CN101188542A - Method for establishing IP tunnel and device for distributing IP address - Google Patents

Method for establishing IP tunnel and device for distributing IP address Download PDF

Info

Publication number
CN101188542A
CN101188542A CNA2006101451812A CN200610145181A CN101188542A CN 101188542 A CN101188542 A CN 101188542A CN A2006101451812 A CNA2006101451812 A CN A2006101451812A CN 200610145181 A CN200610145181 A CN 200610145181A CN 101188542 A CN101188542 A CN 101188542A
Authority
CN
China
Prior art keywords
user
address
chain
command
tunnel
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CNA2006101451812A
Other languages
Chinese (zh)
Inventor
刘丽娜
王珊珊
闫文俊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Technologies Co Ltd
Original Assignee
Huawei Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co Ltd filed Critical Huawei Technologies Co Ltd
Priority to CNA2006101451812A priority Critical patent/CN101188542A/en
Publication of CN101188542A publication Critical patent/CN101188542A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Data Exchanges In Wide-Area Networks (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The embodiment of the invention discloses a method to establish an internet agreement IP tunnel. The method comprises the steps that a tunnel-established initiator sends a tunnel-established request to a control face element location; the control face element location responds to the request, and sends back the IP address of a user face element location to the initiator; the initiator and the user face element location use the IP address to establish an IP tunnel between the initiator and the user face element location. Based on the method, the invention also discloses a system to establish the internet agreement IP tunnel and a device to distribute the IP address. Through the IP tunnel established between the initiator and the user face element location, the technical proposal which is provided by the invention can realize the communications between the tunnel-established initiator and the user face element location in the IP-based moving management technology.

Description

Set up the method and system of IP tunnel and the device of distributing ip address
Technical field
The present invention relates to network communications technology field, relate in particular to a kind of method and system of IP tunnel and device of distributing ip address set up.
Background technology
In the legacy network organizational structure, the chain of command that is used for processing signaling all is set at same gateway device with the user's face that is used for processing service data.Along with the continuous growth of traffic data type and quantity, make that the load of traditional gateway that integrates user's face and chain of command is heavy, and be unfavorable for professional expansion.Third generation partner program (3GPP) is tended to and based on the GTP agreement gateway user face and chain of command is separated, and has realized communicating by letter between gateway user face and the IP node, by gateway user face special disposal business datum.The gateway control face separates with user's face, makes that the chain of command gateway can be by centralized configuration together, thereby realizes the centralized control to the whole network.Such centralized control can better realize load balancing, and saves operation cost.The plurality of advantages that gateway user face and chain of command are separated makes separation gateway chain of command and user's face become one of development of Communication Technique trend now.
The fusion of mobile communication technology and Internet Protocol (IP) technology also is the development of Communication Technique direction always.Wherein, IP-based mobile management technology as the mobile IP (MIP) of the Internet engineering duty group (IETF) definition, mobility that internet key upgrades and many Su Xieyi (MOBIKE) etc., is the solution that locomotive function can be provided based on the internet.When 3GPP exploitation next generation network (E3S), will consider the IP-based mobile management technology of compatible this class.The inventor finds under study for action: after not considering gateway user face and chain of command separates in the existing IP-based mobile management technology, therefore the communication issue between gateway user face and the IP node can not support 3GPP.
With MIP is example, and MIP provides a kind of IP routing mechanism, and mobile node (MN) can be connected on any link with a permanent IP address.Realize that MIP may relate to three kinds of functional entitys, be respectively: mobile node, Foreign Agent (FA) and local agent (HA).HA can safeguard the positional information of MN.When MN is in the home network, only need to use the home address (HoA) that distributes by HA.After MN leaves home network, moves to a field network, MN will obtain a Care-of Address (CoA) that is distributed by field network.When using mobile IP to serve, MN need initiate the MIP registration process to HA.This registration process promptly is to set up the process of IP tunnel between MN and the HA.HA creates the related of HoA and CoA in this registration process.When the business data packet that sends to MN arrived HA, HA was properly routed to MN according to the current location information of the MN that CoA provided of record with business data packet.HA is exactly the gateway that integrates chain of command and user's face, when chain of command HA and user's face HA realize separating, HA is as carrying out Signalling exchange between chain of command HA and the MN, user's face HA be responsible for and MN between business data processing, but communicating by letter between MN and the user's face HA need realize that promptly MN can't carry out direct communication with user's face HA by chain of command HA.
Similarly, in the MOBIKE technology, under the situation of business datum by IP tunnel transmission, subscriber equipment (UE) need and gateway (GW) between set up safe IP (IPsec) tunnel.Wherein, GW both had been used to handle the interacting message when setting up the IPsec tunnel with UE, was used for again after setting up the IPsec tunnel business datum being handled.When chain of command GW and user's face GW realize separating, GW is as carrying out Signalling exchange between chain of command GW and the MN, user's face GW be responsible for and UE between business data processing, but communicating by letter between UE and the user's face GW need be by chain of command GW realization, promptly UE can't carry out direct communication with user's face GW.
Summary of the invention
In view of this, first purpose of the embodiment of the invention is: a kind of method of setting up IP tunnel is provided, makes in the IP-based mobile management technology, realize communicating by letter between the promoter that the tunnel is set up and the user's veil unit.
Second purpose of the embodiment of the invention is: the device of a kind of distributing ip address is provided, makes in the IP-based mobile management technology, realize communicating by letter between the promoter that the tunnel is set up and the user's veil unit.
The 3rd purpose of the embodiment of the invention is: a kind of system that sets up IP tunnel is provided, makes in the IP-based mobile management technology, realize communicating by letter between the promoter that the tunnel is set up and the user's veil unit.
First purpose of the embodiment of the invention is achieved through the following technical solutions:
The invention provides a kind of method of setting up IP tunnel, comprising:
The promoter that IP tunnel is set up sends the request of setting up IP tunnel to the chain of command network element;
The chain of command network element responds described request, returns the IP address of user's veil unit to the promoter;
Described promoter and described user's veil unit set up the IP tunnel between this promoter and this user's veil unit according to described IP address.
Second purpose of the embodiment of the invention is achieved through the following technical solutions:
The embodiment of the invention provides the device of a kind of distributing ip address, comprising:
The chain of command network element is used to receive the request of setting up IP tunnel, responds this request, and the IP address of user's veil unit is sent.
The 3rd purpose of the embodiment of the invention is achieved through the following technical solutions:
The embodiment of the invention provides a kind of system that sets up IP tunnel, comprising:
Initiate device and user's veil unit of unit, distributing ip address;
Initiate the unit, be used for sending the request of setting up IP tunnel to the device of distributing ip address, according to the IP address that receives, set up and described user's veil unit between IP tunnel;
The device of distributing ip address comprises:
The chain of command network element is used to receive the request of setting up IP tunnel from initiating the unit, responds this request, and the IP address of user's veil unit is sent, and is received by described initiation unit.
By foregoing as seen, the technical scheme that the embodiment of the invention provides is returned to the IP address of user's veil unit by the chain of command network element promoter of tunnel foundation by in setting up the process of IP tunnel.Like this, the promoter obtains under the IP address situation of user's veil unit, and user's veil unit sets up the IP tunnel between this promoter and this user's veil unit.And communicate by letter, thereby realize in the IP-based mobile management technology communicating by letter between the promoter of tunnel foundation and the user's veil unit by this IP tunnel and user's veil unit.
Description of drawings
Fig. 1 is the method overview flow chart that the present invention sets up IP tunnel;
Fig. 2 is a method flow diagram of setting up IP tunnel in the present invention's first preferred embodiment;
Fig. 3 is a method flow diagram of setting up IP tunnel in the present invention's second preferred embodiment;
Fig. 4 is a method flow diagram of setting up IP tunnel in the present invention's the 3rd preferred embodiment;
Fig. 5 is a method flow diagram of setting up IP tunnel in the present invention's the 4th preferred embodiment;
Fig. 6 is the structural representation of the device of distributing ip address in the preferred embodiment of the present invention;
Fig. 7 is a structural representation of setting up the system of IP tunnel in the preferred embodiment of the present invention.
Embodiment
For the purpose, technical scheme and the advantage that make the embodiment of the invention is clearer, describe in further detail below in conjunction with accompanying drawing.
In the embodiment of the invention, the chain of command network element returns to this promoter with the IP address of user's veil unit under the promoter's that IP tunnel is set up request.The promoter is learning under the IP address situation of user's veil unit, and user's veil unit sets up the IP tunnel between this promoter and this user's veil unit.Like this, just can communicate between promoter and the user's veil unit by this IP tunnel.
Fig. 1 is the method overview flow chart that the present invention sets up IP tunnel, may further comprise the steps:
The promoter that step 101, IP tunnel are set up sends the request of setting up IP tunnel to the chain of command network element.
Step 102, chain of command network element respond this request, and return the IP address of user's veil unit to the promoter.
Step 103, promoter and user's veil unit set up the IP tunnel between this promoter and this user's veil unit according to this IP address.
Be example at first, be described in detail in the MIP technology and adopt the above-mentioned method of setting up IP tunnel shown in Figure 1 to realize the process of communicating by letter between user's face HA and the MN/FA with the MIP technology.
As mentioning in the background technology, before MN uses the MIP service, need initiate the MIP registration process to HA, the essence of this registration process is the IP tunnel of setting up between MN/FA and the HA.Adopt the above-mentioned method of setting up IP tunnel that this registration process is made improvement, set up the IP tunnel between MN/FA and the user's face HA, can realize communicating by letter between MN/FA and the user's face HA.
Mobile IP technology can be divided into based on the MIPv4 technology of IPv4 and MIPv6 technology based on IPv6.
In MIPv4, MN has two kinds to the mode that HA initiates the MIP registration: first kind, MN initiates the MIP registration by FA to HA; Second kind, MN directly initiates the MIP registration to HA.
Fig. 2 is a method flow diagram of setting up IP tunnel in the present invention's first preferred embodiment.The mobile IP technology that relates in the present embodiment is the MIPv4 technology, and MN initiates the MIP registration by FA to HA, sets up the IPv4 tunnel between FA and the user's face HA.Present embodiment may further comprise the steps:
Step 201, MN send the MIP login request message to FA.
Carry the HoA address of MN and the control plane address of HA in this login request message.Wherein, the HA address when MN known control face HA address, this chain of command HA address integrate chain of command and user's face with original HA is identical.
After step 202, FA received login request message, the binding of creating the link layer address of FA and MN and HoA address was related.
In step 202, this binding association is the link layer address of FA and MN and the corresponding relation of HoA address.
Step 203, FA as request message from the IPv4 tunnel to chain of command HA that initiate to set up, send to chain of command HA with above-mentioned login request message.
In the present embodiment, FA is the promoter who sets up above-mentioned IP v4 tunnel, and chain of command HA is the chain of command network element.That is to say that FA is the request of setting up above-mentioned IP v4 tunnel to chain of command HA initiation to the essence that chain of command HA sends above-mentioned login request message.
After step 204, chain of command HA receive above-mentioned request message, respond this request, the HoA address of creating MN is related with the binding of FA address.
In step 204, HoA address that this binding association is MN and the corresponding relation between the FA address.
Step 205, chain of command HA are returned the response message of register requirement to FA, and this response message is as the request response of setting up IP tunnel, the IP address of carrying user's face HA.
FA and user's face HA set up this IPv4 tunnel between the two according to this IP address.
In the present embodiment, user's face HA is user's veil unit.Chain of command HA by return the response message of MIP register requirement to FA, carries the IP address of user's face HA to FA by this response message just.Before chain of command HA sent above-mentioned request message, chain of command HA can be by static configuration or the dynamic IP address of finding to know user's face HA at FA in the IP address of this user's face HA.
The response message that step 206, FA return HA, the response message as the MN register requirement returns to MN.
In the present embodiment, in this response message that MN returns, can not carry the information of the IP address of relevant user's face HA by FA.
The process in the IPv4 tunnel between the above-mentioned FA of foundation and the user's face HA realizes to the register flow path that HA initiates MIP by FA based on existing MN, by chain of command HA response FA send set up the request message in IPv4 tunnel the time, return the IP address of user's face HA to FA, set up the IPv4 tunnel between FA and the user's face HA.HA address when wherein, this chain of command HA address integrates chain of command and user's face with original HA is identical.
After the MIP of MN registration was finished, when MN sent the uplink business data bag to peer node (CN) in the network of FA place, this business data packet need be sent to user's face HA by the IPv4 tunnel of setting up between FA and the user's face HA.This process is specially:
The business data packet that MN at first will send to CN sends to FA.The source address in the IP packet header of this business data packet is the HoA address of MN, and destination address is the address of CN.
FA receives after this business data packet that will send, and is the FA address with source address, and destination address is that the MIP encapsulation process is carried out to the business data packet that will send, the business data packet after obtaining encapsulating in the IP packet header of the IP address of user's face HA.Business datum after the encapsulation is surrounded by two-layer IP packet header: the source address in external IP packet header is the FA address, and destination address is the IP address of user's face HA; The source address in inner IP packet header remains the HoA address of MN, and destination address is the address of CN.
Like this, the business data packet after FA just will encapsulate by above-mentioned IP v4 tunnel sends to user's face HA.After the business data packet of user's face HA after receiving encapsulation, business data packet after the encapsulation is carried out the MIP decapsulation to be handled, remove the external IP packet header of the business data packet after the encapsulation, and, will send to CN from the business data packet that MN sends according to the destination address in inner IP packet header.
Table 1 is to send business data packet from MN, receives in this business datum packet procedures the packed and pairing IP of the decapsulation packet header of this business data packet to CN.
Figure A20061014518100111
Table 1
When CN sends the downlink service data bag to MN, this business data packet also will be sent to FA by the above-mentioned IP v4 tunnel between user's face HA and the FA.This process is specially:
The business data packet that CN at first will send to MN sends to user's face HA.The source address in the IP packet header of this business data packet is the CN address, and destination address is the HoA address of MN.
User's face HA receives after the business data packet that will send, and is the IP address of user's face HA with source address, and destination address is that the MIP encapsulation process is carried out to this business data packet in the IP packet header of FA address, the business data packet after obtaining encapsulating.Business datum after the encapsulation is surrounded by two-layer IP packet header: the source address in external IP packet header is user's face HA, and destination address is the FA address; The source address in inner IP packet header remains the CN address, the HoA address of destination address MN.Also need to prove, before user's face HA carries out the MIP encapsulation process to the business data packet that will send, chain of command HA need will create the related user's face HA that informs with the binding of FA address in HoA address of MN in the step 204, user's face HA is related according to this MIP binding, and business data packet is carried out encapsulation process.
Like this, the business data packet after user's face HA just will encapsulate by above-mentioned IP v4 tunnel sends to FA.After the business data packet of FA after receiving encapsulation, the business data packet after the encapsulation is carried out the MIP decapsulation handle, remove the external IP packet header of the business data packet after the encapsulation, and this business data packet is sent to MN according to the destination address in inner IP packet header.The process of above-mentioned FA decapsulation and transmission business data packet is attainable prior art.
Table 2 is to send descending business data packet from CN, receives in this business datum packet procedures the packed and pairing IP of the decapsulation packet header of this business data packet to MN.
Figure A20061014518100121
Table 2
Based on above-mentioned embodiment shown in Figure 2, when FA comprises user's face FA and chain of command FA, also can under chain of command FA and situation that user's face FA separates, realize handling the signaling message that sends over by chain of command FA, by user's face FA handle and other network elements between the business datum transmitted.Improve flow process shown in Figure 2, the specific practice of this realization is: and the FA that carries out Signalling exchange between MN and the HA is chain of command FA.In the step 203, when chain of command FA sends the login request message of MN to chain of command HA, the address of this chain of command FA and the address of user's face FA are carried to chain of command HA.FA is the promoter that IP tunnel is set up.Like this, set up IP tunnel between user's face FA and the user's face HA.In addition, in step 206, when chain of command FA returns the response message of register requirement to MN, the address of user's face FA is carried to MN.
Like this, when MN sends the uplink business data bag to CN, earlier business data packet is sent to user's face FA, the source address in the IP packet header of this business data packet is the HoA address of MN, and destination address is the address of CN.User's face FA receives after this business data packet that will send, with source address is the address of user's face FA, destination address is that the MIP encapsulation process is carried out to the business data packet that will send, the business data packet after obtaining encapsulating in the IP packet header of the IP address of user's face HA.Business datum after the encapsulation is surrounded by two-layer IP packet header: the source address in external IP packet header is the address of user's face FA, and destination address is the IP address of user's face HA; The source address in inner IP packet header remains the HoA address of MN, and destination address is the address of CN.
Like this, user's face FA just by and user's face HA between the IPv4 tunnel the set up business data packet after will encapsulating send to user's face HA.After the business data packet of user's face HA after receiving encapsulation, business data packet after the encapsulation is carried out the MIP decapsulation to be handled, remove the external IP packet header of the business data packet after the encapsulation, and, will send to CN from the business data packet that MN sends according to the destination address in inner IP packet header.
Table 3 is to send business data packet from MN, receives in this business datum packet procedures the packed and pairing IP of the decapsulation packet header of this business data packet to CN.
Figure A20061014518100131
Table 3
When CN sends the downlink service data bag to MN, this business data packet also will be sent to user's face FA by the IPv4 tunnel between user's face HA and the user's face FA.This process is specially:
The business data packet that CN at first will send to MN sends to user's face HA.The source address in the IP packet header of this business data packet is the CN address, and destination address is the HoA address of MN.
User's face HA receives after the business data packet that will send, and is the IP address of user's face HA with source address, and destination address is that the MIP encapsulation process is carried out to this business data packet, the business data packet after obtaining encapsulating in the IP packet header of user's face FA address.Business datum after the encapsulation is surrounded by two-layer IP packet header: the source address in external IP packet header is user's face HA, and destination address is user's face FA address; The source address in inner IP packet header remains the CN address, the HoA address of destination address MN.Before user's face HA carries out the MIP encapsulation process to the business data packet that will send, chain of command HA need be with the related user's face HA that informs with the binding of the address of chain of command FA in HoA address of the MN that creates, user's face HA is related according to this MIP binding, and business data packet is carried out encapsulation process.
User's face HA by and user's face FA between the IPv4 tunnel the set up business data packet after will encapsulating send to user's face FA.After the business data packet of user's face FA after receiving encapsulation, business data packet after the encapsulation is carried out the MIP decapsulation to be handled, remove the external IP packet header of the business data packet after the encapsulation, and this business data packet is sent to MN according to the destination address in inner IP packet header.
Table 4 is to send descending business data packet from CN, receives in this business datum packet procedures the packed and pairing IP of the decapsulation packet header of this business data packet to MN.
Figure A20061014518100141
Table 4
Fig. 3 is a method flow diagram of setting up IP tunnel in the present invention's second preferred embodiment.The mobile IP technology that relates in the present embodiment also is the MIPv4 technology, and MN directly initiates the MIP registration to HA, sets up the IPv4 tunnel between MN and the user's face HA.Present embodiment may further comprise the steps:
Step 301, MN will send to the MIP login request message of user's face HA, and the request message as initiate to set up the IPv4 tunnel to chain of command HA address sends to chain of command HA.
Carry the HoA address of MN and the control plane address of HA in this login request message.Wherein, the HA address when MN known control face HA address, this chain of command HA address integrate chain of command and user's face with original HA is identical.
In the present embodiment, MN is the promoter who sets up above-mentioned IP v4 tunnel, and chain of command HA is the chain of command network element.For chain of command HA, this chain of command is only handled the signaling message that sends over, and that is to say, MN is the request of setting up above-mentioned IP v4 tunnel to chain of command HA initiation to the essence that chain of command HA sends above-mentioned login request message.
After step 302, user's face HA receive login request message, respond this request, the HoA address of creating MN is related with the binding of CoA address.
In step 302, this binding association is the corresponding relation of HoA address and the CoA address of MN.
Step 303, chain of command HA are returned the response message of register requirement to MN, and this response message is as the request response of setting up IP tunnel, the IP address of carrying user's face HA.
MN and user's face HA set up this IPv4 tunnel between the two according to this IP address.
In the present embodiment, user's face HA is user's veil unit.Before chain of command HA sent above-mentioned request message, chain of command HA can be by static configuration or the dynamic IP address of finding to know user's face HA at MN in the IP address of this user's face HA.
The process in the IPv4 tunnel between the above-mentioned MN of foundation and the user's face HA directly realizes to the register flow path of HA initiation MIP based on existing MN, by chain of command HA when the response MN register requirement, return the IP address of user's face HA to MN, set up the IP tunnel between MN and the user's face HA.HA address when wherein, this chain of command HA address integrates chain of command and user's face with original HA is identical.
After the MIP of MN registration is finished, when MN sends the uplink business data bag to CN in field network, this business data packet will be sent to user's face HA earlier by the IPv4 tunnel of setting up between MN and the user's face HA.This process is specially:
MN will send to CN uplink business data bag and send to user's face HA, and the source address in the IP packet header of this business data packet is the HoA address of MN, and destination address is the CN address.MN is the CoA address with source address at first, and destination address is that the MIP encapsulation process is carried out to the business data packet that will send, the business data packet after obtaining encapsulating in the IP packet header of the IP address of user's face HA.Wherein, the CoA address of MN is the address of MN as the promoter of tunnel foundation.Business datum after the encapsulation is surrounded by two-layer IP packet header: the source address in external IP packet header is the CoA address, and destination address is the IP address of user's face HA; The source address in inner IP packet header is the HoA address, and destination address is the CN address.
Business data packet after MN just will encapsulate by above-mentioned IP v4 tunnel sends to user's face HA.After the business data packet of user's face HA after receiving this encapsulation, business data packet after this encapsulation is carried out the MIP decapsulation to be handled, remove the external IP packet header of the business data packet after this encapsulation, and this business data packet is sent to CN according to the destination address in inner IP packet header.The process of above-mentioned user's face HA decapsulation and transmission business data packet is attainable prior art.
Table 5 is to send business data packet from MN, receives in this business datum packet procedures the packed and pairing IP of the decapsulation packet header of this business data packet to CN.
Figure A20061014518100161
Table 5
When CN sends the downlink service data bag to MN, this business data packet also will be sent to MN by the above-mentioned IP v4 tunnel between user's face HA and the MN.This process is specially:
The business data packet that CN will send to MN earlier sends to user's face HA.The source address in the IP packet header of this business data packet is the CN address, and destination address is the HoA address of MN.
User's face HA receives after the above-mentioned business data packet, is the IP address of user's face HA with source address, and destination address is that the MIP encapsulation process is carried out to this business data packet that will send, the business data packet after obtaining encapsulating in the IP packet header of CoA address.Business datum after the encapsulation is surrounded by two-layer IP packet header: the source address in external IP packet header is user's face HA, and destination address is the CoA address; The source address in inner IP packet header remains the CN address, and destination address is the HoA address.Also need to prove, before user's face HA carries out the MIP encapsulation process to business data packet, chain of command HA need will create the related user's face HA that informs with the binding of CoA address in HoA address of MN in the step 302, user's face HA is related according to this MIP binding, and business data packet is carried out encapsulation process.
Like this, the business data packet after user's face HA will encapsulate by above-mentioned IP v4 tunnel sends to MN.After the business data packet of MN after receiving this encapsulation, the business data packet after this encapsulation is carried out the MIP decapsulation handle, remove the external IP packet header of the business data packet after this encapsulation, obtain the business data packet of CN transmission.The process of above-mentioned MN decapsulation and transmission business data packet is attainable prior art.
Table 6 is to send the downlink service data bag from CN, receives in this business datum packet procedures the packed and pairing IP of the decapsulation packet header of this business data packet to MN.
Figure A20061014518100171
Table 6
Fig. 4 is a method flow diagram of setting up IP tunnel in the present invention's the 3rd preferred embodiment.The mobile IP technology that relates in the present embodiment is the MIPv6 technology, and MN directly initiates the MIP registration to HA, sets up the IPv6 tunnel between MN and the user's face HA.Because in the present embodiment, MN adopts mode from the MIP registration to HA that directly initiate, set up the IPv6 tunnel between MN and the user's face HA, therefore, it is similar to set up the IPv4 tunneling process between this process and MN shown in Figure 3 and the user's face HA, difference is that process shown in Figure 3 is based on the IPv4 technology, and wherein the interacting message between MN and the chain of command HA adopts the form of IPv4 definition.And in the present embodiment, the interacting message between MN and the chain of command HA adopts the form of IPv6 definition.Do brief description with reference to 4 pairs of present embodiment flow processs of figure.Present embodiment may further comprise the steps:
Step 401, MN will send to chain of command HA as request message from the IPv6 tunnel to the initiation of chain of command HA address that set up to the MIP binding update messages of user's face HA transmission.
Carry the HoA address of MN and the control plane address of HA in this binding update messages.
After step 402, user's face HA receive updating message, respond this message, the HoA address of creating MN is related with the binding of CoA address.
Step 403, chain of command HA are returned the response message of updating message to MN, and this response message is as the request response of setting up IP tunnel, the IP address of carrying user's face HA.
In the present embodiment, before chain of command HA sent above-mentioned request message, chain of command HA can be by static configuration or the dynamic IP address of finding to know user's face HA at MN in the IP address of user's face HA.
Step 404, MN and user's face HA set up this IPv6 tunnel between the two according to this IP address.
In the present embodiment, chain of command HA is the chain of command network element, and user's face HA is user's veil unit, and MN is the promoter that IP tunnel is set up.
The process in the IPv6 tunnel between the above-mentioned MN of foundation and the user's face HA directly realizes to the register flow path of HA initiation MIP based on existing MN, by chain of command HA when the binding update messages that response MN sends, return the IP address of user's face HA to MN, set up the IPv6 tunnel between MN and the user's face HA.HA address when wherein, this chain of command HA address integrates chain of command and user's face with original HA is identical.
After the MIP of MN registration is finished, when MN sends the uplink business data bag to CN in field network, this business data packet will be sent to user's face HA earlier by the IPv6 tunnel of setting up between MN and the user's face HA, by user's face HA this business data packet be sent to CN again; And in the process of CN transmission downlink service data bag to MN, between MN and the user's face HA IPv6 tunnel business transferring packet by above-mentioned foundation.The process of business transferring packet is similar between this process and the above-mentioned MN that realizes based on the IPv4 technology and the user's face HA, and different is the IP tunnel difference of service data transmission bag.Therefore, repeat no more MN and send the uplink business data bag, and CN sends the process of downlink service data bag to MN to CN.
Fig. 5 is a method flow diagram of setting up IP tunnel in the present invention's the 4th preferred embodiment.The IP-based mobile management technology that relates in the present embodiment is the MOBIKE technology.Wherein, the IP tunnel of setting up between UE and the user's face GW is the IPsec tunnel.UE has a local IP (Local IP) address in local network, the IPsec tunnel of UE between Local IP address creation and the user's face GW, in the process of setting up the IPsec tunnel, chain of command GW is a UE reallocation far-end IP (RomoteIP) address, and the corresponding relation between GW record Remote IP and the Local IP.Present embodiment may further comprise the steps:
Step 501, UE send IKE_SA_INIT (initialization of IKE security association) request message to chain of command GW.
Wherein, IKE is an internet key exchange.
Step 502, chain of command GW respond this IKE_SA_INIT message, return the IKE_SA_INIT response message to UE.
In this group IKE_SA_INIT message that step 501 and step 502 relate to, UE and chain of command GW consulted encryption algorithm, exchange random number (nonces), and carry out asymmetric cipher key change (Diffie_Hellman) algorithm.
Step 503, UE will send to the IKE_AUTH (IKE authentication) of chain of command GW or CREATE_CHILD_SA request message as request message from the IPsec tunnel to chain of command GW that initiate to set up, send to chain of command GW.
In the present embodiment, the promoter that UE sets up as IP tunnel is the promoter among the MOBIKE.Initiate the request set up the IPsec tunnel to chain of command GW.Chain of command GW is the chain of command respondent among the MOBIKE as the chain of command network element.
UE sends to chain of command GW with identity (identity) information of oneself in the IKE_AUTH request message.The identity of UE defers to the NAI form of RFC2486 definition.UE need obtain by the far-end IP of chain of command GW dynamic-configuration (Remote IP) address, therefore need carry a configuring request (CFG_REQUEST) in this IKE_AUTH request message.
Step 504, GW return the response message of IKE_AUTH or CREATE_CHILD_SA request message to UE, this response message is as the request response of setting up the IPsec tunnel, carry the IP address of user's face GW, UE and user's face GW set up this IPsec tunnel between the two according to this IP address.
In the present embodiment, user's face GW is the user's face respondent among the MOBIKE as user's veil unit.
In step 504, chain of command GW checks the legitimacy of UE, then, load, Security Association, remaining IKEv2 parameter and the IKEv2 that disposes is consulted termination together, sends to UE by IKE_AUTH or CREATE_CHILD_SA response message.GW is that the Remote IP address that UE distributes also is returned to UE in this message, and simultaneously, in the present embodiment, chain of command GW issues the IP address of user's face GW just to UE by this message.
The above-mentioned IPsec of foundation tunneling process is realized based on the existing IPsec tunneling process of setting up between UE and the GW.This GW is the gateway that integrates chain of command GW and user's face GW.
After IPsec tunnel between UE and the GW is set up and finished, when UE sends the uplink business data bag to CN in field network, this business data packet will be sent to user's face GW earlier by the IPsec tunnel of setting up between UE and the user's face GW.This process is specially:
UE at first carries out encapsulation process with the encapsulation of IPsec packet header to the business data packet that will send to CN, obtains the business data packet that will send.UE is the local ip address of UE again with source address, and destination address is the business data packet that the IP packet header encapsulation of the IP address of user's face GW will send, the business data packet after obtaining encapsulating.Wherein, the local ip address of UE is the address of UE as the promoter of tunnel foundation.Business datum after the encapsulation is surrounded by three layers of IP packet header, and the source address in external IP packet header is the local ip address of UE, and destination address is the IP address of user's face GW; Middle IP packet header is IPsec packet header; The source address in inner IP packet header is the far-end IP address of UE, and destination address is the CN address.
Second business data packet that UE will locate by above-mentioned IP sec tunnel sends to user's face GW.User's face GW is after receiving this second business data packet, this second business data packet is carried out decapsulation to be handled, remove the external IP packet header of this second business data packet, obtain first business data packet, remove the IPsec packet header of first business data packet again, obtaining source address is the far-end IP address of UE, and destination address is the business data packet of CN address.User's face GW sends to CN according to the destination address CN address of this business data packet with this business data packet.
Table 7 is to send first business data packet from UE to receive this first business datum packet procedures to CN, the differentiation situation in the packed and pairing IP of the decapsulation packet header of this business data packet.
Figure A20061014518100201
Table 7
When CN sends the downlink service data bag to UE, this business data packet also will be sent to UE by the above-mentioned IP sec tunnel between user's face GW and the UE.This process is specially:
The business data packet that CN will send to UE earlier sends to user's face GW.The source address in the IP packet header of this business data packet is the CN address, and destination address is the far-end IP address of UE.
User's face GW receives after the above-mentioned business data packet, with the encapsulation of IPsec packet header this business data packet is carried out encapsulation process, obtains the business data packet that will send.User's face GW is the IP address of user's face GW again with source address, and destination address is that encapsulation process is carried out to the packet that will send, the business data packet after obtaining encapsulating in the IP packet header of the local ip address of UE.Business datum after the encapsulation is surrounded by three layers of IP packet header, and the source address in external IP packet header is the IP address of user's face GW, and destination address is the local ip address of UE; Middle IP packet header is IPsec packet header; The source address in inner IP packet header is the CN address, and destination address is the far-end IP address of UE.Also need to prove, before user's face GW carries out the IPsec encapsulation process to the 3rd business data packet, chain of command GW need inform user's face GW with the Local IP address of UE, and user's face GW carries out encapsulation process according to this Local IP address to the business data packet that will send.
Like this, the business data packet after user's face GW will encapsulate by above-mentioned IP sec tunnel sends to UE.After the business data packet of UE after receiving this encapsulation, business data packet after this encapsulation is carried out decapsulation to be handled, remove the external IP packet header and the middle IP packet header of the business data packet after this encapsulation, this business data packet is sent to UE according to the destination address in inner IP packet header.The process of above-mentioned UE decapsulation is attainable prior art.
The process in the above-mentioned IPsec of foundation tunnel also can be carried out between two gateways, by the promoter of one of them chain of command gateway as tunnel foundation, another chain of command gateway tunnel is in response set up the chain of command network element of request, by return the IP address of the user plane gateway of a back chain of command gateway correspondence to previous chain of command gateway, set up the IPsec tunnel between above-mentioned two gateways.
Table 8 is to send descending business data packet from CN, receives in this business datum packet procedures the packed and pairing IP of the decapsulation packet header of this business data packet to UE.
Figure A20061014518100221
Table 8
In the various embodiments described above, it is signaling or business datum that MN or UE need to discern information of going out to be sent, and like this, MN or UE can correctly send to signaling the chain of command network element and handle, and this chain of command network element also comprises the chain of command part of FA; Business datum is sent to user's veil unit handle, this user's veil unit also comprises user's face FA.
In addition, in the various embodiments described above, chain of command network element and user's veil unit can be distributed on the same network entity, and also can be used as independently, two network entities exist.Can be distributed on the same FA entity as chain of command FA and the user's face FA that mentions in the above-mentioned content.Similarly, chain of command HA and user's face HA also can be distributed on the same HA entity, and chain of command GW and user's face GW also can be distributed on the same GW entity.
The embodiment of the invention provides the device of a kind of distributing ip address based on the above-mentioned method of setting up IP tunnel shown in Figure 1, and Fig. 6 is the structural representation of a preferred embodiment of this device, comprising:
Chain of command network element 601 is used to receive the request of setting up IP tunnel, responds this request, and the IP address of user's veil unit is sent.
The embodiment of the invention also based on the above-mentioned method of setting up IP tunnel shown in Figure 1 and the device of distributing ip address, provides a kind of system that sets up IP tunnel.Fig. 7 is the structural representation of a preferred embodiment of this system.In the present embodiment, this system comprises: the device 702 and the user's veil unit 703 that initiate unit 701, distributing ip address.
Initiate unit 701, be used for sending the request of setting up IP tunnel to the device 702 of distributing ip address, according to the IP address that receives, the IP tunnel between foundation and the user's veil unit 703.This initiation unit 701 can be the promoter among above-mentioned FA, MN or the MOBIKE, as UE, etc.
The device 702 of distributing ip address comprises:
The chain of command network element is used to receive the request of setting up IP tunnel from initiating unit 701, responds this request, and the IP address of user's veil unit is sent, and receives by initiating unit 701.This chain of command network element 601 can be the chain of command respondent among above-mentioned chain of command FA, chain of command HA or the MOBIKE, as chain of command GW, etc.
Wherein, user's veil unit 703 is informed in the binding association between two addresses mentioning during chain of command network element 601 can institute sets up or writes down when the request of IP tunnel of setting up that response initiates that unit 701 sends as step 204, step 302.User's veil unit 703 makes encapsulation process again according to this association to the business data packet that will send.In the embodiment of the invention, internal interface can be adopted between chain of command network element 601 and the user's veil unit 703, also open interface can be adopted.
The device 702 of distributing ip address can be by static configuration or the dynamic IP address of finding to know user's veil unit 703.Wherein, in chain of command network element 601 the process, the IP address of user's veil unit 703 is sent to initiation unit 701 by the requirement foundation initiating unit 701 in response and send and the IP tunnel between user's veil unit 703.Initiate unit 701 and still signaling message is sent to 601 processing of chain of command network element, and being sent to user's veil unit 703, business datum handles, like this, user's face as in this class network element of gateway that just will originally integrate chain of command and user's face is separated, reducing had originally both needed processing signaling, needed the load capacity of the gateway of processing service data again.Such gateway can be used as the chain of command network element 601 at this place, a processing signaling message.And the effect of balanced each user's veil unit load is played by the one or more user's veil of a chain of command network element may command unit, and the distance between user's veil unit and the user is furthered.
In sum, the technical scheme that the embodiment of the invention provides is returned to the IP address of user's veil unit by the chain of command network element promoter of tunnel foundation by in setting up the process of IP tunnel.Like this, the promoter obtains under the IP address situation of user's veil unit, and user's veil unit sets up the IP tunnel between this promoter and this user's veil unit, and communicate by letter by this IP tunnel and user's veil are first, thereby realize in the IP-based mobile management technology communicating by letter between the promoter that the tunnel is set up and the user's veil unit.In addition, the embodiment of the invention can be set up on the basis of IP tunnel flow process at IP-based mobile management technology existing, realizes communicating by letter between the promoter that sets up in the tunnel and the user's veil unit, and is convenient and easy.

Claims (12)

1. a method of setting up IP tunnel is characterized in that, comprising:
The promoter that the Internet Protocol IP tunnel is set up sends the request of setting up IP tunnel to the chain of command network element;
The chain of command network element responds described request, returns the IP address of user's veil unit to the promoter;
Described promoter and described user's veil unit set up the IP tunnel between this promoter and this user's veil unit according to described IP address.
2. method according to claim 1 is characterized in that,
Described promoter is: the Foreign Agent among the mobile IP;
Described chain of command network element is: the chain of command home agent among the mobile IP;
Described user's veil unit is: the user's face home agent among the mobile IP;
Described promoter sends the request set up IP tunnel to the chain of command network element: described Foreign Agent receives the mobile IP login request message that described mobile node is sent, and this mobile IP login request message is sent to described chain of command network element as the request of described IP tunnel;
Described chain of command network element to the IP address that the promoter returns user's veil unit is: the mobile IP login request response message that described chain of command network element will carry described user's face network element IP address sends to described Foreign Agent.
3. method according to claim 1 is characterized in that,
Described promoter is: the Foreign Agent among the mobile IP, and described Foreign Agent comprises: chain of command Foreign Agent and user's face Foreign Agent;
Described chain of command network element is: the chain of command home agent among the mobile IP;
Described user's veil unit is: the user's face home agent among the mobile IP;
Described promoter sends the request of setting up IP tunnel to the chain of command network element: described chain of command Foreign Agent receives the mobile IP login request message that described mobile node is sent, this mobile IP login request message is sent to described chain of command network element as the request of described IP tunnel, and carry the address of this chain of command Foreign Agent and the address of described user's face Foreign Agent in the described mobile IP login request message.
4. method according to claim 3, it is characterized in that, described chain of command network element to the IP address that the promoter returns user's veil unit is: described chain of command network element sends to described chain of command Foreign Agent according to the mobile IP login request message of the address of carrying described chain of command Foreign Agent that receives with the mobile IP login request response message that carries described user's face network element IP address.
5. method according to claim 4 is characterized in that, described IP tunnel is the IP tunnel between described user's face Foreign Agent and the described user's veil unit.
6. method according to claim 1 is characterized in that,
Described promoter is: the mobile node among the mobile IP;
Described chain of command network element is: the chain of command home agent among the mobile IP;
Described user's veil unit is: the user's face home agent among the mobile IP;
Described promoter sends the request set up IP tunnel to the chain of command network element: described mobile node sends to described chain of command network element with mobile IP login request message as the request of described IP tunnel;
Described chain of command network element to the IP address that the promoter returns user's veil unit is: the response message of mobile IP login request that described chain of command network element will carry the IP address of described user's veil unit sends to described mobile node.
7. method according to claim 1 is characterized in that,
Described promoter is: mobility that internet key upgrades and the promoter among many Su Xieyi MOBIKE;
Described chain of command network element is: chain of command respondent among the MOBIKE;
Described user's veil unit is: user's face respondent among the MOBIKE;
Described promoter sends the request set up IP tunnel to the chain of command network element: the promoter among the described MOBIKE sends to described chain of command network element with IKE_AUTH or CREATE_CHILD_SA request message as the request of described IP tunnel;
Described chain of command network element to the IP address that the promoter returns user's veil unit is: IKE_AUTH or CREATE_CHILD_SA response message that described chain of command network element will carry the IP address of described user's veil unit send to described promoter.
8. method according to claim 7 is characterized in that, the promoter among the described MOBIKE is: user equipment (UE), perhaps chain of command gateway.
9. the device of a distributing ip address is characterized in that, comprising:
The chain of command network element is used to receive the request of setting up IP tunnel, responds this request, and the IP address of user's veil unit is sent.
10. device according to claim 9 is characterized in that,
Described chain of command network element is: the chain of command home agent among the mobile IP, perhaps, chain of command respondent among the MOBIKE.
11. a system that sets up IP tunnel is characterized in that, comprising:
Initiate device and user's veil unit of unit, distributing ip address;
Initiate the unit, be used for sending the request of setting up IP tunnel to the device of distributing ip address, according to the IP address that receives, set up and described user's veil unit between IP tunnel;
The device of distributing ip address comprises:
The chain of command network element is used to receive the request of setting up IP tunnel from initiating the unit, responds this request, and the IP address of user's veil unit is sent, and is received by described initiation unit.
12. system according to claim 11 is characterized in that,
Described initiation unit is: the mobile node among the mobile IP, or the Foreign Agent among the mobile IP, or the promoter among the MOBIKE.
CNA2006101451812A 2006-11-17 2006-11-17 Method for establishing IP tunnel and device for distributing IP address Pending CN101188542A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNA2006101451812A CN101188542A (en) 2006-11-17 2006-11-17 Method for establishing IP tunnel and device for distributing IP address

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNA2006101451812A CN101188542A (en) 2006-11-17 2006-11-17 Method for establishing IP tunnel and device for distributing IP address

Publications (1)

Publication Number Publication Date
CN101188542A true CN101188542A (en) 2008-05-28

Family

ID=39480740

Family Applications (1)

Application Number Title Priority Date Filing Date
CNA2006101451812A Pending CN101188542A (en) 2006-11-17 2006-11-17 Method for establishing IP tunnel and device for distributing IP address

Country Status (1)

Country Link
CN (1) CN101188542A (en)

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2010124486A1 (en) * 2009-04-28 2010-11-04 中兴通讯股份有限公司 Method for establishing chained connection, serving gateway and packet data network gateway
WO2012149745A1 (en) * 2011-09-19 2012-11-08 华为技术有限公司 Data multiplexing transmission method, device and system
WO2014101432A1 (en) * 2012-12-28 2014-07-03 腾讯科技(深圳)有限公司 Data packet processing method and daemon server
CN103959834A (en) * 2012-09-12 2014-07-30 华为技术有限公司 Communication method, device and system in mobile backhaul network
WO2016127381A1 (en) * 2015-02-13 2016-08-18 华为技术有限公司 Mobility management method, device and system
WO2017124231A1 (en) * 2016-01-18 2017-07-27 华为技术有限公司 Internet protocol (ip) address allocation method, control plane gateway and user plane gateway
CN107079507A (en) * 2015-09-30 2017-08-18 华为技术有限公司 Keep method, chain of command gateway and the mobile management net element of business continuance
CN109428852A (en) * 2017-07-18 2019-03-05 中兴通讯股份有限公司 Communication tunnel end-point addresses separation method, terminal, ePDG and storage medium
CN109698800A (en) * 2017-10-24 2019-04-30 中国电信股份有限公司 For realizing the methods, devices and systems of control plane entity selection
CN114697989A (en) * 2020-12-31 2022-07-01 大唐移动通信设备有限公司 Communication transmission method, device and system

Cited By (23)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2010124486A1 (en) * 2009-04-28 2010-11-04 中兴通讯股份有限公司 Method for establishing chained connection, serving gateway and packet data network gateway
WO2012149745A1 (en) * 2011-09-19 2012-11-08 华为技术有限公司 Data multiplexing transmission method, device and system
CN103959834A (en) * 2012-09-12 2014-07-30 华为技术有限公司 Communication method, device and system in mobile backhaul network
WO2014101432A1 (en) * 2012-12-28 2014-07-03 腾讯科技(深圳)有限公司 Data packet processing method and daemon server
US9843514B2 (en) 2012-12-28 2017-12-12 Tencent Technology (Shenzhen) Company Limited Packet processing method and background server
US10356598B2 (en) 2015-02-13 2019-07-16 Huawei Technologies Co., Ltd. Mobility management method, apparatus, and system
WO2016127381A1 (en) * 2015-02-13 2016-08-18 华为技术有限公司 Mobility management method, device and system
CN106465093A (en) * 2015-02-13 2017-02-22 华为技术有限公司 Mobility management method, device and system
CN106465093B (en) * 2015-02-13 2020-01-17 华为技术有限公司 Method, device and system for mobility management
JP2018510554A (en) * 2015-02-13 2018-04-12 華為技術有限公司Huawei Technologies Co.,Ltd. Mobility management method, apparatus, and system
US10638527B2 (en) 2015-09-30 2020-04-28 Huawei Technologies Co., Ltd. Service continuity ensuring method, control plane gateway, and mobility management network element
CN107079507A (en) * 2015-09-30 2017-08-18 华为技术有限公司 Keep method, chain of command gateway and the mobile management net element of business continuance
US10595350B2 (en) 2015-09-30 2020-03-17 Huawei Technologies Co., Ltd. Service continuity ensuring method, control plane gateway, and mobility management network element
US10701744B2 (en) 2015-09-30 2020-06-30 Huawei Technologies Co., Ltd. Service continuity ensuring method, control plane gateway, and mobility management network element
US10827543B2 (en) 2015-09-30 2020-11-03 Huawei Technologies Co., Ltd. Service continuity ensuring method, control plane gateway, and mobility management network element
US11432351B2 (en) 2015-09-30 2022-08-30 Huawei Technologies Co., Ltd. Service continuity ensuring method, control plane gateway, and mobility management network element
WO2017124231A1 (en) * 2016-01-18 2017-07-27 华为技术有限公司 Internet protocol (ip) address allocation method, control plane gateway and user plane gateway
CN109428852A (en) * 2017-07-18 2019-03-05 中兴通讯股份有限公司 Communication tunnel end-point addresses separation method, terminal, ePDG and storage medium
CN109428852B (en) * 2017-07-18 2023-09-15 中兴通讯股份有限公司 Communication tunnel endpoint address separation method, terminal, ePDG and storage medium
CN109698800A (en) * 2017-10-24 2019-04-30 中国电信股份有限公司 For realizing the methods, devices and systems of control plane entity selection
CN109698800B (en) * 2017-10-24 2022-05-10 中国电信股份有限公司 Method, device and system for realizing control plane entity selection
CN114697989A (en) * 2020-12-31 2022-07-01 大唐移动通信设备有限公司 Communication transmission method, device and system
WO2022142373A1 (en) * 2020-12-31 2022-07-07 大唐移动通信设备有限公司 Communication transmission method, device and system

Similar Documents

Publication Publication Date Title
CN101188542A (en) Method for establishing IP tunnel and device for distributing IP address
Chen et al. IP-based next-generation wireless networks: systems, architectures, and protocols
EP2426956B1 (en) Data transferring method, system and related network device based on proxy mobile (pm) ipv6
JP5227960B2 (en) Packet transfer for proxy mobile IP
CA2249837C (en) An efficient mobility management scheme for a wireless internet access system
CN1859614B (en) Method, device and system for radio transmission
CN101390370B (en) Gateway, terminal and the method for controlling gateway and terminal
KR101137002B1 (en) Method and system for controlling mobility in a communication network, related network and computer program product therefor
KR100988186B1 (en) Method and apparatus for dynamic home address assignment by home agent in multiple network interworking
CN101331716B (en) Method for transmission of data packets based on the Ethernet transmission protocol between at least one mobile communication unit and a communication system
CN101480018A (en) Method of creating security associations in mobile IP networks
WO2004036332A2 (en) Virtual private network with mobile nodes
CA2528787A1 (en) Method, system and apparatus to support mobile ip version 6 services
CN108353282A (en) Method and apparatus for the wireless communication for using the security model for supporting multiple connectivities and service context
KR20020014512A (en) Method of integration network element on communication system
CN101374334A (en) Method and system for transferring packet data network identification information
US20110214166A1 (en) Connection management
EP1634424B1 (en) Methods and apparatuses for optimizing resource management in cdma2000 wireless ip networks
CN101478750B (en) Fast switch and authentication fusion method based on IPSec
CN101123575B (en) A multi-host access method, system and device supporting mixed IP
CN102281287B (en) TLS (transport layer security)-based separation mechanism mobile signaling protection system and method
CN102378399B (en) User equipment access method, Apparatus and system
CN101790146A (en) Method for allocating address information, network equipment and network system
Zubair et al. DMAM: distributed mobility and authentication mechanism in next generation networks
Chaouchi et al. Signalling analysis in integrated 4G networks

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Open date: 20080528