WO2008080276A1 - Procédé d'établissement et procédé de fonctionnement du service pervasif basé sur un réseau intégré - Google Patents
Procédé d'établissement et procédé de fonctionnement du service pervasif basé sur un réseau intégré Download PDFInfo
- Publication number
- WO2008080276A1 WO2008080276A1 PCT/CN2007/001396 CN2007001396W WO2008080276A1 WO 2008080276 A1 WO2008080276 A1 WO 2008080276A1 CN 2007001396 W CN2007001396 W CN 2007001396W WO 2008080276 A1 WO2008080276 A1 WO 2008080276A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- service
- connection
- mapping
- network
- identifier
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims abstract description 43
- 238000011017 operating method Methods 0.000 title 1
- 238000013507 mapping Methods 0.000 claims abstract description 88
- 238000012545 processing Methods 0.000 claims description 18
- 238000012423 maintenance Methods 0.000 claims description 7
- 239000011159 matrix material Substances 0.000 claims description 6
- 238000012384 transportation and delivery Methods 0.000 claims description 4
- 238000006243 chemical reaction Methods 0.000 claims description 3
- 238000004891 communication Methods 0.000 abstract description 24
- 230000008569 process Effects 0.000 abstract description 9
- 230000005540 biological transmission Effects 0.000 description 30
- 238000005516 engineering process Methods 0.000 description 20
- 238000010586 diagram Methods 0.000 description 14
- 238000013461 design Methods 0.000 description 11
- 230000007246 mechanism Effects 0.000 description 11
- 238000011161 development Methods 0.000 description 10
- 230000018109 developmental process Effects 0.000 description 10
- 238000011160 research Methods 0.000 description 10
- 230000010354 integration Effects 0.000 description 9
- 238000007726 management method Methods 0.000 description 9
- 238000010295 mobile communication Methods 0.000 description 7
- 230000008859 change Effects 0.000 description 6
- 238000004458 analytical method Methods 0.000 description 2
- 238000010276 construction Methods 0.000 description 2
- 230000007812 deficiency Effects 0.000 description 2
- 230000033001 locomotion Effects 0.000 description 2
- 230000007774 longterm Effects 0.000 description 2
- 230000003287 optical effect Effects 0.000 description 2
- 238000000926 separation method Methods 0.000 description 2
- 102100031184 C-Maf-inducing protein Human genes 0.000 description 1
- 101000993081 Homo sapiens C-Maf-inducing protein Proteins 0.000 description 1
- 230000008901 benefit Effects 0.000 description 1
- 230000001413 cellular effect Effects 0.000 description 1
- 230000006835 compression Effects 0.000 description 1
- 238000007906 compression Methods 0.000 description 1
- 230000001419 dependent effect Effects 0.000 description 1
- 230000004069 differentiation Effects 0.000 description 1
- 230000009977 dual effect Effects 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000000605 extraction Methods 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 230000008520 organization Effects 0.000 description 1
- 238000013439 planning Methods 0.000 description 1
- 238000000275 quality assurance Methods 0.000 description 1
- 238000011084 recovery Methods 0.000 description 1
- 230000008439 repair process Effects 0.000 description 1
- 230000011218 segmentation Effects 0.000 description 1
- 230000011664 signaling Effects 0.000 description 1
- 230000005236 sound signal Effects 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
- 230000009897 systematic effect Effects 0.000 description 1
- 238000012360 testing method Methods 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L65/00—Network arrangements, protocols or services for supporting real-time applications in data packet communication
- H04L65/1066—Session management
- H04L65/1073—Registration or de-registration
Definitions
- the invention relates to a method and a method for establishing a universal service based on an integrated network, which is a computer network technology, and particularly relates to a network architecture for providing all services.
- Background technique
- the existing information networks can be mainly divided into telecommunication networks (including fixed telephone networks and mobile telephone networks), television networks, and the Internet, depending on the scope of services. These networks are briefly described below.
- the existing fixed telephone network is mainly a network based on program-controlled digital switching technology, and is mainly used for transmitting voice.
- the program-controlled digital switching network consists of the customer premises network, the access network and the core network.
- the program-controlled digital switching network is designed to transmit voice signals. It uses circuit switching to support data transmission and image transmission.
- the program-controlled digital switching network is designed for fixed user terminals, so it does not support the mobility of user terminals very well.
- Mobile communication technology as a branch of the communications field, has developed very rapidly in recent years. At present, the cellular telephone technology adopted by most global mobile communication systems is 2G, and its transmission technology is mainly time division multiple access (TDMA). 2G data transfer rate is low, only 9.6Kbps. 3G is the third generation mobile communication technology.
- the transmission technology is mainly three forms of code division multiple access (CDMA): WCDMA, CDMA2000 and TD ⁇ SCDMA.
- CDMA code division multiple access
- the data transmission rate is 384Kbps in high-speed motion and 2Mbps in static state.
- the mobile communication technology better solves the mobility problem of the user terminal, but since the mobile communication uses the wireless channel transmission, the data transmission rate is low, and the mobile communication technology is not suitable for the transmission conference due to the high error rate.
- Real-time services such as television and video images that require high quality of service.
- the television network is mainly used to transmit images and transmit television programs to users in one direction.
- the current television network is a network dedicated to providing broadcast and television services, unable to provide voice and data services, and cannot perform two-way communication.
- the Internet has become the fastest growing network among the three major networks (Internet, telecommunications, and television networks).
- the Internet follows a four-layer architecture of TCP/IP (including sub-interfaces)
- the network layer, the network layer, the transport layer, and the application layer use the connectionless packet switching technology to transmit data and provide "best effort" services.
- this connectionless feature is also the bottleneck of the evolution of the Internet from a single data transmission network to a multi-service bearer network.
- the best-effort service feature provided by the Internet cannot guarantee the reliability of transmission at all, and the retransmission delay introduced by the transmission layer's Transmission Control Protocol (TCP) cannot be used for services such as voice and video that require high real-time performance. Endure.
- the existing information network adopts a service-oriented network service architecture, which is constructed and managed hierarchically.
- the newly added important services and technologies are implemented by independent network layers, each of which has Own network platform, not only the construction network cost is high, but also because each layer of management and control methods are developed under different historical conditions and application environments, the control methods of each layer are very different, the whole network Management becomes very complicated and the operating costs are very high.
- IP becomes the dominant business, many of the features that are useful in the voice age will become meaningless, many layers of the multi-tier structure will gradually disappear, and the entire functional structure level will become simple and flat.
- the integration of the information network will evolve from a vertical direction to a horizontal direction.
- next-generation network is not a new network, but is based on the integration of multiple existing network evolutions.
- the current telecommunications and computer communities have different views on next-generation networks. Due to the different network foundations and different evolution routes, the focus is on the standard setting process. The points and solutions are also very different.
- ASON Automated Switched Optical Network
- Softswitch is mainly concentrated on the service layer.
- NGI Next Generation Internet
- the transport layer only needs to provide as high a bandwidth as possible.
- the focus is on the service bearer layer and the service layer: On the service bearer layer.
- the specification focuses on the IPv6 (Internet Protocol Version 6) protocol; the specification at the business layer is mainly embodied in intelligent terminals that use end-to-end control.
- next-generation networks ITU-T established the Next Generation Network Focus Group (FGNGN) in Geneva on May 6, 2004, with service requirements, architecture and mobility, quality of service, control and signaling. Seven working groups, including security, network evolution, and future packet networks, meet on average every two months to research and develop standards that are urgently needed in the industry related to next-generation networks.
- FGNGN Next Generation Network Focus Group
- the "FRA-NGN Functional Architecture Model" draft standard initially proposes some functional entities of the next-generation network business layer and transport layer.
- the draft defines and analyzes the model of the next-generation network from the perspective of logical functional entities; "FRMOB mobility function” Demand "The draft standard divides the mobility of next-generation networks into three cases: inter-network mobility, intra-network mobility, and intra-network mobility, and proposes mobility management requirements and functional architecture; "CMIP manageable users. "Network Capabilities” The draft standard proposes that the service of the manageable IP network is to provide network resources control and management to users, and to manage IP. And having a user packet traffic should diversity, information security and access control, the movement control and management, bandwidth allocation and SLA negotiation, configuration, and end to end QoS Priority configuration other functions.
- IPv6 packet bearer on different media including Ethernet, point-to-point protocol (PPP) link, fiber-optic distributed data interface (FDDI) ), Token Ring, ARCnet, etc.
- IPv6 basic protocols including RFC2460 (Internet Protocol version 6), RFC2675 (IPv6 mega-package), RFC2507 (IPv6 header compression), etc.
- IPv6 address-related protocols including RFC3513 (IPv6 address structure), RFC2374 (IPv6 aggregatable global unicast address), RFC1887 (IPv6 unicast address allocation), RFC2375 (multicast address allocation), etc.
- IPv6 multicast-related protocols including RFC2710 (IPv6MLD), RFC3306 (IPv6 group based on unicast address) Broadcast address), etc.
- service related protocols including SIP for establishing a voice or video session, Media Gateway Control
- the next generation network is a packet-based network that can provide multiple services including telecommunication services. Based on the separation of service-related functions and lower-layer transmission functions, it can utilize multiple broadband and QoS-enabled transmission technologies; it can provide users with unlimited access to multiple operators; and can support a wide range of mobile services. Sexuality ensures that consistent, universal business is provided to users.
- An important goal of the next generation network is network convergence.
- Japan's NTT Corporation developed a next-generation network and network structure development plan called RENA (Resonant Network Architecture), with a planned investment of 5 billion US dollars. Its goal is to create a network where everyone can communicate freely.
- RENA Resonant Network Architecture
- the RENA plan is only an engineering development plan. Simply relying on the development of broadband networks and broadband access has not brought any theoretical innovation to the development of the Internet itself, nor has it solved the extensive mobility of the Internet. Sexuality, multi-service integration, universality and many other basic issues are just a stopgap measure for Internet development.
- BT proposed a "21CN" next-generation network construction plan with an estimated investment of 80 million pounds.
- the GEM project mainly includes a research plan and a test environment.
- GEM's research programs include: building new core functions, designing new naming mechanisms, addresses and consistency architectures, designing new network management paradigms; Security of the architecture, designing a highly reliable, descriptive security mechanism; Designing a new architecture that can work with new wireless technologies, optical communication technologies, and pervasive computing technologies; Service extraction structures, such as information targets, location-based services, identity networks, etc.; establish new services and applications, such as more secure, robust, and controllable large-scale distributed applications, design the principles and patterns of distributed applications; The new network architecture principle, studying the complexity and scalability of the network.
- the present invention provides a ubiquitous service establishment method and operation method based on an integrated network. Used to achieve service integration and network integration.
- a method for realizing an integrated network universal service system allows a variety of mobile access including fixed users and mobile terminals, mobile subnets, and self-organizing network users, and fixed users and mobile users enjoy the same personalized service services.
- Distributed network resource sharing and lookup services which deliver voice, data, and image services and provide fine-grained quality of service to ensure consistent, universal service to users.
- a method for establishing a universal service based on an integrated network comprising: an integrated network, characterized in that:
- Bind service identifiers to various services, network resources, and users
- a virtual connection sublayer and a virtual service sublayer are established in the service layer, and the virtual connection sublayer and the virtual service sublayer include a service identifier and a service connection that support unified classification and positioning of the entire network service.
- the connection identifier of the terminal identity and the work of the virtual service sublayer and the virtual connection sublayer, the service-to-connection mapping and the inverse mapping service identity resolution mapping, and the mapping of a connection identifier to multiple exchange route identifiers A connection identifier resolution map that implements multiple path selections for service connections on the network.
- the matrix r MxW converts the user-aware QoS queue into the service's own QoS queue format, and the conversion mode is
- the service identifier resolution mapping includes: a one-to-one simple mapping, a one-to-many connection mapping, a multi-to-one multi-stream mapping, and a many-to-many complex mapping;
- the one-to-one simple mapping is as follows:
- indicates the service type indicates the connection type
- ⁇ £> indicates the connection identifier
- A indicates the client terminal
- / indicates the server terminal
- the one-to-many connection mapping is as follows:
- the many-to-one multi-stream mapping is as follows:
- the service provider generates a service to provide a connection identifier
- the service recipient generates a service accept connection identifier
- connection identifier resolution mapping described is:
- a method for operating a ubiquitous service based on an integrated network comprising: a service unified processing server, a client server, an integrated network, and a client server may serve as a service request end or a service provider according to a situation, and is characterized by the Steps:
- the client server registers the ternary information in the service unified processing server, and the ternary information includes: a connection identifier, a service identifier, and a service description;
- Service discovery step the service requesting end submits a required service description sub-step to the service unified processing server, and the service unified processing server forms a connection identifier and a service identifier in the ternary information corresponding to the service to form a dual-group information and returns the service request side.
- Service establishment step By using the registered service identification service provider to listen to the service request side of the service request, and through the binary information group to contact the service requester sub-step, the service request side and the service delivery handshake and authentication, and finally establish contact Substep
- Service Maintenance Step The service requester exchanges a packet with the service exchange to distinguish the identity.
- the method for the service unified processing server to obtain the corresponding ternary information in the service discovery step is based on a distributed acquisition method: the service identifier unified manager system is composed of a super node and a distributed storage system; the super node will serve the service provider The registration information is classified in a large range, and corresponding ternary information is generated. The generated ternary information is stored in the distributed system based on the distributed hash table, and the service requesting end provides the service description through the super node and the distributed system positioning service. end.
- Advantageous Effects of Invention The technical solution of the present invention realizes service integration and network integration, and overcomes the deficiencies of the prior art.
- the technical solution of the present invention allows a variety of mobility access including fixed users and mobile terminals, mobile subnets, and self-organizing network users, and fixed users and mobile users enjoy the same personalized service services, and realize distributed network resource sharing and Find services to deliver services such as voice, data, and images and provide fine-grained quality of service to ensure consistent, universal service to users.
- Figure 1 is a schematic diagram of an architecture of an integrated network
- FIG. 2 is a schematic diagram of a service layer structure of an integrated network
- Figure 3 is a schematic diagram of a QoS layering model of an integrated network
- Figure 4 is a schematic diagram of service identity generation of an integrated network
- FIG. 5 is a schematic diagram of a one-to-many service identifier resolution mapping model of an integrated network
- FIG. 6 is a schematic diagram of an integrated network multi-to-one service identifier resolution mapping model
- FIG. 7 is a schematic diagram of an integrated network multi-to-multiple service identifier resolution mapping model
- Figure 8 is a schematic diagram of a traditional network man-in-the-middle fraud attack
- Figure 9 is a schematic diagram of an integrated network denial of service attack
- FIG. 10 is a schematic diagram of an integrated network multi-to-many connection identifier resolution mapping model
- Figure 11 is a schematic diagram of the operation of the integrated network service layer
- Figure 12 is a timing diagram of the unified processing mechanism of the integrated network service layer
- Figure B is a schematic diagram of a distributed method for obtaining ternary information.
- Embodiment 1 is a diagrammatic representation of Embodiment 1:
- This embodiment is a method for establishing a universal service of an integrated network, specifically a method for establishing a structural system of an integrated network service layer, and a structural system model of the integrated network is shown in FIG. 1 . It consists of two major parts, the "Netcom layer” and the "service layer.”
- the integrated network described in this embodiment is an existing network
- a converged network is an existing Internet, mobile communication network, fixed telephone network, and all networks connected to it for transmitting data, images, streaming media, video, and audio signals.
- This is the hardware system used in this embodiment.
- the purpose of the present invention is to integrate existing network hardware, establish a network architecture suitable for various services, reduce network structure levels, provide network efficiency, and improve network services.
- the integrated network and the universal service system are a new type of network architecture different from the OSI seven-layer network system and the Internet four-layer network system.
- the integrated network and the universal service system organically integrate users, services and network resources into one whole, which realizes network integration and provides universal services for users.
- the ultimate goal of the present invention is to replace the existing network architecture with an integrated network and a ubiquitous service architecture, thereby establishing an integrated network platform, providing multi-granular quality of service for multi-service transmission, ensuring provision to users. Universal service.
- the concept of pervasive service is gradually emerging after critically inheriting the existing four-layer model of OSI and the four-layer model of the Internet.
- the "Netcom layer” includes a virtual access sublayer and a virtual backbone sublayer, and provides an integrated network communication platform for data, voice, video and other services.
- the "netcom layer” adopts the "indirect communication" mode: the virtual access sublayer uses the access identifier to forward data, and the virtual backbone sublayer uses the internal switched route identifier instead of the access identifier to forward, and after reaching the generalized switching router of the communication peer, The exchange route identifier of the data packet is replaced with the original access identifier; the virtual access sublayer is responsible for the access of the communication terminal, the virtual backbone sublayer solves the location management and the exchange routing theory, the privacy of the user, the security of the network, Controllability and mobility are well implemented in the "Netcom layer”.
- the architecture of the "service layer” is shown in Figure 2.
- the “service layer” is mainly responsible for the session, control and management of various services. These services include various network services provided by operators or third-party value-added service providers, mainly voice, data, streaming media, etc.
- a "service layer” bearer.
- various services, network resources, and users are identified by unique service identifiers, each application is bound to the service identifier, and the resolution from the service identifier to the connection identifier is performed, from the connection identifier to The resolution of the route identifier is exchanged, thereby establishing a service identifier and a connection identifier resolution mapping theory of the ubiquitous service.
- Service layer innovation introduces two virtual sub-layers: virtual service sub-layer and virtual connection sub-layer; two analytical mappings: Service ID resolution map and connection ID resolution map. The basic steps can be summarized as:
- Bind service identifiers to various services, network resources, and users
- Virtual service sub-layer This layer is the basis for implementing ubiquitous services. It is used to solve unified service object scheduling, provide controllable management of services, and provide possibilities for supporting multiple services. The key is to introduce the concept of service identification.
- Service Identification The role of service identification is to uniformly classify and locate services supported by various networks, reflecting the idea of universal service.
- the core of integrated network and ubiquitous service design is to support different types of services, so between services
- the new network uses two designs of "user-aware QoS" and "service identity support QoS delivery". As shown in Figure 3, the QoS support provided by the network layer for the service layer includes user-aware QoS and service itself QoS. The final QoS needs to be reflected in the service identifier and passed to the lower layer by the service identifier.
- xN a queue after the user perceives that the QoS is converted into the QoS format of the service itself;
- R QoS value that can be used to calculate the QoS class;
- K a set of service identifiers obtained according to the supported QoS classes
- the service completion speed is expressed as the long-term average transmission rate
- the data correctness is represented by the bit error rate and the data loss rate
- the stability is represented by the delay change rate.
- the QP specification matrix is obtained. ⁇ ; ⁇ for equation (2):
- the introduction of service identification addresses an important drawback of the original design of the Internet.
- the Internet lacks a unified description of the various application services. This design flaw forces a simple concept "port number" to take on too much functionality from its original purpose.
- the port number was originally designed to complete the integration of the data stream, categorizing multiple packet-independent packets according to the supported applications.
- the port number is given a second function (identifying the network service).
- the meaningless design of the port number and the meaningful differentiated service.
- the main manifestation is that the port number itself does not see any service features, and must pass a strict one-to-one correspondence (well-known port number). The mechanism can complete its identification, and this corresponding mechanism will be difficult to change once it is released.
- the introduction of the service identifier will replace the port number to describe the application of the network.
- Service ID resolution mapping In order to complete the service-to-connection establishment, it is necessary to construct a service identity resolution mapping according to the service layer overall model of FIG. 2, and associate the virtual service module with the work of the virtual connection module to implement service-to-connection mapping and inverse mapping. .
- the mapping forms include: one-to-one simple mapping, one-to-many multi-connection mapping, many-to-one multi-stream mapping, and many-to-many complex mapping, which are defined as (3), (4), (5), and 6).
- Equation (3) is a one-to-one simple mapping
- ⁇ indicates the service type
- ft indicates the client terminal
- / indicates the server terminal.
- One-to-one simple mapping will be a service between the terminal; and / >. This mapping is the main service connection mode currently adopted by the Internet and telecommunication networks. In the Internet, a service is completed by a TCP or UDP connection; in a telecommunication network, a telephone service is implemented by a circuit connection.
- Equation (4) is a one-to-many connection mapping, the same service ( / /D corresponds to multiple connections, where "variables represent "one connection. Multi-connection mapping can speed up the transmission of data during the service process. Currently, many download tools of the Internet use this type of mapping. It can be constructed according to (4) In the mapping model of Figure 5, the data flow of a single application is decomposed to establish multiple connection transmissions.
- Equation (5) represents a many-to-one multi-stream mapping, in which a plurality of different types of data streams are transmitted in one connection process, and the data streams are derived from the same service.
- a multi-stream map is a simple mapping of a service to a connection, but the service is internally divided into multiple logical streams according to the type of data transmitted.
- the benefit of shunting is that you can Different connection modes are provided in the inbound stream according to different data types, and the transmission efficiency is improved. For example, the data stream that needs to be retransmitted in error in one service and the data stream that is insensitive to errors can be processed separately.
- the mapping model corresponding to the formula (5) is as shown in FIG. 6. One application stream is classified according to the type, and the obtained multiple streams are mapped to the same connection.
- the new network performs transmission design for multiple applications to multiple connected streams.
- multiple services ⁇ (/ ⁇ ) Decomposed into different types of streams, and then transmitted by establishing multiple connections.
- Many-to-many complex mapping can speed up the transmission of service data, and at the same time distinguish the flow of different data types, reflecting the idea of universal service.
- the many-to-many complex mapping model is shown in Figure 7.
- the mapping rules for the analytical mapping function are established by a certain hashing algorithm.
- the hash algorithm maps binary values of arbitrary length to smaller fixed-length binary values. This small binary value is called a hash value.
- a hash value is a unique and extremely compact numerical representation of a piece of data.
- the subsequent hashing process will produce different values. Finding two different inputs hashed to the same value is computationally impossible, so the hash of the data can verify the integrity of the data and improve security.
- different service object identifiers can be represented by binary values of different lengths, and the connection identifier represents a fixed connection information, so it can be represented by a fixed-length binary value.
- the mapping of the service object identifier to the connection identifier is implemented in accordance with the mapping rule of the hash algorithm, and can be completely realized in theory. At the same time, this mapping ensures data security and integrity.
- connection identifier is the identifier of the service connection and terminal identity. It is the core of the pervasive service model. It can support mobility and security well and provide certain service quality assurance.
- the connection identifier indicates the identity in the connection, during a service connection, the service provider and The service recipients respectively generate a connection identifier, and the two connection identifiers form a connection identifier pair, which uniquely identifies a service connection.
- connection identifier Z is an infinite set, W e ⁇ l, 2,... ⁇ , and the connection identifier z contains some attributes of the connection (service) Quality requirements, etc.).
- the generation expression of the connection identifier Z of the first and second connections is:
- (0 represents the t-th attribute value of the first and second connections ( ⁇ ⁇ 1, 2 ⁇ ), and is a connection identifier generation function whose argument is all attribute values of the first connection, and the dependent variable is / Connection ID of the secondary connection.
- connection pair When the communication parties perform a communication, the connection pair is used to indicate the connection, and the connection pair can be represented by a sequence. «2 and "Representing the terminals of the communication terminals of this connection, / and 7 ⁇ respectively indicate the connection type at the terminal, respectively.”
- connection identifier can fundamentally solve the mobility problem.
- the IP address acts both as the identity of the host and as the location identifier of the host. This method is not conducive to supporting the mobility of the host.
- the change of the IP address will cause the original established transmission connection to be interrupted, and the connection needs to be re-established.
- the mapping of the connection ID and the service identifier to the connection identifier will provide a mobility solution for the separation of identity and location, separating the dual functions of the traditional IP address, and exchanging the routing identifier as the location identifier of the host;
- the identity of the host and the identity of a service connection This technology allows the communication host to switch only the exchange route identifier in the case of wireless mobility, and the connection identifier identifying the service connection remains unchanged during this process, and the connection is not interrupted.
- connection identifier In the denial of service attack, the attacker impersonates the target node and simultaneously communicates with multiple communication nodes, so that the target node receives a large amount of information in a short time. Information is congested. Careful analysis of these two kinds of network attacks is not difficult to see, their essence is the address fraud and address unsafe use.
- connection identifier By introducing the connection identifier, it is used as the identifier of the host identity, and the route identifier is exchanged as the communication address. Therefore, even if the host's communication address is changed due to mobile handover or multiple township issues, the connection identifier does not affect the legal identity of the host identity. The problem of deception and impersonation in the network is solved.
- the universal service model can fundamentally guarantee the stability of the service connection, and provides a certain guarantee of service quality at the connection level.
- Connection ID resolution mapping This mapping links the work of the virtual connection module and the Netcom layer, completes the mapping of a connection identifier to multiple exchange route identifiers, realizes multiple path selection of service connections on the network, and improves the reliability of network transmission. Sex.
- the integrated network model is divided into the network layer and the service layer.
- the layered design makes the layers independent of each other. There is no need to know how the other party implements between the layers. It only needs to provide some interfaces.
- the connection identifier resolution mapping functions as a function of this interface, associating the virtual connection module with the work of the Netcom layer, and completing the mapping of the service connection to the exchange routing. Due to the independence of design between layers, the Netcom layer can be abstracted to provide only one switching route for the connection of the service layer. Therefore, there is no one-to-one mapping and one-to-many mapping in the connection identification resolution mapping. There are two types of mapping and many-to-many mapping.
- a communication host generally has only one network interface, and each interface only assigns one network address, and all connections are multiplexed with one routing.
- the integrated network will support the service shown in (8) to connect to the routing of the many-to-many mapping, where a service represents a customer, and a / client terminal represents a switched route identifier, ", m is changed the amount.
- Mapping ⁇ ( ⁇ ) maps the connection identifier pairs corresponding to the service between the terminal //// to m exchange routings
- FIG. 10 is a connection and routing multi-to-many mapping model based on the connection identifier resolution mapping matrix of equation (8), and the input multiple connections are connected to multiple paths through the connection identifier resolution mapping.
- the multi-to-many mapping enables the Netcom layer to provide differentiated services to the service layer, improving transmission efficiency.
- many-to-many mapping can better solve data retransmission and connection interruption recovery problems. In traditional TCP, after a packet is lost, it must be retransmitted, which affects the subsequent data transmission and reduces the transmission efficiency. When the link is interrupted for some reason, the impact on performance is greater. Many-to-many mapping technology can avoid the above problems by connecting multiple paths.
- Embodiment 2 This embodiment is a running process of the service layer of the integrated network: Based on the overall model of the service layer, a unified processing mechanism of the service layer shown in FIG. 11 can be designed, and the service identity unified manager is used in the figure. To manage the unified registration and query of service identifiers in a global scope, Figure 12 is a corresponding timing diagram. User 2 and client 2 are service providers, and user 1 and client 1 are service acquirers. The service layer unified processing mechanism is divided into the following four phases or steps:
- the client server registers the ternary information in the service unified processing server.
- the ternary information includes: connection identifier, service identifier, and service description.
- Service discovery step the service requesting end submits a required service description sub-step to the service unified processing server, and the service unified processing server forms a connection identifier and a service identifier in the ternary information corresponding to the service to form a dual-group information and returns the service request side.
- Service establishment step By using the registered service identification service provider to listen to the service request side of the service request, and through the binary information group to contact the service requester sub-step, the service request side and the service delivery handshake and authentication, and finally establish contact Substeps.
- Service Maintenance Step The service requester exchanges a packet with the service exchange to distinguish the identity.
- connection identifier is the concept of the "network pass layer" of the integrated network, which is the identifier of the location of the communication terminal;
- service identifier is a symbolic representation of the service, used to listen and establish a service connection;
- service description is a description of the user-friendly service function, performance, etc. Reflect the user's preference for the service.
- the terminal providing the service submits the corresponding ternary information group to the service identity unified manager to complete the service registration.
- the service discovery includes: the user submits the required service description to the service identity unified manager; the service identity unified manager obtains the corresponding ternary information from the registered service; the unified processor converts the binary in the ternary information (access identifier, Service ID) is returned to the user.
- the key to the design is that the Unified Manager obtains the corresponding ternary information from the registered services. This solution will present a distributed acquisition method.
- the service identity unified manager system is composed of a super node and a distributed storage system.
- the super node classifies the registration information of the service provider in a large range, and generates a corresponding ternary information group.
- the generated information is stored in the distributed system based on the distributed hash table, and the service acquiring party uses the service description through the super node and Distributed system location service provider.
- the current form of service description is relatively simple.
- the terminal in the figure uses the SIP username as the service description for service registration and discovery.
- Service establishment includes: The service provider uses its registered service identifier for connection interception; The acquirer establishes a service connection with the service provider using the corresponding connection identifier. This phase involves some mechanisms such as handshake and authentication when establishing a connection.
- the service maintenance is mainly after the service connection is established, and the communication parties integrate the flow of the packet exchange data packet.
- the traditional Internet uses a socket consisting of an IP address and a port number in the service establishment and service maintenance phases.
- the connection identifier is introduced in the integrated network to classify the data packets.
- the innovation of the service layer unified processing mechanism is embodied in: Introducing a third-party service identity unified manager, the service provider can change the service identifier at any time, just re-register, overcome the shortage of well-known port numbers; introduce local independent random numbers
- the connection identifier separates the service connection from the service maintenance, which increases the concealment of the data packet; the connection identifier is separated from the host location information to solve the service continuity problem in the mobile environment.
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- General Business, Economics & Management (AREA)
- Multimedia (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
Un procédé de service pervasif dans un réseau intégré fait appel à une architecture de réseau intégré assurant un traitement de service uniforme. Pour résoudre le problème de la faible interopérabilité, un procédé se charge d'assurer à l'utilisateur le service approprié et le service pervasif. La solution technique repose sur: l'établissement de la couche de communication réseau, l'établissement de la couche de service basée sur la couche de communication réseau, l'association de divers services et ressources réseaux à un identificateur de service, le mappage de la sous-couche de service virtuelle sur la sous-couche de connexion virtuelle, le mappage de la sous-couche de connexion virtuelle sur la couche de communication réseau. Ceci permet divers accès mobiles qui incluent l'utilisateur fixe, le terminal mobile, le sous-réseau mobile et l'utilisateur ad hoc, et autres; l'utilisateur fixe et l'utilisateur mobile utilisant le même service personnel, ce qui assure ainsi le partage et la recherche de service d'une ressource de réseau distribué, la transmission de services audio, vidéo et de données et autres et produit une qualité de service à fine granularité, qui apporte à l'utilisateur un service approprié et un service pervasif.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN200610169726.3 | 2006-12-28 | ||
CN 200610169726 CN101212464B (zh) | 2006-12-28 | 2006-12-28 | 实现一体化网络中普适服务的方法 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2008080276A1 true WO2008080276A1 (fr) | 2008-07-10 |
Family
ID=39588123
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2007/001396 WO2008080276A1 (fr) | 2006-12-28 | 2007-04-26 | Procédé d'établissement et procédé de fonctionnement du service pervasif basé sur un réseau intégré |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN101212464B (fr) |
WO (1) | WO2008080276A1 (fr) |
Families Citing this family (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101465815B (zh) * | 2009-01-05 | 2011-05-18 | 浙江大学 | 在一体化承载网中维护根服务器配置一致性的方法 |
CN101465886B (zh) * | 2009-01-05 | 2012-12-05 | 浙江大学 | 在一体化承载网中维护根服务器数据一致性的方法 |
EP2404408B1 (fr) * | 2009-03-03 | 2017-04-26 | Samsung Electronics Co., Ltd. | Procédé et appareil permettant de restreindre la divulgation d'informations de réseau au cours d'un service d'accès à distance |
US10404485B2 (en) | 2009-03-03 | 2019-09-03 | Samsung Electronics Co., Ltd | Method and apparatus for restricting disclosure of network information during remote access service |
CN101815032B (zh) * | 2010-03-16 | 2012-08-22 | 中国电子科技集团公司第三十研究所 | 基于一体化网络安全服务架构的信息分类隔离方法 |
CN101771619B (zh) * | 2010-03-16 | 2012-07-04 | 中国电子科技集团公司第三十研究所 | 实现一体化安全服务的网络系统 |
CN102572774B (zh) * | 2010-12-27 | 2015-06-03 | 中兴通讯股份有限公司 | 一种多种接入方式接入网络的方法、接入设备和认证设备 |
CN102158551B (zh) * | 2011-03-30 | 2013-06-26 | 沈益民 | 物联网信息源统一描述和访问方法 |
CN104506971A (zh) * | 2014-12-31 | 2015-04-08 | 绵阳芯联芯网络科技有限公司 | 基于分离映射机制的无源光网络移动漫游的实现方法 |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6477576B2 (en) * | 1999-06-17 | 2002-11-05 | International Business Machines Corporation | Methods, systems and computer program products for the automated discovery of a services menu |
CN1777113A (zh) * | 2005-12-19 | 2006-05-24 | 北京交通大学 | 一种实现一体化网络服务的体系结构 |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1372325A1 (fr) * | 2002-06-13 | 2003-12-17 | Koninklijke KPN N.V. | Système de télécommunication comprenant une plate-forme pour activer et contrôler des services téléphoniques |
-
2006
- 2006-12-28 CN CN 200610169726 patent/CN101212464B/zh not_active Expired - Fee Related
-
2007
- 2007-04-26 WO PCT/CN2007/001396 patent/WO2008080276A1/fr active Application Filing
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6477576B2 (en) * | 1999-06-17 | 2002-11-05 | International Business Machines Corporation | Methods, systems and computer program products for the automated discovery of a services menu |
CN1777113A (zh) * | 2005-12-19 | 2006-05-24 | 北京交通大学 | 一种实现一体化网络服务的体系结构 |
Non-Patent Citations (1)
Title |
---|
RAO W. ET AL.: "Service Discovery in Ubiquitous Service Environment", JOURNAL OF WUT (INFORMATION & MANAGEMENT ENGINEERING), vol. 27, no. 4, 31 August 2005 (2005-08-31), pages 71 - 74 * |
Also Published As
Publication number | Publication date |
---|---|
CN101212464A (zh) | 2008-07-02 |
CN101212464B (zh) | 2011-09-07 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2008080276A1 (fr) | Procédé d'établissement et procédé de fonctionnement du service pervasif basé sur un réseau intégré | |
CN101606373B (zh) | 用于分组交换网络的通信方法和采用该方法的网络 | |
Wang et al. | ICEBERG: An Internet core network architecture for integrated communications | |
US20060146792A1 (en) | Voice over IP (VOIP) network infrastructure components and method | |
US20070291734A1 (en) | Methods and Apparatus for Multistage Routing of Packets Using Call Templates | |
US20040109414A1 (en) | Method of providing differentiated service based quality of service to voice over internet protocol packets on router | |
US20080247382A1 (en) | System and method for providing improved VoIP services | |
KR101368615B1 (ko) | 단대단 콜의 구현 방법, 단대단 콜 터미널 및 시스템 | |
WO2005107161A1 (fr) | Systeme et procede de communications d'un reseau de telecommunications ip et leur application | |
WO2012016528A1 (fr) | Procédé et système compatibles avec ethernet | |
CN1435063A (zh) | 用于为分组数据激活一个分组数据用户上下文的方法和系统 | |
WO2012016526A1 (fr) | Procédé de communication réseau urbain et système de communication | |
CN110177098A (zh) | Ndn与ip网络边界网关转换方法和装置 | |
WO2012130128A1 (fr) | Procédé, dispositif et système pour mettre en œuvre la conversion d'un identifiant de réseau | |
CN100417067C (zh) | 一种实现一体化网络服务的体系结构 | |
CN101272395B (zh) | 一种通信网络的层次接入控制方法 | |
Ganapathy et al. | Design of a network service architecture | |
CN101674297A (zh) | 分布式业务网络、核心服务设备及协议报文处理方法 | |
KR100705567B1 (ko) | 브이오아이피 호 처리 시스템 및 그 방법 | |
WO2008080275A1 (fr) | Procédé de construction d'un réseau intégré et dispositif d'acheminement globalement modifiable dans le réseau intégré | |
CN102158477A (zh) | 一种通信系统和信息交互方法 | |
Cisco | I | |
US8526315B2 (en) | Flow state attributes for producing media flow statistics at a network node | |
JP4870882B2 (ja) | Ipネットワーク間の通信方法 | |
WO2011124121A1 (fr) | Système et procédé de communication de données inter-réseau |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 07720969 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 07720969 Country of ref document: EP Kind code of ref document: A1 |