Method, equipment and system for data switching based on tunnel

A tunnel and data technology, which is applied in network data management, electrical components, wireless communication, etc., can solve the problems of low resource utilization, high reuse operation cost, and low user security, so as to increase difficulty and save EID identification resources, reducing the effect of OpenX

Active Publication Date: 2013-06-19
CHINA MOBILE COMM GRP CO LTD
View PDF3 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0010] Embodiments of the present invention provide a tunnel-based data forwarding method, device, and system to overcome the high operating cost and low resource utilization caused by the existing identity and location separation network technology that does not support the reuse of terminal identities and low user security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, equipment and system for data switching based on tunnel
  • Method, equipment and system for data switching based on tunnel
  • Method, equipment and system for data switching based on tunnel

Examples

Experimental program
Comparison scheme
Effect test

example 1

[0079] Such as Figure 4 In the network architecture shown, two terminals X and Y communicate. Both use a network with a private address (pEID1). The location identifier of X is RLOC1, and the location identifier of Y is RLOC2. When X and Y are connected to the network, they both register their private EID-RLOC and domain name binding information with the mapping server. X wants to initiate a communication domain name request to Y, the specific data communication process is as follows Figure 5 :

[0080] Step A: Terminal X queries the mapping server for the EID of destination node Y according to the domain name of destination node Y. The mapping server returns the registered binding information: Y-RLOC2-pEID1. ITR finds that this EID is a private identity after receiving it, then allocates and caches a mapped EID2 corresponding to Y's information RLOC2-pEID1, and replies to node X's DNS information as EID2.

[0081] Step B: The terminal X constructs a normal data packet ...

example 2

[0085] Such as Image 6 In the network architecture shown, a node X with a global address wants to communicate with a node Y with a private EID. Node X is identified as EID1 and its location is identified as RLOC1, and it knows the domain name Y of node Y. Node Y's identity is pEID2, and its location is RLOC2, both of which have registered the domain name, EID information and RLOC binding information on the mapping server. The communication process initiated by node X to node Y is as follows:

[0086] Step A: Terminal X queries the mapping server for the EID of destination node Y according to the domain name of destination node Y. It uses the global EID itself, so ITR does not perform NAT conversion binding. The mapping server returns the information binding RLOC2-pEID2 of the destination node Y. ITR finds that the EID of the peer node is a private identifier, then assigns a mapped EID2 to bind Y's information RLOC2-pEID2, and replies with the DNS information of node X as Y...

example 3

[0091] Such as Figure 7In the network architecture shown, node X in the identity and location separation network using private addresses wants to access node Y in the non-identity and location separation network, X’s identity is pEID1, the location is RLOC1, and Y uses the legal IP address IP1 . Node X knows Y's IP address. In this example, since the communication peer adopts the IP address, the terminal does not need to perform DNS query before sending the packet. The communication process is as follows:

[0092] Step A: Node X constructs a normal identity- and location-separated network message, sends Y's IP address as the destination EID, and sends it to the ITR.

[0093] Step B: ITR finds that the source address of the data packet is a private EID, performs NAT mapping to EID1, and uses the IP address of the destination node as EID to query its corresponding RLOC address, and finds that there is no corresponding information in its own cache list, then sends EID to the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method, equipment and a system for data switching based on a tunnel. A terminal in an identity and position separation network can adopt a private address or a global address. When the terminal initiates data communication, private address switching of a source address is conducted on a data package by internet talk radio (ITR) if the terminal initiating the data communication adopts the private address, and the source address is switched to the global address. If a destination address of the data package is a mapping address pre-distributed by the ITR, a communication opposite terminal adopts a private address, so that the mapping address needs to be switched to the private address again. Terminals in different subnets of the identity and position separation network can adopt the same private address, the defect in the prior art that the terminals must use fixed one-to-one EID is avoided, and the problems in existing identity and position separation network technology that operating cost is high, resource utilization rate is low, user safety is low and the like due to the fact that the existing identity and position separation network technology which is not in support of reuse of terminal identity labels are solved.

Description

technical field [0001] The present invention relates to the technical field of mobile communication, in particular to a tunnel-based data forwarding method, device and system. Background technique [0002] With the development of the network, the scale of the Internet is getting bigger and bigger. In the traditional TCP / IP network, the IP address has dual functions, that is, it is used as the location identification of the network terminal and as the identity identification of the terminal in the network. However, in the mobile Internet era, there are more and more problems with user terminal mobility and multi-homing. When a host moves to a new network, its location changes and so does its IP address. The change of IP address causes the interruption of communication. In addition, with the use of some communication technologies such as multi-homing and traffic engineering, scattered routes are added to each routing table, which destroys the aggregability of network prefix...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W8/26H04W40/02
Inventor 陈刚张倓
Owner CHINA MOBILE COMM GRP CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products