Sovereign network architecture of rear IP

A technology of architecture and sovereignty, applied in transmission systems, digital transmission systems, data exchange networks, etc., can solve problems such as the inability to guarantee the controllability of the network, and the inability to provide good support for mobile services, so as to improve user experience, The effect of improving security and improving data transmission efficiency

Inactive Publication Date: 2020-03-06
PEKING UNIV SHENZHEN GRADUATE SCHOOL +2
View PDF5 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0037] The purpose of the present invention is to provide a post-IP sovereign network architecture, which aims to solve the inherent security problems of using the IP protocol. Using the IP protocol to build a sovereign network cannot guarantee the manageability and control of the network. Born with insufficient genes, it cannot provide good support for many mobile services

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Sovereign network architecture of rear IP
  • Sovereign network architecture of rear IP
  • Sovereign network architecture of rear IP

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0089] A network hierarchical management scheme bound with identity marks is proposed, which solves the problem of current network content management confusion. The hierarchical management scheme not only promotes the dissemination of information, but also eliminates the influence of traditional media on inappropriate information for minors to a certain extent.

[0090] The sovereign network internally uses identity identifiers for routing, and its name space has no upper limit in principle, avoiding the problem of exhaustion of IPv4 addresses. The network pays more attention to the storage of network resources or users rather than traditional network resources, avoiding the performance problems of traditional IP networks.

[0091] Such as figure 1 As shown, the post-IP sovereign network system framework provided by the present invention is sufficient, and the equipment in the post-IP sovereign network system framework adopts a novel network centered on identity identificatio...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a sovereign network system architecture of a rear IP (Internet Protocol), equipment in the sovereign network system architecture of the rear IP adopts a novel network taking anidentity label as a center, and no IP network exists in the novel network; the sovereign network equipment further comprises an ID-ICN router and an EAN node, and the ID-ICN router is used for supporting inter-translation, addressing and network data transmission of different identities and content identifiers; the EAN node is used for allowing a user in a sovereign network to freely request othernetworks and Internet data outside the sovereign network in an authority range, allowing other sovereignty network users carrying a sovereignty network visa to access data in a sovereignty network, shielding all requests actively initiated by other networks and the Internet outside the sovereignty network, installing a related content auditing program in the EAN node, and carrying out preliminaryauditing and filtering on the content reaching the node. The sovereign network latches the user information and the behavior log by using the blockchain to prevent the data from being tampered.

Description

technical field [0001] The invention belongs to the improvement field of interconnection communication technology, and in particular relates to a post-IP sovereign network architecture. Background technique [0002] Use the existing IP system to build a sovereign network, and deploy IPv4 mirror root servers, IPv6 mirror root servers, and IPv6 firewalls in the sovereign network. These two root servers plus firewalls ensure that all IPv4 and IPv6 domain name allocation, address resolution, and information control are within the borders of each country. At the same time, through the mirror switch, it ensures the smooth flow of scientific and technological communication between the domestic network and the international network and is absolutely controllable for security and ideological connectivity. Its system architecture is as figure 1 shown. [0003] The IP-based network system has two fundamental flaws: top-level domain name management and technical deficiencies. Domain...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/08H04L29/06H04L12/715
CPCH04L67/1097H04L45/64H04L63/0245H04L63/145H04L67/63H04L67/568H04L9/50
Inventor 李挥綦九华张昕淳侯韩旭谢鑫韦国华李文军杨昕王菡马化军
Owner PEKING UNIV SHENZHEN GRADUATE SCHOOL
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products