CN109842918B - Wireless communication method and device - Google Patents

Wireless communication method and device Download PDF

Info

Publication number
CN109842918B
CN109842918B CN201711190919.1A CN201711190919A CN109842918B CN 109842918 B CN109842918 B CN 109842918B CN 201711190919 A CN201711190919 A CN 201711190919A CN 109842918 B CN109842918 B CN 109842918B
Authority
CN
China
Prior art keywords
address
message
tunnel
terminal device
gateway
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201711190919.1A
Other languages
Chinese (zh)
Other versions
CN109842918A (en
Inventor
孟锐
王闯
笪斌
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Technologies Co Ltd
Original Assignee
Huawei Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co Ltd filed Critical Huawei Technologies Co Ltd
Priority to CN201711190919.1A priority Critical patent/CN109842918B/en
Publication of CN109842918A publication Critical patent/CN109842918A/en
Application granted granted Critical
Publication of CN109842918B publication Critical patent/CN109842918B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Mobile Radio Communication Systems (AREA)

Abstract

The application provides a method and a device for wireless communication, wherein the method comprises the following steps: a first router receives a first message, wherein the first message is used for detecting a bifurcation point between a first transmission path and a second transmission path, the first transmission path is the shortest transmission path from a current position of a first terminal device to a second terminal device, a first gateway is the current gateway of the first terminal device, the second transmission path is the shortest transmission path from a first address to the second terminal device, the first address is an address acquired when the first terminal device accesses a network for the first time, and the first message comprises the first address and a second address; the first router determines the first router as the bifurcation point according to the first address and the second address; the first router establishes a first tunnel, which is a tunnel from the first router to the first gateway. The wireless communication method of the embodiment of the application is beneficial to solving the problem of non-shortest path by detecting the branch point and establishing the branch point tunnel.

Description

Wireless communication method and device
Technical Field
The present application relates to the field of communications, and more particularly, to a method and apparatus for wireless communication.
Background
Proxy Mobile Internet Protocol Version6 (PMIPv 6) (RFC5213) provides three-layer mobility support for IPv6 on the network side, i.e., the terminal can keep the IPv6 address unchanged during the moving process without the Mobile terminal participating in the signaling process related to the moving, and the transport layer connection does not need to be reestablished during the moving process, thereby providing service continuity assurance during the moving process.
Before a Mobile Node (MN) moves, the MN communicates with a Correspondent Node (CN) using a Home Address (HoA) allocated by a gateway when the MN accesses a network for the first time. The destination address of the message sent by the CN is the HoA. In the switching process, a current Mobile access gateway (N-MAG) informs an LMA of a Proxy Care-of-Address (P-CoA) allocated by the current N-MAG, the LMA uses the P-CoA to establish a tunnel to the N-MAG, and a message of the LMA sent by a CN (central node) enters the tunnel and is forwarded to the N-MAG through the tunnel, so that after the MN moves, the path through which the message sent by the CN to the MN and the path through which the message sent by the MN to the CN pass are not the shortest path.
Therefore, in the moving process of the mobile node, how to solve the problem that the path through which the message sent by the correspondent node to the mobile node and the message sent by the mobile node to the correspondent node pass is not the shortest path is a problem to be solved urgently.
Disclosure of Invention
The application provides a method and a device for wireless communication, which are used for detecting a bifurcation point and establishing a bifurcation point tunnel by carrying destination addresses of a new path and an old path in a detection message, thereby receiving or sending a message through a shortest path formed by the bifurcation point tunnel and the bifurcation point to a communication opposite end and being beneficial to solving the problem of a non-shortest path.
In a first aspect, a method of wireless communication is provided, the method comprising: a first router receives a first message, wherein the first message is used for detecting a bifurcation point between a first transmission path and a second transmission path, the first transmission path is the shortest transmission path from a current position of a first terminal device to a second terminal device, a first gateway is the current gateway of the first terminal device, the second transmission path is the shortest transmission path from a first address to the second terminal device, the first address is an address acquired when the first terminal device accesses a network for the first time, the first message comprises the first address and a second address, and the second address is an address acquired after the first terminal device moves to the first gateway; the first router determines the first router as the bifurcation point according to the first address and the second address; the first router establishes a first tunnel, which is a tunnel from the first router to the first gateway.
According to the wireless communication method, the destination addresses of the new path and the old path are carried in the detection message sent by the communication opposite end node to detect the branch point and establish the branch point tunnel, so that the message is received or sent through the shortest path formed by the branch point tunnel and the branch point to the communication opposite end, and the problem of non-shortest paths is solved.
With reference to the first aspect, in some possible implementations of the first aspect, the method further includes: the first router binds the first address with the first tunnel.
According to the wireless communication method, the new and old destination addresses are carried in the bifurcation point detection message, the new and old destination addresses are used for searching the routing table hop by hop, whether the searching results are consistent or not is compared, and if the searching results are not consistent, the current router is the bifurcation point.
With reference to the first aspect, in some possible implementations of the first aspect, the method further includes: and the first router sends a second message to the first gateway, wherein the second message is used for indicating the first gateway to establish a second tunnel, and the second tunnel is a reverse tunnel of the first tunnel.
With reference to the first aspect, in some possible implementations of the first aspect, the method further includes: the first router receives a first message after tunnel encapsulation sent by the first gateway, wherein the destination address of the first message is the address of the second terminal device, the source address of the first message is the first address, the tunnel destination address of the first message after tunnel encapsulation is the address of the first router, and the tunnel source address of the first message after tunnel encapsulation is the second address; the first router deletes the tunnel encapsulation of the first message; and the first router sends the first message after deleting the tunnel encapsulation to the second terminal equipment.
With reference to the first aspect, in some possible implementations of the first aspect, the method further includes: the first router receives a second message sent by the second terminal device, wherein the destination address of the second message is the first address, and the source address of the second message is the address of the second terminal device; the first router performs tunnel encapsulation on the second message, wherein the tunnel destination address of the second message after tunnel encapsulation is the second address, and the tunnel source address of the second message after tunnel encapsulation is the address of the first router; and the first router sends the second message after tunnel encapsulation to the first gateway.
With reference to the first aspect, in some possible implementations of the first aspect, the method further includes: the first router receives a third message sent by a third terminal device, and the destination address of the third message is the first address; and the first router sends the third message to the first gateway on the first tunnel according to the destination address of the third message.
In the method for wireless communication according to the embodiment of the application, in a downlink process, a branch point receives any downlink message of which a destination address is bound with a branch point tunnel, the downlink message is forwarded through the branch point tunnel, after the message exits from the first gateway, the first gateway checks whether a source address of the downlink message is bound with a second tunnel, if the source address of the downlink message is not bound with the second tunnel, and the first gateway can use the existing branch point without initiating branch point detection.
With reference to the first aspect, in some possible implementations of the first aspect, the method further includes: the first router receives a fourth message sent by the first gateway through the local mobility anchor of the first terminal device, wherein the destination address of the fourth message is the address of the third terminal device, and the source address of the fourth message is the first address; and the first router sends a third message to the first gateway according to the source address of the fourth message, wherein the third message is used for indicating the first gateway to bind the address of the third terminal device with the second tunnel.
In the method for wireless communication of the embodiment of the application, in an uplink process, a branch point receives an uplink message that a source address is bound with a branch point tunnel but does not come out from the branch point tunnel, and sends a branch point notification message to a first gateway, and the first gateway can directly use an existing branch point without initiating branch point detection.
With reference to the first aspect, in some possible implementations of the first aspect, the method further includes: the first router receives a fourth message, where the fourth message is used to detect a bifurcation point between a fifth transmission path and a sixth transmission path, the fifth transmission path is a shortest transmission path from a current location of a fourth terminal device to the fifth terminal device, a fifth gateway is a current gateway of the fourth terminal device, the sixth transmission path is a shortest transmission path from a third address to the fifth terminal device, and the third address is an address obtained when the fourth terminal device first accesses a network; the first router determines, according to the fourth message, that the first router is not the bifurcation point; the first router forwards the fourth message to a next router.
In a second aspect, a method of wireless communication is provided, the method comprising: the method comprises the steps that a first gateway generates a fifth message, wherein the fifth message is used for triggering and detecting a first router, the first router is a bifurcation point of a first transmission path and a second transmission path, the first transmission path is the shortest transmission path from a current position of first terminal equipment to second terminal equipment, the first gateway is the current gateway of the first terminal equipment, the second transmission path is the shortest transmission path from a first address to the second terminal equipment, the fifth message comprises the first address and a second address, the first address is an address acquired when the first terminal equipment is accessed into a network for the first time, and the second address is an address acquired after the first terminal equipment moves to the first gateway; and the first gateway sends the fifth message to a second gateway, wherein the second gateway is a gateway of the second terminal equipment.
In the wireless communication method of the embodiment of the application, the first gateway is helpful to solve the problem of the non-shortest path by sending the message triggering the detection of the branch point.
With reference to the second aspect, in some possible implementation manners of the second aspect, the generating, by the first gateway, a fifth message includes: the first gateway receives a fifth message sent by the first terminal device, and the destination address of the fifth message is the address of the second terminal device; the first gateway determines that an output interface of the fifth message is a third tunnel according to the destination address of the fifth message; the first gateway generates the fifth message when determining that the destination address of the third tunnel is the local mobility anchor of the first terminal device.
Specifically, the first gateway generates a fifth message, including: the first gateway receives a fifth message sent by the first terminal device, and the destination address of the fifth message is the address of the second terminal device; the second gateway performs tunnel encapsulation on the fifth message, and the tunnel destination address of the fifth message after tunnel encapsulation is the local mobile anchor point of the first terminal device; the first gateway determines that an output interface of the fifth message is a third tunnel according to the tunnel destination address of the fifth message; the first gateway generates the fifth message when determining that the destination address of the third tunnel is the local mobility anchor of the first terminal device.
With reference to the second aspect, in some possible implementation manners of the second aspect, the generating, by the first gateway, the fifth message when determining that the destination address of the third tunnel is the local mobility anchor of the first terminal device includes: and the first gateway generates the fifth message after a preset time period when determining that the destination address of the third tunnel is the local mobility anchor point of the first terminal device.
In the method for wireless communication according to the embodiment of the application, after the first terminal device moves, when the first gateway receives or sends a message through the non-shortest path each time, the first gateway actively delays for a period of time before detection each time to initiate the bifurcation point detection, which is beneficial to saving detection times and signaling overhead.
With reference to the second aspect, in some possible implementation manners of the second aspect, the generating, by the first gateway, a fifth message includes: and the first gateway generates the fifth message when receiving the sixth message sent by the local mobility anchor of the first terminal device.
With reference to the second aspect, in some possible implementations of the second aspect, the method further includes: the first gateway receives a sixth message which is sent by the first router and is encapsulated by the tunnel, and the source address of the sixth message is the address of the second terminal device; the first gateway establishes a second tunnel according to the source address of the sixth message, wherein the second tunnel is a tunnel from the first gateway to the first router; and the first gateway binds the address of the second terminal equipment with the second tunnel.
With reference to the second aspect, in some possible implementations of the second aspect, the method further includes: the first gateway receives a second message sent by the first router, wherein the second message is used for indicating the first gateway to establish a second tunnel, and the second tunnel is a tunnel from the first gateway to the first router; the first gateway establishes the second tunnel according to the second message; and the first gateway binds the address of the second terminal equipment with the second tunnel.
With reference to the second aspect, in some possible implementations of the second aspect, the method further includes: the first gateway receives a first message sent by the first terminal device, wherein the destination address of the first message is the address of the second terminal device, and the source address of the first message is the first address; the first gateway performs tunnel encapsulation on the first message, wherein a tunnel destination address of the first message after tunnel encapsulation is the address of the first router, and a tunnel source address of the first message after tunnel encapsulation is the second address; and the first gateway sends the first message after tunnel encapsulation to the first router.
With reference to the second aspect, in some possible implementations of the second aspect, the method further includes: the first gateway receives a second message which is sent by the first router and is encapsulated by a tunnel, wherein the destination address of the second message is the first address, the source address of the second message is the address of the second terminal equipment, the tunnel destination address of the second message is the second address after the tunnel encapsulation, and the tunnel source address of the second message after the tunnel encapsulation is the address of the first router; the first gateway deletes the tunnel encapsulation of the second message; and the first gateway sends the second message after deleting the tunnel encapsulation to the first terminal equipment.
With reference to the second aspect, in some possible implementations of the second aspect, the method further includes: the first gateway receives a third message sent by the first router on a first tunnel, wherein the first tunnel is a tunnel from the first router to the first gateway, the destination address of the third message is the first address, and the source address of the third message is the address of a third terminal device; the first gateway binds the address of the third terminal device with the second tunnel.
In the method for wireless communication according to the embodiment of the application, in a downlink process, a branch point receives any downlink message of which a destination address is bound with a branch point tunnel, the downlink message is forwarded through the branch point tunnel, after the message exits from the first gateway, the first gateway checks whether a source address of the downlink message is bound with a second tunnel, if the source address of the downlink message is not bound with the second tunnel, and the first gateway can use the existing branch point without initiating branch point detection.
With reference to the second aspect, in some possible implementations of the second aspect, the method further includes: the first gateway receives a fourth message sent by the first terminal device, wherein the destination address of the fourth message is the address of a third terminal device, and the source address of the fourth message is the first address; the first gateway sends the fourth message to the first router through the local mobile anchor point of the first terminal device according to the destination address of the fourth message; and the first gateway receives a third message sent by the first router according to the source address of the fourth message, wherein the third message is used for indicating the first gateway to bind the address of the third terminal device with the second tunnel.
In the method for wireless communication of the embodiment of the application, in an uplink process, a branch point receives an uplink message that a source address is bound with a branch point tunnel but does not come out from the branch point tunnel, and sends a branch point notification message to a first gateway, and the first gateway can directly use an existing branch point without initiating branch point detection.
In a third aspect, a method of wireless communication is provided, the method comprising: the second gateway receives a fifth message of the first gateway, where the fifth message is used to trigger detection of a bifurcation point between a first transmission path and a second transmission path, the first transmission path is a shortest transmission path from a current location of the first terminal device to the second terminal device, the first gateway is a current mobile access gateway of the first terminal device, the second transmission path is a shortest transmission path from a first address to the second terminal device, the first address is an address obtained when the first terminal device accesses a network for the first time, the fifth message includes the first address and a second address, and the second address is an address obtained after the first terminal device moves to the first gateway; and the second gateway sends a first message to the first router according to the fifth message, wherein the first message is used for detecting the bifurcation point and comprises the first address and the second address.
In a fourth aspect, an apparatus for wireless communication is provided, the apparatus comprising: a transceiver module, configured to receive a first message, where the first message is used to detect a branch point between a first transmission path and a second transmission path, the first transmission path is a shortest transmission path from a current location of a first terminal device to a second terminal device, a first gateway is a current gateway of the first terminal device, the second transmission path is a shortest transmission path from a first address to the second terminal device, the first address is an address obtained when the first terminal device accesses a network for the first time, the first message includes the first address and a second address, and the second address is an address obtained after the first terminal device moves to the first gateway; a processing module for determining the apparatus as the bifurcation point according to the first address and the second address; the processing module is further configured to establish a first tunnel, the first tunnel being a tunnel from the device to the first gateway.
With reference to the fourth aspect, in some possible implementations of the fourth aspect, the processing module is further configured to bind the first address with the first tunnel.
With reference to the fourth aspect, in some possible implementation manners of the fourth aspect, the transceiver module is further configured to send a second message to the first gateway, where the second message is used to instruct the first gateway to establish a second tunnel, and the second tunnel is a reverse tunnel of the first tunnel.
With reference to the fourth aspect, in some possible implementation manners of the fourth aspect, the transceiver module is further configured to receive a first packet after tunnel encapsulation sent by the first gateway, where a destination address of the first packet is an address of the second terminal device, a source address of the first packet is the first address, a tunnel destination address of the first packet after tunnel encapsulation is an address of the apparatus, and a tunnel source address of the first packet after tunnel encapsulation is the second address; the processing module is further configured to delete the tunnel encapsulation of the first packet; the transceiver module is further configured to send the first packet after the tunnel encapsulation is deleted to the second terminal device.
With reference to the fourth aspect, in some possible implementation manners of the fourth aspect, the transceiver module is further configured to receive a second message sent by the second terminal device, where a destination address of the second message is the first address, and a source address of the second message is an address of the second terminal device; the processing module is further configured to perform tunnel encapsulation on the second packet, where a tunnel destination address of the second packet after tunnel encapsulation is the second address, and a tunnel source address of the second packet after tunnel encapsulation is the address of the device; the transceiver module is further configured to send the second packet after tunnel encapsulation to the first gateway.
With reference to the fourth aspect, in some possible implementation manners of the fourth aspect, the transceiver module is further configured to receive a third message sent by a third terminal device, where a destination address of the third message is the first address; the processing module is further configured to send the third packet to the first gateway on the first tunnel according to the destination address of the third packet.
With reference to the fourth aspect, in some possible implementation manners of the fourth aspect, the transceiver module is further configured to receive a fourth message sent by the first gateway through the local mobility anchor of the first terminal device, where a destination address of the fourth message is an address of a third terminal device, and a source address of the fourth message is the first address; the processing module is further configured to send a third message to the first gateway according to the source address of the fourth packet, where the third message is used to instruct the first gateway to bind the address of the third terminal device with the second tunnel.
With reference to the fourth aspect, in some possible implementation manners of the fourth aspect, the transceiver module is further configured to receive a fourth message, where the fourth message is used to detect a branch point of a fifth transmission path and a sixth transmission path, the fifth transmission path is a shortest transmission path from a current location of the fourth terminal device to the fifth terminal device, the fifth gateway is a current gateway of the fourth terminal device, the sixth transmission path is a shortest transmission path from a third address to the fifth terminal device, and the third address is an address obtained when the fourth terminal device accesses the network for the first time; the processing module is further configured to determine, based on the fourth message, that the apparatus is not the bifurcation point; the transceiver module is further configured to forward the fourth message to a next router.
In a fifth aspect, an apparatus for wireless communication is provided, the apparatus comprising: a processing module, configured to generate a fifth message, where the fifth message is used to trigger and probe a first router, the first router is a branch point of a first transmission path and a second transmission path, the first transmission path is a shortest transmission path from a current location of a first terminal device to a second terminal device, the apparatus is a current gateway of the first terminal device, the second transmission path is a shortest transmission path from a first address to the second terminal device, the fifth message includes the first address and a second address, the first address is an address obtained when the first terminal device first accesses a network, and the second address is an address obtained after the first terminal device moves to the apparatus; and the transceiver module is configured to send the fifth message to a second gateway, where the second gateway is a gateway of the second terminal device.
With reference to the fifth aspect, in some possible implementation manners of the fifth aspect, the processing module is specifically configured to: controlling the transceiver module to receive a fifth message sent by the first terminal device, wherein the destination address of the fifth message is the address of the second terminal device; determining that an output interface of the fifth message is a third tunnel according to the destination address of the fifth message; and generating the fifth message when the destination address of the third tunnel is determined to be the local mobility anchor point of the first terminal device.
With reference to the fifth aspect, in some possible implementation manners of the fifth aspect, the processing module is specifically configured to: and generating the fifth message after a preset time period when the destination address of the third tunnel is determined to be the local mobility anchor point of the first terminal device.
With reference to the fifth aspect, in some possible implementation manners of the fifth aspect, the processing module is specifically configured to: and generating the fifth message when receiving the sixth message sent by the local mobility anchor of the first terminal device.
With reference to the fifth aspect, in some possible implementation manners of the fifth aspect, the transceiver module is further configured to receive a sixth packet sent by the first router after tunnel encapsulation, where a source address of the sixth packet is an address of the second terminal device; the processing module is further configured to establish a second tunnel according to the source address of the sixth packet, where the second tunnel is a tunnel from the device to the first router; the processing module is further configured to bind the address of the second terminal device with the second tunnel.
With reference to the fifth aspect, in some possible implementation manners of the fifth aspect, the transceiver module is further configured to receive a second message sent by the first router, where the second message is used to instruct the apparatus to establish a second tunnel, and the second tunnel is a tunnel from the apparatus to the first router; the processing module is further configured to establish the second tunnel according to the second message; the processing module is further configured to bind the address of the second terminal device with the second tunnel.
With reference to the fifth aspect, in some possible implementation manners of the fifth aspect, the transceiver module is further configured to receive a first message sent by the first terminal device, where a destination address of the first message is an address of the second terminal device, and a source address of the first message is the first address; the processing module is further configured to perform tunnel encapsulation on the first packet, where a tunnel destination address of the first packet after tunnel encapsulation is the address of the first router, and a tunnel source address of the first packet after tunnel encapsulation is the second address; the transceiver module is further configured to send the first packet after tunnel encapsulation to the first router on the second tunnel.
With reference to the fifth aspect, in some possible implementation manners of the fifth aspect, the transceiver module is further configured to receive a second packet after tunnel encapsulation sent by the first router, where a destination address of the second packet is the first address, a source address of the second packet is an address of the second terminal device, a tunnel destination address of the second packet after tunnel encapsulation is the second address, and a tunnel source address of the second packet after tunnel encapsulation is an address of the first router; the processing module is further configured to delete the tunnel encapsulation of the second packet; the transceiver module is further configured to send the second packet after the tunnel encapsulation is deleted to the first terminal device.
With reference to the fifth aspect, in some possible implementation manners of the fifth aspect, the transceiver module is further configured to receive a third packet sent by the first router on a first tunnel, where the first tunnel is a tunnel from the first router to the apparatus, a destination address of the third packet is the first address, and a source address of the third packet is an address of a third terminal device; the processing module is further configured to bind the address of the third terminal device with the second tunnel.
With reference to the fifth aspect, in some possible implementation manners of the fifth aspect, the transceiver module is further configured to receive a fourth message sent by the first terminal device, where a destination address of the fourth message is an address of a third terminal device, and a source address of the fourth message is the first address; the processing module is further configured to send the fourth packet to the first router through the local mobility anchor of the first terminal device according to the destination address of the fourth packet; the transceiver module is further configured to receive a third message sent by the first router according to the source address of the fourth message, where the third message is used to instruct the apparatus to bind the address of the third terminal device with the second tunnel.
In a sixth aspect, an apparatus for wireless communication, the apparatus comprising: a transceiver module, configured to receive a fifth message of a first gateway, where the fifth message is used to trigger detection of a bifurcation point between a first transmission path and a second transmission path, the first transmission path is a shortest transmission path from a current location of a first terminal device to a second terminal device, the first gateway is a current mobile access gateway of the first terminal device, the second transmission path is a shortest transmission path from a first address to the second terminal device, the first address is an address obtained when the first terminal device accesses a network for the first time, the fifth message includes the first address and a second address, and the second address is an address obtained after the first terminal device moves to the first gateway; and a processing module, configured to send a first message to the first router according to the fifth message, where the first message is used to detect the bifurcation point, and the first message includes the first address and the second address.
In a seventh aspect, another apparatus for wireless communication is provided, the apparatus comprising: a transceiver, a memory, and a processor. Wherein the transceiver, the memory and the processor are in communication with each other via an internal connection path, the memory is configured to store instructions, the processor is configured to execute the instructions stored by the memory to control a receiver to receive signals and a transmitter to transmit signals, and when the instructions stored by the memory are executed by the processor, the execution causes the processor to perform the method of the first aspect or any possible implementation manner of the first aspect.
In an eighth aspect, another apparatus for wireless communication is provided, the apparatus comprising: a transceiver, a memory, and a processor. Wherein the transceiver, the memory and the processor are in communication with each other via an internal connection path, the memory is configured to store instructions, the processor is configured to execute the instructions stored by the memory to control the receiver to receive signals and control the transmitter to transmit signals, and when the processor executes the instructions stored by the memory, the execution causes the processor to execute the method of the second aspect or any possible implementation manner of the second aspect.
In a ninth aspect, another apparatus for wireless communication is provided, the apparatus comprising: a transceiver, a memory, and a processor. Wherein the transceiver, the memory and the processor are in communication with each other via an internal connection path, the memory is configured to store instructions, the processor is configured to execute the instructions stored by the memory to control the receiver to receive signals and control the transmitter to transmit signals, and when the processor executes the instructions stored by the memory, the execution causes the processor to perform the method of the third aspect or any possible implementation manner of the third aspect.
A tenth aspect provides a system for wireless communication, the system comprising the apparatus of any one of the possible implementations of the fourth aspect or the fourth aspect, the apparatus of any one of the possible implementations of the fifth aspect or the fifth aspect, and the apparatus of any one of the possible implementations of the sixth aspect or the sixth aspect; or
The system comprises the apparatus of any of the possible implementations of the seventh aspect or the seventh aspect described above, the apparatus of any of the possible implementations of the eighth aspect or the eighth aspect, and the apparatus of any of the possible implementations of the ninth aspect or the ninth aspect.
In an eleventh aspect, there is provided a computer program product comprising: computer program code for causing a computer to perform the method of the first aspect or any of the possible implementations of the first aspect when the computer program code is run by the computer.
In a twelfth aspect, there is provided a computer program product comprising: computer program code for causing a computer to perform the method of the second aspect or any of the possible implementations of the second aspect when the computer program code is run by the computer.
In a thirteenth aspect, there is provided a computer program product comprising: computer program code which, when run by a computer, causes the computer to perform the method of the third aspect or any of the possible implementations of the third aspect.
In a fourteenth aspect, a computer-readable medium is provided for storing a computer program comprising instructions for performing the method of the first aspect or any possible implementation manner of the first aspect.
In a fifteenth aspect, a computer-readable medium is provided for storing a computer program comprising instructions for performing the method of the second aspect or any possible implementation of the second aspect.
In a sixteenth aspect, there is provided a computer readable medium for storing a computer program comprising instructions for performing the method of the third aspect or any possible implementation manner of the third aspect.
In a seventeenth aspect, a chip system applied in a first router is provided, the chip system including: the chip system comprises one or more processors, one or more memories and an interface circuit, wherein the interface circuit is responsible for information interaction between the chip system and the outside, the one or more memories, the interface circuit and the one or more processors are interconnected through a line, and instructions are stored in the one or more memories; the instructions are executable by the one or more processors to perform the operations of the first router in the method of the various aspects described above.
In an eighteenth aspect, a chip system is provided, which is applied in a first gateway, and includes: the chip system comprises one or more processors, one or more memories and an interface circuit, wherein the interface circuit is responsible for information interaction between the chip system and the outside, the one or more memories, the interface circuit and the one or more processors are interconnected through a line, and instructions are stored in the one or more memories; the instructions are executable by the one or more processors to perform operations of the first gateway in the methods of the various aspects described above.
In a nineteenth aspect, a chip system is provided, which is applied in a second gateway, and the chip system includes: the chip system comprises one or more processors, one or more memories and an interface circuit, wherein the interface circuit is responsible for information interaction between the chip system and the outside, the one or more memories, the interface circuit and the one or more processors are interconnected through a line, and instructions are stored in the one or more memories; the instructions are executable by the one or more processors to perform operations of the second gateway in the methods of the various aspects described above.
Drawings
Fig. 1 is a diagram of a scene architecture of a communication system of a method and apparatus for wireless communication of the present application.
Fig. 2 is another scene architecture diagram of a communication system of a method and apparatus of wireless communication of the present application.
Fig. 3 is a schematic flow chart of a method of wireless communication of an embodiment of the present application.
Fig. 4 is a schematic diagram of a downlink packet transmission process according to an embodiment of the present application.
Fig. 5 is a schematic diagram of an uplink packet transmission process according to an embodiment of the present application.
Fig. 6 is another schematic flow chart of a wireless communication method according to an embodiment of the present application.
Fig. 7 is another schematic diagram of a downlink packet transmission process according to an embodiment of the present application.
Fig. 8 is another schematic diagram of an uplink packet transmission process according to an embodiment of the present application.
Fig. 9 is a further schematic flow chart of a wireless communication method according to an embodiment of the present application.
Fig. 10 is a further schematic flow chart of a wireless communication method according to an embodiment of the present application.
FIG. 11 shows a MN and a CN in an embodiment of the present application1Scene diagram in one-to-one communication process.
FIG. 12 shows a MN and a CN in an embodiment of the present application1、CN2Scene diagram in one-to-many communication process.
Fig. 13 is a schematic block diagram of an apparatus for wireless communication according to an embodiment of the present application.
Fig. 14 is another schematic block diagram of an apparatus for wireless communication of an embodiment of the present application.
Fig. 15 is yet another schematic block diagram of an apparatus for wireless communication of an embodiment of the present application.
Fig. 16 is yet another schematic block diagram of an apparatus for wireless communication of an embodiment of the present application.
Fig. 17 is yet another schematic block diagram of an apparatus for wireless communication of an embodiment of the present application.
Fig. 18 is yet another schematic block diagram of an apparatus for wireless communication of an embodiment of the present application.
Detailed Description
The technical solution in the present application will be described below with reference to the accompanying drawings.
Before describing the technical solutions of the embodiments of the present application, several technical terms in the embodiments of the present application are first introduced.
Shortest path: a path constructed by a routing table generated by a routing protocol is called a shortest path.
Route optimization: the message is adjusted from forwarding through a non-shortest path to forwarding through a shortest path.
Ascending: the forwarding direction of the message from the terminal to the network is called uplink.
Descending: the forwarding direction of the message from the network to the terminal is called downlink.
A bifurcation point: for the same source address and two destination addresses, two shortest paths are correspondingly arranged, the two paths are partially overlapped from a source node and then separated, and the overlapped end point or the separated starting point is called a bifurcation point.
The technical scheme of the embodiment of the application can be applied to various communication systems, for example: a global System for Mobile communications (GSM) System, a Code Division Multiple Access (CDMA) System, a Wideband Code Division Multiple Access (WCDMA) System, a General Packet Radio Service (GPRS), a Long term evolution (Long term evolution, LTE) System, an LTE Frequency Division Duplex (FDD) System, an LTE Time Division Duplex (TDD), a Universal Mobile Telecommunications System (UMTS), a Worldwide Interoperability for Microwave Access (WiMAX) communication System, a future fifth Generation (5G) System or a New Radio network (NR, New) System, etc.
Terminal equipment in the embodiments of the present application may refer to user equipment, access terminals, subscriber units, subscriber stations, mobile stations, remote terminals, mobile devices, user terminals, wireless communication devices, user agents, or user devices. The terminal device may also be a cellular phone, a cordless phone, a Session Initiation Protocol (SIP) phone, a Wireless Local Loop (WLL) station, a Personal Digital Assistant (PDA), a handheld device with Wireless communication function, a computing device or other processing device connected to a Wireless modem, a vehicle-mounted device, a wearable device, a terminal device in a future 5G Network or a terminal device in a future evolved Public Land Mobile Network (PLMN), and the like, which are not limited in this embodiment.
The Network device in this embodiment may be a device for communicating with a terminal device, where the Network device may be a Base Transceiver Station (BTS) in a Global System for Mobile communications (GSM) System or a Code Division Multiple Access (CDMA) System, may also be a Base Station (NodeB, NB) in a Wideband Code Division Multiple Access (WCDMA) System, may also be an evolved node b (eNB, or eNodeB) in an LTE System, may also be a wireless controller in a Cloud Radio Access Network (CRAN) scenario, or may be a relay Station, an Access point, a vehicle-mounted device, a wearable device, a Network device in a future 5G Network, or a Network device in a future evolved PLMN Network, and the like, and the embodiment of the present invention is not limited.
Fig. 1 is a diagram of a scene architecture of a communication system 100 of a method and apparatus for wireless communication of the present application. As shown in fig. 1, the communication system 100 includes a first terminal device 110, a second terminal device 120, a first gateway 130, a second gateway 140, a third gateway 150, and a first router 160, where the second gateway 140 is a gateway of the second terminal device 120, the first gateway 130 is a gateway after the first terminal device 120 moves, and the third gateway 150 is a gateway before the first terminal device 110 moves. In Proxy Mobile Internet Protocol Version6 (Proxy Mobile Internet Protocol Version6, MIPv6), the transport layer of the Mobile terminal is allowed to keep the IPV6 address unchanged during the moving process, thereby providing service continuity guarantee during the moving process. With reference to fig. 1, in the PMIPv6 protocol, the third gateway 150 is a gateway when the first terminal device 110 accesses the network for the first time, the third gateway 150 allocates a home Address (HoA) to the first terminal device 110, the first terminal device 110 communicates with the second terminal device 120 through the third gateway, as shown in fig. 1, when the first terminal device 110 is handed over to the first gateway 130 when the first terminal device 110 moves, the first gateway 130 allocates a Proxy Care-of Address (P-CoA) to the first terminal device 110, the first terminal device 110 communicates with the second terminal device 120 through the first gateway 130, as shown in fig. 1, the shortest transmission path for the first terminal device 110 to communicate with the second terminal device 120 after moving is transmission path 1; before the first terminal device 110 moves, the shortest transmission path through which the first terminal device 110 communicates with the second terminal device 120 through the third gateway 150 is transmission path 2.
It should be appreciated that the third gateway may be the gateway when the first terminal device first accesses the network.
It should also be understood that in IPv6, the HoA may be assigned to the first terminal device 110 by the third gateway 150, or the third gateway 150 may assign a prefix of the HoA, and the first terminal device itself determines a suffix of the HoA; in IPv4, the HoA may be assigned to the first terminal device 110 by the third gateway 150.
As shown in fig. 1, the transmission path 1 and the transmission path 2 have a part overlapping and the other part separated, and a boundary Point of the overlapped part and the separated part defines a Branch Point (BP). The shortest path 1 after a move can be seen as consisting of two parts: a coinciding part (second end device 120 to first router 160) and a separate part (first router 160 to first gateway 130). Thus, traffic can be forwarded to the first end device 110 according to the shortest path by establishing a tunnel between the first router 160 and the first gateway 130.
It should be understood that the first terminal device may be a Mobile Node (MN), the second terminal device may be a Correspondent Node (CN), the second Gateway may be a Gateway (GW), the first Gateway may be a current Mobile access Gateway (N-MAG), and the third Gateway may be a Gateway when the first terminal device first accesses the network.
Fig. 2 is another block diagram of a communication system 100 for a method and apparatus for wireless communication according to the present application. As shown in fig. 2, the communication system 100 includes a first terminal device 110, a second terminal device 120, a first gateway 130, a second gateway 140, a third gateway 150, a first router 160, a third terminal device 170, and a fourth gateway 180, where the second gateway 140 is a gateway of the second terminal device 120, the fourth gateway 180 is a gateway of the third terminal device 170, the first gateway 130 is a gateway that the first terminal device 110 is currently mobile to access, and the third gateway 150 is a gateway that the first terminal device 110 is first network to access. Referring to fig. 2, the first terminal device 110 communicates with the second terminal device 120 and the third terminal device 170 at the same time, and for the second terminal device 120 and the third terminal device 170, the branch points of the new and old transmission paths of the first terminal device 110 before and after movement are both the first router 160, so that the traffic of the second terminal device 120 and the third terminal device 170 can be forwarded to the first terminal device 110 according to the shortest path only by establishing a tunnel between the first router 160 and the first gateway 130.
Fig. 3 shows a schematic flow diagram of a method 200 of wireless communication according to an embodiment of the application, the method 200 comprising, as shown in fig. 3:
s210, a first gateway generates a fifth message, wherein the fifth message is used for triggering and detecting a first router, the first router is a bifurcation point of a first transmission path and a second transmission path, the first transmission path is the shortest transmission path from a current position of a first terminal device to a second terminal device, the first gateway is the current gateway of the first terminal device, the second transmission path is the shortest transmission path from a first address to the second terminal device, and the first address is an address obtained when the first terminal device is accessed into a network for the first time;
s220, the first gateway sends the fifth message to a second gateway, the second gateway receives the fifth message sent by the first gateway, and the second gateway is a gateway of the second terminal device;
s230, the second gateway sends a first message to the first router according to the fifth message, the first router receives the first message sent by the second gateway, and the first message is used to detect a branch point of the first transmission path and the second transmission path;
s240, the first router determines, according to the first message, that the first router is the branch point;
s250, the first router establishes a first tunnel, where the first tunnel is a tunnel from the first router to the first gateway.
Optionally, the first tunnel is a tunnel from the first router to the first gateway.
Specifically, a first gateway triggers a detection bifurcation point, the first gateway generates a fifth message, the fifth message is used for triggering and detecting the first router, the first router is a bifurcation point of a first transmission path and a second transmission path, the first transmission path is a shortest transmission path from a current position to a second terminal device, the first gateway is a current gateway of the first terminal device, the second transmission path is a shortest transmission path from a first address to the second terminal device, the first address is an address obtained when the first terminal device accesses a network for the first time, the first gateway sends the fifth message to the second gateway, the second gateway analyzes the content of the fifth message after receiving the fifth message sent by the first gateway, sends the first message to the first router, and the first message is used for detecting the bifurcation point of the first transmission path and the second transmission path, and after receiving the first message, the first router determines that the first router is the branch point, and the first router establishes a first tunnel, wherein the first tunnel is a tunnel from the first router to the first gateway.
It should be understood that the first terminal device, the second terminal device, the first gateway, and the second gateway in fig. 3 may correspond to the first terminal device 110, the second terminal device 120, the first gateway 130, and the second gateway 140 in fig. 1.
The method for wireless communication of the embodiment of the application detects the branch point and establishes the branch point tunnel, so that the message is received or sent through the shortest path formed by the branch point tunnel and the branch point to the communication opposite end, and the method is helpful for solving the problem of the non-shortest path.
Optionally, the method 200 further comprises:
the first router receives a fourth message sent by a fourth gateway, where the fourth message is used to detect a bifurcation point between a fifth transmission path and a sixth transmission path, the fifth transmission path is a shortest transmission path from a current location of a fourth terminal device to a fifth terminal device, the fifth gateway is the current gateway of the fourth terminal device, the sixth transmission path is a shortest transmission path from a third address to the fifth terminal device, the third address is an address obtained when the fourth terminal device accesses a network for the first time, and the fourth gateway is the gateway of the fifth terminal device;
the first router determines, according to the fourth message, that the first router is not the bifurcation point;
the first router forwards the fourth message to a next router.
Specifically, the first router may be a branch point between the first transmission path and the second transmission path, and if the first router determines that the first router is the branch point, a tunnel from the first router to the first gateway is established; the first router may not be a bifurcation point between the fifth transmission path and the sixth transmission path, and when the first router determines that the first router is not the bifurcation point between the fifth transmission path and the sixth transmission path, the fourth message is forwarded to the next router continuously until a certain router determines that the router is the bifurcation point, and then a tunnel from the router to the fifth gateway is established.
Optionally, the first gateway generates the fifth message, including:
the first terminal device sends a fifth message to the first gateway, the first gateway receives the fifth message sent by the first terminal device, and the destination address of the fifth message is the address of the second terminal device;
the first gateway determines that an output interface of the fifth message is a third tunnel according to the destination address of the fifth message;
the first gateway generates the fifth message when determining that the destination address of the third tunnel is a Local Mobility Anchor (LMA) of the first terminal device.
It should be understood that the local mobility anchor of the first terminal device may be an LMA in Proxy Mobile Internet Protocol (PMIP).
Specifically, the first terminal device needs to send an uplink packet, the first terminal device sends a fifth packet to a current gateway (first gateway) of the first terminal device, a destination address of the fifth packet is an address of the second terminal device, after receiving the fifth packet, the first gateway searches for an outgoing interface of the fifth packet as a physical interface or as a tunnel according to the destination address of the fifth packet, when it is determined that the outgoing interface of the fifth packet is a third tunnel, searches for a destination address of the third tunnel, and generates the fifth message when it is determined that the destination address of the third tunnel is a local mobility anchor of the first terminal device, thereby triggering bifurcation detection.
It should be understood that, after receiving the fifth message, the first gateway searches a routing table according to a destination address of the fifth message, if the first terminal device is fixed under the first gateway and has not moved, the first gateway determines that an outgoing interface of the fifth message is a physical interface, if the first terminal device is accessed to the first gateway after moving, the outgoing interface of the fifth message is a tunnel, the first gateway determines that a destination address of the tunnel is the first router or another router, and when determining that the destination address of the tunnel is a local mobility anchor point of the first terminal device, the fifth message is generated to trigger bifurcation point detection.
It should be further understood that, before the bifurcation point is not detected, after the first gateway receives the uplink packet sent by the first terminal device, the routing table entry of the first gateway packet is searched according to the destination address of the uplink packet, the local mobility anchor point that forwards the first packet to the first terminal device is determined, and the first packet is forwarded to the second terminal device through the local mobility anchor point of the first terminal device.
Optionally, the Address of the LMA is an LMA Address (LMAA).
Optionally, when determining, by the first gateway, that the destination address of the forwarding tunnel of the fifth packet is the local mobility anchor of the first terminal device according to the destination address of the fifth packet, generating the fifth message includes:
and the first gateway generates the fifth message after a preset time period when determining that the destination address of the forwarding tunnel of the fifth message is the local mobility anchor point of the first terminal device according to the destination address of the fifth message.
Specifically, a first terminal device sends a fifth message to a second terminal device, after the first gateway receives the fifth message, because the address of the second terminal device is not bound to a first tunnel between the first gateway and a first router, the fifth message is forwarded through the tunnel from the first gateway to a local mobile anchor of the first terminal device, and at this time, a triggering condition for detection of a bifurcation point is met, but at this time, actual triggering is not performed, but active delay of a preset time period is performed.
For example, the preset time period is (RTT b/w MAG & LMA + RTT b/w LMA & BP), the packet is forwarded to the local mobility anchor of the first terminal device during the delay period, after tunnel encapsulation is stripped, the packet is forwarded by the router, because the first router is on the transmission path from the local mobility anchor of the first terminal device to the second terminal device, the fifth packet inevitably passes through the first router, and if no bifurcation point (the first router) is detected at this time, after a preset time, the first gateway generates the fifth message.
If the first router is detected at this time, and the first router detects that a message with a source address of the first address does not come out from a second tunnel from the first gateway to the first router, it is considered that the address of the second terminal device is not bound to the second tunnel from the first gateway to the first router, so that the first router sends a second message to the first gateway, the second message is used for indicating the first gateway to establish a second tunnel, the second tunnel is a tunnel from the first gateway to the first router, the first gateway establishes the second tunnel, and the first gateway device binds the address of the second terminal device to the second tunnel.
Optionally, the first gateway generates a fifth message, including:
and the first gateway generates the fifth message when receiving the sixth message sent by the local mobility anchor of the first terminal device.
Specifically, the first gateway generates the fifth message when receiving the sixth message sent by the local mobility anchor of the first terminal device, where the local mobility anchor of the first terminal device is different from the first router.
Two preconditions for triggering the bifurcation point detection are given, and in one-to-one communication between the MN and the CN, the flow of the bifurcation point detection triggering is as follows:
when the MN moves, the LMA is used for transferring the traffic of the MN, the transferred traffic is non-shortest path traffic, and once a current Mobile Access gateway (N-MAG) captures the non-shortest path traffic, the current MN triggers bifurcation point detection.
(1) Uplink non-shortest path traffic: and the N-MAG receives the message sent by the MN, searches the tunnel of the bifurcation point by using the address of the destination address CN, detects the non-shortest path flow (forwards by using the tunnel from the N-MAG to the LMA) if the search fails, and triggers the detection of the bifurcation point.
(2) Downlink non-shortest path traffic: and the N-MAG receives a message from the LMA to the MAG (the source address of the message after tunnel encapsulation is LMAA, and the destination address is P-CoA), namely the non-shortest path flow is detected, and the bifurcation point detection is triggered.
Optionally, the determining, by the first router according to the first message, that the first router is the branch point includes:
the first router determines that the first router is the bifurcation point by searching a routing table according to the first address and the second address;
wherein, the method 200 further comprises:
the first router binds the first address with the first tunnel.
Specifically, a first message sent by the second gateway to the first router includes a first address and a second address, the first address is an address obtained when the first terminal device accesses a network for the first time, the second address is allocated to the first terminal device by the first gateway, and the first router determines that the first router is the branch point according to the first address and the second address, and then binds the first address with the first tunnel.
According to the wireless communication method, the new and old destination addresses are carried in the bifurcation point detection message, the new and old destination addresses are used for searching the routing table hop by hop, whether the searching results are consistent or not is compared, and if the searching results are not consistent, the current router is the bifurcation point.
It should be understood that, after the first router receives the first message, according to the two destination addresses (the first address and the second address) carried in the first message, the routing table is searched to obtain that the outgoing interface is different from the next hop, and then the first router is determined to be the branch point.
It should also be understood that, if a router finds a routing table according to two destination addresses carried in the first message after receiving the first message, and obtains that an outgoing interface is the same as a next hop, the router will continue to forward the first message to a next router until, after forwarding to the first router, the first router determines that the first router is the branch point.
For example, the N-MAG constructs a Branch Point Detection Trigger (BPDT) message, where a destination address is CN (which is obtained from an original data packet triggering the flow and takes a destination address of an uplink packet or a source address of a downlink packet), and a source address is P-CoA, and carries HoA of the MN through an option. The BPDT message is forwarded to a gateway GW of the CN, the GW constructs a Branch Point Detection (BPD), the destination address is P-CoA, the source address is the address of the CN, and the HoA of the message is carried through the option. In the process of forwarding the BPD message to the N-MAG, a destination address P-CoA and an option address HoA are used for searching a routing table hop by hop, the searched out interface and the next hop are compared, if the two are the same, forwarding is continued, and otherwise, the current router is the bifurcation point. And the BP establishes a tunnel to the N-MAG and simultaneously establishes a binding relationship between the HoA and the tunnel.
Optionally, the method 200 further comprises:
the first router sends a second message to the first gateway, the first gateway receives the second message sent by the first router, the second message is used for indicating the first gateway to establish a second tunnel, and the second tunnel is a reverse transmission path of the first tunnel;
the first gateway establishes the second tunnel according to the second message;
and the first gateway binds the address of the second terminal equipment and the second tunnel.
For example, after establishing a tunnel to the N-MAG and binding the HoA with the tunnel, the BP sends a Branch Point Notification (BPN) message to the N-MAG, where a destination address of the BPN message is a P-CoA and a source address of the BPN message is an address of the BP, and an option carries an address of the CN (a source address of the BPD message). After receiving the BPN message, the N-MAG establishes a reverse tunnel from the N-MAG to the BP and simultaneously establishes a binding relationship between the address of the CN and the reverse tunnel.
It should be understood that, the first router may also send a downlink message to the first gateway upon establishing the first tunnel, where a source address of the downlink message is an address of the second terminal device, the first gateway receives the downlink message sent by the first router, and after the first gateway determines, according to the source address of the downlink message, that a second tunnel from the first gateway to the first router is not established, the first gateway establishes the second tunnel from the first gateway to the first router, and binds the source address of the second terminal device with the second tunnel.
Optionally, fig. 4 shows a schematic diagram of a downlink packet transmission process according to an embodiment of the present application, and as shown in fig. 4, the downlink packet transmission process includes:
the second terminal equipment sends a first message to the first router, the first router receives the first message sent by the second terminal equipment, the destination address of the first message is the first address, and the source address of the first message is the address of the second terminal equipment;
the first router performs tunnel encapsulation on the first message, the tunnel destination address of the first message after tunnel encapsulation is the second address, and the tunnel source address of the first message after encapsulation is the address of the first router;
the first router sends the first message after tunnel encapsulation to the first gateway on the first tunnel;
the first gateway receives a first message after tunnel encapsulation sent by the first router, wherein an inner layer destination address of the first message after tunnel encapsulation is the first address, an inner layer source address of the first message after tunnel encapsulation is the address of the second terminal device, a tunnel destination address of the first message after tunnel encapsulation is the second address, and a tunnel source address of the first message after tunnel encapsulation is the first router;
the first gateway deletes the tunnel encapsulation of the first message;
and the first gateway sends the first message after deleting the tunnel encapsulation to the first terminal equipment.
It should be understood that the second terminal device sends a first message to the first router, where a destination address of the first message is the first address, a source address of the first message is an address of the second terminal device, the first router performs tunnel encapsulation on the first message after receiving the first message, a tunnel destination address of the first message after tunnel encapsulation is the second address, a tunnel source address of the first message after tunnel encapsulation is an address of the first router, an inner layer destination address of the first message after tunnel encapsulation is the first address, and an inner layer source address of the first message after tunnel encapsulation is an address of the second terminal device.
Optionally, fig. 5 is a schematic diagram illustrating an uplink packet transmission process according to an embodiment of the present application, and as shown in fig. 5, the uplink packet transmission process includes:
the first terminal equipment sends a second message to the first gateway, the first gateway receives the second message sent by the first terminal equipment, the destination address of the second message is the address of the second terminal equipment, and the source address of the second message is the first address;
the first gateway performs tunnel encapsulation on the second message, wherein the tunnel destination address of the second message after tunnel encapsulation is the first router, and the tunnel source address of the second message after tunnel encapsulation is the second address;
the first gateway sends the second message after tunnel encapsulation to the first router, the first router receives the second message after tunnel encapsulation sent by the first gateway, the inner layer destination address of the second message after tunnel encapsulation is the address of the second terminal device, the inner layer source address of the second message after tunnel encapsulation is the first address, the tunnel destination address of the second message after tunnel encapsulation is the address of the first router, and the tunnel source address of the second message after tunnel encapsulation is the second address;
the first router deletes the tunnel encapsulation of the second message;
and the first router sends the second message after deleting the tunnel encapsulation to the second terminal equipment.
Optionally, the method 200 further comprises:
a third terminal device sends a third message to the first router, the first router receives the third message sent by the third terminal device, and the destination address of the third message is the first address;
and the first router sends the third message to the first gateway on the first tunnel according to the destination address of the third message.
In the method for wireless communication according to the embodiment of the application, in a downlink process, a branch point receives any downlink message of which a destination address is bound with a branch point tunnel, the downlink message is forwarded through the branch point tunnel, after the message exits from the first gateway, the first gateway checks whether a source address of the downlink message is bound with a second tunnel, if the source address of the downlink message is not bound with the second tunnel, and the first gateway can use the existing branch point without initiating branch point detection.
Optionally, the method 200 further comprises:
the first router receives a fourth message sent by the first gateway through the local mobility anchor of the first terminal device, wherein the destination address of the fourth message is the address of the third terminal device, and the source address of the fourth message is the first address;
and the first router sends a third message to the first gateway according to the source address of the fourth message, wherein the third message is used for indicating the first gateway to bind the address of the third terminal device with the second tunnel.
In the method for wireless communication of the embodiment of the application, in an uplink process, a branch point receives an uplink message that a source address is bound with a branch point tunnel but does not come out from the branch point tunnel, and sends a branch point notification message to a first gateway, and the first gateway can directly use an existing branch point without initiating branch point detection.
Fig. 6 shows a schematic flow diagram of a wireless communication method 300 according to an embodiment of the application, the method 300 comprising, as shown in fig. 6:
s310, the N-MAG sends BPDT information to GW, the destination address is the address of CN (the destination address of the uplink message or the source address of the downlink message is obtained from the original data message triggering the process), the source address is P-CoA, and the HoA of MN is carried through the option.
S320, the GW sends BPD information to the BP according to the BPDT information, the destination address is P-CoA, the source address is CN address, and the HoA of the message is carried through the option.
S330, in the process of forwarding the BPD message to the BP, the BPD message uses the destination address and the option address to search the routing table hop by hop, compares the outgoing interface and the next hop searched twice, if the outgoing interface and the next hop are the same, the BPD message is forwarded continuously, otherwise, the current router is the bifurcation point BP.
S340, the BP establishes a tunnel to the N-MAG, and simultaneously establishes a binding relationship between the HoA and the tunnel.
S350, the BP sends BPN information to the N-MAG, the P-CoA of the destination address and the source address are the address of the BP, and the option carries the address of the CN (the source address of the BPD information).
And S360, after the N-MAG receives the BPN message, the tunnel from the N-MAG to the BP is established, and meanwhile, the binding relationship between the address of the CN and the tunnel is established.
Optionally, before the N-MAG sends the BPDT message to the GW S310, the method 300 further includes:
s301, the N-MAG sends a Proxy Binding Update (PBU) message to the LAM;
s302, the LAM sends a Proxy Binding Acknowledgement (PBA) message to the N-MAG;
s303, the MN sends an uplink message to the N-MAG, the N-MAG receives the uplink message sent by the MN, and the N-MAG performs tunnel encapsulation on the uplink message;
s304, the N-MAG sends the uplink message after the tunnel encapsulation to the LMA on the tunnel from the N-MAG to the LMA, and the LMA peels off the tunnel encapsulation of the uplink message;
s305, the LMA sends the uplink message after the tunnel encapsulation is stripped to the CN.
It should be understood that after receiving the uplink message sent by the MN, the N-MAG performs tunnel encapsulation on the uplink message, where a tunnel encapsulation destination address of the uplink message after tunnel encapsulation is LMAA, a tunnel encapsulation source address is P-CoA, an inner layer destination address is an address of CN, and an inner layer source address is HoA, and sends the uplink message after tunnel encapsulation to the LMA, and the LMA decapsulates the uplink message after tunnel encapsulation after receiving the uplink message after tunnel encapsulation, and sends the uplink message to the CN after peeling off the tunnel encapsulation.
S306, the CN sends a downlink message to the LMA, the LMA receives the downlink message sent by the CN, and the LMA performs tunnel encapsulation on the downlink message;
s307, the LMA sends the downlink message after tunnel encapsulation to the N-MAG on the tunnel from the LMA to the N-MAG;
s308, the N-MAG strips off the encapsulation of the downlink message, and the N-MAG sends the downlink message with the encapsulation stripped off to the MN.
It should be understood that, the LMA receives a downlink message sent by the CN, where a destination address of the downlink message is HoA, a source address of the downlink message is an address of the CN, tunnel encapsulation is performed on the downlink message, a tunnel destination address of the downlink message after tunnel encapsulation is P-CoA, a tunnel source address is LMAA, an inner layer destination address is HoA, and an inner layer source address is an address of the CN, tunnel encapsulation is performed and the downlink message after tunnel encapsulation is sent to the N-MAG, after the N-MAG receives the downlink message after tunnel encapsulation, the N-MAG decapsulates the downlink message after tunnel encapsulation, and sends the downlink message to the MN after tunnel encapsulation is stripped.
Optionally, after S360, the N-MAG establishes the tunnel to the BP, the method 300 further includes:
s371, CN sends the downstream message to BP, BP receives the downstream message that CN sends, carry on the tunnel encapsulation to the downstream message;
s372, the BP sends the downlink message after tunnel encapsulation to the N-MAG on the tunnel from the BP to the N-MAG;
s373, the N-MAG strips off the encapsulation of the downlink message, and the N-MAG sends the downlink message with the stripped encapsulation to the MN.
Fig. 7 is a schematic diagram illustrating a downlink packet transmission process according to an embodiment of the present application, where as shown in fig. 7, the downlink packet transmission process includes: the method comprises the steps that a BP receives a downlink message sent by a CN, the source address of the downlink message is the address of the CN, the destination address of the downlink message is HoA, the downlink message is subjected to tunnel encapsulation, the tunnel source address of the downlink message after tunnel encapsulation is the address of the BP, the tunnel destination address of the downlink message after tunnel encapsulation is P-CoA, the inner layer source address is the address of the CN, the inner layer destination address is the HoA, the downlink message after tunnel encapsulation is sent to an N-MAG, the N-MAG unpacks the downlink message after tunnel encapsulation after receiving the downlink message after tunnel encapsulation, and the downlink message is sent to an MN after the tunnel encapsulation is stripped.
S373, the MN sends an uplink message to the N-MAG, the N-MAG receives the uplink message sent by the MN, and the N-MAG performs tunnel encapsulation on the uplink message;
s374, the N-MAG sends the tunnel-encapsulated uplink message to the BP on the tunnel from the N-MAG to the BP;
s375, after the tunnel encapsulation of the uplink message is stripped by the BP, the uplink message after the tunnel encapsulation is stripped is sent to the CN1
Fig. 8 is a schematic diagram illustrating an uplink packet transmission process according to an embodiment of the present application, where, as shown in fig. 8, the uplink packet transmission process includes: the N-MAG receives the uplink message sent by the MN, the source address of the uplink message is the address of the HoA, the destination address of the downlink message is the CN, the uplink message is subjected to tunnel encapsulation, the tunnel source address of the encapsulated downlink message is the P-CoA, the tunnel destination address of the encapsulated downlink message is the address of the BP, the tunnel encapsulated uplink message is sent to the BP, the BP decapsulates the tunnel encapsulated uplink message after receiving the tunnel encapsulated uplink message, and sends the uplink message to the CN after peeling off the tunnel encapsulation.
Optionally, fig. 9 shows a schematic flow chart of a wireless communication method 300 according to an embodiment of the application, the method 300 comprising:
s381, a third terminal device sends a third packet to a first router, where the first router receives the third packet sent by the third terminal device, a destination address of the third packet is the first address, and a source address of the third packet is an address of the third terminal device;
s382, the first router sends the third packet to the first gateway on the first tunnel according to the destination address of the third packet;
s383, the first gateway binds the address of the third terminal device with the second tunnel;
s384, the first gateway sends the third packet to the first terminal device.
Specifically, the first terminal device communicates with the second terminal device and the third terminal device at the same time, after performing branch point detection on the second terminal device, it is determined that the first router is the branch point, a first tunnel from the first router to the first gateway is established, and the first address and the first tunnel are bound. When the third terminal device sends a third message to the first router, where a source address of the third message is an address of the third terminal device, a destination address of the third message is the first address, the first router tunnel-encapsulates the third message, the first router sends the third message to the first gateway on the first tunnel according to the destination address of the third message, the first gateway receives the third message after tunnel encapsulation, strips off the tunnel encapsulation, determines that the source address of the third message (the address of the third terminal device) is not bound with the second tunnel, binds the address of the third terminal device with the second tunnel, and sends the third message after tunnel encapsulation is stripped to the first terminal device
Optionally, fig. 10 shows a schematic flow chart of a wireless communication method 300 according to an embodiment of the application, the method 300 comprising:
s385, the first terminal device sends a fourth message to the first gateway, and the first gateway receives the fourth message sent by the first terminal device, where a source address of the fourth message is the first address, and a destination address of the fourth message is an address of the third terminal device;
s386, after the first gateway tunnel-encapsulates the fourth packet, sending the tunnel-encapsulated fourth packet to the local mobility anchor of the first terminal device;
s387, the local mobility anchor of the first terminal device strips the tunnel encapsulation of the fourth packet, and sends the fourth packet to the third terminal device, where the tunnel encapsulation is stripped, and the first router receives the fourth packet sent by the first gateway through the local mobility anchor of the first terminal device;
s388, the first router sends a third message to the first gateway according to the source address of the fourth packet, the first gateway receives the third message sent by the first router according to the source address of the fourth packet, and the third message is used to instruct the first gateway to bind the address of the third terminal device with the second tunnel;
s389, the first gateway binds the address of the third terminal device to the second tunnel according to the third message.
Specifically, the first terminal device communicates with the second terminal device and the third terminal device at the same time, after performing branch point detection on the second terminal device, it is determined that the first router is the branch point, a first tunnel from the first router to the first gateway is established, and the first address and the first tunnel are bound. When the first terminal device sends a fourth message to the first gateway, where a source address of the fourth message is the first address, a destination address of the fourth message is an address of the third terminal device, the first gateway searches a routing table according to the destination address of the fourth message, because the address of the third terminal device is not bound to the second tunnel, the first gateway tunnel-encapsulates the fourth message, where a tunnel destination address of the tunnel-encapsulated fourth message is an address of a local mobility anchor of the first terminal device, where a source address of the tunnel-encapsulated fourth message is the second address, and sends the tunnel-encapsulated fourth message to the local mobility anchor of the first terminal device, where the tunnel encapsulation of the fourth message is stripped by the local mobility anchor of the first terminal device, and the tunnel-stripped fourth message is sent to the first router, the first router detects that the fourth message with the source address being the first address is not sent to the first router from the second tunnel, and determines that the address of the third terminal device is not bound with the second tunnel, so that a third message is sent to the first gateway, the third message is used for indicating the first gateway to bind the address of the third terminal device with the second tunnel, the source address of the third message is the address of the first router, the destination address is the second address, the address of the third terminal device is carried by an option, and the first gateway binds the address of the third terminal device with the second tunnel after receiving the third message.
The router of the embodiment of the application expands the control plane action and the forwarding plane action which are introduced by the application on the basis of the existing router.
The control plane acts as follows:
(1) and (3) detecting a bifurcation point: receiving a bifurcation point detection message, and respectively searching a routing table by using a destination address (P-CoA) and an option address (HoA);
(2) and (3) establishing a branch point tunnel: if a router is detected as a bifurcation point, establishing a tunnel of the bifurcation point (the encapsulation destination address of the tunnel is P-CoA, and the source address of the tunnel is BP), locally establishing a Binding Cache Entry (BCE) and Binding the HoA and the tunnel of the bifurcation point;
(3) notification of a bifurcation point: if a router is detected as a branch point, receiving a message sent to a CN by a MN of which the source address is bound with a branch point tunnel but does not come out from the branch point tunnel, and sending a branch point notice to a corresponding N-MAG.
The action of the forwarding plane has the following aspects:
(1) the message sent by the CN to the MN: the BP receives the message with the destination address of HoA and carries out tunnel encapsulation on the message, wherein the destination address of the tunnel is P-CoA, and the source address of the tunnel is the address of the BP;
(2) message sent by MN to CN: and the BP receives the message from the N-MAG to the BP tunnel, and continues routing forwarding after the tunnel encapsulation of the BP is stripped.
The gateway of the embodiment of the application expands and supports the control plane action and the forwarding plane action introduced by the application on the basis of the existing gateway.
The control plane acts as follows:
(1) bifurcation point detection initiates 1: the N-MAG receives a message sent by the MN, searches a bifurcation point tunnel by using a destination address, detects non-shortest path flow (forwards by using the tunnel from the N-MAG to the LMA) if the search fails, and constructs a BPDT message to trigger bifurcation point detection;
(2) bifurcation point detection initiation 2: the N-MAG receives a message from the LMA to the N-MAG tunnel (the source address of the message is LMAA, and the destination address is P-CoA), namely non-shortest path flow is detected, and BPDT information is constructed to trigger bifurcation point detection;
(3) constructing a BPD message: a gateway GW of the CN receives a BPDT message of a destination address belonging to the gateway range, constructs a BPD message and detects a bifurcation point;
(4) tunnel establishment 1: the MAG receives the messages from the tunnel BP to the N-MAG, checks whether the source address of the message is bound with the reverse tunnel, and if not, binds the source address with the tunnel MAG to the BP;
(5) and (3) tunnel establishment 2: and the N-MAG receives the BPN message and binds the corresponding CN address and the tunnel from the N-MAG to the BP.
The action of the forwarding plane has the following aspects:
(1) the CN sends the flow to the MN: receiving a message from the BP to the N-MAG tunnel, peeling off the tunnel package of the message and forwarding the message to the MN;
(2) after receiving a message which is sent by MN and has a destination address of CN, searching BULE hit by using the address of CN, performing tunnel encapsulation on the message, wherein the source address is P-CoA and the destination address is BP address.
For better understanding of the present application, the method of wireless communication according to the embodiment of the present application is described below with reference to fig. 11 and 12, respectively.
As a specific example, FIG. 11 shows a MN and a CN according to an embodiment of the present application1The scene graph in the one-to-one communication process mainly comprises the following steps in the scene:
(1)CN1sending a downlink message to the MN, wherein the source address of the downlink message is CN1The destination address is FFF1:: 1;
(2) the downlink message is forwarded to the LMA by the route, and enters a tunnel from the LMA to the N-MAG on the LMA;
(3) after receiving a message coming out of the tunnel, the N-MAG starts a timer (default is 10 seconds), after the timer is overtime, the N-MAG still does not receive a tunnel binding notice, and the N-MAG initiates bifurcation point detection;
(4) the N-MAG constructs a BPDT message with the destination address of CN1The source address is FFAB::2 (P-CoA of MN), the option carries FFF1::1 (HoA of MN);
(5) after the GW captures (through the access control list rule set in advance) the BPDT message, the GW constructs the BPD message, the destination address is FFAB::2, the source address is CN1The option carries FFF1:: 1;
(6) in the process that GW forwards the data to N-MAG hop by hop, the address carried in the destination address and the option is respectively used for searching a routing table, and the searched routing table items are inconsistent on BP twice;
(7) BP establishes a Binding Cache Entry (BCE), the key value is FFF1::1 (HoA of MN), and the value field is FFAB::2 (P-CoA of MN);
(8) a subsequent BP receives a message with a destination address of FFF1::1, tunnel encapsulation is added to the message, the destination address is FFAB::2, and a source address is BP;
(9) the N-MAG receives the message coming out of the BP tunnel, and finds the source address CN of the message after peeling off the tunnel package of the message1The address of the BCE is not bound with a tunnel from the N-MAG to the BP, the BCE is established, and the key value is CN1The value range of the address of (1) is BP address and FFAB: 2;
(10) MN towards CN1Sending the message with the source address of FFF1::1 and the destination address of CN1The address of (a);
(11) the message is sent to the N-MAG through a default route, the N-MAG searches for a BCE (binary coded decimal) by using a destination address, tunnel encapsulation is carried out, the source address is FFAB::2, and the destination address is BP;
(12) the message is forwarded to BP, BP strips tunnel encapsulation and continues to be forwarded to CN1
Wireless communication method, MN and CN of the embodiment of the application1Through the tunnel from the branch point and the branch point to the CN1The shortest path forwarding composed of the gateway solves the problem of non-shortest path in the one-to-one transmission process of MN and CN.
As a specific example, fig. 12 shows an MN and a CN according to an embodiment of the present application1、CN2One-to-many connectorA scene graph in a message process mainly comprises the following steps in the scene:
(1) MN towards CN2Sending the message with the source address of FFF1::1 and the destination address of CN2The address of (a);
(2) the message is sent to the N-MAG through a default route, the N-MAG finds the failure of a branch point tunnel by using a destination address, and the N-MAG starts a timer (default is 10 seconds);
(3) N-MAG searches Binding Update List items (BULE), adds tunnel encapsulation from N-MAG to LMA on the message, and sends the message to LMA;
(4) the message is stripped of tunnel encapsulation on LMA, and destination address CN is used2The address of the message is continuously forwarded to the BP, the BP detects that the source address of the message is FFF1::1, the message is bound with a tunnel from the BP to the N-MAG, a BPN message is constructed and sent, the destination address is FFAB::2, the source address is a BP address, and options are used for carrying CN2Address of (destination address of data message);
(5) after receiving BPN message, N-MAG establishes BCE with key value of CN2Address, value range is BP address and FFAB:: 2;
(6) subsequent MN towards CN2The sent message can search and hit the BCE, and the message is forwarded to the BP after tunnel encapsulation.
Wireless communication method, MN and CN of the embodiment of the application1、CN2All the traffic between the two channels passes through the tunnel at the branch point and the branch point to the CN1、CN2The shortest path forwarding composed of the route paths of the gateway solves the problem of non-shortest path in the one-to-many transmission process of MN and CN.
The method of wireless communication according to the embodiment of the present application is described in detail above with reference to fig. 1 to 12, and the apparatus of wireless communication according to the embodiment of the present application is described in detail below with reference to fig. 13 to 18.
Fig. 13 shows a schematic block diagram of an apparatus 400 for wireless communication according to an embodiment of the application, which, as shown in fig. 13, comprises:
a transceiver module 410, configured to receive a first message, where the first message is used to detect a branch point between a first transmission path and a second transmission path, the first transmission path is a shortest transmission path from a current location of a first terminal device to a second terminal device, a first gateway is a current gateway of the first terminal device, the second transmission path is a shortest transmission path from a first address to the second terminal device, the first address is an address obtained when the first terminal device accesses a network for the first time, the first message includes the first address and a second address, and the second address is an address obtained after the first terminal device moves to the first gateway;
a processing module 420 for determining the apparatus as the bifurcation point according to the first address and the second address;
the processing module 420 is further configured to establish a first tunnel, which is a tunnel from the apparatus to the first gateway.
Optionally, the processing module 420 is further configured to bind the first address with the first tunnel.
Optionally, the transceiver module 410 is further configured to send a second message to the first gateway, where the second message is used to instruct the first gateway to establish a second tunnel, and the second tunnel is a reverse tunnel of the first tunnel.
Optionally, the transceiver module 410 is further configured to receive a first message after tunnel encapsulation sent by the first gateway, where a destination address of the first message is an address of the second terminal device, a source address of the first message is the first address, a tunnel destination address of the first message after tunnel encapsulation is an address of the apparatus, and a tunnel source address of the first message after tunnel encapsulation is the second address;
the processing module 420 is further configured to delete the tunnel encapsulation of the first packet;
the transceiver module 410 is further configured to send the first packet after deleting the tunnel encapsulation to the second terminal device.
Optionally, the transceiver module 410 is further configured to receive a second message sent by the second terminal device, where a destination address of the second message is the first address, and a source address of the second message is an address of the second terminal device;
the processing module 420 is further configured to perform tunnel encapsulation on the second packet, where a tunnel destination address of the second packet after tunnel encapsulation is the second address, and a tunnel source address of the second packet after tunnel encapsulation is the address of the device;
the transceiver module 410 is further configured to send the second packet after tunnel encapsulation to the first gateway.
Optionally, the transceiver module 410 is further configured to receive a third message sent by a third terminal device, where a destination address of the third message is the first address;
the processing module 420 is further configured to send the third packet to the first gateway on the first tunnel according to the destination address of the third packet.
Optionally, the transceiver module 410 is further configured to receive a fourth message sent by the first gateway through the local mobility anchor of the first terminal device, where a destination address of the fourth message is an address of a third terminal device, and a source address of the fourth message is the first address;
the processing module 420 is further configured to send a third message to the first gateway according to the source address of the fourth packet, where the third message is used to instruct the first gateway to bind the address of the third terminal device and the second tunnel.
Optionally, the transceiver module 410 is further configured to receive a fourth message, where the fourth message is used to detect a branch point between a fifth transmission path and a sixth transmission path, where the fifth transmission path is a shortest transmission path from a current location of the fourth terminal device to the fifth terminal device, the fifth gateway is a current gateway of the fourth terminal device, the sixth transmission path is a shortest transmission path from a third address to the fifth terminal device, and the third address is an address obtained when the fourth terminal device accesses the network for the first time;
the processing module 420 is further configured to determine, from the fourth message, that the apparatus is not the bifurcation point;
the transceiving module 410 is further configured to forward the fourth message to a next router.
It should be appreciated that the apparatus 400 herein is embodied in the form of functional modules. The term module herein may refer to an Application Specific Integrated Circuit (ASIC), an electronic circuit, a processor (e.g., a shared, dedicated, or group processor) and memory that execute one or more software or firmware programs, a combinational logic circuit, and/or other suitable components that support the described functionality. In an optional example, it may be understood by those skilled in the art that the apparatus 400 may be specifically the first router in the foregoing embodiment, and the apparatus 400 may be configured to perform each procedure and/or step corresponding to the first router in the foregoing method embodiment, and in order to avoid repetition, details are not described here again.
Fig. 14 shows a schematic block diagram of an apparatus 500 for wireless communication according to an embodiment of the application, the apparatus 500 comprising, as shown in fig. 14:
a processing module 510, configured to generate a fifth message, where the fifth message is used to trigger and probe a first router, the first router is a branch point of a first transmission path and a second transmission path, the first transmission path is a shortest transmission path from a current location of a first terminal device to a second terminal device, the apparatus is a current gateway of the first terminal device, the second transmission path is a shortest transmission path from a first address to the second terminal device, the fifth message includes the first address and a second address, the first address is an address obtained when the first terminal device first accesses a network, and the second address is an address obtained after the first terminal device moves to the apparatus;
a transceiver module 520, configured to send the fifth message to a second gateway, where the second gateway is a gateway of the second terminal device.
Optionally, the processing module 510 is specifically configured to:
controlling the transceiver module 520 to receive a fifth message sent by the first terminal device, where a destination address of the fifth message is an address of the second terminal device;
determining that an output interface of the fifth message is a third tunnel according to the destination address of the fifth message;
and generating the fifth message when the destination address of the third tunnel is determined to be the local mobility anchor point of the first terminal device.
Optionally, the processing module 510 is specifically configured to:
and generating the fifth message after a preset time period when the destination address of the third tunnel is determined to be the local mobility anchor point of the first terminal device.
Optionally, the processing module 510 is specifically configured to:
and generating the fifth message when receiving the sixth message sent by the local mobility anchor of the first terminal device.
Optionally, the transceiver module 520 is further configured to receive a sixth message sent by the first router after tunnel encapsulation, where a source address of the sixth message is an address of the second terminal device;
the processing module 510 is further configured to establish a second tunnel according to the source address of the sixth packet, where the second tunnel is a tunnel from the device to the first router;
the processing module 510 is further configured to bind the address of the second terminal device with the second tunnel.
Optionally, the transceiver module 520 is further configured to receive a second message sent by the first router, where the second message is used to instruct the apparatus to establish a second tunnel, and the second tunnel is a tunnel from the apparatus to the first router;
the processing module 510 is further configured to establish the second tunnel according to the second message;
the processing module 510 is further configured to bind the address of the second terminal device with the second tunnel.
Optionally, the transceiver module 520 is further configured to receive a first message sent by the first terminal device, where a destination address of the first message is an address of the second terminal device, and a source address of the first message is the first address;
the processing module 510 is further configured to perform tunnel encapsulation on the first packet, where a tunnel destination address of the first packet after tunnel encapsulation is the address of the first router, and a tunnel source address of the first packet after tunnel encapsulation is the second address;
the transceiver module 520 is further configured to send the first packet after tunnel encapsulation to the first router on the second tunnel.
Optionally, the transceiver module 520 is further configured to receive a second packet after tunnel encapsulation sent by the first router, where a destination address of the second packet is the first address, a source address of the second packet is an address of the second terminal device, a tunnel destination address of the second packet after tunnel encapsulation is the second address, and a tunnel source address of the second packet after tunnel encapsulation is an address of the first router;
the processing module 510 is further configured to delete the tunnel encapsulation of the second packet;
the transceiver module 520 is further configured to send the second packet after deleting the tunnel encapsulation to the first terminal device.
Optionally, the transceiver module 520 is further configured to receive a third packet sent by the first router on a first tunnel, where the first tunnel is a tunnel from the first router to the apparatus, a destination address of the third packet is the first address, and a source address of the third packet is an address of a third terminal device;
the processing module 510 is further configured to bind the address of the third terminal device with the second tunnel.
Optionally, the transceiver module 520 is further configured to receive a fourth message sent by the first terminal device, where a destination address of the fourth message is an address of a third terminal device, and a source address of the fourth message is the first address;
the processing module 510 is further configured to send the fourth packet to the first router through the local mobility anchor of the first terminal device according to the destination address of the fourth packet;
the transceiving module 520 is further configured to receive a third message sent by the first router according to the source address of the fourth message, where the third message is used to instruct the apparatus to bind the address of the third terminal device with the second tunnel.
It should be appreciated that the apparatus 500 herein is embodied in the form of functional modules. The term module herein may refer to an Application Specific Integrated Circuit (ASIC), an electronic circuit, a processor (e.g., a shared, dedicated, or group processor) and memory that execute one or more software or firmware programs, a combinational logic circuit, and/or other suitable components that support the described functionality. In an optional example, it may be understood by those skilled in the art that the apparatus 500 may be specifically a first gateway in the foregoing embodiment, and the apparatus 500 may be configured to perform each procedure and/or step corresponding to the first gateway in the foregoing method embodiment, and in order to avoid repetition, details are not described here again.
Fig. 15 shows a schematic block diagram of an apparatus 600 for wireless communication according to an embodiment of the application, and as shown in fig. 15, the apparatus 600 includes:
a transceiver module 610, configured to receive a fifth message of a first gateway, where the fifth message is used to trigger detection of a bifurcation point between a first transmission path and a second transmission path, the first transmission path is a shortest transmission path from a current location of a first terminal device to a second terminal device, the first gateway is a current mobile access gateway of the first terminal device, the second transmission path is a shortest transmission path from a first address to the second terminal device, the first address is an address obtained when the first terminal device accesses a network for the first time, the fifth message includes the first address and a second address, and the second address is an address obtained after the first terminal device moves to the first gateway;
a processing module 620, configured to send a first message to the first router according to the fifth message, where the first message is used to detect the bifurcation point, and the first message includes the first address and the second address.
It should be appreciated that the apparatus 600 herein is embodied in the form of functional modules. The term module herein may refer to an Application Specific Integrated Circuit (ASIC), an electronic circuit, a processor (e.g., a shared, dedicated, or group processor) and memory that execute one or more software or firmware programs, a combinational logic circuit, and/or other suitable components that support the described functionality. In an optional example, it may be understood by those skilled in the art that the apparatus 600 may be embodied as the second gateway in the foregoing embodiment, and the apparatus 600 may be configured to perform each procedure and/or step corresponding to the second gateway in the foregoing method embodiment, and in order to avoid repetition, details are not described here again.
Fig. 16 shows a schematic block diagram of another apparatus 700 for wireless communication provided by an embodiment of the present application. The apparatus 700 comprises at least one processor 710, memory 720, and a communication interface 730; said at least one processor 710, said memory 720 and said communication interface 730 are all connected by internal pathways;
the memory 720 for storing computer execution instructions;
the at least one processor 710 is configured to execute the computer-executable instructions stored in the memory 720, so that the apparatus 700 can perform the information processing method provided by the above method embodiment by performing data interaction with other apparatuses through the communication interface 730.
Wherein the at least one processor 710 is configured to:
receiving a first message through the communication interface 730, where the first message is used to detect a bifurcation point between a first transmission path and a second transmission path, the first transmission path is a shortest transmission path from a current location of a first terminal device to a second terminal device, a first gateway is a current gateway of the first terminal device, the second transmission path is a shortest transmission path from a first address to the second terminal device, the first address is an address obtained when the first terminal device accesses a network for the first time, the first message includes the first address and a second address, and the second address is an address obtained after the first terminal device moves to the first gateway;
determining the apparatus as the bifurcation point according to the first address and the second address;
a first tunnel is established, the first tunnel being a tunnel from the device to the first gateway.
It should be understood that the apparatus 700 may be embodied as the first router in the above embodiments, and may be used to perform each step and/or flow corresponding to the first router in the above method embodiments.
Fig. 17 shows a schematic block diagram of another apparatus 800 for wireless communication provided by an embodiment of the present application. The apparatus 800 includes at least one processor 810, a memory 820, and a communication interface 830; the at least one processor 810, the memory 820, and the communication interface 830 are all connected by internal pathways;
the memory 820 is used for storing computer execution instructions;
the at least one processor 810 is configured to execute the computer-executable instructions stored in the memory 820, so that the apparatus 800 can perform the method of wireless communication provided by the above-mentioned method embodiments by performing data interaction with other apparatuses through the communication interface 830.
Wherein the at least one processor 810 is configured to:
generating a fifth message, where the fifth message is used to trigger and detect a first router, the first router is a bifurcation point between a first transmission path and a second transmission path, the first transmission path is a shortest transmission path from a current location of a first terminal device to a second terminal device, the device is a current gateway of the first terminal device, the second transmission path is a shortest transmission path from a first address to the second terminal device, the fifth message includes the first address and a second address, the first address is an address obtained when the first terminal device first accesses a network, and the second address is an address obtained after the first terminal device moves to the device;
the fifth message is sent via the communication interface 830 to a second gateway, which is a gateway of the second terminal device.
It should be understood that the apparatus 800 may be embodied as the first gateway in the foregoing embodiments, and may be configured to perform each step and/or flow corresponding to the first gateway in the foregoing method embodiments.
Fig. 18 is a schematic block diagram of another apparatus 900 for wireless communication provided by an embodiment of the present application. The apparatus 900 includes at least one processor 910, memory 920, and a communication interface 930; the at least one processor 910, the memory 920, and the communication interface 930 are all connected by internal pathways;
the memory 920 is used for storing computer execution instructions;
the at least one processor 910 is configured to execute the computer-executable instructions stored in the memory 920, so that the apparatus 900 may perform the method of wireless communication provided by the above-mentioned method embodiments by performing data interaction with other apparatuses through the communication interface 930.
Wherein the at least one processor 910 is configured to:
receiving a fifth message of a first gateway through the communication interface 930, where the fifth message is used to trigger detection of a bifurcation point between a first transmission path and a second transmission path, the first transmission path is a shortest transmission path from a current location of a first terminal device to a second terminal device, the first gateway is a current mobile access gateway of the first terminal device, the second transmission path is a shortest transmission path from a first address to the second terminal device, the first address is an address obtained when the first terminal device accesses a network for the first time, the fifth message includes the first address and a second address, and the second address is an address obtained after the first terminal device moves to the first gateway;
and sending a first message to the first router according to the fifth message, wherein the first message is used for detecting the bifurcation point and comprises the first address and the second address.
It should be understood that the apparatus 900 may be embodied as the second gateway in the foregoing embodiments, and may be configured to perform each step and/or flow corresponding to the second gateway in the foregoing method embodiments.
An embodiment of the present application further provides a chip system, where the chip system includes: the chip system comprises one or more processors, one or more memories and an interface circuit, wherein the interface circuit is responsible for information interaction between the chip system and the outside, the one or more memories, the interface circuit and the one or more processors are interconnected through a line, and instructions are stored in the one or more memories; the instructions are executable by the one or more processors to cause the first router, first gateway, or second gateway to perform operations corresponding to the first router, first gateway, or second gateway of the above-described method.
An embodiment of the present application further provides a communication system, including: a first router, and/or a first gateway, and/or a second gateway; the first router is the first router described in the foregoing embodiments, the first gateway is the first gateway described in the foregoing embodiments, and the second gateway is the second gateway described in the foregoing embodiments.
The embodiment of the present application further provides a computer program product, which is applied in a first router, a first gateway or a second gateway, and the computer program product includes a series of instructions, when the instructions are executed, so that the first router, the first gateway or the second gateway can perform the operations of the first router, the first gateway or the second gateway corresponding to the above method.
In the embodiment of the present application, it should be noted that the above method embodiments of the embodiment of the present application may be applied to a processor, or implemented by a processor. The processor may be an integrated circuit chip having signal processing capabilities. In implementation, the steps of the above method embodiments may be performed by integrated logic circuits of hardware in a processor or instructions in the form of software. The processor may be a general purpose processor, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), an off-the-shelf Programmable Gate Array (FPGA) or other Programmable logic device, discrete Gate or transistor logic device, discrete hardware component. The various methods, steps, and logic blocks disclosed in the embodiments of the present application may be implemented or performed. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like. The steps of the method disclosed in connection with the embodiments of the present application may be directly implemented by a hardware decoding processor, or implemented by a combination of hardware and software modules in the decoding processor. The software module may be located in ram, flash memory, rom, prom, or eprom, registers, etc. storage media as is well known in the art. The storage medium is located in a memory, and a processor reads information in the memory and completes the steps of the method in combination with hardware of the processor.
It will be appreciated that the memory in the embodiments of the subject application can be either volatile memory or nonvolatile memory, or can include both volatile and nonvolatile memory. The non-volatile Memory may be a Read-Only Memory (ROM), a Programmable ROM (PROM), an Erasable PROM (EPROM), an Electrically Erasable PROM (EEPROM), or a flash Memory. Volatile Memory can be Random Access Memory (RAM), which acts as external cache Memory. By way of example, but not limitation, many forms of RAM are available, such as Static random access memory (Static RAM, SRAM), Dynamic Random Access Memory (DRAM), Synchronous Dynamic random access memory (Synchronous DRAM, SDRAM), Double Data rate Synchronous Dynamic random access memory (DDR SDRAM), Enhanced Synchronous SDRAM (ESDRAM), Synchronous Link DRAM (SLDRAM), and direct memory bus RAM (DR RAM). It should be noted that the memory of the systems and methods described herein is intended to comprise, without being limited to, these and any other suitable types of memory.
It should be appreciated that reference throughout this specification to "one embodiment" or "an embodiment" means that a particular feature, structure or characteristic described in connection with the embodiment is included in at least one embodiment of the present application. Thus, the appearances of the phrases "in one embodiment" or "in an embodiment" in various places throughout this specification are not necessarily all referring to the same embodiment. Furthermore, the particular features, structures, or characteristics may be combined in any suitable manner in one or more embodiments. It should be understood that, in the various embodiments of the present application, the sequence numbers of the above-mentioned processes do not mean the execution sequence, and the execution sequence of each process should be determined by its function and inherent logic, and should not constitute any limitation to the implementation process of the embodiments of the present application.
Additionally, the terms "system" and "network" are often used interchangeably herein. The term "and/or" herein is merely an association describing an associated object, meaning that three relationships may exist, e.g., a and/or B, may mean: a exists alone, A and B exist simultaneously, and B exists alone. In addition, the character "/" herein generally indicates that the former and latter related objects are in an "or" relationship.
It should be understood that in the embodiment of the present application, "B corresponding to a" means that B is associated with a, from which B can be determined. It should also be understood that determining B from a does not mean determining B from a alone, but may be determined from a and/or other information.
The above embodiments may be implemented in whole or in part by software, hardware, firmware, or any combination thereof. When implemented in software, may be implemented in whole or in part in the form of a computer program product. The computer program product may include one or more computer instructions. When loaded and executed on a computer, cause the processes or functions described in accordance with the embodiments of the application to occur, in whole or in part. The computer may be a general purpose computer, a special purpose computer, a network of computers, or other programmable device. The computer instructions may be stored on a computer readable storage medium or transmitted from one computer readable storage medium to another, for example, from one website, computer, server, or data center to another website, computer, server, or data center via wired (e.g., coaxial cable, fiber optic, Digital Subscriber (DSL)) or wireless (e.g., infrared, wireless, microwave, etc.) means. The computer-readable storage medium can be any available medium that can be accessed by a computer or a data storage device, such as a server, a data center, etc., that incorporates one or more of the available media. The usable medium may be a magnetic medium (e.g., floppy Disk, hard Disk, magnetic Disk), an optical medium (e.g., DVD), or a semiconductor medium (e.g., Solid State Disk (SSD)), among others.
Those of ordinary skill in the art will appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware or combinations of computer software and electronic hardware. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the implementation. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
It is clear to those skilled in the art that, for convenience and brevity of description, the specific working processes of the above-described systems, apparatuses and units may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
In the several embodiments provided in the present application, it should be understood that the disclosed system, apparatus and method may be implemented in other ways. For example, the above-described apparatus embodiments are merely illustrative, and for example, the division of the units is only one logical division, and other divisions may be realized in practice, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit.
The functions, if implemented in the form of software functional units and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present application or portions thereof that substantially contribute to the prior art may be embodied in the form of a software product stored in a storage medium and including instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present application. And the aforementioned storage medium includes: u disk, removable hard disk, read only memory, random access memory, magnetic or optical disk, etc. for storing program codes.
The above description is only for the specific embodiments of the present application, but the scope of the present application is not limited thereto, and any person skilled in the art can easily conceive of the changes or substitutions within the technical scope of the present application, and shall be covered by the scope of the present application. Therefore, the protection scope of the present application shall be subject to the protection scope of the claims.

Claims (38)

1. A method of wireless communication, comprising:
a first router receives a first message, where the first message is used to detect a bifurcation point between a first transmission path and a second transmission path, the first transmission path is a shortest transmission path from a current location of a first terminal device to a second terminal device, a first gateway is a current gateway of the first terminal device, the second transmission path is a shortest transmission path from a first address to the second terminal device, the first address is an ip version6 IPV6 address obtained when the first terminal device accesses a network for the first time, the first message includes the first address and a second address, and the second address is an address obtained after the first terminal device moves to the first gateway;
the first router determines that the first router is the bifurcation point according to the first address and the second address;
the first router establishes a first tunnel, and the first tunnel is a tunnel from the first router to the first gateway.
2. The method of claim 1, further comprising:
the first router binds the first address with the first tunnel.
3. The method of claim 2, further comprising:
and the first router sends a second message to the first gateway, wherein the second message is used for indicating the first gateway to establish a second tunnel, and the second tunnel is a reverse tunnel of the first tunnel.
4. The method of claim 3, further comprising:
the first router receives a first message which is sent by the first gateway and subjected to tunnel encapsulation, wherein the destination address of the first message is the address of the second terminal device, the source address of the first message is the first address, the tunnel destination address of the first message which is subjected to tunnel encapsulation is the address of the first router, and the tunnel source address of the first message which is subjected to tunnel encapsulation is the second address;
the first router deletes tunnel encapsulation of the first message;
and the first router sends the first message after deleting the tunnel encapsulation to the second terminal equipment.
5. The method according to any one of claims 1 to 4, further comprising:
the first router receives a second message sent by the second terminal device, wherein the destination address of the second message is the first address, and the source address of the second message is the address of the second terminal device;
the first router performs tunnel encapsulation on the second message, wherein a tunnel destination address of the second message after tunnel encapsulation is the second address, and a tunnel source address of the second message after tunnel encapsulation is the address of the first router;
and the first router sends the second message after tunnel encapsulation to the first gateway.
6. The method according to claim 3 or 4, characterized in that the method further comprises:
the first router receives a third message sent by a third terminal device, wherein the destination address of the third message is the first address;
and the first router sends the third message to the first gateway on the first tunnel according to the destination address of the third message.
7. The method according to claim 3 or 4, characterized in that the method further comprises:
the first router receives a fourth message sent by the first gateway through the local mobility anchor of the first terminal device, wherein the destination address of the fourth message is the address of a third terminal device, and the source address of the fourth message is the first address;
and the first router sends a third message to the first gateway according to the source address of the fourth message, wherein the third message is used for indicating the first gateway to bind the address of the third terminal device with the second tunnel.
8. The method according to any one of claims 1 to 4, further comprising:
the first router receives a fourth message, where the fourth message is used to detect a bifurcation point between a fifth transmission path and a sixth transmission path, the fifth transmission path is a shortest transmission path from a current position of a fourth terminal device to the fifth terminal device, a fifth gateway is a current gateway of the fourth terminal device, the sixth transmission path is a shortest transmission path from a third address to the fifth terminal device, and the third address is an address obtained when the fourth terminal device first accesses a network;
the first router determines that the first router is not the bifurcation point according to the fourth message;
the first router forwards the fourth message to a next router.
9. A method of wireless communication, comprising:
a first gateway generates a fifth message, where the fifth message is used to trigger and probe a first router, the first router is a bifurcation point between a first transmission path and a second transmission path, the first transmission path is a shortest transmission path from a current location of a first terminal device to a second terminal device, the first gateway is a current gateway of the first terminal device, the second transmission path is a shortest transmission path from a first address to the second terminal device, the fifth message includes the first address and a second address, the first address is an ip version6 IPV6 address obtained when the first terminal device first accesses a network, and the second address is an address obtained after the first terminal device moves to the first gateway;
and the first gateway sends the fifth message to a second gateway, wherein the second gateway is a gateway of the second terminal equipment.
10. The method of claim 9, wherein the first gateway generates a fifth message comprising:
the first gateway receives a fifth message sent by the first terminal device, and the destination address of the fifth message is the address of the second terminal device;
the first gateway determines that an output interface of the fifth message is a third tunnel according to the destination address of the fifth message;
and the first gateway generates the fifth message when determining that the destination address of the third tunnel is the local mobility anchor point of the first terminal device.
11. The method of claim 10, wherein the first gateway generates the fifth message when determining that the destination address of the third tunnel is the local mobility anchor of the first terminal device, comprising:
and the first gateway generates the fifth message after a preset time period when determining that the destination address of the third tunnel is the local mobility anchor point.
12. The method of claim 9, wherein the first gateway generates a fifth message comprising:
and the first gateway generates the fifth message when receiving a sixth message sent by the local mobility anchor of the first terminal device.
13. The method of claim 9, further comprising:
the first gateway receives a sixth message which is sent by the first router and is subjected to tunnel encapsulation, and the source address of the sixth message is the address of the second terminal device;
the first gateway establishes a second tunnel according to the source address of the sixth message, wherein the second tunnel is a tunnel from the first gateway to the first router;
and the first gateway binds the address of the second terminal equipment with the second tunnel.
14. The method of claim 9, further comprising:
the first gateway receives a second message sent by the first router, wherein the second message is used for indicating the first gateway to establish a second tunnel, and the second tunnel is a tunnel from the first gateway to the first router;
the first gateway establishes the second tunnel according to the second message;
and the first gateway binds the address of the second terminal equipment with the second tunnel.
15. The method according to claim 13 or 14, characterized in that the method further comprises:
the first gateway receives a first message sent by the first terminal device, wherein the destination address of the first message is the address of the second terminal device, and the source address of the first message is the first address;
the first gateway performs tunnel encapsulation on the first message, wherein a tunnel destination address of the first message after tunnel encapsulation is the address of the first router, and a tunnel source address of the first message after tunnel encapsulation is the second address;
and the first gateway sends the first message after tunnel encapsulation to the first router.
16. The method according to claim 13 or 14, characterized in that the method further comprises:
the first gateway receives a second message which is sent by the first router and is packaged in a tunnel, wherein the destination address of the second message is the first address, the source address of the second message is the address of the second terminal device, the tunnel destination address of the second message is the second address after the tunnel is packaged, and the tunnel source address of the second message is the address of the first router after the tunnel is packaged;
the first gateway deletes the tunnel encapsulation of the second message;
and the first gateway sends the second message after deleting the tunnel encapsulation to the first terminal equipment.
17. The method according to claim 13 or 14, characterized in that the method further comprises:
the first gateway receives a third message sent by the first router on a first tunnel, wherein the first tunnel is a tunnel from the first router to the first gateway, the destination address of the third message is the first address, and the source address of the third message is the address of a third terminal device;
and the first gateway binds the address of the third terminal equipment with the second tunnel.
18. The method according to claim 13 or 14, characterized in that the method further comprises:
the first gateway receives a fourth message sent by the first terminal device, wherein the destination address of the fourth message is the address of a third terminal device, and the source address of the fourth message is the first address;
the first gateway sends the fourth message to the first router through the local mobile anchor point of the first terminal equipment according to the destination address of the fourth message;
and the first gateway receives a third message sent by the first router according to the source address of the fourth message, wherein the third message is used for indicating the first gateway to bind the address of the third terminal device with the second tunnel.
19. A method of wireless communication, comprising:
a second gateway receives a fifth message of a first gateway, where the fifth message is used to trigger detection of a bifurcation point between a first transmission path and a second transmission path, the first transmission path is a shortest transmission path from a current location of a first terminal device to the second terminal device, the first gateway is a current mobile access gateway of the first terminal device, the second transmission path is a shortest transmission path from a first address to the second terminal device, the first address is an ip version6 IPV6 address obtained when the first terminal device first accesses a network, the fifth message includes the first address and a second address, and the second address is an address obtained after the first terminal device moves to the first gateway;
and the second gateway sends a first message to a first router according to the fifth message, wherein the first message is used for detecting the bifurcation point, and the first message comprises the first address and the second address.
20. An apparatus of wireless communication, comprising:
a transceiver module, configured to receive a first message, where the first message is used to detect a bifurcation point between a first transmission path and a second transmission path, the first transmission path is a shortest transmission path from a current location of a first terminal device to a second terminal device, a first gateway is a current gateway of the first terminal device, the second transmission path is a shortest transmission path from a first address to the second terminal device, the first address is an ip version6 IPV6 address obtained when the first terminal device accesses a network for the first time, the first message includes the first address and a second address, and the second address is an address obtained after the first terminal device moves to the first gateway;
a processing module to determine the apparatus as the bifurcation point based on the first address and the second address;
the processing module is further configured to establish a first tunnel, where the first tunnel is a tunnel from the device to the first gateway.
21. The apparatus of claim 20, wherein the processing module is further configured to bind the first address with the first tunnel.
22. The apparatus of claim 21, wherein the transceiver module is further configured to send a second message to the first gateway, and wherein the second message is used to instruct the first gateway to establish a second tunnel, and wherein the second tunnel is a reverse tunnel of the first tunnel.
23. The apparatus according to claim 22, wherein the transceiver module is further configured to receive a first tunnel-encapsulated packet sent by the first gateway, where a destination address of the first packet is an address of the second terminal device, a source address of the first packet is the first address, a tunnel destination address of the first packet after tunnel encapsulation is an address of the apparatus, and a tunnel source address of the first packet after tunnel encapsulation is the second address;
the processing module is further configured to delete the tunnel encapsulation of the first packet;
the transceiver module is further configured to send the first packet after the tunnel encapsulation is deleted to the second terminal device.
24. The apparatus according to any one of claims 20 to 23, wherein the transceiver module is further configured to receive a second packet sent by the second terminal device, where a destination address of the second packet is the first address, and a source address of the second packet is an address of the second terminal device;
the processing module is further configured to perform tunnel encapsulation on the second packet, where a tunnel destination address of the second packet after tunnel encapsulation is the second address, and a tunnel source address of the second packet after tunnel encapsulation is the address of the device;
the transceiver module is further configured to send the second packet after tunnel encapsulation to the first gateway.
25. The apparatus according to claim 22 or 23, wherein the transceiver module is further configured to receive a third packet sent by a third terminal device, and a destination address of the third packet is the first address;
the processing module is further configured to send the third packet to the first gateway on the first tunnel according to a destination address of the third packet.
26. The apparatus according to claim 22 or 23, wherein the transceiver module is further configured to receive a fourth message sent by the first gateway through the local mobility anchor of the first terminal device, where a destination address of the fourth message is an address of a third terminal device, and a source address of the fourth message is the first address;
the processing module is further configured to send a third message to the first gateway according to the source address of the fourth packet, where the third message is used to instruct the first gateway to bind the address of the third terminal device with the second tunnel.
27. The apparatus according to any one of claims 20 to 23, wherein the transceiver module is further configured to receive a fourth message, where the fourth message is used to detect a bifurcation point between a fifth transmission path and a sixth transmission path, the fifth transmission path is a shortest transmission path from a current location of a fourth terminal device to the fifth terminal device, a fifth gateway is a current gateway of the fourth terminal device, the sixth transmission path is a shortest transmission path from a third address to the fifth terminal device, and the third address is an address obtained when the fourth terminal device accesses the network for the first time;
the processing module is further to determine, from the fourth message, that the apparatus is not the bifurcation point;
the transceiver module is further configured to forward the fourth message to a next router.
28. An apparatus of wireless communication, comprising:
a processing module, configured to generate a fifth message, where the fifth message is used to trigger and probe a first router, the first router is a branch point of a first transmission path and a second transmission path, the first transmission path is a shortest transmission path from a current location of a first terminal device to a second terminal device, the apparatus is a current gateway of the first terminal device, the second transmission path is a shortest transmission path from a first address to the second terminal device, the fifth message includes the first address and a second address, the first address is an IPV6 version of an internet protocol obtained when the first terminal device first accesses a network, and the second address is an address obtained after the first terminal device moves to the apparatus;
and the transceiver module is configured to send the fifth message to a second gateway, where the second gateway is a gateway of the second terminal device.
29. The apparatus of claim 28, wherein the processing module is specifically configured to:
controlling the transceiver module to receive a fifth message sent by the first terminal device, wherein a destination address of the fifth message is an address of the second terminal device;
determining that an output interface of the fifth message is a third tunnel according to the destination address of the fifth message;
and generating the fifth message when the destination address of the third tunnel is determined to be the local mobility anchor point of the first terminal device.
30. The apparatus of claim 29, wherein the processing module is specifically configured to:
and generating the fifth message after a preset time period when the destination address of the third tunnel is determined to be the local mobility anchor point.
31. The apparatus of claim 28, wherein the processing module is specifically configured to:
and generating the fifth message when receiving a sixth message sent by the local mobility anchor of the first terminal device.
32. The apparatus according to claim 28, wherein the transceiver module is further configured to receive a sixth packet sent by the first router after tunnel encapsulation, and a source address of the sixth packet is an address of the second terminal device;
the processing module is further configured to establish a second tunnel according to the source address of the sixth packet, where the second tunnel is a tunnel from the device to the first router;
the processing module is further configured to bind the address of the second terminal device with the second tunnel.
33. The apparatus according to claim 28, wherein the transceiver module is further configured to receive a second message sent by the first router, the second message being used to instruct the apparatus to establish a second tunnel, the second tunnel being a tunnel from the apparatus to the first router;
the processing module is further configured to establish the second tunnel according to the second message;
the processing module is further configured to bind the address of the second terminal device with the second tunnel.
34. The apparatus according to claim 32 or 33, wherein the transceiver module is further configured to receive a first packet sent by the first terminal device, where a destination address of the first packet is an address of the second terminal device, and a source address of the first packet is the first address;
the processing module is further configured to perform tunnel encapsulation on the first packet, where a tunnel destination address of the first packet after tunnel encapsulation is an address of the first router, and a tunnel source address of the first packet after tunnel encapsulation is the second address;
the transceiver module is further configured to send the first packet after tunnel encapsulation to the first router on the second tunnel.
35. The apparatus according to claim 32 or 33, wherein the transceiver module is further configured to receive a second packet after tunnel encapsulation sent by the first router, where a destination address of the second packet is the first address, a source address of the second packet is an address of the second terminal device, a tunnel destination address of the second packet after tunnel encapsulation is the second address, and a tunnel source address of the second packet after tunnel encapsulation is an address of the first router;
the processing module is further configured to delete the tunnel encapsulation of the second packet;
the transceiver module is further configured to send the second packet after the tunnel encapsulation is deleted to the first terminal device.
36. The apparatus according to claim 32 or 33, wherein the transceiver module is further configured to receive a third packet sent by the first router over a first tunnel, where the first tunnel is a tunnel from the first router to the apparatus, a destination address of the third packet is the first address, and a source address of the third packet is an address of a third terminal device;
the processing module is further configured to bind the address of the third terminal device with the second tunnel.
37. The apparatus according to claim 32 or 33, wherein the transceiver module is further configured to receive a fourth packet sent by the first terminal device, where a destination address of the fourth packet is an address of a third terminal device, and a source address of the fourth packet is the first address;
the processing module is further configured to send the fourth packet to the first router through the local mobility anchor of the first terminal device according to the destination address of the fourth packet;
the transceiver module is further configured to receive a third message sent by the first router according to the source address of the fourth packet, where the third message is used to instruct the apparatus to bind the address of the third terminal device with the second tunnel.
38. An apparatus of wireless communication, comprising:
a transceiver module, configured to receive a fifth message of a first gateway, where the fifth message is used to trigger detection of a bifurcation point between a first transmission path and a second transmission path, the first transmission path is a shortest transmission path from a current location of a first terminal device to a second terminal device, the first gateway is a current mobile access gateway of the first terminal device, the second transmission path is a shortest transmission path from a first address to the second terminal device, the first address is an ip version6 IPV6 address obtained when the first terminal device first accesses a network, the fifth message includes the first address and a second address, and the second address is an address obtained after the first terminal device moves to the first gateway;
and a processing module, configured to send a first message to a first router according to the fifth message, where the first message is used to detect the bifurcation point, and the first message includes the first address and the second address.
CN201711190919.1A 2017-11-24 2017-11-24 Wireless communication method and device Active CN109842918B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711190919.1A CN109842918B (en) 2017-11-24 2017-11-24 Wireless communication method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711190919.1A CN109842918B (en) 2017-11-24 2017-11-24 Wireless communication method and device

Publications (2)

Publication Number Publication Date
CN109842918A CN109842918A (en) 2019-06-04
CN109842918B true CN109842918B (en) 2020-09-08

Family

ID=66876354

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711190919.1A Active CN109842918B (en) 2017-11-24 2017-11-24 Wireless communication method and device

Country Status (1)

Country Link
CN (1) CN109842918B (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2004107702A1 (en) * 2003-06-03 2004-12-09 Telefonaktiebolaget Lm Ericsson (Publ) Ip mobility
CN1663217A (en) * 2002-06-19 2005-08-31 摩托罗拉公司 Data flow between a communication node and a mobile node in a mobile network
CN101227248A (en) * 2008-01-29 2008-07-23 中兴通讯股份有限公司 Method for establishing business path
CN102695236A (en) * 2011-03-22 2012-09-26 中兴通讯股份有限公司 Method and system of data routing
CN103051545A (en) * 2011-10-13 2013-04-17 中兴通讯股份有限公司 Method and system for establishing optimized path for multicast data
US8499097B1 (en) * 2006-11-22 2013-07-30 Microsoft Corporation Mobile route optimization authorization
CN106843211A (en) * 2017-02-07 2017-06-13 东华大学 A kind of method for planning path for mobile robot based on improved adaptive GA-IAGA

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20100073036A (en) * 2008-12-22 2010-07-01 한국전자통신연구원 Method for supporting mobility

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1663217A (en) * 2002-06-19 2005-08-31 摩托罗拉公司 Data flow between a communication node and a mobile node in a mobile network
WO2004107702A1 (en) * 2003-06-03 2004-12-09 Telefonaktiebolaget Lm Ericsson (Publ) Ip mobility
US8499097B1 (en) * 2006-11-22 2013-07-30 Microsoft Corporation Mobile route optimization authorization
CN101227248A (en) * 2008-01-29 2008-07-23 中兴通讯股份有限公司 Method for establishing business path
CN102695236A (en) * 2011-03-22 2012-09-26 中兴通讯股份有限公司 Method and system of data routing
CN103051545A (en) * 2011-10-13 2013-04-17 中兴通讯股份有限公司 Method and system for establishing optimized path for multicast data
CN106843211A (en) * 2017-02-07 2017-06-13 东华大学 A kind of method for planning path for mobile robot based on improved adaptive GA-IAGA

Also Published As

Publication number Publication date
CN109842918A (en) 2019-06-04

Similar Documents

Publication Publication Date Title
US11129068B2 (en) Network device and terminal device applied for cell handover
WO2017091960A1 (en) Method, device and system for switching between mobile edge computing platforms
CN111510986B (en) Method for maintaining service continuity, control plane gateway and mobile management network element
AU2018399714B2 (en) Wireless communications method and device
CN104796954A (en) System and method for seamless mobility in a network environment
WO2019095119A1 (en) Network switching method, network device, and terminal device
JP2021517751A (en) Methods, devices and computer storage media for configuring secondary cells
KR20110003384A (en) Method and device for deleting bearer
CN112929949B (en) Wireless communication method and communication device
CN111543116B (en) Method for forwarding data between nodes in relay network and network node
ES2928582T3 (en) Method to establish a tunnel between the local gateways and the gateway
CN109842918B (en) Wireless communication method and device
JP6473171B2 (en) Indication of IMEISV via MAP for inter-MSC handover
US20100165917A1 (en) Base station apparatus, access gateway apparatus, communication control system and communication control method
CN106998540B (en) Emergency call switching method, system and emergency access switching functional entity
CN111526550B (en) Communication method, network equipment and terminal equipment
CN109729520B (en) Method and apparatus for wireless communication
CN111465097A (en) Notification information display method and device
JP6827520B2 (en) Service continuity assurance methods, control plane gateways, and mobility management network elements
AU2017430204A1 (en) Path switching method and base station
CN112438061B (en) Wireless communication method, network node and terminal equipment
EP3007492B1 (en) Route optimizing method and apparatus, and computer storage medium
Magagula et al. Enhancement to seamless vertical handover in a micro-mobility domain
Liu et al. S-PMIPv6: Efficient handover of proxy mobile IPv6 by using SCTP
CN104469866A (en) PMIPv6 switching method based on busy forward chain

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant