CN113645669A - Network access control method and system for wireless terminal - Google Patents

Network access control method and system for wireless terminal Download PDF

Info

Publication number
CN113645669A
CN113645669A CN202010393710.0A CN202010393710A CN113645669A CN 113645669 A CN113645669 A CN 113645669A CN 202010393710 A CN202010393710 A CN 202010393710A CN 113645669 A CN113645669 A CN 113645669A
Authority
CN
China
Prior art keywords
wireless
wireless access
access points
access point
target
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010393710.0A
Other languages
Chinese (zh)
Inventor
金磊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou Ezviz Software Co Ltd
Original Assignee
Hangzhou Ezviz Software Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou Ezviz Software Co Ltd filed Critical Hangzhou Ezviz Software Co Ltd
Priority to CN202010393710.0A priority Critical patent/CN113645669A/en
Publication of CN113645669A publication Critical patent/CN113645669A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • H04W36/0005Control or signalling for completing the hand-off
    • H04W36/0083Determination of parameters used for hand-off, e.g. generation or modification of neighbour cell lists
    • H04W36/0085Hand-off measurements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • H04W36/24Reselection being triggered by specific parameters
    • H04W36/30Reselection being triggered by specific parameters by measured or perceived connection quality data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/20Selecting an access point

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The application discloses a network access control method and system for a wireless terminal. The method is applied to a wireless controller and comprises the following steps: determining a target wireless access point which meets the optimal condition of wireless connection with a wireless terminal from a plurality of wireless access points; adding the wireless terminal into blacklists of other wireless access points respectively, wherein the other wireless access points comprise wireless access points except the target wireless access point in the plurality of wireless access points, and the blacklists are used for preventing wireless connection; and when the target wireless access point is detected to meet the preset abandon condition, removing the wireless terminal from the blacklist of other wireless access points.

Description

Network access control method and system for wireless terminal
Technical Field
The present application relates to the field of internet, and in particular, to a network access control method and system for a wireless terminal.
Background
With the development of the internet and various intelligent terminals, internet support at any time and any place is unavailable in production and life, and the comprehensive coverage of the network is gradually the basic condition like water and electricity supply in public or private activity places.
For example, in a common or civil building, a plurality of Wireless terminals usually Access the internet through a Wireless Access Point (Wireless AP, abbreviated as Wireless AP), but since the power of one Wireless AP is limited and the network coverage is usually not ideal, an effect of covering as comprehensively as possible can be achieved by installing a plurality of Wireless APs, specifically, in a civil residence, one Wireless AP can be installed in each room, thereby achieving more comprehensive network coverage.
However, in the case of multiple wireless APs, it is very important how to maintain access to a wireless AP with relatively good signal quality and maintain network connection. Therefore, a network access control method for a wireless terminal is needed to maintain network connection and maintain relatively good wireless signal quality as possible.
Disclosure of Invention
The embodiment of the application provides a network access control method for a wireless terminal, which can enable the wireless terminal to keep network connection and keep the network connection with relatively better wireless signal quality as much as possible.
The embodiment of the application provides a network access control system for a wireless terminal, which can enable the wireless terminal to keep network connection and keep the network connection with relatively better wireless signal quality as much as possible.
The embodiment of the application provides a network access control device for a wireless terminal, which can enable the wireless terminal to keep network connection and keep the network connection with relatively better wireless signal quality as much as possible.
In order to solve the above technical problem, the embodiment of the present application is implemented as follows:
the embodiment of the application adopts the following technical scheme:
a network access control method for a wireless terminal is applied to a wireless controller and comprises the following steps:
determining a target wireless access point which meets the optimal condition of wireless connection with a wireless terminal from a plurality of wireless access points;
adding the wireless terminal into blacklists of other wireless access points respectively, wherein the other wireless access points comprise wireless access points except the target wireless access point in the plurality of wireless access points, and the blacklists are used for preventing wireless connection;
and when detecting that the target wireless access point meets a preset abandon condition, removing the wireless terminal from the blacklist of other wireless access points.
A network access control system for a wireless terminal, comprising: a wireless controller, a plurality of wireless access points, and a wireless terminal, wherein,
the wireless controller is configured to, in response to the user input,
determining a target wireless access point which meets the optimal condition of wireless connection with the wireless terminal from the plurality of wireless access points;
adding the wireless terminal into blacklists of other wireless access points respectively, wherein the other wireless access points comprise wireless access points except the target wireless access point in the plurality of wireless access points, and the blacklists are used for preventing wireless connection;
and when detecting that the target wireless access point meets a preset abandon condition, removing the wireless terminal from the blacklist of other wireless access points.
A network access control device for a wireless terminal is applied to a wireless controller and comprises the following components: a determination unit, an addition unit, and a removal unit, wherein,
the determining unit is used for determining a target wireless access point which meets the optimal wireless connection condition with the wireless terminal from the plurality of wireless access points;
the adding unit is used for respectively adding the wireless terminal into blacklists of other wireless access points, the other wireless access points comprise wireless access points except the target wireless access point in the plurality of wireless access points, and the blacklists are used for preventing wireless connection;
the removing unit is used for removing the wireless terminal from the blacklist of other wireless access points when the target wireless access point is detected to meet the preset abandon condition.
According to the technical scheme provided by the embodiment, the wireless controller can determine the target wireless access point which meets the optimal wireless connection condition with the wireless terminal from the controlled wireless access points, and accordingly, the wireless terminal can be respectively added into the blacklists of other wireless access points except the target wireless access point, so that the wireless terminal can keep better network connection. When detecting that the target wireless access point meets the preset abandon condition, the wireless terminal can be removed from the blacklists of other wireless access points, so that the wireless terminal can keep network connection with one of the other wireless access points, and relatively better network connection is kept.
That is, by preventing the wireless terminal from being added to the wireless access point with the non-optimal wireless connection condition, the wireless terminal can maintain a better wireless connection, and if the wireless access point with the optimal connection condition meets the abandon condition, the wireless terminal can maintain the network connection by removing the wireless terminal from the blacklist, and maintain the relatively better network connection again.
Drawings
In order to more clearly illustrate the embodiments or prior art solutions of the present application, the drawings needed for describing the embodiments or prior art will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments described in the present application, and that other drawings can be obtained by those skilled in the art without inventive exercise.
Fig. 1 is a flowchart illustrating a network access control method for a wireless terminal according to an embodiment of the present application;
fig. 2 is a schematic diagram of a connection relationship between a wireless controller and a wireless access point according to an embodiment of the present application;
fig. 3 is a schematic application scenario diagram of a network access control method for a wireless terminal according to an embodiment of the present application;
fig. 4 is a schematic structural diagram of a network access control apparatus for a wireless terminal according to an embodiment of the present application;
fig. 5 is a schematic structural diagram of a network access control system for a wireless terminal according to an embodiment of the present application;
fig. 6 is a schematic structural diagram of an electronic device according to an embodiment of the present application.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the technical solutions of the present application will be described in detail and completely with reference to the following embodiments and accompanying drawings. It should be apparent that the described embodiments are only some of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
The technical solutions provided by the embodiments of the present application are described in detail below with reference to the accompanying drawings.
Example 1
The present embodiment provides a network access control method for a wireless terminal, which enables the wireless terminal to maintain network connection and maintain network connection with relatively good wireless signal quality as much as possible. It is assumed that the execution subject may be a Wireless Controller, specifically, a Wireless Access Point Controller (Wireless Access Point Controller), which may be a network device for centralized controlling Wireless Access points, and is a core of the Wireless network and responsible for managing all Wireless Access points in the Wireless network. And a wireless access point (wireless AP), which may be connected to a wireless terminal to enable the wireless terminal to access the internet, in this specification, the wireless controller is referred to as AC for short, and the wireless AP is referred to as AP for short. The specific flow diagram of this embodiment is shown in fig. 1, and includes:
step 102: and determining a target wireless access point which meets the optimal wireless connection condition with the wireless terminal from the plurality of wireless access points.
As described above, in order to achieve the full coverage of the network, a plurality of APs are usually installed and controlled by the AC. Fig. 2 is a schematic diagram of a connection relationship between a wireless controller and a wireless access point, where the left and right diagrams are two connection relationships, respectively.
Specifically, in the left drawing, the AC and each AP are independent from each other, the AC and each AP may be connected by a wired manner (indicated by a solid line), and the AC may implement network control on each AP. In the right drawing, an AC and one of the APs are assembled in one device, that is, the device has both functions of the AC and the AP, and the AC is connected with the other APs through the APs in the device itself in a wireless manner (indicated by dotted lines), so as to control the APs. For example, a Mesh network, i.e., a wireless Mesh network, is a dynamic network architecture that can be continuously expanded, any two devices can maintain wireless interconnection, in an actual Mesh network, a device having an AC function may be referred to as a master device, and the other devices may be referred to as slave devices, and an AC in the master device may play a role in controlling all APs.
Fig. 3 is a schematic diagram illustrating an application scenario of the network access control method for a wireless terminal. In which multiple APs may be located in different rooms, such as a family of houses, and 3 APs are located in different rooms. The wireless terminals (terminals connected to the internet by wireless) may include a door lock, a television, a camera, and a curtain, and the positions of the wireless terminals are usually fixed and unchangeable, so it is necessary to maintain connection to a better network, which not only ensures network experience, but also makes full use of network resources, i.e. the wireless terminals in this specification may be fixed wireless terminals.
Taking the door lock in fig. 3 as an example, the door lock may be an intelligent door lock that needs to access the internet, and it can be understood that, due to the distance between the door lock and each AP and the consideration of shielding of wireless signals, it is desirable to maintain a wireless network with the AP1, that is, the AP1 may be the most probable choice for maintaining the best quality of wireless signals between the door lock and the door lock. Similarly, other wireless terminals may have their own optimal selection, such as the most optimal selection for tv is likely AP1, and certainly is likely AP2, while the most optimal selection for cameras is AP2, and the most optimal selection for blinds is AP 3.
Therefore, in this step, the AC can determine a target AP satisfying the optimal condition for wireless connection with the wireless terminal from the plurality of APs. Specifically, the optimal condition for wireless connection may include that the wireless signal quality is optimal, and in this step, the wireless signal quality between different wireless access points and each AP may be detected from multiple APs, so as to determine an AP corresponding to the optimal wireless signal quality, and determine the AP as the target AP.
Specifically, the AC may control the wireless terminal to connect to different APs respectively, for example, taking the door lock in fig. 3 as an example, the door lock may be network-connected to the AP1, the AP2, and the AP3 respectively by adding the door lock to a blacklist of different APs, so as to detect the wireless signal quality between different APs and the door lock respectively, for example, the quality of the wireless signal may be determined individually or comprehensively by one or more of the wireless signal strength dBm, the wireless transmission rate Mbps, the ping value, and the like, and the optimal wireless signal quality is determined by using the quality of the wireless signal, so as to determine the AP corresponding to the optimal wireless signal quality as the target AP.
In practical application, the optimal condition for wireless connection may further include that the wireless transmission distance is the shortest, and in this step, the wireless connection distances between different APs and the wireless terminal may be detected from the multiple APs, and the AP corresponding to the shortest wireless connection distance is determined as the target AP.
Specifically, the AC may control the wireless terminal to connect with different APs respectively, and obtain wireless signal strengths between the wireless terminal and different APs respectively, so that the wireless terminal in the room may be located based on a propagation model method of the wireless signal strengths, a fingerprint identification method, and the like. Therefore, the wireless connection distance between each AP and the wireless terminal can be obtained, and accordingly the AP with the shortest wireless connection distance between the AP and the wireless terminal can be used as the target AP.
In practical application, the target AP meeting the optimal condition of wireless connection with the wireless terminal may be determined by combining the two manners. For example, the results determined by the two methods may be compared comprehensively, if the results are consistent, the target AP may be determined directly, and if the results are inconsistent, a certain result may be set as a first choice, and the like.
Step 104: and respectively adding the wireless terminal into blacklists of other wireless access points.
Having determined the optimal selection of APs, i.e., the target AP, for the wireless terminal in the foregoing steps, the wireless terminal may then try to maintain network connectivity with the optimally selected target AP. The connection maintaining mode can be realized by rejecting the connection establishment between the wireless terminal and other APs.
Specifically, a blacklist for preventing wireless connection may be created for the AP, and a wireless terminal belonging to the blacklist cannot establish network connection with the AP. For example, in fig. 3, a black list may be created for each AP, and the wireless terminal may be added to the black list to control that the wireless terminal cannot establish a network connection relationship with the AP, so that the wireless terminal is added to a desired target AP.
For example, in fig. 3, if it is determined that the target AP meeting the optimal condition for wireless connection with the door lock is AP1, the door lock may be added to blacklists of other APs, where the other APs may be APs other than the target AP, among the multiple APs. In fig. 3, if the wireless terminal is a door lock and the target AP is AP1, the other APs may be AP2 and AP3, that is, the door lock may be added to the blacklists of AP2 and AP3, respectively, so that the door lock and AP1 can keep connecting with AP1 when accessing the internet. For example, if the wireless network module of the wireless device is restarted or disconnected, the wireless device can be connected to the desired AP again.
Similarly, if it is determined that the target AP satisfying the optimal condition for wireless connection with the camera is AP2, the camera may be added to the black list of AP1 and AP 3. The blacklist may be added by adding one or all of an IP (Internet Protocol, Protocol for interconnecting networks) and a MAC (Media Access Control Address) of the wireless terminal to the blacklist.
Step 106: and when detecting that the target wireless access point meets the preset abandon condition, removing the wireless terminal from the blacklist of other wireless access points.
In practical applications, the AP may be disconnected, such as power off, damage, and the like. Therefore, to further enable the wireless terminal to maintain the network connection, when a target AP is detected to be dropped, the wireless terminal may be removed from the blacklist of other APs so that the wireless terminal may connect to one of the other APs. For example, in fig. 3, if the AC detects that the AP1 is unlinked, the door lock may be removed from the blacklist of AP2 and AP3 so that the door lock may be connected to one of the AP2 or AP3 to maintain network connectivity.
That is, the abandon condition may be preset as an AP loss, and when the target AP loss is detected, it may be determined that the preset abandon condition is satisfied, and accordingly, the wireless terminal may be removed from the blacklist of other APs.
In practical applications, the AP may have too low wireless signal transmission power for its own reason, so that the AP no longer has an optimal wireless connection condition with the wireless terminal. To further enable the wireless terminal to maintain network connectivity and connect to a relatively good network, the wireless terminal may be removed from the blacklist of other APs when the wireless signal transmission power of the target AP is detected to be below a threshold. Still referring to fig. 3, if the AC detects that the wireless transmission power of the AP1 is below 30% of the maximum power, the door lock may be removed from the blacklist of AP2 and AP3 so that the door lock may select one of the AP2 or AP3 when disconnecting from the AP1 or re-accessing the network, thereby maintaining the network connection and at a relatively good network quality.
That is, the abandoning condition may be preset such that the wireless transmission power of the AP is lower than the proportional threshold of the highest power, and when it is detected that the target AP satisfies the condition, it may be determined that the preset abandoning condition is satisfied, and accordingly, the wireless terminal may be removed from the blacklist of other APs.
According to the foregoing, the target AP may satisfy the predetermined drop condition due to the loss of association, thereby causing the wireless terminal to connect to other APs. In practical applications, the reason for powering off the target AP may be the power-off operation of the user, and it is likely that the target AP will be powered on again in a short time, so the powered-on AP1 is also likely to be the optimal choice for the wireless terminal.
Therefore, in order to enable the wireless terminal to maintain a better wireless connection, the method may further include: and when detecting that the target wireless access point recovers the optimal wireless connection condition, adding the wireless terminal into the blacklist of other wireless access points again.
Specifically, after detecting that the target AP is lost and the wireless terminal is removed from the blacklist of other APs, the AC may further detect whether the target AP is connected again at regular time, and detect whether the optimal condition of wireless connection between the target AP and the wireless terminal is recovered, and if so, the wireless terminal may be added to the blacklist of other APs again, so that the wireless terminal is connected to the target AP again.
For example, in fig. 3, if the AC detects that the AP1 is disconnected, the IP and/or MAC of the door lock may be removed from the blacklist of AP2 and AP3 so that the door lock may connect to both APs to maintain network connectivity. After that, whether the AP1 restores connection with the AC can be detected regularly, if so, whether the optimal condition of wireless connection between the AP1 and the door lock is satisfied again can be detected, and if so, the IP and/or MAC address of the door lock can be added into the AP2 and the AP3 again, so that the door lock can maintain better network connection with the AP 1.
In practical applications, if the target AP still does not recover the optimal conditions for wireless connection for a period of time, the AP location or position may change, for example, in fig. 3, if the AP1 is damaged, the user is forced to change the AP installation mode, and the positions of the AP2 and the AP3 may be adjusted to achieve the network coverage as much as possible. Therefore, it is necessary to find a target AP satisfying the optimal condition for wireless connection for the wireless terminal again, and then the AC may prompt the user to adjust or modify the connection of the wireless terminal after a preset period of time, that is, step 102 and step 104 may be executed again.
According to the method provided by the embodiment, the wireless controller can determine the target wireless access point which satisfies the optimal wireless connection condition with the wireless terminal from the plurality of controlled wireless access points, and accordingly, the wireless terminal can be respectively added into the blacklists of other wireless access points except the target wireless access point, so that the wireless terminal can keep better network connection. When detecting that the target wireless access point meets the preset abandon condition, the wireless terminal can be removed from the blacklists of other wireless access points, so that the wireless terminal can keep network connection with one of the other wireless access points, and relatively better network connection is kept.
That is, by preventing the wireless terminal from being added to the wireless access point with the non-optimal wireless connection condition, the wireless terminal can maintain a better wireless connection, and if the wireless access point with the optimal connection condition meets the abandon condition, the wireless terminal can maintain the network connection by removing the wireless terminal from the blacklist, and maintain the relatively better network connection again.
Example 2
Based on the same concept, embodiment 2 of the present application provides a network access control apparatus for a wireless terminal, which enables the wireless terminal to maintain network connection and maintain network connection with relatively good signal quality as much as possible. The schematic structural diagram of the device is shown in fig. 4, and the device comprises: a determination unit 202, an addition unit 204, and a removal unit 206, wherein,
a determining unit 202, configured to determine, from the multiple wireless access points, a target wireless access point that satisfies an optimal condition for wireless connection with the wireless terminal;
the adding unit 204 may be configured to add the wireless terminal to blacklists of other wireless access points, where the other wireless access points include wireless access points other than the target wireless access point in the multiple wireless access points, and the blacklists are used to prevent wireless connection;
the removing unit 206 may be configured to remove the wireless terminal from the blacklist of other wireless access points when it is detected that the target wireless access point meets the preset abandon condition.
In an embodiment, the adding unit 204 may further be configured to:
and when the target wireless access point is detected to recover the optimal wireless connection condition, adding the wireless terminal into the blacklist of other wireless access points again.
In one embodiment, the wireless connection optimization condition may include that the wireless signal quality is optimal, then
A determining unit 202, which may be configured to:
detecting wireless signal quality between different wireless access points and a wireless terminal respectively from a plurality of wireless access points;
and determining the wireless access point corresponding to the optimal wireless signal quality as a target wireless access point.
In one embodiment, the optimal condition for the wireless connection may include that the wireless connection is closest, then
A determining unit 202, which may be configured to:
detecting wireless connection distances between different wireless access points and a wireless terminal respectively from a plurality of wireless access points;
and determining the wireless access point corresponding to the shortest wireless connection distance as a target wireless access point.
According to the device provided by the above embodiment, the wireless controller may determine, from the plurality of controlled wireless access points, a target wireless access point that satisfies the optimal condition for wireless connection with the wireless terminal, and accordingly, the wireless terminal may be added to the blacklists of other wireless access points except the target wireless access point, so that the wireless terminal may maintain a better network connection. When detecting that the target wireless access point meets the preset abandon condition, the wireless terminal can be removed from the blacklists of other wireless access points, so that the wireless terminal can keep network connection with one of the other wireless access points, and relatively better network connection is kept.
That is, by preventing the wireless terminal from being added to the wireless access point with the non-optimal wireless connection condition, the wireless terminal can maintain a better wireless connection, and if the wireless access point with the optimal connection condition meets the abandon condition, the wireless terminal can maintain the network connection by removing the wireless terminal from the blacklist, and maintain the relatively better network connection again.
Example 3
Based on the same concept, embodiment 3 of the present application provides a network access control system for a wireless terminal, which enables the wireless terminal to maintain network connection and maintain network connection with relatively good signal quality as much as possible. The schematic structural diagram of the system is shown in fig. 5, and in practice, but not limited to, three structures in the diagram include: a wireless controller 302, a plurality of wireless access points 304, and a wireless terminal 306, wherein,
a wireless controller 302 operable to:
determining a target wireless access point which meets the optimal wireless connection condition with the wireless terminal 306 from the plurality of wireless access points 304;
adding the wireless terminal 306 to a blacklist of other wireless access points, including wireless access points other than the target wireless access point, in the plurality of wireless access points 304, respectively, wherein the blacklist can be used for preventing wireless connection;
when detecting that the target wireless access point satisfies the preset abandon condition, the wireless terminal 306 is removed from the blacklist of other wireless access points.
In one embodiment, the wireless controller 302 may be further configured to:
and when the target wireless access point is detected to recover the optimal wireless connection condition, adding the wireless terminal into the blacklist of other wireless access points again.
In one embodiment, the wireless connection optimization condition may include that the wireless signal quality is optimal, then
A wireless controller 302 operable to:
detecting wireless signal quality between different wireless access points and the wireless terminal respectively from a plurality of wireless access points 304;
and determining the wireless access point corresponding to the optimal wireless signal quality as a target wireless access point.
In one embodiment, the optimal condition for the wireless connection may include that the wireless connection is closest, then
A wireless controller 302 operable to:
detecting wireless connection distances between different wireless access points and the wireless terminal respectively from the plurality of wireless access points 304;
and determining the wireless access point corresponding to the shortest wireless connection distance as a target wireless access point.
In one embodiment, the wireless controller 302 and the wireless access point 304 are assembled in one physical device.
Specifically, each wireless access point 304 may be equipped with a wireless controller 302, for example, according to fig. 2 described above, the wireless controller AC and the wireless access point AP may be equipped in a physical device, and in this case, the physical device has both AC and AP functions. In implementing the present solution, the radio controller 302 in one entity device may be selected as the execution subject.
For example, similar to fig. 3, there are 3 entity devices, each of which integrates the wireless controller 302 and the wireless access point 304, and the wireless controller 302 in one entity device may be used as an execution subject to achieve the network access control effect for the wireless terminal provided in this specification, while the wireless controller 302 in the other two entity devices is used as a backup. In addition, the radio controller 303 in another entity device can be switched as an execution subject according to an operation instruction of a user.
As shown in fig. 5, there are at least three system configurations, one is that a wireless controller 302 and a plurality of wireless access points 304 are independent from each other, and one wireless controller 302 controls a plurality of wireless access points 304; another is that a wireless controller 302 and a wireless access point 304 are assembled in one physical device, controlling the other wireless access points 304; in addition, each entity device may be equipped with a wireless controller 302 and a wireless access point 304, and when executing the scheme, one wireless controller 302 may be used as an execution subject, and the other two wireless controllers may be used as spares.
According to the system provided by the embodiment, the wireless controller can determine the target wireless access point which satisfies the optimal wireless connection condition with the wireless terminal from the plurality of controlled wireless access points, and accordingly, the wireless terminal can be respectively added into the blacklists of other wireless access points except the target wireless access point, so that the wireless terminal can maintain better network connection. When detecting that the target wireless access point meets the preset abandon condition, the wireless terminal can be removed from the blacklists of other wireless access points, so that the wireless terminal can keep network connection with one of the other wireless access points, and relatively better network connection is kept.
That is, by preventing the wireless terminal from being added to the wireless access point with the non-optimal wireless connection condition, the wireless terminal can maintain a better wireless connection, and if the wireless access point with the optimal connection condition meets the abandon condition, the wireless terminal can maintain the network connection by removing the wireless terminal from the blacklist, and maintain the relatively better network connection again.
Fig. 6 is a schematic structural diagram of an electronic device according to an embodiment of the present application. On the hardware level, the electronic device comprises a processor and optionally an internal bus, a network interface and a memory. The Memory may include a Memory, such as a Random-Access Memory (RAM), and may further include a non-volatile Memory, such as at least 1 disk Memory. Of course, the electronic device may also include hardware required for other services.
The processor, the network interface, and the memory may be connected to each other via an internal bus, which may be an ISA (Industry Standard Architecture) bus, a PCI (Peripheral Component Interconnect) bus, an EISA (Extended Industry Standard Architecture) bus, or the like. The bus may be divided into an address bus, a data bus, a control bus, etc. For ease of illustration, only one double-headed arrow is shown in FIG. 6, but that does not indicate only one bus or one type of bus.
And the memory is used for storing programs. In particular, the program may include program code comprising computer operating instructions. The memory may include both memory and non-volatile storage and provides instructions and data to the processor.
The processor reads the corresponding computer program from the non-volatile memory into the memory and then runs the computer program to form a network access control device or system for the wireless terminal on a logic level. The processor is used for executing the program stored in the memory and is specifically used for executing the following operations:
determining a target wireless access point which meets the optimal condition of wireless connection with a wireless terminal from a plurality of wireless access points;
adding the wireless terminal into blacklists of other wireless access points respectively, wherein the other wireless access points comprise wireless access points except the target wireless access point in the plurality of wireless access points, and the blacklists are used for preventing wireless connection;
and when detecting that the target wireless access point meets a preset abandon condition, removing the wireless terminal from the blacklist of other wireless access points.
The electronic device can be applied to a wireless controller.
The method performed by the network access control device or system for a wireless terminal according to the embodiments shown in fig. 4 or fig. 5 may be applied to or implemented by a processor. The processor may be an integrated circuit chip having signal processing capabilities. In implementation, the steps of the above method may be performed by integrated logic circuits of hardware in a processor or instructions in the form of software. The Processor may be a general-purpose Processor, including a Central Processing Unit (CPU), a Network Processor (NP), and the like; but also Digital Signal Processors (DSPs), Application Specific Integrated Circuits (ASICs), Field Programmable Gate Arrays (FPGAs) or other Programmable logic devices, discrete Gate or transistor logic devices, discrete hardware components. The various methods, steps, and logic blocks disclosed in the embodiments of the present application may be implemented or performed. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
The steps of the method disclosed in connection with the embodiments of the present application may be directly implemented by a hardware decoding processor, or implemented by a combination of hardware and software modules in the decoding processor. The software module may be located in ram, flash memory, rom, prom, or eprom, registers, etc. storage media as is well known in the art. The storage medium is located in a memory, and a processor reads information in the memory and completes the steps of the method in combination with hardware of the processor.
The electronic device may further perform the functions of the network access control apparatus or system for a wireless terminal provided in the embodiments shown in fig. 4 or fig. 5 in the embodiment shown in fig. 6, which are not described herein again in this embodiment of the present application.
Embodiments of the present application also provide a computer-readable storage medium storing one or more programs, where the one or more programs include instructions, which, when executed by an electronic device including multiple application programs, enable the electronic device to perform the method performed by the network access control apparatus or system for a wireless terminal in the embodiment shown in fig. 4 or fig. 5, and are specifically configured to perform:
determining a target wireless access point which meets the optimal condition of wireless connection with a wireless terminal from a plurality of wireless access points;
adding the wireless terminal into blacklists of other wireless access points respectively, wherein the other wireless access points comprise wireless access points except the target wireless access point in the plurality of wireless access points, and the blacklists are used for preventing wireless connection;
and when detecting that the target wireless access point meets a preset abandon condition, removing the wireless terminal from the blacklist of other wireless access points.
The computer readable storage medium may be applied to a wireless controller.
The systems, devices, modules or units illustrated in the above embodiments may be implemented by a computer chip or an entity, or by a product with certain functions. One typical implementation device is a computer. In particular, the computer may be, for example, a personal computer, a laptop computer, a cellular telephone, a camera phone, a smartphone, a personal digital assistant, a media player, a navigation device, an email device, a game console, a tablet computer, a wearable device, or a combination of any of these devices.
For convenience of description, the above devices or systems are described separately with their functions divided into various units. Of course, the functions of the units may be implemented in one or more software and/or hardware when implementing the present application.
As will be appreciated by one skilled in the art, embodiments of the present application may be provided as a method, apparatus, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
In a typical configuration, a computing device includes one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
The memory may include forms of volatile memory in a computer readable medium, Random Access Memory (RAM) and/or non-volatile memory, such as Read Only Memory (ROM) or flash memory (flash RAM). Memory is an example of a computer-readable medium.
Computer-readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), Static Random Access Memory (SRAM), Dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), Read Only Memory (ROM), Electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), Digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape magnetic disk storage or other magnetic storage devices, or any other non-transmission medium that can be used to store information that can be accessed by a computing device. As defined herein, a computer readable medium does not include a transitory computer readable medium such as a modulated data signal and a carrier wave.
It should also be noted that the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
As will be appreciated by one skilled in the art, embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The application may be described in the general context of computer-executable instructions, such as program modules, being executed by a computer. Generally, program modules include routines, programs, objects, components, data structures, etc. that perform particular tasks or implement particular abstract data types. The application may also be practiced in distributed computing environments where tasks are performed by remote processing devices that are linked through a communications network. In a distributed computing environment, program modules may be located in both local and remote computer storage media including memory storage devices.
The embodiments in the present application are described in a progressive manner, and the same and similar parts among the embodiments can be referred to each other, and each embodiment focuses on the differences from the other embodiments. In particular, for the system embodiment, since it is substantially similar to the method embodiment, the description is simple, and for the relevant points, reference may be made to the partial description of the method embodiment.
The above description is only an example of the present application and is not intended to limit the present application. Various modifications and changes may occur to those skilled in the art. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present application should be included in the scope of the claims of the present application.

Claims (10)

1. A network access control method for a wireless terminal, wherein the method is applied to a wireless controller, and comprises the following steps:
determining a target wireless access point which meets the optimal condition of wireless connection with a wireless terminal from a plurality of wireless access points;
adding the wireless terminal into blacklists of other wireless access points respectively, wherein the other wireless access points comprise wireless access points except the target wireless access point in the plurality of wireless access points, and the blacklists are used for preventing wireless connection;
and when detecting that the target wireless access point meets a preset abandon condition, removing the wireless terminal from the blacklist of other wireless access points.
2. The method of claim 1, wherein the method further comprises:
and when the target wireless access point is detected to recover the optimal wireless connection condition, adding the wireless terminal into the blacklist of the other wireless access points again.
3. The method of claim 2, wherein the radio connection optimization condition comprises a radio signal quality optimization, then
Determining a target wireless access point which meets the optimal condition of wireless connection with a wireless terminal from a plurality of wireless access points, wherein the method comprises the following steps:
detecting wireless signal quality between different wireless access points and a wireless terminal respectively from a plurality of wireless access points;
and determining the wireless access point corresponding to the optimal wireless signal quality as a target wireless access point.
4. The method of claim 2, wherein the optimal condition for the wireless connection comprises a wireless connection being closest in distance
Determining a target wireless access point which meets the optimal condition of wireless connection with a wireless terminal from a plurality of wireless access points, wherein the method comprises the following steps:
detecting wireless connection distances between different wireless access points and a wireless terminal respectively from a plurality of wireless access points;
and determining the wireless access point corresponding to the shortest wireless connection distance as a target wireless access point.
5. A network access control system for a wireless terminal, comprising: a wireless controller, a plurality of wireless access points, and a wireless terminal, wherein,
the wireless controller is used for controlling the wireless communication system,
determining a target wireless access point which meets the optimal condition of wireless connection with the wireless terminal from the plurality of wireless access points;
adding the wireless terminal into blacklists of other wireless access points respectively, wherein the other wireless access points comprise wireless access points except the target wireless access point in the plurality of wireless access points, and the blacklists are used for preventing wireless connection;
and when detecting that the target wireless access point meets a preset abandon condition, removing the wireless terminal from the blacklist of other wireless access points.
6. The system of claim 5, wherein the wireless controller is further configured to:
and when the target wireless access point is detected to recover the optimal wireless connection condition, adding the wireless terminal into the blacklist of the other wireless access points again.
7. The system of claim 6, wherein the optimal condition for the wireless connection comprises the wireless connection being closest in distance
The wireless controller is configured to:
detecting wireless connection distances between different wireless access points and wireless terminals respectively from the plurality of wireless access points;
and determining the wireless access point corresponding to the shortest wireless connection distance as a target wireless access point.
8. The system of claim 5, wherein the wireless controller and the wireless access point are assembled in one physical device.
9. An electronic device, comprising:
a processor; and
a memory arranged to store computer-executable instructions that, when executed, cause the processor to:
determining a target wireless access point which meets the optimal condition of wireless connection with a wireless terminal from a plurality of wireless access points;
adding the wireless terminal into blacklists of other wireless access points respectively, wherein the other wireless access points comprise wireless access points except the target wireless access point in the plurality of wireless access points, and the blacklists are used for preventing wireless connection;
and when detecting that the target wireless access point meets a preset abandon condition, removing the wireless terminal from the blacklist of other wireless access points.
10. A computer-readable storage medium storing one or more programs that, when executed by an electronic device including a plurality of application programs, cause the electronic device to:
determining a target wireless terminal target wireless access point which meets the optimal wireless connection condition with a wireless terminal from a plurality of wireless access points;
adding the wireless terminal into blacklists of other wireless access points respectively, wherein the other wireless access points comprise wireless access points except the target wireless access point in the plurality of wireless access points, and the blacklists are used for preventing wireless connection;
and when the target wireless access point is detected to meet the preset abandon condition, removing the wireless terminal from the blacklist of other wireless access points.
CN202010393710.0A 2020-05-11 2020-05-11 Network access control method and system for wireless terminal Pending CN113645669A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010393710.0A CN113645669A (en) 2020-05-11 2020-05-11 Network access control method and system for wireless terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010393710.0A CN113645669A (en) 2020-05-11 2020-05-11 Network access control method and system for wireless terminal

Publications (1)

Publication Number Publication Date
CN113645669A true CN113645669A (en) 2021-11-12

Family

ID=78415433

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010393710.0A Pending CN113645669A (en) 2020-05-11 2020-05-11 Network access control method and system for wireless terminal

Country Status (1)

Country Link
CN (1) CN113645669A (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102067678A (en) * 2008-03-26 2011-05-18 高通股份有限公司 Device managed access point lists in wireless communications
US20150223160A1 (en) * 2014-01-31 2015-08-06 Qualcomm Incorporated Directing network association of a wireless client
CN109246784A (en) * 2018-11-02 2019-01-18 新华三技术有限公司 A kind of roaming control method and device
KR20190049449A (en) * 2017-10-31 2019-05-09 한국시스템보증(주) Apparatus and method for identifying a user terminal and blocking access to a wireless access point

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102067678A (en) * 2008-03-26 2011-05-18 高通股份有限公司 Device managed access point lists in wireless communications
US20150223160A1 (en) * 2014-01-31 2015-08-06 Qualcomm Incorporated Directing network association of a wireless client
KR20190049449A (en) * 2017-10-31 2019-05-09 한국시스템보증(주) Apparatus and method for identifying a user terminal and blocking access to a wireless access point
CN109246784A (en) * 2018-11-02 2019-01-18 新华三技术有限公司 A kind of roaming control method and device

Similar Documents

Publication Publication Date Title
RU2619596C2 (en) Method and device for adjusting router signal power
US9532359B2 (en) Resource allocation method and device
US11419181B2 (en) Device control method and apparatus, storage medium, processor, and terminal
US11284347B2 (en) Activation system information transmission method, apparatus, and device
RU2598597C1 (en) Improved expanded prohibition of access classes
CN103765948A (en) Method, apparatus and system for selecting mobility management entities
KR20190047598A (en) Method and device of transmitting data
US9736711B2 (en) Methods and devices for adjusting signal strength of router
EP3629632A1 (en) Base station control method and apparatus, and device
JP2020520187A (en) Method and terminal for determining the reason for establishment
JP6085719B2 (en) User notification method, user notification device, program, and recording medium
CN114007241A (en) ZigBee system, gateway equipment thereof, gateway switching method and device
EP4092529A1 (en) Service scheduling method and apparatus, electronic device, and storage medium
CN113261249A (en) Data transmission method, related equipment and computer storage medium
CN113645669A (en) Network access control method and system for wireless terminal
WO2016165674A1 (en) Trusted environment operating method and device for terminal
EP3280091B1 (en) Method, apparatus and system for establishing interface between vnfms
TWI778614B (en) Method, terminal, base station, and computer-readable storage medium for determining and indicating access parameters
CN106028303B (en) Intelligent device discovery method and device
CN111836385A (en) Method and device for processing network beacon in wireless sensor network
CN109246760B (en) Wireless local area network load balancing method based on power control, wireless access device and wireless access equipment
CN112235842A (en) Communication method and device of Internet of things equipment
WO2015117447A1 (en) Methods and apparatus for dialing and disabling dialing
CN112188593B (en) Wireless configuration method and device, storage medium and electronic device
CN107534479A (en) Management frame antenna selecting method and device based on master-slave type network

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination