Internet access method based on identity and location separation
An access method and Internet technology, applied in the field of Internet access, can solve the problems of limited number of access nodes, large routing overhead, large address translation overhead, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0027] An Internet access method based on the separation of identity and location;
[0028] In an Internet access method based on the separation of identity and location, the dual functions of the IP address as the identity of the host and as the location of the host are separated, and the IP address is only used as the location of the host. At the same time, a new name space——EndhostIdentity (EID) is introduced, which uses EID as the identity of the host, and uses EID as the terminal identifier of TCP, UDP and other transmission protocols. Each host has a globally unique EID. Table 1 shows the format of the TCP packet using EID as the terminal identifier, and Table 2 shows the format of the UDP packet using EID as the terminal identifier.
[0029]
[0030] Table 1 TCP packet format using EID as terminal identifier
[0031]
[0032] Table 2 UDP packet format using EID as terminal identifier
[0033] In order to resolve the mapping between EID and IP address, a new dev...
Embodiment 2
[0058] Such as figure 1 shown. figure 1 Shown in is a fixed host and a single host that communicates with nodes in the Internet when it moves. figure 1 The communication source in the network moves during the communication process. It originally connected to the Internet through subnet 1, and then connected to the Internet through subnet 2 after moving.
[0059] Step 1: All nodes register their end host identifiers in the DNS server, such as the communication source registering EID 1 , the communication peer registers EID 2 , the IRS registers its own end host identifier EID in the DNS server IRS and address IP IRS .
[0060] Step 2: All nodes register their end host identifiers and current IP addresses in the IRS, such as the communication source registering EID 1 and IP 1 , the communication peer registers EID 2 and IP 2 .
[0061] Step 3: The communication source searches for the DNS server and obtains the EID of the communication peer 2 and IRS EID IRS and IP ...
Embodiment 3
[0075] Such as image 3 shown. image 3What is shown in is that the nodes in the mobile network communicate with the nodes in the Internet, AR is an access router (Access Router), and MR has enough address space to assign a unique address to each host belonging to its own network . For simplicity, only four mobile routers are shown in the figure.
[0076] The communication steps between MN and CN are as follows:
[0077] Step 1: All nodes register their end host identifiers in the DNS server, such as MN registering EID MN 、CN registration EID CN 、MR registration EID MR , the IRS registers the EID in the DNS server IRS and address IP IRS .
[0078] Step 2: All nodes register their end host identifiers and current IP addresses in the IRS, such as MN registration EID MN and IP MN 、CN registration EID CN and IP CN 、MR registration EID MR and IP MR .
[0079] Step 3: MN queries the DNS server to obtain the EID of CN CN , IRS EID IRS and address IP IRS , MR's EID ...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com