CN117596712A - Method, device, system, electronic equipment and medium for network node to access network - Google Patents

Method, device, system, electronic equipment and medium for network node to access network Download PDF

Info

Publication number
CN117596712A
CN117596712A CN202410080292.8A CN202410080292A CN117596712A CN 117596712 A CN117596712 A CN 117596712A CN 202410080292 A CN202410080292 A CN 202410080292A CN 117596712 A CN117596712 A CN 117596712A
Authority
CN
China
Prior art keywords
network
network node
accessed
node
identifier
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202410080292.8A
Other languages
Chinese (zh)
Inventor
陈波
徐滨
孙汉标
向文
韩佳延
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Xiaomi Mobile Software Co Ltd
Original Assignee
Beijing Xiaomi Mobile Software Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Xiaomi Mobile Software Co Ltd filed Critical Beijing Xiaomi Mobile Software Co Ltd
Priority to CN202410080292.8A priority Critical patent/CN117596712A/en
Publication of CN117596712A publication Critical patent/CN117596712A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup
    • H04W76/11Allocation or use of connection identifiers
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/08Access restriction or access information delivery, e.g. discovery data delivery

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Small-Scale Networks (AREA)

Abstract

The disclosure relates to the field of network technologies, and in particular, to a method, a device, a system, an electronic device and a medium for accessing a network node to a network. The method comprises the following steps: determining a device identification of a target network node to be accessed to the network; and in response to receiving a first detection request message sent by a second network node which is not accessed to the network, sending a first detection response message carrying the equipment identifier of the target network node to the second network node, so that the second network node accesses the network when the equipment identifier carried in the first detection response message is consistent with the equipment identifier of the second network node. The network nodes which are not accessed to the network do not need to be accessed to the network first and then installed, so that the difficulty of network access during assembly is reduced, and the assembly operation is simplified.

Description

Method, device, system, electronic equipment and medium for network node to access network
Technical Field
The disclosure relates to the field of network technologies, and in particular, to a method, a device, a system, an electronic device and a medium for accessing a network node to a network.
Background
With the progress of technology and the continuous development of computer technology, intelligent devices such as smart phones and smart televisions have been widely used, wherein the connection between the intelligent devices and a network is a necessary condition for the intelligent devices to realize various intelligent demands, so that higher requirements are put forward for the intelligent devices to access the network.
Disclosure of Invention
In order to overcome the problems in the related art, the present disclosure provides a method, an apparatus, a system, an electronic device, and a medium for accessing a network by a network node.
According to a first aspect of embodiments of the present disclosure, there is provided a method of a network node accessing a network, applied to a first network node of an accessed network, the method comprising:
determining a device identification of a target network node to be accessed to the network;
and in response to receiving a first detection request message sent by a second network node which is not accessed to the network, sending a first detection response message carrying the equipment identifier of the target network node to the second network node, so that the second network node accesses the network when the equipment identifier carried in the first detection response message is consistent with the equipment identifier of the second network node.
According to a second aspect of embodiments of the present disclosure, there is provided a method of a network node accessing a network, applied to a second network node not accessing the network, the method comprising:
sending a first probe request message;
receiving a first detection response message which is sent by a first network node accessed to a network and carries a device identifier of a target network node to be accessed to the network based on the first detection request message;
And if the equipment identifier carried by the first detection response message is consistent with the self equipment identifier, accessing the network.
According to a third aspect of embodiments of the present disclosure, there is provided an apparatus for a network node to access a network, for application to a first network node of an accessed network, the apparatus comprising:
a first determining module configured to determine a device identity of a target network node to be accessed to the network;
the first sending module is configured to send a first detection response message carrying the equipment identifier of the target network node to the second network node in response to receiving a first detection request message sent by a second network node which is not accessed to the network, so that the second network node accesses the network when the equipment identifier carried in the first detection response message is consistent with the equipment identifier of the second network node.
According to a fourth aspect of embodiments of the present disclosure, there is provided an apparatus for a network node accessing a network, for application to a second network node not accessing the network, the apparatus comprising:
a third transmitting module configured to transmit the first probe request message;
a second receiving module configured to receive a first probe response message which is sent by a first network node of an accessed network based on the first probe request message and carries a device identifier of a target network node to be accessed to the network;
And the network access module is configured to access the network if the equipment identifier carried by the first detection response message is consistent with the equipment identifier of the first detection response message.
According to a fifth aspect of embodiments of the present disclosure, there is provided a system for a network node to access a network, comprising:
a first network node having access to a network for performing the method for the network node to access the network according to any of the first aspects of the embodiments of the present disclosure;
a second network node not accessing the network, configured to perform a method for accessing the network by the network node according to any of the second aspects of the embodiments of the present disclosure.
According to a sixth aspect of embodiments of the present disclosure, there is provided a first electronic device, comprising:
a first processor;
a first memory for storing processor-executable instructions;
wherein the first processor is configured to implement the steps of the method for a network node to access a network of any of the first aspects of the embodiments of the present disclosure when the executable instructions are executed.
According to a seventh aspect of embodiments of the present disclosure, there is provided a second electronic device, comprising:
a second processor;
a second memory for storing processor-executable instructions;
wherein the second processor is configured to implement the steps of the method for a network node to access a network of any of the second aspects of the disclosed embodiments when the executable instructions are executed.
According to an eighth aspect of embodiments of the present disclosure, there is provided a computer readable storage medium having stored thereon computer program instructions which, when executed by a processor, implement the steps of the method for a network node to access a network provided by the first aspect of embodiments of the present disclosure or the second aspect of embodiments of the present disclosure.
By adopting the technical scheme, the network nodes which are not accessed to the network can be accessed to the network through the communication between the first network node and the second network node, the first network node and the second network node do not need to be operated simultaneously, and aiming at the scene that the assembly positions of the first network node and the second network node are far away and inconvenient to operate simultaneously, the network nodes which are not accessed to the network do not need to be accessed to the network first and then installed, the difficulty of network access in assembly is reduced, and the assembly operation is simplified.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the disclosure.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the disclosure and together with the description, serve to explain the principles of the disclosure.
Fig. 1 is a block diagram illustrating a system for a network node to access a network in accordance with an exemplary embodiment.
Fig. 2 is a flow chart illustrating a method of a network node accessing a network according to an exemplary embodiment.
Fig. 3 is a flow chart illustrating a method of another network node accessing a network according to an example embodiment.
Fig. 4 is an interaction diagram illustrating a method for a network node to access a network according to an example embodiment.
FIG. 5 is a schematic diagram illustrating device identification of candidate nodes for managing interface display, according to an example embodiment.
Fig. 6 is a block diagram illustrating an apparatus for a network node to access a network in accordance with an exemplary embodiment.
Fig. 7 is a block diagram illustrating another network node's apparatus for accessing a network in accordance with an exemplary embodiment.
Fig. 8 is a block diagram of a first electronic device, according to an example embodiment.
Fig. 9 is a block diagram of a second electronic device, according to an example embodiment.
Detailed Description
Reference will now be made in detail to exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numbers in different drawings refer to the same or similar elements, unless otherwise indicated. The implementations described in the following exemplary examples are not representative of all implementations consistent with the present disclosure. Rather, they are merely examples of apparatus and methods consistent with some aspects of the present disclosure as detailed in the accompanying claims.
It should be noted that, all actions for acquiring signals, information or data in the present disclosure are performed under the condition of conforming to the corresponding data protection rule policy of the country of the location and obtaining the authorization given by the owner of the corresponding device.
In some wireless local area networks, such as wireless Mesh networks, a plurality of nodes (each node may be a gateway, a router, etc.) are included, and each node is connected to each other. In the related art, the network node generally accesses to the network in two ways, the first way is: and the network node which is accessed to the network and the network node which is not accessed to the network simultaneously perform WPS key operation to realize WPS connection. Wherein the WPS is Wi-Fi protection setting. The second mode is as follows: the network nodes which are not accessed to the network are accessed to the network nodes which are accessed to the network through wires, and the network is accessed through wires. Both the above two methods require that the user simultaneously operate the network node of the non-access network and the network node of the accessed network, however, when the distance between the network node of the non-access network and the network node of the accessed network is relatively long, the user needs to place the network node of the non-access network near the network node of the accessed network to complete the operation of the access network, and then move the network node of the non-access network to the installation position for installation, so that the operation is relatively complicated.
In view of the above, the present disclosure provides a method, an apparatus, a system, an electronic device, and a medium for accessing a network by a network node, where the network node is not accessed to the network first and then installed, so as to reduce the difficulty of assembly and simplify the assembly operation.
Before describing in detail the method for network node access to a network provided by the present disclosure, first, a system for network node access to a network will be described.
Fig. 1 is a block diagram illustrating a system for a network node to access a network in accordance with an exemplary embodiment. As shown in fig. 1, the system may comprise a first network node 10 of an accessed network and a second network node 20 of a non-accessed network, the first network node 10 and the second network node 20 being communicatively connected. The first network node 10 is arranged to perform a method of network node access to a network applied to a first network node of an accessed network. The second network node 20 is arranged to perform a method of network node access to a network applied to a second network node not accessing the network. Wherein a method of network node access to a network applied to a first network node of an accessed network and a method of network node access to a network applied to a second network node of a non-accessed network will be described below.
Fig. 2 is a flow chart illustrating a method of a network node accessing a network according to an exemplary embodiment, the method being applied to a first network node 10 of an accessed network as shown in fig. 1. As shown in fig. 2, the method may include the following steps.
In step S21, a device identification of a target network node of the network to be accessed is determined.
In step S22, in response to receiving the first probe request message sent by the second network node that is not accessing the network, a first probe response message carrying the device identifier of the target network node is sent to the second network node, so that the second network node accesses the network when the device identifier carried in the first probe response message is consistent with the device identifier of the second network node.
In the present disclosure, the network may be a local area network including, but not limited to, a Mesh network or a wireless network with multi-stage devices connected to a central point, etc. Taking a Mesh network as an example, the Mesh network comprises a plurality of network nodes accessed to the Mesh network. The first network node refers to any preset network node which is accessed to the Mesh network, the second network node is a network node which is not accessed to the Mesh network, and the first network node can determine whether the second network node can access to the Mesh network, and after determining the node which can access to the Mesh network, the first network node controls the node to access to the network so as to provide network service.
Illustratively, the first network node may be a gateway, router, or wireless access point AP (Access Point) of an accessed network, or the like. The second network node may also be a gateway, router or wireless access point AP of the accessed network, etc. In the case where the network node is a router, the device identifier of the target network node may be the LAN MAC of the router, i.e., the physical address of the port on the router at the end to which the computer is connected.
It should be appreciated that the second network node may be plural and that each network node may communicate with the first network node via a separate communication channel.
In the present disclosure, the second network node that is not accessing the network may send the first probe request message periodically or in real time. Since each second network node cannot know the communication channel between the first network node for controlling its access to the network and the second network node, and thus each second network node cannot send the first probe request message in a specific communication channel to ensure that the first network node can receive the first probe request message, in an embodiment, each second network node can send the first probe request message in a full channel to ensure that the first network node can receive the first probe request message. The first probe request message may be, for example, probe request message probe request 1.
The first network node sends a first probe response message carrying the device identification of the target network node to the second network node when receiving the first probe request message. For example, the first network node may send the first probe response message to each second network node point-to-point in a unicast manner to establish a communication connection between the first network node and the second network node with reduced interference to other nodes and saving network resources. The first probe response message may be a probe response message probe response 1.
When the second network node receives the first probe response message, it determines whether the target network node determined in step S21 is the second network node, that is, it determines whether the device identifier carried in the first probe response message is consistent with the device identifier of the second network node, and determines that the second network node is the target network node and accesses the network when it determines that the device identifier carried in the first probe response message is consistent with the device identifier of the second network node.
By adopting the technical scheme, the network nodes which are not accessed to the network can be accessed to the network through the communication between the first network node and the second network node, the first network node and the second network node do not need to be operated simultaneously, and aiming at the scene that the assembly positions of the first network node and the second network node are far away and inconvenient to operate simultaneously, the network nodes which are not accessed to the network do not need to be accessed to the network first and then installed, the difficulty of network access in assembly is reduced, and the assembly operation is simplified.
In one embodiment, the device identification of the target network node determining the network to be accessed may be: the user inputs the device identification of the network node to the first network node, and the first network node determines the device identification of the network node input by the user as the device identification of the target network node.
In another embodiment, the first network node scans the second network node of the non-access network to obtain candidate nodes of the network to be accessed, and further determining the device identifier of the target network node of the network to be accessed may be: and determining the equipment identification of the target network node based on the candidate node.
Illustratively, in this embodiment, the method may further comprise:
sending a second detection request message carrying a second configuration mechanism identifier;
receiving a second probe response message sent by a second network node which is not accessed to the network in response to the second probe request message;
and if the second detection response message carries the first configuration mechanism identifier and the equipment identifier of the second network node, determining the second network node as a candidate node of the network to be accessed.
The second probe request message is a message that the first network node uses to scan for a second network node that is not accessing the network. To improve the comprehensiveness of the scanning, the first network node may send the second probe request message probe request 2 on the full channel to avoid missed scanning. Wherein the second configuration mechanism identification may be a partial field in the custom vendor_ie. vendor_ie is a data structure used to transport vendor specific information in Wi-Fi networks. For example, when the network is a mesh network, the vendor_ie may also be denoted as vendor_ie_mesh. Table 1 is a field included in vendor_ie and a corresponding description.
TABLE 1
Wherein the second configuration mechanism identification may include the first four fields of vendor_ie in table 1, i.e., the second configuration mechanism identification includes: u_int8_t id field, u_int8_t len field, u_int8_t oui [3] field, and u_int8_t oui_type field. In the second configuration mechanism identification, the u_int8_t oui [3] field is the vendor oui identity of the first network node.
In addition, in the present disclosure, the second probe request message may further carry a custom vendor_ie of the first network node shown in table 1. And the device identifier in the custom vendor_ie of the first network node is the device identifier of the first network node.
When receiving the second probe request message probe request 2, the second network node feeds back a second probe response message probe response 2 if the second configuration mechanism identifier can be identified from the probe request 2. When the first network node receives the second probe response message probe response 2, if it is determined that the second probe response message probe response 2 carries the first configuration mechanism identifier and the device identifier of the second network node, that is, the custom vendor_ie carrying the second network node, the second network node is determined to be a candidate node of the network to be accessed.
The first four fields in the custom vendor_ie of the second network node are the first configuration mechanism identifier, the u_int8_t oui [3] field is the vendor oui identifier of the second network node, and the u_int8_t almac [6] field is the device identifier of the second network node.
It should be understood that, if the first network node and the second network node are nodes of the same vendor, the contents of the first four fields in the custom vendor_ie of the first network node are the same as the contents of the first four fields in the custom vendor_ie of the second network node.
In addition, if the second network node does not successfully identify the second configuration mechanism identifier, the second probe response message probe response 2 fed back does not carry the custom vendor_ie of the second network node, and accordingly, the first network node determines that the second network node is not a candidate node of the network to be accessed. The unsuccessful recognition may include a second configuration mechanism identifier that the second network node does not support the first network node or the second configuration mechanism identifier is not included in the second probe request message probe request 2.
After the candidate node is determined in the above manner, the device identifier of the target network node of the network to be accessed is determined from the device identifiers of the candidate nodes.
For example, after determining the candidate node, the first network node may output the device identifier of the candidate node, so that the user selects the device identifier of the network node to be accessed to the network from the device identifiers of the candidate node; and determining the equipment identification of the network node selected by the user as the equipment identification of the target network node of the network to be accessed.
In one embodiment, the first network node may periodically actively send a second probe request message carrying the second configuration mechanism identification.
In another embodiment, the first network node may send a second probe request message carrying the second configuration mechanism identifier when receiving the node scan request. Optionally, the first network node responds to the detection of the node scanning request input by the user through the preset management interface, and sends a second probe request message carrying the second configuration mechanism identifier.
For example, when a network node needs to be connected to the network, the user may perform a node scanning operation on the management interface, for example, click a "node scanning" button on the management interface. And when the first network node detects the operation of clicking the node scanning button on the management interface by the user, sending a second detection request message carrying the second configuration mechanism identifier on the whole channel.
Accordingly, in this embodiment, the first network node may output the device identifier of the candidate node to the management interface, so as to display the device identifier of the candidate node on the management interface, and further, the user selects the device identifier of the network node to be accessed to the network from the displayed device identifiers of the candidate node.
By adopting the technical scheme, a user can complete the operation of accessing the second network node into the network through the management interface, so that the operation of the access network can be remotely completed, the assembly difficulty is further reduced, and the assembly operation is simplified.
It should be appreciated that after determining the device identifier of the target network node in the above manner, the first network node may encapsulate the device identifier of the target network node in the u_int8_t almac [6] field of the custom vendor_ie of the first network node, and then, when receiving the first probe request message sent by the second network node, send the first probe response message carrying the custom vendor_ie of the first network node encapsulating the device identifier of the target network node to the second network node. Meanwhile, the first network node may trigger the WPS button to wait for WPS interaction with the target network node.
In step S22, in response to receiving the first probe request message sent by the second network node that is not connected to the network, the specific implementation manner of sending the first probe response message carrying the device identifier of the target network node to the second network node may be: in response to receiving a first detection request message sent by a second network node which is not accessed to the network, determining whether the second network node accords with the network access condition according to the first detection request; and if the second network node meets the network access condition, sending a first detection response message carrying the equipment identifier of the target network node to the second network node.
For example, in response to receiving a first probe request message sent by a second network node which is not accessed to the network, determining whether the first probe request message carries a first configuration mechanism identifier; and if the first detection request message carries the first configuration mechanism identifier, determining that the second network node accords with the network access condition.
When the first network node receives a first detection request message sent by a second network node which is not accessed to the network, determining whether the first detection request message carries a first configuration mechanism identifier or not, or determining whether the first detection request message carries a custom vendor_ie of the second network node or not, if so, determining that the second network node accords with the network access condition, and at the moment, sending a first detection response message carrying the equipment identifier of the target network node to the second network node.
Fig. 3 is a flow chart illustrating a method of another network node accessing a network, the method being applied to a second network node not accessing the network, according to an exemplary embodiment. As shown in fig. 3, the method may include the following steps.
In step S31, a first probe request message is sent.
For example, a second network node that is not accessing the network may send a first probe request message on a full channel periodically or in real time to ensure that the first network node is able to receive the first probe request message.
In one embodiment, the first probe request message carries a first configuration mechanism identification to send, by the first network node, a first probe response message carrying a device identification of a target network node of the network to be accessed to the second network node based on the first configuration mechanism identification.
That is, when the first network node receives the first probe request message, if it is determined that the first probe request message carries the first configuration mechanism identifier, the first network node sends a first probe response message carrying the device identifier of the target network node of the network to be accessed to the second network node. And if the first detection request message does not carry the first configuration mechanism identification, the first detection response message carrying the equipment identification of the target network node of the network to be accessed is forbidden to be sent to the second network node.
In step S32, a first probe response message carrying a device identifier of a target network node of the network to be accessed, which is sent by a first network node of the accessed network based on the first probe request message, is received.
The first network node sends a first probe response message carrying the device identification of the target network node to the second network node when receiving the first probe request message. For example, the first network node may send the first probe response message to each second network node point-to-point in a unicast manner to establish a communication connection between the first network node and the second network node while reducing interference to other nodes and conserving network resources.
In step S33, if the device identifier carried by the first probe response message is consistent with the device identifier of the first probe response message, the network is accessed.
For example, when the second network node determines that the device identifier of the target network node is consistent with the device identifier of the second network node, the second network node characterizes that the first network node is adding the second network node to the network, and then the second network node accesses the network according to a preset standard network access flow. For example, the WPS button is triggered for WPS interaction to enable connection with the first network node. The specific implementation manner of accessing the network according to the standard network access flow belongs to a relatively conventional technology, and this disclosure will not be repeated.
Furthermore, the second network node does not perform any operation upon determining that the device identity of the target network node does not coincide with the device identity of itself.
By adopting the technical scheme, the network nodes which are not accessed to the network can be accessed to the network through the communication between the first network node and the second network node, the first network node and the second network node do not need to be operated simultaneously, and aiming at the scene that the assembly positions of the first network node and the second network node are far away and inconvenient to operate simultaneously, the network nodes which are not accessed to the network do not need to be accessed to the network first and then installed, the difficulty of network access in assembly is reduced, and the assembly operation is simplified.
Furthermore, in the present disclosure, the method may further include: and when receiving a second detection request message carrying a second configuration mechanism identifier sent by the first network node, if the second configuration mechanism identifier is successfully identified, sending a second detection response message carrying the first configuration mechanism identifier and the equipment identifier of the first network node so as to determine a candidate node to be accessed into the network by the first network node based on the second detection response message.
In this way, the first network node is facilitated to determine candidate nodes of the network to be accessed, and further, the user is facilitated to determine the equipment identifier of the target network node from the candidate nodes. The specific embodiment of the first network node determining the candidate node is described above, and will not be described herein.
Fig. 4 is an interaction diagram illustrating a method for a network node to access a network according to an example embodiment. As shown in fig. 4, the method may include the following steps.
In step S41, when the first network node detects a node scanning request input by a user through a preset management interface, the first network node sends a second probe request message 2 carrying a custom vendor_ie of the first network node on a full channel.
In step S42, the second network node receives the second probe request information probe request 2 and identifies a second configuration mechanism identity.
In step S43, the second network node sends a second probe response message probe response 2 carrying a custom vendor_ie of the second network node to the first network node when the second configuration mechanism identifier is successfully identified.
In addition, when the second network node does not successfully recognize the second configuration mechanism identifier, the second network node replies a second probe response message probe response 2 which does not carry the custom vendor_ie of the second network node.
In step S44, the first network node identifies a custom vendor_ie of the second network node carried by the received probe response message probe response 2, if identification is successful and the u_int8_t almac [6] field is not null, determines that the second network node is a candidate node of the network to be accessed, and displays the candidate node on the management interface.
If the second network node feeds back a second probe response message probe response 2 which does not carry the custom vendor_ie of the second network node, determining that the second network node is not a candidate node.
Illustratively, FIG. 5 is a schematic diagram illustrating device identification of candidate nodes of a management interface display, according to an example embodiment. As shown in fig. 5, assuming that the determined candidate nodes are Agent1 and agent_n1 … … agent_nx, the device identifiers of the candidate nodes displayed by the management interface are respectively: agents 1_almac, agents_n1_almac … … Agents_nx_almac.
In step S45, the first network node determines the device identifier of the candidate node selected by the user on the display interface as the device identifier of the target network node, encapsulates the device identifier of the target network node into the custom vendor_ie of the first network node, and triggers the WPS key operation.
In step S46, the second network node periodically sends a first probe request message probe 1 carrying a custom vendor_ie of the second network node on the full channel.
In step S47, the first network node receives a first probe request message probe request 1.
In step S48, if the custom vendor_ie of the second network node is identified, the first network node sends a first probe response message probe response 1 carrying the custom vendor_ie of the first network node to the second network node. Wherein, the custom vendor_ie of the first network node encapsulates the device identifier of the target network node.
In step S49, the second network node receives the first probe response message probe response 1, and if it is determined that the device identifier of the target network node is consistent with the device identifier of the second network node, accesses the network according to the preset standard network access procedure.
The standard network access procedure may include triggering a WPS key operation to implement WPS connection, and performing synchronous configuration with the first network node.
Therefore, the network nodes which are not accessed to the network can be accessed to the network through the communication between the first network node and the second network node, the first network node and the second network node do not need to be operated at the same time, and aiming at the scene that the assembly positions of the first network node and the second network node are far away and inconvenient to operate at the same time, the network nodes which are not accessed to the network do not need to be accessed to the network first and then installed, the difficulty of network access in assembly is reduced, and the assembly operation is simplified.
Based on the same inventive concept, the present disclosure also provides an apparatus for a network node access network applied to a first network node of an accessed network. Fig. 6 is a block diagram illustrating an apparatus for a network node to access a network, applied to a first network node of the accessed network, according to an exemplary embodiment. As shown in fig. 6, the apparatus for accessing a network by a network node may include:
A first determining module 601 configured to determine a device identity of a target network node to be accessed to the network;
a first sending module 602, configured to send, in response to receiving a first probe request message sent by a second network node that is not connected to the network, a first probe response message carrying a device identifier of the target network node to the second network node, so that the second network node accesses the network when the device identifier carried in the first probe response message is consistent with the device identifier of the second network node.
Optionally, the first sending module 602 is configured to:
in response to receiving a first detection request message sent by a second network node which is not accessed to the network, determining whether the second network node meets a network access condition according to the first detection request;
and if the second network node meets the network access condition, sending a first detection response message carrying the equipment identifier of the target network node to the second network node.
Optionally, the first sending module 602 is configured to:
in response to receiving a first probe request message sent by a second network node which is not accessed to the network, determining whether the first probe request message carries a first configuration mechanism identifier;
And if the first detection request message carries the first configuration mechanism identifier, determining that the second network node accords with the network access condition.
Optionally, the apparatus for accessing the network by the network node may further include:
the second sending module is configured to send a second detection request message carrying a second configuration mechanism identifier;
a first receiving module configured to receive a second probe response message sent by a second network node that is not accessing the network in response to the second probe request message;
a second determining module, configured to determine that the second network node is a candidate node to be accessed to the network if the second probe response message carries a first configuration mechanism identifier and a device identifier of the second network node;
the first determining module 601 is configured to: and determining the equipment identification of the target network node to be accessed to the network from the equipment identifications of the candidate nodes.
Optionally, the first determining module 601 is configured to: and outputting the equipment identification of the candidate node to select the equipment identification of the target network node to be accessed to the network from the equipment identifications of the candidate node by a user.
Optionally, the second sending module is configured to: responding to a node scanning request input by a user through a preset management interface, and sending a second detection request message carrying a second configuration mechanism identifier;
accordingly, the first determining module 601 is configured to: and outputting the equipment identification of the candidate node to the management interface so as to display the equipment identification of the candidate node on the management interface, and selecting the equipment identification of the target network node to be accessed to the network from the displayed equipment identifications of the candidate node by a user.
Based on the same inventive concept, the present disclosure also provides an apparatus for a network node of a second network node not accessing a network to access the network. Fig. 7 is a block diagram illustrating another network node access network apparatus for use with a second network node not accessing a network, according to an exemplary embodiment. As shown in fig. 7, the apparatus for accessing a network by a network node may include:
a third transmitting module 701 configured to transmit a first probe request message;
a second receiving module 702, configured to receive a first probe response message sent by a first network node of an accessed network based on the first probe request message, where the first probe response message carries a device identifier of a target network node to be accessed to the network;
And the network access module 703 is configured to access the network if the device identifier carried by the first probe response message is consistent with the device identifier of the first probe response message.
Optionally, the first probe request message carries a first configuration mechanism identifier, so that the first network node sends a first probe response message carrying a device identifier of a target network node to be accessed to the network to the second network node based on the first configuration mechanism identifier.
Optionally, the apparatus for accessing the network by the network node may further include:
and the fourth sending module is configured to send the second detection response message carrying the first configuration mechanism identifier and the equipment identifier of the second detection response message to determine a candidate node to be accessed to the network by the first network node based on the second detection response message if the second configuration mechanism identifier is successfully identified when the second detection request message carrying the second configuration mechanism identifier sent by the first network node is received.
The specific manner in which the various modules perform the operations in relation to the network node access network apparatus of the above embodiments has been described in detail in relation to the embodiments of the method and will not be described in detail here.
The present disclosure also provides a computer readable storage medium having stored thereon computer program instructions which, when executed by a processor, implement the steps of the method of the present disclosure for a network node access network applied to a first network node of an accessed network.
The present disclosure also provides a computer readable storage medium having stored thereon computer program instructions which, when executed by a processor, implement the steps of the method of the present disclosure for a network node access network applied to a second network node not accessing a network.
Fig. 8 is a block diagram of a first electronic device, according to an example embodiment. For example, the first electronic device 800 may be a mobile phone, a computer, a digital broadcast terminal, a messaging device, a game console, a tablet device, a medical device, an exercise device, a personal digital assistant, or the like.
Referring to fig. 8, a first electronic device 800 may include one or more of the following components: a first processing component 802, a first memory 804, a first power component 806, a first multimedia component 808, a first audio component 810, a first input/output interface 812, a first sensor component 814, and a first communication component 816.
The first processing component 802 generally controls overall operation of the first electronic device 800, such as operations associated with display, telephone calls, data communications, camera operations, and recording operations. The first processing component 802 may include one or more first processors 820 to execute instructions to perform all or part of the steps of the method described above as being applied to a network node of a first network node of an accessed network. Further, the first processing component 802 may include one or more modules that facilitate interactions between the first processing component 802 and other components. For example, the first processing component 802 may include a multimedia module to facilitate interaction between the first multimedia component 808 and the first processing component 802.
The first memory 804 is configured to store various types of data to support operation at the first electronic device 800. Examples of such data include instructions for any application or method operating on the first electronic device 800, contact data, phonebook data, messages, pictures, videos, and so forth. The first memory 804 may be implemented by any type or combination of volatile or nonvolatile memory devices such as Static Random Access Memory (SRAM), electrically erasable programmable read-only memory (EEPROM), erasable programmable read-only memory (EPROM), programmable read-only memory (PROM), read-only memory (ROM), magnetic memory, flash memory, magnetic or optical disk.
The first power supply component 806 provides power to the various components of the first electronic device 800. The first power component 806 can include a power management system, one or more power sources, and other components associated with generating, managing, and distributing power for the first electronic device 800.
The first multimedia component 808 includes a screen between the first electronic device 800 and the user that provides an output interface. In some embodiments, the screen may include a Liquid Crystal Display (LCD) and a Touch Panel (TP). If the screen includes a touch panel, the screen may be implemented as a touch screen to receive input signals from a user. The touch panel includes one or more touch sensors to sense touches, swipes, and gestures on the touch panel. The touch sensor may sense not only the boundary of a touch or slide action, but also the duration and pressure associated with the touch or slide operation. In some embodiments, the first multimedia component 808 includes a front camera and/or a rear camera. When the first electronic device 800 is in an operation mode, such as a photographing mode or a video mode, the front camera and/or the rear camera may receive external multimedia data. Each front camera and rear camera may be a fixed optical lens system or have focal length and optical zoom capabilities.
The first audio component 810 is configured to output and/or input audio signals. For example, the first audio component 810 includes a Microphone (MIC) configured to receive external audio signals when the first electronic device 800 is in an operational mode, such as a call mode, a recording mode, and a voice recognition mode. The received audio signals may be further stored in the first memory 804 or transmitted via the first communication component 816. In some embodiments, the first audio component 810 further comprises a speaker for outputting audio signals.
The first input/output interface 812 provides an interface between the first processing component 802 and a peripheral interface module, which may be a keyboard, click wheel, button, or the like. These buttons may include, but are not limited to: homepage button, volume button, start button, and lock button.
The first sensor assembly 814 includes one or more sensors for providing status assessment of various aspects for the first electronic device 800. For example, the first sensor assembly 814 may detect an on/off state of the first electronic device 800, a relative positioning of the components, such as a display and keypad of the first electronic device 800, the first sensor assembly 814 may also detect a change in position of the first electronic device 800 or a component of the first electronic device 800, the presence or absence of a user's contact with the first electronic device 800, a change in orientation or acceleration/deceleration of the first electronic device 800, and a temperature change of the first electronic device 800. The first sensor assembly 814 may include a proximity sensor configured to detect the presence of nearby objects without any physical contact. The first sensor assembly 814 may also include a light sensor, such as a CMOS or CCD image sensor, for use in imaging applications. In some embodiments, the first sensor assembly 814 may further include an acceleration sensor, a gyroscopic sensor, a magnetic sensor, a pressure sensor, or a temperature sensor.
The first communication component 816 is configured to facilitate communication between the first electronic device 800 and other devices, either wired or wireless. The first electronic device 800 may access a wireless network based on a communication standard, such as WiFi,2G, or 3G, or a combination thereof. In one exemplary embodiment, the first communication component 816 receives a broadcast signal or broadcast-related information from an external broadcast management system via a broadcast channel. In an exemplary embodiment, the first communication component 816 further includes a Near Field Communication (NFC) module to facilitate short range communications. For example, the NFC module may be implemented based on Radio Frequency Identification (RFID) technology, infrared data association (IrDA) technology, ultra Wideband (UWB) technology, bluetooth (BT) technology, and other technologies.
In an exemplary embodiment, the first electronic device 800 may be implemented by one or more Application Specific Integrated Circuits (ASICs), digital Signal Processors (DSPs), digital Signal Processing Devices (DSPDs), programmable Logic Devices (PLDs), field Programmable Gate Arrays (FPGAs), controllers, microcontrollers, microprocessors or other electronic elements for performing the above-described method of network node access network applied to a first network node of an accessed network.
In an exemplary embodiment, a non-transitory computer readable storage medium is also provided, such as first memory 804 including instructions executable by first processor 820 of first electronic device 800 to perform the above-described method of network node access network applied to a first network node of an accessed network. For example, the non-transitory computer readable storage medium may be ROM, random Access Memory (RAM), CD-ROM, magnetic tape, floppy disk, optical data storage device, etc.
In another exemplary embodiment, a computer program product is also provided, comprising a computer program executable by a programmable apparatus, the computer program having code portions for performing the above-described method of network node access network applied to a first network node of an accessed network when executed by the programmable apparatus.
Fig. 9 is a block diagram of a second electronic device, according to an example embodiment. For example, the second electronic device 900 may be a mobile phone, a computer, a digital broadcast terminal, a messaging device, a game console, a tablet device, a medical device, an exercise device, a personal digital assistant, and the like.
Referring to fig. 9, the second electronic device 900 may include one or more of the following components: a second processing component 902, a second memory 904, a second power component 906, a second multimedia component 908, a second audio component 910, a second input/output interface 912, a second sensor component 914, and a second communication component 916.
The second processing component 902 generally controls overall operations of the second electronic device 900, such as operations associated with display, telephone calls, data communications, camera operations, and recording operations. The second processing component 902 may include one or more second processors 920 to execute instructions to perform all or part of the steps of the method described above as being applied to network node access networks of a second network node not accessing networks. Further, the second processing component 902 may include one or more modules that facilitate interactions between the second processing component 902 and other components. For example, the second processing component 902 can include a multimedia module to facilitate interaction between the second multimedia component 908 and the second processing component 902.
The second memory 904 is configured to store various types of data to support operation at the second electronic device 900. Examples of such data include instructions for any application or method operating on the second electronic device 900, contact data, phonebook data, messages, pictures, videos, and so forth. The second memory 904 may be implemented by any type of volatile or non-volatile memory device or combination thereof, such as Static Random Access Memory (SRAM), electrically erasable programmable read-only memory (EEPROM), erasable programmable read-only memory (EPROM), programmable read-only memory (PROM), read-only memory (ROM), magnetic memory, flash memory, magnetic or optical disk.
The second power supply component 906 provides power to the various components of the second electronic device 900. The second power component 906 can include a power management system, one or more power sources, and other components associated with generating, managing, and distributing power for the second electronic device 900.
The second multimedia component 908 comprises a screen between the second electronic device 900 and the user providing an output interface. In some embodiments, the screen may include a Liquid Crystal Display (LCD) and a Touch Panel (TP). If the screen includes a touch panel, the screen may be implemented as a touch screen to receive input signals from a user. The touch panel includes one or more touch sensors to sense touches, swipes, and gestures on the touch panel. The touch sensor may sense not only the boundary of a touch or slide action, but also the duration and pressure associated with the touch or slide operation. In some embodiments, the second multimedia component 908 includes a front-facing camera and/or a rear-facing camera. When the second electronic device 900 is in an operational mode, such as a photographing mode or a video mode, the front camera and/or the rear camera may receive external multimedia data. Each front camera and rear camera may be a fixed optical lens system or have focal length and optical zoom capabilities.
The second audio component 910 is configured to output and/or input audio signals. For example, the second audio component 910 includes a Microphone (MIC) configured to receive external audio signals when the second electronic device 900 is in an operational mode, such as a call mode, a recording mode, and a voice recognition mode. The received audio signals may be further stored in the second memory 904 or transmitted via the second communication component 916. In some embodiments, the second audio component 910 further includes a speaker for outputting audio signals.
The second input/output interface 912 provides an interface between the second processing component 902 and a peripheral interface module, which may be a keyboard, click wheel, button, or the like. These buttons may include, but are not limited to: homepage button, volume button, start button, and lock button.
The second sensor assembly 914 includes one or more sensors for providing status assessment of various aspects for the second electronic device 900. For example, the second sensor assembly 914 may detect an on/off state of the second electronic device 900, a relative positioning of the assemblies, such as a display and keypad of the second electronic device 900, the second sensor assembly 914 may also detect a change in position of the second electronic device 900 or a component of the second electronic device 900, the presence or absence of a user's contact with the second electronic device 900, an orientation or acceleration/deceleration of the second electronic device 900, and a change in temperature of the second electronic device 900. The second sensor assembly 914 may include a proximity sensor configured to detect the presence of nearby objects without any physical contact. The second sensor assembly 914 may also include a light sensor, such as a CMOS or CCD image sensor, for use in imaging applications. In some embodiments, the second sensor assembly 914 may also include an acceleration sensor, a gyroscopic sensor, a magnetic sensor, a pressure sensor, or a temperature sensor.
The second communication component 916 is configured to facilitate communication between the second electronic device 900 and other devices, either wired or wireless. The second electronic device 900 may access a wireless network based on a communication standard, such as WiFi,2G, or 3G, or a combination thereof. In one exemplary embodiment, the second communication component 916 receives broadcast signals or broadcast-related information from an external broadcast management system via a broadcast channel. In an exemplary embodiment, the second communication component 916 further includes a Near Field Communication (NFC) module to facilitate short range communication. For example, the NFC module may be implemented based on Radio Frequency Identification (RFID) technology, infrared data association (IrDA) technology, ultra Wideband (UWB) technology, bluetooth (BT) technology, and other technologies.
In an exemplary embodiment, the second electronic device 900 may be implemented by one or more Application Specific Integrated Circuits (ASICs), digital Signal Processors (DSPs), digital Signal Processing Devices (DSPDs), programmable Logic Devices (PLDs), field Programmable Gate Arrays (FPGAs), controllers, microcontrollers, microprocessors, or other electronic elements for performing the above-described method for network node access to a network applied to a second network node that is not connected to a network.
In an exemplary embodiment, a non-transitory computer readable storage medium is also provided, such as a second memory 904 comprising instructions executable by the second processor 920 of the second electronic device 900 to perform the above-described method for network node access to a network applied to a second network node not accessing the network. For example, the non-transitory computer readable storage medium may be ROM, random Access Memory (RAM), CD-ROM, magnetic tape, floppy disk, optical data storage device, etc.
In another exemplary embodiment, a computer program product is also provided, comprising a computer program executable by a programmable apparatus, the computer program having code portions for performing the above-described method of network node access network applied to a second network node not accessing a network when executed by the programmable apparatus.
Other embodiments of the disclosure will be apparent to those skilled in the art from consideration of the specification and practice of the disclosure. This disclosure is intended to cover any adaptations, uses, or adaptations of the disclosure following the general principles of the disclosure and including such departures from the present disclosure as come within known or customary practice within the art to which the disclosure pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the disclosure being indicated by the following claims.
It is to be understood that the present disclosure is not limited to the precise arrangements and instrumentalities shown in the drawings, and that various modifications and changes may be effected without departing from the scope thereof. The scope of the present disclosure is limited only by the appended claims.

Claims (15)

1. A method of a network node accessing a network, applied to a first network node of an accessed network, the method comprising:
determining a device identification of a target network node to be accessed to the network;
and in response to receiving a first detection request message sent by a second network node which is not accessed to the network, sending a first detection response message carrying the equipment identifier of the target network node to the second network node, so that the second network node accesses the network when the equipment identifier carried in the first detection response message is consistent with the equipment identifier of the second network node.
2. The method according to claim 1, wherein said sending a first probe response message carrying a device identification of said target network node to a second network node not accessing said network in response to receiving a first probe request message sent by said second network node comprises:
In response to receiving a first detection request message sent by a second network node which is not accessed to the network, determining whether the second network node meets a network access condition according to the first detection request;
and if the second network node meets the network access condition, sending a first detection response message carrying the equipment identifier of the target network node to the second network node.
3. The method according to claim 2, wherein said determining whether the second network node meets the network access condition according to the first probe request in response to receiving the first probe request message sent by the second network node that is not accessing the network, comprises:
in response to receiving a first probe request message sent by a second network node which is not accessed to the network, determining whether the first probe request message carries a first configuration mechanism identifier;
and if the first detection request message carries the first configuration mechanism identifier, determining that the second network node accords with the network access condition.
4. The method according to claim 1, wherein the method further comprises:
sending a second detection request message carrying a second configuration mechanism identifier;
Receiving a second probe response message sent by a second network node which is not accessed to the network in response to the second probe request message;
if the second detection response message carries a first configuration mechanism identifier and a device identifier of the second network node, determining that the second network node is a candidate node to be accessed to the network;
the determining the device identifier of the target network node to be accessed to the network includes:
and determining the equipment identification of the target network node to be accessed to the network from the equipment identifications of the candidate nodes.
5. The method of claim 4, wherein the determining the device identification of the target network node to be accessed to the network from the device identifications of the candidate nodes comprises:
outputting the equipment identification of the candidate node to select the equipment identification of the network node to be accessed to the network from the equipment identifications of the candidate node by a user;
and determining the equipment identification of the network node selected by the user as the equipment identification of the target network node to be accessed to the network.
6. The method of claim 5, wherein the sending the second probe request message carrying the second configuration mechanism identification comprises:
Responding to a node scanning request input by a user through a preset management interface, and sending a second detection request message carrying a second configuration mechanism identifier;
accordingly, the outputting the device identifier of the candidate node includes:
and outputting the equipment identification of the candidate node to the management interface so as to display the equipment identification of the candidate node on the management interface.
7. A method for a network node to access a network, applied to a second network node that is not accessing the network, the method comprising:
sending a first probe request message;
receiving a first detection response message which is sent by a first network node accessed to a network and carries a device identifier of a target network node to be accessed to the network based on the first detection request message;
and if the equipment identifier carried by the first detection response message is consistent with the self equipment identifier, accessing the network.
8. The method of claim 7, wherein the first probe request message carries a first configuration mechanism identification to send, by the first network node, a first probe response message to the second network node carrying a device identification of a target network node to be accessed to the network based on the first configuration mechanism identification.
9. The method according to claim 7 or 8, characterized in that the method further comprises:
and when receiving a second detection request message carrying a second configuration mechanism identifier sent by the first network node, if the second configuration mechanism identifier is successfully identified, sending a second detection response message carrying the first configuration mechanism identifier and the equipment identifier of the first network node so as to determine candidate nodes to be accessed to the network by the first network node based on the second detection response message.
10. An apparatus for a network node to access a network, the apparatus being adapted to be applied to a first network node of an accessed network, the apparatus comprising:
a first determining module configured to determine a device identity of a target network node to be accessed to the network;
the first sending module is configured to send a first detection response message carrying the equipment identifier of the target network node to the second network node in response to receiving a first detection request message sent by a second network node which is not accessed to the network, so that the second network node accesses the network when the equipment identifier carried in the first detection response message is consistent with the equipment identifier of the second network node.
11. An apparatus for a network node to access a network, the apparatus being adapted to a second network node not accessing the network, the apparatus comprising:
a third transmitting module configured to transmit the first probe request message;
a second receiving module configured to receive a first probe response message which is sent by a first network node of an accessed network based on the first probe request message and carries a device identifier of a target network node to be accessed to the network;
and the network access module is configured to access the network if the equipment identifier carried by the first detection response message is consistent with the equipment identifier of the first detection response message.
12. A system for a network node to access a network, comprising:
a first network node having access to a network for performing the method of the network node of any of claims 1-6 to access the network;
a second network node not accessing the network for performing the method of the network node accessing the network according to any of claims 7-9.
13. A first electronic device, comprising:
a first processor;
a first memory for storing processor-executable instructions;
wherein the first processor is configured to implement the steps of the method of the network node access network of any of claims 1-6 when the executable instructions are executed.
14. A second electronic device, comprising:
a second processor;
a second memory for storing processor-executable instructions;
wherein the second processor is configured to implement the steps of the method of the network node access network of any of claims 7-9 when the executable instructions are executed.
15. A computer readable storage medium having stored thereon computer program instructions, which when executed by a processor, implement the steps of the method of any of claims 1-6 or any of claims 7-9.
CN202410080292.8A 2024-01-19 2024-01-19 Method, device, system, electronic equipment and medium for network node to access network Pending CN117596712A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202410080292.8A CN117596712A (en) 2024-01-19 2024-01-19 Method, device, system, electronic equipment and medium for network node to access network

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202410080292.8A CN117596712A (en) 2024-01-19 2024-01-19 Method, device, system, electronic equipment and medium for network node to access network

Publications (1)

Publication Number Publication Date
CN117596712A true CN117596712A (en) 2024-02-23

Family

ID=89922413

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202410080292.8A Pending CN117596712A (en) 2024-01-19 2024-01-19 Method, device, system, electronic equipment and medium for network node to access network

Country Status (1)

Country Link
CN (1) CN117596712A (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109963352A (en) * 2019-04-08 2019-07-02 乐鑫信息科技(上海)股份有限公司 Method of network entry, device, equipment and the storage medium of equipment
CN113099440A (en) * 2019-12-23 2021-07-09 阿里巴巴集团控股有限公司 Network configuration method, device, equipment and system
CN113099451A (en) * 2020-01-07 2021-07-09 上海诺基亚贝尔股份有限公司 Method, apparatus, device and computer readable medium for connecting to a network
CN113115403A (en) * 2021-03-25 2021-07-13 北京小米移动软件有限公司 Method and device for network node to access network, electronic equipment and storage medium
WO2022183350A1 (en) * 2021-03-01 2022-09-09 Oppo广东移动通信有限公司 Network configuration method for internet of things device, terminal device, and internet of things device

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109963352A (en) * 2019-04-08 2019-07-02 乐鑫信息科技(上海)股份有限公司 Method of network entry, device, equipment and the storage medium of equipment
CN113099440A (en) * 2019-12-23 2021-07-09 阿里巴巴集团控股有限公司 Network configuration method, device, equipment and system
CN113099451A (en) * 2020-01-07 2021-07-09 上海诺基亚贝尔股份有限公司 Method, apparatus, device and computer readable medium for connecting to a network
WO2022183350A1 (en) * 2021-03-01 2022-09-09 Oppo广东移动通信有限公司 Network configuration method for internet of things device, terminal device, and internet of things device
CN113115403A (en) * 2021-03-25 2021-07-13 北京小米移动软件有限公司 Method and device for network node to access network, electronic equipment and storage medium

Similar Documents

Publication Publication Date Title
CN111837425B (en) Access method, access device and storage medium
CN112166634B (en) Paging cause sending method and device, and paging cause obtaining method and device
US20240015695A1 (en) Methods and apparatuses for sending information, and storage media
CN108810866B (en) Method and device for connecting intelligent equipment and storage medium
CN106454998B (en) Wireless local area network access method, device and terminal
US11647425B2 (en) Methods and devices for reducing temperature for user equipment
US11252623B2 (en) Network switching method, device and storage medium
CN107070707B (en) Method and device for determining initialization mode of router
CN116112958A (en) Wireless notification area updating method and wireless notification area updating device
CN106792570B (en) Positioning method and device
US11064415B2 (en) Wireless communication method and apparatus
CN113163467B (en) Node hop count updating method, device, terminal and storage medium in Mesh network
CN112492665B (en) Random access method and device, PLMN (public land mobile network) identifier sending method and device
CN108696914B (en) Method and device for scanning intelligent equipment and storage medium
CN117596712A (en) Method, device, system, electronic equipment and medium for network node to access network
CN111800836A (en) Communication method, communication device, electronic equipment and storage medium
US20220225473A1 (en) Network switching resource determining method and network switching resource configuration method
CN113115402B (en) Access method and device of access point, electronic equipment and storage medium
US20220104003A1 (en) Random access method and apparatus, and computer readable storage medium
CN112261698B (en) Method and device for accessing network, terminal and storage medium
CN112910906B (en) Data access method and device, mobile terminal and storage medium
CN114363994B (en) Method, device and system for node network access, electronic equipment and storage medium
CN115001899B (en) Network sharing method, network sharing device and storage medium
CN109005569B (en) Network connection method and device and routing equipment
US20240137903A1 (en) Ranging method and apparatus, terminal device and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination