GB2338875A - Integrated information communications system - Google Patents

Integrated information communications system Download PDF

Info

Publication number
GB2338875A
GB2338875A GB9920084A GB9920084A GB2338875A GB 2338875 A GB2338875 A GB 2338875A GB 9920084 A GB9920084 A GB 9920084A GB 9920084 A GB9920084 A GB 9920084A GB 2338875 A GB2338875 A GB 2338875A
Authority
GB
United Kingdom
Prior art keywords
ics
address
packet
corporation
network
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
GB9920084A
Other versions
GB2338875B (en
GB9920084D0 (en
Inventor
Hisao Furukawa
Shoji Miyaguchi
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
DISTRIB SYST RES INST
Distribution Systems Research Institute
Miyaguchi Research Co Ltd
Original Assignee
DISTRIB SYST RES INST
Distribution Systems Research Institute
Miyaguchi Research Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from JP35022497A external-priority patent/JP3084681B2/en
Priority claimed from JP3900798A external-priority patent/JP3000051B2/en
Application filed by DISTRIB SYST RES INST, Distribution Systems Research Institute, Miyaguchi Research Co Ltd filed Critical DISTRIB SYST RES INST
Priority claimed from GB9821661A external-priority patent/GB2332837B/en
Publication of GB9920084D0 publication Critical patent/GB9920084D0/en
Publication of GB2338875A publication Critical patent/GB2338875A/en
Application granted granted Critical
Publication of GB2338875B publication Critical patent/GB2338875B/en
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/02Details
    • H04L12/14Charging, metering or billing arrangements for data wireline or wireless communications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/46Interconnection of networks
    • H04L12/4604LAN interconnection over a backbone network, e.g. Internet, Frame Relay
    • H04L12/4608LAN interconnection over ATM networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/46Interconnection of networks
    • H04L12/4604LAN interconnection over a backbone network, e.g. Internet, Frame Relay
    • H04L12/462LAN interconnection over a bridge based backbone
    • H04L12/4625Single bridge functionality, e.g. connection of two networks over a single bridge
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/66Arrangements for connecting between networks having differing types of switching systems, e.g. gateways
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/74Address processing for routing
    • H04L45/742Route cache; Operation thereof
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L61/00Network arrangements, protocols or services for addressing or naming
    • H04L61/09Mapping addresses
    • H04L61/25Mapping addresses of the same type
    • H04L61/2503Translation of Internet protocol [IP] addresses
    • H04L61/2514Translation of Internet protocol [IP] addresses between local and global IP addresses
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L61/00Network arrangements, protocols or services for addressing or naming
    • H04L61/09Mapping addresses
    • H04L61/25Mapping addresses of the same type
    • H04L61/2503Translation of Internet protocol [IP] addresses
    • H04L61/2521Translation architectures other than single NAT servers
    • H04L61/2535Multiple local networks, e.g. resolving potential IP address conflicts
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L61/00Network arrangements, protocols or services for addressing or naming
    • H04L61/45Network directories; Name-to-address mapping
    • H04L61/4505Network directories; Name-to-address mapping using standardised directories; using standardised directory access protocols
    • H04L61/4511Network directories; Name-to-address mapping using standardised directories; using standardised directory access protocols using domain name system [DNS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L61/00Network arrangements, protocols or services for addressing or naming
    • H04L61/45Network directories; Name-to-address mapping
    • H04L61/4557Directories for hybrid networks, e.g. including telephone numbers
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0272Virtual private networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/123Applying verification of the received information received data contents, e.g. message integrity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
    • H04L69/16Implementation or adaptation of Internet protocol [IP], of transmission control protocol [TCP] or of user datagram protocol [UDP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
    • H04L69/22Parsing or analysis of headers
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/54Store-and-forward switching systems 
    • H04L12/56Packet switching systems
    • H04L12/5601Transfer mode dependent, e.g. ATM
    • H04L2012/5638Services, e.g. multimedia, GOS, QOS
    • H04L2012/5646Cell characteristics, e.g. loss, delay, jitter, sequence integrity
    • H04L2012/5652Cell construction, e.g. including header, packetisation, depacketisation, assembly, reassembly
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/54Store-and-forward switching systems 
    • H04L12/56Packet switching systems
    • H04L12/5601Transfer mode dependent, e.g. ATM
    • H04L2012/5685Addressing issues
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2212/00Encapsulation of packets
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
    • H04L69/08Protocols for interworking; Protocol conversion
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
    • H04L69/18Multiprotocol handlers, e.g. single devices capable of handling multiple protocols

Abstract

To provide an integrated information communication system (ICS) without using dedicated lines or the Internet, ensuring communication speed, communication quality, communication trouble countermeasures in a unified manner, wherein security and reliability in communication is ensured, the system is comprised of an access control apparatus for connecting a plurality of computer communication networks or information communication equipment (eg. LANs) to each, and a relay device for networking the aforementioned access control apparatus, the system having functions for performing routing by transferring information by a unified address system, and is configured such that the aforementioned plurality of computer communication networks or information communication equipment can perform communications in an interactive manner. A conversion table 22013-1, which may be within the access control apparatus, has network identifiers for sectioning off a section of the ICS network and making that portion a net. This enables closed-zone intra-corporation communication, inter-corporation communication or virtual dedicated line communication using the network server, or open-zone inter-corporation communication.

Description

2338875 INTEGRATED WUMTION COMMUNICATICN SYSTEM
BACKGRCUND OF THE INVENTI 1. Field of the Invention
The present invention relates to an integrated informtion canmzdeatim system connecting information comnanication equipments or info=ation canninication systems such as andlor for personal mniputer, LAN (Local Area Network), telephone (including cellular phone), FAX (Facsimile), CATV (Cable Television), Internet and the Like, not only via dedicated lines, but also via ISDN (Integrated Services Digital Network), FR (Frarne Relay), ATM (Asynchronous T1ransfer Mode), IPX (Integrated Packet Exchange), satellite, wireless and public lines. Hem, integrated information camunicatIon equits perform ccxtatLuiicatim provided with an address (for information ccnnunication) for distinguishing the integrated information cam=cation equipment with other equipment. Particularly, the present irrvention relates to an integrated informtion ccuumicatim system which integrates data transfer services based m connection-less networks (e.g., RFC791 or RFC1883 IP (Internet Protocol) technology) and inproves the overall economics of the information comnmication system by employing a unified address system, and ensuring security to realize interactive camunications between connected terminals or systems. 2. Description of the Prior Art
In accordance with mriputer and information canamication 1 technology, cmWter conymnication networks have in recent years come to be widely used in universities, research institutes, gove=inent organizations, and intra-corporation/inter-corporatim situations. LANs are used for intra-corporation communication networks, and in the event that the geographic locale is m a national basis, the form thereof becomes such as sown in FIG.1. In the example descr in FIGA, each local LAN uses a common protocol, with each being connected by dedicated lines. Here, e.g., a corporation X has LAN-X 1, LAWX2 and LAN-M as LANs, a corporation Y has LAWY1, LAWY2 and LAWY3 as LANs, and both corporations X and Y use communication address systems ADX and ADY for performing mrputer cammicatIons. Since it is necessary to lay a separate dedicated Line for each corporation with such a LAN network. system architecture becomes costly, and in the event that connection is to be made to a LAN network of another corporation, interfacing must be matched such as the mication address system, making inter-connection very difficult and very costly.
On the other hand, the Internet has recently become widespread as a global-scale computer communication network. On the Internet, networks are connected using a router of a provider, a em=mication protocol called TCP/IP (Transmission Control Protocol/Intemet Protocol) is employed, dedicated lines or FR networks are used for connecting remote areas, and Ethernets which are 10 LANs or FDDIs (Fiber Distributed Data Interface) which are 10 LANs are used as communication paths within structures. FIG. 2 shows an example of an 2 Internet connection, in which the routers in the providers maintain mutual connection by wwhanging routing table connection information. Each router is connected to a plurality of networks, and judgment is made based m the routing table regarding to which router connected to which provider s network received data should go next. Thus, m the Internet, the IP address attached to each IP packet (IP datagram) is checked, judgment is made to which router the IP packet should be sent, and that IP packet is sent accordingly. Thus, IP packets are transferred one after another and delivered to the destination mqputer, by means of all routers performing the above-described operation.
FIG.3 illustrates the information contents of an RFC791 IP Packet used by the Internet, divided into a control field and a data field. FIG.4 illustrates the information contents of a similar WC1883, divided into a control field and a data field. In either figure, the parentheses () indicate the number of bits.
However, with the Internet, the path control is restricted by IP, so that me cannot tell whether the other party with which ccffmmcatim is being made is the authorized party, and the system is such that the ccffnxmcatim path is not administrated in an integrated manner, meaning that there are problem regarding security in that information may be eavesdropped. Also, in reality, addresses within the LANs a being separately decided by the LAN users, so there is the necessity to replace the LAN user addresses when connecting the LAN to the Internet. Also, communication quality such as 3 t_ ' conTunication speed and communication error rate for the trunk lines making up the Internet cammicatIon path differ from one line to another for each LAN, and are practically non-uniform. Also, there are problem such as an attempt to send a 10 TV signal for videoconferencing not achieving the desired communication speed. Further, there is no administrator for performing maintenance of the network such as in the case of failure, of for integrating the overall network for future planning for the network and so forth. Also, with LAN networks and the Internet, the terminals are personal cariputers (computers), and it has been difficult to use telephones, FAX and CATV in an integrated manner therein.
SUMMARY OF THE INYMION
The present embodiment has been made in accordance with the abavedescribed situations, and it is an object of the present invention to provide an integrated information communication system capable of containing a plurality of VANs which perform IP packet transfer of which. security and reliability in communications has been ensured, by means of not using dedicated lines or the Internet so as to improve economic considerations of the information communication system architecture, and ensuring communication speed, communication quality and c^lnication trouble countermeasure in a unified manner. Alw, it is another object of the present invention to provide an integrated information communication system which uses a single information transfer which is not dependent m the type of service, 4 such as sound, imge (motion and still). text, etc., so as to interconnect services which have conventionally been provided separately, such as total communication services, analog/digital telephone line services, Internet provider services, FAX services, computer data exchange services, CATV services and so forth. Further, it is another object of the present invention to provide an integrated information communication system which enables inter-corporation communication with very little change to the computer communication address systems which have been independently and separately created within each separate corporation (including univexsltles, research institutes, organizations, etc.).
The present invention relates to an integrated information cannzdcatim system, and the above objects of the present invention are realized as follows: the present invention is configured by providing an access control apparatus for connecting a plurality of computer communication networks or information cammunication equipment to each, and a relay device for networking the aforementioned access control apparatus, the system having functions for perfonning routing by transferring information by a unified address system, and is configures such that the aforementioned plurality of computer communication networks or information communication equipments can perform communications in an interactive manner. In FIG.1 which is given as an example of a conventional arrangement, the range of dedicated lines used for intra- corporation and inter-corporation communications is indicated by solid lines, and this is replaced with the equivalent of a mqmter crucations network according to IP as a cemm ccumiriication network indicated by broken lines.
The above-described objects of the present invention are achieved by an ICS user packet having a unique ICS user address system ADX being converted into an ICS network packet having an address system ADS, based m the administration of a conversion table provided within an access control apparatus, and by being arranged such that in the case that transmission is made over at least one VAN contained therein following rules of the aforementioned address system ADS, and the destination other access control apparatus Is reached, conversion Is made to the aforementioned ICS user address system ADX based m the administration of the aforementioned conversion table, and another external informtion cammunication apparatus is reached. Also, the above-described objects of the present invention are achieved by an ICS user packet having a unique ICS user address system ADX being converted into an ICS network packet corresponding with a reception ICS network address registered beforehand to the conversion table in accordance with a user logic c=uncation line, rather than using an ICS user address within the aforwmtimed ICS user packet based m the administration of a conversion table provided within the access control apparatus, and by being arranged such that in the case that transmission of the aforementioned ICS network packet is made to another access control apparatus via at least me VAN follawing rules of the ICS address system ADS, the transfer destination of the 6 aforwmtlmed ICS network packet being either 1 or N, this is returned to the aforementioned ICS network packet based on the administration of a cmversion table provided within the aforementioned access control appanatus, and another exteznal information c=unication apparatus is reached.
BRIEF DESCRIPTION OF M
In the accampanYing drgs:
FIG.1 is a block diagram to explain a conventional LAN network; FIG.2 is a diagram illustrating a form of Internet; FIG.3 is a diagram illustrating an IP packet according to RFC791 stipulation; FIG.4 is a diagram illustrating an IP packet according to RFC1883 stipulation; FIG.5 1s a block diagrain systematicaLly illustrating the basic principle of the present invention; FIG.6 is a block diagram illustrating an exaffple of a network wherein an ICS according to the present =n--nti-on ls constructed of a plurality of VANS; FIG.7 is a block diagram illustrating an example of configuring the access control apparatus; FIG.8 is a block diagrain illustrating an example of configuring the relay apparatus; FIG.9 is a block diagram illustrating an ale of config=ing the inter-VAN gateway; 7 FIG. 10 is a block diagram illustrating an example of configuring the ICS network server; FIG-11 is an array diagram illustrating an example of the ICS user address used in the present invention; FIG-12 is a wiring diagram illustrating the connection relation between the ICS logic terminal and user co=rdcatim line; FIG.13 is a diagram illustrating the relation between the ICS user packet and the ICS network packet, used in the present invention; FIG.14 is a portion of a constructional block drawing illustrating a first embodiment (intra-corporat:ion mmmicatj-m, inter-corPoration ccmuziication) according to the present invention; FIG.15 is a portion of a constructional block drawing illustrating a first embodiment according to the present irmention; FIG. 16 is a diagram to show an example of a cmversion table; FIG.17 is a diagram to show an example of a temporary cmversion table; FIG.18 is a flowchart illustrating an example of operation of the access control apparatus; FIG.19 is a flowchart illustrating an example of operation of the access control apparatus in inter-corporation conTunication; FIG.20 is a constructional block drawing illustrating a second embodiment (virtual dedicated line) according to the present invention; FIG.21 is a diagram to show an example of the conversion table; 8 FIG.22 ls a flowchart illustrating an example of operation of the access control apparatus in virtual dedicated line connection; FIG.23 is a diagram to show an example of format of NSAP type ATM address; FIG.24 is a diagram to show an information unit of ATM cell type; FIG.25 is a diagram to explain cmversion/restoring operation between ICS network packet and CPCS packet; FIG.26 is a diagram to explain dissolution/asseffibly between CKS frame and cell; FIG.27 is a portion of a constructional block showing a Yd entxxbHP-nt (embodt using ATM network) according to the present invention; FIG.28 is a portion of a constructional block showing a Yd embodiment according to the present invention; FIG. 29 is a diagram to show an example of an ATM address conversion table and a VC address cmversion table; FIG - 30 is a diagram to show an example of an ATM address conversion table and a VC address conversion table; FIG. 31 is a flowchart to show a flow of packet using SM and]PVC; FIG. 32 is a flowchart to show a flow of packet using SM and WC; FIGs. 33 and 34 are block diagram to show l:N cammmication or N:1 ccmmnicatim using PVC; 9 FIGs.35 and 36 are block diagrams to show N:N ccmainicati-m using PVC; FIG. 37 is a diagram to show an example of FR frame address portion; FIG. 38 is a diagram to show a variation between Ics network packet and FR frame; FIG. 39 is a portion of a constructional block shg a fourth mbmbiwnt (anbod2t using FR network) according to the present i=ention; FIG - 40 is a portion of a constructional block showing a fourth embodwent according to the present invention; FIG.41 is a diagram to show an example of an FR address conversion table and a MC address conversion table; FIG. 42 is a diagram to show an example of an FR address conversion table and a MC address conversion table; FIG. 43 is a flowchart to show a flow of packet using SM and PVC; FIG.44 is a flowchart to show a flow of using SVC and PVC; FIGs.45 and 46 are block diagrams to show l:N cen=mication or N:1 cammication using PVC; FIGs.47 and 48 are block diagrams to N:N cmication using PVC; FIG.49 is a portion of a constructional block shg a fifth wbodiment(ac=tion of telephone line, ISDN line, CATV line, satellite line, M line, cellular phone line) according to the present invention; FIG.50 is a portion of a constructional block showing a fifth embodiment according to the present invention; FIG.51 is a portion of a constructional block showing a fifth embodiment according to the present invention; FIG.52 is a portion of a constructional block showing a fifth entxxlurmt according to the present invention; FIG.53 shows an example of the conversion table; FIG. 54 is a flowchart to show an operation of a fifth entx:)t; FIG. 55 is a portion of a constructional block showing a sixth embodiment according to the present invention; FIG. 56 is a portion of a constructional block showing a sixth embodiment according to the present invention.
FIG. 57 is a portion of a constructional block showing a sixth entxxlurent according to the present invention; FIG. 58 is a diagram to show an example of description of router table in a cli al -up router;
FIG.59 is a flowchart to show an operation of a sixth embodiment; FIG. 60 is a constructional block showing a seventh embodiment (ICS address administration server) according to the present invention; FIG.61 is constructional block showing an eighth ent)odiment (full-duplex c=unication including a satel 1 i te, ccmmmicatim 11 path) according to the present invention; FIG - 62 is a timing chart to show an example of qperation of a fl., 11 - duplex ccrm-unication by TCP; FIG.63 is a timing chart to explain an eighth embodiment; FIG.64 is a timing chart to explain an eighth embodiment; FIG.65 is a timing chart to explain an eighth embodiment; FIG.66 is a constructional block shg a variation of an eighth embodiment; FIG.67 is a timing chart to show an operation of a ninth ent)odiment(full- duplex communication including a satellite commiunication path) according to the present invention; FIG.68 is a timing chart to explain a ninth embodinmt; FIG.69 is a timing chart to explain a ninth entx)din-ent; FIG - 70 is a timing chart to explain a tenth embodit; FIG.71 is a timing chart to explain a tenth effbodirwnt; FIG.72 is a timing chart to explain an eleventh entxxlt; FIG.73 s a constructional block showing a twelfth effbodiment (fi,l 1 - duplex c=amication path) according to the present invention..
FIG. 74 is a timing chart to show an operation of a twelfth embodiment; FIG.75 is a constructional block to show a variation of a twelfth effbodinlent; FIG.76 is a diagrwn to show an example of WP frame; FIG.77 is a diagram to show an example of IMP frame; FIG.78 is a portion of a constructional block showing a 12 thirteenth wbodiment (control of receiving priority degree) according to the present invention; FIG. 79 is a portion of a constructional block showing a thirteenth ent)odiment according to the present invention; FIG. 80 is a portion of a diagram to explain a thirteenth embodiment; FIG - 81 is a portion of a diagram to explain a thirteenth embodiment; FIG.82 is a flowchart to show an operation to decide a degree of Priority; FIG. 83 is a constructional block showing a 14th embodiment (control of transmitting priority degree) according to the present invention; FIGS.84and 85 are diagrams to show an example of a conversion table using in a 14t2' enbodiment; FIG.86 is a flowchart to show an operation of priority decision:In a 14th embodiment; FIG.87 is a constructional block showing a 15th entxxUmnt (multiplex ccmminication) according to the present invention; FIG. 88 is a diagram to show an example of a conversion table using in a 15th embodiment; FIG.89 is a diagram to show an example of a conversion table using in a 15th embodiment; FIG.90 is a constructional block to show a variation of a 15th embodiment; 13 FIG.91 is a portion of a constructional block showing a 16th embodiment (operation of ICS) according to the present invention; FIG.92 is a portion of a constructional block showing a 16th embodiment according to the present irmention; FIG. 93 is a diagram to explain a 16th embodiment; FIG.94 is a diagram to explain a 16'd' embodiment; FIG. 95 is a diagram to explain a 16t1' embodiment; FIG.96 is a diagram to explain a 16th embodiment; FIG.97 is a diagram to explain a 16th embodiment; FIG.98 1s a diagram to explain a 16th embodiment; FIG.99 is a diagram to explain a 16th embodiment; FIG.100 is a diagram to show an example of an ICS network address apprDpriation record table using in a 16th embodiment; FIG. 101 is a diagram to show an example of an ICS user address appropriation record table using in a 16th embodiment; FIG.102 is a diagram to show an example of a conversion table using in a 16th embodiment; FIG.103 is a diagram to show an example of a cormersion table using in a 16t1' embodiment; FIG.104 is a diagram to show an example of a conversion table using in a 16th embodiment; FIG.105 is a procedure chart to explain a 16'dembodiment; FIG. 106 is a diagram to show an example of a conversion table using in a 16th embodiment; FIG. 107 is a procedure chart to explain a 16th admffixwnt; 14 FIG. 108 is a diagram to show an example of a conversion table using in a 16t1' embodiment; FIG.109 is a diagram to explain a domain name server; FIG.110 is a diagram to explain a domain name server; FIG. 111 is a diagram to explain a domain name server; FIG. 112 is a diagram to explain a domain name server; FIG.113 is a diagram to explain a call of a domain name server; FIG. 114 is a diagram to explain re-writing of a conversion table frcxn an IP terminal; FIG. 115 is a diagram to explain re-writing of a conversion table from an IP terminal; FIG.116 is a constructional block showing a 17' embodiment (CaLl-ing of a communicator by telephone number) according to the present invention; FIG.117 is a diagram to show an example of a conversion table; FIG.116 is a diagram to explain an 17' embodiment; FIG.118 is a diagram to show an example of an inner table using in a 17'd' embodiment; FIG. 119 is a diagram to show an example of an inner table using in a 17'u' embodiment; FIG. 120 is a diagram to show an example of an inner table using in a 17th embodiment; FIG.121 is a diagram to explain a call of a domain name server; FIG.123 is a portion of a constructional block showing a 18th embodiment (IP terminal to be connected with plural access control appar-atuses) according to the present invention; FIG.124 is a portion of a constructional block showing a 18h embodiment according to the present invention; FIG.125 is a diagram to an example of a verifying server; FIG. 126 is a diagram to show an example of a conversion table; FIG.127 is a timing chart to explain register procedure fran a hcm IP temninal; FIG.128 is a diagram to explain an accessing method of an verifying server; FIG. 129 ls a diagram to show an example of an inner table using in a 18th embodiment; FIG.130 is a diagram to show an example of an inner table using in a 18t" embodiment; FIG. 131 is a diagram to show an example of an inner table using in a 18th embodiment; FIG. 132 is a block diagram to show a call of an verifying server; FIG.133 a portion of a constructional block diagram illustrating a 19111 embodiment (closed-zone network communication and open-zone mt, Ltazxication used network discriminator) according to the present invention; FIG.134 is a portion of a constructional block diagram illustrating a 19'k11 embodiment according to the present invention..
FIG.135 is a portion of a constructional block diagram illustrating a 19P1 embodiment according to the present invention; 16 FIG. 136 is a portion of a constructional block diagram illustrating a 19th embodiment according to the present invention; FIG. 137 is a diagram to show an example of a conversion table used in a 19th embodiment; FIG.138 is a diagram to show an example of a conversion table used in a 19th embodiment; FIG.139 is a diagram to show an example of a conversion table used in a 10' embodiment; FIG.140 is a diagram to show an exarrple of a conversion table used in a 19th embodiment; FIG - 141 is a flowchart to show an example of an operation of a 19th embodiment; FIG.142 is a flowchart to show an exarrple of an operation of a 19"h embodiment; FIG.143 is a portion of a constructional block diagram ilIustrating a 20th embodiment (IP terminal to be connected with plural access control apparatus having network identifier) according to the present invention; FIG.144 is a portion of a constructional block diagram il.lustrating a 20t" embodiment according to the present invention; FIG.145 is a diagram to show an example of a verifying server used in a 20u' effbodimant; FIG.146 is a diagram to show an example of a conversion table used in a 20th embodiment; FIG.147 is a signal flowchart to explain an operation of a 20th 17 embodiment; FIG. 148 is a diagram to explain a 20t" embodiment FIG. 149 is a diagram to explain a 20t" embodiment FIG. 150 is a diagram to explain a 20t" embodiment; FIG.151 is a diagram to explain a 20th embodiment; FIG.152 is a diagram to explain a 20th embodiment; and FIG.153 is a diagram to explain a 20th embodiment.
DESMIPTIM OF M PREFERRM MMI14aM FIG.5 systematica:Lly illustrates the basic principle of the present invention, wherein the integrated information cemamication systefn (hereafter referred to as ', ICSn) 1 according to the present invention has self -appointed address providing niles as a computer information/cammunication address. i.e., the systegn has a unique address system ADS, and has access control apparatuses (2 through 7 in the present example) which serve as access points for connecting a plurality of mqmter ccnmmicatim networks or information mmiunication equipments, e. g., a great number of LANs (in the present example, corporation X s LAN- Xl, LAWX2 and LAWX3, and corporation Y' s LAWY1, LAWY2 and LAWY3). Here, corporation X' s IAN-Xl, LAWX2 and LAN-M have the same address system ADX, and corporation Y ' s LAWY1, LAWY2 and LAWY3 have the same address system ADY. The access control apparatuses 2, 3 and 4 have conversion tables for admmistrating mutual conversion between the address system ADS and the address system ADX. The access control apparatuses 5, 6 and 7 18 have conversion tables for administrating matual conversion between the address system ADS and the address system ADY. The cmWter cammmication data (ICS packet) within the ICS 1 uses addresses according to the address system ADS of the ICS 1, and performs IP ccmnmicatim such as is used m the Internet.
Now, description will be made regarding the operation in the case of camunication within a single corporation. The mriputer conTunication data (ICS packet) 80 transmitted from the LAN-Xl of the corporation X is provided with addressing following the address system ADX, but is subjected to address conversion following the address system ADS under administration of the conversion table of the access control apparatus within the ICS 1, and beccmes ICS packet 81. This is then sent within the ICS 1 following the rules of the address system ADS, and upon reaching the destination access control apparatus 4, is restored to the cmWter camimication data 80 of the address system ADX under the administration of the conversion table thereof, and is sent to the LAN-M within the same corporation X. Here, the ICS frame being sent and received within the ICS 1 is referred to as an ICS network packet, and the ICS packet being sent and received outside of the ICS 1 is referred to as an ICS user packet. The ICS user packet is such as stipulated by the Internet protocol RFC791 or RFC1883 as a rule, but dealing with ICS packets which do not follow this rule will be described later in conjunction with description of another embodiment.
The ICS network packet 81 is ccnprised of a network control 19 field 81-1 and a network data field 81-2, with the network control field 81-1 storing the addresses (address system ADS) of the access control apparatuses 2 and 4 therein. The ICS user packet is either used as the network data field 81-2 with no change to the data value thereof, or is subjected to data format conversion following stipulations determined within the ICS 1 and is used as network data field 81-2. An example of the data format conversion stipulations might be cmversion to ciphertext or data compression, and the access control apparatus 2 may be provided with ciphering neans, deciphering neans for returning the ciphertext to the original pL-:dn-text, data caLpiesslon neans, and data decenpression mans for returning the carpressed data to the original data. In the access control apparatus 2, the ICS user packet 80 is used as the ICS network packet 81-2, and each of the operations of adding the network control field 81-1 to the ICS network packet 81-2 are referred to as 'ICS encapsulationw. Also, in the access control apparatus 4, the operations of removing the network control field 81-1 from the ICS network packet 81 are referred to as 11ICS reverse encapsulationn.
Now, des=ption wrill be made regarding the operation in the case of comm=ilcation between corporations. The mrputer =winication data (ICS user packet) 82 transmitted from the LAN-Y2 of the corporation Y is provided with addressing following the address system ADY, but is subjected to address conversion following the address system ADS under administration, of the conversion table of the access control apparatus 6 within the ICS 1, and be=ms ICS packet 83.
This is then sent within the ICS 1 following the rules of the address system ADS, and upon reaching the destination access control appanatus 3, is converted to the ccnWter canTenication data 82 of the address system ADX under the ad=istration of the conversion table thereof, and is sent to the LAWX2 within the corporation X. While address lengths of 32 bits and 128 bits are used in the present invention, the present invention is by no neans restricted to these. Even if the length of the addresses are changed to such other than 32-bit or 128bit, this does not change the principle of address conversion which is the prJnciple idea of the present invention.
Thus, according to the present invention, both intra-corporation and inter-corporation cter camunications are enabled by unified address administration by the ICS 1. Generally used user terminals for cter camunications are incorporated within the LAN within the structure of the user, and incorporated within the VAN (Value Added Network) via access Line, and user data packets are sent which have differing data formats anddiffering address system for each type of service. For example, an IP address Is used for Internet services, a telephone number/ISDN number (E. 164 address) for telephone services, and an X.121 address is used for X. 25 packet services. Conversely, according to the ICS 1 of the present invention, address conversion is performed with the conversion table of the access control apparatus based m the input ICS user packet, thus realizing sending of information frames of data of varied structures unified under a single data fonnat and address system, i.e., converted to ICS packets.
21 FIG. 6 schematically illustrates an example wherein the ICS 1 of the present invention is cauprised of a plurality of VANs (VAN- 1. VAN2, VAN3), with each VAN being administered by a VAN operator. An ICS 1 user applies to the VAN operator for a user communication line, and the VAN operator decides the ICS address and ICS network address for the user and registers this information with the circuit type in a conversion table 12 within the access control apparatus 10 such as shown in FIG.7. The ICS 1 has as access points serving as external connection elements with the LANs (or terminals) of the corporations X and Y the access control apparatuses 10-1, 10-2, 10-3, 10-4 and 10-5, as shown in FIG.7., and further has relay apparatuses 20-1, 20-2, 20-3 and 20-4, and also ICS network servers 40-1, 40-2, 40-3, 40-4 and 40-5, as well as ICS address administration servers 501 and 50-2. A relay apparatus 20 such as shown in FIG.8 is provided to the conminication path within each of the VANs, and an inter-VAN gateway 30 such as illustrated in FIG.9 is provided as the connection element of VAN-2 and VAN-3. The LANs 1-1, 1-2, 1-3 and 1-4 are respectively connected to the access control apparatuses 10-1, 10-5, 10-4 and 10-2, via the user communication lines 36-1, 36-2, 36-3 and 36-4.
The access control apparatus 10 (10-1, 10-2, 10-3, 10-4 and 105) are devices containing the user cominication lines from the user (corporations X and Y) to the ICS 1, and as shown in FIG. 7, is comprised of a processing device 11 canprIsed of a CPU or the like, a conversion table 12 serving as a database for performing address conversion and the like, an input/output interface line portion 13, 22 and a temporary conversion table 14. Also, the relay apparatus 20 has network Packet transferring functions and path specification routing functions, and as shown in FIG.8 has a processing device 21 ccffprised of a CPU or the like and a conversion table 22, the omversion table 22 being used for detemining the ccffffunicatim destination when the ICS network frame is transferred within the ICS 1. The Inter-VAN gateway 30 has a processing device 31 ccffp=ed of a CPU or the lik and a relay table 32 for determining where to send ICS network packets between VANs, as shown in FIG.5.
As shown in FIG.10, the ICS server 40 Is ccnprised of a processing device 41 and an ICS network database 42, the usage of the ICS network database 42 not being restricted. Examples of this usage include: user-specific data corresponding with the ICS address (such as the name or address of the user), data not corresponding with the ICS address, such as data indicating the state of c=unication trouble within the VAN, or data not directly related to the VAN, such as an electronic library which maintains and discloses digital documents, public keys for a public encryption system using encryptlon technology employed in verifying the authenticity of the sender and receiver, and maintaining data such as public proof data and related data or secret keys for a secret encryption system and related data. The processing device 41 refers to the ICS network database 42, and obtains corresponding data and sends the data to the access control apparatus 10. Further, not only does the ICS network database 42 operate in stand-alone manner, but also is capable of camnmicating with other Ics network servers and obtaining data therefrern, by mans of sending and receiving ICS network frames based on IP cmication technology. Within the ICS, the ICS network server is the only catponent provided with an ICS network address.
According to the present invention, the address used to identify ccxtpaters, terminals and the like used within the ICS net packet is referred to as an ICS network address, and the address used to identify the cmWters, terminals and the like used within the ICS user packet is referred to as an ICS user address. The ICS network address is used only within the ICS, one or both of the two types being used; 32-bit and/or 128-bit. Sind-larly, the ICS usex address uses one or both of the two types; 32-bit and/or 128-bit. The access control apparatus 10, the relay apparatus 20, the VAN gateway 30 and the ICS network server are arranged so as to be provided each with an ICS network address so as to be uniquely identified. Also, the ICS user address is formed of a VAN upper code and VAN internal code. With the length of the VAN upper code being represented as Cl bits and the length of the VAN internal code being represented as C2 bits, the ICS user address is used such that the total of Cl + C2 equals either 32 bits or 128 bits.
In the present invention, no particular method for deciding the VAN upper code and VAN internal code is stipulated, but In the case of Cl + C2 m 32 bits, the following example can be given for a method for deciding such:
24 VAN upper address = district administration codeWbit) 11country code(4bit) 11VAN code(8-bit) VAN internal code = VAN district codeWbit) 5VAN access point (8-bit) lluser logic (4-bit) FIG.11 makes description thereof using an example of an ICS user address. Here, the symbol na 11bn indicates Linkage of data %aw and "b", i.e., data obtained by means of arrayed data "au and %bw in this order. The ICS network address can be provided with locality in the same mamer as with the user network address. That is,
ICS network address = district administration code 11 country code 11 VAN code 11 VAN district code 11 user logic communications 1.ine code Thus, the relay apparatus can efficiently find the transfer destination by means of deciding the transferring destination with consideration to the district. The address can be determined in the same way in the case of Cl + C2 = 128 bits, as wel-1. Incidentally, with the present irmmtim, the ICS frame can be constructed as described later, as long as Cl + C2 - 32 bits or Cl + C2 = 128 bits is kept, regardless of how the field sections for the VAN upper code and VAN internal code are made, or the length of each of the sections.
A-1so, when deciding the VAN upper code and VAN intemal code, Part of these codes niay be made to be unique to the user. That is, the user can make a user-specific address systern. The address values within a 32 bit address value are from address 0 to address (22 -1), the present invention is carried out by providing an address decided uniquely to the user within the range of address 10 x 224 to address (10 x 224 + 224 -1), i.e., address (172 x 224 + 16 x 216) to address (172 x 224+ 32 x 216 -1) or address (192 x 224+ 168 x 216) to address (192 x 224+ 169 x 216 -1).
A physical camn=cation line can be separated into a plurality of camnmication lines and used, this being realized in conventional art as frame relay (FR) nultiplex conmimication method, for example. According to the present invention, the user' s cannunication line is separated into a user physical c=unication line and one or rnore user logic cannmication lines. FIG.12 illustrates an exaffple of the above, wherein a user physical c=mication line 60 is separated into two user logic cenviunication lines 61-1 and 61-2 of the commmication rate 50 Mps. Also, separate mTiputer ccnmrlicatim apparatuses 62-1, 62-2, 62-3, and 62-4 are each connected to respective user logic catcation lines, and the ICS user addresses R4123,0025,0026,4124' are provided to each of the cter comninication apparatuses 62-1 through 62-4. The user physical canninication line 60 is connected to the access control apparatus 63, and the point of contact between the two is called nICS logic tenninal". The ICS logic tendnal is provided with an only ICS network address within the ICS. In the exarnple shawn in FIG.12 user logic ocmnmicatim 1 61-1 and 61-2 26 are connected to the access control apparatus 63, and ICS network addresses n8710n and n8711n are provided to the contact point ICS logic terndnals 64-1 and 64-2, respectively.
As described above, the ICS network server 40 is also provided with an only ICS network address, so that the ICS network address can determine that the ICS logic tenninal or the ICS network server Is the only one within the ICS. The ICS network server is capable of exchanging information with other ICS servers by means of sending and receiving ICS network packets provided with each other' s ICS network addresses, using the IP cnication technology. This function is referzed to as HICS network server ccmnzdcatim functionR. The access control apparatus is also provided with an only ICS network address within the ICS, and is capable of exchanging infonmtim with other ICS servers by means of the ICS network server cammication function. The ICS network server ceminication function is realized bY using conventional TCP or UDP(User Datagrarn Protocol) technology.
There are two types of ICS packets in the present invention, as described earlier, the ICS network packet which is sent and received within the ICS, and the ICS user packet which is sent and received outside of the ICS. Each packet is ccnprised of a control field and a data field, and, as shown in FIG.13, the packets are ccnprLsed of a network control field, a user control field, a network data field and a user data field, so as to allow usage by ICS encapsulation and ICS reverse encapsulation. That is, when the ICS user packet enters the ICS fran the access control apparatus, the ICS user packet becams
27 m,,-rt- of the data of the ICS network packet, and the control field of the ICS network packet (network control field) is added thereto (ICS encapsulation). The network control field is divided into a basic field and an external field. The basic field is used as a header of RFC791 or RFC1833 stipulation and the external field 1s used for ciphering or the like.
Inside the network control field of the ICS packet is placed a range for storing the sender' s address and the intended receiver' s add s. There are two types of ICS packets, those with a 32-bit address length and those with a 128-bit address length, with a packet format being employed according to the RFC791 stipulation shown in FIG.3, for example. In the event that 32 bits is insufficient for the ICS network address, for example, in the event that a 64-bit address is to be used, following the RFC791 stipulation, the lacking 32 bits (64 bits - 32 bits) are written into the option portion of the ICS network packet control field, thus making the network address usable at 64 bits. Now, supplemental description wil.1 be made regarding the aforementioned user-specific address. In the event that a great number of users have a private address (a type of ICS address) in the section between (10 x 22A) and (10 x 224 + 224 - 1) for example, in the case that the length of the ICS user address is 32 bits, the 32 bits is insufficient for the ICS network address, since the ICS network address is provided corresponding to the ICS user address, and 64 bits is required, for example. In this case, as described above, the la:king 32 bits are written into the option portion of the ICS network
28 packet control field, thus making the network address usable at 64 bits.
The fact that communication between the same user (called ', intracorporation cammunicationn) is possible using a private address will be described in the first embodiment. Also, in the event that the address length is 128 bits, the present embodiment is carried out following packet format according to the RFC1883 stipulation such as shown in FIGA, for example. The transmitting address range within the network control field, and the address stored in the destination address are made to be ICS network addresses, each respectively being the transmitting ICS network address and the receiving ICS network address. Further, the transmitting address range within the user control field, and the address stored in the destination address are made to be ICS user addresses, each respectively being the sender ICS user address and the receiver ICS user address.
Incidentally, there is no need to following the RFC791 or RFC1883 stipulation for the ICS packet format in carTying out the present invention; the present invention can be carried out as long as the packet format is such that uses addresses of 32 bits or 128 bits in length. Generally, ICSs receives ICS user packets stipulated by RFC791 or RFU883, but other packet formats can be handles within the ICS network by converting to ICS user packets with conversion means.
Embodiment-1 (Basic ICS, intra-corporation ccmnnication and intracorporation canrunication):
29 A first embodiment of the present invention will be described with reference to FIGs.14 and 15, regarding basic camunication wherein the transfer destination within the ICS is determined fran the z eiver' s ICS user address, based on administration by a conversion table. In the figures, 170-1, 170-2, 170-3 and 170-4 respectively gateways provided within the LANs 100-1, 100-2, 100-3 and 100-4, and the ICS packets can pass through these gateways 170-1 through 1704.
First, description will be made regarxbng ommmication between a terminal which is connected to LAN 100-1 of a corporation X which has a unique address system ADX, and a terminal which Is connected to LAN 100-2 of the same corporation X. That is, this is c=runication between a terminal which has an ICS user address '0012n on the LAN 100-1, and a tenninal which has an ICS user address "003C m the LAN 100-2. This communication is typical of c=unication made between terminals which have set addresses based m a unique address system within a single corporation (ADX in this example), the camwmcation being made via the ICS 100 in an interactive manner. This type of c=amication is referred to as intra-corporation comamication service (or intra-corporation cammunication) - Next, description will be made regarding cainunication between a tenninal which is connected to LAN 100-1 of a corporation X which has a unique address system ADX, and a terminal which is connected to LAN 100-3 of a corporation Y which has a unique address system ADY. That is, this Is ccmmnication between a terminal which has an ICS user address n0012n m the LAN
100-1, and a terminal which has an ICS user address "1156n on the LAN 1003. This comffunication is typical of c=unication made between teminals which have different address systems w-Lthin different corporations, the commication being made using an ICS address system which can be shared between the two. This type of camn=cation is referred to as intercorporation ccffnmication service (or intercorporation camunication). <<Cmmn preparation>> In describing the present embocbzmt, the address format and so forth is determined as described below, but the specific nume=c values and formats are all but an example, and the present invention is by no means Limited to these. The ICS network address is represented by a 4- digit number, and the sender ICS user address and the receiver ICS user address are both represented by a 4-digit number. Of the sender ICS user address and the receiver ICS user address, addresses of which the upper two digits are not nOOR are used as inter-corporation camnnication addresses, and these inter-corporation camnmication addresses are an only value within the ICS 100. Of the sender ICS user address and the receiver ICS user address, addresses of which the upper two digits are ', 00n are used as intra-corporation cammunication addresses, and these intra- corporation communication addresses may be duplicate of other intra- corporation canrunication addresses within the ICS 100. The ICS address administration server 150-1 is capable of uniquely identifying the inter- corporation caunmication addresses. Also, the conversion table 113-1 provided to 31 the access control apparatus 110-1 contains the follg: originating ICS network addresses, receiving ICS network addresses, sender ICS network addresses, receiver ICS network addresses, request identification, speed segments and so forth. The request identification registered to the conversion table 113-1 is such that, e.g., "l" represents intra- corporation camunication service, ', 2n represents inter-corporation canmnication service, and "3N represents virtual dedicated Line connection. The speed segment is the line speed that the cnication fram the ICS network address requires, including throughput (e.g., the number of ICS packets sent within a certain amount of time). <<Preparation for intra-corporation mm=cation>> The users of LAN 100-1 and LAN 100-2 specify the terminal and apply to a VAN operator in order that the intra-corporation communication of the terminals connected to the LANs can perform communication via the VAN-1 and VAN-3. The VAN operator responds to the application and sets the aforementioned ICS network address, ICS user address, request identification number. etc. to the conversion tables of the access control apparatuses 110-1 and 110-5 connected to the LAN 100-1 and LAN 100-2.
The items to be set for the VAN- 1 are as follows. The ICS network address is decided by the ICS logic tennuial of the access control apparatus 110-1 to which the LAN 100-1 is comected, with the ICS network address of the ICS logic terminal in this case being set as "7711". The intra-corporation ccnvunicatiM address Of the 32 terminal connected to the LAN 100-1 from which the application was made Is set as ', 0012", and this is used as the sender ICS user address. The intra-corporation camunication address used by the terminal of the address is set as ', 2212n, and this is used as the sender ICS user address. Nwft, the intra-corporation commnication address of the terminal connected to the LAN 100-2 from which the application was made is decided by the ICS logic terminal of the access control apparatus 110-5 to which the LAN 100-2 is connected, in this case the ICS network address being set as "9922-, and this is used as the receiving ICS network address. Further, the ICS user address used by the terminal connected to the LAN 100-2 is set as '003C, and this is used as the receiver ICS user address. The number %ln is set as the request identification, indicating the intracorporation coffimunication service that was applied for, and the above is registered to the conversion table 113-1.
The items to be set for the VAN- 3 are as follows. Values necessary for reverse cmrmication (cwmanication fram LAN 100-2 to LAN-1) are set to the conversion table of the access control apparatus 110-5 connecting the LAN 100-2 fran which application was made. That is, data is set reverse to the transmitting ICS network address and the receiving ICS network address, and at the same tima, data is set reverse to the sender ICS user address and the receiver ICS user address. The ICS network address of the LAN 100-2 is set as "9922-, and this is used as the transmitting ICS network address. Numeral n0OW' is set as the sender ICS user address for the intra-corporation 33 A ICS user address of the terminal connected to the LAN 100-2, and the ICS user address "0012n of the terminal of the other party is used as the receiver ICS user address. Also, the ICS user address ', 7711H of the LAN 100-1 is used as the receiving ICS network address and the value 1- is set as the request identification, indicating intracorporation canmmication services. The above is written to the conversion table of the access control apparatus 110-5 and registered. <<Operation of intra- corporation camiunication>> Regarding c=unication between a terminal connected to LAN 100- 1 and having a sender ICS user address ', 0012n, and a terminal connected to LAN 100-2 and having a receiver ICS usw address "0034-, the sender ', 0012n sends an ICS user packet to the receiver "003C. This ICS user packet has set as the sender ICS user address "0012-, and as the receiver ICS user address has set "0034n, and the terminal with the ICS user address ', 0012n perform sending thereof.
The operation will be explained with reference to a flowchart in FIG.18. The conversion table 113-1 is shown in FIG.16 and the trary conversion table 114-2 is shown in FIG.17.
The ICS user packet P1 is sent via the user logic cannmication line 180-1, and transferred to the access control apparatus 110-1 as the ICS user packet Pl. The access control apparatus 110-1 refers to the conversion table 113-1 fran the transmitting ICS network address "7711"(Steps S100 and S101) and the receiver ICS user address "0034w of the received ICS user packet, and knows that the c=nunication is an intra- corporation canmication from the request identification 34 value ', 1" obtained at the same time(Step S102). Then, the receiving ICS network address "9922w corresponding to the sender ICS user address -0034- is obtained (Step S103) and is ICS-encapsulated (Step S106). The above procedures illustrated in a flowchart are as shown in FIG.18, with the intra-corporation being flow (1) C-ie. The sender ICS user address may be used to specify a source of the ICS packet.
The access control apparatus 110-1 performs the ICS encapsulation, forming the ICS network packet P2 which is sent to the relay apparatus 120-1. Since the ICS network address of the network field is ensured of its uniqueness within the ICS, there is no conflict with other ICS packets. The ICS network packet P2 passes through the relay apparatus 120- 1 and 120-2 based on the receiving ICS network address, and reaches the access control apparatus 110-5 of the VAN-3. The access control apparatus 110-5 removes the network control field fran the ICS network packet P4 and performs ICS reverse encapsulation, and re-creates a user data packet P5 which is the same as the ICS user Packet P1 frern the network data field of the ICS packet, and sends it to the LAN 100-2. The ICS user packet is routed through the LAN 1002, and is transferred to the terminal which has the ICS user address R00340. <Oreparation for inter-corporation cmminication>>
As an example of performing inter-corporation communication, the conTamicatim between a terminal which has an ICS user address R00120 and is connected to a LAN 100-1 following address system ADX, and a 46 terminal which has an ICS user address 1156 n and is connected to a LAN 100-3 following address system ADY, will be described. The users of the LAN 100-1 and LAN 100-3 specify the terminal to the vAN each is connected to so as to be able to perform the ccmmnicatim via VAN1 and VAN-2, and make application to the vAN operator. The vAN operator sets the necessary item in the conversion table of the access control apparatus which is connected to the LAN 100-1 and LAN 100-3, in accoce with the application.
The items to be set regarding VAN-1 are as follows. The ICS network address of the LAN 100-1 is made to be "7711R, the intracorporation cammication. address held by the terminal comected to the LAN 100-1 from which there was application is made to be '10012-, and this is made to be the sender ICS user address. The intercorporation communication address provided to the tenninal of the above ICS user address made to be "2212n, and this is made to be the sender user address (inter-corPoration). The ICS network address is determined by the ICS logic terminal of the access control apparatus 110-4 connected to the ICS network address of the LAN 100-3 from which there was application, the ICS network address here being "8822n, cand this is Made to be the receiving ICS network address. Also, the ICS user address of a terminal connected to the LAN 100-3 is made to be 115C, and this is made to be the receiver ICS user address. Further, a value "2n is set as the request identification, indicating the inter-corporation cmication, service that was applied for, and the above is registered to the conversion table 113-1.
1 1 36 The item to be set regarding VAN- 2 are as follows. As a conversion table for the access control apparatus 110-4 to which the IAN 100-3 is connected, a temporary conversion table 114-2 which holds reverse data for a certain time, e.g., 24 hours, is set. That is, regarding the ICS network address ', 8822" to which is connected the LAN 100-3 which uses the inter-corporation ccmmication service, the following are provided within the access control apparatus 110-4: a transmitting ICS network address, a sender ICS user address, a receiver ICS user address, a receiving ICS network address and trary conversion table 114-2 which includes a request identification and so forth. <<Operation of inter-corporation ccmnmicatim>> A terminal having an ICS user address ', 0012" sends an ICS user Packet Fl wherein the sender ICS user address is set as "0012' and the receiver ICS user address is set as ', 115C as. The ICS user packet Fl is transferred to the access control apparatus 110-1 via the user logic mnamications line 180-1.
The access control apparatus 110-1 refers to the conversion table 113-1 from the originating ICS network address ', 7711" of the LAN 100-l(Steps S100 and S101) and the receiver ICS user address '1156 and knows that the request identification value is '2n, i.e., this ccnua=cation is an inter-corporation c=unication (Step S102). The receiving ICS network address corresponding to the receiver ICS user address '1156w is known as "8822"(Step S104), and then the sender ICS user address ', 0012R is converted into an inter-corporation 37 46 OWILIM cation address 2212"(Step S105). The access control apparatus 110-1 adds a network control field, frcm the obtained transmitting ICS network address ', 7711', the sender ICS user address ', 2212m, the receiver ICS user address ', 1156R and the receiving ICS network address "8822n, and performs the ICS encapsulation, forming the ICS network packet F2 which is sent to the relay apparatus 120-1(Step S106). The above procedures are illustrated in a flow (2) in FIG.18.
In the above inter-corporation cammication, in the event that the sender ICS user address within the ICS user packet Fl is made to be the inter-corporation camnmication address ', 2212%, the sender and the receiver perfonn the inter-corporation cemmmicati-on using an intercorporatlon camunication address(Steps S102 and S104). In this case, the access control apparatus 110-1 does not perfonn the process of converting the sender ICS user address "2212R into the intercorporation comumication address ', 2212', as such is not necessary. The above procedures are illustrated in a flow (3) in FIG.18. The sender ICS user address may be used to specify a source of the ICS packet - The relay apparatus 120-1 transfers the ICS network packet to the access control apparatus 110-4 within the VAN-2 via the relay )aratus 120-2 within the VAN-1, the inter-VAN gateway 130 and the relay apparatus 120-3 within the VAN-2, based m the receiving ICS network address. The operation will be expla with reference to FIG.19. The access control apparatus 110-4 receives the ICS network packet(Step S110), creates an ICS usex packet F5 from the network data 1 I 1 38 field(Step Sill: ICS reverse encapsulation), and decides fran the receiving ICS network address the logic terminal for sending((1) of Step S112) and sends it to the LAN 100-3(Step S113). At the same time, in the event that the relation among the transmitting ICS network address "8822', the sender ICS user address 1156n, the rver ICS user address "2212w and the receiving ICS network address "7711- is not registered in the conversion table within the access control apparatus 110-4, a value "2w of the request identification, i.e., a designation of the inter- corporation ccnTmmication is set to the tenporary conversion table 114- 2((2) of Step S112). The registration contents of the trary conversion table 114-2 are updated according to processes such as the contents being deleted if there is no usage thereof for 24 hours. The ICSuser packet is routed through the LAN 100-3, and is transferred to the terminal having the ICS user address
1156R. In a case that the colum of the sender ICS user address in the conversion table 114-2 is separated as 'intra-corporationw and "intercorporatim" of the conversion table 113-1, e.g., in the case that '1159m is described in the conversion table as the sender ICS user address "11590 which is described at the address colizm of user control field of ICS user packet just after the ICS reverse encapsulation is processed. Then, the process in whIch the address of the user control field is rewritten to %0023w is added to the process of the Step S112(1). As described above, although the ICS user address "00230 for the intra- corporation c=unication is used within LAN, the ICS '1159w for the corporations outside LAN. In another entxxbn.L-nts,
39 the values are not set in the temporary conversion table. Further, in another enbodinients, the cmversion table 113-1 does not include the sender ICS address (intra-corporation) and the sender ICS user address (inter-corporation) and does not include the flow (2) in FIG.18, i.e., Step S105. At the Step S104, the sender ICS user address is not referred. An effect of this effbodunent is that register number of the conversion table is to be reduced to me of the sender ICS user address when there are many the sender ICS user addresses.
EhtXXlinmt-2 (Virtual dedicated line):
Now. description of the operation of virtual dedicated line connection according to the present irmention will be made with reference to FIG.20. Here, the virtual dedicated line connection refers to ccnmmicatim wherein ICS user packets are transferred in a fixed manner to a receiving ICS network address already registered in the conversion table, regardless of the ICS user address within the user control field of the ICS user packet, in which the format taken is one-on-one or one-m-N. While the camponents of FIG.20 are the sam as those of Embodinbent-1 shown in FIGs.14 and 15, what is different is the contents of registration in the conversion table. In the conversion table of the access control apparatus, the receiving ICS network address is determined frm the transmitting ICS network address in a fixed manner, so that either the sender ICS user address (intra-corporation), the sender ICS user address (Inter-coiMration) and the receiver ICS user address are either not registered, or ignored if registered.
Description will now be given regarding a case in which a corporation X uses virtual dedicated line connection, and the Lmication is conducted between LAN 200-1 of the corporation X which is connected to the access control apparatus 210-1, and LAN 2002 of the corporation X which is connected to the access control apparatus 210-5. The conversion table 2131 is shom in FIG.21. <<Preparation>>
The user applies to a VAN operator for virtual dedicated line connection. The VAN operator determines the ICS network address "7711n of the ICS logic terminal at the connection point between the access control apparatus 210-1 for connecting the LAN 200-1 of the corporation X and the user logic c=unications line 240-1, and similarly determines the ICS network address ', 9922R of the ICS logic terminal at the connection point between the access control apparatus 210-5 for connecting the LAN 200-2 of the corporation X and the user logic mmunications line 240-2. Next, the VAN operator performs setting to the conversion table 213-1 of the access control apparatus 210-1 of the following: the transmitting ICS network address "7711n, the receiving ICS network address ', 9922n and the request type. Illustrated in FIG.20 is an ele wherein the request type "3n has been made to serve as the virtual dedicated line connection. Similarly, the VAN operator perform setting to the conversion table of the access control apparatus 210-5 of the following: the transmitting ICS network address ', 9922n, the receiving ICS network address ', 7711w and the request type. <<Procedures>> The operation will be explained with reference to FIG.22. The LAN 200-1 of the corporation X sends a user packet F10 to the ICS 200 via the user logic communication line 240. The access control apparatus 210-1 which has received the ICS user packet F10 fran the logic terminal of the ICS network address "7711w makes reference to the request type of the transmitting ICS network address 7711"(Steps: S200 and S201) and identifies this as a virtual dedicated line connection by referring the request identification "30(Step S202), and reads the receiving ICS network address ', 9922R(Step S203). Next, the access control apparatus 210-1 adds a network control field to the ICS user packet F10 in which the receiving ICS network address is set to
R "9922n and the transmitting ICS network address is set to "7711 ' thus forming an ICS network packet Fll(Step S204: ICS encapsulation), and sends this to the relay apparatus 220-l(Step S205). The relay apparatus 200-1 which receives the ICS network packet F11 determines the destination based on the receiving ICS network address of the ICS network packet F11, and sends an ICS network packet F12 to the relay apparatus 220-2. The ICS network packet F12 is transferred to the access control apparatus 210-5 via the relay apparatus 220-4 within the VAN- 3.
The access control apparatus 210-5 rewoves the network control field from the ICS network packet F13 (ICS reverse encapsulation), and sends the ICS network packet F14 frcm the logic terminal of the ICS
42 network address ', 9922n to the user logic communications line 240-2. Then, the LAN 200-2 of the corporation X receives the ICS user packet F14. Transmission can be made in the same say as described frcrn the LAN 200- 2 to the LAN 200-1. and thus, interactive camimication is available. Using the same method, ICS user packets can be transferred fran the LAN 200-1 of the corporation X to a LAN 200-3 of another corporation Y.
Also, while the above description has been made with reference to a case of one-on-one communication, one-on-N ccnvunicatim can also be performed. For example, a plurality of ICS network addresses may be set to the corrversion table 213-1 of the access control apparatus 210-1 shawn in FIG.20, as indicated by the transmitting ICS network address "7712m. In the present example, two ICS network addresses are set, '16611n and "8822n. The access control apparatus 210-1, upon receiving the ICS user packet frurn the ICS logic terminal with an ICS network address ', 7712R, creates a first ICS network packet wherein a network control field set with ', 6611n for the receiving ICS network address is added thereto, and a second ICS network packet wherein a network control field set with "8822" for the receiving ICS network address is added thereto, these being sent to the reJay apparatus 220 1. Consequently, one-on-two camuziication can be performed.
Subsequently, one-on-N communication can be perfo by transferring each ICS network packet in the same manner as described above.
43 Embodiment-3 (Embodiment using an ATM network):
An eabodiment will be des=bed utierein the network inside the ICS according to the present invention is configured using an ATM network. The present embodunent w:LU be described in the following order: (1) supplementary explanation of ATM-related conventional art, (2) des=iption of campanents, (3) flow of packets using SM, (4) flow of packets using PVC, (5) one-on-N or N-on-one c=amication using PM, and (6) N-m-N communication using PVC. Incidentally, since the present ewbodment mainly discloses art regarding address conversion between ICS network packets and AIM networks, so any of the following can be applied to the present embodiment: intra-corporatlon CKxtatunicatim sexvice and intercorporation CC[M1Inication service des=bed in Entxxbzmt-1 and virtual dedicated line service described in Embodinent-2. (1) Supplementary explanation of ATM-related conventional art:
First, supplementary explanation will be made regarding ATMrelated conventional art to the extent that is necessary to des=ibe the present embodiment. With an ATM network, a plurality of non-f logic channels which can flexibly deal with ccnmmcatim speed and so forth can be set on a physical line, these logic channels being referred to as VCs (Virtual Channel). There are two types of virtual channels stipulated according to the way of setting, SM (Switched Virtual Channel) and PVC (Permanent Virtual Channel). The SM performs call setting of a virtual channel whenever necessary, and can establish a logic line having the necessary speed for a necessary 1 44 duration with all aj:bitrary ATM terminal (a general term for commmication devices which are connected to the ATM network and pexform camunicatIons using the ATM network). Call setting of the virtual channel is performed by the ATM terminal which is att"ting to initiate c=mnication, and the "Signal-ing Method- iS standardized in ITU-T regarding this method. An address for identifying the destination ATM terminal to which call setting is to be performed (this address hereafter referred to as RATM address") is necessary for call setting, and the ATM addresses are systematized so that each ATM texnd.nal has a unique ATM address within the ATM network, in order to enable identification of the ATM terminals. There are the following address s-ysteffs: E.164 format stipulated in the ITU-T Recambendations Q.2931, and the three types of NSAP method ATM addresses such as sham in FIG. 23 following the ATM Forum UNI 3.1 Specifications. Now, regarding ICS, which of the above ATM address systems Is used is decided by the specific construction of the ATM network, so description of the present effbodmrL-nt wIll proceed using the term RATM address".
The PVC performs call setting in a semi-permanent manner, and can be considered to be a virtual line as viewed from the ATM terminal. IDs for identifying virtual channels (hereafter referred to as "virtual channel IDR) are appropriated to established virtual channels for both the VC and PVC. A virtual- channel ID is ccnl=sed of the VPI (Virtual Path Identifier) and the VCI (Virtual Channel Identifier) of the cell header portion of the ATM cell format (63 bytes) shown in FIG. 24.
Information ninication within the ATM network is perfo in information units of the ATM cell format shown in FIG. 24, so there is the necessity to convert the ICS network packets into the ATM cells in order to send aver an ATM network. This conversion is performed in two steps: conversion to CKS (Ccnirrm Part Convexgence Sublayer) shown in FIG.25, and degradation of the CKS frames to the ATM frames as shown in FIG. 26. Dividing a cemnnication packet into ATM cells results in a plurality of the ATM cells in most circumstances, so the series of ATM cells related to the since conm=cation, packet is re Eerred to as an ATM cell sequence. Reception of an ATM cell sequence results in reverse conversion, which is performed in two steps: assembling a CKS frame from the ATM cell sequence shown in FIG. 26, and extracting and reproducing the camunication packet (ICS network packet) from the CPCS frame shown in FIG. 25. Conversion to the CKS frame and degradation/assembly of the ATM cells constitute known art, which has been standardized following the ITU-T Recommendations. Also, protocol headers within the CKS frame user information have been standardized in RFC1483 of IETF. (2) Description of components:
FIGs.27 and 28 focus m the ATM network 1042, in which the internal construction of the conversion unit 1033-1 within the ATM exchange 101331 and of the conversion unit 1033-2 within the ATM exchange 10133-2 is described, and also the access control apparatus 1010-2 and 1010-1 are described in a sinplified manner. Contents of 46 an ATM address conversion table 1533-5 and a VC address cmversion table 1433-5 are shown in FIG.29, and contents of an ATM address conversion table 1533-6 and a VC address conversion table 1433-6 are shown in FIG.30. In the present effhodimant, the internal configuration of the access control apparatus and the operation of the processing device within the access control apparatus are basically the sarne in principle as the description given in Entxx1unent-l.
Appropriated to the access control apparatus 1010-5 shown in FIG.27 are ICS network addresses "7711R and "7722n, serving as connection points (ICS logic terminals) for corporations X and A which are the us= of the ICS 905. Also appropriated to the access control apparatus 1010-7 are ICS network addresses w7733n and w7744n, serving as cOmectIOn Points for corporations W and C, similwly. In FIG.28, appropriated to the access control apparatus 1010-6 are ICS network addresses "9922n and R9933n, serving as connectim points for corporations Y and B, and similarly appr:)priated to the access control aPParatus 1010-8 are ICS network addresses w9944n and w9955n, serving as Connection points for corporations Z and D. Here, in the ATM network embodimmt, the corporations X, Y and so forth, which are given as WMPleS of uS=, may be differing locations within a single corporation which performs intra- corporation cannunication, or may be different corporations which perform inter-corporation connLmication.
An interface unit 1133-5 is provided in the conversion unit 1033-5 within the ATM exchange 10133-5, this interface unit 1133-5 handling the processing of rectifying interfacing (ptWsical layers, 4 7 data link layer protocol) of the communication lines connecting the access control apparatus 1010-5 and the ATM exchange 10133-5. The conversion unit 1033-5 is comprised of a processing device 1233-5, and also an ATM address conversion table 1533-5 for call setting with the SW, and a VC address conversion table 1433-5 for converting addresses from ICS network addresses used by both SM and PVC to virtual channel. Also, the ATM exchange 101335 connects the ATM address administration senver 1633-5 serving as an information processing device for storing the ATM address conversion table with, in the case of using PVC, the PVC address administration server 1733-5 serving as an information processing device for storing the VC address conve=im table, thereby performing the information processing relating to address conversion. The ccnponents making up the ATM exchange 10133-6 are the same as the description given regarding the ATM exchange 10133-5. In FIGs.27 and 28, the access control apparatus 1010-5 and the access control apparatus 1010-7 are connected to the ATM exchange 10133-5 via the Mumnlication line 1810-5 and CCmnunicatim line 1810-7, respectively, and also, the access control apparatus 1010-6 and the access control apparatus 1010-8 are connected to the ATM exchange 10133-6 via the CKX&&LRXlicatiM line 1810-6 and cunninication line 1810-8, respectively. An ATM address "39770 unique to the network is set to the conversion unit 1033-5 within the ATM exchange 10133-5, and an ATM address "3999" unique to the network is set to the conversion unit 1033-6 within the ATM exchange 10133-6. The ATM exchange 10133-5 and the ATM exchange 10133-6 are connected via the ATM exchange 10133-7 in the present
48 enbodiment. (3) Flow of packets using SM:
An effbodment wherein SM is applied as a camnmication path within the ATM network will be described with an exmple of an ICS user packet sent frcin a terminal of a corporation X toward a terminal of a corporation Y, with reference to FIGs.27 and 28. <<Preparation>> A receiving ICS network address indicating the destination of the ICS network packet, a receiving ATM address for indicating the other party for call setting of the virtual channel m the ATM network, and channel capabilities such as camiunication speed requested by the virtual channel, a registered in the ATM address conversion table 1533-5. Also, similar registration is made to the ATM address conversion table 1533-6. In the entot, the values set in the ATM address conversion table 1533-5 are as follows: "9922" which is the ICS network address appropriated to the ICS logic terminal of the access control apparatus 1010-6 is set as the conmmication address of the corporation Y, and the ATM address "3999" which is uniquely appropriated to the conversion unit 1033-6 within the ATM network is registered as the receiving ATM address. In the present entmt, a cenumication speed of 64 Kbps is set as the channel capabilities. The contents registered to the ATM address conversion table 1533-5 are also written to the ATM address adwdn-istratim server 1633-5.
The values set in the ATM address conversion table 1533-6 are as follows: M11" which is the ICS network address appropriated to the 49 ICS logic terminal of the access amtrol apparatus 1010-5 is set as the ocnmmcatim address of the corporation X, and the ATM address -3977- which is uniquely appropriated in the ATM network to the conversion unit 1033-5 within the ATM exchange 10133-5 to which the access control apparatus 1010-5 is comected is registered as the receiving ATM address. In the present effbodmmt, a camnmication speed of 64 Kbps is set as the channel capabilities. The contents registered to the ACIM address conversim table 1533-6 are also written to the ATM address administration server 1633-6. <<Transferring ICS network packets fram the access control apparatus>> As described in Embodiment-1, the ICS user packets sent from a terminal of the corporation X toward the terminal of the corporation Y connected to the access control apparatus 1010-6 via the access control apparatus 1010-5 is encapsulated upon passing through the access control apparatus 1010-5, and beccmes an ICS network packet F1 having the transmitting ICS network address n7711w and the receiving ICS network address 09922m as an ICS packet header. The ICS network packet Fl is sent fran the access control apparatus 1010-5 to the ATM exchange 10133-5, and reaches the cmversion unit 1033-5. The fol-lowing is a description thereof made with reference to FIG.31. <<Obtaining a virtual channel M>>
Once the cormersion unit 1033-5 receives the ICS network packet Fl(Step, S1601), there is the need to request a virtual channel ID of the SM virtual channel determined by the relation of the transmitting ICS network address M11" and the receiving ICS network address 1 i -9922- in the ICS packet header, in order to correctly transfer the received packet Fl to the ATM exchange 10133-5. In the case that the ccunmication is based m the SW, there are cases that the virtual channel corresPondlng With the c=amication path is established at the time of the receiving the ICS network packet, and cases in which the virtual channel has not yet been established. In order to find out whether or not the virtual channel has been established, the processing device 1233-5 first searches whether or not a virtual channel corresponding with the pair of a transmitting ICS network address R7711" and a receiving ICS network address n9922n is registered in the VC address conversion table 1433-5 (Step S1602), and in the event that there is registration here, establishment of the virtual channel can be thus conf=red. That is, the fact that the virtual channel corresponding with the pair of transmitting ICS network address R7711" and receiving ICS network address "9922" is w33w ls obtained, and further, it can be found that this virtual dbannel ls ccffnimicating based on the SW, fram the value nlln of the channel type obtained at the same tim. In the event that there is no such registration on the VC address conversion table 1433-5, the requested virtual channel is established with the latter-described <<call setting>>, and the virtual channel ID is obtained fran the information registered to the VC address conversion table 1433-5 at that point (Step S1603). <<Call setting>> Regarding the abave-mentioned case wherein Rthere is no regist- 51 ration of a virtual channel ID corresponding with a camn=cation, path detennined by correspondence between a transmitting ICS network address and a receiving ICS network address m the VC address conversion table 1433-5", i.e., in the case that there is no virtual channel ID corresponding with the camm=cation. path established yet, it beccrrk--s necessary to perfonn the follg call setting, to establish a virtual channel within the ATM network comprising ICS 905. An example of operation of the call setting will now be described.
The processing device 1233-5 of the conversion unit 1033-5, upon mking reference to the VC address conversion table 1433-5 and finding that there is no registration of a virtual channel ID corresponding with the pair of transmitting ICS network address "7711w and receiving ICS network address 09922H (Step S1602), the processing device 1233-5 of the conversion unit 1033-5 refers to the VC address conversion table 1533-5, finds the receiving ICS network address "99220 registered in the VC address conversion table 1533-5 rnatching the receiving ICS network address n9922R, and obtains transndtting ATM address n3999n corresponding thereto and channel capabilities "64Kn corresponding thereto, and so forth. The processing device 1233-5 uses the obtained transmitting ATM address "3999w to perfonn a request for call setting to the ATM exchange 10133-5, and also requested at this tIm is channel capabilities such as conmmcat2.on speed of the virtual channel sinultaneously obtained frcxn the VC address conversion table 1533-5 and so forth. The ATM exchange 10133-5, upon receiving the call setting request, uses a signal rrk--Uiod which is provided 52 standard to ATm exchanges proper as known technique to establish a virtual channel within the ATM network which reaches the ATM exchange 10133-6 (Step S1606). The virtual channel ID appropriated for identification of the virtual channel is notified fran the ATM exchanges to conversion units 1033-5 and 1033-6 therein, but in the event that this Is based m stipulations of a signal nethod according to known technique, the value notified fran the calling party ATM exchange 10133-5(e.g., R33n) and the value notified frcm the receiving party ATM exchange 101333(e.g., "44w) may not be the same value. At the conversion unit 1033-5, the virtual channel ID '33" which is notified frcrn the ATM exchange 10133-5 is registered in the VC address conversion table 1433-5 along with the transmitting ICS network address "7711n and the receiving ICS network address w99220 (Step S1607), and stores these m the VC address conversion table 1433-5 while the connection of this virtual channel is established. When the virtual channel connection is no longer necessary, the conversion unit 1033-5 requests call release of the virtual channel to the ATM exchange 10133-5, and at the same tirre deletes the registration corresponding with virtual channel ID R33" m the VC address conversion table 1433-5. Registration to the VC address conversion table 1433-6 in the conversion unit 1033-6 will be described later. << Packet transfer>> The processing device 1233-5 of the conversion unit 1033-5 converts the ICS network packet Fl received fran the access control apparatus 1010-5 into a CKS frame sham in FIG.25 according to the 53 virtual channel (virtual channel ID 033n) established according the above description, and further perform degradation into ATM cells as shown in FIG.26 and transfers to the relay ATM exchange 10133-7(Step S1604). <<Transfer of ATM cells>>
Accortling to the above-described rrethod, the ATM cell series S1 carprized of a plurality of eel-Is obtained by converting the ICS network packet Fl is transferred frem the ATM exchange 10133-5 to the relay ATM exchange 10133-5, and further is transferred to the ATM exchange 10133-6 as ATM cell series S2. The following is a des cri ption thereof with reference to the flowchart in F1G.32. <<Operation following arrival of packet>> Once the ATM cell series S2 reaches the ATM exchange 10133-6 (Step S1610), this ATM cell series S2 is transferred fmn the ATM exchange 10133-6 to the conversion unit 1033-6. At the conversion unit 1033-6 as shown In FIG. 26, the received ATM cells are assembled into a CPCS frame, and further, as shown in FIG.25, an ICS network packet is restored frcin the CPCS frame (Step S1611). In FIG.28, the restored ICS network packet is shown as ICS network packet F2, but the contents thereof are identical to that of the ICS network packet Fl. The ICS network packet F2 is transferred to an access control apparatus determined by the receiving ICS network address n9922n in the header thereof, i.e., to access control apparatus 1010-6 which has an ICS logic terminal appropriated with ICS network address n99220 (Step S1612).
54 1 At this tirne, at the conversion unit 1033-6, the transmitting ICS network address n7711n, the receiving ICS network address '9922" the channel type nll' b-idicating the fact this is SM identified at the point of receiving the call, and the virtual chamel ID n44K appropriated at the time of call setting of the SM virtual chamel are registered in the VC address cmversion table 1433-6 (Step S1614), and at this time, the transmitting ICS network address n7711" of the ICS network packet F2 is written to the receiving ICS network address of the VC address conversion table 1433-6. and the receiving ICS network address "99220 is written to the transmitting ICS network address of the VC address conversion table 1433-6, i.e., these are written in reverse positions. However, if at the point of registratim an item already exists within the VC address conversion table 1433-6 identical to that regarding which registration is being attempted, no registration is made. The address conversion information registered in the VC address conversion table 1433-6 is stored m the VC address conversion table 1433-5 while the comection of the virtual Chamel having a corresponding virtual Channel (in this example, virtual chamel ID R44n) Is established (Step S1613). <<Reverse packet flow>> Now, description of the case of reverse flaw of the ICS packet, i.e., flow from a corporatim Y to a corporatim X, will be made with reference to FIGs.27 and 28, under the presumption that call setting of the SVC virtual Chamel has been made according to the above description. An ICS user packet sent out from the corporation Y to the corporation X is converted into an ICS network packet F3 having the transmitting ICS network address n9922n and the receiving ICS network address "7711n in the header portion thereof, and the processing following the flaw sh own in FIG.31 as described above is perfonroad by the processing device 1233-6 of the conversion unit 10336 within the ATM exge 10133-6.
In this case, the VC address conversion table 1433-5 in the conversion unit 1033-6 has registered therein a vixtual channel ID 044n with a channel type "11" which neans SW, corresponding with the tting ICS network address n9922" and receiving ICS network address n7711", so the system operates following the flow(l) shown in FIG.31, thereby converting the ICS network packet F3 into a plurality of ATM cells (ATM series S3) and transferring, with regard to the virtual channel ID "4C. The ICS network packet F3 is re and transferred by the relay ATM e=hange 10133-5, beccnv-. ATM series S4 and reach the ATM exchange 10133-5, are received via the virtual channel having virtual channel ID n330 in the conversion unit 1033-6 thereof, and restored into an ICS network packet F4 having identical contents with the ICS network packet F3. In the conversion unit 10335. the pair of the transmitting ICS network address w99220 and the receiving ICS network address 07711w in the header of the ICS network packet F4 is already registered in the VC address conversion table 1433-5 in reverse fashion, so registration to the VC address conversion table is not performed, and the ICS network packet F4 is transferred to the access control apparatus 1010-5.
56 <<Eyle of application to half -duplex caumniicatim>> The above des=ption has been made with reference to cases wherein an ICS packet is transferred from the corporation X to the corporation Y, and reverse fram the corporation Y to the corporation X, with an network within the ICS 905 having been configured of an ATM network, being carried out with a single SM virtual channel. For example, applying this transfer and reverse transfer to a request packet to a server terminal of the corporation Y tobe connected to the ICS fram a client terminal of the corporation X to be connected to the ICS (transfer), and a response packet to this request packet frcm the client terminal of the corporation X to server temninal of the corporation Y (reverse transfer) results in an application example of half -duplex cammication in which me-way communication is performed at times, and both-way communication is realized by switching the communication direction by time frames. <<Ele of application to fill 1 -duplex camanicatim>> The virtual channel set on the ATM network is capable of fl duplex conTamication, J..e., simultaneous both-way c=unication, due to the ATM stipulations. For example, applying the transfer and reverse transfer to request packets to a plurality of server terminals of the corporation Y to be connected to the ICS from a plurality of client te=inals of the corporation X to be connected to the ICS (transfer), and response packets to the request packets frem the plurality of client terminals of the corporation X to the plurality of server temninals of the corporation Y (reverse transfer) results in ahronous transfer of packets between the client terminals and the server terminals, so simultaneous both-way ccnminiication is conducted m the single SM virtual Channel serving as the communication path, thereby making for an application example of full-duplex cemmmicatim. (4) Flow of packets using PVC An embodiment wherein the network within the ICS 906 is configured with an ATM network and PVC is applied as a cann=cation path within the ATM network will be described with an example of an ICS user packet sent fran a terminal of a corporation W toward a terminal of a corporation Z, with reference to FIGs.27 and 28. <<Preparat:Lon>> A transmitting ICS network address, a receiving ICS address, the virtual channel ID of the PVC fixed on the ATM network (indicating the CatalUniCation path between the ATM exchange 10133-5 and the ATM exchange 10133-6), and the channel type indicating that the virtual channel ID is PVC, are registered in the VC address conversion table 1433-5. This registration is different frcin the ease of WC, in that registration is made in the VC address conversion table 1433-5 at the same time that the PVC virtual channel is set in the ATM exchanges (10133-5, 10133-7, 10133- 6) serving as the coniziication path, and is saved in a fixed manner e the caum=cation path is necessary, i.e., until the setting of the PVC virtual channel is canceled. Also, the registration is made to the VC address cmversion table 1433-6 in the same manner. Incidentally, the PVC virtual channel ID is appropriated to the respective ATM exchanges at the time that PVC is 58 fixedly connected between the ATM exchanges.
The values set in the VC address conversion table 1433-5 are as follows: value "7733' which is the transmitting ICS network address appropriated to the ICS logic terminal of the access control apparatus 1010-7 is set as the cammunication address of the corporation W, and value '9944' which is the receiving ICS network address appropriated to the ICS logic terminal of the access control apparatus 1010-8 is set as the communication address of the corporation Z. Further, the PVC virtual channel ID '55' which is appropriated to the ATM exchange 10133-5 is set as the virtual channel ID, and value "W is set as the channel type, indicating the PVC. Also, settings for registering to the VC address conversion table 1433-5 are written to the PVC address administration server 1733-5, and stored.
In the s ame way, similar settings are made in the VC address conversion table 1433-6 in the conversion unit 1033-6 in the ATM exchange 10133-6, with the transmitting ICS network address and the receiving ICS network address reversed. In this case, even if the same PVC is being Inpl-ied, the virtual channel ID may be of a different value to the VC address conversion table 1433-5. When the registering to VC add s conversion table 1433-6 in this instance, this is also written to and stored in the PVC address administration server 1733-6.
The values set in the VC address conversion table 1433-6 are as follows: value "994C which is the transmitting ICS network address appropriated to the ICS logic terminal of the access control apparatus 59 1010-8 is set as the comninication address of the corporation Z, and value "7733' which is the rving ICS network address appropriated to the ICS logic terminal of the access control apparatus 1010-7 is set as the cammicatIon address of the corporation W. Further, the PVC virtual channel ID 066H which is appropriated to the ATM e-xge 10133-6 Is set as the virtual channel ID, and value n22n is set as the channel type, indicating PVC. <<Transferring ICS network packets from access control apparatus>> The ICS user packet sent toward the terminal of the corporation Z connected to the access control apparatus 1010-5 via the access control apparatus 1010-7 is ICS-encapsulated upon passing through the access control apparatus 1010-7, and becomes an ICS network packet F5 having the transmitting ICS network address 07733" and the receiving ICS network address 09944n as an ICS packet header. The ICS network packet F5 is sent from the access control apparatus 1010-7 to the ATM exchange 10133-5, and reaches the oonversim unit 1033-5 via the interface unit 1133-5. <<Obtaining a virtual channel ID>> The processing device 1233-5 refers to the VC address conversion table 1433-5 using the transmitting ICS network address n7733" and the receiving ICS network address 09944n in the header of the received ICS network packet F5, and obtains the fact that the virtual channel ID identifying the virtual channel set between the conversion units 10335 and 1033-6 inside the ATM exchange 10133-6 connected to the access control apparatus 1010-8 with the ICS logic terminal provided with a 1 1 1 reviving ICS network address R9944H is "SSn. At the same time, it can be famd that the virtual channel is PVC, fran the value R 22 n of the channel type obtained. <<Transfer of packets>> The processing device 1233-5 converts the ICS network packet F5 received from the access control apparatus 1010-7 into an ATM cell series, and transfers this to the ATM exchange 10133-7, with regard to the PVC virtual channel "55n obtained as described above. The method of ATM cell conversion is the same as that described above in the embodiment of SW. The above processing procedures of the conversion unit 1033-5 are as shown in FIG.31, and PVC always follows the flaw (1) <<Tr&lsfer of ATM cells>> The ATM cell series S1 comprised of a plurality of cells obtained by converting the ICS network packet Fl is transferred from the ATM exchange 10133-5 to the relay ATM exchange 10133-7, and further is transferred to the ATM exchange 10133-6 as ATM cell series S2. This operation is the same as with SW. <<Operation following a=-ival of packet>> Once the ATM cell series S2 reaches the ATM exchange 10133-6, this ATM cell series S2 is transferred from the ATM exchange 10133-6 to the conversion unit 1033-6 within the ATM exchange 10133-6. The conversion unit 1033-6 assembles the received ATM cells into a CKS frame, which is the same as with - SM. In FIG. 28, the restored ICS network packet is shown as an ICS network packet F6, but the contents 61 thereof are identical to that of the ICS network packet F5. The ICS network packet F6 is transferred to an access control apparatus determined by the receiving ICS network address 099440 in the header thereof, i.e., to access control device 1010-8 which has an ICS logic terminal appropriated with ICS network address "9944n. The above processing procedures of the conversion unit 1033-6 are as shown in FIG. 32, and PVC always follows the flow (1). <<Reverse packet flow>> Next, description of the case of reverse flow of the ICS packet, i.e., flow fran the corporation Z to the corporation W, will be made with reference to FIGs.27 and 28, in the same manner as above. An ICS user packet sent out fran the corporation Z to the corporation W is ICS- encapsulated into an ICS network packet F7 having the transmitting ICS network address 09944n and the receiving ICS network address R77330 in the header portion thereof, and the processing follg the flow shown in FIG.31 as described above is performed by the processing device 1233-6 of the conversion unit 1033-6 within the ATM exchange 10133-6. In this case, the VC address conversion table 1433-6 in the conversion unit 1033-6 has registered therein a vixtual channel ID "66R corresponding with a transmitting ICS network address w994C and a receiving ICS network address w7733R, so the system converts the ICS network packet F7 into a plurality of ATM cell series and transfers, with regard to the virtual channel ID "66a.
The ATM cell series transferred through the ATM network reach the converting unit 1033-5 of the ATM exchange 10133-5, are received 62 i via the virtual channel having virtual channel ID -55-, and restored into an ICS network packet F8 having identical contents with the ICS network frame F7. Hawever, in the conversion unit 1033-5, the pair of the transmitting ICS network address 0994C and the receiving ICS network address n7733R in the header of the ICS network packet F4 is already registered in the VC address conversion table 1433-5 in reverse fashion, and information that the virtual channel ID R55n as to this transmitting/receiving address pair is channel type R221 is obtained, so registration to the VC address conversion table is not performed, and the ICS network packet F8 is transferred to the access control apparatus 1010- 7. <<Example of application to half-duplex cammunication>> The abave description has been made with reference to an embodiment of transferr2ng an ICS packet using PVC with a network within ICS 905 having been configured of an MM network, but the difference between the PVC and the SM is whether the virtual channel is fixed or ca-1led and set as necessary, so there is no difference in the operation itself of transferring packets aver the set virtual channel. Accordingly, regarding the ICS according to the present invention, an example of application to half -duplex cammunication using an ATM network PVC virtual channel is the same as an example of application to half -duplex ccnTmnication using a SVC network PVC virtual channel. <<Example of application to full- duplex cammnicatim>>
The ele of application of PVC full-duplex ccomtinication is 63 equivalent to the example of application of ful 1 duplex ccffniunicatim in SW, due to the Same reason as the example of application to half duplex camunication.
(5) One-on-N or Won-one c=nunication using PVC In the above exarnple, an embodiment was des=bed wherein me virtual channel was described as a ccmnxnicatim path connecting me corporation (location) with one corporation (location), i.e., a =atunication path connecting me ICS logic terminal with me ICS logic tenranal, but me PVC virtual channel can be used as a com=ication path connecting me ICS logic terminal with a plurality of ICS logic terminals. Such One-on-N or Won- one cammication will be described with reference to FIGs.33 and 34. <<Description of camponents>>
In FIGs.33 and 34, regarding the access control apparatus 101010, the corporation X is connected to an ATM exchange 10133-10 with an ICS logic terminal within the access control apparatus 1010-10 provided with the ICS network address "7711'. With the parties to be reached frern the corporation X as the corporations A through D, the corporation A is connected to an ICS logic te=inal within the access control apparatus 1010-20 provided with the ICS network address 09922", and the corporation B is connected to an ICS logic terminal within the access control apparatus 1010-20 provided with the ICS network address 09923n. In the same manner, the corporation C is connected to an ICS logic terminal within the access control apparatus 1010-40 provided with the ICS network address n994C, and the corporation D is 64 connected to an ICS logic terminal within the access control apparatus 1010-40 provided with the ICS network address "9955". The access control apparatuses 1010-20 and 1010-40 are connected to the ATM exchange 10133- 20, and the ATM exchanges 10133-10 and 10133-20 are connected via a relay network. <<Preparation>> With regard to the ATM exchanges 10133-10 and ATM 10133-20, a single PVC virtual channel cormecting the conversion unit 1033-10 within the ATM exchange 10133-10 and the conversion unit 1033-20 within the ATM exchange 10133-20, setting w33n as the virtual channel ID provided to the conversion unit 1033-10 of the virtual Channel, and "4C as the virtual channel ID provided to the conversion unit 1033-20 of the virtual channel. Registration such as shown in FIGs.33 and 34 is performed regarding the VC address conversion. table 1433-1 within the coriversim unit 1033-10 and the VC address conversion table 143320 within the conversion unit 1033-20. <<Packet flow for one-on-N cannLmicatim>> The flow of packets for one-on-N ccmnjnicati-on will be described conce=ing packets sent frcin the corporation X to each of the corporations A through D. An ICS network packet sent fran the corporation X toward the corporation A, having a transmitting ICS network address R7711n and a receiving network address "9922n, is transferred to the PVC virtual channel with a virtual channel ID R3V, by neans of making reference to the VC address conversion table 1433-20 in the conversion unit 1033-10. An ICS network packet sent fran the corporation X toward the corporation B, having a transmitting ICS network address M11" and a receiving network address "9933", is also transferred to the PVC virtual channel with a virtual channel ID H33'. An ICS network packet sent from the corporation X toward the corporation C, having a transmitting ICS network address "7711n and a receiving network address "99440, and An ICS network packet sent from the corporation X toward the corporation D, having a transmitting ICS network address 177110 and a receiving network address "995SH are transferred to the PVC virtual channel with a virtual channel ID R3V in the sam manner. This indicates that one-on-N (corporation X to corporations A through D) omvmicatim is being perfo while sharing a single PVC virtual channel. Reverse packet flow, i.e., transfer from the corporations A through D to the corporation X, will be described in the next section. <<Packet flow for Won-one camunication>> The flow of packets for Won-one conninication will be described concerning packets sent to the corporation X frem each of the corporations A through D. An ICS network packet sent toward the corporation X frcin the corporation A, having a transmitting ICS network address 099W and a receiving network address 07711m, is transferred to the PVC virtual channel with a virtual channel ID R44-, by ffeans of making reference to the VC address conversion table 143320 in the conversion unit 1033-20. An ICS network packet sent toward the corporation X from the corporation B, having a transmitting ICS network address R9933" and a receiving network address 17711', is also 1 1 66 transferred to the PVC virtual channel with a virtual channel ID n4C An ICS network packet sent toward the corporation X from the corporation C, having a transmitting ICS network address '994C and a receiving network address w7711', and An ICS network packet sent toward the corporation X frcm the corporation D, having a transmitting ICS network address 09955n and a receiving network address 7711n are transferred to the PVC virtual channel with a virtual channel ID "44n in the same manner. This indicates that Won-one (corporations A through D to corporation X) ccnniunicatim is being performed while sharing a single PVC virtual channel. (6) N-m-N conmnication using PVC Using the sam method as one-on-N ccmnication, one PVC virtual channel can be used as a cammication path connecting a plurality of ICS logic terminals with a plurality of ICS logic terminals. Such Non-N mffrunication will be described with reference to FIGs.35 and 36. <Oescription of canpments>> The corporation X has ICS logic terminal address '7711" of the access control apparatus 1010-11 as the contact point thereof, the corporation Y has ICS logic terminal address "7722n of the access control apparatus 1010-11 as the contact point thereof, and the access control apparatus 1010-11 Is connected to the ATM exchange 10133-11. With the other party which the corporation X or corporation Y is attempting to reach as the corporation A or corporation C. The corporation A has ICS logic teardnal address w99220 of the access control apparatus 1010-21 as the contact point thereof, the corpo- 67 ration Y has ICS logic terminal address "994C of the access control apparatus 1010-41 as the contact point thereof. The access control apparatuses 1010-21 and 1010-4 are connected to the ATM exchange 10133-21, and the ATM exchanges 10133-11 and 10133-21 are connected via a relay network. <<Preparation>> With regard to the ATM exchanges 10133-11 and 10133-21, a single PVC virtual channel connects the conversion unit 1033-11 within the ATM exchange 10133-11 and the conversion unit 1033-21 within the ATM exchange 10133-21, setting w33m as the virtual channel ID provided to the conversion unit 1033-11 of the virtual channel, and n4C as the virtual channel ID provided to the conversion unit 1033-21 of the virtual channel. Registration such as shown In FIGs.35 and 36 is performed regarding the VC address conversion table 1433-11 within the conversion unit 1033-11 and the VC address conversion table 1433-21 within the conversion unit 1033-21. <<Packet flaw for N-on-N comninication>> The flaw of packets for N-on-N ccrffmmication will first be described concerning packets sent fiat the corporation X to each of the corporations A and C. An ICS network packet sent frern the corporation X toward the corporation A, having a transmitting ICS network address n7711n and a receiving network address 09922%, is transferred to the PVC virtual channel with a virtual channel ID '33-, by means of mg reference to the VC address cmversion table 143311 in the conversion unit 1033-1. An ICS network packet sent frcin the 68 corporation x toward the corporation C, having a transmitting ICS network address '7711' and a receiving network address 099440, is also transferred to the PVC virtual channel with a virtual channel ID N33R. Next, the flaw of packets will be des=bed concerning packets sent frcm the corporation Y to each of the corporations A and C. An ICS network packet sent fram the corporation Y toward the corporation A, having a transmitting ICS network address R7722" and a receiving network address 09922w, is transferred to the PVC virtual channel with a virtual channel ID "33w, by me= of making reference to the VC address conversion table 1433-11 in the conversion unit 1033-11. An ICS network packet sent fran the corporation Y toward the corporation C, having a transmitting ICS network address n7722w and a receiving network address w9944w, is also transferred to the PVC virtual channel with a virtual channel ID w33".
Next, reverse packet flow will be described concerning packets sent to each of the corporations X and Y fram the corporation A. An ICS network packet sent toward the corporation X frcm the corporation A, having a transmitting ICS network address n9922n and a receiving network address w7711", is transferred to the PVC virtual channel with a virtual channel ID "4C, by means of making reference to the VC address conversion table 1433-21 in the conversion unit 1033-2. An ICS network packet sent toward the corporation Y frem the corporation A, having a transmitting ICS network address "9922w and a receiving network address M22w, is transferred to the PVC virtual channel with a virtual channel ID H44n, by mans of making reference to the VC 69 address conversion table 1433-2 in the conversion unit 1033-2. An ICS network packet sent toward the corporation X fram the corporation C, having a transmitting ICS network address N9944w and a receiving network address "77110, is transferred to the PVC virtual channel with a virtual channel ID 0440. An ICS network packet sent toward the corporation Y from the corporation C, having a transmitting ICS network address "994C and a receiving network address n7722", is also transferred to the PVC virtual channel with a virtual channel ID "44R. Thus, N-on-N comimcation is performed while sharing a single PVC virtual channel.
Embodurent-4 (Embodiment using an FR network):
An embodiment W2.11 be des=bed wtw the network inside the ICS according to the present invention is configured using an FR network. The present entodiment will be described in the following order: (1) supplementary explanation of FR-related conventional art, (2) description of components, (3) flow of packets using SM, (4) flow of packets using PVC, (5) one-on- N or Won-one canxmicatim using PVC, and (6) N-m-N canuzdcatim using PVC. With the present embodiment, two types of methods using SM or PVC may be used separately, or these may be used in conjunction. Description will be given regarding each of the cases of using SM and PVC. Also, intracorporation comcation service and inter-corporation comnmicatim service described in Effbodmmt-1, and virtual dedicated line service described in Entiodin-ent-2, can both be realized with the access control apparatus according to the present invention, so there is no need to consider these separately regarding network packet cammmication with the network within the ICS. Rather, in the present wbodiment, these caffmziicatim services will be described integrally. (1) Supplementary explanation of FR-related conventional art:
First, supplementary explanation will be made regarding FRrelated c=entional art to the extent that is necessary to describe the present embodiment.
A frame relay consists of using oommnication infonmtion units called packets with vale lengths to perfonn cammmication and to specify the oammunication path for each packet. This is a conventional art which has been standardized in the ITUM.233 Recommendations and so forth which have realized accumulated exchange of packets within a circuit network, and also logic multiplexing (a. technique for nultiplexing a single physical line into a plurality of logic lines) - The service using the above technique is referred to as Frame Mode Bearer Service (hereafter referred to as "FMBS"), and stipulated for FMBS are: the Frame Switch Bearer Service (hereafter referred to as -FSBS) Win the other party to which connection is to be made is selected (SVC); and the Frame Relay Bearer Service (hereafter referred to as RFRBSw) wherein the other party to which connection is to be made is fixed (PVC). The term nFram Relayn generally only indicates FRBS ("Frame Relayn in the narrow sense) at times, but with the present invention, nFrame Relay" is used as a term indicating all including MS and FRBS. In the event that only 71 FSBS is to be specifically indicated, the term nframe relay using SVCw will be used, and in the event that only FRBS is to be specifically indicated, the term "frame relay using PVC w2-U be used. Hereafter, the above-defined Oframe relay in the wide sense (F1MBS)w will be referred to as FR, and packets transferred over an FR network will be called "FR packets" in order to distinguish these fram ICS packets.
As des=bed earlier. wIth an FR network, a plurality of logic lines can be set on a physical line, these logic lines being referred to as logic channels. Identifiers appropriated to FR terminals connecting to both ends of the logic channels (an overall reference to cxxtnun-icatiLon equipment comected to the FR network and cmicating using the FR network) in order to identify the logic channels are called Data Link Comection Identifiers (hereafter referred to as nDLCIO). SVC and PVC are stipulated to logic channels, depending m the way of setting. SVC performs call setting of the logic channel when necessary, and is capable of obtaining a logic line with any FR terminal for a necessary duration, at a necessary speed. Ca 11 setting of the 10g2.C channel is performed by the FR terminal attempting to initiate comn=catim, the method thereof being standardized in ITU-T. Call setting requires an address for identifying the FR terminal of the other party to which the call is to be set (hereafter referred to as 1FR address"), the FR addresses being systematized so as to be unique in the FR network, thereby enabling identification of each FR terminal. PVC is for fixedly setting a call setting to the FR exchange, and can be viewed as a vixtual dedicated line frern the point 1 72 of the FR terminal.
Regarding the established logic channels, DLCIs for identifying logic channels are appropriate for both SVC and PVC, and in the event of transferring an FR packet, the MCI is set at the MCI bit portion m the FR packet address portion shawn in FIG.37. There are three formts stipulated for the FR packet address portion, FIG.37 showing the 2-byte format which is one of these. Logic channel capabilities (channel capabilities) of the FR network include: Cam-Litted Informtion Rate (hereafter referred to as nCIRn) which is the infomation transfer speed guaranteed at a no state (a state wherein there is no congestion) of the FR network.
Them is the necessity to convert ICS network packets into FR packets in order to send such canm=cation packets over an FR network, as shown in FIG.38. Reception of an FR packet results in reverse conversion, consisting of extracting and reproducing the ccffn-Lmcatm packet (ICS network packet) from the FR packet as shown in FIG.38. Conversion of this FR packet has been standardized following the ITU-T Recannendations. Also, protocol headers within the FR packet user information have been standardized in RFC1490 of IETF. (2) Description of camponents:
FIGs.39 and 40 show a forth entxxUmmt of the present invention. In the Present ewbod=L-nt, the internal configuration of the access control apparatus and the operation of the processing device within the access control apparatus are basically the same in principle as the description given in Embodiment-l.
73 Appropriated to the access control apparatus 1010-5 are ICS network addresses R7711" and 077220, serving as connection points (ICS logic terminals) for the corporations X and A which are the users of the ICS 925. Also appropriated to the access control apparatus 1010-7 are ICS network addresses n7733' and 077440, serving as connection points for the corporations W and C, similarly. Appropriated to the access control apparatus 1010-6 are ICS network addresses n9922n and 09933w, serving as connection points for the corporations Y and B, and sindlarly appropriated to the access control apparatus 1010-8 are ICS network addresses n99440 and 09955R, serving as connection, points for the corporations Z and D. Here, in the ammt sh in FIGs. 39 and 40, etc., the corporations X, Y and so forth, which are given as examples of users, may be differing locations within a single corporation which performs the intra-corporation. ccmmnication, or may be different corporations which perfonn the inter-corporation,ccnTnunicatim.
An interface unit 1132-5 is provided in the conversion unit 1032-5 within the FR exchange 10132-5, this interface unit 1132-5 handling the processing of rectifying interfacing of the cemamicatim Line 1812-5 connecting the access control apparatus 1010-5 and the FR exchange 101325, and the oamunication line 1812-5 connecting the access control apparatus 1010-7 and the FR exchange 10132-5 (physical layers, data link layer protocol). The conversion unit 1032-5 is campri-sed of a processing device 1232-5, and an FR address conversion table 1532-5 for call setting with SW, and a MC address 74 convexsion table 1432-5 for converting addresses fran ICS network addresses used by both SVC and PVC to logic channel. Also, the FR exchange 10132-5 connects the FR address administration server 1632-5 serving as an information processing device for storing the FR address conversion table with, in the case of using PM, the MC address administration server 1732-5 serving as an information processing device for storing the MC address conversion table, thereby pexforming an information processing relating to address conversion. The compments making up the FR exchange 10132-6 are the same as thedescription given regarding the FR exchange 10132-5. In the present entxxlinb-,-nt, the access control apparatuses 1010-5 and 1010-7 are connected to the FR exchange 10132-5 via the camunication lines 18105 and 1810-7, respectively, and also, the access control apparatuses 1010-6 and 1010-8 are connected to the FR exchange 10132-6 via the cammtnication lines 1810- 6 and 1810-8, respectively. An FR address R2977w unique to the network is set to the conversion unit 1032-5 within the FR exchange 10132-5, and an FR address w2999" unique to the network Is set to the conversion unit 1032-6 within the FR exchange 10132-6. The FR exchanges 10132-5 and 10132- 6 are connected via the FR relay network, but in the present entxKlunent, connecting is made via the FR exchange 10132-7 representing the FR relay network. (3) Flow of packets using SW:
An embodiment wherein the network within an ICS is configured of an FR network, and SVC is applied as a canxinication path within the FR network, will be described with an example of an ICS user packet sent frcrn a terminal of the corporation X toward a terminal of the corporation Y, with reference to FIGs.39 and 40. <<Preparation>> A receiving ICS network address indicating the destinatim of the ICS network packet to be transferred frcm the conversion unit 1032-5 to the FR network, a receiving FR address for indicating the other party for call setting of the logic channel m the FR network, and channel capabilities such as cammication speed requested by the logic channel, are registered in the FR address conversion table 15325 within the conversion unit 1032-5 inside the FR exchange 10132. Also, sindlar registration is made to the FR address conversion table 1532-6.
In the entxxbmmt, the values set in the FR address conversion table 15325 are as follows: "9922" which is the ICS network address appropriated to the ICS logic terminal of the access control apparatus 1010-6 is set as the canmmication address of the corporation Y, and the FR address w2999n which is uniquely appropriated to the conversim unit 1032-6 within the FR network is registered as the receiving FR address. In the present embodinent, a mmmication speed of 64 Kbps is set as the channel capabilities. The contents registered to the FR address conversion table 1532-5 are also written to the FR address tration server 1632-5- The values set in the FR address conversion table 1532-6 are as follows: value "7711' which is the ICS network address appropriated to the ICS logic tenninal of the access control apparatus 1010-5 is set 76 as the camn=cation address of the corporation X, and the FR address "29770 which is uniquely appropriated in the FR network to the conversion unit 1032-5 within the FR exchange 10132-5 to which the access control apparatus 1010-5 is comected is registered as the receiving FR address. In the present entx)dt, a ccnTa=dcatim speed of 64 M:)ps is set as the Channel capabilities. The contents registered to the FR address cmversion table 1532-6 are also written to the FR address adffdnistration server 1632-6. <<Transferring ICS network packets frcin access control apparatus> > The ICS user packet sent toward the terminal of the corporation Y 00mected to the access control apparatus 1010-6 via the access control apparatus 1010-5 is ICS-encapsulated upon passing through the access control apparatus 1010-5, and beccrnes an ICS network packet F1 having the transmitting ICS network address n7711- and the receiving ICS network address "9922" as an ICS packet header. The ICS network Packet F1 is sent frctn the access control apparatus 1010-5 to the FR exchange 10132-5, and reaches the conversion unit 1032-5 via an interface unit 1132-5 which processes conversion/rectifying of electric signals in the CoMiniCation path. The following is a description thereof made with reference to the flowchart in FIG.43. <<Obtaining a MM>
Once the conversion unit 1032-5 receives the ICS network packet Fl(Step S1701), there is the need to request a MCI of the SVC logic channel determined by the relation of the transmitting ICS network address w7711n and the receiving ICS network address 09922n in the ICS 77 packet header, in order to correctly transfer the received packet Fl to the FR exchange 10132-5. In the case that the cammication is based m SW, there are cases that the logic channel corresponding with the ccmmnicatim path is established. at the time of receiving the ICS network packet, and cases in which the logic channel has not yet been established. In order to find out whether or not the logic channel has been established, the processing device 1232-5 first searches whether or not a logic channel corresponding with the pair of a transmitting ICS network address 077110 and a receiving ICS network address n9922n is registered. in the MC address conversion table 14325(Step S1702), and in the event that there is registration hexe, establist of the logic channel can be thus confirmed. That is, the fact that the logic channel corresponding with the pair of t=mmnitting ICS network address "7711" and receiving ICS network address R9922n is w16n is obtained, and further, it can be found that this logic channel is commicating based on SW, fran the value R1091 of the channel type obtained at the sarne time. In the event that there is no such registration m the MC address conversion table 1432-5, the reted logic channel is established with the latterdescribed <<call setting>>, and MCI is obtained fran the infonnation registered to the MC address conversion table 1432-5 at that point (Step S1703). <<Call setting>> Regarding the above-nmtioned cam wherein nthere is no registration of a MCI cormsponding with a commications path 78 determined by correspondence between a transmitting ICS network address and a receiving ICS network address m the MC address conversion table 1432-5n, i.e., in the case that there is no MCI corresponding with this camuucations path established yet, it becomes necessary to perform the follawing call setting, to establish a logic channel within the FR network ccniprizing ICS 925. An example of operation of the call setting will now be described.
The processing device 1232-5 of the conversion unit 1032-5, upon making reference to the MC address conversion table 1432-5 and finding that there is no registration of a MCI corresponding with the pair of transmitting ICS network address n77lin and receiving ICS network address n9922n (Step S1702), the processing device 1232-5 of the conversion unit 1032-5 refers to the MC address conversion table 1532-5, finds the iving ICS network address n9922' registered in the MC address conversion table 1532-5 matching the receiving ICS network address "99220, and obtains t=ansmitting FR address '2999n corresponding thereto and channel capabilities n64M corresponding thereto, and so forth (Step S1705). As described in the above <<Preparation>> section, this transmitting FR address '2999' is an address which is uniquely appropriated within the FR network to the conversion unit 1032-6 in the FR exchange 10132-6 to which the access control apparatus 1010-6 is comected, this access control apparatus 1010-6 having the ICS logic terminal provided with a receiving ICS network address n9922".
The processing device 1232-5 uses the obtained transmitting FR address w2999n to perfonn a request for call setting to the FR exchange 10132-5, and also requested at this time is channel ilities such as cemmn:lcation speed of the logic channel surultaneously obtained fran the FR address conversion table 1532-5 and so forth(Step S1706). The FR exchange 10132-5, upon receiving the call setting request, uses a signal method which is provided standard to FR exchanges proper as known technique to establish a logic channel within the FR network which reaches the FR exchange 10132-6. The MCI appropriated for identification of the logic channel is notified fran the FR exchanges to conversion units 10325 and 1032-6 therein, but in the event that this is based on stipulations of a signal method according to known technique, the value notified frcin the calling party FR exchange 10132-5 (e.g., "16n) and the value notified fran the receiving party FR exchange 10132-3 (e.g., R26n) may not be the same value. At the conversion unit 1032-5, the MCI w160 which is notified fran the FR exchange 10132-5 is registered in the FR address conversion table 1432-5 along with the transmitting ICS network address n7711" and the receiving ICS network address n9922m (Step S1707), and stores these m the FR address conversion table 1432-5 while the connection of the above logic channel is establi. %m the logic channel connection is no longer necessary, the conversion unit 1032-5 requests call release of the logic channel to the FR excbange 10132-5, and at the same time deletes the registration corresponding with MCI w160 m the FR address conversion table 1432-5. Registration to the FR address conversion table 1432-6 in the convexsim unit 1032-6 will be described later. <<Packet transfer>> The processing device 1232-5 of the conversion unit 1032-5 converts the ICS network packet Fl received from the access control apparatus 1010-5 into a FR packet sham in FIG.38 according to the logic chamel(DLCI 016n) established according the above description, and further perform the conversion into FR packets and transfers to the relay FR exchange 10132- 7(Step S1704). <<Transfer of FR packets>>
According to the above-described method, the FR packet si obtained bY converting the ICS network packet Fl is transferred from the FR exchange 10132-5 to the relay FR exchange 10132-5, and further is transferred to the FR exchange 10132-6 as FR packet S2. The following is a description thereof with reference to the flowchcart in FIG.44. <<Operation follg arrival of packet>>
Once the FR packet S2 reaches the PR excbmge 10132-6(Step S1710), this FR packet S2 is transferred frcin the FR exchange 10132-6 to the conversion unit 1032-6. At the conversion unit 1032-6, as shown in FIG.38, an ICS network packet is restored frcin the received FR packet (Step S1711). In FIG.40, the re tored ICS network packet is shown as an ICS network packet F2, but the contents thereof are identical to that of the ICS network packet Fl. The ICS network packet F2 is transferred to an access control apparatus detennined by the receiving ICS network address '9922n in the header thereof, i.e., 81 to access control apparatus 1010-6 which has an ICS logic terminal appropriated with ICS network address '9922"(Step S1712).
At this time, at the conversion unit 1032-6, the transmitting ICS network address 077110, the receiving ICS network address "9922m the channel type "10n indicating the fact this is SVC identified at the point of receiving the call, and MCI -26- appropriated at the time of call setting of the SM logic channel are registered in the FR address conversion table 14326(Step S1714), and at this time, the transmitting ICS network address '77110 of the ICS network packet F2 is written to the receiving ICS network address of the FR address conversion table 1432-6, and the receiving ICS network address 09922" is written to the transmitting ICS network address of the FR address conversion table 1432-6, i.e., these are written in reverse positions. However, if at the point of registration an item already exists within the FR address conversion table 1432-6 identical to that regarding which registration is being attempted, no registration is made. The address conversion information registered in the FR address conversion table 1432-6 Is stored m the MC address conversion table 1432-6 while the connection of the logic channel having a corresponding logic channel (in this exarrple, MCI 026n) is established. <<Reverse packet flow>> Now, description of the case of reverse flow of the ICS packet, i.e., flow from the corporation Y to the corporation X. will be made with reference to FIGs.39 and 40, under the presumption that call setting of the SM logic channel has been made according to the above i 82 description.
An ICS user packet sent out from the corporation Y to the corporation X is ICS-encapsulated upon passing through the access control apparatus 1010-6 and is converted into an ICS network packet F3 having the transmitting ICS network address w9922' and the receiving ICS network address N7711w in the header portion thereof, and is transferred to the conversion unit 1032-6 within the FR exge 10132-6. The processing following the flow shown in FIG.43 as described above is performed by the processing device 1232-6 of the corriersion unit 1032-6, but the FR address conversion table 1432-5 in the cormersion unit 1032-6 has registered therein a MCI '26w with a channel type w1OR which means SW, corresponding with transmitting ICS network address R9922w and receiving ICS network address w7711R, so the systern operates following the flow (1) shown in FIG.43, thereby converting the ICS network packets F3 into an FR packet (FR packet S3) and transfexring, with regard to MCI R26u.
The FR packet S3 is relayed and transferred by the relay FR exchange 10132-5, become FR packet S4 and reach the FR exchange 101325, are received via the logic channel having MCI w16n in the conversion unit 1032-6 thereof, and restored into an ICS network packet F4 having identical contents with the ICS network packet F3. In the conversion unit 1032-5, the pair of the transmitting ICS network address R9922n and the receiving ICS network address R7711" in the header of the ICS network packet F4 is already registered in the FR address conversion table 1432-5 in reverse fashion, so registration 83 to the FR address conversion table is not performed, and the ICS network packet F4 Is transferred to the access control apparatus 10105. <<Example of application to half -duplex cmTmmicatim>> The abave description has been made with reference to cases wherein an ICS packet is transferred fram the corporation X to the corporation Y, and reverse fram the corporation Y to the corporation X, with an network within ICS 925 having been configured of an FR network, being carried out with a single SVC logic channel. For example, applying the transfer and reverse transfer to a request packet to a server terminal of the corporation Y to be connected to the ICS frcxn a client texmnal of the corporation X to be comected to the ICS (transfer), and a response padcet to the request packet fran the client terminal of the corporation X to server terminal of the corporation Y (revexse transfer) results in an application example of half -duplex caffnmicatim in which one-way ccm=ication is performed at times, and both-way ccnTminicatim is realized by switching the caffinanication direction by time frames. <<Rle of application to full-duplex cammunication>>
The logic channel set m the FR network is capable of fi "lex cermiinicatim, i.e., simultaneous both-way communication, due to the FR stipulations. For example, applying the transfer and reverse transfer to request padcets to a plurality of server terminals of the corporation Y to be connected to the ICS fram a plurality of client terminals of the corporation X to be connected to the ICS 84 (transfer), and response packets to the request packets from the plurality of client terminals of the corporation X to the plurality of server terminals of the corporation Y (reverse transfer) results in asynchronous transfer of packets between the client terminals and the server terminals, so simultaneous both-way communication is conducted an the single SVC logic channel serving as the cmm=catim path, thereby making for an application example of flil 1 -duplex ccnTmjnicatim. (4) Flow of packets using PVC:
An entx:)dt wherein the network within the ICS 925 is configured with an FR network and PVC is applied as a canmnication Path within the FR network will be described with an example of an ics user packet sent from a terminal of the corporation W toward a terminal of the corporation Z. <<Preparation>> A transmitting ICS network address of an ICS network packet to be transferred to the FR network from the conversion unit 1032-5, a receiving ICS address, the MCI of the PVC fixed on the FR network (indicating the ccmklnicat:lon path between the FR exchange 10132-5 and the FR exchange 10132-6), and the cliannel type indicating that the MCI is PVC, a registered in the FR address conversion table 1432-5. This registration is different from the case of SVC, in that registration is made in the FR address conversion table 1432-5 at the same time that the PVC logic channel is set in the FR exchanges (10132-5, 10132-5, 10132-6) serving as the ceffounication path, and is saved in a fixed manner while the comn=cation path is necessary, i. e., until the setting of the PVC logic channel is canceled. Also, the registration is made to the MC address conversion table 1432-6 in the same manner. Incidentally, the MCI of PVC is appropriated to the respective FR exchanges at the tim that PVC is fixedly connected between the FR exchanges.
The values set in the MC address conversion table 1432-5 are as follows: value "7733" which is the transmitting ICS network address appropriated to the ICS logic terminal of the access control apparatus 1010-7 is set as the ccmnmicatim address of the corporation W, and value H9944n which is the receiving ICS network address appropriated to the ICS logic terminal of the access control apparatus 1010-8 is set as the mmunication address of the corporation Z. Further, PVC logic channel ID n18n which is appropriated to the FR exchange 10132-5 is set as the MCI, and value n20n is set for the channel type, indicating PVC. Also, settings for registering to the MC address conversion table 1432-5 are written to the MC address administration server 1732-5, and stored. In the same way, similar settings are made in the MC address conversion table 1432-6 in the cormersion unit 10326 in the FR exchange 10132-6, with the transmitting ICS network address and the receiving ICS network address reversed. In this case, even if the same PVC is being implied, the MCI may be of a different value to the MC address cmversion table 1432-5.
The values set in the MC address conversion table 1432-6 are as follaWS: value n994C which is the transmitting ICS network address appropriated to the ICS logic terminal of the access control apparatus 86 1010-8 is set as the ccmmmication address of the corporation Z, and value '7733" which is the receiving ICS network address appropriated to the ICS logic terminal of the access control apparatus 1010-7 is set as the camunication address of the corporation W. Further, PVC logic channel ID '28' which is appropriated to the FR exchange 10132-6 is set as the MCI, and value "20' is set as the channel type, indicating PVC. Also, settings registered to the MC address conversion table 1432-6 are also written to and store in the MC address administration server 1732-6. <<Transferring ICS network packets from the access control device>> As described in Embodiment-1, the ICS user packet sent toward the terminal of the corporation Z connected to the access control appar'atus 1010-8 via the access control apparatus 1010-7 is ICSencc-g>sulated UPOn Passing through the access control apparatus 1010-7, and becomes an Ics network packet F5 having the transmitting ICS network address -7733- and the receiving ICS network address "994C as an ICS packet header. The ICS network packet PS is sent from the aCCESS control apparatus 1010-7 to the FR exchange 10132-5, and reaches the conversion unit 1032-5. <<Obtaining a DLCI>> The processing device 1232-5 refers to the DLC address conversion table 1432-5 using the transmitting ICS network address "7733" and the receiving ICS network address "9944' in the header of the received network packet F5, and obtains the fact that the MCI identifying the logic channel set as a cm=mcatim path for this ICS 87 network address pair is '180. At the same tine, it can be found that this logic chamel is PVC, fran the value 020' of the Channel type obtained. <<Transfer of packet>> The processing device 1232-5 cmverts the ICS network packet F5 received fran the access control apparatus 1010-7 into an FR frame, and transfers it to FR exchange 10132-7, with regard to the PVC logic chamel n18" obtained as described above. The method of FR packet conversion is the same as that described above in the embodiment of SW. The above processing procedures of the conversion unit 1032-5 are as shown in FIG. 43, and PVC always follows the flow (1). <<Transfer of FR packet>> The FR packet S1 ccnprised of a plurality of cells obtained by converting the ICS network packet PS is transferred frern the FR exchange 10132-5 to the relay FR exchange 10132-5, and further is transferred to the FR exchange 10132-6 as FR packet S2. This operation is the same as with SW. <<Opexatim following arrival of packet>> Once the FR packet S2 reaches the FR exchange 10132-6, this FR packet S2 Is transferred frcxn the FR exchange 10132-6 to the conversion unit 1032- 6 within the FR exchange 10132-6. The conversion unit 1032-6 restored the received FR packet Into an ICS network packet, which is the same as with SW. In FIGAO, the restored ICS network packet is shown as ICS network packet F6, but the contents thereof are identical to that of the ICS network packet F5. The ICS network Q i 88 packet F6 is transferred to an access control apparatus determined by the receiving ICS network address 09944w in the header thereof, i.e., to access control apparatus 1010-8 which has an ICS logic terminal appropriated with the ICS network address 09944n. The abave processing procedures of the conversion unit 1032-6 are as shown in FIG.44, and PVC always follows the flow (1). <<Reverse packet flow>> Next, description of the case of reverse flow of the ICS packet, i.e., flaw from the corporation Z to the corporation W, will be made, with an PVC logic channel as the cammication path. An ICS user packet sent out fran the corporation Z to the corporation W is ICSencapsulated into an ICS network packet F7 having the transmitting ICS network address n994C and the receiving ICS network address R7733R in the header portion thereof when passing through the access control apparatus 1010-8, and is transferred to the conversion unit 1032-6 within the FR exchange 10132-6. The processing following the flow shawn in FIG.43 is performed by the processing device 1232-6 of the conversion unit 1032-6. In this case, the MC address conversion table 1432-5 in the conversion unit 1032-6 has registered therein a MCI R28w corresponding with the transmitting ICS network address "994C and the receiving ICS network address n7733N, so the system converts the ICS network packets F7 into an FR packet and transfers, with regard to MCI w28
The FR packet transferred Uimugh the FR network reach the conversion unit 1032-5 of the FR exchange 10132-5, are received via 89 the logic channel having MCI "181, and restored into an ICS network packet F8 having identical contents with the ICS network packet F7. amever, in the conversion unit 1032-5, the pair of the trwmLitting ICS network address n9944' and the receiving ICS network address n77330 in the header of the ICS network packet F8 is al registered in the MC address conversion table 1432-5 in reverse fashion, and an information that the MCI "18n as to this transmitting/receiving address pair is channel type '20n is obtained, so the registration to the FR address conversion table is not performed, and the ICS network packet F8 is transferred to the access control apparatus 1010-7. <<Example of application to half-duplex communication>> The above description has been made with reference to an embodiment of transferring an ICS packet using PVC with a network within ICS 925 having been configured of an FR network, but the difference between PVC and the earner-described SM IS whether the logic channel is fixed or called and set as necessary, so there is no di Terence In the operation itself of transferring packets aver the set logic Channel. Accordingly, regarding the ICS according to the present Jimmtim, an example of application to half -duplex cemnun:lcation using an FR network with a PVC logic channel is the same as an example of application to half -duplex communication using a SVC logic channel. <<kle of application to full-duplex c=micatim>>
Due to the same reason as that regarding the example of capplication to full-duplex communication, an example of application to WC fill 1 -duplex coffmmication is the saw as an ele of application to WC fuU-lex communication. (5) One-on-N or Won-one communication using PVC:
In the above example, an embodmmt was described wherein me logic channel was described as a communication path camecting one corporation (location) with one corporation (location), i.e., a comn-mication path connecting me ICS logic tenninal with one ICS logic tendnal, but one PVC logic channel can be used as a acm=catim path Connecting me ICS logic terminal with a plurality Of ICS logic terminals. Such One-on-N or Won- one cenininication will be described with reference to FIGs.45 and 46. <<Description of camponents>>
The corporation X is connected with an ICS logic terminal within the access control apparatus 1010-10 provided with the ICS network address H7711', and the access control apparatus 1010-52 is connected to the FR exchange 10132-52. With the parties to be reached frcm the corporation X as the corporations A through D, the corporation A is connected to an ICS logic terminal within the access control apparatus 1010-62 provided with the ICS network address 09922n, and the corporation B is connected to an ICS logic terminal within the access control apparatus 1010-62 provided with the ICS network address n9923". In the same manner, the corporation C is comected to an ICS logic te=drial within the access control apparatus 1010-82 provided with the ICS network address n994C, and the corporation D is connected to an 91 ICS logic terminal within the access control apparatus 1010-82 prmided with the ICS network address "99550. The access control apparatuses 1010- 62 and 1010-82 are connected to the FR exchange 10132-62, and the FR exchange 10132-52 and FR exchange 10132-62 are connected via a relay network. <<Preparation>> With regard to the FR exges 10132-52 and 10132-62, a single PVC logic channel connecting the conversion unit 1032-52 within the FR exchange 10132-52 and the conversion unit 1032-62 within the FR exchange 10132-62, setting -W as the MCI provided to the conversion unit 1032-52 of the logic channel, and "2C as the MCI provided to the conversion unit 1032-62 of the logic channel. Registration such as shown in FIGs.45 and 46 is performed regarding the MC address conversion table 1432-52 within the conversion unit 103252 and the MC address conversion table 1432-62 within the conversion unit 103262. <<Frame flow for one-on-N comnnicatim>> The flow of packet for one-on-N comyunication will be described conce=ning packet sent fraim the corporation X to each of the corporations A tbrough D. An ICS network packet sent fram the corporation X taward the corporation A, having a transmitting ICS network address "7711" and a receiving network address N9922n, is transferred to the PVC logic channel with a MCI R 161, by neans of making reference to the MC address conversion table 143262 in the conversion unit 103252. An ICS network packet sent fran the corporation X toward the 92 corporation B, having a transmitting ICS network address "7711n and a receiving network address R9933', is also transferred to the PVC logic channel with a MCI '16'. An ICS network packet sent frcin the coiporation X toward the corporation C, having a transmitting ICS network address M11' and a receiving network address n994C, and an ICS network packet sent frcm the corporation X toward the corporation D, having a trwLmdtting ICS network address R7711w and a receiving network address "9955w a transferred to the PVC logic channel with a MCI '16n in the same manner. This indicates that one-on-N (the corporation X to the corporations A through D) cemmmicatim is being performed while sharing a single P5X logic channel. Reverse packet flow, i.e., transfer fram the corporations A through D to the corporation X, will be described next. <<Packet flow for Won-one cannmication>> The flow of packet for Won-one c=unication will be described concerning packet sent to the corporation Xfrcm each of the corporations A through D. An ICS network packet sent toward the corporation X frern the corporation A, having a transmitting ICS network address "9922" and a receiving network address n7711", is transferred to the PVC logic channel with a MCI 1126n, by means of making reference to the MC address conversion table 1432-62 in the conversion unit 1032-62. An ICS network packet sent toward the corporation X frorn the corporation B, having a transmitting ICS network address n9933n and a receiving network address R7711u, is also transferred to the PVC logic channel with a MCI "2C. An ICS network 93 packet sent toward the corporation X fram the corporation C, having a transmitting ICS network address n994C and a receiving network address "7711", and An ICS network packet sent toward the corporation X frcin the corporation D, having a transmitting ICS network address N9955n and a receiving network address w7711n are transferred to the PVC logic channel with a MCI w260 in the sama manner. This indicates that Won-one (the corporations A through D to the corporation X) camn=cation is being perfo while sharing a single PVC logic channel. (6) N-m-N c=unication using PVC:
Using the same rnethod as one-on-N caut,Linication, one PVC logic channel can be used as a c=unication path connecting a plurality of ICS logic terminals with a plurality of ICS logic terminals. Such Non-N ccncatim will be described with reference to FIGs.47 and 48. <<Description of ccnporients>>
The corporation X has ICS logic terminal address R7711R of the access control apparatus 1010-13 as the contact point thereof, the corporation Y has ICS logic te=dnal address 07722n of the access control apparatus 101013 as the contact point thereof, and the access control apparatus 1010-13 is connected to the FR exckmge 10132-13. With the other party which the corporation X or corporation Y is atternpting to reach as the corporation A or corporation C, the corporation A has ICS logic terminal address n9922m of the access control apparatus 1010-23 as the contact point thereof, the corporation Y has ics logic terminal address n9944n of the access 94 control apparatus 1010-43 as the contact point thereof. The access control apparatuses 1010-23 and 1010-43 are connected to the FR exchange 10132-23, and the FR exchanges 10132-13 and 10132-23 are oamected via a relay network. <<Preparation>> With regard to the FR exchanges 10132-13 and 10132-23, a single PVC logic channel connects the conversion unit 1032-13 within the FR exchange 10132- 13 and the conversion unit 1032-23 within the FR exchange 10132-23, setting R16n as the MCI provided to the conversion unit 1032-13 of the logic charmel, and n26m as the MCI provided to the conversion unit 1032- 23 of the logic channel. The registration such as shown in FIGs.47 and 48 is per-fo regarding the MC address conversion table 1432-13 within the conversion unit 1032-13 and the MC address conversion table 1432-23 within the conversion unit 103223. <<Packet flow for N-m-N canaziicatim>> The flow of packets for N-m-N ccmTunicatim will first be described concerning packets sent frcyn the corporation X to each of the corporations A and C. An ICS network packet sent frxin the corporation X toward the corporation A, having a transmitting ICS network address R77110 and a receiving network address 09922n, is transferred to the PVC logic channel with a MCI R16R, by mans of making reference to the MC address conversion table 1432-13 in the conversion unit 1032-13. An ICS network packet sent fran the corporation X toward the corporation C, having a transmitting ICS A 1 1 network address -7711' and a receiving network address 99441', is also transfe=ed to the PVC logic channel with a MCI w 16 -. W-xt, the flow of packet will be described concerning packets sent frcm the corporation Y to each of the corporations A and C. An ICS network Packet sent fram the 001POratlOn Y toward the corporation A, having a tr mstwitting ICS network address w7722n and a receiving network ad s N9922n, is transferred to the PVC logic channel with a MCI 016n, by means of making reference to the DLC address cmversion table 1432-13 in the conversion unit 1032-13. An ICS network packet sent fran the corporation Y toward the corporation C, having a transmitting ICS network address "7722" and a receiving network address -9944n, is also transferred to the PVC logic channel with a MC1 n1C.
* Next, reverse packet flow will be described concerning packets sent to each of the corporations X and Y frcm the corporation A. An ICS network packet sent toward the corporation X frctn the corporation A, havIng a transmitting ICS network address -9922- and a receiving network address "7711w, is transferred to the PVr- logic channel with a MCI n26n, by means of making reference to the DLC address conversion table 1432-23 in the conversion unit 1032-2. An ICS network packet Sent toward the Corporation Y fr(n the corporation A, having a itting ICS network address n9922" and a receiving network add s w7722", is also transferred to the PVC logic channel with a MCI "2C. An ICS network packet sent toward the corporation X frcxt the corporation C, having a transmtting ICS network address w9944n and a receiving network address "7711n, is transferred to the PVC 96 n logic channel with a MCI "26. An ICS network packet sent toward the corporation Y frcxn the corporation C, having a transmitting ICS network address R994C and a receiving network address R77220, is also transferred to the PVC logic channel with a MCI n2C. Thus, N-on-N camnmication is performed. while sharing a single PVC logic channel.
Embodiment-5 (Containment of telephone line, ISDN Line, CATV line, satellite line, M Line, cellular phone line):
As described in Ehbodiment-l and Ewbodiment-2, connection to access control apparatuses which serve as access points is not limited to camnmication lines to LANs (dedicated lines, etc.), but rather, telephone 1, ISDN lines, CATV lines, satellite 1, M 1 and cellulw phone lines may also be contained. The following is a description of an embodiment.
FIG.49 through FIG.52 illustrate an example of a system containing telephone lines, ISDN lines, CATV lines, satellite lines, M lines and cellulw phone lines, according to the ICS 6000. The line portions 6011-1 and 6011-2 are made up of telephone Line conversion units 6030-1 and 60302, ISDN line conversion units 6029-1 and 6029-2, CATV line conversion units 6028-1 and 6028-2, satellite line conversion units 6027-1 and 60272, M line conversion units 6026-1 and 6026-2, and cellular phone Line conversion units 6025-1 and 6025-2. The telephone line convexsim units 6030-1 and 6030-2 have capabilities for conversion and reverse-conversion equivalent to physical layers and data Link layers (first and second 1 of OSI (Open Systems Interconnection) caffainication protocol) between the telephone lines 6160-1 and 6160-2 and the access control apparatuses 60101 and 6010-2. Also, the ISDN line conversion units 6029-1 and 6029-2 have capabilities for corive=im and reverse-cormersion equivalent to physical layers and data 1Ank layers between the IsDN 1 6161-1 and 6161-2 and the access control apparatuses 6010-1 and 6010-2, and the CATV Line conversion units 6028-1 and 6028-2 have capabi 1 i i for cmversion and reverse-conversion equivalent to physical layers and data link layers between the CATV L 6162-1 and 6162-2 and the access control apparatuses 6010-1 and 6010-2. Further, the satellite Line conversion units 6027-1 and 6027-2 have ties for conversion and reverse-conversion equivalent to physical layers and data Lu& layers between the satellIte 1 61631 and 6163-2 and the access control apparatuses 6010-1 and 6010-2, and the M conversion units 6026-1 and 6026-2 have capabilities for conversion and reverse-conversion equivalent to physical layers and data 1-11 layers between the M lines 6164-1 and 6164-2 and the access control apparatuses 6010-1 and 6010-2. The cellular phone conversion units 6025-1 and 6025-2 have capabilities for conversion and reverse-conversion equivalent to physical layers and data Link layers between the cellular phone wireless lines 6165-1 and 6165-2 and the access control apparatuses 6010-1 and 6010-2. An example of the conversion table 6013-1 is shown in FIG.53.
The ICS packet interface network 6050 transfers ICS network packets following the RFC791 or RFC1883 stipulations, without change 98 in the ICS network packet for-mat. The X. 25 network 6040 accepts ICS network packets and converts these to X. 25 fomat and transfers, and at the end reverse-converts these into ICS network packet format and outputs. The FR network 6041 accepts ICS network packets and converts these to FR format and transfers, and at the end reverse-converts these into ICS network packet format and outputs. The ATM network 6042 accepts ICS network packets and converts these to ATM formt and transfers, and at the end reverse-cmverts these into ICS network packet format and outputs. The satellite comTunication network 6043 accepts ICS network packets and transfers the infonnation using the satellite, and at the end reverseconverts these into ICS network packet format and outputs. Also, the CATV line network 6044 accepts ICS network packets and converts Into CATV f ormat packets and transfers the contents thereof, and at the end reverseconverts these into ICS network packet format and outputs. <<CatTnm preparation>> The conversion table 6013-1 within the access control apparatus 6010-1 contains the transmitting ICS network address, the sender ICS user address, the receiver ICS user address, the receiving ICS network address, the request identification and the speed as shown in FIG.53. The request identification represents services and connections, e.g., as follows: value "lu indicates intra-corporation service, value R2w indicates inter- corporation service, value "V indicates virtual dedicated line connection, and value wC indicates ICS server connection. The conversion table 6013- 1 contains addresses registered 99 therein with the sane method as that described in Embodiment-1 and Effbodirrient-2. The ICS network server 670 has an ICS user address of '200OR and an ICS network address of "7821", and is connected to the access control apparatus 6010-1 via ICS camunications line 6081-1. The conversion table 6013-1 contains the receiver ICS user address 02000w of the ICS network server 670, receiving ICS network address of n7821w and request identification of w40.
The operation thereof is described with reference to FIG.54. <<Caaminication fram a telephone line to an ISDN lim>> The user 6060-1 sends out the ICS user frame F110 with a sender ICS user address 03400n and a receiver ICS user address n250OR to the access control apparatus 6010-1 via the telephone Line 6160-1. The access control apparatus 6010-1 receives the ICS user packet F110 fran the telephone Line cormersion unit 6030-1 with the ICS network address 07721"(Step S1800), and checks whether or not the ICS network address 077210 is registered an the conversion table 6013-1 with the request identification as virtual dedicated line connection 03n(Step S1801). In this case, the tration has not been made, so next, the access control apparatus 6010-1 checks that the receiver ICS user address 025000 is registered m the conversion table 6013-1(Step S1803) and that the request identification has been registered as intercorporation commnication "2N(Step S1804). In this case, the registration has been made, so the receiving ICS network address n5522n is obtained from the conversion table 6013-1, processing such as billing related to the inter-corporation commication is performed 1 (Step S1805), the ICS user packet F110 is ICS-encapsulated (Step S1820), converted into an ICS network packet F120, and sent to the ICS packet transfer network 6030 via ICS network camunication line 6080-1 (Step S1825). <<CcmTiLmication fran an ISDN line to a CATV line>> The user 6061-1 sends out the ICS user packet F111 with a sender ICS user address R350OR and a receiver ICS user address 12600w to the access control apparatus 6010-1 via the ISDN line 6161-1. The access control apparatus 6010-1 receives the ICS user packet F111 fran the ISDN line conversion unit 6031-1 with the ICS network address M22' (Step S1800), and checks whether or not the ICS network address w7722n is registered m the conversion table 6013-1 with the request identification as virtual dedicated line connection n3w(Step S1801). In this case, the registration has been made, so the receiving ICS network address n552Y is obtained from the conversion table 6013-1, processing such as billing related to dedicated line connection is performed(Step S1802), the ICS user packet F111 is ICS-encapsulated (Step S1820), converted into an ICS network packet F121, and sent to the ICS packet transfer network 6030 via ICS network cmcatim line 6080-l(Step S1825).
Incidentally, regarding the virtual dedicated line connection, the sender ICS user address and receiver ICS user address written within the ICS network packet F111 do not have to be used in the access control apparatus. Next, the ICS network packet F121 reaches the access control apparatus 6010-2 via the FR network 6041 and the 101 ICS network cammmication line 6080-2 for exle, is reversely ICSencapsulated and restored into the ICS user packet F111, and reaches the user 6062-2 connected to the ChTV line 6162-2 via the CATV line unit 6028-2 which is provided with the transmitting ICS network address "5523'. <<CcmTLmication frcin a CATV line to a satellite Line>> The user 6062-1 sends out the ICS user packet F112 with a sender ICS user address "3600" and a receiver ICS user address 02700' to the access control apparatus 6010-1 via the CATV Line 6162-1. The access control apparatus 6010-1 receives the ICS user packet F112 fran the CATV line converslon unit 6032-1 with the ICS network address "77230 (Step S1800). and Ch whether or not the ICS network address R77230 is registered m the cmversion table 6013-1 with the request identification as virtual dedicated line connection R30(Step S1801). In this case, the registration has not been made, so next, the access control apparatus 6010-1 ch that the receiver ICS user address w270OR is registered on the cmversion table 6013-1(Step S1803) and that the request identification has been registered as intercorporation camnmication 02"(Step S1804). In this case, the registration has been made as inter-corporation ccnin=catim w2 so the receiving ICS network address w5524n is obtained fram the conversion table 6013-1, processing such as biLl-ing related to intercorporation cmnunicatim is perfo(Step S1805), the ICS user packet F112 is ICSencapsulated(Step S1820), cmverted into an ICS network packet F122, and sent to the ICS packet transfer network 630 102 via ICS network ccmrmicatim line 6080-l(Step S1825). The ICS network packet F122 reaches the access control apparatus 6010-2 via the ATM network 6042 and the ICS network cammunication line 6080-2 for example, is reversely ICS-encapsulated and restored into the ICS user packet F112, and reaches the user 6063-2 with the receiving ICS network address "2700". <<Ccnllunication fram a satellite line to an M line>> The user 6063-1 sends out the ICS user packet F113 with a sender ICS user address R3700w and a receiver ICS user address R2800n to the access control apparatus 6010-1 via the telephone line 6163-1. The access control apparatus 6010-1 receives the ICS user packet F113 fran the satellite line conversim unit 6027-1 with the ICS network address "7724"(Step S1800), and checks whether or not the ICS network address w7724R is registered m the conversion table 6013-1 with the request identification as virtual dedicated Line connection n3n(Step S1801). In this case, the registration has not been, so next, the access control apparatus 6010-1 checks that the receiver ICS user address "2800w is registered m the conversion table 6013-l(Step S1803) and that the request identification has been registered as intercorporation c=unication "2w(Step S1804). In this case, the registration has been as inter- corporation cenTmmcatim "2 so the receiving ICS network address "5525n is obtained fram the conversion table 6013-1, processing such as billing related to intercorporation cannmication is performed(Step S1805), the ICS user packet F113 is ICS-encapsulated(Step S1820), converted into an ICS 103 network packet F123, and sent to the ICS frame transfer network 6030 via ICS network connunication lin 6080-l(Step S1825). The ICS network packet F123 reaches the access control apparatus 6010-2 via the ICS packet interface 6050 and ICS network cammication line 60802 for example, is reversely ICS-encapsulated. and restored into the ICS user packet F113, and reaches the user 6064-2 with the receiving ICS network address "2800". <<Ccmamicat:lon fran an M line to a cellular telephone line>> The user 6064-1 sends out the ICS user packet F114 with a sender ICS user address w0012K and a receiver ICS user address R2900n to the access control apparatus 6010-1 via the M line 6164-1. The access control apparatus 6010-1 receives the ICS user packet F114 from the IM line conversion unit 6026-1 with the ICS network address M25" (Step S1800), and checks whether or not the ICS network address w7725' is registered m the conversion table 6013-1 with the request identification as virtual dedicated line oannection NY'(Step S1801). In this case, the registration has not been made, so next, the access control apparatus 6010-1 checks that the receiver ICS user address 029000 written in the ICS user packet F114 is registered m the conversion table 6013-l(Step S1803) and that the request identification has been registered as Inter-corporation conTamication, 02n (Step S1804). In this case, the registration has not been made as inter-corporation cemmunication m2", so the access control apparatus 6010-1 checks whether the registration has been made as intracorporation cammanicatim wlw(Step S1810). In this case, the 104 1 1 registration has been made as intra-corporation c=unication 11R, so the receiving ICS network address w5526n is obtained fran the conversion table 6013-1. processing such as billing related to intracorporation cammication is performed(Step S1811), the ICS usex' packet F113 is ICS- encapsulated (Step S1820), converted into an ICS network packet F124, and sent to the ICS packet transfer network 6030 via ICS network camunication line 6080-1(Step S1825). The ICS network packet F124 reaches the access control apparatus 6010-2 via the CATV line network 6044 and ICS network camnmication line 6080-2 for example, is reversely ICS-encated and restored into the ICS user packet F114, and reaches the user 6065-2 with the receiving ICS network address R290C. <<Caniunication fran a cellular telene line to a telephone line>> The user 6065-1 sends out the ICS user packet F115 with a sender ICS user address R3800n and a receiver ICS user address n24000 to the access control apparatus 6010-1 via the cellular telephone line 6165-1. The access control apparatus 6010-1 receives the ICS user packet F115 from the cellular telephone line conversion unit 6035-1 with the ICS network address R7726m(Step S1800), and checks whether or not the ICS network address R7726w is registered m the conversion table 6013-1 with the request identification as virtual dedicated line connection R3u(Step S1801). In this case, the registration has not been made, so next, the access control apparatus 6010-1 checks that the receiver ICS user address H2400w written in the ICS user packet F115 is registered m the conversion table 6013-l(Step S1803) and that the request identificatien has been registered as inter-corporation communication "20(Step S1804). In this case, the registration has been made as intercorporatim communication n20, so the receiving ICS network acls n5521n is obtained fran the cormersion table 6013-1, processing such as billing related to intra-corporation cemamication is performed(Step S1811), the ICS user packet F115 is ICS-encapsulated (Step S1820), converted into an ICS network packet F125. and sent to the ICS packet transfer network 6030 via ICS network cammication Line 6080-l(Step S1825). The ICS network packet F124 reaches the access control apparatus 6010-2 via the satellite line network 6043 and ICS network =minication line 6080-2 for example, is reversely ICS-encapsulated and restored into the ICS user packet F115, and reaches the user 6060-2 with the receiving ICS network address n2400" <<Cmcation fr= a cel lill ar telephone line to an ICS network sei-v-ex>> The user 6066-1 sends out the ICS user packet F116 wth a sender ICS user address n 39800 and a receiver ICS user address n2000w to the access control apparatus 6010-1 via the cellular telephone line 6166-1. The access control apparatus 6010-1 receives the ICS user packet F116 fran the cellul= telephone line conversion unit 6025-1 with the ICS network address "7726"(Step S1800), and checks whether or not the ICS network address "7726n is registered m the conversion table 6013-1 with the request identification as virtual dedicated line connection n31(Step S1801). In this case, the registration has not been made, so next, the access control apparatus 6010-1 checks that the receiver ICS i 106 user address R200Ou written in the ICS user packet F116 is tered m the convexsim table 6013-l(Step S1803) and that the request identification has been registered as inter-corporation cana=cation R2R(Step S1804). In this case, the registration has not been made so the access control appanatus 6010-1 checks whether or not the request identification is registered as intra-corporation cammication 0195 (Step S1810). In this case, the registration has not been oade, so the access control apparatus 60101 checks whether or not the request identification is registered as ICS network server R4R(Step S1812). In this case, the registration has been made as inter-corporation c=mication "2n, so the receiving ICS network address R8721R ls obtained frcrn the conversion table 6013-1, processing such as billing related to intra-corporation ccm=dcatim is performead(Step S1813), the ICS user packet F115 is ICS-encapsulated(Step S1820), cmverted into an ICS network packet, and sent to the ICS network server 670 (Step S1825).
According to the above-desc=bed transfer=g methods, changing the ICS user address written into the ICS user packet allows for tSie sending side to select any of the following on the receiving side: telephone line, ISDN line, CATV Line, satellite Line, M line, or cellular phone line; regardless of whether the sending side is any of the follg: telephone line, ISDN line, CATV line, satellite line, 1M line, or cellular phone line.
Embodiment-6 (Dial-up router) 107 An example of using a cli al -up router will be described with reSerence to FIG.55 through FIG-57. A user 7400-1 within a LAN 7400 has an ICS user address "2500", and similarly, a user 7410-1 within a LAN 7410 has an ICS usex address 03601". The administrator of the dial-up router 7110 enters in the router table 7113-1 of the dial-up rolt 7110 the telephone nwter specified from the receiver ICS user ad 1 s and the order or priority thereof from the router table input unit 7018-1.
Now, registration to the router table 7113-1 will be described with reference to FIG.58. In the event that the receiver ICS user address 03601n has been specified, the highest m the priority list is telephone number '03-1111-1111n, N6.2 m the priority List is telephone number '032222-2222n, and No.3 on the priority List is telephone number n03-33333333n. The receiver ICS user addresses "3602R and 037000 are also registered in the same manner. Here, reference will be made to the flowchart shown in FIG.59 as an example of camunication from the sender ICS usex address w2500" to the receiver ICS user address "3601".
The user 7400-1 sends the ICS user packet F200 to the dial-up router 7110 via the gateway 7400-2 and the user logic camnmication line 7204. The dial-up router 7110 operates under the processing device 7112-1, and receives the ICS user packet F20O(Step S1901), reads the receiver ICS user address n3601n included in the ICS user packet F200, searches the router table 7113-1 with the address n3601n included in the ICS user packet F200 as the search keyword(Step S1902), 108 1 i and finds the telephone number with high priority. In this case, the telephone number highest m the priority list is "03-1111-1111", as shown in the router table in FIG.58, so the dial-up router 7110 dials the telephone number R03-1111-1111" via the telephone network as the first atternpt(Step S1910). As a result, a telephone caruenication path 7201 with the line portion 7011-1 of the access control apparatus 7010-1 which is called by the telephone number R03-1111-1111R is established, i.e., the dial-up router 7110 and the Line portion 7011-1 are connected by a telephone line. In the event that the dial-up router 7110 and the line portion 7011-1 are not connected by a telephone line, dial-up router 7110 finds the telephone number R032222-2222- that is second in priority, and dials the telephone number R03-2222-2222" via the telephone network as the first attempt(Step S1911). As a result, a telephone ccnmxmicatim path 7202 with the line portion 7011-1 of the access control apparatus 7010-1 which ls called by the telephone number R03-2222-2222R is established. Also, in the event that the clial-up router 7110 and the line unit 7011-1 are not connected by a telephone line, the dial-up router 7110 finds the telephone number R03-3333-3333n that is third in priority, and dials the telephone number R03-3333-333Y via the telephone network as the third attempt(Step S1911). As a result, a telephone camuziication path 7203 with the Line port-ion 7011-3 of the access control apparatus 7010-3 which is called by the telephone number n03-3333-3333" is established. In the event that the dial-up router and the access control apparatus are not connected by a telephone line regardless of 109 1 the above multiple attempts, the dial-up router 7110 stores the received ICS packet F200 in a memory 7117-1(Step S1913), makes reference again to the router table(Step S1902) after a certain amount of time(Step S1914), and attempts est lisbment of telephone commutlication path 7201, 7202 or 7203.
Next, description will be made regarding the opemtims following the connection of the aforementioned dial-up router 7110 and the line portion 7011-1. The clial -up router 7110 enters verification procedures for detemntning whether this is an authorized user registered in the access control apparatus 7010-1 as a user(Step S1920). Any arrangement which achieves the object of verification is agreeable for the verification procedures, but for example, an ID and password for identifying the dialup router are sent fran the dial-up router 7110 to the line portion 7011 via the telephone line 7201 the verifying unit 7016-1 of the access control apparatus 7010-1 checks whether or not the received ID and password are correct, and in the event that the user is correct, the fact that the user is correct, i.e., communication data notifying "affinrative confirmationn is sent to the dial-up router 7110 via the telephone communication path 7210, thus completing the verification procedures. In the event that either me of the ID or password is incorrect, communication via the telephone communication path 7210 is terminated.
Upon receiving notification of "affirmative confirmation" from the telephone line 7201 in user verification, the dial-up router 7110 sends the ICS user packet F200 to the telephone communication path 7201 (Step S1930), and when the confirmation has been made that the access control apparatus 7010-1 has received the ICS user packet F200, releases the telephone camiunication path 7201 and hangs up(Step S1931), thus leting the abave-described series of processes for the dial-up router.
Upon receiving the ICS user packet F200, the access control apparatus 7010-1 uses the conversion table 7013-1 under administration of the processing device 7012-1, generating an ICS network packet F301, which is sent out into the ICS network camnmication line 7301 within the ICS 7100. In the present embodinient, the transmitting ICS network address for the ICS network packet F301 Is 07501n which is a network address appropriatedto the ICs logic terminal within the line portion 7011-1, and the receiving ICS network address is n8601n appropriated to the ICS logic terminal within the access control apparatus 7010-2. The ICS network packet F301 is transferred across the ICS 7100 and reaches the access control apparatus 7010-2, where it is reversely ICS-encaated and reaches the user 7410-1 with the ICS user address "3601' via the user logic communication line 7601.
In the above description, in the event that a telephone catatunication path 7202 called by the telephone nt -03-2222-2222' is established between the dial-up router 7110 and the line portion 7011-1 of the access control apparatus 7010-1, the ICS user packet F200 is transferred frem the dial-up router 7110 to the line portion 7011-1 via the telephone ccmTLmication path 7202. In this case also, upon receiving the ICS user packet F200, the access control apparatus ill 7010-1 performs the ICS encapsulation to generate an ICS network packet F302, which is sent out into the ICS network cammnication line 7301 within the ICS 7100. Now, the transmitting user address for the ICS usex packet F302 is 75020, and the receiving ICS user address, '8601'.
Also, in the event that a telephone commtmication path 7203 called by the telephone number "03-3333-3333n is established between the dial-up router 7110 and the line portion 7011-3 of the access control apparatus 7010-3, the ICS user packet F200 is transferred from the dial-up router 7110 to the line portion 7011-3 via the telephone cxxtatmicati-on path 7203. In this case, upon receiving the ICS user packet F200, the access control apparatus 7010-3 perform the ICS encapsulation to generate an ICS network packet F303, which is sent out into the ICS network commmication line 7303 witbin the ICS 7100. In this case, the transmitting user address for the ICS user packet F303 is '7800" which is a network address provided to an ICS logic termina.l within the line portion 7011-3, and the receiving ICS usex address is "8601w, which is a network address provided to an ICS logic terminal within the line portion 7010-2. The ICS network packet F303 is transferred across the ICS 7100 and reaches the access control apparatus 7010-2, where it is reversely ICS-encapsulated and reaches the user 7410-1 with the ICS user address w3601" via the user logic ccxittaziication line 7601.
112 Embodiment-7 (ICS address name administration server):
In the present ent)odt shown in FIG.60, ICS address name administration servers 13000-1, 13000-2, 13000-3 and 13000-4 within the ICS 13000-1 are respectively connected to access control apparatuses 13010-1, 13010-2, 13010-3 and 13010-4. The ICS address name administration server 13000-1 has a processing device 130001-1, a correlation table 13002-1 and an ICS name converting table 13003-1, and further is appropriated an ICS network address 098010 which can be miqmly distinguished within the ICS.
The other ICS address name administration servers 13000-2, 13000-3 and 13000-4 also have the sc-m capabilit as the ICS address name administration server 13000-1, each containing a processing device, a correlation table and an ICS name conversion table, each having the respective ICS network addresses R9802n, R9803n and n9804n each camnmicating me with another using ICS network camnmication functions, and each capable of exchanging the information that another ICS address name administration server has. The ICS address name VAN representative administration server 13020-1 has an ICS network address n9805n, and another ICS address name VAN representative administration server 13020-2 has an ICS network address n9806n, these comninicating with a great ICS address name administration servers and other ICS address name VAN representative administration servers using ICS network canxniication functions, and each capable of exchanging the information that each other has. The ICS address name VAN representative administration server 130201 has a processing 113 9 device 13031-1 and a database 13032-1, perform exchange of the information such as ICS addresses and ICS names with all ICS address name administration servers within the VAN 13000-1, the collected data relating to the ICS addresses and ICS names is stored in the database 13032-1. Hence the ICS address name VAN representative administration server 13020-1 represents the VAN 13030-1 by means of performing the above procedures.
The above ICS address name VAN administration server 13020-1 includes a processing device, a correlation table and an ICS name conversion table, and another entx)dunent may be fo by grouping the co=elatlon table and the ICS name conversion table into a single table, in which case one of the ICS user addresses contained in both of these two types of tables is used.
&t)odit-8 (Full-duplex ccnymmicatim including satellite ccncatim path: Part l): <<Configuration of user, data providing corporation, communication satellite, etc.>> The present embodiment perform a type of fl -duplex ccnTmmicatim by ining a satellites transmitting functions and IP ccffmjnicatim functions. In the present entediment, wIP terminalw indicates a terminal or camputer which has functions of sending and receiving IP packets.
Description will be made with reference to FIG.61. The present embodiment is comprised of: ICS 16000-1; access control apparatuses
114 16100-1, 16110-1 and 16120-1; data providing corporation 16200-1; IP te=ninal 16210-1 of the data providing corporation; satellite transmission corporation 16300-1; IP terminal 16310-1 of the Satellite transmission corporation; database 16320-1 of the satellite transmission corporation; satellite transmission equipment 16330-1 of the satelli e transmission corporation; ccnTmziicatim sateJLlite 164001; users 16500-1, 16510-1 and 16520-1; IP terminals 16501-1, 16511-1 and 16521-1 of each user; satellite receivers 16502-1, 16512-1 and 16522-1 of each user; satellite electric wave comnnication lines 16600-1, 16610-1, 16620-1 and 16630-1; and user logic communication 1 16710-1, 16720-1, 16730-1 and 16740-1. The IP terminals 16210-1, 16501-1, 16511-1 and 16521-1 each have ICS user addresses u3000m, '2300', '240OR and n250OR, and are respectively connected to the access control apparatuses 16100-1, 16120-1, 16120-1 and 16110-1, via user logic canmmication 1. The IP terminal 16310-1 can be classified as an ICS network server, baving an ICS special number "4300", and connected to the access control apparatus 16100-1 via the ICS network c=unication line within the ICS 16000-1. Electric wave transmitted from the sate M te transmitter 16330-1 transfer information via the satellite electric wave commication path 16600-1, the electric wave is received by satellite receivers 16502-1, 16512-1 and 16522-1, the received data being delivered to the IP terminals 16501-1, 16511-1 and 16521-1. The present embodiment is characterized by the satellite transmission corporation 16300-1 having satellite cammunication functions.
<<Preparation: Description of cormentional art>>
In order to describe the present entxxlinient, first, known Tep and UDP cenrunication technology will be explained. FIG.62 is an exanPle of full-duplex camxinicatim using TCP, wherein a cemmzii cating party 1 sends a synchronous packet #1, and a cammunicating party 2 returns a confirming packet #2 upon receiving the first packet.
Communication procedures wherein such packets #1 and #2 are sent and received is referred to as TCP connection est phase. Next, both ccnTamcating parties send and receive packets #3-1, #3-2, C-3 and #3-4, and c=lunication procedures wherein such sending and receiving of Packets Is Performed is referred to as TCP data transfer phase. Finally, a final packet #4 is sent and a confirming packet #5 is returned to conf= the reception of the packet. Cemmalcation procedures wherein such packets #4 and #5 are sent and received is referred to as TCP connection ending phase. Besides the above TCP c=unication procedures, there are ccmmziication procedures called UDP, canpr of data transfer alone. An ele Is shown in FIG.62, UDP is characterized in comparison with WP by the absence of the TCP connection establishment and connection ending phases.
The mnninication procedures according to the present embodiment will be made with reference to FIGs.61 and 63. In the following procedures. the aforementioned TCP teclmology full-duplex cmmzucation is employed except for the cases of transmission instruction to satellite transmission pment (#6 and #14 in FIG.63) and "data transmissionw using electric wave fran the satellite transmission 116 equipment (#7 and #15 in FIG.63), however, only the TCP data transfer phase is sham in FIG. 63, and the TCP connection estabLishment phase and TCP connection ending phase are omitted fran the drawing and fran description thereof.
The IP terminal 16210-1 of the data providing corporation 162001 obtains Mata to be pruvided' fram the database 16220-1 thereof and sends it to the IP terminal 16310-1 of the satellite transmission corporation 16300-1 which can be identified by the ICS special nuffber R430Ow, using the IP frame transmission functions of the ICS (#1 in FIG-63, the same hereafter). The satellite transmission corporation 16300-1 stores the received Rdata to be pravidedn in its database 16320-1. The IP temninal 16501-1 of the user 16500-1 sends an "inquiry packetn to the IP terminal 16210-1 which can be identified with the ICS user address R300On(#2). The IP terminal 16210-1 returns a Rreply packetn(#3), the IP terminal 16501-1 receives this nreply packetn, and then sends a "request packet" to the IP te=dxial 162101(#4). When the IP terminal 16210-1 receives the nrequest packetw, it sends a "transmission instruction packeC to the IP terminal 16310-1 (#5). When the IP terminal 16310-1 receives the ninstruction packet-, it instructs transmission of the Mata to be providedw saved in the database 16220-1(#6). The satellite transmission equipment 16330-1 emits the ndata to be providedw as electric wave toward the canamication satellite 16400-1 (first half of #7), the canTunication satellite 16400-1 amplifies the received Mata to be provided" and emits it (latter half of V), the satellite receiving equipment 16502- 117 1 receives the "data to be provided" as electric wave, and hands it to the IP terminal 16501-1. Thus, the IP terminal 16501-1 obtains the ndata to be providedw via the cinication satellite 16400-1, and sends a areception confirmation packetn to the IP terminal 16210-1 of the corporation 16200-1 providing the ndata to be prov:ldedn(#8). Next, the IP terminal 16210-1 sends a "reception confirmation packet" to the IP terminal 16310-1 of the satellite transmission corporation 16300-1 (#9). In the above procedures, #1, #2, C, #4, #5, #8 and #9 use the above- described MP cemn=cation technology, and the TCP data transfer phase alone is shown and described.
Next, the procedures #10, #11, #12, #13, #14, #15, #16 and #17 shown in FIG.63 are almost the same as the above procedures, the difference in this example being that instead of the user 16500-1, the IP terminal 16501-1 and the satellite receiving equipment 16502-1, another user 16510- 1, IP terminal 16511-1 and satellite receiving equipment 16512-1 are used, and the present embodiment is capable of transferring ndata to be providedn to a plurality of users.
The above-described c=unication procedures shall be described with reference to FIG.64. The sending of an nincltlji:y paclwtot(#2), returning a "reply packet"(#3), sending of a nrequest packet"(#4), ndata transmissionn by satellite comnmicatim(#7), and sending "reception confirmation packetn(#8) in FIG.64 corresponds with the sending of an "inquiry packetn(#2), returning a nreply packetn(#3), sending of a Orequest packetn(#4), ndata transmission" by satellite cxxiniunicatim(#7), and sending "reception confirmation packet"(#8) in 1 FIG. 63. F= the above description, in the event that the satellite ammmication corporation 16300-1 and the data providing corporation 16200- 1 are viewed as an integrated camunication function unit (hereafter referred to as an Hintegrated camiunicatian entityO). The user in FIG. 64 can be considered to be perforrning full-duplex caffnunication with the aformantioned integrated cmm=cation entity. <<Variatim m above enbodinv-. nt>>
Next, a variation of the above entxxbzmt wherein only a portion of the camiunication procedures has been changed shall be described with reference to FIGs.61 and 65.
First, the IP terminal 16501-1 of the user 16500-1 sends an ninquiry packet" to the IP terminal 16210-1 which can be identified with the ICS user address w30000 (#1 in FIG.65: the same hereafter). The IP terminal 16210-1 returns a nreply packet"(#2), the IP terminal 16510-1 receives the wreply packet", and then sends a nrequest packeto to the IP terminal 16210-1(#3). When the IP terminal 16210-1 receives the "request packeC, it sends Mata to be provideT frczn the database 16220-1 thereof to the IP terminal 16310-1 which can be identlfied by the ICS special nurdier m430on(#4), and also sends a Rtransmission instruction packeto to the IP terminal 16310-1(#5).
The satellite transmission corporation 16300-1 stores the received Rdata to be providedn in its database 16320-1, and instructs transrnissim of the saved ndata to be prmided"(#6). The satellite transmission equipment 16330-1 emits the udata to be pravidedn as electric wave toward the camziication satellite 16400-1 (first half 119 of V), the commmicatim satellite 16400-1 amplifies the received Ndata to be provideW and emits It (latter half of #7), the satellite receiving equipment 16502-1 receives the udata to be providedw as el cc wave, and hands it to the IP terminal 16501-1. Thus, the IP terminal 16501-1 obtains the udata to be provide& via the comnmication satellite 16400-1, and sends a wreception confirmation packetR to the IP terminal 16210-1 of the corporation 16200-1 providing the Mata to be pravidedn(#8). Next, the IP terminal 16210-1 sends a reception confirmation packeto to the IP teindxel 16310-1 of the satellite transmission corporation 16300-1(#9). Next, the procedures #10, #11, #12, #13, #14, #15, #16, #17 and #18 are almost the same as the above procedures, the difference in this example being that instead of the usex 16500-1, the IP terminal 16501-1 and satellite receiving equipment 16502-1, another user 16510-1, IP texnUnal 16511-1 and satel-lite receiving equipment 16512-1 are used. <<Another variation m above ewbodimnt>> In the above two ent)odts, TCP technology f-lill-duplex o=nrmicatim is employed, and only the TCP data transfer phase is shown in the figures, with the TCP comection establishment phase and TCP connection ending phase being omitted from the drawings and from description thereof. In the embodiment to be described now, UDP communication technology described in FIG.62 is applied to a part or to all, and part or all of the packet sending and receiving using the TCP data transfer phase technique is replaced with packet sending and receiving using the UDP data transfer phase technique.
<<Another variation m above effbodt>> Another version will be described with reference to FIG.66. In FIG.61, the satellite transmission corporation 16300-1, the IP terminal 16310-1 of the satellite transmission corporation, the database 16320-1 of the satellite transmission corporation, and satellite transmission equipment 16330-1 of the satellite transmission corporation are each within the ICS 16000-1, the IP terminal 16310-1 being provided with an ICS special nmber n4300 As ccn to this, in the example shown in FIG.66, the satellite transmission corporation 16300-2, the IP terminal 16310-2 of the satellite transmission corporation, the database 16320-2 of the satellite transmission corporation, and the satellite transmission equipment 16330- 2 of the satellite transmission corporation are each outside of the ICS 16000-2 the IP tendnal 16310-2 being provided with an ICS user address 03900m. The data providing corporation 16200-1 and users 16500-1, 16510-1, 16520-1 are capable of sending and receiving of IP packets can be performed campletely regardless of whether the other party has an ICS user address or an ICS special nu, so sending and receiving of IP frames can be perfo in combination with satellite cann=cation with the example in FIG.66 just as with that in FIG.61.
Ebbodirrp-nt-9 (Full-duiplex conminication including satellite comenication path: Part 2):
The present enbodiment is another variation of Effbodirnent-8, with description being rnade with reference to FIGs.61 and 66. The
121 1.
data providing corporation 16200-1, the satellite transmission corporation 16300-1, the user 16500-1, etc. are the same; only the communication procedures are different. Also, TCP technology f1111duplex mication will be employed, but FIG.67 only illustrates the MP data transfer phase.
The IP tenTdnal 16210-1 of the data providing corporation 162001 obtains "data to be provided" from the database 16220-1 thereof and sends this to the IP terminal 16310-1 of the satelli e transmission corporation 16300-1 which can be identified by the ICS special number 043000, using the IP frame transmission functions of the ICS (#1 in FIG.67, the same hereafter). The satellite transmission corporation 16300-1 stores the received "data to be provideC in its database 16320-1. Next, the IP terminal 16210-1 of the data providing corporation 16200-1 sends a ntransmission notification framen to the IP terminal 16501-1 of the user 16500-1(#2). Upon receiving the ntransmission notification packetn, the IP terminal 16501-1 returns a " transmission consent packetn to the IP terminal 16210-1(#3). When the IP temminal 16210-1 receives the ntransmission consent packeC, it sends a utransmission instruction packetn to the IP terminal 163101(#4). Wm the IP terminal 16310-1 of the satellite transmission corporation 16300-1 receives the ntransmission instruction packet", it instructs transmission of the ndata to be providedn saved in the database 16220-1(#5). The satellite transmission equipment 16330-1 emits the "data to be provideffl as electric wave toward the connLinication satellite 16400-1(first half of %), the camiunication 122 satellite 16400-1 amplifies the received udata to be providedn and emits it (latter half of #6), the satel 1 i e receiving t 16502-1 receives the Odata to be providedn as electric wave, and hands it to the IP terminal 16501-1. Thus, the IP terminal 16501-1 obtains the "data to be providedn via the c=iinication satellite 16400-1, and sends a wreception confirmation packetn to the IP terminal 16210-1 of the data providing corporation 16200-1 providing the Mata to be providedw(V).
The above-described communication procedures shall be described with reference to FIG.68. The sending of &i ntransmission notification packetn(#2), the returning of a ntransmission consent packet"(#3), Mata transmissiann by satellite cannxiication (#6), and the sending of nreception confirmation packet"(#7) in FIG.68 correspond with the sending of an ntransmission notification frame"(#2), the returning of a "transmission consent packetn(#3), Mata transion'n by satellite ccmmnicatim(#6), and the sending of wreception confirmation packetw(#7) in FIG.67, respectively. From the above description, in the event that the satellite cmication corporation 16300-1 and the data providing corporation 16200-1 are viewed as an integrated cann=cation function unit (hereafter referred to as an %integrated c=unication entityn), the user 16500-1 in FIG.68 can be considered to be performing filll-duplex c=amication with the aforementioned integrated canmxucatim entity. <<Another variation on above embodt>>
Next, a variation of the above entx)dnmt wherein only a portion 123 of the ccmziicatim procedures has been changed shall be described with reference to FIGs. 61 and 69. The IP tenninal 16210-1 of the data providing corporation 16200-1 sends a "transmission notification packet" to the IP terminal 16501-1 of the user 16500-1 (#1 in FIG.69: the same hereafter). Upon receiving the "transmission notification packeC, the IP terminal 16501-1 returns a "transmission consent packet- to the IP terminal 16210-1(#2). When the IP terminal 16210-1 r mives the "transmission consent packetw, it obtains Odata to be provide& from the database 16220-1 thereof and sends this to the IP terminal 16310-1 of the satellite transmission corporation 16300-1 which can be identified by the ICS special number "43000(#3) and sends a "transmission instruction packetn to the IP teiminal 16310-1(#4). the IP terminal 16310-1 of the satellite transmission corporation 16300-1 receives the "transmission instruction packet", it instnicts transmission of the ndata to be provided" saved in the database 16220-1(#5). The subsequent cainmication procedures are the same as those described above. <<Another variation m above entx)dt>> In the above two ewbodiments, TCP technology full-duplex coffrmucatim is errployed, and only the TCP data transfer phase is shown in the figures, with the TCP connection establishment phase and the TCP connection ending phase being omitted from the drawings and from the description thereof. In the effbodmnent to be described now, UDP c=lunicatim technology described in FIG.62 is applied to a part or to all, and part or all of the Packet sending and receiving using
124 the WP data transfer phase technique is replaced with packet sending and receiving using the UDP data transfer phase technique. <<Another variation m above embodumnt>> Another version will be described with reference to FIG.66. In FIG.61, the satellite transmission corporation 16300-1, the IP terminal 16310-1 of the satel 1 i te transmission corporation, the database 16320-1 of the satellite transmissim corporation, and the satellite transmission equipmt 16330-1 of the satellite transmissim corporation are each within the ICS 16000-1, the IP terminal 16310-1 being provided with an ICS special number 04300'. As cam to this, in the example shown in FIG. 66, the satel- lite transmission corporation 16300-2, the IP terminal 16310-2 of the satellite transmission corporation, the database 16320-2 of the satellite transmission corporation, and the satellite transmission equipmmt 16330-2 of the sate' lite transmission corporation are each outside of the ICS 16000-2 the IP terminal 16310-2 being provided with an ICS user address 139000 EhtK)diment-10 (Pu-U-duplex ccnmniicatim including satellite ccncation path: Part 3):
The present effbodinva-nt is another variation of Embodt-8, and will be described with reference to FIGs.61 and 70. The data providing corporation 16200-1, the satellite transmitting corporation 16300-1, the user 16500-1 are the same, with only the ccnTmziicatim procedures being different. The present ent)odlt perform the fullduplex canTunication of TCP technology, but only the TCP data transfer -qe is shown in FIG. 70.
The IP terminal 16210-1 of the data providing corporation 162001 sends a nplan notification packetn to each of the following: the IP tenninal 16501-1 having an ICS user address n230Ow, ICS user address R240C (165111), and ICS user address '250C (16521-1) (#1 in FIG.70: the same hereafter). Next, the IP terminal 16210-1 of the data providing corporation 16200-1 obtains "data to be provided" from the database 162201 thereof and sends this to the IP terminal 16310-1 of the satellite transmission corporation 16300-1 which can be identified R by the ICS special number "4300, using the IP frame transfer functions of the ICS(#2). The satellite transmission corporation 16300-1 stores the received ndata to be providedn in its database 16320-1, and also instructs transmission of the Mata to be provideT (#3). The satellite transmission ecluit 16330-1 emits the "data to be providedw as electric wave toward the camunication satellite 16400-1(first half of #4), the cmication satellite 16400-1 amplifies the received ndata to be providedn and emits it(latter half of #4), the satellite receiving pment 16502-1 receives the Mata to be providedn as electric wave, and hands it to the IP terminal 16501-1.
Thus, the IP terminal 16501-1 obtains the ndata to be provide& via the ccmnmicatim satellite 164001, and sends an "individual report packetn to the IP terminal 16210-1(#5-1). Using the same camnmication procedures, the IP terminal 16511-1 obtains the -data to be provided", and sends an "individual report packet" to the IP 126 terminal 16210-1(#5-2). The IP terminal 16521-1 also obtains.the "data to be provided", and sends an windividual. report packeC to the IP terminal 16210-1(#5-3). The IP terminal 16210-1 sends an "individual inquiry packetn to the IP terminal 16511-1 of the user 16510-1(#6), and the IP terminal 16511-1 returns an ":individual reply packet" to the IP terminal 16210-1(#7).
The above-described caunanication procedures will be described with reference to FIG.71. The sending of the Rplan notification frame"(#1), Rdata transmissionw by sateMte cammunication(#4), the sending of "individual report packetn(#5-2), the sending of -individual inquiry packet"(#6), and the returning of -individual reply PackeC(V) in FIG.71 correspond with the sending of the Oplan notification packet"(#1), Mata transmissionw by satelli e ccmTmicatim(#4), the sending of "individual report framen(#5-2), the sending of -individual inquiry frame-(#6), and the returning of nindividual reply framew(V) in FIG.70, respectively. Frcxn the above des=Ption, in the event that the satellite ccmrunicatim corporation 16300-1 and the data providing corporation 16200-1 are viewed as an integrated camnXlication entity, the user 16500-1 in FIG.67 can be considered to be performing filll-duplex ccrammication with the aforwmtioned integrated camunication entity. <<Another variation m above embodiment>> In each of the above eutediments, the filll-duplex c=nication of WP technology is employed, and only the TCP data transfer phase is shown in the figures, with the TCP connection establishment phase and T1CP connection ending phase being emitted from the drawings and from the description thereof. In the effbodiment to be described new, UDP camunication technology described in FIG.62 is applied to a part or to all, and part or all of the packet sending and receiving using the TCP data transfer phase technique is replaced with packet sending and receiving using the UDP data transfer phase technique. <<Another variation m above embodirmnt>>
Another version will be described with reference to FIG.66. In FIG.61, the satellite transmission corporation 16300-1, the IP teamtinal 16310-1 of the satel-lite transmission corporation, the database 16320-1 of the satellite transmission corporation, and the satellite transmission equipment 16330-1 of the satellite transmission corporation are each within the ICS 16000-1, the IP terminal 16310-1 being provided with an ICS special nu n4300 As eaxpared to this, in the example shown in FIG.66, the satellite transmission corporation 16300-2, the IP terminal 16310-2 of the satellite transmission corporation, the database 16320-2 of the satel lite transmission corporation, and the satellite transmission equipment 16330-2 of the satellite transmission corporation are each outside of the ICS 16000-2, the IP terminal 16310-2 being provided with an ICS user address n390On.
Brbediment-11 (F'ull-duPlex COMmMication including satellite COMUnicatiOn path: Part 4):
The present entxxlunent is another variation of Ehtodmp-nt-8, and will be described With reference to FIGs.61 and 72. The data 128 I-.
Providing corporation 16200-1, the satellite transmission corporation 16300-1, the user 16500-1 are the same, with only the camimication procedures being different. The present embodiment perform the fullduplex comm=cation of TCP technology, but only the TCP data transfer phase is shown in FIG.72.
The IP te=rdnal 16210-1 of the data providing corporation 162001 obtains "data to be Providedn fram the database 16220-1 thereof and sends this to the IP terminal 16310-1 of the sateJ-1ite transmission corporation 163001 which can be identified by the ICS special number w4300n, using the IP frame transfer functions of the ICS (#1 in FIG.72: the same hereafter). The satellite transmission corporation 16300-1 stores the received Rdatato be providedn in its database 16320-1.
Next, the IP terminal 16501-1 of the user 16500-1 sends an winquiry packeC to the IP terminal 16310-1 which can be identified with the ICS usex address n430On(#2). The IP terminal 16310-1 returns a "reply packet"(#3), the IP terminal 16510-1 receives the -reply packet", and then sends a "ret packeC to the IP terminal 163101(#4). When the IP terminal 16310-1 receives the Orequest packetw, it instnicts satellite transmission equi pment of the Rdata to be providedn saved in the database 16300-1(#5). The satellite transmission pment 16330-1 emits the ndata to be provided" as electric wave toward the acmxrdcatim satellite 16400-1 (first half of #6), the cacation satellite 16400-1 amplifies the received Odata to be provide& and eridts it (latter half of #6), the satellite 129 receiving equipment 16502-1 receives the ndata to be providedn as electric wave, and hands it to the IP tenninal 16501-1. Thus, the IP tendnal 16501-1 obtains the -data to be provided- via the camunication satellite 16400-1, and sends a wreception confirmtion packet" to the IP tendnal 16310-1 of the data providing corporation 16200-1 providing the Mata to be provided" (V). In the above procedures, #1, #2, #3. #4 and #7 use the above-described TCP c=mication technology, and the TCP data transfer phases alone are shown and described. Next, the procedures #8, #9, #10, #11, #12 and #13 shown in FIG.72 are almst the sarne as the above procedures, the difference in this exannple being that instead of the user 16500-1, the IP termtinal 165011, and the satellite receiving equipment 16502-1, another corporation 16510-1, IP tenTdnal 16511-1, and satellite receiving equipment 165121 are used.
The above-described mication proce&ires shall be described with refexence to FIG. 64. The sending of an n inquiry packet n (#2), the returning of a "reply packetn (C), the sending of a wrequest packetn(#4), Mata transmission" by satellite cammicatim(#7), and the sending of -reception conflnrkltlon packet"(#8) in FIG.64 orrespond with the sending of an winquiry padcetw(#2), the returning of a Oreply padcet"(#3), the sending of a nret packetw(#4), ndata transmissionn by satellite cemmm:Lcation(#7), and the sending -reception confinmtion padcet-(#8) in FIG.72, respectively. From the above description, in the event that the satellite canmnication corporation 16300-1 and the data providing corporation 162001 are vie as an integrated cammLmication entity, the user 16500-1 in FIG. 64 can be considered to be performing fill l -duplex canmmication with the aforementioned integrated omm=cation entity. <<Amther variation m above entx)dt>> In the above two effbodiments, the fill' -duplex canamication of TCP tology is emplo, and only the TCP data transfer phase is shown in the figures, with the TCP connection establishment phase and T1CP connection ending phase being omitted from the drawings and from the description thereof. In the entxxliment to be des=bed now, UDP caratunication technology described in FIG.62 is applied to a part or to all, and part or all of the packet sending and receiving using the TCP data transfer phase technique is replaced with packet sending and receiving using the UDP data transfer phase technique. <<Another variation m above embodumnt>>
Another version w:LU be described with reference to FIG.66. In FIG.61, the satellite transmission corporation 16300-1, the IP terminal 16310-1 of the satellite transmission corporation, the database 16320-1 of the satellite transmission corporation, and the satellite transmission equipment 16330-1 of the satellite transmission corporation are each within the ICS 16000-1, the IP terminal 16310-1 being provided with an ICS special number w4300 As caq3ared to this, in the example shown in FIG. 66, the satellite transmission corporation 16300-2, the IP terminal 16310- 2 of the satellite transmission corporation, the database 16320-2 of the satellite transmission corporation, and the satel 1 i te transmission equipment 16330-2 of the 131 satellite transmission corporation are each outside of the ICS 16000-2, a the IP tenninal 16310-2 being provided with an ICS user address n3900.
EffibodiMent-12 (Full-duplex COMMcation including satellite CORTMmication path: Part 5):
The present effbodinmt pexforms a type of fli -duplex cammication by combining a satellite transmission f=tion and an jp conm=cation function. A major difference between the present embodiment and EmbOdiumt - 8 is the fact that the sate 11 i te receiving equipumt is within the access control apparatus in the present entKxUffient.
Description will be made with reference to FIG. 73. The present embodiment ls rised of: an ICS 16000-3; access control apparatuses 16100- 3, 16110-3 and 16120-3; satellite reception equipffents 16102-3, 16112-3 and 16122-3; a data providing corporation 16200-3; an IP terminal 16210-3 of the data providing corporation; a satel-lite transmission corporation 16300-3; an IP terminal 16310-3 of the satellite transmission corporation; a database 16320-3 of the satelli e transmission corporation; a satell- ite transmission equipment 16330-3 of the satellite transmission corporation; a corcation satellite 16400-3; users 16500-3, 16510-3 and 16520-3; IP terminals 16501-3, 16511-3 and 16521-3 of each user; satellite airwaves commmication lines 16600-3, 16610-3, 16620-3 and 16630- 3; and user logic emminication lines 16710-3, 16720-3, 16730-3 and 16740- 3. The IP terminals 16210-3, 16501-3, 16511-3 and 16521-3 each have ICS user
132 addresses 0300On. n2300", n2400n and "2500n, and are respectively connected to the access control apparatuses 16100-3, 16120-3, 16120-3 and 16110-3, via user logic camnnication lines. The IP terminal 16310-3 can be classified as an ICS network server, having an ICS special nu "4300", and connected to the access control apparatus 16100-3 via the ICS network crdcations Line within the ICS 16000-3. Electric wave transmitted fram the satellite transmitter 16330-3 transfers information via the satellite electric wave camunication path 16600-3, the electric wave is received by satellite receivers 16112-3 and 16122-3. << Ele of canTunication procedures >> The canmmication procedures according to the present entxdlment will be made with reference to FIG.73and 74. In the following procedures, the aforementioned flill-duplex camnmication of TCP technology is mployW except for the cases of transmission instruction to satellite transmission equipment (#5 and #12 in FIG.74) and udata transmissionn using electric wave from the satellite transmission pment (#6 and #13 in FIG.74), however, only the TCP data transfer phase is shown in FIG.74.
The IP terminal 16210-3 of the data providing corporation 162003 obtains Odata to be providedw frem the database 16220-3 thereof and sends this to the IP terminal 16310-3 of the satellite transmission corporation 16300-3 which can be identified by the ICS special nunber "4300n, using the IP packet transfer function of the ICS (#1 in FIG.74, the sarne hereafter). The satellite transmission corporation 16300-3 133 stores the received "data to be provided" in its database 16320-3. The IP terminal 16501-3 of the usw 16500-3 sends an "inquiry packet" to the IP terminal 16310-3 which can be identified with the ICS user address '4300"(#2). The IP terminal 16310-3 returns a reply packet-(#3), the IP terminal 16501-3 receives the nreply packetn, and then sends a "request packet" to the IP terminal 16310-3 (#4). When the IP terminal 16310-3 receives the Rrequest packetn, it cmverts the "data to be provide& saved in the database 16320-3 into ICS packet format and instructs transmission thereof (#5). Here, the data portion of the ICS packet is the ndata to be provided", and the destination ICS usw address is address n2300n of the IP tenminal 16501-3. The satellite transmission equipment 16330-3 emits the ICS packet including Mata to be providedn as electric wave toward the comunication satellite 16400-3 (first half of #6), the camumication sateJ- 1ite 16400-3 amplifies the received Rdata to be provided and emits it (latter half of #6), the satellite receiving pmts 16502-3, 16112-3 and 16122-3 each receive the ICS frame including the udata to be provideT as electric wave, each check the destination of the Mata to be provided", and since the destination of the Mata to be providedn is IP te=rdnal 16501-3. the access control apparatus 16122-3 returns the ndata to be providedn, to the ICS user frame format, and sends it to the IP terminal 16501-3(V). receiving the Mata to be provideT, the IP terminal 16501-3 sends a "reception confixmation packet" to the IP terminal 16310-3(#8). In the above procedures, #1, C, C, #4, #7 and #8 use the abave-described TCP 134 1 ccmziicatim technology, and the TCP data transfer phase alone is shown and described.
Next, the procedures #9, #10, #11, #12, #13, #14 and #15 shown in FIG.74 are almost the same as the above procedures, the difference in this example being that instead of the user 16500-3, the IP terminal 16501-3, and the satellite receiving equipment 16502-3, another company 16510-3, IP tenninal 16511-3, and sateXlite receiving equipment 16512-3 are used, and the present embodiment is capable of transferring wdata to be providedn to a plurality of users.
The abave-described communication procedures shall be described with reference to FIG.64. The sending of an ninquiry packetn(#2), the returning of a nreply packetn(#3), the sending of a nrequest packetn(#4), ndata transmissionn by satellite cmcatim(#7), and the sending of - reception confirmation packet- in FIG.64 correspond with the sending of an "inquiry packet"(#2), the returning of a wreply packetn(#3), the sending of a nrequest packetn(#4), udata transmissionn by satellite ccnminication(#7), and the sending of -reception confirmation packet-(#8) in FIG.74, respectively. Frcin the above description, in the event that the satellite canuziication corporation 16300-3 and the data providing corporation 16200-3 are viewed as an nintegrated ccmnmication entity, the user in FIG.64 can be considered to be performing fill 1 -duplex ccmmunication with the aforementioned integrated cm=mcation entity. <<Another variation m above embodiment>>
In the above two entKxbzmts, the full-duplex ccmmunication of TCP technology is erqpla, and only the TCP data transfer phase is shown in the figures, with the TCP comection establist phase and TCP comection ending phase being cmitted from the drawings and from the description thereof. In the entx>dinmt to be described now, UDP,ccm=iicatim technology described in FIG.62 is applied to a part or to all. and part or all of the packet sending and receiving using the TCP data transfer phase technique is replaced with packet sending and receiving using the UDP data transfer phase technique. <<Another variation m above entxxllment>>
Another version will be described with reference to FIG.75. In FIG.73, the satellite transmission corporatim 16300-3, the JP terndnal 16310-3 of the satellite transmissian corporation, the database 16320-1 of the satellite transmission corporation, and the satel I ite trarismissian equipment 16330-3 of the satellite transmissim corporation are each inside the ICS 16000-3, the JP terminal 16310-3 being provided with an ICS special nuiber R4300 As caT to this, in the example shown in FIG.75, the satellite transmission corporatian 16300-4, the JP terminal 16310-4 of the satellite transmission corporation, the database 16320-2 of the satellite tranmiission corporation, and the satellite transmission equipnmt 16330-4 of the satellite transmissian corporation are each outside of the ICS 16000-4 the JP terminal 16310-4 being provided with an ICS user address u3900" Embodiment-13 (Control of rving Priority degree):
In the control field of the JP packet shown in FIG. 3, there is a
136 transmitting IP address and a destination IP address in addition to the nprotocol typen, and in the TCP packet shown in FIG.76 and the UDP frame sham in FIG. 77 there are defined a sender's port number and an intended receiver's port number, respectively. The 48 bits of data consisting of the IP address (32 bits) and the port number (16 bits) laid out is called a socket number. That is, socket number = IP address 11 port number. In the present anbodiment, the following term shall be used: sender's socket number - sender's IP address 11 sender's port number; intended receiver's socket number = intended receiver's IP address H intended receiver's port number. The present mbodinmt is an eyle of controlling the degree of priority of the Ics user frame which is obtained by reaching the access control apparatus fran the ICS network camnmication line and being reversely ICSencapsulated here, this control-ling the degree of priority being performed using the -protocol typen which is displayed in the ICS user frame, and the socket number thereof.
AS shown in FIGs.78 and 79, an ICS 17000-1 includes access control apparatuses 17100-1, 17110-1, 17120-1, 17130-1, 17140-1, 17150-1 and 17160-1, and the access control apparatus 17100-1 includes a line unit 17111-1, a processing device 17112-1 and a conversion. table 17113-1. Blocks 17200-1, 17210-1, 17220-1, 17230-1, 17240-1, 17250-1, 17260-1, 17270-1 and 17280-1 are each corporation LANs, and are each connected to the ICS 17000-1 via the respective gateways 17201-1, 17211-1, 17221-1, 17231-1, 17241-1, 17251-1, 17261-1, 17271-1 and 17281-1. Each LAN has 2 to 3 terminals having functions for 137 sending IP user packet, wherein the ICS user addresses are: for within LAN 17200-1, 02600n and '2610n; for within LAN 17200-1, n2600" and 02610"; for within LAN 17210-1, "1230w and "1240"; for within LAN 17220-1, - 2700n, n2710n, and '2720"; for within LAN 17230-1, "2800n and n28100; for within LAN 17240-1, "120OR and n121ON; for within LAN 17250-1, -1200- and -1210"; for within LAN 17260-1, "2200' and 02210n; for within LAN 17270-1, '2300' and w231Ow; and for within LAN 17280-1, '2400" and n241On. Further, blocks 17291-1 and 17292-1 are each tenninals which have functions of sending and receiving IP user packets, respectively having ICS user addresses "25000 and "1250n, being connected to ICS 17000-1. <<Conversion table>> The conversion table 17113-1 within the access control apparatus 17100-1 shall be described with reference to FIGs. 80 and 81. The function of the conversion table as the same as those in the other entxxbnmts, and the present irmention is characterized in that the portion table, named 'degree of priority of reception- code, degree of priority of protocol, degree of priority of TCP socket, and degree of prior2.ty of UDP socket, which are components of the conversion table 17113-1 are used for controlling the degree of priority. In the event that the transmitting ICS network address of the conversion table is -7821-, the -degree of priority of receptionn code is stipulated to be apr-7821n. That is, the - degree of priority of receptionn code is to be a parameter which is dependent m the ICS network address provided to the ICS usex logic tenninal sent from the access control 138 apparatus after the ICS reverse encapsulation. Looking at the other portion table of the conversion table 17113-1, e.g., in regard to "pr7821n, the degree of priority of protocol is described as being "p-1n, the degree of priority of TCP socket as nt-lo, and the degree of priority of UDP socket as "NULL Here, HNULLO indicates Ounspecified". The degree of priority of protocol "p-l" dictates that the degree of priority of is, in descending order, nTCP", UMPR, nWPMR and uIGPW.
Looking at even other portion table with regard to the degree of priority of TCP socket nt-1n, the dictated order of degree of priority R of is, in descending order, nsk-l- and -sk-7. Looking at even other portion table with regard to the degree of priority of UDP socket Ou1-, the dictated order of degree of priority is, in descending order, nsk-3" and nsk-8n. Further, in the contents of the socket code "sk-l" which is written in another portion table, "Ton indicates the intended receiver's socket number, and indicates that the intended receiver's IP address is R2100n and that the intended receiver's port number is "30n, and in the same manner, in the contents of the socket code nsk2w, "Frcin" indicates the sender's socket number, and indicates that the sender's IP address is n1240R and that the sender's port number is n32n. <<Individual description of ICS packet>>
The ICS network frame NFO1 is sent out fran the terminal 17291-1 with the ICS user address n2500n, and then is ICS-encapsulated at the access control apparatus 17110-1 with a transmitting ICS network 139 address 0720ON and a receiving IcS network address n7821n, then is transfe=ed within the ICS 17000-1 and reaches the access omtrol apparatus 17100-1, where it is reversely ICS-encapsulated to become an ICS user frame UFOl, and readies the terminal with the ICS user address "2100n via the user logic communication line 17821-1. The aprotocol typen of the control field of the user packet UP01 which is within the Ics network packet NFol is TcP, and the wIntended receiver's Port numbern of the TCP packet is "30- in the ele.
In the following. beginning with a packet NF02, brief descriptim will be made in the order of NF03, NF04, NFOS, NF06, NF07, NFO8, NFO9, NF10 and NFU, as sham in FIG.78.
A frame NF02 is sent out fram a temninal with the ICS user address H260C, and then is ICS-encapsulated, at with a transmitting ICS network address w7300n and a receiving ICS network address "7821", then is transferred within the ICS and is reversely ICS-encapsulated to become a frame UF02, and reaches the terminal with the ICS user address n2110n via the user logic cemnunicatim line 17821-1. The wprotocol typen of the packet UF02 is TCP, and the wintended receiver's port nu" of the TCP packet is '30n, in this example.
A frame NF03 is sent out from a temninal with the ICS user address n1230n, and then is ICS-encapsulated. at with a transmitting ICS network address "7400n and a receiving ICS network address R7822n, then is transferred within the ICS and is reversely ICS-encapsulated, to become a packet UP03, and reaches the terndrual with the ICS user address n1200n via the user logic canmnication line 17822-1. The i i mi=t ,.--ocol type- of the packet UF03 is TCP4. and the -intended receiver's port number" of the TCP packet is "30", in this example.
A frame NF02 is sent out ficm a terminal with the ICS user address R12400, and then is ICS-encapsulated at with a transmitting ICS network address "740OR and a receiving ICS network address N7822m then is transferred within the ICS and Is reversely ICS-encapsulated to become a packet UF04, and reaches the terminal with the ICS user address N1210n via the user logic communication line 17822-1. The Rprotocol typen of the packet UF04 is TCP, and the nintended receivervs port number' of the TCP packet is w320, in this example.
A frame NFOS is sent out from a terminal with the ICS user address R1250n, and then is ICS-encapsulated at with a transmitting ICS network address n7500" and a rving ICS network address N78220 then is transferred within the ICS and is reversely ICS-encapsulated to became a packet UF05, and reaches the terminal with the ICS usw address R1220R via the user logic communication line 17822-2. The "protocol typen of the packet UF05 is TCP, and the nintended receiver's port numbern thereof is R320, in this example.
A frame NF06 is sent out fram a terminal with the ICS user address N261Ow, and then is ICS-encapsulated at with a transmitting ICS network address w730OR and a receiving ICS network address '782Y then is transferred within the ICS and is reversely ICS-encapsulated to become a packet UF06, and reaches the texminal with the ICS user address '220OR via the user logic comiLmication line 17823-1. The Rprotocol type" of the packet UF06 is UDP, and the nintended p p 1--- 1 i 1 receiverys port numbero of the TCP packet is R4C, in this example.
A frame NF07 is sent out from a tenninal with the ICS user address w2700n, and then is ICS-encapsulated at with a transmitting ICS network address n7600" and a receiving ICS network address 0782Y then is transferred within the ICS and is revexsely ICS-encapsulated to became a packet TW07, and reaches the terminal with the ICS user address n2210n via the user logic ccmamicatim line 17823-1. The "protocol typew of the packet UF07 is UDP, and the nintended receiver's port number' thereof is R4C, in this example.
A packet NF08 is sent out fran a terminal with the ICS user address 02710n, and then is ICS-encapsulated at with a transmitting ICS network address 176000 and a receiving ICS network address "782C then is transferred within the ICS and is reversely ICS- ed to beccme a packet UFO8, and reaches the terminal with the ICS user address w230OR via the user logic comninication line 17824-1. The -protocol type- of the packet UFO8 is UDP, and the -intended recelver's port numbern thereof is '140R, in this example.
A packet NF09 is sent out frcxn a terminal with the ICS user address "2800", and then is ICS-encapsulated at with a transmitting ICS network address R770OR and a receiving ICS network address "782C, then is transferred within the ICS and is reversely ICS-encapsulated to beceme a packet UF09, and reaches the terminal with the ICS user address I'2310n via the user logic ccmmmication line 17824-1. The "Protocol type" of the packet UF09 is UDP, and the "intended receiver's port number" thereof is w42", in this example.
142 jI p A packet NFlO is sent out fram a terminal with the ICS user address n2720n, and then is ICS-encapsulated at with a transmitting ICS network address N760C and a receiving ICS network address "7825n then is transferred within the ICS and is reversely ICS-encapsulated to became a packet UFlO, and reaches the terminal with the ICS user address 02400n via the user logic cammunication line 17825-1. The nprotocol typen of the packet UP10 is TCP,, and the nintended receiver's port nuffibern thereof is H60u, in this exmple.
A frame NF11 is sent out fram a terminal with the ICS user address R2810", and then is ICS-encapsulated. at with a transmitting ICS network address 077000 and a receiving ICS network address 07825H, then is transferred within the ICS and is reversely ICS-en ed to became a packet UM, and reaches the terminal with the ICS user address R2410m via the user logic communication Line 17825-1. The nprotocol typen of the packet UF11 is UDP, and the wintended receiver's port numbern thereof is "70n, in this example.
<<Example 1 for determining the degree of priority>> The manner in which the degree of priority is determined w-M be described with reference to the flowchart in FIG.82. The access control apparatus 17100-1 receives the ICS network packets NFO1 and NF02 fram the ICS network camninication line almost at the same time (Step S1000), and reversely ICS-encapsulates each to obtain ICS user packets UFO1 and UM(Step S1010). Fram the conversion table 17113-1 it can be known that the receiving ICS network address of the ICS logic terminal sending these ICS user packets is n7821n for both, i.e., 143 9 i 1 that there is a match(Step S1020). The "degree of priority of reception" code for both ICS network packets NFO1 and NF02 is apr7821", and then according to portion table of the conversion table 17113-1, the degree of priority of protocol for Opr-7821n is specified as being Hp-1n, the degree of priority of TCP socket as nt-lu, and the degree of priority of UDP socket as wNULLn. Further. looking at even other portion table comprising the conversion table 17113-1, the degree of priority of protocol "p-l" dictates that the degree of priority of is, in descending order, TICP, UDP, 1CPM and IGPM, and with regard to the degree of priority of TCP socket "t-l", the dictated order of degree of priority of ls, in descending order, Osk-10 and usk-7w, and the contents of the socket code "sk-l" indicate that the IP address comprising the intended receiver's socket number is R210on and that the intended receiver's port number thereof is n30n. The protocol type indicated within the ICS network packet NFO1 is wTCP the intended receiver's ID address is 0210Ow, and the intended receiver's port number is w30n. On the other hand, the protocol type indicated within the ICS network packet NF02 is OTCP", the intended receiver's ID address is "2110", and the intended receiver's port number is n3C. In the present embodiment. it can be understood that it is the ICS network packet NFO1 that has the protocol type and intended receiver's socket number that matches with the specifications of the aforemntioned socket code nsk-1 Based on the above procedures, it is determined that the ICS network packet to be sent out with higher priority is NFU(Step S1030). Next, this ICS
144 network packet NFO1 is sent out to the user logic terminal via the ICS logic terminal (Step S1040). <<Ele 2 for determining the degree of pr:Lority>> The access control apparatus 17100-1 receives the ICS network frames NF03, NF04 and NF05 from the ICS network cammLmication line at at the same time(Step S1000), and reversely ICS-encapsulates each to obtain ICS user packets UF03, NF04 and W05(Step S1010). Fram the conversion table 17113-1 it can be known that the receiving ICS network address of the ICS logic terminal sending these ICS user packets is n7822n for all, i.e., that there is a match (Step S1020). The -degree of priority of receptioncode for all of the ICS network packets NF03, NF04 and NFOS is "pr-7822n, the degree of priority of protocol thereof is specified as being 'T-1", the degree of priority of 7CP socket as nt-2', and the degree of priority of UDP socket as %NULLu. The contents of the degree of priority of protocol up-l" dictates that TCP has the highest degree of priority, and with regard to the degree of priority of TCP socket "t-2", "sk-2' has the highest degree of PrIo=ty, and the contents of the socket code Isk-2" indicate that the IP address comprising the sender's socket nurter is "2100" and that the sender's port number thereof is '30n. The protocol type indicated within the ICS network packet NF03 is "TCPR, the sender's ID address is "1230n, and the sender's port number is "30w. The prDtocol type indicated within the ICS network packet NF04 is NTCPR, the sender's ID address Is 11240n, and the sender's port nwiber is -32". Also, the protocol type indicated within the ICS network packet NFO5 is "TCPR, the sender's ID address is "1250", and the sender's port number is "32". In the present embodiment, it can be understood that it is the ICS network packet NF04 that has the protocol type and the intended receiver's socket number that matches with the specifications of the aforemantioned socket code nsk-2n. Based m the above procedures, it is determined that the ICS network packet to be sent out with higher priority is NF04 (Step S1030). Next, this ICS network packet NF04 is sent out to the user logic te=dnal via the ICS logic terminal (Step S1040). <<Exarnple 3 for detemnining the degree of priority>>
The access control apparatus 17100-1 receives the ICS network packets NF06 and NF07 fram the ICS network cacation line almost at the same time (Step S1000), and reversely ICS-encapsulates each to obtain ICS user packets UF06 and UF07 (Step S1010). Frcm the conversion table 17113-1 it can be known that the receiving ICS network address of the ICS logic terminal sending these ICS user packets is '7823n for both, i.e., that there is a match (Step S1020). The nde of priority of receptionn code for both ICS network packets NF06 and NF07 is npr-78230, and the degree of priority of protocol is specified as being Hp-2", the degree of priority of MP socket as RNULLO, and the degree of priority of UDP socket as nu-1n. Further, looking at even other portion table cmprising the conversion table 17113-1, the degree of priority of protocol "p-2" dictates that the degree of priority is, in descending order, UDP, TCP, WPM and IGpM, and with regard to the degree of priority of UDP socket "u-1u, 146 1 the dictated o of degree of priority is, in descending order, Isk3w and msk-8n, and the contents of the socket code usk-3" indicate that the IP address wriprising the intended receiver's socket number is N2200m and that the intendedreceiver's port number thereof is w4011 The protocol type indicated within the ICS network packet NF06 is "UDP", the Intended receiver's ID address is R2200n, and the intended receiver's port number is 040. On the other hand, the protocol type Indicated within the ICS network packet NF07 is 'UDPO, the intended receiver's ID address is R21lon, and the Intended receiver's port nuriber is n40n. In the present ent)odt, it can be understood that it is the ICS network packet NF06 that has the protocol type and the intended receiver's socket number that matches with the specifications of the aforementioned socket code nsk-3n. Based m the above procedures, it is determined that the ICS network packet to be sent out with higher priority is NF06 (Step S1030). Next, this ICS network packet NF06 is sent out to the user logic terminal via the ICS logic terminal (Step S1040). <<Eyle 4 for determining the degree of prior:lty>>
The access control apparatus 17100-1 receives the ICS network packets NFO8 and NF09 fran the ICS network cammunication Line almost at the same time (Step S1000), and reversely ICS-encapsulates each to obtain ICS user packets UFO8 and UF09 (Step S1010). Fram the conversion table 17113-1 it can be known that the receiving ICS network address of the ICS logic terminal sending these ICS user packets is w78240 for both, i.e., that there is a match (Step S1020).
147 1.
The Megree of priority of reception" code for both ICS network packets NFO8 and NFO9 is Rpr-782C, and the degree of priority of protocol is specified as being "p-20, the degree of priority of TCP socket as NULL", and the degree of priority of UDP socket as Ou-2R. The degree of priority of protocol up-20 dictates that socket code usk-4w has the highest priority, and the contents of the socket signal nsk-4w indicate that the IP address comprising the sender's socket number is 0271Ou and that the sender's port number thereof is N40R. The protocol type indicated within the ICS network packet NFOB is "UDPw, the senders ID address is 2710, and the sender's port number m is R40. On the other hand, the protocol type indicated within the ICS network packet NF09 is -UDP", the sender's ID address is "2800-, and the sender's port number is "42". In the present embodiment, it can be understood that it is the ICS network packet NFO8 that has the protocol type and the sender's socket number that matches with the specifications of the aforementioned socket code usk-4". Based on the above procedures, it is determined that the ICS network packet to be sent out with higher priority is NFOB (Step S1030). Next, this ICS network packet NFO8 Is sent out to the user logic terminal via the ICS logic terminal (Step S1040). <<EmMle 5 for deteamdxLing the degree of priority>>
The access control apparatus 17100-1 rves the ICS network frames NFlO and NF11 fram the ICS network mnmnicatim line almost at the same time (Step S1000), and reversely ICS-encc-tes each to obtain ICS user packets UFlO and UF11 (Step S1010). From the 148 conversion table 17113-1 it can be known that the receiving ICS network address of the ICS logic tenninal sending these ICS user packets is R7825n for both, i.e., that there is a match (Step S1020). The mdegree of priority of reception" code for both ICS network packets NFlO and NF11 is npr-7825-, and the degree of priority of protocol is specified as being "p-lm, the degree of priority of TCP socket as Bt-31, and the degree of priority of UDP socket as nu-3u. The degree of priority of protocol up-lw dictates that the degree of priority of TCP is higher than that of UDP. The protocol type indicated in the ICS network packet NFlO is "T1CP", and the protocol type indicated in the ICS network packet NFlO is wUDP-. Based m the above procedures, it is determined that the ICS network packet to be sent out with higher priority is NF10 (Step S1030). Next, this ICS network packet NF10 is sent out to the user logic terminal via the ICS logic terminal (Step S1040).
Entx)diment-14 (Control of transmitting priority degree):
DescrIptIon will now be made regarding and entx>d-unmt wherein user IP packets arriving frcm outside the ICS are ICS-encapsulated. with the access control apparatus, and then the order of sending out onto the ICS network c=unication line is decided. <<Configuration>>
As shown in FIG.83, an CS 17000-2 includes access control apparatuses 17100-2 through 17190-2, and the access control apparatus 17100-2 includes a line unit 17111-2, a processing device 17112-2 and 149 a conversion table 17113-2. Blocks 17240-2 through 17280-2 are corporate LANs which are each connected to the ICS 17000-2 via the ICS user logic ccnmmcatim Line. Each of the LANs includes a plurality of IP terminals and blocks 17401-2 and 17411-2 are both IP terminals. <<Conversion table>> The f=tions of the conversion table 17113-2 shown in FIGs.84 and 85 are the same as those in the other entxdurents, and the present invention is characterized in that the portion table, named ndegree of priority of receptionn code, degree of priority of protocol, degree of priority of TCP socket, and degree of priority of UDP socket, which are cenponents of the conversion table 17113-2 are used for controlling the degree of priority. In the event that the transmitting ICS network address of the conversion table is 07821n, the "transmitting priority degreen code is stipulated to be "ps-7821n That is. the "receiving priority degree' code is made to be a ter which is dependent on the ICS network address provided to the ICS user logic terminal sent from the access cmtrol apparatus after the ICS reverse encapsulation. Looking at the other portion table of the conversion table 17113-1, e.g., in regard to ups-78211, the degree of priority of protocol is described as being Rp-21m, the degree of priority of TCP socket as nt-21-, and the degree of priority of UDP socket as ONULLn. The method of describing the degree of priority of protocol, the degree of priority of TCP socket, and the degree of priority of UDP socket, etc. is the same as that of Embodiment-13.
1 <<Eyle 1 for determining the degree of priority>> The manner in which the degree of priority is determined will be described with reference to the flowchart in FIG.86. The access control apparatus 17100-2 receives the ICS user packets F01 and F02 fram the ICS network camn=cation line at at the same time, and obtains the ICS network address appropriated to the ICS logic terminal (Step S2700). Next, the procedures for control of transmitting priority degree a as follows. The - transmitting priority degree' code for both ICS user packets F01 and F02 is ups-7821n, and then according to portion table of the conversion table 17113-2, the degree of priority of protocol for 'ps-78210 is specified as being "p-21 the degree of priority of TCP socket as "t-21', and the degree of priority of UDP socket as RNULL Further, looking at other portion table comprising the conversion table 17113-2, the degree of prIority of protocol Rp-21w dictates that the degree of priority is, in descending order, TCP, UDP, ICPM, and IGPM, and with regard to the degree of priority of TCP socket nt-21m, the dictated order of degree of priority of is, in descending order, -sk-21- and -sk-27-, and the contents of the socket signal usk-21w indicate that the IP address compri- sing the sender's socket nmter is 02100' and that the sender's port number thereof is -30 The protocol type indicated within the ICS user packet F01 is uTCPR, the sender's ID address is '210OR, and the sender's port number is 030R. On the other hand, the protocol type indicated within the ICS network packet F02 is NTW, the sender's ID address is N2110n, and the sender's port number is '300.
151 In the present entKdlment, it can be understood that it is the ICS network packet F01 that has the protocol type and the intended receiver's socket number that matches with the specifications of the aforementioned socket code usk-21m. Based on the above procedures, it is determined that the ICS user packet to be sent out with higher priority is F01 (Step S2710).
Next, the system checks whether or not the ICS network address "77210 provided to the logic terminal which received the ICS user packet F01 is registered m the conversion table 17113-2 with the request identification as virtual dedicated line connection "3' (Step S2720). The subsequent steps are the same as the steps S2730 through S2770 described with the other entxxUnients, and at the end ICS encapsulation is performed (Step S2780), and the ICS network packet NFO1 is sent into the ICS 17000-2 with priority (Step S2790). << Another ele for determining the degree of priority >> Regarding example 2 for detexffdning the degree of priority wherein the access control apparatus 17100-2 receives the ICS user packets F03, F04 and F05 frm the ICS logic tenninal of the line portion 17111-2 provided with ICS network address R7822n almost at the same time; example 3 for determining the degree of priority wherein the access control apparatus 17100-2 receives the ICS user packets F06 and F07 frern the ICS logic terminal of the line portion 17111-2 provided with ICS network address '7823w almost at the same time; example 4 for detennining the degree of priority vd-jP-mm the access control apparatus 17100-2 receives the ICS user packets F08 and F09 fran the ICS logic tenninal of the line portion 17111-2 provided with ICS network address n7824w almost at the saw tim; and example 5 for dete=rdning the degree of priority wherein the access control apparatus 17100-2 receives the ICS user packets F10 and F11 fram the ICS logic terminal of the line portion 17111-2 provided with ICS network address '7823w almst at the same time: the method for determining the degree of priority is the same as example 1 for dete=nining the degree of priority, as shown in the portion table comprising the conversion table 17113-2, and description thereof will be anitted.
Embodiment-15 (Nbltiple comrunication):
The description of the present effbodiment will be niade with reference to. FIG. 85 through FIG. 87. An ICS 18000-1 includes access control apparatuses 18140-1, 18141-1, 18142-1, 18143-1 and 18144-1, a conversion table within the access control apparatus 18140-1 being 18195-1 and the conversion table within the access control apparatus 18141-1 being 181961. The conversion table 18195-1, as with the conversion table 6013-1, contain specified values R10, "2R, "V and "4w for request identification. and correspondingly, intra-corporation ccmziication, inter-corporation caffnLmication, virtual dedicated line connection, and ICS network server connection can be made within a single access control apparatus. The conversion table 18196-1, contains only the specified value R3w for request identification, enabling virtual dedicated line connection. The ICS network server
153 18160-1 is connected to the access control apparatus 18140-1 via an ICS network co=mication Line. A block 18184-1 is an FR network or an ATM network; in the event that 18184-1 is an FR network.
LANs 18110-1 and 18130-1 are each c ann ected with access control 18140-1 and 18142-1 via an ICS user logic cunication line. The gateways 18171-1 and 18172-1 are connected to the access control apparatus 18140-1 or 18141-1, via an ICS user logic ccmTLmicatim line. LAN 18120-1 includes a plurality of IP terminals, 18121-1, 18122-1 and 18123-1. Now, the term 'IP terminal" refers to a tenninal which has the functions of sending and receiving IP user packets. The IP tenninals 18150-1 and 18151-1 are each via access control apparatuses 18143-1, 18144-1, and an ICS user logic comn.inication line. The ICS network comiunication line 18191-1 connects the conversion unit 18181-1 with the access control apparatus 18141-1, and the ICS network cmication Line 18192-1 connects the conversion unit 18182-1 with the access control apparatus 18141-2.
ICS user packet sent fram the LAN 18120-1 or LAN 18110-1 is, upon arrival to the access control apparatus 18140-1, ICS- ed in order to receive me of the ceffnunicatim services of intracorporation camiunication, inter-oorporation conxmicatim, virtual dedicated line connection, or ICS network server connection, following control of the request identification values -1n, -2 n ' N3w or w49% listed in the conversion table 18195-1. Also, an ICS user padcet sent fram the gateway 18172-1, upon arrival to the access control apparatus 18140-1, is ICS- encapsulated, in order to rve virtual dedicated 154 991 qq; Bu-pl"Aum aoj suo-p:pun-j = Z-OZZ9T pue Z-OTZ91 sl-gm uorsxaAuoo OORJJG4uT JM N4 lXa0P4gu M ue ST Z-00ZqT XpoTq e 4rq4 4mAa 9q4 UT mN 'Z-OUST 4R6 P q4Tm P9ORTd9a = T-UTS1 Pue I-UT9T SZEB 9q4 "xaq4=g pue OZ-OZZ9T:1Tun mTsaeAuoo aoe3x94uT DM q:l-pm pooeTdaz a" 1MST UOT4ROTm=m XaOP4GU SDI W4 Pue "I-Z9Tgl 4Tm uo-rsxaAuoo stX4 'T-zv191 sri:Rz Tw:poo sseom sq;:Z-01Z91 4Tun UOTSx-uth-u00 9029a94UT DM q4T.M TdGa = T-16T91 OM U0TWOTUM= X-TOP49u SW gq: Pue 'T-T9T9T:1Tun uo-cs=-Auoc> atp srt4,ea T0a4U00 SSW0le OT1.1T-OOZST XaGM4gu WIV -TO X-TOM4GU M W4Tm peoL>Tdea sT L9DIA UT T-MST X-TOWM4gu W1Y -10 XJOY4gu UA aU SgsrLIR= TW4U00 ssomE atn qBno=q:l sTea=94 c1I ptm sffln tT4TA pe;oeuuoo axe pue ls;asr4Pa Toj:4uoo sswoe eTd-pTm apnTou-p os-re Z-OOOST SDI IT-00091 SDI q;TM SY 06%)Id 0: OOW-U-agw XMA OPEW 9q M.M UO-P4dT=aa <<uo-p:RTaEA::luaw.rpoqwa woqe o4 96uetp -reT4apd>> pezTrew s-r s4mped jsm sDI go aegsuea4 'saupx)wd pgqT=sgp-w aq; o4 Bome IsnxU XJ0m4W W1Y aO XaGM4W M 9R: 90 UOT:Omg W4 se POM ST 4-Te U%OUX e sT ipTqm (Dm) A4-Ted x-Tr4o gq: q4TA uo-p;oeuuoo g 1 1-p919,r XJ0m4W W1V -TO X-TOM4GU Ud Gx& -TOd T-ZPTST sr4Ra T0-nu00 SS9we N4 04 PalaATTOP ST Pue 'I-UTST OuTT UOT4P0Tunu= X-TOP49u SDI N4 xffim=q4 S9ssed "T-Z9TST 4TM UOTS3GAU00 9x& qBnOxq; S9ssEd 'T-PSIST XJ0M4gu WIV -TO XOu UA 9q; qPnOaM. SOssed XaPJnJ 'I-T6TWE OUTT U0TWOTmu= X-TOM4gu SDI 9q; RT-A 1-19T9T 4TM UOTSXUAWO W4 q6nwq4 "SsEd 'T-961ST 9Tqel U0TWaMOO 9q; uO P94M E. UOT4ROTTY4U9PT:isa a& go TO-T4U0c) aq: fsurmg 9OT&Ies U0-p4ROTm=m GU-PT ICS user packet into the FR packet format. and reverse-converting thereof. In the event that 18200-2 is an ATM network, the PVC interface conversion units 18210-2 and 18220-2 are functions for converting the ICS user packet into the ATM frame format, and reverseconverting thereof. Transfer of ICS use packet according to this variation is realized by using the functions of fixed connection with the other party (PVC) by the FR network or ATM network.
Effibodiment-16 (Operation of ICS):
Description will be made with reference to FIGs.91 and 92. The ICS 190001 includes: VAN 19010-1, VAN 19020-1, access control apparatuses 19300-1, 19310-1, 19320-1 and 19330-1, relay devices 19400-1, 19410-1, 19420-1 and 19430-1, inter-VAN gateway 19490-1, and server devices 19500-1, 19510-1, 19520-1, 19530-1 and 19540-1. Each semw is provided with an ICS network address, and has a plurality of ICS network servers therein. These plurality of ICS network servers are distinguished by port numbers used with TCP caffnmicatim protocol or IMP cnication protocol. The access control apparatuses 19300-1, 19310-1, 19320-1 and 19330-1 each include conversion tables 19301-1, 19311-1, 19311-1 and 19311-1, each includes cmversion table servers 19731-1, 19732-1, 19733-1 and 19734-1, and also includes dcmain name mers 19741-1, 19742-1, 19743-1 and 19744-1, and also includes resource administration servers 19751-1, 19752-1, 19753-1 and 19754-1, the relay device 19400-1 includes a path information server 19761-1 and resource administration server 19755-1, the relay device 19410-1 156 includes a path information server 19762-1, the relay device 19420-1 includes a path information server 19763-1, the relay device 19430-1 includes a path information server 19764-1, the server device 19500-1 includes a user service server 19711-1 and ICS authority server 197211, the server device 19510-1 includes a governing resource administration server 19750-1 and governing resource administration server 19760-1, the server device 19520-1 includes a user service server 19712-1 and ICS authority server 19722-1, the server device 19530-1 includes an ICS network server 19980-1 which has an ICS user address R120OR and perform electronic library services, and an ICS network server 19981-1 which has an ICS user address n130OR and perform travel information services, the server device 19540-1 includes a governing resource administration server 19720-1, governing domain name server 19740-1, governing conversion table server 19730-1. and governing user service server 19710-1.
The above-described access control apparatuses, relay device, server devices, and VAN gateways are connected by the ICS network ccmTLinicatim lines 19040-1, 19041-1, 19042-1 and 19043-1, so as to be able to exchange information me with another using ICS network commmi-catim functions. The server devices are formed by, e.g., giving the ICS network camuziication function to a cter, with programs rmning therein for realizing server functions.
A block 19110-1 is an FR network, and the conversion units 19111-1 and 19112-1 are for performing interface conversion with the cmmmcatim lines of the FR exchange network and the ICS 157 cctia,Luiicatim lines transferring ICS network packets. Also, a block 19900-1 is an ATM network, and the conversion units 19901-1 and 199021 are for performing interface conversion, with the cammication lines of the ATM excImge network and the ICS ccffmmcatim lines transferring ICS network packets.
In the ent)odt. connected outside of the ICS 19000 LANs 19600-1, 19601-1, 19602-1, 19603-1, 19604-1 and 19605-1, and IP tenninals 19606-1 and 19607-1 having functions for sending and receiving ICS network packets. <<Hierarchical structure of the ICS network server>> Description will be made with FIGs.93 through 98. The governing user server 19710-1 has superior controlling authority in instructing the user service servers 19711-1 and 19712-1 or requesting individual informtion reports, the meaning of superior controlling authority being illustrated in a tree-structure diagram in FIG.93. A block 19811-1 is a cemninication path for informtion exchange between the governing user service server 19710-1 and the user service server 19711-1, and i_s caffpr of ICS cammnication lines and relay device, among others. The governing resource administration server 19720-1, the governing conversion table server 19730-1, the governing domain name server 19740-1, the governing resource administration server 19750-1, and the governing resource administration server 19760-1 are also the same, each being shown in FIGs.94 through 98. Now, in the present embodnmt, there are two layers in the tree-structure hierarchy, but this can be increased to three or wre layers by
158 increasing the name of access control apparatuses, relay devices, servers devices, etc., places within the ICS. The path information service is provided with the functions of sending and receiving inside the ICS, a path table used by the relay devices and access control apparatuses. The resource administration server is provided with administration functions of keeping up m rriounting information or obstruction information of the relay devices, access control apparatuses and server devices. <<Operation of ICS 19000-1 by ICS operator>> The ICS operators 19960-1 and 19961-1 provide instructions such as operation start-up to, or request reports of individual information frCIM, the governing usW service server 19710-1, the governing conversion table server 19730-1, the governing resource administration server 19750-1, and the governing resource administration server 19760-1, thereby facilitating operation of the Ics 19000-1. <<Operation of ICS 19000-1 by ICS authority>> The ICS authority 19950-1 provides instructions such as the operation start-up to, or request reports of individual informtion fran, the governing resource administration server 19720-1 and the governing do name server 19740-1, thereby facilitating administration of addresses and the Like used in the ICS 19000-1. <<Socket nunber and server>> The ICS servers each have ICS user addresses and ICS network addresses, but an addition to the other entx>dts is that the above servers have, in addition to ICS network addresses, port numbers 159 I- stipulated by TCP or UDP mnnmication protocol. That is. each of the aforementioned servers is identified by a 32-bit ICS network address and a 16-bit port number, ng for a value with a total of 48 bits (this being referred to as 'Nsocket nwib-=0). Each server includes which have peculiar functions operating within the ICS 190001, and further, there are servers among these which have noperating interfacen, as described later. Now, the Roperating interface" is a function which perform exchange of information, and sends and receives instructions such as operation of the various server functions or start-up or operation, with the operator via a keyboard or the Like. Each server provides access control apparatuses or relay devices, for example, with ICS network addresses, applies differing port numbers to the plurality of programs within these devices (i.e., servers), distinguishing by the socket number. As described in the embodiments, each server has ICS network commanication functions, and can exchange information one with another using the ICS network address and the port numbers. <<Registration 1 to ICS of user: Inter-corporation camnmication and ICS network server>> Description wi_11 be made with reference to FIG.91, FIG.92 and FIG.99. An applicant 19200-1 to the ICS 19000-1 applies to the ICS receptionist 19940-1 for ICS membership (procedure P100). The nApplication reception data" is a usage item of ICS wherein the ICS user address, the ICS network address, and the ICS name. has been deleted, and is comprised of, e.g., request identification (classification of intra-corporation canamication, inter-corporation cammication, virtual dedicated line connection, or ICS network server connection), commication band conditions such as speed class and priority, billing cmditions, apen-zone connection conditions, paynmt method, name and address of user (personal ID data), signing conditions, encryption conditions and so m.
The ICS receptionist 19940-1 enters the above "application reception data" to the user service server 19711-1 via the woperating interfacen, and stores the Rapplication reception datan in the user database 19611-1 (procedure P110). Next, the user service server 19711-1 requests of the ICS authority server 19721-1 the ICS user address, ICS network address and ICS narre, using the ICS network cmatunication functions (procedures P120). The ICS authority server 19721-1 appropriates the requested aforementioned ICS address and ICS name using the ICS network address appropriation record table 19622-1 (FIG.100) and the ICS usex address appropriation record table 19623-1 (FIG.101) stored within the database 19621-1 (procedure P130), stores the appropriation results in the aforementioned appropriation tables, and further returns the appropriation results to the user service server 19711-1 (procedure P140). The user service server 19711-1 stores the appropriation results obtained fran the ICS authority server 19721-1 in the user database 19611- 1 (procedure P150).
FIG.100 is an example of the ICS network address appropriation record table 19622-1, and in the first line of this table there is an example which states beforehand that an ICS network address '7700' has 161 been appropriated to ICS logic terminal identifying code LT-001 of the node identifying code ACU-1, that the appropriate identifying code is user-1, that the date of appropriation is April 1, 1998, and that the node identifying code ACU-1 points to the access control apparatus 19300- 1. Also, in the third line of this table there is an example which states beforehand that an ICS network address n69300 bas been appropriated to port number 0620n of the node identifying code SW-1, that the appropriate identifying code is Sc-001, that the date of appropriation is February 1, 1998. and that the node identifying code SW-1 points to the server device 19530-1.
FIG.101 is an exarnple of an ICS usex address appropriation record table, and in the first line of this table tliere is an example which states that the ICS name address "4610w has been appropriated with an ICS nam (also called an ICS damain name) of nddl.ccl.bbl.aal.jpn, that the request identification value is w2R, that the appropriate identifying code is user-1, and that the date of appropriation is April 1, 1998. Fn, in the fourth line of this table there is an example which states that the ICS name address '1200" has been appropriated with an ICS name of nrrl.qq.pp.jpI, that the request identification value is 04n, that the appropriate identifying code is Sv-001, and that the date of appropriation is Febnmry 1, 1998.
The user service servex 19711-1 provides information to the cormersion table server 19731-1 via the ICS network ccrmiLmicatim function so as to write the application contents of the usage applicant 19200-1 and the obtained ICS network address into the conversim table 19301-1 In the access control apparatus 19300-1 (procedure P160). The contents to be provided are: transmitting ICS network address, sender ICS user address, request identification, speed class, priority, signing conditions, encryption conditions, open-zone clws and so m. Also, in the event that the aforwmtimed ICS network address and ICS user address have a request value of n2n, i.e., inter-corporation coffcation, registration is made as transmitting ICS network address and sender ICS user address. In the event that the request value is n4n, i.e., ICS network server, registration is rnade as receiving ICS network address and receiver ICS user address. The cmversion table server 19731-1 adds the above contents to the conversion table 19301-1 (procedures P170). The receiving ICS network address and the receiver ICS user address are not registered in the conversion table 19301-1 at this time, but are registered in the cmversion table 19301-1 at the tine of wregistration of other party of camxmcatiLon", later described in the present wbodin-ent.
Next, the conversion table server 19731-1 notifies the ICS dcmain name server 19641-1 of the ICS network address, the ICS user address and the ICS name (procedure P180). The ICS do name server 19641-1 writes the above received ICS network address, ICS user address and ICS name in the database therein and stores thern (procedure P190), and reports letion of writing to the conversion table server 19731-1 (procedure P200). The conversion table server 163 19731-1 confirnis this report (procedure P210), reports letion of the series of procedures to the user sexvice server 19711-1 (procedure P220), the user service server 19711-1 confirms this report (procedure P230), and informs the usage applicant of the appropriation results, nanvaly, the ICS user address and ICS nanne (procedure P240). Incidentally, the ICS network address is used only within the ICS, so the usage applicant is not notified of this. In the event that the request value is RC, i.e., ICS network server, the user service server 19711-1 notifies all conversion table servers within the ICS 19000-1 at the time of the procedure P160, and requests registration to the conversion table of all access control apparatuses. <<Re-writing administration of conversion table by governing conversion table server>> Description will be rnade with reference to procedures 800 through 960 to the bottan of FIG.99 and FIG.91, FIG.92, FIG.95. The governincr conversion table server 19730-1 instructs the conversion table server 19731-1 to re-write the contents of the conversion table 19301-1, e.g., speed class priority. transmitting ICS network address, a part or all of other item in the conversion table (procedure P800), and the conversion table server 19731-1 changes the contents of the conversion table 19301-1 according to the instructions (procedure P810). Also, the dcmain name server 19741-1 is instructed to re-write the ICS network address and the Like (procedure P820), the dcmain name server 19741-1 follaws; the instructions and updates the internal table (procedure P830), reports the results to the conversion table server
164 19731-1 (procedure P840), the conversion table server 19731-1 confi rm(procedure P850), and reports to the governing conversion table server 19730-1 (procedure P860). Also, the governing conversion table server 19730-1 instructs the user service server 19711-1 to re-write the contents of the user database 19611-1, such as speed class, ICS network address, etc. (procedure P900), and the user service server 19711-1 follows the instructions and updates the contents Of the user database 19611-1 (procedure P910). Also, the ICS network addresses, ICS user address, and ICS names which have became unnecessary to the ICS authority server 19721-1 are ret urn ed, or new re que sts are made (procedure P920), the ICS authority server 19721-1 follows these instructions and updates the ICS network address appropriation record table 19622-1 and the ICS user address appropriation record table 19623-1 (procedure P930), reports the results thereof to the user service server 19711-1 (procedure P940), the user service server 19711-1 confirm the report (procedure P950), and reports to the governing conversion table server (procedure P960).
In the above description, an arrangement may be used wherein first, the governing conversion table server 19730-1 calls up the user service server 19711-1 and perform the aforementioned procedures P900 through P960, and then secondly calls up the conversion table server 19731-1 and perform the aforementioned procedures P800 through P860. With such an arrangement, the ICS operator 19960-1 instructing rewriting of the contents of the access control table to the governing conversion table server 19730-1 enables exchanging of the conversion table within the acoess control apparatus and the address information related thereto with demain nam servers and ICS authority servers which have administration, thereby faci 1 i tating ease of re-writing managemmt of the contents of a conversion table with consistency, i.e., ease of updating management of all conversion tables within the access control apparatuses within the ICS 19000-1. <<Registration of other party of camamicatim>> FIG.105 will be described. A usage applicant for the ICS 19000-1 applies for registration of other party of oamuncation to the ICS receptionist 19940-1 along with the damin narne of the other party of ccxtnv-mication (procedure P300). The ICS receptionist 19940-1 receives the dc name of the other party of ccnmmcation (procedure P310), and sends it to the conversion table server 19731-1 (procedure P320). The conversion table server 19731-1 exchanges information with the dmk-dn name servers 19740-1, 19742-1, etc. (procedures P330 and P331), obtains the ICS network address and the ICS user address corresponding with the dem= naffe of the other party of cami=catlon regarding which there was inquiry, updates the contents of the conversion table 19301-1 (procedure P340), and reports the results (procedures P350 and P360). The updated results are shown to the conversion table 19301-2. The ICS network address obtained here is registered in a conversion table such as shown in FIG.106 as a receiving ICS network address, and the ICS user address obtained here is registered as a receiver ICS user address. Incidentally, in the ca e of an ICS network sezvw, the spaces for the ICS network address and the ICS user address remain 166 f i blank. <<Registration 2 to ICS of user: Intra-corporation c=unication and virtual dedicated line>> Description will be made with reference to FIG.107. The difference with intra-oorporation comnunication as ccopared. to the above intercorporation. caffmmicatim is that an ICS user address is banded in and an ICS name cannot be used, accordingly, there is no appropriation of the ICS names, and there are no procedures for using ICS names (procedures P180, P190 and P200). First, an applicant 19200-1 to the ICS 19000-1 applies to the ICS receptionist 19940-1 for ICS mmtership (procedure P400). The "Application reception data- is a usage item of ICS wherein the ICS network address and the ICS name has been deleted, and is cotnprised of, e.g., ICS user address, request identification (classification of intra-caxporation cannmication, inter-corporation cmnzdcatim, virtual dedicated line connection, or ICS network server connection), speed class and priority, etc., the same as with the previous inter-corporation communication.. The ICS user address further shows a plurality of pairs for both sender ICS user address and receiver ICS user address. Also, in the case of a virtual dedicated line connection, the sender ICS user address and the receiver ICS user address are not shown; this is what is different as cam to the intra-corporation conmmication.
The ICS applicant 19940-1 enters the above "application reception datag to the user service server 19711-1 via the "operating interfacem, and stores the "application reception, data" in the user 167 database 19611-1 (procedure P410). Next, the user service server 19711-1 requests of the ICS authority server 197231-1 the ICS user address, the ICS network address and the ICS name, using the ICS network cnication function (procedures P420). The ICS authority server 19721-1 appropriates only the ICS network address as with the above procedure P130 (procedure P430), records the appropriation results in the aforementioned appropriation tables, and further returns the appropriation results to the user service server 19711-1 (procedure P440). The user service server 19711-1 stores the appropriation results obtained frcxn the ICS authority server 19721-1 in the user database 19611-1 (procedure P450).
The user service server 19711-1 notifies the conversion table server 19731-1 of the application contents and the obtained ICS network address (procedure P460), the conversion table server 19731-1 adds the above contents to the cormersion table 19301-1 (procedure P370), and reports completion of registration (procedures P480 and P495). FIG.108 shows and example of registration to the conversion table 19301 of the intracorporation camunication and the virtual dedicated line. <<Description of damain name server>>
An example of 4-1 hierarchy will be described with reference to FIG.109 and FIGs.110 to 112, regarding the procedures P330 and P331 regarding the dmk-dn name server in the description of FIG.105. The ICS network address of the internal table 19600-1 of the dark-dn name server which is the object of the dan-:dn name "rooC is "9500", and
1 168 domain names wc-dw, Rei2R, na31m and so forth exist below, indicating, e. g., that the ICS network address of the domain name server which handles the domain name nal" is "9610", and the port number Is "440' The ICS network address of the internal table 19610-1 of the dcmain name server which is the object of the domain name "al" is "9610", and domain names "bln, nb2n. OW" and so forth exist below, Indicating, e.g., that the ICS network address of the domain name server which handles the dcmain name wb2" is "9720", and the port number is "440R.
The ICS network address of the internal table 19620-1 of the domain name server which Is the object of the domain name ubl" is "9720", and demain names Rc4R, nc5", Rc6R and so forth exist below, indicating, e.g., that the terminal space for the domain name 0c5" is YES, meaning that there are no more domain names below, and that in this example, the ICS network address of the ICS name ncS.b2.al.n is R9720R, and that the ICS user address is w451On. Also, the record of the Internal table 19620-1 of the domain name server, i.e., the ICS name (ICS domain name), the ICS network address and the ICS user address "4610w are considered to be me group of data and referTed to particularly as a Rresource recordn of the domain name server. <<CaLling dcmain name servers>> With reference to FIG.113, description will be made regarding the procedures in which the cmversion table server 19630-1 calls the domain name servers 19640-1, 19650-1 and 19660-1, and searches for the ICS network address and the ICS user address corresponding with the dcmain name "c5.b2.al.'". The conversion table server 19630-1 enters
169 the demain name wcS.b2.al.w in the resolver 19635-1 in the conversion table. The resolver 19635-1 sends the ICS packet 19641-1 including Walw to the ICS do name server 19640-1, and an ICS packet 19642-1 including an ICS network address n9610' of the ICS danain nanne server for nal" is returned. Next, The resolver 19635-1 sends an ICS packet 19651-1 including 0b20 to the ICS dc name server 19650-1, and an ICS packet 19652- 1 including an ICS network address 09720w of the ICS danain name server for nb20 is returned.
Next, the resolver 19635-1 sends an ICS packet 19661-1 including nc5n to the ICS domain name server 19660-1, and an ICS packet 19662-1 including an ICS network address n9820w for 0c5 and an ICS user address w452C is returned. According to the abave procedures, the conversion table server 19630-1 obtains an ICS network address n9820" and an ICS user address "4520n corresponding with the danain name Rc5.b2.al.".
<<Re-writing of conversion table fran an IP temn>> Description will be made with reference to FIGs.114 and 115. An ICS user packet including the dwein name nc5.b2.al." is sent frm the IP terminal 19608-1 to the conversion table seiver 19731-1 (procedure P500). The conversion table server 19731-1 makes inquiry to the danain narne sexvw (procedure P510), the dc name server searches and obtains the ICS network address "9820n and the ICS user address n452ON corresponding with the domain name "c5.b2.al.n (procedure P520), and returns this to the conversion table server 19731-1 (procedure P530), the conversion table server writes this to the conversion table
1 19301-1 (procedure P540), and reports to the IP terminal 19608-1 (procedure P550). In these procedures, the ICS network address "9820" is written into the cormersion table as a receiving network address, and the ICS user address 04520' as a receiver ICS user address, the re-written conversion table being shown in FIG.103. Incidentally, FIG.103 cmits the items listed in the conversion table corresponding with the request identification included in FIG.102.
Next, the IP tendnal 19608-1 sends an ICS user packet to the conversion table server 19731-1, including specification for changing the speed class to "2R, with regard to the registered contents of the conversion table 19301-1X (procedure P600). The cmversion table server 19731-1 re- writes the registration contents of the corrversion table 19301-1X so that the speed class is n2n, according to the specification (procedure P610), and reports to the IP terminal 19608-1 (procedure P620). The conversion table re-written by these procedures is shown as 19301-Y (FIG. 104). <<Wwing a terminal between access control apparatuses>>
As can be seen from the embodiment of the ICS user address appropri-ation record table 19623-1, the first line of this table appropriates ICS name nddl.ccl.bbl.aal.jpw to the ICS user address "4610", and holds the ICS user address and the ICS name. For example, in the event that a terminal 19608-1 (FIG.91) having an ICS user address R461OR is moved frcin the access control apparatus 19300-1 to the access control apparatus 19320-1 (FIG.92), and in the event that this terminal is appropriated a new ICS network address N78210 for 171 example, the conversion table has registered therein a transmitting ICS network address n7821" and a sender ICS user address 0461OR as a pair. In this case, the ICS name Oddl.ccl.bbl.aal.jpn is paired with the ICS user address 04610n as stipulated by the ICS user address =priation record table 19623-1, and the ICS name is not changed. The resource record caqnt of the ICS name uddl.ocl.bbl.aal.jp" within the domain name server, the ICS network address n7700n, and the ICS user address w4610", is changed to that having the ICS name Oddl.ocl.bbl.aal. jp", the ICS network address n7821n and the ICS user address n461On. That is, the ICS network address 0770C is re-written to another address n7821n, but the ICS name "ddl.cel.bbl.aal.jpn and the ICS user address n4610w are not re-written. Sunmmrizing this, the resource record of the domain name server and ICS user address xropriation record table of the ICS authority server hold the ICS user address and the ICS name, and there is no case in which only one is changed. Accordingly, in the event that a termanal is moved between access control apparatuses, there is no need to change the ICS user address and ICS name of the tenninal. (Other embodiment: determination of ICS user address by the user) This is an arrangement wherein the above embodiment has been changed so that the user detennines the ICS user address. That is, when the usw (usage applicant 19200-1) applies to the ICS 19000-1, an ICS user address Is added. The ICS receptionist 19940-1 includes the ICS user address in the application reception data. Also, the ICS authority server 19711-1 stores the ICS user address that the user has 172 applied for in the ICS user address appropriation record table 19623-1. According to the above method, the user can determine his/her ICS user address, thus increasing freedcm of usage.
Embodirrent-17 (calling other party of camunication by telephone rnmt)er):
The present oTbodwmt shows an example wherein using the telephone number as the ICS domain name allows sending and receiving of ICS user JP packet with the other party of communication, in which digitized voice is stored within the user JP packet, thereby facilitating public communication using a telephone. In the present mbmbsent, des=ptim will be made with reference to the example wherein the telephone number 81-3-1234-5678 in Tokyo, Japan, is viewed as being domain name "5678.34.12.3.81.99 Here, "3n indicates Tokyo, and '81m indicates Japan.
Description will be made with reference to FIG.116. An ICS 20000-1 includes access control apparatuses 20010-1, 20020-1 and 20030-1, relay devices 20080-1 and 20090-1, domain name servers 201101, 20120-1, 20130-1, 20140-1 and 20150-1, and the access control apparatus 20010-1 includes line portion 20011-1, a processing device 20012-1, a cmversion table 20013-1 and a conversion table server 20040-1. The conversion table server 20040-1 is within the access control apparatus 20010-1, and an ICS network address of "78000 and port number of R600w are appropriated. The conversion table server 20040-1 Is provided with an ICS user address R4600m frcm outside of
173 the ICS 20000-1, and appears to be an ICS server having the functions of converting an entered dcffam name into an ICS user address and returning, and also registering the ICS network address in the conversion table 20013-1 within the access control apparatus 20010-1.
A block 20210-1 is a LAN, blocks 20211-1 and 20300-1 are both IP terminals having the functions of sending and receiving ICS user frwes, each having ICS user addresses n4520w and u1200n, and are connected to the ICS 20000-1 via the ICS user logic camunication line. IP terminal 20300-1 can be used as a telephone and thus is referred to as an nIP telephmen. The IP telephone 20300-1 includes a telephone number input unit 20310-1, IP address accumalatIng unit 20320-1, voice data sending/receiving unit 20330-1, input buttons 20340-1, and voice input/output unit 20350-1. <<Obtaining ICS user address by telephone nuffkber>> The telephone number -1234-5678- is entered into the telephone number input unit 20310-1 by the input buttons 20340-1. The telephone number input unit 20310-1 generates the ICS user packet P1201, and delivers this to the access control apparatus 20010-1 via the ICS user logic canuziication Ime. Here, the ICS user packet is the sender ICS user address '1200m and the receiver ICS user address "4600", and the telephone number -1234-5678" entered by the input buttons 20340-1 is included in the data. The processing device 20010-1 looks at the conversion table 20013-1. and sends the ICS user packet P1201 to the conversion table server 20040-1 indicated by the ICS user address "460On. Also, in the present embodinmt, the Conversion table Server 174 20040-1 is within the access control apparatus 20010-1, so there is no need to user ICS network mmiunication functions. Based m the telephone nu "1234-5678" included in the data field of the ICS user packet, the conversion table server 20040-1 sequentially contacts dcmain name servers 20130-1, 20140-1 and 20150-1, and obtains the ICS network address "7920' and the ICS user address "4520n of the terminal 20211-1 of the other party of ccnmnicatim In the event that the telephone nmt)er w1234-5678" is viewed as a dank-dn narrhes.
Next, the conversion table server 20040-1 creates a conversion table new item 20030-1 using the two addresses w7920w and 04520w obtained here, generates an ICS user packet P1202 for the ICS user address n4520n and writes the ICS user address w4520n therein and sends it to the IP telephone 20300-1. The IP telephone 20300-1 c=bines the ICS user address 04520n contained in the received ICS user packet P1202 with the telephone nunber n1234-5678w regarding which inquiry has already been made, and stores these in the IP address storage unit 20320-1, and uses it at a later day at the point that the ICS user address n4520n correspondIng with the telephone nmt)er R1234-5678w becomes necessary. The aforemmtioned conversion table new itern 20030-1 correlates the IP telephone 20300-1 having the ICS network address R78200 and the ICS user address '12000 with the destination terminal 20211-1 specified by the telephone nmt)er n12345678R. The conversion table new item 20030-1 is used as a new cnent of the conversion table 20013-1. <<Ccuniunicatim using ICS user address>> Voice is inputted from the voice input/output unit 20350-1, the voice is converted into digital data at the voice data sending/receiving unit 20330-1, stored in the ICS user packet P1210, and sent to the destination specified by the telephone number 01234 5678', i.e., to the terminal 20211-1 determined by the ICS user ad S n4520". After this, telephone ccmnmicatim Is performed by sending and receiving ICS user packet between the two terminals 20211 1 and 20211-1.
<<Detai-led description of dwain name server>>
Regarding the above description, the method of the conversion table server presenting the telephone nuffber w1234-56780 to the damain name server and obtaining the ICS network address R792C and the ICS user address u452OR will be described in detai-1.
FIG.116 is diagram illustrating an entx)diment of a 6-layer hierarchy udcmain name treen, with root damain name wroot-tel" being provided m Level 1 of the tree, domain names aln - 044m... 0810... 090' existing m Level 2 which is lower m the tree, and dc names... R311... R6n---for exarrple existing on Level 3 beneath damain name n81", and dc names nllw, 012n, "13n,... for example existing m Level 4 beneath dmain name "3", and further dcmain names... 033', '3C, "35", -- for example existing m Level 5 beneath dc name 0121, and damain. names... u5677", 05678", 0567C existing m Level 6 beneath damain name R34R.
FIG.119 illustrates the internal table 20131-1 of the dcmain name server 20130-1 handling the domain name N3", and indicates that, 176 e.g., under domain name "3" the dc server 20140-1 which handles domain name "12" has an ICS network address of "8720" and a port number of "440". FIG.120 illustrates the internal table 20141-1 of the domain nam server 20140-1 handling the domain n^ w12", and indicates that, e.g., under domain name R12" the domain server 20150-1 which handles do name w34R has an ICS network address of '8820' and a port number of "440w. Also, FIG. 121 illustrates the internal table 20151-1 of the domain name server 20150-1 handling the domain r "12R, and indicates that the endpoint for the domain name. "5678" in the internal table 20151-1 is YES, ffeag that there are no more domain names below, and in this example, the ICS network address corresponding to the domain name w5678.34.12.3.18.n is "8920", and the ICS user address thereof is R4520'. <<CaLlJng domain name server>> With reference to FIG.122, description will be made of the procedures for the conversion table server 20040-1 calling the domain name servers 20130- 1, 20140-1 and 20150-1, and searching for the ICS network address and the ICS user address corresponding with the dcnk-dn ricim R5678.34.12.3.81.H. Now, the resolver 20041-1 has therein the ICS network address of a domain name server handling the Level 1 domain R=t-teln shom in FIG.119. Also, in the event that there is a great deal of communication with the domain name server which handle the Level 2 and Level 3 domains, the ICS network addresses of the upper domain name servers thereof are stored in the resolver 20041-1.
The conversion table server 20040-1 inputs domain name 177 5678.34.12." into the internal resolver 20041-1. The resolver 200411 has the ICS network address 08610w of the server handling the domain name 13. 81.w which indicates R81n for Japan and n3n for Tokyo, and sends an ICS packet 20135-1 including the domain nam n12w which is under the domain name "3n to the ICS domain name server 20130-1 using the ICS network communication function, in response to which an ICS fram 20136-1 including the ICS network address n8720" of the ICS domain name server 20140-1 which handles the domain name w12m J-s returned. Next, the resolver 20041-1 sends an ICS packet 20145-1 including the domain name n34n to the ICS domain name server 20140-1, in response to which an ICS packet 20146-1 including the ICS network address n8820R of the ICS domain name server 20146-1 which handles the domain name w34n is returned.
Next, the resolver 20041-1 sends an ICS packet 20155-1 including the domain nam w5678n to the ICS dc name server 20150-1, in response to which an ICS packet 20156-1 including the ICS network address n7920n and "ICS user address 45200 of the ICS domain namp, server 20156-1 corresponding with the domain name n5678n is returned. According to the above procedures, the conversion table 20040-1 obtains the ICS network address 07920" and the ICS user address n4520" corresponding to the domain name n5678.34.12.3.81. << Telephone line connection >> There is a telephone line conversion unit 20510-1 within the line portion 200011-1, and the telephone 20520-1 is connected to the telephone line conversion unit 20510-1 via the telephone line 20530-1.
178 The telephone line conversion unit 20510-1 has the same function as those described in the other embodiments, and generates an ICS user packet sorted in the data field, as will as cmverting voice sent frcrn the telephone line 20530-1 Into digitized voice. Also, ICS user packet which is sent in reverse, i.e., frcm the ICS net to pass through the access control line portion, have the digitized voice stored therein converted into analog voice in the telephone line conversion unit 20510-1, or in the event of an ISDN line, converted into digitized voice. According to such an arrangement, the IP terminal 20300-1 provided with an ICS domain name and the telephone 20520-1 can perform communication by telephone voice. (Connecting to a public telephone network)
Further, the telephone line conversion unit 20510-1 and the private exchange 20600-1 are connected by a telephone line 20530-2. Telephones 20520-2 and 20520-3 are comected with a private telephone Line 20540-1 extending fram the private exchange 20600-1, and a telephone communication can be carried out between the telephone 20520-2 and the telephone 20300-1. Also, connection can be made via the private exchange 20600-1 to public telephone networks/ international telephone network 20680-1. Such an arrangement enables the telephone ccmmunication between the telephones 20520-4 and 20300-1.
Embodiment-18 (IP terminal capable of connecting to plural access control apparatuses):
The present embodiment does not fix the IP terminal having the 179 functions for sending and receiving ICS user IP packets to a specific access control apparatus; rather, it realizes an IP terminal which can be ma and connected to other access control apparatuses and used, i.e., capable of roaming. Roaming is realized based m the ICS demain name provided to the IP terminal. <<Password transmission technique using cipher>> The present embodiment includes procedures for cipher-ing a secret password PW and sending it fran the sender (encoding (ciphering) side) to the receiver (decoding side). First, a ciphering function Ei and a decoding function Di will be described. The ciphexing function Ei Is represented by y Ei(kl, x), and the decoding function Di is represented by x Di(k2, y). Here, "y" denotes the ciphertext, "xw denotes plain-text, %kV' and "k2" are keys, and win represents cipher numbers (i = 1, 2, -) detemnining the secret key code and the public key code, including how the value of the cipher key is to be used. In the above, an arrangement may be used wherein plain-text xl is ciphered instead of pLain-text x with x' = X 11 r (wherein "r" is a random number), and discarding the randam number r frem the plain-text x' upon decoding, thus obtaining the plain-text x. Such an arrangement generates a different ciphertext each time the same plain-text is ciphered, owing to the random number, and it is said that such is less susceptible to code cracking. (Exarrple of cipher number i = 1) <<Preparation>> The sender m discloses the demain name thereof (DNm) to the public including the receiver. The receiver calculates Km = Hash- 1 (DNm) using the secret data ccrrpression function Hash-1, and hands aver only the cipher key Km using a safe nethod so as to be unnoticed by a tbird party. This example is an exarrple of using DES ciphering, and the sender holds an Ociphering mdule DES-en for realizing the ciphering function Ei, and a cipher key Yin. The cipher key Km is a secret value which the sender and receiver share. The receiver has the 'decoding ne DES-d" for realizing the decoding function Di, and the data compression function Hash-1. What is used for the data campression function Hash-1 is detennined separately for each cipher ntmtw. A data carnpression function is also referred to as a whash function <<Ciphering by sender>> The sender sets the secret password PW as x = PW, and ciphers as y = DES- e(Yjn, x) with the ciphering module DES-e and the cipher key Kin being held, thereby sending the ciphertext y and damain nam. Mn. <<Decoding by receiver>> The receiver receives the ciphertext y and the dcm= name Dun, calculates the secret cipher key Kin as Km = Hash-l(DNrn) using the receiver's secret data cmsim function Hash-1, and the obtains the plaintext x as x = DES-d(Rn, y) using the decoding module. The plain-text x is password PW, and the receiver can obtain the secret password PW. A third party does not know the data cmpression function Hash-1 and thus cannot calculate the cipher key Km, and accordingly, cannot calculate the secret password PW. In the above etL)odiment, as stipulation of the cipher number i =3, the ciphering functions and the decoding functions can be replaced with ciphering f=tions and decoding functions other than DES code. (Eyle of cipher number i = 2) <<Preparation>> The present example is an example of employing RSA encoding. wherein the sender generates ciphering function y = 2emod n and decoding function y = ieniod n. Here, e d holds, the key d being a secret value. The sender hands to the receiver the disclosable keys e and n. and ciphering module RSA-e for realizing y -emod n. The sender holds the ciphering keys and the ciphering le RSA-e. The sender does holds neither the secret ciphering modJule nor secret data. On the other hand, the receiver holds n and the secret key d, and the ciphering module RSA-e for realizing y = 2e mod n. <<Ciphering by sender>> The sender encodes the secret password PW, awn domain name DNm, and time of sending (year/month/day/hour/minute/second) as x = PW 11 xl 11x2 (wlv-. xl: damain name DNm, and x2: year/month/dayl minute/second) and ciphers as y m ie mod n using the ciphering module RSA-e, thus sending the ciphertext y. <<Decoding by receiver>> The receiver receives the ciphertext y and calculates x = yd mod n using the decoding module RSA-d held beforehand and the decoding key. The result is x = PW 11 xl 11 x2, so the data which is at a certain position from the head of x is used as the password PW. In the above 182 I ciphering, domain name xl andYP-arlmnth/day/hour/rrdnute/second x2 are used as random numbers. A third party does not know the secret key cl and thus carmot calculate the secret password pw. in the above ent)odt, as stipulations of the cipher number i = 4, the values of the cipher keys e, d and n can be changed. Also, as stipulations of the cipher number i = 5, the RSA ciphering technique can be replaced with a different public key ciphering technique. <<Tan verification technIque using password and rmdcm nur>> Description will be made regarding ver-ification technique for determining whether or not the password W used by a roaming temmxial agrees with the password registered in the verifying server. AS Prerequisite conditions, the verifying server of the ver fying entity and the terminal of the user to receive verification have a password W that is secret to a third party, with a ciphering function E (wherein y = E(k, x), y represents ciphertext, k represents ciphering key, and x represents plain-text). Specific procedures for terminal verification will now be described. The terminal of the user to receive verification decides upon a random number R using appropriate means, calculates Yl - F(PW, R) using the password W and function y F(M R) and sends both the random number R and the function Yl to the verifying entity. The verifying entity receives the random nmter R and the function Y1, and calculates Y2 = F(FW, R) using the received random number R, the password W held within, and the function F, and checks whether or not Yl = Y2 holds. In the event that there is a match, verification can be made that the owner of the terminal which
* 183 1 is being verified ls using the correct password PW, i. e., verification of the temmnal can be made. In the above technique, an arrangement in which the user to be verified cannot freely select the randam number R but rather the random number R is restricted to depending m time (called a time randem number) further increases difficulty of a third party calculating the password. Instead of the ciphering function used above, the secret data compression function Hj way be used instead, for Y1, Y2 m (PW, R). <<Overall configuration>> FIGs.123 and 124 illustrate an overview of the roaming technique according to the present embodiment, wbe the ICS 21000-1 includes access control apparatuses 21010-1, 21020-1, 21030-1, 21040-1, 21050-1 and 21060- 1, relay devices 21080-1, 21080-2 and 21080-3, verifying se.,vers 21100-1, 21101-1, 21102-1 and 21103-1, demain name servers 21130-1, 21131-1, 21132-1 and 21133-1, a user service server 21250-1 and an ICS authority server 21260-1. The access control apparatus 21010-1 is provided with a conversion table 21013-1, a conversion table server 21016-1, a registration server 21017-1 and a connection server 21018-1. The access control apparatus 21020-1 is provided with a conversion table 21023-1, a conversion table server 21026-1, a registration server 21027-1 and a connection server 21028-1. The connection servers 21018-1 and 21028-1 are provided with an ICS user address R6310n, and has the function to register access control apparatuses determined as necessary to the IP tenninal, or to connect thereto.
184 The conversion table server 21016-1 has a function for rewriting the contents of the conversion table 21013-1, and the conversion table server 21026-1 has a function for re-writing the contents of the conversion table 21023-1. Also, the LAN 21150-1 has an IP temminal 21151-1, the LAN 21160-1 has an IP terminal 21161-1, and a block 21171-1 is an IP terminal. A block 21200-1 is a portable roaming terminal. and is identified by ICS dcmain name ncl.bl.al.m provided uniquely within the ICS 21000-1. <<Application for use of roaming terminal>> The owner of a roaming terminal 21200-1 indicates as an ICS usage applicant 21270-1 a paymmt method for the roaming terminal 21200-1, and applies to the ICS authority server 21260-1 via user service server 21250- 1 for an ICS damain name and an ICS user address. The Payment method represented by billing class "MNYn, e.g., in the event that ENY = 1, the charges are billed to the hcm IP (i. e., an IP terminal which is connected to the access control apparatus in a fixed manner), in the event that MY - 2, the charges are paid according to the record of the verifying server. The ICS authority server 21260-1 sets an ICS demain name mcl.bl.al.n for using the roaming terminal 21200-1, and an ICS user address B120On. Further, in order to be connected to the access control apparatus 21010-1 in a fixed mamer and use it, the owner of the IP terminal 21200-1 applies for an ICS network address to the ICS authority server 21260-1 via the user service server 21250-1. The user service server 21250-1, upon obtaining the ICS network address, makes a request to the cmversion table sexver 21016-1 to set the ICS network address "8115" and the ICS user address N120C in the conversion table 21013-1.
The ICS receptionist 21271-1 mbeds inside the interior 21201-1 of the roaming terminal 21200-1 the foUg: ICS dc name Wcl.bl.a.1.0, ICS user address n1200", special ICS address for roaming terminals (called nroaming special numbern) "1000", ICS user address "6300w for registration server, and ICS user address 063101 for connecting server, and further eff inside the interior 21202-1 of the roaming terminal 21200- 1 the ciphering function Ei and decoding related data RP1. Now, RP1 = Hj (domain name 11 RPO) 11 RPO (wherein RPO NMY 11:111 j) holds, and the domain name is "cl.bl.al.". MNY is the above-described billing class, "iw is a cipher number for typifying the cipher Ei, and njo determines the type of Hash function Hj. Data compression function HJ Is a secret dedicated function used only by the verilying server and the user service server. The user does not hold the data caqn-essim function Hj, and does not even know Hj, and thus is incapable of generating code related data RP1. <<Registration procedure frcin hem IP terminal>> Description will be made with reference to FIG.127. The roaming terminal user connects the roaming terminal 21200-1 to the position of the home IP terminal 21151-1. Next, the roaming terminal user decides on a password (PW) and enters this from the input unit 21204-1, and also generates an ICS user packet M01 using the ciphering function and the coding-related data stored within the inner portion 21202-1, and sends it to the access control apparatus 21010-1 via the ICS user
186 logic omminication line 21152-1 (procedures T10). The destination of the ICS user packet W01 is N6300n which points to the roaming registratim server, and includes own ICS dcn name wcl.bl.al. n, cipher parameter PR1, ICS user address N12000, expiration data n98-1231", ciphertext nyn which is the password that has been ciphered, ntg" (wherein tg = 1 In order to display registration procedures), and wYesm or aNo" for roaming comectim specification. The gener-ation method effployed for the ciphertext "yw is the coding technique described earner. For example, In the event that the cipher nu 2, ciphertext "yn is generated with y =)e mod n (wherein x = PW 11 cl.bl.al. llyear/month/day/hour/minute/second). The access omtrol apparatus 21010-1 looks at the conversim table 21013-1 and transfers the ICS user packet PKO1 to the registration server 21017-1 with the destination -6300- (procedure T15). The registratim server 21017-1 uses the darain name ncl.bl.al.w to call the verifying server 21100-1 (procedure T20). Also, the method by which the registration server 210171 calls the veril- ying server 21100-1 using the dcmain name is the same as the method by which the connection server 21028-1 calls the verifying server 21100-1 using the darain name, the details thereof being described in detail later. The verifying server 21100-1 checks the omtents of the received ICS user packet W01, and decodes the ciphertext ny" using the earlier- described technique, thereby calculating the password PW. For example, in the event that the cipher nuffiber - 2, the ciphertext wyn is decoded with x = yd mod n. ThIs yields x = PWIlcl.bl.al. llyear/rnmth/day/hourlrninutelsecmd, so 187 the password PW can be obtained.
Next, the contents of the cipher parameter PP1 is RP1 = Hj (domain name 11 RPO) li RPO (wherein RPO = MY 11 i 11 j), so the verifying server 21100-1 uses the secret Hash function Hj held within the verifying server 21100-1 and the obtained demain name Ncl.bl.al.N to calculate t = Hi (dcmain name 11 RPO) 11 RPO), and checks whether or not t = RP1 holds for the received RP1. If it holds, judgment is passed that the dcmain name "cl.bl.al. 0. the billing class MW, and the cipher numbers "iw and njo have not been tampered with. The verifying server 21100-1 checks for excessive or insufficient registration contents, and in the event that the contents are normal, the registration results are registered in the verification table 21100-2; registration is not made in the event there are insufficient registration contents.
Wiis is illustr-ated in the verifying table 21100-2 in the line with the administration number 1, with the dcmain name as "cl.bl.al.", cipher number n20, billing class (MNY) "1n, value of calculated password PW "224691-, expiration date n98-12-31R, roaming connection of nYes, i.e., acceptance of a roaming connection. At the time of generating the W01 in procedure T10, the aforementioned value of tg may be set to tg = 2 and roaming connection set to "Now. The password will not leak to a third party, due to application of the abovedescribed ciphering method. Roaming registration is reported by passing through the registration server 210171 (procedure T30), then the access control apparatus 21010-1 (procedure T35), and reported to 1 188 the roaming Jp terminal (procedure T40). Further, an ICS user packet for changing the value of the password PW with tg = 3 or changing the date of expiration with tg = 4 can be sent fram the tern 21200-1 via the ICS user logic camnnication line 21152-1, after the above procedure T40 has been completed. Incidentally, a method which can be employed for changing the password involves specifying the prior password. <<Sending and receiving user IP packet e travelmg>> An example will be described regarding connecting a roaming terminal 21200-1 to the access control apparatus 21020-1 and sending and receiving of user IP packet between damain name Ncl.bl.al.n of the roaming tenn 21200-1 and the other party of cwminication with a dmkiin name nc2.b2.a2. n. The user inputs the follg frcm the input unit 21204-1: the dc name "c2. b2.a2.n of other party of conminication, ntgo which has been set to tg = 5 for specifying sending and receiving of user IP packet, own password PW, and nS" which specifies the roaming connection period in days (represented by TTL). The inside 21201-1 and 21202-1 of the roaming temmInal 21200-1 is used to this end. Also, the IP frame field 21203-1 is used for generating, and sending and receiving ICS user IP packets W01, W02, W03, W04 and so forth.
Next, the roaming temninal 21200-1 generates a user IP packet W02, and sends it to the access control apparatus 21020-1 via the ICS user logic c=nunication line 21210-1 (procedure T50). The user IP packet M02 includes the sender damain name "cl.bl.al.0, receiver 189 datkqin name wc2.b2.a2.". cipher parameter RP2 and connection period (represented by TTL). The cipher parameter RP2 Is data calculated with the password PW and the inside 21202-2. That is, year/mc)nth/daY/ secad Oyy-mm-dd-sssss' is generated and used as a time randcrn number TR (TR m yy-ffm-dd-sssss), and the clock of inside 21202-2 and the cipher function Ri is used to calculate RP2 = U(PW, TR) 11TR.
The access control apparatus 21020-1 receives the user IP packet W02, obtains the ICS network address "7800' provided to the ICS logic terminal, and since the request identificatim from the conversion table 21023-1 is %4R and further the sender ICS user address written to the user IP packet M02 is "100ON (1.e., roaming special number), the abave ICS network address n78OW is held, and is delivered with the ICS user packet M02 to the comectim server 21028-1 pointed to by the receiver ICS user address 06310' (procedure T60). The ICS network address n780OR obtained in this procedure will be used after the later-described process T130. <<Function of comection server>> Next, the connection server 21028-1 calls the verifying server 21100-1 using the demain name ncl.bl.al.", and transfers the dcmain name ncl.bl. al." and the cipher parameter RP2 to the verifying server (procedure T70). The verifying server 21100-1 reads the values of the password PW and cipher number written to the verifying table 21100-2, and selects cipher function Ei and reads the password PW. Next, the cipher paranreter RP is RP2 = Ei (PW, TR) 11 TR, so the tim randam nmtw which is to the latter half of the RP2 is used to calculate t = Ei (M TR). In the event that the value of this temporary variable t calculated here matches the first half Ei (PW, T) of the received RP2, confirmation can be made that the password PW entered into the temninal 21200-1 is correct. The time function TR includes the year/month/day (i.e., TR = yyinm-dd-sssss), so unauthorized access can be discovered in the case that the received year/month/day does not match that time of processing.
Next, the verifying server 21100-1 reports the follawing items written in the verifying table 21100-2 to the connection server 210281 (procedure T80): ccopletion of roaming registration, billing class, and verifying server calling information (procedure T80). In the present embodiment, the billing class is MNY = 1, and the verIfying sexver calling information is the ICS network address R7981w of the vexj ying server 21100-1, port number R71Ou and administration number -1- of the verifying administration table. The connection server 21028-1 presents the danain name "cl.bl.al.m to the damain name server, requests the ICS user address and the ICS network address associated with the dcmain name (procedure T90), and obtains the ICS user address "1200" and the ICS network address "8115" (procedure T100). In the same way, the connection server presents the darain name Rc2.b2.a2.n to the dcmain name server, requests the ICS user address and the ICS network address associated with the damain name (procedure T110), and obtains the ICS user address n2500" and the ICS network address R820OR (procedure T120).
Next, the connection server 21028-1 inform the conversion table 191 server 21026-1 of the following (procedure T130): the ICS network address w7800n of the ICS logic teaninal which has input the ICS user packet (held in procedure T60); the ICS user address "1200", ICS user address 02500n, and ICS network address R820OR, just obtained fran the domain name server; and also, the completion of roaming registration, billing class, and verifying server calling informtion received from the verifying server 21100-1.
The conversion table server 21026-1 writes the fa= address to the conversion table 21023-1 as received. The value of the request identification is w10", meaning inter-corporation communication by roaming. In the event that the billing class is MNY = 1, the ICS network address n8115n and the ICS user address u120OR just obtained fran the domain name server are forwarded to the billing notificatim destination of the conversion table 21023-1. Also, in the event that the billing class is MNY = 2, verifying server calling information Is forwarded to the billing notificatim destination of the conversion table 21013-1. Further, w5R which specifies the roaming connection period in days is also written to the conversion table 21013-1. When the writing to the conversion table 21023-1 is carpleted, the conversion table server 21026- 1 reports the results to the connection server 21028-1 (procedure T140). This completion report is sent via the access control apparatus 21020-1 (procedure T150) to the roaming terminal 21200-1 with the ICS user packet M03 (procedure T160).
Now, the ICS usw packet W03 includes the ICS user address "120C associated with the danain name n cl.bl.al." of the roaming terminal 21200-1, and the CS user address R250C associated with the do name "c2.b2.a2." of the other party of communication. The corporation operating the access control apparatus can charge the owner of the roaming teiminal 21200-1 for the above usage of the connection server 21028-1, i.e., the procedures for receiving the ICS user packet PK02 up to returning the ICS user packet PK03, and w50 which specifies the roaming connection period in days. <<Using the roaming tendnal>> The roaming terminal 21200-1 can use the conversion table 210231 created following the above-described procedures, to perform intercorporation camiunication (procedures T170 through T220). In the event that w5R which specifies the roaming connection period in days elapses, the conversion table server 21026-1 can delete the above roaming connection written in the inside of conversion table 21023-1. <<Notification of biLlJng>> The access control apparatus 21020-1 notifies the billing notification destination registered in the conversion table 21023-1 of the commnication charges (procedure T300 or T310). <<Method for accessing the verifying server>> On the above description, detailed description will be made regarding the method for judging whether or not the verification request contained in the ICS network packet PK02 generated by the roaming teaminal 21200-1 due to the connection server 21028-1 presenting the domain name ncl.bl.al.o to a plurality of verifying servers including verifying server 21100-1 is correct, i.e., whether
193 or not the domain name ncl.bl.al." of the roaming tenninal 21200-1 is registered with the verifying server.
An example of 4-Lnw hierarchy will be described with reference to FIG. 128. A domain name wrooto is provided m Level 1 of the tree, and domain names nalm, 0a2w, "a3"... and so forth exist m Level 2 below, domain names mbln, "b2n, "b3n. and so forth exist m Level, 3 below "al" for exmple, and domain r wcln, "c2R, nc3n and so forth exist m Level 4 below "bl" for example.
FIG.129 illustrates the inte table 21102-2 of the verdfying server 211021 handling the domain nrootn, indicating,,e.g., that the ICS network address of the dc name server 21101-1 which handles the domain name naln below the do nam wrootl is 07971w, and the port number is n71On. Also, FIG.130 illustrates the internal table 21101-2 of the verifying server 21101-1 handling the domain waln, indicating, e.g., that the ICS network address of the domain name server 21100-1 which handles the domain name nbln below the daimain name nal" is w7981n, and the port nu is 71C.
FIG.131 illustrates the internal table 21100-2 of the verifying server 21100-1 handling the domain "blu, indicating, e.g., that the domain name ncln below the domain name "bl" shows uYES" in the endpoint in the internal table 21100-2, meaning that there are no more domain names below, and that in this example, the domain name. cl.bl.al" has been registered with the verifying server, and facts such that the password PW is "224691", that the date of expiration is 098-12-31n, etc., are recorded therein.
194 <<CaLling verifying server>> With reference to FIG. 132, description will be made regarding the procedures in which the connection server 21028-1 caUs the verifying server 21100-1 using the domain name wcl.bl.al.", and checks whether or not the dcmain name "cl.bl.al." has been registered in the verifying server. Now, the connection server 21028-1 has therein the ICS network address of the verifying server handling the damain wrootw m Level 1 shawn in FIG. 128. Also, in the event that there is a great deal of carff=ication with the verifying servers which handle the Level 2 and Level 3 dcmains, the ICS network addresses of the verifying servers thereof a held therein.
The connection server 21028-1 enters the dcmain name ncl.bl.al.w in the internal resolver 21029-1. The resolver 21029-1 sends the ICS frame 213351 including -al- under the domain name -root- and the cipher parameter RP2 to the verifying server 21102-1, and an ICS packet 21336-1 including an ICS network address R7971n of the ICS dcmain name server for nal" is returned. Next, the resolver 21029-1 sends an ICS packet 21345-1 including nbln to the vexiúyjng server 21101-1, and an ICS packet 21346-1 including an ICS network address "7981' of the verifying server for nb10 is returned. Next, the resolver 21029-1 sends an ICS packet 21355-1 including wclw to the verifying server 21100-1, and regarding the dcmain name mcl", the space for the endpoint of 21100-1 is wYesw this time, so it can be judged that verification information has been registered. In this way, "rooto, 'alw and Oblu have been followed in order, so it can be understood that the verification information for the reversed domain name wcl.bl.al.n is registered in the internal table 21100-2.
The verifying server 21100-1 checks the received cipher er RP, and checks that the expiration date n98-12-31w has not expired. Next, the verifying server 21100-1 reads the password PW and the value of the cipher number written in the vexifying table, and selects cipher function El. The cipher parameter RP is RR2 m Ei(PW, TR) 11 TR, so the time random number TR to the latter half of RP2 is used to calculate t = Ki (PW, TR). In the event that the value of this temporary variable t calculated here matches the first half Ei(PW, TR) of the received RP2. confirmation can be made that the password PW entered into the terminal 21200-1 is correct. The above results are reported to the connection server 21028-1. Consequently, the connection server 21028-1 can know the verification results (authorized or denied) and the billing clws MNY. <<Other embodiment of roaming without a hem IP terminal>> In the above embodiment. in the event that the ICS receptionist does not set a home IP terminal, the earlier-described "Registration procedures frem ham IP terminal' are performed via the user service server 21250-1. In this case, the billing record 0120n within the vexjúying table 21100-2 within the verifying server 21100-1, and the in Eormation "7981-710-10 of the verifying server presented to the billing notification destination within the conversion table 21023-1, are used. <<Another embodiment of roaming wherein the verifying server is 196 included in the domain name server>> The structure of the domain name tree shown in FIG - 128 that is the object of verifying server 21110-1 is the same as the danain name trees that are the object of domain name servers in other effbodiments. Accordingly, each domain server is capable of storIng the data of the verifying server described in the present embodmmt, and include the function of a verifying server. That is, this other method of carrying out roaming is realized by integrating the verifying server described in the present entKxlurbent with the domain name server described in other entxxbinents. <<Access control apparatus and IP temninal connecting with wireless transceiver>> A wireless transceiver 21620-1 Is provided within the ICS 21000-1, and the wireless transceiver 21620-1 and a wireless transceiver 21640-1 can exchange information one with another via a wireless camnmication path 21625-1. The temninal 21630-1 includes the less transceiver 21640-1, and as with the ca e of the earlierdescribed IP tenrdnal 21200-1, the terminal 21200-2 has functions for inter-corporation camiunication using an ICS dc name. There is an information camiunication path 21620-1 between the access control apparatus 21020-1 and the wireless transceiver 21620-1. The information canmnication path 21610-1 is Like the ICS user logic cann=cation line in that it has functions for sending and receiving ICS user packet, and these a different in that the information camenication path 21610-1 is within the ICS 21000-1. The wireless 197 transceiver 21620-1 and the wireless transceiver 21640-1 both have functions for receiving the ICS user packet, converting the in _ormation within the ICS user packet into ICS user packet information in waveform format and transmitting them, and also reverse function, i.e., receiving ICS user packet informtion in waveform format and reverse-converting into ICS packet formt and transmitting t. Accordingly, the ICS user packet sent out from the IP terminal 21200-2 passes through the wireless transceiver 21640-1, wireless caitiaziicatim path 21625-1, less transceiver 21620-1, and information commnication path 21610-1, and is provided to the access control apparatus. Also, an ICS packet sent out in the reverse cl i. i.e., sent from the access control apparatus 21020-1 passes through the information emnanication path 21610-1, the wireless transceiver 21620-1, the less comTunication path 21625-2, the less transceiver 21640-1, and is delivered to the IP terminal 21200-2.
Embodiment-19 (Closed-zone network cormmnication using network identifier, and open-zone communication):
A method for using a network identifier to restrict virtual dedicated line service, intra-corporation communication service and inter- corporation communication service to within the closed-zone, and a method for non-specifying the closedzone specification of the network identifier, i.e., specifying open-zone, will be described. Here, the network identifier is
198 appropriated corresponding with the ICS user address. <<Configuration>> As shown in FIGs.133 to 136, an ICS 22000-1 includes access control apparatuses 22010-1, 22020-1, 22030-1 and 220401, and the access control apparatus 22010-1 includes a line portion 22011-1, a processing device 22012-1 and a conversion table 22013-1, the access control apparatus 22020-1 includes a line portion 22021-1, a processing device 22022-1 and a conversion table 22023-1, the access control appartus 22030-1 includes a line portion 22031-1, a processing device 22032-1 and a conversion table 22033-1, the access control apparatus 22040-1 includes a line portion 22041-1, a processing device 22042-1 and a conversion table 22043- 1, and blocks 22060-1, 22061-1, 22062-1, 22063-1 and 22064-1 are each relay devices, and are interconnected and also connected to one of the access control apparatuses, via the ICS network communication line. Blocks 22101-1, 22102-1, 22103-1, 22104-1, 22105-1, 22106-1, 22107-1, 22108-1, 22109-1, 22110-1, 22111-1 and 22112-1 are each corporation LANs, and are each connected to the line portions of one of the access control apparatuses via the respective gateways and the ICS user logic communication line. Here, a block 22120-1 is a gateway for LAN 22101-1, a block 22121-1 is an ICS user logic communications line, and the other gateways and ICS user logic communication lines are also in similar positions, as shown in FIGs.133 through 136.
199 1 1 1 Each LAN has 2 to 3 IP terminals having function for sending an IP user packet, wherein the ICS user addresses are: for within LAN 22101-1. n1SOW and 01510n; for within LAN 22102-1, '5200n, -5210m, and '5250"; for within LAN 22103-1, 01900n and n191Ow; for within LAN 22104-1, n1100" and '111ON; for within LAN 22105-1, 04200% and "4210"; for within LAN 22106-1, 01800n and R1810m; for within LAN 22107-1, n1920n and "1930n; for within LAN 22108-1, '5410" and '5420n; for within LAN 22109-1, w1430m and '1440; for within LAN 22110-1, 0650OR and '1960w; for within LAN 22111-1, "1820n and R183C; and for within LAN 22112-1, '4410" and "1420.
In the above description, values 01000n through n19990 for the ICS user address indicate the ICS user addresses for the intra- corporation communication, values '200ON through "6999" for the ICS user address indicate the ICS user addresses for the 1nter-corporation conymmication, and values "7000" through 09999w for the ICS network address indicate the ICS network addresses. The ICS network server uses the ICS user address range (01000w through N199C) when performing the intra-corporation commiunication, and the ICS user address range (02000n through "6999n) when perfo rmin g the inter-corporation communication. Also, the ICS user addresses used for the intra-corporation communication can also be used for the intercorporation communication. <<Conversion table line and network identifier>> Description will be made regarding "lines" in the conversion table. For example, in conversion table 22013-1, the example isthat wherein: in the first line, the value of request identification is '1R, the value of transmitting ICS network address is 0810OR, the value of sender ICS user address (intra-corporation) is '150ON, sender ICS user address (intercorporation) is blank, the value of receiver ICS user address is w110Ow, the value of receiving ICS network address is w710OR, the value of the network identifier is RA001w, and other items are unfilled. Here, a blank space may mean uNulln. The nlinew in the conversion table is also referred to as a Wrecordw of the conversion table. The network identifier is a symbol provided for sectoring off a section of the ICS network and making that portion a net, and distinguishing the net, and may be a numeral or a code. The network identifiers are provided per line in the conversion table. Incidentally, in the event that the network is not to be a closed-zone network, this is indicated in each line in the conversion table with "Open", as shown in conversion table 22033-1.
The operation will be described with reference to the flowcharts in FIGs. 141 and 142. <<Closed-zone/intra-corporation communication>> An ICS user frame S01 is sent out from an IP terminal having an address R1100' within the LAN 22104-1, and reaches the access control apparatus 22020-1 via the ICS user logic 201 /I- communication line. At the time of receiving the ICS user packet S01 from the ICS logic terminal with the address 0710OR of the line portion 22021- 1, the access control apparatus 22020-1 obtains the transmitting ICS network address 0710Ow, and further obtains the sender ICS user address ullOOR and the receiver ICS user address "1500" from the ICS user packet S01 (Step SP100), and checks whether the transmitting ICS network address 071000 is registered on the conversion table 22023-1 with the request identification as RY (Step SP110). In this case, it is not registered, so next the access control apparatus 22020-1 checks whether or not there is a record in the conversion table 22023-1 that contains all of the ICS network address n7100", the sender ICS user address "110OR, and the receiver ICS user address "1500", these having been obtained as described above (Step SP120). In this case, the existence of such is confirmed (Step SP130), and next, the sender ICS user address (intra-corporation) of this record alone is recorded as "1100", confirmation is made that the space for the sender ICS user address (inter-corporation) is blank, following which receiving ICS network address R8100m is obtained (Step SP160).
Next, an ICS encapsulation is performed using the transmitting ICS network address 0710Ou thus obtained and the receiving ICS network address "8100" (Step SP180), and the ICS network packet TO1 thus obtained is sent out onto the ICS 202 il- network communication line (Step SP190). The ICS network packet TO1 passes through the relay devices 22062-1, 22061-1 and 22060-1, and reaches the access control apparatus 22010-1. The access control apparatus 22010-1, upon receiving the ICS network packet TO1 (Step ST100), confirms that the receiving ICS network address N8100n written within the network control field (ICS capsule) of the ICS network packet TO1 is registered as the transmitting ICS network address 08100n within the conversion table 22013-1 (Step ST110), and then performs the ICS reverse encapsulation (Step ST120), and sends the obtained ICS user packet S01 to the ICS logic communication line 12121-1 connected to the address n8100n within the line portion 22011-1 (Step ST130). Incidentally, in the event that the receiving ICS network address N81000 is not registered within the conversion table 22013-1, the ICS network packet TO1 is discarded (Step ST115). <<Closed-zone/intra-corporation communication/access to network server>>
An ICS user packet S02 is sent out from an IP terminal having an address R1100n within the LAN 22104-1. At the time of receiving the ICS user packet S02 from the ICS logic terminal with the address R710C of the line portion 22021-1, the access control apparatus 22020-1 obtains the transmitting ICS network address n7100", and further obtains the sender ICS user address R1100n and the receiver ICS user address 06100n 203 from the ICS user packet S02 (Step SP100), and checks whether the ICS network address 0710OR is registered on the conversion table 22023-1 with the request identification as n3' (Step SP110). In this case, it is not registered, so next the access control apparatus 22020-1 checks whether or not there is a record in the conversion table 22023-1 that contains all of the ICS network address w7100n, the sender ICS user address '110OR and the receiver ICS user address 0610Ow, these having been obtained as described above (Step SP120). In this case, the non-existence of such is confirmed (Step SP130) Next, search is made for a record identical to the above receiver ICS user address N6100n from one or more records in the conversion table with a network identifier the same as the network identifier "A001m having the request identification value 141 in the conversion table 22023-1 with the aforementioned ICS network address of w7100 and the sender ICS user address of n1100' (in this case, the third record from the top in the conversion table 22023-1), and the receiving network address "9100" written to the record is found (Step SP170). Next, the ICS encapsulation is performed using the transmitting ICS network address "710C and the receiving ICS network address n910Ou thus obtained (Step SP180), and the ICS network frame T02 thus obtained is sent out onto the network communication line (Step SP190). The ICS network packet T02 passes through the relay devices 22062-1 and 22061-1, and 204 reaches the ICS network server 22081-1. The same is true for the ICS user packet S03 sent out from the IP terminal having the address n1110n within the LAN 22104-1, the network identifier is nA002n, and is ICS- encapsulated to become the ICS network packet T03, and passes through the relay devices 220621 and 22061-1, and reaches the ICS network server 22082-1. <<Closed-zonelinter-corporation communication>> An ICS user packet S04 is sent out from an IP terminal having an address "42000 within the LAN 22105-1. At the time of receiving the ICS user frame S04 from the ICS logic terminal with the address n7200n of the line portion 22021-1, the access control apparatus 22020-1 obtains the transmitting ICS network address 07200", and further obtains the sender ICS user address "4200n and the receiver ICS user address w5200w from the ICS user packet S04 (Step SP100), and checks whether the address R7200n is registered on the conversion table 22023-1 with the request identification as I'3w (Step SP110). In this case, it is not registered, so next the access control apparatus 22020-1 checks whether or not there is a record in the conversion table 22023-1 that contains all of the transmitting ICS network address R72000, the sender ICS user address w4200 and the receiver ICS user address 05200n, these having been obtained as described above (Step SP120). In this case, the existence of such is confirmed (Step SP130), and next, the sender ICS user address (intra-corporation) of this record is blank, 205 confirmation is made that the sender ICS user address (intercorporation) alone is recorded as R42000 (Step SP160).
Next, the ICS encapsulation is performed using the transmitting ICS network address n72000 thus obtained and the receiving ICS network address n82000 (Step SP180), and the ICS network packet T04 thus obtained is sent out onto the network commication line (Step SP190). The ICS network packet T04 passes through the relay devices 22062-1, 22061-1 and 22060-1, and reaches the access control apparatus 22010-1. The access control apparatus 22010-1, upon receiving the ICS network packet T04 (Step ST100), confirms that the receiving ICS network address n820OR written within the network control field (ICS encapsule) of the ICS network frame T04 is registered as the transmitting ICS network address n8200" within the conversion table 22013-1 (Step ST110), and then performs the ICS reverse encapsulation (Step ST120), and sends the obtained ICS user packet S04 to the ICS logic communication line connected to the address n820C (Step ST130). <<Closed-zone/inter- corporation conmmicationlaccess to network server>>
An ICS user packet SOS is sent out from an IP terminal having an address n4200' within the LAN 22105-1. At the time of receiving the ICS user packet S05 from the ICS logic terminal with the address "7200" of the line portion 22021-1, the access control apparatus 22020-1 obtains the transmitting 206 ICS network address '7200", and further obtains the sender ICS user address '420OR and the receiver ICS user address R620C from the ICS user packet S05 (Step SP100), and checks whether the ICS network address w720OR is registered on the conversion table 22023-1 with the request identification as 03w (Step SP110). In this case, it is not registered, so next the access control apparatus 22020-1 checks whether or not there is a record in the conversion table 22023-1 that contains all of the transmitting ICS network address "7200m, the sender ICS user address N4200m and the receiver ICS user address 0620Ow, these having been obtained as described above (Step SP120). In this case, the non-existence of such is confirmed (Step SP130), and next, search is made for a record identical to the above receiver ICS user address w610OR from one or more records in the conversion table with a network identifier the same as the network identifier OB001m having the request identification value 04n (ICS network server specification) in the conversion table 22023-1 with the aforementioned receiver ICS network address of "720OR and the sender ICS user address of n420OR (in this case, the seventh record from the top in the conversion table 22023-1), and the receiving network address "9200n written to the record is found (Step SP170).
Next, the ICS encapsulation is performed using the transmitting ICS network address 07200w and the receiving ICS network address 0920OR thus obtained (Step SP180), and the ICS 207 j, 1 network packet T05 thus obtained is sent out onto the ICS network communication line (Step SP190). The ICS network packet T05 passes through the relay device 22062-1 and reaches the ICS network server 22083- 1. The same is true for the ICS user packet S06 sent out from the IP terminal having the address B4210m within the LAN 22105-1, the network identifier is nBO02n, and is ICS-encapsulated to become the ICS network frame T06, and passes through the relay device 22062-1 and reaches the ICS network server 22084-1. <<Communication from network server within ICS to network server outside of ICS>> The IP terminal 22092-1 within the LAN 22102-1 is an wICS external servern, comprised of an IP terminal placed outside the ICS 22000-1 and so forth. The ICS external server 22092-1 has an ICS user address 05250n, and is registered in the conversion table 22013-1 (ninth record from the top in the in the conversion table 22013-1). However. the receiver ICS user address and the receiving ICS network address spaces are blank, and are registered as being wNull". At the time that the ICS internal server 22084-1 sends out an ICS network packet T22, the ICS network packet T22 passes through the relay devices 22062-1, 22061-1 and 22060-1, and reaches the access control apparatus 22010-1 (Step SP100), confirmation is made that the transmitting IC network address is not registered within the conversion table 22013-1 as w8200m, the ICS reverse 208 1 encapsulation is performed (Step SP120) in order to form the ICS user packet S22, which is sent toward the ICS external server 22092-1 (Step SP130). For reverse direction communication, the ICS encapsulation is performed using the conversion table 22013-1, and delivery is made to the ICS Internal server 22084-1. <<Closed-zonelvirtual dedicated line>> An ICS user packet S07 is sent out from an IP terminal having an address n1800n within the LAN 22106-1. At the time of receiving the ICS user packet S07 from the ICS logic terminal with the address "73000 of the line portion 22021-1, the access control apparatus 22020-1 obtains the transmitting ICS network address w7300n, and further obtains the sender ICS user address "18000 and the receiver ICS user address '1900n from the ICS user packet S07 (Step SP100), and checks whether the ICS network address n7300m is registered on the conversion table 22023-1 with the request identification as R3n, i.e., as a virtual dedicated line connection (Step SP110). In this case, it is registered. Next the access control apparatus 22020-1 checks whether or not there is a record in the conversion table 22023-1 that contains the transmitting ICS network address w7300n and the receiver ICS user address "1900n, these having been obtained as described above (Step SP140). In this case, such does not exist, so the receiver ICS network address w83000 of the record wherein the receiver ICS 209 1 user address space is blank (or "Null") with the ICS network address "730Ou in the conversion table 22023-1 is found (Step SP145), the ICS encapsulation is performed using the transmitting ICS network address '7300w thus obtained and the receiving ICS network address n830OR (Step SP180), and the ICS network packet T07 thus obtained is sent out onto the network communication line (Step SP190). The ICS network packet T07 passes through the relay devices 22062-1, 22061-1 and 22060-1, and reaches the access control apparatus 22010-1. The access control apparatus 22010-1, upon receiving the ICS network packet T07 (Step ST100), confirms that the receiving ICS network address N830Ou written within the network control field (ICS capsule) of the ICS network packet T07 is registered as the transmitting ICS network address "8300' within the conversion table 22013-1 (Step ST110), and then performs the ICS reverse encapsulation (Step ST120), and sends the obtained ICS user packet S07 to the!CS logic communication line 12121-1 connected to the address n8300" within the line portion 22011-1 (Step ST130).
This is the same for ICS user packet S09 sent out from the IP terminal having the ICS user address "1820" within the LAN 22111-1, the network identifier is nCO02n, the ICS encapsulation is performed and transferred through the ICS 22000-1, the ICS reverse encapsulation is performed at the access control apparatus 22030 to form an ICS user packet S09, 210 which reaches the IP terminal having the ICS user address "1920" within the LAN 22107-1. <<Closed-zone/virtual dedicated line/access to network server>> An ICS user packet S08 is sent out from an IP terminal having an address w181OR within the LAN 22106-1. At the time of receiving the ICS user packet S08 from the ICS logic terminal with the address "7300n of the line portion 22021-1, the access control apparatus 22020-1 obtains the ICS network address "7300n, and further obtains the sender ICS user address "181OR and the receiver ICS user address w63000 from the transmitting ICS user packet S08 (Step SP100), and checks whether w7300" is registered on the conversion table 22023-1 with the request identification as n3" (virtual dedicated line) (Step SP110). In this case, it is registered. Next the access control apparatus 22020-1 checks whether or not there is a record in the conversion table 22023-1 that contains the transmitting ICS network address w730OR and the receiver ICS user address n6300", these having been obtained as described above (Step SP140). In this case, such does exist, and the receiving network address 09300m written to the record is found (Step SP145). Next, the ICS encapsulation is performed using the transmitting ICS network address N7300w and the receiving ICS network address n930C thus obtained (Step SP180), the transmitting ICS network address w7300w thus obtained and the receiving ICS network are used to perform the ICS encapsulation 211 (Step SP180), and the ICS network packet TO8 thus obtained is sent out onto the ICS network communication line (Step SP190). The ICS network packet TO8 passes through the relay devices 22062-1 and 22064-1, and reaches the ICS network server 220871.
The same is true for the ICS user packet S10 sent out from the IP terminal having the address 018300 within the LAN 22111-1, the network identifier is nCO02u, and is ICSencapsulated to become the ICS network packet T10, and passes through the relay device 22064-1 and reaches the ICS network server 22089-1. <<Open-zonelinter-corporation communication>> Open-zone/inter-corporation communication is almost the same as the aforementioned closed-zone/inter-corporation communication; the difference is that checking has been added for registration of both the sender ICS user address (intracorporation) and the sender ICS user address (intercorporation) in searching the records in conversion tables 22013-1 and 22043-1, as described below.
An ICS user packet S13 is sent out from an IP terminal having a user address '1420' within the LAN 22112-1. At the time of receiving the ICS user packet S13 from the ICS logic terminal with the address R7405w of the line portion 22041-1, the access control apparatus 22040-1 obtains the transmitting ICS network address w7405n, and further obtains the sender ICS 212 user address n1420n and the receiver ICS user address 054200 from the ICS user packet S13 (Step SP100), and checks whether the ICS network address R7405n is registered on the conversion table 22023-1 with the request identification as n30 (Step SP110). In this case, it is not registered, so next the access control apparatus 22040-1 checks whether or not there is a record in the conversion table 22043-1 that contains all of the transmitting ICS network address 07405n, the sender ICS network address n14200 and receiver ICS user address N54200, these having been obtained as described above (Step SP120), the existence of such is confirmed (Step SP130), and next, a record is found recorded in the conversion table 22043-1 wherein the sender ICS user address (intra-corporation) is w1420n and the sender ICS user address (inter-corporation) is "5420" (in this case, the fifth record from the top on conversion table 220431). Next, the received sender ICS user address (intracorporation) 0142C is re- written to a inter-corporation address n4420n, and the receiving ICS network address "8400" registered to this record is obtained (Step SP160). Next, the ICS encapsulation is performed using the transmitting ICS network address 07405" and the receiving ICS network address "8400" thus obtained (Step SP180), and the ICS network packet thus obtained is sent out onto the ICS network communication line (Step SP190). The ICS network packet passes through the relay devices 22064-1 and 22063-1, and reaches the access 213 control apparatus 22030-1. The access control apparatus 220301, upon receiving the ICS network packet (Step ST100), confirms that the receiving ICS network address 08400' written within the network control field (ICS capsule) of the ICS network packet is registered as the transmitting ICS network address 08400n within the conversion table 22033- 1 (Step ST110), and then performs the ICS reverse encapsulation (Step ST120). and sends the obtained ICS user packet S130 to the ICS logic communication line connected to the address n8400" (Step ST130).
An ICS user packet S11 sent out from an IP terminal having an ICS user address "4410' within the LAN 22112-1 is ICS-encapsulated by the access control apparatus 22040-1 by the same procedures as described above with regard to closedzonelinter-corporation communication, transferred through the ICS 22000-1, reversely ICS-encapsulated in the access control apparatus 22030-1, and delivered to an IP terminal having an ICS user address "5410" within the LAN 22108-1. As another example, an ICS user packet S12 sent out from an IP terminal having an ICS user address n4410 within the LAN 22112-1 is ICS-encapsulated by the access control apparatus 22040-1 by the same procedures as described above, transferred through the ICS 22000-1, delivered to the access control apparatus 22030- 1. and at the time of the ICS reverse encapsulation, reference to the record in conversion table 22033-1 (in this case, the fifth 214 record from the top on the conversion table) reveals that the address "5430R written within the ICS user packet S12 is an ICS user address (inter-corporation), the address value w54300 is re-written to an ICS user address (intra-corporation) n1430" (Step ST120), an ICS user packet S120 is generated, and delivered to the IP terminal having the ICS user address w1430' within the LAN 22109-1. As another example, an ICS user packet S14 sent out from an IP terminal having an ICS user address w14200 within the LAN 22112-1 has a sender ICS user address '1420w and a receiver ICS user address w5440", is transferred through the ICS 22000-1 and is delivered to the IP terminal within the LAN 22109 with an ICS user address of n14400 and a sender ICS user address 04420", having been converted to an ICS user packet S140 with a receiver ICS user address w1440R. <<Open-zone/inter-corporation conymication/access to network server>> ICS user packets S15 and S16 sent out from within the LAN 22112-1 are delivered to the ICS network server 22085-1 that is the destination of each, following the same procedures as that described above. <<Communication from network server within ICS to network server outside of ICS>> A block 22086-1 is an ICS network server is an within the ICS 22000-1, and is an RICS external server", comprised of a database placed outside the ICS 22000-1, and so forth. The 215 ICS external servers 22090-1 and 22091 have ICS user addresses w650OR and "19600, and are registered in the conversion table 22033-1 (in this case, the eighth and ninth records from the top in the in the conversion table 22033-1). However, the receiver ICS user address and the receiving ICS network address spaces are blank, and are registered as being "Nullo. The ICS external server 22091-1 has sender ICS user address (intracorporation) "1960", and further, is provided with a sender ICS user address (inter-corporation) "6960n. Also, the ICS internal server 22086-1 has ICS user address "6600n, ICS network address w9500", these being registered in the conversion table 22033-1 (in this case, the tenth record from the top in the in the conversion table 22033-1).
At the time that the ICS internal server 22086-1 sends out the ICS network packet T20, the ICS network packet T20 passes through the relay devices 22063-1 and reaches the access control apparatus 22030-1, the ICS reverse encapsulation is performed using the conversion table 22033-1 in order to form the ICS user packet S20, which is delivered to the ICS external server 22090-1. For reverse direction communication, the ICS reverse encapsulation Is performed in the access control apparatus 22030- 1 to form the ICS user packet S21, and delivery is made to the ICS external server 22086-1. Summarizing the above, an ICS external server is placed outside of the ICS 22000-1, and communication between internal servers within the 216 ICS 22000-1 and external servers outside the ICS 22000 is enabled.
An arrangement may be used wherein all or a plurality of records in the conversion table 22013-1 within the access control apparatus 22013-1 are selected as necessary, stored within a conversion table record file 220141, and extracting as necessary for performing the ICS encapsulation and the ICS reverse encapsulation. This also is true for the conversion table 22020-1 within the access control apparatus 22023-1 and so forth. In the access control apparatus, the portion of the conversion table 21033-1 in which specification of the network identifier is that for open-zone connection (10penw) is usually not held within the access control apparatus, and instead an arrangement may be used in which address information to be registered to the conversion table is obtained from the domain name server 22095-1 and temporarily used as a conversion table 22030-1. Also, the network server 22081-1 for closedzonelintracorporation communication may be used as a domain name server for closedzonelintra-corporation communication which can be commanded by the network identifier RA001'. Incidentally, the hierarchical structure of the domain name in the example is shown to be a single-layer structure specifying, e.g., domain name Ral', but this may be made to be 2- or 3layer hierarchy such as wbl.al.n or 'cl.bl.al.n. Further, the network server 22083-1 for closed-zone/inter-corporation
217 communication may be used as a domain name server for closedzone/inter- corporation communication which can be commanded by the network identifier uBO01". The network server 22087-1 for closed-zone/virtual dedicated line may be used as a domain name server for closed- zonelvirtual dedicated line which can be commanded by the network identifier 0C001n. Incidentally. in the present embodiment, the hierarchical structure of the domain name in the example is shown to be a single-layer structure specifying, e.g., domain name Ralw, but this may be made to be 2- or 3-layer hierarchy such as mbl.al.' or Wcl.bl.al.".
Embodiment-20 (IP terminal capable of connecting to plural access control apparatuses with identifiers):
The present embodiment does not fix the IP terminal having the functions for sending and receiving ICS user IP packet to a specific access control device; rather, it realizing usage of an IP terminal which can be moved and connected to other access control apparatuses and used, i.e., capable of roaming, using identifiers. Roaming is realized based on the ICS domain name provided to the IP terminal. <<Password transmission technique using cipher>> The present embodiment includes procedures for ciphering a secret password PW and sending this from the sender (ciphering side) to the receiver (decoding side). First, the 218 ciphering function Ei and the decoding function Di will be described. The ciphering function Ei is represented by y Ei(kl, x), and the decoding function Di is represented by x Di(k2, y). Here, y denotes the ciphertext, x denotes plaintext, U and U are keys, and Oin represents cipher numbers (i - 1, 2, -) determining the secret key code and public key code, including how the value of the cipher key is to be used. In the above, an arrangement may be used wherein plain-text xl is ciphered instead of the plain-text x with x' - x 11 r (wherein r is a random number), and discarding the random number r from the plain-text x' upon decoding, thus obtaining the plain-text x. Such an arrangement generates a different ciphertext each time the same plain-text is ciphered, owing to the random number, and it is said that such is less susceptible to cipher cracking. (Example of cipher number i = 1) <<Preparation>> The sender m discloses the domain name thereof (DNm) to the public including the receiver. The receiver calculates Km m Hash-l(DNm) using the secret data compression function Hash1, and hands over only the cipher key Km using a safe method so as to be unnoticed by a third party. This example is an example of using DES ciphering, and the sender holds an 'Nciphering module DES-en for realizing the ciphering function Ei, and a cipher key Km. The cipher key Km is a secret value 219 which the sender and receiver share. The receiver has the ncipher:lng module DES-dn for realizing the decoding function Di and the data compression function Hash-1. What is used for the data compression function Hash-1 is determined separately for each cipher number. A data compression function is also referred to as a nhash functionn. <<Ciphering by sender>> The sender sets the secret password PW as x m PW, and ciphers as y - DES- e(Km,x) with the ciphering module DES-e and the cipher key Km being held, thereby sending the ciphertext and domain name DNm. <<Decoding by receiver>> The receiver receives the ciphertext y and the domain name DNm, calculates the secret cipher key Km as Km = Hashl(DNm) using the receiver's secret data compression function Hash-1, and the obtains the plain-text x as x = DES - d(KM,y) using the decoding module. The plain- text x is password PW and the receiver can obtain the secret password PW. A third party does not know the data compression function Hash-1 and thus cannot calculate the cipher key Km, andaccordingly, cannot calculate the secret password PW. In the above embodiment, as stipulation of the cipher number i = 3, the ciphering function and the decoding function can be replaced with coding function and decoding function other than DES code. (Example of cipher number i = 2) 220 <<Preparation>> The present example is an example of employing RSA ciphering, wherein the sender generates a ciphering function y - ^od n and a decoding function y m x%od n. Here, e o d holds, the key d being a secret value. The sender hands to the receiver the discloseable ciphering keys e and n, and the ciphering module RSA-e for realizing y = x%od n. The sender holds the ciphering keys and the ciphering module RSA-e. The sender does holds neither the secret ciphering module nor secret data. On the other hand, the receiver holds n and the secret key d and the ciphering module RSA-e for realizing y x'mod n. <<Ciphering by sender>> The sender ciphers the secret password PW, own domain name DNm, and time of sending (year/month/day/hour/minute /second) as x = PW 11 xl 11 x2 (wherein Xl: domain name DNm, and x2: year/month/day/hour/minute/ second) and encodes as y m x%od n using the ciphering module RSA-e, thus sending the ciphertext Y. <<Decoding by receiver>> The receiver receives the ciphertext y and calculates y xImod n using the decoding module RSA-d held beforehand and the decoding key. The result is x = PW 11 xl 11 x2, so the data which is at a certain position from the head of x is used as PW. In the above ciphering, domain name xl and year/month/day/ 221 hour/minute/second x2 are used as random numbers. A third party does not know the secret key d and thus cannot calculate the secret password PW. In the above embodiment, as stipulations of the cipher number i - 4, the values of the cipher keys e, d and n can be changed. Also, as stipulations of the cipher number i m 5, the RSA ciphering technique can be replaced with a different public key ciphering technique. <<Terminal verification technique using password and random number>> Description will be made regarding verification technique for determining whether or not the password PW used by a roaming terminal agrees with the password registered in the verifying server. As prerequisite conditions, the verifying server of the verifying entity and the terminal of the user to receive verification have a password PW that is secret to a third party, with a ciphering function E (wherein y = E(k,x), y represents ciphertext, k represents ciphering key, and x represents plain-text). Specific procedures for terminal verification will now be described. The terminal of the user to receive verification decides upon a random number R using appropriate means, calculates Yl = F(PW, R) using the password PW and the function y = F(PW, R) and sends both the random number R and Y1 to the verifying entity. The verifying entity receives the random numbers R and Y1, and calculates Y2 = F(FW, R) using the received random number R, the password PW held
222 within, and function F, and checks whether or not Y1 = Y2 holds. In the event that there Is a match, the verification can be made that the owner of the terminal which is being verified is using the correct password PW, i.e., verification of the terminal can be made. In the above technique, an arrangement in which the user to be verified cannot freely select the random number R but rather the random number R is restricted to depending on time (called a time random number) further increases difficulty of a third party calculating the password. Instead of the ciphering function used above, the secret data compression function HJ may be used instead, for Y1, Y2 = Hj(W, R). <<Overall configuration>> FIGs.143 and 144 illustrate an overview of the roaming technique according to the present embodiment, wherein an ICS 21000-1 includes access control apparatuses 21010-1, 21020-1, 21030-1, 21040-1, 21050-1 and 21060-1, relay devices 21080-1, 21081-1, 21082-1 and 21083-1, verification servers 21100-1, 21101-1, 21102-1 and 21103-1, domain name servers 21130-1, 21131-1, 21132-1 and 21133-1, user service server 21250- 1 and an ICS authority server 21260-1. The access control apparatus 21010- 1 is provided with a conversion table 21013-1, a conversion table server 21016-1, a registration server 21017-1 and a connection server 21018-1. The access control apparatus 21020-1 is provided with a conversion table 21023-1, a 223 conversion table server 21026-1, a registration server 21027-1 and a connection server 21028-1. The connection servers 210181 and 21028-1 are provided with an ICS user address "63100, and has the function to register access control apparatuses determined as necessary to the IP terminal, or to connect thereto. The verifying server 21100-2 is shown in FIG.145 and the conversion table 21023-1 is shown in FIG.146.
The conversion table server 21016-1 has a function for re-writing the contents of the conversion table 21013-1, and the conversion table server 21026-1 has a function for rewriting the contents of the conversion table 21023-1, which is the same as described in other embodiments. Also, the LAN 21150-1 has an IP terminal 21151-1, the LAN 21160-1 has an IP terminal 21161-1, and a block 21171-1 is an IP terminal. A block 21200-1 is a portable roaming terminal, and is identified by the ICS domain name Icl.bl.al.' provided uniquely within the ICS 21000-1. <<Application for use of roaming terminal>> The owner of a roaming terminal 21200-1 indicates as an ICS usage applicant 21270-1 the payment method for the roaming terminal 21200-1, and applies to the ICS authority server 21260-1 via user service server 21250-1 for an ICS domain name and an ICS user address. The payment method is represented by billing class "MNY, e.g., in the event that MNY = 1, the charges are billed to the home IP (i.e., an IP terminal which 224 is connected to the access control apparatus in a fixed manner), in the event that MNY = 2, the charges are paid according to the record of the verifying server. The ICS authority server 21260-1 sets an ICS domain name: 'cl.bl.al.n for using the roaming terminal 21200-1, and an ICS us- er address w12000. Further, in order to be connected to the access control apparatus in a fixed manner and use it, the owner of the IP terminal 21200-1 applies for an ICS network address to the ICS authority server 21260-1 via the user service server 21250-1. The user service server 21250-1, upon obtaining the ICS network address, makes a request to the conversion table server 21016-1 to set the ICS network address 081151 and the ICS user address w1200m in the conversion table 21013-1.
The ICS receptionist 21271-1 embeds inside the interior 21201-1 of the roaming terminal 21200-1 the following: ICS domain name ocl.bl.al.w, ICS user address N120C, special ICS address for roaming terminals (called wroaming special numbern) "1000", ICS user address "63000 for registration server, and ICS user address R6310w for connecting server, and further embeds inside the interior 21201-1 of the roaming terminal 21200-1 the ciphering function Ei and the decoding related data RP1. Now, RP1 = Hj (domain 11 name RPO) 11 RPO (wherein RPO = NMY 11 i 11 j 11 NID) holds, and the domain name is wcl.bl. al.". MNY is the above-described billing class, "i" is a cipher number for the cipher Ei, and njn determines the type of Hash function Hj, and 225 "NID' is a network identifier "BOOlu. Network identifies are named to distinguish between closed-zone networks and open-zone networks. Data compression function Hj is a secret dedicated function used only by the verifying server and the user service server. The user does not hold the data compression function Hj, and does not even known Hj, and thus is incapable of generating cipher related data RP1. <<Registration procedures from home IP terminal>> Description will be made with reference to FIG.147. The roaming terminal user connects the roaming terminal 21200-1 to the position of the home IP terminal 21151-1. Next, the roaming terminal user decides on a password (PW) and enters this from the input unit 21204-1, and also generates an ICS user packet M01 using the ciphering function and the codingrelated data stored within 21202-1, and sends it to the access control apparatus 21010-1 via the ICS user logic communication line 21152-1 (procedures T10). The destination of the ICS user packet M01 is 0630ON which points to the roaming registration server, and includes own ICS domain name mcl. bl.al.", cipher parameter PR1, ICS user address n12000, expiration data R98-1231", ciphertext wy" which is the password that has been ciphered, Otgn (wherein tg = 1 in order to display registration procedures), and "Yes" or uNon for roaming connection specification. The generation method employed for the ciphertext "y" is the ciphering technique described earlier.
226 For example, in the event that the cipher number = 2, ciphertext wyn is generated with y - x%od n (wherein x - PW cl.bl.al. 11 year/month/day/hour/minute/ second). The access control apparatus 21010-1 looks at the conversion table 21013-1 and transfers the ICS user packet M01 to the registration server 31017-1 with the destination w630ON (procedure T15). The registration server 21017-1 uses the domain name ncl. bl.al.' to call the verifying server 21100-1 (procedure T20). Also, the method by which the registration server 210171 calls the verifying server 21100-1 using the domain name is the same as the method by which the connection server 21028-1 calls the verifying server 21100-1 using the domain name, the details thereof being described in detail later. The verifying server 21100-1 checks the contents of the received ICS user packet M01, and decodes the ciphertext wyn using the earlierdescribed technique, thereby calculating the password PW. For example, in the event that the code number = 2, the ciphertext Wy" is decoded with x = ydmod n. This yields x = PW 111. bl. al. year/month/day/hour/minute/second, so the password PW can be obtained.
Next, the contents of the cipher parameter PP1 is RP1 HJ (domain name 11 RPO) 11 RPO (wherein RPO a MNY 11 i Ii j 11 NID), so the verifying server 21100-1 uses the secret Hash function Hj held within the verifying server 21100-1 and the obtained domain name "cl. bl. al. R to calculate t = Hj (domain name 11 RPO) 11 RPO), 227 and checks whether or not t = RP1 holds for the received RP1. If it holds, judgment is passed that the domain name Wcl.bl.al.0, billing class MNT, cipher numbers wiw and NjO, and the network identifier 'NIDO have not been tampered with. The verifying server 21100-1 checks for excessive or insufficient registration contents, and in the event that the contents are normal, the registration results are registered in the verifying table 21100-2; registration is not made in the event there are insufficient registration contents.
This is illustrated in the verifying table 21100-2 in the line with the administration number 1, with the domain name as cl.bl.al.0, cipher number w2u, billing class (MNY) 01 value of calculated password PW w224691m, expiration date u9812-31 roaming connection of wYes'. i.e., acceptance of a roaming connection. At the time of generating the M01 in procedure T10, the aforementioned value of tg may be set to tg = 2 and roaming connection set to nNon. The password will not leak to a third party, due to application of the abovedescribed ciphering method. Roaming registration is reported by passing through the registration server (procedure T30), then the access control apparatus 21010-1 (procedure T35), and reported to the roaming IP terminal (procedure T40). Further, an ICS user packet for changing the value of the password PW with tg m 3 or changing the date of expiration with tg = 4 can be sent from the terminal 21200-1 via the ICS user logic 228 communication line 21152-1, after the above procedure T40 has been completed. Incidentally, a method which can be employed for changing the password involves specifying the prior password. <<Sending and receiving user IP packet while traveling>> An example will be described regarding connecting a roaming terminal 21200-1 to the access control apparatus 210201 and sending and receiving of the user IP packet between domain name "cl.bl.al.m of the roaming termInal 21200-1 and the other party of communication with a domain name wc2.b2.a2." The user inputs the following from the input unit 21204-1: the domain name "c2.b2.a2.w of other party-of conmmication, wtg" which has been set to tg = 5 for specifying sending and receiving of user IP packet, own password PW, and 05" which specifies the roaming connection period in days (represented by TTL). The cipher parameter RP2 is data calculated with the password PW and the inside 21202-2. That is, year/month/day/second "yy-mm-dd-sssss" is generated and used as a time random number TR (TR = yy-mm-dd-sssss), and the clock of inside 21202-2 and the cipher function Ei is used to calculate RP2 - Ei (PW, TR) 11 TR.
The access control apparatus 21020-1 receives the user IP packet PK02, obtains the ICS network address R780OR provided to the ICS logic terminal, and since the request identification from the conversion table is "C and further the sender ICS 229 1 user address written to the user IP packet M02 is 0100OR (i.e., roaming special number), the above ICS network address w780OR is held, and is delivered with the ICS user packet M02 to the connection server 21028-1 pointed to by the receiver ICS user address '6310n (procedure T60). The ICS network address '780OR obtained in this procedure will be used after the laterdescribed process T130. <<Function of connection server>> Next, the connection server 21028-1 calls the verifying server 21100-1 using the domain name "cl.bl.alm, and transfers the domain name "cl.bl. al' and the parameter RP2 to the verifying server (procedure T70). The verifying server 21100-1 reads the values of the password PW and the cipher number written to the verifying table 21100-2, and selects cipher function Ei and reads the password PW. Next, the cipher parameter RP is RP2 = Ei (PW, TR) 11 TR, so the time random number which is to the latter half of the RP2 is used to calculate t U(PW, TR). In the event that the value of this temporary variable t calculated here matches the first half Ei(PW, T) of the received RP2, confirmation can be made that the password PW entered into the terminal 21200-1 is correct. The time function TR includes the year/month/day (i.e., TR = yy-mm-ddsssss), so unauthorized access can be discovered in the case that the received year/month/day does not match that time of processing.
230 Next, the verifying server 21100-1 reports the following items written in the verifying table 21100-2 to the connection server 21028-1 (procedure T80): completion of roaming registration, billing class, and verifying server calling information (procedure T80). In the present embodiment, the billing class is MNY = 1, and the verifying server calling information is the ICS network address n7981" of the verifying server 21100-1, port number '710' and administration number n1R of the verifying administration table. The connection server 21028-1 presents the domain name 'cl.bl.al.' to the domain name server, requests the ICS user address and ICS network address associated with the domain name (procedure T90), and obtains the ICS user address N1200n and ICS network address '8115' (procedure T100). In the same way, the connection server presents the domain name nc2.b2.a2.n to the domain name server, requests the ICS user address and the ICS network address associated with the domain name (procedure T110), and obtains the ICS user address '2500" and the ICS network address "8200n (procedure T120).
Next, the connection server 21028-1 informs the conversion table server 21026-1 of the following (procedure T130): the ICS network address "7800" of the ICS logic terminal which has input the ICS user packet (held in procedure T60); the ICS user address n1200", ICS user address "2500n, and ICS network address n820OR, Just obtained from the domain name 231 server; and also the completion of roaming registration, billing class, and verifying server calling information received from the verifying server 21100-1. The conversion table server 2120-6 writes the four address to the conversion table 21023-1 as received. The value of the request identification is '100, meaning the inter-corporation communication by roaming. The network identifier (NID) is "BO01%. In the event that the billing class is MNY = 1, the ICS network address 08115, and the ICS user address "1200" just obtained from the domain name server are forwarded to the billing notification destination of the conversion table 210231. Also, in the event that the billing class is MNY = 2, verifying server calling information is forwarded to the billing notification destination of the conversion table 210131. Further, 05n which specifies the roaming connection period in days is also written to the conversion table 21013-1. When the writing to the conversion table 21023-1 is completed, the conversion table server 21026-1 reports the results to the connection server 21028-1 (procedure T140). This completion report is sent via the access control apparatus 21020-1 (procedure T150) to the roaming terminal 21200-1 with the ICS user packet M03 (procedure T160).
Now, the ICS user packet M03 includes the ICS user address w120OR associated with the domain name wcl.bl.al.' of the roaming terminal 212001, and the CS user address w2500' 232 associated with the domain name wc2.b2.a2.w of the other party of communication. The corporation operating the access control apparatus can charge the owner of the roaming terminal 21200-1 for the above usage of the connection server 21028-1, i.e., the procedures for receiving the ICS user packet PM2 up to ret urn ing the ICS user packet PK03, and "Sn which specifies the roaming connection period 1n days. The above embodiment is an example of the network identifier (NID) NB001n, and is applied to closed-zone networks described in other embodiments. Also, as another embodiment, the network identifier (NID) may be set as ROpen" and applied to an open-zone network. In this case, the roaming technique is the same as that of the aforementioned closed-zone network wBOO10. <<Using the roaming terminal>> The roaming terminal 21200-1 can use the conversion table 21023-1 created following the above-described procedures, to perform the inter- corporation communication the same as with that described in other embodiments (procedures T170 through T220). In the event that RSR which specifies the roaming connection period in days elapses, the conversion table server 21026-1 can delete the above roaming connection written in the inside of conversion table 21023-1. <<Notification of billing>> The access control apparatus 21020-1 notifies the billing notification destination registered in the conversion table 21023-1 of the communication charges (procedure T300 or T310). <<Method for accessing the verifying server>> Of the above description, detailed description will be made regarding the method for judging whether or not the verification request contained in the ICS network packet PK02 generated by the roaming terminal 21200-1 due to the connection server 21028-1 presenting the domain name "cl.bl.al." to a plurality of verifying servers including verifying server 21100-1 is correct, i.e., whether or not the domain name acl.bl.al.n of the roaming terminal 21200-1 is registered with the verifying server.
An example of 4-layer hierarchy will be described with reference to FIG. 173. A domain name 'mroot" is provided on Level 1 of the tree, and domain names mal", "a21', na3" - and so forth exist on Level 2 below, domain names wbln, "b2R, 'b3R... and so forth exist on Level 3 below nal" for example, and domain names "cl", "c2n, "c3R - and so forth exist on Level 4 below ubl" for example.
FIG.149 illustrates the internal table 21102-2 of the verifying server 21102-1 handling the domain "rootw, indicating, e.g., that the ICS network address of the domain name server 21101-1 which handles the domain name Ial" below the domain name "root" is N79710, and the port number is n71OR Also, FIG.150 illustrates the internal table 21101-2 of the 234 verifying server 21101-1 handling the domain "al", indicating, e.g., that the ICS network address of the domain name server 21100-1 which handles the domain name "bl" below the domain name malm is N7981R, and the port number is n710". FIG.151 illustrates the internal table 21100-2 of the verifying server 21100-1 handling the domain ablu, indicating, e.g., that the domain name wclu below the domain name wblw shows wYESR in the terminal space in the internal table 21100-2, meaning that there are no more domain names below, and that in this example, the domain name ncl.bl. al" has been registered with the verifying server, and facts such that the password PW is '224691', that the date of expiration is "98-12-31n, etc., are recorded therein <<Calling verifying server>> With reference to FIG.152, description will be made regarding the procedures in which the connection server 21028-1 calls the verifying server 21100-1 using the domain name ncl.bl.al.n, and checks whether or not the domain name ncl.bl.al.o has been registered in the verifying server. Now, the connection server 21028-1 has therein the ICS network address of the verifying server handling the domain Rrootn on Level 1 shown in FIG.153. Also, in the event that there is a great deal of communication with the verifying servers which handle the Level 2 and Level -3domains, the ICS network addresses of the verifying servers thereof are held therein.
The connection server 21028-1 enters the domain name Mcl.bl.al.n in the internal resolver 21029-1. The resolver 21029-1 sends the ICS packet 21335-1 including nalw under the domain name nrootR and the cipher parameter RP2 to the verifying server 21102-1, and an ICS packet 21336-1 including an ICS network address n7971w of the ICS domain name server for Walw is returned. Next, the resolver 21029-1 sends an ICS packet 21345-1 including wbln to the verifying server 21101-1, and an ICS packet 21346-1 including an ICS network address n7981" of the verifying server for nbln is returned. Next, the resolver 21029-1 sends an ICS packet 21355-1 including ncl" to the verifying server 21100-1, and regarding the domain name n cln, the space for the endpoint of 21100-1 is wYesn this time, so it can be judged that verifying information has been registered. In this way, "root", "al", and Rblw have been followed in order, so it can be understood that the verification information for the reversed domain name Mcl.bl.al.n is registered in the internal table 21100-2.
The verifying server 21100-1 checks the received cipher parameter RP2, and checks that the expiration date R98-12-31n has not expired. Next, the verifying server 21100-1 reads the password PW and the value of the cipher number written in the verification table, and selects cipher function Ei. The cipher parameter RP is RR2 = Ei (M TR) 11 TR, so the time random number TR to the latter half of RP2 is used to calculate t = EiRW, 236 TR). In the event that the value of this temporary variable t calculated here matches the first half Ei(PW, TR) of the received RP2, confirmation can be made that the password PW entered into the terminal 21200-1 is correct. The above results are reported to the connection server 21028-1. Consequently, the connection server 21028-1 can know the verification results (authorized or denied) and billing class MNY. <<Other embodiment of roaming without a home IP terminal>> In the above embodiment, in the event that the ICS receptionist 21271-1 does not set a home IP terminal, the earlier-described 'Registration procedures from home IP terminal' are performed via the user service server 21250-1. In this case, the billing record 0120n within the verifying table 21100-2 within the verifying server 21100-1, and the information R7981-710-1n of the verifying server presented to the billing notification destination within the conversion table 21023-1, are used. <<Another embodiment of roaming wherein the verifying server is included in the domain name server>> The structure of the domain name tree shown in FIG.153 that is the object of verifying server 21110-1 is the same as the domain name trees that are the object of domain name servers in other embodiments. Accordingly, each domain server is capable of storing the data of the verifying server 237 described in the present embodiment, and include the functions of a verifying server. That is. this other method of carrying out roaming is realized by integrating the verifying server described in the present embodiment with the domain name server described in other embodiments. <<Access control apparatus and IP terminal connecting with wireless transceiver>> A wireless transceiver 21620-1 is provided within the ICS 21000-1, and the wireless transceiver 21620-1 and a wireless transceiver 21640-1 can exchange information one with another via a wireless cenTnLmicatim path 21625-1. The terminal 21630-1 includ s the less transceiver 21640-1. and as with the case of the earlierdescribed IP terminal 21200-1, the terminal 21200-2 has a function for the inter-corporation ccm=catim using an ICS domain name. There is an information ocmtinication path 21620-1 between the access control apparatus 21020-1 and the wireless transceiver 21620-1. The information communication path 21610-1 is like the ICS user logic commnication line in that it has a function for sending and receiving ICS user packets, and these are different in that the information cottatunication path 21610-1 is within the ICS 21000-1. The wireless transceiver 21620-1 and the wireless transceiver 21640-1 both have a function for receiving ICS user packets, converting the Information within the ICS user frame into ICS user packet information in waveform format and transmitting them, and also reverse functions. i.e., receiving ICS user packet information, in waveform format and reverse- i 1 238 converting into ICS packet format and transmitting these. Accordingly, the ICS user packet sent out fram the IP terminal 21200-2 passes through the wireless transceiver 21640-1, wireless camnzi.icatim path 21625-1, wireless transceiver 21620-1, and Information camunication path 21610-1, and is provided to the access control apparatus. Also, ICS frame sent out in the reverse direction I.e., sent from the access control apparatus 21020-1 passes through the information camxmicatim path 21610-1, wireless transceiver 21620-1, wireless camixdcatim path 21625-2, less transceiver 21640-1, and is delivered to the IP te=dnal 21200-2.
Thus, according to the present invention, administration of information cmication is performed with a unified address system, and various services can be provided, without using dedicated lines or the Internet, thus enabling structuring a large-scale camunication system with high security and with relatively lcw costs. Also, intercorporation cominication can be performed between individual Corporations (including government organizations, universities, and so forth) which had conventionally been services separately with Practically no change to the address system for cmWter ConTmmications. Further, since the network administrator holds the network control authority, the overall administration of the network becare-s clear, increasing ease of securing reliability and also markedly inproving security.
239 CLAM 1. In an integrated information communications system; wherein an ICS user packet having a unique ICS user address system ADX is converted into an ICS network packet having an address system ADS, based on the administration of a conversion table provided within an access control apparatus; and wherein in the case that transmission is made over at least one VAN contained therein following rules of said address system ADS, and the destination other access control apparatus is reached, conversion is made to said ICS user address system ADX based on the administration of said conversion table, and another external information communications apparatus is reached, characterized in that network identifier is registered in said conversion table, closed-zone intra-corporation communication is performed by using the network identifier and is capableof accessing to a network server for the intra-corporation communication.
2. An integrated information communications system according to

Claims (1)

  1. Claim 1, wherein closed-zone inter-corporation is performed by using the
    network identifier and is capable of accessing to a network server for the inter- corporation communication.
    3. An integrated information communications system according to Claim 1, wherein closed-zone virtual dedicated line communication is performed by using the network identifier and is capable of accessing to a network server for the virtual dedicated line communication.
    4. An integrated information communications system according to Claim 1, wherein open-zone inter-corporation communication is performed by using the network identifier and is capable of accessing to a network server for the open-zone inter-corporation communication.
    5. An integrated information communications system according to Claim 1, wherein ICS user is transmitted/received by using the conversion table between an internal network server and an external network server.
    r, 6. An integrated information communications system according to Claim 1, wherein the conversion table is held in a conversion table record file and is took out at a necessary time to use.
    7. An integrated information communications system according to Claim 1, wherein the conversion table is not held in said access control apparatus, and information to register at the conversion table is obtained from domain name and is used by temporarily holding at the conversion table.
    8. An integrated information communications system according to Claim 1, wherein a domain name server for closed-zone intra-corporation communication is provided in ICS network.
    9. An integrated information communications system according to either Claim 2, wherein, a domain name server for closed-zone inter- corporation communication is provided in ICS network.
    10. An integrated information communications system according to either Claim 3, wherein, a domain name server for closed-zone virtual dedicated line is provided in ICS network.
    2-4 i
GB9920084A 1997-12-05 1998-10-05 Integrated information communication system Expired - Fee Related GB2338875B (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
JP35022497A JP3084681B2 (en) 1996-12-06 1997-12-05 Integrated information and communication system
JP3900798A JP3000051B2 (en) 1998-02-20 1998-02-20 Integrated information and communication system
GB9821661A GB2332837B (en) 1997-12-05 1998-10-05 Integrated information communication system

Publications (3)

Publication Number Publication Date
GB9920084D0 GB9920084D0 (en) 1999-10-27
GB2338875A true GB2338875A (en) 1999-12-29
GB2338875B GB2338875B (en) 2000-08-30

Family

ID=27269500

Family Applications (7)

Application Number Title Priority Date Filing Date
GB9920041A Expired - Fee Related GB2338871B (en) 1997-12-05 1998-10-05 Integrated information communication system
GB9920042A Expired - Fee Related GB2338872B (en) 1997-12-05 1998-10-05 Integrated information communication system
GB9920084A Expired - Fee Related GB2338875B (en) 1997-12-05 1998-10-05 Integrated information communication system
GB0019276A Expired - Fee Related GB2356327B (en) 1997-12-05 1998-10-05 Integrated information communication system
GB9920086A Expired - Fee Related GB2338876B (en) 1997-12-05 1998-10-05 Integrated information communication system
GB9920076A Expired - Fee Related GB2338873B (en) 1997-12-05 1998-10-05 Intergrated information communication system
GB9920079A Expired - Fee Related GB2338874B (en) 1997-12-05 1998-10-05 Integrated information communication system

Family Applications Before (2)

Application Number Title Priority Date Filing Date
GB9920041A Expired - Fee Related GB2338871B (en) 1997-12-05 1998-10-05 Integrated information communication system
GB9920042A Expired - Fee Related GB2338872B (en) 1997-12-05 1998-10-05 Integrated information communication system

Family Applications After (4)

Application Number Title Priority Date Filing Date
GB0019276A Expired - Fee Related GB2356327B (en) 1997-12-05 1998-10-05 Integrated information communication system
GB9920086A Expired - Fee Related GB2338876B (en) 1997-12-05 1998-10-05 Integrated information communication system
GB9920076A Expired - Fee Related GB2338873B (en) 1997-12-05 1998-10-05 Intergrated information communication system
GB9920079A Expired - Fee Related GB2338874B (en) 1997-12-05 1998-10-05 Integrated information communication system

Country Status (1)

Country Link
GB (7) GB2338871B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
RU2679962C1 (en) * 2018-02-20 2019-02-14 Акционерное общество "Российская корпорация ракетно-космического приборостроения и информационных систем" (АО "Российские космические системы") Method of assigning ip addresses in a personal satellite communication network on low-orbit satellites repeaters with zone registration of subscriber terminals

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2320167A (en) * 1996-12-06 1998-06-10 Distrib Syst Res Inst Integrated information communications system

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FR2737372B1 (en) * 1995-07-27 1997-09-12 Alexandre Serge DEVICE AND METHOD FOR INTERCONNECTING NETWORKS, IP ROUTER COMPRISING SUCH A DEVICE
CN1087537C (en) * 1995-12-26 2002-07-10 Ntt移动通信网株式会社 Mobile radio data communication system
GB9603590D0 (en) * 1996-02-20 1996-04-17 Hewlett Packard Co Method of accessing a target entity over a communciations network
US6172972B1 (en) * 1996-05-28 2001-01-09 Microsoft Corporation Multi-packet transport structure and method for sending network data over satellite network
CA2217838C (en) * 1996-11-07 2003-07-29 At&T Corp. Wan-based voice gateway

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2320167A (en) * 1996-12-06 1998-06-10 Distrib Syst Res Inst Integrated information communications system

Also Published As

Publication number Publication date
GB2338875B (en) 2000-08-30
GB2338874B (en) 2000-08-30
GB2338873A (en) 1999-12-29
GB2338872A (en) 1999-12-29
GB9920041D0 (en) 1999-10-27
GB0019276D0 (en) 2000-09-27
GB2338876A (en) 1999-12-29
GB9920079D0 (en) 1999-10-27
GB2338871A (en) 1999-12-29
GB9920042D0 (en) 1999-10-27
GB9920076D0 (en) 1999-10-27
GB2338873B (en) 2000-08-30
GB2338871B (en) 2000-08-30
GB9920086D0 (en) 1999-10-27
GB2338876B (en) 2000-08-30
GB2356327A (en) 2001-05-16
GB2338874A (en) 1999-12-29
GB2338872B (en) 2000-08-30
GB9920084D0 (en) 1999-10-27
GB2356327B (en) 2002-06-26

Similar Documents

Publication Publication Date Title
CA2254045C (en) Integrated information communication system
US7315554B2 (en) Simple peering in a transport network employing novel edge devices
EP1639764B1 (en) Apparatus and methods using tunneling to enhance remote lan connectivity
KR20040004724A (en) Wireless LAN service system providing proxy gateway and method thereof
JPH1188438A (en) Integrated information communication system
GB2338875A (en) Integrated information communications system
GB2364491A (en) Integrated information communications (ICS) system
JP3283864B2 (en) Data transmission method by satellite communication
JP3932269B2 (en) Integrated information communication system
JP3261459B2 (en) Integrated information and communication system
JP3905110B2 (en) IP communication network
JP4117894B2 (en) IP communication system using IP communication network
JP2002158717A (en) Integrated information communication system
JP2004048744A (en) Integrated information communication system
JP2007151162A (en) Method of ip communication
JP2008104200A (en) Ip communication system using ip communication network
JP2007174650A (en) Ip communication network

Legal Events

Date Code Title Description
732E Amendments to the register in respect of changes of name or changes affecting rights (sect. 32/1977)

Free format text: REGISTERED BETWEEN 20170309 AND 20170315

PCNP Patent ceased through non-payment of renewal fee

Effective date: 20171005