200820056 九、發明說明: 【發明所屬之技術領域】 本發明係有關-種網路與網路連線,特別是指—種利用圖形使用 可利用的網路連線與裳置而達到可便利地進行連線盘 裝配網路連線與電子裝置的方法。 疋灯逆深,、 【先前技術】 目前在區_路上將_财姆置 且對使用者來說是非常不便利的。它 7万,相田複亦隹 者、4才足財彳T衣配或者重新纽網路與網路裝置。 ,„需要使用者執行絲個由操作线所提供的安裝形 衣配母—個裝置與每—個裝置的連線架構。這樣的傳統方法不 僅耗%,而且對一般使用者來說也過於複雜。 須勃舉财說’為了t裝—常見的擷取點(a_s p〇int),使用者必 802 些步驟,以完成絲轉。這些必須的步财—些是設定 送以1=安裝設定,例如發送辨、加密' 總、請求發送/清除發 案分離(fragments)。假如這些設定是錯誤的 無法與電腦產生傳達。 竹 除了沒些奴外,使用者必須手動安裝互聯網協定位址〇齡⑽ —〇丨address)。為了女裝互聯網協定位址,使用者必須透過傳輸 :貫際連線至電腦與擷取點。狀這時候讓使用者感到耗時與不方 更。為了裝配擷取點,當電腦與擷取點實際連線時 ,執行安裝程式。使用者也必須將擷取點裝配為如齡點、 =或者增強$ (repeater)等特定角色。這些需要被完全安裝的詳細 對大部分的使用者而言都是太過複雜。因此,安裝過程經常需要 =具備專業技術的人員來執行,但這些專業人員往往需要高額花費 睛。 、 當ΑΡ增進無線連線至網際網路的便利性時,然而現有的Aps建 5 200820056 立方法是相當不便的。除此之外,對—般制者而言要排 f的故障或問題是相當困難的。假如使用者的電腦無法與Ap建立連 線,使用者無法確定問題出在哪,他們僅知道網路連線失敗了。更者, :如”要重新裝配他們的網路,電腦需要再次實際與擷取點連 線亚且必須再執行一次上述的安裝程序。 這樣的絲導致當使时試著錢或#理蘭的無_路時 !到挫折。再者’因為這些醜在舊有的鱗網路系財是相洛 的,因此使得使用者接受APs的情況變得遲緩。 因此,需要—射財滅®形制者界面上枝地呈現出目前 網路配置並且讓者能躺拖練置至錢者界面的蝴卿 的區域圖像來輕易地再次裝配網路之便利地連線與配置網路連線以及 電子設備的改善方法。 ' 【發明内容】 於此係將本發明所實現的優點與所克服習知方法的缺點具體化且 明白地顯示,本發明提供—於在鱗上裝配網路、網路連線與電 子裝置的方法。 /'兒 本發明係-種_使用者界面的方法,其在拓樸圖表上便利地呈 現出目前網路架構。在網路上的每個裝置被以圖像呈現。裝置間的連 線也顯示在制者界面。如果使用者決定重聽配稱,使用者僅· 要簡單地闕對顧像並且贼裝置至設定位置。新的連線將自動ς 建立並且在使用者界社_路拓齡單將自動更新,以呈現新網路 架構。假如新架構是屬於不能相容的纽下,使用者界面將呈現出— 警告訊號以向使用者說明該項衝突。在這樣的方法下,使用者將不兩 要擔心有不適當的架構。因此’使用者可以輕易地裝配他們的網路而 而不需要具備南階的技術經驗。 使用者界面也包含有_表單,紅現_取酿客戶擷取點間 的關係。關係表單包含有兩個區域,一個區域是擷取點,另一個區^ 200820056 是客戶操取點。擷取點與客戶擷取‘關的連線是细代表每一 假如連線或 的圖像來_化呈現。因為具有拓麵表或者拓樸表單,因此使用 可以簡單地拖像域驗置祕立_連線。而且 者架構不適當的話,錯誤訊息將會通知使用者。 現出來 本發明之使用者界面也包含呈現丨連線絲。當㈣者 置時,與钱置連狀連線與裝置將於使崎界面的連·態區域呈、200820056 IX. INSTRUCTIONS: [Technical Fields of the Invention] The present invention relates to a network and a network connection, and particularly to a network connection and a shelf that can be utilized by using graphics. A method of assembling a network connection cable and an electronic device. The xenon lamp is deep, [previous technology] Currently, it is very inconvenient for the user to set the _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ It is 70,000, Xiang Tian Fu is also a squatter, 4 is only a good fortune T clothing or re-new network and network devices. , „Requires the user to perform the wire-to-make installation of the device and the device provided by the operation line. This traditional method is not only expensive, but also too complicated for the average user. The need to say that 'for t-installation--a common point (a_s p〇int), the user 802 steps to complete the silk turn. These necessary steps - some are set to send 1 = installation settings For example, send identification, encrypt 'total, request to send/clear fragmentation. If these settings are wrong, they cannot be communicated with the computer. In addition to the slaves, the user must manually install the Internet Protocol address. (10) —〇丨 address). For the women's Internet Protocol address, the user must transmit through: the computer to the computer and the point of capture. This time makes the user feel time-consuming and incompetent. Point, when the computer is actually connected to the capture point, execute the installer. The user must also assemble the capture point to a specific role such as age point, = or enhance (repeater). These details need to be fully installed. Most users are too complicated. Therefore, the installation process often needs to be performed by professional technicians, but these professionals often need high cost. When it comes to improving wireless connectivity to the Internet. Convenience, however, the existing Aps build 5 200820056 method is quite inconvenient. In addition, it is quite difficult for the general system to troubleshoot the fault or problem. If the user's computer can not be associated with Ap When the connection is established, the user can't determine where the problem is. They only know that the network connection has failed. Moreover, if you want to reassemble their network, the computer needs to connect to the point again and must Execute the above installation procedure again. Such silk leads to frustration when trying to make money or #理兰's no-road! Moreover, because these ugly old-fashioned online networks are linked to each other, the user's acceptance of APs has become sluggish. Therefore, it is necessary to connect the image of the current network configuration on the interface of the smashing-out device and allow the user to lie and drag the image of the area of the player to the interface of the money to easily re-assemble the network for convenient connection. An improved method of configuring network connections and electronic devices. SUMMARY OF THE INVENTION The present invention provides an advantage of the advantages achieved by the present invention and the disadvantages of the conventional methods overcome, and the present invention provides for assembling a network, a network connection, and an electronic device on a scale. method. The present invention is a method of user interface that conveniently presents the current network architecture on a topographical diagram. Each device on the network is rendered as an image. The connections between the devices are also displayed on the maker interface. If the user decides to listen to the assignment, the user simply has to slap the image and the thief is set to the set position. The new connection will be automatically established and will be automatically updated in the user community to present the new network architecture. If the new architecture is incompatible, the user interface will present a warning signal to explain the conflict to the user. Under such an approach, users will have to worry about having an inappropriate architecture. Therefore, users can easily assemble their networks without the need for Southern technical experience. The user interface also contains a _ form, which is the result of the relationship between the customers. The relationship form contains two areas, one is the capture point and the other is ^200820056 is the customer operation point. The point of contact with the customer and the ‘off line is a fine representation of each image that is connected or imaged. Because it has a tabular table or a topological form, it can be easily dragged and used to verify the secret_connection. If the architecture is not appropriate, the error message will inform the user. It is now apparent that the user interface of the present invention also includes the presenting of a wire. When (4) is placed, the connection and the connection with the money will be displayed in the connected state of the interface.
目丽尚未伽為網路-部份的任何未使職置將呈現在使用者界 面的未使職置區域。使用者可以簡單地拖驗置賴像進入使用者 界面的拓樸表單或者_表單來賴目前尚未使用的裝置。如果竿構 是相容的,使用者界面將進行更新以呈現出新的網路架構。 本發明自動地職鱗連線並允許制者可輕純擷取連線至操 取點(AP)的網路或者裝置。除此之外,拓樸使用者界面允許使用者 能夠輕易地裝配裝置與網路間的連線。 除了將電腦與網路進行無線連線外,本發明也可以使用在不同應 用例如Wi-Fi揚聲為、Wi_Fi電視應用等。舉例來說,電腦可無線連線 至Wi Fi 為並且在電腦播放的音效檔將可由西丨_闩揚聲器接收到。 利用本發明之方法,使用者可以㈣地與可接收無線電之裝置連線。 〜在本發明的具體實施例中,所有應用裝置的預先設定是Ap模組。 这意味著當裝置開啟電源或重制機時,裝置自練配細取點。電 腦掃瞄並且經由無線連線裝配裝置的設定。因為裝置是自 模組’電腦可以Μ地_裝置與建立連線。 為 衣置了以被叹疋為各戶ΑΡ模組並且透過另外αρ執行應用。舉例 來歧,在網路上已經具有一 Αρ時,在網路加入新的裝置,新的裝置 將被偵測為第二ΑΡ。新的裝置隨後可以再次裝配為客戶Αρ並與原本 連線 旦!線連線被建立,電腦可以進行傳輸資料或者與裝置連 線。 ’、 7 200820056 料庫°所有的連«料被儲存在資 利L ΑΡ ΐΐΪ! 網路假如在掃猫過程中’先前可 否掃瞄或移除這個連線資料。 者了 ^、擇疋 客戶==瓣可以輕易地重新裝配網路架構以及_ ===如網路架構遭遇到問題,咖 技 術二::==明’當更容一之㈣ 先前-般贿與隨贿盡的描述都僅是制並且是騎清 本發明之申請專利範圍内之精神。 睪 【實施方式】 相關資料將在本發明之具體實_巾詳細描述,實關的範例將 描^相關圖式中。圖中所使用的相同參考標號與敘述在盡可能的情 況下是指相同或近似的部分。 請參閱第1圖,其係為本發明之無線網路環境實施例方塊示意圖。 利用本發明之方法可以容易地配置無線網路環境與維修,因此無 線網路環境100可以更為龐大。 如同第1Α圖所示,環境1〇〇可包含有電腦彳彳〇、一擷取點12〇、 一客戶擷取點140、可作為擷取點的裝置15〇、151、152以及網際網 路擷取130。可作為擷取點的裝置15〇、151、152包含有例如線上電 視(AP enabled TV)、線上電話(AP enab丨ed speakers)、線上遊戲 (AP enabled gaming devices)或者線上混音系統(Ap enab|ed stereo system)。 為了將電腦與AP無線連線,裝置是設定在AP模組依據電源啟動 或重新啟動。使用者藉由點選軟體使用者界面的掃瞄按鈕選擇執行掃 猫。電腦將掃瞄所有APs。電腦軟體將利用由操作系統所提供之掃瞒 8 200820056 應用程式界面(API)進行掃瞄。 線至AP後,魏將進==^:取t連線至發_AP。在連 界面呈現二的1料軟存所有貧料於資料庫中並且在軟體使用者 裝配連線。裝置等級或者裝置連 =::;===次 在這樣的方式下,裝置間的連線可利用軟體自=3=動處= 由使:;==,不再需透過手動方式來二裝二J 用者二圖,其係本發明之具有拓樸圖表之網路結構的圖形使 ^ 223 ΐί [ J冗=爾構。在網路上的所有裝置使用對應的圖: ^不。在弟1B圖所舉的範例中,網路包含_ 225、續擁取點 際網路228連線的擷取點226。 電知225疋赠連線到與網 其匕組成連線至擷取點。在這個實施例中,在 ”占或者 是被呈現在關係表單222的左側如同―樸; 200820056 侧表示擷取點229與網際網路231連線。 的、商點選拓樸表單221或關係表單222上的裝置時,該裝置 被呈現在連線狀態區域223。在這個範例中,使用 %。連線狀態區域223展示*擷取點233是連線至 壯罢^某些網路狀態具有未使用或者額外未與網路連線的裝置。這些 衣置,呈現在使用者界面220的未使用裝置區域224。在第 ^ :^使用練點242是可利用的但目前尚未被使用的。除此之外, 支t之更多裝置可利用’這些額外裝置可呈現在未 ## + 過㈣代表裝置的®像至拓樸表I 221 =早222力内來輕易地在於網路上使用未使用裝置區域224所呈現的 ^力ί架構是相容的,使用者界面將進行更新,以呈現新的架構。 ^如采構是不相容的,賴诗告訊如告知朗者架财問題。並 二想要將—裝置由網路上切斷時,可以簡單酬代表 33=由拓樸表單221或者關係表單222至未使用裝置區域 個者界面22Q清楚地與邏輯地展示出網路雜所包含 衣置”裝置關連,’減用者可峨速且容純配置或重新配置 他們的網路’而無須高階的技術經驗。 更者’在賴者界社像具有—朗裝標藏。這 =衣置標射雜使时輕祕改變叹清楚定義職置或者讓使用 者識別裝置。此外朗者可以改财__,以更清楚區分各裝置。 =樣,允許仙者自訂❹者界_樣子。在本發具體實施例 :,裝置圖像將自動修改以反應裝置狀態的改變。舉例來說,假如擷 點被重新配置為客戶操取點,該圖像將由齡點圖像改 掘 取點圖像。 請參閱第2A目,其係為本發明之基本無線環境具體實施例示意 200820056 圖。 第m圖中^無線網路環境200包含有電腦201、第一 Ap2〇2、 G5以及網際網路摘取2G3。錢者可以利用 =AP202擷取網際網路資源。第二Ap2〇4配置為客戶Ap並且透 k弟- AP202將無線裝置205與電腦2〇1連線。 在第2A圖中所描績出的無線網路環境係如下配置。a =^=_軸或者錄啟動。使__她吏用^ 利用由系麟提供卿_雜式界面⑽)進行_ 將 =軟=將發現财APs並且將他們呈現在軟體使用料面的拓 樸圖表上。%腦軟體在電腦端的資料庫内存取所有的掃猫資料。 ^在這個範例中,電腦偵測第—Ap與第二Ap。剛開始第一 弟ΑΡ兩者都被呈現為用戶Aps。再由使用者決定是否與第二μ 連線或者疋否將第二AP裝配為客戶ap。 假如仙者決定電腦與第二AP連線,使用者僅需簡單地點選軟 肢使用者界面拓樸圖表上的第三AP圖像,電腦軟體隨後將 電腦與第二AP連線。 將 ^假如使用者決定第二AP將成為客戶Ap,第二Ap將在第一 Ap 官理下進行連線。假如使用者被要求輸入上網密碼(WEp “丫)時, 一彈出式視窗將要求使膽輸人密碼。在不需要上_碼時,這=步 驟將會被略過。最後,電腦軟體將自祕_裝_路,因此電腦ς 透過第一 AP與第二AP或者客戶AP連線。 、 請參閱第2B圖,其係為本發明之第2A圖的無線網路環境中電腦 的圖形使用者界面具體實施例示意圖。 本發明的軟體使用者界面220包含有拓樸表單221、關係表單 222、連線狀態223以及未使用AP表單224。 、、 在電腦225掃猫環境後,所有被偵測到的APs226、227被以固 11 200820056 像在拓樸表單221上呈現。在第2A圖的範例環境中,電腦225 _ 到第一 AP226與第二AP227並在界面220在拓樸表單221上呈現出 兩者。 第一 AP229與第二AP230在關係表單222上以圖像呈現出來。 關係表單包含有AP區域與呈現連線至AP的裝置或者網路的區域。因 為第- AP229與第二AP230力者皆被_為APs,因此他們都被呈 現在AP區域。在這個時候,其它的區域是空的。 請參閱第2C圖,其係本發明之帛2A圖無線網路環境中電腦的圖 形使用者界面的具體實施例示意圖。 在這個範例中’使用者選擇將電腦225透過第—Ap226 際網路228。使用者僅需簡單的闕位在拓樸表單221上的第一 AP226 ®像,軟體將架構資料儲存在電腦端㈣料庫中並且自動地配 置無線環境。軟體制者界面22G的拓樸表單22彳呈現出電腦225盘 網際網路22δ兩者間透過第一 AP進行連線。 /、 關係表單222顯示出在ΑΡ區域的第_ Αρ229與在其它區域和第 9一二2Γ連?的網際網路231。此時,在拓樸表單221與關係表單 二中’第一 AP23G被顯示為與電腦與網際網路231都無連線。 #你j閱第2D圖,其係本發明之第2Α圖無線網路環境中電腦的圖 形使用者界面的具體實施例示意圖。 假如使用者決定電腦225與第:ΑΡ227進行連線,使用者僅需點 ί構3表上的第二奶27圖像,軟體將在電腦端資料庫儲存 =構貝枓亚且自動配置無線環境。軟體使用者界面22G的拓樸⑵ 壬現出電腦225與第二AP227間的連線。 、 =表單222顯示出AP區域具有第二Ap23〇而其它區域是空 “,在拓樸表單221與關係表單222兩者皆顯示第- AP229 /、電腦225切斷連線但與網際網路228連線。 睛翏閱第2E圖,其係本發明之第2A圖無線網路環境中_的圖 12 200820056 形使用者界面的具體實施例示意圖。 選二 庫’使用者經由簡單地點 軟趙使用者界二:自動地配置環境。 偭ϋ丨由 u 連、、友狀恶區域223呈現出連線資料。在這 Π日 域223顯示出電腦232連線至第二ΑΡ233。 -旦使^者中’ ί二ΑΡ包含有音訊裝置,例如音效卡。 ^ 、表早上的第二ΑΡ時,將可由音塑裝置靜到雷腦 ΐ放自方法,本發明將可讓電腦無_轻音響裝 ^自電恥揚耸态的聲音現在可以由^ ^ ::g;^ 贫象=^=定第二AP227將是客戶AP,賴者僅_地拖 AP227彳m λρ之圖像AP226上方,倾將錄裝配第二 用紗m ^且在細端_庫儲存這個配《訊。軟體使 與第u 腦225透過第—AP229連線至網際網路231 :錢者試著以不可行或者不相容裝㈣方絲配置環境時,軟 吏用者這樣的連線或者架構是不可行的,以防止使用者錯 請參閱第2G圖,其係為本發明之第2Α 圖形使用者界面的具體實施例示意圖。 衣兄中4的 當使用者希望f腦225連線衫二ΑΡ227時,使 二ΑΡ227的圖像並且電腦225透過第_ Αρ226與第二Αρ227連線。 連線訊息將呈現在連線狀態區域223。 、 請麥閱第3Α圖,其係為本發明之無線網路環境中電腦的圖形使用 200820056 者界面的具體實施例不意圖。 在第3A圖所描述之無線網路環境包含有連線至第一 Ap226與第 - AP227之電腦225。第- AP226配置為允許電腦225能夠擷取網 際網路228。第一客戶AP240與第二客戶ΑΡ241係連線至第二 ΑΡ227。軟體使用者界面220在拓樸表單221與關係表單222上呈 出連線資料。 請參閱f 3Β目,其係為本發明之無線網路環境中電腦的圖形使用 者界面的具體實關示意圖,以及第3C _卿制者界面警告訊 號的具體實施例示意圖。 σ 口 ° 為了重新配置網路環境,電腦掃瞒並且在電腦端資料庫記錄所有 連線資料。使用者拖受客戶ΑΡ243至第一 ΑΡ229上來重新配置網路, 因此客戶ΑΡ243係隸屬第—ΑΡ229管理。接著,軟體繼是否第一 ΑΡ229 是一個路由 AP (routing ΑΡ)。 ▲假如第一 AP229是一個路由AP,軟體將連線至客戶AP243並且 改k它的配置以連結至第„ AP229。假如Ap需要WEp錄匙,使用 者需正確地輸入錄匙。 一在配置儲存後,使用者將可在軟體使用界面2〇〇上看到新的配置 資料,如第3C圖所示。 ^在些範例中,使用者可能試著在某種程度上重新配置沒有實質 放應的網路。舉例來說,假如使用者拖吳AP1 229至Ap2咖下,這 個,作疋;^允許的。軟體將會通知朗者這樣的連線或者架構是不 :仃的’如第3C圖所示。這樣將可防止使用者免於不慎錯誤配置環 士兄。 田使用者重雜置網路環境,軟體自動提示使用者詢問訊息是否 ”,線與配置資料需要被儲存。在上述實施例中,第一客戶Μ被 移^第一 APT。原本的配置包含位在第二AP下的第-客戶AP與第 一客戶ΑΡ。軟體詢問使用者是否第-客戶ΑΡ與第二客戶ΑΡ的連線 14 200820056 如細麵爾_料,它科齡/ 月_貝m内。精由這樣的方式 曰破儲存在電 狀態,體將由資料庫擷取出相闕資料並且自動地回到原有 需要自動重新配置客戶AP。假如使;^者闕於軟體是否 2:Z:::Wi (—> - -, Λητ;;, ::=r4r- 如使用者不較保留該項資料,它將句細*轉在賴庫内。假 客戶AP。 、 ^ 茱並且提示使用者需重置 問題叫軟體界面將在連線狀態上顯示出有 1 ΐίί! 1嶋單料絲齡_述。 時,===線至客戶ΑΡ並且電腦不用偵測客戶- 被_在連缘軟體_客戶Αρ,連線資料將 使用者=客戶Αρ ’軟體將通知 項資料,舰崎娜巾=i;:f機留該 該項資料將被捨棄。 者不希主❹該項資料, 圖形使用者界面顯示出目前連後金 At 戶AP時,情況將呈現在使用者配置狀恶°當電腦沒有偵測客 個f Ϊ 最大允許裝置,歧線情況下試著去增加另一 抑輕易地Γ用點選或裝置。使用者 p M m ®像裝置來概裝置並且將該 Θ ㈣ΑΡ表單。代表I置的表單將被呈現在未使用的 15 200820056 y表單讀將來_。t使转想要去制軸 要拖矣職置__、表單或者拓樸表單。 用者僅轉 配置二使用者能夠加入新的裝置。電腦將連線至新 、’4,如同先闕描述。連線資料將 内亚且使用者界面顯示出目前連線狀態。 子^糾貝抖庫 當電腦沒有摘測到特定ΑΡ或者客戶Αρ並且電腦具有乙太網 線曰守,電腦透過乙太網路進行掃描,以伽脚或者客戶A 腦偵測到裝置’電腦將重新配職 在使用者㈣絲使驗表輪太晴^ 將破顯不 同,地,假如電腦是_乙太網路連線來無線連線至Αρ 透過ΑΡ掃描乙太網路。個‘+ Η4<<沾、以自將 裝置為乙太網路裝置。心刺讀置,職新配置該 2同先㈣it ’本發明提供—鋪由在卿使用者界面上呈現 、、= :’來剌Ir於在鱗網路魏巾建立連軸裝配電子裝置的 線。。除此之外’電子裝置配置連鱗不需要透職線實際與擷取點連 熟習該項技蟄者當知依據本發明所做的各種均等變化或修 =所進行的各種均等·或修飾,故即凡依本發明 = =及精神所為之均等變化或修飾,均應包括於本發明之中請 唯以上所述者’僅為本發明之較佳實施例而已,並翻來限 =明實施之細。故即凡依本發日种請翻·之概及精神所為= 句等變化或修飾,均應包括於本發明之帽專利範圍内。 ^ 【圖式簡單說明】 、相關圖式翻來增輯本發明_解並且相_枝合併 於成本發明之詳述部分。在這些圖式中·· 16 200820056 第1A圖為本發明之無線網路環境實施例方塊示意圖; 第1B圖為本發明之具有拓樸圖表之網路結構的圖形使用者界面示意 圖; 第2A圖為本發明之基本無線環境的具體實施例示意圖; 第2B-2G目為本發明之第2A _無線網路環境中電腦的 界面具體實施例示意圖; 第3A圖為本發明之無線網路環境中電腦的圖形使用者 施例示意圖; κ 的圖形使用者界面的具體實 第3Β圖為本發明之無線網路環境中電腦 施例示意圖; 第3C圖為圖形使用者界面警告訊號的具體實施例示意圖 【主要元件符號說明】 1〇〇無線網路環境 110電腦 120擷取點Anything that has not yet been swayed into the Internet - part of the unemployed area that will not be placed on the user interface. The user can simply drag and drop the top-level form or _form that enters the user interface to rely on devices that are not currently in use. If the structure is compatible, the user interface will be updated to present a new network architecture. The present invention automatically connects to the scales and allows the system to simply retrieve the network or device that is connected to the point of operation (AP). In addition, the top-level user interface allows users to easily assemble the connection between the device and the network. In addition to wirelessly connecting the computer to the network, the present invention can also be used in different applications such as Wi-Fi, Wi-Fi TV applications, and the like. For example, a computer can wirelessly connect to Wi Fi and the audio file played on the computer will be received by the Wester_Latch speaker. With the method of the present invention, the user can (4) connect to the device that can receive the radio. ~ In a specific embodiment of the invention, the pre-setting of all application devices is an Ap module. This means that when the device is powered on or re-machined, the device is self-practicing with fine points. The computer scans and assembles the device via a wireless connection. Because the device is self-module, the computer can be connected to the device. For the clothing, the sigh is used as a module for each household and the application is executed by another αρ. For example, when there is already a Αρ on the network, a new device is added to the network, and the new device will be detected as the second device. The new unit can then be assembled again as a customer and connected to the original! A wire connection is established and the computer can transfer data or connect to the device. ’, 7 200820056 All the materials in the library are stored in the capital L ΑΡ ΐΐΪ! If the network is in the process of sweeping the cat, the connection data can be scanned or removed previously. ^, 疋 疋 customers == 瓣 can easily reassemble the network architecture and _ === If the network architecture encounters problems, coffee technology 2::== Ming's more to one (4) Previous-general bribes The descriptions of the bribery are only systemic and are the spirit of the patent application within the scope of the invention.睪 [Embodiment] The related materials will be described in detail in the specific embodiment of the present invention, and examples of actual implementation will be described in the related drawings. The same reference numbers and descriptions used in the drawings refer to the same or similar parts as far as possible. Please refer to FIG. 1 , which is a block diagram of an embodiment of a wireless network environment of the present invention. The wireless network environment and maintenance can be easily configured using the method of the present invention, so the wireless network environment 100 can be made even larger. As shown in Figure 1, the environment 1 can include a computer port, a pick-up point 12, a customer access point 140, devices that can be used as pick-up points, 15, 151, 152, and the Internet. Take 130. The devices 15 〇, 151, 152, which can be used as capture points, include, for example, an AP enabled TV, an AP enab丨ed speakers, an AP enabled gaming device, or an online mixing system (Ap enab). |ed stereo system). In order to wirelessly connect the computer to the AP, the device is set to start or restart according to the power of the AP module. The user selects to execute the sweeping mouse by clicking the scan button of the software user interface. The computer will scan all APs. The computer software will be scanned using the broom 8 200820056 application interface (API) provided by the operating system. After the line to the AP, Wei will enter ==^: Take the t connection to the _AP. In the interface, the two materials are stored in the database and all the software users are connected. Device level or device connection =::;=== times In this way, the connection between devices can use software from =3=moving = by::==, no need to manually install two The second diagram of the second user, which is a graph of the network structure of the present invention having a topographical graph, makes the 223 ΐ [ [J redundant]. All devices on the network use the corresponding map: ^No. In the example given in Figure 1B, the network contains _225, which continues to capture the point 226 of the network 228 connection. The cable is connected to the network and its connection to the pick-up point. In this embodiment, the "accounting" is presented on the left side of the relationship form 222 as "Pak"; the 200820056 side indicates that the picking point 229 is connected to the Internet 231. The business point selection top form 221 or relationship form When the device is 222, the device is presented in the connection status area 223. In this example, % is used. The connection status area 223 is displayed. * The capture point 233 is connected to the network. Some network status has not Devices that are or are not otherwise connected to the network. These devices are presented in the unused device area 224 of the user interface 220. The use point 242 is available but not yet used. In addition, more devices can be used to 'apply' in the ## + + (4) representative device's ® image to topology table I 221 = early 222 force to easily use on the network unused The architecture of the device area 224 is compatible, and the user interface will be updated to present a new architecture. ^ If the architecture is incompatible, Lai Shi’s announcement is to inform the public. And if you want to remove the device from the network, you can The single reward representative 33=from the topology form 221 or the relationship form 222 to the unused device area individual interface 22Q clearly and logically shows that the network miscellaneous includes the clothing "device, the reducer can idle and accommodate Purely configure or reconfigure their network' without the need for advanced technical experience. Moreover, the image of the Lai’s community has a slogan. This = when the clothing is used to make a secret change, sigh clearly define the position or let the user identify the device. In addition, the lang can change the __ to distinguish the devices more clearly. = sample, allowing the immortal to customize the 界 _ _ _. In a particular embodiment of the invention: the device image will be automatically modified to reflect changes in device status. For example, if the point is reconfigured as a customer fetch point, the image will be digested from the age point image to take the point image. Please refer to item 2A, which is a schematic diagram of a specific embodiment of the basic wireless environment of the present invention. In the mth figure, the wireless network environment 200 includes a computer 201, a first Ap2〇2, a G5, and an Internet access 2G3. Money can use the =AP202 to capture Internet resources. The second Ap2〇4 is configured as a client Ap and the wireless device 205 is connected to the computer 2〇1. The wireless network environment shown in Figure 2A is configured as follows. a =^=_axis or record start. Let __ her use ^ to use the _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ % brain software accesses all sweeping cat data in the database on the computer side. ^ In this example, the computer detects the -Ap and the second Ap. At the beginning, the first brother-in-law was presented as a user Aps. Then the user decides whether to connect with the second μ or whether to assemble the second AP as the client ap. If the immortal decides to connect the computer to the second AP, the user simply selects the third AP image on the soft-limb user interface topology diagram, and the computer software then connects the computer to the second AP. ^ If the user decides that the second AP will become the customer Ap, the second Ap will be connected under the first Ap. If the user is asked to enter the Internet access code (WEp “丫”), a pop-up window will ask for a password. If the _ code is not needed, the step will be skipped. Finally, the computer software will be The secret _ installation _ road, so the computer 透过 through the first AP and the second AP or customer AP connection. Please refer to Figure 2B, which is the graphic user of the computer in the wireless network environment of Figure 2A of the present invention. A schematic diagram of a specific embodiment of the interface. The software user interface 220 of the present invention includes a topology form 221, a relationship form 222, a connection state 223, and an unused AP form 224. After the computer 225 scans the cat environment, all are detected. The arriving APs 226, 227 are presented as a solid form 11 200820056 on the topology form 221. In the example environment of FIG. 2A, the computer 225_ is presented to the first AP 226 and the second AP 227 and on the topology 220 at interface 220. The first AP 229 and the second AP 230 are presented as images on the relationship form 222. The relationship form includes an AP area and an area for presenting a device or network connected to the AP. Because the first AP 229 and the second AP 230 Forces are all _ for APs, They are all presented in the AP area. At this time, the other areas are empty. Please refer to FIG. 2C, which is a schematic diagram of a specific embodiment of the graphical user interface of the computer in the wireless network environment of FIG. In this example, the user selects to pass the computer 225 through the first-Ap226 network 228. The user simply needs to place the first AP226® image on the topology form 221, and the software stores the architecture data on the computer. (4) The wireless environment is automatically configured in the repository. The topology form 22 of the soft system interface 22G presents the computer 225 disk Internet 22δ connected through the first AP. /, the relationship form 222 is displayed in The first AP23G is displayed as the computer and the Internet in the top form 221 and the relationship form two in the _ Α ρ 229 of the ΑΡ area and the Internet 231 connected to the other areas and the ninth and the second 。. There is no connection between 231. #你j看第2D图, which is a schematic diagram of a specific embodiment of a graphical user interface of a computer in a wireless network environment according to the second aspect of the present invention. If the user decides to perform the computer 225 and the first: 227 Connection The user only needs to click on the second milk 27 image on the 3 table, the software will be stored in the computer database = 构贝枓亚 and automatically configure the wireless environment. The topology of the software user interface 22G (2) is displayed The connection between the computer 225 and the second AP 227. = Form 222 shows that the AP area has the second Ap23 and the other areas are empty, and both the top form 221 and the relationship form 222 display the first - AP229 /, computer The 225 disconnects the connection but is connected to the Internet 228. FIG. 2E is a schematic diagram of a specific embodiment of the user interface of FIG. 12 in the wireless network environment of FIG. 2A of the present invention. Select the second library 'users via a simple location Soft Zhao user boundary two: automatically configure the environment.连The connection data is presented by the u-connected, friend-like area 223. In this day field 223, the computer 232 is connected to the second port 233. - In the case of '^', there is an audio device, such as a sound card. ^, the second time in the morning of the table, will be able to be silenced by the sound plastic device to the thunder brain ΐ self-method, the invention will allow the computer to have no _ light audio installation ^ self-shaking voice can now be ^ ^ : :g;^ Poor image =^= The second AP227 will be the client AP, and the image will be over the image AP226 above the AP227彳m λρ, and the second mesh yarn will be recorded and assembled in the thin end. Save this match. The software connects the first brain 225 through the AP-229 to the Internet 231: When the money tries to configure the environment in an infeasible or incompatible (4) square wire, the connection or architecture of the soft user is not available. For the purpose of preventing the user from being wrong, please refer to FIG. 2G, which is a schematic diagram of a specific embodiment of the second graphical user interface of the present invention. When the user wants the f brain 225 to connect to the second 227, the image of the second 227 and the computer 225 are connected to the second Αρ227 through the first _ Αρ226. The connection message will be presented in the connection status area 223. Please refer to Figure 3 for the graphic use of the computer in the wireless network environment of the present invention. The specific embodiment of the 200820056 user interface is not intended. The wireless network environment depicted in Figure 3A includes a computer 225 that is coupled to the first Ap 226 and the - AP 227. The first-AP 226 is configured to allow the computer 225 to capture the Internet 228. The first client AP 240 is connected to the second client 241 to the second port 227. The software user interface 220 presents connection data on the topology form 221 and the relationship form 222. Please refer to the F3 project, which is a specific implementation diagram of the graphical user interface of the computer in the wireless network environment of the present invention, and a schematic diagram of a specific embodiment of the 3C_clearer interface warning signal. σ port ° In order to reconfigure the network environment, the computer brooms and records all connection data in the computer-side database. The user drags the client 243 to the first 229 to reconfigure the network, so the client 243 is affiliated with the ΑΡ229 management. Next, the software follows whether the first ΑΡ229 is a routing AP (routing ΑΡ). ▲ If the first AP229 is a routing AP, the software will connect to the client AP243 and change its configuration to link to the AP 229. If the Ap requires a WEP key, the user needs to enter the key correctly. After that, the user will be able to see the new configuration data on the software interface 2, as shown in Figure 3C. ^ In some examples, the user may try to reconfigure to some extent without substantial responsibility. For example, if the user drags Wu AP1 229 to Ap2, this is done; ^ is allowed. The software will notify the Langer that the connection or architecture is not: 仃' as in 3C As shown in the figure, this will prevent the user from accidentally misconfiguring the ring brother. The field user is confused with the network environment, the software automatically prompts the user to ask if the message is ", and the line and configuration data need to be stored. In the above embodiment, the first client Μ is moved to the first APT. The original configuration includes the first-client AP and the first client 位 located under the second AP. The software asks the user whether the first-client is connected to the second customer. 14 200820056 As detailed, it is aged/month_bay. In this way, the storage is in the electrical state, the body will extract the relevant data from the database and automatically return to the original need to automatically reconfigure the client AP. If you make ^^ to the software whether 2:Z:::Wi (-> - -, Λητ;;, ::=r4r- If the user does not retain the information, it will be fine* Inside the library. Fake client AP., ^ 茱 and prompt the user to reset the problem. The software interface will display 1 ΐ ίίίίίίίίίίίίίίίίίίίίί ΑΡ and the computer does not need to detect the customer - is _ in the splicing software _ customer Α ρ, the connection data will be user = customer Α ρ 'software will inform the item information, the ship saki na towel = i;: f machine to leave the information Was abandoned. The user does not wish to take the information, the graphical user interface shows that when the current AP At AP is connected, the situation will appear in the user configuration. When the computer does not detect the guest f Ϊ the maximum allowed device, In the case of a line, try to add another one to easily use the click or device. The user p M m ® like the device and the Θ (4) ΑΡ form. The form representing I will be presented in the unused 15 200820056 y form read the future _.t turn to want to go to the axis to drag the job __, form or topology form The user only transfers the configuration to the second user to be able to join the new device. The computer will be connected to the new, '4, as described first. The connection data will be displayed in the inner Asia and the user interface shows the current connection status. When the computer does not take a specific measurement or customer Αρ and the computer has an Ethernet cable, the computer scans through the Ethernet, and the device is detected by the gamma or the customer A brain. The user (4) wire makes the watch wheel too clear ^ will be different, if the computer is _ ethernet connection to wirelessly connect to Α through the ΑΡ scan Ethernet. A '+ Η 4<< The device is an Ethernet device. The heartbeat reads, the new configuration of the 2 is the same as the first (four) it 'the present invention provides - the shop is presented on the user interface of the Qing, = : '来剌Ir in the scale The network Wei towel establishes a line for assembling the electronic device. In addition to the 'electronic device configuration, the scale does not need to pass through the line. Actually and the point of acquisition is familiar with the skill. Those who know what to do according to the invention Equal change or repair = various equals or modifications performed, so Equivalent changes or modifications in accordance with the present invention are included in the present invention. The above description is only for the preferred embodiment of the present invention, and is limited to the details of the implementation. Therefore, any change or modification of the sentence, such as the general statement and the spirit of the present invention, shall be included in the scope of the cap patent of the present invention. ^ [Simple description of the schema] The present invention is based on the detailed description of the invention. In the drawings, FIG. 1A is a block diagram of an embodiment of a wireless network environment of the present invention; FIG. 2A is a schematic diagram of a specific embodiment of a basic wireless environment of the present invention; 2B-2G is a second computer interface of the present invention in a wireless network environment FIG. 3A is a schematic diagram of a graphical user of a computer in a wireless network environment of the present invention; FIG. 3 is a schematic diagram of a graphical user interface of the present invention. schematic diagram Figure 3C is a schematic diagram of a specific embodiment of a graphical user interface warning signal. [Main component symbol description] 1. Wireless network environment 110 computer 120 capture point
130網際網路擷取 140客戶端擷取點 150可作為擷取點的裝置 151可作為擷取點的裝置 152可作為擷取點的裝置 200無線網路環境 201電腦 202 第 一 Αρ 203網際網路擷取 204 第二 αρ 205無線裝置 220軟體使用者界面 17 200820056 221拓樸表單 222關係表單 223連線狀態區域 224未使用裝置區域 225電腦130 Internet access 140 client capture point 150 can be used as the capture point device 151 can be used as the capture point device 152 can be used as the capture point device 200 wireless network environment 201 computer 202 first Α 203 203 Internet Road capture 204 second αρ 205 wireless device 220 software user interface 17 200820056 221 topology form 222 relationship form 223 connection status area 224 unused device area 225 computer
226 第一 AP 227 第二 AP 228網際網路 229 AP1226 First AP 227 Second AP 228 Internet 229 AP1
230 AP2 231網際網路 232電腦 233 第二 AP 240第一客戶AP 241第二客戶AP 242第一客戶AP 243第二客戶AP230 AP2 231 Internet 232 Computer 233 Second AP 240 First Client AP 241 Second Client AP 242 First Client AP 243 Second Client AP