Network boundary treatment method

A processing method and network boundary technology, applied in the field of communication, can solve the problems of too many peripheral interfaces, inability to transmit, and the calling party cannot predict the network situation of the called party.

Inactive Publication Date: 2008-02-06
HUAZHONG UNIV OF SCI & TECH
View PDF0 Cites 30 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In theory, packet filtering firewalls can be configured to judge based on any part of the protocol header, but most filters are configured to filter only the most important data fields
[0009] In the 3G core network, unsolicited incoming calls are adopted, and the calling party cannot predict the network situation of the called party. If the called party is behind a firewall, even if a port on the firewall is opened to receive call signaling, After the call is established, the voice and video channels are allocated dynamically, so they may not be transmitted due to the firewall
However, the functions of these functional units are very repetitive. When the functions change,

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network boundary treatment method
  • Network boundary treatment method
  • Network boundary treatment method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0070] The present invention provides a network boundary processing method. When firewall / NAT traversal is required, an SBC server is set up between the user's intranet and a VoIP (Voice over Internet Protocol, VoIP) server. The implementation of the present invention as shown in FIG. 1 For example, an SBC server is set up between the 3G access network and the core network. The SBC server includes a SAG module and an MCC module. The SAG module includes the SIP protocol stack and session control functions, media session control functions, user routing and information hiding functions, and has H .428 protocol stack; communicate with the MCC module through the H.428 protocol SAG module, the MCC module has the functions of trunk index, media encryption and decryption, and RTP protocol stack. By modifying the entry corresponding to the call server (Call Server) in the domain name server, the IP address of the SBC is used as the IP address of the call server to respond to the user te...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention discloses a method of network boundary disposal, which comprises: a signaling channel is established between a first SIP terminal and a second SIP terminal; and a media cannel is established between the first SIP terminal and the second SIP terminal. The network boundary disposal method provided by the present invention can realize that a conversation edge controller is adopted to conduct firewall or NAT crossing with no change to the prior network rack. The method is a network boundary disposal mechanism which is widely used for the network systems based on SIP such as the 3G core network and the next generation network.

Description

technical field [0001] The present invention relates to the field of communication technology, in particular to a network boundary processing method based on Session Initiation Protocol (Session Initiation Protocol, SIP). Background technique [0002] With the deployment of the 3G network, and even accumulated some experience in networking and operation, the standard of the 3G network is still developing and perfecting, currently going through six stages from R99 to R7. But boundary problems such as private address translation, firewall penetration, and topology hiding still exist. [0003] First of all, in order to serve more users, the 3G core network must support the existing general packet radio service (General Packet Radio Service, GPRS) / universal mobile telecommunications system (Universal Mobile Telecommunications System, UMTS) user access, wireless local area network (WirelessLAN , WLAN) user access, even fixed users. There are great differences between these diff...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L12/46H04L12/66H04L29/06H04L12/56
Inventor 王芙蓉杨军何娟莫益军
Owner HUAZHONG UNIV OF SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products