Message caching method and access point

A message buffering and access point technology, applied in advanced technologies, data switching networks, power management, etc., can solve problems such as system failures, cache power-saving message occupation, etc., to avoid system failures, effectively control storage space, Guaranteed effect of power saving performance

Active Publication Date: 2012-07-18
RUIJIE NETWORKS CO LTD
View PDF4 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0010] Embodiments of the present invention provide a message caching method and an access point, which are used to solve the problem in the prior art that a large amount of memory space is occupied by caching power-saving messages and cause system failures

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Message caching method and access point
  • Message caching method and access point
  • Message caching method and access point

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0043] image 3 Shown is a flow chart of the message buffering method provided in Embodiment 1 of the present invention, which specifically includes the following processing steps:

[0044] In step 301, the access point receives a message to be transmitted to the first user terminal, and the first user terminal belongs to the access point.

[0045] Step 302 , judging whether the first user terminal is in a dormant state, if not in a dormant state but in an awake state, proceed to step 303 , and if in a dormant state, proceed to step 304 .

[0046] Step 303: Send the message to the first user terminal.

[0047] Step 304 , the access point determines the remaining amount of buffer space pre-allocated by itself for caching the power-saving message, that is, the value of the allocated buffer space minus the space occupied by the current cache of the power-saving message.

[0048] In this embodiment, the remaining amount of the pre-allocated buffer space can be updated and saved ...

Embodiment 2

[0065] Figure 4 Shown is a flow chart of the message caching method provided in Embodiment 2 of the present invention, which specifically includes the following processing steps:

[0066] Step 401, the access point receives a message to be transmitted to the first user terminal, and the first user terminal belongs to the access point.

[0067] Step 402 , judging whether the first user terminal is in a dormant state, if not in a dormant state but in an awake state, proceed to step 403 , and if in a dormant state, proceed to step 404 .

[0068] Step 403: Send the packet to the first user terminal.

[0069] Step 404 , judging whether the power saving queue depth corresponding to the first user terminal reaches the second depth threshold, if yes, proceed to step 405 , if not, proceed to step 406 .

[0070] Wherein, the second depth threshold is used to limit the maximum value of the power-saving queue depth corresponding to each user terminal.

[0071] Step 405: When the depth...

Embodiment 3

[0086]Based on the same inventive concept, according to the message caching method provided by the above-mentioned embodiments of the present invention, correspondingly, Embodiment 3 of the present invention also provides an access network, whose structural diagram is as follows Figure 5 shown, including:

[0087] a receiving unit 501, configured to receive a message to be transmitted to the first user terminal;

[0088] A buffer space determining unit 502, configured to determine the remaining amount of buffer space pre-allocated by the access point for buffering power-saving messages when the first user terminal is in a dormant state;

[0089] The cache processing unit 503 is configured to discard the message when the remaining amount is insufficient and the power-saving queue depth corresponding to the first user terminal reaches a first depth threshold, and the first depth threshold is the allocated The value of dividing the buffer space by the number of user terminals c...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a message caching method and an access point. The method is characterized in that: the access point receives a message to be transmitted to a first user terminal; when the first user terminal is in a dormant state, the access point is determined as the surplus of a cache space allocated by a cache electricity saving message in advance; when the surplus is not enough, and the depth of an electricity saving queue corresponding to the first user terminal reaches a first depth threshold value, the message is discarded; when the surplus is not enough, and the depth of the electricity saving queue corresponding to the first user terminal does not reach the first depth threshold value, the cache space is released by discarding an electricity saving message cached in the electricity saving queue corresponding to a second user terminal, and released cache space caches the message to the electricity saving queue corresponding to the first user terminal. By the technical scheme provided by the invention, the problem of system failure caused by a reason that lots of memory space is occupied by caching the electricity saving message is solved.

Description

technical field [0001] The invention relates to the technical field of power-saving message buffering in the technical field of wireless communication, in particular to a message buffering method and an access point. Background technique [0002] When a wireless user accesses WLAN (Wireless Local Area Networks, wireless local area network) through a user terminal, it does not need to be located in a specific location. In order to make full use of the characteristics of mobility, it will try to avoid some factors that restrict the location of use, including power supply, Therefore, user terminals are generally powered by batteries, but the power of batteries is limited, and the time for continuous power supply to user terminals is also limited. Therefore, while WLAN provides wireless users with convenient wireless access services, energy management has become a major issue in the network. An important performance indicator for large-scale applications. [0003] The 802.11 st...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W28/14H04W52/02H04L12/56
CPCY02B60/50Y02D30/70
Inventor 黄岁世
Owner RUIJIE NETWORKS CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products