Unlock instant, AI-driven research and patent intelligence for your innovation.

Method for realizing access control, central controller and access point (AP) device

A central controller and access control technology, applied in access restriction, network traffic/resource management, electrical components, etc., can solve the problems of STA unable to access, STA unable to access the network normally, etc., to ensure normal access , to achieve the effect of load balancing

Active Publication Date: 2011-09-21
NEW H3C TECH CO LTD
View PDF3 Cites 21 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, when an AP rejects the STA's connection request, the next time the STA sends a connection request, it may still choose to connect to the AP, but is constantly rejected by the AP, which makes the STA unable to access
[0006] It can be seen that in the existing access control technology, since the STA chooses which AP to be included in the network, the STA may not be able to access the network normally.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for realizing access control, central controller and access point (AP) device
  • Method for realizing access control, central controller and access point (AP) device
  • Method for realizing access control, central controller and access point (AP) device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0037] This embodiment provides a method for implementing access control, which is applied to a system including at least a central controller and two or more access points AP with the same basic service set identifier BSSID and service set identifier SSID. Among all APs with the same BSSID and SSID in the system, only one AP sends beacon packets.

[0038] like image 3 As shown, the method for implementing access control in this embodiment includes:

[0039] Step 301, when two or more APs receive an association request initiated by the same client STA, the central controller selects a serving AP among the two or more APs;

[0040] Step 302, the central controller generates an association response and sends it to the serving AP; the serving AP sends the received association response to the STA, so that the STA accesses the system through the serving AP. Wherein, the association request is initiated by the STA according to the beacon message.

[0041] The method of implement...

Embodiment 2

[0043] This embodiment provides a method for implementing access control, which is applied to Figure 4 system shown. Figure 4The system includes a central controller (not shown in the figure) and seven AP devices. Among the seven AP devices, only one AP sends beacon messages (for convenience of description, hereinafter referred to as core AP), while the remaining six APs do not send beacon messages (for convenience of description, hereinafter referred to as ordinary APs), That is, AP1 to AP6. The core AP periodically sends beacon packets, and the coverage area of ​​the beacon packets of the core AP is the area indicated by the outer circle. The coverage areas of core APs and common APs are figure 2 In the area of ​​the small circle where it is located, both core APs and common APs can establish connections with STAs located in their coverage areas; the coverage area of ​​each AP is included in the coverage area of ​​the beacon message.

[0044] Those skilled in the art ...

Embodiment 3

[0069] see Image 6 , Image 6 It is a flow chart of the method for implementing access control in Embodiment 3 of the present invention. This embodiment is applied to the scenario where the central controller re-selects a suitable serving AP for the STA after the STA moves in the system.

[0070] In the initial state, STA 1 accesses the network through AP 1 in the load balancing domain. As STA 1 moves, when the signal strength of STA 1 detected by the AP changes, the central controller needs to re-select the appropriate service for STA 1. AP access. Include the following steps:

[0071] Step 601: STA 1 moves in the load balancing domain. When the core AP and AP1 detect that the signal strength of STA 1 changes, they each report the signal strength of STA 1 after they have detected the change to the central controller, but AP2 does not detect it. If the signal strength of STA1 changes, it will not re-report the detected signal strength of STA1 to the central controller;

...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method for realizing access control, a central controller and an access point (AP) device. The method is applied to a system which at least comprises the central controller and more than two APs having same basic service set identifiers (BSSIDs) and service set identifiers (SSIDs), wherein only one of the APs sends a beacon message. The method comprises the following steps: when a relevance request initiated by a same client STA (spanning tree algorithm) is received by the more than two APs, selecting a service AP from the more than two APs by the central controller; generating a relevance response and sending the relevance response to the service AP; and sending the received relevance response to the STA by the service AP, wherein the relevance request is initiated by the STA according to the beacon message. The method provided by the invention can be used for ensuring the normal access of the STA and realizing the load balance among APs.

Description

technical field [0001] The present invention relates to the technical field of wireless local area network (WLAN), in particular to a method for realizing access control, a central controller and access point (AP, Access Point) equipment. Background technique [0002] WLAN is a wireless data network, which builds a local area network in a wireless manner, using electromagnetic waves to send and receive data in the air without cable media. WLAN is a supplement and extension to the wired networking method, which enables the computers in the network to be mobile, thereby quickly and conveniently solving the problem of network connectivity that is difficult to achieve using wired methods. [0003] like figure 1 It is a schematic diagram of a WLAN networking structure in the prior art, including a station (STA, Station) and an access point (AP, Access Point), wherein the AP notifies the surrounding STAs by continuously sending beacon (beacon) messages, so that It can search for...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04W28/08H04W48/06
Inventor 徐百忱常向青
Owner NEW H3C TECH CO LTD