Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Internet access method based on identity and location separation

An access method and Internet technology, applied in the field of Internet access, can solve problems such as large routing overhead, large address translation overhead, and limited number of access nodes.

Inactive Publication Date: 2006-07-12
BEIJING JIAOTONG UNIV
View PDF0 Cites 222 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although these solutions have solved the problem of the Ad hoc network accessing the Internet to a certain extent, there are obvious defects: because the nodes in the Ad hoc network use internal addresses for communication, when the nodes in the Ad hoc network and the Internet When the nodes communicate with each other, the proxy gateway needs to perform address translation on the nodes in the Ad hoc network, and the address translation overhead of the proxy gateway is large; if the combination of the Ad hoc network and MIP is considered, the number of access nodes is limited by the number of care-of addresses. And will cause huge routing overhead

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Internet access method based on identity and location separation
  • Internet access method based on identity and location separation
  • Internet access method based on identity and location separation

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0027] An Internet access method based on the separation of identity and location;

[0028] 160-bit source EID

160-bit destination EID

16-bit source port number

16-bit destination port number

32-bit serial number

32-digit confirmation number

4 digits

Ministry length

6 reserved bits

6 flag bits

16 bit windows

16 bit checksum

16-bit urgent pointer

options (if any)

data

[0029] Table 1 TCP packet format using EID as terminal identifier

[0030] 160-bit source EID

160-bit destination EID

16-bit source port number

16-bit destination port number

16-bit UDP length

16-bit UDP checksum

data

[0031] Table 2 UDP packet format using EID as terminal identifier

[0032] In order to resolve the mapping between EID and IP address, a new device——Identity Resolution Server (IRS) is introduced. The IRS is responsibl...

Embodiment 2

[0057] Such as figure 1 shown. figure 1 Shown in is a fixed host and a single host that communicates with nodes in the Internet when it moves. figure 1 The communication source in the network moves during the communication process. It originally connected to the Internet through subnet 1, and then connected to the Internet through subnet 2 after moving.

[0058] Step 1: All nodes register their end host identifiers in the DNS server, such as the communication source registering EID 1 , the communication peer registers EID 2 , the IRS registers its own end host identifier EID in the DNS server IRS and address IP IRS .

[0059] Step 2: All nodes register their end host identifiers and current IP addresses in the IRS, such as the communication source registering EID 1 and IP 1 , the communication peer registers EID 2 and IP 2 .

[0060] Step 3: The communication source searches for the DNS server and obtains the EID of the communication peer 2 and IRS EID IRS and IP ...

Embodiment 3

[0074] Such as image 3 shown. image 3 What is shown in is that the nodes in the mobile network communicate with the nodes in the Internet, AR is an access router (Access Router), and MR has enough address space to assign a unique address to each host belonging to its own network . For simplicity, only four mobile routers are shown in the figure.

[0075] The communication steps between MN and CN are as follows:

[0076] Step 1: All nodes register their end host identifiers in the DNS server, such as MN registering EID MN 、CN registration EID CN、MR registration EID MR , the IRS registers the EID in the DNS server IRS and address IP IRS .

[0077] Step 2: All nodes register their end host identifiers and current IP addresses in the IRS, such as MN registration EID MN and IP MN 、CN registration EID CN and IP CN 、MR registration EID MR and IP MR .

[0078] Step 3: MN queries the DNS server to obtain the EID of CN CN , IRS EID IRS and address IP IRS , MR's EID ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

An identity and position separation based on internet mainframe accessing method separates the double function of traditional IP address, the IP address is only used as position identify of mainframe, leading-in new name-space one end mainframe identity which is used as identifiers of mainframe and terminal identifier of transmission protocol. Leading-in identity resolver for resolving map relation between mainframe and IP address and dynamically updating binding between end mainframe identifiers and IP address. DNS resolving map relation between domain name and end identifiers and recording identified resolver IP address. In communication process communication node IP address can be changed but communication node EID keeps unchanged. Said invention can make fixation termination, mobile terminal, mobile network, self-organization network etc accessing internet in unitive mode.

Description

technical field [0001] The invention relates to an Internet access method based on the separation of identity and location, and belongs to the technical field of computer networks. Background technique [0002] With the rapid development of information network technology and the continuous emergence of various new services, more and more mobile devices require access to the Internet to communicate with other communication terminals on the Internet anytime and anywhere to obtain information and services. This raises mobility support requirements for the traditional Internet. The mobility of the Internet means that an IP-based device can still maintain the current communication when it moves to a different network, and it does not include the situation that the device only moves within a single network. In addition, people are no longer satisfied with using a fixed terminal or a single mobile terminal to connect to the network, but hope to organically combine terminals within...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L12/28H04L29/06
Inventor 张宏科秦雅娟周华春杨水根杨冬王博董平郜帅刘颖张思东张冰怡
Owner BEIJING JIAOTONG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products