CN116017397A - Wireless communication method, electronic device, and computer storage medium - Google Patents
Wireless communication method, electronic device, and computer storage medium Download PDFInfo
- Publication number
- CN116017397A CN116017397A CN202211462710.7A CN202211462710A CN116017397A CN 116017397 A CN116017397 A CN 116017397A CN 202211462710 A CN202211462710 A CN 202211462710A CN 116017397 A CN116017397 A CN 116017397A
- Authority
- CN
- China
- Prior art keywords
- wireless access
- access node
- signal strength
- mobile terminal
- maximum signal
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Classifications
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D30/00—Reducing energy consumption in communication networks
- Y02D30/70—Reducing energy consumption in communication networks in wireless communication networks
Landscapes
- Mobile Radio Communication Systems (AREA)
Abstract
The application discloses a wireless communication method, an electronic device and a non-volatile computer readable storage medium. The method comprises the following steps: accessing a mobile terminal, and acquiring wireless access node list information and authentication information from the mobile terminal; acquiring the wireless access node with the maximum signal strength based on the wireless access node list information; and sending the authentication information to the wireless access node with the maximum signal strength so as to enable the mobile terminal to communicate with the wireless access node with the maximum signal strength. By the scheme, the noninductive roaming of the mobile terminal can be realized.
Description
Technical Field
The present application relates to the field of wireless Wi-Fi and communication, and more particularly, to a wireless communication method, an electronic device, and a non-volatile computer-readable storage medium.
Background
In the current network environment, there are multiple Access Points (APs), and coverage areas between the APs overlap with each other. Wireless roaming refers to the process that when a mobile terminal moves to a superposition area of coverage of two or more APs, the mobile terminal can move between APs and select optimal AP access, and data communication is kept uninterrupted in the process. In a wireless local area network (wireless local area network, WLAN), a wireless access node may actively boot a mobile terminal according to signal strength of the mobile terminal using a boot protocol in a Wi-Fi protocol standard to implement roaming of the mobile terminal.
At present, the non-inductive roaming system is basically a scheme of adding an Access Control (AC) to an AP, and for a home subscriber, only multiple APs are generally deployed, no AC controller is needed, additional AC purchase is needed to increase the cost, and the mobile terminal inevitably has the problems of packet loss and delay when switching between different APs for authentication.
Disclosure of Invention
The application provides at least one wireless communication method, electronic equipment and a nonvolatile computer readable storage medium, so as to achieve the aims of no sense of the mobile terminal in the wireless roaming process, always keeping connection with the AP, avoiding the problem that the prior scheme needs repeated authentication between the APs, and achieving no data retransmission and packet loss.
A first aspect of the present application provides a wireless communication method for a wireless access node, the wireless communication method comprising: accessing a mobile terminal, and acquiring wireless access node list information and authentication information from the mobile terminal; the wireless access node list information comprises wireless access nodes connected and connectable with the mobile terminal and signal intensity of each wireless access node; the wireless access node list information is sent to the connected wireless access node when the signal strength corresponding to the connected wireless access node is smaller than a strength threshold value by the mobile terminal; acquiring the wireless access node with the maximum signal strength based on the wireless access node list information; and sending the authentication information to the wireless access node with the maximum signal strength so as to enable the mobile terminal to communicate with the wireless access node with the maximum signal strength.
Wherein the sending the authentication information to the radio access node with the highest signal strength includes: creating a virtual network card, and performing Wi-Fi connection with the wireless access node with the maximum signal strength through the virtual network card; and sending the authentication information to the wireless access node with the maximum signal strength through the Wi-Fi.
The wireless access node list information further includes the MAC address of the connected wireless access node and the MAC address of the wireless access node with the maximum signal strength, and after the authentication information is sent to the wireless access node with the maximum signal strength through the Wi-Fi connection, the method further includes: changing the MAC address of the connected wireless access node into the MAC address of the wireless access node with the maximum signal strength so as to update the configuration information of the connected wireless access node; and sending the updated configuration information to the wireless access node with the maximum signal strength.
Wherein after the updated configuration information is sent to the radio access node with the maximum signal strength, the method further comprises: and disconnecting the Wi-Fi connection before the wireless access node with the maximum signal strength.
Wherein the authentication information includes at least one of a MAC address, a data transmission rate set, a unicast key, a multicast key, and an IP address of the mobile terminal.
A second aspect of the present application provides a wireless communication method for a wireless communication system, the wireless communication system including a mobile terminal and at least two wireless access nodes, the wireless communication method comprising: the mobile terminal establishes communication connection with one wireless access node; the mobile terminal sends wireless access node list information to the connected wireless access node when the signal intensity corresponding to the connected wireless access node is smaller than an intensity threshold; the wireless access node list information comprises wireless access nodes connected and connectable with the mobile terminal and signal intensity of each wireless access node; the connected wireless access node acquires the wireless access node with the maximum signal strength based on the wireless access node list information; and the connected wireless access node sends the authentication information to the wireless access node with the maximum signal strength so as to enable the mobile terminal to communicate with the wireless access node with the maximum signal strength.
Wherein after the mobile terminal establishes a communication connection with one of the wireless access nodes, the method further comprises: the mobile terminal transmits the authentication information to the connected wireless access node; and the mobile terminal monitors all surrounding wireless access nodes and acquires the list information of the wireless access nodes.
Wherein the sending the authentication information to the radio access node with the highest signal strength includes: creating a virtual network card, and performing Wi-Fi connection with the wireless access node with the maximum signal strength through the virtual network card; and sending the authentication information to the wireless access node with the maximum signal strength through the Wi-Fi.
The wireless access node list information further includes the MAC address of the connected wireless access node and the MAC address of the wireless access node with the maximum signal strength, and after the authentication information is sent to the wireless access node with the maximum signal strength through the Wi-Fi connection, the method further includes: changing the MAC address of the connected wireless access node into the MAC address of the wireless access node with the maximum signal strength so as to update the configuration information of the connected wireless access node; the updated configuration information is sent to the wireless access node with the maximum signal strength; and disconnecting the Wi-Fi connection before the wireless access node with the maximum signal strength.
In order to solve the technical problems, another technical scheme adopted by the application is as follows: an electronic device, comprising: a processor; a memory coupled to the processor for storing a computer program executable on the processor; wherein the processor implements the wireless communication method described above when executing the computer program.
In order to solve the technical problems, another technical scheme adopted by the application is as follows: a non-transitory computer readable storage medium having program instructions stored thereon, comprising: the computer readable storage medium has stored thereon a program code which when executed by a processor implements the wireless communication method described above.
After the wireless access node is accessed to the mobile terminal, acquiring wireless access node list information and authentication information sent to the connected wireless access node by the mobile terminal when the signal intensity corresponding to the connected wireless access node is smaller than an intensity threshold value from the mobile terminal; the wireless access node list information comprises wireless access nodes which are connected and connectable by the mobile terminal, then the wireless access node with the maximum signal strength is obtained from the wireless access node list information, and authentication information is sent to the wireless access node with the maximum signal strength, so that the mobile terminal is always connected with the wireless access node with the maximum signal strength. The auto-negotiation among a plurality of wireless access nodes realizes the transfer of authentication information, a central controller is not required to be deployed, the mobile terminal is free from sense in the wireless roaming process, the connection with the wireless access nodes is always kept, the problem of repeated authentication among the wireless access nodes is avoided, and the aims of no data retransmission and no packet loss are achieved.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the application.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the application and, together with the description, serve to explain the technical aspects of the application.
Fig. 1 is a flow chart of a first embodiment of a wireless communication method of the present application;
FIG. 2 is a schematic diagram showing a specific flow of step S13 in the embodiment of FIG. 1;
FIG. 3 is a flow chart of a second embodiment of the wireless communication method of the present application;
FIG. 4 is a schematic diagram illustrating a specific flow of step S34 in the embodiment of FIG. 3;
fig. 5 is a flow chart of a third embodiment of a wireless communication method of the present application;
FIG. 6 is a schematic diagram of an embodiment of a communication system of the present application;
FIG. 7 is a schematic diagram of an embodiment of an electronic device of the present application;
FIG. 8 is a schematic structural diagram of one embodiment of a non-volatile computer-readable storage medium of the present application.
Detailed Description
The following describes the embodiments of the present application in detail with reference to the drawings.
In the following description, for purposes of explanation and not limitation, specific details are set forth such as the particular system architecture, interfaces, techniques, etc., in order to provide a thorough understanding of the present application.
The term "and/or" is herein merely an association relationship describing an associated object, meaning that there may be three relationships, e.g., a and/or B, may represent: a exists alone, A and B exist together, and B exists alone. In addition, the character "/" herein generally indicates that the front and rear associated objects are an "or" relationship. Further, "a plurality" herein means two or more than two. In addition, the term "at least one" herein means any one of a plurality or any combination of at least two of a plurality, for example, including at least one of A, B, C, and may mean including any one or more elements selected from the group consisting of A, B and C.
Some concepts in the embodiments of the present application will be explained first.
AP: including simple wireless access points (wireless APs) and also wireless routers (including wireless gateways and wireless bridges).
And (3) STA: station sites, each of which connects to terminals in a wireless network (e.g., notebook computers, PDAs, and other user devices that can be networked), may be referred to as a site.
AC: access Control, commonly referred to as a wireless controller, is a network device, i.e., a wireless controller, responsible for managing APs in a wireless network within a certain area.
Beacon frame: the beacon frames broadcast by the AP periodically are sent out by the AP at certain time intervals so as to tell the outside of the existence of the wireless network. Wi-Fi devices may all receive under the same channel.
BSSID: the MAC address of the wireless access node.
RSSI: received Signal Strength Indication, is an indication of the strength of the received signal.
SSID: service Set Identifier, service set identification, is used to distinguish between different networks.
Referring to fig. 1, fig. 1 is a flow chart of a first embodiment of a wireless communication method according to the present application, and an execution subject of the wireless communication method according to the present embodiment is a wireless access node.
Step S11: accessing a mobile terminal, and acquiring wireless access node list information and authentication information from the mobile terminal; the wireless access node list information comprises wireless access nodes connected and connectable with the mobile terminal and signal intensity of each wireless access node; the wireless access node list information is sent to the connected wireless access node by the mobile terminal when the signal strength corresponding to the connected wireless access node is smaller than the strength threshold value.
A wireless access node (hereinafter, expressed using AP 1) accesses a mobile terminal, and AP1 acquires and saves authentication information of the mobile terminal from a connected mobile terminal, including at least one of a MAC address and an IP address of the mobile terminal, a data transmission rate set negotiated with the mobile terminal by AP1, a unicast key, and a multicast key.
When the signal strength between the AP1 and the mobile terminal is smaller than the strength threshold, the AP1 acquires wireless access node list information from the connected mobile terminal, the wireless access node list information including information of wireless access nodes to which the mobile terminal is connected and connectable, the information of the wireless access nodes including BSSID and RSSI thereof, i.e., MAC address and signal strength of the wireless access nodes.
Step S12: and acquiring the wireless access node with the maximum signal strength based on the wireless access node list information.
The AP1 acquires the radio access node list information, selects a radio access node having the highest signal strength from the radio access node list, and initiates connection.
Step S13: and sending the authentication information to the wireless access node with the maximum signal strength so as to enable the mobile terminal to communicate with the wireless access node with the maximum signal strength.
The AP1 transmits authentication information to the wireless access node having the greatest signal strength so that the mobile terminal communicates with the wireless access node having the greatest signal strength to connect the mobile terminal with the AP having the greatest signal strength.
Referring to fig. 2, fig. 2 is a schematic flowchart of step S13 in the embodiment of fig. 1.
Step S21: and creating a virtual network card, and performing Wi-Fi connection with the wireless access node with the maximum signal strength through the virtual network card.
The AP1 creates a virtual network card, which is a coexistence mode of the STA mode and the AP mode, i.e. when the Wi-Fi module is used as the AP, it may also exist as one STA mode, for example: the Wi-Fi module is used as an AP, so that a mobile phone or a computer of a client can be accessed, and meanwhile, the Wi-F module can be used as an STA to be accessed to a router or an upper server for data uploading. And the AP1 initiates Wi-Fi connection to the wireless access node with the maximum signal strength in the received wireless access node list by using the virtual STA, so that the AP1 communicates with the wireless access node with the maximum signal strength in the wireless access node list.
Step S22: and sending the authentication information to the wireless access node with the maximum signal strength through Wi-Fi.
After the AP1 establishes Wi-Fi connection with the wireless access node with the maximum signal strength in the received wireless access node list, the authentication information of the mobile terminal is sent to the wireless access node with the maximum signal strength in the wireless access node list by using a Wi-Fi communication mode, and the AP2 is used to express the wireless access node with the maximum signal strength in the wireless access node list.
After the AP1 synchronizes the authentication information of the mobile terminal to the AP2, the AP2 synchronizes the configuration of the AP1, including saving the MAC address and the IP address of the mobile terminal, setting a unicast key, a multicast key, etc., and the AP2 sets the BSSID of the AP1, that is, the MAC address of the AP1, to its own BSSID. After that, the AP2 performs data transmission and reception with the mobile terminal at the rate set supported by both parties.
After the AP2 completes the synchronization configuration with the AP1, the virtual STA of the AP1 disconnects the Wi-Fi connection with the AP2, and at the same time the AP1 changes its BSSID to the BSSID of the AP2.
The auto-negotiation among a plurality of wireless access nodes realizes the transfer of authentication information, a central controller is not required to be deployed, the mobile terminal is free from sense in the wireless roaming process, the connection with the wireless access nodes is always kept, the problem of repeated authentication among the wireless access nodes is avoided, and the aims of no data retransmission and no packet loss are achieved.
Referring to fig. 3, fig. 3 is a flow chart of a second embodiment of a wireless communication method according to the present application, where the wireless communication method is used in a wireless communication system, and the wireless communication system includes a mobile terminal and at least two wireless access nodes.
Step S31: the mobile terminal establishes a communication connection with a radio access node.
The mobile terminal is connected with a last wireless access node, authentication information is transmitted to the connected wireless access node, and monitors all surrounding wireless access nodes and acquires wireless access node list information. The wireless access node stores authentication information with the mobile terminal, including at least any one of a MAC address and an IP address of the mobile terminal, a data transmission rate set negotiated by the wireless access node with the mobile terminal, a unicast key, a multicast key, and the like.
Step S32: the mobile terminal sends wireless access node list information to the connected wireless access node when the signal intensity corresponding to the connected wireless access node is smaller than an intensity threshold value; the wireless access node list information comprises wireless access nodes connected and connectable with the mobile terminal and signal intensity of each wireless access node.
The mobile terminal monitors Beacon frames of all surrounding wireless access nodes, and when the mobile terminal finds that the signal intensity corresponding to the connected wireless access node is smaller than the intensity threshold value, the mobile terminal sends the wireless access node list information with the same hot spot name under the current channel to the connected wireless access node. The wireless access node list information includes information of wireless access nodes to which the mobile terminal is connected and connectable, and the information of the wireless access nodes includes BSSID and RSSI thereof, i.e., MAC address and signal strength of the wireless access nodes. The connected radio access node will be described below using AP1.
Step S33: the connected wireless access node acquires the wireless access node with the highest signal strength based on the wireless access node list information.
The AP1 receives the radio access node list information from the mobile terminal and acquires a radio access node with the highest signal strength from the radio access node list. The AP2 will be used hereinafter to describe the radio access node with the greatest signal strength.
Step S34: the connected wireless access node transmits authentication information to the wireless access node having the greatest signal strength so that the mobile terminal communicates with the wireless access node having the greatest signal strength.
The AP1 transmits authentication information to the wireless access node having the greatest signal strength so that the mobile terminal communicates with the wireless access node having the greatest signal strength to connect the mobile terminal with the AP having the greatest signal strength.
Referring to fig. 4, fig. 4 is a schematic flowchart of step S34 in the embodiment of fig. 3.
Step S41: the connected wireless access node creates a virtual network card, and Wi-Fi connection is carried out between the virtual network card and the wireless access node with the maximum signal strength.
The AP1 creates a virtual network card, which is a coexistence mode of the STA mode and the AP mode. AP1 initiates a Wi-Fi connection to AP2 using the virtual STA to enable AP1 to communicate with the wireless access node with the highest signal strength in the wireless access node list.
Step S42: the connected wireless access node sends authentication information to the wireless access node with the maximum signal strength through Wi-Fi.
Further, after the connected wireless access node sends the authentication information to the wireless access node with the maximum signal strength through Wi-Fi, the connected wireless access node changes the MAC address of the wireless access node with the maximum signal strength into the MAC address of the connected wireless access node so as to update the configuration information of the wireless access node with the maximum signal strength; transmitting the configuration information to a wireless access node with the maximum signal strength; the Wi-Fi connection before the wireless access node with the highest signal strength is disconnected.
After Wi-Fi communication is established between the AP1 and the AP2, authentication information of the AP1 and the mobile terminal is sent to the AP2.
After the AP1 synchronizes the authentication information of the mobile terminal to the AP2, the AP2 synchronizes the configuration of the AP1, including saving the MAC address and the IP address of the mobile terminal, setting a unicast key, a multicast key, etc., and the AP2 sets the BSSID of the AP1, that is, the MAC address of the AP1, to its own BSSID. After that, the AP2 performs data transmission and reception with the mobile terminal at the rate set supported by both parties.
After the AP2 completes the synchronization configuration with the AP1, the virtual STA of the AP1 disconnects the Wi-Fi connection with the AP2, and at the same time the AP1 changes its BSSID to the BSSID of the AP2. And the mobile terminal continues to monitor Beacon frames of all surrounding wireless access nodes, and when the signal strength of the currently connected wireless access node is lower than the strength threshold value, the mobile terminal reports the wireless access node list information to the currently connected wireless access node and repeats the steps.
The auto-negotiation among a plurality of wireless access nodes realizes the transfer of authentication information, a central controller is not required to be deployed, the mobile terminal is free from sense in the wireless roaming process, the connection with the wireless access nodes is always kept, the problem of repeated authentication among the wireless access nodes is avoided, and the aims of no data retransmission and no packet loss are achieved.
Referring to fig. 5, fig. 5 is a flowchart of a third embodiment of the wireless communication method of the present application.
The mobile terminal establishes Wi-Fi connection with the AP1, and the AP1 stores authentication information of the mobile terminal, wherein the authentication information comprises at least any one of a MAC address and an IP address of the mobile terminal, a data transmission rate set negotiated by the wireless access node and the mobile terminal, a unicast key, a multicast key and the like. And the mobile terminal monitors Beacon frames of all surrounding wireless access nodes, and when the mobile terminal finds that the signal intensity corresponding to the AP1 is smaller than the intensity threshold value, the mobile terminal sends the wireless access node list information with the same hot spot name under the current channel to the AP1. The wireless access node list information includes information of wireless access nodes to which the mobile terminal is connected and connectable, and the information of the wireless access nodes includes BSSID and RSSI thereof, i.e., MAC address and signal strength of the wireless access nodes.
The AP1 selects a wireless access node AP2 with the maximum signal strength from the received wireless access node list information to initiate connection, and the AP1 creates a virtual network card which is a coexistence mode of an STA mode and an AP mode. AP1 initiates a Wi-Fi connection with AP2 using the virtual STA to enable AP1 to communicate with AP2. The AP1 synchronizes the authentication information with the mobile terminal to the AP2, and the AP2 synchronizes the configuration of the AP1, including saving the MAC address and the IP address of the mobile terminal, setting a unicast key, a multicast key, and the like, and the AP2 sets the BSSID of the AP1, that is, the MAC address of the AP1, to its own BSSID. After that, the AP2 performs data transmission and reception with the mobile terminal at the rate set supported by both parties.
After the AP2 synchronizes the configuration of the AP1, the AP1 disconnects the STA network card connected to the AP1 and changes its BSSID to the BSSID of the AP2. And the mobile terminal continues to monitor Beacon frames of all surrounding wireless access nodes, and when the signal strength of the currently connected wireless access node is lower than the strength threshold value, the mobile terminal reports the wireless access node list information to the currently connected wireless access node and repeats the steps. The mobile terminal remains connected to the AP throughout the process.
Referring to fig. 6, fig. 6 is a schematic structural diagram of an embodiment of a communication system of the present application.
In the wireless communication method implemented in the present application, the configuration of AP1, AP2, AP3, and the like is the same throughout the coverage area of the AP, including SSID, BSSID, beacon of AP1, AP2, AP3, and the like. All physical APs form a large virtual AP, the self-negotiation among the APs realizes the noninductive roaming of the mobile terminal, a central controller is not required to be deployed, the mobile terminal is always considered to be in the coverage range of the same AP in the moving process, and the APs with the maximum signal strength are always connected.
Referring to fig. 7, fig. 7 is a schematic structural diagram of an embodiment of an electronic device of the present application.
The electronic device 700 may include, in particular, a processor 710 and a memory 720. The memory 720 is coupled to the processor 710.
The processor 710 is used to control the operation of the electronic device 700, and the processor 710 may also be referred to as a CPU (Central Processing Unit ). Processor 710 may be an integrated circuit chip with signal processing capabilities. Processor 710 may also be a general purpose processor, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), a Field Programmable Gate Array (FPGA) or other programmable logic device, discrete gate or transistor logic, discrete hardware components. A general purpose processor may be a microprocessor or the processor 710 may be any conventional processor or the like.
The processor 710 is configured to execute a computer program stored in the memory 720 to implement the data processing method of system reconstruction described in the embodiments of the data processing method of system reconstruction of the present application.
In some implementations, the electronic device 700 may further include: a peripheral interface 730, and at least one peripheral. Processor 710, memory 720, and peripheral interface 730 may be connected by a bus or signal line. Individual peripheral devices may be connected to peripheral device interface 730 by buses, signal lines, or a circuit board. Specifically, the peripheral device includes: at least one of radio frequency circuitry 740, display 750, and power supply 760.
The Radio Frequency circuit 740 is used to receive and transmit RF (Radio Frequency) signals, also known as electromagnetic signals. The radio frequency circuit 740 communicates with the communication network and other communication devices via electromagnetic signals, and the radio frequency circuit 740 is a communication circuit of the electronic device 700. The radio frequency circuit 740 converts an electrical signal into an electromagnetic signal for transmission, or converts a received electromagnetic signal into an electrical signal. Optionally, the radio frequency circuit 740 includes: antenna systems, RF transceivers, one or more amplifiers, tuners, oscillators, digital signal processors, codec chipsets, subscriber identity module cards, and so forth. The radio frequency circuit 740 may communicate with other terminals via at least one wireless communication protocol. The wireless communication protocol includes, but is not limited to: the world wide web, metropolitan area networks, intranets, various generations of mobile communication networks (2G, 3G, 4G, and 5G), wireless local area networks, and/or Wi-Fi (Wireless Fidelity ) networks. In some embodiments, the radio frequency circuit 740 may also include NFC (Near Field Communication ) related circuits, which are not limited in this application.
The display screen 750 is used to display a UI (User Interface). The UI may include graphics, text, icons, video, and any combination thereof. When the display screen 750 is a touch display screen, the display screen 750 also has the ability to collect touch signals at or above the surface of the display screen 750. The touch signal may be input as a control signal to the processor 710 for processing. At this time, the display 750 may also be used to provide virtual buttons and/or a virtual keyboard, also referred to as soft buttons and/or a soft keyboard. In some embodiments, the display 750 may be one, disposed on the front panel of the electronic device 700; in other embodiments, the display screen 750 may be at least two, respectively disposed on different surfaces of the electronic device 700 or in a folded design; in other embodiments, the display 750 may be a flexible display disposed on a curved surface or a folded surface of the electronic device 700. Even further, the display screen 750 may be arranged in an irregular pattern other than rectangular, i.e., a shaped screen. The display 750 may be made of LCD (Liquid Crystal Display ), OLED (Organic Light-Emitting Diode) or other materials.
The power supply 760 is used to power the various components in the electronic device 700. The power source 760 may be alternating current, direct current, disposable battery, or rechargeable battery. When the power source 760 includes a rechargeable battery, the rechargeable battery may be a wired rechargeable battery or a wireless rechargeable battery. The wired rechargeable battery is a battery charged through a wired line, and the wireless rechargeable battery is a battery charged through a wireless coil. The rechargeable battery may also be used to support fast charge technology.
For detailed descriptions of functions and execution procedures of each functional module or component in the embodiment of the electronic device 700 of the present application, reference may be made to the description in the embodiment of the data processing method reconstructed by the system of the present application, which is not repeated herein.
In several embodiments provided in the present application, it should be understood that the disclosed electronic device 700 and the data processing method for system reconstruction may be implemented in other manners. For example, the various embodiments of the electronic device 700 described above are merely illustrative, e.g., the division of modules or units is merely a logical functional division, and there may be additional divisions when actually implemented, e.g., multiple units or components may be combined or integrated into another system, or some features may be omitted, or not performed. Alternatively, the coupling or direct coupling or communication connection shown or discussed with each other may be an indirect coupling or communication connection via some interfaces, devices or units, which may be in electrical, mechanical or other form.
The units described as separate units may or may not be physically separate, and units shown as units may or may not be physical units, may be located in one place, or may be distributed over a plurality of network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the embodiment.
In addition, each functional unit in each embodiment of the present application may be integrated in one processing unit, or each unit may exist alone physically, or two or more units may be integrated in one unit. The integrated units may be implemented in hardware or in software functional units.
Referring to fig. 8, fig. 8 is a schematic structural diagram of an embodiment of a non-volatile computer readable storage medium of the present application.
Referring to fig. 8, the above-described integrated units, if implemented in the form of software functional units and sold or used as separate products, may be stored in a non-volatile computer-readable storage medium 800. Based on such understanding, the technical solution of the present application may be embodied essentially or in part or all or part of the technical solution contributing to the prior art or in the form of a software product stored in a storage medium, including several instructions/computer programs to cause a computer device (which may be a personal computer, a server, or a network device, etc.) or a processor (processor) to perform all or part of the steps of the methods of the embodiments of the present invention. And the aforementioned storage medium includes: various media such as a usb disk, a removable hard disk, a Read-Only Memory (ROM), a random access Memory (RAM, random Access Memory), a magnetic disk or an optical disk, and computer devices such as a computer, a mobile phone, a notebook computer, a tablet computer, and a camera having the above storage media.
In the several embodiments provided in this application, it should be understood that the disclosed systems, apparatuses, and methods may be implemented in other ways. For example, the apparatus embodiments described above are merely illustrative, e.g., the division of elements is merely a logical functional division, and there may be additional divisions of actual implementation, e.g., multiple elements or components may be combined or integrated into another system, or some features may be omitted, or not performed. Alternatively, the coupling or direct coupling or communication connection shown or discussed with each other may be an indirect coupling or communication connection via some interfaces, devices or units, which may be in electrical, mechanical or other form.
In addition, each functional unit in each embodiment of the present application may be integrated in one processing unit, or each unit may exist alone physically, or two or more units may be integrated in one unit. The integrated units may be implemented in hardware or in software functional units.
Claims (11)
1. A wireless communication method for a wireless access node, the wireless communication method comprising:
accessing a mobile terminal, and acquiring wireless access node list information and authentication information from the mobile terminal; the wireless access node list information comprises wireless access nodes connected and connectable with the mobile terminal and signal intensity of each wireless access node; the wireless access node list information is sent to the connected wireless access node when the signal strength corresponding to the connected wireless access node is smaller than a strength threshold value by the mobile terminal;
acquiring the wireless access node with the maximum signal strength based on the wireless access node list information;
and sending the authentication information to the wireless access node with the maximum signal strength so as to enable the mobile terminal to communicate with the wireless access node with the maximum signal strength.
2. The wireless communication method according to claim 1, wherein the transmitting the authentication information to the wireless access node having the greatest signal strength comprises:
creating a virtual network card, and performing Wi-Fi connection with the wireless access node with the maximum signal strength through the virtual network card;
and sending the authentication information to the wireless access node with the maximum signal strength through the Wi-Fi.
3. The wireless communication method according to claim 2, wherein the wireless access node list information further includes MAC addresses of connected wireless access nodes and MAC addresses of the wireless access nodes with the greatest signal strength, and wherein the transmitting the authentication information to the wireless access node with the greatest signal strength through the Wi-Fi connection further includes:
changing the MAC address of the wireless access node with the maximum signal strength into the MAC address of the connected wireless access node so as to update the configuration information of the wireless access node with the maximum signal strength;
and sending the configuration information to the wireless access node with the maximum signal strength.
4. The wireless communication method according to claim 3, further comprising, after said transmitting the updated configuration information to the wireless access node having the highest signal strength:
and disconnecting Wi-Fi connection with the wireless access node with the maximum signal strength.
5. The wireless communication method according to claim 1, wherein the authentication information includes at least one of a MAC address, a data transmission rate set, a unicast key, a multicast key, and an IP address of the mobile terminal.
6. A wireless communication method for a wireless communication system comprising a mobile terminal and at least two radio access nodes, the wireless communication method comprising:
the mobile terminal establishes communication connection with one wireless access node;
the mobile terminal sends wireless access node list information to the connected wireless access node when the signal strength corresponding to the connected wireless access node is smaller than a strength threshold value; the wireless access node list information comprises wireless access nodes connected and connectable with the mobile terminal and signal intensity of each wireless access node;
the connected wireless access node acquires the wireless access node with the maximum signal strength based on the wireless access node list information;
and the connected wireless access node sends the authentication information to the wireless access node with the maximum signal strength so as to enable the mobile terminal to communicate with the wireless access node with the maximum signal strength.
7. The method of claim 6, further comprising, after the mobile terminal establishes a communication connection with one of the radio access nodes:
the mobile terminal transmits the authentication information to the connected wireless access node;
and the mobile terminal monitors all surrounding wireless access nodes and acquires the list information of the wireless access nodes.
8. The method according to claim 6, wherein the transmitting the authentication information to the radio access node having the highest signal strength comprises:
creating a virtual network card, and performing Wi-Fi connection with the wireless access node with the maximum signal strength through the virtual network card;
and sending the authentication information to the wireless access node with the maximum signal strength through the Wi-Fi.
9. The wireless communication method according to claim 8, wherein the wireless access node list information further includes MAC addresses of connected wireless access nodes and MAC addresses of the wireless access nodes with the greatest signal strength, and wherein the transmitting the authentication information to the wireless access node with the greatest signal strength through the Wi-Fi connection further includes:
changing the MAC address of the wireless access node with the maximum signal strength into the MAC address of the connected wireless access node so as to update the configuration information of the wireless access node with the maximum signal strength;
transmitting the configuration information to the wireless access node with the maximum signal strength;
and disconnecting the Wi-Fi connection before the wireless access node with the maximum signal strength.
10. An electronic device, comprising:
a processor;
a memory coupled to the processor for storing a computer program executable on the processor;
wherein the processor, when executing the computer program, implements the wireless communication method of any of claims 1 to 9.
11. A non-transitory computer readable storage medium having program instructions stored thereon, comprising: the computer-readable storage medium stores program code; the program code, when run on a computer, causes the computer to perform the wireless communication method of any of claims 1 to 9.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202211462710.7A CN116017397A (en) | 2022-11-17 | 2022-11-17 | Wireless communication method, electronic device, and computer storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202211462710.7A CN116017397A (en) | 2022-11-17 | 2022-11-17 | Wireless communication method, electronic device, and computer storage medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN116017397A true CN116017397A (en) | 2023-04-25 |
Family
ID=86027693
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202211462710.7A Pending CN116017397A (en) | 2022-11-17 | 2022-11-17 | Wireless communication method, electronic device, and computer storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN116017397A (en) |
-
2022
- 2022-11-17 CN CN202211462710.7A patent/CN116017397A/en active Pending
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10165477B2 (en) | Distributed seamless roaming in wireless networks | |
AU2016200197B2 (en) | Repeating method of wireless repeating device,and wireless repeating device | |
JP2021522750A (en) | Communication method and communication device | |
JP2021536165A (en) | Communication device and communication method for multi-band operation | |
EP3254516A1 (en) | Systems and methods for dynamic band switching | |
US11395192B2 (en) | Communication method and communications apparatus | |
JP2023521512A (en) | Link processing method, multilink device and computer readable storage medium | |
US9769721B2 (en) | Channel switching method, apparatus, and device | |
US20160366633A1 (en) | Access point, station, and beacon frame sending method and system | |
EP2563086B1 (en) | Wireless communication apparatus | |
CN108632022A (en) | A kind of secret key update method and device | |
US10390278B2 (en) | Method for automatic switching between access points, and wireless routing device | |
KR20140113230A (en) | Method for wireless link setup of access point utilizing multiple channels | |
CN116017397A (en) | Wireless communication method, electronic device, and computer storage medium | |
EP4012965A1 (en) | Channel indication sending method, channel scanning method, and device | |
JP6659042B2 (en) | Communication device, communication system, communication control method, and communication control program | |
CN114557004A (en) | Communication method and communication device | |
CN114258011B (en) | Information sending method, information receiving method, information sending device, information receiving device and terminal | |
RU2803784C2 (en) | Communication device and communication method for multi-band operation | |
JP2024503592A (en) | Multilink reconfiguration method and device | |
CN117793678A (en) | Network connection method, electronic equipment and system | |
KR20240052858A (en) | Communication method and multi-link device | |
CN117896795A (en) | Assisted roaming | |
CN113573421A (en) | Network connection method, mobile router, wireless device, and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |