WO2008017275A1 - Procédé et système de classification de paquet, leur noeud de cryptage et noeud de classification - Google Patents

Procédé et système de classification de paquet, leur noeud de cryptage et noeud de classification Download PDF

Info

Publication number
WO2008017275A1
WO2008017275A1 PCT/CN2007/070412 CN2007070412W WO2008017275A1 WO 2008017275 A1 WO2008017275 A1 WO 2008017275A1 CN 2007070412 W CN2007070412 W CN 2007070412W WO 2008017275 A1 WO2008017275 A1 WO 2008017275A1
Authority
WO
WIPO (PCT)
Prior art keywords
classification
node
encrypted
data packet
encryption
Prior art date
Application number
PCT/CN2007/070412
Other languages
English (en)
Chinese (zh)
Inventor
Yong Xie
Jianjun Wu
Liang Gu
Wenliang Liang
Original Assignee
Huawei Technologies Co., Ltd.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co., Ltd. filed Critical Huawei Technologies Co., Ltd.
Publication of WO2008017275A1 publication Critical patent/WO2008017275A1/fr

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/16Implementing security features at a particular protocol layer
    • H04L63/164Implementing security features at a particular protocol layer at the network layer
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/03Protecting confidentiality, e.g. by encryption
    • H04W12/033Protecting confidentiality, e.g. by encryption of the user plane, e.g. user's traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W28/00Network traffic management; Network resource management
    • H04W28/16Central resource management; Negotiation of resources or communication parameters, e.g. negotiating bandwidth or QoS [Quality of Service]
    • H04W28/18Negotiating wireless communication parameters
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W80/00Wireless network protocols or protocol adaptations to wireless operation
    • H04W80/04Network layer protocols, e.g. mobile IP [Internet Protocol]

Definitions

  • the present invention relates to the field of wireless communication technologies, and in particular, to a packet classification technique. Background of the invention
  • WiMAX Worldwide Interoperability for Microwave Access
  • BS base station
  • ASN-GW access service network gateway
  • CSN including logical entities such as Policy Server (PF), Authentication and Accounting Server (AAA Server), Application Server (AF), etc.
  • PF Policy Server
  • AAA Server Authentication and Accounting Server
  • AF Application Server
  • Wireless Metropolitan Area Network Access Technology Based on IEEE 802.16d/e Standard on Wireless Side of WiMAX Network R1, R2, R3, etc. in Fig. 1 represent a reference point, that is, an interface.
  • the ASN is a network function set that provides wireless access services for terminals, including the network element BS and the ASN-GW.
  • the CSN provides an IP connection service for the terminal.
  • the terminal is a mobile user equipment, and the user uses the terminal to access the WiMAX network.
  • a classifier is used to classify various services carried by the network into specific service flows of the bearer network.
  • the classifier of the uplink service is implemented on the terminal, and the downlink service is divided into The classifier is implemented on the BS or ASN-GW.
  • the service flow is the minimum operational object guaranteed by the WiMAX bearer network quality of service (QoS). Different service flows can have different QoS guarantees.
  • the classifier can allocate it to the corresponding service flow according to the different QoS requirements of the upper layer service.
  • the classifier consists of a series of classification rules.
  • the specific classification parameters are listed in the IEEE related standards. If the IP traffic is carried, one of the main classification parameters is the IP address. For example, for an IPv4 packet, a specific IP packet can be classified into a specific service flow based on the source/destination IP address, protocol type, and source/destination Transmission Control Protocol/User Data Protocol (TCP/UDP) port number.
  • TCP/UDP Transmission Control Protocol/User Data
  • the terminal and the home agent (HA) located at the CSN transmit data through the tunnel.
  • the terminal and the home agent (HA) located at the CSN transmit data through the tunnel.
  • different QoS data needs to be classified into different data channels for transmission, and corresponding to the WiMAX network, the IP data packets are classified into different service flows for transmission.
  • the existing IEEE standard defines a series of classifier rules, there is one situation that cannot be handled after ⁇ is applied to a WiMAX network.
  • IP security/encapsulated security load IPSec/ESP
  • the HA receives the encrypted data when it is encrypted.
  • the entire IP packet is encrypted and added to the tunnel IP header in front of the encrypted IP packet. Therefore, if the classifier relies on the information in the subsequent IP packet to distinguish different service flows, this IP packet cannot be implemented.
  • the classifier can only be unpacked on the terminal or the HA, but the classifier needs to classify the data packets on the ASN-GW, access router (AR) or BS classification nodes between the two physical transmission paths. Summary of the invention
  • the embodiment of the present invention provides a data packet classification method, and a method for counting A packet classification system, an encryption node, and a classification node are used to classify the encrypted data packets.
  • An embodiment of the present invention provides a data packet classification method, where the method includes:
  • the encryption node adds or configures a classification parameter in the non-encrypted portion of the encrypted IP data packet, and sends the encrypted IP data packet to the classification node;
  • the classification node classifies the encrypted IP data packet according to the classification parameter.
  • An embodiment of the present invention further provides a system for data packet classification, where the system includes: an encryption node, configured to add or configure a classification parameter in an unencrypted portion of an encrypted IP data packet, and add the encrypted IP data.
  • the packet is sent to the classification node;
  • a classifying node including a classifier, wherein the classifier is configured to classify the encrypted IP data packet according to the classification parameter in the encrypted IP data packet.
  • An embodiment of the present invention further provides an encryption node, including:
  • a sending unit configured to send the encrypted IP data packet to the classification node.
  • the embodiment of the present invention further provides a classification node, including: a receiving unit, configured to receive an encrypted IP data packet carrying a classification parameter in a non-encrypted portion;
  • a classifier configured to classify the encrypted IP data packet according to the classification parameter in the encrypted IP data packet.
  • the encryption node adds the classification parameter for classification in the non-encrypted part of the encrypted IP data packet in the embodiment of the present invention
  • the classifier can directly read The classification parameter of the non-encrypted part is taken, so that the data packet can be classified according to the classification parameter.
  • the classification node can acquire the classification parameter without decrypting the data packet, and classify according to the classification parameter.
  • Embodiments of the present invention provide multiple acquisitions The method of classifying parameters improves the flexibility of classification. BRIEF DESCRIPTION OF THE DRAWINGS
  • FIG. 1 is a schematic diagram of a WiMAX network architecture in the prior art
  • FIG. 2 is a schematic flow chart of a first embodiment of the present invention
  • FIG. 3 is a schematic flow chart of a second embodiment of the present invention.
  • FIG. 4 is a schematic flow chart of a third embodiment of the present invention.
  • FIG. 5 is a schematic flowchart of a fourth embodiment of the present invention.
  • FIG. 6 is a schematic structural diagram of a system according to a first embodiment of the present invention.
  • FIG. 7 is a schematic structural diagram of a system according to a second embodiment and a third embodiment of the present invention.
  • FIG. 8 is a schematic structural diagram of a system according to a fourth embodiment of the present invention. Mode for carrying out the invention
  • the encryption node adds or configures a classification parameter in the non-encrypted part of the encrypted IP data packet, and the subsequent encrypted IP data packet carries the classification parameter, and the classification node encrypts the data according to the classification parameter.
  • IP packets are classified.
  • adding the classification parameter means adding a new parameter to the non-encrypted part of the IP data packet after encryption, and adding the new parameter as the classification parameter; configuring the classification parameter means that the non-encrypted part of the encrypted IP data packet is already existing.
  • the parameters are configured and the configured parameters are used as encryption parameters.
  • the IP packets before encryption include: tunnel IP header, tunnel IP extension header, original IP header, original IP extension header, upper layer protocol header, and data.
  • the encrypted IP data packet when the IP data packet is encrypted and transmitted, for example, by IPSec/ESP encryption, the encrypted IP data packet includes: a tunnel IP header, a tunnel IP extension header, an ESP header, an encrypted data, and an ESP authentication (ESPAUTH).
  • the encrypted part includes encrypted data
  • the non-encrypted part includes a tunnel IP header, a tunnel IP extension header, an ESP header, and the like.
  • the encrypted data is formed by encrypting the original IP header, the original IP extension header, the upper layer protocol header, and the data part in the IP packet before encryption; the tunnel IP header must be constructed according to the actual situation except the destination address and the source address, and other field contents.
  • the corresponding field content of the original IP header may be constructed or copied by the encryption node according to the situation; the tunnel IP extension header is constructed by the encryption node itself, and the original IP extension header in the IP packet before encryption may not be copied.
  • the classification parameters described in the embodiments of the present invention are as shown in Table 3, but are not limited thereto.
  • the classification node can be classified according to any one of these parameters or any combination thereof.
  • Step 101 to step 102 the encryption node extracts the classification information that may be used for classification before encrypting the IP data packet, and adds the classification parameters to the non-encrypted portion of the encrypted IP data packet.
  • the tunnel IP extension header of this embodiment can be defined as follows: The name is a Filter Header; the Type can be determined; the structure can be as shown in Table 4. Referring to Table 4, the first 8 bits of the new tunnel IP extension header are the Next Header field, indicating the start of the Filter Header; the second 8 bits are the extended header length (Hdr Ext Len) field, indicating the length of the Filter Header. The following bits are the Options section, which is used to indicate the specific classification parameters.
  • the definitions of the Next Header and Hdr Ext Len fields can be the same as those of the usual IPv6 extension headers, and are not mentioned here.
  • the format of the Options section can be as shown in Table 5. It is arranged in the order of Filter type and Filter value.
  • the Filter type is the type in Table 3.
  • the Filter value is the value of the packet filter attribute in Table 3.
  • the classification parameter is the destination port.
  • the Filter type is 4, the Filter value is 8E.
  • the padding bit can be padded at the end to be an integer multiple of 8 bytes.
  • the encryption node may select the classification information to be added to the tunnel IP extension header of the encrypted IP data packet; if the encryption node does not know which classification node needs The information is classified and transmitted, and the encryption node can add all the classification information in Table 3 to the tunnel IP extension header of the encrypted IP data packet.
  • classification parameters such as SPI can be added to the ESP header.
  • Step 103 The encryption node sends the encrypted IP data packet with the classification parameter to the classifier in the classification node.
  • Step 104 The classifier in the classification node receives the foregoing IP data packet from the encryption node, classifies according to the classification parameter in the tunnel IP extension header, allocates it to the corresponding service flow, and transmits the data to the corresponding data channel. Decrypt the node.
  • the unnecessary partial or all classification parameters may be deleted.
  • Step 105 The classification node sends the classified IP data packet to the decryption node through the corresponding data channel. If the decryption node receives a packet with a Filter Header extension header, it can ignore the tunnel IP extension header without any processing.
  • the step includes querying the content that the classification parameter and the tunnel IP header of the encrypted IP data packet overlap, and in step 101, the non-coincident content of the classification parameter is formed into a tunnel IP extension header, and the tunnel of the encrypted IP data packet is filled in.
  • step 101 the classification parameter is formed into a tunnel IP extension header, and Fill in the tunnel IP extension header of the encrypted IP packet.
  • the classification node classifies according to the classification parameters in the tunnel IP header and the tunnel IP extension header.
  • the above method of the embodiment can be realized by the system shown in Fig. 6.
  • the system includes an encryption node and a classification node, and may further include a decryption node.
  • the encryption node adds a classification parameter to the non-encrypted portion of the encrypted IP data packet, and sends the encrypted IP data packet.
  • the encryption node includes at least an adding configuration unit and a sending unit, wherein the adding configuration unit adds or configures a classification parameter in the non-encrypted portion of the encrypted IP data packet, and the sending unit sends the encrypted IP data packet to the classification node.
  • the classification node includes a receiving unit and a classifier, and the receiving unit receives the encrypted IP data packet that is sent by the encryption node and carries the classification parameter in the non-encrypted portion, and the classifier classifies the encrypted IP data packet according to the classification parameter, and The classified packet is sent to the decryption node.
  • the decryption node decrypts and processes the received encrypted IP packet.
  • the encryption node may further include an extracting unit and/or a query unit.
  • the extracting unit is configured to extract the classification parameter from the pre-encrypted IP data packet;
  • the query unit is configured to obtain the non-coincident content in the tunnel IP header of the encrypted IP data packet in the classification parameter, so as to fill in the encrypted IP data packet.
  • Tunnel IP extension header section is configured to extract the classification parameter from the pre-encrypted IP data packet.
  • the classification node shown in Fig. 6 may further include a deletion unit for deleting some or all of the classification parameters of the encrypted IP packet.
  • the encryption node in this embodiment may be an HA in a WiMAX system, and the classification node may For a base station or ASN-GW or AR in a WiMAX system, the decryption node can be a terminal in a WiMAX system.
  • the present invention is not limited to this.
  • the encryption node assigns different classification parameters to different traffic flows in advance through interaction with the decryption node or the classification node.
  • the present embodiment is described by taking a flow label as an example.
  • Flow Label In the basic header of IPv6, there is a How Label field, which is used to uniquely identify a service flow from the source address to the destination address. This value is generally assigned by the source, that is, it is allocated at the encryption node. .
  • Step 201 The encryption node and the decryption node exchange the classifier information of the classification node before the encryption, and assign different Flow Labels to different service flows. This process can be performed when the encryption node and the decryption node generate a security association (SA), or at other times.
  • SA security association
  • the decryption node has obtained the classifier information before the encryption of the classification node, for example, the decryption node acquires the classifier information by interacting with the classification node.
  • Step 202 The encryption node notifies the classification node of the service flow classifier information and the corresponding Flow Label before encryption. Since the decryption node also has the traffic classifier information before encryption and the corresponding Flow Label, in this step, the decryption node may also notify the classification node of the traffic classifier information before encryption and the corresponding Flow Label.
  • Step 203 The encryption node configures a Flow Label in the tunnel IP extension header of the encrypted IP data packet, and configures the flow label to be newly allocated in step 201 corresponding to the service flow to which the data packet belongs. In this way, the encryption node does not have to extract the original Flow Label from the pre-encrypted IP packet.
  • Step 204 The encrypted node sends the encrypted IP data packet configured with the Flow Label. go with.
  • Step 205 The classifier in the classification node receives the foregoing IP data packet from the encryption node, performs classification according to the Flow Label and other classification parameters in the tunnel IP extension header, and allocates the same to the corresponding service flow, thereby passing Different data channels are transmitted to the decryption node.
  • Step 206 The classification node sends the classified IP data packet to the decryption node through the corresponding data channel.
  • the encryption node and the classification node directly allocate different Flow Labds for different service flows by interaction.
  • the third embodiment includes the following steps:
  • Step 301 The encryption node and the decryption node generate an SA, and exchange the pre-encryption classifier signal.
  • Step 302 The encryption node and the classification node allocate different Flow Labels for different service flows by interaction.
  • Step 303 The encryption node configures a Flow Label in the tunnel IP extension header of the encrypted IP data packet, and configures the Flow Label in step 302 corresponding to the service flow to which the data packet belongs. In this way, the encryption node does not have to extract the original Flow Label from the pre-encrypted IP packet.
  • Step 304 The encryption node sends the encrypted IP data packet configured with the Flow Label allocated in step 302.
  • Step 305 The classifier in the classification node receives the foregoing IP data packet from the encryption node, performs classification according to the Flow Label and other classification parameters in the tunnel IP extension header, and assigns it to the corresponding service flow, thereby passing Different data channels are transmitted to the decryption node.
  • Step 306 the classification node sends the classified IP data packet through the corresponding data channel. Give the decryption node. After decrypting the IP packet received by the node, the tunnel IP extension header can be ignored without any processing.
  • the methods of the second embodiment and the third embodiment of the present invention can be realized by the system shown in Fig. 7.
  • the system includes an encryption node and a classification node, and may further include a decryption node.
  • the encryption node configures the classification parameter in the non-encrypted portion of the encrypted IP data packet, and sends the classification parameter to the classification node.
  • the encryption node includes at least an adding configuration unit and a sending unit, wherein the adding configuration unit adds or configures a classification parameter in the non-encrypted portion of the encrypted IP data packet, and the sending unit sends the encrypted IP data packet to the classification node.
  • the classification node includes a receiving unit and a classifier, and the receiving unit receives the encrypted IP data packet that is sent by the encryption node and carries the classification parameter in the non-encrypted portion, and the classifier classifies the encrypted IP data packet according to the classification parameter, and The classified packet is sent to the decryption node.
  • the decryption node decrypts and processes the received encrypted IP packet.
  • the encryption node further includes a first interaction unit
  • the classification node further includes a second interaction unit
  • the decryption node further includes a third interaction unit.
  • the first interaction unit and the second interaction unit allocate different encrypted classification parameters for different service flows by interaction; corresponding to the second embodiment, the first interaction unit and the third interaction unit pass The interaction allocates different encrypted classification parameters for different service flows, and notifies the classification node of the service flow and the corresponding encrypted classification parameters.
  • the encryption nodes in the second embodiment and the third embodiment may be HAs in the WiMAX system
  • the classification nodes may be base stations in the WiMAX system or ASN-GWs or ARs
  • the decryption nodes may be terminals in the WiMAX system.
  • the invention is not limited thereto. Fourth embodiment:
  • a fourth embodiment of the present invention is in encrypting nodes and classifications.
  • the node directly sets different classification parameters for different service flows.
  • a fourth embodiment of the present invention includes the following steps:
  • Step 401 Set different encrypted classification parameters, such as manual setting or automatic setting, for the different service flows in the encryption node and the classification node.
  • Step 402 The encryption node adds or configures an encrypted classification parameter corresponding to the service flow to which the data packet belongs in the non-encrypted portion of the encrypted IP data packet.
  • Step 403 The encryption node sends the encrypted IP data packet with the encrypted classification parameter added or configured.
  • Step 404 The classification node receives the foregoing IP data packet from the encryption node, classifies the classification parameter according to the non-encrypted part and the service flow information corresponding thereto, and allocates the same to the corresponding service flow, thereby transmitting through different data channels. Give the decryption node.
  • Step 405 The classification node sends the classified encrypted IP data packet to the decryption node through the corresponding data channel.
  • the decryption node receives the IP packet, it can ignore the classification parameters of the non-encrypted part without any processing.
  • the above method of the embodiment can be realized by the system shown in Fig. 8.
  • the system includes a decryption node and a classification node, and may further include a decryption node.
  • the encryption node adds or configures a classification parameter in the non-encrypted portion of the encrypted IP data packet, and sends the encrypted IP data packet.
  • the encryption node includes at least an adding configuration unit and a sending unit, wherein the adding configuration unit adds or configures a classification parameter in the non-encrypted portion of the encrypted IP data packet, and the sending unit sends the encrypted IP data packet to the classification node.
  • the classification node includes a receiving unit and a classifier, and the receiving unit receives the encrypted IP data packet that is sent by the encryption node and carries the classification parameter in the non-encrypted portion, and the classifier classifies the encrypted IP data packet according to the classification parameter, and The classified packet is sent to the decryption node.
  • the decryption node decrypts and processes the received encrypted IP data packet.
  • the encryption node further includes a first configuration unit
  • the classification node further includes a second configuration unit.
  • the first configuration unit and the second configuration unit are configured to set different encrypted classification parameters for different service flows.
  • the encryption node in the fourth embodiment may be HA in the WiMAX system
  • the classification node may be a base station in the WiMAX system or an ASN-GW or an AR
  • the decryption node may be a terminal in the WiMAX system.
  • the invention is not limited thereto.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

L'invention concerne un procédé de classification de paquet, comprenant les étapes suivantes : le noeud de cryptage ajoute ou configure des paramètres de classification dans la partie non cryptée des paquets IP cryptés ; le noeud de classification classe le paquet IP crypté selon les paramètres de classification précités. Il existe toujours un système, un noeud de cryptage et un noeud de classification pour une classification de paquet. Le noeud de classification est apte à lire les paramètres de classification de la partie non cryptée après avoir reçu les paquets IP cryptés. Il existe encore de multiples procédés pour obtenir des paramètres de classification, et ainsi la souplesse de classification est améliorée.
PCT/CN2007/070412 2006-08-04 2007-08-03 Procédé et système de classification de paquet, leur noeud de cryptage et noeud de classification WO2008017275A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CNA2006101038622A CN101119289A (zh) 2006-08-04 2006-08-04 一种数据包分类方法及其系统
CN200610103862.2 2006-08-04

Publications (1)

Publication Number Publication Date
WO2008017275A1 true WO2008017275A1 (fr) 2008-02-14

Family

ID=39032651

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2007/070412 WO2008017275A1 (fr) 2006-08-04 2007-08-03 Procédé et système de classification de paquet, leur noeud de cryptage et noeud de classification

Country Status (2)

Country Link
CN (1) CN101119289A (fr)
WO (1) WO2008017275A1 (fr)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109561046A (zh) * 2017-09-26 2019-04-02 中兴通讯股份有限公司 一种融合通信公众账号内容加密的方法及装置
CN109819528A (zh) * 2019-02-27 2019-05-28 努比亚技术有限公司 无网通讯方法、移动终端和计算机可读存储介质

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2004274493A (ja) * 2003-03-10 2004-09-30 Toshiba Corp 通信装置、中継装置、通信制御方法及び通信制御プログラム
JP2004274666A (ja) * 2003-03-12 2004-09-30 Mitsubishi Electric Information Systems Corp 暗号装置及びコンソール端末及び管理装置及びプログラム
CN1668026A (zh) * 2004-03-13 2005-09-14 鸿富锦精密工业(深圳)有限公司 网络品质服务系统及方法
US20050220091A1 (en) * 2004-03-31 2005-10-06 Lavigne Bruce E Secure remote mirroring

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2004274493A (ja) * 2003-03-10 2004-09-30 Toshiba Corp 通信装置、中継装置、通信制御方法及び通信制御プログラム
JP2004274666A (ja) * 2003-03-12 2004-09-30 Mitsubishi Electric Information Systems Corp 暗号装置及びコンソール端末及び管理装置及びプログラム
CN1668026A (zh) * 2004-03-13 2005-09-14 鸿富锦精密工业(深圳)有限公司 网络品质服务系统及方法
US20050220091A1 (en) * 2004-03-31 2005-10-06 Lavigne Bruce E Secure remote mirroring

Also Published As

Publication number Publication date
CN101119289A (zh) 2008-02-06

Similar Documents

Publication Publication Date Title
US11743767B2 (en) Compression of ethernet packet header
CA2814479C (fr) Detection de flux de donnees de service dans un reseau d'acces 3gpp conforme ayant une fonction de modification de paquet
JP4918617B2 (ja) Macプロトコル・データ・ユニット内のダミー・パディング用サブヘッダ
CN101494538B (zh) 一种数据传输控制方法及通讯系统以及加密控制网元
US11558879B2 (en) Handling network traffic via a fixed access
WO2019033920A1 (fr) Procédé et dispositif permettant à un côté réseau d'identifier et de commander un équipement utilisateur distant
CN101442428B (zh) 一种端到端QoS的申请方法、系统和设备
CN107006022A (zh) Lwa pdu路由方法及装置
KR20050048684A (ko) 통신 시스템에서 마이크로-터널들을 사용하기 위한 방법 및장치
JP2004266310A (ja) Wlan相互接続におけるサービス及びアドレス管理方法
EP2625827B1 (fr) Separation du trafic montant dans un noeud en bordure d'un reseau de communication
WO2018126692A1 (fr) Procédé et appareil destinés à commander la transmission de données
WO2011044808A1 (fr) Procédé et système de suivi de communication anonyme
CN101374100B (zh) 一种WiMAX业务数据流报文的分类方法、装置及系统
WO2017035745A1 (fr) Procédé et équipement de traitement de paquets de données
WO2020135011A1 (fr) Procédé et dispositif de transmission et terminal de transmission de message et terminal de réception
JP2023531312A (ja) データ伝送方法および装置
KR102109704B1 (ko) 데이터 트래픽의 전달 방법 및 장치
WO2008031362A1 (fr) Réseau support, système, dispositif et procédé de service de diffusion multidiffusion
WO2008017275A1 (fr) Procédé et système de classification de paquet, leur noeud de cryptage et noeud de classification
CN101227417B (zh) 数据包分类方法及其系统
WO2017210811A1 (fr) Procédé et appareil d'exécution de stratégie de sécurité
WO2009039797A1 (fr) Procédé, système et appareil pour mettre à jour dynamiquement les informations de classificateur
WO2011109992A1 (fr) Procédé, dispositif et système pour obtenir des données
Wang et al. Research and Design of Next Generation Internet (IPV9) Datagram

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 07785408

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

NENP Non-entry into the national phase

Ref country code: RU

122 Ep: pct application non-entry in european phase

Ref document number: 07785408

Country of ref document: EP

Kind code of ref document: A1