Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for setting data tunnel

A technology of data tunneling and tunnel information, applied in the direction of data exchange and network interconnection through path configuration, it can solve the problems of no description of carrying, establishment of data tunnels, and no description of tunnel information, etc., and achieve the effect of saving bandwidth resources.

Inactive Publication Date: 2007-07-18
HUAWEI TECH CO LTD
View PDF0 Cites 17 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0010] However, although the existing protocols stipulate that the tunnel information can be carried in the tunnel establishment request message and the tunnel establishment response message, it does not specify how to carry it under what circumstances, nor does it specify how to use the tunnel information to establish a data tunnel and what kind of data tunnel to establish. data tunnel

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for setting data tunnel
  • Method for setting data tunnel
  • Method for setting data tunnel

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0034] The first embodiment: establishing a bidirectional data tunnel between DPFnA and DPFnB.

[0035] Referring to Fig. 5, the flow chart of the first embodiment of the present invention is as follows:

[0036] Step 101, DPFnA sends a tunnel establishment request message to DPFnB, the message at least carries the tunnel information of DPFnA and the tunnel direction information element whose value is bidirectional.

[0037] Step 102: After receiving the tunnel establishment request message, DPFnB performs corresponding processing according to the tunnel direction information element, such as recording the tunnel information of DPFnA, reserving bandwidth resources, etc., and then returns a tunnel establishment response message to DPFnA, which at least carries DPFnB tunnel information.

[0038] Step 103: After receiving the tunnel establishment response message, DPFnA performs corresponding processing, such as recording the tunnel information of DPFnB, reserving bandwidth reso...

no. 2 example

[0039] The second embodiment: establishing a unidirectional data tunnel from DPFnB to DPFnA.

[0040] Referring to Fig. 6, the flow process of the second embodiment of the present invention is as follows:

[0041] Step 201, DPFnA sends a tunnel establishment request message to DPFnB, the message at least carries the tunnel information of DPFnA and the tunnel direction information element whose value is unidirectional.

[0042] Step 202: After receiving the tunnel establishment request message, DPFnB performs corresponding processing according to the tunnel direction information element, such as recording tunnel information of DPFnA, reserving bandwidth resources, etc., and then returns a tunnel establishment response message to DPFnA. Since the value of the tunnel direction information element in the tunnel establishment request message is unidirectional, the tunnel establishment response message does not carry the tunnel information of the DPFnB.

[0043] In step 203, DPFnA se...

no. 3 example

[0044] Embodiment 3: Establish a unidirectional data tunnel from DPFnA to DPFnB.

[0045] Referring to Fig. 7, the process of the third embodiment of the present invention is as follows:

[0046] In step 301, DPFnA sends a tunnel establishment request message to DPFnB, and the message carries a tunnel direction information element whose value is unidirectional. In addition, the message may also carry the tunnel direction information element whose value is bidirectional, and may further carry the tunnel information of the DPFnA.

[0047] Step 302: After receiving the tunnel establishment request message, DPFnB returns a tunnel establishment response message to DPFnA according to the tunnel direction information element. The message at least carries the tunnel information of DPFnB and the tunnel direction information element whose value is unidirectional.

[0048] If the tunnel establishment request message carries the tunnel direction information element whose value is bidirec...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

This invention discloses a method for setting up data tunnel including: A, a first DPFn sends a data tunnel set-up request message with data tunnel direction cells to a second DPFn, B, the second DPFn returns a response message based on the value of the tunnel direction cell to set up a data tunnel between the first and second DPFn. Since tunnel direction cell is added in the message for setting up data tunnel, data tunnels of different kinds are set up between two DPFn.

Description

technical field [0001] The invention relates to the technical field of data tunnels, in particular to a method for establishing a data tunnel. Background technique [0002] The Worldwide Interoperability Microwave Access (WiMax) system is also called 802.16 or the Institute of Electrical and Electronics Engineers (IEEE) 802.16 standard. It is a Wireless Metropolitan Area Network (WMAN) technology and a new air interface standard proposed for microwave and millimeter wave frequency bands. [0003] FIG. 1 is a schematic diagram of a current WiMax network reference model. Referring to FIG. 1, a WiMax network consists of an Access Service Network (ASN) and a Connection Service Network (CSN). The ASN is managed by the Network Access Provider (NAP), and the CSN is managed by the Network Service Provider (NAP). A user terminal / mobile terminal (SS / MS) may roam to a CSN that is not the home network service provider (HomeNSP) it subscribes to, but the CSN corresponding to the visit...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/46H04L12/28
Inventor 肖亚军
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products