WO2003065677A1 - Systeme et procede de mise en application de multidiffusion commandee - Google Patents
Systeme et procede de mise en application de multidiffusion commandee Download PDFInfo
- Publication number
- WO2003065677A1 WO2003065677A1 PCT/CN2002/000596 CN0200596W WO03065677A1 WO 2003065677 A1 WO2003065677 A1 WO 2003065677A1 CN 0200596 W CN0200596 W CN 0200596W WO 03065677 A1 WO03065677 A1 WO 03065677A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- multicast
- router
- host
- message
- user
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims abstract description 63
- 238000013475 authorization Methods 0.000 claims abstract description 6
- 230000008569 process Effects 0.000 claims description 20
- 238000012545 processing Methods 0.000 claims description 20
- 230000004044 response Effects 0.000 claims description 9
- 239000000284 extract Substances 0.000 claims description 5
- 238000004891 communication Methods 0.000 claims description 4
- 238000010586 diagram Methods 0.000 description 10
- 238000007726 management method Methods 0.000 description 10
- 230000006870 function Effects 0.000 description 5
- 238000005516 engineering process Methods 0.000 description 3
- 230000007246 mechanism Effects 0.000 description 2
- 238000011217 control strategy Methods 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 239000000203 mixture Substances 0.000 description 1
- 238000012360 testing method Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/08—Configuration management of networks or network elements
- H04L41/0893—Assignment of logical groups to network elements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/02—Details
- H04L12/16—Arrangements for providing special services to substations
- H04L12/18—Arrangements for providing special services to substations for broadcast or conference, e.g. multicast
- H04L12/185—Arrangements for providing special services to substations for broadcast or conference, e.g. multicast with management of multicast group membership
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0892—Network architectures or network communication protocols for network security for authentication of entities by using authentication-authorization-accounting [AAA] servers or protocols
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/101—Access control lists [ACL]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/08—Configuration management of networks or network elements
- H04L41/0894—Policy-based network configuration management
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
Definitions
- the present invention relates to an IP multicast technology, specifically, to an IP controlled multicast system and an implementation method thereof, and belongs to the field of communication technology. Background of the invention
- a multicast group is composed of a sender and a receiver, and the sender and receiver are connected by a multicast distribution tree.
- the sender needs to send data to a group
- the host directly sends the data to the router connected to it.
- the router forwards the data to the multicast receiver through the multicast distribution tree.
- the router does not place any restrictions on the host sending the message.
- IGMP protocol Internet Group Management Protocol
- the received multicast group data is forwarded to the host; similarly, the router does not place any restrictions on the host that wants to receive the multicast packet.
- the above-mentioned IGMP extension protocol is an extension on the basis of IGMP V2. It adds authentication functions for multicast senders and receivers, and prevents unauthorized users from sending / receiving multicast packets.
- the IGMP extension protocol uses a Challenge-Response mechanism similar to the PPP authentication protocol CHAP (Challenge Handshake Authentication Protocol) that requires three-way handshake and password encryption to authenticate users.
- CHAP hallenge Handshake Authentication Protocol
- the ingress router can authenticate it using the challenge-response mechanism.
- the ingress router can use RADIUS as the authentication server during authentication.
- the multicast packet sent by the sender can be forwarded by the ingress router to the IP multicast network to the egress router.
- the ingress router drops the multicast packet (silently) sent by the sender.
- the egress router starts sending IP multicast packets to the receiver after passing the egress route authentication.
- authentication is unsuccessful, the egress router does not forward IP packets to the receiver.
- the above RADIUS extension protocol is extended on the basis of RAMUS. It can authenticate multicast senders and receivers at the ingress router and egress router, track the user's multicast data, and provide data for service management.
- the authentication server must be able to provide the authentication service requested by the router.
- the router provides the user ID (User1D) and password. For security, challenge-based authentication is required for authentication.
- Each service must also be authenticated, such as each multicast group address. This is because multicast packets are sent by group address, and user permissions should be associated with the group. Except for adding some attributes, other requirements are the same as RADIUS. Whether the router uses RADIUS authentication is optional.
- the multicast router When the multicast router is configured to support RADIUS accounting, it will generate an accounting start packet at the beginning of the multicast service and send it to the RADIUS multicast accounting server.
- the accounting start message describes the type of service.
- the RADIUS multicast accounting server After receiving the message, the RADIUS multicast accounting server sends an acknowledgement message back.
- the multicast router also generates an accounting end message and sends it to the RADIUS multicast accounting server.
- the accounting end message describes the type of service. After receiving the message, the RADIUS multicast accounting server will send an acknowledgement message.
- the multicast router When the multicast router receives an IGMP Join request, it sends an Access-Request packet to the RADIUS multicast authentication server to request authentication. After receiving the authentication pass response from the RADIUS multicast authentication server, the multicast router sends an Account-Request / Start message to the RADIUS multicast accounting server to start accounting. When the multicast router receives an IGMP Leave request, it sends an Account-Request / Stop message to the multicast accounting server to end the accounting. If the multicast router does not receive a response within a certain period of time, the RADIUS extended protocol recommends that the multicast router resend the Access-Request packet several times in a row. The multicast accounting server can request other servers to complete the accounting function (proxy). When the accounting server cannot successfully record the accounting packets, it cannot send Accounting-Response acknowledgement packets to the multicast router.
- CISCO has developed the CISCO Group Management Protocol (CGMP) to solve the multicast forwarding flooding problem in the Ethernet switch environment.
- CGMP CISCO Group Management Protocol
- layer 3 devices can control layer 2 devices.
- the forwarding table thus provides a means to control the authorized reception of users to a certain extent.
- the CGMP message format is shown in Figure 1. It consists of a version number (Ver) of 4 bits, a type of 4 bits, a reserved portion of 2 bytes, and the number of GDA / USA pairs in the message (Count). L byte and several GDA / USA pairs.
- GDA Group Destination Address
- GDA Group Destination Address
- USA Unicast Source Address
- the working process of the CGMP method is as follows: Host 1 sends an IGMP Membership Report message to join the multicast group 224.1.2.3, and the switch uses the MAC address 0100.5e01.0203 corresponding to the group address resolved from the message to find CAM (CAM: Content-Addressable Memory) table, because there is no match in the CAM table, the message is forwarded to all ports including the CPU and the multicast router.
- the multicast router receives the IGMP Membership Report message, in addition to routinely processing the message, it also generates a CGMP Join message to multicast to the switch. This message contains the MAC address of the host applying to join the multicast group.
- the switch After the switch receives the CGMP Join message, it adds an entry to the CAM table, including the GDA (pictured: 0100.5e01.0203), and the port number of the host applying to join the multicast group (pictured: 2) And the port number of the router connected to the switch (shown as: 1). Among them, the host port number is obtained through the USA lookup table.
- the fourth host 4 when the fourth host 4 joins the multicast group 224.1.2.3, it also sends an IGMP Membership Report (IGMP Membership Report) message to the switch, and the switch parses out that the joined group is 224.1.2.3, and uses the The corresponding MAC address 0100.5e01.0203 looks up the CAM table. The result is to find the entry and send the packet to ports 1 and 2 listed in the entry.
- IGMP Membership Report IGMP Membership Report
- router (I.e. router and host 1). After the router receives the IGMP Membership Report message, in addition to routinely processing the message, it also generates a CGMP Join message to multicast to the switch. The message contains the host applying to join the multicast group. MAC address
- the switch receives the CGMP Join report
- the GDA is used to look up the CAM table to obtain an entry, and the port number 5 of the machine 4 is obtained through the USA lookup table, and then the port number 5 is added to the entry.
- CISCO's CGMP method does not link the router's forwarding control of the Layer 2 switch with the authorized reception of the host / user, but only provides control to control the flooding of multicast packets of the Layer 2 switch on its ports. The method also does not provide a method for authenticating and authorizing users to join a multicast group. (2) The router cannot detect the "Silent Leave" of the host / user. Summary of the Invention
- An object of the present invention is to provide a controlled multicast system, which provides an implementation environment for the method for implementing controlled multicast of the present invention.
- Another object of the present invention is to provide a method for implementing controlled multicast.
- a controlled multicast system includes an Ethernet switch and a multicast router, wherein the Ethernet switch is connected to each user host in the downlink, and is connected to the multicast router in the uplink, and the multicast router A multicast router that is uplink connected to another system, The Ethernet switch completes the Layer 2 multicast exchange.
- the Ethernet switch and the user host use
- the IGMP V2 (version 2) protocol is used as a group management protocol; it is characterized in that the controlled multicast system further includes: a portal server and an AAA server connected to the multicast router, where the portal server is used for user access authentication Interface, the AAA server is used to save the user's permission to join the multicast group.
- the AAA server is configured with the address of each multicast group to which each user has the right to join.
- the multicast router works with the AAA server. Authenticate the user to join the multicast group, and issue control commands according to the authentication result to control the Ethernet switch to perform multicast forwarding.
- the multicast router and the AAA server use the RADIUS + protocol, which is an extension of the standard RADIUS protocol, as the communication protocol, and the Ethernet switch and the multicast router use the Group Management Protocol (HGMP: Huawei Group Management Protocol) as the control protocol. .
- RADIUS + protocol which is an extension of the standard RADIUS protocol
- HGMP Huawei Group Management Protocol
- the method of controlled multicast according to the present invention is implemented as follows: The method includes the following steps: first perform access authentication processing, then the Ethernet switch divides VLANs by port and processes host IGMP messages, and performs user's Identification, authentication for joining the multicast, and processing of IGMP messages by the router, and then the multicast router controls the Ethernet switch for multicast forwarding, and the HGMP protocol is used as the control protocol for controlled multicast between the two; after that, the switch Process the HGMP control message and forward the multicast stream; after the host finishes forwarding, it exits the multicast group and processes it accordingly.
- the method includes the following steps:
- (1) First perform access authentication processing When a host accesses the network, it first needs to input authentication information including a user name and password through an interface provided by the portal server, and the AAA server verifies the identity of the host through the information; After passing the authentication, the router records the user ID of the host and its corresponding vlan number in a user multicast access permission table; (2) The Ethernet switch divides the VLAN according to the port and processes the host IGMP message: The Ethernet switch divides the VLAN according to the port, each port is divided into a VLAN, and each port is connected to a host user. When the switch receives the host, When sending an IGMP message, it uses the destination MAC address of the message to look up the CAM table and forward it.
- the forwarding process is the same as that of a unicast message: that is, if the port corresponding to the destination MAC address is found, the port is clicked.
- Forwarding multicast ⁇ if the port corresponding to the destination MAC address is not found, forwarding the multicast packet to all ports;
- the AAA server decides whether to let the user join according to the service applied by the user: If the user has permission, it sends an accept message in response Otherwise, it sends a reject message to respond; the router does not perform any processing after receiving the reject message. After receiving the accept message, it writes the multicast address of the group that the user can join to the user's multicast access permission table, and joins the host.
- the packet is processed routinely by the multicast router, and then an HGMP join is generated (HGMP J oin) message is sent to the switch, the message contains the vlan number corresponding to the port connected to the host applying to join the multicast group and the multicast address requested to join, and contains the Join command domain;
- the multicast router must also The general processing of establishing a multicast forwarding tree for IGMP Membership Report messages is performed like an ordinary multicast router;
- the multicast router controls the Ethernet switch to perform multicast forwarding, and the HGMP protocol is used as the control protocol of controlled multicast between the two:
- the multicast router controls the generation and Delete, when the multicast router allows a host to join a For each group, it sends to the switch an HGMP Join message containing the VLAN number of the host applying to join the multicast group and the multicast address applying for joining.
- the multicast router wants to terminate a host to join a group, it sends The switch sends an HGMP Leave message including the VLAN number of the host that terminated the joining of the multicast group and the address of the terminated multicast group. In this way, the multicast router controls the multicast forwarding of the Ethernet switch;
- the switch processes the HGMP control message:
- the switch receives the HGMP Join message, it checks the CAM table with the MAC address corresponding to the multicast address. If it can find an entry corresponding to it, it passes the message in the message.
- vlanID looks up the table to obtain the host port number, and then adds the port number to the entry; if it cannot be found, an entry is added to the CAM table, the entry contains the MAC address corresponding to the multicast address, The port number of the host applying to join the multicast group and the port number of the router connected to the switch;
- the switch receives the HGMP Leave message, it checks the CAM table with the MAC address corresponding to the multicast address to obtain an entry, and then passes the vlanID Look up the table to obtain the host port number, and then delete the port number from the entry. If the port number is the only port of the entry, delete the entire entry;
- the host leaves the multicast group: When the host needs to leave the multicast group after completing the multicast, the host sends an IGMP Leave message to request to leave the multicast group. After receiving the leave message, the router extracts the message from the message. VlanID, and use it to find the user multicast access permission table established in step (1) to get the corresponding entry, delete the multicast address indicated by the member leave message in the entry, and complete the usual router leave for member Routine processing of messages to generate another HGMP The Leave message is sent to the switch. The message contains the VLAN number of the host that wants to leave the multicast group and the multicast address that it wants to leave, and it also contains the Leave command field.
- the multicast forwarding table and the unicast forwarding table of the Ethernet switch are shared.
- the Ethernet switch forwards the packet, if the packet is forwarded to the multicast router port, the vlan protocol is used; otherwise, the vlan protocol is not used when sending the packet to other ports.
- the multicast data packet sent by the multicast router to the switch in the step (6) above does not add a VLAN number, so as to avoid the defect of wasting bandwidth by sending one copy of data for each VLAN of different hosts on the same switch.
- the operation of the host exiting the multicast group in the above step (7) can also be implemented by the following methods: When the router learns that the user is offline, it actively sends an HGMP Leave message and stops sending multicast streams to the user.
- the specific implementation method is as follows: The procedure is the same as the IGMP Leave message.
- the controlled multicast implementation method also controls the multicast sender: When a host sends data to a multicast group, the first multicast router that receives the data uses a multicast access control list (Access Control List, Said: ACL) to filter data packets, and only the packets that meet their requirements can be forwarded to the multicast tree.
- a multicast access control list Access Control List, Said: ACL
- the multicast access control list is composed of a command word, a source address, and a group address (that is, a destination address).
- the multicast access control list is delivered to each multicast router by a centralized multicast service control server, so that the router can complete the function of controlling the sender through the multicast access control list.
- the multicast service control server It also doubles as an AAA server.
- the multicast access control list can also be delivered through a centralized policy server or network management to eliminate the inconvenience caused by the scattered configuration.
- the main advantages of the present invention are: when a user joins a multicast group, technical means of authentication and authorization are provided to ensure that only authorized users can enter the multicast group; and the one- "" correspondence relationship between the port, the user, and vlanlD, and then Coupled with user access authentication, it can be easily identified Users joining or leaving a multicast group.
- the multicast router can perform decision-making active control on the multicast forwarding function of the layer 2 switch, and can also send its control strategy to the Ethernet switch, which better solves the problem of controlling the IP multicast service.
- the host leaves the multicast group without sending an IGMP Leave for example, when the multicast application terminates abnormally, the user can also actively stop the user's group membership by going offline.
- the introduction of the control method of the present invention does not affect its forwarding efficiency. Therefore, the present invention has a good application prospect.
- Figure 1 is a schematic diagram of the CGMP message format currently used.
- Figure 2 is a schematic diagram of the signal flow of host 1 when it joins the multicast group 224.1.2.3 for the first time in the working process of CGMP.
- Figure 3 is a schematic diagram of the signal flow of the second host joining the multicast group 224.1.2.3 during the CGMP operation.
- FIG. 4 is a schematic diagram of a system composition structure of a controlled multicast system according to the present invention.
- FIG. 5 is a schematic diagram of a signal flow when the host 1 performs access authentication in the controlled multicast of the present invention.
- Figure 6 is a schematic diagram of the signal flow of the first host in the controlled multicast of the present invention to join the multicast group 224.1.2.3
- FIG. 7 is a schematic diagram of the signal flow direction of the second host in the controlled multicast of the present invention to join the multicast group 224.1.2.3.
- FIG. 8 is a schematic diagram of a signal flow of a multicast stream forwarded by a router in a controlled multicast according to the present invention.
- FIG. 9 is a schematic diagram of the signal flow of the host 1 leaving the multicast group 224.1.2.3 in the controlled multicast of the present invention.
- FIG. 10 is a schematic diagram of a centralized control scheme in a controlled multicast system of the present invention. Mode of Carrying Out the Invention
- the present invention is a controlled multicast system, which includes an Ethernet switch 1 and a multicast router 2, wherein the Ethernet switch 1 is connected to each user host in the downlink, and is connected to the multicast router 2 in the uplink.
- the multicast router 2 is uplink connected to the multicast router 5 of other systems.
- the Ethernet switch 1 completes Layer 2 multicast exchange.
- the Ethernet switch and the user host use the IGMP V2 (version 2) protocol as the group management protocol.
- the multicast system further includes: a portal server 3 and an AAA server 4 connected to the multicast router 2, where the portal server 3 is used as an interface for user access authentication, and the AAA server 4 is used to save a user's permission to join a multicast group It is configured that the multicast router 1 and the AAA server 4 have a client-server structure.
- the multicast router 2 cooperates with the AAA server 4 to complete the authorization authentication of the user to join the multicast group, and sends a control command according to the authentication result. Control Ethernet switch 1 for multicast forwarding.
- the multicast router 2 and the AAA server 4 of the present invention use the RADIUS + protocol extended to the standard RADIUS protocol as the communication protocol, and the group management protocol HGMP is used as the control protocol between the Ethernet switch 1 and the multicast router 2.
- the AAA server is the authentication server.
- the right side of the AAA server in the figure The user ID in the box indicates the user name entered during user authentication, and the group (group) indicates the address of the multicast group to which the user joins.
- An Ethernet switch (LAN Switch) divides VLANs according to ports, and each port is connected to a user. Among them, port 1 is connected to the multicast router, and ports 2-5 are connected to host users 1 to 4 respectively.
- the multicast router After passing the authentication, the multicast router records the user ID of host 1 (that is, host 1) and the corresponding VLAN. Number 6: vlan l (here it is assumed that the user name in the user host 1 account is host 1).
- host 1 when host 1 wants to join a multicast group (assuming it is a 224 ⁇ 2.3 group), it sends an IGMP Membership Report message to join the multicast group 224.1.2.3, and the Switching Engine uses the information from the message.
- the destination MAC address 0100.5e01.0203 looks up the CAM table. Because there is no match in the CAM table, the packet is forwarded to all ports, including the CPU and the router. The packet forwarded to the router is added with the VLAN number according to the receiving port. (For host 1, this is vlanl).
- the router After receiving the IGMP Membership Report message, the router extracts the vlanID: vlan 1 in the message, and uses it to look up the table to obtain the UserlD of the corresponding user: host 1, and then uses the found UserlD as the user name and the group to which the host is to join
- the broadcast address (224.1.2.3) is an attribute, and an extended RADIUS authentication packet is sent to the AAA server for authentication, and the AAA server decides whether to let the user join according to the service applied by the user. If the user has permission, send an accept message in response, otherwise send a reject message in response. After receiving the reject message, the router does not perform any processing.
- the router After receiving the accept message, the router writes the multicast address of the group that the user can join into the user's multicast access permission table, and sends the join message to the host as a normal router's routine forwarding. Processing, and then generating an HGMP Join message and sending it to the switch, the message contains the vlan number of the host applying to join the multicast group: vlan 1 and the multicast address applying to join: 224.1.2.3, and contains the Join command domain.
- the switch When the switch receives the HGMP Join message, it adds an entry in the CAM table, which contains the MAC address corresponding to the multicast address (224.1.2.3): 0100.5e01.0203. Port number: 2, and the port number of the router connected to the switch: 1. The host port number is obtained by looking up the vlanID table.
- the router After receiving the IGMP Membership Report message, the router extracts the vlanID: vlan 4 in the message, and uses it to look up the table to obtain the UserlD of the corresponding user: host 4, and then uses the found UserlD as the user name and the
- the multicast address (224.1.2.3) is an attribute, and sends an extended RADIUS authentication packet to the AAA server for authentication.
- the AAA server decides whether to let the user join according to the service applied by the user. If the user has permission, send an accept message in response, otherwise send a reject message in response. After receiving the reject message, the router does not perform any processing.
- the router After receiving the accept message, the router writes the multicast address of the group that the user can join into the user's multicast access permission table, and uses the normal router routine for the message that the host joins. Then, a HGMP Join message is generated and sent to the switch.
- the message contains the VLAN number of the host applying to join the multicast group: vlan 4 and the multicast address applying to join: 224.1.2.3, and contains the Join command domain.
- the switch When the switch receives the HGMP Join message, it uses the MAC address (0100.5e01.0203) corresponding to its multicast address (224.1.2.3) to search the CAM table. Because the first host 1 in the step described in FIG. 6 After joining the 224.1.2.3 group, there is already an entry in the CAM table. This query will get the same entry that matches the last time. The host port number is obtained by looking up the table with vlanID: 5, and then the port Number 5 is added to the entry.
- the router When the router receives the multicast stream from the multicast source, it forwards the multicast stream to the port according to the forwarding table. Because the router establishes a multicast forwarding exit based on the actual port of the switch instead of the vlan number when processing the IGMP Membership Report message from the host, a switch connected to the router has only one exit in the multicast forwarding table, and the multicast stream Only one copy (COPY) is sent to the switch, and no multicast ID is added to the multicast data packet.
- COPY multicast stream Only one copy
- N02 / 00596 is an upward arrow from host 1.
- the switching engine uses its destination MAC address 0100.5e01.0203 to look up the CAM table, finds the entry, and sends the message to the port listed in this entry: 1 and 5 (ie: router and host 4).
- the router After receiving the leave message from its members, the router extracts vlanID: vlan l in the message, and looks up the table to obtain the corresponding entry, and deletes the multicast address 224.1 indicated by the member leave message in the entry. 2.3, as shown in FIG.
- the switch When the switch receives the HGMP Leave message, it uses the MAC address 0100.5e01.0203 corresponding to the multicast address 224.1.2.3 to look up the CAM table to obtain an entry, and then uses the vlanID lookup table to obtain the port number of the host that sent the IGMP Leave message. : 2, then delete the port number 2 from the entry.
- the above steps are specific operation steps for controlling multicast members in the method for implementing controlled multicast according to the present invention.
- the method for implementing the present invention also performs related control on the multicast sender, see FIG. 10.
- the host the source (IDC) in FIG. 10
- the first multicast router that receives the data will first download the multicast access control list (Access) through the multicast service control server.
- Control List ACL for short
- a multicast access control list consists of a command word, a source address, and a group address (also a destination address).
- a centralized multicast service control server is usually used to complete the delivery of the multicast access control list to each multicast router, and these multicast routers control the function of the sender.
- the service control server also doubles as an AAA server, and of course, it can also issue a multicast access control list through a centralized policy server or network management.
- the multicast system and its implementation method of the present invention have been experimentally implemented on several devices developed by the applicant, and the results of these tests are successful, achieving the inventive purpose of controlling the multicast.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Accounting & Taxation (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Small-Scale Networks (AREA)
- Mobile Radio Communication Systems (AREA)
Description
Claims
Priority Applications (5)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
DE60231556T DE60231556D1 (de) | 2002-01-30 | 2002-08-28 | System und implementierungsverfahren für gesteuertes multicast |
AU2002330421A AU2002330421B2 (en) | 2002-01-30 | 2002-08-28 | System and implementation method of controlled multicast |
JP2003565135A JP3845086B2 (ja) | 2002-01-30 | 2002-08-28 | 制御されたマルチキャストのシステム及び実行方法 |
EP02764488A EP1480405B1 (en) | 2002-01-30 | 2002-08-28 | System and implementation method of controlled multicast |
US10/502,543 US7680884B2 (en) | 2002-01-30 | 2002-08-28 | System and implementation method of controlled multicast |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNB021004455A CN1192574C (zh) | 2002-01-30 | 2002-01-30 | 受控组播的系统及其实现方法 |
CN02100445.5 | 2002-01-30 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2003065677A1 true WO2003065677A1 (fr) | 2003-08-07 |
Family
ID=4739369
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2002/000596 WO2003065677A1 (fr) | 2002-01-30 | 2002-08-28 | Systeme et procede de mise en application de multidiffusion commandee |
Country Status (9)
Country | Link |
---|---|
US (1) | US7680884B2 (zh) |
EP (2) | EP1480405B1 (zh) |
JP (1) | JP3845086B2 (zh) |
CN (1) | CN1192574C (zh) |
AT (1) | ATE425621T1 (zh) |
AU (1) | AU2002330421B2 (zh) |
DE (1) | DE60231556D1 (zh) |
RU (1) | RU2282945C2 (zh) |
WO (1) | WO2003065677A1 (zh) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1715628A4 (en) * | 2004-03-24 | 2007-03-21 | Huawei Tech Co Ltd | METHOD FOR IMPLEMENTING A SELECTIVE BROADCAST SERVICE |
US8155137B2 (en) * | 2005-04-18 | 2012-04-10 | France Telecom | Method and system for transmitting a multicast stream over a data exchange network |
Families Citing this family (85)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7281263B1 (en) * | 2001-02-23 | 2007-10-09 | Sprint Communications Company L.P. | System and method for managing security access for users to network systems |
EP1376926B1 (en) * | 2002-06-25 | 2007-03-21 | Alcatel | Method and device for data broadcasting in third generation networks |
WO2004043019A1 (ja) * | 2002-11-05 | 2004-05-21 | Fujitsu Limited | ネットワーク中継方法及び装置 |
US7233987B2 (en) * | 2002-12-20 | 2007-06-19 | Alcatel Canada Inc. | System and method for converting requests between different multicast protocols in a communication network |
US7516487B1 (en) | 2003-05-21 | 2009-04-07 | Foundry Networks, Inc. | System and method for source IP anti-spoofing security |
US7523485B1 (en) * | 2003-05-21 | 2009-04-21 | Foundry Networks, Inc. | System and method for source IP anti-spoofing security |
US20040255154A1 (en) * | 2003-06-11 | 2004-12-16 | Foundry Networks, Inc. | Multiple tiered network security system, method and apparatus |
US8555352B2 (en) | 2003-06-20 | 2013-10-08 | Juniper Networks, Inc. | Controlling access nodes with network transport devices within wireless mobile networks |
US7746799B2 (en) | 2003-06-20 | 2010-06-29 | Juniper Networks, Inc. | Controlling data link layer elements with network layer elements |
CN100346605C (zh) * | 2003-06-26 | 2007-10-31 | 华为技术有限公司 | 一种组播源控制的方法和系统 |
US7876772B2 (en) | 2003-08-01 | 2011-01-25 | Foundry Networks, Llc | System, method and apparatus for providing multiple access modes in a data communications network |
US7735114B2 (en) * | 2003-09-04 | 2010-06-08 | Foundry Networks, Inc. | Multiple tiered network security system, method and apparatus using dynamic user policy assignment |
US7774833B1 (en) * | 2003-09-23 | 2010-08-10 | Foundry Networks, Inc. | System and method for protecting CPU against remote access attacks |
GB2406462A (en) * | 2003-09-25 | 2005-03-30 | Nokia Corp | Multicasting apparatus |
CN1286297C (zh) * | 2003-09-25 | 2006-11-22 | 华为技术有限公司 | 一种实现用户位置标识传递的方法 |
US20050080901A1 (en) * | 2003-10-14 | 2005-04-14 | Reader Scot A. | Method and apparatus for controlling access to multicast data streams |
US8528071B1 (en) | 2003-12-05 | 2013-09-03 | Foundry Networks, Llc | System and method for flexible authentication in a data communications network |
KR100523490B1 (ko) * | 2003-12-17 | 2005-10-24 | 한국전자통신연구원 | 이더넷 기반 수동형 광가입자망에서의 멀티캐스트 서비스지원 방법 |
CN100454888C (zh) * | 2004-03-06 | 2009-01-21 | 鸿富锦精密工业(深圳)有限公司 | 组播流量控制管理方法 |
KR100594737B1 (ko) * | 2004-05-04 | 2006-06-30 | 삼성전자주식회사 | 공인 아이피 주소가 필요 없는 네트워크 시스템 및 시스템설정 방법 |
JP4533247B2 (ja) * | 2004-06-08 | 2010-09-01 | キヤノン株式会社 | サービス提供システム、サービス提供方法及びサービス提供装置 |
JP4516397B2 (ja) * | 2004-10-05 | 2010-08-04 | 株式会社日立製作所 | レイヤ2スイッチ |
CN100426787C (zh) * | 2004-12-17 | 2008-10-15 | 中兴通讯股份有限公司 | 以太网交换机动态发现组播路由器的方法 |
WO2006087472A1 (fr) * | 2005-02-18 | 2006-08-24 | France Telecom | Procede et equipements de controle d'acces a des flux ip multicast |
DE602006016251D1 (de) * | 2005-03-29 | 2010-09-30 | Lg Electronics Inc | Verfahren zum senden und empfangen von steuerinformationen für einen punkt-zu-mehrpunkt-multimedia-multicast-dienst |
CN1848728B (zh) * | 2005-04-14 | 2010-09-01 | 中国科学院声学研究所 | 一种基于ip网络的组播数据受控方法 |
CN100384124C (zh) * | 2005-04-30 | 2008-04-23 | 杭州华三通信技术有限公司 | 为局域网接入用户提供网络电视服务的方法及系统 |
CN100442723C (zh) * | 2005-06-30 | 2008-12-10 | 华为技术有限公司 | 监控组播用户的装置及实现方法 |
FR2889390A1 (fr) * | 2005-07-29 | 2007-02-02 | France Telecom | Mesure d'audience de flux ip multicast |
US8503446B2 (en) | 2005-08-29 | 2013-08-06 | Alcatel Lucent | Multicast host authorization tracking, and accounting |
CN100463447C (zh) * | 2005-08-31 | 2009-02-18 | 杭州华三通信技术有限公司 | 控制组播数据转发的交换设备及方法 |
CN1863153B (zh) * | 2005-10-09 | 2010-09-29 | 华为技术有限公司 | 以太网支持源特定组播转发的方法及其设备 |
CN100463449C (zh) * | 2005-10-21 | 2009-02-18 | 中兴通讯股份有限公司 | 一种用于宽带接入设备的组播快速加入方法 |
US7843845B2 (en) * | 2005-11-28 | 2010-11-30 | Alcatel Lucent | Diagnostic tool and method for troubleshooting multicast connectivity flow problem(s) in a layer 2 aggregation network |
CN1801711B (zh) * | 2006-01-18 | 2011-03-23 | 杭州华三通信技术有限公司 | 一种组播组成员认证方法和装置 |
KR100808188B1 (ko) * | 2006-03-23 | 2008-03-03 | 엘지전자 주식회사 | 멀티캐스팅 기능을 가진 이동통신 단말기 및 이를 이용한멀티캐스팅 방법 |
CN100420240C (zh) * | 2006-03-30 | 2008-09-17 | 华为技术有限公司 | 一种组播权限控制方法 |
US7953089B1 (en) * | 2006-05-16 | 2011-05-31 | Cisco Technology, Inc. | Systems and methods for multicast switching in a private VLAN |
CN101087246B (zh) * | 2006-06-08 | 2011-04-20 | 中国电信股份有限公司 | 一种实现网络层组播业务及业务管理的系统与方法 |
CN101119290B (zh) * | 2006-08-01 | 2011-06-01 | 华为技术有限公司 | 以太网支持源特定组播转发的方法及系统 |
CN102694666B (zh) * | 2006-08-15 | 2015-01-28 | 华为技术有限公司 | 一种组播业务处理方法以及设备 |
US8681779B2 (en) * | 2006-09-01 | 2014-03-25 | Alcatel Lucent | Triple play subscriber and policy management system and method of providing same |
CN101155046B (zh) * | 2006-09-25 | 2011-06-22 | 华为技术有限公司 | 实现组播控制的网络控制系统和方法 |
US20080175239A1 (en) * | 2007-01-23 | 2008-07-24 | Yipes Enterprise Services, Inc | Multicast wide-area network for distributing data to selected destinations with limited or no replication |
US8392593B1 (en) | 2007-01-26 | 2013-03-05 | Juniper Networks, Inc. | Multiple control channels for multicast replication in a network |
CN101247549B (zh) * | 2007-02-16 | 2012-06-27 | 华为技术有限公司 | 组播方法和组播系统以及组播设备 |
JP4773387B2 (ja) * | 2007-03-19 | 2011-09-14 | 株式会社日立製作所 | ネットワークシステム |
US8238337B1 (en) * | 2007-04-03 | 2012-08-07 | Marvell Isreal Ltd. (M.I.S.L.) | Hybrid multicast switch employing network-layer routing |
CN101312400B (zh) * | 2007-05-25 | 2011-03-30 | 上海大亚科技有限公司 | 四以太网口调制解调器设备上实现igmp侦听功能的方法 |
CN101321073B (zh) * | 2007-06-04 | 2010-09-08 | 华为技术有限公司 | 一种组播业务授权控制的方法及装置 |
US8203943B2 (en) * | 2007-08-27 | 2012-06-19 | Cisco Technology, Inc. | Colored access control lists for multicast forwarding using layer 2 control protocol |
CN101394277A (zh) * | 2007-09-17 | 2009-03-25 | 华为技术有限公司 | 实现组播认证的方法和装置 |
EP2213042A1 (en) | 2007-10-15 | 2010-08-04 | Media Patents, S. L. | Method for managing multicast traffic in a data network and network equipment using said method |
US8295300B1 (en) * | 2007-10-31 | 2012-10-23 | World Wide Packets, Inc. | Preventing forwarding of multicast packets |
CN101202715B (zh) * | 2007-11-27 | 2012-02-22 | 杭州华三通信技术有限公司 | 组播权限自动部署方法和装置 |
CN101459595B (zh) * | 2007-12-14 | 2012-05-23 | 华为技术有限公司 | 识别最后一跳交换机的方法、交换机及组播设备 |
US9031068B2 (en) | 2008-02-01 | 2015-05-12 | Media Patents, S.L. | Methods and apparatus for managing multicast traffic through a switch |
WO2009095041A1 (en) * | 2008-02-01 | 2009-08-06 | Soporte Multivendor S.L. | Method for managing multicast traffic through a switch operating in the layer 2 of the osi model, and router and switch involved in said method |
WO2009109684A1 (es) | 2008-03-05 | 2009-09-11 | Media Patents, S. L. | Procedimiento para monitorizar o gestionar equipos conectados a una red de datos |
WO2009151750A1 (en) * | 2008-04-03 | 2009-12-17 | Telcordia Technologies, Inc. | A formal language for multicast communication |
CN101291240B (zh) * | 2008-06-19 | 2010-08-25 | 杭州华三通信技术有限公司 | 一种组播流传输方法和系统 |
US8612559B2 (en) * | 2008-12-10 | 2013-12-17 | Cisco Technology, Inc. | Central controller for coordinating multicast message transmissions in distributed virtual network switch environment |
CN101442793B (zh) * | 2008-12-30 | 2010-09-29 | 杭州华三通信技术有限公司 | 无线网络接入方法、装置和系统 |
CN101873658A (zh) * | 2009-04-21 | 2010-10-27 | 华为技术有限公司 | 移动组播切换的方法和设备 |
CN101635724A (zh) * | 2009-06-30 | 2010-01-27 | 中兴通讯股份有限公司 | 一种实现组播成员认证的方法及系统 |
US8275891B2 (en) * | 2009-07-20 | 2012-09-25 | At&T Intellectual Property I, L.P. | Method and apparatus for social networking in a dynamic environment |
CN101651553B (zh) * | 2009-09-03 | 2013-02-27 | 华为技术有限公司 | 用户侧组播业务主备保护系统、方法及路由设备 |
JP5569057B2 (ja) * | 2010-03-15 | 2014-08-13 | ヤマハ株式会社 | 通信システム、スイッチングハブ、およびルータ |
CN101841485B (zh) * | 2010-05-28 | 2013-04-24 | 华为技术有限公司 | 组播流量分担的方法及相关装置 |
US8849989B2 (en) * | 2010-10-22 | 2014-09-30 | Telefonaktiebolaget L M Ericsson (Publ) | Mechanism for tracking host participation in multicast groups |
CN102202001A (zh) * | 2011-06-15 | 2011-09-28 | 中国电信股份有限公司 | 用户带宽动态调整的方法、系统和宽带网络网关 |
WO2013000165A1 (en) * | 2011-06-30 | 2013-01-03 | France Telecom Research & Development Beijing Company Limited | Data routing |
US8887222B2 (en) * | 2011-09-14 | 2014-11-11 | Qualcomm Incorporated | Multicasting in a wireless display system |
CN102333099B (zh) * | 2011-10-27 | 2014-09-10 | 杭州华三通信技术有限公司 | 一种安全控制方法和设备 |
CN102368707B (zh) * | 2011-10-31 | 2013-06-12 | 华为技术有限公司 | 一种组播控制的方法、设备及系统 |
CN102594818A (zh) * | 2012-02-15 | 2012-07-18 | 北京星网锐捷网络技术有限公司 | 网络访问权限控制方法、装置及相关设备 |
US20160192403A1 (en) * | 2014-12-30 | 2016-06-30 | Qualcomm Incorporated | Mechanism to provide lte voice, internet and embms services over ethernet for connected home architecture |
CN107885573B (zh) * | 2016-09-29 | 2021-09-14 | 华为技术有限公司 | 一种数据流量的控制方法、控制器及数据中心系统 |
RU175729U1 (ru) * | 2017-05-25 | 2017-12-15 | Общество с ограниченной ответственностью "БУЛАТ" | Мультисервисный маршрутизатор |
US11153145B2 (en) * | 2017-06-07 | 2021-10-19 | Arista Networks, Inc. | System and method of a centralized gateway that coordinates between multiple external controllers without explicit awareness |
US11018886B1 (en) * | 2018-09-20 | 2021-05-25 | Cisco Technology, Inc. | Methods and apparatus for selectively filtering an IP multicast data stream for selected group members of a multicast group |
RU186859U1 (ru) * | 2018-11-21 | 2019-02-06 | Общество с ограниченной ответственностью "БУЛАТ" | Мультисервисный маршрутизатор |
US11277276B2 (en) | 2019-05-31 | 2022-03-15 | Nxp Usa, Inc. | Multicast processing for neighbor discovery proxy devices using hardware filtering |
US11683262B2 (en) * | 2019-11-26 | 2023-06-20 | Cisco Technology, Inc. | Group-based policies for inter-domain traffic |
CN112202814B (zh) * | 2020-11-04 | 2022-02-08 | 中国电子科技集团公司第三十研究所 | 一种路由交换设备内生安全动态防护功能的处理方法 |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP0887982A2 (en) * | 1997-06-23 | 1998-12-30 | Sun Microsystems, Inc. | Method and system for secure distribution of cryptographic keys on multicast networks |
WO2000062480A2 (en) * | 1999-04-13 | 2000-10-19 | Nortel Networks, Inc. | Apparatus and method for transmitting messages across different multicast domains |
US6275859B1 (en) * | 1999-10-28 | 2001-08-14 | Sun Microsystems, Inc. | Tree-based reliable multicast system where sessions are established by repair nodes that authenticate receiver nodes presenting participation certificates granted by a central authority |
Family Cites Families (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6041166A (en) * | 1995-07-14 | 2000-03-21 | 3Com Corp. | Virtual network architecture for connectionless LAN backbone |
US5684800A (en) * | 1995-11-15 | 1997-11-04 | Cabletron Systems, Inc. | Method for establishing restricted broadcast groups in a switched network |
US5968126A (en) * | 1997-04-02 | 1999-10-19 | Switchsoft Systems, Inc. | User-based binding of network stations to broadcast domains |
US6331983B1 (en) * | 1997-05-06 | 2001-12-18 | Enterasys Networks, Inc. | Multicast switching |
US6307837B1 (en) * | 1997-08-12 | 2001-10-23 | Nippon Telegraph And Telephone Corporation | Method and base station for packet transfer |
US6035405A (en) | 1997-12-22 | 2000-03-07 | Nortel Networks Corporation | Secure virtual LANs |
US6839348B2 (en) * | 1999-04-30 | 2005-01-04 | Cisco Technology, Inc. | System and method for distributing multicasts in virtual local area networks |
US6870842B1 (en) * | 1999-12-10 | 2005-03-22 | Sun Microsystems, Inc. | Using multicasting to provide ethernet-like communication behavior to selected peers on a network |
US20020091926A1 (en) * | 2001-01-10 | 2002-07-11 | The Furukawa Electric Co., Ltd. | Multicast authentication method, multicast authentication server, network interconnection apparatus and multicast authentication system |
JP2002290458A (ja) * | 2001-03-26 | 2002-10-04 | Fujitsu Ltd | マルチキャストシステム |
US7194622B1 (en) * | 2001-12-13 | 2007-03-20 | Cisco Technology, Inc. | Network partitioning using encryption |
US7263610B2 (en) * | 2002-07-30 | 2007-08-28 | Imagictv, Inc. | Secure multicast flow |
-
2002
- 2002-01-30 CN CNB021004455A patent/CN1192574C/zh not_active Expired - Lifetime
- 2002-08-28 EP EP02764488A patent/EP1480405B1/en not_active Expired - Lifetime
- 2002-08-28 JP JP2003565135A patent/JP3845086B2/ja not_active Expired - Lifetime
- 2002-08-28 EP EP20080013732 patent/EP1986396B1/en not_active Expired - Lifetime
- 2002-08-28 AU AU2002330421A patent/AU2002330421B2/en not_active Expired
- 2002-08-28 US US10/502,543 patent/US7680884B2/en active Active
- 2002-08-28 DE DE60231556T patent/DE60231556D1/de not_active Expired - Fee Related
- 2002-08-28 WO PCT/CN2002/000596 patent/WO2003065677A1/zh active Application Filing
- 2002-08-28 RU RU2004126668A patent/RU2282945C2/ru active
- 2002-08-28 AT AT02764488T patent/ATE425621T1/de not_active IP Right Cessation
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP0887982A2 (en) * | 1997-06-23 | 1998-12-30 | Sun Microsystems, Inc. | Method and system for secure distribution of cryptographic keys on multicast networks |
WO2000062480A2 (en) * | 1999-04-13 | 2000-10-19 | Nortel Networks, Inc. | Apparatus and method for transmitting messages across different multicast domains |
US6275859B1 (en) * | 1999-10-28 | 2001-08-14 | Sun Microsystems, Inc. | Tree-based reliable multicast system where sessions are established by repair nodes that authenticate receiver nodes presenting participation certificates granted by a central authority |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1715628A4 (en) * | 2004-03-24 | 2007-03-21 | Huawei Tech Co Ltd | METHOD FOR IMPLEMENTING A SELECTIVE BROADCAST SERVICE |
US7830825B2 (en) | 2004-03-24 | 2010-11-09 | Huawei Technologies Co., Ltd. | Method for realizing the multicast service |
US8155137B2 (en) * | 2005-04-18 | 2012-04-10 | France Telecom | Method and system for transmitting a multicast stream over a data exchange network |
Also Published As
Publication number | Publication date |
---|---|
RU2282945C2 (ru) | 2006-08-27 |
JP2005516544A (ja) | 2005-06-02 |
EP1986396A2 (en) | 2008-10-29 |
RU2004126668A (ru) | 2006-02-10 |
EP1480405A4 (en) | 2006-08-16 |
EP1986396B1 (en) | 2013-04-03 |
ATE425621T1 (de) | 2009-03-15 |
EP1986396A3 (en) | 2008-11-05 |
EP1480405B1 (en) | 2009-03-11 |
CN1192574C (zh) | 2005-03-09 |
US20050091313A1 (en) | 2005-04-28 |
JP3845086B2 (ja) | 2006-11-15 |
US7680884B2 (en) | 2010-03-16 |
EP1480405A1 (en) | 2004-11-24 |
AU2002330421B2 (en) | 2006-05-25 |
DE60231556D1 (de) | 2009-04-23 |
CN1414759A (zh) | 2003-04-30 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2003065677A1 (fr) | Systeme et procede de mise en application de multidiffusion commandee | |
JP3864312B2 (ja) | 802.1xプロトコルベースマルチキャスト制御方法 | |
US8203943B2 (en) | Colored access control lists for multicast forwarding using layer 2 control protocol | |
US8028324B2 (en) | Method for transmitting policy information between network equipment | |
JP4002380B2 (ja) | マルチキャストシステム、認証サーバ端末、マルチキャスト受信者端末管理方法、並びに記録媒体 | |
US20050080901A1 (en) | Method and apparatus for controlling access to multicast data streams | |
US20080232368A1 (en) | Network system | |
US20110167482A1 (en) | Secure authentication advertisement protocol | |
JP2004135281A (ja) | 安定したマルチキャストフロー | |
WO2004114619A1 (fr) | Procede et systeme pour commander une source de diffusion selective | |
JP2005516544A5 (zh) | ||
WO2009036685A1 (fr) | Procédé et appareil pour implémenter une authentification de multidiffusion | |
WO2008098506A1 (fr) | Procédé, système et dispositif de multidiffusion | |
WO2008052475A1 (fr) | Procédé, système et dispositif pour une authentification de multidiffusion | |
US9065669B2 (en) | Method and apparatus for authorizing multicast forwarding states | |
CN100414933C (zh) | 基于ppp协议的组播业务的实现方法及装置 | |
Ishikawa et al. | An architecture for user authentication of IP multicast and its implementation | |
CN1848728B (zh) | 一种基于ip网络的组播数据受控方法 | |
CN110138796A (zh) | 组播控制方法和装置 | |
CN100563157C (zh) | 组播服务节点的受控认证方法 | |
Sun et al. | A stateful multicast access control mechanism for future metro‐area‐networks | |
JP2004086532A (ja) | Ipマルチキャスト通信システムにおけるセッション制御方法、セッション制御プログラムおよびセッション制御プログラムを記録した記録媒体 | |
US8966100B1 (en) | System, device, and method for distributing access control information in a communication system | |
JP2004180023A (ja) | データ中継方法、データ中継装置およびその装置を用いたデータ中継システム |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CO CR CU CZ DE DK DM DZ EC EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ OM PH PL PT RO RU SD SE SG SI SK SL TJ TM TN TR TT TZ UA UG US UZ VN YU ZA ZM ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR IE IT LU MC NL PT SE SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
WWE | Wipo information: entry into national phase |
Ref document number: 10502543 Country of ref document: US Ref document number: 2002330421 Country of ref document: AU |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2003565135 Country of ref document: JP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2002764488 Country of ref document: EP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2004126668 Country of ref document: RU |
|
WWP | Wipo information: published in national office |
Ref document number: 2002764488 Country of ref document: EP |