WO2022110756A1 - 一种层次结构的标识寻址方法 - Google Patents
一种层次结构的标识寻址方法 Download PDFInfo
- Publication number
- WO2022110756A1 WO2022110756A1 PCT/CN2021/098587 CN2021098587W WO2022110756A1 WO 2022110756 A1 WO2022110756 A1 WO 2022110756A1 CN 2021098587 W CN2021098587 W CN 2021098587W WO 2022110756 A1 WO2022110756 A1 WO 2022110756A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- address
- border router
- identification
- controller
- message
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims abstract description 84
- 238000013507 mapping Methods 0.000 claims abstract description 53
- 230000008569 process Effects 0.000 claims abstract description 20
- 238000007726 management method Methods 0.000 claims description 53
- 230000007246 mechanism Effects 0.000 claims description 12
- 238000004458 analytical method Methods 0.000 claims description 11
- 238000000926 separation method Methods 0.000 claims description 6
- 230000000977 initiatory effect Effects 0.000 claims description 2
- 230000000644 propagated effect Effects 0.000 claims description 2
- 102100037250 EP300-interacting inhibitor of differentiation 1 Human genes 0.000 description 34
- 101000881670 Homo sapiens EP300-interacting inhibitor of differentiation 1 Proteins 0.000 description 34
- 102100024533 Carcinoembryonic antigen-related cell adhesion molecule 1 Human genes 0.000 description 16
- 101000981093 Homo sapiens Carcinoembryonic antigen-related cell adhesion molecule 1 Proteins 0.000 description 15
- 230000006872 improvement Effects 0.000 description 14
- 238000010586 diagram Methods 0.000 description 12
- 101000586272 Mus musculus Osteocalcin-2 Proteins 0.000 description 6
- 238000005516 engineering process Methods 0.000 description 5
- 238000011161 development Methods 0.000 description 4
- 238000012545 processing Methods 0.000 description 4
- 230000008901 benefit Effects 0.000 description 3
- WLNBMPZUVDTASE-HXIISURNSA-N (2r,3r,4s,5r)-2-amino-3,4,5,6-tetrahydroxyhexanal;sulfuric acid Chemical compound [O-]S([O-])(=O)=O.O=C[C@H]([NH3+])[C@@H](O)[C@H](O)[C@H](O)CO.O=C[C@H]([NH3+])[C@@H](O)[C@H](O)[C@H](O)CO WLNBMPZUVDTASE-HXIISURNSA-N 0.000 description 2
- 230000005540 biological transmission Effects 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 238000011160 research Methods 0.000 description 2
- 108090000573 Osteocalcin Proteins 0.000 description 1
- 238000004891 communication Methods 0.000 description 1
- 238000012217 deletion Methods 0.000 description 1
- 230000037430 deletion Effects 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 230000009977 dual effect Effects 0.000 description 1
- 230000010365 information processing Effects 0.000 description 1
- 230000006855 networking Effects 0.000 description 1
- 230000002688 persistence Effects 0.000 description 1
- 230000004044 response Effects 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L45/00—Routing or path finding of packets in data switching networks
- H04L45/74—Address processing for routing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L45/00—Routing or path finding of packets in data switching networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L45/00—Routing or path finding of packets in data switching networks
- H04L45/02—Topology update or discovery
- H04L45/04—Interdomain routing, e.g. hierarchical routing
Definitions
- the present invention relates to the field of network technology and communication technology, and in particular, to a hierarchical structure identification addressing method.
- ICN Information-Centric Networking
- ETSI European Telecommunications Standardization Institute
- NCP 004 Evolved Architecture for mobility using Identity Oriented Networks
- the new network architecture based on the idea of separation of identity and address has become a new idea to solve the problems of traditional TCP/IP network. After the location and identity are separated, how to use the uniqueness and persistence of the identity to design a routing mechanism that meets the needs of future Internet development has become a current research hotspot.
- Identification-based routing methods can be divided into two categories: identification-based direct routing and address-based routing after identification-based resolution addressing.
- the identification direct routing method directly maps the identification of the object to the route, that is, the location and identification resolution path and the retrieval path of the routing information are integrated.
- Typical projects include: CCN/NDN; the method based on identification resolution addressing and address routing is Will first map the identity to the address through the name resolution system, and then adopt the address-based routing method.
- Typical projects include: DONA, MoblityFirst.
- the first method does not need to rely on resolution services and network addresses, and performs routing and forwarding entirely based on identifiers; however, it cannot be better compatible with existing network devices and network architectures. There are a large number of identifier routing tables, which brings scalability and routing benefits. Convergence efficiency problem.
- the second method can be better compatible with the existing network equipment and network architecture, and the underlying mechanism is still based on address routing; however, it needs to rely on the external parsing and mapping system, and the security and efficiency of the system will affect the routing process.
- the present invention proposes a hierarchical identification addressing method, which performs network domain layering based on the management domain and the control domain.
- the controller stores the identification and address mapping relationship of entities in the control domain, and manages the
- the domain border router stores the matching relationship between the identity of the entity in the management domain and the control domain, as well as the association between the identity and the associated border router, and implements hierarchical storage; at the same time, it adopts the method of intra-domain hierarchical analysis to realize the dynamic identity of the message transmission process. Parsing and addressing; effectively solve the problems of scalability and query efficiency caused by the large number of identification address mapping tables.
- the present invention proposes a hierarchical identification addressing method, which uses an identifier unrelated to the network address to uniquely identify each network entity in the network under the framework of the separation of identification and address; the entire network consists of multiple
- the management domain can be divided into multiple control domains, and each control domain has a controller;
- the network nodes that bear the identification resolution and routing include but are not limited to: the edge routers of the control domain and the border routers of the management domain;
- the controller stores the identification and address mapping relationship of entities in the control domain, and the management domain border router stores the matching relationship between the identification of entities in the management domain and the control domain, and the association between the identification and the associated border router;
- the method includes but is not limited to:
- Step 1) receiving the request message carrying the identifier of the requesting network entity
- Step 2) Perform identification resolution on the edge router of the control domain to obtain the address, if the address obtained by resolution is the final destination address, the process ends; otherwise, the address obtained by resolution is the border router address of the management domain where the network entity is located, and enter step 3) ;
- Step 3 On the border router of the management domain, carry out the matching between the identity of the entity in this management domain and the controller that stores the relevant mapping relationship of the identity, and if a matching controller is found, then in the matching controller, perform identification resolution and search. address, go to step 2); otherwise, execute step 4);
- Step 4) On the management domain border router, determine the intermediate border router corresponding to the identifier; and on the intermediate border router, obtain the management domain border router associated with the identifier through an index, and perform step 3).
- the network entities include but are not limited to: hosts, data and services; the identifier generation methods include but are not limited to: flat naming method, hierarchical naming method and multi-semantic naming method .
- the controller is used to realize the following functions:
- the identification can be re-analyzed based on a specific trigger mechanism
- the address obtained by parsing is the final destination address; if not stored, the address obtained by parsing is the preset target address, including but not limited to: boundary router address and default forwarding address;
- the delivered flow table carries the address obtained by parsing, and the router can fill in or update the destination address field in the message based on the delivered flow table.
- the entity in the control domain is a network entity with a unique identification, including but not limited to: network equipment, services and data; if the entity is a network device, the device is first connected to the control domain through this control domain. network; if the entity is data or service, etc., the network device where the entity is located first connects to the network through this control domain; that is, the message sent by the device where the entity is located enters the first control domain that passes through the network, called The control domain in which this entity resides.
- the destination address field in the message is empty or the filled address is a pre-agreed address
- the destination address in the message is an invalid address; otherwise, the destination address in the message is a valid address;
- the pre-agreed address is an address selected from the reserved addresses in the address space, and is a non-routing address, including a reserved address in an IP network.
- the specific trigger mechanism can trigger the re-analysis and addressing of the identifier, including but not limited to: the message carries the trigger flag bit.
- the edge router of the control domain refers to the first router through which the message is forwarded to the control domain, and is located at the periphery of the control domain.
- the edge router of the control domain is used to implement the following Function:
- the message After receiving a message whose destination address field is an invalid address, the message can be reported and forwarded to the controller to which the edge router belongs, and the controller is requested to issue a forwarding flow table;
- the destination address field in the packet can be filled in or updated based on the flow table sent by the controller.
- the updated destination address may include but is not limited to: final destination address and The address of the border router in the management domain, etc.;
- the destination address field in the message can be updated based on the flow table below the controller;
- the management domain border router refers to a device used for message forwarding between management domains, which is a kind of border device, and the management domain border router is used to implement the following functions:
- the identity of the network entity is mapped to the index of one or more border routers, and these mapped border routers are called the intermediate border routers of the entity's identity, wherein the pre-agreed method Including but not limited to: table lookup and function mapping;
- the matching relationship between the identifier and the control domain can be added or deleted based on the registration or cancellation request of the identifier
- (9) carry out identification parsing, and update the destination address field of message based on parsing result, the address that parsing obtains includes but is not limited to: controller address, edge router address and border router address;
- the mapping relationship between the identifier and the address of the network entity corresponding to the identifier is stored and maintained on the controller of the control domain.
- the matching relationship between the identifier and the control domain is stored and maintained in the border router of the management domain to which the network entity belongs.
- the association relationship between the identifier and the associated border router refers to the mapping relationship between the entity identifier and the address of the border router that registers the relationship.
- the method further includes: the step of registering the identification, which specifically includes:
- the entity registers the mapping relationship between the identifier and the address with the controller of the control domain where it is located;
- the controller stores the mapping relationship between the identifier and the address of the entity
- the registration request is flooded to the border routers of the administrative domain to which the entity belongs;
- the border router stores the matching relationship between the mapping relationship and the control domain
- Border routers map network entity identifiers to intermediate border router indexes
- the registration request is flooded to the identity-mapped intermediary border router
- the intermediary border router stores the association of the identity with the associated border router.
- step 2 specifically comprises the following steps:
- Step 201) When the edge router receives that the destination address field in the message is an invalid address, or receives a specific trigger mechanism, the edge router reports and forwards the message to the controller where it is located, and requests to issue a forwarding flow table;
- Step 202) After receiving the message, the controller performs identification analysis
- Step 203 The controller issues a flow table, and the flow table carries the address information obtained by parsing;
- Step 204) The edge router fills in or updates the destination address field of the message based on the delivery flow table.
- step 3 specifically comprises the following steps:
- Step 301) The message received by the border router is matched with the control domain in the management domain;
- Step 302) If there is a matching control domain, perform identification resolution and addressing in the matching controller, and go to Step 201);
- step 4 specifically comprises the following steps:
- Step 401) on the management domain border router the identification is mapped to the intermediate border router index
- Step 402) forward the message to the intermediate border router
- Step 403 on this intermediate border router, obtain the associated border router of the identification
- Step 404) forwards the message to the associated border router, performs matching and addressing of the control domain within the management domain, and executes step 301).
- the method further includes: a logout step of the identification, which specifically includes:
- the entity deregisters the mapping relationship between the ID and the address from the controller of the control domain where the entity is located;
- the controller deletes the mapping relationship between the identifier and the address of the entity
- the logout request is propagated to the border routers of the administrative domain to which the entity belongs;
- the border router deletes the matching relationship between the mapping relationship and the control domain
- Border routers map network entity identifiers to intermediate border router indexes
- the logout request is flooded to the identity-mapped intermediary border router
- the intermediate border router deletes the association of the ID with the associated border router.
- the method of the invention performs network domain layering based on the management domain and the control domain, the controller stores the identification and address mapping relationship of the entities in the control domain, the management domain border router stores the matching relationship between the identification of the entities in the management domain and the control domain, and the identification and associated boundaries
- the association relationship between routers realizes hierarchical storage; at the same time, the method of hierarchical analysis between intra-domain and inter-domain realizes dynamic analysis and addressing of identification during message transmission; effectively solves the scalability caused by the large number of identification address mapping tables. and query efficiency issues.
- 1 is a schematic diagram of a network structure
- Fig. 2 the identification registration flow chart of the present invention
- FIG. 3 concrete flow chart of the identification registration of the present invention
- FIG. 4 is a schematic diagram of network processing of the mapping relationship between server registration EID1 and IP1 according to the present invention
- Fig. 5 is the identification cancellation flow chart of the present invention.
- Fig. 6 is the concrete flow chart of the identification cancellation of the present invention.
- FIG. 7 is a schematic diagram of network processing of the server deregistering the mapping relationship between EID1 and IP1 according to the present invention
- Fig. 8 is the identification parsing and routing flow chart of the present invention.
- Fig. 9 is a schematic diagram of user 1 requesting identification EID1 network parsing and routing process
- Figure 10 is a schematic diagram of user 2 requesting identification EID1 network resolution and routing process
- Figure 11 is a schematic diagram of user 3 requesting identification EID1 network resolution and routing process
- FIG. 12 is a flowchart of the identification registration of the present invention.
- An identifier refers to a globally unique identifier that can represent a network entity independent of a network address, including but not limited to data identifiers, etc.; a network address refers to the network routable address information where the network entity is located, including However, it is not limited to the use of information such as IP addresses.
- the content identifier is taken as an example, which is represented by EID (Entity ID), and the network address is represented by IP address.
- the video content Movie is deployed on the server, the identifier is EID1, and the network address of the server is IP1; the server publishes the video content by registering the mapping relationship between EID1 and IP1 to the network, and the user obtains the video content through the identifier EID1, When the server does not provide video content, it needs to cancel the mapping relationship between EID1 and IP1 from the network.
- FIG. 1 is a schematic diagram of a network structure involved in the present invention.
- FIG. 2 and FIG. 3 are flow charts of identification registration
- FIG. 4 is a schematic diagram of network processing of server registration of the mapping relationship between EID1 and IP1.
- the process of logo registration includes the following steps:
- S1101 The server sends a registration request for the EID1-IP1 mapping relationship to the controller C1;
- S1103 the controller C1 diffuses the registration information to the border routers BGP1 and BGP2;
- S1104 The border routers BGP1 and BGP2 insert the EID1-IP1 mapping relationship into the Bloom filter storage space corresponding to the controller C1 maintained by them;
- S1105 Map EID1 to an intermediate border router index through a hash function
- S1106 Diffuse registration information to the intermediate border router BGP4;
- FIG. 5 and FIG. 6 are flowcharts of identification cancellation
- FIG. 7 is a schematic diagram of network processing of server logout of the mapping relationship between EID1 and IP1.
- the process of identity logout includes the following steps:
- S1201 The server sends a request for deregistration of the EID1-IP1 mapping relationship to the controller C1;
- the controller C1 diffuses the deregistration information to the border routers BGP1 and BGP2;
- S1204 The border routers BGP1 and BGP2 delete the EID1-IP1 mapping relationship in the Bloom filter storage space corresponding to the controller C1 maintained respectively;
- S1206 Diffuse the deregistration information to the intermediate border router BGP4;
- FIG. 8 is a flowchart of identification-based addressing.
- FIG. 9 is a schematic diagram of the addressing process of the user 1 requesting to identify the network entity corresponding to the EID1.
- the addressing process of user 1 requesting to identify the network entity corresponding to EID1 includes the following steps:
- the edge router ER4 After receiving the message, the edge router ER4 checks whether the destination address field is an invalid address, and if it is an invalid address, reports and forwards the message to the controller C1, and executes step S1402; if it is a valid address, forwards it directly based on the flow table;
- the controller C1 carries the address IP1 obtained by parsing in the delivered flow table
- FIG. 10 is a schematic diagram of the addressing process of the user 2 requesting to identify the network entity corresponding to the EID1.
- the addressing process of user 2 requesting to identify the network entity corresponding to EID1 includes the following steps:
- the edge router ER4 After receiving the message, the edge router ER4 checks whether the destination address field is an invalid address. If it is an invalid address, it reports and forwards the message to the controller C2, and executes step S1402; if it is a valid address, it is directly forwarded based on the flow table;
- the controller C2 carries the address of BGP1 obtained by parsing in the delivered flow table
- the edge router ER2 updates the destination address field in the packet to the address of BGP1, and forwards the packet to the border router BGP1;
- Steps S1401 to S1404 are executed again in the control domain where the controller C1 is located as follows:
- the edge router ER5 After receiving the message, the edge router ER5 checks whether the destination address field is an invalid address, and if it is an invalid address, reports and forwards the message to the controller C1, and executes step S1402; if it is a valid address, forwards it directly based on the flow table;
- the controller C1 carries the address IP1 obtained by parsing in the delivered flow table
- FIG. 11 is a schematic diagram of the addressing process of the user 3 requesting to identify the network entity corresponding to the EID1.
- the addressing process of user 3 requesting to identify the network entity corresponding to EID1 includes the following steps:
- the edge router ER3 After receiving the message, the edge router ER3 checks whether the destination address field is an invalid address, and if it is an invalid address, reports and forwards the message to the controller C4, and executes step S1402; if it is a valid address, forwards it directly based on the flow table;
- the controller C4 carries the address of BGP3 obtained by parsing in the delivered flow table
- the edge router ER3 updates the destination address field in the packet to the address of BGP3, and forwards the packet to the border router BGP3;
- S1602 Update the destination address field in the packet to the address of the intermediate border router BGP4 corresponding to the index, and forward the packet to the border router BGP4;
- S1603 On the intermediate border router BGP4, perform a quick query of EID1 in the Bloom filter corresponding to each border router, and determine that the associated border router is BGP1;
- S1604 Update the destination address field in the message to the address of the associated border router as BGP1, forward the message to BGP1, and execute step (1501).
- Steps S1501 to S1502 are executed again in the autonomous domain AS1 as follows:
- Steps S1401 to S1404 are executed again in the control domain where the controller C1 is located as follows:
- the edge router ER5 After receiving the message, the edge router ER5 checks whether the destination address field is an invalid address, and if it is an invalid address, reports and forwards the message to the controller C1, and executes step S1402; if it is a valid address, forwards it directly based on the flow table;
- the controller C1 carries the address IP1 obtained by parsing in the delivered flow table
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
一种层次结构的标识寻址方法,所述方法包括:步骤1)接收携带请求网络实体的标识符的请求报文;步骤2)在控制域的边缘路由器上进行标识解析得到地址,若解析得到的地址为最终目的地址,过程结束;否则,解析得到的地址为网络实体所在管理域的边界路由器地址,进入步骤3);步骤3)在管理域的边界路由器上,进行本管理域内实体的标识与存储该标识相关映射关系的控制器的匹配,若找到匹配的控制器,则在匹配的控制器中进行标识解析与寻址,转入步骤2);否则,执行步骤4);步骤4)在管理域边界路由器上,确定该标识对应的中介边界路由器;并在该中介边界路由器上,通过索引得到标识关联的管理域边界路由器,执行步骤3)。
Description
相关申请
本申请要求名称为“一种层次结构的标识寻址方法”、于2020年11月24日提交的中国专利申请号为2020113263621的优先权,于2021年5月8日提交的中国专利申请号为2021105002713的优先权,在此通过引用包括上述申请。
本发明涉及网络技术和通信技术领域,特别涉及一种层次结构的标识寻址方法。
随着物联网、移动接入、分布式信息处理、海量流媒体等新技术和应用的发展,当前基于TCP/IP架构的计算机网络性能已经逐渐趋于极限,信息内容服务的海量需求与网络带宽瓶颈的矛盾日益加剧。因IP网络结构而出现的网络细腰问题,已经成为阻碍当前网络应用层发展的重要因素。现有互联网TCP/IP体系结构在可扩展性、移动性、多宿主和流量工程等方面存在诸多问题。互联网现在使用的IP地址具备位置信息和身份信息双重含义,混淆了位置(locator)与标识(identifier)的功能界限,存在IP地址语义过载问题。这种命名机制也是制约网络技术发展的症结所在。
针对于上述问题,学术界和各标准组织加强了针对未来新型互联网架构的研究。本世纪初,以互联网的主要需求为导向,提出了以信息/内容为中心构建网络体系架构,解耦信息与位置关系的信息中心网络技术(Information-Centric Networking,ICN),增加网络存储信息能力,从网络层面提升内容获取、移动性支持和面向内容的安全机制能力。ICN系列的典型项目包括:NDN、DONA、NetInf、PURSUIT等。国际互联网工程任务组(IETF)于2009年开始启动LISP(Locator/ID Separation Protocol)工作组,提出了标识与地址分离的思想来解决路由系统的问题。欧洲电信标准化协会(ETSI)于2018年发布了“NGP 004:Evolved Architecture for mobility using Identity Oriented Networks”,基于名字与地址分离的思想支持原生移动性。基于标识与地址分离思想的新型网络架构,已经成为解决传统TCP/IP网络问题的新思路。位置与标识分离后,如何利用标识的唯一性和持久性的特点,设计满足未来互联网发展需求的路由机制成为当前的研究 热点。
基于标识的路由方法可以分为两类:基于标识直接路由的方法和基于标识解析寻址后基于地址路由的方法。标识直接路由方法将对象的标识直接映射为路由,即将位置与标识的解析路径和路由信息的取回路径进行融合,典型的项目包括:CCN/NDN;基于标识解析寻址和地址路由的方法是将先将标识通过名字解析系统映射为地址,再采取基于地址的路由方法,典型的项目包括:DONA、MoblityFirst。
第一种方法不需要依赖于解析服务和网络地址,完全基于标识进行路由转发;但不能更好的兼容现有网络设备和网络架构,存在标识路由表数量庞大,带来的可扩展性和路由收敛效率问题。第二种方法可以更好的兼容现有的网络设备和网络架构,底层机制仍是基于地址路由;但需要依赖于外部解析映射系统,系统的安全性和效率会影响路由过程。
发明内容
针对于现有标识路由算法存在的问题,本发明提出一种层次结构的标识寻址方法,基于管理域和控制域进行网络域分层,控制器存储控制域内实体的标识与地址映射关系,管理域边界路由器存储管理域内实体的标识与控制域匹配关系,以及标识与关联边界路由器的关联关系,实现分级存储;同时,采取域内域间分级解析的方式,实现了报文传输过程中标识的动态解析与寻址;有效解决了标识地址映射表数目庞大带来的可扩展性和查询效率问题。
针对于上述问题,本发明提出一种层次结构的标识寻址方法,在标识与地址分离的架构下,使用与网络地址无关的标识符唯一地标识网络中的每个网络实体;整个网络由多个管理域组成,管理域可划分为多个控制域,每个控制域中有一个控制器;承载标识解析和路由的网络节点包括但不限于:控制域的边缘路由器和管理域的边界路由器;控制器存储控制域内实体的标识与地址映射关系,管理域边界路由器存储管理域内实体的标识与控制域匹配关系,以及标识与关联边界路由器的关联关系;所述方法包括但不限于:
步骤1)接收携带请求网络实体的标识符的请求报文;
步骤2)在控制域的边缘路由器上进行标识解析得到地址,若解析得到的地址为最终目的地址,过程结束;否则,解析得到的地址为网络实体所在管理域的边界路由器地址,进入步骤3);
步骤3)在管理域的边界路由器上,进行本管理域内实体的标识与存储该标识相关映射关系的控制器的匹配,若找到匹配的控制器,则在匹配的控制器中进行标识解析与寻址,转入步骤2);否则,执行步骤4);
步骤4)在管理域边界路由器上,确定该标识对应的中介边界路由器;并在该中介边界路由器上,通过索引得到标识关联的管理域边界路由器,执行步骤3)。
作为上述方法的一种改进,所述的网络实体包括但不限于:主机、数据和服务;所述标识符的生成方法包括但不限于:扁平化命名方法、层次化命名方法和多语义命名方法。
作为上述方法的一种改进,所述控制器用于实现下述功能:
(1)存储并维护控制域内实体的标识与地址映射关系;
(2)提供控制域内实体的标识与地址映射关系的注册和注销功能;
(3)与所属管理域的管理域边界路由器进行信息交互,用于确定标识与控制器的匹配关系;
(4)在接收到路由器发送报文时,检查报文中目的地址是否为有效地址;
(5)对目的地址为无效地址的报文,能够进行标识解析;
(6)对目的地址为有效地址的报文,能够基于特定触发机制,进行标识的重新解析;
(7)对所有标识进行解析,若控制器中存储标识相关的映射关系,则解析得到地址为最终目的地址;若未存储,解析得到地址为预先设定的目标地址,包括但不限于:边界路由器地址和默认转发地址;
(8)在下发的流表中携带解析得到的地址,路由器可基于下发的流表,在报文中进行目的地址字段的填写或更新。
作为上述方法的一种改进,所述控制域内实体是一个有唯一标识的网络实体,包括但不限于:网络设备,服务和数据;若实体为网络设备,则该设备首先通过这个控制域连接到网络;若实体为数据或服务等,则该实体所在的网络设备首先通过这个控制域连接到网络;即该实体所在设备发送的报文,进入网络内所经过的第一个控制域,称为该实体所在的控制域。
作为上述方法的一种改进,当报文中的目的地址字段为空或已填写的地址为事先约定地址,则报文中目的地址为无效地址;否则,报文中目的地址为有效地址;其中,事先约定地址是从地址空间的保留地址中选定的地址,为非路由地址,包括IP网络中的保留地址。
作为上述方法的一种改进,所述的特定触发机制能够触发标识的重新解析与寻址,包括但不限于:报文中携带触发标志位。
作为上述方法的一种改进,所述控制域的边缘路由器是指报文转发至控制域范围内经过的第一个路由器,位于控制域的外围,所述控制域的边缘路由器用于实现下述功能:
(1)在收到目的地址字段为无效地址的报文后,能够将报文上报转发到边缘路由器所属控制器,请求控制器下发转发流表;
(2)对于目的地址字段为无效地址的报文,能够基于控制器下发的流表进行报文中目的地址字段的填写或更新,更新后的目的地址可能包括但不限于:最终目的地址和所在管理域的边界路由器地址等;
(3)对于目的地址字段为有效地址的报文,能够基于特定触发机制,将报文上报转发到所属控制器,请求控制器下发转发流表;
(4)对于目的地址字段为有效地址的报文,能够基于控制器下表流表进行报文中目的地址字段的更新;
(5)基于控制器下发的流表进行路由转发。
作为上述方法的一种改进,所述管理域边界路由器是指用于管理域之间报文转发的设备,是边界设备的一种,所述管理域边界路由器用于实现下述功能:
(1)具备一个索引,唯一地代表该边界路由器;
(2)存储并维护所有边界路由器的索引与地址的映射关系;
(3)存储并维护管理域内实体的标识与控制域的匹配关系;
(4)采用事先约定的方法,将网络实体的标识映射为一个或多个边界路由器的索引,这些被映射到的边界路由器称为该实体标识的中介边界路由器,其中,所述事先约定的方法包括但不限于:查表和函数映射;
(5)向中介边界路由器发起标识与该边界路由器关联关系的注册、注销请求;
(6)存储并维护标识与关联边界路由器的关联关系;
(7)能够基于标识的注册或注销请求,增加或删除标识与控制域的匹配关系;
(8)基于标识的注册或注销请求,增加或删除标识与边界路由器的关联关系;
(9)进行标识解析,并基于解析结果更新报文的目的地址字段,解析得到 的地址包括但不限于:控制器地址、边缘路由器地址和边界路由器地址;
(10)若收到的报文来自所在管理域内的网络设备,先进行管理域内标识与控制域的匹配,若匹配不成功,再进行中介边界路由器映射。
作为上述方法的一种改进,所述的管理域内实体的标识与控制域的匹配关系中,该标识对应的网络实体的标识与地址的映射关系在该控制域的控制器上进行了存储和维护,而该标识与该控制域的匹配关系在这个网络实体所属管理域的边界路由器进行了存储和维护。
作为上述方法的一种改进,所述的标识与关联边界路由器的关联关系,是指实体标识与注册该关系的边界路由器地址的映射关系。
作为上述方法的一种改进,所述方法还包括:标识的注册步骤,具体包括:
实体向所在控制域的控制器注册标识与地址的映射关系;
控制器存储该实体的标识与地址的映射关系;
注册请求扩散到实体所属管理域的边界路由器;
边界路由器存储该映射关系与控制域的匹配关系;
边界路由器将网络实体标识映射为中介边界路由器索引;
注册请求扩散到标识映射的中介边界路由器;
中介边界路由器存储标识与关联边界路由器的关联关系。
作为上述方法的一种改进,所述步骤2)具体包括如下步骤:
步骤201)边缘路由器收到报文中目的地址字段为无效地址,或受到特定触发机制时,将该报文上报转发到所在控制器,请求下发转发流表;
步骤202)控制器接收到报文后,进行标识解析;
步骤203)控制器下发流表,流表中携带解析得到的地址信息;
步骤204)边缘路由器基于下发流表,填写或更新报文目的地址字段。
作为上述方法的一种改进,所述步骤3)具体包括如下步骤:
步骤301)边界路由器收到的报文,进行管理域内控制域匹配;
步骤302)若存在匹配控制域,在匹配的控制器中进行标识解析与寻址,执行步骤201);若匹配不成功,再进行管理域间中介边界路由器映射与寻址,执行步骤4)。
作为上述方法的一种改进,所述步骤4)具体包括如下步骤:
步骤401)管理域边界路由器上,将标识映射为中介边界路由器索引;
步骤402)将报文转发到中介边界路由器;
步骤403)该中介边界路由器上,得到标识的关联边界路由器;
步骤404)将报文转发到关联边界路由器,进行这个管理域内控制域匹配与寻址,执行步骤301)。
作为上述方法的一种改进,所述方法还包括:标识的注销步骤,具体包括:
实体向所在控制域的控制器注销标识与地址的映射关系;
控制器删除该实体的标识与地址的映射关系;
注销请求扩散到实体所属管理域的边界路由器;
边界路由器删除该映射关系与控制域的匹配关系;
边界路由器将网络实体标识映射为中介边界路由器索引;
注销请求扩散到标识映射的中介边界路由器;
中介边界路由器删除标识与关联边界路由器的关联关系。
本发明的优势在于:
本发明的方法基于管理域和控制域进行网络域分层,控制器存储控制域内实体的标识与地址映射关系,管理域边界路由器存储管理域内实体的标识与控制域匹配关系,以及标识与关联边界路由器的关联关系,实现分级存储;同时,采取域内域间分级解析的方式,实现了报文传输过程中标识的动态解析与寻址;有效解决了标识地址映射表数目庞大带来的可扩展性和查询效率问题。
图1为网络结构示意图;
图2本发明的标识注册流程图;
图3本发明的标识注册的具体流程图;
图4为本发明的服务端注册EID1与IP1映射关系网络处理示意图;
图5为本发明的标识注销流程图;
图6为本发明的标识注销的具体流程图;
图7为本发明的服务端注销EID1与IP1映射关系网络处理示意图;
图8为本发明的标识解析和路由流程图;
图9为用户1请求标识EID1网络解析和路由过程示意图;
图10为用户2请求标识EID1网络解析和路由过程示意图;
图11为用户3请求标识EID1网络解析和路由过程示意图;
图12为本发明的标识注册流程图。
为使本发明的目的、技术方案和优点更加清楚,下面将结合本发明实施例中的附图,对本发明中的技术方案进行清楚、完整地描述。
标识符,是指与网络地址无关的全局唯一的能够代表一个网络实体的标识符,包括但不限于数据标识符等;网络地址,是指该网络实体所在位置的网络可路由的地址信息,包括但不限于使用IP地址等信息。所描述的实施例中以内容标识符为例,使用EID(Entity ID)表示,网络地址使用IP地址表示。服务端上部署了视频内容Movie,标识符为EID1,服务端网络地址是IP1;服务端通过向网络注册EID1与IP1的映射关系进行视频内容的发布,用户通过标识符EID1进行视频内容的获取,服务端不提供视频内容时需向网络注销EID1与IP1的映射关系。
所描述的实施例中,网络中的所有控制器上均需要维护了一张EID-IP的映射表;BGP路由器上为所属自治域中的所有控制器,分别维护了一个布隆过滤器,用于标识和控制域的快速匹配,为了支持删除功能,本实施例中使用计数型布隆过滤(counting bloom);基于哈希函数和最近距离原则,可以将标识映射为边界路由器的索引。图1为本发明涉及的网络结构示意图。
图2和图3是标识注册流程图;图4是服务端注册EID1与IP1映射关系网络处理示意图。
标识注册的过程包括以下步骤:
S1101:服务端向控制器C1发送EID1-IP1映射关系的注册请求;
S1102:控制器C1在在本地的映射表中插入此条映射关系;
S1103:控制器C1向边界路由器BGP1和BGP2扩散注册信息;
S1104:边界路由器BGP1和BGP2在各自维护的控制器C1对应的布隆过滤器存储空间中插入EID1-IP1映射关系;
S1105:通过哈希函数,将EID1映射为中介边界路由器索引;
S1106:向中介边界路由器BGP4扩散注册信息;
S1107:在中介边界路由器BGP4上,插入EID1与BGP1以及BGP2的关联关系,注册过程结束。
图5和图6是标识注销流程图;图7是服务端注销EID1与IP1映射关系网络处理示意图。
标识注销的过程包括以下步骤:
S1201:服务端向控制器C1发送EID1-IP1映射关系的注销请求;
S1202:控制器C1在在本地的映射表中删除此条映射关系;
S1203:控制器C1向边界路由器BGP1和BGP2扩散注销信息;
S1204:边界路由器BGP1和BGP2在各自维护的控制器C1对应的布隆过滤器存储空间中删除EID1-IP1映射关系;
S1205:通过哈希函数,将EID1映射为中介边界路由器索引;
S1206:向中介边界路由器BGP4扩散注销信息;
S1207:在中介边界路由器BGP4上,删除EID1与BGP1以及BGP2的关联关系,注销过程结束。
图8为基于标识的寻址流程图。图9为用户1请求标识EID1对应网络实体的寻址过程示意图。
用户1请求标识EID1对应网络实体的寻址过程包括以下步骤:
S1301:用户1请求时,在报文中携带请求的标识符EID1;
S1401:边缘路由器ER4收到报文后,检查目的地址字段是否为无效地址,若为无效地址,将报文上报转发至控制器C1,执行步骤S1402;若为有效地址,直接基于流表转发;
S1402:控制器C1接收到报文后,进行标识解析得到地址IP1;
S1403:控制器C1在下发的流表中携带解析得到的地址IP1;
S1404:边缘路由器ER4将报文中目的地址字段更新为IP1,寻址过程结束;
图10为用户2请求标识EID1对应网络实体的寻址过程示意图。
用户2请求标识EID1对应网络实体的寻址过程包括以下步骤:
S1301:用户2请求时,在报文中携带请求的标识符EID1;
S1401:边缘路由器ER4收到报文后,检查目的地址字段是否为无效地址,若为无效地址,将报文上报转发至控制器C2,执行步骤S1402;若为有效地址,直接基于流表转发;
S1402:控制器C2接收到报文后,进行标识解析,控制器C2中未查询到EID1相关条目,因此将边界路由器BGP1的地址作为解析地址;
S1403:控制器C2在下发的流表中携带解析得到的BGP1的地址;
S1404:边缘路由器ER2将报文中目的地址字段更新为BGP1的地址,并将报文转发至边界路由器BGP1;
S1501:在边界路由器BGP1上,分别对控制器C1、C2、C3对应的布隆过滤器中进行EID1的快速查询和匹配,查询到C1中包含EID1相关标识,并选取一个 C1所在控制域的边缘路由器ER5;
S1502:将报文中目的地址字段更新为ER5的地址,并将报文转发至ER5;
在控制器C1所在控制域内再次执行步骤S1401~S1404如下:
S1401:边缘路由器ER5收到报文后,检查目的地址字段是否为无效地址,若为无效地址,将报文上报转发至控制器C1,执行步骤S1402;若为有效地址,直接基于流表转发;
S1402:控制器C1接收到报文后,进行标识解析得到地址IP1;
S1403:控制器C1在下发的流表中携带解析得到的地址IP1;
S1404:边缘路由器ER5将报文中目的地址字段更新为IP1,寻址过程结束;
图11为用户3请求标识EID1对应网络实体的寻址过程示意图。
用户3请求标识EID1对应网络实体的寻址过程包括以下步骤:
S1301:用户3请求时,在报文中携带请求的标识符EID1;
S1401:边缘路由器ER3收到报文后,检查目的地址字段是否为无效地址,若为无效地址,将报文上报转发至控制器C4,执行步骤S1402;若为有效地址,直接基于流表转发;
S1402:控制器C4接收到报文后,进行标识解析,控制器C4中未查询到EID1相关条目,因此将边界路由器BGP3的地址作为解析地址;
S1403:控制器C4在下发的流表中携带解析得到的BGP3的地址;
S1404:边缘路由器ER3将报文中目的地址字段更新为BGP3的地址,并将报文转发至边界路由器BGP3;
S1501:在边界路由器BGP3上,对控制器C4对应的布隆过滤器进行EID1的快速查询和匹配,查询到C4中未包含EID1相关标识,执行步骤S1601;
S1601:在边界路由器BGP3上,通过哈希函数,将EID1映射为中介边界路由器索引;
S1602:将报文中目的地址字段,更新为索引对应的中介边界路由器BGP4的地址,并将报文转发至边界路由器BGP4;
S1603:在中介边界路由器BGP4上,在各个边界路由器对应的布隆过滤器中进行EID1的快速查询,确定关联边界路由器为BGP1;
S1604:将报文中目的地址字段,更新为关联边界路由器为BGP1的地址,并将报文转发至BGP1,执行步骤(1501)。
在自治域AS1内再次执行步骤S1501~S1502如下:
S1501:在边界路由器BGP1上,分别对控制器C1、C2、C3对应的布隆过滤器中进行EID1的快速查询和匹配,查询到C1中包含EID1相关标识,并选取一个C1所在控制域的边缘路由器ER5;
S1502:将报文中目的地址字段更新为ER5的地址,并将报文转发至ER5;
在控制器C1所在控制域内再次执行步骤S1401~S1404如下:
S1401:边缘路由器ER5收到报文后,检查目的地址字段是否为无效地址,若为无效地址,将报文上报转发至控制器C1,执行步骤S1402;若为有效地址,直接基于流表转发;
S1402:控制器C1接收到报文后,进行标识解析得到地址IP1;
S1403:控制器C1在下发的流表中携带解析得到的地址IP1;
S1404:边缘路由器ER5将报文中目的地址字段更新为IP1,寻址过程结束。
本发明的基于标识的寻址流程图如图12所示。最后所应说明的是,以上实施例仅用以说明本实用新型的技术方案而非限制。尽管参照实施例对本实用新型进行了详细说明,本领域的普通技术人员应当理解,对本实用新型的技术方案进行修改或者等同替换,都不脱离本实用新型技术方案的精神和范围,其均应涵盖在本实用新型的权利要求范围当中。
最后所应说明的是,以上实施例仅用以说明本发明的技术方案而非限制。尽管参照实施例对本发明进行了详细说明,本领域的普通技术人员应当理解,对本发明的技术方案进行修改或者等同替换,都不脱离本发明技术方案的精神和范围,其均应涵盖在本发明的权利要求范围当中。
Claims (15)
- 一种层次结构的标识寻址方法,在标识与地址分离的架构下,使用与网络地址无关的标识符唯一地标识网络中的每个网络实体;整个网络由多个管理域组成,管理域可划分为多个控制域,每个控制域中有一个控制器;承载标识解析和路由的网络节点包括但不限于:控制域的边缘路由器和管理域的边界路由器;控制器存储控制域内实体的标识与地址映射关系,管理域边界路由器存储管理域内实体的标识与控制域匹配关系,以及标识与关联边界路由器的关联关系;所述方法包括但不限于:步骤1)接收携带请求网络实体的标识符的请求报文;步骤2)在控制域的边缘路由器上进行标识解析得到地址,若解析得到的地址为最终目的地址,过程结束;否则,解析得到的地址为网络实体所在管理域的边界路由器地址,进入步骤3);步骤3)在管理域的边界路由器上,进行本管理域内实体的标识与存储该标识相关映射关系的控制器的匹配,若找到匹配的控制器,则在匹配的控制器中进行标识解析与寻址,转入步骤2);否则,执行步骤4);步骤4)在管理域边界路由器上,确定该标识对应的中介边界路由器;并在该中介边界路由器上,通过索引得到标识关联的管理域边界路由器,执行步骤3)。
- 根据权利要求1所述的层次结构的标识寻址方法,其特征在于,所述的网络实体包括但不限于:主机、数据和服务;所述标识符的生成方法包括但不限于:扁平化命名方法、层次化命名方法和多语义命名方法。
- 根据权利要求1所述的层次结构的标识寻址方法,其特征在于,所述控制器用于实现下述功能:(1)存储并维护控制域内实体的标识与地址映射关系;(2)提供控制域内实体的标识与地址映射关系的注册和注销功能;(3)与所属管理域的管理域边界路由器进行信息交互,用于确定标识与控制器的匹配关系;(4)在接收到路由器发送报文时,检查报文中目的地址是否为有效地址;(5)对目的地址为无效地址的报文,能够进行标识解析;(6)对目的地址为有效地址的报文,能够基于特定触发机制,进行标识的重新解析;(7)对所有标识进行解析,若控制器中存储标识相关的映射关系,则解析 得到地址为最终目的地址;若未存储,解析得到地址为预先设定的目标地址,包括但不限于:边界路由器地址和默认转发地址;(8)在下发的流表中携带解析得到的地址,路由器可基于下发的流表,在报文中进行目的地址字段的填写或更新。
- 根据权利要求3所述的层次结构的标识寻址方法,其特征在于,所述控制域内实体是一个有唯一标识的网络实体,包括但不限于:网络设备,服务和数据;若实体为网络设备,则该设备首先通过这个控制域连接到网络;若实体为数据或服务等,则该实体所在的网络设备首先通过这个控制域连接到网络;即该实体所在设备发送的报文,进入网络内所经过的第一个控制域,称为该实体所在的控制域。
- 根据权利要求3所述的层次结构的标识寻址方法,其特征在于,当报文中的目的地址字段为空或已填写的地址为事先约定地址,则报文中目的地址为无效地址;否则,报文中目的地址为有效地址;其中,事先约定地址是从地址空间的保留地址中选定的地址,为非路由地址,包括IP网络中的保留地址。
- 根据权利要求3所述的层次结构的标识寻址方法,其特征在于,所述的特定触发机制能够触发标识的重新解析与寻址,包括但不限于:报文中携带触发标志位。
- 根据权利要求5所述的层次结构的标识寻址方法,其特征在于,所述控制域的边缘路由器是指报文转发至控制域范围内经过的第一个路由器,位于控制域的外围,所述控制域的边缘路由器用于实现下述功能:(1)在收到目的地址字段为无效地址的报文后,能够将报文上报转发到边缘路由器所属控制器,请求控制器下发转发流表;(2)对于目的地址字段为无效地址的报文,能够基于控制器下发的流表进行报文中目的地址字段的填写或更新,更新后的目的地址可能包括但不限于:最终目的地址和所在管理域的边界路由器地址等;(3)对于目的地址字段为有效地址的报文,能够基于特定触发机制,将报文上报转发到所属控制器,请求控制器下发转发流表;(4)对于目的地址字段为有效地址的报文,能够基于控制器下表流表进行报文中目的地址字段的更新;(5)基于控制器下发的流表进行路由转发。
- 根据权利要求7所述的层次结构的标识寻址方法,其特征在于,所述管理 域边界路由器是指用于管理域之间报文转发的设备,是边界设备的一种,所述管理域边界路由器用于实现下述功能:(1)具备一个索引,唯一地代表该边界路由器;(2)存储并维护所有边界路由器的索引与地址的映射关系;(3)存储并维护管理域内实体的标识与控制域的匹配关系;(4)采用事先约定的方法,将网络实体的标识映射为一个或多个边界路由器的索引,这些被映射到的边界路由器称为该实体标识的中介边界路由器,其中,所述事先约定的方法包括但不限于:查表和函数映射;(5)向中介边界路由器发起标识与该边界路由器关联关系的注册、注销请求;(6)存储并维护标识与关联边界路由器的关联关系;(7)能够基于标识的注册或注销请求,增加或删除标识与控制域的匹配关系;(8)基于标识的注册或注销请求,增加或删除标识与边界路由器的关联关系;(9)进行标识解析,并基于解析结果更新报文的目的地址字段,解析得到的地址包括但不限于:控制器地址、边缘路由器地址和边界路由器地址;(10)若收到的报文来自所在管理域内的网络设备,先进行管理域内标识与控制域的匹配,若匹配不成功,再进行中介边界路由器映射。
- 根据权利要求5所述的层次结构的标识寻址方法,其特征在于,所述的管理域内实体的标识与控制域的匹配关系中,该标识对应的网络实体的标识与地址的映射关系在该控制域的控制器上进行了存储和维护,而该标识与该控制域的匹配关系在这个网络实体所属管理域的边界路由器进行了存储和维护。
- 根据权利要求8所述的层次结构的标识寻址方法,其特征在于,所述的标识与关联边界路由器的关联关系,是指实体标识与注册该关系的边界路由器地址的映射关系。
- 根据权利要求1所述的层次结构的标识寻址方法,其特征在于,所述方法还包括:标识的注册步骤,具体包括:实体向所在控制域的控制器注册标识与地址的映射关系;控制器存储该实体的标识与地址的映射关系;注册请求扩散到实体所属管理域的边界路由器;边界路由器存储该映射关系与控制域的匹配关系;边界路由器将网络实体标识映射为中介边界路由器索引;注册请求扩散到标识映射的中介边界路由器;中介边界路由器存储标识与关联边界路由器的关联关系。
- 根据权利要求11所述的层次结构的标识寻址方法,其特征在于,所述步骤2)具体包括如下步骤:步骤201)边缘路由器收到报文中目的地址字段为无效地址,或受到特定触发机制时,将该报文上报转发到所在控制器,请求下发转发流表;步骤202)控制器接收到报文后,进行标识解析;步骤203)控制器下发流表,流表中携带解析得到的地址信息;步骤204)边缘路由器基于下发流表,填写或更新报文目的地址字段。
- 根据权利要求12所述的层次结构的标识寻址方法,其特征在于,所述步骤3)具体包括如下步骤:步骤301)边界路由器收到的报文,进行管理域内控制域匹配;步骤302)若存在匹配控制域,在匹配的控制器中进行标识解析与寻址,执行步骤201);若匹配不成功,再进行管理域间中介边界路由器映射与寻址,执行步骤4)。
- 根据权利要求13所述的层次结构的标识寻址方法,其特征在于,所述步骤4)具体包括如下步骤:步骤401)管理域边界路由器上,将标识映射为中介边界路由器索引;步骤402)将报文转发到中介边界路由器;步骤403)该中介边界路由器上,得到标识的关联边界路由器;步骤404)将报文转发到关联边界路由器,进行这个管理域内控制域匹配与寻址,执行步骤301)。
- 根据权利要求11所述的层次结构的标识寻址方法,其特征在于,所述方法还包括:标识的注销步骤,具体包括:实体向所在控制域的控制器注销标识与地址的映射关系;控制器删除该实体的标识与地址的映射关系;注销请求扩散到实体所属管理域的边界路由器;边界路由器删除该映射关系与控制域的匹配关系;边界路由器将网络实体标识映射为中介边界路由器索引;注销请求扩散到标识映射的中介边界路由器;中介边界路由器删除标识与关联边界路由器的关联关系。
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2023530956A JP2023550175A (ja) | 2020-11-24 | 2021-06-07 | 階層構造の識別子アドレッシング方法 |
Applications Claiming Priority (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011326362 | 2020-11-24 | ||
CN202011326362.1 | 2020-11-24 | ||
CN202110500271.3 | 2021-05-08 | ||
CN202110500271.3A CN114553773B (zh) | 2020-11-24 | 2021-05-08 | 一种层次结构的标识寻址方法 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2022110756A1 true WO2022110756A1 (zh) | 2022-06-02 |
Family
ID=81668527
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2021/098587 WO2022110756A1 (zh) | 2020-11-24 | 2021-06-07 | 一种层次结构的标识寻址方法 |
Country Status (3)
Country | Link |
---|---|
JP (1) | JP2023550175A (zh) |
CN (1) | CN114553773B (zh) |
WO (1) | WO2022110756A1 (zh) |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101459698A (zh) * | 2007-12-14 | 2009-06-17 | 中国人民解放军信息工程大学 | 域内和域间的网络互连方法及其系统 |
CN104168154A (zh) * | 2014-07-31 | 2014-11-26 | 中国人民解放军91655部队 | 面向网络态势感知的多级别网络系统及其构建方法 |
CN105656771A (zh) * | 2014-11-12 | 2016-06-08 | 中国移动通信集团公司 | 一种业务路径确定方法、装置和系统 |
US20190068403A1 (en) * | 2017-08-29 | 2019-02-28 | Futurewei Technologies, Inc. | Stitching Multi-Domain LSPs In Hierarchical SDN Architecture |
US20190288876A1 (en) * | 2018-03-13 | 2019-09-19 | Ambit Microsystems (Shanghai) Ltd. | System for combining wireless sensor networks and method thereof |
Family Cites Families (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP3374638B2 (ja) * | 1996-02-29 | 2003-02-10 | 株式会社日立製作所 | システム管理/ネットワーク対応表示方法 |
US7970929B1 (en) * | 2002-03-19 | 2011-06-28 | Dunti Llc | Apparatus, system, and method for routing data to and from a host that is moved from one location on a communication system to another location on the communication system |
US7609689B1 (en) * | 2001-09-27 | 2009-10-27 | Cisco Technology, Inc. | System and method for mapping an index into an IPv6 address |
EP1690370B1 (en) * | 2003-12-01 | 2017-02-22 | Samsung Electronics Co., Ltd. | Home network system and method therefor |
FR2876853A1 (fr) * | 2004-10-20 | 2006-04-21 | France Telecom | Procede d'adressage d'un reseau ip se connectant a un autre reseau ip |
US20080076412A1 (en) * | 2006-09-22 | 2008-03-27 | Amit Khetawat | Method and apparatus for registering an access point |
KR20130087932A (ko) * | 2012-01-30 | 2013-08-07 | 한국전자통신연구원 | 호스트 위치자 식별자 매핑 방법 및 장치 |
US20140164645A1 (en) * | 2012-12-06 | 2014-06-12 | Microsoft Corporation | Routing table maintenance |
US9467478B1 (en) * | 2013-12-18 | 2016-10-11 | vIPtela Inc. | Overlay management protocol for secure routing based on an overlay network |
CN106452861B (zh) * | 2016-09-29 | 2019-05-21 | 中国联合网络通信集团有限公司 | 一种信息同步的方法及设备 |
CN109842574B (zh) * | 2017-11-28 | 2020-07-17 | 中国科学院声学研究所 | 一种基于可编程网络技术的多宿主网络路由转发方法 |
-
2021
- 2021-05-08 CN CN202110500271.3A patent/CN114553773B/zh active Active
- 2021-06-07 JP JP2023530956A patent/JP2023550175A/ja active Pending
- 2021-06-07 WO PCT/CN2021/098587 patent/WO2022110756A1/zh active Application Filing
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101459698A (zh) * | 2007-12-14 | 2009-06-17 | 中国人民解放军信息工程大学 | 域内和域间的网络互连方法及其系统 |
CN104168154A (zh) * | 2014-07-31 | 2014-11-26 | 中国人民解放军91655部队 | 面向网络态势感知的多级别网络系统及其构建方法 |
CN105656771A (zh) * | 2014-11-12 | 2016-06-08 | 中国移动通信集团公司 | 一种业务路径确定方法、装置和系统 |
US20190068403A1 (en) * | 2017-08-29 | 2019-02-28 | Futurewei Technologies, Inc. | Stitching Multi-Domain LSPs In Hierarchical SDN Architecture |
US20190288876A1 (en) * | 2018-03-13 | 2019-09-19 | Ambit Microsystems (Shanghai) Ltd. | System for combining wireless sensor networks and method thereof |
Also Published As
Publication number | Publication date |
---|---|
JP2023550175A (ja) | 2023-11-30 |
CN114553773A (zh) | 2022-05-27 |
CN114553773B (zh) | 2022-11-22 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9825860B2 (en) | Flow-driven forwarding architecture for information centric networks | |
US8837483B2 (en) | Mapping private and public addresses | |
JP3757917B2 (ja) | パケット転送装置、パケット転送方法解決サーバ、dnsサーバ、ネットワークシステム及びプログラム | |
US6856991B1 (en) | Method and apparatus for routing data to a load balanced server using MPLS packet labels | |
US10104633B1 (en) | Active position driven mobility content delivery in information centric networks | |
CN102075420B (zh) | 基于位置标识和主机标识分离的系统及其移动性管理方法 | |
CN108293023B (zh) | 支持信息为中心的网络中的上下文感知的内容请求的系统和方法 | |
KR101381701B1 (ko) | 데이터 메시지 처리 방법, 시스템 및 접속 서비스 노드 | |
Hussaini et al. | Producer mobility support for Information Centric Networking approaches: A review | |
US20210112004A1 (en) | Apparatus and method for forwarding a packet in content centric network | |
CN109561355B (zh) | 一种ccn/ndn内容注册、内容位置解析和内容路由的系统及方法 | |
WO2022110756A1 (zh) | 一种层次结构的标识寻址方法 | |
US8737261B2 (en) | Node registering method | |
Amadeo et al. | Towards software-defined fog computing via named data networking | |
US20150098468A1 (en) | Method of controlling routing of identifier/locator mapping service | |
US11196666B2 (en) | Receiver directed anonymization of identifier flows in identity enabled networks | |
CN106130912B (zh) | 一种路由节点及路由方法 | |
JP2023554345A (ja) | ネットワーク内のストレージ機能を有するデータ伝送システム | |
Kafle et al. | ID-based communication framework in future networks | |
KR20220073422A (ko) | 정보 중심 네트워크에서 프로듀서 이동성 지원을 위한 패킷 경로 설정 방법 및 장치 | |
Aiash et al. | Supporting communication in information centric networks using the location/ID split protocol and time released caching | |
CN114650296B (zh) | 一种信息中心网络副本选择方法 | |
Kafle et al. | ID-based communication framework for new generation networks | |
CN113660162A (zh) | 一种临近缓存感知的半集中式路由方法及其系统 | |
KR20210044730A (ko) | 콘텐츠 중심 네트워크의 패킷 포워딩 장치 및 방법 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
WWE | Wipo information: entry into national phase |
Ref document number: 2023530956 Country of ref document: JP |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 21896265 Country of ref document: EP Kind code of ref document: A1 |