Movatterモバイル変換


[0]ホーム

URL:


CN112752264A - Mesh network networking method and device and computer readable storage medium - Google Patents

Mesh network networking method and device and computer readable storage medium
Download PDF

Info

Publication number
CN112752264A
CN112752264ACN201911048127.XACN201911048127ACN112752264ACN 112752264 ACN112752264 ACN 112752264ACN 201911048127 ACN201911048127 ACN 201911048127ACN 112752264 ACN112752264 ACN 112752264A
Authority
CN
China
Prior art keywords
mesh network
network
identification information
node
accessed
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201911048127.XA
Other languages
Chinese (zh)
Other versions
CN112752264B (en
Inventor
陈小平
熊德林
陈国丞
连根辉
余冬勇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Foshan Viomi Electrical Technology Co Ltd
Original Assignee
Foshan Viomi Electrical Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Foshan Viomi Electrical Technology Co LtdfiledCriticalFoshan Viomi Electrical Technology Co Ltd
Priority to CN201911048127.XApriorityCriticalpatent/CN112752264B/en
Publication of CN112752264ApublicationCriticalpatent/CN112752264A/en
Application grantedgrantedCritical
Publication of CN112752264BpublicationCriticalpatent/CN112752264B/en
Activelegal-statusCriticalCurrent
Anticipated expirationlegal-statusCritical

Links

Images

Classifications

Landscapes

Abstract

The application relates to the technical field of wireless communication, and discloses a networking method, equipment and a computer readable storage medium of a Mesh network, wherein the method comprises the following steps: when a network access request of a node device to be accessed to a network is received, authenticating the node device to be accessed to the network according to message information carried by the network access request to obtain an authentication result; determining whether the node equipment to be accessed to the network is accessed to the Mesh network or not according to the authentication result; if the node equipment to be accessed to the network is determined to be accessed to the Mesh network, establishing a network of the node equipment to be accessed to the network in the Mesh network; and sending a root node device switching instruction to all node devices in the Mesh network so as to allow all the node devices in the Mesh network to select new root node devices. The method and the device can ensure the safety and the communication quality of the Mesh network.

Description

Mesh network networking method and device and computer readable storage medium
Technical Field
The present application relates to the field of wireless communications technologies, and in particular, to a networking method and device for a Mesh network, and a computer-readable storage medium.
Background
Along with the improvement of the life quality of people, smart homes are quietly entering the lives of people on a large scale. The intelligent home is connected with various intelligent devices in the home through the Internet of things technology, and compared with the common home, the intelligent home not only has the traditional living function, but also has the network communication function. At present, although these intelligent devices can use Wireless Mesh Networks (also called Wireless Mesh Networks, etc.) to perform self-networking, the intelligent devices are vulnerable to intrusion of illegal devices controlled by illegal personnel, and threaten the security and communication quality of the home Mesh network.
Therefore, how to ensure the security and the communication quality of the Mesh network is a problem that needs to be solved urgently at present.
Disclosure of Invention
The present application mainly aims to provide a Mesh network networking method, device and computer readable storage medium, and aims to ensure the security and communication quality of a Mesh network.
In order to achieve the above object, the present application provides a networking method for a Mesh network, including:
when a network access request of a node device to be accessed to a network is received, authenticating the node device to be accessed to the network according to message information carried by the network access request to obtain an authentication result;
determining whether the node equipment to be accessed to the network is accessed to the Mesh network or not according to the authentication result;
if the node equipment to be accessed to the network is determined to be accessed to the Mesh network, establishing a network of the node equipment to be accessed to the network in the Mesh network;
and sending a root node device switching instruction to all node devices in the Mesh network so as to allow all the node devices in the Mesh network to select new root node devices.
In addition, in order to achieve the above object, the present application further provides a networking device of a Mesh network, where the networking device of the Mesh network includes a processor, a memory, and a networking program of the Mesh network that is stored on the memory and can be executed by the processor, where the networking program of the Mesh network is executed by the processor to implement the steps of the networking method of the Mesh network.
In addition, to achieve the above object, the present application also provides a computer readable storage medium, where a networking program of a Mesh network is stored on the computer readable storage medium, where the networking program of the Mesh network is executed by a processor to implement the steps of the networking method of the Mesh network as described above.
The application provides a networking method, equipment and a computer readable storage medium of a Mesh network, when a network access request of a node equipment to be accessed is received, the node equipment to be accessed is authenticated according to message information carried by the network access request, and an authentication result is obtained; determining whether the node equipment to be accessed to the network is accessed to the Mesh network according to the obtained authentication result; if the node equipment to be accessed to the network is determined to be accessed to the Mesh network, establishing a network of the node equipment to be accessed to the network in the Mesh network; and further sending a root node device switching instruction to all node devices in the Mesh network so that all node devices in the Mesh network can select new root node devices to complete networking. Therefore, the node equipment which is expected to be accessed into the Mesh network is authenticated, and only the node equipment which is successfully authenticated is accessed into the Mesh network, so that the equipment which does not belong to a Mesh network user is prevented from being accessed into the network, the safety of the Mesh network is ensured, and after new node equipment is accessed into the network, the switching of root node equipment is triggered, and the communication quality of the Mesh network can be ensured.
Drawings
Fig. 1 is a schematic hardware structure diagram of a networking device of a Mesh network according to embodiments of the present application;
fig. 2 is a schematic flowchart of an embodiment of a networking method of a Mesh network according to the present application;
fig. 3 is a schematic structural diagram of a WiFi Mesh network involved in an embodiment of the present application;
fig. 4 is a schematic flowchart of another embodiment of a networking method of a Mesh network according to the present application;
fig. 5 is a schematic flowchart of a networking method of a Mesh network according to another embodiment of the present application.
The implementation, functional features and advantages of the objectives of the present application will be further explained with reference to the accompanying drawings.
Detailed Description
It should be understood that the specific embodiments described herein are merely illustrative of the present application and are not intended to limit the present application.
The networking method of the Mesh network related to the embodiment of the application is mainly applied to networking equipment of the Mesh network, and the networking equipment of the Mesh network can be equipment with a wireless function, such as a Personal Computer (PC), a portable computer, a mobile terminal, a server and the like.
Referring to fig. 1, fig. 1 is a schematic diagram of a hardware structure of a networking device of a Mesh network according to an embodiment of the present application. In this embodiment, the networking device of the Mesh network may include a processor 1001 (e.g., a Central Processing Unit, CPU), acommunication bus 1002, auser interface 1003, anetwork interface 1004, and amemory 1005. Thecommunication bus 1002 is used for realizing connection communication among the components; theuser interface 1003 may include a Display screen (Display), an input unit such as a Keyboard (Keyboard); thenetwork interface 1004 may optionally include a standard wired interface, a wireless interface (e.g., WI-FI interface); thememory 1005 may be a high-speed RAM memory or a non-volatile memory (e.g., a magnetic disk memory), and thememory 1005 may optionally be a memory separate from theprocessor 1001. Those skilled in the art will appreciate that the hardware configuration shown in FIG. 1 is not limiting of the present application and may include more or fewer components than those shown, or some components may be combined, or a different arrangement of components.
With continued reference to fig. 1, thememory 1005 of fig. 1, identified as a readable computer-readable storage medium, the computer-readable storage medium, may include an operating system, a network communication module, and a networking program of the Mesh network. In fig. 1, the network communication module is mainly used for connecting to a server and performing data communication with the server; theprocessor 1001 may call a networking program of the Mesh network stored in thememory 1005, and execute the steps of the networking method of the Mesh network provided in the embodiment of the present application.
The embodiment of the application provides a networking method of a Mesh network.
Referring to fig. 2, fig. 2 is a schematic flowchart of an embodiment of a networking method of a Mesh network according to the present application. The networking method of the Mesh network is realized by networking equipment of the Mesh network, and the networking equipment of the Mesh network can be equipment such as a cloud server or a user terminal (a smart phone, a tablet personal computer or a PC) of the Mesh network. Specifically, as shown in fig. 2, the networking method of the Mesh network includes the following steps:
step S101, when receiving a network access request of a node device to be accessed, authenticating the node device to be accessed according to message information carried by the network access request to obtain an authentication result;
step S102, determining whether the node equipment to be accessed to the network is accessed to a Mesh network or not according to the authentication result;
step S103, if the node equipment to be accessed to the network is determined to be accessed to the Mesh network, establishing the network of the node equipment to be accessed to the network in the Mesh network;
and step S104, sending a root node device switching instruction to all node devices in the Mesh network so as to allow all node devices in the Mesh network to select new root node devices.
For better understanding of the embodiments of the present application, before introducing the embodiments of the present application, an application scenario of the embodiments of the present application will be described. The networking method of the Mesh network in the embodiment of the application is suitable for the closed Mesh network, such as a family WiFi Mesh network, and is characterized in that a user has uniqueness.
The embodiment of the application provides a networking method of a Mesh network, and only node equipment which is successfully authenticated is accessed into the Mesh network by authenticating the node equipment which is desired to be accessed into the Mesh network, so that equipment which does not belong to a Mesh network user is prevented from being accessed into the Mesh network, and the safety of the Mesh network is further ensured.
In this embodiment of the present application, before step S101, a routing information table is established, where the establishing manner of the routing information table includes:
a. the method comprises the steps that networking equipment of the Mesh network records identification information of each node equipment of a Mesh network user, wherein the identification information of each node equipment comprises a manufacturer, a model and a serial number of each node equipment, a user ID of the Mesh network and the like, and has uniqueness;
b. after recording the identification information of each node device of a Mesh network user, performing associated storage on the identification information of each node device and the identification information of the Mesh network;
c. and establishing a routing information table based on the identification information of the Mesh network and the identification information of each node device which are stored in an associated manner.
That is, the route information table is established in a manner that a networking device of the Mesh network records identification information of each node device of a Mesh network user in advance, wherein the identification information of each node device of the Mesh network user can be input by the Mesh network user; after recording the identification information of each node device of a Mesh network user, the networking device of the Mesh network stores the identification information of each node device and the identification information of the Mesh network in an associated manner, wherein the identification information of the Mesh network can be the identification number of the Mesh network and has uniqueness; and finally, based on the identification information of the Mesh network and the identification information of each node device which are stored in a correlated manner, a routing information table can be established.
The following describes in detail each step of gradually implementing Mesh network networking in the embodiment of the present application:
step S101, when a network access request of a node device to be accessed to the network is received, the node device to be accessed to the network is authenticated according to message information carried by the network access request, and an authentication result is obtained.
When networking equipment of the Mesh network receives a network access request of node equipment to be accessed, the node equipment to be accessed is authenticated according to message information carried by the network access request, and an authentication result is obtained.
Illustratively, the authenticating the node device to be networked according to the message information carried by the network access request to obtain an authentication result specifically includes:
a1, decoding the message information carried by the network access request to extract Mesh network identification information and the identification information of the node equipment to be accessed from the message information;
a2, matching the extracted Mesh network identification information and the identification information of the node equipment to be networked with a prestored routing information table to determine whether the node equipment to be networked is effective node equipment;
a3, if the node device to be accessed to the network is determined to be a valid node device, obtaining an authentication result of successful authentication.
That is, the node device to be networked sends a networking request to the networking device of the Mesh network, where the networking request carries message information, where the message information includes Mesh network identification information and identification information of the node device to be networked. It should be noted that, in order to prevent the message information from being maliciously tampered, the message information is pre-encapsulated into a frame structure agreed with the networking device of the Mesh network, for example, the message information may be encapsulated in an internet protocol security IPSec manner, and the frame structure may be a self-defined frame structure, for example:
***MAC headerAddr informationDevice informationpayloadFrame check***
Therefore, after receiving a network access request sent by a node device to be accessed, a networking device of the Mesh network firstly decodes message information carried in the network access request according to a preset decoding mode corresponding to the encapsulation mode so as to extract Mesh network identification information and identification information of the node device to be accessed from the message information. And then, matching the extracted Mesh network identification information and the identification information of the node equipment to be networked with a prestored route information table to determine whether the node equipment to be networked is effective node equipment or not (defining the node equipment belonging to a Mesh network user as the effective node equipment), and if the extracted Mesh network identification information and the identification information of the node equipment to be networked are matched with the prestored route information table, determining that the node equipment to be networked is the effective node equipment, and obtaining an authentication result which is successfully authenticated.
Illustratively, the matching the extracted Mesh network identification information and the identification information of the node device to be networked with a pre-stored routing information table to determine whether the node device to be networked is an effective node device specifically includes:
a20, comparing the extracted Mesh network identification information with pre-stored Mesh network identification information in a pre-stored routing information table to determine whether the extracted Mesh network identification information is consistent with the pre-stored Mesh network identification information;
a21, if the extracted Mesh network identification information is consistent with the prestored Mesh network identification information, comparing the extracted identification information of the node equipment to be networked with prestored equipment identification information in a prestored routing information table;
a22, if the pre-stored device identification information consistent with the extracted identification information of the node device to be accessed exists in the pre-stored routing information table, determining that the node device to be accessed is an effective node device.
The extracted Mesh network identification information is compared with the pre-stored Mesh network identification information in the pre-stored routing information table to judge whether the extracted Mesh network identification information is consistent with the pre-stored Mesh network identification information in the pre-stored routing information table, if the extracted Mesh network identification information is consistent with the pre-stored Mesh network identification information in the pre-stored routing information table, the extracted identification information of the node device to be networked is further compared with the pre-stored device identification information in the pre-stored routing information table, and if the pre-stored device identification information which is consistent with the extracted identification information of the node device to be networked exists in the pre-stored routing information table, the node device to be networked is determined to be an effective node device, namely, the node device to be networked can be determined to belong to a node device of a Mesh network user, so that an authentication result which is successfully authenticated is obtained.
In addition, after the extracted Mesh network identification information is compared with the pre-stored Mesh network identification information in a pre-stored routing information table to determine whether the extracted Mesh network identification information is consistent with the pre-stored Mesh network identification information, if the extracted Mesh network identification information is inconsistent with the pre-stored Mesh network identification information, determining that the node device to be networked is an invalid node device, and listing the node device to be networked in a blacklist.
The extracted Mesh network identification information is compared with the pre-stored Mesh network identification information in the pre-stored routing information table to judge whether the extracted Mesh network identification information is consistent with the pre-stored Mesh network identification information in the pre-stored routing information table, if the extracted Mesh network identification information is inconsistent with the pre-stored Mesh network identification information in the pre-stored routing information table, the node device to be networked does not belong to the node device of the Mesh network user, the node device to be networked is judged to be an invalid node device, an authentication result of authentication failure is obtained, the node device to be networked is listed in a blacklist, and if the node device to be networked initiates a network access request again, authentication can be directly carried out according to the blacklist.
In addition, if the extracted Mesh network identification information is consistent with the pre-stored Mesh network identification information, after the extracted identification information of the node device to be networked is compared with the pre-stored device identification information in a pre-stored routing information table, if the pre-stored device identification information consistent with the extracted identification information of the node device to be networked does not exist in the pre-stored routing information table, the node device to be networked is determined to be an invalid node device, and the node device to be networked is listed in a blacklist.
After the extracted identification information of the node device to be accessed is compared with the prestored device identification information in the prestored routing information table, if the prestored device identification information consistent with the extracted identification information of the node device to be accessed does not exist in the prestored routing information table, the node device to be accessed is also indicated to not belong to the node device of the Mesh network user, the node device to be accessed is judged to be an invalid node device, so that an authentication result of authentication failure is obtained, the node device to be accessed is listed in a blacklist, and if the node device to be accessed initiates a network access request again, authentication can be directly carried out according to the blacklist.
In further implementations, it is also possible: and counting the network access request times of the same invalid node device within a preset time length, and if the counted times exceed a preset threshold value, generating alarm information to remind a Mesh network user.
That is, considering that even though the network access request of the illegal device is rejected, the network access request of the illegal device may still try to access the Mesh network continuously, in this embodiment of the present application, the network access request times of the same invalid node device within the preset time duration are counted, and if the network access request times of the same invalid node device within the preset time duration exceed the preset threshold, an alarm message is generated to remind the Mesh network user, for example, "there is frequent intrusion of an unknown device, please note |)! ", wherein, the preset duration and the preset threshold can be flexibly set according to the actual situation. Of course, the alarm information of different levels may also be generated according to the number of network access requests of the same invalid node device within a preset time duration, for example, if the number of network access requests exceeding a preset threshold is within a lower limit of a preset range, the alarm information of a low level is generated, such as "there is an unknown device intrusion, please note! "; if the number of the network access request times exceeds the preset threshold is within a preset range, generating a middle-level alarm message, such as "there is an unknown device frequently intruding, please note! "; if the number of the network access request times exceeds the preset threshold exceeds the upper limit value of a preset range, generating high-level alarm information, such as "there is unknown equipment frequently intruding, please check immediately! In this way, attention and maintenance of the Mesh network by the Mesh network user are brought, and therefore the safety of the Mesh network is improved.
And S102, determining whether the node equipment to be accessed to the network is accessed to the Mesh network or not according to the authentication result.
And if the networking equipment of the Mesh network authenticates the node equipment to be accessed, and an authentication result which is successfully authenticated is obtained, determining that the node equipment to be accessed can be accessed into the Mesh network.
Step S103, if the node equipment to be accessed to the network is determined to be accessed to the Mesh network, establishing the network of the node equipment to be accessed to the network in the Mesh network.
And if the node equipment to be accessed to the network is determined to be accessed to the Mesh network, establishing the network of the node equipment to be accessed to the network in the Mesh network, and completing the network access operation of the node equipment to be accessed to the network. Specifically, as shown in fig. 3, fig. 3 is a home WiFi Mesh network provided in this embodiment, where the WiFi Mesh network includes a router, a root node device, a routing node device, and a leaf node device, for example, if the to-be-networked node device is a sweeper, the to-be-networked node device may be used as a leaf node device to establish a connection between the to-be-networked node device and the routing node device in the home WiFi Mesh network, and the to-be-networked node device is, for example, theleaf node device 18 in fig. 3, that is, a connection between the to-be-networked node device and therouting node device 14.
And step S104, sending a root node device switching instruction to all node devices in the Mesh network so as to allow all the node devices in the Mesh network to select new root node devices.
Because the device node is added in the Mesh network, considering that the root node device is the only exit device in the Mesh network for communicating with the external internet, and the connection communication quality between the root node device and the router is crucial, the networking device of the Mesh network can send a root node device switching instruction to all the node devices in the Mesh network so as to allow all the node devices in the Mesh network to select a new root node device.
Specifically, any higher parent node device in the Mesh network may obtain its own information (including wireless quality and load, where the load includes CPU occupancy, wireless traffic usage rate, and the like), and information of a subordinate child node device having a connection relationship with the parent node device, measure its own communication capability according to the own information, measure the communication capability of the subordinate child node device having a connection relationship with the subordinate child node device according to the information of the subordinate child node device having a connection relationship with the subordinate child node device, and broadcast the communication capability of the parent node device and the communication capability of the subordinate child node device having a connection relationship with the subordinate child node device in the Mesh network.
According to the networking method of the Mesh network, when a network access request of a node device to be accessed is received, the node device to be accessed is authenticated according to message information carried by the network access request, and an authentication result is obtained; determining whether the node equipment to be accessed to the network is accessed to the Mesh network according to the obtained authentication result; if the node equipment to be accessed to the network is determined to be accessed to the Mesh network, establishing a network of the node equipment to be accessed to the network in the Mesh network; and further sending a root node device switching instruction to all node devices in the Mesh network so that all node devices in the Mesh network can select new root node devices to complete networking. Therefore, the node equipment which is expected to be accessed into the Mesh network is authenticated, and only the node equipment which is successfully authenticated is accessed into the Mesh network, so that the equipment which does not belong to a Mesh network user is prevented from being accessed into the network, the safety of the Mesh network is ensured, and after new node equipment is accessed into the network, the switching of root node equipment is triggered, and the communication quality of the Mesh network can be ensured.
Further, referring to fig. 4, based on the foregoing embodiment, another embodiment of the networking method of the Mesh network of the present invention is provided, and after step S103, the method includes:
step S105, sending a route switching instruction to the route node equipment in the Mesh network, so that the route node equipment in the Mesh network triggers the route switching operation.
After the device to be networked is accessed into the Mesh network, because the device node is newly added in the Mesh network, the load balance of the Mesh network is considered, the problem that a certain routing node device has a heavy load is avoided, and the networking device of the Mesh network can send a routing switching instruction to the routing node device in the Mesh network so that the routing node device in the Mesh network can trigger the routing switching operation.
Specifically, with a routing node device in the Mesh network as an upper parent node device, any upper parent node device (such as therouting node device 14 in fig. 3, denoted by m) first acquires its own information (the information includes radio quality and load, where the load includes CPU occupancy and radio traffic usage), information of a lower child node device (theleaf node device 18 in fig. 3) having a connection relationship therewith, and information of the remaining upper parent node devices (therouting node devices 12 and 13 in fig. 3) at the same level as it; then, the communication capability of the device is measured according to the information of the device, and the communication capability of the other upper level father node devices is measured according to the information of the other upper level father node devices in the same level.
Further, the superior parent node device compares the communication capability thereof with the communication capability of each of the other superior parent node devices, preliminarily determines whether the communication capability of the other superior parent node devices is higher than the communication capability thereof, if so, takes the other superior parent node devices with the communication capability higher than the communication capability thereof as the alternative superior parent node devices, then sorts the communication capabilities of the alternative superior parent node devices, determines the target superior parent node device from the superior parent node devices according to the sorting result, and preferably, determines the alternative superior parent node device with the largest communication capability as the target superior parent node device.
And then, determining whether to trigger the route switching of the subordinate child node device according to the information of the subordinate child node device having a connection relation with the superior parent node device, disconnecting the connection relation with the subordinate child node device when determining to trigger the route switching of the subordinate child node device, and establishing the connection relation between the subordinate child node device and the target superior parent node device, thereby realizing the route switching of the subordinate child node device. In this way, all the routing node devices in the Mesh network can control the route switching in the above manner.
According to the networking method of the Mesh network, after the node equipment to be networked is connected into the Mesh network, the routing node in the Mesh network is controlled to trigger routing switching, so that the problem of overweight load of certain routing node equipment can be avoided, the load balance of the Mesh network is ensured, the stability of the Mesh network is further improved, and the communication quality of the Mesh network is ensured.
Further, referring to fig. 5, based on the foregoing embodiment, another embodiment of the networking method of the Mesh network of the present invention is provided, and after step S103, the method includes:
step S106, receiving the running state information reported by all the node devices in the Mesh network in the current period, and monitoring the working states of all the node devices in the Mesh network according to the running state information.
That is, after the device to be networked is accessed to the Mesh network, the networking device of the Mesh network may also periodically monitor the operating states of all the node devices in the Mesh network. Specifically, the networking device of the Mesh network receives running state information reported by all node devices in the Mesh network in a current period, the running state information of each node device includes running time, power consumption and the like of each node device in the current period, and then the running state information of each node device can be analyzed, so that working states of all node devices in the Mesh network are obtained and reported to a Mesh network user, the Mesh network user can conveniently control each node device according to the working state of each node device, convenience is brought to the Mesh network user, and experience of the Mesh network user is improved.
In addition, the embodiment of the application also provides a computer readable storage medium.
The computer readable storage medium stores a networking program of the Mesh network, wherein the networking program of the Mesh network is executed by a processor to realize the steps of the networking method of the Mesh network.
The method implemented when the networking program of the Mesh network is executed may refer to each embodiment of the networking method of the Mesh network of the present application, and details are not described here.
The computer-readable storage medium may be an internal storage unit of the networking device of the Mesh network described in the foregoing embodiment, for example, a hard disk or a memory of the networking of the Mesh network. The computer readable storage medium may also be an external storage device of the computer device, such as a plug-in hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card), and the like provided on the computer device.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or system that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or system. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or system that comprises the element.
The above-mentioned serial numbers of the embodiments of the present application are merely for description and do not represent the merits of the embodiments.
Through the above description of the embodiments, those skilled in the art will clearly understand that the method of the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but in many cases, the former is a better implementation manner. Based on such understanding, the technical solutions of the present application may be embodied in the form of a software product, which is stored in a computer-readable storage medium (such as ROM/RAM, magnetic disk, optical disk) as described above, and includes several instructions for enabling a terminal device (such as a mobile phone, a computer, a server, an air conditioner, or a network device) to execute the method according to the embodiments of the present application.
The above description is only a preferred embodiment of the present application, and not intended to limit the scope of the present application, and all modifications of equivalent structures and equivalent processes, which are made by the contents of the specification and the drawings of the present application, or which are directly or indirectly applied to other related technical fields, are included in the scope of the present application.

Claims (10)

CN201911048127.XA2019-10-302019-10-30Networking method and equipment of Mesh network and computer readable storage mediumActiveCN112752264B (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
CN201911048127.XACN112752264B (en)2019-10-302019-10-30Networking method and equipment of Mesh network and computer readable storage medium

Applications Claiming Priority (1)

Application NumberPriority DateFiling DateTitle
CN201911048127.XACN112752264B (en)2019-10-302019-10-30Networking method and equipment of Mesh network and computer readable storage medium

Publications (2)

Publication NumberPublication Date
CN112752264Atrue CN112752264A (en)2021-05-04
CN112752264B CN112752264B (en)2023-11-03

Family

ID=75640960

Family Applications (1)

Application NumberTitlePriority DateFiling Date
CN201911048127.XAActiveCN112752264B (en)2019-10-302019-10-30Networking method and equipment of Mesh network and computer readable storage medium

Country Status (1)

CountryLink
CN (1)CN112752264B (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN113766491A (en)*2021-08-262021-12-07珠海格力电器股份有限公司Mesh networking-based equipment sharing method and device
CN114222369A (en)*2021-12-152022-03-22成都航天通信设备有限责任公司Networking communication method, device and system
CN114258023A (en)*2021-12-232022-03-29深圳市创维软件有限公司Mesh networking method, device, equipment and readable storage medium
CN114629518A (en)*2022-03-312022-06-14厦门骐俊物联科技股份有限公司Dynamic ad hoc network method of digital interphone
CN115551124A (en)*2022-09-152022-12-30Oppo广东移动通信有限公司 A networking method, device, equipment and computer storage medium
CN116600318A (en)*2023-05-082023-08-15浪潮工业互联网股份有限公司 A method for industrial equipment networking and active identification equipment
WO2023206820A1 (en)*2022-04-292023-11-02青岛海尔科技有限公司Method and apparatus for determining node state in mesh network, and device

Citations (3)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20150249921A1 (en)*2012-09-172015-09-03Zte CorporationAuthentication Method and System for Wireless Mesh Network
CN105451290A (en)*2014-08-202016-03-30北京南瑞智芯微电子科技有限公司Micropower wireless network self-organizing method and micropower wireless network
CN109963352A (en)*2019-04-082019-07-02乐鑫信息科技(上海)股份有限公司Method of network entry, device, equipment and the storage medium of equipment

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20150249921A1 (en)*2012-09-172015-09-03Zte CorporationAuthentication Method and System for Wireless Mesh Network
CN105451290A (en)*2014-08-202016-03-30北京南瑞智芯微电子科技有限公司Micropower wireless network self-organizing method and micropower wireless network
CN109963352A (en)*2019-04-082019-07-02乐鑫信息科技(上海)股份有限公司Method of network entry, device, equipment and the storage medium of equipment

Cited By (10)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN113766491A (en)*2021-08-262021-12-07珠海格力电器股份有限公司Mesh networking-based equipment sharing method and device
CN114222369A (en)*2021-12-152022-03-22成都航天通信设备有限责任公司Networking communication method, device and system
CN114258023A (en)*2021-12-232022-03-29深圳市创维软件有限公司Mesh networking method, device, equipment and readable storage medium
CN114258023B (en)*2021-12-232024-01-09深圳市创维软件有限公司Mesh networking method, device, equipment and readable storage medium
CN114629518A (en)*2022-03-312022-06-14厦门骐俊物联科技股份有限公司Dynamic ad hoc network method of digital interphone
CN114629518B (en)*2022-03-312024-03-01厦门骐俊物联科技股份有限公司Dynamic ad hoc network method of digital interphone
WO2023206820A1 (en)*2022-04-292023-11-02青岛海尔科技有限公司Method and apparatus for determining node state in mesh network, and device
CN115551124A (en)*2022-09-152022-12-30Oppo广东移动通信有限公司 A networking method, device, equipment and computer storage medium
CN115551124B (en)*2022-09-152025-02-14Oppo广东移动通信有限公司 A networking method, device, equipment and computer storage medium
CN116600318A (en)*2023-05-082023-08-15浪潮工业互联网股份有限公司 A method for industrial equipment networking and active identification equipment

Also Published As

Publication numberPublication date
CN112752264B (en)2023-11-03

Similar Documents

PublicationPublication DateTitle
CN112752264A (en)Mesh network networking method and device and computer readable storage medium
US12425861B2 (en)Method for determining class information and apparatus
US8787899B2 (en)Restricting and preventing pairing attempts from virus attack and malicious software
US20130272164A1 (en)Systems and methods of wi-fi enabled device configuration
JP2018527794A (en) Rogue access point profiling
CN104540134B (en)Wireless access node detection method, wireless network detecting system and server
US9949116B2 (en)Method and apparatus for establishing SSID-based connection between terminal device and gateway device
CN106550360B (en)WiFi connection method and system
EP3547759B1 (en)Method, access point and wireless local area network system for establishing a wireless local area network connection between an access point and a station
US20150029840A1 (en)Transmitting data via a private sub-network of a service provider network
CN102883320A (en)WiFi (Wireless Fidelity) authentication method and system thereof
CN103262625A (en)IP-based paging for DSDS
CN103119974A (en)System and method for maintaining privacy in a wireless network
CN109937608B (en) Method and system for collecting sensor data from a sensor device
JP2017535122A (en) Sensor code verification processing method, apparatus, network platform device, and Internet gateway of things
CN105052177B (en) Wireless network system, terminal management device, wireless relay device and communication method
CN102377568A (en)Network relay device and frame relaying control method
US20220279471A1 (en)Wireless communication method for registration procedure
CN106792694A (en)A kind of access authentication method, and access device
CN105636155A (en) Method and device for controlling a wireless access point
WO2023011069A1 (en)Communication method and apparatus
US11689928B2 (en)Detecting unauthorized access to a wireless network
Soós et al.On the security threat of abandoned and zombie cellular iot devices
CN111147269B (en)Access point configuration method, networking system, access point and storage medium
CN106332077B (en)Authentication method and system for accessing isolated network

Legal Events

DateCodeTitleDescription
PB01Publication
PB01Publication
SE01Entry into force of request for substantive examination
SE01Entry into force of request for substantive examination
GR01Patent grant
GR01Patent grant

[8]ページ先頭

©2009-2025 Movatter.jp