WO2016138658A1 - 伪接入方法,伪接入直连调度方法,站点以及接入点 - Google Patents

伪接入方法,伪接入直连调度方法,站点以及接入点 Download PDF

Info

Publication number
WO2016138658A1
WO2016138658A1 PCT/CN2015/073683 CN2015073683W WO2016138658A1 WO 2016138658 A1 WO2016138658 A1 WO 2016138658A1 CN 2015073683 W CN2015073683 W CN 2015073683W WO 2016138658 A1 WO2016138658 A1 WO 2016138658A1
Authority
WO
WIPO (PCT)
Prior art keywords
sta
pseudo
pseudo access
access
direct connection
Prior art date
Application number
PCT/CN2015/073683
Other languages
English (en)
French (fr)
Inventor
丁志明
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Priority to PCT/CN2015/073683 priority Critical patent/WO2016138658A1/zh
Priority to US15/555,463 priority patent/US20180042046A1/en
Priority to CN201580005807.7A priority patent/CN106171034B/zh
Priority to EP15883715.3A priority patent/EP3255951B1/en
Publication of WO2016138658A1 publication Critical patent/WO2016138658A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W74/00Wireless channel access, e.g. scheduled or random access
    • H04W74/04Scheduled or contention-free access
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/08Access restriction or access information delivery, e.g. discovery data delivery
    • H04W48/10Access restriction or access information delivery, e.g. discovery data delivery using broadcasted information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/08Access restriction or access information delivery, e.g. discovery data delivery
    • H04W48/14Access restriction or access information delivery, e.g. discovery data delivery using user query or user detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/20Selecting an access point
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup
    • H04W76/14Direct-mode setup
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W72/00Local resource management
    • H04W72/12Wireless traffic scheduling
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W74/00Wireless channel access, e.g. scheduled or random access
    • H04W74/002Transmission of channel access control information
    • H04W74/004Transmission of channel access control information in the uplink, i.e. towards network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W84/00Network topologies
    • H04W84/02Hierarchically pre-organised networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
    • H04W84/10Small scale networks; Flat hierarchical networks
    • H04W84/12WLAN [Wireless Local Area Networks]

Definitions

  • the present invention relates to the field of communications, and in particular, to a pseudo access method, a pseudo access direct connection scheduling method, a station, and an access point.
  • Direct communication means that two STAs (Stations) (for example, user terminals) are associated with the same AP (Access Point), but when they communicate with each other, packets are sent directly to the other party through the air interface instead of Forwarded by the AP.
  • STA1 sends a message to STA2 through the AP, it needs to occupy the channel twice, that is, one uplink and one downlink, and the direct link only needs to occupy the channel once. This can improve the utilization of the wireless channel, and at the same time improve the available system throughput of the BSS (Basic Service Set), which is controlled by the AP, is an AP-centric wireless LAN.
  • BSS Basic Service Set
  • the direct link can work on the working channel of the AP, that is, the basic channel, or can work on a channel different from the AP, that is, the non-base channel.
  • the direct link of the AP still needs to request the channel resource from the AP when transmitting the data. That is, when the direct link is transmitting data, the BSS (Basic Service Set) controlled by the AP is basically The other STAs and APs in the service set, ie, an AP-centric WLAN, cannot use the working channel being occupied.
  • BSS Basic Service Set
  • the direct link works on a non-essential channel
  • the direct link does not occupy the resources of the AP working channel, and therefore does not affect the data transmission of other links in the BSS, but the STA on the direct link may compete with other BSS channels. Resources.
  • the AP's working channel is wider and wider, and the limited wireless spectrum can divide the number of channels less and less, so that when the AP works on a wide wireless channel, the STA selects the non-essential channel.
  • the direct link is mainly considered to work in the basic channel.
  • the WiFi network (that is, the network running the IEEE802.11 standard) runs on the free wireless spectrum, mainly using a competitive mechanism.
  • the newly developed standard IEEE 802.11ax is dedicated to improving the efficiency of the WiFi network and further improving the system throughput, which is intensive.
  • direct connection technology will be used.
  • existing standards compete for channels by STAs in direct-connected links.
  • the embodiments of the present invention provide a pseudo access method, a pseudo access direct connection scheduling method, a site, and an access point, which are used to improve channel usage efficiency of communication between STAs in a dense scenario.
  • a first aspect of the embodiments of the present invention provides a pseudo access method, including:
  • the STAs of the STAs are configured to support the access point APs that support the pseudo-access.
  • the STAs are not the legal users of the APs.
  • the pseudo-access is used to enable the non-legitimate users accessing the AP to send scheduling related management frames to the AP and accept the APs. Scheduling management;
  • the STA sends the pseudo access information to the AP, where the pseudo access information is used to enable the AP to determine that the access initiated by the STA is a pseudo access;
  • the STA establishes a pseudo-access association with the AP, so that the STA can send a scheduling-related management frame to the AP and accept scheduling management of the AP.
  • the sending, by the STA, the pseudo access information to the AP includes:
  • the STA sends a pseudo access association request message to the AP, where the pseudo association request message is used to initiate a pseudo access association request to the AP, where the information indication indicating the pseudo access information is included;
  • the method further includes:
  • the sending, by the STA, the pseudo access information to the AP includes:
  • the STA sends a pseudo access authentication request message to the AP, where the pseudo access authentication request message is used to initiate a pseudo access authentication request to the AP, where the authentication type parameter indicating the pseudo access information is included ;
  • the method further includes:
  • the STA receives a pseudo access authentication response message sent by the AP, where the pseudo access authentication response message is a response to the pseudo access authentication request message, and is used to determine that the AP receives the pseudo sent by the SAT. Access authentication request.
  • the STA finds that the pseudo access is supported.
  • the AP specifically includes:
  • the STA listens to a broadcast frame that can be received by the AP;
  • the STA determines that the first AP is the AP that supports the pseudo access.
  • the STA finds that the pseudo access is supported.
  • the AP specifically includes:
  • the STA receives the probe response frame sent by the second AP, where the probe response frame indicates that the second AP is the AP that supports pseudo access.
  • a second aspect of the embodiments of the present invention provides a pseudo access method, including:
  • the AP receives the pseudo access information sent by the STA, and the pseudo access information is used to enable the AP to determine that the access initiated by the STA is a pseudo access, and the STA is not a legal user of the AP, and the AP supports the AP.
  • the pseudo-access is used to enable a non-legitimate user accessing the AP to send a scheduling related to the AP Manage frames and accept scheduling management of APs;
  • the AP establishes a pseudo-access association with the STA, so that the AP can receive the scheduling-related management frame sent by the STA and perform scheduling management on the STA.
  • the receiving, by the AP, the pseudo access information sent by the STA specifically includes:
  • the AP receives a pseudo access association request message sent by the STA, where the pseudo association request message is used to initiate a pseudo access association request to the AP, where the information indication indicating the pseudo access information is included;
  • the method further includes:
  • the AP sends a pseudo access association response message to the STA, where the pseudo access association response message is a response to the pseudo access association request message, and is used to determine that the AP accepts the pseudo connection sent by the STA. Enter the association request.
  • the receiving, by the AP, the pseudo access information sent by the STA specifically includes:
  • the method further includes:
  • the AP sends a pseudo access authentication response message to the STA, where the pseudo access authentication response message is a response to the pseudo access authentication request message, and is used to determine that the AP receives the pseudo connection of the SAT transmission. Enter the authentication request.
  • the AP receives the pseudo connection sent by the STA. Before entering the information step, it also includes:
  • the AP sends a broadcast frame, indicating that the AP supports pseudo access in the broadcast frame.
  • the AP receives the pseudo connection sent by the STA. Before entering the information step, it also includes:
  • the AP sends a probe response frame to the STA, where the probe response frame indicates that the AP supports pseudo access.
  • a third aspect of the embodiments of the present invention provides a pseudo access direct scheduling method, including:
  • the first STA and the second STA respectively establish a pseudo-access association with the same AP that supports the pseudo-access, and the first STA and the second STA are not legal users of the AP;
  • the first STA establishes a direct connection with the second STA by using the AP;
  • the first STA and the second STA accept direct scheduling of the AP.
  • the first STA and the second STA respectively establish a pseudo access with an AP that supports pseudo access.
  • the associations specifically include:
  • the first STA discovers an AP that supports pseudo access
  • the first STA notifies the identifier of the AP that is found by the P2P connection to the second STA;
  • the first STA and the second STA both establish a pseudo access association with the AP.
  • the first STA passes the AP and the second STA.
  • the establishment of direct connection specifically includes:
  • the first STA initiates a direct connection request to the AP, and the direct connection request is used to request to establish a direct connection between the first STA and the second STA;
  • the first STA receives the direct connection response returned by the AP, and the direct connection response is used to notify that the direct connection requested by the first STA has been successfully established.
  • the direct scheduling of the AP by the first STA and the second STA specifically includes:
  • the first STA and the second STA perform direct communication on the directly connected transport stream allocated by the AP.
  • the method further includes:
  • the first STA and the second STA When the first STA and the second STA perform direct communication on the direct connection transport stream, the first STA and the second STA use the key of the P2P connection for protection.
  • a fourth aspect of the embodiments of the present invention provides a pseudo access direct connection scheduling method, including:
  • the AP establishes a pseudo-access association with the first STA and the second STA, and the AP supports the pseudo-access.
  • the first STA and the second STA are not legal users of the AP, and the first STA and the A P2P connection has been established between the second STAs;
  • the AP performs direct connection scheduling on the first STA and the second STA.
  • the establishing, by the AP, the direct connection between the first STA and the second STA includes:
  • the AP establishes a direct connection between the first STA and the second STA according to the direct connection request, and returns a direct connection response to the first STA, where the direct connection response is used to notify the The direct connection requested by the first STA has been successfully established.
  • the AP is configured to the first STA and the second STA.
  • Direct connection scheduling specifically includes:
  • the AP allocates a direct connection transport stream for the first STA to perform direct communication with the second STA.
  • a fifth aspect of the embodiments of the present invention provides a station STA, including:
  • a discovery module configured to discover an access point AP that supports pseudo access, where the STA is not a legal user of the AP, and the pseudo access is used to enable a non-legitimate user accessing the AP to send a scheduling related management frame to the AP. And accept the scheduling management of the AP;
  • a first sending module configured to send the pseudo access information to the AP, where the pseudo access information is used to enable the AP to determine that the access initiated by the STA is a pseudo access;
  • the first establishing module is configured to establish a pseudo access association with the AP, so that the STA can send a scheduling related management frame to the AP and accept scheduling management of the AP.
  • the first sending module is configured to send a pseudo access association request message to the AP, where the pseudo The association request message is used to initiate a pseudo access association request to the AP, where the information indication indicating the pseudo access information is included;
  • the STA further includes:
  • a first receiving module configured to receive a pseudo access association response message sent by the AP, where the pseudo access association response message is a request for the pseudo access association request message, before establishing a pseudo access association with the AP
  • the response is used to determine that the AP accepts a pseudo access association request sent by the STA.
  • the first sending module is configured to send a pseudo access authentication request message to the AP, where the pseudo The access authentication request message is used to initiate a pseudo access authentication request to the AP, where the authentication type parameter indicating the pseudo access information is included;
  • the STA further includes:
  • a second receiving module configured to receive a pseudo access authentication response message sent by the AP before establishing a pseudo access association with the AP, where the pseudo access authentication response message is a request for the pseudo access authentication request The response is used to determine that the AP receives the pseudo access authentication request sent by the SAT.
  • the discovery module specifically includes:
  • a listening unit configured to listen to a broadcast frame sent by the AP that can be received
  • a determining unit configured to determine, when the first AP supports the pseudo access, in the broadcast frame sent by the first AP that is detected by the listening unit, determining that the first AP is the AP that supports the pseudo access.
  • the discovery module specifically includes:
  • a probe sending unit configured to send a probe request frame, where the probe request frame carries information for finding an AP that supports pseudo access;
  • the response receiving unit is configured to receive a probe response frame that is sent by the second AP, where the probe response frame indicates that the second AP is the AP that supports pseudo access.
  • a sixth aspect of the embodiments of the present invention provides an access point AP, including:
  • a third receiving module configured to receive the pseudo access information sent by the STA, where the pseudo access information is used to enable the AP to determine that the access initiated by the STA is a pseudo access, and the STA is not legal to the AP
  • the user the AP supports the pseudo access, and the pseudo access is used to enable the non-legitimate user accessing the AP to send the scheduling related management frame to the AP and accept the scheduling management of the AP;
  • a second establishing module configured to establish a pseudo access association with the STA, so that the AP can receive a scheduling related management frame sent by the STA, and perform scheduling management on the STA.
  • the third receiving module is configured to receive a pseudo access association request message sent by the STA, The pseudo association request message is used to initiate a pseudo access association request to the AP, where the information indication indicating the pseudo access information is included;
  • the AP further includes:
  • a second sending module configured to send a pseudo access association response message to the STA before establishing a pseudo access association with the STA, where the pseudo access association response message is a request for the pseudo access association request message The response is used to determine that the AP accepts a pseudo access association request sent by the STA.
  • the third receiving module is configured to receive a pseudo access authentication request message sent by the STA, The pseudo access authentication request message is used to initiate a pseudo access authentication request to the AP, where the authentication type parameter indicating the pseudo access information is included;
  • the AP further includes:
  • a third sending module configured to send a pseudo access authentication response message to the STA before establishing a pseudo access association with the STA, where the pseudo access authentication response message is a request for the pseudo access authentication request message
  • a response configured to determine that the AP receives the pseudo access authentication request sent by the SAT.
  • the AP further includes:
  • the fourth sending module is configured to send a broadcast frame before receiving the pseudo access information sent by the STA, where the AP is instructed to support the pseudo access.
  • the AP further includes:
  • a probe receiving module configured to receive a probe request frame sent by the STA, where the probe request frame carries information for finding an AP that supports pseudo access;
  • the response sending module is configured to send a probe response frame to the STA, where the probe response frame indicates that the AP supports pseudo access.
  • a seventh aspect of the present invention provides a STA, which is used as the first STA, and includes:
  • a third establishing module configured to establish a P2P connection with the second STA
  • a fourth establishing module configured to establish a pseudo-access association with the second STA and the same AP that supports the pseudo-access, where the first STA and the second STA are not legal users of the AP;
  • a fifth establishing module configured to establish a direct connection with the second STA by using the AP
  • the scheduling accepting module is configured to accept the direct connection scheduling of the AP with the second STA.
  • the fourth establishing module specifically includes:
  • a discovery unit configured to discover an AP that supports pseudo access
  • a notification unit configured to notify the second STA of the discovered identity of the AP by using the P2P connection
  • a establishing unit configured to establish a pseudo access association with the AP and the second STA.
  • the fifth establishing module specifically includes:
  • a direct connection requesting unit configured to initiate a direct connection request to the AP, where the direct connection request is used to request to establish a direct connection between the first STA and the second STA;
  • the direct connection response receiving unit is configured to receive a direct connection response returned by the AP, and the direct connection response is used to notify that the direct connection requested by the first STA has been successfully established.
  • the scheduling accepting module specifically includes:
  • a transport stream requesting unit configured to request a direct-connected transport stream from the AP, to notify an AP of a demand for resources of the direct connection communication between the first STA and the second STA;
  • a communication unit configured to perform direct communication with the second STA on the directly connected transport stream allocated by the AP.
  • the communication unit is specifically configured to perform direct communication with the second STA on the directly connected transport stream allocated by the AP, and use a key of the P2P connection for protection.
  • An eighth aspect of the embodiments of the present invention provides an AP, including:
  • a sixth establishing module configured to establish a pseudo-access association with the first STA and the second STA, where the AP supports the pseudo-access, and the first STA and the second STA are not legal users of the AP, A P2P connection has been established between the first STA and the second STA;
  • a seventh establishing module configured to establish a direct connection between the first STA and the second STA
  • a scheduling module configured to perform direct connection scheduling on the first STA and the second STA.
  • the seventh establishing module specifically includes:
  • a direct connection request receiving unit configured to receive a direct connection request initiated by the first STA, where the direct connection request is used to request to establish a direct connection between the first STA and the second STA;
  • a direct connection request response unit configured to establish a direct connection between the first STA and the second STA according to the direct connection request, and return a direct connection response to the first STA, the direct connection response
  • the direct connection used to notify the first STA request has been successfully established.
  • the scheduling module specifically includes:
  • a transport stream request receiving unit configured to receive, by the first STA, a request for a direct-connected transport stream, to obtain a requirement for direct communication of the first STA and the second STA to a resource;
  • a transport stream allocation unit configured to allocate a direct transport stream for the first STA to perform direct communication with the second STA.
  • a ninth aspect of the embodiments of the present invention provides an STA, including:
  • Input device output device, processor and memory
  • the processor is configured to perform the following steps by invoking an operation instruction stored by the memory:
  • the access point AP supporting the pseudo access is discovered, and the STA is not a legal user of the AP, and the pseudo access is used to enable the non-legitimate user accessing the AP to send a scheduling related management frame to the AP and accept the scheduling of the AP. management;
  • the processor when performing the step of sending the pseudo access information to the AP, specifically performs the following steps. :
  • the processor Before performing the step of establishing a pseudo access association with the AP, the processor is further configured to perform the following steps:
  • the pseudo access association response message is a response to the pseudo access association request message, and is used to determine that the AP accepts a pseudo access association sent by the STA request.
  • the processor when performing the step of sending the pseudo access information to the AP, the processor specifically performs the following steps. :
  • the processor Before performing the step of establishing a pseudo access association with the AP, the processor is further configured to perform the following steps:
  • the processor specifically performs the following steps:
  • the first AP is determined to be the AP that supports the pseudo access.
  • the processor when performing the step of discovering the access point AP that supports the pseudo access, the processor specifically performs the following steps:
  • a tenth aspect of the embodiments of the present invention provides an AP, including:
  • Input device output device, processor and memory
  • the processor is configured to perform the following steps by invoking an operation instruction stored by the memory:
  • the pseudo access information is used to enable the AP to determine that the access initiated by the STA is a pseudo access, the STA is not a legal user of the AP, and the AP supports the pseudo Accessing, the pseudo access is used to enable a non-legitimate user accessing the AP to send a scheduling related management frame to the AP and accept scheduling management of the AP;
  • a pseudo access association is established with the STA, so that the AP can receive the scheduling related management frame sent by the STA and perform scheduling management on the STA.
  • the processor when performing the step of receiving the pseudo access information sent by the STA, the processor specifically performs the following steps:
  • the processor Before performing the step of establishing a pseudo access association with the STA, the processor further performs the following steps:
  • the processor when performing the step of receiving the pseudo access information sent by the STA, the processor specifically performs the following steps:
  • the processor Before performing the step of establishing a pseudo access association with the STA, the processor further performs the following steps:
  • the pseudo sent by the receiving STA is performed.
  • the processor is further configured to perform the following steps:
  • a broadcast frame is sent in which the AP is instructed to support pseudo access.
  • the pseudo sent by the receiving STA is performed.
  • the processor is further configured to perform the following steps:
  • An eleventh embodiment of the present invention provides an STA, which is used as the first STA, and includes:
  • Input device output device, processor and memory
  • the processor is configured to perform the following steps by invoking an operation instruction stored by the memory:
  • the processor when the second STA is configured to establish a pseudo connection with the same AP supporting the pseudo access, the processor is specifically configured to perform the following steps:
  • the second STA establishes a pseudo access association with the AP.
  • the processor when the performing the When the STA establishes a direct connection, the processor is specifically configured to perform the following steps:
  • the processor when performing the step of accepting the direct connection scheduling of the AP with the second STA, is specifically configured to perform the following steps:
  • the processor when the second STA is allocated to the AP in the AP, the processor is specifically configured to perform the following steps:
  • a twelfth aspect of the embodiments of the present invention provides an AP, including:
  • Input device output device, processor and memory
  • the processor is configured to perform the following steps by invoking an operation instruction stored by the memory:
  • the step of establishing a direct connection between the first STA and the second STA is performed Time
  • the processor is specifically configured to perform the following steps:
  • the processor when performing the pair of the first STA and the When the second STA performs the step of direct connection scheduling, the processor is specifically configured to perform the following steps:
  • the embodiment of the present invention has the following advantages:
  • the STA after the STA discovers the AP that supports the pseudo access, the STA sends the pseudo access information to the AP, and establishes a pseudo access association with the AP. Therefore, the STA that is not the legal user of the AP can be pseudo-accessed to the AP and receive the scheduling management of the AP. Therefore, in a dense scenario, multiple STAs can be prevented from competing with each other under the same spectrum resource, thereby improving the STA. Channel usage efficiency between communications.
  • FIG. 1 is a schematic flowchart of a pseudo access method according to an embodiment of the present invention.
  • FIG. 2 is another schematic flowchart of a pseudo access method according to an embodiment of the present invention.
  • FIG. 3 is another schematic flowchart of a pseudo access method according to an embodiment of the present invention.
  • FIG. 5 is a schematic flowchart of a pseudo access direct connection scheduling method according to an embodiment of the present invention.
  • FIG. 6 is another schematic flowchart of a pseudo-access direct connection scheduling method according to an embodiment of the present invention.
  • FIG. 7 is another schematic flowchart of a pseudo access direct connection scheduling method according to an embodiment of the present invention.
  • FIG. 8 is another schematic flowchart of a pseudo-access direct connection scheduling method according to an embodiment of the present invention.
  • FIG. 9 is another schematic flowchart of a pseudo-access direct connection scheduling method according to an embodiment of the present invention.
  • FIG. 10 is a schematic structural diagram of a site in an embodiment of the present invention.
  • FIG. 11 is a schematic structural diagram of another station in an embodiment of the present invention.
  • FIG. 12 is a schematic structural diagram of another station in an embodiment of the present invention.
  • FIG. 13 is a schematic structural diagram of an access point according to an embodiment of the present invention.
  • FIG. 14 is another schematic structural diagram of an access point according to an embodiment of the present invention.
  • FIG. 15 is another schematic structural diagram of an access point according to an embodiment of the present invention.
  • 16 is a schematic structural diagram of another access point in an embodiment of the present invention.
  • FIG 17 is another schematic structural diagram of an access point according to an embodiment of the present invention.
  • FIG. 18 is another schematic structural diagram of a station in an embodiment of the present invention.
  • FIG. 19 is a schematic structural diagram of another station in an embodiment of the present invention.
  • FIG. 20 is another schematic structural diagram of an access point according to an embodiment of the present invention.
  • 21 is another schematic structural diagram of an access point according to an embodiment of the present invention.
  • FIG. 22 is a schematic structural diagram of a device according to an embodiment of the present invention.
  • first, second, etc. may be used to describe individual STAs or APs in embodiments of the present invention, STAs or APs should not be limited to these terms. These terms are only used to distinguish STAs or APs from each other.
  • the first STA may also be referred to as a second STA without departing from the scope of the embodiments of the present invention.
  • the second STA may also be referred to as a first STA; similarly, the second AP may also be This is not limited by the embodiment of the present invention.
  • an embodiment of a pseudo access method in an embodiment of the present invention includes:
  • the STA finds an AP that supports pseudo access.
  • the STA can discover an AP that supports pseudo access, and the STA is not a legitimate user of the AP.
  • the inbound user can enable the non-legitimate user accessing the AP to send a scheduling related management frame to the AP and accept the scheduling management of the AP.
  • scheduling related management frame may specifically include:
  • Management frame used to create a direct link that is, DLS Request, DLS Response, etc.
  • Management frame for creating or modifying a transport stream ie ADDTS, etc.
  • Management frame for requesting transmission of resources, and so on.
  • the STA can find multiple ways to support the pseudo access AP.
  • the STA may listen to the broadcast frame sent by the AP, and if the broadcasted frame sent by the first AP indicates that the first AP supports the pseudo access, the STA determines the first AP bit.
  • the STA may send a probe request frame, where the probe request frame carries information for finding an AP that supports pseudo access, and then the STA receives a probe response frame sent by the second AP, where the probe response frame indicates the second An AP is an AP that supports pseudo access.
  • the probe request message may be a Probe Request frame defined in 802.11
  • the probe response message may be a Probe Response frame defined in 802.11.
  • the STA sends the pseudo access information to the AP, where the pseudo access information is used to enable the AP to determine that the access initiated by the STA is a pseudo access.
  • the AP is configured to send the pseudo access information, and the pseudo access information is used to enable the AP to determine that the access initiated by the STA is a pseudo access.
  • the STA establishes a pseudo-access association with the AP, so that the STA can send a scheduling related management frame to the AP and accept scheduling management of the AP.
  • the STA After the STA sends the pseudo access information to the AP, the STA establishes a pseudo access association with the AP, so that the STA can send the scheduling related management frame to the AP and accept the scheduling management of the AP.
  • the STA after the STA discovers the AP that supports the pseudo-access, it sends the pseudo-access information to the AP, and establishes a pseudo-access association with the AP, so that the STA that is not the legal user of the AP can pseudo-access to the AP.
  • the scheduling management of the AP is received. Therefore, in a dense scenario, competition between multiple STAs under the same spectrum resource can be avoided, thereby improving channel usage efficiency of communication between STAs.
  • another embodiment of the pseudo access method in the embodiment of the present invention includes:
  • the AP receives the pseudo access information sent by the STA.
  • the AP that supports the pseudo access can receive the pseudo access information sent by the STA, and the pseudo access information is used to enable the AP to determine that the access initiated by the STA is a pseudo access, and the STA is not a legitimate user of the AP, and the pseudo connection
  • the incoming user is configured to enable the non-legitimate user accessing the AP to send a scheduling related management frame to the AP and accept the scheduling management of the AP.
  • the STA needs to first discover that the AP supports the pseudo access, which can be in multiple ways:
  • the AP may send a broadcast frame, and indicate, in the broadcast frame, that the AP supports pseudo access;
  • the AP may receive the probe request frame sent by the STA, where the probe request frame carries information for finding an AP that supports pseudo access, and then the AP sends a probe response frame to the STA, where the AP indicates the AP in the probe response frame. Support for pseudo access.
  • the AP establishes a pseudo-access association with the STA, so that the AP can receive a scheduling-related management frame sent by the STA and perform scheduling management on the STA.
  • the AP After receiving the pseudo access information sent by the STA, the AP establishes a pseudo access association with the STA, so that the AP can receive the scheduling related management frame sent by the STA and perform scheduling management on the STA.
  • the AP after receiving the pseudo access information sent by the STA, the AP establishes a pseudo-access association with the STA, so that the STA that is not the legal user of the AP can pseudo-access to the AP, and receive the scheduling management of the AP. Therefore, in a dense scenario, mutual competition between multiple STAs under the same spectrum resource can be avoided, thereby improving channel utilization efficiency of communication between STAs.
  • the STA sends the pseudo access information to the AP.
  • the pseudo access information may be sent to the AP at different stages of communication between the STA and the AP, thereby indicating that the pseudo access is performed.
  • the following describes the pseudo access method in the embodiment of the present invention by transmitting the pseudo access information at different stages and using the interaction between the STA and the AP:
  • another embodiment of the pseudo access method in the embodiment of the present invention includes:
  • the STA finds an AP that supports pseudo access.
  • the STA sends a pseudo access authentication request message to the AP.
  • the STA After the STA is configured to support the pseudo access, the STA sends a pseudo access authentication request message to the AP, where the pseudo access authentication request message is used to initiate a pseudo access authentication request to the AP, where the pseudo access information is included.
  • Authentication type parameter ;
  • the indication may be a pseudo access authentication in the 802.11 authentication message.
  • an 802.11 authentication message carries an authentication type parameter to indicate which type of authentication is performed.
  • the authentication type parameter takes a value of 0, it indicates an open system authentication (Open System), and when the value is 1, it indicates Shared key authentication (shared key, that is, a common key is preset on both sides of the STA and the AP). If the value is 2, it means fast transition authentication (that is, the STA quickly switches from one AP to another AP).
  • 3 indicates the peer-to-peer authentication (for peer-to-peer authentication between two neighboring nodes in the mesh network).
  • a definition can be added to the authentication type parameter. For example, when the value is 4, it indicates pseudo. Access authentication.
  • a new frame can also be defined to perform pseudo access 802.11 authentication, which is not limited herein.
  • the AP receives a pseudo access authentication request message sent by the STA.
  • the AP receives the pseudo access authentication request message sent by the STA, where the pseudo access authentication request message is used to initiate a pseudo access authentication request to the AP, where the indication is included.
  • the authentication type parameter of the pseudo access information is included.
  • the AP sends a pseudo access authentication response message to the STA.
  • the AP may send the pseudo access authentication response message to the STA if the pseudo access authentication request is approved, and the pseudo access authentication response message is the pseudo connection.
  • the response to the authentication request message is used to determine that the AP receives the pseudo access authentication request sent by the SAT.
  • the STA receives a pseudo access authentication response message sent by the AP.
  • the STA After the AP sends the pseudo access authentication response to the STA, the STA receives the pseudo access authentication response message sent by the AP, and the pseudo access authentication response message is a response to the pseudo access authentication request message, and is used to determine that the AP receives the A pseudo access authentication request sent by the SAT.
  • the STA sends an association request message to the AP.
  • the AP receives an association request message sent by the STA.
  • the AP sends an association response message to the STA.
  • the STA receives an association response message sent by the AP.
  • the association identifier assigned by the AP to the STA may be carried.
  • step 306 and step 309 are similar to the implementation in the existing standard, except that the AP can determine that the 802.11 authentication performed in steps 303 to 305 is a pseudo access authentication, and therefore in steps 307 and 308 at this time. What is actually done after the 802.11 association is done is pseudo access.
  • the STA establishes a pseudo access association with the AP, so that the STA can send a scheduling related management frame to the AP and accept scheduling management of the AP.
  • the AP sends an association response message to the STA, and after receiving the association response message, the STA has met all the conditions for performing the pseudo-access association. At this time, the STA establishes a pseudo-access association with the AP, so that the STA can send the AP to the AP. Scheduling related management frames and accepting scheduling management of the AP.
  • the pseudo access message is carried in the pseudo access authentication request message in the 802.11 authentication process, and only a small amount of modification to the existing standard is required to implement the pseudo access, and no unnecessary extra is needed.
  • the step of improving the efficiency of the pseudo access of the STA and the AP is carried in the pseudo access authentication request message in the 802.11 authentication process, and only a small amount of modification to the existing standard is required to implement the pseudo access, and no unnecessary extra is needed.
  • steps 301, 302, 305, 306, 309, and 310 are steps of implementing the pseudo access method by using the STA as an execution subject.
  • steps 304, 304, 307, 308, and 310 are steps of implementing the pseudo access method by using the AP as an execution subject.
  • another embodiment of the pseudo access method in the embodiment of the present invention includes:
  • the STA finds an AP that supports pseudo access.
  • the STA sends an authentication request message to the AP.
  • the AP receives an authentication request message sent by the STA.
  • the AP sends an authentication response message to the STA.
  • the STA receives an authentication response message sent by the AP.
  • steps 402 and 405 are similar to the implementations in the existing standards. Specifically, no modification can be made to the authentication Authentication frame in the existing 802.11 standard.
  • the STA sends a pseudo access association request message to the AP.
  • the STA may send a pseudo access association message to the AP, where the pseudo association request message is used to initiate a pseudo access association request to the AP, where the information indicating the pseudo access information is included. Instructions.
  • the association request frame defined in 802.11 may be used, where an information is added to indicate that this is a pseudo access association request.
  • the specific indication manner may be to add an information element, and the presence of the information element indicates that the STA is requesting a pseudo access association.
  • the information element reference may be made to the 802.11 standard text, which is not described in detail herein, and the manner of adding the pseudo access indication information is not limited to the use of the information element method; another new frame may be defined as the pseudo access association request, which is not used here. limited.
  • the AP receives a pseudo access association request message sent by the STA.
  • the AP After the STA sends the pseudo access association request message to the AP, the AP receives the pseudo access association request message sent by the STA, and the pseudo association request message is used to initiate a pseudo access association request to the AP, where the proxy includes the pseudo access.
  • Informational indication of information After the STA sends the pseudo access association request message to the AP, the AP receives the pseudo access association request message sent by the STA, and the pseudo association request message is used to initiate a pseudo access association request to the AP, where the proxy includes the pseudo access.
  • Informational indication of information is used to initiate a pseudo access association request to the AP, where the proxy includes the pseudo access.
  • the AP sends a pseudo access association response message to the STA.
  • the AP After receiving the pseudo access association request message sent by the STA, the AP sends a pseudo access association response message to the STA, and the pseudo access association response message is the pseudo access association request message. The response is used to determine that the AP accepts the pseudo access association request sent by the STA.
  • the STA receives a pseudo access association response message sent by the AP.
  • the STA After the AP sends the pseudo access association response message to the STA, the STA receives the pseudo access association response message sent by the AP, and the pseudo access association response message is a response to the pseudo access association request message, and is used to determine the AP. Accept the pseudo access association request sent by the STA.
  • the STA establishes a pseudo access association with the AP, so that the STA can send a scheduling related management frame to the AP and accept scheduling management of the AP.
  • step 310 Similar to step 310, it will not be described here.
  • the pseudo access message is carried in the pseudo access association request message in the 802.11 association process, and only a small amount of modification to the existing standard is required to implement the pseudo access, and no unnecessary extra is needed.
  • the step of improving the efficiency of the pseudo access of the STA and the AP is carried in the pseudo access association request message in the 802.11 association process, and only a small amount of modification to the existing standard is required to implement the pseudo access, and no unnecessary extra is needed.
  • steps 401, 402, 405, 406, 409, and 410 are steps of implementing the pseudo access method by using the STA as an execution subject.
  • steps 404, 404, 407, 408, and 410 are steps of implementing the pseudo access method by using the AP as an execution subject.
  • an embodiment of a pseudo access direct scheduling method in an embodiment of the present invention includes:
  • the first STA establishes a P2P connection with the second STA.
  • the first STA establishes a P2P connection with the second STA for communication.
  • the establishment process of the P2P connection is not described in detail here.
  • the first STA and the second STA negotiate a key for the P2P connection, and the communication between them is protected by this key.
  • the first STA and the second STA respectively establish a pseudo-access association with the same AP that supports the pseudo-access.
  • the first STA and the second STA are not legal users of the AP.
  • the first STA and the second STA respectively establish a pseudo-access association with the same AP that supports the pseudo-access, and the first STA and the second STA are not legal users of the AP; Yes, the AP supports pseudo access, and the AP also supports direct connection scheduling.
  • the AP supports pseudo access
  • the AP also supports direct connection scheduling.
  • the first STA establishes a direct connection with the second STA by using the AP.
  • the first STA After the first STA and the second STA are pseudo-accessed to the same AP, the first STA establishes a direct connection with the second STA through the AP.
  • the first STA and the second STA accept direct scheduling of the AP.
  • the first STA After the first STA establishes a direct connection with the second STA, the first STA accepts the direct connection scheduling of the AP.
  • the first STA and the second STA that are connected by the P2P are established.
  • the AP can be pseudo-accessed to the AP, and the direct connection scheduling of the AP is accepted, thereby preventing the P2P user and the AP user from contending for the same channel resource.
  • the conflicts sent at the time improve the channel efficiency in dense scenes.
  • Another embodiment of the pseudo-access direct scheduling method in the embodiment of the present invention includes:
  • the first STA establishes a P2P connection with the second STA.
  • step 501 Similar to step 501, it will not be described here.
  • the first STA finds an AP that is pseudo-accessed.
  • the first STA finds that the environment is crowded and the communication effect is poor, so an AP that supports pseudo access is found.
  • an AP that supports pseudo access For the process of searching for an AP, refer to the pseudo access method in the embodiment of the present invention, which is not described herein.
  • the AP that supports pseudo access here actually supports direct connection scheduling.
  • the first STA notifies the identifier of the AP that is discovered by using the P2P connection to the second STA.
  • the first STA finds an AP that supports pseudo access, and the identifier of the AP notifies the second STA through the P2P connection, so that the second STA also pseudo-accesses the AP.
  • the second STA may also actively find such an AP by itself, and may inform the first STA that the found AP supporting the pseudo access, and the APs respectively found may not be the same, and therefore need to negotiate together.
  • An AP access is not limited here.
  • the first STA and the second STA both establish a pseudo access association with the AP.
  • the first STA and the second STA both establish a pseudo access association with the AP.
  • the first STA initiates a direct connection request to the AP, where the direct connection request is used to request to establish a direct connection between the first STA and the second STA.
  • the first STA After the first STA and the second STA establish a pseudo-access association with the AP, the first STA initiates a direct connection request to the AP, where the direct connection request is used to request to establish between the first STA and the second STA.
  • Direct connection That is, the object indicating the direct connection in the direct connection request sent by the first STA is the second STA.
  • the first STA receives a direct connection response returned by the AP, where the direct connection response is used to notify that the direct connection requested by the first STA has been successfully established.
  • the first STA After the first STA sends the direct connection request, the first STA receives the direct connection response returned by the AP, and the direct connection response is used to notify that the direct connection requested by the first STA has been successfully established.
  • the first STA requests a directly connected transport stream from the AP, to notify the AP of the requirement for the direct communication of the first STA and the second STA to the resource.
  • the first STA After the establishment of the direct connection between the first STA and the second STA, the first STA requests the directly connected transport stream from the AP, and notifies the AP of the demand for the direct communication of the first STA and the second STA.
  • the first STA should initiate the handshake process of the STA to STA Link Master Key (the master key of the direct link) to enable the directly connected parties to obtain the SMK, but due to the pseudo access.
  • the process STA and the AP do not have the authentication security authentication process. Therefore, there is no temporary key between the first STA and the AP.
  • the interaction message is not protected.
  • the SMK cannot be sent to the first STA and the second STA securely. Therefore, the SMK handshake cannot be performed.
  • the SMK-based STK four-step handshake between the first STA and the second STA cannot be performed. Since the AP knows that the first STA and the second STA are pseudo-accessed to the AP, subsequent operations are allowed after they are directly connected without performing the SMK handshake.
  • the first STA and the second STA perform on a direct-connected transport stream allocated by the AP. Direct communication.
  • the first STA After the first STA requests the direct connection transport stream from the AP, the first STA performs direct communication with the second STA on the directly connected transport stream allocated by the AP.
  • the key of the P2P connection can be used for protection.
  • the first STA and the second STA that are connected by the P2P are established.
  • the AP can be pseudo-accessed to the AP, and the direct connection scheduling of the AP is accepted, thereby preventing the P2P user and the AP user from contending for the same channel resource.
  • the conflicts sent at the time improve the channel efficiency in dense scenes.
  • another embodiment of a pseudo access direct scheduling method in an embodiment of the present invention includes:
  • the AP establishes a pseudo-access association with the first STA and the second STA, where the AP supports the pseudo-access, the first STA and the second STA are not legal users of the AP, and the first STA A P2P connection has been established with the second STA;
  • the AP establishes a direct connection between the first STA and the second STA.
  • the AP performs direct connection scheduling on the first STA and the second STA.
  • the first STA and the second STA that are connected by the P2P are established.
  • the AP can be pseudo-accessed to the AP, and the direct connection scheduling of the AP is accepted, thereby preventing the P2P user and the AP user from contending for the same channel resource.
  • the conflicts sent at the time improve the channel efficiency in dense scenes.
  • Another embodiment of the pseudo access scheduling method in the embodiment of the present invention includes:
  • the AP establishes a pseudo-access association with the first STA and the second STA, where the AP supports the pseudo-access, the first STA and the second STA are not legal users of the AP, and the first STA A P2P connection has been established with the second STA;
  • the AP receives a direct connection request initiated by the first STA, where the direct connection request is used to request to establish a direct connection between the first STA and the second STA.
  • the AP establishes a direct connection between the first STA and the second STA according to the direct connection request, and returns a direct connection response to the first STA, where the direct connection response is used for notification.
  • the direct connection requested by the first STA has been successfully established;
  • the AP receives the first STA request for a direct connection transport stream, and obtains the first STA.
  • the AP allocates a direct connection transport stream, where the first STA performs direct communication with the second STA.
  • the first STA and the second STA that are connected by the P2P are established.
  • the AP can be pseudo-accessed to the AP, and the direct connection scheduling of the AP is accepted, thereby preventing the P2P user and the AP user from contending for the same channel resource.
  • the conflicts sent at the time improve the channel efficiency in dense scenes.
  • Another embodiment of the pseudo access scheduling method in the embodiment of the present invention includes:
  • the first STA establishes a P2P connection with the second STA to communicate.
  • the first STA and the second STA negotiate a key of the P2P connection, and the communication between them is protected by the key;
  • the first STA finds that the environment is congested, and the communication effect is poor, so that an AP that supports pseudo access is found.
  • the AP that supports pseudo access here actually supports direct connection scheduling, otherwise the STA pseudo-access to the AP has no meaning;
  • the first STA finds an AP that supports pseudo access, and sends the information to the second STA, which means that the second STA also pseudo-accesses the AP.
  • the second STA may also actively find such an AP by itself, and may notify the first STA that the found AP supporting the pseudo access, and the APs respectively found may not be the same, and therefore may also need to negotiate together. Which AP is connected;
  • the first STA and the AP complete the pseudo access.
  • the first STA requests to establish a direct connection to the AP, and the directly connected object is the second STA;
  • the AP rejects the direct connection request of the first STA.
  • the second STA pseudo-accesses to the AP.
  • the first STA requests the AP to establish a direct connection again, and the directly connected object is the second STA.
  • the AP accepts the direct connection request, and sends a direct connection request to the second STA, indicating that the directly connected object is the first STA.
  • the second STA receives the direct connection request, and returns a direct connection response to the AP.
  • the AP sends a direct connection response to the first STA, indicating that the direct connection is successfully established.
  • the first STA should initiate the SMK handshake process to enable the directly connected parties to obtain the SMK.
  • the STA and the AP do not have the authentication security authentication process, so the first STA and the AP There is no temporary key, the interactive message is not protected, and the SMK cannot be sent to the first STA and the second STA securely. Therefore, the SMK handshake cannot be performed.
  • the SMK-based STK is four steps between the first STA and the second STA. The handshake can't be done either. Since the AP knows that the first STA and the second STA are pseudo-accessed to the AP, they are allowed to perform subsequent operations without directly performing the SMK handshake after being directly connected;
  • the first STA requests the AP to establish a direct transport stream, so that the AP knows the demand for resources of the direct communication.
  • the AP can schedule the first STA and the second STA according to communication requirements, thereby improving channel utilization efficiency in a dense environment.
  • the first STA and the second STA are directly connected to each other and still use the key of the P2P link for protection. Therefore, even if there is no STK handshake, the communication between them is still secure.
  • an embodiment of the STA in the embodiment of the present invention includes:
  • the discovery module 1001 is configured to discover an access point AP that supports pseudo access, where the STA is not a legal user of the AP, and the pseudo access is used to enable a non-legitimate user accessing the AP to send scheduling related management to the AP. Frame and accept the scheduling management of the AP;
  • the first sending module 1002 is configured to send the pseudo access information to the AP, where the pseudo access information is used to enable the AP to determine that the access initiated by the STA is a pseudo access.
  • the first establishing module 1003 is configured to establish a pseudo access association with the AP, so that the STA can send a scheduling related management frame to the AP and accept scheduling management of the AP.
  • the first sending module 1002 sends the pseudo access information to the AP, and the first establishing module 1003 establishes a pseudo access association with the AP, so that the The STAs of the legal users of the AP can be pseudo-accessed to the AP and receive the scheduling management of the AP. Therefore, in a dense scenario, multiple STAs can be prevented from competing with each other under the same spectrum resources, thereby improving communication between STAs. Channel usage efficiency.
  • the discovery module 1001 may include multiple different units to discover the access point AP supporting the pseudo access:
  • the foregoing discovery module 1001 may specifically include:
  • a listening unit configured to listen to a broadcast frame sent by the AP that can be received
  • a determining unit configured to determine, when the first AP supports the pseudo access, in the broadcast frame sent by the first AP that is detected by the listening unit, determining that the first AP is the AP that supports the pseudo access.
  • the foregoing discovery module 1001 may specifically include:
  • a probe sending unit configured to send a probe request frame, where the probe request frame carries information for finding an AP that supports pseudo access;
  • the response receiving unit is configured to receive a probe response frame that is sent by the second AP, where the probe response frame indicates that the second AP is the AP that supports pseudo access.
  • the first sending module 1002 may also implement sending pseudo access information to the AP in a plurality of different manners:
  • the foregoing first sending module 1002 may be configured to send a pseudo access association request message to the AP, where the pseudo association request message is sent.
  • the first receiving module 1101 is configured to establish a pseudo access with the AP, where the STA is configured to send a pseudo access request to the AP.
  • the pseudo access association response message sent by the AP is received, where the pseudo access association response message is a response to the pseudo access association request message, and is used to determine that the AP accepts the pseudo sent by the STA. Access association request.
  • the first sending module 1002 carries the pseudo access message in the pseudo access authentication request message in the 802.11 authentication process, and only needs to perform a small modification on the existing standard to implement the pseudo access. Adding more redundant steps improves the efficiency of pseudo access by STAs and APs.
  • the first sending module 1002 may be configured to send a pseudo access authentication request message to the AP, where the pseudo access authentication is performed.
  • the request message is used to initiate a pseudo access authentication request to the AP, and includes an authentication type parameter indicating the pseudo access information.
  • the STA further includes: a second receiving module 1201, configured to establish with the AP Before receiving the pseudo access association, receiving a pseudo access authentication response message sent by the AP, where the pseudo access authentication response message is a response to the pseudo access authentication request message, and is used to determine the The AP receives the pseudo access authentication request sent by the SAT.
  • the first sending module 1002 carries the pseudo access message in the pseudo access authentication request message in the 802.11 authentication process, and only needs to perform a small modification on the existing standard to implement the pseudo access. Adding more redundant steps improves the efficiency of pseudo access by STAs and APs.
  • an embodiment of an AP in the embodiment of the present invention includes:
  • the third receiving module 1301 is configured to receive the pseudo access information sent by the STA, where the pseudo access information is used to enable the AP to determine that the access initiated by the STA is a pseudo access, and the STA is not the AP.
  • the legal user the AP supports the pseudo access, and the pseudo access is used to enable the non-legitimate user accessing the AP to send the scheduling related management frame to the AP and accept the scheduling management of the AP;
  • the second establishing module 1302 is configured to establish a pseudo access association with the STA, so that the AP can receive the scheduling related management frame sent by the STA and perform scheduling management on the STA.
  • the second establishing module 1302 establishes a pseudo-access association with the STA, so that the STA that is not the legal user of the AP can be pseudo-accessed.
  • the scheduling management of the AP is received. Therefore, in a dense scenario, multiple STAs can be prevented from competing with each other under the same spectrum resource, thereby improving channel usage efficiency of communication between STAs.
  • the third receiving module 1301 before receiving the pseudo access information sent by the STA, the third receiving module 1301 needs to enable the STA to discover the AP first, which can be implemented in multiple manners:
  • the AP further includes:
  • the fourth sending module 1401 is configured to send a broadcast frame before receiving the pseudo access information sent by the STA, where the AP is instructed to support the pseudo access.
  • the foregoing AP further includes:
  • the probe receiving module 1501 is configured to receive a probe request frame sent by the STA, where the probe request frame carries information for finding an AP that supports pseudo access.
  • the response sending module 1502 is configured to send a probe response frame to the STA, where the probe response frame indicates that the AP supports pseudo access.
  • the third receiving module 1301 may implement the pseudo access information sent by the receiving STA in a plurality of different manners:
  • the third receiving module 1301 is specifically configured to receive a pseudo access association request message sent by the STA, where the pseudo association request message is received.
  • the third sending module 1601 is configured to establish a pseudo access association with the STA, where the AP includes a pseudo access association request, and the information indicating the pseudo access information is included in the AP.
  • sending a pseudo access association response message to the STA where the pseudo access association response message is a response to the pseudo access association request message, and is used to determine that the AP accepts the pseudo access sent by the STA. Associate the request.
  • the third receiving module 1301 receives the pseudo access message in the pseudo access authentication request message that is carried in the 802.11 authentication process, and only needs to modify a small number of existing standards to implement pseudo access. More redundant steps need to be added to improve the efficiency of pseudo access by STAs and APs.
  • the third receiving module 1301 is specifically configured to receive a pseudo access authentication request message sent by the STA, where the pseudo access authentication is performed.
  • the request message is used to initiate a pseudo access authentication request to the AP, and includes an authentication type parameter indicating the pseudo access information.
  • the AP further includes: a third sending module 1701, configured to establish with the STA Before the pseudo access association, the pseudo access authentication response message is sent to the STA, and the pseudo access authentication response message is a response to the pseudo access authentication request message, and is used to determine that the AP receives the SAT transmission. Pseudo access authentication request.
  • the third receiving module 1301 receives the pseudo access message in the pseudo access authentication request message that is carried in the 802.11 authentication process, and only needs to modify a small number of existing standards to implement pseudo access. More redundant steps need to be added to improve the efficiency of pseudo access by STAs and APs.
  • an embodiment of a STA used as a first STA in the embodiment of the present invention includes:
  • a third establishing module 1801, configured to establish a P2P connection with the second STA
  • the fourth establishing module 1802 is configured to establish a pseudo-access association with the second STA and the same AP that supports the pseudo-access, where the first STA and the second STA are not legal users of the AP;
  • a fifth establishing module 1803, configured to establish a direct connection with the second STA by using the AP;
  • the scheduling accepting module 1804 is configured to accept the direct connection scheduling of the AP with the second STA.
  • the third establishing module 1801 establishes a P2P connection with the second STA.
  • the fourth establishing module 1802 pseudo-accesses to the AP, and the scheduling accepting module 1804 accepts the direct connection scheduling of the AP, thereby avoiding P2P.
  • the conflicts sent when users and AP users contend for the same channel resources improve channel efficiency in dense scenarios.
  • the fourth establishing module 1802 and the second STA respectively establish a pseudo-access association with the same AP supporting the pseudo-access.
  • the first STA of the AP that supports the pseudo-access can be found. And sending the identifier of the AP to the second STA.
  • the fourth establishing module 1802 specifically includes:
  • the discovery unit 1901 is configured to discover an AP that supports pseudo access.
  • the notification unit 1902 is configured to notify the second STA of the discovered identity of the AP by using the P2P connection;
  • the establishing unit 1903 is configured to establish a pseudo access association with the AP by using the second STA.
  • the foregoing fifth establishing module 1803 may specifically include:
  • the direct connection request initiating unit 1904 is configured to initiate a direct connection request to the AP, where the direct connection request is used to request to establish a direct connection between the first STA and the second STA;
  • the direct connection response receiving unit 1905 is configured to receive a direct connection response returned by the AP, where the direct connection response is used to notify that the direct connection requested by the first STA has been successfully established;
  • the foregoing scheduling accepting module 1804 may specifically include:
  • the transport stream requesting unit 1906 is configured to request the direct connection transport stream from the AP to notify the AP of the requirement of the direct communication of the first STA and the second STA for resources;
  • the communication unit 1907 is configured to perform direct communication with the second STA on the directly connected transport stream allocated by the AP;
  • the foregoing communication unit 1907 is specifically configured to perform direct communication with the second STA on the directly connected transport stream allocated by the AP, and use a key of the P2P connection for protection.
  • the third establishing module 1801 establishes a P2P connection with the second STA.
  • the fourth establishing module 1802 pseudo-accesses to the AP, and the scheduling accepting module 1804 accepts the direct connection scheduling of the AP, thereby avoiding P2P.
  • another embodiment of the AP in the embodiment of the present invention includes:
  • the sixth establishing module 2001 is configured to establish a pseudo-access association with the first STA and the second STA, where the AP supports the pseudo-access, and the first STA and the second STA are not legal users of the AP.
  • a P2P connection has been established between the first STA and the second STA;
  • a seventh establishing module 2002 configured to establish a direct connection between the first STA and the second STA
  • the scheduling module 2003 is configured to perform direct connection scheduling on the first STA and the second STA.
  • the sixth establishing module 2001 establishes a pseudo-access association with the first STA and the second STA that have established the P2P connection.
  • the seventh establishing module 2002 is in the first STA and the second STA.
  • the direct connection is established, so that the first STA and the second STA receive the direct connection scheduling of the AP, which avoids the conflicts that are sent when the P2P user and the AP user contend for the same channel resource, and improves the channel efficiency in the dense scenario.
  • the seventh establishing module 2002 specifically includes:
  • the direct connection request receiving unit 2101 is configured to receive a direct connection request initiated by the first STA, where the direct connection request is used to request to establish a direct connection between the first STA and the second STA;
  • the direct connection request response unit 2102 is configured to establish a direct connection between the first STA and the second STA according to the direct connection request, and return a direct connection response to the first STA, where the direct connection Responding to the direct connection for notifying the first STA that the request has been successfully established;
  • the foregoing scheduling module 2003 specifically includes:
  • the transport stream request receiving unit 2103 is configured to receive the request of the first STA for the direct connection transport stream, and obtain a requirement for the direct communication of the first STA and the second STA to the resource;
  • the transport stream allocating unit 2104 is configured to allocate a direct transport stream for the first STA to perform direct communication with the second STA.
  • the sixth establishing module 2001 establishes a pseudo-access association with the first STA and the second STA that have established the P2P connection.
  • the seventh establishing module 2002 is in the first STA and the second STA.
  • a direct connection is established between the first STA and the second STA to receive the direct connection scheduling of the AP. The conflicts sent by the P2P user and the AP user when contending for the same channel resource are avoided, and the channel efficiency in the dense scenario is improved.
  • FIG. 22 is a structural diagram of a device according to an embodiment of the present invention.
  • the STA or the AP in the embodiment of the present invention may adopt the device structure, and the device 2200 includes:
  • the input device 2201, the output device 2202, the processor 2203, and the memory 2204 (wherein the number of processors 2203 in the device 2200 may be one or more, and one processor 2203 is exemplified in FIG. 22).
  • the input device 2201, the output device 2202, the processor 2203, and the memory 2204 may be connected by a bus or other means, wherein the bus connection is taken as an example in FIG.
  • the processor 2203 is configured to perform the following steps by calling an operation instruction stored in the memory 2204:
  • the access point AP supporting the pseudo access is discovered, and the STA is not a legal user of the AP, and the pseudo access is used to enable the non-legitimate user accessing the AP to send a scheduling related management frame to the AP and accept the scheduling of the AP. management;
  • the processor 2203 when the step of transmitting the pseudo access information to the AP is performed, the processor 2203 specifically performs the following steps:
  • the processor Before performing the step of establishing a pseudo access association with the AP, the processor is further configured to perform the following steps:
  • the pseudo access association response message is a response to the pseudo access association request message, and is used to determine that the AP accepts a pseudo access association sent by the STA request;
  • the processor 2203 when the step of transmitting the pseudo access information to the AP is performed, specifically performs the following steps:
  • the processor Before performing the step of establishing a pseudo access association with the AP, the processor is further configured to perform the following steps:
  • the processor 2203 when performing the step of discovering an access point AP that supports pseudo access, the processor 2203 specifically performs the following steps:
  • the first AP is the AP supporting the pseudo access when the first AP is configured to support the pseudo access in the broadcast frame sent by the first AP;
  • the processor 2203 when performing the step of discovering an access point AP that supports pseudo access, the processor 2203 specifically performs the following steps:
  • the processor 2203 is configured to perform the following steps by calling an operation instruction stored in the memory 2204:
  • the pseudo access information is used to enable the AP to determine that the access initiated by the STA is a pseudo access, the STA is not a legal user of the AP, and the AP supports the pseudo Accessing, the pseudo access is used to enable a non-legitimate user accessing the AP to send a scheduling related management frame to the AP and accept scheduling management of the AP;
  • the processor 2203 when performing the step of receiving the pseudo access information sent by the STA, specifically performs the following steps:
  • the processor 2203 Before performing the step of establishing a pseudo access association with the STA, the processor 2203 further performs the following steps:
  • the pseudo access association response message is a response to the pseudo access association request message, and is used to determine that the AP accepts a pseudo access association request sent by the STA ;
  • the processor 2203 when performing the step of receiving the pseudo access information sent by the STA, specifically performs the following steps:
  • the processor 2203 Before performing the step of establishing a pseudo access association with the STA, the processor 2203 further performs the following steps:
  • the processor 2203 before performing the step of receiving the pseudo access information sent by the STA, the processor 2203 is further configured to perform the following steps:
  • the processor 2203 before performing the step of receiving the pseudo access information sent by the STA, the processor 2203 is further configured to perform the following steps:
  • the processor 2203 is configured to perform the following steps by calling an operation instruction stored in the memory 2204. :
  • the processor 2203 when performing the step of establishing a pseudo-access association with the same AP that supports the pseudo-access, is specifically configured to perform the following steps:
  • the processor 2203 when performing the step of establishing a direct connection with the second STA by using the AP, is specifically configured to perform the following steps:
  • the processor 2203 when performing the step of accepting the direct scheduling of the AP with the second STA, is specifically configured to perform the following steps:
  • the processor 2203 when performing the step of performing direct communication with the second STA on the directly connected transport stream allocated by the AP, is specifically configured to perform the following steps:
  • the processor 2203 is configured to perform the following steps by calling an operation instruction stored in the memory 2204. :
  • the first STA and the second STA are not legal users of the AP, and a P2P connection is established between the first STA and the second STA.
  • the processor 2203 when the step of establishing a direct connection between the first STA and the second STA is performed, the processor 2203 is specifically configured to perform the following steps:
  • the processor 2203 when performing the step of performing direct connection scheduling on the first STA and the second STA, the processor 2203 is specifically configured to perform the following steps:
  • the disclosed system, apparatus, and method may be implemented in other manners.
  • the device embodiments described above are merely illustrative.
  • the division of the unit is only a logical function division.
  • there may be another division manner for example, multiple units or components may be combined or Can be integrated into another system, or some features can be ignored or not executed.
  • the mutual coupling or direct coupling or communication connection shown or discussed may be an indirect coupling or communication connection through some interface, device or unit, and may be in an electrical, mechanical or other form.
  • the units described as separate components may or may not be physically separated, and the components displayed as units may or may not be physical units, that is, may be located in one place, or may be distributed to multiple network units. You can choose some or all of them according to actual needs.
  • the unit is to achieve the purpose of the solution of the embodiment.
  • each functional unit in each embodiment of the present invention may be integrated into one processing unit, or each unit may exist physically separately, or two or more units may be integrated into one unit.
  • the above integrated unit can be implemented in the form of hardware or in the form of a software functional unit.
  • the integrated unit if implemented in the form of a software functional unit and sold or used as a standalone product, may be stored in a computer readable storage medium.
  • the technical solution of the present invention which is essential or contributes to the prior art, or all or part of the technical solution, may be embodied in the form of a software product stored in a storage medium.
  • a number of instructions are included to cause a computer device (which may be a personal computer, server, or network device, etc.) to perform all or part of the steps of the methods described in various embodiments of the present invention.
  • the foregoing storage medium includes: a U disk, a mobile hard disk, a read-only memory (ROM), a random access memory (RAM), a magnetic disk, or an optical disk, and the like. .

Abstract

本发明实施例公开了伪接入方法,伪接入直连调度方法,站点以及接入点,用于提高密集场景下STA之间通信的信道使用效率。本发明实施例方法包括:STA发现支持伪接入的AP后,向该AP发送伪接入信息,与该AP建立伪接入关联,从而使得不是该AP的合法用户的STA能伪接入到AP上,接收该AP的调度管理。

Description

伪接入方法,伪接入直连调度方法,站点以及接入点 技术领域
本发明涉及通信领域,尤其涉及伪接入方法,伪接入直连调度方法,站点以及接入点。
背景技术
直连通信是指两个STA(Station,站点)(例如,用户终端)关联到同一个AP(Access Point,接入点),但他们相互之间通信时报文通过空口直接发送给对方,而不经过AP转发。如图1所示。当STA1通过AP向STA2发送一个消息时,需要两次占用信道,即一次上行再一次下行,而使用直连链路只需占用一次信道。这样能提高无线信道的利用率,同时能提高AP所控制的BSS(Basic Service Set,基本服务集,即一个以AP为中心的无线局域网)的可获得的有效系统吞吐量。
现有标准中,直连链路可以工作在AP的工作信道即基本信道上,也可以工作在与AP不同的信道即非基本信道上。当直连链路工作在基本信道时,AP的直连链路在传输数据时,仍然需要向AP请求信道资源,即当直连链路在传输数据时,AP所控制的BSS(Basic Service Set,基本服务集,即一个以AP为中心的无线局域网)中其它的STA和AP本身不能使用正在被占用的工作信道。当直连链路工作在非基本信道时,直连链路不占用AP工作信道的资源,因此不影响BSS内其它链路的数据传输,但直连链路上的STA就可能与其它BSS竞争信道资源。
随着IEEE802.11技术的发展,AP的工作信道越来越宽,而有限的无线频谱可划分的信道数量越来越少,这样对于AP工作在很宽的无线信道时,STA选择非基本信道作为直连链路的工作信道就变得困难,因此直连链路主要还是要考虑在基本信道内工作。
WiFi网络(即运行IEEE802.11标准的网络)运行于免费无线频谱,主要采用竞争机制,最新制定中的标准IEEE 802.11ax致力于提高WiFi网络的效率,以及进一步提升系统吞吐量,其中在一些密集用户场景中,采用直连技术将显 著提高系统吞吐量,现有标准由直连链路中的STA自己去竞争信道。
同时,在实际应用,通常会出现两个STA直接互连进行通信,而不需要关联到一个AP,例如可以使用IEEE802.11中定义的对等模式(ad hoc)直接连接,或者使用WFA(Wi-Fi Alliance,WiFi联盟)定义的P2P连接模式进行连接等等。WFA定义的P2P模式的商标名是WiFi Direct,它是多个STA互联的一种模式,其中一个STA扮演类似AP的群主(Group Owner)角色,其它STA扮演客户端角色,但最常见的P2P应用情况还是两个STA例如智能手机之间的连接。本发明中将两个STA不通过基础设施AP直接连接的方式统一称为P2P连接,以区别于一个AP下两个STA的直连。
然而,在密集场景下,可能出现许多STA连接到AP进行互联网业务,同时许多STA进行P2P通信,它们可能在相同的频谱资源下相互竞争,导致信道使用效率低下。
发明内容
本发明实施例提供了伪接入方法,伪接入直连调度方法,站点以及接入点,用于提高密集场景下STA之间通信的信道使用效率。
本发明实施例第一方面提供了一种伪接入方法,包括:
站点STA发现支持伪接入的接入点AP,所述STA不是所述AP的合法用户,所述伪接入用于使接入AP的非合法用户能向AP发送调度相关管理帧并接受AP的调度管理;
所述STA向所述AP发送伪接入信息,所述伪接入信息用于使所述AP确定所述STA发起的接入为伪接入;
所述STA与所述AP建立伪接入关联,使得所述STA能向所述AP发送调度相关管理帧并接受所述AP的调度管理。
结合本发明实施例的第一方面,本发明实施例第一方面的第一种实现方式中,所述STA向所述AP发送伪接入信息具体包括:
所述STA向所述AP发送伪接入关联请求消息,所述伪关联请求消息用于向所述AP发起伪接入关联请求,其中包含有表示所述伪接入信息的信息指示;
所述STA与所述AP建立伪接入关联的步骤之前还包括:
所述STA接收所述AP发送的伪接入关联响应消息,所述伪接入关联响应消息为对所述伪接入关联请求消息的响应,用于确定所述AP接受所述STA发出的伪接入关联请求。
结合本发明实施例的第一方面,本发明实施例第一方面的第二种实现方式中,所述STA向所述AP发送伪接入信息具体包括:
所述STA向所述AP发送伪接入认证请求消息,所述伪接入认证请求消息用于向所述AP发起伪接入认证请求,其中包含有表示所述伪接入信息的认证类型参数;
所述STA与所述AP建立伪接入关联的步骤之前还包括:
所述STA接收所述AP发送的伪接入认证响应消息,所述伪接入认证响应消息为对所述伪接入认证请求消息的响应,用于确定所述AP接收所述SAT发送的伪接入认证请求。
结合本发明实施例的第一方面至第一方面的第二种实现方式中任一种实现方式,本发明实施例第一方面的第三种实现方式中,所述STA发现支持伪接入的AP具体包括:
所述STA侦听能接收到的AP发出的广播帧;
若侦听到的第一AP发出的广播帧中指示该第一AP支持伪接入,所述STA确定该第一AP为所述支持伪接入的AP。
结合本发明实施例的第一方面至第一方面的第二种实现方式中任一种实现方式,本发明实施例第一方面的第四种实现方式中,所述STA发现支持伪接入的AP具体包括:
所述STA发送探测请求帧,在所述探测请求帧中携带寻找支持伪接入的AP的信息;
所述STA接收第二AP发送的探测响应帧,所述探测响应帧中指示所述第二AP为所述支持伪接入的AP。
本发明实施例第二方面提供了一种伪接入方法,包括:
AP接收STA发送的伪接入信息,所述伪接入信息用于使所述AP确定所述STA发起的接入为伪接入,所述STA不是所述AP的合法用户,所述AP支持伪接入,所述伪接入用于使接入AP的非合法用户能向AP发送调度相关 管理帧并接受AP的调度管理;
所述AP与所述STA建立伪接入关联,使得所述AP能接收所述STA发送的调度相关管理帧并对所述STA进行调度管理。
结合本发明实施例的第二方面,本发明实施例第二方面的第一种实现方式中,所述AP接收STA发送的伪接入信息具体包括:
所述AP接收所述STA发送的伪接入关联请求消息,所述伪关联请求消息用于向所述AP发起伪接入关联请求,其中包含有表示所述伪接入信息的信息指示;
所述AP与所述STA建立伪接入关联的步骤之前还包括:
所述AP发送伪接入关联响应消息给所述STA,所述伪接入关联响应消息为对所述伪接入关联请求消息的响应,用于确定所述AP接受所述STA发出的伪接入关联请求。
结合本发明实施例的第二方面,本发明实施例第二方面的第二种实现方式中,所述AP接收STA发送的伪接入信息具体包括:
所述AP接收所述STA发送的伪接入认证请求消息,所述伪接入认证请求消息用于向所述AP发起伪接入认证请求,其中包含有表示所述伪接入信息的认证类型参数;
所述AP与所述STA建立伪接入关联的步骤之前还包括:
所述AP发送伪接入认证响应消息给所述STA,所述伪接入认证响应消息为对所述伪接入认证请求消息的响应,用于确定所述AP接收所述SAT发送的伪接入认证请求。
结合本发明实施例的第二方面至第二方面的第二种实现方式中任一种实现方式,本发明实施例第二方面的第三种实现方式中,所述AP接收STA发送的伪接入信息的步骤之前还包括:
所述AP发送广播帧,在该广播帧中指示该AP支持伪接入。
结合本发明实施例的第二方面至第二方面的第二种实现方式中任一种实现方式,本发明实施例第二方面的第四种实现方式中,所述AP接收STA发送的伪接入信息的步骤之前还包括:
所述AP接收所述STA发送的探测请求帧,所述探测请求帧中携带寻找支 持伪接入的AP的信息;
所述AP发送探测响应帧给所述STA,所述探测响应帧中指示所述AP支持伪接入。
本发明实施例第三方面提供了一种伪接入直连调度方法,包括:
第一STA与第二STA建立P2P连接;
所述第一STA和所述第二STA分别与同一个支持伪接入的AP建立伪接入关联,所述第一STA与所述第二STA不是所述AP的合法用户;
所述第一STA通过所述AP与所述第二STA建立直连;
所述第一STA与所述第二STA接受所述AP的直连调度。
结合本发明实施例的第三方面,本发明实施例第三方面的第一种实现方式中,所述第一STA和所述第二STA分别与同一个支持伪接入的AP建立伪接入关联具体包括:
所述第一STA发现支持伪接入的AP;
所述第一STA将发现的所述AP的标识通过所述P2P连接通知所述第二STA;
所述第一STA和所述第二STA均与所述AP建立伪接入关联。
结合本发明实施例的第三方面或第三方面的第一种实现方式,本发明实施例第三方面的第二种实现方式中,所述第一STA通过所述AP与所述第二STA建立直连具体包括:
所述第一STA向所述AP发起直连请求,所述直连请求用于请求在所述第一STA与所述第二STA之间建立直连;
所述第一STA接收所述AP返回的直连响应,所述直连响应用于通知所述第一STA请求的直连已经建立成功。
结合本发明实施例的第三方面,本发明实施例第三方面的第三种实现方式中,所述第一STA与所述第二STA接受所述AP的直连调度具体包括:
所述第一STA向所述AP请求直连传输流,以通知AP所述第一STA与所述第二STA的直连通信对资源的需求;
所述第一STA与所述第二STA在所述AP分配的直连传输流上进行直连通信。
结合本发明实施例第三方面的第三种实现方式,本发明实施例第三方面的第四种实现方式中,所述方法还包括:
所述第一STA与所述第二STA在直连传输流上进行直连通信时,使用P2P连接的密钥进行保护。
本发明实施例第四方面提供了一种伪接入直连调度方法,包括:
AP分别与第一STA和第二STA建立伪接入关联,所述AP支持伪接入,所述第一STA与所述第二STA不是所述AP的合法用户,所述第一STA与所述第二STA之间已建立有P2P连接;
所述AP在所述第一STA与所述第二STA之间建立直连;
所述AP对所述第一STA和所述第二STA进行直连调度。
结合本发明实施例的第四方面,本发明实施例第四方面的第一种实现方式中,所述AP在所述第一STA与所述第二STA之间建立直连具体包括:
所述AP接收所述第一STA发起的直连请求,所述直连请求用于请求在所述第一STA与所述第二STA之间建立直连;
所述AP根据所述直连请求,在所述第一STA与所述第二STA之间建立直连,并返回直连响应给所述第一STA,所述直连响应用于通知所述第一STA请求的直连已经建立成功。
结合本发明实施例的第四方面或第四方面的第一种实现方式,本发明实施例第四方面的第二种实现方式中,所述AP对所述第一STA和所述第二STA进行直连调度具体包括:
所述AP接收所述第一STA对直连传输流的请求,得到所述第一STA与所述第二STA的直连通信对资源的需求;
所述AP分配直连传输流供所述第一STA与所述第二STA进行直连通信。
本发明实施例第五方面提供了一种站点STA,包括:
发现模块,用于发现支持伪接入的接入点AP,所述STA不是所述AP的合法用户,所述伪接入用于使接入AP的非合法用户能向AP发送调度相关管理帧并接受AP的调度管理;
第一发送模块,用于向所述AP发送伪接入信息,所述伪接入信息用于使所述AP确定所述STA发起的接入为伪接入;
第一建立模块,用于与所述AP建立伪接入关联,使得所述STA能向所述AP发送调度相关管理帧并接受所述AP的调度管理。
结合本发明实施例的第五方面,本发明实施例第五方面的第一种实现方式中,所述第一发送模块具体用于,向所述AP发送伪接入关联请求消息,所述伪关联请求消息用于向所述AP发起伪接入关联请求,其中包含有表示所述伪接入信息的信息指示;
所述STA还包括:
第一接收模块,用于在与所述AP建立伪接入关联之前,接收所述AP发送的伪接入关联响应消息,所述伪接入关联响应消息为对所述伪接入关联请求消息的响应,用于确定所述AP接受所述STA发出的伪接入关联请求。
结合本发明实施例的第五方面,本发明实施例第五方面的第二种实现方式中,所述第一发送模块具体用于,向所述AP发送伪接入认证请求消息,所述伪接入认证请求消息用于向所述AP发起伪接入认证请求,其中包含有表示所述伪接入信息的认证类型参数;
所述STA还包括:
第二接收模块,用于在与所述AP建立伪接入关联之前,接收所述AP发送的伪接入认证响应消息,所述伪接入认证响应消息为对所述伪接入认证请求消息的响应,用于确定所述AP接收所述SAT发送的伪接入认证请求。
结合本发明实施例的第五方面至第五方面的第二种实现方式,本发明实施例第五方面的第三种实现方式中,所述发现模块具体包括:
侦听单元,用于侦听能接收到的AP发出的广播帧;
确定单元,用于当所述侦听单元侦听到的第一AP发出的广播帧中指示该第一AP支持伪接入时,确定该第一AP为所述支持伪接入的AP。
结合本发明实施例的第五方面至第五方面的第二种实现方式,本发明实施例第五方面的第四种实现方式中,所述发现模块具体包括:
探测发送单元,用于发送探测请求帧,在所述探测请求帧中携带寻找支持伪接入的AP的信息;
响应接收单元,用于接收第二AP发送的探测响应帧,所述探测响应帧中指示所述第二AP为所述支持伪接入的AP。
本发明实施例第六方面提供了一种接入点AP,包括:
第三接收模块,用于接收STA发送的伪接入信息,所述伪接入信息用于使所述AP确定所述STA发起的接入为伪接入,所述STA不是所述AP的合法用户,所述AP支持伪接入,所述伪接入用于使接入AP的非合法用户能向AP发送调度相关管理帧并接受AP的调度管理;
第二建立模块,用于与所述STA建立伪接入关联,使得所述AP能接收所述STA发送的调度相关管理帧并对所述STA进行调度管理。
结合本发明实施例的第六方面,本发明实施例第六方面的第一种实现方式中,所述第三接收模块具体用于,接收所述STA发送的伪接入关联请求消息,所述伪关联请求消息用于向所述AP发起伪接入关联请求,其中包含有表示所述伪接入信息的信息指示;
所述AP还包括:
第二发送模块,用于在与所述STA建立伪接入关联之前,发送伪接入关联响应消息给所述STA,所述伪接入关联响应消息为对所述伪接入关联请求消息的响应,用于确定所述AP接受所述STA发出的伪接入关联请求。
结合本发明实施例的第六方面,本发明实施例第六方面的第二种实现方式中,所述第三接收模块具体用于,接收所述STA发送的伪接入认证请求消息,所述伪接入认证请求消息用于向所述AP发起伪接入认证请求,其中包含有表示所述伪接入信息的认证类型参数;
所述AP还包括:
第三发送模块,用于在与所述STA建立伪接入关联之前,发送伪接入认证响应消息给所述STA,所述伪接入认证响应消息为对所述伪接入认证请求消息的响应,用于确定所述AP接收所述SAT发送的伪接入认证请求。
结合本发明实施例的第六方面至第六方面的第二种实现方式中任一种实现方式,本发明实施例第六方面的第三种实现方式中,所述AP还包括:
第四发送模块,用于在接收STA发送的伪接入信息之前,发送广播帧,在该广播帧中指示该AP支持伪接入。
结合本发明实施例的第六方面至第六方面的第二种实现方式中任一种实现方式,本发明实施例第六方面的第四种实现方式中,所述AP还包括:
探测接收模块,用于接收所述STA发送的探测请求帧,所述探测请求帧中携带寻找支持伪接入的AP的信息;
响应发送模块,用于发送探测响应帧给所述STA,所述探测响应帧中指示所述AP支持伪接入。
本发明实施例第七方面提供了一种STA,作为第一STA使用,包括:
第三建立模块,用于与第二STA建立P2P连接;
第四建立模块,用于和所述第二STA分别与同一个支持伪接入的AP建立伪接入关联,所述第一STA与所述第二STA不是所述AP的合法用户;
第五建立模块,用于通过所述AP与所述第二STA建立直连;
调度接受模块,用于与所述第二STA接受所述AP的直连调度。
结合本发明实施例的第七方面,本发明实施例第七方面的第一种实现方式中,所述第四建立模块具体包括:
发现单元,用于发现支持伪接入的AP;
通知单元,用于将发现的所述AP的标识通过所述P2P连接通知所述第二STA;
建立单元,用于和所述第二STA均与所述AP建立伪接入关联。
结合本发明实施例的第七方面或第七方面的第一种实现方式,本发明实施例第七方面的第二种实现方式中,所述第五建立模块具体包括:
直连请求发起单元,用于向所述AP发起直连请求,所述直连请求用于请求在所述第一STA与所述第二STA之间建立直连;
直连响应接收单元,用于接收所述AP返回的直连响应,所述直连响应用于通知所述第一STA请求的直连已经建立成功。
结合本发明实施例的第七方面,本发明实施例第七方面的第三种实现方式中,所述调度接受模块具体包括:
传输流请求单元,用于向所述AP请求直连传输流,以通知AP所述第一STA与所述第二STA的直连通信对资源的需求;
通信单元,用于与所述第二STA在所述AP分配的直连传输流上进行直连通信。
结合本发明实施例第七方面的第三种实现方式,本发明实施例第七方面的 第四种实现方式中,所述通信单元具体用于,与所述第二STA在所述AP分配的直连传输流上进行直连通信,并使用P2P连接的密钥进行保护。
本发明实施例第八方面提供了一种AP,包括:
第六建立模块,用于分别与第一STA和第二STA建立伪接入关联,所述AP支持伪接入,所述第一STA与所述第二STA不是所述AP的合法用户,所述第一STA与所述第二STA之间已建立有P2P连接;
第七建立模块,用于在所述第一STA与所述第二STA之间建立直连;
调度模块,用于对所述第一STA和所述第二STA进行直连调度。
结合本发明实施例的第八方面,本发明实施例第八方面的第一种实现方式中,所述第七建立模块具体包括:
直连请求接收单元,用于接收所述第一STA发起的直连请求,所述直连请求用于请求在所述第一STA与所述第二STA之间建立直连;
直连请求响应单元,用于根据所述直连请求,在所述第一STA与所述第二STA之间建立直连,并返回直连响应给所述第一STA,所述直连响应用于通知所述第一STA请求的直连已经建立成功。
结合本发明实施例的第八方面或第八方面的第一种实现方式,本发明实施例第八方面的第二种实现方式中,所述调度模块具体包括:
传输流请求接收单元,用于接收所述第一STA对直连传输流的请求,得到所述第一STA与所述第二STA的直连通信对资源的需求;
传输流分配单元,用于分配直连传输流供所述第一STA与所述第二STA进行直连通信。
本发明实施例第九方面提供了一种STA,包括:
输入装置、输出装置、处理器和存储器;
通过调用所述存储器存储的操作指令,所述处理器用于执行如下步骤:
发现支持伪接入的接入点AP,所述STA不是所述AP的合法用户,所述伪接入用于使接入AP的非合法用户能向AP发送调度相关管理帧并接受AP的调度管理;
向所述AP发送伪接入信息,所述伪接入信息用于使所述AP确定所述STA发起的接入为伪接入;
与所述AP建立伪接入关联,使得所述STA能向所述AP发送调度相关管理帧并接受所述AP的调度管理。
结合本发明实施例的第九方面,本发明实施例第九方面的第一种实现方式中,当执行所述向所述AP发送伪接入信息的步骤时,所述处理器具体执行如下步骤:
向所述AP发送伪接入关联请求消息,所述伪关联请求消息用于向所述AP发起伪接入关联请求,其中包含有表示所述伪接入信息的信息指示;
在执行所述与所述AP建立伪接入关联的步骤之前,所述处理器还用于执行如下步骤:
接收所述AP发送的伪接入关联响应消息,所述伪接入关联响应消息为对所述伪接入关联请求消息的响应,用于确定所述AP接受所述STA发出的伪接入关联请求。
结合本发明实施例的第九方面,本发明实施例第九方面的第二种实现方式中,当执行所述向所述AP发送伪接入信息的步骤时,所述处理器具体执行如下步骤:
向所述AP发送伪接入认证请求消息,所述伪接入认证请求消息用于向所述AP发起伪接入认证请求,其中包含有表示所述伪接入信息的认证类型参数;
在执行所述与所述AP建立伪接入关联的步骤之前,所述处理器还用于执行如下步骤:
接收所述AP发送的伪接入认证响应消息,所述伪接入认证响应消息为对所述伪接入认证请求消息的响应,用于确定所述AP接收所述SAT发送的伪接入认证请求。
结合本发明实施例的第九方面至第九方面的第二种实现方式中任一种实现方式,本发明实施例第九方面的第三种实现方式中,当执行所述发现支持伪接入的接入点AP的步骤时,所述处理器具体执行如下步骤:
侦听能接收到的AP发出的广播帧;
当侦听到的第一AP发出的广播帧中指示该第一AP支持伪接入时,确定该第一AP为所述支持伪接入的AP。
结合本发明实施例的第九方面至第九方面的第二种实现方式中任一种实 现方式,本发明实施例第九方面的第四种实现方式中,当执行所述发现支持伪接入的接入点AP的步骤时,所述处理器具体执行如下步骤:
发送探测请求帧,在所述探测请求帧中携带寻找支持伪接入的AP的信息;
接收第二AP发送的探测响应帧,所述探测响应帧中指示所述第二AP为所述支持伪接入的AP。
本发明实施例第十方面提供了一种AP,包括:
输入装置、输出装置、处理器和存储器;
通过调用所述存储器存储的操作指令,所述处理器用于执行如下步骤:
接收STA发送的伪接入信息,所述伪接入信息用于使所述AP确定所述STA发起的接入为伪接入,所述STA不是所述AP的合法用户,所述AP支持伪接入,所述伪接入用于使接入AP的非合法用户能向AP发送调度相关管理帧并接受AP的调度管理;
与所述STA建立伪接入关联,使得所述AP能接收所述STA发送的调度相关管理帧并对所述STA进行调度管理。
结合本发明实施例的第十方面,本发明实施例第十方面的第一种实现方式中,当执行所述接收STA发送的伪接入信息的步骤时,所述处理器具体执行如下步骤:
接收所述STA发送的伪接入关联请求消息,所述伪关联请求消息用于向所述AP发起伪接入关联请求,其中包含有表示所述伪接入信息的信息指示;
在执行所述与所述STA建立伪接入关联的步骤之前,所述处理器还执行如下步骤:
发送伪接入关联响应消息给所述STA,所述伪接入关联响应消息为对所述伪接入关联请求消息的响应,用于确定所述AP接受所述STA发出的伪接入关联请求。
结合本发明实施例的第十方面,本发明实施例第十方面的第二种实现方式中,当执行所述接收STA发送的伪接入信息的步骤时,所述处理器具体执行如下步骤:
接收所述STA发送的伪接入认证请求消息,所述伪接入认证请求消息用于向所述AP发起伪接入认证请求,其中包含有表示所述伪接入信息的认证类 型参数;
在执行所述与所述STA建立伪接入关联的步骤之前,所述处理器还执行如下步骤:
发送伪接入认证响应消息给所述STA,所述伪接入认证响应消息为对所述伪接入认证请求消息的响应,用于确定所述AP接收所述SAT发送的伪接入认证请求。
结合本发明实施例的第十方面至第十方面的第三种实现方式中任一种实现方式,本发明实施例第十方面的第四种实现方式中,在执行所述接收STA发送的伪接入信息的步骤之前,所述处理器还用于执行如下步骤:
发送广播帧,在该广播帧中指示该AP支持伪接入。
结合本发明实施例的第十方面至第十方面的第三种实现方式中任一种实现方式,本发明实施例第十方面的第五种实现方式中,在执行所述接收STA发送的伪接入信息的步骤之前,所述处理器还用于执行如下步骤:
接收所述STA发送的探测请求帧,所述探测请求帧中携带寻找支持伪接入的AP的信息;
发送探测响应帧给所述STA,所述探测响应帧中指示所述AP支持伪接入。
本发明实施例第十一方面提供了一种STA,作为第一STA使用,包括:
输入装置、输出装置、处理器和存储器;
通过调用所述存储器存储的操作指令,所述处理器用于执行如下步骤:
与第二STA建立P2P连接;
和所述第二STA分别与同一个支持伪接入的AP建立伪接入关联,所述第一STA与所述第二STA不是所述AP的合法用户;
通过所述AP与所述第二STA建立直连;
与所述第二STA接受所述AP的直连调度。
结合本发明实施例的第十一方面,本发明实施例第十一方面的第一种实现方式中,当执行所述和所述第二STA分别与同一个支持伪接入的AP建立伪接入关联的步骤时,所述处理器具体用于执行如下步骤:
发现支持伪接入的AP;
将发现的所述AP的标识通过所述P2P连接通知所述第二STA;
和所述第二STA均与所述AP建立伪接入关联。
结合本发明实施例的第十一方面或第十一方面的第一种实现方式,本发明实施例第十一方面的第二种实现方式中,当执行所述通过所述AP与所述第二STA建立直连的步骤时,所述处理器具体用于执行如下步骤:
向所述AP发起直连请求,所述直连请求用于请求在所述第一STA与所述第二STA之间建立直连;
接收所述AP返回的直连响应,所述直连响应用于通知所述第一STA请求的直连已经建立成功。
结合本发明实施例的第十一方面,本发明实施例第十一方面的第三种实现方式中,当执行所述与所述第二STA接受所述AP的直连调度的步骤时,所述处理器具体用于执行如下步骤:
向所述AP请求直连传输流,以通知AP所述第一STA与所述第二STA的直连通信对资源的需求;
与所述第二STA在所述AP分配的直连传输流上进行直连通信。
结合本发明实施例的第十一方面的第三种实现方式,本发明实施例第十一方面的第四种实现方式中,当执行所述与所述第二STA在所述AP分配的直连传输流上进行直连通信的步骤时,所述处理器具体用于执行如下步骤:
与所述第二STA在所述AP分配的直连传输流上进行直连通信,并使用P2P连接的密钥进行保护。
本发明实施例第十二方面提供了一种AP,包括:
输入装置、输出装置、处理器和存储器;
通过调用所述存储器存储的操作指令,所述处理器用于执行如下步骤:
分别与第一STA和第二STA建立伪接入关联,所述AP支持伪接入,所述第一STA与所述第二STA不是所述AP的合法用户,所述第一STA与所述第二STA之间已建立有P2P连接;
在所述第一STA与所述第二STA之间建立直连;
对所述第一STA和所述第二STA进行直连调度。
结合本发明实施例的第十二方面,本发明实施例第十二方面的第一种实现方式中,当执行所述在所述第一STA与所述第二STA之间建立直连的步骤时, 所述处理器具体用于执行如下步骤:
接收所述第一STA发起的直连请求,所述直连请求用于请求在所述第一STA与所述第二STA之间建立直连;
根据所述直连请求,在所述第一STA与所述第二STA之间建立直连,并返回直连响应给所述第一STA,所述直连响应用于通知所述第一STA请求的直连已经建立成功。
结合本发明实施例的第十二方面或第十二方面的第一种实现方式,本发明实施例第十二方面的第二种实现方式中,当执行所述对所述第一STA和所述第二STA进行直连调度的步骤时,所述处理器具体用于执行如下步骤:
接收所述第一STA对直连传输流的请求,得到所述第一STA与所述第二STA的直连通信对资源的需求;
分配直连传输流供所述第一STA与所述第二STA进行直连通信。
从以上技术方案可以看出,本发明实施例具有以下优点:本发明实施例中,STA发现支持伪接入的AP后,向该AP发送伪接入信息,与该AP建立伪接入关联,从而使得不是该AP的合法用户的STA能伪接入到AP上,接收该AP的调度管理,因此在密集场景下,可以避免多个STA之间在相同频谱资源下的相互竞争,从而提高STA之间通信的信道使用效率。
附图说明
图1为本发明实施例中伪接入方法一个流程示意图;
图2为本发明实施例中伪接入方法另一个流程示意图;
图3为本发明实施例中伪接入方法另一个流程示意图;
图4为本发明实施例中伪接入方法另一个流程示意图;
图5为本发明实施例中伪接入直连调度方法一个流程示意图;
图6为本发明实施例中伪接入直连调度方法另一个流程示意图;
图7为本发明实施例中伪接入直连调度方法另一个流程示意图;
图8为本发明实施例中伪接入直连调度方法另一个流程示意图;
图9为本发明实施例中伪接入直连调度方法另一个流程示意图;
图10为本发明实施例中站点一个结构示意图;
图11为本发明实施例中站点另一个结构示意图;
图12为本发明实施例中站点另一个结构示意图;
图13为本发明实施例中接入点一个结构示意图;
图14为本发明实施例中接入点另一个结构示意图;
图15为本发明实施例中接入点另一个结构示意图;
图16为本发明实施例中接入点另一个结构示意图;
图17为本发明实施例中接入点另一个结构示意图;
图18为本发明实施例中站点另一个结构示意图;
图19为本发明实施例中站点另一个结构示意图;
图20为本发明实施例中接入点另一个结构示意图;
图21为本发明实施例中接入点另一个结构示意图;
图22为本发明实施例中设备一个结构示意图。
具体实施方式
下面将结合本发明实施例中的附图,对本发明实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例仅仅是本发明一部分实施例,而不是全部的实施例。基于本发明中的实施例,本领域技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都属于本发明保护的范围。
应当理解,尽管在本发明实施例中可能采用术语第一、第二等来描述各个STA或AP,但STA或AP不应限于这些术语。这些术语仅用来将STA或AP彼此区分开。例如,在不脱离本发明实施例范围的情况下,第一STA也可以被称为第二STA,类似地,第二STA也可以被称为第一STA;同样的,第二AP也可以被称为第三AP等等,本发明实施例对此不做限制。
下面分别以STA和AP作为执行主体,对本发明实施例中的伪接入方法进行描述:
一、以STA作为执行主体。
请参阅图1,本发明实施例中伪接入方法一个实施例包括:
101、STA发现支持伪接入的AP;
STA可以发现支持伪接入的AP,该STA不是该AP的合法用户,该伪接 入用于使接入AP的非合法用户能向该AP发送调度相关管理帧并接受AP的调度管理。
需要说明的是,调度相关管理帧具体可以包括:
用于创建直连链路的管理帧,即DLS Request、DLS Response等;
用于创建或修改传输流的管理帧,即ADDTS等;
用于请求传输资源的管理帧等等。
可以理解的是,STA发现支持伪接入的AP的方式可以有多种:
可选的,STA可以侦听能接收到的AP发出的广播帧,若侦听到的第一AP发出的广播帧中指示该第一AP支持伪接入,则该STA确定该第一AP位支持伪接入的AP。具体的,AP可以在其广播的信标消息中携带一个指示信息表示其支持伪接入;
可选的,STA可以发送探测请求帧,在该探测请求帧中携带寻找支持伪接入的AP的信息,然后该STA接收第二AP发送的探测响应帧,该探测响应帧中指示该第二AP为支持伪接入的AP。具体的,当运行于IEEE802.11标准的网络下时,该探测请求消息可以是802.11中定义的Probe Request帧,该探测响应消息可以是802.11中定义的Probe Response帧。
102、所述STA向所述AP发送伪接入信息,所述伪接入信息用于使所述AP确定所述STA发起的接入为伪接入;
STA发现支持伪接入的AP后,想该AP发送伪接入信息,该伪接入信息用于使该AP确定该STA发起的接入为伪接入。
103、所述STA与所述AP建立伪接入关联,使得所述STA能向所述AP发送调度相关管理帧并接受所述AP的调度管理。
该STA向该AP发送伪接入信息后,与该AP建立伪接入关联,使得该STA能向该AP发送调度相关管理帧并接受该AP的调度管理。
本发明实施例中,STA发现支持伪接入的AP后,向该AP发送伪接入信息,与该AP建立伪接入关联,从而使得不是该AP的合法用户的STA能伪接入到AP上,接收该AP的调度管理,因此在密集场景下,可以避免多个STA之间在相同频谱资源下的相互竞争,从而提高STA之间通信的信道使用效率。
二、以AP作为执行主体。
请参阅图2,本发明实施例中伪接入方法另一个实施例包括:
201、AP接收STA发送的伪接入信息;
支持伪接入的AP可以接收STA发送的伪接入信息,该伪接入信息用于使该AP确定该STA发起的接入为伪接入,该STA不是该AP的合法用户,该伪接入用于使接入AP的非合法用户能向AP发送调度相关管理帧并接受AP的调度管理。
可以理解的是,AP接收STA发送的伪接入信息的步骤之前,需要使STA先发现该AP支持伪接入,其可以有多种方式:
可选的,AP可以发送广播帧,并在该广播帧中指示该AP支持伪接入;
可选的,AP可以接收该STA发送的探测请求帧,该探测请求帧中携带寻找支持伪接入的AP的信息,然后该AP发送探测响应帧该给STA,该探测响应帧中指示该AP支持伪接入。
202、所述AP与所述STA建立伪接入关联,使得所述AP能接收所述STA发送的调度相关管理帧并对所述STA进行调度管理。
该AP接收到STA发送的伪接入信息后,与该STA建立伪接入关联,使得该AP能接收该STA发送的调度相关管理帧并对所述STA进行调度管理。
本发明实施例中,AP接收STA发送的伪接入信息后,与该STA建立伪接入关联,从而使得不是该AP的合法用户的STA能伪接入到AP上,接收该AP的调度管理,因此在密集场景下,可以避免多个STA之间在相同频谱资源下的相互竞争,从而提高STA之间通信的信道使用效率。
上面实施例中,STA向所述AP发送伪接入信息,在实际应用中,该伪接入信息可以在STA与AP进行通信的不同阶段发送给该AP,从而指示进行伪接入。下面分别从在不同的阶段发送伪接入信息,以STA与AP的交互对本发明实施例中的伪接入方法进行描述:
1、在802.11认证过程中指示进行伪接入:
请参阅图3,本发明实施例中伪接入方法另一个实施例包括:
301、STA发现支持伪接入的AP;
与步骤101类似,此处不作赘述。
302、所述STA向所述AP发送伪接入认证请求消息;
该STA发现支持伪接入的AP后,向该AP发送伪接入认证请求消息,该伪接入认证请求消息用于向该AP发起伪接入认证请求,其中包含有表示该伪接入信息的认证类型参数;
具体的,可以是在802.11认证消息中指示是伪接入认证。现有802.11标准中,802.11认证消息中带有一个认证类型参数来指示进行哪一种类型的认证,当认证类型参数取值为0时表示开放系统认证(Open System)、取值为1时表示共享密钥认证(Shared Key,即STA和AP两边预设一个共同的密钥)、取值为2时表示快速迁移认证(Fast Transition,即STA从一个AP快速切换到另一个AP)、取值为3时表示对等同步认证(用于mesh网络中两个邻节点之间的对等认证),本步骤中可以在这个基础上给认证类型参数增加一个定义,例如取值为4时表示伪接入认证。当然也可以定义一个新的帧来执行伪接入802.11认证,此处不作限定。
303、所述AP接收所述STA发送的伪接入认证请求消息;
STA向该AP发送伪接入认证请求消息后,该AP接收该STA发送的伪接入认证请求消息,该伪接入认证请求消息用于向该AP发起伪接入认证请求,其中包含有表示该伪接入信息的认证类型参数。
304、所述AP发送伪接入认证响应消息给所述STA。
AP接收到STA发送的伪接入认证请求消息后,若是同意此伪接入认证请求,则AP可以发送伪接入认证响应消息给该STA,该伪接入认证响应消息为对所述伪接入认证请求消息的响应,用于确定该AP接收该SAT发送的伪接入认证请求。
305、所述STA接收所述AP发送的伪接入认证响应消息。
AP向STA发送伪接入认证响应后,STA接收该AP发送的伪接入认证响应消息,该伪接入认证响应消息为对该伪接入认证请求消息的响应,用于确定该AP接收该SAT发送的伪接入认证请求。
306、所述STA向所述AP发送关联请求消息;
307、所述AP接收所述STA发送的关联请求消息;
308、所述AP向所述STA发送关联响应消息;
309、所述STA接收所述AP发送的关联响应消息;
在该关联响应消息中,可以携带有AP分配给该STA的关联标识。
需要说明的是,步骤306与步骤309与现有标准中的实现类似,只是此时AP能确定在步骤303至305中做的802.11认证是伪接入认证,因此此时在步骤307与308中进行802.11关联之后实际上完成的是伪接入。
310、所述STA与所述AP建立伪接入关联,使得所述STA能向所述AP发送调度相关管理帧并接受所述AP的调度管理。
AP向该STA发送关联响应消息,而STA接收到关联响应消息后,则已满足进行伪接入关联的全部条件,此时STA与该AP建立伪接入关联,使得该STA能向该AP发送调度相关管理帧并接受该AP的调度管理。
本发明实施例中,将伪接入消息携带在802.11认证过程中的伪接入认证请求消息中,仅需要对现有标准进行少量的修改即可实现伪接入,不需要加入更多的多余的步骤,提高了STA与AP进行伪接入的效率。
可以理解的是,图3所对应实施例中,步骤301、302、305、306、309、310是以STA作为执行主体来实现该伪接入方法的步骤。步骤304、304、307、308、310是以AP作为执行主体来实现该伪接入方法的步骤。
2、在802.11关联过程中指示进行伪接入:
请参阅图4,本发明实施例中伪接入方法另一个实施例包括:
401、STA发现支持伪接入的AP;
与步骤101类似,此处不作赘述。
402、所述STA向所述AP发送认证请求消息;
403、所述AP接收所述STA发送的认证请求消息;
404、所述AP发送认证响应消息给所述STA;
405、所述STA接收所述AP发送的认证响应消息;
需要说明的是,步骤402与步骤405与现有标准中的实现类似。具体的,可以不对现有802.11标准中的认证Authentication帧作任何修改。
406、所述STA向所述AP发送伪接入关联请求消息;
该STA接受高AP发送的认证响应消息后,可以向该AP发送伪接入关联消息,该伪关联请求消息用于向该AP发起伪接入关联请求,其中包含有表示伪接入信息的信息指示。
具体的,可以采用802.11中定义的关联请求Association Request帧,其中增加一个信息指示这是一个伪接入关联请求。具体的指示方式可以是增加一个信息元素,这个信息元素的存在就表示STA是请求伪接入关联。关于信息元素可以参考802.11标准文本,这里不作详细介绍,并且增加伪接入指示信息的方式并不限于使用信息元素方式;也可以另定义一个新的帧来作为伪接入关联请求,此处不作限定。
407、所述AP接收所述STA发送的伪接入关联请求消息;
STA向AP发送伪接入关联请求消息后,AP接收该STA发送的伪接入关联请求消息,该伪关联请求消息用于向所述AP发起伪接入关联请求,其中包含有表示伪接入信息的信息指示。
408、所述AP发送伪接入关联响应消息给所述STA;
AP接收到STA发送的伪接入关联请求消息后,若同意此伪接入关联请求,则向STA发送伪接入关联响应消息,该伪接入关联响应消息为对该伪接入关联请求消息的响应,用于确定该AP接受该STA发出的伪接入关联请求。
409、所述STA接收所述AP发送的伪接入关联响应消息;
AP发送伪接入关联响应消息给STA后,该STA接收该AP发送的伪接入关联响应消息,该伪接入关联响应消息为对该伪接入关联请求消息的响应,用于确定该AP接受该STA发出的伪接入关联请求。
410、所述STA与所述AP建立伪接入关联,使得所述STA能向所述AP发送调度相关管理帧并接受所述AP的调度管理。
与步骤310类似,此处不作赘述。
本发明实施例中,将伪接入消息携带在802.11关联过程中的伪接入关联请求消息中,仅需要对现有标准进行少量的修改即可实现伪接入,不需要加入更多的多余的步骤,提高了STA与AP进行伪接入的效率。
可以理解的是,图4所对应实施例中,步骤401、402、405、406、409、410是以STA作为执行主体来实现该伪接入方法的步骤。步骤404、404、407、408、410是以AP作为执行主体来实现该伪接入方法的步骤。
下面对本发明实施例中伪接入直连调度方法进行描述:
一、以第一STA作为执行主体:
请参阅图5,本发明实施例中伪接入直连调度方法一个实施例包括:
501、第一STA与第二STA建立P2P连接;
第一STA与第二STA建立P2P连接进行通信。P2P连接的建立过程这里不作详细描述。P2P连接建立过程中第一STA和第二STA会协商出P2P连接的密钥,它们之间的通信受这个密钥保护。
502、所述第一STA和所述第二STA分别与同一个支持伪接入的AP建立伪接入关联,所述第一STA与所述第二STA不是所述AP的合法用户;
当通信环境拥挤时,该第一STA和第二STA分别与同一个支持伪接入的AP建立伪接入关联,该第一STA与该第二STA不是所述AP的合法用户;可以理解的是,该AP支持伪接入,且该AP也支持直连调度。具体的建立伪接入关联的步骤可以参阅本发明实施例中伪接入方法,此处不作赘述。
503、所述第一STA通过所述AP与所述第二STA建立直连;
该第一STA与该第二STA伪接入到同一个AP后,该第一STA通过该AP与该第二STA建立直连。
504、所述第一STA与所述第二STA接受所述AP的直连调度。
该第一STA与第二STA通过该AP建立直连后,接受该AP的直连调度。
本发明实施例中,建立了P2P连接的第一STA与第二STA,在密集场景时,可以伪接入到AP,接受AP的直连调度,避免了P2P用户和AP用户争用相同信道资源时发送的冲突,提高了密集场景下的信道效率。
下面对本发明实施例中伪接入直连调度方法进行详细描述,请参阅图6,本发明实施例中伪接入直连调度方法另一个实施例包括:
601、第一STA与第二STA建立P2P连接;
与步骤501类似,此处不作赘述。
602、所述第一STA发现伪接入的AP;
第一STA发现环境拥挤,通信效果差,于是查找一个支持伪接入的AP。查找AP的过程可以参考本发明实施例中伪接入方法,此处不作赘述。当然,这里说的支持伪接入的AP实际上也支持直连调度。
603、所述第一STA将发现的所述AP的标识通过所述P2P连接通知所述第二STA;
第一STA找到了支持伪接入的AP,该AP的标识通过P2P连接通知第二STA,使第二STA也伪接入到该AP。具体来说,第二STA也可能自己主动去找这样的AP,并且可能将找到的支持伪接入的AP告诉第一STA,它们分别找到的AP可能不是同一个,因此还需要协商一起向哪一个AP接入,此处不作限定。
604、所述第一STA与所述第二STA均与所述AP建立伪接入关联;
第二STA得到第一STA发现的支持伪接入的AP后,该第一STA与该第二STA均与该AP建立伪接入关联。
605、所述第一STA向所述AP发起直连请求,所述直连请求用于请求在所述第一STA与所述第二STA之间建立直连;
第一STA和第二STA均与该AP建立伪接入关联后,该第一STA向该AP发起直连请求,该直连请求用于请求在该第一STA与该第二STA之间建立直连。即该第一STA发出的直连请求中指示直连的对象为第二STA。
606、所述第一STA接收所述AP返回的直连响应,所述直连响应用于通知所述第一STA请求的直连已经建立成功;
第一STA发出直连请求后,该第一STA接收AP返回的直连响应,该直连响应用于通知该第一STA请求的直连已经建立成功。
607、所述第一STA向所述AP请求直连传输流,以通知AP所述第一STA与所述第二STA的直连通信对资源的需求;
第一STA与第二STA之间的建立直连后,该第一STA向该AP请求直连传输流,通知AP该第一STA与该第二STA的直连通信对资源的需求。
现有标准中,直连建立成功后,第一STA本应发起SMK(STA to STA link Master Key,直连链路的主密钥)握手过程以使直连双方获得SMK,但由于伪接入过程STA和AP没有认证的安全认证过程,因此第一STA和AP之间没有临时密钥,交互消息不受保护,SMK不能安全地发送给第一STA和第二STA,因此SMK握手不能进行,进而,第一STA和第二STA之间基于SMK的STK四步握手也不能进行。由于AP知道第一STA和第二STA是伪接入到AP的,因此允许它们直连后不进行SMK握手就可以进行后续的操作。
608、所述第一STA与所述第二STA在所述AP分配的直连传输流上进行 直连通信。
第一STA向该AP请求直连传输流后,该第一STA与该第二STA在该AP分配的直连传输流上进行直连通信。
可以理解的是,该第一STA与该第二STA在直连传输流上进行直连通信时,可以使用P2P连接的密钥进行保护。
本发明实施例中,建立了P2P连接的第一STA与第二STA,在密集场景时,可以伪接入到AP,接受AP的直连调度,避免了P2P用户和AP用户争用相同信道资源时发送的冲突,提高了密集场景下的信道效率。
二、以AP作为执行主体:
请参阅图7,本发明实施例中伪接入直连调度方法另一个实施例包括:
701、AP分别与第一STA和第二STA建立伪接入关联,所述AP支持伪接入,所述第一STA与所述第二STA不是所述AP的合法用户,所述第一STA与所述第二STA之间已建立有P2P连接;
702、所述AP在所述第一STA与所述第二STA之间建立直连;
703、所述AP对所述第一STA和所述第二STA进行直连调度。
本发明实施例中,建立了P2P连接的第一STA与第二STA,在密集场景时,可以伪接入到AP,接受AP的直连调度,避免了P2P用户和AP用户争用相同信道资源时发送的冲突,提高了密集场景下的信道效率。
下面对本发明实施例中的伪接入直连调度方法进行具体描述,请参阅图8,本发明实施例中伪接入调度方法另一个实施例包括:
801、AP分别与第一STA和第二STA建立伪接入关联,所述AP支持伪接入,所述第一STA与所述第二STA不是所述AP的合法用户,所述第一STA与所述第二STA之间已建立有P2P连接;
802、所述AP接收所述第一STA发起的直连请求,所述直连请求用于请求在所述第一STA与所述第二STA之间建立直连;
803、所述AP根据所述直连请求,在所述第一STA与所述第二STA之间建立直连,并返回直连响应给所述第一STA,所述直连响应用于通知所述第一STA请求的直连已经建立成功;
804、所述AP接收所述第一STA对直连传输流的请求,得到所述第一STA 与所述第二STA的直连通信对资源的需求;
805、所述AP分配直连传输流供所述第一STA与所述第二STA进行直连通信。
本发明实施例中,建立了P2P连接的第一STA与第二STA,在密集场景时,可以伪接入到AP,接受AP的直连调度,避免了P2P用户和AP用户争用相同信道资源时发送的冲突,提高了密集场景下的信道效率。
下面以第一STA,第二STA和AP之间的交互,对本发明实施例中伪接入调度方法进行描述,请参阅图9,本发明实施例中伪接入调度方法另一个实施例包括:
901、第一STA与第二STA建立P2P连接进行通信。P2P连接建立过程中第一STA和第二STA会协商出P2P连接的密钥,它们之间的通信受这个密钥保护;
902、第一STA发现环境拥挤,通信效果差,于是查找一个支持伪接入的AP。当然,这里说的支持伪接入的AP实际上也支持直连调度,否则STA伪接入到AP就没有意义了;
903、第一STA找到了支持伪接入的AP,将此信息告诉第二STA,意思是请第二STA也伪接入到该AP。具体来说,第二STA也可能自己主动去找这样的AP,并且可能将找到的支持伪接入的AP告诉第一STA,它们分别找到的AP可能不是同一个,因此可能还需要协商一起向哪一个AP接入;
904、第一STA与AP完成伪接入;
905、第一STA向AP请求建立直连,直连的对象是第二STA;
906、如果第二STA此时还没有接入到AP,则AP拒绝第一STA的直连请求;
907、第二STA向AP伪接入;
908、第一STA稍后再次向AP请求建立直连,直连的对象是第二STA;
909、AP接受直连请求,向第二STA发送直连请求,指示直连对象是第一STA;
910、第二STA接受直连请求,向AP返回直连响应;
911、AP向第一STA发送直连响应,指示直连建立成功;
现有标准中,直连建立成功后,第一STA本应发起SMK握手过程以使直连双方获得SMK,但由于伪接入过程STA和AP没有认证的安全认证过程,因此第一STA和AP之间没有临时密钥,交互消息不受保护,SMK不能安全地发送给第一STA和第二STA,因此SMK握手不能进行,进而,第一STA和第二STA之间基于SMK的STK四步握手也不能进行。由于AP知道第一STA和第二STA是伪接入到AP的,因此允许它们直连后不进行SMK握手就可以进行后续的操作;
912、第一STA向AP请求建立直连传输流,以便AP知道它们的直连通信对资源的需求;
913、AP就可以根据第一STA和第二STA的通信需求对它们进行调度,由此提高了密集环境下的信道利用效率;
914、第一STA和第二STA直连通信,仍然使用P2P链路的密钥进行保护,因此,即使没有STK握手,它们之间的通信仍然是安全的。
下面对本发明实施例中用于伪接入的STA进行描述:
请参阅图10,本发明实施例中STA一个实施例包括:
发现模块1001,用于发现支持伪接入的接入点AP,所述STA不是所述AP的合法用户,所述伪接入用于使接入AP的非合法用户能向AP发送调度相关管理帧并接受AP的调度管理;
第一发送模块1002,用于向所述AP发送伪接入信息,所述伪接入信息用于使所述AP确定所述STA发起的接入为伪接入;
第一建立模块1003,用于与所述AP建立伪接入关联,使得所述STA能向所述AP发送调度相关管理帧并接受所述AP的调度管理。
本发明实施例中,发现模块1001发现支持伪接入的AP后,第一发送模块1002向该AP发送伪接入信息,第一建立模块1003与该AP建立伪接入关联,从而使得不是该AP的合法用户的STA能伪接入到AP上,接收该AP的调度管理,因此在密集场景下,可以避免多个STA之间在相同频谱资源下的相互竞争,从而提高STA之间通信的信道使用效率。
上面实施例中,发现模块1001中可以包含有多种不同的单元来发现支持伪接入的接入点AP的:
可选的,作为本发明实施例中STA另一个实施例,上述发现模块1001具体可以包括:
侦听单元,用于侦听能接收到的AP发出的广播帧;
确定单元,用于当所述侦听单元侦听到的第一AP发出的广播帧中指示该第一AP支持伪接入时,确定该第一AP为所述支持伪接入的AP。
可选的,作为本发明实施例中STA另一个实施例,上述发现模块1001具体可以包括:
探测发送单元,用于发送探测请求帧,在所述探测请求帧中携带寻找支持伪接入的AP的信息;
响应接收单元,用于接收第二AP发送的探测响应帧,所述探测响应帧中指示所述第二AP为所述支持伪接入的AP。
上面实施例中,第一发送模块1002也可以采用多种不同的方式来实现向所述AP发送伪接入信息:
可选的,作为本发明实施例中STA另一个实施例,请参阅图11,上述第一发送模块1002具体可以用于,向所述AP发送伪接入关联请求消息,所述伪关联请求消息用于向所述AP发起伪接入关联请求,其中包含有表示所述伪接入信息的信息指示;该STA还可以包括:第一接收模块1101,用于在与所述AP建立伪接入关联之前,接收所述AP发送的伪接入关联响应消息,所述伪接入关联响应消息为对所述伪接入关联请求消息的响应,用于确定所述AP接受所述STA发出的伪接入关联请求。
本发明实施例中,第一发送模块1002将伪接入消息携带在802.11认证过程中的伪接入认证请求消息中,仅需要对现有标准进行少量的修改即可实现伪接入,不需要加入更多的多余的步骤,提高了STA与AP进行伪接入的效率。
可选的,作为本发明实施例中STA另一个实施例,请参阅图12,上述第一发送模块1002具体可以用于,向所述AP发送伪接入认证请求消息,所述伪接入认证请求消息用于向所述AP发起伪接入认证请求,其中包含有表示所述伪接入信息的认证类型参数;所述STA还包括:第二接收模块1201,用于在与所述AP建立伪接入关联之前,接收所述AP发送的伪接入认证响应消息,所述伪接入认证响应消息为对所述伪接入认证请求消息的响应,用于确定所述 AP接收所述SAT发送的伪接入认证请求。
本发明实施例中,第一发送模块1002将伪接入消息携带在802.11认证过程中的伪接入认证请求消息中,仅需要对现有标准进行少量的修改即可实现伪接入,不需要加入更多的多余的步骤,提高了STA与AP进行伪接入的效率。
下面对本发明实施例中用于伪接入的AP进行描述:
请参阅图13,本发明实施例中AP一个实施例包括:
第三接收模块1301,用于接收STA发送的伪接入信息,所述伪接入信息用于使所述AP确定所述STA发起的接入为伪接入,所述STA不是所述AP的合法用户,所述AP支持伪接入,所述伪接入用于使接入AP的非合法用户能向AP发送调度相关管理帧并接受AP的调度管理;
第二建立模块1302,用于与所述STA建立伪接入关联,使得所述AP能接收所述STA发送的调度相关管理帧并对所述STA进行调度管理。
本发明实施例中,第三接收模块1301接收STA发送的伪接入信息后,第二建立模块1302与该STA建立伪接入关联,从而使得不是该AP的合法用户的STA能伪接入到AP上,接收该AP的调度管理,因此在密集场景下,可以避免多个STA之间在相同频谱资源下的相互竞争,从而提高STA之间通信的信道使用效率。
上面实施例中,第三接收模块1301接收STA发送的伪接入信息之前,需要使STA先发现该AP,其可以采用多种方式实现:
可选的,作为本发明实施例中AP另一个实施例,请参阅图14,上述AP还包括:
第四发送模块1401,用于在接收STA发送的伪接入信息之前,发送广播帧,在该广播帧中指示该AP支持伪接入。
可选的,作为本发明实施例中AP另一个实施例,请参阅图15,上述AP还包括:
探测接收模块1501,用于接收所述STA发送的探测请求帧,所述探测请求帧中携带寻找支持伪接入的AP的信息;
响应发送模块1502,用于发送探测响应帧给所述STA,所述探测响应帧中指示所述AP支持伪接入。
上面实施例中,第三接收模块1301可以采用多种不同的方式来实现接收STA发送的伪接入信息:
可选的,作为本发明实施例中AP另一个实施例,请参阅图16,上述第三接收模块1301具体用于,接收所述STA发送的伪接入关联请求消息,所述伪关联请求消息用于向所述AP发起伪接入关联请求,其中包含有表示所述伪接入信息的信息指示;该AP还包括:第二发送模块1601,用于在与所述STA建立伪接入关联之前,发送伪接入关联响应消息给所述STA,所述伪接入关联响应消息为对所述伪接入关联请求消息的响应,用于确定所述AP接受所述STA发出的伪接入关联请求。
本发明实施例中,第三接收模块1301接收携带在802.11认证过程中的伪接入认证请求消息中的伪接入消息,仅需要对现有标准进行少量的修改即可实现伪接入,不需要加入更多的多余的步骤,提高了STA与AP进行伪接入的效率。
可选的,作为本发明实施例中AP另一个实施例,请参阅图17,上述第三接收模块1301具体用于,接收所述STA发送的伪接入认证请求消息,所述伪接入认证请求消息用于向所述AP发起伪接入认证请求,其中包含有表示所述伪接入信息的认证类型参数;所述AP还包括:第三发送模块1701,用于在与所述STA建立伪接入关联之前,发送伪接入认证响应消息给所述STA,所述伪接入认证响应消息为对所述伪接入认证请求消息的响应,用于确定所述AP接收所述SAT发送的伪接入认证请求。
本发明实施例中,第三接收模块1301接收携带在802.11认证过程中的伪接入认证请求消息中的伪接入消息,仅需要对现有标准进行少量的修改即可实现伪接入,不需要加入更多的多余的步骤,提高了STA与AP进行伪接入的效率。
下面对本发明实施例中用于伪接入直连调度的STA进行描述:
请参阅图18,本发明实施例中作为第一STA使用的STA一个实施例包括:
第三建立模块1801,用于与第二STA建立P2P连接;
第四建立模块1802,用于和所述第二STA分别与同一个支持伪接入的AP建立伪接入关联,所述第一STA与所述第二STA不是所述AP的合法用户;
第五建立模块1803,用于通过所述AP与所述第二STA建立直连;
调度接受模块1804,用于与所述第二STA接受所述AP的直连调度。
本发明实施例中,第三建立模块1801与第二STA建立了P2P连接,在密集场景时,第四建立模块1802伪接入到AP,调度接受模块1804接受AP的直连调度,避免了P2P用户和AP用户争用相同信道资源时发送的冲突,提高了密集场景下的信道效率。
上面实施例中,第四建立模块1802和所述第二STA分别与同一个支持伪接入的AP建立伪接入关联,在实际应用中,可以由发现支持伪接入的AP的第一STA将该AP的标识发送给第二STA,请参阅图19,作为本发明实施例中STA另一个实施例,上述第四建立模块1802具体包括:
发现单元1901,用于发现支持伪接入的AP;
通知单元1902,用于将发现的所述AP的标识通过所述P2P连接通知所述第二STA;
建立单元1903,用于和所述第二STA均与所述AP建立伪接入关联;
可选的,上述第五建立模块1803具体可以包括:
直连请求发起单元1904,用于向所述AP发起直连请求,所述直连请求用于请求在所述第一STA与所述第二STA之间建立直连;
直连响应接收单元1905,用于接收所述AP返回的直连响应,所述直连响应用于通知所述第一STA请求的直连已经建立成功;
可选的,上述调度接受模块1804具体可以包括:
传输流请求单元1906,用于向所述AP请求直连传输流,以通知AP所述第一STA与所述第二STA的直连通信对资源的需求;
通信单元1907,用于与所述第二STA在所述AP分配的直连传输流上进行直连通信;
可选的,上述通信单元1907具体可以用于,与所述第二STA在所述AP分配的直连传输流上进行直连通信,并使用P2P连接的密钥进行保护。
本发明实施例中,第三建立模块1801与第二STA建立了P2P连接,在密集场景时,第四建立模块1802伪接入到AP,调度接受模块1804接受AP的直连调度,避免了P2P用户和AP用户争用相同信道资源时发送的冲突,提高 了密集场景下的信道效率。
下面对本发明实施例中用于伪接入直连调度的AP进行描述:
请参阅图20,本发明实施例中AP另一个实施例包括:
第六建立模块2001,用于分别与第一STA和第二STA建立伪接入关联,所述AP支持伪接入,所述第一STA与所述第二STA不是所述AP的合法用户,所述第一STA与所述第二STA之间已建立有P2P连接;
第七建立模块2002,用于在所述第一STA与所述第二STA之间建立直连;
调度模块2003,用于对所述第一STA和所述第二STA进行直连调度。
本发明实施例中,第六建立模块2001与建立了P2P连接的第一STA与第二STA建立伪接入关联,在密集场景时,第七建立模块2002在第一STA与所述第二STA之间建立直连,使第一STA与第二STA接受AP的直连调度,避免了P2P用户和AP用户争用相同信道资源时发送的冲突,提高了密集场景下的信道效率。
下面对本发明实施例中用于伪接入直连调度的AP进行具体描述,请参阅图21,作为本发明实施例中AP另一个实施例,上述第七建立模块2002具体包括:
直连请求接收单元2101,用于接收所述第一STA发起的直连请求,所述直连请求用于请求在所述第一STA与所述第二STA之间建立直连;
直连请求响应单元2102,用于根据所述直连请求,在所述第一STA与所述第二STA之间建立直连,并返回直连响应给所述第一STA,所述直连响应用于通知所述第一STA请求的直连已经建立成功;
上述调度模块2003具体包括:
传输流请求接收单元2103,用于接收所述第一STA对直连传输流的请求,得到所述第一STA与所述第二STA的直连通信对资源的需求;
传输流分配单元2104,用于分配直连传输流供所述第一STA与所述第二STA进行直连通信。
本发明实施例中,第六建立模块2001与建立了P2P连接的第一STA与第二STA建立伪接入关联,在密集场景时,第七建立模块2002在第一STA与所述第二STA之间建立直连,使第一STA与第二STA接受AP的直连调度, 避免了P2P用户和AP用户争用相同信道资源时发送的冲突,提高了密集场景下的信道效率。
请参阅图22,为本发明实施例中一个设备结构图,本发明实施例中的STA或AP均可以采用该设备结构,该设备2200包括:
输入装置2201、输出装置2202、处理器2203和存储器2204(其中设备2200中的处理器2203的数量可以一个或多个,图22中以一个处理器2203为例)。在本发明的一些实施例中,输入装置2201、输出装置2202、处理器2203和存储器2204可通过总线或其它方式连接,其中,图22中以通过总线连接为例。
1、当该设备2200表示用于伪接入的STA时,作为本发明实施例中STA另一个实施例,通过调用存储器2204存储的操作指令,所述处理器2203用于执行如下步骤:
发现支持伪接入的接入点AP,所述STA不是所述AP的合法用户,所述伪接入用于使接入AP的非合法用户能向AP发送调度相关管理帧并接受AP的调度管理;
向所述AP发送伪接入信息,所述伪接入信息用于使所述AP确定所述STA发起的接入为伪接入;
与所述AP建立伪接入关联,使得所述STA能向所述AP发送调度相关管理帧并接受所述AP的调度管理;
本发明的一些实施例中,当执行所述向所述AP发送伪接入信息的步骤时,所述处理器2203具体执行如下步骤:
向所述AP发送伪接入关联请求消息,所述伪关联请求消息用于向所述AP发起伪接入关联请求,其中包含有表示所述伪接入信息的信息指示;
在执行所述与所述AP建立伪接入关联的步骤之前,所述处理器还用于执行如下步骤:
接收所述AP发送的伪接入关联响应消息,所述伪接入关联响应消息为对所述伪接入关联请求消息的响应,用于确定所述AP接受所述STA发出的伪接入关联请求;
本发明的一些实施例中,当执行所述向所述AP发送伪接入信息的步骤时, 所述处理器2203具体执行如下步骤:
向所述AP发送伪接入认证请求消息,所述伪接入认证请求消息用于向所述AP发起伪接入认证请求,其中包含有表示所述伪接入信息的认证类型参数;
在执行所述与所述AP建立伪接入关联的步骤之前,所述处理器还用于执行如下步骤:
接收所述AP发送的伪接入认证响应消息,所述伪接入认证响应消息为对所述伪接入认证请求消息的响应,用于确定所述AP接收所述SAT发送的伪接入认证请求;
本发明的一些实施例中,当执行所述发现支持伪接入的接入点AP的步骤时,所述处理器2203具体执行如下步骤:
侦听能接收到的AP发出的广播帧;
当侦听到的第一AP发出的广播帧中指示该第一AP支持伪接入时,确定该第一AP为所述支持伪接入的AP;
本发明的一些实施例中,当执行所述发现支持伪接入的接入点AP的步骤时,所述处理器2203具体执行如下步骤:
发送探测请求帧,在所述探测请求帧中携带寻找支持伪接入的AP的信息;
接收第二AP发送的探测响应帧,所述探测响应帧中指示所述第二AP为所述支持伪接入的AP。
2、当该设备2200表示用于伪接入的AP时,作为本发明实施例中AP另一个实施例,通过调用存储器2204存储的操作指令,所述处理器2203用于执行如下步骤:
接收STA发送的伪接入信息,所述伪接入信息用于使所述AP确定所述STA发起的接入为伪接入,所述STA不是所述AP的合法用户,所述AP支持伪接入,所述伪接入用于使接入AP的非合法用户能向AP发送调度相关管理帧并接受AP的调度管理;
与所述STA建立伪接入关联,使得所述AP能接收所述STA发送的调度相关管理帧并对所述STA进行调度管理;
本发明的一些实施例中,当执行所述接收STA发送的伪接入信息的步骤时,所述处理器2203具体执行如下步骤:
接收所述STA发送的伪接入关联请求消息,所述伪关联请求消息用于向所述AP发起伪接入关联请求,其中包含有表示所述伪接入信息的信息指示;
在执行所述与所述STA建立伪接入关联的步骤之前,所述处理器2203还执行如下步骤:
发送伪接入关联响应消息给所述STA,所述伪接入关联响应消息为对所述伪接入关联请求消息的响应,用于确定所述AP接受所述STA发出的伪接入关联请求;
本发明的一些实施例中,当执行所述接收STA发送的伪接入信息的步骤时,所述处理器2203具体执行如下步骤:
接收所述STA发送的伪接入认证请求消息,所述伪接入认证请求消息用于向所述AP发起伪接入认证请求,其中包含有表示所述伪接入信息的认证类型参数;
在执行所述与所述STA建立伪接入关联的步骤之前,所述处理器2203还执行如下步骤:
发送伪接入认证响应消息给所述STA,所述伪接入认证响应消息为对所述伪接入认证请求消息的响应,用于确定所述AP接收所述SAT发送的伪接入认证请求;
本发明的一些实施例中,在执行所述接收STA发送的伪接入信息的步骤之前,所述处理器2203还用于执行如下步骤:
发送广播帧,在该广播帧中指示该AP支持伪接入;
本发明的一些实施例中,在执行所述接收STA发送的伪接入信息的步骤之前,所述处理器2203还用于执行如下步骤:
接收所述STA发送的探测请求帧,所述探测请求帧中携带寻找支持伪接入的AP的信息;
发送探测响应帧给所述STA,所述探测响应帧中指示所述AP支持伪接入。
3、当该设备2200表示用于伪接入直连调度的STA时,作为本发明实施例中STA另一个实施例,通过调用存储器2204存储的操作指令,所述处理器2203用于执行如下步骤:
与第二STA建立P2P连接;
和所述第二STA分别与同一个支持伪接入的AP建立伪接入关联,所述第一STA与所述第二STA不是所述AP的合法用户;
通过所述AP与所述第二STA建立直连;
与所述第二STA接受所述AP的直连调度;
本发明的一些实施例中,当执行所述和所述第二STA分别与同一个支持伪接入的AP建立伪接入关联的步骤时,所述处理器2203具体用于执行如下步骤:
发现支持伪接入的AP;
将发现的所述AP的标识通过所述P2P连接通知所述第二STA;
和所述第二STA均与所述AP建立伪接入关联;
本发明的一些实施例中,当执行所述通过所述AP与所述第二STA建立直连的步骤时,所述处理器2203具体用于执行如下步骤:
向所述AP发起直连请求,所述直连请求用于请求在所述第一STA与所述第二STA之间建立直连;
接收所述AP返回的直连响应,所述直连响应用于通知所述第一STA请求的直连已经建立成功;
本发明的一些实施例中,当执行所述与所述第二STA接受所述AP的直连调度的步骤时,所述处理器2203具体用于执行如下步骤:
向所述AP请求直连传输流,以通知AP所述第一STA与所述第二STA的直连通信对资源的需求;
与所述第二STA在所述AP分配的直连传输流上进行直连通信;
本发明的一些实施例中,当执行所述与所述第二STA在所述AP分配的直连传输流上进行直连通信的步骤时,所述处理器2203具体用于执行如下步骤:
与所述第二STA在所述AP分配的直连传输流上进行直连通信,并使用P2P连接的密钥进行保护。
4、当该设备2200表示用于伪接入直连调度的AP时,作为本发明实施例中AP另一个实施例,通过调用存储器2204存储的操作指令,所述处理器2203用于执行如下步骤:
分别与第一STA和第二STA建立伪接入关联,所述AP支持伪接入,所 述第一STA与所述第二STA不是所述AP的合法用户,所述第一STA与所述第二STA之间已建立有P2P连接;
在所述第一STA与所述第二STA之间建立直连;
对所述第一STA和所述第二STA进行直连调度;
本发明的一些实施例中,当执行所述在所述第一STA与所述第二STA之间建立直连的步骤时,所述处理器2203具体用于执行如下步骤:
接收所述第一STA发起的直连请求,所述直连请求用于请求在所述第一STA与所述第二STA之间建立直连;
根据所述直连请求,在所述第一STA与所述第二STA之间建立直连,并返回直连响应给所述第一STA,所述直连响应用于通知所述第一STA请求的直连已经建立成功;
本发明的一些实施例中,当执行所述对所述第一STA和所述第二STA进行直连调度的步骤时,所述处理器2203具体用于执行如下步骤:
接收所述第一STA对直连传输流的请求,得到所述第一STA与所述第二STA的直连通信对资源的需求;
分配直连传输流供所述第一STA与所述第二STA进行直连通信。
所属领域的技术人员可以清楚地了解到,为描述的方便和简洁,上述描述的系统,装置和单元的具体工作过程,可以参考前述方法实施例中的对应过程,在此不再赘述。
在本申请所提供的几个实施例中,应该理解到,所揭露的系统,装置和方法,可以通过其它的方式实现。例如,以上所描述的装置实施例仅仅是示意性的,例如,所述单元的划分,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式,例如多个单元或组件可以结合或者可以集成到另一个系统,或一些特征可以忽略,或不执行。另一点,所显示或讨论的相互之间的耦合或直接耦合或通信连接可以是通过一些接口,装置或单元的间接耦合或通信连接,可以是电性,机械或其它的形式。
所述作为分离部件说明的单元可以是或者也可以不是物理上分开的,作为单元显示的部件可以是或者也可以不是物理单元,即可以位于一个地方,或者也可以分布到多个网络单元上。可以根据实际的需要选择其中的部分或者全部 单元来实现本实施例方案的目的。
另外,在本发明各个实施例中的各功能单元可以集成在一个处理单元中,也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个单元中。上述集成的单元既可以采用硬件的形式实现,也可以采用软件功能单元的形式实现。
所述集成的单元如果以软件功能单元的形式实现并作为独立的产品销售或使用时,可以存储在一个计算机可读取存储介质中。基于这样的理解,本发明的技术方案本质上或者说对现有技术做出贡献的部分或者该技术方案的全部或部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质中,包括若干指令用以使得一台计算机设备(可以是个人计算机,服务器,或者网络设备等)执行本发明各个实施例所述方法的全部或部分步骤。而前述的存储介质包括:U盘、移动硬盘、只读存储器(ROM,Read-Only Memory)、随机存取存储器(RAM,Random Access Memory)、磁碟或者光盘等各种可以存储程序代码的介质。
以上所述,以上实施例仅用以说明本发明的技术方案,而非对其限制;尽管参照前述实施例对本发明进行了详细的说明,本领域的普通技术人员应当理解:其依然可以对前述各实施例所记载的技术方案进行修改,或者对其中部分技术特征进行等同替换;而这些修改或者替换,并不使相应技术方案的本质脱离本发明各实施例技术方案的精神和范围。

Claims (54)

  1. 一种伪接入方法,其特征在于,包括:
    站点STA发现支持伪接入的接入点AP,所述STA不是所述AP的合法用户,所述伪接入用于使接入AP的非合法用户能向AP发送调度相关管理帧并接受AP的调度管理;
    所述STA向所述AP发送伪接入信息,所述伪接入信息用于使所述AP确定所述STA发起的接入为伪接入;
    所述STA与所述AP建立伪接入关联,使得所述STA能向所述AP发送调度相关管理帧并接受所述AP的调度管理。
  2. 根据权利要求1所述的方法,其特征在于,所述STA向所述AP发送伪接入信息具体包括:
    所述STA向所述AP发送伪接入关联请求消息,所述伪关联请求消息用于向所述AP发起伪接入关联请求,其中包含有表示所述伪接入信息的信息指示;
    所述STA与所述AP建立伪接入关联的步骤之前还包括:
    所述STA接收所述AP发送的伪接入关联响应消息,所述伪接入关联响应消息为对所述伪接入关联请求消息的响应,用于确定所述AP接受所述STA发出的伪接入关联请求。
  3. 根据权利要求1所述的方法,其特征在于,所述STA向所述AP发送伪接入信息具体包括:
    所述STA向所述AP发送伪接入认证请求消息,所述伪接入认证请求消息用于向所述AP发起伪接入认证请求,其中包含有表示所述伪接入信息的认证类型参数;
    所述STA与所述AP建立伪接入关联的步骤之前还包括:
    所述STA接收所述AP发送的伪接入认证响应消息,所述伪接入认证响应消息为对所述伪接入认证请求消息的响应,用于确定所述AP接收所述SAT发送的伪接入认证请求。
  4. 根据权利要求1至3中任一项所述的方法,其特征在于,所述STA发现支持伪接入的AP具体包括:
    所述STA侦听能接收到的AP发出的广播帧;
    若侦听到的第一AP发出的广播帧中指示该第一AP支持伪接入,所述STA确定该第一AP为所述支持伪接入的AP。
  5. 根据权利要求1至3中任一项所述的方法,其特征在于,所述STA发现支持伪接入的AP具体包括:
    所述STA发送探测请求帧,在所述探测请求帧中携带寻找支持伪接入的AP的信息;
    所述STA接收第二AP发送的探测响应帧,所述探测响应帧中指示所述第二AP为所述支持伪接入的AP。
  6. 一种伪接入方法,其特征在于,包括:
    AP接收STA发送的伪接入信息,所述伪接入信息用于使所述AP确定所述STA发起的接入为伪接入,所述STA不是所述AP的合法用户,所述AP支持伪接入,所述伪接入用于使接入AP的非合法用户能向AP发送调度相关管理帧并接受AP的调度管理;
    所述AP与所述STA建立伪接入关联,使得所述AP能接收所述STA发送的调度相关管理帧并对所述STA进行调度管理。
  7. 根据权利要求6所述的方法,其特征在于,所述AP接收STA发送的伪接入信息具体包括:
    所述AP接收所述STA发送的伪接入关联请求消息,所述伪关联请求消息用于向所述AP发起伪接入关联请求,其中包含有表示所述伪接入信息的信息指示;
    所述AP与所述STA建立伪接入关联的步骤之前还包括:
    所述AP发送伪接入关联响应消息给所述STA,所述伪接入关联响应消息为对所述伪接入关联请求消息的响应,用于确定所述AP接受所述STA发出的伪接入关联请求。
  8. 根据权利要求6所述的方法,其特征在于,所述AP接收STA发送的伪接入信息具体包括:
    所述AP接收所述STA发送的伪接入认证请求消息,所述伪接入认证请求消息用于向所述AP发起伪接入认证请求,其中包含有表示所述伪接入信息的认证类型参数;
    所述AP与所述STA建立伪接入关联的步骤之前还包括:
    所述AP发送伪接入认证响应消息给所述STA,所述伪接入认证响应消息为对所述伪接入认证请求消息的响应,用于确定所述AP接收所述SAT发送的伪接入认证请求。
  9. 根据权利要求6至8中任一项所述的方法,其特征在于,所述AP接收STA发送的伪接入信息的步骤之前还包括:
    所述AP发送广播帧,在该广播帧中指示该AP支持伪接入。
  10. 根据权利要求6至8中任一项所述的方法,其特征在于,所述AP接收STA发送的伪接入信息的步骤之前还包括:
    所述AP接收所述STA发送的探测请求帧,所述探测请求帧中携带寻找支持伪接入的AP的信息;
    所述AP发送探测响应帧给所述STA,所述探测响应帧中指示所述AP支持伪接入。
  11. 一种伪接入直连调度方法,其特征在于,包括:
    第一STA与第二STA建立P2P连接;
    所述第一STA和所述第二STA分别与同一个支持伪接入的AP建立伪接入关联,所述第一STA与所述第二STA不是所述AP的合法用户;
    所述第一STA通过所述AP与所述第二STA建立直连;
    所述第一STA与所述第二STA接受所述AP的直连调度。
  12. 根据权利要求11所述的方法,其特征在于,所述第一STA和所述第二STA分别与同一个支持伪接入的AP建立伪接入关联具体包括:
    所述第一STA发现支持伪接入的AP;
    所述第一STA将发现的所述AP的标识通过所述P2P连接通知所述第二STA;
    所述第一STA和所述第二STA均与所述AP建立伪接入关联。
  13. 根据权利要求11或12所述的方法,其特征在于,所述第一STA通过所述AP与所述第二STA建立直连具体包括:
    所述第一STA向所述AP发起直连请求,所述直连请求用于请求在所述第一STA与所述第二STA之间建立直连;
    所述第一STA接收所述AP返回的直连响应,所述直连响应用于通知所述第一STA请求的直连已经建立成功。
  14. 根据权利要求11所述的方法,其特征在于,所述第一STA与所述第二STA接受所述AP的直连调度具体包括:
    所述第一STA向所述AP请求直连传输流,以通知AP所述第一STA与所述第二STA的直连通信对资源的需求;
    所述第一STA与所述第二STA在所述AP分配的直连传输流上进行直连通信。
  15. 根据权利要求14所述的方法,其特征在于,所述方法还包括:
    所述第一STA与所述第二STA在直连传输流上进行直连通信时,使用P2P连接的密钥进行保护。
  16. 一种伪接入直连调度方法,其特征在于,包括:
    AP分别与第一STA和第二STA建立伪接入关联,所述AP支持伪接入,所述第一STA与所述第二STA不是所述AP的合法用户,所述第一STA与所述第二STA之间已建立有P2P连接;
    所述AP在所述第一STA与所述第二STA之间建立直连;
    所述AP对所述第一STA和所述第二STA进行直连调度。
  17. 根据权利要求16所述的方法,其特征在于,所述AP在所述第一STA与所述第二STA之间建立直连具体包括:
    所述AP接收所述第一STA发起的直连请求,所述直连请求用于请求在所述第一STA与所述第二STA之间建立直连;
    所述AP根据所述直连请求,在所述第一STA与所述第二STA之间建立直连,并返回直连响应给所述第一STA,所述直连响应用于通知所述第一STA请求的直连已经建立成功。
  18. 根据权利要求16或17所述的方法,其特征在于,所述AP对所述第一STA和所述第二STA进行直连调度具体包括:
    所述AP接收所述第一STA对直连传输流的请求,得到所述第一STA与所述第二STA的直连通信对资源的需求;
    所述AP分配直连传输流供所述第一STA与所述第二STA进行直连通信。
  19. 一种站点STA,其特征在于,包括:
    发现模块,用于发现支持伪接入的接入点AP,所述STA不是所述AP的合法用户,所述伪接入用于使接入AP的非合法用户能向AP发送调度相关管理帧并接受AP的调度管理;
    第一发送模块,用于向所述AP发送伪接入信息,所述伪接入信息用于使所述AP确定所述STA发起的接入为伪接入;
    第一建立模块,用于与所述AP建立伪接入关联,使得所述STA能向所述AP发送调度相关管理帧并接受所述AP的调度管理。
  20. 根据权利要求19所述的STA,其特征在于,所述第一发送模块具体用于,向所述AP发送伪接入关联请求消息,所述伪关联请求消息用于向所述AP发起伪接入关联请求,其中包含有表示所述伪接入信息的信息指示;
    所述STA还包括:
    第一接收模块,用于在与所述AP建立伪接入关联之前,接收所述AP发送的伪接入关联响应消息,所述伪接入关联响应消息为对所述伪接入关联请求消息的响应,用于确定所述AP接受所述STA发出的伪接入关联请求。
  21. 根据权利要求19所述的STA,其特征在于,所述第一发送模块具体用于,向所述AP发送伪接入认证请求消息,所述伪接入认证请求消息用于向所述AP发起伪接入认证请求,其中包含有表示所述伪接入信息的认证类型参数;
    所述STA还包括:
    第二接收模块,用于在与所述AP建立伪接入关联之前,接收所述AP发送的伪接入认证响应消息,所述伪接入认证响应消息为对所述伪接入认证请求消息的响应,用于确定所述AP接收所述SAT发送的伪接入认证请求。
  22. 根据权利要求19至21中任一项所述的STA,其特征在于,所述发现模块具体包括:
    侦听单元,用于侦听能接收到的AP发出的广播帧;
    确定单元,用于当所述侦听单元侦听到的第一AP发出的广播帧中指示该第一AP支持伪接入时,确定该第一AP为所述支持伪接入的AP。
  23. 根据权利要求19至21中任一项所述的STA,其特征在于,所述发现 模块具体包括:
    探测发送单元,用于发送探测请求帧,在所述探测请求帧中携带寻找支持伪接入的AP的信息;
    响应接收单元,用于接收第二AP发送的探测响应帧,所述探测响应帧中指示所述第二AP为所述支持伪接入的AP。
  24. 一种接入点AP,其特征在于,包括:
    第三接收模块,用于接收STA发送的伪接入信息,所述伪接入信息用于使所述AP确定所述STA发起的接入为伪接入,所述STA不是所述AP的合法用户,所述AP支持伪接入,所述伪接入用于使接入AP的非合法用户能向AP发送调度相关管理帧并接受AP的调度管理;
    第二建立模块,用于与所述STA建立伪接入关联,使得所述AP能接收所述STA发送的调度相关管理帧并对所述STA进行调度管理。
  25. 根据权利要求24所述的AP,其特征在于,所述第三接收模块具体用于,接收所述STA发送的伪接入关联请求消息,所述伪关联请求消息用于向所述AP发起伪接入关联请求,其中包含有表示所述伪接入信息的信息指示;
    所述AP还包括:
    第二发送模块,用于在与所述STA建立伪接入关联之前,发送伪接入关联响应消息给所述STA,所述伪接入关联响应消息为对所述伪接入关联请求消息的响应,用于确定所述AP接受所述STA发出的伪接入关联请求。
  26. 根据权利要求24所述的AP,其特征在于,所述第三接收模块具体用于,接收所述STA发送的伪接入认证请求消息,所述伪接入认证请求消息用于向所述AP发起伪接入认证请求,其中包含有表示所述伪接入信息的认证类型参数;
    所述AP还包括:
    第三发送模块,用于在与所述STA建立伪接入关联之前,发送伪接入认证响应消息给所述STA,所述伪接入认证响应消息为对所述伪接入认证请求消息的响应,用于确定所述AP接收所述SAT发送的伪接入认证请求。
  27. 根据权利要求24至26中任一项所述的AP,其特征在于,所述AP还包括:
    第四发送模块,用于在接收STA发送的伪接入信息之前,发送广播帧,在该广播帧中指示该AP支持伪接入。
  28. 根据权利要求24至26中任一项所述的AP,其特征在于,所述AP还包括:
    探测接收模块,用于接收所述STA发送的探测请求帧,所述探测请求帧中携带寻找支持伪接入的AP的信息;
    响应发送模块,用于发送探测响应帧给所述STA,所述探测响应帧中指示所述AP支持伪接入。
  29. 一种STA,作为第一STA使用,其特征在于,包括:
    第三建立模块,用于与第二STA建立P2P连接;
    第四建立模块,用于和所述第二STA分别与同一个支持伪接入的AP建立伪接入关联,所述第一STA与所述第二STA不是所述AP的合法用户;
    第五建立模块,用于通过所述AP与所述第二STA建立直连;
    调度接受模块,用于与所述第二STA接受所述AP的直连调度。
  30. 根据权利要求29所述的STA,其特征在于,所述第四建立模块具体包括:
    发现单元,用于发现支持伪接入的AP;
    通知单元,用于将发现的所述AP的标识通过所述P2P连接通知所述第二STA;
    建立单元,用于和所述第二STA均与所述AP建立伪接入关联。
  31. 根据权利要求29或30所述的STA,其特征在于,所述第五建立模块具体包括:
    直连请求发起单元,用于向所述AP发起直连请求,所述直连请求用于请求在所述第一STA与所述第二STA之间建立直连;
    直连响应接收单元,用于接收所述AP返回的直连响应,所述直连响应用于通知所述第一STA请求的直连已经建立成功。
  32. 根据权利要求29所述的STA,其特征在于,所述调度接受模块具体包括:
    传输流请求单元,用于向所述AP请求直连传输流,以通知AP所述第一 STA与所述第二STA的直连通信对资源的需求;
    通信单元,用于与所述第二STA在所述AP分配的直连传输流上进行直连通信。
  33. 根据权利要求32所述的STA,其特征在于,所述通信单元具体用于,与所述第二STA在所述AP分配的直连传输流上进行直连通信,并使用P2P连接的密钥进行保护。
  34. 一种AP,其特征在于,包括:
    第六建立模块,用于分别与第一STA和第二STA建立伪接入关联,所述AP支持伪接入,所述第一STA与所述第二STA不是所述AP的合法用户,所述第一STA与所述第二STA之间已建立有P2P连接;
    第七建立模块,用于在所述第一STA与所述第二STA之间建立直连;
    调度模块,用于对所述第一STA和所述第二STA进行直连调度。
  35. 根据权利要求34所述的AP,其特征在于,所述第七建立模块具体包括:
    直连请求接收单元,用于接收所述第一STA发起的直连请求,所述直连请求用于请求在所述第一STA与所述第二STA之间建立直连;
    直连请求响应单元,用于根据所述直连请求,在所述第一STA与所述第二STA之间建立直连,并返回直连响应给所述第一STA,所述直连响应用于通知所述第一STA请求的直连已经建立成功。
  36. 根据权利要求34或35所述的AP,其特征在于,所述调度模块具体包括:
    传输流请求接收单元,用于接收所述第一STA对直连传输流的请求,得到所述第一STA与所述第二STA的直连通信对资源的需求;
    传输流分配单元,用于分配直连传输流供所述第一STA与所述第二STA进行直连通信。
  37. 一种STA,其特征在于,包括:
    输入装置、输出装置、处理器和存储器;
    通过调用所述存储器存储的操作指令,所述处理器用于执行如下步骤:
    发现支持伪接入的接入点AP,所述STA不是所述AP的合法用户,所述 伪接入用于使接入AP的非合法用户能向AP发送调度相关管理帧并接受AP的调度管理;
    向所述AP发送伪接入信息,所述伪接入信息用于使所述AP确定所述STA发起的接入为伪接入;
    与所述AP建立伪接入关联,使得所述STA能向所述AP发送调度相关管理帧并接受所述AP的调度管理。
  38. 根据权利要求37所述的STA,其特征在于,当执行所述向所述AP发送伪接入信息的步骤时,所述处理器具体执行如下步骤:
    向所述AP发送伪接入关联请求消息,所述伪关联请求消息用于向所述AP发起伪接入关联请求,其中包含有表示所述伪接入信息的信息指示;
    在执行所述与所述AP建立伪接入关联的步骤之前,所述处理器还用于执行如下步骤:
    接收所述AP发送的伪接入关联响应消息,所述伪接入关联响应消息为对所述伪接入关联请求消息的响应,用于确定所述AP接受所述STA发出的伪接入关联请求。
  39. 根据权利要求37所述的STA,其特征在于,当执行所述向所述AP发送伪接入信息的步骤时,所述处理器具体执行如下步骤:
    向所述AP发送伪接入认证请求消息,所述伪接入认证请求消息用于向所述AP发起伪接入认证请求,其中包含有表示所述伪接入信息的认证类型参数;
    在执行所述与所述AP建立伪接入关联的步骤之前,所述处理器还用于执行如下步骤:
    接收所述AP发送的伪接入认证响应消息,所述伪接入认证响应消息为对所述伪接入认证请求消息的响应,用于确定所述AP接收所述SAT发送的伪接入认证请求。
  40. 根据权利要求37至39中任一项所述的STA,其特征在于,当执行所述发现支持伪接入的接入点AP的步骤时,所述处理器具体执行如下步骤:
    侦听能接收到的AP发出的广播帧;
    当侦听到的第一AP发出的广播帧中指示该第一AP支持伪接入时,确定该第一AP为所述支持伪接入的AP。
  41. 根据权利要求37至39中任一项所述的STA,其特征在于,当执行所述发现支持伪接入的接入点AP的步骤时,所述处理器具体执行如下步骤:
    发送探测请求帧,在所述探测请求帧中携带寻找支持伪接入的AP的信息;
    接收第二AP发送的探测响应帧,所述探测响应帧中指示所述第二AP为所述支持伪接入的AP。
  42. 一种AP,其特征在于,包括:
    输入装置、输出装置、处理器和存储器;
    通过调用所述存储器存储的操作指令,所述处理器用于执行如下步骤:
    接收STA发送的伪接入信息,所述伪接入信息用于使所述AP确定所述STA发起的接入为伪接入,所述STA不是所述AP的合法用户,所述AP支持伪接入,所述伪接入用于使接入AP的非合法用户能向AP发送调度相关管理帧并接受AP的调度管理;
    与所述STA建立伪接入关联,使得所述AP能接收所述STA发送的调度相关管理帧并对所述STA进行调度管理。
  43. 根据权利要求42所述的AP,其特征在于,当执行所述接收STA发送的伪接入信息的步骤时,所述处理器具体执行如下步骤:
    接收所述STA发送的伪接入关联请求消息,所述伪关联请求消息用于向所述AP发起伪接入关联请求,其中包含有表示所述伪接入信息的信息指示;
    在执行所述与所述STA建立伪接入关联的步骤之前,所述处理器还执行如下步骤:
    发送伪接入关联响应消息给所述STA,所述伪接入关联响应消息为对所述伪接入关联请求消息的响应,用于确定所述AP接受所述STA发出的伪接入关联请求。
  44. 根据权利要求42所述的AP,其特征在于,当执行所述接收STA发送的伪接入信息的步骤时,所述处理器具体执行如下步骤:
    接收所述STA发送的伪接入认证请求消息,所述伪接入认证请求消息用于向所述AP发起伪接入认证请求,其中包含有表示所述伪接入信息的认证类型参数;
    在执行所述与所述STA建立伪接入关联的步骤之前,所述处理器还执行 如下步骤:
    发送伪接入认证响应消息给所述STA,所述伪接入认证响应消息为对所述伪接入认证请求消息的响应,用于确定所述AP接收所述SAT发送的伪接入认证请求。
  45. 根据权利要求42至44中任一项所述的AP,其特征在于,在执行所述接收STA发送的伪接入信息的步骤之前,所述处理器还用于执行如下步骤:
    发送广播帧,在该广播帧中指示该AP支持伪接入。
  46. 根据权利要求42至44中任一项所述的AP,其特征在于,在执行所述接收STA发送的伪接入信息的步骤之前,所述处理器还用于执行如下步骤:
    接收所述STA发送的探测请求帧,所述探测请求帧中携带寻找支持伪接入的AP的信息;
    发送探测响应帧给所述STA,所述探测响应帧中指示所述AP支持伪接入。
  47. 一种STA,作为第一STA使用,其特征在于,包括:
    输入装置、输出装置、处理器和存储器;
    通过调用所述存储器存储的操作指令,所述处理器用于执行如下步骤:
    与第二STA建立P2P连接;
    和所述第二STA分别与同一个支持伪接入的AP建立伪接入关联,所述第一STA与所述第二STA不是所述AP的合法用户;
    通过所述AP与所述第二STA建立直连;
    与所述第二STA接受所述AP的直连调度。
  48. 根据权利要求47所述的STA,其特征在于,当执行所述和所述第二STA分别与同一个支持伪接入的AP建立伪接入关联的步骤时,所述处理器具体用于执行如下步骤:
    发现支持伪接入的AP;
    将发现的所述AP的标识通过所述P2P连接通知所述第二STA;
    和所述第二STA均与所述AP建立伪接入关联。
  49. 根据权利要求47或48所述的STA,其特征在于,当执行所述通过所述AP与所述第二STA建立直连的步骤时,所述处理器具体用于执行如下步骤:
    向所述AP发起直连请求,所述直连请求用于请求在所述第一STA与所述 第二STA之间建立直连;
    接收所述AP返回的直连响应,所述直连响应用于通知所述第一STA请求的直连已经建立成功。
  50. 根据权利要求47所述的STA,其特征在于,当执行所述与所述第二STA接受所述AP的直连调度的步骤时,所述处理器具体用于执行如下步骤:
    向所述AP请求直连传输流,以通知AP所述第一STA与所述第二STA的直连通信对资源的需求;
    与所述第二STA在所述AP分配的直连传输流上进行直连通信。
  51. 根据权利要求50所述的STA,其特征在于,当执行所述与所述第二STA在所述AP分配的直连传输流上进行直连通信的步骤时,所述处理器具体用于执行如下步骤:
    与所述第二STA在所述AP分配的直连传输流上进行直连通信,并使用P2P连接的密钥进行保护。
  52. 一种AP,其特征在于,包括:
    输入装置、输出装置、处理器和存储器;
    通过调用所述存储器存储的操作指令,所述处理器用于执行如下步骤:
    分别与第一STA和第二STA建立伪接入关联,所述AP支持伪接入,所述第一STA与所述第二STA不是所述AP的合法用户,所述第一STA与所述第二STA之间已建立有P2P连接;
    在所述第一STA与所述第二STA之间建立直连;
    对所述第一STA和所述第二STA进行直连调度。
  53. 根据权利要求52所述的AP,其特征在于,当执行所述在所述第一STA与所述第二STA之间建立直连的步骤时,所述处理器具体用于执行如下步骤:
    接收所述第一STA发起的直连请求,所述直连请求用于请求在所述第一STA与所述第二STA之间建立直连;
    根据所述直连请求,在所述第一STA与所述第二STA之间建立直连,并返回直连响应给所述第一STA,所述直连响应用于通知所述第一STA请求的直连已经建立成功。
  54. 根据权利要求52或53所述的AP,其特征在于,当执行所述对所述第一STA和所述第二STA进行直连调度的步骤时,所述处理器具体用于执行如下步骤:
    接收所述第一STA对直连传输流的请求,得到所述第一STA与所述第二STA的直连通信对资源的需求;
    分配直连传输流供所述第一STA与所述第二STA进行直连通信。
PCT/CN2015/073683 2015-03-05 2015-03-05 伪接入方法,伪接入直连调度方法,站点以及接入点 WO2016138658A1 (zh)

Priority Applications (4)

Application Number Priority Date Filing Date Title
PCT/CN2015/073683 WO2016138658A1 (zh) 2015-03-05 2015-03-05 伪接入方法,伪接入直连调度方法,站点以及接入点
US15/555,463 US20180042046A1 (en) 2015-03-05 2015-03-05 Pseudo access method, direct connection scheduling method for pseudo access, station, and access point
CN201580005807.7A CN106171034B (zh) 2015-03-05 2015-03-05 伪接入方法,伪接入直连调度方法,站点以及接入点
EP15883715.3A EP3255951B1 (en) 2015-03-05 2015-03-05 Pseudo access method, pseudo access direct-connection scheduling method, stations and access point

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2015/073683 WO2016138658A1 (zh) 2015-03-05 2015-03-05 伪接入方法,伪接入直连调度方法,站点以及接入点

Publications (1)

Publication Number Publication Date
WO2016138658A1 true WO2016138658A1 (zh) 2016-09-09

Family

ID=56848757

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2015/073683 WO2016138658A1 (zh) 2015-03-05 2015-03-05 伪接入方法,伪接入直连调度方法,站点以及接入点

Country Status (4)

Country Link
US (1) US20180042046A1 (zh)
EP (1) EP3255951B1 (zh)
CN (1) CN106171034B (zh)
WO (1) WO2016138658A1 (zh)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107864491A (zh) * 2017-10-25 2018-03-30 广东欧珀移动通信有限公司 Gsm模式下的锁频方法、终端和计算机可读存储介质

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114025355A (zh) * 2021-08-05 2022-02-08 成都西加云杉科技有限公司 一种伪ap识别方法、装置、设备及存储介质

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1650642A (zh) * 2002-03-29 2005-08-03 空气磁体公司 检测无线局域网中的伪接入点
US20120282948A1 (en) * 2011-05-03 2012-11-08 Texas Instruments Incorporated Wireless-based positioning without association
CN102781002A (zh) * 2012-07-30 2012-11-14 深圳市易聆科信息技术有限公司 一种自动获取加密无线网络密钥的方法及系统
CN103843380A (zh) * 2011-09-30 2014-06-04 国际商业机器公司 用于监视未经授权接入点的监视系统、监视服务器、方法和程序

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
ATE386385T1 (de) * 2004-10-26 2008-03-15 Alcatel Lucent Beschränkter wlan-zugriff für eine unbekannte mobilstation
US20090019539A1 (en) * 2007-07-11 2009-01-15 Airtight Networks, Inc. Method and system for wireless communications characterized by ieee 802.11w and related protocols
US8493887B2 (en) * 2008-12-30 2013-07-23 Qualcomm Incorporated Centralized control of peer discovery pilot transmission
WO2012082024A1 (en) * 2010-12-13 2012-06-21 Telefonaktiebolaget L M Ericsson (Publ) Methods and user equipments for device to device communication
CN104349303B (zh) * 2013-08-05 2019-07-23 中兴通讯股份有限公司 设备到设备连接管理方法、装置及基站

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1650642A (zh) * 2002-03-29 2005-08-03 空气磁体公司 检测无线局域网中的伪接入点
US20120282948A1 (en) * 2011-05-03 2012-11-08 Texas Instruments Incorporated Wireless-based positioning without association
CN103843380A (zh) * 2011-09-30 2014-06-04 国际商业机器公司 用于监视未经授权接入点的监视系统、监视服务器、方法和程序
CN102781002A (zh) * 2012-07-30 2012-11-14 深圳市易聆科信息技术有限公司 一种自动获取加密无线网络密钥的方法及系统

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107864491A (zh) * 2017-10-25 2018-03-30 广东欧珀移动通信有限公司 Gsm模式下的锁频方法、终端和计算机可读存储介质

Also Published As

Publication number Publication date
EP3255951A4 (en) 2018-02-28
CN106171034A (zh) 2016-11-30
CN106171034B (zh) 2020-03-10
US20180042046A1 (en) 2018-02-08
EP3255951B1 (en) 2019-09-25
EP3255951A1 (en) 2017-12-13

Similar Documents

Publication Publication Date Title
EP3275112B1 (en) Schedule selection and connection setup between devices participating in a nan data link
TWI542165B (zh) 用於對等傳輸量和ap傳輸量多工的系統和方法(一)
JP5684375B2 (ja) ダイレクトリンクセットアップのための、wlan局の能力の発見のための方法および装置
WO2016004903A1 (zh) 基于网络共享的设备到设备的通信方法及系统、存储介质
WO2018059457A1 (zh) 一种会话连接建立方法、相关设备及系统
WO2017028743A1 (zh) 中继用户设备控制方法、装置及用户设备
WO2022126563A1 (zh) 网络资源选择方法、终端设备和网络设备
JP6430856B2 (ja) 無線通信システムおよび無線通信方法
WO2017024909A1 (zh) 一种进行数据传输的方法和设备
WO2022033558A1 (zh) 一种中继管理方法及通信装置
WO2017031636A1 (zh) 一种无线回程连接的建立方法及装置
WO2018137364A1 (zh) 数据发送方法、数据发送终端以及基站
US20230156833A1 (en) Packet Forwarding Method, Apparatus, and System
WO2015018232A1 (zh) 设备到设备连接管理方法、装置及基站
WO2016155132A1 (zh) 终端化小区之间的协作方法和系统、终端
US20220263879A1 (en) Multicast session establishment method and network device
WO2015143763A1 (zh) 一种负荷信息传递方法、系统、网元及计算机存储介质
Pyattaev et al. Network-assisted D2D over WiFi direct
WO2022033543A1 (zh) 一种中继通信方法及通信装置
WO2022160123A1 (zh) 接入方式选择方法、终端设备和网络设备
WO2016138658A1 (zh) 伪接入方法,伪接入直连调度方法,站点以及接入点
WO2021163894A1 (zh) 一种基于中继的通信方法及装置
WO2016131182A1 (zh) 一种随机接入方法、站点和接入点
US20220060858A1 (en) Network slicing framework for time-sensitive peer-to-peer networking
WO2016029409A1 (zh) 一种数据传输方法及装置

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 15883715

Country of ref document: EP

Kind code of ref document: A1

WWE Wipo information: entry into national phase

Ref document number: 15555463

Country of ref document: US

NENP Non-entry into the national phase

Ref country code: DE

REEP Request for entry into the european phase

Ref document number: 2015883715

Country of ref document: EP