[go: up one dir, main page]

CN117675641A - Method for realizing comprehensive detection of WAPI equipment of different manufacturers - Google Patents

Method for realizing comprehensive detection of WAPI equipment of different manufacturers Download PDF

Info

Publication number
CN117675641A
CN117675641A CN202311634445.0A CN202311634445A CN117675641A CN 117675641 A CN117675641 A CN 117675641A CN 202311634445 A CN202311634445 A CN 202311634445A CN 117675641 A CN117675641 A CN 117675641A
Authority
CN
China
Prior art keywords
equipment
wapi
test
performance
compatibility
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN202311634445.0A
Other languages
Chinese (zh)
Inventor
吴振田
杨志花
王秀竹
李波
罗崇立
钟震宇
钱鑫
杨健豪
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Electric Power Communication Technology Co Ltd
Original Assignee
Guangdong Electric Power Communication Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Electric Power Communication Technology Co Ltd filed Critical Guangdong Electric Power Communication Technology Co Ltd
Priority to CN202311634445.0A priority Critical patent/CN117675641A/en
Publication of CN117675641A publication Critical patent/CN117675641A/en
Withdrawn legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/08Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
    • H04L43/0805Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters by checking availability
    • H04L43/0817Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters by checking availability by checking functioning
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/08Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/08Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
    • H04L43/0876Network utilisation, e.g. volume of load or congestion level
    • H04L43/0894Packet rate
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/16Threshold monitoring
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/20Arrangements for monitoring or testing data switching networks the monitoring system or the monitored elements being virtualised, abstracted or software-defined entities, e.g. SDN or NFV
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/50Testing arrangements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Environmental & Geological Engineering (AREA)
  • Computer Security & Cryptography (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a method and a system, which relate to the technical field of wireless communication and comprise the following steps: registering the equipment through the authentication and privacy infrastructure of WAPI; performing functional test and compatibility test according to the WAPI functional architecture and the software architecture; based on simulating the real network environment, the performance requirements of the manufacturer WAPI are evaluated. The method for realizing the comprehensive detection of WAPI equipment of different manufacturers ensures normal basic functions of the equipment and identifies potential problems by carrying out functional tests and compatibility tests, improves the compatibility of the equipment, enables an evaluation result to be more objective and clear by constructing a performance evaluation model, generally considers a plurality of performance indexes, provides comprehensive and systematic performance analysis, provides powerful decision basis for optimizing the system or the equipment based on the evaluation result of the model, and achieves better effects in the aspects of completion efficiency, accuracy and completion time.

Description

Method for realizing comprehensive detection of WAPI equipment of different manufacturers
Technical Field
The invention relates to the technical field of wireless communication, in particular to a method for realizing comprehensive detection of WAPI equipment of different manufacturers.
Background
With the rapid development of wireless technology, wireless Access Points (APs) and terminal devices are increasingly used in daily life and work. In order to ensure security of wireless communication, WAPI (wireless local area network authentication and privacy infrastructure) is widely adopted as a wireless local area network security standard in china. However, since there are a number of vendor-produced WAPI devices on the market, these devices may differ in actual performance, compatibility, and security.
Conventional WAPI device testing methods typically focus on a single vendor or model of device, and there are few methods that can comprehensively evaluate devices of different vendors and models. Furthermore, these test methods typically focus on the basic functionality of the device, ignoring comprehensive assessment of performance, compatibility, and security. Most existing testing methods are only specific to WAPI devices of a specific manufacturer or model, and lack versatility and universality. This means that when a user or administrator needs to evaluate different vendors or models of devices, they may need to use multiple different testing methods, which is neither convenient nor economical. While some test methods may focus on some aspect of the device, such as basic functionality or security, few methods are capable of comprehensively evaluating the performance, compatibility, and security of the device. This may lead to some potential problems being ignored, such as performance bottlenecks, compatibility problems, or security vulnerabilities. Many existing test methods require a significant amount of manual operations, such as manually configuring equipment, manually running test cases, and the like. This is not only inefficient but also prone to error. Most existing test methods only provide basic test results such as pass/fail or performance metrics. They lack intelligent analysis functions such as automatically identifying performance bottlenecks, recommending optimization suggestions, or predicting the long-term stability of the device.
Disclosure of Invention
The present invention has been made in view of the above-described problems.
Therefore, the technical problems solved by the invention are as follows: the existing WAPI equipment testing method lacks of safety and compatibility, is low in testing efficiency and accuracy, and cannot intuitively evaluate the optimization problem of the current state of the equipment.
In order to solve the technical problems, the invention provides the following technical scheme: a method for realizing comprehensive detection of WAPI equipment of different manufacturers comprises the following steps: registering the equipment through the authentication and privacy infrastructure of WAPI; performing functional test and compatibility test according to the WAPI functional architecture and the software architecture; based on simulating the real network environment, the performance requirements of the manufacturer WAPI are evaluated.
As a preferred scheme of the method for realizing comprehensive detection of WAPI equipment of different manufacturers, the invention comprises the following steps: when the equipment is registered through the WAPI identity authentication and privacy infrastructure, including the first access of the equipment to the WAPI network, the equipment sends an access request and an identity authentication request, and after the WAPI management system verifies the identity of the equipment, a session key is generated and the equipment is registered.
As a preferred scheme of the method for realizing comprehensive detection of WAPI equipment of different manufacturers, the invention comprises the following steps: the functional test and the compatibility test according to the WAPI functional architecture and the software architecture comprise the step of performing a data transmission speed test and a connection stability test on the functions of the equipment;
when the equipment performs data transmission speed test, if the data transmission speed of the equipment is lower than the expected data transmission speed, analyzing network flow through a network performance monitoring tool, finding out bandwidth bottleneck, performing network reconstruction, implementing QoS strategy on a router or a switch, and distributing priority to the equipment;
if the QoS strategy can not improve the data transmission speed, upgrading network hardware or introducing bandwidth management equipment;
if the data transmission speed of the equipment is unstable, selecting channels with less interference for wireless equipment, creating VLAN or subnetwork, isolating different types of traffic, and optimizing a data transmission path by using SD-WAN solution;
if the data transmission speed of the equipment is lower than a threshold value in the peak time, limiting the bandwidth use of non-critical applications, ensuring the data transmission speed of the critical applications, caching data in advance in the non-peak time, and reducing the data transmission requirement in the peak time;
if the data packet is wrong or damaged in the data transmission of the equipment, transmitting the data through a plurality of paths by using an error correction coding technology;
when the equipment performs connection stability test, if the number of equipment connection interruption is greater than a threshold value, establishing network redundancy, accessing by using double-link or multi-link, and simultaneously periodically checking the health state of the network equipment by using a network monitoring tool;
if the equipment failure is detected, automatically switching to a standby link;
if the number of times of failure of the equipment to connect to the network is larger than a threshold value, the positions and the number of access points are optimized, and the coverage area and the identity verification information of the equipment are ensured to be correct;
if the device is connected, the specific network service can not be accessed, a special VLAN or a subnet is created by using a service discovery protocol, and QoS policies are set for key services.
As a preferred scheme of the method for realizing comprehensive detection of WAPI equipment of different manufacturers, the invention comprises the following steps: the functional test and the compatibility test according to the WAPI functional architecture and the WAPI software architecture comprise a device response time test, a device compatibility test and a device security test;
when the equipment performs equipment response time test, if the equipment response time is larger than a threshold value, implementing a cache strategy on the equipment or a network, reducing the data searching time, and distributing the request to a plurality of equipment or servers by using a load equalizer;
if the response time is out when the equipment processes a large number of requests, optimizing a request queue by using an algorithm, and expanding dynamic resources;
when the equipment performs equipment compatibility test, if the equipment is not compatible, the equipment uses a virtualization technology to simulate the behavior of the equipment, ensure the compatibility, automatically detect the equipment type and adjust the interface compatibility;
if the device is not compatible with the network service, converting the incompatible service request by using the adapter or converting the used protocol;
when the equipment performs equipment security test, if the security certificate of the equipment is out of date or invalid, the equipment uses multi-factor identity verification to automatically detect the validity of the certificate and update the certificate before the expiration;
if the encryption method of the equipment is unsafe, upgrading the encryption algorithm of the equipment, and carrying out an end-to-end encryption strategy on the implementation end;
if the user data stored by the device is accessed by an unauthorized third party, the device uses a data desensitization technology and implements an access control list policy.
As a preferred scheme of the method for realizing comprehensive detection of WAPI equipment of different manufacturers, the invention comprises the following steps: the functional test and the compatibility test according to the WAPI functional architecture and the WAPI software architecture comprise the steps of checking the seamless cooperative working capacity of equipment of different manufacturers by simulating a real network environment, and respectively performing an operating system compatibility test, a hardware compatibility test, a network environment compatibility test, a software application compatibility test and an external equipment compatibility test.
As a preferred scheme of the method for realizing comprehensive detection of WAPI equipment of different manufacturers, the invention comprises the following steps: the performance requirement of the manufacturer WAPI is evaluated by collecting data throughput through a functional test, outputting response time, error rate, concurrent connection number and power consumption, and constructing a performance evaluation model, wherein the performance evaluation model is expressed as follows:
wherein T is data throughput, R is response time, E is error rate, C is concurrent connection number, P o Is power consumption.
As a preferred scheme of the method for realizing comprehensive detection of WAPI equipment of different manufacturers, the invention comprises the following steps: the evaluating the performance requirements of the manufacturer WAPI comprises evaluating the equipment based on the performance scores of the manufacturer WAPI;
when P >0.7, the performance of the manufacturer WAPI evaluates to a high score, continuously monitors performance and is regularly more feasible, encouraging users to feed back performance;
when 0.3< P > is 0.7, the performance of the manufacturer WAPI is evaluated as a medium score, the configuration or the setting of the equipment is adjusted according to the result of the performance test, and the hardware or the software of the equipment is considered to be upgraded so as to solve the bottleneck problem and improve the performance;
when P is less than 0.3, the performance of WAPI of manufacturers is evaluated as low score, deep performance and safety analysis is carried out on equipment, hardware and software are comprehensively upgraded, and if equipment problems cannot be solved or the upgrading cost is too high, retirement and equipment replacement are considered.
Another object of the present invention is to provide a system for implementing comprehensive detection of WAPI devices of different manufacturers, which can visually evaluate the current state of the device by constructing a performance evaluation model, so as to solve the problem that the current WAPI device test method ignores comprehensive evaluation of performance, compatibility and safety.
As a preferable scheme of the system for realizing comprehensive detection of WAPI equipment of different manufacturers, the invention comprises the following steps: the device comprises a device registration module, a functional test and module, a compatibility test module, a WAPI performance evaluation module and a WAPI performance evaluation module; the device registration module is used for verifying the identity of the device, generating a session key and registering the device; the functional test module is used for carrying out data transmission speed test, connection stability test, equipment response time test, equipment compatibility test and equipment safety test on the functions of the equipment according to the WAPI function architecture and the software architecture; the compatibility test module is used for simulating a real network environment and carrying out operation system compatibility test, hardware compatibility test, network environment compatibility test, software application compatibility test and external equipment compatibility test; the WAPI performance evaluation module is used for collecting data through a functional test and constructing a performance evaluation model; the WAPI performance evaluation module is used for outputting WAPI performance evaluation through a performance evaluation model
A computer device comprising a memory and a processor, said memory storing a computer program, characterized in that execution of said computer program by said processor is the step of implementing a method for implementing comprehensive detection of WAPI devices of different vendors.
A computer readable storage medium having stored thereon a computer program, characterized in that the computer program when executed by a processor implements the steps of a method for implementing comprehensive detection of WAPI devices of different vendors.
The invention has the beneficial effects that: the method for realizing the comprehensive detection of WAPI equipment of different manufacturers ensures normal basic functions of the equipment and identifies potential problems by carrying out functional tests and compatibility tests, improves the compatibility of the equipment, enables an evaluation result to be more objective and clear by constructing a performance evaluation model, generally considers a plurality of performance indexes, provides comprehensive and systematic performance analysis, provides powerful decision basis for optimizing the system or the equipment based on the evaluation result of the model, and achieves better effects in the aspects of completion efficiency, accuracy and completion time.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings required for the description of the embodiments will be briefly described below, it being obvious that the drawings in the following description are only some embodiments of the present invention, and that other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art. Wherein:
fig. 1 is an overall flowchart of a method for implementing comprehensive detection of WAPI devices of different manufacturers according to a first embodiment of the present invention.
Fig. 2 is a system function architecture diagram of a method for implementing comprehensive detection of WAPI devices of different manufacturers according to a first embodiment of the present invention.
Fig. 3 is a system software architecture diagram of a method for implementing comprehensive detection of WAPI devices of different manufacturers according to a first embodiment of the present invention.
Fig. 4 is an overall flowchart of a system for implementing comprehensive detection of WAPI devices of different manufacturers according to a third embodiment of the present invention.
Detailed Description
So that the manner in which the above recited objects, features and advantages of the present invention can be understood in detail, a more particular description of the invention, briefly summarized above, may be had by reference to the embodiments, some of which are illustrated in the appended drawings. All other embodiments, which can be made by one of ordinary skill in the art based on the embodiments of the present invention without making any inventive effort, shall fall within the scope of the present invention.
Example 1
Referring to fig. 1-3, for one embodiment of the present invention, a method for implementing comprehensive detection of WAPI devices of different vendors is provided, including:
s1: the device is registered through the authentication and privacy infrastructure of the WAPI.
Further, when the device accesses the WAPI network for the first time, the device sends an access request and an authentication request, and after the identity of the device is authenticated by the WAPI management system, a session key is generated and the device is registered.
It should be noted that when a new device attempts to access the WAPI network, it first sends an access request to the network. The request contains basic information of the device, such as MAC address, device model number, manufacturer information, etc.
It should also be noted that after receiving the access request, the WAPI management system of the network performs identity verification first. The device needs to provide its pre-stored identity credentials or other identity credentials. The WAPI management system verifies the validity of these credentials. This may involve communication with a central authentication server to confirm whether the device's credentials are valid and not tampered with.
Further, once the identity of the device is verified, the WAPI management system further identifies the vendor and model of the device. This may be accomplished by parsing information provided by the device (e.g., device model number, firmware version, etc.) or querying a device database.
It should be noted that, after the identity of the device is confirmed, the WAPI management system registers the device in the system. This involves assigning a unique device ID to the device and storing detailed information of the device in a device database. The device database may contain information on the MAC address, model number, manufacturer, last access time, location, etc. of the device.
It should also be noted that the WAPI management system generates a session key for each registered device in order to secure communications between the device and the network. This key is used to encrypt all communications between the device and the network, ensuring the privacy and integrity of the data.
Further, once the device successfully registers, the WAPI management system sends an acknowledgment to the device. This information tells the device that it has successfully registered and can begin normal network communications.
S2: and performing functional test and compatibility test according to the functional architecture and the software architecture of the WAPI.
Further, the data transmission speed test and the connection stability test are carried out on the functions of the equipment;
when the equipment performs data transmission speed test, if the data transmission speed of the equipment is lower than the expected data transmission speed, analyzing network flow through a network performance monitoring tool, finding out bandwidth bottleneck, performing network reconstruction, implementing QoS strategy on a router or a switch, and distributing priority to the equipment;
if the QoS strategy can not improve the data transmission speed, upgrading network hardware or introducing bandwidth management equipment;
if the data transmission speed of the equipment is unstable, selecting channels with less interference for wireless equipment, creating VLAN or subnetwork, isolating different types of traffic, and optimizing a data transmission path by using SD-WAN solution;
if the data transmission speed of the equipment is lower than a threshold value in the peak time, limiting the bandwidth use of non-critical applications, ensuring the data transmission speed of the critical applications, caching data in advance in the non-peak time, and reducing the data transmission requirement in the peak time;
if the data packet is wrong or damaged in the data transmission of the equipment, transmitting the data through a plurality of paths by using an error correction coding technology;
when the equipment performs connection stability test, if the number of equipment connection interruption is greater than a threshold value, establishing network redundancy, accessing by using double-link or multi-link, and simultaneously periodically checking the health state of the network equipment by using a network monitoring tool;
if the equipment failure is detected, automatically switching to a standby link;
if the number of times of failure of the equipment to connect to the network is larger than a threshold value, the positions and the number of access points are optimized, and the coverage area and the identity verification information of the equipment are ensured to be correct;
if the device is connected, the specific network service can not be accessed, a special VLAN or a subnet is created by using a service discovery protocol, and QoS policies are set for key services.
It should be noted that, the device response time test, the device compatibility test, the device security test;
when the equipment performs equipment response time test, if the equipment response time is larger than a threshold value, implementing a cache strategy on the equipment or a network, reducing the data searching time, and distributing the request to a plurality of equipment or servers by using a load equalizer;
if the response time is out when the equipment processes a large number of requests, optimizing a request queue by using an algorithm, and expanding dynamic resources;
when the equipment performs equipment compatibility test, if the equipment is not compatible, the equipment uses a virtualization technology to simulate the behavior of the equipment, ensure the compatibility, automatically detect the equipment type and adjust the interface compatibility;
if the device is not compatible with the network service, converting the incompatible service request by using the adapter or converting the used protocol;
when the equipment performs equipment security test, if the security certificate of the equipment is out of date or invalid, the equipment uses multi-factor identity verification to automatically detect the validity of the certificate and update the certificate before the expiration;
if the encryption method of the equipment is unsafe, upgrading the encryption algorithm of the equipment, and carrying out an end-to-end encryption strategy on the implementation end;
if the user data stored by the device is accessed by an unauthorized third party, the device uses a data desensitization technology and implements an access control list policy.
It should also be noted that, by simulating the real network environment, the seamless cooperative working capacities of the devices of different manufacturers are checked, and the operating system compatibility test, the hardware compatibility test, the network environment compatibility test, the software application compatibility test and the external device compatibility test are respectively performed.
S3: based on simulating the real network environment, the performance requirements of the manufacturer WAPI are evaluated.
Further, data throughput is collected through functional testing, response time, error rate, concurrent connection number and power consumption are output, and a performance evaluation model is constructed and expressed as:
wherein T is data throughput, R is response time, E is error rate, C is concurrent connection number, P o Is power consumption.
It should be noted that the device was rated based on the performance score of vendor WAPI;
when P is more than 0.7, the performance of the manufacturer WAPI is evaluated as high score, and the data throughput is expressed as excellent when the device processes a large amount of data, so that the device can rapidly receive and transmit the data, and the method is beneficial to applications requiring high bandwidth, such as high-definition video streaming, large data analysis and the like; at the moment, the response time is expressed as low delay of the equipment, and a user or other systems can obtain instant feedback when interacting with the equipment, so that the real-time application and the task with strong interactivity are facilitated; the error rate is expressed as that the error rate is lower when the equipment processes the request, and the equipment is stable; the number of concurrent connections at this time indicates that the device is capable of handling a large number of concurrent connections, which is advantageous for scenarios where multiple users or devices need to be served. At the moment, the power consumption is expressed as excellent performance, the power consumption of the equipment is reasonable, and the performance is better in the aspect of energy efficiency.
When 0.3< P <0.7, the performance of the manufacturer WAPI is evaluated as a medium score, and the data throughput is represented as that the device is average in terms of data processing, so that the probability of error occurrence when the device cannot operate in high-bandwidth application is increased; the response time is then expressed as a delay of the device at a moderate level, not suitable for highly real-time tasks; the error rate at this time is indicated as low when the device processes the request, and further optimization and adjustment are required to improve the stability; the concurrent connection number is represented as that the device can process a certain number of concurrent connections, and is limited in a high concurrent scene; the power consumption is represented by the fact that the power consumption of the device is matched with the performance of the device, and the power consumption needs to be optimized to improve energy efficiency.
When P is less than 0.3, the performance of the manufacturer WAPI is evaluated as low score, and the data throughput is represented as poor performance of the device when the device processes data, and the probability of error occurrence is high when the device cannot operate in high-bandwidth application; the response time is represented by the high latency of the device, and the user or other system is high in latency when interacting with the device; the error rate is expressed as that the equipment is frequently in error, and the reliability and the stability are low; the concurrent connection number is expressed as that the device can only process a small number of concurrent connections; the power consumption is then expressed as a relatively high power consumption of the device, resulting in overheating, short battery life, or other related problems.
In order to verify the beneficial effects of the invention, scientific demonstration is carried out through economic benefit calculation and simulation experiments.
10 WAPI devices of different manufacturers are selected, and three main test scenes are set, namely device registration and identification, functional test and performance evaluation.
Wherein the task completion comprises: authentication, namely, whether the equipment can successfully pass the authentication and establish secure connection with the WAPI management system. Data transmission, whether a device is able to successfully transmit and receive data. This may include file transfer, real-time data streaming, etc. The device responds if the device is able to respond to network requests, such as DHCP requests, DNS queries, etc., within a specified time. Compatibility tests whether a device is compatible with other devices and systems and can operate seamlessly in the network. Security tests whether the device is capable of defending against various network attacks, such as DDoS attacks, man-in-the-middle attacks, etc. Performance assessment-device performance under high load conditions, such as in the case of large data transfers or multiple concurrent connections. Other specific tasks, depending on the nature and functionality of the device, may be other testing tasks, such as firmware updates, remote management, etc.
Wherein the task completion is correctly determined as: authentication, namely if the identity certificate provided by the equipment is accepted by the WAPI management system and connection is successfully established, the task is considered to be completed correctly. Data transfer-if the data is successfully transferred without error and completed within a specified time, this task is deemed to be completed correctly. The device responds by deeming that the task is completed correctly if the device responds to the network request within a specified time and returns the correct result. Compatibility testing-if a device is able to operate seamlessly with other devices and systems without causing any conflicts or failures, then this task is deemed to be done correctly. Security test-if the device successfully defends against all network attacks and does not reveal any sensitive information or is controlled by an attacker, this task is deemed to be done correctly. Performance evaluation this task is considered to be done correctly if the performance of the device under high load conditions meets the expected criteria, such as data transfer speed, response time, etc., all within acceptable limits. And other specific tasks, namely judging whether the completion is correct or not according to specific requirements and standards of the tasks for other test tasks.
The experimental results are shown in table 1.
Table 1 comparison of experimental results
The average completion efficiency of my invention is 93.7% significantly higher than 83.4% of the prior art, as seen by the comparative index "completion efficiency" in table 1; the average accuracy of the my invention is 96.7 percent which is obviously better than 87.9 percent of the prior art as seen from the comparison index 'accuracy' in the table 1; the average completion time of my invention of 9.3 minutes is significantly better than 16 minutes of the prior art by comparison index "completion time" in table 1. Compared with the prior art, the invention has better effect in the aspects of completion efficiency, accuracy and completion time. Specifically, the average completion efficiency of the invention is improved by about 10%, the accuracy is improved by about 8%, and the completion time is shortened by about 30%
In summary, my invention is a preferred solution in terms of accuracy, time cost and resource utilization.
Example 3
Referring to fig. 4, for one embodiment of the present invention, a system for implementing comprehensive detection of WAPI devices of different vendors is provided, including: the device comprises a device registration module, a functional test module, a compatibility test module, a WAPI performance evaluation module and a WAPI performance evaluation module.
The device registration module is used for verifying the identity of the device, generating a session key and registering the device, the functional test module is used for carrying out data transmission speed test, connection stability test, device response time test, device compatibility test and device safety test on the function of the device according to the function architecture and the software architecture of the WAPI, the compatibility test module is used for simulating a real network environment and carrying out operating system compatibility test, hardware compatibility test, network environment compatibility test, software application compatibility test and external device compatibility test, the WAPI performance evaluation module is used for collecting data through the functional test and constructing a performance evaluation model, and the WAPI performance evaluation module is used for outputting WAPI performance evaluation through the performance evaluation model.
The functions, if implemented in the form of software functional units and sold or used as a stand-alone product, may be stored in a computer-readable storage medium. Based on this understanding, the technical solution of the present invention may be embodied essentially or in a part contributing to the prior art or in a part of the technical solution in the form of a software product stored in a storage medium, comprising several instructions for causing a computer device (which may be a personal computer, a server, a network device, etc.) to perform all or part of the steps of the method of the embodiments of the present invention. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a random access Memory (RAM, random Access Memory), a magnetic disk, or an optical disk, or other various media capable of storing program codes.
Logic and/or steps represented in the flowcharts or otherwise described herein, e.g., a ordered listing of executable instructions for implementing logical functions, can be embodied in any computer-readable medium for use by or in connection with an instruction execution system, apparatus, or device, such as a computer-based system, processor-containing system, or other system that can fetch the instructions from the instruction execution system, apparatus, or device and execute the instructions. For the purposes of this description, a "computer-readable medium" can be any means that can contain, store, communicate, propagate, or transport the program for use by or in connection with the instruction execution system, apparatus, or device.
More specific examples (a non-exhaustive list) of the computer-readable medium would include the following: an electrical connection (electronic device) having one or more wires, a portable computer diskette (magnetic device), a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber device, and a portable compact disc read-only memory (CDROM). Additionally, the computer-readable medium may even be paper or other suitable medium upon which the program is printed, as the program may be electronically captured, via, for instance, optical scanning of the paper or other medium, then compiled, interpreted or otherwise processed in a suitable manner, if necessary, and then stored in a computer memory.
It is to be understood that portions of the present invention may be implemented in hardware, software, firmware, or a combination thereof. In the above-described embodiments, the various steps or methods may be implemented in software or firmware stored in a memory and executed by a suitable instruction execution system. For example, if implemented in hardware, as in another embodiment, may be implemented using any one or combination of the following techniques, as is well known in the art: discrete logic circuits having logic gates for implementing logic functions on data signals, application specific integrated circuits having suitable combinational logic gates, programmable Gate Arrays (PGAs), field Programmable Gate Arrays (FPGAs), and the like. It should be noted that the above embodiments are only for illustrating the technical solution of the present invention and not for limiting the same, and although the present invention has been described in detail with reference to the preferred embodiments, it should be understood by those skilled in the art that the technical solution of the present invention may be modified or substituted without departing from the spirit and scope of the technical solution of the present invention, which is intended to be covered in the scope of the claims of the present invention.
It should be noted that the above embodiments are only for illustrating the technical solution of the present invention and not for limiting the same, and although the present invention has been described in detail with reference to the preferred embodiments, it should be understood by those skilled in the art that the technical solution of the present invention may be modified or substituted without departing from the spirit and scope of the technical solution of the present invention, which is intended to be covered in the scope of the claims of the present invention.

Claims (10)

1. The method for realizing the comprehensive detection of WAPI equipment of different manufacturers is characterized by comprising the following steps:
registering the equipment through the authentication and privacy infrastructure of WAPI;
performing functional test and compatibility test according to the WAPI functional architecture and the software architecture;
based on simulating the real network environment, the performance requirements of the manufacturer WAPI are evaluated.
2. The method for implementing comprehensive detection of WAPI devices of different manufacturers according to claim 1, wherein: when the equipment is registered through the WAPI identity authentication and privacy infrastructure, including the first access of the equipment to the WAPI network, the equipment sends an access request and an identity authentication request, and after the WAPI management system verifies the identity of the equipment, a session key is generated and the equipment is registered.
3. The method for implementing comprehensive detection of WAPI devices of different manufacturers according to claim 1, wherein: the functional test and the compatibility test according to the WAPI functional architecture and the software architecture comprise the step of performing a data transmission speed test and a connection stability test on the functions of the equipment;
when the equipment performs data transmission speed test, if the data transmission speed of the equipment is lower than the expected data transmission speed, analyzing network flow through a network performance monitoring tool, finding out bandwidth bottleneck, performing network reconstruction, implementing QoS strategy on a router or a switch, and distributing priority to the equipment;
if the QoS strategy can not improve the data transmission speed, upgrading network hardware or introducing bandwidth management equipment;
if the data transmission speed of the equipment is unstable, selecting channels with less interference for wireless equipment, creating VLAN or subnetwork, isolating different types of traffic, and optimizing a data transmission path by using SD-WAN solution;
if the data transmission speed of the equipment is lower than a threshold value in the peak time, limiting the bandwidth use of non-critical applications, ensuring the data transmission speed of the critical applications, caching data in advance in the non-peak time, and reducing the data transmission requirement in the peak time;
if the data packet is wrong or damaged in the data transmission of the equipment, transmitting the data through a plurality of paths by using an error correction coding technology;
when the equipment performs connection stability test, if the number of equipment connection interruption is greater than a threshold value, establishing network redundancy, accessing by using double-link or multi-link, and simultaneously periodically checking the health state of the network equipment by using a network monitoring tool;
if the equipment failure is detected, automatically switching to a standby link;
if the number of times of failure of the equipment to connect to the network is larger than a threshold value, the positions and the number of access points are optimized, and the coverage area and the identity verification information of the equipment are ensured to be correct;
if the device is connected, the specific network service can not be accessed, a special VLAN or a subnet is created by using a service discovery protocol, and QoS policies are set for key services.
4. The method for implementing comprehensive detection of WAPI devices of different manufacturers according to claim 1, wherein: the functional test and the compatibility test according to the WAPI functional architecture and the WAPI software architecture comprise a device response time test, a device compatibility test and a device security test;
when the equipment performs equipment response time test, if the equipment response time is larger than a threshold value, implementing a cache strategy on the equipment or a network, reducing the data searching time, and distributing the request to a plurality of equipment or servers by using a load equalizer;
if the response time is out when the equipment processes a large number of requests, optimizing a request queue by using an algorithm, and expanding dynamic resources;
when the equipment performs equipment compatibility test, if the equipment is not compatible, the equipment uses a virtualization technology to simulate the behavior of the equipment, ensure the compatibility, automatically detect the equipment type and adjust the interface compatibility;
if the device is not compatible with the network service, converting the incompatible service request by using the adapter or converting the used protocol;
when the equipment performs equipment security test, if the security certificate of the equipment is out of date or invalid, the equipment uses multi-factor identity verification to automatically detect the validity of the certificate and update the certificate before the expiration;
if the encryption method of the equipment is unsafe, upgrading the encryption algorithm of the equipment, and carrying out an end-to-end encryption strategy on the implementation end;
if the user data stored by the device is accessed by an unauthorized third party, the device uses a data desensitization technology and implements an access control list policy.
5. The method for implementing comprehensive detection of WAPI devices of different manufacturers according to claim 1, wherein: the functional test and the compatibility test according to the WAPI functional architecture and the WAPI software architecture comprise the steps of checking the seamless cooperative working capacity of equipment of different manufacturers by simulating a real network environment, and respectively performing an operating system compatibility test, a hardware compatibility test, a network environment compatibility test, a software application compatibility test and an external equipment compatibility test.
6. The method for implementing comprehensive detection of WAPI devices of different manufacturers according to claim 1, wherein: the performance requirement of the manufacturer WAPI is evaluated by collecting data throughput through a functional test, outputting response time, error rate, concurrent connection number and power consumption, and constructing a performance evaluation model, wherein the performance evaluation model is expressed as follows:
wherein T is data throughput, R is response time, E is error rate, C is concurrent connection number, P o Is power consumption.
7. The method for implementing comprehensive detection of WAPI devices of different manufacturers according to claim 1, wherein: the evaluating the performance requirements of the manufacturer WAPI comprises evaluating the equipment based on the performance scores of the manufacturer WAPI;
when P >0.7, the performance of the manufacturer WAPI evaluates to a high score, continuously monitors performance and is regularly more feasible, encouraging users to feed back performance;
when 0.3< P > is 0.7, the performance of the manufacturer WAPI is evaluated as a medium score, the configuration or the setting of the equipment is adjusted according to the result of the performance test, and the hardware or the software of the equipment is considered to be upgraded so as to solve the bottleneck problem and improve the performance;
when P is less than 0.3, the performance of WAPI of manufacturers is evaluated as low score, deep performance and safety analysis is carried out on equipment, hardware and software are comprehensively upgraded, and if equipment problems cannot be solved or the upgrading cost is too high, retirement and equipment replacement are considered.
8. A system employing a method of implementing comprehensive detection of WAPI devices of different vendors according to any one of claims 1 to 7, wherein: the device comprises a device registration module, a functional test module, a compatibility test module, a WAPI performance evaluation module and a WAPI performance evaluation module;
the device registration module is used for verifying the identity of the device, generating a session key and registering the device;
the functional test module is used for carrying out data transmission speed test, connection stability test, equipment response time test, equipment compatibility test and equipment safety test on the functions of the equipment according to the WAPI function architecture and the software architecture;
the compatibility test module is used for simulating a real network environment and carrying out operation system compatibility test, hardware compatibility test, network environment compatibility test, software application compatibility test and external equipment compatibility test;
the WAPI performance evaluation module is used for collecting data through a functional test and constructing a performance evaluation model;
the WAPI performance evaluation module is used for outputting WAPI performance evaluation through the performance evaluation model.
9. A computer device comprising a memory and a processor, the memory storing a computer program, characterized in that the processor, when executing the computer program, implements the steps of a method of implementing the comprehensive detection of WAPI devices of different vendors according to any one of claims 1 to 7.
10. A computer readable storage medium having stored thereon a computer program, wherein the computer program when executed by a processor performs the steps of a method of implementing the comprehensive detection of WAPI devices of different vendors according to any one of claims 1 to 7.
CN202311634445.0A 2023-12-01 2023-12-01 Method for realizing comprehensive detection of WAPI equipment of different manufacturers Withdrawn CN117675641A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311634445.0A CN117675641A (en) 2023-12-01 2023-12-01 Method for realizing comprehensive detection of WAPI equipment of different manufacturers

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311634445.0A CN117675641A (en) 2023-12-01 2023-12-01 Method for realizing comprehensive detection of WAPI equipment of different manufacturers

Publications (1)

Publication Number Publication Date
CN117675641A true CN117675641A (en) 2024-03-08

Family

ID=90070818

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311634445.0A Withdrawn CN117675641A (en) 2023-12-01 2023-12-01 Method for realizing comprehensive detection of WAPI equipment of different manufacturers

Country Status (1)

Country Link
CN (1) CN117675641A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN118337314A (en) * 2024-06-13 2024-07-12 深圳市建鸿兴数字包装科技有限公司 Sectional type vertical seal automatic real-time measured value transmission and intelligent control method and system
CN118426425A (en) * 2024-05-13 2024-08-02 上海巅思智能科技有限公司 Method for quickly recovering data in numerical control process

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN118426425A (en) * 2024-05-13 2024-08-02 上海巅思智能科技有限公司 Method for quickly recovering data in numerical control process
CN118337314A (en) * 2024-06-13 2024-07-12 深圳市建鸿兴数字包装科技有限公司 Sectional type vertical seal automatic real-time measured value transmission and intelligent control method and system
CN118337314B (en) * 2024-06-13 2024-08-27 深圳市建鸿兴数字包装科技有限公司 Segmented vertical sealing automated real-time measurement value transmission and intelligent control method and system

Similar Documents

Publication Publication Date Title
US9923978B2 (en) Automated network service discovery and communication
CN117675641A (en) Method for realizing comprehensive detection of WAPI equipment of different manufacturers
US20180367567A1 (en) Systems and methods for network access control
CN103746812B (en) A kind of access authentication method and system
WO2020057163A1 (en) Mec platform deployment method and device
CN111787038B (en) Method, system and computing device for providing edge service
CN101621380B (en) A terminal security state evaluation method, network equipment and system
CN111049946B (en) Portal authentication method, portal authentication system, electronic equipment and storage medium
CN111194035B (en) Network connection method, device and storage medium
EP3614741B1 (en) Processing apparatus for terminal access to 3gpp network and communication system and corresponding system and computer program product
US11871471B1 (en) Process for managing reconnections of devices in a network
WO2021134562A1 (en) Configuration device replacement method and apparatus, device, and storage medium
CN108600156A (en) A kind of server and safety certifying method
WO2014101046A1 (en) Network device deployment method, base station, and network element management device
US20240283825A1 (en) Quality of trust framework for wireless communication networks
CN113472545B (en) Equipment network access method, device, equipment, storage medium and communication system
US10979287B2 (en) Method and apparatus for receiving a solution when configuration function verification fails in a terminal
CN111866003B (en) A terminal risk assessment method and device
CN106304071B (en) A kind of network access verifying method, access authentication equipment and system
CN109451074B (en) Server load balancing processing method based on portal protocol
US12096214B2 (en) Establishing a backup connectivity between a sensor and a management system
US7577101B1 (en) Method and apparatus for generating extensible protocol independent binary health checks
KR101262344B1 (en) System based on diameter and session management method using the same
KR102055912B1 (en) Apparatus and method for managing sharing terminal in a router environment
CN110401952A (en) An authentication method and related equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication
WW01 Invention patent application withdrawn after publication

Application publication date: 20240308