A method and device for implementing roaming between wireless controllers AC

A technology of a wireless controller and an implementation method, applied in the field of data communication, can solve the problems of no backup of security entries and poor user experience, and achieve the effect of improving the roaming experience

Active Publication Date: 2020-01-21
BEIJING XINWANG RUIJIE NETWORK TECH CO LTD
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0018] Solution 1: Currently there is no standard to regulate the backup of security table items. If Option 1 is adopted, it is limited to the equipment of a single device manufacturer, using a private protocol for backup, that is, the roaming migration of wireless devices across manufacturers still cannot solve the problem, unless there is a cross-vendor standard backup protocol
[0019] Solution 2: The purpose of roaming is to improve the user's wireless experience. If you adopt solution 2, the user experience during roaming will be poor.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method and device for implementing roaming between wireless controllers AC
  • A method and device for implementing roaming between wireless controllers AC
  • A method and device for implementing roaming between wireless controllers AC

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0057] Optionally, based on the first embodiment of the present invention, in the second embodiment of the present invention, the trigger conditions include:

[0058] The STA is associated with the first access device, wherein the STA roams to the first access device after the second access device associates with the second AC corresponding to the second access device and acquires an IP address. An access device and the STA of the first AC corresponding to the first access device.

[0059] Optionally, based on the first embodiment of the present invention, in the third embodiment of the present invention, the trigger conditions include:

[0060] The security entry corresponding to the STA ages out, wherein the STA establishes an association with the first AC corresponding to the first access device and acquires an IP address on the first access device Roaming to the second access device and the second AC corresponding to the second access device after the security entry, reac...

no. 4 example

[0064] Optionally, based on the fourth embodiment of the present invention, in the fifth embodiment of the present invention, the step S109 specifically includes: when receiving the lease of the IP address of the associated STA on the associated STA reaches a set threshold An IP address renewal request is initiated, so that the associated STA renews the lease of the IP address of the associated STA according to the new lease of the IP address of the associated STA on the DHCP server.

[0065] Since the IP address allocated by the DHCP server after the STA renews the lease remains unchanged, DHCPSnooping on the access device AP sniffs the DHCP to obtain the IP address and learns security entries. The access device AP initiates DHCP to obtain the IP address instead of the STA. transparent. At this time, the leases of DHCP Server and Snooping will be refreshed, the STA’s lease remains the original one, and the STA’s communication is normal. Afterwards, when the STA reaches the 1 / ...

no. 6 example

[0072] Optionally, based on the sixth embodiment of the present invention, in the seventh embodiment of the present invention, the trigger conditions include:

[0073] The STA is associated with the first access device, wherein the STA roams to the first access device after the second access device associates with the second AC corresponding to the second access device and acquires an IP address. An access device and the STA of the first AC corresponding to the first access device.

[0074] Optionally, based on the sixth embodiment of the present invention, in the eighth embodiment of the present invention, the trigger conditions include:

[0075] The security entry corresponding to the STA ages out, wherein the STA establishes an association with the first AC corresponding to the first access device and acquires an IP address on the first access device Roaming to the second access device and the second AC corresponding to the second access device after the security entry, re...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention provides a method for realizing roaming between wireless controllers AC, applied to a first wireless local area network access device. The method comprises the following steps: detecting a trigger condition, and when the trigger condition is detected, determining whether a security table entry corresponding to an associated terminal STA exists within a preset time period; if no security table entry is detected, initiating an IP address releting request to a DHCP server according to the MAC address of the associated STA, so that the DHCP server establishes a new lease for the IP address of the associated STA; and establishing the security table entry corresponding to the associated STA according to the feedback of the DHCP server for the IP address releting request. Meanwhile, the embodiment of the invention further provides an apparatus for realizing roaming between wireless controllers AC. The method and apparatus provided by the embodiment of the invention have the beneficial effects of solving the problem that the access device has no terminal STA security table entry, resulting in that the terminal cannot access the network, and enabling the terminal to normally access the network while roaming among ACs.

Description

technical field [0001] The present invention relates to the field of data communication, in particular to a method and device for realizing roaming among wireless controllers AC. Background technique [0002] ROAM (roaming) is a function provided to meet the behavior of reassociation when wireless users move within the coverage of different APs (Access Points, wireless access points). The roaming function allows wireless users, namely STA (Station, Wireless workstations) continue to maintain the original IP communication and continue to enjoy all application services during the mobile process. For users, the roaming behavior is transparent, that is, the STA will not perceive the occurrence of roaming during the roaming process. [0003] DHCP Snooping means DHCP snooping. By snooping on the DHCP (DynamicHost Configuration Protocol, Dynamic Host Configuration Protocol) interactive message between the DHCP Client and the server, the record and monitoring of the user's IP addres...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04W8/26H04W8/08
CPCH04W8/08H04W8/26
Inventor 黄国华
Owner BEIJING XINWANG RUIJIE NETWORK TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products