Method for realizing access control, central controller and access point (AP) device
A central controller and access control technology, applied in access restriction, network traffic/resource management, electrical components, etc., can solve the problems of STA unable to access, STA unable to access the network normally, etc., to ensure normal access , to achieve the effect of load balancing
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0037] This embodiment provides a method for implementing access control, which is applied to a system including at least a central controller and two or more access points AP with the same basic service set identifier BSSID and service set identifier SSID. Among all APs with the same BSSID and SSID in the system, only one AP sends beacon packets.
[0038] like image 3 As shown, the method for implementing access control in this embodiment includes:
[0039] Step 301, when two or more APs receive an association request initiated by the same client STA, the central controller selects a serving AP among the two or more APs;
[0040] Step 302, the central controller generates an association response and sends it to the serving AP; the serving AP sends the received association response to the STA, so that the STA accesses the system through the serving AP. Wherein, the association request is initiated by the STA according to the beacon message.
[0041] The method of implement...
Embodiment 2
[0043] This embodiment provides a method for implementing access control, which is applied to Figure 4 system shown. Figure 4The system includes a central controller (not shown in the figure) and seven AP devices. Among the seven AP devices, only one AP sends beacon messages (for convenience of description, hereinafter referred to as core AP), while the remaining six APs do not send beacon messages (for convenience of description, hereinafter referred to as ordinary APs), That is, AP1 to AP6. The core AP periodically sends beacon packets, and the coverage area of the beacon packets of the core AP is the area indicated by the outer circle. The coverage areas of core APs and common APs are figure 2 In the area of the small circle where it is located, both core APs and common APs can establish connections with STAs located in their coverage areas; the coverage area of each AP is included in the coverage area of the beacon message.
[0044] Those skilled in the art ...
Embodiment 3
[0069] see Image 6 , Image 6 It is a flow chart of the method for implementing access control in Embodiment 3 of the present invention. This embodiment is applied to the scenario where the central controller re-selects a suitable serving AP for the STA after the STA moves in the system.
[0070] In the initial state, STA 1 accesses the network through AP 1 in the load balancing domain. As STA 1 moves, when the signal strength of STA 1 detected by the AP changes, the central controller needs to re-select the appropriate service for STA 1. AP access. Include the following steps:
[0071] Step 601: STA 1 moves in the load balancing domain. When the core AP and AP1 detect that the signal strength of STA 1 changes, they each report the signal strength of STA 1 after they have detected the change to the central controller, but AP2 does not detect it. If the signal strength of STA1 changes, it will not re-report the detected signal strength of STA1 to the central controller;
...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 