CN116017397A - Wireless communication method, electronic device, and computer storage medium - Google Patents

Wireless communication method, electronic device, and computer storage medium Download PDF

Info

Publication number
CN116017397A
CN116017397A CN202211462710.7A CN202211462710A CN116017397A CN 116017397 A CN116017397 A CN 116017397A CN 202211462710 A CN202211462710 A CN 202211462710A CN 116017397 A CN116017397 A CN 116017397A
Authority
CN
China
Prior art keywords
wireless access
access node
signal strength
mobile terminal
maximum signal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202211462710.7A
Other languages
Chinese (zh)
Inventor
孟伟
王明慧
王聪
王杰
江利腾
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhejiang Dahua Technology Co Ltd
Original Assignee
Zhejiang Dahua Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhejiang Dahua Technology Co Ltd filed Critical Zhejiang Dahua Technology Co Ltd
Priority to CN202211462710.7A priority Critical patent/CN116017397A/en
Publication of CN116017397A publication Critical patent/CN116017397A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Landscapes

  • Mobile Radio Communication Systems (AREA)

Abstract

The application discloses a wireless communication method, an electronic device and a non-volatile computer readable storage medium. The method comprises the following steps: accessing a mobile terminal, and acquiring wireless access node list information and authentication information from the mobile terminal; acquiring the wireless access node with the maximum signal strength based on the wireless access node list information; and sending the authentication information to the wireless access node with the maximum signal strength so as to enable the mobile terminal to communicate with the wireless access node with the maximum signal strength. By the scheme, the noninductive roaming of the mobile terminal can be realized.

Description

Wireless communication method, electronic device, and computer storage medium
Technical Field
The present application relates to the field of wireless Wi-Fi and communication, and more particularly, to a wireless communication method, an electronic device, and a non-volatile computer-readable storage medium.
Background
In the current network environment, there are multiple Access Points (APs), and coverage areas between the APs overlap with each other. Wireless roaming refers to the process that when a mobile terminal moves to a superposition area of coverage of two or more APs, the mobile terminal can move between APs and select optimal AP access, and data communication is kept uninterrupted in the process. In a wireless local area network (wireless local area network, WLAN), a wireless access node may actively boot a mobile terminal according to signal strength of the mobile terminal using a boot protocol in a Wi-Fi protocol standard to implement roaming of the mobile terminal.
At present, the non-inductive roaming system is basically a scheme of adding an Access Control (AC) to an AP, and for a home subscriber, only multiple APs are generally deployed, no AC controller is needed, additional AC purchase is needed to increase the cost, and the mobile terminal inevitably has the problems of packet loss and delay when switching between different APs for authentication.
Disclosure of Invention
The application provides at least one wireless communication method, electronic equipment and a nonvolatile computer readable storage medium, so as to achieve the aims of no sense of the mobile terminal in the wireless roaming process, always keeping connection with the AP, avoiding the problem that the prior scheme needs repeated authentication between the APs, and achieving no data retransmission and packet loss.
A first aspect of the present application provides a wireless communication method for a wireless access node, the wireless communication method comprising: accessing a mobile terminal, and acquiring wireless access node list information and authentication information from the mobile terminal; the wireless access node list information comprises wireless access nodes connected and connectable with the mobile terminal and signal intensity of each wireless access node; the wireless access node list information is sent to the connected wireless access node when the signal strength corresponding to the connected wireless access node is smaller than a strength threshold value by the mobile terminal; acquiring the wireless access node with the maximum signal strength based on the wireless access node list information; and sending the authentication information to the wireless access node with the maximum signal strength so as to enable the mobile terminal to communicate with the wireless access node with the maximum signal strength.
Wherein the sending the authentication information to the radio access node with the highest signal strength includes: creating a virtual network card, and performing Wi-Fi connection with the wireless access node with the maximum signal strength through the virtual network card; and sending the authentication information to the wireless access node with the maximum signal strength through the Wi-Fi.
The wireless access node list information further includes the MAC address of the connected wireless access node and the MAC address of the wireless access node with the maximum signal strength, and after the authentication information is sent to the wireless access node with the maximum signal strength through the Wi-Fi connection, the method further includes: changing the MAC address of the connected wireless access node into the MAC address of the wireless access node with the maximum signal strength so as to update the configuration information of the connected wireless access node; and sending the updated configuration information to the wireless access node with the maximum signal strength.
Wherein after the updated configuration information is sent to the radio access node with the maximum signal strength, the method further comprises: and disconnecting the Wi-Fi connection before the wireless access node with the maximum signal strength.
Wherein the authentication information includes at least one of a MAC address, a data transmission rate set, a unicast key, a multicast key, and an IP address of the mobile terminal.
A second aspect of the present application provides a wireless communication method for a wireless communication system, the wireless communication system including a mobile terminal and at least two wireless access nodes, the wireless communication method comprising: the mobile terminal establishes communication connection with one wireless access node; the mobile terminal sends wireless access node list information to the connected wireless access node when the signal intensity corresponding to the connected wireless access node is smaller than an intensity threshold; the wireless access node list information comprises wireless access nodes connected and connectable with the mobile terminal and signal intensity of each wireless access node; the connected wireless access node acquires the wireless access node with the maximum signal strength based on the wireless access node list information; and the connected wireless access node sends the authentication information to the wireless access node with the maximum signal strength so as to enable the mobile terminal to communicate with the wireless access node with the maximum signal strength.
Wherein after the mobile terminal establishes a communication connection with one of the wireless access nodes, the method further comprises: the mobile terminal transmits the authentication information to the connected wireless access node; and the mobile terminal monitors all surrounding wireless access nodes and acquires the list information of the wireless access nodes.
Wherein the sending the authentication information to the radio access node with the highest signal strength includes: creating a virtual network card, and performing Wi-Fi connection with the wireless access node with the maximum signal strength through the virtual network card; and sending the authentication information to the wireless access node with the maximum signal strength through the Wi-Fi.
The wireless access node list information further includes the MAC address of the connected wireless access node and the MAC address of the wireless access node with the maximum signal strength, and after the authentication information is sent to the wireless access node with the maximum signal strength through the Wi-Fi connection, the method further includes: changing the MAC address of the connected wireless access node into the MAC address of the wireless access node with the maximum signal strength so as to update the configuration information of the connected wireless access node; the updated configuration information is sent to the wireless access node with the maximum signal strength; and disconnecting the Wi-Fi connection before the wireless access node with the maximum signal strength.
In order to solve the technical problems, another technical scheme adopted by the application is as follows: an electronic device, comprising: a processor; a memory coupled to the processor for storing a computer program executable on the processor; wherein the processor implements the wireless communication method described above when executing the computer program.
In order to solve the technical problems, another technical scheme adopted by the application is as follows: a non-transitory computer readable storage medium having program instructions stored thereon, comprising: the computer readable storage medium has stored thereon a program code which when executed by a processor implements the wireless communication method described above.
After the wireless access node is accessed to the mobile terminal, acquiring wireless access node list information and authentication information sent to the connected wireless access node by the mobile terminal when the signal intensity corresponding to the connected wireless access node is smaller than an intensity threshold value from the mobile terminal; the wireless access node list information comprises wireless access nodes which are connected and connectable by the mobile terminal, then the wireless access node with the maximum signal strength is obtained from the wireless access node list information, and authentication information is sent to the wireless access node with the maximum signal strength, so that the mobile terminal is always connected with the wireless access node with the maximum signal strength. The auto-negotiation among a plurality of wireless access nodes realizes the transfer of authentication information, a central controller is not required to be deployed, the mobile terminal is free from sense in the wireless roaming process, the connection with the wireless access nodes is always kept, the problem of repeated authentication among the wireless access nodes is avoided, and the aims of no data retransmission and no packet loss are achieved.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the application.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the application and, together with the description, serve to explain the technical aspects of the application.
Fig. 1 is a flow chart of a first embodiment of a wireless communication method of the present application;
FIG. 2 is a schematic diagram showing a specific flow of step S13 in the embodiment of FIG. 1;
FIG. 3 is a flow chart of a second embodiment of the wireless communication method of the present application;
FIG. 4 is a schematic diagram illustrating a specific flow of step S34 in the embodiment of FIG. 3;
fig. 5 is a flow chart of a third embodiment of a wireless communication method of the present application;
FIG. 6 is a schematic diagram of an embodiment of a communication system of the present application;
FIG. 7 is a schematic diagram of an embodiment of an electronic device of the present application;
FIG. 8 is a schematic structural diagram of one embodiment of a non-volatile computer-readable storage medium of the present application.
Detailed Description
The following describes the embodiments of the present application in detail with reference to the drawings.
In the following description, for purposes of explanation and not limitation, specific details are set forth such as the particular system architecture, interfaces, techniques, etc., in order to provide a thorough understanding of the present application.
The term "and/or" is herein merely an association relationship describing an associated object, meaning that there may be three relationships, e.g., a and/or B, may represent: a exists alone, A and B exist together, and B exists alone. In addition, the character "/" herein generally indicates that the front and rear associated objects are an "or" relationship. Further, "a plurality" herein means two or more than two. In addition, the term "at least one" herein means any one of a plurality or any combination of at least two of a plurality, for example, including at least one of A, B, C, and may mean including any one or more elements selected from the group consisting of A, B and C.
Some concepts in the embodiments of the present application will be explained first.
AP: including simple wireless access points (wireless APs) and also wireless routers (including wireless gateways and wireless bridges).
And (3) STA: station sites, each of which connects to terminals in a wireless network (e.g., notebook computers, PDAs, and other user devices that can be networked), may be referred to as a site.
AC: access Control, commonly referred to as a wireless controller, is a network device, i.e., a wireless controller, responsible for managing APs in a wireless network within a certain area.
Beacon frame: the beacon frames broadcast by the AP periodically are sent out by the AP at certain time intervals so as to tell the outside of the existence of the wireless network. Wi-Fi devices may all receive under the same channel.
BSSID: the MAC address of the wireless access node.
RSSI: received Signal Strength Indication, is an indication of the strength of the received signal.
SSID: service Set Identifier, service set identification, is used to distinguish between different networks.
Referring to fig. 1, fig. 1 is a flow chart of a first embodiment of a wireless communication method according to the present application, and an execution subject of the wireless communication method according to the present embodiment is a wireless access node.
Step S11: accessing a mobile terminal, and acquiring wireless access node list information and authentication information from the mobile terminal; the wireless access node list information comprises wireless access nodes connected and connectable with the mobile terminal and signal intensity of each wireless access node; the wireless access node list information is sent to the connected wireless access node by the mobile terminal when the signal strength corresponding to the connected wireless access node is smaller than the strength threshold value.
A wireless access node (hereinafter, expressed using AP 1) accesses a mobile terminal, and AP1 acquires and saves authentication information of the mobile terminal from a connected mobile terminal, including at least one of a MAC address and an IP address of the mobile terminal, a data transmission rate set negotiated with the mobile terminal by AP1, a unicast key, and a multicast key.
When the signal strength between the AP1 and the mobile terminal is smaller than the strength threshold, the AP1 acquires wireless access node list information from the connected mobile terminal, the wireless access node list information including information of wireless access nodes to which the mobile terminal is connected and connectable, the information of the wireless access nodes including BSSID and RSSI thereof, i.e., MAC address and signal strength of the wireless access nodes.
Step S12: and acquiring the wireless access node with the maximum signal strength based on the wireless access node list information.
The AP1 acquires the radio access node list information, selects a radio access node having the highest signal strength from the radio access node list, and initiates connection.
Step S13: and sending the authentication information to the wireless access node with the maximum signal strength so as to enable the mobile terminal to communicate with the wireless access node with the maximum signal strength.
The AP1 transmits authentication information to the wireless access node having the greatest signal strength so that the mobile terminal communicates with the wireless access node having the greatest signal strength to connect the mobile terminal with the AP having the greatest signal strength.
Referring to fig. 2, fig. 2 is a schematic flowchart of step S13 in the embodiment of fig. 1.
Step S21: and creating a virtual network card, and performing Wi-Fi connection with the wireless access node with the maximum signal strength through the virtual network card.
The AP1 creates a virtual network card, which is a coexistence mode of the STA mode and the AP mode, i.e. when the Wi-Fi module is used as the AP, it may also exist as one STA mode, for example: the Wi-Fi module is used as an AP, so that a mobile phone or a computer of a client can be accessed, and meanwhile, the Wi-F module can be used as an STA to be accessed to a router or an upper server for data uploading. And the AP1 initiates Wi-Fi connection to the wireless access node with the maximum signal strength in the received wireless access node list by using the virtual STA, so that the AP1 communicates with the wireless access node with the maximum signal strength in the wireless access node list.
Step S22: and sending the authentication information to the wireless access node with the maximum signal strength through Wi-Fi.
After the AP1 establishes Wi-Fi connection with the wireless access node with the maximum signal strength in the received wireless access node list, the authentication information of the mobile terminal is sent to the wireless access node with the maximum signal strength in the wireless access node list by using a Wi-Fi communication mode, and the AP2 is used to express the wireless access node with the maximum signal strength in the wireless access node list.
After the AP1 synchronizes the authentication information of the mobile terminal to the AP2, the AP2 synchronizes the configuration of the AP1, including saving the MAC address and the IP address of the mobile terminal, setting a unicast key, a multicast key, etc., and the AP2 sets the BSSID of the AP1, that is, the MAC address of the AP1, to its own BSSID. After that, the AP2 performs data transmission and reception with the mobile terminal at the rate set supported by both parties.
After the AP2 completes the synchronization configuration with the AP1, the virtual STA of the AP1 disconnects the Wi-Fi connection with the AP2, and at the same time the AP1 changes its BSSID to the BSSID of the AP2.
The auto-negotiation among a plurality of wireless access nodes realizes the transfer of authentication information, a central controller is not required to be deployed, the mobile terminal is free from sense in the wireless roaming process, the connection with the wireless access nodes is always kept, the problem of repeated authentication among the wireless access nodes is avoided, and the aims of no data retransmission and no packet loss are achieved.
Referring to fig. 3, fig. 3 is a flow chart of a second embodiment of a wireless communication method according to the present application, where the wireless communication method is used in a wireless communication system, and the wireless communication system includes a mobile terminal and at least two wireless access nodes.
Step S31: the mobile terminal establishes a communication connection with a radio access node.
The mobile terminal is connected with a last wireless access node, authentication information is transmitted to the connected wireless access node, and monitors all surrounding wireless access nodes and acquires wireless access node list information. The wireless access node stores authentication information with the mobile terminal, including at least any one of a MAC address and an IP address of the mobile terminal, a data transmission rate set negotiated by the wireless access node with the mobile terminal, a unicast key, a multicast key, and the like.
Step S32: the mobile terminal sends wireless access node list information to the connected wireless access node when the signal intensity corresponding to the connected wireless access node is smaller than an intensity threshold value; the wireless access node list information comprises wireless access nodes connected and connectable with the mobile terminal and signal intensity of each wireless access node.
The mobile terminal monitors Beacon frames of all surrounding wireless access nodes, and when the mobile terminal finds that the signal intensity corresponding to the connected wireless access node is smaller than the intensity threshold value, the mobile terminal sends the wireless access node list information with the same hot spot name under the current channel to the connected wireless access node. The wireless access node list information includes information of wireless access nodes to which the mobile terminal is connected and connectable, and the information of the wireless access nodes includes BSSID and RSSI thereof, i.e., MAC address and signal strength of the wireless access nodes. The connected radio access node will be described below using AP1.
Step S33: the connected wireless access node acquires the wireless access node with the highest signal strength based on the wireless access node list information.
The AP1 receives the radio access node list information from the mobile terminal and acquires a radio access node with the highest signal strength from the radio access node list. The AP2 will be used hereinafter to describe the radio access node with the greatest signal strength.
Step S34: the connected wireless access node transmits authentication information to the wireless access node having the greatest signal strength so that the mobile terminal communicates with the wireless access node having the greatest signal strength.
The AP1 transmits authentication information to the wireless access node having the greatest signal strength so that the mobile terminal communicates with the wireless access node having the greatest signal strength to connect the mobile terminal with the AP having the greatest signal strength.
Referring to fig. 4, fig. 4 is a schematic flowchart of step S34 in the embodiment of fig. 3.
Step S41: the connected wireless access node creates a virtual network card, and Wi-Fi connection is carried out between the virtual network card and the wireless access node with the maximum signal strength.
The AP1 creates a virtual network card, which is a coexistence mode of the STA mode and the AP mode. AP1 initiates a Wi-Fi connection to AP2 using the virtual STA to enable AP1 to communicate with the wireless access node with the highest signal strength in the wireless access node list.
Step S42: the connected wireless access node sends authentication information to the wireless access node with the maximum signal strength through Wi-Fi.
Further, after the connected wireless access node sends the authentication information to the wireless access node with the maximum signal strength through Wi-Fi, the connected wireless access node changes the MAC address of the wireless access node with the maximum signal strength into the MAC address of the connected wireless access node so as to update the configuration information of the wireless access node with the maximum signal strength; transmitting the configuration information to a wireless access node with the maximum signal strength; the Wi-Fi connection before the wireless access node with the highest signal strength is disconnected.
After Wi-Fi communication is established between the AP1 and the AP2, authentication information of the AP1 and the mobile terminal is sent to the AP2.
After the AP1 synchronizes the authentication information of the mobile terminal to the AP2, the AP2 synchronizes the configuration of the AP1, including saving the MAC address and the IP address of the mobile terminal, setting a unicast key, a multicast key, etc., and the AP2 sets the BSSID of the AP1, that is, the MAC address of the AP1, to its own BSSID. After that, the AP2 performs data transmission and reception with the mobile terminal at the rate set supported by both parties.
After the AP2 completes the synchronization configuration with the AP1, the virtual STA of the AP1 disconnects the Wi-Fi connection with the AP2, and at the same time the AP1 changes its BSSID to the BSSID of the AP2. And the mobile terminal continues to monitor Beacon frames of all surrounding wireless access nodes, and when the signal strength of the currently connected wireless access node is lower than the strength threshold value, the mobile terminal reports the wireless access node list information to the currently connected wireless access node and repeats the steps.
The auto-negotiation among a plurality of wireless access nodes realizes the transfer of authentication information, a central controller is not required to be deployed, the mobile terminal is free from sense in the wireless roaming process, the connection with the wireless access nodes is always kept, the problem of repeated authentication among the wireless access nodes is avoided, and the aims of no data retransmission and no packet loss are achieved.
Referring to fig. 5, fig. 5 is a flowchart of a third embodiment of the wireless communication method of the present application.
The mobile terminal establishes Wi-Fi connection with the AP1, and the AP1 stores authentication information of the mobile terminal, wherein the authentication information comprises at least any one of a MAC address and an IP address of the mobile terminal, a data transmission rate set negotiated by the wireless access node and the mobile terminal, a unicast key, a multicast key and the like. And the mobile terminal monitors Beacon frames of all surrounding wireless access nodes, and when the mobile terminal finds that the signal intensity corresponding to the AP1 is smaller than the intensity threshold value, the mobile terminal sends the wireless access node list information with the same hot spot name under the current channel to the AP1. The wireless access node list information includes information of wireless access nodes to which the mobile terminal is connected and connectable, and the information of the wireless access nodes includes BSSID and RSSI thereof, i.e., MAC address and signal strength of the wireless access nodes.
The AP1 selects a wireless access node AP2 with the maximum signal strength from the received wireless access node list information to initiate connection, and the AP1 creates a virtual network card which is a coexistence mode of an STA mode and an AP mode. AP1 initiates a Wi-Fi connection with AP2 using the virtual STA to enable AP1 to communicate with AP2. The AP1 synchronizes the authentication information with the mobile terminal to the AP2, and the AP2 synchronizes the configuration of the AP1, including saving the MAC address and the IP address of the mobile terminal, setting a unicast key, a multicast key, and the like, and the AP2 sets the BSSID of the AP1, that is, the MAC address of the AP1, to its own BSSID. After that, the AP2 performs data transmission and reception with the mobile terminal at the rate set supported by both parties.
After the AP2 synchronizes the configuration of the AP1, the AP1 disconnects the STA network card connected to the AP1 and changes its BSSID to the BSSID of the AP2. And the mobile terminal continues to monitor Beacon frames of all surrounding wireless access nodes, and when the signal strength of the currently connected wireless access node is lower than the strength threshold value, the mobile terminal reports the wireless access node list information to the currently connected wireless access node and repeats the steps. The mobile terminal remains connected to the AP throughout the process.
Referring to fig. 6, fig. 6 is a schematic structural diagram of an embodiment of a communication system of the present application.
In the wireless communication method implemented in the present application, the configuration of AP1, AP2, AP3, and the like is the same throughout the coverage area of the AP, including SSID, BSSID, beacon of AP1, AP2, AP3, and the like. All physical APs form a large virtual AP, the self-negotiation among the APs realizes the noninductive roaming of the mobile terminal, a central controller is not required to be deployed, the mobile terminal is always considered to be in the coverage range of the same AP in the moving process, and the APs with the maximum signal strength are always connected.
Referring to fig. 7, fig. 7 is a schematic structural diagram of an embodiment of an electronic device of the present application.
The electronic device 700 may include, in particular, a processor 710 and a memory 720. The memory 720 is coupled to the processor 710.
The processor 710 is used to control the operation of the electronic device 700, and the processor 710 may also be referred to as a CPU (Central Processing Unit ). Processor 710 may be an integrated circuit chip with signal processing capabilities. Processor 710 may also be a general purpose processor, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), a Field Programmable Gate Array (FPGA) or other programmable logic device, discrete gate or transistor logic, discrete hardware components. A general purpose processor may be a microprocessor or the processor 710 may be any conventional processor or the like.
Memory 720 is used to store a computer program, which may be a RAM, a ROM, or other type of storage device. In particular, the memory may include one or more computer-readable storage media, which may be non-transitory. The memory may also include high-speed random access memory, as well as non-volatile memory, such as one or more magnetic disk storage devices, flash memory storage devices. In some embodiments, a non-transitory computer readable storage medium in memory is used to store at least one piece of program code.
The processor 710 is configured to execute a computer program stored in the memory 720 to implement the data processing method of system reconstruction described in the embodiments of the data processing method of system reconstruction of the present application.
In some implementations, the electronic device 700 may further include: a peripheral interface 730, and at least one peripheral. Processor 710, memory 720, and peripheral interface 730 may be connected by a bus or signal line. Individual peripheral devices may be connected to peripheral device interface 730 by buses, signal lines, or a circuit board. Specifically, the peripheral device includes: at least one of radio frequency circuitry 740, display 750, and power supply 760.
Peripheral interface 730 may be used to connect at least one Input/output (I/O) related peripheral device to processor 710 and memory 720. In some embodiments, processor 710, memory 720, and peripheral interface 730 are integrated on the same chip or circuit board; in some other implementations, either or both of processor 710, memory 720, and peripheral interface 730 may be implemented on separate chips or circuit boards, which is not limiting in this embodiment.
The Radio Frequency circuit 740 is used to receive and transmit RF (Radio Frequency) signals, also known as electromagnetic signals. The radio frequency circuit 740 communicates with the communication network and other communication devices via electromagnetic signals, and the radio frequency circuit 740 is a communication circuit of the electronic device 700. The radio frequency circuit 740 converts an electrical signal into an electromagnetic signal for transmission, or converts a received electromagnetic signal into an electrical signal. Optionally, the radio frequency circuit 740 includes: antenna systems, RF transceivers, one or more amplifiers, tuners, oscillators, digital signal processors, codec chipsets, subscriber identity module cards, and so forth. The radio frequency circuit 740 may communicate with other terminals via at least one wireless communication protocol. The wireless communication protocol includes, but is not limited to: the world wide web, metropolitan area networks, intranets, various generations of mobile communication networks (2G, 3G, 4G, and 5G), wireless local area networks, and/or Wi-Fi (Wireless Fidelity ) networks. In some embodiments, the radio frequency circuit 740 may also include NFC (Near Field Communication ) related circuits, which are not limited in this application.
The display screen 750 is used to display a UI (User Interface). The UI may include graphics, text, icons, video, and any combination thereof. When the display screen 750 is a touch display screen, the display screen 750 also has the ability to collect touch signals at or above the surface of the display screen 750. The touch signal may be input as a control signal to the processor 710 for processing. At this time, the display 750 may also be used to provide virtual buttons and/or a virtual keyboard, also referred to as soft buttons and/or a soft keyboard. In some embodiments, the display 750 may be one, disposed on the front panel of the electronic device 700; in other embodiments, the display screen 750 may be at least two, respectively disposed on different surfaces of the electronic device 700 or in a folded design; in other embodiments, the display 750 may be a flexible display disposed on a curved surface or a folded surface of the electronic device 700. Even further, the display screen 750 may be arranged in an irregular pattern other than rectangular, i.e., a shaped screen. The display 750 may be made of LCD (Liquid Crystal Display ), OLED (Organic Light-Emitting Diode) or other materials.
The power supply 760 is used to power the various components in the electronic device 700. The power source 760 may be alternating current, direct current, disposable battery, or rechargeable battery. When the power source 760 includes a rechargeable battery, the rechargeable battery may be a wired rechargeable battery or a wireless rechargeable battery. The wired rechargeable battery is a battery charged through a wired line, and the wireless rechargeable battery is a battery charged through a wireless coil. The rechargeable battery may also be used to support fast charge technology.
For detailed descriptions of functions and execution procedures of each functional module or component in the embodiment of the electronic device 700 of the present application, reference may be made to the description in the embodiment of the data processing method reconstructed by the system of the present application, which is not repeated herein.
In several embodiments provided in the present application, it should be understood that the disclosed electronic device 700 and the data processing method for system reconstruction may be implemented in other manners. For example, the various embodiments of the electronic device 700 described above are merely illustrative, e.g., the division of modules or units is merely a logical functional division, and there may be additional divisions when actually implemented, e.g., multiple units or components may be combined or integrated into another system, or some features may be omitted, or not performed. Alternatively, the coupling or direct coupling or communication connection shown or discussed with each other may be an indirect coupling or communication connection via some interfaces, devices or units, which may be in electrical, mechanical or other form.
The units described as separate units may or may not be physically separate, and units shown as units may or may not be physical units, may be located in one place, or may be distributed over a plurality of network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the embodiment.
In addition, each functional unit in each embodiment of the present application may be integrated in one processing unit, or each unit may exist alone physically, or two or more units may be integrated in one unit. The integrated units may be implemented in hardware or in software functional units.
Referring to fig. 8, fig. 8 is a schematic structural diagram of an embodiment of a non-volatile computer readable storage medium of the present application.
Referring to fig. 8, the above-described integrated units, if implemented in the form of software functional units and sold or used as separate products, may be stored in a non-volatile computer-readable storage medium 800. Based on such understanding, the technical solution of the present application may be embodied essentially or in part or all or part of the technical solution contributing to the prior art or in the form of a software product stored in a storage medium, including several instructions/computer programs to cause a computer device (which may be a personal computer, a server, or a network device, etc.) or a processor (processor) to perform all or part of the steps of the methods of the embodiments of the present invention. And the aforementioned storage medium includes: various media such as a usb disk, a removable hard disk, a Read-Only Memory (ROM), a random access Memory (RAM, random Access Memory), a magnetic disk or an optical disk, and computer devices such as a computer, a mobile phone, a notebook computer, a tablet computer, and a camera having the above storage media.
In the several embodiments provided in this application, it should be understood that the disclosed systems, apparatuses, and methods may be implemented in other ways. For example, the apparatus embodiments described above are merely illustrative, e.g., the division of elements is merely a logical functional division, and there may be additional divisions of actual implementation, e.g., multiple elements or components may be combined or integrated into another system, or some features may be omitted, or not performed. Alternatively, the coupling or direct coupling or communication connection shown or discussed with each other may be an indirect coupling or communication connection via some interfaces, devices or units, which may be in electrical, mechanical or other form.
In addition, each functional unit in each embodiment of the present application may be integrated in one processing unit, or each unit may exist alone physically, or two or more units may be integrated in one unit. The integrated units may be implemented in hardware or in software functional units.

Claims (11)

1. A wireless communication method for a wireless access node, the wireless communication method comprising:
accessing a mobile terminal, and acquiring wireless access node list information and authentication information from the mobile terminal; the wireless access node list information comprises wireless access nodes connected and connectable with the mobile terminal and signal intensity of each wireless access node; the wireless access node list information is sent to the connected wireless access node when the signal strength corresponding to the connected wireless access node is smaller than a strength threshold value by the mobile terminal;
acquiring the wireless access node with the maximum signal strength based on the wireless access node list information;
and sending the authentication information to the wireless access node with the maximum signal strength so as to enable the mobile terminal to communicate with the wireless access node with the maximum signal strength.
2. The wireless communication method according to claim 1, wherein the transmitting the authentication information to the wireless access node having the greatest signal strength comprises:
creating a virtual network card, and performing Wi-Fi connection with the wireless access node with the maximum signal strength through the virtual network card;
and sending the authentication information to the wireless access node with the maximum signal strength through the Wi-Fi.
3. The wireless communication method according to claim 2, wherein the wireless access node list information further includes MAC addresses of connected wireless access nodes and MAC addresses of the wireless access nodes with the greatest signal strength, and wherein the transmitting the authentication information to the wireless access node with the greatest signal strength through the Wi-Fi connection further includes:
changing the MAC address of the wireless access node with the maximum signal strength into the MAC address of the connected wireless access node so as to update the configuration information of the wireless access node with the maximum signal strength;
and sending the configuration information to the wireless access node with the maximum signal strength.
4. The wireless communication method according to claim 3, further comprising, after said transmitting the updated configuration information to the wireless access node having the highest signal strength:
and disconnecting Wi-Fi connection with the wireless access node with the maximum signal strength.
5. The wireless communication method according to claim 1, wherein the authentication information includes at least one of a MAC address, a data transmission rate set, a unicast key, a multicast key, and an IP address of the mobile terminal.
6. A wireless communication method for a wireless communication system comprising a mobile terminal and at least two radio access nodes, the wireless communication method comprising:
the mobile terminal establishes communication connection with one wireless access node;
the mobile terminal sends wireless access node list information to the connected wireless access node when the signal strength corresponding to the connected wireless access node is smaller than a strength threshold value; the wireless access node list information comprises wireless access nodes connected and connectable with the mobile terminal and signal intensity of each wireless access node;
the connected wireless access node acquires the wireless access node with the maximum signal strength based on the wireless access node list information;
and the connected wireless access node sends the authentication information to the wireless access node with the maximum signal strength so as to enable the mobile terminal to communicate with the wireless access node with the maximum signal strength.
7. The method of claim 6, further comprising, after the mobile terminal establishes a communication connection with one of the radio access nodes:
the mobile terminal transmits the authentication information to the connected wireless access node;
and the mobile terminal monitors all surrounding wireless access nodes and acquires the list information of the wireless access nodes.
8. The method according to claim 6, wherein the transmitting the authentication information to the radio access node having the highest signal strength comprises:
creating a virtual network card, and performing Wi-Fi connection with the wireless access node with the maximum signal strength through the virtual network card;
and sending the authentication information to the wireless access node with the maximum signal strength through the Wi-Fi.
9. The wireless communication method according to claim 8, wherein the wireless access node list information further includes MAC addresses of connected wireless access nodes and MAC addresses of the wireless access nodes with the greatest signal strength, and wherein the transmitting the authentication information to the wireless access node with the greatest signal strength through the Wi-Fi connection further includes:
changing the MAC address of the wireless access node with the maximum signal strength into the MAC address of the connected wireless access node so as to update the configuration information of the wireless access node with the maximum signal strength;
transmitting the configuration information to the wireless access node with the maximum signal strength;
and disconnecting the Wi-Fi connection before the wireless access node with the maximum signal strength.
10. An electronic device, comprising:
a processor;
a memory coupled to the processor for storing a computer program executable on the processor;
wherein the processor, when executing the computer program, implements the wireless communication method of any of claims 1 to 9.
11. A non-transitory computer readable storage medium having program instructions stored thereon, comprising: the computer-readable storage medium stores program code; the program code, when run on a computer, causes the computer to perform the wireless communication method of any of claims 1 to 9.
CN202211462710.7A 2022-11-17 2022-11-17 Wireless communication method, electronic device, and computer storage medium Pending CN116017397A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211462710.7A CN116017397A (en) 2022-11-17 2022-11-17 Wireless communication method, electronic device, and computer storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211462710.7A CN116017397A (en) 2022-11-17 2022-11-17 Wireless communication method, electronic device, and computer storage medium

Publications (1)

Publication Number Publication Date
CN116017397A true CN116017397A (en) 2023-04-25

Family

ID=86027693

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211462710.7A Pending CN116017397A (en) 2022-11-17 2022-11-17 Wireless communication method, electronic device, and computer storage medium

Country Status (1)

Country Link
CN (1) CN116017397A (en)

Similar Documents

Publication Publication Date Title
US10165477B2 (en) Distributed seamless roaming in wireless networks
AU2016200197B2 (en) Repeating method of wireless repeating device,and wireless repeating device
JP2021522750A (en) Communication method and communication device
JP2021536165A (en) Communication device and communication method for multi-band operation
EP3254516A1 (en) Systems and methods for dynamic band switching
US11395192B2 (en) Communication method and communications apparatus
JP2023521512A (en) Link processing method, multilink device and computer readable storage medium
US9769721B2 (en) Channel switching method, apparatus, and device
US20160366633A1 (en) Access point, station, and beacon frame sending method and system
EP2563086B1 (en) Wireless communication apparatus
CN108632022A (en) A kind of secret key update method and device
US10390278B2 (en) Method for automatic switching between access points, and wireless routing device
KR20140113230A (en) Method for wireless link setup of access point utilizing multiple channels
CN116017397A (en) Wireless communication method, electronic device, and computer storage medium
EP4012965A1 (en) Channel indication sending method, channel scanning method, and device
JP6659042B2 (en) Communication device, communication system, communication control method, and communication control program
CN114557004A (en) Communication method and communication device
CN114258011B (en) Information sending method, information receiving method, information sending device, information receiving device and terminal
RU2803784C2 (en) Communication device and communication method for multi-band operation
JP2024503592A (en) Multilink reconfiguration method and device
CN117793678A (en) Network connection method, electronic equipment and system
KR20240052858A (en) Communication method and multi-link device
CN117896795A (en) Assisted roaming
CN113573421A (en) Network connection method, mobile router, wireless device, and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination