Abstract:
Embodiments of the present invention provide a method and device for label automatic allocation in ring network protection. The method includes: after physical topology configuration of ring network protection is completed, if connectivity detection between a first node and a downstream node of a ring tunnel is UP, receiving, a first label distribution message sent by the downstream node; sending, by the first node according to the identifier indicating that the tail node label is ready, a second label distribution message to the upstream node; so that the upstream node learns that label allocation for all nodes on the ring tunnel between the first node and a tail node is completed. The method solves problems in the prior art that a workload for configuration of a working ring is big and availability of an end-to-end service cannot be ensured.
Abstract:
A method for collecting and identifying interference, which includes requesting each access point device to collect spectrum information, so as to determine interference sources of spectrum information that belongs to a same interference type and is collected by the at least two access point devices, and extracting, from the spectrum information collected by the at least two access point devices, the spectrum information that belongs to the same interference type; matching characteristic sequences of the interference sources, and calculating an overlapping characteristic match value so as to determine whether the match value is greater than a preset threshold, and if the match value is greater than the preset threshold, determining that the extracted spectrum information is from a same interference source, and if the match value is not greater than the preset threshold, determining that the extracted spectrum information is from different interference sources.
Abstract:
The present invention provides a positioning method, device and system, which are applied to indoor WLAN positioning. A positioning server obtains location service information of APs in a set of APs to be measured; selects three APs to be measured in the set of APs to be measured according to a preset rule, and calculates a first coordinate of a terminal; if a calculated RSSI value of an unmeasured AP is not smaller than a difference between the measured RSSI value and a preset threshold, determines that signals of the unmeasured AP are not affected by reflection; and uses the first coordinate as a location coordinate of the terminal if all the three APs to be measured have been measured, thereby positioning the terminal.
Abstract:
A method, a device, and a system for acquiring application information in a WLAN are provided by embodiments of the present invention. A controller sends a switch request message to an unassociated neighboring AP. The switch request message includes an identifier of a mobile terminal and a designated channel. The unassociated neighboring AP switches from an original working channel of the unassociated neighboring AP to the designated channel and monitors the mobile terminal according to the identifier of the mobile terminal so as to acquire application information.
Abstract:
Embodiments of the present invention provide a method and device for label automatic allocation in ring network protection. The method includes: after physical topology configuration of ring network protection is completed, if connectivity detection between a first node and a downstream node of a ring tunnel is UP, receiving, a first label distribution message sent by the downstream node; sending, by the first node according to the identifier indicating that the tail node label is ready, a second label distribution message to the upstream node; so that the upstream node learns that label allocation for all nodes on the ring tunnel between the first node and a tail node is completed. The method solves problems in the prior art that a workload for configuration of a working ring is big and availability of an end-to-end service cannot be ensured.
Abstract:
A method for collecting and identifying interference, which includes requesting each access point device to collect spectrum information, so as to determine interference sources of spectrum information that belongs to a same interference type and is collected by the at least two access point devices, and extracting, from the spectrum information collected by the at least two access point devices, the spectrum information that belongs to the same interference type; matching characteristic sequences of the interference sources, and calculating an overlapping characteristic match value so as to determine whether the match value is greater than a preset threshold, and if the match value is greater than the preset threshold, determining that the extracted spectrum information is from a same interference source, and if the match value is not greater than the preset threshold, determining that the extracted spectrum information is from different interference sources.
Abstract:
A method, a device, and a system for acquiring application information in a WLAN are provided by embodiments of the present invention. A controller sends a switch request message to an unassociated neighboring AP. The switch request message includes an identifier of a mobile terminal and a designated channel. The unassociated neighboring AP switches from an original working channel of the unassociated neighboring AP to the designated channel and monitors the mobile terminal according to the identifier of the mobile terminal so as to acquire application information.
Abstract:
A method includes detecting a trigger operation of a user on a control on a first interface of the terminal device, where the control is used to obtain target data; and in response to the trigger operation of the user, performing a first action and a second action that correspond to the control, where the first action is used to open and display a second interface, and the second action is used to obtain, through matching, information that is on the second interface and that is related to the target data.
Abstract:
A method includes receiving, by an electronic device, an instruction for wiping data or performing a factory reset, setting an identifier according to the instruction, shutting down or restarting electronic device, reading the identifier when the electronic device is powered on or is connected to a network, sending a request to a server to request the server to delete a security service from a secure element (SE), receiving a command from the server, where the command instructs the electronic device to delete a target security service from the SE, and the target security service is based on a security service installed in the SE and a list of deletable security services stored in the server, and deleting, a secure element applet corresponding to the target security service from the SE according to the first command.
Abstract:
A method includes receiving, by an electronic device, an instruction for wiping data or performing a factory reset, setting an identifier according to the instruction, shutting down or restarting electronic device, reading the identifier when the electronic device is powered on or is connected to a network, sending a request to a server to request the server to delete a security service from a secure element (SE), receiving a command from the server, where the command instructs the electronic device to delete a target security service from the SE, and the target security service is based on a security service installed in the SE and a list of deletable security services stored in the server, and deleting, a secure element applet corresponding to the target security service from the SE according to the first command.