Method for routing protocol supporting of mobility in integrated network access subnetwork

A mobility and network technology, applied in wireless network protocols, electrical components, wireless communication, etc., can solve the problems of wasting control message processing overhead, aggravating HA node processing overhead, etc., and achieve the effect of reducing single point failure rate

Inactive Publication Date: 2011-08-17
BEIJING JIAOTONG UNIV
View PDF3 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Mobile IP proposes a router processing solution based on existing IPv4 and IPv6 addresses for terminal mobility. However, in Mobile IP, the location management information of terminal mobility is assisted by the Home Agent HA, and data packets during terminal mobility are It needs to be routed to the home agent node for forwarding processing again, which greatly increases the processing overhead of the HA node;
[0005] At the same time, in mobile IP, routing optimization is also an extremely important process. In order to complete the routing of the shortest path, the route selection of the mobile terminal at the communication peer needs to be assisted by the home agent, and the HA actively distributes the current mobile terminal location information To the peer nodes that communicate with it, but because not all communication peers are long-term active, doing so also wastes a considerable amount of control message processing overhead

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for routing protocol supporting of mobility in integrated network access subnetwork
  • Method for routing protocol supporting of mobility in integrated network access subnetwork
  • Method for routing protocol supporting of mobility in integrated network access subnetwork

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0037] First, some terms used in this embodiment are introduced:

[0038] Host ID (HID): It is only used for accessing the network and represents the public identity of the access terminal or subnet, and the ID does not change during the movement of the mobile terminal. For simple description and convenient discussion, this embodiment assumes that each terminal has only one globally unique HID.

[0039] Access router: Appears only in the access network, connects with access terminals and other access routers, generates and stores host-location relationships for host agents, and registers host-location relationships with designated access routers, and communicates with other access routers The router provides the host-location query service, forms a router link state maintenance area with other access routers, and maintains reachability through the underlying routing protocol;

[0040] This embodiment includes: a mobile access terminal, an old access router before the terminal...

Embodiment 2

[0061] This embodiment is an improvement of Embodiment 1 on the data packet forwarding process of the access router, such as image 3 shown. This embodiment includes steps:

[0062] S21. For the access router, if the data packet is not from the tunnel, jump to step S22; if the data packet is from the tunnel, decapsulate the tunnel data packet, and use the original destination HID of the data packet as an index to find its own host-location Correspondence cache, if hit, then forward to the corresponding interface, and jump to step S23; if not hit, then jump to step S24;

[0063] S22. Using the data packet purpose HID as an index, search the local routing table, if it is hit, then forward it to the corresponding interface, and the forwarding process ends; if it is not hit, then generate the location information of the designated access router through the hash function H, H(HID) =R, and the packet is forwarded to the designated access router R in a tunnel mode (tunnel is establ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a host-identifier-based method for routing protocol supporting of terminal micro-mobility under a planar routing environment in an integrated network access subnetwork. The method comprises the steps: moving an access terminal to a new access router and registering a host-position relation for the access router; appointing an access router to an access network by the new access router according to a compatible Hash algorithm to update the host-position relation; updating an original host-position relation for an old access router by the appointed access router; and informing a source access router of the updated host-position relation by the old access router when the old access router receives data communication initiated by other access routers. A flooding mechanism is utilized among access routers so as to maintain a topological database among the routers, and a proper bottom routing protocol is utilized to maintain the routing accessibility among the access routers.

Description

technical field [0001] The invention relates to a mobility support method for an integrated network access subnet host identification plane routing protocol, which is a mobility mechanism based on a plane identification routing mode based on a distributed hash table algorithm, and is a mobility support method. A method for a terminal to perform micro-mobility within an access subnet. Background technique [0002] In the access subnet of the integrated network, the planarization and variable length of the access identifier make the access subnet routing method based on the flat identifier a good alternative to the access subnet routing. The access subnet routing protocol can not only provide the accessibility of the access identifier after flattening and variable length, but also support the micro-mobility of the mobile terminal using the access identifier in the access subnet of the integrated network . [0003] SEATTLE (A Scalable Ethernet Architecture for Large Enterpris...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W24/02H04W40/02H04W80/04
Inventor 张宏科姚楠董平邱峰李晓倩周三奇段璨然孙冰
Owner BEIJING JIAOTONG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products