CN116389359A - Data communication addressing method and system based on route isolation - Google Patents

Data communication addressing method and system based on route isolation Download PDF

Info

Publication number
CN116389359A
CN116389359A CN202310266670.7A CN202310266670A CN116389359A CN 116389359 A CN116389359 A CN 116389359A CN 202310266670 A CN202310266670 A CN 202310266670A CN 116389359 A CN116389359 A CN 116389359A
Authority
CN
China
Prior art keywords
protection equipment
service
directory
boundary protection
network
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202310266670.7A
Other languages
Chinese (zh)
Other versions
CN116389359B (en
Inventor
许波
李洪钧
张洁
谢俊杰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Institute of Systems Engineering of PLA Academy of Military Sciences
Original Assignee
Institute of Systems Engineering of PLA Academy of Military Sciences
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Institute of Systems Engineering of PLA Academy of Military Sciences filed Critical Institute of Systems Engineering of PLA Academy of Military Sciences
Priority to CN202310266670.7A priority Critical patent/CN116389359B/en
Publication of CN116389359A publication Critical patent/CN116389359A/en
Application granted granted Critical
Publication of CN116389359B publication Critical patent/CN116389359B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/74Address processing for routing
    • H04L45/745Address table lookup; Address filtering
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/54Organization of routing tables
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0823Network architectures or network communication protocols for network security for authentication of entities using certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention discloses a data communication addressing method and a system based on route isolation, wherein the system adopts a set of effective private directory route generation technology, a trusted cross-network terminal and boundary protection equipment are used as directory communication forwarding nodes to perform unified summarization learning to form a set of multi-path and multi-node communication addressing tables, so that on the premise of route isolation among different networks, how a service terminal performs cross-network communication addressing is ensured, and the reliable, reachable and recoverable cross-network service transmission paths are realized. The invention effectively ensures the routing isolation requirement of the prior network edge protection equipment, supports the bidirectional intercommunication of service levels of different network services on the premise of routing isolation, adopts a private directory routing process, and has better safety and sealing performance.

Description

Data communication addressing method and system based on route isolation
Technical Field
The invention relates to the technical field of network security, in particular to a data communication addressing method and system based on route isolation.
Background
On the premise that network security becomes a national strategic background, network security puts higher requirements on boundary protection, routing isolation is a necessary requirement of boundary protection, and traditional boundary isolation equipment mainly comprises a firewall, a gateway, a bastion machine and the like. General data ferry is based on fixed-point transmission of internet servers, and the use scene and the application background of the data ferry are limited to a certain extent.
How to support multi-service based bi-directional interactions in the internet that require communication addressing with inter-network routing isolation. Therefore, it is needed to propose a data communication addressing method based on route isolation, so as to cope with network security boundary protection, and how to realize multi-service-based bidirectional access under the route isolation.
Disclosure of Invention
The invention aims to provide a data communication addressing method and a system based on route isolation, which ensure that a service terminal can carry out cross-network communication addressing on the premise of route isolation among different networks, thereby realizing reliable, reachable and recoverable cross-network service transmission paths.
The technical solution for realizing the purpose of the invention is as follows: a data communication addressing method based on route isolation comprises the following specific steps:
s1, loading a trusted authentication certificate file on boundary protection equipment offline, configuring IP addresses of different network service processing boards of the equipment through service configuration, and configuring adjacent boundary protection equipment IP addresses as neighbors of the equipment for learning and publishing directory routes;
s2, the boundary protection equipment performs bidirectional authentication based on certificates to the configured neighbor equipment, and actively learns directory routing information of the other party to the neighbor equipment after the authentication is successful;
s3, loading a certificate file of a trusted authentication on the service terminal provided with the access authentication transmission software, and configuring a trusted access IP address, wherein the configured IP address is a deployed IP address of boundary protection equipment;
s4, the access authentication transmission software on the service terminal performs access authentication on the boundary protection equipment, the local ip address and the MAC address are announced to the boundary protection equipment after authentication is completed, and a trusted relationship is formed between the local ip address and the MAC address and the boundary protection equipment after authentication is successful;
s5, after the boundary protection equipment receives the authentication of the service terminal, directory routing information of the service terminal is formed locally;
s6, after forming a directory route information table of the service terminal, the boundary protection equipment performs directory route notification to the neighbor equipment;
s7, after the boundary protection equipment completes neighbor establishment and directory route notification and learning, the boundary protection equipment has the capability of providing directory route addressing for the accessed service terminal;
s8, when the service terminal accesses the data between networks, and the access authentication transmission software judges that the target IP is not the address in the local network, a directory forwarding path request is carried out on the authentication boundary protection equipment;
s9, after receiving the directory forwarding path request, the boundary protection equipment traverses the local directory routing table entry, queries through the target address, acquires the IP address of the access point of the target address, takes the access point of the target address as the next hop of the inter-network forwarding path, and sends the next hop to the service terminal;
s10, after receiving the next hop of the forwarding path, the access authentication transmission software of the service terminal performs cross-domain next hop tunnel encapsulation on the inter-network data and encapsulates the inter-network data on target boundary protection equipment;
and S11, after the target boundary protection equipment receives the inter-network tunnel, carrying out tunnel stripping on the data and ferrying and transmitting the data to the target service terminal.
Further, in S5, after receiving the authentication of the service terminal, the border protection device locally forms directory routing information of the service terminal, where the service routing information specifically includes:
1) SrcIP: a service end IP address;
2) Mac_addr: a service end MAC address;
3) Access_addr: access point IP address.
Further, in S6, the directory route generation flow is as follows:
the service terminal and the boundary protection equipment conduct certificate file importing;
the service terminal and the boundary protection equipment perform access bidirectional authentication;
the service terminal announces IP and MAC addresses to the boundary protection equipment and forms a terminal directory route;
and the boundary protection equipment performs directory route notification to the neighbor equipment.
Further, after the target boundary protection equipment receives the inter-network tunnel, the data is stripped and ferred to the target service terminal, and the specific process is as follows:
the method comprises the steps that a service terminal A firstly initiates an inter-network service request, then judges whether data are local network targets or not, and if the data are not local network service terminals A, performs directory routing query on boundary protection equipment A, the boundary protection equipment A returns directory routing query results to the service terminal A; and the service terminal A performs cross-domain next-hop target tunnel encapsulation to the boundary protection equipment B, and the boundary protection equipment B performs tunnel stripping and service data ferrying to the service terminal B.
A data communication addressing system based on route isolation, the system comprising:
the plurality of boundary protection devices are deployed at a boundary outlet of the service communication network, are used for boundary security protection, route isolation and cross-domain service access registration, serve as intermediate forwarding nodes for forwarding the private directory route between networks, and participate in the whole directory route learning process;
the access authentication transmission software is deployed on terminals needing to carry out cross-network service communication in each service, is used for terminal trusted access authentication and participates in the generation of directory routing;
the data communication addressing system based on route isolation realizes data communication addressing based on the data communication addressing method.
Further, the system deployment networking mode is as follows: in the system networking, boundary protection equipment is deployed at a network edge outlet of a service network, and access authentication transmission software is installed on a cross-network service seat.
Compared with the prior art, the invention has the remarkable advantages that: (1) By adopting a set of effective private directory routing technology, a reliable cross-network terminal and boundary protection equipment are used as directory communication forwarding nodes to perform unified summarization learning, and a set of multi-path and multi-node communication addressing tables are formed, so that the business terminal can perform cross-network communication addressing on the premise of ensuring routing isolation among different networks, and the reliable, reachable and recoverable cross-network business transmission paths are realized; (2) The routing isolation requirement of the existing network edge protection equipment is effectively ensured; (3) The bidirectional intercommunication of the service layers is supported on the premise of route isolation of different network services; (4) The private directory routing process is adopted, so that the security and the sealing performance are achieved.
Drawings
FIG. 1 is a schematic diagram of a system deployment networking approach.
Fig. 2 is a directory route generation flow chart.
Fig. 3 is a schematic diagram of a border protection apparatus neighbor learning advertisement directory routing process.
Fig. 4 is a process diagram of a target edge protection device performing tunnel stripping and ferrying transmission to a target service terminal.
Detailed Description
It is easy to understand that various embodiments of the present invention can be envisioned by those of ordinary skill in the art without altering the true spirit of the present invention in light of the present teachings. Accordingly, the following detailed description and drawings are merely illustrative of the invention and are not intended to be exhaustive or to limit or restrict the invention.
Various exemplary embodiments of the present invention will now be described in detail with reference to the accompanying drawings. It should be noted that: the relative arrangement of the components and steps, numerical expressions and numerical values set forth in these embodiments do not limit the scope of the present invention unless it is specifically stated otherwise.
The following description of at least one exemplary embodiment is merely exemplary in nature and is in no way intended to limit the invention, its application, or uses.
Techniques, methods, and apparatus known to one of ordinary skill in the relevant art may not be discussed in detail, but are intended to be part of the specification where appropriate.
In all examples shown and discussed herein, any specific values should be construed as merely illustrative, and not a limitation. Thus, other examples of exemplary embodiments may have different values.
The invention provides a data communication addressing method and a system based on route isolation, which adopt a set of effective private directory route generation technology, take a trusted cross-network terminal and boundary protection equipment as directory communication forwarding nodes to perform unified summarization learning, and form a set of multi-path and multi-node communication addressing tables, thereby ensuring how a service terminal performs cross-network communication addressing on the premise of route isolation among different networks, and realizing reliable, reachable and recoverable cross-network service transmission paths.
The invention discloses a data communication addressing method based on route isolation, which comprises the following steps:
s1, loading a trusted authentication certificate file on boundary protection equipment offline, configuring IP addresses of different network service processing boards of the equipment through service configuration, and configuring adjacent boundary protection equipment IP addresses as neighbors of the equipment for learning and publishing directory routes;
s2, the boundary protection equipment performs bidirectional authentication based on certificates to the configured neighbor equipment, and actively learns directory routing information of the other party to the neighbor equipment after the authentication is successful;
s3, loading a certificate file of a trusted authentication on the service terminal provided with the access authentication transmission software, and configuring a trusted access IP address, wherein the configured IP address is a deployed IP address of boundary protection equipment;
s4, the access authentication transmission software on the service terminal performs access authentication on the boundary protection equipment, the local ip address and the MAC address are announced to the boundary protection equipment after authentication is completed, and a trusted relationship is formed between the local ip address and the MAC address and the boundary protection equipment after authentication is successful;
s5, after the boundary protection equipment receives the authentication of the service terminal, directory routing information of the service terminal is formed locally;
s6, after forming a directory route information table of the service terminal, the boundary protection equipment performs directory route notification to the neighbor equipment;
s7, after the boundary protection equipment completes neighbor establishment and directory route notification and learning, the boundary protection equipment has the capability of providing directory route addressing for the accessed service terminal;
s8, when the service terminal accesses the data between networks, and the access authentication transmission software judges that the target IP is not the address in the local network, a directory forwarding path request is carried out on the authentication boundary protection equipment;
s9, after receiving the directory forwarding path request, the boundary protection equipment traverses the local directory routing table entry, queries through the target address, acquires the IP address of the access point of the target address, takes the access point of the target address as the next hop of the inter-network forwarding path, and sends the next hop to the service terminal;
s10, after receiving the next hop of the forwarding path, the access authentication transmission software of the service terminal performs cross-domain next hop tunnel encapsulation on the inter-network data and encapsulates the inter-network data on target boundary protection equipment;
and S11, after the target boundary protection equipment receives the inter-network tunnel, carrying out tunnel stripping on the data and ferrying and transmitting the data to the target service terminal.
Further, in S5, after receiving the authentication of the service terminal, the border protection device locally forms directory routing information of the service terminal, where the service routing information specifically includes:
1) SrcIP: a service end IP address;
2) Mac_addr: a service end MAC address;
3) Access_addr: access point IP address.
As a specific example, in S6, the directory route generation flow is as follows:
the service terminal and the boundary protection equipment conduct certificate file importing;
the service terminal and the boundary protection equipment perform access bidirectional authentication;
the service terminal announces IP and MAC addresses to the boundary protection equipment and forms a terminal directory route;
and the boundary protection equipment performs directory route notification to the neighbor equipment.
As a specific example, after the target boundary protection device receives the inter-network tunnel, the target boundary protection device strips the tunnel and ferries the data to the target service terminal, and the specific process is as follows:
the method comprises the steps that a service terminal A firstly initiates an inter-network service request, then judges whether data are local network targets or not, and if the data are not local network service terminals A, performs directory routing query on boundary protection equipment A, the boundary protection equipment A returns directory routing query results to the service terminal A; and the service terminal A performs cross-domain next-hop target tunnel encapsulation to the boundary protection equipment B, and the boundary protection equipment B performs tunnel stripping and service data ferrying to the service terminal B.
A data communication addressing system based on route isolation, the system comprising:
the plurality of boundary protection devices are deployed at a boundary outlet of the service communication network, are used for boundary security protection, route isolation and cross-domain service access registration, serve as intermediate forwarding nodes for forwarding the private directory route between networks, and participate in the whole directory route learning process;
the access authentication transmission software is deployed on terminals needing to carry out cross-network service communication in each service, is used for terminal trusted access authentication and participates in the generation of directory routing;
the data communication addressing system based on route isolation realizes data communication addressing based on the data communication addressing method.
As a specific example, the system deployment networking approach is as follows: in the system networking, boundary protection equipment is deployed at a network edge outlet of a service network, and access authentication transmission software is installed on a cross-network service seat.
The invention will be described in further detail with reference to the accompanying drawings and specific examples.
Examples
Aiming at the routing problem that when a plurality of service networks are interconnected, the boundary safety protection equipment performs routing isolation on the network routing and performs multi-service bidirectional communication, the invention provides a data communication addressing method and system based on the routing isolation.
In order to achieve the aim of the invention, the invention adopts the following technical scheme:
in one aspect, a data communication addressing system based on route isolation is provided, the system comprising:
the border protection equipment is deployed at a border outlet of the service communication network, is used for border security protection, route isolation and cross-domain service access registration, is used as an intermediate forwarding node for forwarding the private directory route between networks, and participates in the whole directory route learning process.
The access authentication transmission software is deployed on terminals needing to carry out cross-network service communication in each service, is used for terminal trusted access authentication and participates in the generation of directory routes.
The system deployment networking mode is shown in fig. 1.
In the system networking, boundary protection equipment is deployed at a network edge outlet of a service network, and access authentication transmission software is installed on a cross-network service seat.
A second aspect provides a data communication addressing method based on route isolation:
the method comprises the steps of loading a certificate file of trusted authentication on the boundary protection equipment in an off-line mode, configuring IP addresses of different network service processing boards of the equipment through service configuration, and configuring the adjacent IP addresses of the boundary protection equipment as neighbors of the adjacent equipment for learning and publishing directory routes.
The boundary protection equipment performs bidirectional authentication based on the certificate to the configured neighbor equipment, and actively learns directory routing information of the opposite party to the neighbor after the authentication is successful.
And loading a certificate file of the trusted authentication on the service terminal provided with the access authentication transmission software, and configuring a trusted access IP address, wherein the configured IP address is a deployed boundary protection equipment IP address.
The access authentication transmission software on the service terminal performs access authentication to the boundary protection equipment, and after authentication is completed, the local ip address and the MAC address are announced to the boundary protection equipment. And after authentication is successful, a trusted relationship is formed with the boundary protection equipment.
After receiving the authentication of the service terminal, the boundary protection equipment forms directory routing information of the terminal locally, wherein the routing information specifically comprises the following steps:
1) SrcIP: a service end IP address;
2) MAC_addr is the MAC address of the service end;
3) Access_addr, the IP address of the Access point;
and the boundary protection equipment performs directory route notification to the neighbor equipment after forming a directory route information table of the service terminal.
The directory route generation flowchart is shown in fig. 2.
The process of learning advertisement directory routing between edge protection device neighbors is shown in fig. 3.
After the boundary protection equipment completes neighbor establishment and directory route notification and learning, the boundary protection equipment has the capability of providing directory route addressing for the accessed service terminal.
When the service terminal accesses the data between networks, the access authentication transmission software judges that the target IP is not the address in the local network, and performs a directory forwarding path request to the authentication boundary protection equipment.
After receiving the directory forwarding path request, the boundary protection equipment traverses the local directory routing table entry, queries through the target address, acquires the IP address of the access point of the target address, takes the access point of the target address as the next hop of the inter-network forwarding path, and sends the next hop of the inter-network forwarding path to the service terminal.
And after receiving the next hop of the forwarding path, the access authentication transmission software of the service terminal performs cross-domain next hop tunnel encapsulation on the inter-network data and encapsulates the inter-network data on the target boundary protection equipment.
After the target boundary protection equipment receives the inter-network tunnel, the data is subjected to tunnel stripping and ferrying transmission to the target service terminal, and the specific process is shown in fig. 4.
The present invention is not limited to the above-mentioned embodiments, and any changes or substitutions that can be easily understood by those skilled in the art within the technical scope of the present invention are intended to be included in the scope of the present invention.
It should be appreciated that in the above description of exemplary embodiments of the invention, various features of the invention are sometimes described in the context of a single embodiment or with reference to a single figure in order to streamline the invention and aid those skilled in the art in understanding the various aspects of the invention. The present invention should not, however, be construed as including features that are essential to the patent claims in the exemplary embodiments.

Claims (6)

1. The data communication addressing method based on route isolation is characterized by comprising the following steps:
s1, loading a trusted authentication certificate file on boundary protection equipment offline, configuring IP addresses of different network service processing boards of the equipment through service configuration, and configuring adjacent boundary protection equipment IP addresses as neighbors of the equipment for learning and publishing directory routes;
s2, the boundary protection equipment performs bidirectional authentication based on certificates to the configured neighbor equipment, and actively learns directory routing information of the other party to the neighbor equipment after the authentication is successful;
s3, loading a certificate file of a trusted authentication on the service terminal provided with the access authentication transmission software, and configuring a trusted access IP address, wherein the configured IP address is a deployed IP address of boundary protection equipment;
s4, the access authentication transmission software on the service terminal performs access authentication on the boundary protection equipment, the local ip address and the MAC address are announced to the boundary protection equipment after authentication is completed, and a trusted relationship is formed between the local ip address and the MAC address and the boundary protection equipment after authentication is successful;
s5, after the boundary protection equipment receives the authentication of the service terminal, directory routing information of the service terminal is formed locally;
s6, after forming a directory route information table of the service terminal, the boundary protection equipment performs directory route notification to the neighbor equipment;
s7, after the boundary protection equipment completes neighbor establishment and directory route notification and learning, the boundary protection equipment has the capability of providing directory route addressing for the accessed service terminal;
s8, when the service terminal accesses the data between networks, and the access authentication transmission software judges that the target IP is not the address in the local network, a directory forwarding path request is carried out on the authentication boundary protection equipment;
s9, after receiving the directory forwarding path request, the boundary protection equipment traverses the local directory routing table entry, queries through the target address, acquires the IP address of the access point of the target address, takes the access point of the target address as the next hop of the inter-network forwarding path, and sends the next hop to the service terminal;
s10, after receiving the next hop of the forwarding path, the access authentication transmission software of the service terminal performs cross-domain next hop tunnel encapsulation on the inter-network data and encapsulates the inter-network data on target boundary protection equipment;
and S11, after the target boundary protection equipment receives the inter-network tunnel, carrying out tunnel stripping on the data and ferrying and transmitting the data to the target service terminal.
2. The routing isolation-based data communication addressing method of claim 1, wherein in S5, after receiving authentication of a service terminal, the border protection apparatus locally forms directory routing information of the service terminal, and the service routing information specifically includes:
1) SrcIP: a service end IP address;
2) Mac_addr: a service end MAC address;
3) Access_addr: access point IP address.
3. The data communication addressing method based on route isolation according to claim 1, wherein in S6, a directory route generation flow is as follows:
the service terminal and the boundary protection equipment conduct certificate file importing;
the service terminal and the boundary protection equipment perform access bidirectional authentication;
the service terminal announces IP and MAC addresses to the boundary protection equipment and forms a terminal directory route;
and the boundary protection equipment performs directory route notification to the neighbor equipment.
4. The data communication addressing method based on route isolation according to claim 1, wherein after the target boundary protection device receives the inter-network tunnel, the data is tunneled and ferred to the target service terminal, and the specific process is as follows:
the method comprises the steps that a service terminal A firstly initiates an inter-network service request, then judges whether data are local network targets or not, and if the data are not local network service terminals A, performs directory routing query on boundary protection equipment A, the boundary protection equipment A returns directory routing query results to the service terminal A; and the service terminal A performs cross-domain next-hop target tunnel encapsulation to the boundary protection equipment B, and the boundary protection equipment B performs tunnel stripping and service data ferrying to the service terminal B.
5. A data communication addressing system based on route isolation, characterized in that the system comprises the following parts:
the plurality of boundary protection devices are deployed at a boundary outlet of the service communication network, are used for boundary security protection, route isolation and cross-domain service access registration, serve as intermediate forwarding nodes for forwarding the private directory route between networks, and participate in the whole directory route learning process;
the access authentication transmission software is deployed on terminals needing to carry out cross-network service communication in each service, is used for terminal trusted access authentication and participates in the generation of directory routing;
the data communication addressing system based on route isolation realizes data communication addressing based on the data communication addressing method of any one of claims 1 to 4.
6. The routing isolation based data communication addressing system of claim 5, wherein the system is deployed in a networking manner as follows: in the system networking, boundary protection equipment is deployed at a network edge outlet of a service network, and access authentication transmission software is installed on a cross-network service seat.
CN202310266670.7A 2023-03-20 2023-03-20 Data communication addressing method and system based on route isolation Active CN116389359B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310266670.7A CN116389359B (en) 2023-03-20 2023-03-20 Data communication addressing method and system based on route isolation

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310266670.7A CN116389359B (en) 2023-03-20 2023-03-20 Data communication addressing method and system based on route isolation

Publications (2)

Publication Number Publication Date
CN116389359A true CN116389359A (en) 2023-07-04
CN116389359B CN116389359B (en) 2024-05-24

Family

ID=86977969

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310266670.7A Active CN116389359B (en) 2023-03-20 2023-03-20 Data communication addressing method and system based on route isolation

Country Status (1)

Country Link
CN (1) CN116389359B (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060126502A1 (en) * 2004-12-14 2006-06-15 Jean-Philippe Vasseur Efficient mechanism for fast recovery in case of border router node failure in a computer network
WO2016058261A1 (en) * 2014-12-16 2016-04-21 北京大学深圳研究生院 Network-based flat routing method
CN111669317A (en) * 2020-05-29 2020-09-15 深圳市风云实业有限公司 Cross-domain secure communication transmission system and method based on hidden network routing

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060126502A1 (en) * 2004-12-14 2006-06-15 Jean-Philippe Vasseur Efficient mechanism for fast recovery in case of border router node failure in a computer network
WO2016058261A1 (en) * 2014-12-16 2016-04-21 北京大学深圳研究生院 Network-based flat routing method
CN111669317A (en) * 2020-05-29 2020-09-15 深圳市风云实业有限公司 Cross-domain secure communication transmission system and method based on hidden network routing

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
钟耿辉;唐加山;: "基于VXLAN的EVPN技术研究与实现", 计算机技术与发展, no. 05 *

Also Published As

Publication number Publication date
CN116389359B (en) 2024-05-24

Similar Documents

Publication Publication Date Title
TWI821373B (en) System for first hop gateway redundancy in a network computing environment
US9825847B2 (en) System and method for enabling services chaining in a provider network
US20190007312A1 (en) Techniques for routing and forwarding between multiple virtual routers implemented by a single device
US8898334B2 (en) System for network deployment and method for mapping and data forwarding thereof
CN106572021B (en) Method for realizing network virtualization superposition and network virtualization edge node
EP3014859B1 (en) Method for enabling services chaining in a provider network
CN102571587B (en) Method and equipment for forwarding messages
CN103905284B (en) A kind of flow load sharing method and apparatus based on EVI networks
JP5231657B2 (en) Method and apparatus for forming, maintaining and / or using overlapping networks
JP2014529926A (en) System and method for implementing and managing virtual networks
CN108737273B (en) Message processing method and device
CN116389359B (en) Data communication addressing method and system based on route isolation
CN103023783B (en) A kind of data transmission method and equipment based on DVPN
US9025606B2 (en) Method and network node for use in link level communication in a data communications network
CN115277720A (en) Multicast group management method, device, equipment and storage medium
EP3942748B1 (en) Seamless multipoint label distribution protocol (mldp) transport over a bit index explicit replication (bier) core
CN103095507B (en) Based on message transmitting method and the edge device of Ethernet virtualization internet network
WO2011150710A1 (en) Service data transmission method and system based on personal network
CN117424778B (en) Method for realizing large two-layer communication across control domain SD-WAN network
CN106452992A (en) Remote multi-homing networking method and apparatus
CN115733643A (en) MAC learning method, device, electronic equipment and storage medium
Garcia-Luna-Aceves Towards loop-free forwarding of anonymous internet datagrams that enforce provenance
CN101729515B (en) Method for acquiring information of neighbor nodes in IP telecommunication network system
JP2004080268A (en) Path information exchange method in dynamically reconfigured optical network, and path information exchange system employing the same

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant