WO2005008957A1 - Methode de mise en oeuvre d'un reseau local d'entreprise virtuel (vlan) sur le dispositif du point d'acces au lan sans fil - Google Patents

Methode de mise en oeuvre d'un reseau local d'entreprise virtuel (vlan) sur le dispositif du point d'acces au lan sans fil Download PDF

Info

Publication number
WO2005008957A1
WO2005008957A1 PCT/CN2003/001010 CN0301010W WO2005008957A1 WO 2005008957 A1 WO2005008957 A1 WO 2005008957A1 CN 0301010 W CN0301010 W CN 0301010W WO 2005008957 A1 WO2005008957 A1 WO 2005008957A1
Authority
WO
WIPO (PCT)
Prior art keywords
area network
local area
access point
data frame
virtual local
Prior art date
Application number
PCT/CN2003/001010
Other languages
English (en)
French (fr)
Inventor
Zhanli Wang
Zhong Guo
Jianguo Tang
Wei Wang
Original Assignee
Zte Corporation
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zte Corporation filed Critical Zte Corporation
Priority to AU2003289599A priority Critical patent/AU2003289599A1/en
Publication of WO2005008957A1 publication Critical patent/WO2005008957A1/zh

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/46Interconnection of networks
    • H04L12/4641Virtual LANs, VLANs, e.g. virtual private networks [VPN]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud
    • H04W12/121Wireless intrusion detection systems [WIDS]; Wireless intrusion prevention systems [WIPS]
    • H04W12/122Counter-measures against attacks; Protection against rogue devices
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/50Secure pairing of devices
    • H04W12/55Secure pairing of devices involving three or more devices, e.g. group pairing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/60Context-dependent security
    • H04W12/69Identity-dependent
    • H04W12/73Access point logical identity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W40/00Communication routing or communication path finding
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/26Network addressing or numbering for mobility support
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W84/00Network topologies
    • H04W84/02Hierarchically pre-organised networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
    • H04W84/10Small scale networks; Flat hierarchical networks
    • H04W84/12WLAN [Wireless Local Area Networks]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W88/00Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
    • H04W88/08Access point devices

Definitions

  • the present invention relates to a method for networking a wireless local area network in the communication field, and in particular, to a method according to
  • the IEEE 802. 11 standard implements a virtual local area network (VLA) method on a wireless local area network (WLAN) access point device (AP).
  • VLA virtual local area network
  • WLAN wireless local area network
  • AP access point device
  • the currently commonly used networking method of applying a virtual local area network on a wireless local area network is: During wireless local area network networking, multiple access point devices AP are connected to a virtual local area network VLAN switch, and multiple VLAN domains are divided on the VLAN switch. Each VLAN domain can contain one or more APs. In this way, multiple virtual subnet sets are formed in the distributed system. When all APs are finally connected to the access controller AC or other devices with equivalent functions, the AC controls them.
  • the wireless terminals corresponding to the APs in different VLAN domains can access each other; otherwise, the wireless terminals between different VLAN domains cannot access each other.
  • APs in different VLAN domains cannot directly transfer the wireless terminal's switching information, and once the VLAN domain to which the wireless terminal belongs changes, the wireless terminal will The connection to the wireless terminal in the original VLAN domain is interrupted. Therefore, the above-mentioned prior art VLAN implementation method obviously has the following disadvantages:
  • VLANs The division of VLANs is implemented through switches, that is, the implementation of VLANs depends on switches external to the AP;
  • the technical problem to be solved by the present invention is to provide a method for implementing a virtual local area network on a wireless local area network access point device, so as to solve the problems existing in the prior art and realize the security of the wireless local area network.
  • the core idea of the present invention is: divide all access point devices added into the distribution system into a management domain, divide wireless terminals corresponding to each access point device into a user domain, and set labels and tags to each access Point device for management and control.
  • the method for implementing a virtual local area network on a wireless local area network access point device includes: dividing the access point device of the distributed system into a management domain, and assigning a unique management domain identifier to each access point device;
  • the access point device encapsulates the data frame to be transmitted into a data frame with a virtual local area network label and sends it to the distribution system;
  • the access point device checks whether the received data frame has a virtual LAN label
  • the data frame does not carry a virtual local area network: sign, the data frame is discarded;
  • the virtual local area network identifier does not match, discard the data frame; If the virtual local area network identifiers match, the data frame is removed from the virtual local area network identifier and then forwarded to the corresponding access point device or wireless terminal.
  • the method for implementing a virtual local area network on a wireless local area network access point device of the present invention can achieve the purpose of wirelessly switching between APs when networking applications in different domains are applied, thereby reducing networking. Reliance on external VLAN switches during application saves networking costs and improves networking flexibility. At the same time, all APs can be divided into a specific management domain. Only administrators who belong to this domain can manage APs. Control to further enhance network security.
  • FIG. 1 is a flowchart of a method for implementing a virtual local area network on a wireless LAN access point device according to the present invention
  • FIG. 2 is a schematic networking diagram of an embodiment of a method for implementing a virtual local area network using the present invention
  • FIG. 3 is a method for implementing a virtual local area network using the present invention Networking diagram of another embodiment.
  • the method for implementing a virtual local area network on a wireless local area network access point device includes the following steps: First, all access point devices APs in a distributed system are divided into a management domain, and access to AP wireless terminals are divided into user domains.
  • the administrator or access controller AC assigns a unique management domain VLAN identifier VID (VLAN Ident if ier, VID for short) to each AP, and each wireless terminal also corresponds to Assign a unique user domain VID (step 101).
  • VID VLAN Ident if ier, VID for short
  • the AP then encapsulates the data frame sent by itself or the wireless terminal connected to the distribution system into a data frame with a VLAN tag (VLAN-Tagged), and sends it to the distribution system (step 102).
  • the AP After receiving the data frame sent by the distribution system, the AP checks whether the received data frame has a VLAN tag (steps 103 and 104). If the data frame does not have a VLAN tag, it discards the data frame (step 105). For a data frame with a VUN tag, a VID matching check is performed (step 106), and for a VID The mismatched data frames are discarded (step 105). If the VIDs match, the data frame is removed from the VLAN tag (step 107), and then the data frame is forwarded to the corresponding AP or wireless terminal (step 108). ).
  • step 105 the VID matching check is performed on the data frame with the VLAN tag to check whether the VID carried in the received data frame matches the VID of the AP in the management domain or the VID of the wireless terminal in the user domain.
  • the AP that the wireless terminal currently accesses is responsible for acquiring and maintaining the original user domain attributes of the wireless terminal, and broadcasting to the distribution system to notify the wireless terminal of the switch.
  • Message, and the AP that the wireless terminal originally accessed received the user domain attribute of the wireless terminal after receiving the terminal handover message.
  • the interaction of user domain attribute messages of wireless terminals between different APs is done through private interaction messages, that is, the private communication messages allow the AP to pass the user domain VID and other information of the originally accessed wireless terminal to the AP accessed by the current wireless terminal. .
  • VLAN domains In wireless LAN networking, the distribution system is divided into two types of VLAN domains: one is a VLAN domain composed of all access point devices AP 202, administrator 204, or access controller AC 301, which is called the management domain.
  • the administrator 204 or the access controller 301 in the domain can access and control all the access point devices AP 202, and each access point device AP 202 can also access freely; the other is a plurality of VLAN domains composed of the wireless terminal MT 203 That is, a set of virtual subnets of multiple wireless terminals is called a user domain.
  • Wireless terminals in the same user domain can be accessed freely, and wireless terminals in different user domains cannot access each other.
  • FIG. 2 shows the application of the present invention in a wireless local area network without an access controller AC or other equipment with equivalent functions, which is suitable for enterprise-level applications.
  • the administrator 204 and the access point device 202 are respectively connected to the switch 201 to form a management domain.
  • the wireless terminal MT 203 accessed by each AP forms multiple applications. Household domain.
  • the administrator 204 adds the AP 202 entering the distributed system to the management domain, and configures the user domain VID of the wireless terminal on the AP 202.
  • the AP 202 adds the wireless terminal to the corresponding user domain according to the VID of the wireless terminal, so that the entire network forms a management domain and a user domain 1, 2, 3.
  • wireless terminals located in the same user domain can communicate with each other. If a wireless terminal switches between APs, the AP currently accessing the wireless terminal is used to obtain and maintain the original user domain attributes of the wireless terminal. And notify the distributed system of the wireless terminal handover message in the management domain.
  • FIG. 3 shows the situation where the present invention is applied to all WLANs where the APs are aggregated to the access controller AC, and is suitable for carrier-grade applications.
  • the management domain is composed of AP 202 and access controller AC 301.
  • AP 202 is connected to access controller AC 301 through switch 201.
  • Access controller AC 301 is connected to switch 201 at one end and the other end to INTERNET connection.
  • AC 301 adds the AP 202 entering the distributed system to the management domain.
  • AC 301 configures the user domain VID of the wireless terminal
  • AP 202 adds the wireless ID of the wireless terminal to it Corresponding user domains, such that the entire network forms a management domain and user domains 1, 2, and 3.
  • AC 301 is used to control whether wireless terminals in different user domains can communicate with each other.
  • the currently accessed AP is responsible for obtaining and maintaining the original user domain of the wireless terminal. And notify the distributed system of the wireless terminal handover message within the management domain.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Description

在无线局域网接入点设备上实现虚拟局域网的方法 技术领域
本发明涉及通讯领域中无线局域网的组网方法, 具体地说, 涉及一种依照
IEEE 802. 11 标准在无线局域网 (WLAN )接入点设备 ( AP )上实现虛拟局域网 ( VLA )方法。
背景技术
安全性一直是无线局域网组网时关注的一个焦点, 目前, 业内已经有了各 种解决无线局域网安全的方案, 其中 IEEE 802. 1Q标准涉及的虚拟局域网技术 在无线局域网上的应用, 为保障无线局域网的安全提供了一种有效的手段。 当 前普遍使用的在无线局域网上应用虚拟局域网的组网方法是: 在无线局域网组 网时,将多个接入点设备 AP连接到虚拟局域网 VLAN交换机上,在 VLAN交换机 上划分了多个 VLAN域, 每个 VLAN域可包含一个或多个 AP, 这样在分布系统内 形成了多个虚拟子网集合, 将所有 AP最终连接到接入控制器 AC或其它具有相 当功能的设备时,由 AC控制不同 VLAN域中各 AP所对应的无线终端是否能够互 访, 否则不同 VLAN域间的无线终端不能互相访问。 当无线终端从一个 VLAN域 的 AP切换到另一个 VLAN域的 AP时,由于不同 VLAN域的 AP间无法直接传递该 无线终端的切换信息, 并且一旦无线终端所属 VLAN域发生改变,会造成无线终 端与原来 VLAN域无线终端的连接中断, 因此上述现有技术的 VLAN实现方法明 显存在以下不足:
( 1 )对 VLAN的划分是通过交换机实现的, 即 VLAN的实现依赖于 AP外部 的交换机;
( 2 )无线终端在不同 VLAN域的 AP间切换时, 切换信息不能直接在 AP间 传递, 且无线终端不能保持原来的 VLAN域属性, 会造成无线终端与原 VLAN域 无线终端的连接中断。
中国专利申请 021 39275. 7 "以太网接入网虚拟局域网接入技术"给出了一 种在以太网交换设备上实现 VLAN的方法,以太网交换设备通过自动学习得到对 VLAN域的划分, 但该方法无法解决在无线局域网 AP设备上实现 VLAN。
发明内容
本发明所要解决的技术问题在于提供一种在无线局域网接入点设备上实现 虛拟局域网的方法, 以解决现有技术中存在的问题, 实现无线局域网的安全。
本发明的核心思想在于: 将加入到分布系统内的所有接入点设备划分到管 理域, 将对应每个接入点设备的无线终端划分到用户域, 通过设定标签和标记 对各接入点设备进行管理和控制。
本发明所述在无线局域网接入点设备上实现虚拟局域网的方法, 包括: 将分布系統的接入点设备划分到管理域, 并为每个接入点设备分配一个唯 一的管理域标识符;
将接入的无线终端划分到用户域, 并为每个无线终端分配一个唯一的用户 域标识符;
接入点设备将待发送的数据帧封装成带有虚拟局域网标签的数据帧, 发送 到分布系统;
接入点设备检查接收到的数据帧是否带有虚拟局域网标签;
如果数据帧不带虚拟局域网 :签, 则将该数据帧丟弃;
如果数据帧带有虚拟局域网标签, 则对该数据帧进行虚拟局域网标识符匹 配性检查;
如果虚拟局域网标识符不匹配, 则丢弃该数据帧; 如果虚拟局域网标识符匹配, 则将该数据帧去掉虚拟局域网标识符后, 转 发至相应的接入点设备或无线终端。
与现有技术相比, 采用本发明的在无线局域网接入点设备上实现虚拟局域 网的方法,可以实现在不同域的组网应用时,无线终端能在 AP间自由切换的目 的, 降低组网应用时对外部 VLAN交换机的依赖, 节省了组网成本, 提高了组网 的灵活性; 同时, 所有 AP可被划分在一个特定的管理域中, 只有属于这个域的 管理员才能对 AP进行管理控制, 进一步增强了网络的安全性。
附图说明
图 1是本发明在无线局域网接入点设备上实现虚拟局域网的方法流程图; 图 2是采用本发明实现虚拟局域网方法的一个实施例的组网示意图; 图 3是采用本发明实现虚拟局域网方法的另一个实施例的组网示意图。 具体实施方式
下面将结合附图和实施例对本发明的技术方案进行详细说明。
如图 1所示, 本发明提供的在无线局域网接入点设备上实现虛拟局域网的 方法包括以下步骤: 首先,分布系统内所有的接入点设备 AP都被划分到管理域 中, 接入到 AP的无线终端被划分到用户域, 管理员或接入控制器 AC为每个 AP 都分配一个唯一的管理域 VLAN标识符 VID ( VLAN Ident if ier, 简称 VID ), 同 时每个无线终端也对应分配一个唯一的用户域 VID (步骤 101 )。然后 AP将自身 或所接的无线终端发送到分布系统的数据帧封装成带有 VLAN 标签 ( VLAN- Tagged ) 的数据帧, 并发送到分布系统(步骤 102 )。 AP收到分布系统 发送来的数据帧后, 检查接收的数据帧是否带有 VLAN标签(步骤 103、 104 ), 如果该数据帧不带有 VLAN标签, 则对该数据帧进行丟弃处理(步骤 105 )。 对 于带有 VUN标签的数据帧, 则进行 VID的匹配性检查(步骤 106 ), 对于 VID 不匹配的数据帧进行丢弃处理(步骤 105 ), 如果 VID匹配, 则将该数据帧去掉 其带有的 VLAN标签(步驟 107 ), 然后将该数据帧转发至相应的 AP或无线终端 (步骤 108 )。
在步骤 105中对带有 VLAN标签的数据帧进行 VID匹配性检查, 是检查接 收到的数据帧所带的 VID是否与管理域中 AP的 VID或用户域中无线终端的 VID 匹配。
在本发明中, 当无线终端在各接入点设备间发生切换时, 该无线终端当前 接入的 AP负责获取并维持该无线终端的原用户域属性,并向分布系统广播通知 无线终端切换的消息, 而该无线终端原始接入的 AP收到终端切换的消息后,释 放该无线终端的用户域属性。在不同 AP之间交互无线终端的用户域属性消息是 通过私有交互消息完成的, 即通过私有交互消息, AP将原始接入的无线终端的 用户域 VID等信息传递给当前无线终端接入的 AP。
下面分别以两种不同的组网应用实例, 来说明本发明在无线局域网接入点 设备上实现虚拟局域网的方法。
在无线局域网组网时,将分布系统划分为两类 VLAN域: 一个是由所有接入 点设备 AP 202、 管理员 204或接入控制器 AC 301组成的 VLAN域, 称为管理域, 在该域内管理员 204或接入控制器 301可以访问及控制所有接入点设备 AP 202 , 各接入点设备 AP 202之间也可以自由访问; 另一个是由无线终端 MT 203组成 的多个 VLAN域, 即多个无线终端的虚拟子网集合, 称为用户域, 相同用户域内 的无线终端之间可以自由访问, 不同用户域的无线终端之间不能互访。
图 2所示为本发明在没有接入控制器 AC或者其他具有相当功能的设备的无 线局域网中的应用, 适用于企业级应用。 管理员 204、 接入点设备 202分別与 交换机 201连接, 组成管理域; 每个 AP所接入的无线终端 MT 203组成多个用 户域。 管理员 204将进入分布系统的 AP 202加入管理域中, 并在 AP 202上配 置无线终端的用户域 VID。 当某一无线终端 MT 203接入 AP 202时, AP 202根 据该无线终端的 VID将其加入到对应的用户域中, 这样整个网絡就形成了管理 域和用户域 1、 2、 3。 此时, 只有位于相同用户域内的无线终端之间可以相互 通信; 若某一无线终端在 AP间发生切换, 则当前接入无线终端的 AP用于获取 并维持该无线终端的原用户域属性, 并在管理域内向分布系统通知无线终端切 换的消息。
图 3所示为本发明应用于所有接入点设备 AP汇聚到接入控制器 AC的无线 局域网情况, 适用于运营级应用。 组成管理域的是各接入点设备 AP 202和接入 控制器 AC 301 , AP 202通过交换机 201与接入控制器 AC 301连接, 接入控制 器 AC 301则一端与交换机 201相连, 另一端与 INTERNET相连。 AC 301将进入 分布系统的 AP 202加入管理域中 , 当某一无线终端 MT 203接入 AP 202后, AC 301配置该无线终端的用户域 VID, AP 202 居该无线终端的 VID将其加入到 对应的用 '户域中, 这样整个网络形成了管理域和用户域 1、 2、 3。 在图 3中, AC 301用于控制不同用户域内的无线终端之间是否可以相互通信, 当某一个无 线终端在 AP间切换时, 当前接入的 AP负责获取并维持该无线终端的原用户域 属性, 并在管理域内向分布系统通知无线终端切换的消息。
最后所应说明的是, 以上实施例仅用以说明本发明的技术方案而非限制, 尽管参照较佳实施例对本发明进行了详细说明, 本领域的普通技术人员应当理 解, 可以对本发明的技术方案进行修改或者等同替换 , 而不脱离本发明技术方 案的精神和范围, 其均应涵盖在本发明的权利要求范围当中。

Claims

权利要求书
1、 一种在无线局域网接入点设备上实现虚拟局域网的方法, 其特征在于, 将分布系统的接入点设备划分到管理域, 并为每个接入点设备分配一个唯 一的管理域标识符;
将接入的无线终端划分到用户域, 并为每个无线终端分配一个唯一的用户 域标识符;
接入点设备将待发送的数据帧封装成带有虚拟局域网标签的数据帧 , 发送 到分布系统;
接入点设备检查接收到的数据帧是否带有虚拟局域网标签;
如果数据帧不带虚拟局域网标签, 则将该数据帧丢弃;
如果数据帧带有虚拟局域网标签, 则对该数据帧进行虚拟局域网标识符匹 配性检查;
如果虚拟局域网标识符不匹配, 则丢弃该数据帧;
如果虚拟局域网标识符匹配, 则将该数据帧去掉虚拟局域网标识符后, 转 发至相应的接入点设备或无线终端。
2、根据权利要求 1所述的在无线局域网接入点设备上实现虚拟局域网的方 法, 其特征在于, 所述方法还包括: 当所述无线终端在各接入点设备间发生切 换时, 当前接入的接入点设备获取并维持所述无线终端的原用户域属性, 并在 管理域内向分布系统发送无线终端切换的消息, 所述无线终端原始接入的接入 点设备收到所述切换消息后, 释放所述无线终端的相关资源。
3、根据权利要求 1或 1所述的在无线局域网接入点设备上实现虚拟局域网 的方法, 其特征在于, 所述对带有虚拟局域网标签的数据帧进行虚拟局域网标 识符匹配性检查的步驟 , 包括检查该数据帧所带的虚拟局域网标识符与管理域 中接入点设备的虚拟局域网标识符是否匹配。
4、根据权利要求 1或 2所述的在无线局域网接入点设备上实现虛拟局域网 的方法, 其特征在于, 所述对带有虚拟局域网标签的数据帧进行虛拟局域网标 识符匹配性检查的步驟, 包括检查该数据帧所带的虚拟局域网标识符与用户域 中的无线终端的虚拟局域网标识符是否匹配。
5、根据权利要求 1或 2所述的在无线局域网接入点设备上实现虚拟局域网 的方法, 其特征在于, 所述管理域包括管理员和各接入点设备。
6、根据权利要求 1或 1所述的在无线局域网接入点设备上实现虚拟局域网 的方法, 其特征在于, 所述管理域包括接入控制器和各接入点设备。
7、根据权利要求 1或 2所述的在无线局域网接入点设备上实现虚拟局域网 的方法, 其特征在于, 所述用户域包括与各接入点设备对应连接的无线终端。
PCT/CN2003/001010 2003-07-21 2003-11-27 Methode de mise en oeuvre d'un reseau local d'entreprise virtuel (vlan) sur le dispositif du point d'acces au lan sans fil WO2005008957A1 (fr)

Priority Applications (1)

Application Number Priority Date Filing Date Title
AU2003289599A AU2003289599A1 (en) 2003-07-21 2003-11-27 The method of implementing vlan on the device of wireless lan access point

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN03139932.0 2003-07-21
CNB031399320A CN1317861C (zh) 2003-07-21 2003-07-21 无线局域网接入点设备虚拟局域网的实现方法

Publications (1)

Publication Number Publication Date
WO2005008957A1 true WO2005008957A1 (fr) 2005-01-27

Family

ID=34069981

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2003/001010 WO2005008957A1 (fr) 2003-07-21 2003-11-27 Methode de mise en oeuvre d'un reseau local d'entreprise virtuel (vlan) sur le dispositif du point d'acces au lan sans fil

Country Status (3)

Country Link
CN (1) CN1317861C (zh)
AU (1) AU2003289599A1 (zh)
WO (1) WO2005008957A1 (zh)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP3666886A1 (en) 2013-03-15 2020-06-17 Dana-Farber Cancer Institute, Inc. Therapeutic peptides

Families Citing this family (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100389575C (zh) 2005-07-13 2008-05-21 华为技术有限公司 一种实现网上设备接入管理的方法
CN1925442B (zh) * 2006-08-01 2011-06-29 程伟明 一种智能环境中无线通信终端的自动组网方法
CN100466626C (zh) * 2006-11-27 2009-03-04 华为技术有限公司 区分无线业务的方法及无线传输设备
US8140654B2 (en) 2007-04-27 2012-03-20 Futurewei Technologies, Inc. Verifying management virtual local area network identifier provisioning consistency
US7969888B2 (en) 2007-04-27 2011-06-28 Futurewei Technologies, Inc. Data communications network for the management of an ethernet transport network
US8442072B2 (en) * 2007-05-25 2013-05-14 Futurewei Technologies, Inc. Method of preventing transport leaks in hybrid switching networks by extension of the link layer discovery protocol (LLDP)
CN100531101C (zh) * 2007-10-22 2009-08-19 华为技术有限公司 一种实现端到端的QinQ业务标签自动分配的方法和装置
CN101640621B (zh) * 2008-08-01 2012-09-19 上海贝尔阿尔卡特股份有限公司 一种在集中式无线网络中实现数据传输的方法和装置
CN102130890B (zh) * 2010-01-18 2013-09-18 杭州华三通信技术有限公司 提高利用ghost进行网络克隆的速率的方法及设备
CN102869012B (zh) * 2011-07-05 2018-11-06 横河电机株式会社 无线局域网接入点设备和系统以及相关方法
CN104426791B (zh) * 2013-08-29 2017-10-03 上海贝尔股份有限公司 一种用于无线网络的网络增强节点
CN105809917A (zh) * 2014-12-29 2016-07-27 中国移动通信集团公司 一种物联网消息传输的方法及设备
CN109547569A (zh) * 2018-12-29 2019-03-29 深圳市力合微电子股份有限公司 一种基于热水器应用的通信组网算法

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2000049827A1 (en) * 1999-02-17 2000-08-24 Telefonaktiebolaget Lm Ericsson (Publ) A method for secure handover
CN1356806A (zh) * 2001-12-31 2002-07-03 刘军民 实现局域网虚通道传送的数据转发方法
WO2003015431A1 (en) * 2001-08-03 2003-02-20 At & T Corp. Architecture and method for using ieee 802.11 like wireless lan system to emulate private land mobile radio system (plmrs) radio service
CN1399490A (zh) * 2002-08-15 2003-02-26 西安西电捷通无线网络通信有限公司 无线局域网移动终端的安全接入方法

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
AT402389B (de) * 1995-10-04 1997-04-25 Fischer Adv Components Gmbh Sicherheitsvorrichtung für im flugzeuginnenraum angebrachte behälter sowie behälter für die luftfahrtindustrie
US5745481A (en) * 1996-06-03 1998-04-28 Motorola, Inc. Message system and method for efficient multi-frequency roaming
US6201811B1 (en) * 1998-03-24 2001-03-13 Telefonaktiebolaget Lm Ericsson (Publ) Transferring Identifier information in a telecommunications system
JP2003143161A (ja) * 2001-11-06 2003-05-16 Nippon Telegr & Teleph Corp <Ntt> 無線通信アクセス制御方式における移動端末、アクセスポイント、およびアクセスノード

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2000049827A1 (en) * 1999-02-17 2000-08-24 Telefonaktiebolaget Lm Ericsson (Publ) A method for secure handover
WO2003015431A1 (en) * 2001-08-03 2003-02-20 At & T Corp. Architecture and method for using ieee 802.11 like wireless lan system to emulate private land mobile radio system (plmrs) radio service
CN1356806A (zh) * 2001-12-31 2002-07-03 刘军民 实现局域网虚通道传送的数据转发方法
CN1399490A (zh) * 2002-08-15 2003-02-26 西安西电捷通无线网络通信有限公司 无线局域网移动终端的安全接入方法

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP3666886A1 (en) 2013-03-15 2020-06-17 Dana-Farber Cancer Institute, Inc. Therapeutic peptides

Also Published As

Publication number Publication date
CN1317861C (zh) 2007-05-23
AU2003289599A1 (en) 2005-02-04
CN1571377A (zh) 2005-01-26

Similar Documents

Publication Publication Date Title
JP4769815B2 (ja) 未知の無線端末のための制限付きwlanアクセス
US6847620B1 (en) Mobile virtual LAN
US8422513B2 (en) Providing station context and mobility in a wireless local area network having a split MAC architecture
EP1903723B1 (en) Method and apparatus for transmitting message
US7835367B2 (en) Network connection method, network connection system, and, layer 2 switch and management server forming the network connection system
US20150172994A1 (en) Dynamic vlans in wireless networks
JP2003521167A (ja) Ipアドレスを無線ユニット識別子として使用するためのシステム及び方法
US9866522B2 (en) Method to control dynamic host configuration protocol pool exhaustion in dynamic network environments
WO2009094928A1 (fr) Procédé et équipement de transmission d&#39;un message basé sur le protocole de tunnel de niveau 2
US20100290391A1 (en) Apparatus and method for accessing multiple wireless networks
WO2005008957A1 (fr) Methode de mise en oeuvre d&#39;un reseau local d&#39;entreprise virtuel (vlan) sur le dispositif du point d&#39;acces au lan sans fil
WO2011153679A1 (zh) 业务配置方法、设备和系统
WO2012155867A1 (zh) 一种报文发送方法及接入控制器
US8068461B2 (en) Foreign agent, home agent, mobile node, system of mobile ethernet and method for data transmission
US20160080318A1 (en) Dynamic host configuration protocol release on behalf of a user
WO2008125027A1 (fr) Procédé de distribution commerciale et dispositif associé pour hall de réseau
CN101188510A (zh) 地址集中控制的方法、设备及系统
US9276768B2 (en) Providing station context and mobility in a wireless local area network having a split MAC architecture
CN101753429A (zh) 一种无线通信系统中的vlan功能的设计方法
TWI600341B (zh) Wireless access setting device
JP2003249947A (ja) ネットワークシステム、網内識別子の設定方法、網内情報管理装置、網内情報管理装置の網内識別子の設定方法、無線アクセスポイント、無線アクセスポイントの網内識別子の設定方法、エッジスイッチ、エッジスイッチの網内識別子の設定方法、プログラム、および記録媒体
KR102280854B1 (ko) Ip 모빌리티 지원 방법 및 ip 모빌리티 제공 시스템
US20220123997A1 (en) Relay functionality in an application centric infrastructure (aci) fabric
JP3790494B2 (ja) Vpn転送装置およびネットワークシステム
JP2003078548A (ja) 加入者無線アクセスシステム

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BW BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE EG ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NI NO NZ OM PG PH PL PT RO RU SC SD SE SG SK SL SY TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): BW GH GM KE LS MW MZ SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IT LU MC NL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
WWE Wipo information: entry into national phase

Ref document number: 853/DELNP/2006

Country of ref document: IN

122 Ep: pct application non-entry in european phase
NENP Non-entry into the national phase

Ref country code: JP