CN117320114A - Access method, device, electronic equipment and storage medium - Google Patents

Access method, device, electronic equipment and storage medium Download PDF

Info

Publication number
CN117320114A
CN117320114A CN202311121465.8A CN202311121465A CN117320114A CN 117320114 A CN117320114 A CN 117320114A CN 202311121465 A CN202311121465 A CN 202311121465A CN 117320114 A CN117320114 A CN 117320114A
Authority
CN
China
Prior art keywords
message
link establishment
flow
target
sent
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202311121465.8A
Other languages
Chinese (zh)
Inventor
吴清根
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
New H3C Technologies Co Ltd
Original Assignee
New H3C Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by New H3C Technologies Co Ltd filed Critical New H3C Technologies Co Ltd
Priority to CN202311121465.8A priority Critical patent/CN117320114A/en
Publication of CN117320114A publication Critical patent/CN117320114A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/02Access restriction performed under specific conditions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/08Access restriction or access information delivery, e.g. discovery data delivery
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/16Discovering, processing access restriction or access information

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The application provides an access method, an access device, electronic equipment and a storage medium. In the method, the AP can periodically calculate the average processing time length of each first interaction message in the self-processing wireless link establishment procedure or calculate the average processing time length of each first interaction message in the self-processing wireless link establishment procedure and the average processing time length of each second Response message in the self-processing same authentication key management procedure, and carry the link establishment parameters comprising the processing time lengths and the corresponding timeout time length of the corresponding procedure in the Beacon message and the Probe Response message so as to guide the wireless terminal to retransmit the corresponding interaction message or reinitiate the wireless link establishment procedure in time according to the link establishment parameters, thereby improving the access success rate and further improving the user experience.

Description

Access method, device, electronic equipment and storage medium
Technical Field
The present disclosure relates to the field of communications technologies, and in particular, to an access method, an access device, an electronic device, and a storage medium.
Background
The procedure for wireless terminal access to wireless local area network (Wireless Local Area Network, WLAN) is as follows:
1. The wireless terminal discovers wireless service through a Beacon (Beacon) message broadcasted by an Access Point (AP) periodically so as to determine the AP to be accessed; alternatively, the AP to be accessed is determined by broadcasting a Probe Request (Probe Request) message and discovering a wireless service by receiving a Probe Response (Probe Response) message of the AP Response.
2. And the wireless terminal initiates a wireless link establishment flow to the determined AP. That is, the wireless terminal sends an authentication request (Authentication Request) message to the determined AP, after receiving an authentication response (Authentication Response) message sent by the determined AP, sends an association request (Association Request) message to the determined AP, and completes the wireless link establishment procedure after receiving a Association Response message sent by the AP.
3. If the access mode of the wireless terminal is not the secret-free access, the wireless terminal continuously initiates an authentication key management flow used by the wireless terminal to the determined AP. When the wireless terminal uses the pre-shared key mode, the authentication key management flow used by the wireless terminal only comprises a key negotiation flow; when the wireless terminal uses the 802.1X authentication mode, the authentication key management procedure used by the wireless terminal comprises a key negotiation procedure and an 802.1X authentication procedure.
4. And after the wireless terminal successfully accesses the WLAN, carrying out data communication through the determined AP.
Generally, the wireless terminal can complete the flow process of accessing to the WLAN in a short time, but under the conditions of large network interference, abnormal packet receiving, slow response of the AP load, large time delay in the network port air interface environment and the like, the interaction flow between the wireless terminal and the AP cannot be completed in time, and the wireless terminal and the AP generally use respective interaction waiting time to determine whether to terminate the access. Because wireless terminals are various in variety and different in interaction waiting time, and the wireless terminals and the AP cannot know interaction processing time of the other side, the situations of overtime retry access and the like are easy to occur, so that the access success rate is low, and the user experience is influenced.
Disclosure of Invention
In order to overcome the problems in the related art, the application provides an access method, an access device, electronic equipment and a storage medium.
According to a first aspect of embodiments of the present application, there is provided an access method, the method being applied to an AP, the method including:
after the current period arrives, calculating average processing duration of each first interaction message in the wireless link establishment flow according to first time when each first wireless terminal which is accessed to the WLAN where the AP is located in the current period receives each first interaction message sent in the wireless link establishment flow, second time when each first interaction message which is sourced from each first wireless terminal is sent by the wireless terminal and a preset first time threshold;
If all the first wireless terminals have target wireless terminals with access modes which are not free from secret access, calculating average processing duration of each second response message in the same authentication key management flow according to third time when the target wireless terminal receives a second response message which is sent by the target wireless terminal in the authentication key management flow used by the target wireless terminal and is aimed at each second interaction message from the AP, fourth time when the target wireless terminal receives a next second interaction message which is sent by the target wireless terminal after receiving the second response message and a preset second time threshold value, wherein the last second response message which is sent by the target wireless terminal and corresponds to the same authentication key management flow and is received by the AP is not included in each second response message;
broadcasting a Beacon message carrying a first link establishment parameter when a broadcasting period is reached, so that after the Beacon message is received and the second wireless terminal which determines that the AP is an AP to be accessed sends any message in a first target flow to the AP, if the next message which is required to be sent by the AP is not received after the average processing time corresponding to the message included in the first link establishment parameter is reached, the message is sent again to the AP, and if the next message is not received after the first target time is reached, the first interaction message in the wireless link establishment flow is sent again to the AP, or the first interaction message in the wireless link establishment flow is sent to other APs which are determined again to be accessed;
If a Probe Request message broadcast by a third wireless terminal is received after the current period arrives, sending a Probe Response message carrying the first link establishment parameter to the third wireless terminal, so that the third wireless terminal sends any message in a second target flow to the AP, if the next message which needs to be sent by the AP is not received after the average processing time corresponding to the message included in the first link establishment parameter arrives, the message is sent again to the AP, and if the next message is not received after the second target time arrives, the first interaction message in the wireless link establishment flow is sent again to the AP, or the first interaction message in the wireless link establishment flow is sent to the newly determined other AP to be accessed;
the first target duration is the minimum duration of the timeout duration corresponding to the first target flow and the timeout duration corresponding to the first target flow recorded by the second wireless terminal, wherein the timeout duration corresponds to the first target flow and is included in the first link establishment parameter;
when the access mode of the second wireless terminal is close access-free, the first target flow is a wireless link establishment flow, and any message is any first interaction message; when the access mode of the second wireless terminal is not close-free access, the first target flow is a wireless link establishment flow or an authentication key management flow used by the second wireless terminal, any message is any first interaction message when the first target flow is a wireless link establishment flow, and any message is any second response message when the first target flow is an authentication key management flow used by the second wireless terminal;
The second target duration is the minimum duration of the timeout duration corresponding to the second target flow included in the first link establishment parameter and the timeout duration corresponding to the second target flow recorded by the third wireless terminal;
when the access mode of the third wireless terminal is close access-free, the second target flow is a wireless link establishment flow, and any message is any first interaction message; when the access mode of the third wireless terminal is not close access-free, the second target flow is a wireless link establishment flow or an authentication key management flow used by the third wireless terminal, any message is any first interaction message when the second target flow is a wireless link establishment flow, and any message is any second response message when the second target flow is an authentication key management flow used by the third wireless terminal.
According to a second aspect of embodiments of the present application, there is provided an electronic device comprising a processor and a machine-readable storage medium storing machine-executable instructions executable by the processor, the processor being caused by the machine-executable instructions to: method steps implementing any of the above access methods.
According to a third aspect of embodiments of the present application, there is provided a computer readable storage medium having stored therein a computer program which, when executed by a processor, implements the method steps of any of the above-described access methods.
The technical scheme provided by the embodiment of the application can comprise the following beneficial effects:
in this embodiment of the present application, the AP may periodically calculate an average processing time length of each first interaction packet in a self-processing wireless link establishment procedure or calculate an average processing time length of each first interaction packet in a self-processing wireless link establishment procedure and an average processing time length of each second Response packet in a self-processing same authentication key management procedure, and carry link establishment parameters including these processing time lengths and timeout periods corresponding to the corresponding procedures in a Beacon packet and a Probe Response packet, so as to guide a wireless terminal to retransmit the corresponding interaction packet or reinitiate the wireless link establishment procedure in time according to the link establishment parameters, thereby improving an access success rate and further improving user experience.
Correspondingly, for the wireless terminal with the access mode of the secret access-free wireless terminal, the average processing time length of the first response message in the wireless link establishment flow can be calculated periodically, and the link establishment parameters comprising the calculated average processing time length and the timeout time length corresponding to the wireless link establishment flow are carried in the first interaction message in the wireless link establishment flow, so that the corresponding AP is guided to retransmit the corresponding message in time or trigger the wireless terminal to restart the wireless link establishment flow according to the link establishment parameters, thereby improving the access success rate and further improving the user experience.
For the wireless terminal with the access mode not being the secret access-free wireless terminal, the average processing time length of the first response message in the self-processing wireless link establishment flow and the average processing time length of each second interaction message in the self-processing self-used authentication key management flow can be calculated periodically, and the link establishment parameters comprising the processing time lengths, the timeout time length corresponding to the wireless link establishment flow and the timeout time length corresponding to the authentication key management flow are carried in the first interaction message in the wireless link establishment flow, so that the corresponding AP is guided to retransmit the corresponding message in time or trigger the wireless terminal to restart the wireless link establishment flow according to the link establishment parameters, thereby improving the access success rate and further improving the user experience.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the application.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the application and together with the description, serve to explain the principles of the application.
Fig. 1 is one of flow diagrams of an access method provided in an embodiment of the present application;
Fig. 2 is a schematic format diagram of a link establishment parameter element provided in an embodiment of the present application;
fig. 3 is a second flow chart of an access method according to an embodiment of the present disclosure;
fig. 4 is a third flow chart of an access method according to an embodiment of the present disclosure;
fig. 5 is a schematic structural diagram of an access device according to an embodiment of the present application;
fig. 6 is a second schematic structural diagram of an access device according to an embodiment of the present disclosure;
fig. 7 is a third schematic structural diagram of an access device according to an embodiment of the present disclosure;
fig. 8 is a schematic structural diagram of an electronic device according to an embodiment of the present application.
Detailed Description
Reference will now be made in detail to exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numbers in different drawings refer to the same or similar elements, unless otherwise indicated. The implementations described in the following exemplary examples are not representative of all implementations consistent with the present application. Rather, they are merely examples of apparatus and methods consistent with some aspects of the present application as detailed in the accompanying claims.
The terminology used in the present application is for the purpose of describing particular embodiments only and is not intended to be limiting of the present application. As used in this application and the appended claims, the singular forms "a," "an," and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise. It should also be understood that the term "and/or" as used herein refers to and encompasses any or all possible combinations of one or more of the associated listed items.
It should be understood that although the terms first, second, third, etc. may be used herein to describe various information, these information should not be limited by these terms. These terms are only used to distinguish one type of information from another. For example, a first message may also be referred to as a second message, and similarly, a second message may also be referred to as a first message, without departing from the scope of the present application. The word "if" or "if" as used herein may be interpreted as "at … …" or "at … …", depending on the context.
Next, embodiments of the present application will be described in detail.
The embodiment of the application provides an access method, which is applied to an AP, where the AP may be a thin (Fit) AP, a Fat (Fat) AP, or an FTTR device in an FTTR network that enables a wireless access function, as shown in fig. 1, where the method may include the following steps:
s11, after the current period arrives, calculating average processing duration of each first interaction message in the wireless link establishment flow according to first time when each first wireless terminal which is accessed to the WLAN where the AP is located in the current period receives each first interaction message sent in the wireless link establishment flow, second time when each first interaction message which is sourced from each first wireless terminal is sent by the wireless terminal, and a preset first time threshold value.
S12, if all the first wireless terminals have the target wireless terminal with the access mode not being free from secret access, calculating the average processing duration of each second response message in the same authentication key management flow according to the third time when the target wireless terminal receives the second response message of each second interaction message from the AP in the authentication key management flow used by the target wireless terminal, the fourth time when the target wireless terminal receives the next second interaction message sent by the target wireless terminal after receiving the second response message from the target wireless terminal and a preset second time threshold value.
In this step, each second response message does not include the last second response message sent by the target wireless terminal corresponding to the same authentication key management flow received by the AP.
And S13, broadcasting a Beacon message carrying a link establishment parameter when a broadcasting period is reached, so that after the Beacon message is received and the second wireless terminal of the AP to be accessed is determined to send any message in a first target process to the AP, if the next message which is required to be sent by the AP is not received after the average processing time corresponding to the message included in the link establishment parameter is reached, the message is sent again to the AP, and if the next message is not received after the first target time is reached, the first interaction message in the wireless link establishment process is sent again to the AP, or the first interaction message in the wireless link establishment process is sent to other APs to be accessed which are determined again.
In this step, the first target duration is the minimum duration of the timeout duration corresponding to the first target procedure included in the first link establishment parameter and the timeout duration corresponding to the first target procedure recorded by the second wireless terminal;
when the access mode of the second wireless terminal is close-free access, the first target flow is a wireless link establishment flow, and any message is any first interaction message; when the access mode of the second wireless terminal is not close-free access, the first target flow is a wireless link establishment flow or an authentication key management flow used by the second wireless terminal, any message is any first interaction message when the first target flow is a wireless link establishment flow, and any message is any second response message when the first target flow is an authentication key management flow used by the second wireless terminal.
And S14, if a Probe Request message broadcast by the third wireless terminal is received after the current period arrives, sending a Probe Response message carrying a first link establishment parameter to the third wireless terminal, so that the third wireless terminal sends any message in the second target process to the AP, if the next message which is required to be sent by the AP is not received after the average processing time corresponding to the message included in the link establishment parameter arrives, resending the message to the AP, and if the next message is not received after the second target time arrives, resending a first interaction message in the wireless link establishment process to the AP, or sending the first interaction message in the wireless link establishment process to other APs which are redetermined to be accessed.
In this step, the second target duration is the minimum duration of the timeout duration corresponding to the second target procedure included in the first link establishment parameter and the timeout duration corresponding to the second target procedure recorded by the third wireless terminal;
when the access mode of the third wireless terminal is close-free access, the second target flow is a wireless link establishment flow, and any message is any first interaction message; when the access mode of the third wireless terminal is not close-free access, the second target flow is a wireless link establishment flow or an authentication key management flow used by the third wireless terminal, any message is any first interaction message when the second target flow is a wireless link establishment flow, and any message is any second response message when the second target flow is an authentication key management flow used by the third wireless terminal.
In the embodiment of the present application, the authentication key management procedures used by all the target wireless terminals may be completely or partially the same. For example, the authentication key management procedure may include only the key agreement procedure, or may include both the key agreement procedure and the 802.1X authentication procedure.
In addition, for the target wireless terminal using the same authentication key management flow, the message interacted with the AP to be accessed determined by itself in the wireless link establishment flow and the message interacted with the AP to be accessed determined by itself in the authentication key management flow are all existing messages, and are not listed here.
It should be further noted that, in the embodiment of the present application, after executing the step S12, the AP may execute the step S13 first, and then execute the step S14; it is also possible to perform the above step S14 first and then the above step S13.
After the step S11 is performed, if the AP finds that all access methods of the first wireless terminal are access-free, the AP directly performs the step S13 and the step S14, or directly performs the step S14 and the step S13.
It should be further noted that, in the embodiment of the present application, in one example, the first link establishment parameter may be in the form of a link establishment parameter element (Link Establish Parameter Element), and a specific format may be shown in fig. 2.
In fig. 2, the Element ID field may have a value of 255;
The value of the Length field is the Length of the element content;
the value of Element ID Extension (extension) field may be 55;
a capability field for characterizing the validity of a field (e.g., dot11-Access State Expired Time field) where a timeout period corresponding to the radio link establishment procedure is located, a field (e.g., dot11-Access Mutual Avg Time field) where an average processing period of each first interaction message in the radio link establishment procedure is located, a field (e.g., 4-way-handshake State Expired Time field) where a timeout period corresponding to the key negotiation procedure is located, a field (e.g., 4-way-handshake Mutual Avg Time field) where an average processing period of each second response message in the key negotiation procedure is located, a field (e.g., 802.1X State Expired Time field) where a timeout period corresponding to the 802.1X authentication procedure is located, and a field (e.g., 802.1X State Mutual Avg Time field) where an average processing period of each second response message in the 802.1X authentication procedure is located;
for example, bit A, represents whether the Dot11-Access State Expired Time field and the Dot11-Access Mutual Avg Time field are valid; when the value of Bit A is 0, the fields of the Dot11-Access State Expired Time and the Dot11-Access Mutual Avg Time are invalid; when the value of Bit A is 1, it represents that the Dot11-Access State Expired Time field and the Dot11-Access Mutual Avg Time field are valid;
Bit B, representing whether the 4-way-handshake State Expired Time field and the 4-way-handshake Mutual Avg Time field are valid; when the value of Bit B is 0, the 4-way-handshake State Expired Time field and the 4-way-handshake Mutual Avg Time field are invalid; when the value of Bit B is 1, it represents that the 4-way-handshake State Expired Time field and the 4-way-handshake Mutual Avg Time field are valid;
bit C, which is valid for the 802.1X State Expired Time field and the 802.1X State Mutual Avg Time field; when the value of Bit C is 0, the representative 802.1X State Expired Time field and the 802.1XState Mutual Avg Time field are invalid; when the Bit C value is 1, the 802.1X State Expired Time field and the 802.1X State Mutual Avg Time field are valid;
dot11-Access State Expired Time field, the value range can be 1-10000 ms, which is preset by the administrator and configured on the AP;
the Dot11-Access Mutual Avg Time field comprises average processing time length of each first interaction message in the wireless link establishment flow, the value range of the average processing time length of each first interaction message can be 0-10000 ms, and when the values of the Dot11-Access Mutual Avg Time fields are all 0, the average processing time length represents that no wireless terminal has access to the AP;
The 4-way-handshake State Expired Time field can be 0-5000 ms in value range, which is preset and configured on the AP by an administrator, and when the value of the 4-way-handshake State Expired Time field is 0, the corresponding timeout duration of the key negotiation flow is not involved;
the 4-way-handshake Mutual Avg Time field comprises average processing time length of each second response message in the key negotiation flow, and the value range of the average processing time length of each second response message can be 0-5000 ms; when the values of the 4-way-handshake Mutual Avg Time fields are all 0, if the values of the 4-way-handshake State Expired Time fields are all 0, the average processing time length of each second response message in the key negotiation flow is not related; if the value of the 4-way-handshake State Expired Time field is not 0, the wireless terminal is not accessed to the AP yet;
the 802.1X State Expired Time field may have a value range of 0-60000 ms, which is preset and configured on the AP by an administrator, and when the value of the 802.1X State Expired Time field is 0, represents a timeout period corresponding to the 802.1X authentication flow;
the 802.1X State Mutual Avg Time field comprises average processing time length of each second response message in the 802.1X authentication flow, and the value range of the average processing time length of each second response message can be 0-1000; when the values of the 802.1X State Mutual Avg Time fields are all 0, if the value of the 802.1X State Mutual Avg Time field is 0, the average processing duration of each second response message in the 802.1X authentication flow is represented; if the value of the 802.1X State Mutual Avg Time field is not 0, the wireless terminal is not accessed to the AP yet;
The element content refers to the content of the Dot11-Access State Expired Time field, the Dot11-Access Mutual Avg Time field, the 4-way-handshake State Expired Time field, the 4-way-handshake Mutual Avg Time field, the 802.1X State Expired Time field, and the 802.1X State Mutual Avg Time field.
In one example, the AP may set the values of Bit a, bit B, and Bit C in Capabilities field to 1. The setting mode is suitable for the scene of carrying the link establishment parameters in the Beacon message and the scene of carrying the link establishment parameters in the Probe Response message.
In another example, the AP may set the value of Bit a in Capabilities field to 1, and the AP may set the values of Bit B and Bit C according to the access manner of the wireless terminal. This scenario is generally applicable to a scenario in which the link establishment parameters are carried in a Probe Response message.
In this embodiment of the present application, after the current period arrives, if no wireless terminal is connected to the AP in the current period, when the broadcasting period arrives, the AP may broadcast the Beacon packet according to the existing manner, and when the Probe Request packet is received after the current period arrives, process the received Probe Request packet according to the existing manner.
Of course, when the broadcast period arrives, the AP may also broadcast a Beacon message carrying the link establishment parameter, and when the Probe Request message is received after the current period arrives, send a Probe Response message carrying the link establishment parameter to the corresponding wireless terminal.
Here, the values of the Dot11-Access Mutual Avg Time field, the 4-way-handshake State Expired Time field, the 4-way-handshake Mutual Avg Time field, the 802.1X State Expired Time field, and the 802.1XState Mutual Avg Time field included in the link establishment parameters in the Beacon packet and the Probe Response packet may be all 0.
And subsequently, for the wireless terminal which receives the Beacon message and determines that the wireless terminal needs to be accessed to the AP, the values of the Dot11-Access Mutual Avg Time field, the 4-way-handshake State Expired Time field, the 4-way-handshake Mutual Avg Time field, the 802.1X State Expired Time field and the 802.1X State Mutual Avg Time field contained in the link establishment parameter carried in the Beacon message are found to be 0, and in this case, the wireless terminal can interact with the AP according to the existing interaction flow.
For the wireless terminal that receives the Probe Response message, the values of the Dot11-Access Mutual Avg Time field, the 4-way-handshake State Expired Time field, the 4-way-handshake Mutual Avg Time field, the 802.1X State Expired Time field and the 802.1X State Mutual Avg Time field included in the link establishment parameter carried in the Probe Response message are found to be 0, and in this case, interaction with the AP may be performed according to the existing interaction flow. Of course, in the embodiment of the present application, the first link establishment parameter may also be presented in other formats, which are not listed here.
Specifically, in the above step S11, the AP may calculate the average processing duration of processing each first interaction packet in the radio link establishment procedure by itself by:
for each first interaction message in the wireless link establishment flow, calculating a difference value between second time for transmitting a first response message for the first interaction message from each first wireless terminal and first time when the first interaction message transmitted by each first wireless terminal is received;
carrying out summation operation on the difference value which is not larger than a preset third time threshold value in the calculated difference values to obtain a first operation result;
carrying out quotient calculation on the first calculation result and the total number value of the difference value which is not greater than a preset third time threshold value to obtain a second calculation result;
and carrying out summation operation on the second operation result and a preset fourth time threshold value to obtain a third operation result, and taking the third operation result as the average processing time length of the first interaction message.
In the above step S12, the AP may calculate the average processing duration of processing each second response message in the same authentication key management flow by itself by:
for each second response message in the same authentication key management flow, calculating a difference between a fourth time when the second response message from the first wireless terminal using the authentication key management flow is received and then a next second interaction message is transmitted and a third time when the second response message transmitted by the first wireless terminal using the authentication key management flow is received before the next second interaction message is transmitted;
Carrying out summation operation on the difference value which is not larger than a preset fifth time threshold value in the calculated difference values to obtain a fourth operation result;
carrying out quotient calculation on the fourth calculation result and the total number value of the difference value which is not greater than a preset fifth time threshold value to obtain a fifth calculation result;
and carrying out summation operation on the fifth operation result and a preset sixth time threshold value to obtain a sixth operation result, and taking the sixth operation result as the average processing time length of the second response message.
It should be noted that, in the embodiment of the present application, the preset first time threshold, the preset second time threshold, the preset third time threshold, the preset fourth time threshold, the preset fifth time threshold, and the preset sixth time threshold may be set by an administrator according to a network experience value of the WLAN network where the AP is located. It should be further noted that, in the embodiment of the present application, when calculating the average processing duration of each first interaction message in the wireless link establishment procedure of self-processing and the average processing duration of each second response message in the same authentication key management procedure of self-processing, the corresponding message data that the first wireless terminal and the AP interact normally is used, so that the subsequent wireless terminal that needs to be accessed to the wireless terminal can be timely guided to access quickly, so as to improve the access success rate, and thus improve the user experience.
Further, in the embodiment of the present application, the AP may further perform the following operations:
after the current period arrives, a first interaction message sent by a fourth wireless terminal in a wireless link establishment flow is received, wherein the first interaction message carries second link establishment parameters;
after any message in the third target flow is sent to the fourth wireless terminal, if the next message which needs to be sent by the fourth wireless terminal is not received after the average processing time length which is calculated by the fourth wireless terminal and is included in the second link establishment parameter and corresponds to the message is reached, the message is sent to the fourth wireless terminal again, and if the next message is not received after the third target time length is reached, a de-authentication message is sent to the wireless terminal so as to trigger the wireless terminal to send the first interaction message in the wireless link establishment flow to the second AP again;
the third target duration is the minimum duration of the timeout duration corresponding to the third target flow included in the second link establishment parameter and the timeout duration corresponding to the third target flow locally recorded by the AP;
when the access mode of the fourth wireless terminal is the close access-free mode, the third target flow is a wireless link establishment flow, and any message is a first response message in the wireless link establishment flow;
When the access mode of the fourth wireless terminal is not close-access-free, the third target flow is a wireless link establishment flow or an authentication key management flow used by the fourth wireless terminal, any message is a first response message in the wireless link establishment flow when the third target flow is the wireless link establishment flow, and any message is any second interaction message in the authentication key management flow when the third target flow is the authentication key management flow used by the fourth wireless terminal.
Here, the second link establishment parameter may be presented in a manner similar to that of the first link establishment parameter, and may include an Element ID field, a Length field, a Element ID Extension field, capabilities field, dot11-Access State Expired Time field, dot11-Access Mutual Avg Time field, 4-way-handshake State Expired Time field, 4-way-handshake Mutual Avg Time field, 802.1X State Expired Time field, and 802.1X State Mutual Avg Time field.
In the second link establishment parameter, the values of the Element ID field and the Element ID Extension field may be the same as the values of the Element ID field and the Element ID Extension field in the first link establishment parameter Element.
The Capabilities field is used for representing the validity of a field (i.e., a Dot11-Access State Expired Time field) of a timeout duration corresponding to the radio link establishment procedure, a field (i.e., a Dot11-Access Mutual Avg Time field) of an average processing duration of a first response message in the radio link establishment procedure, a field (e.g., a 4-way-handshake State Expired Time field) of a timeout duration corresponding to the key negotiation procedure, a field (i.e., a 4-way-handshake Mutual Avg Time field) of an average processing duration of each second interaction message in the key negotiation procedure, a field (e.g., a 802.1X State Expired Time field) of a timeout duration corresponding to the 802.1X authentication procedure, and a field (e.g., a 802.1X State Mutual Avg Time field) of an average processing duration of each second interaction message in the 802.1X authentication procedure.
Here, bit A represents whether the Dot11-Access State Expired Time field and the Dot11-Access Mutual Avg Time field are valid; when the value of Bit A is 0, the fields of the Dot11-Access State Expired Time and the Dot11-Access Mutual Avg Time are invalid; when the value of Bit A is 1, it represents that the Dot11-Access State Expired Time field and the Dot11-Access Mutual Avg Time field are valid;
Bit B, representing whether the 4-way-handshake State Expired Time field and the 4-way-handshake Mutual Avg Time field are valid; when the value of Bit B is 0, the 4-way-handshake State Expired Time field and the 4-way-handshake Mutual Avg Time field are invalid; when the value of Bit B is 1, it represents that the 4-way-handshake State Expired Time field and the 4-way-handshake Mutual Avg Time field are valid;
bit C, which is valid for the 802.1X State Expired Time field and the 802.1X State Mutual Avg Time field; when the value of Bit C is 0, the representative 802.1X State Expired Time field and the 802.1XState Mutual Avg Time field are invalid; when the Bit C value is 1, it is valid for the 802.1X State Expired Time field and the 802.1X State Mutual Avg Time field.
Dot11-Access State Expired Time field, the value range can be 1-10000 ms, which is preset by the administrator and configured on the wireless terminal.
The Dot11-Access Mutual Avg Time field includes an average processing duration of the first response message in the radio link establishment procedure, where the corresponding value range may be 0-10000 ms, and when the value of the Dot11-Access Mutual Avg Time field is 0, it indicates that the radio terminal has not yet accessed to the AP.
The 4-way-handshake State Expired Time field may have a value ranging from 0ms to 5000ms, and is preset and configured on the wireless terminal by an administrator, and when the value of the 4-way-handshake State Expired Time field is 0, the timeout period corresponding to the key negotiation flow is not involved.
The 4-way-handshake Mutual Avg Time field comprises average processing time length of each second interaction message in the key negotiation flow, and the value range of the average processing time length of each second interaction message can be 0-5000 ms; when the value of the 4-way-handshake Mutual Avg Time field is 0, if the value of the 4-way-handshake State Expired Time field is 0, the average processing duration of each second response message in the key negotiation flow is not involved; if the value of the 4-way-handshake State Expired Time field is not 0, it represents that the wireless terminal has not yet accessed the AP.
The 802.1X State Expired Time field may be set to 0-60000 ms, and is preset and configured on the wireless terminal by an administrator, where when the value of the 802.1X State Expired Time field is 0, the value represents a timeout period corresponding to the 802.1X authentication procedure.
The 802.1X State Mutual Avg Time field comprises average processing duration of each second interaction message in the 802.1X authentication flow, and the value range of the average processing duration of each second interaction message can be 0-1000; when the values of the 802.1X State Mutual Avg Time fields are all 0, if the value of the 802.1X State Mutual Avg Time field is 0, the average processing duration of each second response message in the 802.1X authentication flow is represented; if the 802.1X State Mutual Avg Time field is not 0, it indicates that no wireless terminal has access to the AP.
In one example, the fourth wireless terminal may set the values of Bit a, bit B, and Bit C in Capabilities field to 1.
In another example, the fourth wireless terminal may set the value of Bit a in Capabilities field to 1, and may set the values of Bit B and Bit C according to its own access manner.
The specific calculation process of the fourth wireless terminal calculating the average processing time length of the first response message in the wireless link establishment procedure and the average processing time length of each second interaction message in the authentication key management procedure used by the fourth wireless terminal itself will be described when the station describes the implementation procedure of the access method at the wireless terminal side, and will not be described in detail here.
The above describes the implementation flow of the access method for the station on the AP side, and the following describes the implementation flow of the access method for the station on the wireless terminal side.
The embodiment of the application also provides an access method, which is applied to the wireless terminal, wherein the access mode of the wireless terminal is a secret-free access, as shown in fig. 3, and the method can comprise the following steps:
s31, after the current period arrives, calculating average processing duration of processing a first response message in the wireless link establishment flow by the self according to first time when the self receives a first response message which is sent by each first access point AP and is used for the first interaction message from the self in the wireless link establishment flow, second time when the self receives a next first interaction message which is sent by each first access point AP after the first response message from each first AP and a preset first time threshold.
S32, if the access to the second AP is determined after the current period arrives, carrying the first link establishment parameter in a first interaction message in the wireless link establishment procedure and sending the first interaction message to the second AP, so that after the second AP sends a first response message in the wireless link establishment procedure to itself, if a next message which needs to be sent by itself is not received after the average processing time length corresponding to the first response message calculated by itself and included in the first link establishment parameter arrives, sending the first response message to itself again, and if the next message is not received after the first target time length arrives, sending a de-authentication message to the wireless terminal so as to trigger the wireless terminal to send the first interaction message in the wireless link establishment procedure to the second AP again.
S33, if a Beacon message carrying a second link establishment parameter broadcast by a third AP is received after the current period arrives and it is determined that the Beacon message needs to be accessed to the third AP, after any interaction message in the wireless link establishment procedure is sent to the third AP, if a next message which needs to be sent by the third AP is not received after the average processing time length corresponding to the interaction message calculated by the third AP and included in the second link establishment parameter arrives, the interaction message is sent to the third AP again, and if the next message is not received after the second target time length arrives, the first interaction message in the wireless link establishment procedure is sent to the third AP again, or the first interaction message in the wireless link establishment procedure is sent to a fourth AP which is determined again to be accessed.
If a Probe Response message carrying a third link establishment parameter sent by a fifth AP is received after the current period arrives and any interaction message in a wireless link establishment procedure is sent to the fifth AP when it is determined that the fifth AP needs to be accessed, if a next message which needs to be sent by the fifth AP is not received after the average processing duration corresponding to the interaction message calculated by the fifth AP and included in the third link establishment parameter arrives, the interaction message is sent to the fifth AP again, and if the next message is not received after the third target duration arrives, the first interaction message in the wireless link establishment procedure is sent to the fifth AP again, or the first interaction message in the wireless link establishment procedure is sent to the sixth AP which is determined again to be accessed.
It should be noted that, the first target duration is the minimum duration of the timeout duration corresponding to the wireless link establishment procedure included in the first link establishment parameter and the timeout duration corresponding to the wireless link establishment procedure locally recorded by the second AP;
the second target time length is the minimum time length of the timeout time length corresponding to the wireless link establishment flow and the timeout time length corresponding to the wireless link establishment flow recorded locally;
The third target duration is the minimum duration of the timeout duration corresponding to the wireless link establishment flow and the timeout duration corresponding to the wireless link establishment flow recorded locally in the third link establishment parameter.
Specifically, in the above step S31, the wireless terminal may calculate the average processing duration of itself processing the first response message in the wireless link establishment procedure by:
calculating a difference value between a second time when the first response message from each first AP is received and a next first interaction message is sent, and a first time when the first response message sent by each first AP is received;
carrying out summation operation on the difference value which is not larger than a preset third time threshold value in the calculated difference values to obtain a first operation result;
carrying out quotient calculation on the first calculation result and the total number value of the difference value which is not greater than a preset third time threshold value to obtain a second calculation result;
and carrying out summation operation on the second operation result and a preset fourth time threshold value to obtain a third operation result, and taking the third operation result as the average processing time length of processing the first response message in the wireless link establishment flow by itself.
It should be noted that, in the embodiment of the present application, the preset first time threshold, the preset second time threshold, the preset third time threshold, and the preset fourth time threshold may be set by an administrator according to a network experience value of the WLAN network where the AP is located.
It should be further noted that, the presentation manner of the first link establishment parameter is the same as the presentation manner of the second link establishment parameter described by the station on the AP side, and the presentation manner of the second link establishment parameter and the third link establishment parameter is the same as the presentation manner of the first link establishment parameter described by the station on the AP side, which will not be described in detail herein.
The embodiment of the application also provides an access method, which is applied to the wireless terminal, as shown in fig. 4, and the method can comprise the following steps:
s41, after the current period arrives, calculating average processing duration of processing a first response message in the wireless link establishment flow by the self according to first time when the self receives a first response message which is sent by each first AP and is used for the first interaction message from the self in the wireless link establishment flow, second time when the self receives a next first interaction message which is sent by each first AP after the first response message from each first AP and a preset first time threshold.
S42, calculating average processing time of each second interaction message in the authentication key management flow according to third time when each first AP receives each second interaction message sent by the first AP in the authentication key management flow, fourth time when each second interaction message from each first AP is sent by the first AP and a preset second time threshold value.
And S43, if the access to the second AP is determined after the current period arrives, carrying the first link establishment parameter in a first interaction message in the wireless link establishment flow and sending the first interaction message to the second AP, so that the second AP sends any message in the first target flow to the second AP, if the next message which needs to be sent by the second AP is not received after the average processing time corresponding to the message included in the first link establishment parameter arrives, the message is sent again to the second AP, and if the next message is not received after the first target time arrives, a de-authentication message is sent to the wireless terminal so as to trigger the wireless terminal to send the first interaction message in the wireless link establishment flow again to the second AP.
And S44, if a Beacon message carrying a second link establishment parameter broadcast by a third AP is received after the current period arrives and the need of accessing the third AP is determined, after any message in a second target flow is sent to the third AP, if the next message which needs to be sent by the third AP is not received after the average processing time corresponding to the message calculated by the third AP and included in the second link establishment parameter arrives, the message is sent again to the third AP, and if the next message is not received after the second target time arrives, the first interaction message in the wireless link establishment flow is sent again to the third AP, or the first interaction message in the wireless link establishment flow is sent to the fourth AP which is determined again to be accessed.
And S45, if a detection Response message carrying a third link establishment parameter sent by a fifth AP is received after the current period arrives and the fifth AP is determined to be accessed, after any message in a third target flow is sent to the fifth AP, if a next message which is needed to be sent by the fifth AP is not received after the average processing time period which corresponds to the message and is calculated by the fifth AP and is included in the third link establishment parameter is reached, the message is sent to the fifth AP again, and if the next message is not received after the third target time period is reached, the first interaction message in the wireless link establishment flow is sent to the fifth AP again, or the first interaction message in the wireless link establishment flow is sent to the sixth AP which is determined again to be accessed.
It should be noted that, in this embodiment of the present application, the first target flow is a wireless link establishment flow or an authentication key management flow used by the second wireless terminal, and when the first target flow is a wireless link establishment flow, any message is a first response message, and when the first target flow is an authentication key management flow, any message is any second interaction message, where the first target duration is a minimum duration of a timeout duration corresponding to the first target flow included in the first link establishment parameter and a timeout duration corresponding to the first target flow locally recorded by the second AP.
The second target flow and the third target flow are both wireless link establishment flows or authentication key management flows, any message is any first interaction message when the second target flow and the third target flow are both wireless link establishment flows, any message is any second response message when the second target flow and the third target flow are both authentication key management flows used by the second wireless terminal, the second target time length is the minimum time length of timeout time length corresponding to the second target flow included in the second link establishment parameters and timeout time length corresponding to the second target flow locally recorded by the second target flow, and the third target time length is the minimum time length of timeout time length corresponding to the third target flow included in the third link establishment parameters and timeout time length corresponding to the second target flow locally recorded by the third target flow.
Specifically, in the above step S41, the wireless terminal may calculate the average processing duration of itself processing the first response message in the wireless link establishment procedure by:
calculating a difference value between a second time when the first response message from each first AP is received and a next first interaction message is sent, and a first time when the first response message sent by each first AP is received;
Carrying out summation operation on the difference value which is not larger than a preset third time threshold value in the calculated difference values to obtain a first operation result;
carrying out quotient calculation on the first calculation result and the total number value of the difference value which is not greater than a preset third time threshold value to obtain a second calculation result;
carrying out summation operation on the second operation result and a preset fourth time threshold value to obtain a third operation result, and taking the third operation result as the average processing time length of processing a first response message in the wireless link establishment flow by itself;
in the above step S42, the wireless terminal may calculate the average processing duration of processing each first interaction message in the authentication key management flow by itself by:
for each second interaction message in the authentication key management flow, calculating a difference value between a fourth time for transmitting a second response message for the second interaction message from each first AP and a third time for receiving the first interaction message transmitted by each first AP;
carrying out summation operation on the difference value which is not larger than a preset fifth time threshold value in the calculated difference values to obtain a fourth operation result;
carrying out quotient calculation on the fourth calculation result and the total number value of the difference value which is not greater than a preset fifth time threshold value to obtain a fifth calculation result;
And carrying out summation operation on the fifth operation result and a preset sixth time threshold value to obtain a sixth operation result, and taking the sixth operation result as the average processing time length of the second interaction message.
It should be noted that, in the embodiment of the present application, the preset first time threshold, the preset second time threshold, the preset third time threshold, the preset fourth time threshold, the preset fifth time threshold, and the preset sixth time threshold may be set by an administrator according to a network experience value of the WLAN network where the AP is located.
It should be further noted that, the presentation manner of the first link establishment parameter is the same as the presentation manner of the second link establishment parameter described by the station on the AP side, and the presentation manner of the second link establishment parameter and the third link establishment parameter is the same as the presentation manner of the first link establishment parameter described by the station on the AP side, which will not be described in detail herein.
According to the technical scheme, the AP can periodically calculate the average processing time length of each first interaction message in the self-processing wireless link establishment procedure or calculate the average processing time length of each first interaction message in the self-processing wireless link establishment procedure and the average processing time length of each second Response message in the self-processing same authentication key management procedure, and carry the link establishment parameters comprising the processing time lengths and the timeout time length corresponding to the corresponding procedure in the Beacon message and the Probe Response message so as to guide the wireless terminal to retransmit the corresponding interaction message or reinitiate the wireless link establishment procedure in time according to the link establishment parameters, thereby improving the access success rate and further improving the user experience.
Correspondingly, for the wireless terminal with the access mode of the secret access-free wireless terminal, the average processing time length of the first response message in the wireless link establishment flow can be calculated periodically, and the link establishment parameters comprising the calculated average processing time length and the timeout time length corresponding to the wireless link establishment flow are carried in the first interaction message in the wireless link establishment flow, so that the corresponding AP is guided to retransmit the corresponding message in time or trigger the wireless terminal to restart the wireless link establishment flow according to the link establishment parameters, thereby improving the access success rate and further improving the user experience.
For the wireless terminal with the access mode not being the secret access-free wireless terminal, the average processing time length of the first response message in the self-processing wireless link establishment flow and the average processing time length of each second interaction message in the self-processing self-used authentication key management flow can be calculated periodically, and the link establishment parameters comprising the processing time lengths, the timeout time length corresponding to the wireless link establishment flow and the timeout time length corresponding to the authentication key management flow are carried in the first interaction message in the wireless link establishment flow, so that the corresponding AP is guided to retransmit the corresponding message in time or trigger the wireless terminal to restart the wireless link establishment flow according to the link establishment parameters, thereby improving the access success rate and further improving the user experience.
Based on the same inventive concept, the present application further provides an access device, where the device is applied to an AP, and a structural schematic diagram of the access device is shown in fig. 5, and specifically includes:
the first calculating module 51 is configured to calculate, after the current period arrives, an average processing duration of processing each first interaction message in the wireless link establishment procedure by itself according to a first time when each first wireless terminal that accesses the WLAN where the AP is located in the current period receives each first interaction message sent in the wireless link establishment procedure by itself, a second time when each first wireless terminal sends a first response message for each first interaction message that originates from each first wireless terminal by itself, and a preset first time threshold;
the second calculating module 52 is configured to calculate, if all the first wireless terminals have a target wireless terminal whose access manner is not secret access-free, an average processing duration of processing each second response message in the same authentication key management procedure by itself according to a third time when the target wireless terminal receives a second response message for each second interaction message from the AP, which is sent by the target wireless terminal in the authentication key management procedure used by the target wireless terminal, a fourth time when the target wireless terminal receives a next second interaction message sent by the target wireless terminal after receiving the second response message, and a preset second time threshold, where each second response message does not include a last second response message sent by the target wireless terminal corresponding to the same authentication key management procedure received by the AP;
A broadcasting module 53, configured to broadcast, when a broadcast period arrives, a Beacon packet carrying a first link establishment parameter, so that after the Beacon packet is received and it is determined that the AP is any packet in a first target flow sent to the AP by a second wireless terminal of the AP to be accessed, if a next packet that needs to be sent by the AP is not received after reaching an average processing duration corresponding to the packet included in the first link establishment parameter, the packet is sent again to the AP, and if the next packet is not received after reaching the first target duration, the first interaction packet in the wireless link establishment flow is sent again to the AP, or the first interaction packet in the wireless link establishment flow is sent again to other APs to be accessed;
the first transceiver module 54 is configured to, if a Probe Request message broadcast by a third wireless terminal is received after the current period arrives, send a Probe Response message carrying the first link establishment parameter to the third wireless terminal, so that after any message in a second target flow is sent to the AP by the third wireless terminal, if a next message that needs to be sent by the AP is not received after an average processing duration corresponding to the message included in the first link establishment parameter arrives, resend the message to the AP, and if the next message is not received after the second target duration arrives, resend a first interaction message in a wireless link establishment flow to the AP, or send a first interaction message in a wireless link establishment flow to other AP to be accessed that is redetermined;
The first target duration is the minimum duration of the timeout duration corresponding to the first target flow and the timeout duration corresponding to the first target flow recorded by the second wireless terminal, wherein the timeout duration corresponds to the first target flow and is included in the first link establishment parameter;
when the access mode of the second wireless terminal is close access-free, the first target flow is a wireless link establishment flow, and any message is any first interaction message; when the access mode of the second wireless terminal is not close-free access, the first target flow is a wireless link establishment flow or an authentication key management flow used by the second wireless terminal, any message is any first interaction message when the first target flow is a wireless link establishment flow, and any message is any second response message when the first target flow is an authentication key management flow used by the second wireless terminal;
the second target duration is the minimum duration of the timeout duration corresponding to the second target flow included in the first link establishment parameter and the timeout duration corresponding to the second target flow recorded by the third wireless terminal;
When the access mode of the third wireless terminal is close access-free, the second target flow is a wireless link establishment flow, and any message is any first interaction message; when the access mode of the third wireless terminal is not close access-free, the second target flow is a wireless link establishment flow or an authentication key management flow used by the third wireless terminal, any message is any first interaction message when the second target flow is a wireless link establishment flow, and any message is any second response message when the second target flow is an authentication key management flow used by the third wireless terminal.
Preferably, the first calculating module 51 is specifically configured to calculate an average processing duration of processing each first interaction message in the wireless link establishment procedure by itself by:
for each first interaction message in the wireless link establishment flow, calculating a difference value between second time for transmitting a first response message for the first interaction message from each first wireless terminal and first time when the first interaction message transmitted by each first wireless terminal is received;
Carrying out summation operation on the difference value which is not larger than a preset third time threshold value in the calculated difference values to obtain a first operation result;
carrying out quotient calculation on the first calculation result and a total number value of the difference value which is not greater than a preset third time threshold value to obtain a second calculation result;
carrying out summation operation on the second operation result and a preset fourth time threshold value to obtain a third operation result, and taking the third operation result as the average processing time length of the first interaction message;
preferably, the second calculating module 52 is specifically configured to calculate an average processing duration of processing each second response message in the same authentication key management flow by itself in the following manner:
for each second response message in the same authentication key management flow, calculating a difference between a fourth time when the second response message from the first wireless terminal using the authentication key management flow is received and then a next second interaction message is transmitted and a third time when the second response message transmitted by the first wireless terminal using the authentication key management flow is received before the next second interaction message is transmitted;
carrying out summation operation on the difference value which is not larger than a preset fifth time threshold value in the calculated difference values to obtain a fourth operation result;
Carrying out quotient calculation on the fourth calculation result and a total number value of the difference value which is not greater than a preset fifth time threshold value to obtain a fifth calculation result;
and carrying out summation operation on the fifth operation result and a preset sixth time threshold value to obtain a sixth operation result, and taking the sixth operation result as the average processing time length of the second response message.
Preferably, the apparatus further comprises:
a second transceiver module (not shown in fig. 5), configured to receive, after the current period arrives, a first interaction packet sent by the fourth wireless terminal in the wireless link establishment procedure, where the first interaction packet carries a second link establishment parameter; and
after any message in the third target flow is sent to the fourth wireless terminal, if the next message which needs to be sent by the fourth wireless terminal is not received after the average processing time length which corresponds to the message and is calculated by the fourth wireless terminal and is included in the second link establishment parameter is reached, the message is sent to the fourth wireless terminal again, and if the next message is not received after the third target time length is reached, a de-authentication message is sent to the wireless terminal so as to trigger the wireless terminal to send the first interactive message in the wireless link establishment flow to the second AP again;
The third target duration is the minimum duration of the timeout duration corresponding to the third target flow included in the second link establishment parameter and the timeout duration corresponding to the third target flow recorded locally by the AP;
when the access mode of the fourth wireless terminal is the close access-free mode, the third target flow is a wireless link establishment flow, and any message is a first response message in the wireless link establishment flow;
when the access mode of the fourth wireless terminal is not close-access-free, the third target flow is a wireless link establishment flow or an authentication key management flow used by the fourth wireless terminal, any message is a first response message in the wireless link establishment flow when the third target flow is the wireless link establishment flow, and any message is any second interaction message in the authentication key management flow when the third target flow is the authentication key management flow used by the fourth wireless terminal.
The application also provides an access device, which is applied to the wireless terminal, wherein the access mode of the wireless terminal is a secret-free access, and the structure schematic diagram is shown in fig. 6, and specifically comprises:
The calculating module 61 is configured to calculate, after the current period arrives, an average processing duration of processing a first response message in a wireless link establishment procedure by itself according to a first time when receiving a first response message for a first interaction message from itself sent by each first access point AP that itself accesses in the current period in the wireless link establishment procedure, a second time when receiving a next first interaction message sent by itself after receiving the first response message from each first AP, and a preset first time threshold;
the first transceiver module 62 is configured to, if it is determined that the second AP needs to be accessed after the current period arrives, carry a first link establishment parameter in a first interaction message in a radio link establishment procedure and send the first interaction message to the second AP, so that after the second AP sends a first response message in the radio link establishment procedure to itself, if a next message that needs to be sent by itself is not received after reaching an average processing duration corresponding to the first response message calculated by itself and included in the first link establishment parameter, resend the first response message to itself, and if the next message is not received after reaching a first target duration, send a de-authentication message to the radio terminal to trigger the radio terminal to resend the first interaction message in the radio link establishment procedure to the second AP;
A second transceiver module 63, configured to, if a Beacon packet carrying a second link establishment parameter broadcast by a third AP is received after the current period arrives and it is determined that the Beacon packet needs to be accessed to the third AP, after any interaction packet in a radio link establishment procedure is sent to the third AP, if a next packet that needs to be sent by the third AP is not received after an average processing duration corresponding to the interaction packet calculated by the third AP and included in the second link establishment parameter arrives, resend the interaction packet to the third AP, and if the next packet is not received after the second target duration is reached, resend a first interaction packet in the radio link establishment procedure to the third AP, or send a first interaction packet in the radio link establishment procedure to a fourth AP that is redetermined to be accessed;
a third transceiver module 64, configured to, if a Probe Response message carrying a third link establishment parameter sent by a fifth AP is received after the current period arrives and it is determined that the fifth AP needs to be accessed, after any interaction message in a radio link establishment procedure is sent to the fifth AP, if a next message that needs to be sent by the fifth AP is not received after an average processing duration corresponding to the interaction message calculated by the fifth AP and included in the third link establishment parameter arrives, send the interaction message to the fifth AP again, and if the next message is not received after the third target duration is reached, send a first interaction message in the radio link establishment procedure to the fifth AP again, or send a first interaction message in the radio link establishment procedure to the sixth AP to be accessed that is redetermined;
The first target duration is the minimum duration of the timeout duration corresponding to the wireless link establishment flow included in the first link establishment parameter and the timeout duration corresponding to the wireless link establishment flow locally recorded by the second AP;
the second target time length is the minimum time length of the timeout time length corresponding to the wireless link establishment flow included in the second link establishment parameter and the timeout time length corresponding to the wireless link establishment flow locally recorded by the second target time length;
the third target duration is the minimum duration of the timeout duration corresponding to the wireless link establishment procedure included in the third link establishment parameter and the timeout duration corresponding to the wireless link establishment procedure locally recorded by the third target duration.
Preferably, the calculating module 61 is specifically configured to calculate an average processing duration of processing the first response message in the radio link establishment procedure by itself in the following manner:
calculating a difference value between a second time when the first response message from each first AP is received and a next first interaction message is sent, and a first time when the first response message sent by each first AP is received;
carrying out summation operation on the difference value which is not larger than a preset third time threshold value in the calculated difference values to obtain a first operation result;
Carrying out quotient calculation on the first calculation result and a total number value of the difference value which is not greater than a preset third time threshold value to obtain a second calculation result;
and carrying out summation operation on the second operation result and a preset fourth time threshold value to obtain a third operation result, and taking the third operation result as the average processing time length of processing the first response message in the wireless link establishment flow per se.
The application also provides an access device, which is applied to a wireless terminal, wherein the access mode of the wireless terminal is not a secret-free access, and the structure schematic diagram is shown in fig. 7, and specifically comprises:
the first calculating module 71 is configured to calculate, after the current period arrives, an average processing duration of processing a first response message in the wireless link establishment procedure by itself according to a first time when the first calculating module receives a first response message for a first interaction message from itself sent by each first access point AP that is accessed in the current period in the wireless link establishment procedure, a second time when the first calculating module receives a next first interaction message sent by the first access point AP that is received by the first calculating module after the first response message from each first access point AP is received, and a preset first time threshold;
The second calculating module 72 is configured to calculate an average processing duration of processing each second interaction message in the authentication key management procedure by itself according to a third time when each first AP receives each second interaction message sent in the authentication key management procedure used by itself, a fourth time when each second response message for each second interaction message from each first AP is sent by itself, and a preset second time threshold;
a first transceiver module 73, configured to, if it is determined that the second AP needs to be accessed after the current period arrives, carry a first link establishment parameter in a first interaction message in a radio link establishment procedure and send the first interaction message to the second AP, so that after the second AP sends any message in a first target procedure to itself, if a next message that needs to be sent by itself is not received after reaching an average processing duration corresponding to the message included in the first link establishment parameter, resend the message to itself, and if the next message is not received after reaching the first target duration, send a de-authentication message to the radio terminal, so as to trigger the radio terminal to resend the first interaction message in the radio link establishment procedure to the second AP;
A second transceiver module 74, configured to, if a Beacon packet carrying a second link establishment parameter broadcast by a third AP is received after the current period arrives and it is determined that the Beacon packet needs to be accessed to the third AP, after any packet in a second target flow is sent to the third AP, if a next packet that needs to be sent by the third AP is not received after an average processing duration corresponding to the packet calculated by the third AP and included in the second link establishment parameter arrives, resend the packet to the third AP, and if the next packet is not received after the second target duration is reached, resend a first interaction packet in a radio link establishment flow to the third AP, or send a first interaction packet in a radio link establishment flow to a redetermined fourth AP to be accessed;
a third transceiver module 75, configured to, if a Probe Response packet carrying a third link establishment parameter sent by a fifth AP is received after the current period arrives and it is determined that the fifth AP needs to be accessed, after any packet in a third target flow is sent to the fifth AP, if a next packet that needs to be sent by the fifth AP is not received after an average processing duration corresponding to the packet calculated by the fifth AP and included in the third link establishment parameter arrives, send the packet to the fifth AP again, and if the next packet is not received after the third target duration is reached, send a first interaction packet in a radio link establishment flow to the fifth AP again, or send a first interaction packet in a radio link establishment flow to the sixth AP that is redetermined to be accessed again;
The first target process is a wireless link establishment process or an authentication key management process used by the second wireless terminal, when the first target process is a wireless link establishment process, any message is a first response message, when the first target process is the authentication key management process, any message is any second interaction message, and the first target time length is the minimum time length of timeout time length corresponding to the first target process and included in the first link establishment parameter, and the second AP locally records;
the second target flow and the third target flow are both wireless link establishment flows or the authentication key management flows, when the second target flow and the third target flow are both wireless link establishment flows, any message is any first interaction message, when the second target flow and the third target flow are both authentication key management flows used by the second wireless terminal, any message is any second response message, the second target time length is the minimum time length of timeout duration corresponding to the second target flow and the timeout duration corresponding to the second target flow, which is locally recorded, included in the second link establishment parameters, and the third target time length is the minimum time length of timeout duration corresponding to the third target flow and the timeout duration corresponding to the second target flow, which is locally recorded, included in the third link establishment parameters.
Preferably, the first calculating module 71 is specifically configured to calculate an average processing duration of processing the first response message in the radio link establishment procedure by itself by:
calculating a difference value between a second time when the first response message from each first AP is received and a next first interaction message is sent, and a first time when the first response message sent by each first AP is received;
carrying out summation operation on the difference value which is not larger than a preset third time threshold value in the calculated difference values to obtain a first operation result;
carrying out quotient calculation on the first calculation result and a total number value of the difference value which is not greater than a preset third time threshold value to obtain a second calculation result;
carrying out summation operation on the second operation result and a preset fourth time threshold value to obtain a third operation result, and taking the third operation result as the average processing time length of processing a first response message in a wireless link establishment flow by itself;
preferably, the second calculating module 72 is specifically configured to calculate an average processing duration of processing each first interaction message in the authentication key management procedure by itself in the following manner:
Calculating a difference value between a fourth time for transmitting a second response message aiming at the second interaction message from each first AP and a third time for receiving the first interaction message transmitted by each first AP aiming at each second interaction message in the authentication key management flow;
carrying out summation operation on the difference value which is not larger than a preset fifth time threshold value in the calculated difference values to obtain a fourth operation result;
carrying out quotient calculation on the fourth calculation result and a total number value of the difference value which is not greater than a preset fifth time threshold value to obtain a fifth calculation result;
and carrying out summation operation on the fifth operation result and a preset sixth time threshold value to obtain a sixth operation result, and taking the sixth operation result as the average processing time length of the second interaction message.
According to the technical scheme, the AP can periodically calculate the average processing time length of each first interaction message in the self-processing wireless link establishment procedure or calculate the average processing time length of each first interaction message in the self-processing wireless link establishment procedure and the average processing time length of each second Response message in the self-processing same authentication key management procedure, and carry the link establishment parameters comprising the processing time lengths and the timeout time length corresponding to the corresponding procedure in the Beacon message and the Probe Response message so as to guide the wireless terminal to retransmit the corresponding interaction message or reinitiate the wireless link establishment procedure in time according to the link establishment parameters, thereby improving the access success rate and further improving the user experience.
Correspondingly, for the wireless terminal with the access mode of the secret access-free wireless terminal, the average processing time length of the first response message in the wireless link establishment flow can be calculated periodically, and the link establishment parameters comprising the calculated average processing time length and the timeout time length corresponding to the wireless link establishment flow are carried in the first interaction message in the wireless link establishment flow, so that the corresponding AP is guided to retransmit the corresponding message in time or trigger the wireless terminal to restart the wireless link establishment flow according to the link establishment parameters, thereby improving the access success rate and further improving the user experience.
For the wireless terminal with the access mode not being the secret access-free wireless terminal, the average processing time length of the first response message in the self-processing wireless link establishment flow and the average processing time length of each second interaction message in the self-processing self-used authentication key management flow can be calculated periodically, and the link establishment parameters comprising the processing time lengths, the timeout time length corresponding to the wireless link establishment flow and the timeout time length corresponding to the authentication key management flow are carried in the first interaction message in the wireless link establishment flow, so that the corresponding AP is guided to retransmit the corresponding message in time or trigger the wireless terminal to restart the wireless link establishment flow according to the link establishment parameters, thereby improving the access success rate and further improving the user experience.
The present embodiment also provides an electronic device, as shown in fig. 6, including a processor 61 and a machine-readable storage medium 62, the machine-readable storage medium 62 storing machine-executable instructions executable by the processor 61, the processor 61 being caused by the machine-executable instructions to: the step of realizing the above access method.
The machine-readable storage medium may include random access Memory (Random Access Memory, RAM) or Non-Volatile Memory (NVM), such as at least one magnetic disk Memory. In the alternative, the machine-readable storage medium may also be at least one memory device located remotely from the foregoing processor.
The processor may be a general-purpose processor, including a central processing unit (Central Processing Unit, CPU), a network processor (Network Processor, NP), etc.; but also digital signal processors (Digital Signal Processor, DSP), application specific integrated circuits (Application Specific Integrated Circuit, ASIC), field programmable gate arrays (Field-Programmable Gate Array, FPGA) or other programmable logic devices, discrete gate or transistor logic devices, discrete hardware components.
In a further embodiment provided herein, there is also provided a computer readable storage medium having stored therein a computer program which when executed by a processor implements the steps of the above-described access method.
The foregoing description of the preferred embodiments of the present invention is not intended to limit the invention to the precise form disclosed, and any modifications, equivalents, improvements and alternatives falling within the spirit and principles of the present invention are intended to be included within the scope of the present invention.

Claims (13)

1. An access method, wherein the method is applied to an access point AP, the method comprising:
after the current period arrives, calculating average processing duration of each first interaction message in the wireless link establishment flow according to first time when each first wireless terminal which is accessed to the WLAN where the AP is located in the current period receives each first interaction message sent in the wireless link establishment flow, second time when each first interaction message which is sourced from each first wireless terminal is sent by the wireless terminal and a preset first time threshold;
if all the first wireless terminals have target wireless terminals with access modes which are not free from secret access, calculating average processing duration of each second response message in the same authentication key management flow according to third time when the target wireless terminal receives a second response message which is sent by the target wireless terminal in the authentication key management flow used by the target wireless terminal and is aimed at each second interaction message from the AP, fourth time when the target wireless terminal receives a next second interaction message which is sent by the target wireless terminal after receiving the second response message and a preset second time threshold value, wherein the last second response message which is sent by the target wireless terminal and corresponds to the same authentication key management flow and is received by the AP is not included in each second response message;
When a broadcasting period is reached, broadcasting a Beacon message carrying a first link establishment parameter, so that after the Beacon message is received and the second wireless terminal which determines that the AP is the AP to be accessed sends any message in a first target flow to the AP, if the next message which is required to be sent by the AP is not received after the average processing time corresponding to the message included in the first link establishment parameter is reached, the message is sent again to the AP, and if the next message is not received after the first target time is reached, the first interaction message in the wireless link establishment flow is sent again to the AP, or the first interaction message in the wireless link establishment flow is sent to other APs which are determined again to be accessed;
if a Probe Request message broadcast by a third wireless terminal is received after the current period arrives, sending a Probe Response message carrying the first link establishment parameter to the third wireless terminal, so that after any message in a second target flow is sent to the AP by the third wireless terminal, if a next message which is required to be sent by the AP is not received after the average processing time length corresponding to the message included in the first link establishment parameter is reached, the message is sent again to the AP, and if the next message is not received after the second target time length is reached, the first interaction message in the wireless link establishment flow is sent again to the AP, or the first interaction message in the wireless link establishment flow is sent to other APs which are determined again to be accessed;
The first target duration is the minimum duration of the timeout duration corresponding to the first target flow and the timeout duration corresponding to the first target flow recorded by the second wireless terminal, wherein the timeout duration corresponds to the first target flow and is included in the first link establishment parameter;
when the access mode of the second wireless terminal is close access-free, the first target flow is a wireless link establishment flow, and any message is any first interaction message; when the access mode of the second wireless terminal is not close-free access, the first target flow is a wireless link establishment flow or an authentication key management flow used by the second wireless terminal, any message is any first interaction message when the first target flow is a wireless link establishment flow, and any message is any second response message when the first target flow is an authentication key management flow used by the second wireless terminal;
the second target duration is the minimum duration of the timeout duration corresponding to the second target flow included in the first link establishment parameter and the timeout duration corresponding to the second target flow recorded by the third wireless terminal;
When the access mode of the third wireless terminal is close access-free, the second target flow is a wireless link establishment flow, and any message is any first interaction message; when the access mode of the third wireless terminal is not close access-free, the second target flow is a wireless link establishment flow or an authentication key management flow used by the third wireless terminal, any message is any first interaction message when the second target flow is a wireless link establishment flow, and any message is any second response message when the second target flow is an authentication key management flow used by the third wireless terminal.
2. The method of claim 1, wherein the average processing time period for processing each first interaction message in the radio link establishment procedure by itself is calculated by:
for each first interaction message in the wireless link establishment flow, calculating a difference value between second time for transmitting a first response message for the first interaction message from each first wireless terminal and first time when the first interaction message transmitted by each first wireless terminal is received;
Carrying out summation operation on the difference value which is not larger than a preset third time threshold value in the calculated difference values to obtain a first operation result;
carrying out quotient calculation on the first calculation result and a total number value of the difference value which is not greater than a preset third time threshold value to obtain a second calculation result;
carrying out summation operation on the second operation result and a preset fourth time threshold value to obtain a third operation result, and taking the third operation result as the average processing time length of the first interaction message;
the average processing time length of each second response message in the same authentication key management flow is calculated by the following method:
for each second response message in the same authentication key management flow, calculating a difference between a fourth time when the second response message from the first wireless terminal using the authentication key management flow is received and then a next second interaction message is transmitted and a third time when the second response message transmitted by the first wireless terminal using the authentication key management flow is received before the next second interaction message is transmitted;
carrying out summation operation on the difference value which is not larger than a preset fifth time threshold value in the calculated difference values to obtain a fourth operation result;
Carrying out quotient calculation on the fourth calculation result and a total number value of the difference value which is not greater than a preset fifth time threshold value to obtain a fifth calculation result;
and carrying out summation operation on the fifth operation result and a preset sixth time threshold value to obtain a sixth operation result, and taking the sixth operation result as the average processing time length of the second response message.
3. The method according to claim 1, wherein the method further comprises:
after the current period arrives, receiving a first interaction message sent by a fourth wireless terminal in a wireless link establishment flow, wherein the first interaction message carries second link establishment parameters;
after any message in the third target flow is sent to the fourth wireless terminal, if the next message which needs to be sent by the fourth wireless terminal is not received after the average processing time length which corresponds to the message and is calculated by the fourth wireless terminal and is included in the second link establishment parameter is reached, the message is sent to the fourth wireless terminal again, and if the next message is not received after the third target time length is reached, a de-authentication message is sent to the wireless terminal so as to trigger the wireless terminal to send the first interactive message in the wireless link establishment flow to the second AP again;
The third target duration is the minimum duration of the timeout duration corresponding to the third target flow included in the second link establishment parameter and the timeout duration corresponding to the third target flow recorded locally by the AP;
when the access mode of the fourth wireless terminal is the close access-free mode, the third target flow is a wireless link establishment flow, and any message is a first response message in the wireless link establishment flow;
when the access mode of the fourth wireless terminal is not close-access-free, the third target flow is a wireless link establishment flow or an authentication key management flow used by the fourth wireless terminal, any message is a first response message in the wireless link establishment flow when the third target flow is the wireless link establishment flow, and any message is any second interaction message in the authentication key management flow when the third target flow is the authentication key management flow used by the fourth wireless terminal.
4. An access method is characterized in that the method is applied to a wireless terminal, the access mode of the wireless terminal is a secret-free access, and the method comprises the following steps:
After the current period arrives, calculating average processing duration of a first response message in a wireless link establishment flow according to first time when the first access point AP which is accessed in the current period receives the first response message which is sent by the first access point AP and aims at the first interaction message which is sourced by the first access point AP in the wireless link establishment flow, second time when the first access point AP receives the next first response message which is sent by the first access point AP after the first response message which is sourced by the first access point AP and a preset first time threshold;
if the first link establishment parameter is carried in a first interaction message in a wireless link establishment flow and is sent to the second AP after the current period arrives, so that the second AP sends a first response message in the wireless link establishment flow to the second AP, if the next message which needs to be sent by the second AP is not received after the average processing time length corresponding to the first response message calculated by the second AP and included in the first link establishment parameter arrives, the first response message is sent again, and if the next message is not received after the first target time length arrives, a de-authentication message is sent to the wireless terminal so as to trigger the wireless terminal to send the first interaction message in the wireless link establishment flow again to the second AP;
If a Beacon message carrying a second link establishment parameter broadcast by a third AP is received after the current period arrives and it is determined that the Beacon message needs to be accessed to the third AP, after any interactive message in a wireless link establishment procedure is sent to the third AP, if a next message which needs to be sent by the third AP is not received after an average processing duration corresponding to the interactive message calculated by the third AP and included in the second link establishment parameter is reached, the interactive message is sent to the third AP again, and if the next message is not received after the second target duration is reached, the first interactive message in the wireless link establishment procedure is sent to the third AP again, or the first interactive message in the wireless link establishment procedure is sent to a redetermined fourth AP to be accessed;
if a Probe Response message carrying a third link establishment parameter sent by a fifth AP is received after the current period arrives and any interaction message in a wireless link establishment procedure is determined to be accessed to the fifth AP, if a next message which is needed to be sent by the fifth AP is not received after the average processing time length corresponding to the interaction message calculated by the fifth AP and included in the third link establishment parameter is reached, the interaction message is sent to the fifth AP again, if the next message is not received after the third target time length is reached, the first interaction message in the wireless link establishment procedure is sent to the fifth AP again, or the first interaction message in the wireless link establishment procedure is sent to the newly determined sixth AP to be accessed;
The first target duration is the minimum duration of the timeout duration corresponding to the wireless link establishment flow included in the first link establishment parameter and the timeout duration corresponding to the wireless link establishment flow locally recorded by the second AP;
the second target time length is the minimum time length of the timeout time length corresponding to the wireless link establishment flow included in the second link establishment parameter and the timeout time length corresponding to the wireless link establishment flow locally recorded by the second target time length;
the third target duration is the minimum duration of the timeout duration corresponding to the wireless link establishment procedure included in the third link establishment parameter and the timeout duration corresponding to the wireless link establishment procedure locally recorded by the third target duration.
5. The method of claim 4 wherein the average processing time for processing the first response message in the radio link setup procedure by itself is calculated by:
calculating a difference value between a second time when the first response message from each first AP is received and a next first interaction message is sent, and a first time when the first response message sent by each first AP is received;
Carrying out summation operation on the difference value which is not larger than a preset third time threshold value in the calculated difference values to obtain a first operation result;
carrying out quotient calculation on the first calculation result and a total number value of the difference value which is not greater than a preset third time threshold value to obtain a second calculation result;
and carrying out summation operation on the second operation result and a preset fourth time threshold value to obtain a third operation result, and taking the third operation result as the average processing time length of processing the first response message in the wireless link establishment flow per se.
6. An access method, wherein the method is applied to a wireless terminal, and the access mode of the wireless terminal is not a secret-free access, the method comprises:
after the current period arrives, calculating average processing duration of a first response message in a wireless link establishment flow according to first time when the first access point AP which is accessed in the current period receives the first response message which is sent by the first access point AP and aims at the first interaction message which is sourced by the first access point AP in the wireless link establishment flow, second time when the first access point AP receives the next first response message which is sent by the first access point AP after the first response message which is sourced by the first access point AP and a preset first time threshold;
Calculating average processing duration of each second interaction message in the authentication key management flow according to third time when each first AP receives each second interaction message sent by the first AP in the authentication key management flow, fourth time when each second interaction message from each first AP is sent by the first AP and a preset second time threshold;
if the first link establishment parameter is carried in a first interaction message in a wireless link establishment flow and is sent to the second AP after the current period arrives, so that the second AP sends any message in a first target flow to the second AP, if the next message which needs to be sent by the second AP is not received after the average processing time corresponding to the message included in the first link establishment parameter arrives, the message is sent again, and if the next message is not received after the first target time arrives, a de-authentication message is sent to the wireless terminal so as to trigger the wireless terminal to send the first interaction message in the wireless link establishment flow again to the second AP;
If a Beacon message carrying a second link establishment parameter broadcast by a third AP is received after the current period arrives and it is determined that the Beacon message needs to be accessed to the third AP, after any message in a second target flow is sent to the third AP, if a next message which needs to be sent by the third AP is not received after an average processing time period corresponding to the message calculated by the third AP and included in the second link establishment parameter arrives, the message is sent to the third AP again, and if the next message is not received after the second target time period arrives, a first interaction message in a wireless link establishment flow is sent to the third AP again, or a first interaction message in a wireless link establishment flow is sent to a fourth AP which is re-determined and is to be accessed;
if a Probe Response message carrying a third link establishment parameter sent by a fifth AP is received after the current period arrives and any message in a third target flow is determined to be accessed to the fifth AP, if a next message which is required to be sent by the fifth AP is not received after the average processing time length corresponding to the message calculated by the fifth AP and included in the third link establishment parameter is reached, the message is sent to the fifth AP again, and if the next message is not received after the third target time length is reached, a first interactive message in a wireless link establishment flow is sent to the fifth AP again, or a first interactive message in a wireless link establishment flow is sent to the newly determined sixth AP to be accessed;
The first target process is a wireless link establishment process or an authentication key management process used by the second wireless terminal, when the first target process is a wireless link establishment process, any message is a first response message, when the first target process is the authentication key management process, any message is any second interaction message, and the first target time length is the minimum time length of timeout time length corresponding to the first target process and included in the first link establishment parameter, and the second AP locally records;
the second target flow and the third target flow are both wireless link establishment flows or the authentication key management flows, when the second target flow and the third target flow are both wireless link establishment flows, any message is any first interaction message, when the second target flow and the third target flow are both authentication key management flows used by the second wireless terminal, any message is any second response message, the second target time length is the minimum time length of timeout duration corresponding to the second target flow and the timeout duration corresponding to the second target flow, which is locally recorded, included in the second link establishment parameters, and the third target time length is the minimum time length of timeout duration corresponding to the third target flow and the timeout duration corresponding to the second target flow, which is locally recorded, included in the third link establishment parameters.
7. The method of claim 6 wherein the average processing time for processing the first response message in the radio link setup procedure by itself is calculated by:
calculating a difference value between a second time when the first response message from each first AP is received and a next first interaction message is sent, and a first time when the first response message sent by each first AP is received;
carrying out summation operation on the difference value which is not larger than a preset third time threshold value in the calculated difference values to obtain a first operation result;
carrying out quotient calculation on the first calculation result and a total number value of the difference value which is not greater than a preset third time threshold value to obtain a second calculation result;
carrying out summation operation on the second operation result and a preset fourth time threshold value to obtain a third operation result, and taking the third operation result as the average processing time length of processing a first response message in a wireless link establishment flow by itself;
the average processing time length of each first interaction message in the self-processing authentication key management flow is calculated by the following steps:
calculating a difference value between a fourth time for transmitting a second response message aiming at the second interaction message from each first AP and a third time for receiving the first interaction message transmitted by each first AP aiming at each second interaction message in the authentication key management flow;
Carrying out summation operation on the difference value which is not larger than a preset fifth time threshold value in the calculated difference values to obtain a fourth operation result;
carrying out quotient calculation on the fourth calculation result and a total number value of the difference value which is not greater than a preset fifth time threshold value to obtain a fifth calculation result;
and carrying out summation operation on the fifth operation result and a preset sixth time threshold value to obtain a sixth operation result, and taking the sixth operation result as the average processing time length of the second interaction message.
8. An access device, the device being applied to an access point AP, the device comprising:
the first calculation module is used for calculating average processing duration of processing each first interaction message in the wireless link establishment flow according to first time when each first wireless terminal which is accessed to the WLAN where the AP is located in the current period receives each first interaction message sent in the wireless link establishment flow, second time when each first interaction message which is sourced from each first wireless terminal is sent by the first calculation module and a preset first time threshold value after the current period arrives;
the second calculating module is configured to calculate, if all the first wireless terminals have a target wireless terminal whose access mode is not secret access-free, an average processing duration of processing each second response message in the same authentication key management flow by itself according to a third time when the second response message for each second interaction message from the AP is received by the target wireless terminal in the authentication key management flow used by the target wireless terminal, a fourth time when the second response message from the target wireless terminal is received by itself and a preset second time threshold, where each second response message does not include a last second response message sent by the target wireless terminal corresponding to the same authentication key management flow received by the AP;
The broadcasting module is used for broadcasting a Beacon message carrying a first link establishment parameter when a broadcasting period is reached, so that after the Beacon message is received and the second wireless terminal which determines that the AP is the AP to be accessed sends any message in a first target flow to the AP, if the next message which is required to be sent by the AP is not received after the average processing time corresponding to the message included in the first link establishment parameter is reached, the message is sent to the AP again, and if the next message is not received after the first target time is reached, the first interaction message in the wireless link establishment flow is sent to the AP again, or the first interaction message in the wireless link establishment flow is sent to other APs which are determined again to be accessed;
the first transceiver module is configured to, if a Probe Request message broadcast by a third wireless terminal is received after the current period arrives, send a Probe Response message carrying the first link establishment parameter to the third wireless terminal, so that after any message in a second target flow is sent to the AP by the third wireless terminal, if a next message that needs to be sent by the AP is not received after an average processing duration corresponding to the message included in the first link establishment parameter is reached, resend the message to the AP, and if the next message is not received after the second target duration is reached, resend a first interaction message in a wireless link establishment flow to the AP, or send a first interaction message in a wireless link establishment flow to other APs to be accessed that are redetermined;
The first target duration is the minimum duration of the timeout duration corresponding to the first target flow and the timeout duration corresponding to the first target flow recorded by the second wireless terminal, wherein the timeout duration corresponds to the first target flow and is included in the first link establishment parameter;
when the access mode of the second wireless terminal is close access-free, the first target flow is a wireless link establishment flow, and any message is any first interaction message; when the access mode of the second wireless terminal is not close-free access, the first target flow is a wireless link establishment flow or an authentication key management flow used by the second wireless terminal, any message is any first interaction message when the first target flow is a wireless link establishment flow, and any message is any second response message when the first target flow is an authentication key management flow used by the second wireless terminal;
the second target duration is the minimum duration of the timeout duration corresponding to the second target flow included in the first link establishment parameter and the timeout duration corresponding to the second target flow recorded by the third wireless terminal;
When the access mode of the third wireless terminal is close access-free, the second target flow is a wireless link establishment flow, and any message is any first interaction message; when the access mode of the third wireless terminal is not close access-free, the second target flow is a wireless link establishment flow or an authentication key management flow used by the third wireless terminal, any message is any first interaction message when the second target flow is a wireless link establishment flow, and any message is any second response message when the second target flow is an authentication key management flow used by the third wireless terminal.
9. The apparatus of claim 8, wherein the apparatus further comprises:
the second transceiver module is used for receiving a first interaction message sent by the fourth wireless terminal in the wireless link establishment flow after the current period arrives, wherein the first interaction message carries second link establishment parameters; and
after any message in the third target flow is sent to the fourth wireless terminal, if the next message which needs to be sent by the fourth wireless terminal is not received after the average processing time length which corresponds to the message and is calculated by the fourth wireless terminal and is included in the second link establishment parameter is reached, the message is sent to the fourth wireless terminal again, and if the next message is not received after the third target time length is reached, a de-authentication message is sent to the wireless terminal so as to trigger the wireless terminal to send the first interactive message in the wireless link establishment flow to the second AP again;
The third target duration is the minimum duration of the timeout duration corresponding to the third target flow included in the second link establishment parameter and the timeout duration corresponding to the third target flow recorded locally by the AP;
when the access mode of the fourth wireless terminal is the close access-free mode, the third target flow is a wireless link establishment flow, and any message is a first response message in the wireless link establishment flow;
when the access mode of the fourth wireless terminal is not close-access-free, the third target flow is a wireless link establishment flow or an authentication key management flow used by the fourth wireless terminal, any message is a first response message in the wireless link establishment flow when the third target flow is the wireless link establishment flow, and any message is any second interaction message in the authentication key management flow when the third target flow is the authentication key management flow used by the fourth wireless terminal.
10. An access device, wherein the device is applied to a wireless terminal, and the access mode of the wireless terminal is a secret-free access, and the device comprises:
The computing module is used for computing average processing duration of a first response message in a wireless link establishment flow according to first time when each first access point AP which is accessed in the current period receives the first response message which is sent by the first access point AP and aims at the first interaction message which is sourced by the first access point AP in the wireless link establishment flow, second time when each first access point AP receives the next first response message which is sent by the first access point AP after the first response message which is sourced by the first access point AP is received, and a preset first time threshold value after the first response message is received by the first access point AP;
the first transceiver module is configured to, if it is determined that the second AP needs to be accessed after the current period arrives, carry a first link establishment parameter in a first interaction message in a radio link establishment procedure and send the first interaction message to the second AP, so that after the second AP sends a first response message in the radio link establishment procedure to itself, if a next message that needs to be sent by itself is not received after reaching an average processing duration corresponding to the first response message calculated by itself and included in the first link establishment parameter, resend the first response message to itself, and if the next message is not received after reaching a first target duration, send a de-authentication message to the radio terminal to trigger the radio terminal to resend the first interaction message in the radio link establishment procedure to the second AP;
The second transceiver module is configured to, if a Beacon packet carrying a second link establishment parameter broadcast by a third AP is received after the current period arrives and it is determined that the Beacon packet needs to be accessed to the third AP, send any interaction packet in a radio link establishment procedure to the third AP, if a next packet that needs to be sent by the third AP is not received after reaching an average processing duration corresponding to the interaction packet calculated by the third AP and included in the second link establishment parameter, send the interaction packet to the third AP again, and if the next packet is not received after reaching a second target duration, send a first interaction packet in the radio link establishment procedure to the third AP again, or send a first interaction packet in the radio link establishment procedure to a fourth AP to be accessed again determined;
a third transceiver module, configured to, if a Probe Response message carrying a third link establishment parameter sent by a fifth AP is received after the current period arrives and it is determined that the fifth AP needs to be accessed, after any interaction message in a wireless link establishment procedure is sent to the fifth AP, if a next message that needs to be sent by the fifth AP is not received after an average processing duration corresponding to the interaction message calculated by the fifth AP and included in the third link establishment parameter arrives, send the interaction message to the fifth AP again, and if the next message is not received after the third target duration arrives, send a first interaction message in the wireless link establishment procedure to the fifth AP again, or send a first interaction message in the wireless link establishment procedure to the sixth AP to be accessed that is redetermined;
The first target duration is the minimum duration of the timeout duration corresponding to the wireless link establishment flow included in the first link establishment parameter and the timeout duration corresponding to the wireless link establishment flow locally recorded by the second AP;
the second target time length is the minimum time length of the timeout time length corresponding to the wireless link establishment flow included in the second link establishment parameter and the timeout time length corresponding to the wireless link establishment flow locally recorded by the second target time length;
the third target duration is the minimum duration of the timeout duration corresponding to the wireless link establishment procedure included in the third link establishment parameter and the timeout duration corresponding to the wireless link establishment procedure locally recorded by the third target duration.
11. An access device, the device being for use in a wireless terminal, the device comprising:
the first calculation module is used for calculating the average processing duration of the first response message in the wireless link establishment flow according to the first time when the first calculation module receives the first response message aiming at the first interaction message from the first access point AP after the first response message from the first access point AP is received in the current period and sent in the wireless link establishment flow, the second time when the first calculation module receives the next first interaction message sent by the first access point AP after the first response message from the first access point AP is received and a preset first time threshold value after the first response message from the first access point AP is received;
The second calculation module is used for calculating the average processing duration of each second interaction message in the self-processing authentication key management flow according to the third time when each first AP receives each second interaction message sent by the first AP in the self-using authentication key management flow, the fourth time when each second response message aiming at each second interaction message from each first AP is sent by the first AP and a preset second time threshold;
the first transceiver module is configured to, if it is determined that the second AP needs to be accessed after the current period arrives, carry a first link establishment parameter in a first interaction message in a radio link establishment procedure and send the first interaction message to the second AP, so that after the second AP sends any message in a first target procedure to itself, if a next message that needs to be sent by itself is not received after an average processing duration corresponding to the message included in the first link establishment parameter arrives, resend the message to itself, and if the next message is not received after the first target duration arrives, send a de-authentication message to the radio terminal, so as to trigger the radio terminal to resend the first interaction message in the radio link establishment procedure to the second AP;
The second transceiver module is configured to, if a Beacon packet carrying a second link establishment parameter broadcast by a third AP is received after the current period arrives and it is determined that the Beacon packet needs to be accessed to the third AP, send any packet in a second target flow to the third AP, if a next packet that needs to be sent by the third AP is not received after reaching an average processing duration corresponding to the packet calculated by the third AP and included in the second link establishment parameter, send the packet to the third AP again, and if the next packet is not received after reaching the second target duration, send a first interaction packet in a radio link establishment flow to the third AP again, or send a first interaction packet in a radio link establishment flow to a re-determined fourth AP to be accessed again;
a third transceiver module, configured to, if a Probe Response packet carrying a third link establishment parameter sent by a fifth AP is received after the current period arrives and it is determined that the fifth AP needs to be accessed, after any packet in a third target flow is sent to the fifth AP, if a next packet that needs to be sent by the fifth AP is not received after an average processing duration corresponding to the packet calculated by the fifth AP and included in the third link establishment parameter arrives, resend the packet to the fifth AP, and if the next packet is not received after the third target duration arrives, resend a first interaction packet in a wireless link establishment flow to the fifth AP, or send a first interaction packet in a wireless link establishment flow to the newly determined sixth AP to be accessed;
The first target process is a wireless link establishment process or an authentication key management process used by the second wireless terminal, when the first target process is a wireless link establishment process, any message is a first response message, when the first target process is the authentication key management process, any message is any second interaction message, and the first target time length is the minimum time length of timeout time length corresponding to the first target process and included in the first link establishment parameter, and the second AP locally records;
the second target flow and the third target flow are both wireless link establishment flows or the authentication key management flows, when the second target flow and the third target flow are both wireless link establishment flows, any message is any first interaction message, when the second target flow and the third target flow are both authentication key management flows used by the second wireless terminal, any message is any second response message, the second target time length is the minimum time length of timeout duration corresponding to the second target flow and the timeout duration corresponding to the second target flow, which is locally recorded, included in the second link establishment parameters, and the third target time length is the minimum time length of timeout duration corresponding to the third target flow and the timeout duration corresponding to the second target flow, which is locally recorded, included in the third link establishment parameters.
12. An electronic device comprising a processor and a machine-readable storage medium storing machine-executable instructions executable by the processor, the processor being caused by the machine-executable instructions to: method steps of any of claims 1-3, 4-5 or 6-7 are achieved.
13. A computer-readable storage medium, characterized in that the computer-readable storage medium has stored therein a computer program which, when executed by a processor, implements the method steps of any of claims 1-3, 4-5 or 6-7.
CN202311121465.8A 2023-08-31 2023-08-31 Access method, device, electronic equipment and storage medium Pending CN117320114A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311121465.8A CN117320114A (en) 2023-08-31 2023-08-31 Access method, device, electronic equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311121465.8A CN117320114A (en) 2023-08-31 2023-08-31 Access method, device, electronic equipment and storage medium

Publications (1)

Publication Number Publication Date
CN117320114A true CN117320114A (en) 2023-12-29

Family

ID=89287434

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311121465.8A Pending CN117320114A (en) 2023-08-31 2023-08-31 Access method, device, electronic equipment and storage medium

Country Status (1)

Country Link
CN (1) CN117320114A (en)

Similar Documents

Publication Publication Date Title
US20210211916A1 (en) Method for configuring measurement gap, access network device and terminal
RU2577336C2 (en) TROUBLESHOOTING Wi-Fi CONNECTIVITY BY MEASURING ROUND TRIP TIME OF PACKETS SENT WITH DIFFERENT MODULATION RATES
CN110999257B (en) Delivery method selection for delivery of server notifications
US20160095022A1 (en) Method, apparatus, and system for connecting to network
JP6805365B2 (en) Adaptive transmission method and equipment
CN107567107B (en) Data transmission method and device
CN110719616A (en) Network switching method and device, storage medium and electronic equipment
US7873364B2 (en) Apparatus and method for accounting in wireless communication system
CN108886713B (en) Data transmission method, data receiving equipment and data sending equipment
Mosbah et al. Enhanced transmission algorithm for dynamic device-to-device direct discovery
EP3796595A1 (en) Dect network clustering system and clustering method
JP2012074784A (en) Initial access setting information generating device, initial access setting information generating method, initial access setting information generating program, and base station device
US10143035B2 (en) Device and method of handling communication with communication device
US8305976B1 (en) Efficient wireless communication network entry for wireless communication devices
US20230353685A1 (en) Device and method for recovering lost information in wireless communication system
KR101461345B1 (en) Apparatus and Method for selection access point
CN117320114A (en) Access method, device, electronic equipment and storage medium
CN111245497B (en) Relay control method, relay control system, electronic device, and storage medium
EP2051429B1 (en) Apparatus and method for setting timer and counter in mobile communication system
JP2002064503A (en) Wireless packet relay method
WO2018119612A1 (en) Method and apparatus for random access
WO2018058537A1 (en) Signal transmission method and apparatus
WO2022027341A1 (en) Wireless communication method and terminal device
CN115243359B (en) Time determining method of NB-IOT (node B-area network) terminal, NB-IOT chip, device and communication system
US11627603B2 (en) Techniques to reduce transmission failures in time-slotted channel hopping networks

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination