WO2007009367A1 - Méthode de détection de doublons d’adresse dans un réseau d’accès deux couches ipv6 et système pour celle-ci - Google Patents

Méthode de détection de doublons d’adresse dans un réseau d’accès deux couches ipv6 et système pour celle-ci Download PDF

Info

Publication number
WO2007009367A1
WO2007009367A1 PCT/CN2006/001708 CN2006001708W WO2007009367A1 WO 2007009367 A1 WO2007009367 A1 WO 2007009367A1 CN 2006001708 W CN2006001708 W CN 2006001708W WO 2007009367 A1 WO2007009367 A1 WO 2007009367A1
Authority
WO
WIPO (PCT)
Prior art keywords
address
network
user
request message
network node
Prior art date
Application number
PCT/CN2006/001708
Other languages
English (en)
Chinese (zh)
Inventor
Haibo Wen
Renxiang Yan
Yinglan Jiang
Fanxiang Bin
Original Assignee
Alcatel
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alcatel filed Critical Alcatel
Publication of WO2007009367A1 publication Critical patent/WO2007009367A1/fr

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L61/00Network arrangements, protocols or services for addressing or naming
    • H04L61/50Address allocation
    • H04L61/5046Resolving address allocation conflicts; Testing of addresses
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L61/00Network arrangements, protocols or services for addressing or naming
    • H04L61/59Network arrangements, protocols or services for addressing or naming using proxies for addressing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2101/00Indexing scheme associated with group H04L61/00
    • H04L2101/60Types of network addresses
    • H04L2101/618Details of network addresses
    • H04L2101/659Internet protocol version 6 [IPv6] addresses

Definitions

  • the present invention relates to an IPv6 technology, and in particular to an Ipv6 duplicate address detection method in a Layer 2 access network. Background technique
  • IPv6 has become more mature, and the network will evolve from an IPv4 network to an IPv6 network.
  • IPv4 network because the address is a scarce resource, the address allocation in the access network is strictly controlled. Usually, a shared address pool is maintained at the access device or the BRAS (Broadband Remote Access Server), as needed. Perform address assignment. IPv6 brings a huge address space that allows every grain of sand on the planet to have an IPv6 address, so every device in the user's network can have a globally addressable address. Address assignment in IPv6 can be divided into two broad categories: stateful address assignment based on DHCPv6 (Dynamic Host Configuration Protocol) and stateless address assignment.
  • DHCPv6 Dynamic Host Configuration Protocol
  • the former can strictly control address allocation.
  • the stateless address assignment is that the host or the terminal obtains a 64-bit prefix by using the RA (Router Advertisement) message obtained from the router, and then attaches the host identifier (Interface identifier) that received the RA message to obtain 128 bits.
  • IPv6 address The RFC standard requires that before an IPv6 unicast address is assigned to an interface (which we used to call a tentative address), DAD (Duplicate Address Detection) detection must be performed in a subnet sharing the same prefix space. To ensure the uniqueness of the tentative address in the subnet. DAD detection is implemented by NS message (neighbor request: Neighbor Solicitation) and NA message (neighbor advertisement: Neighbor Advertisement) mechanism.
  • the structure of the Layer 2 network access system is shown.
  • the network access equipment DSLAM (Digital Subscriber Line Access Multiplexer) 12 and CPE (Client Device) usually work at the second layer.
  • IPv6 is supported, and there are multiple prefix allocation methods, such as: one user network has a unique prefix, or multiple user networks share a prefix.
  • prefix space has a 64-bit address space, that is, a user network has 2 64 addresses, and the equipment of the user network may be much smaller than this number. This scheme makes the address utilization quite low.
  • multiple user networks share one A 64-bit prefix, that is, sharing the same address space, can avoid address space waste and address fragmentation, and is convenient for network user management.
  • DAD detection needs to be completed in the shared domain.
  • DAD detection method There is currently a lack of a mature DAD detection method when multiple user networks share a prefix.
  • the most straightforward method is to enable these messages to directly enter other user networks sharing the same prefix according to the standard DAD mechanism, that is, the DAD-related messages (such as NS messages, NA messages) are identified by the Layer 2 access device, and then These messages are forwarded to other user networks sharing the same prefix, and the network nodes in their user networks respond to the message.
  • DFM Direct Flooding Method
  • the DFM method may cause many problems between different user networks sharing prefixes, such as network security: DAD denial of service attacks, one of a user network. A malicious host or terminal responds to each NS message from another user network.
  • the purpose of the present invention is to implement a secure cross-user network address repeat detection when a plurality of user networks share a prefix under the same Layer 2 access device in an IPv6 access network.
  • One of the objectives of the present invention is to provide a method for detecting a duplicate address of a Layer 2 network access device.
  • the network access device is connected to a plurality of user networks through its user interface, and a plurality of user networks share a network prefix.
  • the method comprises the steps of: a) receiving step: receiving a network node neighbor request message from the user network, and acquiring a tentative address included in the neighbor request message; b) determining step: determining whether the tentative address is shared by the network prefix user The network node in the network uses; c:), the decision step: If the tentative address has been allocated for use, construct a corresponding neighbor advertisement message, notify the generation of the The network node of the neighbor request message may not use the tentative address; otherwise, the network node tentative address configuration information is saved.
  • step C if the tentative address has been used by other network nodes in the user network initiating the neighbor request message, the neighbor request message is ignored.
  • step C) before saving the tentative address configuration information of the network node, waiting for a certain time and detecting whether another network node requests the same tentative address, if there is a neighbor request message with the same tentative address, A corresponding neighbor advertisement message is constructed to notify the two network nodes that generated the tentative address neighbor request message that the address is unusable.
  • a further object of the present invention is to provide a Layer 2 network access device for IPv6 user access, comprising a plurality of user interface units, respectively connected to a plurality of user networks through a client device connected thereto, and receiving a network from a user network.
  • a node neighbor request message the user network sharing a network prefix
  • the network access device comprises: a duplicate address detection proxy unit: obtaining a tentative address included in a neighbor request message of each user interface unit, and determining the tentative address Whether it is used by the network node in the user network sharing the network prefix. If the tentative address has been allocated for use, construct a corresponding neighbor advertisement message to notify the network node that generated the neighbor request message that the tentative address is unavailable, otherwise, save the Network node tentative address configuration information.
  • the duplicate address detection proxy unit finds that the tentative address has been used by other network nodes in the user network that initiated the neighbor request message, and the network access device ignores the neighbor request message.
  • a further object of the present invention is to provide an IPv6 user access system, including a plurality of user networks, a Layer 2 network access device, and a broadband access server, where a plurality of user networks are connected to a Layer 2 network access device through a client device and share a a network prefix, characterized in that: the network node in the user network generates a neighbor request message for repeated address detection; the layer 2 network access device intercepts the network node neighbor request message from different user networks, if the neighbor request message is temporarily The fixed address is assigned to the network node of the other user network, and the network access device constructs a corresponding neighbor advertisement message.
  • the access system further includes a broadband access server, and the neighbor advertisement message target link layer address option field is a MAC address of the broadband access server.
  • a further object of the present invention is to provide a duplicate address detection proxy unit for Ipv6 user access, comprising: a plurality of interface units: receiving a neighbor request message for a duplicate address request generated by a network node connected to the interface unit; Line table: Network for saving network nodes in the interface unit Address configuration information: The control unit: extracts tentative address information in the neighbor request message, and performs a lookup in the interface address line table. When the tentative address has been used, constructs a neighbor advertisement message to notify the generated neighbor request The corresponding interface unit of the message, otherwise, the tentative address configuration information is added to the interface address line table.
  • the interface address line table includes network node IP address and MAC address information
  • the interface address line table further includes interface unit information, and the control unit first searches within the range of the network node corresponding to the generated neighbor request message in its interface unit, if it has been used by other network nodes of the interface The control unit ignores the neighbor request message.
  • the control unit sets a waiting time to further receive and judge other possible temporary address requests of the network node.
  • the present invention successfully solves the duplicate address detection that must be performed when multiple user networks share a prefix in a Layer 2 access device in an IPv6 access network, which provides a rapid popularization of IPv6 in the access network. Strong protection.
  • the duplicate address detection method and the duplicate address detection proxy unit provided by the present invention can also support repeated address detection when multiple Layer 2 network access devices share a prefix.
  • FIG. 1 is a schematic structural diagram of a layer 2 network access system according to the present invention.
  • FIG. 2 is a schematic structural diagram of a duplicate address detecting proxy unit of the present invention.
  • FIG. 3 is a schematic structural diagram of a duplicate address detecting process of the present invention. detailed description
  • a plurality of user networks 11 are connected to the DSLAM 12 through their Layer 2 CPEs, assuming that the user networks 11A, 11B each have a respective subnet space.
  • the RA message for prefix distribution is sent by the BRAS in the access network.
  • Use User network 11A network node a interface? 3 Its 0800 detection process is as follows:
  • the interface P al of the network node a1 must join two multicast groups before the NS message is sent, that is, the All-Nodes Multicast Address and the requesting node multicast address.
  • the former can guarantee that the interface can receive the NA message from the node that has used the tentative address; the latter can ensure that the two nodes that are ready to use the tentative address can detect the existence of the other party in time.
  • the interface P al of the network node a is in the NS message sent, the target address field is set to the tentative address to be detected, the IP source address is set to the unspecified address (ie::), and the IP sink address is set to be The requesting node multicast address formed by the tentative address detected.
  • the other network node interface in the subnet receives the NS message for DAD detection, and if it finds that the target address in the message has been used by itself, it will Construct an NA message to advertise that this address is already in use. If the destination address is also the tentative address for the interface P a2 , then the tentative address is repeated in the subnet, then the tentative address cannot be used by the two 1 ⁇ 2 and P al (the interface P al will also Received the NS message sent by P a2 for DAD detection of the same address).
  • the interface P al of the network node a receives a valid NA message. If the destination address in the message is the tentative address of the interface, it indicates that the tentative address is not unique in the subnet, ie, it fails. DAD detection, cannot be assigned to this interface.
  • the interface P al of the network node a does not receive any response message NA to the tentative address within a specified time, indicating that the address is unique within the subnet, and the address is assigned to the interface. For its use.
  • the DSLAM 12 In the access system shown in the figure, it is assumed that user networks 11A, 11B pass through the network access device DSLAM 12 Sharing the same network prefix, the interface P al of the network node a1 in the user network 11A generates an NS message for DAD detection; the DSLAM 12 intercepts the message from the NS, does not forward to other user networks, but extracts the NS a tentative address in the message, and determining whether the tentative address is assigned to a network node of another user network, if the tentative address has been interfaced by another network node of the user network, such as the interface P of the network node bl in the user network 11B When bl is used, the DSLAM 12 constructs a corresponding NA message, notifying the user that the network node a in the network A cannot use the temporary address.
  • the target link layer address option field in the above NA message is the MAC address of the BRAS (Broadband Access Server).
  • the BRAS is the first router in the access network relative to the user network.
  • the MAC address of the BRAS is used to prevent direct communication between network nodes in the user networks A and B, and the communication between the network nodes in the user networks A and B. All must be transited through the BRAS.
  • the DSLAM 12 can determine whether the tentative address has been allocated or not by establishing and maintaining the address configuration information of the network node of each user network. The implementation will be more clear by the following description.
  • the Layer 2 network access device DSLAM 12 has a plurality of user interface units 20A, 20B, which are connected to the formed user network (such as the user network 11 ⁇ , 11 ⁇ ..) through the CPE;
  • the interface unit 22 is connected to the network to receive the RA message sent from the BRAS.
  • the user interface unit receives the NS message generated by the network node in the user network, and the message includes tentative address information.
  • the DSLAM 12 further includes a DAD proxy unit 21 to implement duplicate address detection between user networks sharing the network prefix.
  • the DAD proxy unit 21 acts as a network node in a user network to respond to DAD messages of network nodes in other user networks, thereby avoiding security problems caused by DAD messages directly entering one user network from another user network; the DAD proxy unit 21 is for these interfaces
  • the unit maintains an interface address line table 21A in which the IPv6 address assigned by the network node in the user network to which each interface unit is connected is recorded.
  • the DAD proxy unit 21 further includes a control unit 21B that receives DAD detection messages from different interface units, does not forward to other user networks, but extracts tentative address information in the NS message, and queries the interface address line table 21A.
  • control unit 21B adds the address configuration information of the network node in the interface address line table 21A to maintain the occupancy of all network node addresses under the access device.
  • the network node address configuration information in the interface address line table 21A may include network node IP address and MAC address information; the DAD proxy unit 21 may maintain its corresponding interface address line table for each interface unit, or may add a table.
  • the control unit To identify the interface unit information, to facilitate the control unit to quickly find the tentative address, the control unit first searches within the range of the network node corresponding to the generated neighbor request message in its interface unit, if it has been used by other network nodes of the interface The control unit 21B can simply ignore the neighbor request message, and the network node using the tentative address of the interface will make a corresponding NA response.
  • the control unit 21B may wait for a period of time before adding the tentative address configuration information to further receive and determine other potential request of the network node for the tentative address.
  • the technical solution provided by the present invention can help to implement address resolution in an IPv6 network, and the solution can be extended to the case where the entire BRAS shares a prefix, as long as it implements the above-mentioned several interface units and interface addresses provided by the present invention in the BRAS.
  • the target link layer address option field in the NA message generated by the control unit 21B is the MAC address of the BRAS (Broadband Access Server) to prevent the network nodes in the user network VIII and B. Direct communication, communication between the user network and the network nodes in B must be relayed through the BRAS.
  • BRAS Broadband Access Server
  • step S30 the network access device DAD agent extracts the target in the NS message when detecting the NS message from the network node a1 interface P al of the user network 11A.
  • the address that is, the tentative address generated by the network node; in step S31, if the target address in the NS message exists in the address line port mapping table associated with the user network 11A, it indicates a certain network node in the user network 11A.
  • the interface P a2 is already using the address, at which point the DAD agent can simply ignore the NS message because the node interface P a2 that is already using the address in the user network of the interface will make a corresponding NA response.
  • the DAD proxy unit constructs an NA message to advertise that the address has been interfaced with the node of the user network P bl Use (step S37).
  • the target link layer address option carried by this NA message is BRAS.
  • the MAC address of the BRAS is used to prevent direct communication between two user network devices.
  • the DAD proxy unit waits for a period of time (step S33). If the DAD proxy unit receives the DAD detection NS message for the tentative address by the other network node interface at this waiting time, it indicates that there are multiple node interfaces ready to use the tentative address, so the DAD agent constructs the corresponding NA message response.
  • step S37 if the NS message for DAD detection by the other network node for the tentative address is not waited (step S35), the temporary prefix field is The address is unique, and the DAD agent unit adds this tentative address to the address line port mapping table associated with the user network 11A (step S36).

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Small-Scale Networks (AREA)

Abstract

La présente invention concerne une méthode de détection de doublons d’adresse dans un réseau d’accès deux couches IPV6 et un système pour celle-ci qui se décrivent ainsi : un proxy DAD figure dans l’équipement du réseau d’accès deux couches ; l’adresse IPV6 utilisée par le noeud de réseau dans une pluralité de réseaux utilisateur partageant le préfixe de réseau est gérée par la table des circuits d’adresse d’interface ; le message DAD généré par différents réseaux utilisateur est intercepté et n’est pas réacheminé directement vers d’autres réseaux utilisateur ; la table des circuits d’adresse d’interface est examinée pour vérifier si l’adresse requise est exploitée par l’autre noeud de réseau et la réponse est un message DAD de proxy. Le problème de sécurité est donc évité par la réception dans un réseau utilisateur d’un message DAD d’un autre réseau utilisateur.
PCT/CN2006/001708 2005-07-19 2006-07-17 Méthode de détection de doublons d’adresse dans un réseau d’accès deux couches ipv6 et système pour celle-ci WO2007009367A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN200510027873.2 2005-07-19
CNA2005100278732A CN1901551A (zh) 2005-07-19 2005-07-19 一种支持IPv6的二层接入网中重复地址检测方法及其装置

Publications (1)

Publication Number Publication Date
WO2007009367A1 true WO2007009367A1 (fr) 2007-01-25

Family

ID=37657287

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2006/001708 WO2007009367A1 (fr) 2005-07-19 2006-07-17 Méthode de détection de doublons d’adresse dans un réseau d’accès deux couches ipv6 et système pour celle-ci

Country Status (2)

Country Link
CN (1) CN1901551A (fr)
WO (1) WO2007009367A1 (fr)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8625609B2 (en) 2006-05-19 2014-01-07 Futurewei Technologies Inc. Using DHCPv6 and AAA for mobile station prefix delegation and enhanced neighbor discovery
CN111049918A (zh) * 2019-12-19 2020-04-21 国网冀北电力有限公司信息通信分公司 一种物联网的通信建立方法及装置
CN113938427A (zh) * 2020-07-08 2022-01-14 中国电信股份有限公司 通信方法及系统、路由节点

Families Citing this family (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101247642B (zh) * 2007-02-14 2012-12-19 华为技术有限公司 安全邻居发现方法、网络设备和移动台
CN101136948B (zh) * 2007-10-22 2011-01-05 中兴通讯股份有限公司 一种IPv6重复地址检测的方法及系统
US8488557B2 (en) 2008-01-14 2013-07-16 Alcatel Lucent Method for detecting a duplicate address, mobile station, network element and communication system
CN101547223B (zh) * 2008-03-26 2012-11-21 华为技术有限公司 地址配置方法、装置和系统
CN101764734B (zh) * 2008-12-25 2012-12-19 中兴通讯股份有限公司 IPv6环境下提高邻居发现安全性的方法及宽带接入设备
CN101674311B (zh) * 2009-10-10 2012-07-04 成都市华为赛门铁克科技有限公司 地址查询方法、网关或用户设备及服务器
EP2493117B1 (fr) 2009-11-17 2015-01-07 Huawei Technologies Co., Ltd. Procédé et appareil de proxy de détection de double adresse
CN101977245A (zh) * 2010-01-07 2011-02-16 中兴通讯股份有限公司 一种ip地址冲突检测的方法、网络设备和系统
CN101909091A (zh) * 2010-07-22 2010-12-08 华为终端有限公司 地址冲突检测方法、用户驻地设备和主机
CN101951415B (zh) * 2010-08-30 2013-10-16 清华大学 提高地址冲突检测过程安全性的方法
CN102413194B (zh) * 2010-09-20 2015-04-01 中国电信股份有限公司 节点设备、网络接入设备、地址冲突处理方法和系统
CN102457407B (zh) * 2010-10-30 2014-11-05 华为技术有限公司 检测自治系统内ip地址冲突的方法及设备
CN102546308B (zh) * 2012-02-10 2015-10-07 神州数码网络(北京)有限公司 基于重复地址检测实现邻居发现代理的方法和系统
CN102761425B (zh) * 2012-07-20 2018-06-12 中兴通讯股份有限公司 计费方法及装置
CN102984288B (zh) * 2012-11-19 2017-11-17 中兴通讯股份有限公司 一种自动管理IPv6地址冲突的方法及系统
CN106302844A (zh) * 2015-05-28 2017-01-04 国网辽宁省电力有限公司丹东供电公司 一种IPv6地址回收禁用方法及装置
CN106789288B (zh) * 2016-12-29 2021-04-02 上海易杵行智能科技有限公司 一种为交换机智能配置不冲突静态网络管理地址的方法
CN109120741B (zh) * 2018-08-27 2020-10-02 南京中兴新软件有限责任公司 一种重复地址检测方法及装置、计算机可读存储介质
WO2020152691A1 (fr) * 2019-01-21 2020-07-30 Telefonaktiebolaget Lm Ericsson (Publ) Détection d'adresse en double du protocole internet version 6 (ipv6) dans des réseaux multiples en utilisant un réseau privé virtuel ethernet (evpn)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1458771A (zh) * 2002-05-15 2003-11-26 华为技术有限公司 一种基于二层交换设备的组播报文转发方法
US20040030769A1 (en) * 2002-07-05 2004-02-12 Samsung Electronics Co., Ltd. Apparatus and method for automatically allocating virtual addresses to nodes having same address
US20050036471A1 (en) * 2003-08-13 2005-02-17 Samsung Electronics Co., Ltd. Fast duplicate address detection entity for managing information for fast duplicate address detection in distribution system and fast duplicate address detection method using the same

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1458771A (zh) * 2002-05-15 2003-11-26 华为技术有限公司 一种基于二层交换设备的组播报文转发方法
US20040030769A1 (en) * 2002-07-05 2004-02-12 Samsung Electronics Co., Ltd. Apparatus and method for automatically allocating virtual addresses to nodes having same address
US20050036471A1 (en) * 2003-08-13 2005-02-17 Samsung Electronics Co., Ltd. Fast duplicate address detection entity for managing information for fast duplicate address detection in distribution system and fast duplicate address detection method using the same

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8625609B2 (en) 2006-05-19 2014-01-07 Futurewei Technologies Inc. Using DHCPv6 and AAA for mobile station prefix delegation and enhanced neighbor discovery
CN111049918A (zh) * 2019-12-19 2020-04-21 国网冀北电力有限公司信息通信分公司 一种物联网的通信建立方法及装置
CN113938427A (zh) * 2020-07-08 2022-01-14 中国电信股份有限公司 通信方法及系统、路由节点

Also Published As

Publication number Publication date
CN1901551A (zh) 2007-01-24

Similar Documents

Publication Publication Date Title
WO2007009367A1 (fr) Méthode de détection de doublons d’adresse dans un réseau d’accès deux couches ipv6 et système pour celle-ci
US8681695B1 (en) Single address prefix allocation within computer networks
KR100908320B1 (ko) IPv6 네트워크 내 호스트 차단 및 탐색방법
US20140325090A1 (en) Discovery and disconnection of client addresses in an access node for an ip network
US8458303B2 (en) Utilizing a gateway for the assignment of internet protocol addresses to client devices in a shared subset
WO2010069181A1 (fr) Procédé et système de configuration d'adresse ipv6
WO2009117960A1 (fr) Procédé d’accès réseau, procédé d’authentification, système de communication et équipement associé
WO2010072096A1 (fr) Procédé et dispositif d'accès à bande large pour améliorer la sécurité d'une découverte de voisins dans un environnement ipv6
WO2009117963A1 (fr) Procédé, appareil et système de configuration d'adresse
WO2007028306A1 (fr) Procede de reconstruction de l'adresse reseau dans le reseau d'acces ipv6
WO2014047919A1 (fr) Procédé, dispositif et système d'attribution d'adresse
US20130089092A1 (en) Method for preventing address conflict, and access node
US20080294755A1 (en) Method and Arrangement in an Access System
JP5241957B2 (ja) 加入者装置をIPv6対応のアグリゲーションネットワークに接続するための方法および装置
WO2011131097A1 (fr) Procédé de traitement de message de données, système et nœud de service d'accès
WO2013086966A1 (fr) Procédé, appareil et système d'interconnexion de la couche 2 basés sur ipv6
JP4186733B2 (ja) 通信システム、端末及びアドレス生成方法
JP3858884B2 (ja) ネットワークアクセスゲートウェイ及びネットワークアクセスゲートウェイの制御方法並びにプログラム
US8705471B2 (en) Method and system for implementing ID/locator mapping
JP3994412B2 (ja) ネットワークシステム、網内識別子の設定方法、ネットワーク接続点、網内識別子の設定プログラム、及び記録媒体
CN102761425B (zh) 计费方法及装置
JP2005064570A (ja) ネットワークシステム及びインターネットワーク装置
KR20040011936A (ko) 복수의 가상랜으로 구성된 이더넷 상에서의 스위칭 장치와이를 이용한 통신 방법
US8738038B2 (en) Method and system for implementing information interaction in a next generation network
WO2012155424A1 (fr) Procédé et système d'attribution de multiples préfixes d'adresse

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application
NENP Non-entry into the national phase

Ref country code: DE

WWW Wipo information: withdrawn in national office

Country of ref document: DE

122 Ep: pct application non-entry in european phase

Ref document number: 06761451

Country of ref document: EP

Kind code of ref document: A1