A method, device and system for realizing network identification conversion

A network identification and identification technology, applied in the field of communication, can solve the problems of network development restrictions, private network IP addresses cannot be repeated, etc.

Active Publication Date: 2016-08-31
旭瑞亿(江苏)智能科技有限公司
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Moreover, in the two-level network architecture, the private network IP address (also called the source network user ID) of the terminal connected to the same border gateway cannot be repeated, and the repeated private network IP address is recognized as an illegal IP address by the border gateway. In the case of limited resources, it has caused great restrictions on the development of the network

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method, device and system for realizing network identification conversion
  • A method, device and system for realizing network identification conversion
  • A method, device and system for realizing network identification conversion

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0045] In this embodiment, the border gateway sets a proxy ID for the routing and forwarding network, that is, the destination network proxy identifier (P-RID), and identifies the terminal through the double identifier of the source network identifier plus the Session ID (session identifier), and establishes the source network identifier+ The mapping from the Session ID to the target network proxy ID provides the basis for the border gateway to obtain the target network location ID based on the target network proxy ID, and can realize the reuse of the source network ID.

[0046] In this embodiment, when the terminal moves, the P-RID remains unchanged and the RID changes. The P-RID is regarded as the proxy identifier of the RID in the access network. In this embodiment, the mapping relationship between the terminal identification code and the P-RID is established information, the edge gateway can obtain the corresponding P-RID according to the identification code of the terminal...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A method, a device, and a system for implementing network identifier conversion are applied on a border gateway. The method comprises: after receiving a first packet of a terminal, judging whether a source network identifier of the terminal is an IPv6 address; and if not, setting an identification code for the terminal, generating a destination network proxy identifier for the terminal, and establishing information of a mapping relationship between the identification code for the terminal and the destination network proxy identifier. Through the present invention, the source network identifier can be translated into the destination network proxy identifier, and the source network identifier can be reused. In theory, the source network identifier has infinite expandability. On the border gateway, the reused source network identifier can be clearly distinguished. Through the present invention, identifier translation for different domains can be effectively performed. The reuse and expansion capabilities of the source network identifier effectively perform interworking and integration of networks with different network identifier and using different addressing manners, thereby providing services for a user to the maximum extent.

Description

technical field [0001] The invention relates to the technical field of communications, in particular to a method, device and system for realizing network identifier conversion. Background technique [0002] (1) Identity and location separation technology. [0003] In order to solve the problem of the rapid expansion of the routing table capacity of Internet core router nodes and the ambiguity of IP addresses, the Internet Engineering Task Force (IETF) has proposed the technology of separating identity and location in recent years. Take the LISP protocol proposed by the Locator and Identifier Separation Protocol (LISP) working group as an example, the terminal identity (Endpoint Identifier, EID) does not participate in the routing of the IP core network, and the backbone router can only see the interface routing of the border access router address (Routing LOCator, RLOC), and a border router can access a large number of terminals, a mapping plane is set separately to store t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L12/749H04L29/12
CPCH04L61/2514
Inventor 谢柯黄兵黄珂吴强孟晓斌马金
Owner 旭瑞亿(江苏)智能科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products