Detailed Description
In order that those skilled in the art will better understand the present invention, a technical solution in the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in which it is apparent that the described embodiments are only some embodiments of the present invention, not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the present invention without making any inventive effort, shall fall within the scope of the present invention.
It should be noted that the terms "first," "second," and the like in the description and the claims of the present invention and the above figures are used for distinguishing between similar objects and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used may be interchanged where appropriate such that the embodiments of the invention described herein may be implemented in sequences other than those illustrated or otherwise described herein. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
First, partial terms or terminology appearing in the course of describing embodiments of the application are applicable to the following explanation:
Ping-pong roaming is a common problem in wireless network environments, particularly in dense Wi-Fi hotspot deployment scenarios. It refers to the phenomenon that a wireless client device (such as a mobile phone, a notebook computer, etc.) frequently switches connections between two or more adjacent wireless Access Points (APs), just like a ping-pong ball bounces back and forth. Ping-pong roaming can cause the terminal to frequently drop and re-associate, affecting the terminal's existing experience.
The Seamless Roaming protocol generally refers to mechanisms and techniques for implementing smooth, unaware Roaming of devices between different Access Points (APs) in a wireless network. Its core goal is to ensure that terminal devices (e.g., cell phones, tablets, notebook computers) can seamlessly switch from one AP to another AP while moving without significant network disruption or performance degradation.
The Multi-Link Operation (MLO) mechanism is an advanced wireless network technology introduced in the IEEE 802.11be (Wi-Fi 7) standard to enhance the capability of devices to handle multiple links in dense network environments, particularly in large or complex network topologies. The main purpose of MLO is to significantly improve data transmission speed and network reliability by allowing devices (such as routers or client devices) to use multiple wireless links simultaneously.
The Co-SR function is a wireless network technology, and aims to coordinate actions of different Access Points (APs) and control power so that multiple APs can realize real-time concurrent transmission. In roaming, the roaming behavior of the device may be enhanced with power control.
At present, the table tennis roaming is identified by setting a central control software for managing the APs in the network, the APs in the network report the access behavior of the terminal to the central control software, then the central control software determines the access frequency of the terminal based on the access data reported by a plurality of APs, further judges whether the table tennis roaming occurs to the terminal, and then the central control software decides a proper processing method and issues the processing method to the corresponding APs for execution. The scheme is realized by means of a central controller, and the AP needs to report data and wait for the controller to issue decisions, so that the ping-pong roaming phenomenon cannot be treated timely and flexibly. Aiming at the technical problems, the embodiment of the invention provides a method embodiment of a roaming identification method. Fig. 1 is a flow chart of a roaming identification method according to an embodiment of the present invention, as shown in fig. 1, the method includes the following steps:
Step S102, receiving an access prompt of a target terminal.
The implementation main body of the method of the embodiment may be an Access Point (AP) in a target network, where the AP is used to connect a terminal in a Wireless Local Area Network (WLAN), for example, a notebook computer, a smart phone, an internet of things device, a wired network infrastructure, etc., so that the terminal can access resources in the internet or the local area network.
The terminal may send a broadcast or probe request signal while looking for a connectable wireless network. The access point may listen to these signals in order to find terminals in the vicinity that are searching for the network. When the target terminal is connected with the access point, the access point receives an access prompt, and the access point can start recording the connection information of the target terminal, such as connection time, signal strength and the like, so as to provide a data basis for subsequent network management and optimization.
Step S104, receiving and storing the access information synchronized by the last access point under the condition that the target terminal has the last access point, wherein the access information comprises at least one of access time, access duration and offline time.
The target terminal may be associated with the access point for the first time, that is, there is no previous access point, and at this time, there is no access information synchronized by the previous access point. But if the target terminal roams from another access point to the current access point, the last access point synchronizes the access information so that the current access point can know the previous access condition of the target terminal. The access information may include access time, access duration, offline time, and may further include an identifier, signal strength, etc. corresponding to the last access point. The synchronization process is typically implemented by a special Roaming protocol, such as the Seamless Roaming protocol. After the seampless Roaming function is turned on, the access point may not need to identify the ping-pong Roaming and delivery handling mechanism through central control software. Similarly, when the target terminal leaves from the current access point and roams to other access points, the current access point can also synchronize related access information packages to other access points.
It should be noted that the Seamless Roaming protocol needs to be combined with a Multi-Link Operation (MLO) mechanism to implement fast handoff between multiple links for the terminal STA. The MLO STA can negotiate switching through multi-link reconfiguration when switching links under the same MLO AP, and can use 802.11r mechanism to perform quick authentication and association when roaming from one MLO AP to another MLO AP. But during which the context of the current session may be interrupted, possibly resulting in a loss of information during roaming. However, in the Seamless Roaming, authentication information and current session context information are synchronized to the target MLO AP in advance through SMD (Seamless Mobility Domain) architecture, so that Roaming time is greatly shortened, continuity of data transmission is maintained, and non-inductive Roaming is realized. And under the MLO architecture, the state information of the STA can be synchronized between the APs so that the STA can smoothly switch between different links. The Seamless Roaming protocol not only provides authentication information synchronization required for fast Roaming, but also can further synchronize Roaming history, signal strength, and other information of the STA. This allows the AP to adjust the transmit power, channel selection, etc. parameters based on more comprehensive information to reduce ping-pong Roaming for STAs while rapidly communicating the processing policy to other related APs through the seampless Roaming information synchronization mechanism.
By combining the fast Roaming capability of the sealess Roaming protocol with the multilink advantages of the MLO mechanism, the wireless network user experience in mobility can be significantly optimized. The combination can provide continuous and stable service, reduce the problem of disconnection or delay caused by roaming, and ensure that users can still enjoy high-quality network service when moving in a large range.
In some embodiments, after the current access point receives the roaming packet synchronized by the previous access point, the current access point may first parse the received roaming packet and extract parameters such as the identifier (e.g. MAC address) of the target terminal, the identifier of the previous access point, the signal strength associated with the target terminal in the previous access point, and the time when the target terminal is disconnected from the previous access point. This information can be used to evaluate the roaming path and network quality of the target terminal. The current access point then stores the parsed access information and stores it in a preset location, where it may be stored in a general database in which a plurality of access information for terminals associated with the current access point may be stored, or may be stored in a separate state table.
The roaming information of the last access point is received and processed, so that the understanding of the access behavior of the AP to the STA is enhanced, the AP can make a more reasonable decision according to the network condition and the user demand, and the overall performance of the network and the experience of the terminal user are improved.
As an optional embodiment, receiving and storing the access information synchronized by the last access point includes inquiring whether a state table corresponding to the target terminal exists, wherein the state table is used for storing the access information of the target terminal, and recording the access information to the state table for storage under the condition that the state table corresponding to the target terminal exists.
After the target terminal is associated with the access point, the access point may query whether a state table corresponding to the target terminal exists, where the state table generally includes detailed information about the terminal, and is used to track and analyze access history and behavior of the terminal, so as to make a decision.
The access point may search a corresponding state table in a locally maintained terminal state database according to an identifier or an MAC address corresponding to the target terminal, where the state table may include information including the MAC address of the terminal, a timestamp of the last access, a duration of the access, an AP associated with the last access, an access signal strength, and so on.
The access point can analyze the access condition of the target terminal according to the information in the state table, and is used for judging whether the target terminal has ping-pong roaming.
As an optional embodiment, inquiring whether the state table corresponding to the target terminal exists or not further comprises establishing the state table corresponding to the target terminal under the condition that the state table corresponding to the target terminal does not exist, and recording access information to the state table for storage.
Alternatively, when the state table corresponding to the target terminal is not queried, the target terminal may be considered to be accessed for the first time or be excessively long from the last access time. At this time, based on the newly built state table, the access time and the access duration of the current target terminal are recorded. When the target terminal is accessed back again after being offline, the relevant access condition can be recorded in the state table. It can be considered that each access point establishes a corresponding state table for an access terminal for storing corresponding access information. I.e. one access point may have state tables corresponding to a plurality of terminals.
For example, when the access point first receives an access hint for a target terminal (e.g., a device with a unique MAC address), it checks a local state database to see if a state table for the terminal already exists. And if the state table corresponding to the target terminal exists, inquiring and updating the state information. If not, this means that it may be the first time the access point encounters the terminal, the access point will create a new state table for the target terminal. The access point then records the current access event of the target terminal, including the specific access time (i.e., the timestamp of the start association) and the access duration (if a continuous connection, it may be updated in real time, otherwise it is completed when the terminal is disconnected). After the state table is established, the access point may continually update the state table. When interaction occurs between the target terminal and the AP, such as roaming, disconnection reconnection, signal strength change, etc., the AP records a corresponding event in the state table.
By establishing the state table, the access point can accurately track and record the access condition of the target terminal, and a data base is provided for subsequent roaming identification.
As an optional embodiment, when the offline of the target terminal is detected, the offline time length corresponding to the target terminal is recorded, and when the offline time length reaches the second preset time length, the state table corresponding to the target terminal is deleted.
Optionally, an aging rule may be set, that is, when the offline time length reaches the second preset time length in the case that the terminal is offline, the state table corresponding to the terminal may be aged or emptied, so as to save the storage space. The second preset duration and the processing method of the state table may also be adjusted according to actual situations, for example, the number of terminals mounted on the access point, the memory of the access point itself, and so on. The processing method of the state table can be direct deletion or the content condition before a certain time.
The following is an alternative embodiment, where the access point considers the terminal to be offline when it does not receive any data packets of the terminal or receives information such as a disassociation frame of the terminal within a specified detection period. After determining that the terminal is offline, the access point starts recording the offline time period. When the offline time of the target terminal reaches or exceeds the second preset time, the access point judges that the terminal is inactive for a long time, and the state table corresponding to the target terminal can be deleted from the state database. This helps reduce maintenance costs of the database, avoids storing unnecessary history data, while maintaining the response speed and resource utilization of the database.
The access point may periodically check the state tables of all terminals, update the active records of the online terminals, and time the offline duration of the offline terminals. And executing the deleting operation or the aging operation of the state table once the offline time period exceeds the second preset time period. Before the state table is cleaned up, it is necessary to ensure that the ongoing network operation or service is not affected. For example, if the terminal is transmitting a file or playing a multimedia stream before offline, it should wait for these operations to be completely finished or confirm that the deletion of the state table is performed after no influence is caused.
Through the method, the access point can effectively manage the state information of the terminal, ensure the real-time performance and the effectiveness of the database, and simultaneously optimize the resource use and keep the high-efficiency operation of the system by timely cleaning the state table of the long-term off-line terminal.
Step S106, based on the access prompt, determining the access frequency corresponding to the target terminal according to the stored access information corresponding to the target terminal.
In this step, based on the access prompt, the access frequency of the target terminal can be determined according to the stored access information. Specifically, the access frequency may be determined by counting the number of accesses of the target terminal in a fixed duration, where the fixed duration refers to a time window used to count the access frequency of the terminal. The access point may set the length of this time window based on network characteristics and traffic requirements. For example, if the goal is to quickly respond and prevent ping-pong roaming, a shorter time window, such as the last 5 minutes or 10 minutes, may be required. The access point may screen out access records within a fixed duration based on the time stamp in the access information, and for each access event that meets the condition, the access point may increment a counter to accumulate the total number of accesses within the first preset duration, thereby calculating the access frequency.
For example, an appropriate time window length, e.g. a few minutes, half an hour or an hour, is selected for evaluating the access behaviour of the target terminal within a specific time period. All access events occurring within the selected time window are extracted from the stored access information of the target terminal. This step may remove older access records, focusing only on recent activities. The number of accesses by the target terminal is counted within a selected time window, including events of entering an associated state from an unassociated state, roaming from one AP to another AP. And calculating the access frequency of the target terminal according to the time window length and the access times, namely the average access times of the target terminal in unit time. A higher access frequency may indicate that the target terminal is experiencing ping-pong roaming.
Step S108, under the condition that the access frequency is larger than a preset roaming threshold value, determining that the target terminal performs ping-pong roaming.
In this step, the access frequency of the target terminal may be compared with a preset roaming threshold, where the roaming threshold is used to define a boundary between normal roaming behavior and ping-pong roaming. The roaming threshold value is set by comprehensively considering network characteristics, service requirements and behavior habits of the terminal, and can be determined by experimental data, expert experience or a machine learning prediction model.
If the access frequency exceeds a preset roaming threshold, this indicates that the target terminal is performing ping-pong roaming. If the access frequency is lower than the preset roaming threshold, the roaming behavior of the target terminal is generally considered to be in a normal range. This means that the handover between the target terminal and the different access points does not go beyond the expected frequency. A specific decision logic may be needed if the access frequency is equal to the threshold value, since this is just in a critical state. Some strategies may consider this as a warning signal, requiring further observation or slight adjustment.
Through the steps, the access point can flexibly identify the ping-pong roaming condition of the target terminal based on the access behavior data of the target terminal, and further, effective management measures are adopted to realize convenient, low-delay and flexible ping-pong roaming treatment.
Through the steps, the roaming identification is carried out locally at the access point by utilizing the roaming data synchronization mechanism, so that the purpose of carrying out ping-pong roaming identification without management of a central controller is achieved, the technical effects of efficiency and flexibility of the roaming identification are improved, and the technical problems that the information synchronization is not timely, the identification efficiency of the roaming phenomenon is low and the roaming situation is not flexible due to the fact that the access behavior of the terminal is acquired through central control software at present and the roaming situation is identified are solved.
It should be noted that the steps illustrated in the flowcharts of the figures may be performed in a computer system such as a set of computer executable instructions, and that although a logical order is illustrated in the flowcharts, in some cases the steps illustrated or described may be performed in an order other than that illustrated herein.
As an optional embodiment, in the case of determining that ping-pong roaming occurs to the target terminal, the method further comprises determining a target access point corresponding to the target terminal based on a preset roaming processing method, and synchronizing an identifier corresponding to the target access point and the roaming processing method to the access point in the target networking.
Alternatively, in the case where ping-pong roaming of the target terminal is detected and confirmed, corresponding processing may be performed. An appropriate target access point may be selected for the target terminal according to a preset roaming processing method, where the roaming processing method is various, for example, the roaming processing method may be selected according to the signal strength corresponding to the access point that the target terminal has accessed, or the access point closest to the target terminal may be selected, etc. After the target access point is selected, the unique identification of the target access point and a preset roaming processing method can be packaged into an information synchronization packet. The information synchronization packet is sent to all access points in the target network using broadcast within the network or a specific inter-access point AP communication mechanism, such as the session signaling mechanism. This step ensures that all access points know the ping-pong roaming status of the target terminal and the target access point. The access point receiving the information can execute corresponding strategies according to the own roles, wherein the target access point can increase the transmitting power, optimize the channel selection and prepare to accept the access of the target access point. The non-target access point can set a roaming suppression list, temporarily refuses the access request of the target terminal, and reduces the occurrence probability of ping-pong roaming.
All access points can update their own roaming management policy according to the received information to ensure consistency and coordination of the whole network. If the current access point is not the target access point, the current access point may be disconnected from the target terminal after determining the target access point and synchronizing the related information, so that the target terminal may be associated with the target access point.
By reducing unnecessary roaming, the network connection stability of the terminal is obviously improved, and the connection interruption and data transmission delay caused by roaming are reduced. Meanwhile, through cooperation among the access points, network resource allocation is optimized, overload of part of the access points due to excessive terminal access is avoided, and therefore overall network performance is improved. In addition, the method enhances the intelligence and the self-adaption of the network, so that the method can better cope with the challenges of high-density users, and provides smooth and high-quality wireless network experience for the users.
As an alternative embodiment, determining the target access point corresponding to the target terminal based on a preset roaming processing method comprises determining a history access point corresponding to the target terminal, reading roaming information corresponding to the history access point, determining signal strength of communication between the target terminal and the history access point based on the roaming information corresponding to the history access point, and determining the target access point corresponding to the target terminal based on the signal strength.
Alternatively, all access points that have been accessed by the target terminal in the last period of time may be collected and consolidated. This information may be extracted from the Roaming record of the access point or may be obtained by information exchange in the sealess Roaming protocol. The historical access point selection may include all access points that may cause ping-pong roaming of the terminal. Roaming information about the STA is then read from each of the historical access points. Such information typically includes signal strength, roaming frequency, duration of each roaming, etc. at which the STA accesses one or more times. The Roaming information may be obtained by the access point locally, or may be obtained by real-time or periodic synchronization between access points via a session Roaming or similar protocol. The average signal strength or the latest signal strength of the terminal at each of the historical access points may be extracted from the roaming information. Signal strength is an important parameter, since higher signal strength generally means a more stable connection and a better transmission rate, which is crucial for the decision of the roaming strategy. After the signal intensity data of all the related access points are acquired, the target access point is determined according to a preset roaming processing method. The preset processing method may be to select the AP with the highest STA signal strength as the target access point. The factors such as signal strength, load condition of the access point, channel interference degree and the like can be comprehensively considered, and the target access point can be determined through a comprehensive scoring system.
By the method, the target access point is determined based on the signal strength, so that the stability and efficiency of the network can be improved, and better connection experience is provided for the terminal.
An optional embodiment of the method for determining the target access point corresponding to the target terminal based on the preset roaming processing method includes the steps of sending a scanning signal to the target terminal, wherein the scanning signal is used for indicating the target terminal to scan the associable access points in the preset area, receiving the associable access points fed back by the target terminal, and selecting the access points meeting preset conditions from the associable access points as the target access points corresponding to the target terminal.
Alternatively, it is also possible to scan the surrounding environment and report potentially associable access points by directing the target terminal and then choose the most suitable as a new target access point from them.
The access point may generate a specific scanning signal containing instructions directing the target terminal STA to perform a surrounding scanning. After receiving the scan signal, the target terminal starts to perform an environment scan, and gathers signal information of neighboring access points, including but not limited to signal strength (RSSI), channel information, supported rates, etc. The target terminal may feed back the scan result to the current access point. The current access point may select an appropriate target access point for it.
For example, the access point may preset a series of selection criteria to select the target access point based on network performance metrics, traffic demands, load conditions of the access point, etc., which may include signal strength thresholds, channel quality, load levels of the access point, etc.
The method ensures that roaming operation is based on the latest network condition through real-time environment scanning, and improves the accuracy and the effectiveness of decision making.
In the following, referring to a specific embodiment, fig. 2 is a schematic diagram of a roaming identification method according to an alternative embodiment of the present invention, as shown in fig. 2, where an MLD AP is an access point supporting a Multi-Link Operation mechanism, and an MLD STA is a terminal supporting the Multi-Link Operation mechanism:
and S201, the MLD AP counts the access frequency and the access interval of the MLD STA in real time.
The MLD AP establishes an access state table for each associated MLD STA, and may record a start access time and an access duration of each access. And the MLD AP can set a certain aging rule, and when the MLD STA is offline for a certain period of time, the access state table is aged or emptied.
S202, the MLD AP records the Seamless Roaming information of each time of the MLD STA.
When an MLD STA roams from a current MLD AP to other MLD APs, the current MLD AP needs to record the next MLD AP and the roaming departure time of the MLD STA in an access state table when synchronizing terminal state information to the next MLD AP.
When the MLD STA roams from other MLD APs to the current MLD AP, the current MLD AP advances the information of the other party from the terminal state synchronous information of the other MLD APs, and records the MLD AP and the roaming access time associated before the MLD STA in an access state table.
And S203, the MLD AP judges whether the MLD STA has ping-pong roaming or not according to the access statistical data of the MLD STA.
The MLD AP checks the access state table of the MLD STA, counts the times of roaming/access behaviors of the MLD STA in a certain time interval, and obtains the responsive access frequency. And when the access frequency of the MLD STA exceeds the ping-pong roaming threshold value, the current MLD STA is considered to have ping-pong roaming.
S204, processing strategies are formulated for MLD STA of ping-pong roaming.
The current MLD AP determines which MLD APs ping-pong Roaming the MLD STA has between according to the Seamless Roaming information of the MLD STA. And then determining the optimal roaming target AP according to the roaming processing strategy. After determining the optimal roaming target AP, the non-target roaming AP may be designated to no longer accept the association of the STA for a designated time.
The roaming processing policy may be to trigger the MLD STA to scan and report environmental information and select an optimal roaming target AP for the MLD STA from the MLD AP objects of ping-pong roaming.
The Roaming processing policy may also be that when the Roaming processing policy synchronizes the signal strength information of the MLD STA to the target AP, directly use the signal strength information as auxiliary information of the final Roaming target AP for the AP decision, and select the MLD AP with the strongest signal strength as the optimal Roaming target AP.
In order to make the STA not roam frequently any more, the Co-SR function can be combined to improve the power of the optimal roaming target AP and reduce the power of the non-optimal roaming target AP.
S205, the MLD AP synchronizes the Roaming policy to the MLD AP in the network, for example, the Roaming policy may be synchronized by a synchronization information mechanism of the seampless Roaming.
According to the steps, the data synchronization between the access points is achieved through the Seamless Roaming, whether the terminal performs ping-pong Roaming or not is timely identified, relevant data can be given out to a central controller for management without reporting the relevant data to the central controller, and the processing decision can be sent out through the Seamless Roaming data synchronization mechanism, so that convenient, low-delay and flexible ping-pong Roaming processing is achieved.
It should be noted that, for simplicity of description, the foregoing method embodiments are all described as a series of acts, but it should be understood by those skilled in the art that the present invention is not limited by the order of acts described, as some steps may be performed in other orders or concurrently in accordance with the present invention. Further, those skilled in the art will also appreciate that the embodiments described in the specification are all preferred embodiments, and that the acts and modules referred to are not necessarily required for the present invention.
From the above description of the embodiments, it will be clear to those skilled in the art that the roaming identification method according to the above embodiments may be implemented by means of software plus necessary general hardware platform, but of course also by means of hardware, but in many cases the former is a preferred embodiment. Based on such understanding, the technical solution of the present invention may be embodied essentially or in a part contributing to the prior art in the form of a software product stored in a storage medium (e.g. ROM/RAM, magnetic disk, optical disk) comprising several instructions for causing a terminal device (which may be a mobile phone, a computer, a server, or a network device, etc.) to perform the method of the various embodiments of the present invention.
According to an embodiment of the present invention, there is further provided a roaming identification device for implementing the roaming identification method, and fig. 3 is a schematic diagram of a router according to an embodiment of the present invention, where the router is configured to perform any one of the roaming identification methods as shown in fig. 3, and includes:
And the data synchronization module is used for receiving and storing the access information synchronized by the last access point corresponding to the target terminal.
And the access information statistics module is used for determining the access frequency corresponding to the target terminal according to the stored access information corresponding to the target terminal based on the access prompt of the target terminal.
And the ping-pong roaming judging module is used for judging whether the target terminal performs ping-pong roaming or not based on the access frequency and a preset roaming threshold value, wherein the target terminal is determined to perform ping-pong roaming under the condition that the access frequency is greater than the roaming threshold value.
Optionally, the router further comprises a ping-pong roaming processing decision module, wherein the ping-pong roaming processing decision module is used for determining a target access point corresponding to the target terminal based on a preset roaming processing method, and the data synchronization module is further used for synchronizing the identifier corresponding to the target access point and the roaming processing method to the access point in the target networking.
According to an embodiment of the present invention, there is provided a computer readable storage medium, wherein the computer readable storage medium includes a stored executable program, and the apparatus in which the computer readable storage medium is located is controlled to execute any one of the roaming identification methods described above when the executable program is executed.
According to an embodiment of the present invention, there is provided an electronic apparatus, including:
a memory storing an executable program;
and the processor is used for running a program, wherein the program executes any roaming identification method.
According to an embodiment of the present invention, there is provided a computer program product comprising a computer program, characterized in that the computer program, when executed by a processor, implements the steps of any of the above roaming identification methods.
The foregoing embodiment numbers of the present invention are merely for the purpose of description, and do not represent the advantages or disadvantages of the embodiments.
In the foregoing embodiments of the present invention, the descriptions of the embodiments are emphasized, and for a portion of this disclosure that is not described in detail in this embodiment, reference is made to the related descriptions of other embodiments.
In the several embodiments provided in the present application, it should be understood that the disclosed technology may be implemented in other manners. The above-described embodiments of the apparatus are merely exemplary, and the division of the units, for example, may be a logic function division, and may be implemented in another manner, for example, a plurality of units or components may be combined or may be integrated into another system, or some features may be omitted, or not performed. Alternatively, the coupling or direct coupling or communication connection shown or discussed with each other may be through some interfaces, units or modules, or may be in electrical or other forms.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of this embodiment.
In addition, each functional unit in the embodiments of the present invention may be integrated in one processing unit, or each unit may exist alone physically, or two or more units may be integrated in one unit. The integrated units may be implemented in hardware or in software functional units.
The integrated units, if implemented in the form of software functional units and sold or used as stand-alone products, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present invention may be embodied essentially or in part or all of the technical solution or in part in the form of a software product stored in a storage medium, including instructions for causing a computer device (which may be a personal computer, a server, or a network device, etc.) to perform all or part of the steps of the method according to the embodiments of the present invention. The storage medium includes a U disk, a Read-Only Memory (ROM), a random access Memory (RAM, random Access Memory), a removable hard disk, a magnetic disk, or an optical disk, etc. which can store the program code.
The foregoing is merely a preferred embodiment of the present invention and it should be noted that modifications and adaptations to those skilled in the art may be made without departing from the principles of the present invention, which are intended to be comprehended within the scope of the present invention.