Tunnel selection method in optimization of visit between hosts under edge network double stack access

An edge network, host technology, applied in the Internet field

Active Publication Date: 2011-02-16
TSINGHUA UNIV
View PDF1 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] This technology has disadvantages: the applications in the network are diverse, each tunnel type has its own advantages and disadvantages, and has its own scope of application, which requires CPE to support multiple tunnels (such as GRE, L2Tpv3,

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Tunnel selection method in optimization of visit between hosts under edge network double stack access
  • Tunnel selection method in optimization of visit between hosts under edge network double stack access
  • Tunnel selection method in optimization of visit between hosts under edge network double stack access

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] The CPE registers with the CGN, and the CGN obtains the tunnel information between CPE1 and CPE2, generates a capability table, and at the same time replies forward information to CPE1 to update the forward table; replies address allocation information to CPE to update the local address mapping table, such as Figure 5 . When the host H1 with the private IPv4 address of 192.168.1.2 sends data to the host H2 with the public IPv4 address of 166.111.8.56 (the address is allocated by DHCPv6 corresponding to the CGN), the data packet is encapsulated with destination and source address information and sent For CPE1 (IPv6 address: 1:0:0:0:0:0:0:1). CPE1 looks up the forward table (the non-shaded part, the shaded part is the information updated after the next step), encapsulates the data packet according to the forwarded forward table, and encapsulates the source and destination IPv6 addresses (CPE1 and CGN addresses) and ports, Then encapsulate the GRE header and send it to C...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a tunnel selection method in the optimization of visit between hosts under edge network double stack access, belonging to the field of the Internet technology. The tunnel selection method is characterized in that a tunnel selection mechanism is added to a consultation mechanism between client access equipment CPE and a network address decoder CGN, which is introduced underedge network double stack access; under the condition that all the CPEs support the tunnel mechanism in 2-3 and the CGN feeds back CGN tunnel information to each CPE according to the IPv6 address of each CPE, tunnel types supported by the CPEs and the priority grade thereof, the CGN is used for maintaining the tunnel types and other information under the edge network double stack access, and after being confirmed by the CGN, and tunnels used in the tunnel consultation mechanism are sent to the CPE used as source terminals. By the invention, the problem how to select a more proper tunnel type to carry out tunnel transmission when various tunnel mechanisms coexist can be solved, thereby better supporting the diversity of network application.

Description

technical field [0001] The tunnel selection method in the optimization of mutual access between hosts under the dual-stack access of the edge network belongs to the field of Internet technology, and is a tunnel transition technology. Background technique [0002] With the rapid development, gradual maturity and wide application of IPv6 technology, the scale of IPv6 network is gradually expanding. However, a large number of Internet applications and services are still only applicable to IPv4 network. It is a long-term and arduous task to transplant these applications and services from IPv4 to IPv6 networks. Therefore, IPv4 and IPv6 networks will coexist for a long time, and their IPv4 / v6 transition will be long-term and complicated. In the IPv4 / IPv6 interconnected network, there are some IPv6 edge networks whose access ends are IPv4 private networks. [0003] Edge network dual-stack access is a tunnel transition technology, which enables private IPv4 networks or hosts to acc...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/12H04L12/28
Inventor 崔勇陈小孩
Owner TSINGHUA UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products