CN102378284A - Inter-domain switching method of proxy mobile IPv6 (Internet Protocol Version 6) - Google Patents

Inter-domain switching method of proxy mobile IPv6 (Internet Protocol Version 6) Download PDF

Info

Publication number
CN102378284A
CN102378284A CN201110378780XA CN201110378780A CN102378284A CN 102378284 A CN102378284 A CN 102378284A CN 201110378780X A CN201110378780X A CN 201110378780XA CN 201110378780 A CN201110378780 A CN 201110378780A CN 102378284 A CN102378284 A CN 102378284A
Authority
CN
China
Prior art keywords
message
address
lma2
hoa2
hoa1
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201110378780XA
Other languages
Chinese (zh)
Other versions
CN102378284B (en
Inventor
马争鸣
王可
张飞
王波涛
王琳
张荀
梁艳盈
梁雨淇
黄燕美
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Sun Yat Sen University
National Sun Yat Sen University
Original Assignee
National Sun Yat Sen University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by National Sun Yat Sen University filed Critical National Sun Yat Sen University
Priority to CN201110378780.XA priority Critical patent/CN102378284B/en
Publication of CN102378284A publication Critical patent/CN102378284A/en
Application granted granted Critical
Publication of CN102378284B publication Critical patent/CN102378284B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

The invention relates to an inter-domain switching method of a proxy mobile IPv6 (Internet Protocol Version 6). When a mobile node (MN) is switched from a local mobile anchor (LAM1) to the other local mobile anchor (LAM2), a binding of a former home address (HoA1) and a new home address (HoA2) is established on the LMA1 by the MN. In a non-routing optimization mode, a source address of a data report which is sent to a non-switched communication node (CN) by the switched MN is the HoA1, and a purpose address of the data report which is sent to the MN by the CN is the HoA1. Therefore, the communication between the MN and the CN is transferred through the LMA1. In a routing optimization mode, an address binding which is maintained by the switched CN is changed to a binding of the HoA1 and the HoA2, the source address of the data report which is sent to the CN by the MN is changed to the HoA2, a home address item expansion head is filled with the HoA1, the purpose address of the data report which is sent to the MN by the CN is changed to the HoA1, and a second kind route head is filled with the HoA1. Accordingly, the CN and the MN can directly be communicated with each other.

Description

The method of switching between a kind of proxy mobile IPv 6 territory
Technical field
The present invention relates to the communications field, be specifically related to the method for switching between a kind of proxy mobile IPv 6 territory.
Background technology
The world today, in the IT industry of develop rapidly, the most noticeable mobile communication and the Internet service of surely belonging to.Mobile communication technology and the crystallization---mobile IP technology (MIP) that IP network merges have mutually held global communication field business especially.The distinguishing feature of MIP is that moving of mobile node (MN) has the transparency for the application of being carried on the network layer; Briefly; Be exactly that MN moves between various network; The above application of transport layer and transport layer all needn't change the source address and the destination address of communication, thereby keeps communication continuity.The MIP The Application of Technology has bright prospects, and its exploitation has become the focus of research in the industry.
Expansion along with development of internet technology and network size; IPv4 address depletion problem is appeared suddenly, and the test of IPv6 and deployment begin to become the focus of industry, is accompanied by the widespread deployment of IPv6; Mobile IP v 6 (MIPv6) is used as killer's level of IPv6, is expected to have been used in a large scale.The MIPv6 technology makes the IPv6 mobile node can use " home address " in network, to move; Thereby the continuity that has kept last layer conversation, but also be that extra signaling consumption, the protocol stack of complicacy and bigger problems such as network delay have been brought in network and terminal simultaneously.At present, a plurality of working groups of IETF are just carrying out the expansion research of MIPv6, comprising completed standard achievement PMIPv6 (Proxy Mobile IPv6--RFC5213).
PMIPv6 has introduced local mobile anchor (LMA) and two new functional entitys of Mobile Access Gateway (MAG) on the basis of MIPv6.LMA has the function of home agent among the similar MIPv6 (HA), is the topological anchor point of MN home network prefix (MN-HNP), is responsible for keeping the reachable state of mobile node.MAG replaces MN to carry out the entity of mobile management function, be responsible for detecting MN access, leave, initialization and upgrade LMA and go up banding cache clauses and subclauses about MN.The schematic network structure of PMIPv6 is as shown in Figure 1.
MN can be assigned to unique MN-HNP when inserting the PMIPv6 territory, and it is according to the MN-HNP configuration home address that is obtained.The flow process in MN access PMIPv6 territory is as shown in Figure 2.At first, MN sends route requests (RS) message to the MAG that it connected.MAG sends agent binding update (PBU) message to LMA, goes up MN-HNP and the current binding of acting on behalf of between the Care-of Address (Proxy-CoA) of MN to set up LMA.LMA replys agent binding to MAG again and confirms (PBA) message after setting up corresponding banding cache clauses and subclauses according to the PBU message that receives, and is established to the end node of the bidirectional tunnel of MAG simultaneously.MAG will be established to the end node of the bidirectional tunnel of LMA after receiving the PBA that LMA sends, at this moment, promptly set up a bidirectional tunnel that is used for transmits data packets between MAG and the LMA.At last, MAG is sent to MN with the information such as MN-HNP that comprise among the PBA through route announcement (RA) message, and MN will be according to the information configuration home address of receiving (HoA) such as MN-HNP, and keeps its home address constant when in this PMIPv6 territory, moving.
MN has obtained initial address configuration in the PMIPv6 territory after; When MN changes Network Access Point (AP); IAD before (MAG1) detects MN and leaves promptly to LMA transmission agent binding releasing (DeReg PBU) message, the MN-HNP of request LMA releasing MN and the binding between its current Proxy-CoA.LMA removes this banding cache after receiving DeReg PBU message, and replys PBA to MAG1.After this, LMA will wait for that one given period allows current new IAD (MAG2) to upgrade this banding cache, if the given time is also confiscated corresponding updating message after arriving, then LMA will delete this banding cache.MAG2 detects and can send PBU to LMA when MN inserts to upgrade banding cache.MN is as shown in Figure 3 from the flow process that MAG1 switches to MAG2.
PMIPv6 supports the mobility of MN and need not MN to participate in through the signaling message between MN and the HA in the expansion MIPv6 agreement.Act on behalf of the MAG execution and the Signalling exchange between the HA of mobile management function in the network and replace MN to carry out mobile management, MN will no longer participate in the Signalling exchange with HA.With respect to MIPv6, PMIPv6 can effectively reduce signaling consumption and handover delay, alleviates the complexity of mobile terminal protocol stack, improves service quality.
Yet, in PMIPv6, how to carry out switching among the RFC5213 between the territory not relating to, when moving to another LMA as MN, how to keep with Correspondent Node CN1 communicate by letter current not authoritative method.According to above-mentioned situation, this paper proposes the method switched between a kind of proxy mobile IPv 6 territory, and this method still keeps communication continuity in the time of can making MN switch to another LMA by a LMA.
Summary of the invention
The purpose of this invention is to provide the method for switching between a kind of proxy mobile IPv 6 territory.This method still keeps communication continuity in the time of can making MN switch to another LMA by a LMA.The objective of the invention is to realize like this:
1, the method for switching between the PMIPv6 territory under the non-routing optimality pattern
We suppose that MN initiates to communicate by letter to CN1 with LMA1 through MAG1.At this moment; MAG1 distributes an address Proxy-CoA1 to MN; LMA1 distributes a home address network prefix MN-HNP1 to MN; And the binding of in LMA1, having set up MN-HNP1 and Proxy-CoA1, MN has disposed address HoA1 according to MN-HNP1, and with the communicating by letter of CN1 in be used as home address to HoA1 and use.MN mails to the data message of CN1, and destination address is CNA1, and source address is HoA1, and CN1 mails to the data message of MN, and destination address is HoA1, and source address is CNA1.Switching flow figure is as shown in Figure 4 between the PMIPv6 territory under the non-routing optimality pattern.
1.1, the leaving of MN
(1) MN leaves MAG1, and MAG1 sends DeReg PBU message to LMA1;
(2) LMA1 receives DeReg PBU message, removes the binding of MN-HNP1 and Proxy-CoA1, and replys PBA message to MAG1;
1.2, the access of MN
(1) MN inserts MAG2 through RS message.
(2) after MAG2 receives RS message, send query messages to aaa server.After aaa server is received query messages, carry out necessary authentication, transmit a reply message to MAG2 then.Reply the address that comprises LMA2 in the message.
(3) after MAG2 receives the answer message of aaa server,, and send PBU message, comprise Proxy-CoA2 in the message to LMA2 for MN distributes an address Proxy-CoA2.
(4) after LMA2 receives PBU message, for MN distributes an address MN-HNP2, and the binding of setting up MN-HNP2 and Proxy-CoA2.LMA2 replys PBA message to MAG2, comprises MN-HNP2 in the message.
(5) after MAG2 receives PBA message, inform MN to MN-HNP2 through RA message.
(6) after MN receives RA message, utilize MN-HNP2 configuration HoA2.
1.3, the foundation of LMA1 address binding
(1) MN sends BU message to LMA1.The destination address of BU message is the address of LMA1, and source address is HoA2, and HoA1 is inserted in the home address territory in the message, and HoA2 is inserted in the Care-of Address territory.BU message mails to LMA1 through the tunnel between MAG2 and the LMA2.
(2) LMA1 receives the binding of setting up HoA1 and HoA2 after the BU message, and replys BA message to MN.The destination address of BA message is HoA2, and source address is the address of LMA1.BA message goes LMA2, LMA2 extracts MN-HNP2 from HoA2, the binding of searching MN-HNP2 and Proxy-CoA2 according to MN-HNP2, then through the tunnel between LMA2 and the MAG2 BA message goes MN.
1.4, the communication after switching between the territory
(1) MN mails to the data message of CN1, and destination address is CNA1, and source address is HoA1.MN will encapsulate the data message, and the data message after the encapsulation, destination address are the addresses of LMA1, and source address is HoA2.Data message after the encapsulation mails to LMA1 through the tunnel between MAG2 and the LMA2.The data message decapsulation of LMA1 to receiving mail to CN1 to the data message after the decapsulation then.
CN1 mails to the data message of MN, and destination address is HoA1, and source address is CNA1.Such data message mails to LMA1.After LMA1 received data message, the binding according to HoA1 searches HoA1 and HoA2 encapsulated the data message then.Data message after the encapsulation, destination address are HoA2, and source address is the address of LMA1.Data message after the encapsulation mails to LMA2.LMA2 extracts MN-NHP2 according to HoA2, according to the binding that MN-NHP2 searches MN-NHP2 and Proxy-CoA2, then through the tunnel between LMA2 and the MAG2, mails to MN to the data message after the encapsulation.
When (2) switch accomplishing back and new communication node CN2 between the MN territory and communicate, the source data packet address of being mail to CN2 by MN is HoA2, and destination address is CNA2; The source data packet address of being mail to MN by CN2 is CNA2, and destination address is HoA2.
The communication process that switches the non-routing optimality in back between the MN territory is as shown in Figure 5.
2, the method for switching between the PMIPv6 territory under the routing optimality pattern
We suppose that MN initiates to communicate by letter to CN1 with LMA1 through MAG1.At this moment, MAG1 distributes an address Proxy-CoA1 to MN, and LMA1 distributes a home address network prefix MN-HNP1 to MN, and the binding of in LMA1, having set up MN-HNP1 and Proxy-CoA1, and MN has disposed address HoA1 according to MN-HNP1.In order to observe the technical specification of MIPv6, under the pattern of routing optimality, HoA1 will with the communicating by letter of CN1 in both served as home address, also serve as Care-of Address.CN1 keeps the binding of HoA1 and HoA1.CN1 mails to the data message of MN, and destination address is HoA1, and source address is CNA1, and second type of route head filled out HoA1.MN mails to the data message of CN1, and destination address is CNA1, and source address is HoA1, and home address option extension head is filled out HoA1.Switching flow figure is as shown in Figure 6 between the PMIPv6 territory under the routing optimality pattern.
2.1, the leaving of MN
(1) MN leaves MAG1, and MAG1 sends DeReg PBU message to LMA1;
(2) LMA1 receives DeReg PBU message, removes the binding of MN-HNP1 and Proxy-CoA1, and replys PBA message to MAG1;
2.2, the access of MN
(1) MN inserts MAG2 through RS message.
(2) after MAG2 receives RS message, send query messages to aaa server.After aaa server is received query messages, carry out necessary authentication, reply message to MAG2 then, reply the address that comprises LMA2 in the message.
(3) after MAG2 receives the answer message of aaa server,, and send PBU message, comprise Proxy-CoA2 in the message to LMA2 for MN distributes an address Proxy-CoA2.
(4) after LMA2 receives PBU message, for MN distributes an address MN-HNP2, and the binding of setting up MN-HNP2 and Proxy-CoA2.LMA2 replys PBA message to MAG2, comprises MN-HNP2 in the message.
(5) after MAG2 receives PBA message, inform MN to MN-HNP2 through RA message.
(6) after MN receives RA message, utilize MN-HNP2 configuration HoA2.
2.3, the LMA1 foundation of binding
(1) MN sends BU message to LMA1.The destination address of BU message is the address of LMA1, and source address is HoA2, and HoA1 is inserted in the home address territory in the message, and HoA2 is inserted in the Care-of Address territory.BU message mails to LMA1 through the tunnel between MAG2 and the LMA2.
(2) LMA1 receives the binding of setting up HoA1 and HoA2 after the BU message, and replys BA message to MN.The destination address of BA message is HoA2, and source address is the address of LMA1.BA message goes LMA2, LMA2 extracts MN-HNP2 from HoA2, search the binding of MN-HNP2 and Proxy-CoA2, then through the tunnel between LMA2 and the MAG2 BA message goes MN.
2.4, the CN1 renewal of binding
(1) MN sends HoTI message and CoTI message to CN1.The destination address of HoTI message is CNA1, and source address is HoA1, and HoA1 is filled out in the home address territory in the message, and HoA2 is filled out in the Care-of Address territory.MN need encapsulate HoTI message.HoTI message after the encapsulation, destination address are the addresses of LMA1, and source address is HoA2.HoTI message after the encapsulation mails to LMA1 through the tunnel between MAG2 and the LMA2.The HoTI message of LMA1 after to the encapsulation of receiving is carried out decapsulation, obtains HoTI message, then HoT1 message goes CN1.The destination address of CoTI message is CNA1, and source address is HoA2, and HoA1 is filled out in the home address territory in the message, and HoA2 is filled out in the Care-of Address territory.CoTI message mails to CN through the tunnel between MAG2 and the LMA2.
(2) after CN1 receives HoTI message and CoTI message,, reply HoT message and CoT message to MN then through necessary authentication.The destination address of HoT message is HoA1, and source address is CNA1.HoT message goes LMA1.After LMA1 received HoT message, the binding according to HoA1 searches HoA1 and HoA2 encapsulated HoT message then.HoT message after the encapsulation, destination address is HoA2, source address is the address of LMA1.HoT message goes LMA2 after the encapsulation.LMA2 extracts MN-HNP2 from HoA2, according to the binding that MN-HNP2 searches MN-HNP2 and Proxy-CoA2, and the HoT message goes MN after encapsulating through the handle of the tunnel between LMA2 and the MAG2 then.The destination address of CoT message is HoA2, and source address is CNA1.CoT message goes LMA2.LMA2 extracts MN-HNP2 from HoA2, the binding of searching MN-HNP2 and Proxy-CoA2 according to MN-HNP2, then through the tunnel between LMA2 and the MAG2 CoT message goes MN.
(3) after MN receives HoT message and CoT message, send BU message to CN1.The destination address of BU message is CNA1, and source address is HoA2, and HoA1 is filled out in the home address territory in the message, and HoA2 is filled out in the Care-of Address territory.BU message mails to CN1 through the tunnel between MAG2 and the LMA2.
(4) after CN1 received BU message, the address binding of keeping oneself was updated to the binding of HoA1 and HoA2, replied BA message to MN then.The destination address of BA message is HoA2, source address CNA1.BA message goes LMA2 mails to MN through the tunnel between LMA2 and the MAG2 then.
2.5, the communication after switching between the territory
(1) MN mails to the data message of CN1, and destination address is CNA1, and source address is HoA2, and home address option extension head is filled out HoA1.The data message that MN mails to CN directly mails to CN1 through the tunnel between MAG2 and the LMA2.
CN1 mails to the data message of MN, and destination address is HoA2, and source address is CNA1, and second type of route head filled out HoA1.The data message that CN mails to MN mails to LMA2.LMA2 extracts MN-HNP2 from HoA2, according to the binding that MN-HNP2 searches MN-HNP2 and Proxy-CoA2, mail to MN to data message through the tunnel between LMA2 and the MAG2 then.
When (2) switch accomplishing back and new communication node CN2 between the MN territory and communicate, the source data packet address of being mail to CN2 by MN is HoA2, and destination address is CNA2; The source data packet address of being mail to MN by CN2 is CNA2, and destination address is HoA2.
The communication process of the routing optimality after switching between the MN territory is as shown in Figure 7.
Description of drawings
The schematic network structure of Fig. 1 PMIPv6
Fig. 2 MN inserts the flow chart in PMIPv6 territory
The flow chart of Fig. 3 MN territory intra
Switching flow figure between the PMIPv6 territory under the non-routing optimality pattern of Fig. 4
Switch the communication flow diagram of the non-routing optimality in back between Fig. 5 MN territory
Switching flow figure between the PMIPv6 territory under Fig. 6 routing optimality pattern
The communication process of the routing optimality after switching between Fig. 7 MN territory
The schematic network structure of Fig. 8 embodiment
Embodiment
The territory method for switching between that the purpose of this invention is to provide a kind of proxy mobile IPv 6, this method comprise non-routing optimality pattern and two kinds of situation of routing optimality pattern.Below we combine Fig. 8 to introduce the idiographic flow that switches between the territory of proxy mobile IPv 6 in detail.
1, the method for switching between the PMIPv6 territory under the non-routing optimality pattern
Our hypothesis, MN initiates to communicate by letter to CN1 through MAG1 and LMA1, the address of LMA1 be aec0:0:0:1::1/64 at this moment, the address of MAG1 is cec0:0:0:1::1/64, MAG1 is to address Proxy-CoA1 of MN distribution, Proxy-CoA1 is the address of MAG1.LMA1 distributes a home address network prefix MN-HNP1 to MN; And the binding of in LMA1, having set up MN-HNP1 and Proxy-CoA1; MN has disposed address HoA1 according to MN-HNP1, and HoA1 is aea0:0:0:1::2/64, and with the communicating by letter of CN1 in be used as home address to HoA1 and use.The address of CN1 is eec0:0:0:1::1/64.The address of switching back LMA2 between the MN territory is bec0:0:0:1::1/64, and the address of MAG2 is dec0:0:0:1::1/64, and the address of HoA2 is bea0:0:0:1::2/64, and the address that MN switches the new communication node CN2 that initiates the back is fec0:0:0:1::1/64.
(1) MN leaves MAG1, and MAG1 sends DeReg PBU message to LMA1, and the source address of message is cec0:0:0:1::1/64, and destination address is aec0:0:0:1::1/64;
(2) LMA1 receives DeReg PBU message, removes the binding of MN-HNP1 and Proxy-CoA1, and replys PBA message to MAG1, and the source address of message is aec0:0:0:1::1/64, and destination address is cec0:0:0:1::1/64;
(3) MN inserts MAG2 through RS message.
(4) after MAG2 receives RS message, send query messages to aaa server.After aaa server is received query messages, carry out necessary authentication, transmit a reply message to MAG2 then.Reply the address that comprises LMA2 in the message.
(5) after MAG2 receives the answer message of aaa server, for MN distributes an address Proxy-CoA2, and send PBU message to LMA2, comprise Proxy-CoA2 in the message, Proxy-CoA2 is the address of MAG2.The source address of PBU message is dec0:0:0:1::1/64, and destination address is bec0:0:0:1::1/64.
(4) after LMA2 receives PBU message, for MN distributes an address MN-HNP2, and the binding of setting up MN-HNP2 and Proxy-CoA2.LMA2 replys PBA message to MAG2, comprises MN-HNP2 in the message, and the source address of PBA message is bec0:0:0:1::1/64, and destination address is dec0:0:0:1::1/64;
(5) after MAG2 receives PBA message, inform MN to MN-HNP2 through RA message;
(6) after MN receives RA message, utilize MN-HNP2 configuration HoA2, the address of HoA2 is bea0:0:0:1::2/64;
(7) MN sends BU message to LMA1.The destination address of BU message is aec0:0:0:1::1/64, and source address is bea0:0:0:1::2/64, and HoA1 is inserted in the home address territory in the message, and HoA2 is inserted in the Care-of Address territory.BU message mails to LMA1 through the tunnel between MAG2 and the LMA2.
(8) LMA1 receives the binding of setting up HoA1 and HoA2 after the BU message, and replys BA message to MN.The destination address of BA message is bea0:0:0:1::2/64, and source address is aec0:0:0:1::1/64.BA message goes LMA2, LMA2 extracts MN-HNP2 from HoA2, the binding of searching MN-HNP2 and Proxy-CoA2 according to MN-HNP2, then through the tunnel between LMA2 and the MAG2 BA message goes MN.
(9) MN mails to the data message of CN1, and destination address is eec0:0:0:1::1/64, and source address is aea0:0:0:1::2/64.MN will encapsulate the data message, and the data message after the encapsulation, destination address are aec0:0:0:1::1/64, and source address is bea0:0:0:1::2/64.Data message after the encapsulation mails to LMA1 through the tunnel between MAG2 and the LMA2.The data message decapsulation of LMA1 to receiving mail to CN1 to the data message after the decapsulation then.
CN1 mails to the data message of MN, and destination address is aea0:0:0:1::2/64, and source address is eec0:0:0:1::1/64.Such data message mails to LMA1.After LMA1 received data message, the binding according to HoA1 searches HoA1 and HoA2 encapsulated the data message then.Data message after the encapsulation, destination address are HoA2, and source address is the address of LMA1.Data message after the encapsulation mails to LMA2.LMA2 extracts MN-NHP2 according to HoA2, according to the binding that MN-NHP2 searches MN-NHP2 and Proxy-CoA2, then through the tunnel between LMA2 and the MAG2, mails to MN to the data message after the encapsulation.
When (10) switch accomplishing back and new communication node CN2 between the MN territory and communicate, the source data packet address of being mail to CN2 by MN is bea0:0:0:1::2/64, and destination address is fec0:0:0:1::1/64; The source data packet address of being mail to MN by CN2 is fec0:0:0:1::1/64, and destination address is bea0:0:0:1::2/64.
2, the method for switching between the PMIPv6 territory under the routing optimality pattern
Our hypothesis, MN initiates to communicate by letter to CN1 through MAG1 and LMA1, the address of LMA1 be aec0:0:0:1::1/64 at this moment, the address of MAG1 is cec0:0:0:1::1/64, MAG1 is to address Proxy-CoA1 of MN distribution, Proxy-CoA1 is the address of MAG1.LMA1 distributes a home address network prefix MN-HNP1 to MN; And the binding of in LMA1, having set up MN-HNP1 and Proxy-CoA1; MN has disposed address HoA1 according to MN-HNP1, and HoA1 is aea0:0:0:1::2/64, and with the communicating by letter of CN1 in be used as home address to HoA1 and use.The address of CN1 is eec0:0:0:1::1/64.The address of switching back LMA2 between the MN territory is bec0:0:0:1::1/64, and the address of MAG2 is dec0:0:0:1::1/64, and the address of HoA2 is bea0:0:0:1::2/64, and the address that MN switches the new communication node CN2 that initiates the back is fec0:0:0:1::1/64.
(1) MN leaves MAG1, and MAG1 sends DeReg PBU message to LMA1, and the source address of message is cec0:0:0:1::1/64, and destination address is aec0:0:0:1::1/64;
(2) LMA1 receives DeReg PBU message, removes the binding of MN-HNP1 and Proxy-CoA1, and replys PBA message to MAG1, and the source address of message is aec0:0:0:1::1/64, and destination address is cec0:0:0:1::1/64;
(3) MN inserts MAG2 through RS message.
(4) after MAG2 receives RS message, send query messages to aaa server.After aaa server is received query messages, carry out necessary authentication, transmit a reply message to MAG2 then.Reply the address that comprises LMA2 in the message.
(5) after MAG2 receives the answer message of aaa server, for MN distributes an address Proxy-CoA2, and send PBU message to LMA2, comprise Proxy-CoA2 in the message, Proxy-CoA2 is the address of MAG2.The source address of PBU message is dec0:0:0:1::1/64, and destination address is bec0:0:0:1::1/64.
(4) after LMA2 receives PBU message, for MN distributes an address MN-HNP2, and the binding of setting up MN-HNP2 and Proxy-CoA2.LMA2 replys PBA message to MAG2, comprises MN-HNP2 in the message, and the source address of PBA message is bec0:0:0:1::1/64, and destination address is dec0:0:0:1::1/64;
(5) after MAG2 receives PBA message, inform MN to MN-HNP2 through RA message;
(6) after MN receives RA message, utilize MN-HNP2 configuration HoA2, the address of HoA2 is bea0:0:0:1::2/64;
(7) MN sends BU message to LMA1.The destination address of BU message is aec0:0:0:1::1/64, and source address is bea0:0:0:1::2/64, and HoA1 is inserted in the home address territory in the message, and HoA2 is inserted in the Care-of Address territory.BU message mails to LMA1 through the tunnel between MAG2 and the LMA2.
(8) LMA1 receives the binding of setting up HoA1 and HoA2 after the BU message, and replys BA message to MN.The destination address of BA message is bea0:0:0:1::2/64, and source address is aec0:0:0:1::1/64.BA message goes LMA2, LMA2 extracts MN-HNP2 from HoA2, the binding of searching MN-HNP2 and Proxy-CoA2 according to MN-HNP2, then through the tunnel between LMA2 and the MAG2 BA message goes MN.
(9) MN sends HoTI message and CoTI message to CN1.The destination address of HoTI message is CNA1, and source address is HoA1, and HoA1 is filled out in the home address territory in the message, and HoA2 is filled out in the Care-of Address territory.MN need encapsulate HoTI message.HoTI message after the encapsulation, destination address are the addresses of LMA1, and source address is HoA2.HoTI message after the encapsulation mails to LMA1 through the tunnel between MAG2 and the LMA2.The HoTI message of LMA1 after to the encapsulation of receiving is carried out decapsulation, obtains HoTI message, then HoTI message goes CN1.The destination address of CoTI message is CNA1, and source address is HoA2, and HoA1 is filled out in the home address territory in the message, and HoA2 is filled out in the Care-of Address territory.CoTI message mails to CN1 through the tunnel between MAG2 and the LMA2.
(10) after CN1 receives HoTI message and CoTI message,, reply HoT message and CoT message to MN then through necessary authentication.The destination address of HoT message is HoA1, and source address is CNA1.HoT message goes LMA1.After LMA1 received HoT message, the binding according to HoA1 searches HoA1 and HoA2 encapsulated HoT message then.HoT message after the encapsulation, destination address is HoA2, source address is the address of LMA1.HoT message goes LMA2 after the encapsulation.LMA2 extracts MN-HNP2 from HoA2, according to the binding that MN-HNP2 searches MN-HNP2 and Proxy-CoA2, and the HoT message goes MN after encapsulating through the handle of the tunnel between LMA2 and the MAG2 then.The destination address of CoT message is HoA2, and source address is CNA1.CoT message goes LMA2.LMA2 extracts MN-HNP2 from HoA2, the binding of searching MN-HNP2 and Proxy-CoA2 according to MN-HNP2, then through the tunnel between LMA2 and the MAG2 CoT message goes MN.
(11) after MN receives HoT message and CoT message, send BU message to CN1.The destination address of BU message is CNA1, and source address is HoA2, and HoA1 is filled out in the home address territory in the message, and HoA2 is filled out in the Care-of Address territory.BU message mails to CN1 through the tunnel between MAG2 and the LMA2.
(12) after CN1 received BU message, the address binding of keeping oneself was updated to the binding of HoA1 and HoA2, replied BA message to MN then.The destination address of BA message is HoA2, source address CNA1.BA message goes LMA2 mails to MN through the tunnel between LMA2 and the MAG2 then.
(13) MN mails to the data message of CN1, and destination address is CNA1, and source address is HoA2, and home address option extension head is filled out HoA1.The data message that MN mails to CN1 directly mails to CN1 through the tunnel between MAG2 and the LMA2.
CN1 mails to the data message of MN, and destination address is HoA2, and source address is CNA1, and second type of route head filled out HoA1.The data message that CN1 mails to MN mails to LMA2.LMA2 extracts MN-HNP2 from HoA2, according to the binding that MN-HNP2 searches MN-HNP2 and Proxy-CoA2, mail to MN to data message through the tunnel between LMA2 and the MAG2 then.
When (14) switch accomplishing back and new communication node CN2 between the MN territory and communicate, the source data packet address of being mail to CN2 by MN is HoA2, and destination address is CNA2; The source data packet address of being mail to MN by CN2 is CNA2, and destination address is HoA2.

Claims (4)

1. the method for switching between a proxy mobile IPv 6 territory is characterized in that:
A, under non-routing optimality pattern; Mobile node (hereinafter to be referred as MN) from a this locality move anchor (hereinafter to be referred as LMA1) switch to another local move anchor (hereinafter to be referred as LMA2) after; MN registers to LMA2, obtains new home address (hereinafter to be referred as HoA2), on LMA1, sets up the binding of original home address (hereinafter to be referred as HoA1) and HoA2; Then, MN will pass through the LMA1 forwarding with communicating by letter of the preceding communication node (hereinafter to be referred as CN1) of switching;
B, under the routing optimality pattern, before switch taking place, CN1 keeps the address binding of HoA1 and HoA1, MN is to the data message of CN1 transmission; Destination address is the address of CN1, and source address is HoA1, and home address option extension head is filled out HoA1; CN1 mails to the data message of MN, and destination address is HoA1, and source address is the address of CN1; Second type of route head filled out HoA1, and after switching generation, MN will set up the binding of HoA1 and HoA2 on LMA1; Also to change to the address binding of CN1 the binding of HoA1 and HoA2, then, the mutual direct communication of MN and CN1;
C, after switch accomplishing between the territory, if MN initiates communication through LMA2 to new communication node (hereinafter to be referred as CN2), no matter be under non-routing optimality pattern, still under the routing optimality pattern, all HoA2 both as home address, also as Care-of Address.
2. method according to claim 1 is characterized in that said steps A specifically comprises:
After A1, MN switch to LMA2; Behind the new home address HoA2 of the home network address prefix configuration of LMA2 distribution, send BU message to LMA1 then, the destination address of BU message is the address of LMA1; Source address is HoA2; HoA1 is inserted in the home address territory in the message, and HoA2 is inserted in the Care-of Address territory, and BU message mails to LMA1 through the IAD (hereinafter to be referred as MAG2) in LMA2 territory and the tunnel between the LMA2;
A2, LMA1 receive the binding of setting up HoA1 and HoA2 after the BU message, and reply BA message to MN, and the destination address of BA message is HoA2, and source address is the address of LMA1, BA message goes LMA2, LMA2 through the tunnel between MAG2 and the LMA2 BA message goes MN;
A3, switching back MN mail to the data message of CN1, and destination address is the address of CN1, and source address is HoA1; MN will encapsulate the data message, and the data message after the encapsulation, destination address are the addresses of LMA1; Source address is HoA2; Data message after the encapsulation mails to LMA1 through the tunnel between MAG2 and the LMA2, and the data message decapsulation of LMA1 to receiving mail to CN1 to the data message after the decapsulation then;
A4, CN1 mail to the data message of MN, and destination address is HoA1, and source address is the address of CN1, and such data message mails to LMA1, and after LMA1 received data message, the binding according to HoA1 searches HoA1 and HoA2 encapsulated the data message then.Data message after the encapsulation, destination address are HoA2, and source address is the address of LMA1, and the data message after the encapsulation mails to LMA2, and LMA2 mails to MN to the data message after the encapsulation through the tunnel between LMA2 and the MAG2.
3. method according to claim 1 is characterized in that said step B specifically comprises:
After B1, MN switch to LMA2; Behind the new home address HoA2 of the home network address prefix configuration of LMA2 distribution, send BU message to LMA1 then, the destination address of BU message is the address of LMA1; Source address is HoA2; HoA1 is inserted in the home address territory in the message, and HoA2 is inserted in the Care-of Address territory, and BU message mails to LMA1 through the tunnel between MAG2 and the LMA2;
B2, LMA1 receive the binding of setting up HoA1 and HoA2 after the BU message, and reply BA message to MN, and the destination address of BA message is HoA2, and source address is the address of LMA1, BA message goes LMA2, LMA2 through the tunnel between MAG2 and the LMA2 BA message goes MN;
After B3, MN receive BA message, send HoTI message and CoTI message to CN1, the destination address of HoTI message is CNA1, and source address is HoA1; HoA1 is filled out in the home address territory in the message, and HoA2 is filled out in the Care-of Address territory, and MN need encapsulate HoTI message; HoTI message after the encapsulation, destination address are the addresses of LMA1, and source address is HoA2; HoTI message after the encapsulation mails to LMA1 through the tunnel between MAG2 and the LMA2, and the HoTI message of LMA1 after to the encapsulation of receiving is carried out decapsulation, obtains HoTI message; HoTI message goes CN1, the destination address of CoTI message is CNA1 then, and source address is HoA2; HoA1 is filled out in the home address territory in the message, and HoA2 is filled out in the Care-of Address territory, and CoTI message mails to CN1 through the tunnel between MAG2 and the LMA2;
After B4, CN1 receive HoTI message and CoTI message,, reply HoT message and CoT message to MN then through necessary authentication; The destination address of HoT message is HoA1, and source address is CNA1, HoT message goes LMA1; After LMA1 received HoT message, the binding according to HoA1 searches HoA1 and HoA2 encapsulated HoT message then; HoT message after the encapsulation, destination address is HoA2, source address is the address of LMA1; HoT message goes LMA2 after the encapsulation, LMA2 through and LMA2 and MAG2 between the tunnel the encapsulation after HoT message goes MN, the destination address of CoT message is HoA2; Source address is CNA1, CoT message goes LMA2, LMA2 through the tunnel between LMA2 and the MAG2 CoT message goes MN;
After B5, MN receive HoT message and CoT message, send BU message to CN1, the destination address of BU message is CNA1; Source address is HoA2; HoA1 is filled out in the home address territory in the message, and HoA2 is filled out in the Care-of Address territory, and BU message mails to CN1 through the tunnel between MAG2 and the LMA2;
After B6, CN1 received BU message, the address binding of keeping oneself was updated to the binding of HoA1 and HoA2, replied BA message to MN then; The destination address of BA message is HoA2; Source address CNA1, BA message goes LMA2 mails to MN through the tunnel between LMA2 and the MAG2 then;
B7, switching back MN mail to the data message of CN1, and destination address is CNA1, and source address is HoA2, and home address option extension head is filled out HoA1, and the data message that MN mails to CN1 directly mails to CN1 through the tunnel between MAG2 and the LMA2;
B8, CN1 mail to the data message of MN, and destination address is HoA2, and source address is CNA1, and second type of route head filled out HoA1, and the data message that CN1 mails to MN mails to LMA2, and LMA2 mails to MN to data message through the tunnel between LMA2 and the MAG2.
4. method according to claim 1 is characterized in that said step C specifically comprises:
C1, under the pattern of non-routing optimality, MN mails to the data message of CN2, destination address is the address of CN2, source address is HoA2, the data message that MN mails to CN2 mails to CN2 through the tunnel between MAG2 and the LMA2; CN2 mails to the data message of MN, and destination address is HoA2, and source address is the address of CN2, and the data message that CN2 mails to MN is intercepted and captured by LMA2, and mails to MN through the tunnel between LMA2 and the MAG2;
C2, under the pattern of routing optimality, CN2 will set up the address binding of HoA2 and HoA2, MN mails to the data message of CN2; Destination address is the address of CN2, and source address is HoA2, and home address option extension head is filled out HoA2; The data message that MN mails to CN2 mails to CN2 through the tunnel between MAG2 and the LMA2, and CN2 mails to the data message of MN, and destination address is HoA2; Source address is the address of CN2; Second type of route head filled out HoA2, and the data message that CN2 mails to MN is intercepted and captured by LMA2, and mails to MN through the tunnel between LMA2 and the MAG2.
CN201110378780.XA 2011-11-23 2011-11-23 Inter-domain switching method of proxy mobile IPv6 (Internet Protocol Version 6) Expired - Fee Related CN102378284B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201110378780.XA CN102378284B (en) 2011-11-23 2011-11-23 Inter-domain switching method of proxy mobile IPv6 (Internet Protocol Version 6)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201110378780.XA CN102378284B (en) 2011-11-23 2011-11-23 Inter-domain switching method of proxy mobile IPv6 (Internet Protocol Version 6)

Publications (2)

Publication Number Publication Date
CN102378284A true CN102378284A (en) 2012-03-14
CN102378284B CN102378284B (en) 2014-03-19

Family

ID=45796066

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201110378780.XA Expired - Fee Related CN102378284B (en) 2011-11-23 2011-11-23 Inter-domain switching method of proxy mobile IPv6 (Internet Protocol Version 6)

Country Status (1)

Country Link
CN (1) CN102378284B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105376230A (en) * 2015-11-16 2016-03-02 东北大学 Two-way access authentication method for multi-layer-MAP oriented HMIPv6 network
CN109729520A (en) * 2017-10-31 2019-05-07 华为技术有限公司 The method and apparatus of wireless communication

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101400045A (en) * 2007-09-30 2009-04-01 华为技术有限公司 Method, system for forwarding packet and anchor point device
US20110264775A1 (en) * 2007-08-07 2011-10-27 Posco ICT Co., Ltd. Method and apparatus for supporting mipv6 service in a wireless communication network

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110264775A1 (en) * 2007-08-07 2011-10-27 Posco ICT Co., Ltd. Method and apparatus for supporting mipv6 service in a wireless communication network
CN101400045A (en) * 2007-09-30 2009-04-01 华为技术有限公司 Method, system for forwarding packet and anchor point device

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
HONGBIN LUO等: "An Approach for Building Scalable Proxy Mobile IPv6 Domains", 《IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT》 *
任三阳等: "基于PM IPv6的域间切换管理方法及性能分析", 《计算机应用研究》 *

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105376230A (en) * 2015-11-16 2016-03-02 东北大学 Two-way access authentication method for multi-layer-MAP oriented HMIPv6 network
CN105376230B (en) * 2015-11-16 2018-05-04 东北大学 A kind of HMIPv6 network bi-directional access authentication methods of oriented multilayer MAP
CN109729520A (en) * 2017-10-31 2019-05-07 华为技术有限公司 The method and apparatus of wireless communication
CN109729520B (en) * 2017-10-31 2020-09-29 华为技术有限公司 Method and apparatus for wireless communication

Also Published As

Publication number Publication date
CN102378284B (en) 2014-03-19

Similar Documents

Publication Publication Date Title
CN101810015B (en) Traffic localization with proxy mobility
CN100596095C (en) Hierarchical mobility IPv6 rapid switching method and system
JP4794520B2 (en) System, access gateway, home agent, and program for optimizing communication path in network-driven mobility management protocol
Shin et al. Distributed mobility management for efficient video delivery over all-IP mobile networks: Competing approaches
US20100103876A1 (en) Mobile terminal and communication management device
JP4968328B2 (en) Mobile IP communication system, mobile IP communication apparatus, and mobile IP communication method
JP5079866B2 (en) Mobile communication terminal, location management device, mobile communication terminal communication method, and location management device registration method
CN101005444B (en) Method and device for quick switching
KR20150074220A (en) System and protocols for inter-mobility access gateway tunneling for fast handoff transition
Wang et al. A mobility handover scheme for IPv6-based vehicular ad hoc networks
US8824353B2 (en) Mobility route optimization in a network having distributed local mobility anchors
CN102547890A (en) Intra-domain switching method for proxy mobile IPv6 (Internet protocol version 6) based on AAA server
Al-Surmi et al. Review on mobility management for future-IP-based next generation wireless networks
CN102378284B (en) Inter-domain switching method of proxy mobile IPv6 (Internet Protocol Version 6)
CN102664970A (en) Method for hierarchical mobile IPV6 based on mobile sub-net
CN102630084A (en) Agent mobile IPv6 (Internet Protocol Version 6) inter-domain switching method based on network mobility management
CN102158564B (en) Optimized communication method of mobile node in proxy mobile IPv6 (Internet Protocol Version 6) domain and communication node in mobile IPv6 domain
CN105764041A (en) IPv6 mobile communication method based on naming data network covering layer
Meng et al. IP mobility enhancements for MIPv6 and PMIPv6
KR100700526B1 (en) Method for handover on mobility network
CN102572790A (en) Distributed mobile IPV6 (Internet Protocol Version 6) method based on AR (Access Router) level
KR101225640B1 (en) AN ENHANCED ROUTE OPTIMIZATION SCHEME FOR MUTIPLE LMAs IN PMIPv6 DOMAIN
CN102149072A (en) Proxy mobile IPv6 (internet protocol version 6) group switching solution based on link layer grouping
CN101621793B (en) Quick switching method and device based on decentralization mobility management business architecture
JP2003092597A (en) Mobile communication system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20140319

Termination date: 20141123

EXPY Termination of patent right or utility model