A method for constructing a virtual reconstructed ubiquitous network architecture based on identity and location separation

A technology of virtual reconfiguration and system architecture, which is applied in the transmission system, data exchange through path configuration, electrical components, etc., can solve the problems of being unable to meet the diversified multimedia needs of ubiquitous network users, and reduce technical difficulty and cost , the effect of supporting mobility

Active Publication Date: 2016-03-23
PLA UNIV OF SCI & TECH
View PDF3 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, most of the current research focuses on traditional computer networks, and the research on identity and location separation mechanisms in wireless networks, especially ubiquitous networks, is still in its infancy, which cannot meet the diverse multimedia needs of ubiquitous network users.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method for constructing a virtual reconstructed ubiquitous network architecture based on identity and location separation
  • A method for constructing a virtual reconstructed ubiquitous network architecture based on identity and location separation
  • A method for constructing a virtual reconstructed ubiquitous network architecture based on identity and location separation

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0066] Figure 5 Shown is a schematic diagram of a ubiquitous network user registration process. Assuming that the ubiquitous network user has the main user identity Tom, at this time, he wishes to register as the sub-user identity Tom_company through the smart terminal held by him. The steps include:

[0067] 1) Tom starts up, opens all available interfaces, scans all available networks, selects a certain access network according to the internally configured network selection scheme, and chooses to register as a sub-user Tom_company, assuming that a 3G network is selected;

[0068] 2) To establish a PDP context, the 3G access network first authenticates the user. The authentication process is the same as the traditional mechanism and will not be repeated. The registration message contains the terminal host identifier, and the 3G access network edge router assigns an IP address to the authenticated terminal. address, establishing a mapping relationship between the terminal ho...

Embodiment 2

[0082] Image 6 Shown is a schematic diagram of the implementation of the identity and location separation mechanism. User A and user B communicate through terminal A and terminal B respectively, including the following steps:

[0083] 1) User A and user B register with terminal A and terminal B respectively, the process is as in one of the embodiments, and will not be repeated;

[0084] 2) The host of terminal A is identified as HID_A, currently connected to network A, and the edge router of access network A assigns a location identifier GLOCa to it; the host of terminal B is identified as HID_B, currently connected to network B, and is assigned by the edge router of access network B The router assigns the location identifier GLOCb to it;

[0085] 3) User A sends a data packet to user B, and the source and destination addresses in the data packet are host identifiers HID_A and HID_B of terminal A and terminal B respectively;

[0086] 4) After receiving the data packet, the ...

Embodiment 3

[0092] Figure 7 According to another embodiment of the present invention, it is a schematic diagram of user mobility support based on virtual reconstructed ubiquitous network architecture based on separation of identity and location. Ubiquitous network user Tom is a sub-user identity Tom_company and partner Bob during working hours. To communicate, the conversation process includes:

[0093] 1) Tom first registers on the smart terminal and office computer as the sub-user Tom_company, and the registration process will not be repeated;

[0094] 2) Tom configures the business of the sub-user identity Tom_company through the smart terminal, and sets video conversations and instant messages to be received by the computer. The smart terminal only receives short messages to facilitate information query when going out. At the same time, the office fixed line is established with the sub-user identity Tom_company Association, so that ordinary voice calls are received through the offic...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a virtual reconstruction ubiquitous network architecture based on identity-position separation. The virtual reconstruction ubiquitous network architecture comprises a terminal and stub network layer, an edge access network layer, a virtual reconstitution core network layer, an application layer and a service support layer. The terminal and stub network layer comprises an intelligent multi-mode terminal supporting an identity-position separation mechanism, and a traditional terminal and stub network which has direct access to an edge access network or has access to the edge access network through a ubiquitous network gateway; the edge access network layer comprises wired and wireless access networks, provides access capability of an IP core network for a bottomlayer terminal, and achieves separation of control and bearing; the application layer comprises an application server, and provides unified service access capacity for heterogeneous users; the service support layer comprises various functional entities, and provides necessary function support. According to the virtual reconstruction ubiquitous network architecture based on identity-position separation, efficient convergence between heterogeneous networks is achieved through virtual reconstruction and identity-position separation, and support to terminal mobility and multi-connection capacity of users and terminals is achieved.

Description

technical field [0001] The invention belongs to the technical field of communication, in particular to a method for constructing a virtual reconstructed ubiquitous network architecture based on separation of identity and location. Background technique [0002] According to the definition of China Communications Standards Association, Ubiquitous Network (Ubiquitous Network) is based on the needs of individuals and society, and realizes on-demand information acquisition, information transmission, information storage, and information processing between people and people, people and things, and things and things. , with environment awareness, content awareness and intelligence, provides ubiquitous and all-encompassing information services and application networks for individuals and society. The research direction of the ubiquitous network architecture at home and abroad can be classified into two categories. One category believes that the existing network system must be overthr...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L29/12H04L12/28
Inventor 随楠楠王聪谢威李宁张冬梅徐友云
Owner PLA UNIV OF SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products