A roaming method and system based on time scheduling
A technology of time and time period, which is applied in the roaming method and system field based on time scheduling, can solve the problems of low realizable rate and poor pertinence, and achieve the effect of maintaining accuracy, reducing power consumption, and improving user experience on the Internet
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0054] Such as figure 1As shown, it is a flowchart of a roaming method based on time scheduling in this embodiment, and the method includes:
[0055] S10: Collect and analyze the number of access requests of roaming users in different time periods;
[0056] In this step, the AC collects data on the number of access requests from roaming users around the clock (24 hours), analyzes and draws the distribution map of the number of user access requests in the time dimension, divides the time into time segments, and divides the time into time periods according to the number of user access requests. From more to less, divide the time level from high to low.
[0057] S20: configure the power of the access point and the quasi-access threshold of the number of users in each time period;
[0058] In this step, the AC collects and analyzes the data on the number of access requests from roaming users around the clock (24 hours) for each time period, that is, each time level, and divides ...
Embodiment 2
[0069] The difference between this embodiment and the previous embodiments is that this embodiment specifically introduces a method and system for collecting and analyzing the number of access requests of roaming users in different time periods.
[0070] Such as image 3 Shown is a flow chart of a roaming method based on time scheduling in this embodiment, and the collection and analysis of the number of roaming user access requests in different time periods includes the following steps:
[0071] S11: collect the number of access requests of roaming users in different time periods of the scene through the AP;
[0072] S12: Divide time levels according to the distribution of the number of user access requests over time.
[0073] In the step S12, the discretization processing method is used to divide the time level T 0 , T 1 ,...,T n , n is a natural number, the larger n is, the smaller the number of user access requests is, and the lower the time level represented; for exam...
Embodiment 3
[0080] The difference between this embodiment and Embodiment 2 is that this embodiment introduces a specific method for configuring access point power and user number quasi-access thresholds.
[0081] The power of the AP in the step S20 is configured according to the calculation result of the following formula:
[0082] P n =(100 / (n+1)%)*P max .
[0083] in,
[0084] P n for time class T n The power value to be configured at the time;
[0085] P max The maximum power value that can be configured for the AP.
[0086] That is, if the time level is T 1 , the AC configures the current power of the AP to be 50% of the maximum power value.
[0087] In the step S20, the quasi-access threshold of the number of users of the AP is configured according to the calculation result of the following formula:
[0088] R n =(100 / (n+1)%)*R max .
[0089] in,
[0090] R n for time class T n The required access threshold for the number of users to be configured;
[0091] R max Th...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


