MXPA00008421A - Geospacial internet protocol addressing - Google Patents

Geospacial internet protocol addressing

Info

Publication number
MXPA00008421A
MXPA00008421A MXPA/A/2000/008421A MXPA00008421A MXPA00008421A MX PA00008421 A MXPA00008421 A MX PA00008421A MX PA00008421 A MXPA00008421 A MX PA00008421A MX PA00008421 A MXPA00008421 A MX PA00008421A
Authority
MX
Mexico
Prior art keywords
address
udip
data
mobile device
dynamic
Prior art date
Application number
MXPA/A/2000/008421A
Other languages
Spanish (es)
Inventor
Dan A Preston
Joseph Preston
James A Vroman
Danny A Allen
Original Assignee
Integrated Data Communications
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Integrated Data Communications filed Critical Integrated Data Communications
Publication of MXPA00008421A publication Critical patent/MXPA00008421A/en

Links

Abstract

The invention provides for conversion of latitude and longitude to an addressing scheme that supports current TCP/IP (v4) and future addressing (v6/ng) requirements. More specifically, it allows a decentralization of the unicast point to device on the hosted network. Geographical Internet Protocol (GeoIP) addressing will facilitate any cast routing schemes where the nearest node has a statically assigned GeoIP. Geo routing, and network management become a function of the GeoIP address.

Description

"DIRECT THE GEO-SPATIAL INTERNET PROTOCOL" TECHNICAL FIELD The present invention is generally in the field of data communications and more specifically is directed to improved methods of data communications with mobile devices. In particular, the invention includes an internet address project based on dynamic (geo-spatial) location that is backwards compatible with existing internet protocols and architectures but provides enhanced data communications with large numbers of mobile devices.
BACKGROUND OF THE INVENTION Internet The Internet Protocol (IP) as it is known today was designed during the late 70's when a 32 bit message (2- ^ 2 0 co or is represented in messages of 4 to 8 bits, eg, the message 255.255.255.255 later called Ipv4) allowed approximately 4.25 billion unique addresses. It was believed during that time that this would be more than enough address space to meet future needs. The IP was still - - experimental and was focused through academia and academia. Personal computers were still a prediction. By the 1990s it was evident that the direction of Ipv4 was going to run out, believing some as early as 1995. The result was Ipvß's charge, through the development of a task force called the Internet Engineering Task Force ( IETF). A key constitutional charter for this task force was interoperability, forward and backward. The basic structure of the new address project is a 128 bit message represented as 8 to 16 bit messages separated by a colon (:), and represented in a hexagonal format, (eg, FFFF: FFFF: ... in hex, 65535: 65535: ... in dec. And 1111111111111111: 1111111111111111: in binary). The combination of available addresses is approximately 3.4 x 10-38 unique addresses, enough to address or direct the network for the next millennium if not for the future not foreseen. As part of the IETF project, a binary prefix (100) has been set aside, representing 1/8 of the available network address. This was separated and was available for geographical base address. The unilanzamiento is defined as a resolved or assigned address or an identifier - singular for a single interface, that is, a packet sent to an address that is supplied to the interface identified by that address. TCP / IP represents connection / exempt connection protocols in the Open Systems Interconnection (OSI) reference model. The OSI is a normal reference model for communication between two end users in a network. It is used to develop products and understand networks. The OSI Reference Model describes seven layers of related functions that are needed at each endpoint when the data is sent from one part to another in a network. "An existing network product or program can be described in part by where that site fits into this layer structure, for example, TCP / IP is usually packaged with other Internet programs as a series of products that support communication over the Internet. This series includes the File Transfer Protocol (FTP), Telnet, the Hypertext Transfer Protocol (HTTP), the email protocols, and sometimes others.The OSI model describes the data flow in a network, any IP network, from the lowest layer (physical connections, ie cell phones) to the layer containing the user's applications, the data going to and from the network is passed from layer to layer.
- Each layer is able to communicate with the layer immediately above it and the layer immediately below it. The OSI Reference Model includes seven layers: 1. The Application layer represents the level at which applications provide access to network services. This layer represents the services that directly support the applications. 2. The Presentation layer moves the data from the Application layer to an intermediary format. This layer also manages security issues by providing services such as data encryption, and comprises the data so that less bit quantity needs to be transferred in the network. 3. The Session layer allows two applications in different systems to establish, use and terminate a session. This layer establishes dialogue control between two computers in a session, regulating which side transmits, more when and why duration transmits. 4. The Transport layer handles error recovery and recovery. It also repacks long messages when necessary in small packets for transmission and, at the receiving end, reconstructs packets in the original message. The Receiving Transport layer also sends acknowledgments of receipt.
. The Network layer directs messages and translates logical messages and names into physical addresses. It also determines the route from the source computer to the destination computer and manages traffic problems, such as switching, route and control of audio signals or data. 6. The Data Link layer packages bits of the Physical layer in frames (logical packages, structured for the data). This layer is responsible for transferring the frames from one computer to another, without errors. After sending a box, wait for an acknowledgment from the receiving computer. 7. The Physical layer transmits the data from one system to another and regulates the transmission of a data through a physical medium. This layer defines the way in which the cable is fixed to the device and which transmission technique is used to send the data through the system. When two devices communicate in a network, the software in each layer in one system assumes that it is communicating with the same layer in the other system. For example, the Transport layer of one system communicates with the Transport layer in the other system. The Transport layer in the first system does not worry about how the communication actually goes through the lower layers in the first system, through the physical media, and then up through the lower layers of the second system. Even though TCP fits well in the OSI Transport layer and IP layer in the Network layer, the other programs fit rather loosely (but not neatly within a layer) in the Session, Presentation and Application layers. . In this model, we only include programs related to the Internet in the Network and the upper layers. OSI can also be applied to other network environments to include voice. A set of communication products that completely conformed to the OSI reference model would fit neatly in each layer. With the advent of Ipv6 or Ipng, the number of network interfaces can be expanded beyond the network to individual devices. A point of real-time and secure linkage can be extended to the individual user through a concept called any launch defined as a communication between a single sender and closer to several receivers in a group. The term exists in contradistinction to multiple release, the communication between a. only sender and multiple receivers, and unilanguage, the communication between a single sender and a single receiver in a network.
- - Any launch is designed to let a guest initiate the efficient update of the route frames for a group of guests. IPv6 can determine which host of the access road is closest and sends the packets to this guest as if it were a uni-lancing communication. In turn, that guest can send anyone to another guest in the group until all the route boxes have been updated. Any release allows the link interface to function now as a link to the device, its address is unique and its interface is virtual to the marrow of the Internet. Extending this concept to devices that are not the classic interface devices, eg, a computer and a network, and expanding the management project, we have created the capacity to transfer the data, for all objects and purposes, almost in real time and insurance. IPv6, unilaneering links and any launch are key elements for tunnel construction protocols, the protocols necessary to reduce the latency of the network for data transfer. In relation to the Internet, the construction of tunnels is using the Internet as part of a private secure network. The "tunnel" is the specific path that a specific message or file can travel through the Internet. A protocol or set of communication rules called Point-to-Point Tunnel Construction Protocol (PPTP) has been proposed that would make it possible to create a virtual private network through "tunnels" over the Internet. This would mean that the devices would no longer need the support of the independent service provider (ISP) for wide-area communication, but that they could safely use public networks in near real time. PPTP, sponsored by Microsoft and other companies, and Layer 2 of Envió, proposed by Cisco Systems, remain among the main proposals for a new Internet Engineering Task Force standard (IETF). With PPTP, which is an extension of the Protocol Point-to-Point Internet (PPP), any user of a communications device with PPP client support will be able to use an ISP to securely connect to a device anywhere in the domain. PPP is a protocol for communication between two devices and is a full duplex protocol that can be used in various physical media, including a twisted pair or optical fiber lines or satellite transmission. Use a variation of High Speed Data Link Control (HDLC) for packet encapsulation. PPP is usually preferred through the previous de facto standard, the Serial Line Internet Protocol (SLIP) because it can handle a synchronous as well as asynchronous communication. PPP can share a line with other users and has error detection that the SLIP lacks. When a selection is possible, PPP is preferred. A virtual private network (VPN) is a private data network that makes use of the public telecommunication infrastructure, maintaining privacy through the use of a tunnel construction protocol and security procedures. A virtual private network can be contrasted with a system of own or rented lines that can only be used by a company. The idea of VPN is to provide the user with the same capabilities at a lower cost, sharing the public infrastructure. The telephone companies have provided secure shared resources for voice messages.A virtual private network makes it possible to have the same secure participation of public resources for the data.The current users are thinking of using a virtual network .private both for extranets and intranets. wide area Using a virtual private network involves encrypting the data before sending it through the public network and decrypting it at the receiving end An additional level of security involves encrypting not only the data but also the source and received network addresses Even though there is still no normal protocol, Microsoft, 3Com, and several other companies have proposed a standard protocol, the Point-to-Point Tunneling Protocol (PPTP) and Microsoft has built a protocol on their Windows NT server. VPN software such as Microsoft's PPTP support, as well as security software, would usually be GPS. Global Positioning or "GPS" was initiated as a result of the problems experienced by the military forces of the United States during the conflict with Vietnam. One of the main difficulties for ground troops was how to keep in touch with one another, especially because of the hard jungle terrain. A localized LORAN system was in use, but this was subject to errors common to all radio systems, such as ground-wave deflection and poor radio reception at night and bad weather. The United States then experimented with a system of 4 satellites, initially called TRANSIT. These were in high orbit above the earth and were available to marine and military users. However, the system was largely inaccurate, since position fixes could only be obtained at most every 2 hours.
The NavStar system was developed later and was able to function in a limited way since 1986, but there was only coverage of 3 to 4 hours per day due to the small number of satellites in orbit. The GPS system became "partially operational" when hostilities began in the Gulf in 1990. Here, the experimental satellites of Block 1 were used in addition to the established satellites of Block 2, thus providing a usable constellation of 21 satellites. The Department of Defense made the operational system for civilian users in 1990, which is the same as the GPS system we use today. GPS satellites are in orbit on Earth twice a day, 17,699 kilometers above the earth, transmitting their precise position and elevation. The GPS receiver acquires the signal, then measures the interval between the transmission and reception of the signal to determine the distance between the receivers and the satellite. Once the receiver has calculated this data for at least 3 satellites, its location on the surface of the earth can be determined. Each satellite transmits the data of almanac and ephemeral. The almanac data is the general information on the location and health of each satellite in the constellation, which can be received from any satellite.
A receiver with a current almanac in his memory knows in which part of the sky to look for satellites, given his last known position and time of day. The ephemeral data is the precise satellite positioning information that is used by the GPS receiver to calculate its position. Each satellite transmits its own ephemeral data. There are also 2 different signal types emitted by satellites; CA (Thick Acquisition) and PPS (Precise Positioning System). The AC coded signals can provide accuracy of 15 RMS (Medium Square Root). However, the DOD has introduced a random error in the system, known as Selective Availability. This means that the satellites randomly send an error signal, thus degrading the accuracy of the signals up to 100 meters, officially, even when the accuracy is usually 50 meters. PPS is only available for authorized users, mainly military and can provide a sub-1 meter accuracy. With the advent of this technology, its subsequent commercialization, its evolution in size, cost and accuracy, GPS is rising to the surface as a technology available for systems with classically considered either compatible, available or necessary from the recent past.
Wireless Communications Cellular (wireless) communications have emerged from analog to digital over the past few years. These data streams are sent using standardized protocols in the telecommunications industry. They are referred to as GSM, CDMA, TDMA, etc., each one singular but developed as a voice under the concept of data. Some have been raised up to purely digital but in the total telecommunications network it is still the voice in the voice networks. These high-speed digital communications have the ability to be supported by TCP / IP in a purely digital environment. So far, 'these three different fields of technology - internet data communications, global positioning system and wireless communications have emerged largely independently; each one directing its own challenges and commercial markets. The present request results from thinking of these new technologies in a broader context, and exploring the ways in which they overlap, or could overlap, to provide new functionality and efficiencies. The need was identified to level and merge the selected aspects of these different technologies together. More specifically, there is a need to accommodate large numbers - of growing mobile users while at the same time providing improved levels of data communication service. A specific need is a way to communicate the data with and from a mobile computing device. Data communication must be fast and reliable, even though the computer or other mobile device may be moving across the entire planet in unpredictable ways. Mobile data communications must also be compatible with existing networks and protocols - a paradigm shift or major issue is not commercially viable.
COMPENDIUM OF THE INVENTION The present invention generally comprises methods and apparatus for data communications with mobile devices such as laptops by battery or cordless telephones. The invention provides a new method for directing mobile devices that accommodate large numbers of these devices while ensuring that all of these addresses are unique. The same method can be used advantageously for stationary devices as well. (Of course, mobile devices are intermittently stationary, just as most stationary devices can be repositioned). The global positioning system offers any device a unique format and a point of reference on the planet. No two places on earth have the same location. Calculating the total population of the singular directions in terms of latitude and longitude of a resolution of .183 meters (e.g., -122 30.1255.45 28.3478), singular locations of approximately 2.16 x 1016 can be achieved. A key aspect of the present invention is the use of the global position to generate a compatible Internet Protocol (IPv4, IPv6) address project globally singular . With recent announcements by wireless telecommunications equipment providers of the inclusion of GPS receivers in their products, the necessary global position data is easily available on a cordless phone, and similarly it can be integrated into virtually any electronic device. The invention allows unique applications that must be incorporated into the transport and network layers of the system architecture. A second key aspect of the invention is a paradigm shift in the architecture of the network. The invention is backwards compatible with existing networks and protocols, but it averages them in a new way. Conventionally, mobile devices, such as the cordless telephone and the computer were believed to be as "clients" in a network architecture and communications software or "batteries" that were correspondingly placed. The clients would communicate with and through a server. Initially, the server or guest would assign an IP address to the client. (Typically using DHCP - the Dynamic Host Configuration Protocol). Then the client would communicate with the rest of the world, through that server, using the address, assigned. The server, which acts as an escape route, would receive packages from the client, repack them (encapsulate) and send them to the wider network. The present invention terminates this conventional arrangement. In accordance with the present invention, it is the "client" device or the end user, such as a mobile telephone or computer that allocates its own IP address, instead of searching for a server or host. Therefore, we define a new DCCP: Dynamic Client Configuration Protocol. The client acts now as the server since it can communicate directly in the largest network, even the internet, reducing the number of intermediate machines. In this way, this new independent client, having assigned its own IP address (based on the global location), can emulate a path or route sender, encapsulating its own packages, as selected. The addresses are found from the client upwards instead of from the guest downwards, as in the prior art. This new paradigm has remarkable potential to cross the internet much faster, than the systems of the previous technique, driving the communication and total latency much lower than the present levels. By driving the protocol stacks to the end user, as opposed to the base station in a wireless bearer network, the voice can be issued up to a "voice through data" transport position. The concept of the present invention laid the foundation for the integration of intelligent wireless devices, which can generate unique IP address projects, which in turn support SLIP or PPP for decentralization of any launch and unilance, building tunnels of the protocols, such as PPTP that support the VRN, and the oriented protocol of connection (TCP) for transport from the session to the network. The missing key element that we have determined is a management project that supports all the above in a singular way, in such a way that the resolved conflicting directions are in the exception instead of as a general rule. Intelligence and control must be propelled towards the de - li device communications in order to achieve real-time data transfer of effective route. The additional objects and advantages of this invention will be apparent from the following detailed description of the preferred embodiments thereof, which continues to refer to the accompanying drawings.
BRIEF DESCRIPTION OF THE DRAWINGS Figure 1 is a photograph of the screen illustrating the operation of a geo-spatial path method using the dynamic IP address derived from the location data, in accordance with the present invention. Figure 2 is a photograph of the screen, as in Figure 1, showing the first location data, an unresolved dynamic IP address (UDIP) derived from the location data in the IPv4 format, and showing the addresses of the physical path and dynamic virtual path (DVG). Figure 3 is another photograph of the screen, as in Figure 1, indicating a new location (latitude and longitude) of the mobile device. Figure 4 illustrates a request through VUL to resolve an address in order to establish a - transfer of data; DCCP returns to the network to a unique address. Figure 5 illustrates a GeoIP change as supplied by the apparatus. Figure 6 represents a change in GeoIP that has been redirected back to the network. Figure 7 is a flow chart illustrating geo-spatial address methods and data communications according to the invention. Figure 8 is a flow chart illustrating a method for converting the location data to form an unresolved dynamic internet protocol (UDIP) address.
DETAILED DESCRIPTION OF A PREFERRED MODALITY The Transfer Control Protocol / Internet Protocol (TCP / IP) has been classically defined or is created at least as being a connection-free data transfer protocol for only computer networks. One aspect of this invention is expanding the definition of the blinking interface devices assigned to an address (IP address) to include hardware, software and firmware platforms, which carry out the transfer. of data for uses other than those limited to computing. Uses other than computing include, but are not limited to, voice and video data. The voice data are analog signals converted into digital currents through analog-to-digital converters, CODEC's. VOCODER's, etc. In the satellite-based communications system, a unique set of problems arise with respect to the communications architecture. The "tower" that hosts the user, the caller is no longer stationary, moves at 27,040 kilometers per hour; and for all purposes and uses, the user and his network device is stationary. This reversal of the classic roles, with respect to the current wireless network, requires network management in an unconventional sense. The intelligence for network administration needs to be decentralized to the user. Unique management projects are needed to support the investment of paper. GeoIP traps through a protocol stack called Dynamic Client Configuration Protocol (DCCP), where the IP address is delivered to the host as a unique node address. The conflicts that arise due to close proximity are resolved in the exception.
Ipv4 uses 48 bit messages as defined above. The following figures describe a software platform mode of the conversion process to Ipv4. Figure 1 represents a number of fields for data entry and exit. The terms in this figure represent new terms that support the definition of GeoDirection using GeoIP. Figure 2 shows a current latitude and longitude of the users as well as Dynamic IP Not Resolved (UDIP), the Dynamic Virtual Access Way (DVG) that is in view and the next access path. DVG is a Virtual Linking Link (VUL), with a unique name and an assigned address. It is a sub-network or sub-mask of the marrow. In the operation, the user and his device "speak" to the Internet through VUL to DVG. The point that represents towards the user is the guest or VUL. During the delivery of the following access path to the view, it adopts the role of VUL. The resolved node and the user do not know that DVG has changed, the node is still transferring the data through VUL. UDIP is a function of GPS latitude and longitude. UDI7P will change constantly until it is resolved through VUL. Figure 3 shows a dynamic change in the user's address. The user's location has - - changed, your UDIP has changed and is making this known to the network along with your domain and domain name. In a conventional wireless system, the cell phone discloses the Equipment Serial Number, the Mobile Identification Number or another convention with a unique name to the network. By combining MIN with the site of the cell and sector, the network knows in which part the user can be reached. According to the present invention, dynamic MIN or UDIP is the location of the user as derived from the location data, e.g., provided by GPS. During request through VUL to resolve an address in order to establish a data transfer, DCCP returns a unique address to the network, see Figure 4. A DNS name and DNS have been previously assigned, DCCP obtains the latitude and longitude of GPS, converts it into GeoIP and resolves the address as a node of unilancement. The data transfer can now happen. If the user's location changes, the network or DCCP can re-resolve GeoIP, see Figure 5. Figure 5 represents a GeoIP change as supplied by the device. Figure 6 represents a change in GeoIP that has been redirected back to the network. The dynamic ability to resolve a change in GeolP satisfies numerous network management issues, - - such as when the call needs to go for an emergency call, such as at 911. This leads to a need to develop GeoSpace routers or routers sensitive to location-based calls. In addition to the emergency applications, a DUIP resolved within a specified area the GeoFence, which can be programmed to respond with a data exchange that is meaningful to the user, such as an advertised message. If the user is traveling in a freeway and crosses the GeoFence installation through the networks, it resolves if its new Geolp within the GeoFence, a data message can be sent to the user from the network that represents the significant information to the user in that location. In a commercial application, the user can be sent a message announcing a product or service at a reduced rate. If many users pass the same point, any launch can include a multiple-launch message or a GeoSpace Multiple Launch. If the area defined by GeoFence is 1,609 square kilometers, any user with an address will be sent within the defined area. In a second embodiment of the invention, the data stream may include video as well as audio. Using the concept of any GeoSpace launch, predetermined routes can be established based on the known location. In the case of fixed network nodes, a statistically assigned value can be assigned instead of being assigned dynamically by a GPS device. In the case of a model of any launch, the statistically assigned address can help to determine the nearest node or access path in the network. The update of the route boxes will be an exception, based on the traffic, instead of the rule. Figure 7 is a flow diagram illustrating a communication methodology in accordance with the present invention. Step 70, Initialization, can include several steps depending on the specific implementation. Typically, the 'memory registers, buffers or the technology device that determines the location (e.g., GPS, SPS) are initialized by clearing the buffers by adjusting the registers, etc. This process begins with a network connection that is made and a negotiation process is required. Then, the acquisition location 72 comprises requesting a latitude, longitude, current altitude and time of the location by determining the source or device, such as a GPS receiver.
Step 74 is to convert that location data to a geo-IP address, as further explained below, with reference to Figure 8. An IP version or protocol is selected in step 76 (although it can be predetermined) and the corresponding conversion algorithm 78, 80 is used depending on the selected protocol. Then, the IP address is assembled, as will be further detailed later, step 82. The geo-IP address is assembled using the information collected from 72, a mobile identification member (MIN) in order to develop four encrypted fields, of 16 singular bits. If the address requirements of 76 are Ipv6, construct an IPv6 address of 8, 16 bit fields (binary) that include MIN. The first 3 binary characters of field one will be 000 and the remaining 13 will be an encryption key followed by 7 remaining fields that include mobile ID with latitude, longitude, encrypted time. If the request is for an address v4, then retrieve from block 80 the Ipv4 as represented in four binary 8-bit fields. In both cases (Ipv4, 6) make a hexagonal and decimal representation of the binary fields. In step 84, the resulting UDIP is stored in the RAM, in any of the three representations - (hexagonal, decimal, binary) of the IP address. Decision 86 indicates a loop synchronizer where every 5 seconds a new position is acquired (step 72) and a dynamic Internet protocol not resolved at 84 is stored. Reference 88 identifies the loop path of the synchronizer. Step 90 is a request from the session manager for the UDIP address (dynamic IP unresolved). It is recovered from the RAM in step 92. Referring to step 94, during the negotiation process, the dynamic client configuration protocol (DCCP) is transferred to the dynamic virtual path through the virtual unlink link (device). wireless), the UDIP. This process, in which the client tells the server his dynamic "phone number" or in this case, the IP address, is contrary to the approach of the prior art in which the server assigns an IP address to a requesting client. The negotiation process 96 is in accordance with the singular direction with negotiation for conflict in the exception. In other words, if there is a conflict, the server will negotiate a new address. During the termination of 96, a session is now established and the data is exchanged in step 98. Step 100 is to assign a dynamic virtual path - that is, the plug user (or wireless device) in a communication socket . In step 102, the server declares the dynamic unresolved IP which is now a resolved network connection (RDIP). Decision 104 indicates a loop synchronizer with a? undeclared variable, depending on how often the server wants to build and re-solve a new IP based on the geographical movement of the object. The variable Y, in other words the loop interval, can be determined as a function of speed and direction of travel. If the time is not equal to the longer Y variable time, the resolved dynamic IP is held (reference "C"). If the time is equal to the time plus Y, then the loop again through the path 106 to 72, build a new direction through the process to 102 and re-solve the new IP based on its change and location. Step 108 is the delivery of DVG. Another important aspect of the invention is that in a mobile environment, the access routes may have to renegotiate the connection, as opposed to the client requesting a renegotiated connection. This happens many times during the session. The dynamic virtual path is delivered to another server as necessary. Step 110 indicates that the access path negotiates the new server for the virtual unlink link.
- In this way, in 112, the network re-establish seam free. Step 114 continues the session back to 98 (data exchange) until the session is done and then gets rid of 116 and ends with 118. An illustrative algorithm for the conversion of latitude and longitude to form the GeoIP address is shown in a pseudo-code below. Explicit Option Say a As Double 'degrees of latitude Dim b As Double' min of latitude Dim c As Double 'degrees of length Dim d As Double' min in length Dim e As Integer Dim f As Integer Dim g As Integer Dim h As Integer Dim I As Integer Dim j As Integer Dim k As Integer Dim i_l As Chain Dim j_l As Chain Dim k_l As Chain Dim i_2 As Chain Dim j_2 As Chain Dim k_2 As Chain Dim 1 As Chain Dim m As Chain Dim n As Chain Dim p As Chain Dim q As Chain Dim r As Chain Dim s As Chain Dim u As Chain Dim v As Chain Dim w As Chain Dim x As Chain Sub Command Privadol_Click () x = Text6. Text w = x Text7.Text = w Text5. Testo = "503.819.7491@airtouch.net" End Sub Sub Private Command2_Click (] a = 45 b = 30.345 c = 122 d = 30.678 - - 1 = 9 j = 268 k = 77 e = (a + 45) * 1.417 f = (b * 4.25) g = (c * 1.417) h = (d * 4.25) 1 = e = f n = g p = h Text6. Text = 1 + "." + M + "." + N + "." + P Text9. exto = k TextlO. Text = I Textile. Text = j Textl. Text = a Text2.Text = b Text3. Text = c Text4. Text = d If I < = 255 Then i_l = I i_2 = I Otherwise: i 1 = 255 i_2 = I - 255 Finish yes If j < = 255 Then j_l = j j_2 = j Otherwise: j_l = 255 j_2 = j - 255 Finish Yes Text8. Text = i_l + "." + i_2 + "." + j_l + "." + j_2 k = 55 I = 268 j = 77 If I < 255 Then i_l = I i_2 = I Otherwise: i__l = 255 i_2 = I - 255 Finish Yes If j < 255 Then j_l = j j_2 = j Otherwise: j 1 255 - j_2 = j - 255 Finish Yes Textl2. Text = i_l + "." + i_2 + "." + j_l + "." + j_2 End Sub Sub Private Command3_Click () a = 35 b = 32.345 c = 111 d = 50.678 e = (a + 45) * 1.417 f = (b * 4.25) g = (c * 1.417) h = (d * 4.25) I = 268 I = 77 k = 55 1 = e m = f n = g P = h - Text6 Text = 1 + "." + M + "." + N + "." + P Text9. Text = k Text 10. exto = I Text 11. Text = j Textl. Text = a Text2. Text = b Text3. Text = c Text4. Text = d If I < 255 Then i_l = I i_2 = I Otherwise: i_l = 255 i_2 = I - 255 Finish Yes If j < = 255 Then j_l = j j_2 = j Otherwise: j_l = 255 j_2 = j - 255 Finish Yes Text8. Text = i l + "." + i 2 + "." + j 1 + "." + j 2 k = 112 - I = 77 j = 55 If I < = 255 Then i_l = I í_2 = I Otherwise: i_l = 255 i_2 = I - 255 Finish Yes If j < = 255 Then j_2 = j Otherwise: j_l = 255 j 2 = j - 255 Finish Yes Textl2. Text = i_l + "." + i_2 + "." + j_l + "." + j_2 End Sub Sub Private Command4_Click () Textl. Text = "" Text2. Text = "" Text3. Text = "" - Text4 exto = Text5. exto = Text6. Text = Text7. Text = Text exto = Text9. Text = Text. Text End Sub Sub Private Command5_Click () Terminate Sub Terminal Sub Terminal The above process can be more easily described by reference to a flow chart - Figure 8. Figure 8 is a flow chart illustrating a method for converting the location data to form an unresolved dynamic internet protocol address ( UDIP). In this illustration the UDIP address is IPv4 compliant. It can be formed to meet other protocols. This process represents an expansion of block 80, 82 of Figure 7. Referring now to Figure 8"Obtain the Middle Memory Chain" - step 42 requires reading the location data of a buffer. The data string is analyzed, step 44, to identify and retrieve at least four data elements, as shown in step 46 the data elements are (1) degrees of latitude; (2) minutes of latitude; (3) degrees of length; and - (4) minutes in length. These elements are identified by corresponding variable names, such as X] _, X2. i and Y2. respectively, even when variable names are arbitrary and are only for convenience. The latitude variable values are used in the formula shown in step 48 to calculate the new values Fl and F2, and the length variables are subjected to the calculation shown in step 50, thus forming four values F] _ a F4, all within a scale of 0 to 255. Then, we round all the decimal values down to the nearest whole number, step 52. Finally, the IPv4 format address is concatenated Fl through F4, with delimiters of period field, step 54. An example 56 of the conversion is shown in Figure 8 which is presented below, which is the flow diagram. Many other conversions could be used based on the location data; The above is just an example that is convenient for ease of calculation. All other conversions that form an IP protocol address based on the location data should be considered equivalent to the method illustrated above. It is within the scope of the invention to include the altitude as part of the location data used to determine a singular direction. The use of altitude avoids conflicts, for example, between devices within the same building but on different floors. The conversion in IPv6 should be considered a second method modality for geographic IP address. In the case of IPv6, a 128 bit message is available, as explained above. Converting latitude and longitude from a conventional GeoIPvd format can be done by changing the definition of the number of degrees in a circle. An appropriate algorithm would include a lower common denominator that considers hexagonal values or multiples of 16 and arc measurements as multiples of 45. For this mode, 720 degrees are used in the algorithm as the number of degrees in a circle. This concept maximizes the hexagonal presentation of the GeoIP management project. If maximum effort is not required, the abundance of available direction will sustain both conventional and unconventional management projects. Using the reserved prefix in the 100 address project that has been separated for geographical direction, this yields FFF (4095) which are the unique sectors for GeoIP. An address of 4F5B: yields a binary address of (100111101011011 :). This represents (hex 4F5B-4000 = 5B5 or 3931 in dec.). This can represent sector 3931 in the IP globe. The following elements from 2 to 16 can directly represent the degrees and minutes within the sector or can be encrypted with variables that are derived from the GPS device. It will be apparent to those who are familiar with the art that many changes can be made in the details of the above-described embodiment of this invention without departing from the underlying principles thereof. The scope of the present invention should therefore be determined only by the following claims.

Claims (20)

- R E I V I N D I C A C I O N S
1. A method for generating a globally unique address for mobile computing applications comprising the steps of: receiving global position information; processing the received global position information to determine the current location data comprising a current latitude, current length and current altitude; and convert the current location data in order to form an unresolved dynamic internet protocol address (UDIP) to be used in the control of. transfer and routing of the data between a mobile device placed in the current location and a server.
2. A method according to claim 1, wherein the UDIP address is in accordance with the IPv4 internet protocol.
3. A method according to claim 1, wherein the UDIP address is in accordance with the IPv6 internet protocol.
4. A method according to claim 1, wherein the global position information is provided by a GPS receiver coupled to the mobile device. -
5. A method according to claim 4, wherein the data comprises an audio and / or video data.
6. A method according to claim 4, wherein. The data includes electronic mail.
7. A method according to claim 4, wherein the data comprises telematic data.
8. A method for transferring data between a host and a mobile device comprising the steps of: generating a UDIP address in the mobile device, based on a current physical location of a mobile device; send the UDIP address from the mobile device to the guest; and registering and resolving the UDIP address in the host as an assigned IP address of the mobile device for subsequent data transfer between the guest and the mobile device.
9. A method according to claim 8, and further comprising: periodically updating the UDIP address in the mobile apparatus in response to a new current location of the mobile device; - send the updated UDIP address from the mobile device to the guest; and resolve by registering the updated UDIP address in the guest as the assigned IP address of the mobile device.
A method according to claim 8, wherein the generation of a UDIP address based on the current physical location of the mobile device includes generating the UDIP address based on the latitude and longitude of the mobile device.
11. A method according to claim 8, wherein generating a UDIP address based on the current physical location of the mobile device includes generating the UDIP address based on the latitude and longitude and altitude of the mobile device.
12. A method according to claim 8, wherein the current physical location of the mobile device is determined by the use of a GPS receiver integrated in the mobile device.
13. A method according to claim 8, wherein the current physical location of the mobile apparatus is determined by the GPS receiver physically coupled to the mobile apparatus.
14. A dynamic geo-spatial routing methodology for data communication with a wireless communication device comprising the steps of: receiving the GPS satellite transmissions in the wireless communication device; acquire the current location data in response to GPS satellite transmissions; including the current location data at least the latitude and longitude of the wireless communications device; generate an unresolved dynamic IP address (UDIP) as a function of the current location data; and transmitting the UDiP address to a remote server to be used to route the communication of the data with the wireless communication device so that the current location of the device determines a dynamic identifier, however, unique for the communication of the data.
15. A method according to claim 14, wherein the UDIP address is in accordance with the IPv4 protocol standard.
16. A method according to claim 15, wherein the UDIP address is in accordance with the IPv6 protocol standard.
17. A method according to claim 14, and further comprising: identifying a first access path in the internet having a unique name and a predetermined assigned IP address; assign the selected process path for temporary use as a DVG dynamic virtual path; present the designated DVG to the wireless communication device as a virtual guest; identify a second access path on the internet that has a unique name and a default assigned IP address; assigning the second access path as the next access path; and resolving UDIP to form a resolved dynamic IP address for data communications between the wireless device and a selected access path of the first and second access routes.
18. A method of data communication with a mobile device comprising the steps of: in the mobile device, acquiring the location data; on the mobile device, convert the acquired location data to form a geo-IP address; prepare a format in the geo-IP address in accordance with an IP protocol of predetermined norm thus forming an unresolved dynamic IP address (UDIP); and storing UDIP in a memory in the mobile device; and periodically repeating the aforementioned steps by updating UDIP in response to the newly acquired location data; request address resolution including sending UDIP stored to a guest; assign a DVG dynamic virtual access path to UDIP; combining the DVG address assigned together with UDIP in order to form a resolved dynamic IP address (RDIP); And use RDIP as an assigned IP address of the mobile device for data transfer.
19. A method according to claim 18, and further comprising: monitoring the elapsed time since the location data was last updated; if the elapsed time exceeds a predetermined time limit, reacquire the location data; and then, repeat the above-mentioned steps based on the newly acquired location data.
20. A method according to claim 18, which includes assigning a new DVG in response to the newly acquired location data.
MXPA/A/2000/008421A 1998-11-02 2000-08-28 Geospacial internet protocol addressing MXPA00008421A (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US60/106,727 1998-11-02

Publications (1)

Publication Number Publication Date
MXPA00008421A true MXPA00008421A (en) 2002-02-26

Family

ID=

Similar Documents

Publication Publication Date Title
US6920129B2 (en) Geo-spacial internet protocol addressing
US6985454B1 (en) ISP system using non-geosynchronous orbit satellites
CN1714558B (en) Mobile IP registration supporting port identification
EP1451950B1 (en) MOBILE ROUTER SUPPORT FOR IPv6
EP2148518B1 (en) Packet communication method using node identifier and locator
CN100403751C (en) Routing in a packet switched network
US20070195803A1 (en) Method and arrangement device relating to communication network
US20090133105A1 (en) Multi-medium wide area communication network
US20020007414A1 (en) Network system using dedicated downlink network and bidirectional network
EP1156626A3 (en) Mobile communication network, terminal equipment, packet communication control method, and gateway
KR102128946B1 (en) Network structure for the scene of a fire
CN113472913B (en) Communication method and device
EP1719310B1 (en) Method and apparatus for providing data over a dynamic wireless network
Hogie et al. Link and routing issues for Internet protocols in space
CN100456716C (en) A method of data transmission on VPN
CN116566897A (en) Addressing routing method, device, equipment and medium
MXPA00008421A (en) Geospacial internet protocol addressing
CN103053186A (en) Network system
JP2001136198A (en) Inter-network communication method and server, and inter-network communication system
CN116033486B (en) IAB host node switching pretreatment method, device, equipment and medium
Wang et al. Application of IPv6 in GIS
EP1336140A2 (en) Data encoding method and system
EP1151583A1 (en) Envelope message for transparent transmission through ip network
Makki et al. On fundamental issues in mobile and wireless Internet
Esaki et al. IPv6 R&D activities in WIDE project