number F in the node access information is carried out;
and under the condition that the signal intensity level G is the same as the signal layer number F, preferentially connecting the accessed WiFi node 5 with high signal intensity E in the node access information by taking the signal intensity E as a judgment basis.
Said Emin = -90dbm, emax = -60dbm, Δ E =10dbm, to =1s, ts =300s.
When networking connection is carried out, the WiFi nodes 5 adopt an address coding method based on WiFi Mesh to carry out coding operation when networking; the data forwarding calculation can be conveniently carried out. And the data forwarding efficiency is improved.
As shown in fig. 3 and 4, the mode applying the WiFi Mesh-based address coding method includes the following steps:
s201, when networking is accessed, a WiFi Mesh networking end 3 is accessed to a gateway end, the node which is accessed first is defined as a WiFi root node 4, and the coding address of the node is determined to be 0-0-0-0 at the current WiFi Mesh networking end 3;
s202, layer 1 coding, layering other WiFi nodes 5 to be coded according to the number of access layers, when the layer 1 WiFi node 5 to be coded accesses the WiFi root node 4 of which the WiFi Mesh networking end 3 determines to code, the WiFi root node 4 codes the WiFi node 5 to be coded on the basis of the self coding address, and sequentially codes the data A of the 1 st bit of the coding address according to the data range of 1-250 according to the access sequence;
s203, sequentially coding according to the sequential coding, coding the N +1 layer, when the N +1 layer WiFi node 5 to be coded accesses the WiFi node 5 of which the WiFi Mesh networking end 3 determines the coding address, coding the WiFi node 5 to be coded by taking the self coding address as the basis, and sequentially coding the N +1 bit data of the coding according to the data range of 1-250, wherein N is a positive integer, N is 1, 2 and 3, the 1 st bit number of the coding address is A, the 2 nd bit number is B, the 3 rd bit number is C, and the 4 th bit number is D.
In IOT application, data encryption can ensure data security and prevent a third party from eavesdropping or injecting false data. The encryption of the WiFi Mesh data networking mode comprises an interactive key process, broadcast key encryption, unicast key encryption and the like, and data transmission is carried out by applying a data encryption method based on WiFi Mesh;
as shown in fig. 5, the mode applies a WiFi Mesh-based data encryption method, including the following steps:
s301, in a key exchange stage, a non-network-connected node sends a networking request to a network-connected node of a WiFi Mesh networking end 3, and the network-connected node generates a pair of a public key A and a private key a through an asymmetric encryption algorithm;
s302, the node which has accessed the network sends the public key A to the node which has not accessed the network, the node which has not accessed the network generates a random key B through a random number, and the random key B is encrypted through the public key A to obtain a ciphertext B; since the public key A is sent in a clear text, the information of the public key A has the risk of leakage;
s303, the node which does not access the network sends the ciphertext B to the node which has accessed the network, and the node which has accessed the network decrypts the ciphertext B by the private key a to obtain a random key B; the ciphertext b is encrypted by the public key A of the asymmetric encryption algorithm and can only be decrypted by the corresponding private key a, so that the security of the ciphertext b is guaranteed, and the subsequent message is transmitted in the form of the ciphertext, so that the problem of sensitive information leakage during key exchange at the initial stage of data transmission is solved;
s304, the accessed network node generates a broadcast key E and a unicast key F through random numbers, and encrypts the broadcast key E and the unicast key F through a random key B by adopting a symmetric encryption algorithm to obtain a calculated ciphertext E after E + F splicing;
s305, the accessed node sends the ciphertext E to the node which is not accessed to the network, the node which is not accessed to the network decrypts the ciphertext E through the random key B, and the ciphertext E is recovered according to a set splicing method to obtain a broadcast key E and a unicast key F;
s306, the non-network-accessing node generates a random number H through a random number, and encrypts the random number H through a broadcast key E and a unicast key F by adopting a symmetric encryption algorithm to obtain a ciphertext H1 and a ciphertext H2;
s307, the node which does not access the network sends the ciphertext H1 and the ciphertext H2 to the node which has accessed the network, the node which has accessed the network decrypts the ciphertext H1 and the ciphertext H2 through the broadcast key E and the unicast key F, the same plaintext data H is obtained, and therefore whether the broadcast key E and the unicast key F which are received by the node which does not access the network are correct is checked; the cipher texts H1 and H2 are respectively obtained by encrypting the H through the broadcast key E and the unicast key F, so that the accessed nodes respectively decode two groups of cipher texts through the E and the F, and if the results are the same and are both random numbers H, the verification is passed.
S308, after the exchange step, the nodes which have accessed the network and the nodes which have not accessed the network obtain a broadcast key E and a unicast key F through negotiation, and in the data exchange stage, the nodes in the WiFi Mesh networking end 3 encrypt and decrypt the transmission contents through the broadcast key E and the unicast key F respectively;
the broadcast key E is generated by the WiFi root node 4 initially through random numbers, and the same broadcast key E is uniformly used by the WiFi Mesh networking end 3; the unicast key F is randomly generated by the networked node. The unicast key F is randomly generated by the accessed nodes, the broadcast key E is inherited from the WiFi root node, only the root node is randomly generated, and the other accessed nodes and the WiFi root node apply the same broadcast key E, so that the broadcast transmission and the broadcast reception of the current Mesh network are facilitated;
wherein, the asymmetric encryption algorithm is RSA, and the symmetric encryption algorithm is AES128.
The non-network-accessing nodes are WiFi nodes which are not accessed to the network and other network equipment to be accessed to the network, and the network-accessed nodes are WiFi root nodes 4 and WiFi nodes 5 which are accessed to the network.
The online upgrading function of the WiFi Mesh is that during online upgrading: the data volume is large, and the data to be received by each node is the same. So to enable faster and more accurate upgrades we define an OTA mode. First, all devices of the Mesh network enter OTA mode
And secondly, issuing an upgraded upgrading file from the WiFi root node, splitting the upgraded upgrading file according to a fixed length to obtain data packets, wherein each data packet has a specific length and a specific number.
After each WiFi node receives the data packet and is verified completely, the data packet is issued according to the same method. Since each packet has the same contents as long as the number is the same, it is not necessary for each node to receive the packet of the parent node. As long as the data of the Mesh network is determined to be an upgraded data packet, the data can be received. The efficiency of the OTA can be improved.
As shown in fig. 6, the OTA mode upgrading method applied to WiFi Mesh online upgrading specifically includes the following steps:
s401, a WiFi root node 4 of a WiFi Mesh networking end 3 receives an upgrading instruction sent by a network end, and a complete upgrading package and corresponding MD5 information are obtained from the network end, wherein the complete upgrading package comprises a complete upgrading file;
s402, the WiFi root node 4 informs all WiFi nodes 5 of the WiFi Mesh networking end 3 to enter an OTA upgrading mode through Mesh broadcasting, and sends the length of an upgrading file and MD5 information, and the WiFi nodes 5 receive and store the length of the upgrading file and the MD5 information;
s403, splitting the upgrade file according to an OTA mode fragmentation method, firstly splitting the upgrade file according to a fixed length to obtain a data packet, if the data packet of the last packet does not reach the fixed length, zero padding is carried out on the data packet which does not reach the fixed length to enable the data packet to reach the fixed length, then a packet header and a packet tail are respectively added to the front and the back of each data packet to generate a data frame, wherein the content of the packet header comprises: the total fragment number, the fragment ID, the effective length and the packet tail content are CRC check values;
s404, sending the fragmented data frame to all WiFi nodes 5 of the WiFi Mesh networking end 3 through Mesh broadcasting;
s405, the WiFi node 5 acquires data frames from other nodes of the WiFi Mesh networking end 3, and whether the data frames are complete or not is checked through a CRC algorithm;
if the determination result in the step S405 is yes, performing a step S407, otherwise performing a step S406;
s406, discarding the incomplete data frame;
s407, storing the data packet information in the data frame according to the fragment ID;
s408, checking whether the sequence and the total number of the data frame fragment ID information are complete or not;
if the judgment result in the step S408 is yes, executing a step S409, otherwise executing a step S405;
s409, integrating all the data packets into a complete upgrade file, and checking whether the MD5 information is correct for the upgrade file of the WiFi node 5;
if the determination result in the step S409 is yes, performing a step S410, otherwise performing a step S411;
s410, the WiFi node 5 sends upgrade file receiving completion information to the WiFi root node 4, and step S412 is executed;
s411, the WiFi node 5 sends upgrading failure information to the WiFi root node 4;
s412, the WiFi root node 4 judges whether all the WiFi nodes 5 send upgrade file receiving completion information or upgrade failure information;
if the determination result in the step S412 is yes, then step S413 is executed, otherwise step S405 is executed;
s413, the WiFi root node 4 sends an instruction for exiting the OTA upgrading mode through Mesh broadcasting, and restarts after the upgrading file is transported to an operation area;
s414, after receiving the instruction of quitting the OTA upgrading mode, other WiFi nodes 5 transport the upgrading file to an operation area and restart the upgrading file;
s415, after the WiFi node 5 restarts upgrading, reporting the version number to the WiFi root node 4;
s416, the WiFi root node 4 judges whether the version number reported by the WiFi node 5 is correct or not;
if the determination result in the step S416 is yes, performing the step S417, otherwise performing the step S418;
s417, the WiFi root node 4 registers the information that the WiFi node 5 is upgraded successfully;
and S418, the WiFi root node 4 registers the upgrading failure information of the WiFi node 5.

Claims (10)

1. A data networking mode of WiFi Mesh is characterized in that: the network comprises a network end (1), a gateway end (2) and a plurality of WiFi Mesh networking ends (3), wherein the network end (1) is connected with the gateway end (2) through a transmission protocol, and the gateway end (2) is connected with the plurality of WiFi Mesh networking ends (3) through a WiFi access protocol;
the WiFi Mesh networking end (3) is a to-be-networked Mesh network conforming to the WiFi Mesh networking standard, and the WiFi Mesh networking end (3) comprises a WiFi root node (4) and a plurality of WiFi nodes (5); the WiFi root node (4) selects a gateway closest to the gateway end as the WiFi root node (4) of the second-layer network, and the gateway end is connected with the WiFi root node (4) through a WiFi access protocol;
the WiFi nodes (5) are the WiFi nodes (5) which are accessed under the WiFi root nodes (4) and are networked by the WiFi Mesh networking ends (3), the WiFi root nodes (4) and the WiFi nodes (5) are connected after interactive negotiation through WiFi management messages, and the WiFi nodes (5) are connected after interactive negotiation through WiFi management messages;
when the WiFi node (5) is connected with the WiFi root node (4) through WiFi management messages in a networking mode, wiFi and BLE broadcasting functions are started by the WiFi node (5) of the WiFi Mesh networking end (3) and the WiFi root node (4), the WiFi root node (4) is connected with a gateway end to determine channels, other WiFi nodes (5) to be accessed receive BLE broadcasting packets in the WiFi Mesh networking end (3) in the three determined channels through BLE broadcasting characteristics, information such as WiFi channels and signal strength of the Mesh network is obtained, a BLE auxiliary networking method based on WiFi Mesh is applied to networking connection, and coding operation is carried out by the WiFi Mesh-based address coding method when the WiFi node (5) is networked;
in the networking data transmission process, a data encryption method based on WiFi Mesh is applied to data transmission;
when the WiFi Mesh networking end (3) is upgraded, an upgrading instruction is sent to the WiFi Mesh networking end (3) through the network end, and the WiFi root nodes (4) and the WiFi nodes (5) of the WiFi Mesh networking end (3) are upgraded on line by adopting an OTA mode upgrading method for WiFi Mesh online upgrading.
2. The data networking method of WiFi Mesh according To claim 1, wherein the WiFi Mesh based BLE assisted networking method includes setting network access determination time To, setting network cut determination time Ts, defining signal strength of WiFi node (5) as Eo, signal strength of other WiFi nodes (5) obtained from node access information as Es, defining signal strength as Δ E, timing time as T, and starting BLE assisted networking process, including the following steps:
s101, wiFi and BLE broadcasting functions are started by the WiFi Mesh networking end (3), a WiFi root node (4) of the WiFi Mesh networking end (3) is connected with a gateway end to determine a channel, and node access information is broadcasted through the BLE broadcasting function;
s102, after the WiFi node (5) to be accessed to the network is started, T starts to time;
s103, the WiFi node (5) to be accessed to the network acquires node access information broadcasted by BLE of nearby nodes on a plurality of broadcast channels according to the broadcasting characteristics of the BLE;
s104, judging whether T is larger than To;
if the judgment result of the step S104 is yes, executing the step S105, otherwise, executing the step S103;
s105, the WiFi node (5) performs networking connection according to an access priority standard method, broadcasts the node access information of the current WiFi node (5) through BLE after connection, resets the timing time T and starts timing at the same time;
s106, judging whether T is larger than Ts;
if the judgment result of the step S106 is yes, executing the step S107, otherwise, executing the step S106;
s107, the WiFi node (5) scans node access information broadcasted by BLE in the WiFi Mesh networking end (3) nearby through the BLE;
s108, judging Eo < Emin and Es > Emin;
if the judgment result in the step S108 is yes, executing the step S105, otherwise executing the step S109;
s109, judging whether Eo is in the range of Emin to Emax, and Es-Eo > delta E;
if the determination result in the step S109 is yes, performing the step S105, otherwise performing the step S110;
s110, resetting the timing time T, timing again T, and executing S106;
the node access information mainly comprises signal strength E, signal layer number F and signal strength grade G;
wherein the signal strength E is a signal strength value of a current channel;
the number F of the signal layers is the number of the layers of the WiFi node (5) accessing to the WiFi Mesh networking end (3);
the signal intensity grade G is divided into three grades according to the intensity range of the signal intensity E, a first boundary point of the signal intensity division is Emin, a second boundary point of the signal intensity division is Emax, when E > Emax is first-level signal intensity, E is second-level signal intensity between Emin and Emax, and E < Emin third-level signal intensity.
3. The WiFi Mesh data networking method of claim 2, characterized in that: the access priority standard method comprises the following steps:
when networking connection is carried out on the WiFi nodes (5) to be accessed, the signal strength grade G is used as a priority judgment basis, and the WiFi nodes are preferentially connected with the WiFi nodes (5) which are accessed to the network and have the high signal strength grade G in the node access information;
under the condition that the signal strength levels G are the same, the signal layer number F is used as a secondary judgment basis, and the signal layer number F is preferentially connected with the accessed WiFi node (5) with the small signal layer number F in the node access information;
and under the condition that the signal intensity level G is the same as the signal layer number F, preferentially connecting the accessed WiFi node (5) with the signal intensity E in the node access information by taking the signal intensity E as a judgment basis.
4. The WiFi Mesh data networking method of claim 2, characterized in that: the Emin = -90dbm, emax = -60dbm, delta E =10dbm, to = -1s and Ts =300s.
5. The data networking method of WiFi Mesh of claim 1, wherein the WiFi Mesh based address coding method comprises the following steps:
s201, when networking is accessed, a WiFi Mesh networking end (3) is accessed to a gateway end, the node which is accessed first is defined as a WiFi root node (4), and the coding address of the node is determined to be 0-0-0-0 at the current WiFi Mesh networking end (3);
s202, coding the layer 1, layering other WiFi nodes (5) to be coded according to the number of access layers, and when the layer 1 WiFi node (5) to be coded accesses the WiFi root node (4) of which the coding is determined by the WiFi Mesh networking end (3), coding the WiFi root node (4) on the basis of the self coding address of the WiFi node (5) to be coded, and sequentially coding the data A of the 1 st bit of the coding address according to the access sequence and the data range of 1-250 by the WiFi root node (4);
s203, coding is sequentially carried out according to the sequence coding, the layer (N + 1) coding is carried out, when the layer (N + 1) WiFi node (5) to be coded accesses the WiFi node (5) of which the coding address is determined by the WiFi Mesh networking end (3), the WiFi node (5) of which the coding address is determined can code the WiFi node (5) to be coded on the basis of the self coding address, the coded data of the layer (N + 1) is sequentially coded according to the data range of 1-250, and N is a positive integer.
6. The WiFi Mesh data networking method of claim 5, wherein: n is 1, 2 and 3, the 1 st digit of the coded address is A, the 2 nd digit of the coded address is B, the 3 rd digit of the coded address is C, and the 4 th digit of the coded address is D.
7. The WiFi Mesh data networking method of claim 1, wherein: the data encryption method based on the WiFi Mesh comprises the following steps:
s301, in a key exchange stage, a non-network-accessing node sends a networking request to a network-accessed node of a WiFi Mesh networking end (3), and the network-accessed node generates a pair of a public key A and a private key a through an asymmetric encryption algorithm;
s302, the accessed node sends the public key A to the node which is not accessed to the network, the node which is not accessed to the network generates a random key B through a random number, and the random key B is encrypted through the public key A to obtain a ciphertext B;
s303, the node which does not access the network sends the ciphertext B to the node which has accessed the network, and the node which has accessed the network decrypts the ciphertext B by the private key a to obtain a random key B;
s304, the accessed network node generates a broadcast key E and a unicast key F through random numbers, and encrypts the broadcast key E and the unicast key F through a random key B by adopting a symmetric encryption algorithm to obtain a calculated ciphertext E after E + F splicing;
s305, the accessed node sends the ciphertext E to the non-accessed node, the non-accessed node decrypts the ciphertext E through the random key B and recovers according to a set splicing method to obtain a broadcast key E and a unicast key F;
s306, the non-network-accessing node generates a random number H through a random number, and encrypts the random number H through a broadcast key E and a unicast key F by adopting a symmetric encryption algorithm to obtain a ciphertext H1 and a ciphertext H2;
s307, the node which does not access the network sends the ciphertext H1 and the ciphertext H2 to the node which has accessed the network, the node which has accessed the network decrypts the ciphertext H1 and the ciphertext H2 through the broadcast key E and the unicast key F, the same plaintext data H is obtained, and therefore whether the broadcast key E and the unicast key F which are received by the node which does not access the network are correct is checked;
s308, after the exchange step, the nodes which have accessed the network and the nodes which have not accessed the network obtain a broadcast key E and a unicast key F through negotiation, and in the data exchange stage, the nodes in the WiFi Mesh networking end (3) encrypt and decrypt the transmission contents through the broadcast key E and the unicast key F respectively;
the broadcast key E is generated by a WiFi root node (4) through random numbers initially, and the same broadcast key E is uniformly used by the WiFi Mesh networking end (3); the unicast key F is randomly generated by the networked node.
8. The WiFi Mesh data networking method of claim 7, wherein: the asymmetric encryption algorithm is RSA, and the symmetric encryption algorithm is AES128.
9. The WiFi Mesh data networking method of claim 7, wherein: the non-network-accessing nodes are WiFi nodes which are not accessed to the network, and the network-accessed nodes are WiFi root nodes (4) and WiFi nodes (5) which are accessed to the network.
10. The WiFi Mesh data networking method of claim 1, wherein: the OTA mode upgrading method for WiFi Mesh online upgrading comprises the following steps:
s401, a WiFi root node (4) of a WiFi Mesh networking end (3) receives an upgrading instruction sent by a network end, and a complete upgrading package and corresponding MD5 information are obtained from the network end, wherein the complete upgrading package comprises a complete upgrading file;
s402, the WiFi root node (4) informs all WiFi nodes (5) of the WiFi Mesh networking end (3) to enter an OTA upgrading mode through Mesh broadcasting, sends the length of an upgrading file and MD5 information, and the WiFi nodes (5) receive and store the length of the upgrading file and the MD5 information;
s403, splitting the upgrade file according to an OTA mode fragmentation method, firstly splitting the upgrade file according to a fixed length to obtain a data packet, if the data packet of the last packet does not reach the fixed length, zero padding is carried out on the data packet which does not reach the fixed length to enable the data packet to reach the fixed length, then a packet header and a packet tail are respectively added to the front and the back of each data packet to generate a data frame, wherein the content of the packet header comprises: the total fragment number, the fragment ID, the effective length and the packet tail content are CRC check values;
s404, the fragmented data frame is sent to all WiFi nodes (5) of the WiFi Mesh networking end (3) through Mesh broadcasting;
s405, the WiFi node (5) acquires data frames from other nodes of the WiFi Mesh networking end (3), and whether the data frames are complete or not is checked through a CRC algorithm;
if the determination result in the step S405 is yes, performing a step S407, otherwise performing a step S406;
s406, discarding the incomplete data frame;
s407, storing the data packet information in the data frame according to the fragment ID;
s408, checking whether the sequence and the total number of the data frame fragment ID information are complete or not;
if the judgment result in the step S408 is yes, executing a step S409, otherwise executing a step S405;
s409, integrating all the data packets into a complete upgrade file, and checking whether the MD5 information is correct for the upgrade file of the WiFi node (5);
if the determination result in the step S409 is yes, performing the step S410, otherwise performing the step S411;
s410, the WiFi node (5) sends upgrade file receiving completion information to the WiFi root node (4), and step S412 is executed;
s411, the WiFi node (5) sends upgrading failure information to the WiFi root node (4);
s412, the WiFi root node (4) judges whether all the WiFi nodes (5) send upgrade file receiving completion information or upgrade failure information;
if the determination result in the step S412 is yes, then step S413 is executed, otherwise step S405 is executed;
s413, the WiFi root node (4) sends an instruction for exiting the OTA upgrading mode through Mesh broadcasting, and the upgrading file is restarted after being transported to an operation area;
s414, after receiving the instruction of exiting the OTA upgrading mode, other WiFi nodes (5) carry the upgrading file to an operation area and restart the upgrading file;
s415, after the WiFi node (5) is restarted and upgraded, reporting the version number to the WiFi root node (4);
s416, the WiFi root node (4) judges whether the version number reported by the WiFi node (5) is correct or not;
if the determination result in the step S416 is yes, performing the step S417, otherwise performing the step S418;
s417, the WiFi root node (4) registers the information that the WiFi node (5) is upgraded successfully;
and S418, the WiFi root node (4) registers the upgrading failure information of the WiFi node (5).
CN202211397493.8A 2022-11-09 2022-11-09 Data networking mode of WiFi Mesh Pending CN115767513A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211397493.8A CN115767513A (en) 2022-11-09 2022-11-09 Data networking mode of WiFi Mesh

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211397493.8A CN115767513A (en) 2022-11-09 2022-11-09 Data networking mode of WiFi Mesh

Publications (1)

Publication Number Publication Date
CN115767513A true CN115767513A (en) 2023-03-07

Family

ID=85368464

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211397493.8A Pending CN115767513A (en) 2022-11-09 2022-11-09 Data networking mode of WiFi Mesh

Country Status (1)

Country Link
CN (1) CN115767513A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116866899A (en) * 2023-09-04 2023-10-10 北京理工大学 Multi-node wireless ad hoc network communication method and device, electronic equipment and storage medium

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116866899A (en) * 2023-09-04 2023-10-10 北京理工大学 Multi-node wireless ad hoc network communication method and device, electronic equipment and storage medium
CN116866899B (en) * 2023-09-04 2023-11-28 北京理工大学 Multi-node wireless ad hoc network communication method and device, electronic equipment and storage medium

Similar Documents

Publication Publication Date Title
US10880817B2 (en) Wi-fi configuration method, Wi-Fi mobile terminal, and Wi-Fi device
CN107770182B (en) Data storage method of home gateway and home gateway
CN108307355B (en) Multicast implementation method of L PWAN Internet of things
JP5288210B2 (en) Unicast key management method and multicast key management method in network
CN107580768B (en) Message transmission method, device and system
WO2018040529A1 (en) Message processing method, device and system
US20100034386A1 (en) Device manager repository
CN113271579A (en) Bluetooth device control method, client, computer device and readable storage medium
CN102474724A (en) Method for securely broadcasting sensitive data in a wireless network
US11153207B2 (en) Data link layer-based communication method, device, and system
CN114245319B (en) Enhanced broadcast concurrent OTA firmware upgrading method based on Bluetooth Mesh
US20190261138A1 (en) Reliable link layer multicast in a low power wide area network
CN110858822B (en) Media access control security protocol message transmission method and related device
CN115767513A (en) Data networking mode of WiFi Mesh
US11343786B2 (en) Method for broadcast gateway signaling using cloud network and apparatus for the same
CN107124312A (en) The method and apparatus of equipment in network configuration
WO2017041534A1 (en) Power line network communication method and device, and computer storage media
CN113676391A (en) Data transmission method, device, communication node and storage medium
CN112640504B (en) Method and device for secure communication
WO2023010880A1 (en) Data transmission method and related device
CN101888343B (en) Service data transmission method and system
CN111800773B (en) Bluetooth Mesh node message repetition identification method, system and storage medium
JP2007142630A (en) Communication apparatus and method
CN109462591A (en) A kind of data transmission method, method of reseptance, apparatus and system
WO2023155520A1 (en) Network connection method and apparatus, device, storage medium, and program product

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination