Unlock instant, AI-driven research and patent intelligence for your innovation.

System and method for access network multi-homing

A network access and multi-homing technology, applied in transmission systems, electrical components, etc., can solve problems such as host preference, adverse effects of routing performance, etc., and achieve the effect of efficient switching

Inactive Publication Date: 2010-03-31
TELEFON AB LM ERICSSON (PUBL)
View PDF0 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] 3. Host preference
On the other hand, indirect techniques using indirection points somewhere in the transit space incur adverse effects on routing performance

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System and method for access network multi-homing
  • System and method for access network multi-homing
  • System and method for access network multi-homing

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] The ability of a host to interchangeably use different IP addresses when communicating with a peer can be abused by a malicious host to communicate with the peer on behalf of a victim host without appropriate security measures in place. Such a "spoofing attack" requires the malicious host to register with the peer a set of IP addresses, including both the victim host's IP address and the IP address from which the malicious host itself can be reached. The malicious host then exchanges packets with the peer via its own IP address, while transport protocols and applications on the peer see the victim host's IP address and therefore assume they are communicating with the victim host. The interface identifier of the malicious host's IP address must be the same as the interface identifier of the victim host's IP address.

[0029] To protect hosts from exposing victims to such impersonation attacks, peers must be able to verify that all IP addresses in a set belong to the same...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A system and method for generating a set of IP addresses (21) for access multi-homing in an Internet access network. A generating host (31) obtains from the network a set of IPv6 subnet prefixes (23)for a plurality of available Internet Service Providers, ISPs. The generating host generates a single IPv6 interface identifier (22) from the subnet prefixes and cryptographically binds the subnet prefixes with the single IPv6 interface identifier. A remote peer (51) verifies that all of the IP addresses belong together by independently generating the IPv6 interface identifier from the same set ofsubnet prefixes and comparing the result with the IPv6 interface identifier generated by the generating host.

Description

technical field [0001] The present invention relates generally to communication networks, and in particular to systems and methods for access network multi-homing using cryptographically bound sets of IP addresses. Background technique [0002] Access network multihoming is a prior art where an access network is connected to multiple Internet Service Providers (ISPs) simultaneously in order to increase Internet connectivity bandwidth and increase robustness to ISP failures. Traditionally, there have been two main approaches for access network multi-homing. One is to advertise the addressing space of the multi-homed access network in the global routing system independently of the addressing space of each ISP of the multi-homed access network, thereby adding a separate routing table entry for the access network. Another approach is to let the host choose the ISP by enabling the host to dynamically switch between IP addresses from an ISP-dependent addressing space. Each addre...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/12
CPCH04L29/12952H04L61/6059H04L61/6004H04L61/6077H04L61/6068H04L29/12801H04L29/12933H04L2101/604H04L2101/668H04L2101/677H04L2101/659H04L61/5007H04L63/126H04L63/123
Inventor C·沃格特
Owner TELEFON AB LM ERICSSON (PUBL)