P2P network SIP realizing method based on host machine mark protocol

A host identification protocol and implementation method technology, applied in the direction of electrical components, transmission systems, etc., can solve the problem of inconvenient and flexible central control servers that do not belong to the same network, client/server mode, etc., and achieve complex and widely mobile devices Sexual support and the effect of improving message utilization

Inactive Publication Date: 2006-07-12
BEIJING JIAOTONG UNIV
View PDF0 Cites 17 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0014] With the rapid development of VoIP and instant messaging systems based on SIP and SIMPLE (SIP for Instant Messaging and Presence Leveraging Extensions), the central control server in the client/server mode is increasing

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • P2P network SIP realizing method based on host machine mark protocol
  • P2P network SIP realizing method based on host machine mark protocol
  • P2P network SIP realizing method based on host machine mark protocol

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0050] Embodiment 1, SIP implementation under the P2P environment:

[0051] In the P2P network environment, the process of SIP user information maintenance, SIP user location and SIP session establishment is as follows:

[0052] Step 1: Start the P2P participant node registration process. First, its IP address and port number are hashed to generate a node identification number.

[0053] Step 2: Send a registration message to the existing registration management node in the logical overlay network, requesting to join the logical overlay network.

[0054] Step 3: The registration management node searches for the node that it knows is closest to the node identification number of the node to be joined, replies to the node to be joined with a 302 message, and redirects its query target to this closer node.

[0055] Step 4: The node to be joined repeats the above process until a node including the node to be joined in the maintained name space is found, which is called the managem...

Embodiment 2

[0067] Step 16: After the caller resends the message to that node, the call is established in the form of traditional SIP. Embodiment 2, the binding realization of SIP and HIP:

[0068] In order to perform a basic HIP exchange, a given host needs to know the IP address and HIT of the remote host. In the bundled implementation of SIP and HIP, the IP address can be obtained through the Contact header in the SIP message, but HIT cannot be obtained directly.

[0069] How to securely obtain HI is very important. Traditional HIP is implemented through DNS or DHT (Distributed Hash Table) used in P2P networks.

[0070] This embodiment is used to describe how to implement the exchange of the host HIT before basic HIP interaction by extending the SIP message. One item in the SIP packet is the Via header, which is used to record the address of the server that the SIP packet passes through during transmission. Due to the uncertain number of servers passed, there may be multiple Via hea...

Embodiment 3

[0096] Embodiment 3: The overall message flow that the peer-to-peer network SIP based on HIP realizes:

[0097] The following will take a simple network as an example to illustrate the entire application process. Using a 3-bit hash space, the corresponding namespace scale is 2 3 =8, the size of the query pointing table item is 3, and the value range of the node identification number and the resource identification number is 0 to 7. The logical overlay network constructed according to the above data is as follows: Figure 4 As shown, the positions with node identification numbers 1 and 3 have registered participating nodes.

[0098] According to the Chord algorithm, a node is responsible for maintaining resources whose resource identification number is less than or equal to the node identification number (modulo operation). Then node 1 is responsible for resources 4-7 and 0-1; node 3 is responsible for resources 2-3.

[0099] There are 3 items in the query pointing table, e...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

Present invention relates to Conversation initialisation protocol SIP which is most widely used appliance session management protocol. It contains operating SIP protocol in peer network and overcomes the shortage of high development cost in traditional client server mode. Based mainframe identify protocol, said invention can provides safety transmission for SIP user data. It can provide more complete network layer movability support. Due to SIP is the most basic protocol composition in instant communication software, IP multimedia subsystem IMS etc network service and application, said invention has wide application.

Description

Technical field [0001] The invention relates to a method for realizing the peer-to-peer network SIP based on the host identification protocol. of computer network [0002] technology field. Background technique [0003] SIP (Session Initiation Protocol, Session Initiation Protocol) is an application layer protocol used to establish and manage sessions. SIP users register with a dedicated location server through their agents to support mobility. The SIP protocol supports user location and negotiation of parameters between sessions. [0004] The message interaction process of establishing a SIP session is as follows: figure 1 shown. The user agent registers its current location with a registration server, and a registration is responsible for binding a user ID (sip: joe.smith@bjtu.edu.cn) and the user's location ID (sip: joe@iplab.bjtu.edu.cn ). After receiving a user request, the registration server will act as a proxy server and forward the request to the called user....

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
Inventor 张宏科周华春秦雅娟杨冬王博杨水根董平郜帅刘颖张思东张冰怡
Owner BEIJING JIAOTONG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products