Method and device for building tunnels as well as network equipment

A technology for tunnel establishment and network protocol, which is applied in the field of network communication and can solve the problems of inability to meet the requirements of 6rd tunnel and 6rd tunnel.

Active Publication Date: 2012-12-12
RUIJIE NETWORKS CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] From the above, it can be known that the address prefix of IPv6 packets in the 6rd tunnel can be flexibly defined, unlike the 6to4 tunnel which starts from 2002 fixedly. Therefore, the address mapping scheme of the 6to4 tunnel cannot meet the needs of the 6rd tunnel
However, the source IP address and destination IP address of the IPv4 packets in the manually configured tunnel are fixed, which is contrary to the flexible IPv6 address style of the 6rd tunnel, and cannot meet the needs of the 6rd tunnel.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for building tunnels as well as network equipment
  • Method and device for building tunnels as well as network equipment
  • Method and device for building tunnels as well as network equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0032] image 3 It is a flow chart of the method for establishing a tunnel provided by Embodiment 1 of the present invention. The executor of this embodiment may be a router, especially a router at the border of an IPv6 network and an IPv4 network, that is, the router is in both an IPv6 network and an IPv4 network. Such as image 3 As shown, the tunnel establishment method in this embodiment includes:

[0033] Step 301, the receiving module receives the first message of the first network protocol, and sends the first message of the first network protocol to the processing module according to the pre-configured first routing information; the first routing information includes the first network protocol a protocol address prefix and a first mask length, the first packet of the first network protocol includes a first destination address;

[0034] First, before step 301 is executed, first routing information is pre-configured on the router, where the first routing information i...

Embodiment 2

[0051] Figure 4 It is a flow chart of the tunnel establishment method provided by Embodiment 2 of the present invention. This embodiment is based on embodiment one, such as Figure 4 As shown, the difference from Embodiment 1 is that step 303 specifically includes:

[0052] Step 303a, the processing module generates second routing information according to the first destination address, the first mask length and the pre-configured second mask length;

[0053] Specifically, the processing module may use the methods described in steps 3031 to 3034 to generate the second routing information, but it is not limited thereto. Wherein, the pre-configured second mask length may also be other values, for example: 32.

[0054] Step 303b, the processing module encapsulates the first packet of the first network protocol into the first packet of the second network protocol according to the second routing information, and forwards the first packet of the second network protocol according ...

Embodiment 3

[0062] Figure 5 It is a flow chart of an implementation method for the receiving module to forward the second packet of the first network protocol provided by Embodiment 3 of the present invention. Such as Figure 5 As shown, the forwarding method of this embodiment includes:

[0063] Step 501, the receiving module receives a second message of the first network protocol, and the second message of the first network protocol includes a second destination address;

[0064] This step specifically refers to that the exchange chip receives an IPv6 message other than the first IPv6 message, and the IPv6 message includes a destination IPv6 address, such as a destination IPv6 address 1000:303:300::1; wherein, due to the second IPv6 message The first IPv6 message and the first IPv6 message are sent by the same device and sent to the same other device, therefore, the first IPv6 message and the second IPv6 message have the same source IPv6 address and destination IPv6 address, that is,...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method and device for building tunnels as well as network equipment. The method comprises the following steps: a first message of a first network protocol is received by a receiving module, and is sent to a processing module according to the first pre-configured routing information, wherein, the first routing information comprises a first network protocol address prefix and a first mask length, and the first message of the first network protocol comprises a first destination address; and the second routing information is generated by the processing module according tothe first destination address, the first mask length and a second pre-configured mask length, and is stored in to the receiving module so that the receiving module forwards the received second message of the first network protocol according to the second routing information. By adopting the technical scheme of the invention, a 6rd tunnel can be implemented in the existing network, the forwarding of the internetwork message is realized through the 6rd tunnel, and the flexibility of the 6rd tunnel can be given full play.

Description

technical field [0001] The invention relates to network communication technology, in particular to a tunnel establishment method, device and network equipment. Background technique [0002] Since the Internet (Internet) was born in the 1990s, it has had a huge impact on human production and life. Devices in the Internet communicate with each other by following a set of standard communication protocols. The standard protocol refers to Internet Protocol (Internet Protocol; IP for short). [0003] Under the IP protocol, each device on the Internet has an IP address, which is used to distinguish devices. Currently, the IP protocol has version 4 and version 6, which are referred to as IPv4 and IPv6 respectively. Among them, the IP address under the IPv4 version is called an IPv4 address, which is represented by a 32-bit binary number, and is often expressed in dotted decimal notation, for example: IPv4 address "5.6.7.8", each number represents a byte value. The IP address un...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L12/56H04L12/46H04L45/74
Inventor 姚辉林东豪冷钦街
Owner RUIJIE NETWORKS CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products