WO2010083739A1 - Ip会话存活监控方法及系统、家庭网关和网络设备 - Google Patents
Ip会话存活监控方法及系统、家庭网关和网络设备 Download PDFInfo
- Publication number
- WO2010083739A1 WO2010083739A1 PCT/CN2010/070161 CN2010070161W WO2010083739A1 WO 2010083739 A1 WO2010083739 A1 WO 2010083739A1 CN 2010070161 W CN2010070161 W CN 2010070161W WO 2010083739 A1 WO2010083739 A1 WO 2010083739A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- session
- detection message
- bidirectional forwarding
- home gateway
- edge node
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing data switching networks
- H04L43/08—Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
- H04L43/0805—Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters by checking availability
- H04L43/0811—Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters by checking availability by checking connectivity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/66—Arrangements for connecting between networks having differing types of switching systems, e.g. gateways
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing data switching networks
- H04L43/10—Active monitoring, e.g. heartbeat, ping or trace-route
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L45/00—Routing or path finding of packets in data switching networks
- H04L45/02—Topology update or discovery
- H04L45/026—Details of "hello" or keep-alive messages
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L69/00—Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
- H04L69/16—Implementation or adaptation of Internet protocol [IP], of transmission control protocol [TCP] or of user datagram protocol [UDP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W80/00—Wireless network protocols or protocol adaptations to wireless operation
- H04W80/04—Network layer protocols, e.g. mobile IP [Internet Protocol]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W76/00—Connection management
- H04W76/20—Manipulation of established connections
- H04W76/25—Maintenance of established connections
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W8/00—Network data management
- H04W8/26—Network addressing or numbering for mobility support
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W84/00—Network topologies
- H04W84/02—Hierarchically pre-organised networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
- H04W84/04—Large scale networks; Deep hierarchical networks
- H04W84/042—Public Land Mobile systems, e.g. cellular systems
- H04W84/045—Public Land Mobile systems, e.g. cellular systems using private Base Stations, e.g. femto Base Stations, home Node B
Definitions
- IP session survival monitoring method and system home gateway and network device
- the embodiments of the present invention relate to the field of communications technologies, and in particular, to an IP session survival monitoring method and system, a home gateway, and a network device. Background technique
- an IP session represents a network access connection session associated with a user's IP address, "IP Session” and a point-to-point protocol (Point-to-Point Protocol; PPP) Session is peer-to-peer.
- IP Session IP Session
- PPP Session Point-to-Point Protocol
- Subscriber Session is a general term for "IP Session” and "PPP Session”.
- the PPP session uses a unique PPP survival detection mechanism
- the IPv4 session uses a unique bidirectional forwarding detection (BFD) or Address Resolution Protocol (ARP) survival detection mechanism.
- BFD bidirectional forwarding detection
- ARP Address Resolution Protocol
- IP Session is usually terminated on an IP Edge Node, such as a Broadband Network Gateway (BNG) or Broadband Remote Access Server (BRAS), on the other side of the “IP Session”.
- BNG Broadband Network Gateway
- BRAS Broadband Remote Access Server
- IP Session is a session connection established between the user equipment and the IP edge node, which is a single hop session.
- IP Session is used for network management of user access networks, such as billing and status.
- IP Session uses the IP address or IP address prefix as the identifier of "IP Session”.
- the HGW supports Network Address Translation (NAT) under IPv4, and the "IPv4 Session" is "Single IPv4 hop”;
- the HGW is a router (IPv2) under IPv6.
- IPv2 IPv2
- NAT Network Address Translation
- the user equipment at the end of the IP Session is not necessarily the HGW.
- the user equipment (UE) after the HGW can be extended to "Multiple IPv6 hop", but how the UE behind the HGW traverses the HGW to implement the "Multiple hop IPv6 Session" survival monitoring ( Keepalive), there is no solution in the prior art. Summary of the invention
- the embodiment of the invention provides a method and system for monitoring the survival of an IP session, a home gateway and a network device, and implements the monitoring of the survival of the "Multiple hop IPv6 Session".
- the embodiment of the invention provides an IP session survival monitoring method, which includes:
- the user terminal or the IP edge node receives the bidirectional forwarding detection message sent by the home gateway, where the first authentication domain value included in the bidirectional forwarding detection message is a difference between the user terminal IP address prefix and the home gateway IP address prefix;
- the user terminal or the IP edge node monitors whether the IP session between the IP edge node and the user terminal is alive according to the first authentication domain value in the bidirectional forwarding detection message.
- the embodiment of the invention provides a home gateway, including:
- a first receiving module configured to receive a bidirectional forwarding detection message sent by the user terminal or the IP edge node
- a first forwarding module configured to send, according to the bidirectional forwarding detection message received by the first receiving module, a bidirectional forwarding detection message including a first authentication domain value to the IP edge node or the user terminal, where the first The authentication field value is the difference between the user terminal IP address prefix and the home gateway IP address prefix.
- the embodiment of the invention provides a network device, including:
- a second receiving module configured to receive a bidirectional forwarding detection message sent by the home gateway, where the first authentication domain value included in the bidirectional forwarding detection message is a difference between a user terminal IP address prefix and a home gateway IP address prefix;
- a processing module configured to monitor, according to the first authentication domain value in the bidirectional forwarding detection message, Whether the IP session between the IP edge node and the user terminal is alive.
- An embodiment of the present invention provides an IP session survival monitoring system, including:
- a home gateway configured to send a bidirectional forwarding detection message to the network device, where the first authentication domain value in the bidirectional forwarding detection message is a difference between the user terminal IP address prefix and the home gateway IP address prefix;
- a network device configured to receive a bidirectional forwarding detection message sent by the home gateway, and monitor, according to the first authentication domain value in the bidirectional forwarding detection message, whether an IP session between the IP edge node and the user terminal is alive .
- the IP session surviving monitoring method and system, the home gateway and the network device provided by the embodiments of the present invention use "Multihop BFD” as the survival monitoring mechanism of the "Multihop IPv6 Session", and can establish the "IPv6 Session" in the UE after the HGW and
- the "Single hop IP Session” is extended to "Multihop IP Session" between IP edge nodes to implement the "Multiple hop IPv6 Session" survival monitoring.
- IPv6 Session is a schematic structural diagram of an "IPv6 Session" system of the present invention
- FIG. 2 is a schematic diagram of a data plane of a "Multihop IPv6 Session" according to the present invention
- IPv6 Session survivability monitoring agent of the present invention
- Embodiment 1 of an IP session survival monitoring method according to the present invention
- Embodiment 2 is a schematic diagram of Embodiment 2 of an IP session survival monitoring method according to the present invention.
- Embodiment 3 of an IP session survival monitoring method according to the present invention.
- FIG. 7 is a schematic structural diagram of an embodiment of a home gateway according to the present invention.
- FIG. 8 is a schematic structural diagram of an embodiment of a network device according to the present invention.
- FIG. 9 is a schematic structural diagram of an embodiment of an IP session survival monitoring system according to the present invention. detailed description The technical solutions of the embodiments of the present invention are further described below with reference to the accompanying drawings and specific embodiments.
- FIG. 1 is a schematic structural diagram of an "IPv6 Session” system according to the present invention.
- the HGW is a Layer 3 router, and implements an "IPv6 Session Keepalive” (Proxy) function.
- IPv6 Session Keepalive Proxy
- Multiple UEs or multiple "IPv6 Sessions” can be bundled into a UE group or an "IPv6 Session” group by management domain, region, or service classification.
- IP Session 0 is a single-hop “IPv6 Session” established between HGW and BNG by HGW as user (Subscriber);
- IP Session n is user terminal (especially nomadic user) as user (Subscriber) in UE and
- IPv6 Session established between BNG,
- IP Session n is Multihop "Session", UE to HGW is the first hop, HGW goes to "IP Edge Node” as the second hop;
- HGW is configured by dynamic host
- DHCP Dynamic Host Configuration Protocol
- PD Prefix Delegation
- an address prefix such as the 56-bit address prefix "Prefix Z”.
- the HGW uses the "Prefix Z" to extend different sub-prefixes for subsequent UEs. For example, different users have different 64-bit sub-prefixes, or fixed users and nomadic users have different 64-bit sub-prefixes.
- FIG. 2 is a schematic diagram of the data plane of the "Multihop IPv6 Session” of the present invention.
- the "Multihop IP Session” between the BNG and the UE is carried in a single hop “IP Session” between the BNG and the HGW.
- IP Session the single hop between the BNG and the HGW.
- FIG. 3 is a schematic diagram of the principle of the "IPv6 Session” survivability monitoring agent of the present invention.
- the block “P” represents the peer end (Peer), and the present invention mainly has two schemes:
- Solution 1 Use "Multihop BFD” as the Keepalive mechanism of the "Multihop IPv6 Session”. Set the IPv6 Session Keepalive Proxy on the HGW to transparently transmit the "Multihop BFD” protocol message or modify the BFD protocol message. Discriminator domain;
- IPv6 Session Keepalive Proxy on the HGW, "Legacy UE” Use “Single Keep Unive” for the first hop of "Single ho Neighbor Unreachable Detection (NUD) / "BFD”, and “Session Keepalive” for "Second Mega” with “Single hop BFD” for BNG ⁇ , " The IPv6 Session Keepalive Proxy implements the surviving relay of the first hop NUD/BFD to the second hop BFD.
- Multiple UEs or multiple "IPv6 Sessions” can be bundled into UE groups or IPv6 Session groups according to the management domain, region, or service classification.
- the proxy can use different wide area network (WAN) ports to correspond to different UE groups or "IPv6 Session” groups. Specifically, when the UE group or "IPv6 Session" group contains only one UE or "IPv6 Session” , the proxy can use different WAN ports to correspond to different UEs or "IPv6 Sessions”.
- WAN wide area network
- FIG. 4 is a schematic diagram of Embodiment 1 of an IP session survival monitoring method according to the present invention.
- the "IPv6 Session Keepalive Proxy" set on the HGW implements the "Multiple hop IPv6 Session" survivability monitoring in a transparent manner.
- the IP edge node may include a BNG or a BRAS, and the like. Be explained.
- the monitoring of the "IP Session" between the UE and the BNG includes the HGW forwarding the BFD message sent between the UE and the BNG.
- the first authentication domain (Discrinum field) in the BFD message is the user terminal IP.
- the corresponding "BFD Session” is alive, because "BFD Session” and "IP Session” are Associated, so you can judge whether the "IP Session" is alive.
- the BNG receives the BFD message and monitors whether the IP session between the BNG and the UE is alive according to the first authentication domain value of the BFD message. For the uplink direction, the UE sends a BFD message to the BNG. After receiving the message, the BNG can determine the corresponding "based on the value of the "Discriminator” field in the message and the pre-defined "BFD Session" identifier. Whether IPv6 Session" is alive.
- IPv6 Session survival monitoring between HGW and BNG includes HGW receiving BNG Sending a BFD message, and monitoring whether the IP session between the HGW and the BNG point is alive according to the second discriminator field value in the BFD message, and the second discriminating field value is set to a special value, such as "0" or "OxFFFF".
- the BNG sends a BFD message to the HGW.
- the HGW can determine the corresponding "BFD Session" according to the value of the "Discriminator" field in the BFD message, and monitor the survival status of the associated "IP Session" accordingly.
- the BNG receives the BFD message sent by the HGW, and monitors whether the IP session between the BNG and the HGW is alive according to the source IP address related information and/or the second authentication domain value of the BFD message, and the source IP address related information includes the source IP address or the source. IP address prefix.
- the HGW can determine the corresponding "BFD Session" according to the source IP address of the message, that is, the source IP address/prefix of the BNG, and/or the value of the "Discriminator" field in the BFD message. Based on this, the associated "IP Session" is monitored for survival.
- the "BFD Session” used by the "Keepalive” of the “IPv6 Session” is "Keepalive” with the HGW address or BNG address.
- the "Discriminator” of the BFD message is set to "0" or "OxFFFF".
- the "BFD Session” used by the "IPv6 Session Keepalive” of the “IPv6 Session” is "Keepalive” interaction with the address or BNG address of the UE.
- the BNG/UE associates the "BFD Session” with the corresponding "IPv6 Session” I "IPv6 Session” group according to the value of the "Discriminator” field of the BFD message.
- the "Discriminator” field can include the “My Discriminator” or "Your Discriminator” field.
- the user may have multiple IP addresses and multiple "IP Sessions” under the same “Prefix Yn”. These multiple "IP Sessions” can be used as an "IP Session” group, and "Discriminator” with BFD messages.
- the value of the "Discriminator" field of the BFD message can represent the "IP Session" group under the same "Prefix Yn", so the first authentication field value is used to identify an IP session or IP address prefix of the same user terminal. Multiple IP sessions.
- the source IP address prefix is used to identify an IP session
- the single-hop "BFD Session” is identified by "Prefix Z” as the “Session”
- the multi-hop “BFD Session” is preceded by "Prefix Z,, or "Prefix Yn” As the identifier of "Session”.
- IP Session 0 can be marked with "Prefix Z”
- BFD Session 0 is used to support "Keepalive”
- the "Discriminator” field of BFD messages is set to "0" or "OxFFFF”
- BNG /UE associates "BFD Session 0" with the corresponding "IPv6 Session 0" according to the value of the source IP address prefix "Prefix Z” and "Discriminator” field of the BFD message (0 or OxFFFF).
- IP Session 1 For "IP Session 1", you can use the "Prefix ⁇ flag, use "BFD Session 1" to support "Keepalive", the "Discriminator” field of the BFD message is set to (Y1-Z); BNG/UE according to the Discriminator of the BFD message” The value of the field (Y1-Z) associates "BFD Session 1" with the corresponding "IPv6 Session ⁇ ".
- IP Session n For "IP Session n", you can use "Prefix Yn” to identify "BFD Session n” to support "Keepalive”, and the "Discriminator” field of BFD messages is set to (Yn-Z); BNG/UE according to BFD messages" The value of the Discriminator field (Yn-Z) associates "BFD Session n" with the corresponding "IPv6 Session n".
- the "IPv6 Session Keepalive Proxy" set on the HGW is used to implement the "Multiple hop IPv6 Session" survival monitoring, and the proxy mode is the HGW receiving the detection of the mutual transmission between the UE or the BNG.
- the proxy mode is the HGW receiving the detection of the mutual transmission between the UE or the BNG.
- the modified detection message is forwarded to the BNG or the UE; the UE or the BNG monitors whether the IP session between the BNG and the UE is alive according to the first authentication domain value of the detection message.
- the proxy mode according to the port settings of the HGW, they are introduced separately:
- a case of the proxy mode is as shown in FIG. 4, for the monitoring of the survival of the "IP Session" between the UE and the BNG, after modifying the first authentication domain value in the detection message, forwarding the modified to the BNG or the UE
- the detecting message specifically includes: receiving, by the HGW, the BFD message sent by the UE, and modifying the first authentication domain value in the BFD message to the difference between the IP address prefix of the user terminal and the IP address prefix of the home gateway, and then sending the modified BFD message to the BNG
- the HGW receives the BFD message sent by the BNG.
- the first authentication field value in the BFD message is the difference between the user terminal IP address prefix and the home gateway IP address prefix, and the first authentication domain value is modified to a value recognizable by the UE, and The modified BFD message is sent to the UE.
- the "BFD Session” used by the "IPv6 Session Keepalive” of the "IPv6 Session” is "Keepalive” interaction with the user's address or BNG address.
- "IPv6 Session Keepalive Proxy” will be the "Discriminator" field of the first hop BFD message.
- the value of the value is changed to (Yn-Z), that is, the difference between "Prefix Yn” and “Prefix Z", and then forwarded on the second hop; or "IPv6 Session Keepalive Proxy" will be the "Discriminator” of the second hop BFD message.
- the value of the field "(Yn-Z) is changed to the value that can be recognized by the UE/BNG, and then forwarded on the first hop.
- the BNG/UE associates the "BFD Session” with the value of the "Discriminator” field of the BFD message.
- the corresponding "IPv6 Session” is associated.
- the "Discriminator” field can include the "My Discriminator” or "Your Discriminator” field.
- the user may have multiple IP addresses under the same "Prefix Yn", multiple" IP Session", these multiple "IP Sessions” can be associated with the value of "Discriminator” i of the BFD message as an "IP Session” group, ie the "Discriminator” field of the BFD message can represent the same "Prefix Yn” "Under the IP Sessio n” group.
- the single-hop "BFD Session" uses "Prefix Z" as the identifier of "Session”; the multi-hop “BFD Session” uses "Prefix Z,, or "Prefix Yn” as the identifier of "Session”.
- FIG. 5 is a schematic diagram of Embodiment 2 of the IP session survival monitoring method according to the present invention.
- the present embodiment provides an 'IPv6 Session Keepalive Proxy' proxy set set on the HGW.
- the method implements the survival monitoring of the "Multiple hop IPv6 Session".
- the "Proxy" uses different WAN ports to correspond to different UE groups or IPv6 Session groups. For example, in Figure 5, a WAN port 0 corresponds to the user 1 to the user n. .
- the HGW receives the BFD or NUD message sent by the UE through the corresponding LAN port.
- the next hop survival monitoring message that is, the next hop monitoring message
- the source address and the destination address are both changed.
- the destination address is changed to the address of the BNG in the uplink direction
- the source address is changed to the address of the HGW.
- the first authentication domain value in the BFD message is modified to be the user terminal.
- the reconstructed BFD message including the modified first authentication domain value is sent to the BNG through a WAN port corresponding to the different local area network port;
- the HGW receives the NUD message sent by the UE, reconstructs the BFD message of the next hop, and sends the reconstructed BFD message to the BNG.
- the HGW receives the BFD message sent by the BNG through a WAN port.
- the first authentication field in the BFD message is the difference between the IP address prefix of the user terminal and the IP address prefix of the home gateway, and the first authentication domain value is modified to be the user.
- the corresponding value of the terminal IP address prefix is used to reconstruct the BFD message, and the BFD message including the modified first authentication domain value is sent to the UE through the corresponding local area network port.
- the "IPv6 Session" surviving monitoring between the HGW and the BNG includes the HGW receiving the BFD message sent by the BNG, and monitoring whether the IP session between the HGW receiving the BNG point is alive according to the second discriminator field value in the BFD message.
- the second discrimination field value is set to a special value such as "0" or "OxFFFF".
- the BNG sends a BFD message to the HGW.
- the HGW can determine the corresponding "BFD Session” according to the value of the "Discriminator" field in the BFD message, and monitor the survival status of the associated "IP Session" accordingly.
- the BNG receives the BFD message sent by the HGW, and monitors the IP session between the BNG and the HGW according to the second authentication domain value of the BFD message. Whether it is alive.
- the HGW can determine the corresponding "BFD Session” according to the value of the "Discriminator” field in the BFD message, and monitor the survival status of the associated "IP Session" accordingly.
- the "BFD Session" used by the single-hop “Keepalive of IPv6 Session” performs "Keepalive” interaction with the HGW address or BNG address, and the BFD message "Discriminator” field setting is set to a special value, such as "0" or " OxFFFF".
- IPv6 Session Keepalive of the multi-hop “IPv6 Session” is completed with two single hops.
- the "Proxy” relays the “Keepalive” process of the first hop and the second hop, and is responsible for maintaining the first hop and the second hop.”
- the state of Keepalive is synchronized, and the "Discriminator” i of "BDF Session” can also be set or falsified by "Proxy".
- the first flea uses the "NUD/BFD Session" of the single hop to perform "keepalive”
- the second hop uses the "BFD Session” of the single hop to perform "keepalive”.
- the "NUD/BFD Session" of the single hop for the first hop uses the user's address or "Proxy” address, which can be the "Keepalive” interaction of the HGW's LAN port address.
- the UE/HGW associates the "BFD Session" with the corresponding "IPv6 Session” according to the value of the "Discriminator" field of the BFD message.
- IPv6 Session Keepalive Proxy changes the value of the "Discriminator” field of the first megabit BFD message to (Yn-Z) and then forwards it on the second hop; or "IPv6 Session Keepalive Proxy” hops the second hop BFD message.
- the value of the "Discriminator” field (Yn-Z) is changed to the value corresponding to "Prefix Yn” and then forwarded on the first hop.
- the second hop, the BNG/HGW associates the "BFD Session” with the corresponding "IPv6 Session" according to the source IP address/prefix of the BFD message and/or the value of the "Discriminator” field.
- the single-hop "BFD Session” uses “Prefix Z” as the identifier of "Session”; the multi-hop “BFD Session” uses "Prefix Z,” or "Prefix Yn” as the identifier of "Session”.
- the BNG/HGW associates "BFD Session 0" with the corresponding "IPv6 Session n" according to the source IP address prefix "Prefix Z" and "Discriminator” i of the BFD message (Yn-Z); HGW/UE according to BFD
- the source IP address prefix "Prefix Yn" of the message associates "BFD Session In” with the corresponding "IPv6 Session n".
- the HGW also performs the state synchronization operation of the session peer, including "Proxy” to collect the "IP Session".
- the BFD diagnostic code or NUD status is expressed on the other hop by the BFD diagnostic code or NUD status.
- the "Proxy” is responsible for the BFD message of the second hop.
- the "diagnostic code” value is copied to the "diagnostic code” field of the first hop BFD message of all "IP Sessions", or "Proxy” is responsible for diagnosing the survival state of session 2 (Peer2) of the second hop, and then the session pair
- the survival state of the end 2 ( Peer 2 ) generates a corresponding diagnostic code ( BFD diagnostic code ), and the first hop of all the "IP Sessions” is notified to the peer end 1 ( Peerl ) through the BFD message.
- the upstream direction "Proxy” is responsible for diagnosing the survival state of the first hop session peer 1 (PEerl) through the NUD mechanism, and then the first hop survival state.
- the corresponding diagnostic code (BFD diagnostic code) is generated, and the peer end 2 (PEer2) is notified by the BFD message.
- BFD diagnostic code diagnostic code
- Neighbor Solicitation (NS) message may not reply to the Peer 1 Neighbor Advertisement (NA) message, or the "Proxy” may stop the Neighbor Solicitation (NS) message to the Peer 1 initiative.
- NA Neighbor Advertisement
- FIG. 6 is a schematic diagram of Embodiment 3 of the IP session survival monitoring method according to the present invention.
- the present embodiment provides an 'IPv6 Session Keepalive Proxy' proxy set on the HGW.
- the method implements the survival monitoring of the "Multiple hop IPv6 Session".
- the Proxy uses different WAN ports to correspond to different UEs or IPv6 sessions. For example, in FIG. 6, WAN port 1 corresponds to user 1, and WAN port n corresponds to user n.
- the HGW receives the BFD or NUD message sent by the UE through a LAN port, and reconstructs the next hop survival monitoring message, that is, the next hop monitoring message for the BFD message.
- the source address and the destination address are both changed.
- the destination address is changed to the address of the BNG in the uplink direction
- the source address is changed to the address of the HGW.
- the first authentication domain value in the BFD message is modified to be the user terminal.
- the reconstructed BFD message including the modified first authentication domain value is sent to the BNG through a WAN port corresponding to the local area network port; for the NUD message, the HGW receives the NUD sent by the UE.
- the message reconstructs the BFD message of the next hop and sends the reconstructed BFD message to the BNG.
- the HGW receives the BFD message sent by the BNG through a WAN port.
- the first authentication field in the BFD message is a value corresponding to the IP address prefix of the user terminal, and the BFD or NUD message is reconstructed, and the NUD message or the first authentication is included.
- the BFD message of the domain value is sent to the UE through a local area network port corresponding to the WAN port.
- IPv6 Session survival monitoring between HGW and BNG includes HGW receiving BNG
- the BFD message is sent, and according to the second discriminator field value in the BFD message, it is monitored whether the IP session between the HGW receiving the BNG point is alive, and the second discriminating field value is set to a special value, such as "0" or "OxFFFF".
- the BNG sends a BFD message to the HGW.
- the HGW can determine the corresponding "BFD Session” according to the value of the "Discriminator" field in the BFD message, and monitor the survival status of the associated "IP Session" accordingly.
- the BNG receives the BFD message sent by the HGW, and monitors whether the IP session between the BNG and the HGW is alive according to the second authentication domain value of the BFD message.
- the HGW can determine the corresponding "BFD Session” according to the value of the "Discriminator” field in the BFD message, and monitor the survival status of the associated "IP Session" accordingly.
- the "BFD Session" used by the "Keepalive” of the single-hop “IPv6 Session” performs a "Keepalive” interaction with an HGW address or a BNG address, and the "Discriminator” field of the BFD message is set to "0" or "OxFFFF".
- IPv6 Session Keepalive of the multi-hop “IPv6 Session” is completed with two single hops.
- the "Proxy” relays the “Keepalive” process of the first hop and the second hop, and is responsible for maintaining the first hop and the second hop.” Keepalive” state synchronization.
- the first flea uses the "NUD/BFD Session" of the single hop to perform "keepalive”
- the second hop uses the "BFD Session” of the single hop to perform "keepalive”.
- the "NUD/BFD Session" for the first hop of the first hop uses the user's address or "Proxy” address, which can be the "Keepalive” interaction of the HGW's LAN port address.
- the UE/HGW associates the "BFD Session" with the corresponding "IPv6 Session” according to the value of the "Discriminator" field of the BFD message.
- the second hop, the BNG/HGW associates the "BFD Session" with the corresponding "IPv6 Session" according to the source IP address/prefix of the BFD message and/or the value of "Discriminator”i or.
- "Proxy” uses different WAN ports to correspond to different UEs or "IPv6 Sessions”.
- the BNG/HGW distinguishes the "IPv6 Sessions” of different users according to the value of the "Discriminator" field of the BFD message.
- the single-hop "BFD Session” uses “Prefix Z” as the identifier of "Session”; the multi-hop “BFD Session” uses "Prefix Z” or "Prefix Yn” as the identifier of "Session”.
- IP Session 0 For "IP Session 0", you can use the Prefix Z logo and use "BFD Session”.
- the "Discriminator” field of the BFD message is set to "0" or "OxFFFF"; BNG/UE will "BFD Session 0" according to the source IP address prefix of the BFD message "Prefix Z" with the corresponding " IPv6 Session 0" is associated.
- IP Session 1 For "IP Session 1", you can use the Prefix Yl logo, use “BFD Session 11" and “BFD Session 21” to support " Keepalive", and the "Discriminator” field of the "BFD Session 21" message is set to (Yl-Z);
- the BNG/HGW associates the "BFD Session 21" with the corresponding "IPv6 Session 1" according to the source IP address prefix "Prefix Y1" of the BFD message; the HGW/UE will "BFD” according to the source IP address prefix "Prefix Yl” of the BFD message.
- Session 11 " is associated with the corresponding "IPv6 Session ⁇ ".
- IP Session ⁇ For "IP Session ⁇ ,, , you can use the Prefix Yn flag, use "BFD Session In” and
- BFD Session 2n to support "Keepalive", "BFD Session 2n” BFD message “Discriminator” i or set to (Yn-Z); "BFD Session In” BFD message “Discriminator” field set to "Prefix Yn” The last 32 bits.
- the BNG/HGW associates the "BFD Session 2n” with the corresponding "IPv6 Session n” according to the source IP address prefix "Prefix Yn" of the BFD message; the HGW/UE will “BFD” according to the source IP address prefix "Prefix Yn” of the BFD message.
- Session In is associated with the corresponding "IPv6 Session n".
- the HGW also performs the state synchronization operation of the session peer, and may include "Proxy” to collect the "IP Session" one-hop diagnostic code (BFD diagnostic code) or NUD.
- BFD diagnostic code one-hop diagnostic code
- NUD one-hop diagnostic code
- the status is, for example, the neighbor is unreachable, and is expressed on another hop by a diagnostic code (BFD diagnostic code) or NUD.
- "Proxy” is responsible for diagnosing the survival state of the first hop session peer 1 (PEerl) through the NUD mechanism, and then the first hop survival state. Generate a corresponding diagnostic code (BFD diagnostic code), and notify the peer 2 (PEer2) through the BFD message; for example, when the "Proxy” sends a Neighbor Solicitation (NS) message to Peer 1, it is not within the specified time.
- BFD diagnostic code corresponding diagnostic code
- NS Neighbor Solicitation
- the IP session survival monitoring method provided by the embodiment of the present invention uses "Multihop BFD” as the survival monitoring mechanism of the "Multihop IPv6 Session” or “IPv6 Session Keepalive Proxy” on the HGW, so that the "IPv6 Session” can be established in the HGW.
- the subsequent "Single hop IP Session” is extended to "Multihop IP Session” between the UE and the IP edge node to implement the "Multiple hop IPv6 Session" survival monitoring.
- FIG. 7 is a schematic structural diagram of a home gateway embodiment of the present invention, as shown in FIG.
- the home gateway includes a first receiving module 11 and a first forwarding module 12, where the first receiving module 11 is configured to receive a bidirectional forwarding detection message sent by the user terminal or the IP edge node; the first forwarding module 12 is configured to use the first And receiving, by the receiving module, a bidirectional forwarding detection message, and sending, by the IP edge node or the user terminal, a bidirectional forwarding detection message including a first authentication domain value, where the first authentication domain value is a user terminal IP address prefix and a home gateway The difference between the IP address prefixes. Specifically, the first receiving module 11 receives the BFD message sent by the UE or the BNG.
- the first discriminator value in the BFD message is the difference between the IP address prefix of the user terminal and the IP address prefix of the home gateway. If the first authentication domain value in the BFD message is not the difference between the user terminal IP address prefix and the home gateway IP address prefix, then the user's IP address prefix and the home gateway IP address are changed. After the difference of the address prefix, it is forwarded to the UE or BNG.
- the home gateway provided in this embodiment further includes a proxy module 13 for modifying the first authentication domain value in the bidirectional forwarding detection message received by the first receiving module 11.
- a proxy module 13 for modifying the first authentication domain value in the bidirectional forwarding detection message received by the first receiving module 11.
- the home gateway in order to realize the survival monitoring of the "IP Session" between the UE connected to the IP edge node and the IP edge node, such as the BNG, adding a proxy function in the home gateway, and implementing the first hop to the second hop through the proxy
- the first receiving module 11 receives the BFD detection message sent by the UE or the BNG, and the proxy module 13 modifies the authentication domain value in the detection message according to the actual situation, so that it is suitable for transmission in the next hop to achieve survival monitoring. purpose.
- the first forwarding module 12 sends a detection message including the modified home domain value to the destination of the next hop, which may be the UE or the BNG.
- the home gateway provided in this embodiment further includes a sending module 14 configured to send a detection message including a second authentication domain value to the BNG, where the second authentication domain value is "0" or "OxFFFF", and the home gateway passes the sending module 14 Implement session monitoring monitoring with BNG.
- the "IPv6 Session Keepalive Proxy" is set on the HGW, so that the "IPv6 Session” can be established between the UE behind the HGW and the IP edge node, and the "Single hop IP Session" is expanded to "Multihop”.
- the IP Session "implements the survival monitoring of the "Multiple hop IPv6 Session”.
- FIG. 8 is a schematic structural diagram of an embodiment of a network device according to the present invention.
- the network device includes a second receiving module 21 and a processing module 22, and the network device receives a BFD message sent by the home gateway through the second receiving module 21, where The first authentication domain value included in the BFD message is a difference between the user terminal IP address prefix and the home gateway IP address prefix.
- the processing module 22 monitors the IP edge node according to the first authentication domain value in the BFD message. Whether the IP session with the user terminal is alive.
- the processing module is further configured to determine, according to the first authentication domain value in the bidirectional forwarding detection message, whether a bidirectional forwarding detection session corresponding to the first authentication domain value is alive, and detect whether the session is alive according to the bidirectional forwarding And determining whether the IP session associated with the two-way forwarding detection session is alive.
- the network device provided in this embodiment may be a UE or a BNG, and the BFD message sent by the home gateway monitors the survival of the "IPv6 Session" between the UE and the BNG.
- FIG. 9 is a schematic structural diagram of an embodiment of an IP session survival monitoring system according to the present invention, as shown in FIG.
- the IP session surviving monitoring system includes a home gateway 1 and a network device 2, wherein the home gateway 1 is configured to send a bidirectional forwarding detection message to the network device, where the first authentication domain value in the bidirectional forwarding detection message is a user terminal IP address prefix and The difference between the home gateway IP address prefix and the network device 2 is configured to receive the bidirectional forwarding detection message sent by the home gateway, and monitor the IP edge node and the user terminal according to the first authentication domain value in the bidirectional forwarding detection message. Whether the IP session between the two is alive.
- the home gateway and the network device involved in the IP session surviving monitoring system provided in this embodiment may use the home gateway and the network device provided in the foregoing embodiments, and details are not described herein again.
- IPv6 Session In the IP session surviving monitoring system provided in this embodiment, by setting an "IPv6 Session Keepalive Proxy" on the HGW, an “IPv6 Session” can be established between the UE behind the HGW and the IP edge node, and “Single hop IP Session” "Expanded to "Multihop IP Session” implements the survival monitoring of "Multiple hop IPv6 Session”.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Health & Medical Sciences (AREA)
- Cardiology (AREA)
- General Health & Medical Sciences (AREA)
- Computer Security & Cryptography (AREA)
- Environmental & Geological Engineering (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Alarm Systems (AREA)
- Computer And Data Communications (AREA)
Description
Claims
Priority Applications (6)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
AT10733212T ATE557497T1 (de) | 2009-01-21 | 2010-01-13 | Verfahren und system zur überwachung der stabilität von ip-sitzungen sowie heim-gateway und netzwerkausrüstung dafür |
KR1020117018476A KR101245786B1 (ko) | 2009-01-21 | 2010-01-13 | Ip 세션 킵얼라이브 모니터링을 위한 방법 및 시스템, 홈 게이트웨이, 및 네트워크 장치 |
JP2011546574A JP5118257B2 (ja) | 2009-01-21 | 2010-01-13 | Ipセッションキープアライブ監視方法およびシステム、ホームゲートウェイ、ならびにネットワーク装置 |
ES10733212T ES2384162T3 (es) | 2009-01-21 | 2010-01-13 | Método y sistema de vigilancia de la vivacidad de sesiones IP, pasarela doméstica y equipo de red |
EP10733212A EP2383934B1 (en) | 2009-01-21 | 2010-01-13 | Ip session liveness monitoring method and system, home gateway and network equipment |
US13/187,972 US8331245B2 (en) | 2009-01-21 | 2011-07-21 | Method and system for IP session keepalive monitoring, home gateway and network device |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2009100019971A CN101783773B (zh) | 2009-01-21 | 2009-01-21 | Ip会话存活监控方法及系统、家庭网关和网络设备 |
CN200910001997.1 | 2009-01-21 |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US13/187,972 Continuation US8331245B2 (en) | 2009-01-21 | 2011-07-21 | Method and system for IP session keepalive monitoring, home gateway and network device |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2010083739A1 true WO2010083739A1 (zh) | 2010-07-29 |
Family
ID=42355536
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2010/070161 WO2010083739A1 (zh) | 2009-01-21 | 2010-01-13 | Ip会话存活监控方法及系统、家庭网关和网络设备 |
Country Status (8)
Country | Link |
---|---|
US (1) | US8331245B2 (zh) |
EP (1) | EP2383934B1 (zh) |
JP (1) | JP5118257B2 (zh) |
KR (1) | KR101245786B1 (zh) |
CN (1) | CN101783773B (zh) |
AT (1) | ATE557497T1 (zh) |
ES (1) | ES2384162T3 (zh) |
WO (1) | WO2010083739A1 (zh) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2013500653A (ja) * | 2010-10-08 | 2013-01-07 | ▲ホア▼▲ウェイ▼技術有限公司 | 情報を提供するための方法、ホームゲートウェイおよびホームネットワークシステム |
CN111355764A (zh) * | 2018-12-24 | 2020-06-30 | 迈普通信技术股份有限公司 | 保活报文发送方法、装置、电子设备及可读存储介质 |
Families Citing this family (25)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101945020A (zh) * | 2010-09-14 | 2011-01-12 | 中兴通讯股份有限公司 | 会话监控处理方法和监控设备 |
EP3282733A1 (en) * | 2012-03-01 | 2018-02-14 | Interdigital Patent Holdings, Inc. | Method and apparatus for supporting dynamic and distributed mobility management |
US9083650B2 (en) | 2012-10-16 | 2015-07-14 | Cable Television Laboratories, Inc. | Overlay network |
WO2014075213A1 (zh) * | 2012-11-13 | 2014-05-22 | 华为技术有限公司 | 双向转发检测bfd会话协商方法、设备及系统 |
CN103067220B (zh) * | 2012-12-19 | 2016-02-10 | 中兴通讯股份有限公司 | 参数更新情况下双向链路转发检测方法及装置 |
US9185170B1 (en) | 2012-12-31 | 2015-11-10 | Juniper Networks, Inc. | Connectivity protocol delegation |
US9602367B2 (en) * | 2013-03-15 | 2017-03-21 | Teoco Corporation | System, method, and computer program product for creating a header detail record |
WO2014179508A1 (en) * | 2013-04-30 | 2014-11-06 | Seven Networks, Inc. | Detection and reporting of keepalive messages for optimization of keepalive traffic in a mobile network |
WO2014194333A1 (en) | 2013-05-31 | 2014-12-04 | Seven Networks, Inc. | Optimizing traffic by controlling keep-alives |
US9497107B1 (en) * | 2013-06-06 | 2016-11-15 | Cisco Technology, Inc. | Seamless path monitoring and rapid fault isolation using bidirectional forwarding detection in a network environment |
WO2017210208A1 (en) * | 2016-05-31 | 2017-12-07 | Brocade Communications Systems, Inc. | Keepalive technique in a network device |
US10476774B2 (en) * | 2016-08-31 | 2019-11-12 | Juniper Networks, Inc. | Selective transmission of bidirectional forwarding detection (BFD) messages for verifying multicast connectivity |
US10541904B2 (en) | 2016-12-14 | 2020-01-21 | Hewlett Packard Enterprise Development Lp | Establishing a network fault detection session |
CN107733931B (zh) * | 2017-11-30 | 2021-03-09 | 新华三技术有限公司 | 入口认证方法、装置及入口服务器 |
CN111614505B (zh) * | 2019-02-25 | 2022-02-25 | 华为技术有限公司 | 报文处理的方法和网关设备 |
US10855813B1 (en) * | 2019-07-01 | 2020-12-01 | EMC IP Holding Company LLC | Controlled activation of performance monitoring component of network protocol |
US10958769B2 (en) * | 2019-07-01 | 2021-03-23 | EMC IP Holding Company LLC | Activation of performance monitoring component of network protocol based on network metrics |
CN110753002B (zh) * | 2019-09-29 | 2023-04-07 | 北京浪潮数据技术有限公司 | 流量调度方法及装置 |
CN112995353B (zh) * | 2019-12-17 | 2022-10-21 | 北京白帽汇科技有限公司 | 基于流量分析的IPv6地址存活性扫描系统及扫描方法 |
CN111654407B (zh) * | 2020-04-14 | 2022-05-27 | 新华三信息安全技术有限公司 | 一种堆叠系统及其双向转发检测方法 |
US11700178B2 (en) | 2020-10-30 | 2023-07-11 | Nutanix, Inc. | System and method for managing clusters in an edge network |
US11374807B2 (en) | 2020-10-30 | 2022-06-28 | Nutanix, Inc. | Handling dynamic command execution in hybrid cloud environments |
US11290330B1 (en) | 2020-10-30 | 2022-03-29 | Nutanix, Inc. | Reconciliation of the edge state in a telemetry platform |
CN113595599B (zh) * | 2021-09-30 | 2021-12-10 | 华东交通大学 | 面向5g的群簇协作通信异构系统和干扰抑制的方法 |
US11765065B1 (en) | 2022-03-23 | 2023-09-19 | Nutanix, Inc. | System and method for scalable telemetry |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20070073891A1 (en) * | 2005-09-29 | 2007-03-29 | Cisco Technology, Inc. | MGCP fallback mechanism enhancement |
WO2008067760A1 (en) * | 2006-12-05 | 2008-06-12 | Huawei Technologies Co., Ltd. | Method and system for distributed architecture for monitoring session liveness |
CN101304367A (zh) * | 2007-05-11 | 2008-11-12 | 华为技术有限公司 | 订户会话的存活监控方法、系统及装置 |
CN101312456A (zh) * | 2007-05-21 | 2008-11-26 | 华为技术有限公司 | 对订户会话进行存活监控的方法及系统 |
Family Cites Families (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6628671B1 (en) * | 1999-01-19 | 2003-09-30 | Vtstarcom, Inc. | Instant activation of point-to point protocol (PPP) connection using existing PPP state |
US7277453B2 (en) * | 2003-05-30 | 2007-10-02 | Motorola, Inc. | Inter private network communications between IPv4 hosts using IPv6 |
US7526556B2 (en) * | 2003-06-26 | 2009-04-28 | International Business Machines Corporation | Method and apparatus for managing keepalive transmissions |
JP4681049B2 (ja) * | 2005-06-14 | 2011-05-11 | テレフオンアクチーボラゲット エル エム エリクソン(パブル) | ネットワークにおける障害処理のための方法および装置 |
US7860981B1 (en) * | 2006-09-29 | 2010-12-28 | Juniper Networks, Inc. | Systems and methods for IP session keepalive using BFD protocols |
US8374164B2 (en) * | 2007-04-06 | 2013-02-12 | Cisco Technology, Inc. | Detection of specific BFD path failures |
JP2009016905A (ja) * | 2007-06-29 | 2009-01-22 | Fujitsu Ltd | パケットネットワークシステム |
-
2009
- 2009-01-21 CN CN2009100019971A patent/CN101783773B/zh not_active Expired - Fee Related
-
2010
- 2010-01-13 WO PCT/CN2010/070161 patent/WO2010083739A1/zh active Application Filing
- 2010-01-13 AT AT10733212T patent/ATE557497T1/de active
- 2010-01-13 JP JP2011546574A patent/JP5118257B2/ja not_active Expired - Fee Related
- 2010-01-13 KR KR1020117018476A patent/KR101245786B1/ko active IP Right Grant
- 2010-01-13 ES ES10733212T patent/ES2384162T3/es active Active
- 2010-01-13 EP EP10733212A patent/EP2383934B1/en not_active Not-in-force
-
2011
- 2011-07-21 US US13/187,972 patent/US8331245B2/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20070073891A1 (en) * | 2005-09-29 | 2007-03-29 | Cisco Technology, Inc. | MGCP fallback mechanism enhancement |
WO2008067760A1 (en) * | 2006-12-05 | 2008-06-12 | Huawei Technologies Co., Ltd. | Method and system for distributed architecture for monitoring session liveness |
CN101304367A (zh) * | 2007-05-11 | 2008-11-12 | 华为技术有限公司 | 订户会话的存活监控方法、系统及装置 |
CN101312456A (zh) * | 2007-05-21 | 2008-11-26 | 华为技术有限公司 | 对订户会话进行存活监控的方法及系统 |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2013500653A (ja) * | 2010-10-08 | 2013-01-07 | ▲ホア▼▲ウェイ▼技術有限公司 | 情報を提供するための方法、ホームゲートウェイおよびホームネットワークシステム |
US8606937B2 (en) | 2010-10-08 | 2013-12-10 | Huawei Technologies Co., Ltd. | Information providing method, home gateway, and home network system |
CN111355764A (zh) * | 2018-12-24 | 2020-06-30 | 迈普通信技术股份有限公司 | 保活报文发送方法、装置、电子设备及可读存储介质 |
CN111355764B (zh) * | 2018-12-24 | 2023-10-24 | 迈普通信技术股份有限公司 | 保活报文发送方法、装置、电子设备及可读存储介质 |
Also Published As
Publication number | Publication date |
---|---|
JP2012516084A (ja) | 2012-07-12 |
ES2384162T3 (es) | 2012-07-02 |
EP2383934B1 (en) | 2012-05-09 |
US8331245B2 (en) | 2012-12-11 |
KR20110104551A (ko) | 2011-09-22 |
EP2383934A4 (en) | 2011-11-02 |
US20110280134A1 (en) | 2011-11-17 |
CN101783773B (zh) | 2013-01-09 |
EP2383934A1 (en) | 2011-11-02 |
CN101783773A (zh) | 2010-07-21 |
ATE557497T1 (de) | 2012-05-15 |
JP5118257B2 (ja) | 2013-01-16 |
KR101245786B1 (ko) | 2013-03-20 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2010083739A1 (zh) | Ip会话存活监控方法及系统、家庭网关和网络设备 | |
US9832168B2 (en) | Service discovery within multi-link networks | |
KR101313831B1 (ko) | 모바일 가상 사설망 통신을 위한 방법, 장치 및 시스템 | |
JP5421392B2 (ja) | 宅内ネットワーク内におけるプロキシモバイルIPv6のサポート | |
JP4487948B2 (ja) | パケット送信方法、中継ノード、および受信ノード | |
EP2401873B1 (en) | Ipv6 anycast-based load balancing and redirection functionality for pmipv6 | |
US11153207B2 (en) | Data link layer-based communication method, device, and system | |
WO2006058206A2 (en) | A method of subnet roaming within a network | |
JP5519710B2 (ja) | データリンク層のための最大送信単位(mtu)サイズ検出メカニズムおよび方法 | |
WO2011137842A1 (zh) | 一种基于cgn实体的数据传输方法、cgn实体、网关及系统 | |
WO2014116148A1 (en) | Methods and arrangements for checking connectivity and detecting connectivity failure | |
WO2009071030A1 (fr) | Procédé pour rapporter des informations de dispositif, système et dispositif pour obtenir des informations de dispositif | |
EP3337121B1 (en) | Networking bonding by a mobile communication device | |
Kärkkäinen et al. | Enabling ad-hoc-style communication in public wlan hot-spots | |
JP5857222B2 (ja) | 無線ネットワークシステム、無線通信装置、及び、無線通信装置のプログラム | |
US10367732B2 (en) | Route control for internet exchange point | |
WO2014090194A1 (zh) | 终端设备的拨号方法和接入设备 | |
JP5889122B2 (ja) | 制御ノード及び通信制御方法 | |
JP3613207B2 (ja) | Arpテーブル形成方法及びこれを用いた経路制御方法 | |
CN106452992A (zh) | 一种远端多归属组网的实现方法及装置 | |
Chen et al. | OSPFv3 over IPv4 for IPv6 Transition | |
Chen et al. | RFC 7949: OSPFv3 over IPv4 for IPv6 Transition | |
Proto et al. | The olsr mdns extension for service discovery | |
Shah et al. | Address Resolution Protocol (ARP) Mediation for IP Interworking of Layer 2 VPNs | |
Kompella | Internet Engineering Task Force (IETF) H. Shah, Ed. Request for Comments: 6575 Ciena Category: Standards Track E. Rosen, Ed. |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 10733212 Country of ref document: EP Kind code of ref document: A1 |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2011546574 Country of ref document: JP |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2010733212 Country of ref document: EP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 3191/KOLNP/2011 Country of ref document: IN |
|
ENP | Entry into the national phase |
Ref document number: 20117018476 Country of ref document: KR Kind code of ref document: A |