CN101202706A - Virtual switchboard system - Google Patents
Virtual switchboard system Download PDFInfo
- Publication number
- CN101202706A CN101202706A CNA2007101677917A CN200710167791A CN101202706A CN 101202706 A CN101202706 A CN 101202706A CN A2007101677917 A CNA2007101677917 A CN A2007101677917A CN 200710167791 A CN200710167791 A CN 200710167791A CN 101202706 A CN101202706 A CN 101202706A
- Authority
- CN
- China
- Prior art keywords
- virtual switch
- data
- message
- interface
- public network
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Landscapes
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
The invention discloses a virtual switch system. The virtual switch system includes a virtual switch and an IP transmitting component. The virtual switch is used for setting up a virtual private LAN section and establishing a virtual interface between the virtual switch system and the IP transmitting component. The virtual interface is used for carrying through data processing of a user from the virtual switch side, transmitting the processed data to the IP transmitting component, so as to transmit the data to an IP public network and transmitting the processed data to the virtual switch, thus transmitting the data to the user at the virtual switch side. The invention expands the service ranges of the virtual switch system, reduces the occupying on a device port resource when a VPLS user accesses the public network, thereby increasing the profit means of the operation business and reducing the cost and technical difficulty for an enterprise user to set up the VPIS by VS.
Description
Technical field
The present invention relates generally to the network communications technology, particularly a kind of virtual switch system that inserts the IP public network.
Technical background
Virtual switch (VS) is the implementation method of a kind of virtual private network (VPN).Virtual switch is the functional entity that generates by configuration on the network equipment, and it can finish the function of Ethernet switch.Can mark off a plurality of virtual switches on the network equipment, virtual switch can be used to set up virtual private LAN section (VPLS) and provide customer flow to converge.
Virtual switch is applied at first on ATM (asynchronous transfer mode) equipment virtual private LAN section business is provided.Afterwards, virtual switch has added that ether inserts and at GRE (generic route encapsulation) tunnel of IP public network transparent transmission Ethernet message access function.The networking mode that present virtual switch is built VPN is seen Fig. 1.
Virtual switch utilizes link layer (ether) information to carry out the forwarding of packet, and the network class that all uses virtual switch to build is similar to an Ethernet.
VS and IP (Internet protocol) forwarding component all are positioned on the edge service node of telecommunication bureau at present, and the basic function of edge service node is to satisfy user's online demand, and the IP forwarding component is one of core of edge service node, and function class is similar to router.And VS be on the edge service node in order to satisfy the demand that VPN is set up in enterprise, and the extension element of increasing income and adding for telecommunication bureau.On the edge service node, VS and IP forwarding component are functional modules independently.The edge service node has only the ability that the VS assembly just has establishment VPLS that adds.Owing to the network equipment of having realized virtual switch does not also possess message is not sent to the ability that the IP forwarding component carries out routing forwarding, therefore privately owned net of enterprise that is made of virtual switch or the user that converges will visit IP network and must add explicit outside interface channel, as router or line.
Fig. 2 is the technical scheme schematic diagram of prior art one.As shown in Figure 2, enterprise uses VS to make up VPLS, but needs to link to each other with public network at router of the inner configuration in addition of certain website.The equipment of VPLS inside is by this router access public network.On this router or within generally can configuration address conversion and packet filtering rule, be used to guarantee the fail safe of the privately owned net of enterprise.
In this scheme, the VPLS internal network devices is the VPLS side interface IP address setting of router a gateway.The inner message to the IP public network of VPLS all is forwarded to router.After router is searched route, message is delivered to the IP public network, promptly among the figure on the IP public network side interface of the edge service node of telecommunication bureau side.
From the IP message that the IP public network comes, promptly the next message of telecommunication bureau's method, edge service node public network side interface arrives router, and enterprise router is searched route.If message in VPLS inside, is then delivered to the VPLS side interface of router in the destination, transmit in VPLS inside.
This networking plan is applicable to the enterprise customer with strong technical strength and economic base.
The shortcoming of the prior art one is that it need add routing device, thereby has increased user's expense.And router is connected the port resource of the preciousness that has also taken the edge service node with the edge service node.In addition, NAT (network address translation) and the safety regulation used during owing to the visit public network need the user to dispose, thereby increase user's maintenance difficulties.
Fig. 3 shows prior art related to the present invention two.As shown in Figure 3, add an aerial lug, connect a port and a port that inserts the IP forwarding component that inserts VS at the edge service node.Like this, the user who inserts VS just can send to the IP assembly to data by this external channel and carries out the IP layer and transmitted.
In this scheme, the interface IP address setting of the IP forwarding component that inner of VPLS and VS are direct-connected is a gateway.VPLS inside is all transmitted on the interface with its direct-connected IP forwarding component by VS to the message of IP public network.After the IP forwarding component is searched route, message is delivered to the IP public network.
From the IP forwarding component of the next IP message arrival edge service node of IP public network, the IP forwarding component is searched route.If the destination in VPLS inside, is then delivered to message with its direct-connected VPLS side interface and given VS, message is transmitted in VPLS inside afterwards.
This scheme is usually used in converging by VS the access user's data flow of visit public network, can be used for also that some are not high to security requirement, the enterprise of limited fund makes up VPLS.
Because general edge service node is placed on telecommunication bureau.Telecommunication department is in order to obtain big profit, and the edge service node is that many users share, and edge service node external interface is a scarce resource, and an external interface can insert a plurality of enterprise customers.The prior art two will be carried out on the edge service node of telecommunication bureau, and the enterprise customer will take an external interface (for example an ATM mouth or an ether physical interface), costs dearly, and the VPLS enterprise customer is lacked fail safe.
Summary of the invention
Therefore, the present invention makes at solving above-mentioned shortcoming of the prior art, an one purpose provides a kind of virtual switch system, when making it insert the IP public network, the enterprise customer who makes up VPLS based on VS neither takies the external interface of valuable edge service node when visit public network resource, need not add extra routing device again.
The invention provides a kind of virtual switch system, described virtual switch system comprises virtual switch and IP forwarding component, described virtual switch is used to set up the virtual private LAN section, sets up virtual interface between described virtual switch and described IP forwarding component; Described virtual interface is used for to handling from described virtual switch pusher side user's data, and give described IP forwarding component to send it to the IP public network with treated data, and the data from the IP public network that transmit from described IP forwarding component are handled, and give described virtual switch to send it to the user of virtual switch pusher side with treated data.
The present invention provides a kind of safe, method easily for the enterprise customer who makes up VPLS based on VS visits the public network resource, because data transmit at the edge service intra-node, need not to use external interface, taking edge service node port resource in the time of can reducing the VPLS user to access public net.In addition, relative prior art two, the present invention can provide and more safely visit public network; And with respect to prior art one, the present invention gives telecommunication bureau with the work that originally is arranged on user's the router, dispose NAT (network address translation) and safety regulation by the user, need not the user and purchase router separately, finish by telecommunication bureau on the edge service node that is configured in telecommunication bureau of NAT (network address translation) and safety regulation, having reduced the enterprise customer uses VS to set up cost and the technical difficulty of VPLS, alleviate the burden of enterprise, increased the profit of telecommunication bureau again.
Description of drawings
Fig. 1 is the networking mode that present virtual switch is built VPN;
Fig. 2 is the technical scheme schematic diagram of prior art one;
Fig. 3 is the technical scheme schematic diagram of prior art two;
Fig. 4 is a principle flow chart of the present invention;
Fig. 5 is a schematic diagram of setting up internal data path of the present invention
Fig. 6 is the flow chart that user side sends datagram to network side in the preferred version of the present invention;
Fig. 7 is the flow chart that network side sends datagram to user side in the preferred version of the present invention.
Embodiment
With reference to Fig. 4, between VS and IP forwarding component, set up a virtual interface.This virtual interface has and the general same function of ether interface, is the data of general ether interface processing from external physical port, and " virtual interface " then handles the data from device interior exchanges data chip.
Virtual interface is a software module.The design of virtual interface is consistent with the design of general ether interface.Virtual interface is with the main distinction of general ether interface: general ether interface is handled the frame of the ether form of receiving from physics ether port.Virtual interface is then handled the Frame that the exchanges data hardware cell of slave unit inside is received, the form of these Frames is device interior definition, for example cell format of regular length.The Ethernet message that sends by internal data path is carried on the self-defining internal data frame of equipment with the self-defining form of equipment.The exchanges data hardware cell is responsible for assembling these Frames by the form of inside definition, removes internal form encapsulation back and takes out Ether frame, gives virtual interface then and carries out link layer process.When sending message, virtual interface is delivered the exchanges data hardware cell to the message of standard ether form, and the exchanges data hardware cell splits and the encapsulation Ethernet message according to the self-defining form of equipment, sends on internal data path then.
Above-mentioned virtual interface is finished following basic function:
1. data channel receives the ether bag internally;
2. resolve the ether bag of input, take out the IP message and give IP forwarding component;
3. receive the data that the IP forwarding component is sent here, carry out the encapsulation of Ethernet link layer;
4. the ether bag being delivered internal data path sends;
5. handle ARP (address resolution protocol) message, set up and safeguard ARP node on this interface, for newly-built ARP node reports route.
In addition, create an internal data path, promptly distribute an internal exchange of data path, it connects VS and virtual interface.The design of the method for building up of internal data path and equipment itself is closely related.
As shown in Figure 5, in the equipment of a distributed forwarding architecture, whole system is built by the veneer of various realization difference in functionalitys.Data communication between the different veneers is finished by the cell bus of system.In this system, the VS assembly realizes on veneer A, and virtual interface, IP forwarding component are realized on board B.For make on the veneer A the VS assembly can with the virtual interface swap data on the board B, the present invention distributes a cell passage between VS and virtual interface.If internal system adopts ATM cell, then this cell passage is exactly a PVC (PVC).The form that the data of transmitting between veneer are packaged into cell exchanges on cell bus.The cell channel information is encapsulated in the cell structure, described cell channel information is the sign of each cell passage, and in the present embodiment, each cell passage has unique identification in internal system, be used for distinguishing different virtual switch systems, described unique identification is a numeral that the overall situation is unique.The IP assembly is delivered to corresponding VS system to Ethernet message according to this unique identification.
Virtual interface on VS1 on the veneer A and VS2 and the board B has been set up inner cell passage Path1 and Path2 respectively.VS1 writes down the MAC Address of virtual interface by Path1 in its MAC (media interviews control) address learning list.When receiving the packet that need send to virtual interface, VS1 just seals the channel information of Path1 and ether and is contained in the cell, and first bus of delivering letters exchanges, and sends to virtual interface.Virtual interface is set up the ARP node table of VS1 system according to the PATH1 channel information, the user's that record VS1 inserts in this ARP node table MAC Address.When virtual interface received that target MAC (Media Access Control) address is the user's that inserts of VS1 the packet of MAC Address, virtual interface was sealed the channel information of Path1 and ether and is contained in the cell, and first bus of delivering letters exchanges.VS1 receives cell from Path1, and the ether bag of recombinating out is given the end user packet switch according to the target MAC (Media Access Control) address in the bag again.
So the message forwarding process of the system that makes up is as follows:
VS puts internal data path to data and sends to virtual interface, and the virtual interface hardware cell of data channel is internally obtained data, removes the Ethernet link encapsulation, gives the IP forwarding component then and looks into routing table and send to the network side interface.If the IP message destination that enters from the network side interface is VS side user, then the IP forwarding component is looked into routing table and message is given the virtual interface that links to each other with VS.Virtual interface is searched the ARP node and is obtained link layer packaging information, afterwards the IP message is carried out link layer packaging and it is put internal data path.VS data channel internally receives data, uses the ether destination address to search address learning list message is mail to VS side user.
The system of Gou Jianing just can make the user to access public net resource of VS side as stated above, that is to say the function that has realized " prior art scheme two ", and does not take valuable equipment to external port.But this scheme is difficult to satisfy the requirement of enterprise high to security requirement, because:
1. do not have address translation feature, therefore require VS side user to use public network address, and can not use private net address, can not satisfy the requirement that makes up VPLS.
2. do not have fire compartment wall, the user on the public network can visit the user resources of VS fully, has serious security breaches.
Use the requirement of private net address and VPLS enterprise customer to the consideration of network security aspect in order to satisfy the VPLS enterprise customer, can carry out following improvement to said method: added NAT assembly and ACL (access control table) assembly.The NAT assembly is finished the conversion of private net address and public network address; The ACL assembly can dispose and generate multiple security strategy, for example to entering packet (source IP address, purpose IP address, source port, destination interface, agreement) five-tuple matching detection, with the fail safe that guarantees that network connects.Fig. 6, Fig. 7 are improvement schematic diagrames of the present invention.
Address transition (NAT) claims address agency again, is used for realizing the conversion between private network address and the global network address.During when the host access internet of internal network or with the main-machine communication of external network, need use address transition.Described NAT assembly is responsible for writing down the mapping relations of private net address and public network address, and the message that passes in and out the NAT assembly is mated, and the message that satisfies the mapping relations that disposed is carried out the conversion of private net address and public network address.
ACL is meant some rules that dispose for the filtering data bag, stipulate which type of packet can pass through, which type of can not pass through, the packet filtering rules of described ACL component record configuration, bag to turnover ACL assembly mates one by one by filtering rule, for the bag that satisfies the rule rule, handle by the action of regular appointment, as allow by or abandon.
NAT and ACL are the mature technologies on the present network equipment.The implementation method of NAT assembly and ACL assembly has multiple, at the general books about network security, substantially all mentions on webpage and the document.The present invention does not have specific (special) requirements to the realization of NAT assembly and ACL assembly, can be used by the present invention as long as possess the software module of NAT and acl feature.
With reference to shown in Figure 6, the data of coming from VS side private user send to virtual interface, message is given the ACL assembly subsequently and message is carried out safety inspections such as five-tuple coupling, the message that does not satisfy the security strategy of having set is dropped, remaining message is delivered the NAT assembly and is carried out the conversion of source address private network to the public network address space, and the message after the conversion is given the IP forwarding component and looked into routing table and send to public network.Certainly, also can not use the NAT assembly, at this moment, message is directly given the IP forwarding component and is looked into routing table and send to public network, but this moment, the user can't use private net address.Also can not use the ACL assembly, message is delivered the NAT assembly and is carried out the conversion of source address private network to the public network address space, and the message after the conversion is given the IP forwarding component and looked into routing table and send to public network.
With reference to shown in Figure 7, the network side interface receives the data message of network side, at first gives the security strategy of ACL assembly coupling configuration, and invalid packet is dropped, and all the other messages are given the IP forwarding component and looked into routing table.Under the situation that the ACL assembly is not set, message is directly given the IP forwarding component and is looked into routing table.On routing table, through NAT conversion and the route that generates, route table items can be established a NAT attribute mark for private net address, and the route that public network address is generated, route table items is not then established the NAT attribute mark.Can know through looking into routing table like this, the destination of message be private network inside or public network on.If the destination of message is in private network inside, then the message destination address route entry that can mate has the NAT sign, this class message is delivered the conversion that the NAT assembly carries out destination address, message after the conversion is searched route once more and is delivered virtual interface, and virtual interface carries out giving VS by internal data path after link encapsulates to message and exchanges forwarding.Under the situation that the NAT assembly is not set, message is directly delivered virtual interface after searching route, and virtual interface carries out giving VS by internal data path after link encapsulates to message and exchanges forwarding.
Above-described the preferred embodiments of the present invention, only be for illustrative purposes, one of ordinary skill in the art should be appreciated that different improvement, increase and decrease all are possible, and can break away from the scope of the present invention that claim of the present invention limits.
Claims (7)
1. virtual switch system, it is characterized in that, described virtual switch system comprises virtual switch and IP forwarding component, and described virtual switch is used to set up the virtual private LAN section, sets up virtual interface between described virtual switch and described IP forwarding component; Described virtual interface is used for to handling from described virtual switch pusher side user's data, and give described IP forwarding component to send it to the IP public network with treated data, and the data from the IP public network that transmit from described IP forwarding component are handled, and give described virtual switch to send it to the user of virtual switch pusher side with treated data.
2. system according to claim 1, it is characterized in that, described virtual interface will be given described IP forwarding component through the data of de-links encapsulation then and look into routing table to send to the IP public network remove the operation of Ethernet link encapsulation from described virtual switch pusher side user's data.
3. system according to claim 1, it is characterized in that, if the IP message destination that enters from the IP public network is the user of virtual switch pusher side, then described IP forwarding component is looked into routing table and message is given the virtual interface that links to each other with described virtual switch, described virtual interface is searched the ARP node and is obtained link layer packaging information, afterwards the IP message is carried out link layer packaging and sends it to described virtual switch.
4. system according to claim 1, it is characterized in that, information exchange between described virtual interface and the described virtual switch is finished by internal data path, and described internal data path is to use the logical data passage of the bus of described virtual interface and described virtual switch place equipment.
5. system according to claim 4 is characterized in that described internal data path has unique identification, is used for distinguishing different virtual switch systems.
6. according to any one described system in the claim 1 to 5, it is characterized in that, also be provided with the access control list assembly between described virtual interface and the described IP forwarding component, be used for the data of coming and going between described virtual interface and the described IP forwarding component are carried out safety detection.
7. system according to claim 6, it is characterized in that, also be provided with the network address translation assembly between described virtual interface and the IP forwarding component, the destination address that is used for entering the message of described private LAN section is converted to private net address by public network address, and the source address of the message that will send from described private LAN section is converted to public network address by private net address.
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNB031600573A CN100399767C (en) | 2003-09-26 | 2003-09-26 | Method for access of IP public net of virtual exchanger system |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CNB031600573A Division CN100399767C (en) | 2003-09-26 | 2003-09-26 | Method for access of IP public net of virtual exchanger system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN101202706A true CN101202706A (en) | 2008-06-18 |
Family
ID=34660791
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CNA2007101677917A Pending CN101202706A (en) | 2003-09-26 | 2003-09-26 | Virtual switchboard system |
CNB031600573A Expired - Fee Related CN100399767C (en) | 2003-09-26 | 2003-09-26 | Method for access of IP public net of virtual exchanger system |
Family Applications After (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CNB031600573A Expired - Fee Related CN100399767C (en) | 2003-09-26 | 2003-09-26 | Method for access of IP public net of virtual exchanger system |
Country Status (1)
Country | Link |
---|---|
CN (2) | CN101202706A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107493180A (en) * | 2016-06-13 | 2017-12-19 | 阿里巴巴集团控股有限公司 | The upgrade method and device of a kind of virtual switch |
Families Citing this family (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN100433713C (en) * | 2005-07-15 | 2008-11-12 | 华为技术有限公司 | Virtual exchange access method, device and virtual exchange system based on IP |
CN100428739C (en) * | 2005-12-31 | 2008-10-22 | 华为技术有限公司 | Implementing method and system for support VPLS service on IP skeletal network |
US8169903B2 (en) * | 2006-03-07 | 2012-05-01 | Cisco Technology, Inc. | Managing traffic within and between virtual private networks when using a session border controller |
CN101052022B (en) * | 2006-04-05 | 2010-10-13 | 华为技术有限公司 | System and method for virtual special net user to access public net |
US8489701B2 (en) | 2007-01-30 | 2013-07-16 | Microsoft Corporation | Private virtual LAN spanning a public network for connection of arbitrary hosts |
CN102104525B (en) | 2011-03-16 | 2013-04-24 | 华为技术有限公司 | Media gateway equipment and method for forwarding data frame |
CN107508767B (en) * | 2012-03-29 | 2020-10-02 | 英特尔公司 | Techniques for using assigned switch identifications in input/output devices |
CN103516822A (en) * | 2012-06-29 | 2014-01-15 | 同方股份有限公司 | Virtualization data exchange safety system for virtualization network |
CN102946354B (en) * | 2012-11-15 | 2016-11-23 | 华为技术有限公司 | Method, device and the network equipment that a kind of message forwards |
CN105187312B (en) * | 2015-08-12 | 2018-05-01 | 北京锐安科技有限公司 | Batch terminal carries out network communication method, device and router |
CN105429901B (en) * | 2015-11-06 | 2018-09-28 | 上海斐讯数据通信技术有限公司 | Uplink data packet forwarding method and device, downlink data packet forwarding method and device |
CN110830594B (en) * | 2019-12-06 | 2022-04-01 | 广州微算互联信息技术有限公司 | Method, system, device and storage medium for expanding IP address of cloud mobile phone |
CN113194020B (en) * | 2021-05-24 | 2022-09-09 | 臻乐尔科技服务(上海)有限公司 | Virtual network interaction method and virtual network architecture |
Family Cites Families (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5793763A (en) * | 1995-11-03 | 1998-08-11 | Cisco Technology, Inc. | Security system for network address translation systems |
US6614800B1 (en) * | 1999-09-02 | 2003-09-02 | International Business Machines Corporation | Method and system for virtual private network administration channels |
JP3478218B2 (en) * | 1999-12-27 | 2003-12-15 | 日本電気株式会社 | Edge node exchanges and exchanges |
JP3679336B2 (en) * | 2001-02-22 | 2005-08-03 | 日本電信電話株式会社 | Packet routing method |
CN1180583C (en) * | 2001-09-03 | 2004-12-15 | 华为技术有限公司 | Realizing method and system of special network in wideband virtual network |
-
2003
- 2003-09-26 CN CNA2007101677917A patent/CN101202706A/en active Pending
- 2003-09-26 CN CNB031600573A patent/CN100399767C/en not_active Expired - Fee Related
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107493180A (en) * | 2016-06-13 | 2017-12-19 | 阿里巴巴集团控股有限公司 | The upgrade method and device of a kind of virtual switch |
CN107493180B (en) * | 2016-06-13 | 2021-04-30 | 阿里巴巴集团控股有限公司 | Upgrading method and device of virtual switch |
Also Published As
Publication number | Publication date |
---|---|
CN100399767C (en) | 2008-07-02 |
CN1601996A (en) | 2005-03-30 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN100399767C (en) | Method for access of IP public net of virtual exchanger system | |
US8908704B2 (en) | Switch with dual-function management port | |
CN100472487C (en) | Virtual broadcast network for inter-domain communications | |
US7672314B2 (en) | Scaling VLANs in a data network | |
KR100509525B1 (en) | Virtual local area network connecting equipment | |
CN101635702B (en) | Method for forwarding data packet using security strategy | |
CN107113240A (en) | Expansible VLAN file transmitting method, computer equipment and computer-readable recording medium | |
JPH11112577A (en) | Interconnection system between lan systems and network service system | |
CN100531138C (en) | Operator's boundary notes, virtual special LAN service communication method and system | |
CN103428094A (en) | Method and device for packet transmitting in Open Flow system | |
JP2002164937A (en) | Network and edge router | |
CN101616014A (en) | A kind of method that realizes cross-virtual private local area network multicast | |
JP4186971B2 (en) | Packet transfer device | |
CN100484080C (en) | Routing access method, system and operator edge equipment for virtual private network | |
JP2002271363A (en) | Network connection device | |
EP2446592A2 (en) | Method and apparatus for simulating ip multinetting | |
CN101778035B (en) | Virtual private LAN service communication method and device | |
US20050201417A1 (en) | System and a method for processing field frames for multiprotocol use in a communications | |
CN107360089A (en) | A kind of method for routing foundation, business datum conversion method and device | |
CN103346950A (en) | Sharing method and device of load between user service boards of rack-mounted wireless controller | |
CN101087258A (en) | A method and device for access to directly connected device across VPN | |
CN102055669A (en) | Method for realizing N:1 virtual local area network (VLAN) mapping in 10 gigabit-capable passive optical network (10GPON) system | |
JP2002204252A (en) | System for converting overlapping private address | |
CN101316239B (en) | Method for controlling access and forwarding in virtual special LAN service network | |
CN103036761A (en) | Tunnel server and client device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C02 | Deemed withdrawal of patent application after publication (patent law 2001) | ||
WD01 | Invention patent application deemed withdrawn after publication |
Open date: 20080618 |