Unlock instant, AI-driven research and patent intelligence for your innovation.

A method, system and device for realizing detachment based on lisp

A de-attachment and device technology, applied in the network field, can solve the problem of blocking blacklist user flow and reducing overhead.

Active Publication Date: 2018-05-01
HUAWEI TEHCHNOLOGIES CO LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0010] The technical problem to be solved by the present invention is to provide a lisp-based implementation method, system and equipment for deattachment, to solve the problem that existing lisp solutions cannot prevent blacklist user flows, and reduce unnecessary overhead

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method, system and device for realizing detachment based on lisp
  • A method, system and device for realizing detachment based on lisp
  • A method, system and device for realizing detachment based on lisp

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0051] Such as image 3 shown, including the following steps:

[0052] Step 1, the MS learns that the user is blacklisted;

[0053] Specifically, after detecting that the user is blacklisted, the network element (network element other than the UE) on the network side notifies the MS that the user is blacklisted. How the network side detects that the user is a blacklisted user is beyond the scope of this article.

[0054] In step 2, the MS deletes the mapping between the user's EID and RLOC (or the binding between EID and RLOC);

[0055] Step 3, the MS actively sends a detachment request to the device with the tunnel router function, notifying the user that it is no longer attached to the network;

[0056] The device with tunnel router function can be ETR and ITR, or lisp-MN.

[0057] Step 4: After receiving the detachment request, the device with the tunnel router function blocks the flow sent to the user and / or the flow sent by the user.

[0058] Preferably, the device w...

Embodiment 2

[0061] This embodiment is based on figure 1 The basic protocol of described lisp realizes the method of embodiment 1, such as Figure 4 As shown, it mainly includes the following steps:

[0062] Step 401: The MS learns that a certain user is a blacklisted user, and deletes the mapping between the user's EID and RLOC;

[0063] Step 402: MS sends a Map-Unregister Request (de-registration request) to ETR (the EID of the user is carried in this message), and notifies ETR that the user is no longer attached to the network;

[0064] Step 403: After the ETR receives the de-registration request message sent by the MS, it records the blacklisted user ID EID, and returns a Map-Unregister Response (de-registration response) message to the MS;

[0065] The response message indicates the success or failure of the de-registration.

[0066] Step 404: The MS sends a de-registration request to the ITR that stores the EID and RLOC mapping of the blacklisted user;

[0067] There is no fixed ...

Embodiment 1

[0071] The scheme of Embodiment 1 can also be implemented on LISP-MN (lisp-MN has the functions of ETR and ITR network elements in the lisp protocol). This embodiment is based on figure 2 Describes the basic protocols of lisp, such as Figure 5 As shown, it mainly includes the following steps:

[0072] Step 501: The MS learns that a certain user is a blacklisted user, and deletes the mapping between the user's EID and RLOC;

[0073] Step 502: The MS sends a deregistration request to the Lisp-MN that stores the EID and RLOC mapping of the blacklisted user (the EID of the user is carried in this message), and notifies the Lisp-MN that the user is no longer attached to the network;

[0074] Step 503: After the Lisp-MN receives the deregistration request message sent by the MS, the ITR function body in the Lisp-MN processes the blacklisted user to prevent the flow sent to the user and / or the flow sent by the user , Lisp-MN returns a deregistration response message to MS.

[0...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a lisp-based detachment implementation method, system and equipment, which solves the problem that the existing lisp scheme cannot prevent blacklist user flows, and reduces unnecessary overhead. The method includes: the mapping server (MS) learns that the user is blacklisted, deletes the mapping of the user's terminal identification (EID) and routing location (RLOC), sends a detachment request to the device with the tunnel router function, and notifies The user is no longer attached to the network; after receiving the detachment request, the device with the tunnel router function blocks the flow sent to the user and / or the flow sent by the user. The system includes a mapping server (MS) and a device with the function of a tunnel router. By adopting the solutions of the embodiments of the present invention, for a blacklisted user, the network can block the flow sent by the user or the flow directed to the user, so as to avoid unnecessary overhead.

Description

technical field [0001] The present invention relates to the field of network technology, in particular to a lisp-based detach implementation method, system and equipment. Background technique [0002] The size of the DFZ (Default Free Zone, default free zone) routing table increases gradually, which impairs the scalability of routing and the execution of routing aggregation. The problem of routing scalability has attracted great interest from both industry and academia. [0003] IAB (Internet Architecture Board, Internet Structure Committee) members discussed that the underlying reason for the increase in the DFZ routing table is the dual semantics of IP addresses. In the existing network, IP addresses are both identifiers and locations. [0004] Currently IRTF RRG (Internet Research Task Force Routing Research Group, Internet Research Task Force Routing Working Group) is committed to developing new routing and address architectures to support multi-homing, traffic engineer...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L12/741H04L29/06H04L45/74
Inventor 赵凝霞孙默
Owner HUAWEI TEHCHNOLOGIES CO LTD