[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

CN102573013B - Data transmission method by adopting multiple access modes and access device - Google Patents

Data transmission method by adopting multiple access modes and access device Download PDF

Info

Publication number
CN102573013B
CN102573013B CN201010608250.5A CN201010608250A CN102573013B CN 102573013 B CN102573013 B CN 102573013B CN 201010608250 A CN201010608250 A CN 201010608250A CN 102573013 B CN102573013 B CN 102573013B
Authority
CN
China
Prior art keywords
user
identity
access
source user
data message
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201010608250.5A
Other languages
Chinese (zh)
Other versions
CN102573013A (en
Inventor
张世伟
符涛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Kunshan Chuangzhihui Intellectual Property Operation Co ltd
Original Assignee
ZTE Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZTE Corp filed Critical ZTE Corp
Priority to CN201010608250.5A priority Critical patent/CN102573013B/en
Priority to PCT/CN2011/084038 priority patent/WO2012089032A1/en
Publication of CN102573013A publication Critical patent/CN102573013A/en
Application granted granted Critical
Publication of CN102573013B publication Critical patent/CN102573013B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup
    • H04W76/11Allocation or use of connection identifiers
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/02Processing of mobility data, e.g. registration information at HLR [Home Location Register] or VLR [Visitor Location Register]; Transfer of mobility data, e.g. between HLR, VLR or external networks
    • H04W8/04Registration at HLR or HSS [Home Subscriber Server]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a data transmission method by adopting multiple access modes, which is applied to a network with separated identification and locator identification. The method includes that a second access node receives data messages sent by a first access node and records connection bonding relation of identification of a source user and locator identification of the source user in the data messages; the locator identification of the source user in the data messages is the locator identification of the first access node; and the second access node receives the data messages sent to the source user, locator identification of the source user recorded by the second access node is searched according to the connection bonding relation, and the data messages are sent to the inquired first access node corresponding to the locator identification of the source user. The invention further discloses an access device. The data transmission method and the access device can enable the user terminal to launch business independently in various access modes, and business flows can not conflict with each other.

Description

Data transmission method and access equipment adopting multiple access modes
Technical Field
The present invention relates to the field of communications technologies, and in particular, to a data transmission method and an access device using multiple access modes.
Background
In the transmission control Protocol/Internet Protocol (TCP/IP) widely used in the existing Internet, an IP address has dual functions, that is: the method is used as the position identification of the communication terminal host network interface in the network topology of the network layer and also as the identity identification of the host network interface in the transmission layer. The TCP/IP design did not initially take into account host mobility. However, as host mobility becomes more prevalent, the semantic overload drawback of IP addresses becomes increasingly apparent. When the IP address of the host changes, not only the route changes, but also the identity of the communication terminal host changes, which may cause the route load to be heavier and heavier, and the change of the host identity may cause the interruption of the application and the connection. The purpose of separating the identity identifier and the position identifier is to solve the problems of semantic overload and serious routing load of an IP address in TCP/IP, safety and the like, so that the dual functions of the IP address are separated, and the support of the problems of mobility, multi-hometown, dynamic IP address redistribution, routing load reduction, mutual access among different network areas in the next generation of internet and the like is realized.
In order to solve the above problems, various network architectures with separated ids and location identifiers have been proposed, including Host Identity Protocol (HIP) and Location Identity Separation Protocol (LISP), which all belong to an id and a location separation network.
Fig. 1 shows an id and location separation Network architecture (chinese patent application No. CN200910174826.9, application date 10/17/2009), and for convenience of description, this user id and location separation Network is abbreviated as SILSN (Subscriber identity & location separation Network) hereinafter; the SILSN includes an Access Server (ASN), a User Equipment (UE), an identity & location Register (ILR), and the like. The ASN is used for accessing the user equipment, is responsible for realizing the access of the user equipment, and bears functions of charging, switching and the like, and the ILR bears functions of position registration and identity recognition of a user. The ASN is a logical entity, and may be a Serving GPRS Support Node (SGSN), a Gateway GPRS Support Node (GGSN), a Packet Data Service Node (PDSN), a Broadband access Server (BRAS), and other devices. In a specific application scenario, the ILR may be a Key Management System (KMS), a Home Location Register (HLR), a Home Subscriber Server (HSS), an Authorization/Authentication/Accounting Server (Authorization, Authentication, Accounting, AAA), and other entities that perform end-to-end Key Management and negotiation functions.
In the SILSN, a user is identified by an Access Identity (AID) (for identifying the identity of the user), an ASN is identified by a Route Identity (RID) (for identifying the location of the user), and each user and ASN have their own independent AID or RID. When a user in a SILSN accesses the network through a user terminal (e.g., UE1), its location is first registered with the ILR through the ASN (i.e., it is registered under which ASN the UE1 is located). After the registration of the UE1, the ILR establishes a correspondence between the AID of the user and the RID of the accessed ASN. Then, if the UE1 needs to communicate with the UE2, after the UE1 sends a data message, the ASN1 queries the ILR about the location of the UE2, i.e., under which ASN the UE2 is located, and in fig. 1, the UE2 is located under the ASN 9. Then the ASN1 sends the data message to the corresponding ASN9, and the ASN9 sends the processed data message to the UE 2.
The network well realizes the separation of the user identity and the position identity, and the identity does not need to be changed when the user equipment moves and roams, thereby ensuring the continuity of the service in the moving process. Route expandability and safety are also improved obviously.
In the initial SILSN, each user can only access the network in one access mode, the SILSN is not designed for simultaneous access in multiple access modes, and when the user accesses the network in multiple access modes, only one different AID can be assigned to each user in each access mode, which causes a situation that one user corresponds to multiple identifiers, and violates the basic requirement of uniqueness of the user identifiers in the SILSN.
Disclosure of Invention
In the prior art, when a user accesses a network by adopting a multi-access mode, data messages transmitted by various access modes are easily disordered, so that normal transmission cannot be realized.
The technical problem to be solved by the present invention is to provide a data transmission method and access device in multiple access modes, so as to ensure that when a user is in multiple access modes, the access device can distinguish data messages transmitted in various access modes, so that the user can normally transmit data messages in multiple access modes.
In order to solve the above technical problem, the present invention provides a data transmission method using multiple access modes, where the method is applied to a network with separate identity and location identifiers, and the method includes:
the second access node receives the data message sent by the first access node and records the connection binding relationship between the identity of the source user and the position identification of the source user in the data message; wherein, the location identifier of the source user in the data message is the location identifier of the first access node; and
and the second access node receives the data message sent to the source user, searches the position identification of the source user recorded by the second access node according to the connection binding relationship, and sends the data message to the first access node corresponding to the inquired position identification of the source user.
Further, in the step of recording the connection binding relationship between the identity and the location identity of the source user equipment in the data message, the second access node also records the identity of the destination user in the data message into the connection binding relationship;
in the step of searching the location identifier of the source user recorded by the second access node according to the connection binding relationship, the second access node searches the location identifier of the source user recorded by the second access node according to the identity identifier of the destination user and the identity identifier of the source user.
Further, the method further comprises:
and if the second access node receives data messages which are sent to the same destination user and contain the identity identification of the same source user in sequence, the second access node inquires the position identification of the same source user from the authentication node to which the same source user belongs, and updates the connection binding relationship by using the inquired position identification after inquiring different position identifications corresponding to different access modes of the same source user.
Further, the step of the second access node updating the connection binding relationship with the queried location identity includes:
and the second access node judges whether the different position identifications, corresponding to different access modes, of the same source user returned to the second access node by the authentication node contain the position identification of the source user in the next data message, and if so, the position identification of the source user in the connection binding relationship is updated to the position identification of the source user in the next data message.
Further, the method further comprises:
the second access node receives a data message sent by a user terminal accessed to the second access node; and
the second access node judges whether the connection binding relationship has the identity of the source user and the identity of the destination user of the data message sent by the user terminal;
if so, finding out a position identifier corresponding to the identity identifier of the target user in the data message sent by the user terminal from the connection binding relationship, and sending the data message to an access node corresponding to the position identifier;
and if not, inquiring the position identification of the target user from the authentication node to which the target user belongs, and sending a data message to the inquired access node corresponding to the position identification associated with one access mode.
Further, after the step of receiving, by the second access node, the data packet sent by the first access node, the method further includes:
the second access node judges whether the identity of the source user and the identity of the destination user in the data message sent by the first access node are stored in the connection binding relationship;
and if not, executing the step of recording the connection binding relationship between the identity of the source user and the position identity of the source user in the data message, and sending the data message sent by the first access node to the destination user.
Further, the method further comprises:
if the second access node judges the connection binding relationship of the source user identity and the destination user identity in the data message sent by the first access node, which is stored in the connection binding relationship, the second access node judges whether the position identity in the connection binding relationship of the source user identity and the destination user identity in the data message sent by the first access node, which is stored in the second access node, is the same as the position identity of the source user in the data message;
if the data messages are the same, the data message sent by the first access node is sent to the target user;
if not, the second access node inquires the position identification of the source user of the authentication node to which the source user of the data message sent by the first access node belongs, and after receiving different position identifications corresponding to different access modes returned by the authentication node, judges whether the position identification returned by the authentication node contains the position identification of the source user in the data message sent by the first access node, and if so, sends the data message to the target user.
Further, the method further comprises:
and if the position identifier returned by the authentication node does not contain the position identifier of the source user in the data message, the second access node discards the data message.
The step that the second access node inquires the position identification of the user from the authentication node to which the user belongs comprises the following steps: the second access node sends a position query request to an authentication node to which a user belongs, wherein the position query request carries the identity of the user;
the authentication node inquires the position identification of the user under each access mode according to the identity identification of the user carried in the position inquiry request, wherein the access modes correspond to the position identifications one to one, and returns a position inquiry response to the second access node, and the position inquiry response comprises the identity identification of the user, the position identification of the user and the access mode associated with each position identification;
wherein the users comprise source users and destination users.
Further, the network with separated identity and location identity is a Subscriber Identity and Location Separation Network (SILSN); the access node is an Access Server (ASN), the authentication node is an Identity and Location Register (ILR), the identity is an Access Identifier (AID), and the location is a Routing Identifier (RID).
In order to solve the above technical problem, the present invention provides an access device, which is applied to a network with separate identity identifier and location identifier, and comprises:
the receiving module is used for receiving a data message sent by first access equipment, wherein the data message comprises an identity of a source user and an identity of a destination user; receiving a data message sent to the source user;
the storage module is used for recording the connection binding relationship between the identity of the source user and the position identification of the source user in the data message; wherein, the location identifier of the source user in the data message is the location identifier of the first access device;
the searching module is used for searching the position identifier of the source user recorded by the storage module from the connection binding relationship after receiving the data message sent to the source user; and
and the sending module is used for sending the data message sent to the source user to the first access equipment corresponding to the position identifier of the source user inquired by the inquiring module.
Further, the storage module is further configured to record the identity of the destination user in the data packet into the connection binding relationship when recording the connection binding relationship between the identity of the source user and the location identity of the source user in the data packet;
the searching module is also used for searching the position identifier of the source user recorded by the storage module according to the identity identifier of the destination user and the identity identifier of the source user.
Further, if the receiving module receives data messages which are sent to the same destination user and contain the identity of the same source user in sequence, the sending module is also used for inquiring the position identity of the source user from the authentication node to which the source user belongs;
the receiving module is further configured to receive different location identifiers, corresponding to different access modes, of the source user, which are returned by the authentication node;
the storage module is further configured to update the connection binding relationship with the queried location identifier.
Further, the storage module is configured to update the connection binding relationship with the queried location identifier as follows:
and judging whether the different position identifiers, corresponding to different access modes, of the source user returned to the second access node by the authentication node contain the position identifier of the source user in the next data message, and if so, updating the position identifier of the source user in the connection binding relationship into the position identifier of the source user in the next data message.
Further, the receiving module is further configured to receive a data packet sent by a user terminal accessed to the access device; receiving position identifiers, corresponding to different access modes, of a target user returned by an authentication node to which the target user belongs in a data message sent by the user terminal;
the searching module is further configured to determine whether the connection binding relationship of the storage module has the identity of the source user and the identity of the destination user in the data packet sent by the user terminal; if so, finding out the position identifier corresponding to the identity identifier of the target user in the data message sent by the user terminal from the connection binding relationship, and indicating a sending module to send the data message; if not, indicating the sending module to inquire the position identification of the target user from the authentication node to which the target user belongs;
the sending module is further configured to send the data packet to the access node corresponding to the location identifier of the destination user after receiving the indication of sending the data packet from the searching module; after receiving the instruction of the searching module for inquiring the position identification of the target user from the authentication node to which the target user belongs; sending a query message to an authentication node to which the target user belongs; and sending a data message to an access node which is inquired by a certification and authentication node to which the target user belongs and corresponds to the position identification associated with one access mode.
Further, the searching module is further configured to, after receiving the data packet sent by the first access device, determine whether the connection binding relationship stores the identity of the source user and the identity of the destination user in the data packet sent by the first access device; and if not, indicating a storage module to record the connection binding relationship between the identity identifier of the source user and the position identifier of the source user in the data message, and indicating a sending module to send the data message sent by the first access equipment to the destination user.
Further, the searching module is further configured to, if it is determined that the connection binding relationship between the identifier of the source user and the identifier of the destination user in the data packet sent by the first access device has been stored in the connection binding relationship, determine whether the location identifier in the connection binding relationship between the identifier of the source user and the identifier of the destination user in the data packet sent by the first access device, which is stored in the connection binding relationship, is the same as the location identifier of the source user in the data packet sent by the first access device; if the data messages are the same, the sending module is instructed to send the data messages sent by the first access equipment to the target user; if not, indicating a sending module to inquire the position identification of the source user to the authentication node to which the source user belongs; after receiving different position identifiers corresponding to different access modes and returned by the authentication node to which the source user belongs, judging whether the position identifiers returned by the authentication node contain the position identifier of the source user in the data message sent by the first access equipment, and if so, indicating the sending module to send the data message to the target user; if not, discarding the data message sent by the first access device;
the receiving module is further configured to receive different location identifiers corresponding to different access manners, which are returned by the authentication node to which the source user belongs, and send the location identifiers to the searching module.
Further, the network with separated identity and location identity is a Subscriber Identity and Location Separation Network (SILSN); the access node is an Access Server (ASN), the authentication node is an Identity and Location Register (ILR), the identity is an Access Identifier (AID), and the location is a Routing Identifier (RID).
Further, the access device includes one of a serving general packet radio service support node (SGSN), a gateway general packet radio service support node (GGSN), a Packet Data Service Node (PDSN), and a broadband access server (BRAS).
The technical scheme of the invention can realize the system method supporting multiple access modes and using the same identity for network communication under the framework of separating the identity from the position identification. Moreover, when one access mode is unavailable, other access modes can be used, and the continuity of the service is improved. In addition, a plurality of access modes use the same user identifier AID, so that the network tracing is simpler, and the network security is improved.
Drawings
FIG. 1 is a schematic diagram of an architecture of a SILSN;
fig. 2 is a schematic diagram of a scenario in which a user terminal transmits a data packet in a forward direction;
fig. 3 is a schematic diagram of a user terminal transmitting a data message in a reverse direction in a scenario corresponding to fig. 2;
fig. 4 is a schematic diagram of another scenario in which a user terminal transmits a data packet in the forward direction;
fig. 5 is a schematic diagram of a user terminal transmitting a data packet in a reverse direction in a scenario corresponding to fig. 4;
fig. 6 is a schematic diagram of confusion caused by reverse transmission of a data packet in another scenario;
FIG. 7 is a diagram illustrating a method of resolving confusion in the reverse direction of sending data messages as shown in FIG. 6;
FIG. 8 is a flowchart of the ASN11 initiating a location query to the ILR in the present invention;
FIG. 9 is a flowchart illustrating an ASN processing data packet sent by a local user in an exemplary application of the present invention;
FIG. 10 is a flowchart illustrating an ASN processing data message sent by other ASNs to a user terminal accessing the ASN in an exemplary application of the present invention;
fig. 11 is a schematic structural diagram of an access device according to an embodiment of the present invention.
Detailed Description
In a network with separate identity and location identity, each user has two identifiers, AID and RID, where AID represents the user's identity and RID represents the user's location. When a user accesses a network by adopting multiple access modes, in order to keep the uniqueness of a user identity AID, the AID must be kept unchanged, and a technical scheme for realizing that a user terminal accesses the network by the multiple access modes in a network with separated identity and location identification is as follows: when a user terminal accesses a network by using different access modes, the user terminal must register in different access nodes, and more precisely, when the same user adopts different accesses, the access nodes of various accesses must have different RIDs. On the basis of the technical scheme, the following steps are correspondingly provided: when a user registers, the Access node shall simultaneously carry the Access mode of the user when reporting the location information of the user terminal to the authentication node, such as Wireless Local Area Network (WLAN), Wideband Code Division Multiple Access (WCDMA) and the like, so that when the user terminal simultaneously adopts multiple Access modes to Access the Network, the Access node reports the location information of each Access mode to the authentication node without mutual coverage, thereby creating a basic condition for the user terminal to adopt multiple Access modes to Access the Network.
However, since the user uses the same id when using multiple access methods, new problems may occur in data transmission and reception. For example, data flows of different access modes are all sent with the same identity, the data messages are easily confused at an access node, and if the original sending and receiving mechanisms of the data messages of the access node are not modified, the data flows of the different access modes are mixed together and cannot be distinguished, so that the service cannot be normally carried out.
The invention provides a data transmission method and access equipment in multiple access modes aiming at the problems, so as to ensure that an access node can distinguish data messages transmitted by various access modes when a user is in the multiple access modes, and the user can normally transmit the data messages in the multiple access modes.
The invention provides a data transmission method adopting multiple access modes, which is applied to a network with separated identity marks and position marks, and comprises the following steps:
the second access node receives the data message sent by the first access node and records the connection binding relationship between the identity of the source user and the position identification of the source user in the data message; wherein, the location identifier of the source user in the data message is the location identifier of the first access node; and
and the second access node receives the data message sent to the source user, searches the position identification of the source user recorded by the second access node according to the connection binding relationship, and sends the data message to the first access node corresponding to the inquired position identification.
Wherein, in the step that the second access node receives the data message sent to the source user:
the identification of the destination user of the received data message is the identification of the source user in the step that the second access node receives the data message sent by the first access node and records the connection binding relationship between the identification of the source user and the position identification of the source user in the data message;
the identification of the source user of the data message received this time, namely the identification of the destination user in the step of the second access node receiving the data message sent by the first access node and recording the connection binding relationship between the identification of the source user and the position identification of the source user in the data message.
Wherein,
in the step of recording the connection binding relationship between the identity and the location identity of the source user equipment in the data message, the second access node also records the identity of the destination user in the data message into the connection binding relationship;
in the step of searching the location identifier of the source user recorded by the second access node according to the connection binding relationship, the second access node searches the location identifier of the source user recorded by the second access node according to the identity identifier of the destination user and the identity identifier of the source user.
The method further comprises the following steps:
and if the second access node receives data messages which are sent to the same destination user and contain the identity identification of the same source user in sequence, the second access node inquires the position identification of the same source user from the authentication node to which the same source user belongs, and updates the connection binding relationship by using the inquired position identification after inquiring different position identifications corresponding to different access modes of the same source user.
Wherein, the step of updating the connection binding relationship by the second access node using the inquired location identifier comprises:
and the second access node judges whether the different position identifications, corresponding to different access modes, of the same source user returned to the second access node by the authentication node contain the position identification of the source user in the next data message, and if the different position identifications contain the position identification of the source user in the connection binding relationship, the position identification of the source user in the connection binding relationship is updated to the position identification of the source user in the next data message.
The method further comprises the following steps:
a second access node receives a data message sent by a user terminal accessed to the second access node; and
the second access node judges whether the connection binding relationship has the identity of the source user and the identity of the destination user of the data message sent by the user terminal;
if so, finding out a position identifier corresponding to the identity identifier of the target user in the data message sent by the user terminal from the connection binding relationship, and sending the data message to an access node corresponding to the position identifier;
and if not, inquiring the position identification of the target user from the authentication node to which the target user belongs, and sending a data message to the inquired access node corresponding to the position identification associated with one access mode.
Hereinafter, embodiments of the present invention will be described in detail with reference to the accompanying drawings. It should be noted that the embodiments and features of the embodiments in the present application may be arbitrarily combined with each other without conflict. In the embodiment of the present invention, the SILSN is taken as an example for description, but the present invention is not limited thereto, and may be applied to other networks in which the identity identifier and the location identifier are separated.
The first embodiment is as follows:
fig. 2 is a schematic diagram of a UE1 supporting multiple access modes actively initiating data (forward data) service. As shown in fig. 2, the UE1 accesses the network by using two access modes, which are WLAN and General Packet Radio Service (GPRS), wherein the WLAN corresponds to the ASN1, and the GPRS corresponds to the ASN2, and both access modes send data packets by using the same AID. In this scenario, it is assumed that the destinations of data transmission of the two access manners are UE3 and UE4, respectively. When the UE1 sends data messages, the ASN1 and the ASN2 inquire the ILR that the positions of the UE3 and the UE4 are the ASN11 and the ASN12 respectively, and then the data messages sent by the UE1 are sent out through the ASN1 and the ASN2 respectively, namely, the data messages are sent from the UE1- > ASN1- > ASN11- > UE3 and from the UE1- > ASN2- > ASN12- > UE 4. It can be seen that when the data message is transmitted in the forward direction, the destination can be reached according to a normal path.
However, as shown in fig. 3, when UE3 and UE4 return data packets to UE1 in reverse (i.e. when a UE accessing a network using multiple access methods receives data packets), if the original mechanism is adopted, that is: when the ASN11 receives the data message of the UE3, the position of the AID is firstly inquired from the ILR, and the ILR returns the positions of the ASN1 and the ASN 2. If the ASN11 does not perform special processing, the data message returned by the UE3 may be sent via the ASN11-ASN2-UE1, as shown by the dashed line in FIG. 3. This may cause disorder of data packets and affect normal operation of the service. Therefore, for the reverse data packets sent by the UE3 and the UE4 and the like received by the ASN11 and the ASN12 in fig. 3, the ASN processing does not only depend on the query result, but also needs to perform some special processing.
In the invention, in order to ensure that the data message returned by the UE3 is transferred to the UE1 through the ASN11 and the ASN1, the ASN11 is required to firstly store the corresponding relation between the AID1 (corresponding to the UE1) and the RID1 (corresponding to the ASN1) when receiving the forward data message sent to the UE3 by the UE1 through the ASN1, such as AID1- > RID1, which is different from the original SILSN processing mechanism. In the original SILSN, after the ASN accessed by the destination user terminal of the data message receives the data message, the corresponding relation between the AID and the RID of the source user in the data message is not actively stored, and the corresponding relation between the AID and the RID in all ASNs comes from the ILR. In the invention, the corresponding relation between the AID and the RID in the ASN may be inquired from the ILR or from the received data message, and the ASN has the capability of self-learning the corresponding relation between the AID and the RID of the source user terminal from the received data message.
Example two:
for a scenario as shown in fig. 4, when two called ues of the ues accessing the network in multiple access manners are located under the same ASN, transmission of the data packet may still be confused, that is:
when data packets are being transmitted in the forward direction, normal transmission is possible from UE1- > ASN1- > ASN11- > UE3 and from UE1- > ASN2- > ASN11- > UE 4. However, when the data packets are transmitted reversely, even if the ASN11 has the capability of self-learning the correspondence relationship between the AID and the RID of the source user terminal UE1 from the received data packets, confusion of data packet transmission may occur, as shown in fig. 5:
since the UE3 and the UE4 are located under the same ASN11, when the ASN11 receives a data packet sent by the UE1 to the UE3 via the ASN1, it records the correspondence relationship of the AID1 and the RID1 of the UE1 as AID1- > RID1, and when the ASN11 receives a data packet sent by the UE1 to the UE4 via the ASN2, it rewrites the correspondence relationship of the UE1 to AID1- > RID2 (if only the correspondence relationship of the source AID and the source RID is recorded, only one group of correspondence relationship about the source AID is available, and therefore, the original correspondence relationship is rewritten), which causes the subsequent packet sent by the UE3 to the UE1 to be also sent via the ASN2, thereby causing confusion of the data packet.
In order to avoid confusion caused when the same user (e.g., UE1) accesses the network in different access manners, when the ASN11 at the opposite end sends data packets in the reverse direction, in the present invention, when the ASN receives packets addressed to the ASN from other ASNs, the ASN simultaneously records the corresponding relationship among the source user id, the destination user id, and the source user location id, and this relationship is hereinafter referred to as a connection binding relationship. In the embodiment of the invention, the corresponding relation among the identity of the source user, the identity of the destination user and the position identity of the source user, namely the corresponding relation among the source AID, the destination AID and the source RID, is recorded. When the subsequent ASN11 receives the data packet, it will query the destination RID of the data packet according to the two identifiers, i.e. the identifier of the destination user and the identifier of the source user, and then send the data packet to the ASN corresponding to the RID.
Such as: when the ASN11 receives the data packet sent to the AID3 by the AID1 forwarded through the ASN1 encapsulation, the following connection binding relationship is maintained: [ AID3- > AID1] - > RID 1;
when the ASN11 receives the data packet sent to the AID4 by the AID1 forwarded through the ASN2 encapsulation, the following connection binding relationship is maintained: [ AID4- > AID1] - > RID 2.
Therefore, the ASN11 records the connection binding relationship among AID1, AID3, and RID1, and the connection binding relationship among AID1, AID4, and RID2, respectively.
When the ASN11 is sending messages:
for the data message with the destination address of AID1 and the source address of AID3, the ASN11 sends the data message to the ASN 1;
for a data message with the destination address of AID1 and the source address of AID4, the ASN11 sends the data message to the ASN 2.
It can be seen that, when the subsequent ASN11 receives the data packet sent by the user UE3(AID3) to the UE1(AID1), since the data packet has a connection binding relationship of [ AID3- > AID1] - > RID1 locally, after the ASN11 encapsulates the data packet, the destination address can be set to RID1 directly according to the locally stored connection binding relationship, and then the data packet is sent to the ASN 1. In this process, ASN11 will no longer query the ILR.
Example three:
when a user communicates with a same peer (e.g., UE3 in fig. 6) through different UEs (e.g., UE1 and UE2 in fig. 6) using multiple access methods, where the different UEs correspond to the same id of the user, the reverse data flow from UE3 to UE1 and UE2 may still be confused, for example, in fig. 6, ASN11 cannot distinguish whether the data packet sent by UE3 is sent to ASN1 or ASN2, which may cause the data packet that should be sent to UE2 through ASN2 to be sent to UE1 through ASN1 (as shown by the dotted line in fig. 6), resulting in data packet confusion.
In order to avoid the problem of data transmission confusion caused by the fact that the same user accesses the same opposite terminal in a plurality of access modes through different user terminals, when the ASN receives messages sent by AID1 of the same user from other ASNs in sequence, the present invention initiates an operation of inquiring the position information of AID1 to the ILR, and determines the processing mode according to the result returned by the ILR, as shown in fig. 7. Wherein, the process that the ASN11 inquires the AID1 location information to the ILR is shown in fig. 7, that is, the process that the SILSN inquires the location information, and the location inquiry process is shown in fig. 8, and includes:
step 801: the ASN11 sends a location query request to the ILR, wherein the location query request carries AID1 of a user;
step 802: the ILR queries the location identifier of the user in each access mode according to the AID1 carried in the location query request, and sends the queried corresponding relationship to the ASN11 by returning a location query response to the ASN 11.
Then, after the ASN11 receives the location query response of the ILR, it determines whether the corresponding relationship in the location query response contains a new RID, such as RID2, and if so, switches the connection binding relationship to RID2, that is: and the connection binding relationship is changed from [ AID3- > AID1] - > RID1 to [ AID3- > AID1] - > RID2, and if the position query result does not contain the new RID, the connection binding relationship is not updated.
Therefore, when the user adopts a new access mode and opposite terminal connection, the original access mode is replaced by the new access mode, the data messages of the two access modes do not conflict, and the service can be carried out on the new connection mode.
An application example of the present invention will be described below with reference to the accompanying drawings.
The sending and receiving of the data message are mainly operated by the ASN, and the processing of the data message by the ASN comprises the following steps: sending data messages of a local user terminal (namely, a user terminal accessed to the local ASN), receiving data messages of other ASNs, and forwarding.
Application example I, flow of ASN processing data message sent by local user terminal
The process of processing the data packet sent by the local user terminal by the ASN is shown in fig. 9, and includes:
step 901: the ASN receives the message sent by the local user terminal, and the process starts.
Step 902: the ASN checks whether there is a corresponding connection binding relationship in the ASN according to the source AID and the destination AID in the data packet, if so, performs step 910, and if not, performs step 903.
When the ASN checks that the ASN has a connection binding relationship between the source AID and the destination AID according to the source AID and the destination AID in the data packet, it indicates that the ASN has received the data packet sent by the ASN to which the user terminal corresponding to the destination AID is accessed, and the RID in the connection binding relationship is the destination RID of the data packet.
When the ASN checks that there is no connection binding relationship between the source AID and the destination AID in the data packet according to the source AID and the destination AID in the data packet, it indicates that the data packet sent by the destination AID in the data packet to the source AID in the data packet has not been received by the ASN.
Step 903: if the connection binding relationship between the source AID and the destination AID in the data message does not exist, the ASN inquires the position information of the destination AID from the ILR;
step 904: and the ILR returns the position information of the multiple groups of access modes of the target AID to the ASN.
Step 905: the ASN selects an access mode and establishes a connection binding relationship, if [ AID1- > AID3] - > RID11, the ASN sends a data message to the ASN (such as ASN11) corresponding to the selected access mode, and the process is finished.
Wherein, when ASN selects access mode, it selects according to the rule set by user or operator
Step 910: if the connection binding relationship exists, such as [ AID1- > AID3] - > RID11, the existing connection binding relationship is directly used for sending the data message to the ASN corresponding to RID 11.
Application example two, the process of processing data message sent by other ASN to the user terminal accessed to the ASN by the ASN
Step 1001: if the ASN receives the data message sent by other ASNs to the user terminal accessed to the ASN, the process starts.
Step 1002: the ASN checks whether the ASN has a connection binding relationship between the source AID and the destination AID carried in the data packet, if so, performs step 1003, and if not, performs step 1010.
And the target AID is the AID corresponding to the user terminal accessed to the ASN.
Step 1003: if yes, checking whether the source RID carried in the data message is the same as the RID in the connection binding relationship between the source AID and the destination AID stored by the ASN, and if so, executing a step 1020; if not, go to step 1004; the connection binding relationship is AID of a source user, AID of a target user and RID of ASN accessed by the source user;
step 1004: if the ASN is different from the source AID, the ASN inquires the location information of the source AID from the ILR to which the user of the source AID belongs.
Step 1005: and the ILR returns the position information corresponding to the multiple groups of access modes of the source AID to the ASN.
Step 1006: after receiving the query result of the ILR, the ASN determines whether the location information returned by the ILR includes the source RID in the data packet, if so, performs step 1007, and if not, performs step 1030;
step 1007: if the position query result contains the new RID, switching the connection binding relationship to the new RID (namely, the RID in the original connection binding relationship is changed into the source RID in the data message), sending a data message to the user terminal corresponding to the target AID, and ending;
step 1010: and if the ASN checks that the connection binding relationship between the source AID and the destination AID carried in the data message does not exist on the ASN, the ASN stores the connection binding relationship of the source AID, then the data message is sent to the user terminal corresponding to the destination AID, and the process is finished.
Step 1020: and if the RID carried in the data message is checked to be the same as the RID in the connection binding relationship between the source AID and the destination AID stored by the ASN, directly sending the data message to the user terminal corresponding to the destination AID, and ending.
Step 1030: and if the ASN judges that the position information returned by the ILR does not contain the source RID in the data message, discarding the data message and ending.
Considering that if the location information returned by the ILR due to handover does not include the new RID, the data packet may also be forwarded to the ASN corresponding to the new RID in this step.
This embodiment also provides an access device, as shown in fig. 11, applied to a network with separate identity and location identifier, where the access device includes:
the receiving module is used for receiving a data message sent by first access equipment, wherein the data message comprises an identity of a source user and an identity of a destination user; receiving a data message sent to the source user;
the storage module is used for recording the connection binding relationship between the identity of the source user and the position identification of the source user in the data message; wherein, the location identifier of the source user in the data message is the location identifier of the first access device;
the searching module is used for searching the position identifier of the source user recorded by the storage module from the connection binding relationship after receiving the data message sent to the source user; and
and the sending module is used for sending the data message sent to the source user to the first access equipment corresponding to the position identifier of the source user inquired by the inquiring module.
Preferably, the storage module is further configured to record the identity of the destination user in the data packet into the connection binding relationship when recording the connection binding relationship between the identity of the source user and the location identity of the source user in the data packet;
the searching module is also used for searching the position identifier of the source user recorded by the storage module according to the identity identifier of the destination user and the identity identifier of the source user.
If the receiving module receives data messages which are sent to the same destination user and contain the identity identifiers of the same source user in sequence, the sending module is also used for inquiring the position identifier of the source user from the authentication node to which the source user belongs;
the receiving module is further configured to receive different location identifiers, corresponding to different access modes, of the source user, which are returned by the authentication node;
the storage module is further configured to update the connection binding relationship with the queried location identifier.
Wherein, the storage module is used for updating the connection binding relationship by the inquired location identifier as follows:
and obtaining different position identifications, corresponding to different access modes, of the source user returned by the authentication node from the receiving module, judging whether the position identifications, corresponding to different access modes, of the source user returned to the second access node by the authentication node contain the position identification of the source user in the next data message, and if so, updating the position identification of the source user in the connection binding relationship into the position identification of the source user in the next data message.
The receiving module is further configured to receive a data packet sent by a user terminal accessing to the access device; receiving position identifiers, corresponding to different access modes, of a target user returned by an authentication node to which the target user belongs in a data message sent by the user terminal;
the searching module is further configured to determine whether the connection binding relationship of the storage module has the identity of the source user and the identity of the destination user in the data packet sent by the user terminal; if so, finding out the position identifier corresponding to the identity identifier of the target user in the data message sent by the user terminal from the connection binding relationship, and indicating a sending module to send the data message; if not, indicating the sending module to inquire the position identification of the target user from the authentication node to which the target user belongs;
the sending module is further configured to send the data packet to the access node corresponding to the location identifier of the destination user after receiving the indication of sending the data packet from the searching module; after receiving the instruction of the searching module for inquiring the position identification of the target user from the authentication node to which the target user belongs; sending a query message to an authentication node to which the target user belongs; and sending a data message to the access node corresponding to the position identifier associated with one access mode, which is inquired by the authentication node to which the target user belongs.
The searching module is further configured to determine, after receiving the data packet sent by the first access device, whether the identity of the source user and the identity of the destination user in the data packet sent by the first access device are stored in the connection binding relationship; and if not, indicating a storage module to record the connection binding relationship between the identity identifier of the source user and the position identifier of the source user in the data message, and indicating a sending module to send the data message sent by the first access equipment to the destination user.
The searching module is further configured to, if the connection binding relationship between the source user identity and the destination user identity in the data message sent by the first access device has been stored in the connection binding relationship, determine whether the location identifier in the connection binding relationship between the source user identity and the destination user identity in the data message sent by the first access device that is stored in the connection binding relationship is the same as the location identifier of the source user in the data message sent by the first access device; if the data messages are the same, the sending module is instructed to send the data messages sent by the first access equipment to the target user; if not, indicating a sending module to inquire the position identification of the source user to the authentication node to which the source user belongs; after receiving different position identifiers corresponding to different access modes and returned by the authentication node to which the source user belongs, judging whether the position identifiers returned by the authentication node contain the position identifier of the source user in the data message sent by the first access equipment, and if so, indicating the sending module to send the data message to the target user; if not, discarding the data message sent by the first access device;
the receiving module is further configured to receive different location identifiers corresponding to different access manners, which are returned by the authentication node to which the source user belongs, and send the location identifiers to the searching module.
Wherein, the network with separated identity and position identification can be a user identity and position separation network (SILSN); the access node is an Access Server (ASN), the authentication node is an Identity and Location Register (ILR), the identity is an Access Identifier (AID), and the location is a Routing Identifier (RID).
Wherein the access device comprises one of a serving general packet radio service support node (SGSN), a gateway general packet radio service support node (GGSN), a Packet Data Service Node (PDSN), and a broadband access server (BRAS).
It will be understood by those skilled in the art that all or part of the steps of the above methods may be implemented by instructing the relevant hardware through a program, and the program may be stored in a computer readable storage medium, such as a read-only memory, a magnetic or optical disk, and the like. Alternatively, all or part of the steps of the above embodiments may be implemented using one or more integrated circuits. Accordingly, each module/unit in the above embodiments may be implemented in the form of hardware, and may also be implemented in the form of a software functional module. The present invention is not limited to any specific form of combination of hardware and software.
The above description is only for the specific embodiments of the present invention, but the scope of the present invention is not limited thereto, and any person skilled in the art can easily conceive of the changes or substitutions within the technical scope of the present invention, and all the changes or substitutions should be covered within the scope of the present invention. Therefore, the protection scope of the present invention shall be subject to the protection scope of the claims.

Claims (17)

1. A data transmission method in multiple access modes is applied to a network with separated identity and position identification, and the method comprises the following steps:
the second access node receives the data message sent by the first access node and records the connection binding relationship between the identity of the source user and the position identification of the source user in the data message; wherein, the location identifier of the source user in the data message is the location identifier of the first access node; in the step of recording the connection binding relationship between the identity and the location identity of the source user equipment in the data message, the second access node also records the identity of the destination user in the data message into the connection binding relationship; and
the second access node receives the data message sent to the source user, searches the position identification of the source user recorded by the second access node according to the connection binding relationship, and sends the data message to the first access node corresponding to the inquired position identification of the source user; in the step of searching the location identifier of the source user recorded by the second access node according to the connection binding relationship, the second access node searches the location identifier of the source user recorded by the second access node according to the identity identifier of the destination user and the identity identifier of the source user.
2. The method of claim 1, wherein the method further comprises:
and if the second access node receives data messages which are sent to the same destination user and contain the identity identification of the same source user in sequence, the second access node inquires the position identification of the same source user from the authentication node to which the same source user belongs, and updates the connection binding relationship by using the inquired position identification after inquiring different position identifications corresponding to different access modes of the same source user.
3. The method of claim 2, wherein the step of the second access node updating the connection binding relationship with the queried location identity comprises:
and the second access node judges whether the different position identifications, corresponding to different access modes, of the same source user returned to the second access node by the authentication node contain the position identification of the source user in the next data message, and if so, the position identification of the source user in the connection binding relationship is updated to the position identification of the source user in the next data message.
4. The method of claim 1, wherein the method further comprises:
the second access node receives a data message sent by a user terminal accessed to the second access node; and
the second access node judges whether the connection binding relationship has the identity of the source user and the identity of the destination user of the data message sent by the user terminal;
if so, finding out a position identifier corresponding to the identity identifier of the target user in the data message sent by the user terminal from the connection binding relationship, and sending the data message to an access node corresponding to the position identifier;
and if not, inquiring the position identification of the target user from the authentication node to which the target user belongs, and sending a data message to the inquired access node corresponding to the position identification associated with one access mode.
5. The method of claim 1, wherein after the step of the second access node receiving the data packet sent by the first access node, the method further comprises:
the second access node judges whether the identity of the source user and the identity of the destination user in the data message sent by the first access node are stored in the connection binding relationship;
and if not, executing the step of recording the connection binding relationship between the identity of the source user and the position identity of the source user in the data message, and sending the data message sent by the first access node to the destination user.
6. The method of claim 5, wherein the method further comprises:
if the second access node judges the connection binding relationship of the source user identity and the destination user identity in the data message sent by the first access node, which is stored in the connection binding relationship, the second access node judges whether the position identity in the connection binding relationship of the source user identity and the destination user identity in the data message sent by the first access node, which is stored in the second access node, is the same as the position identity of the source user in the data message;
if the data messages are the same, the data message sent by the first access node is sent to the target user;
if not, the second access node inquires the position identification of the source user of the authentication node to which the source user of the data message sent by the first access node belongs, and after receiving different position identifications corresponding to different access modes returned by the authentication node, judges whether the position identification returned by the authentication node contains the position identification of the source user in the data message sent by the first access node, and if so, sends the data message to the target user.
7. The method of claim 6, wherein the method further comprises:
and if the position identifier returned by the authentication node does not contain the position identifier of the source user in the data message, the second access node discards the data message.
8. The method of claim 2, 4 or 5, wherein:
the step that the second access node inquires the position identification of the user from the authentication node to which the user belongs comprises the following steps: the second access node sends a position query request to an authentication node to which a user belongs, wherein the position query request carries the identity of the user;
the authentication node inquires the position identification of the user under each access mode according to the identity identification of the user carried in the position inquiry request, wherein the access modes correspond to the position identifications one to one, and returns a position inquiry response to the second access node, and the position inquiry response comprises the identity identification of the user, the position identification of the user and the access mode associated with each position identification;
wherein the users comprise source users and destination users.
9. The method according to any of claims 1 to 7, wherein the identity and location identity separated network is a subscriber identity and location separated network, SILSN; the access node is an access server ASN, the authentication node is an identity identifier and a position register ILR, the identity identifier is an access identifier AID, and the position identifier is a routing identifier RID.
10. An access device, applied to a network with separated identity and location, the access device comprising:
the receiving module is used for receiving a data message sent by first access equipment, wherein the data message comprises an identity of a source user and an identity of a destination user; receiving a data message sent to the source user;
the storage module is used for recording the connection binding relationship between the identity of the source user and the position identification of the source user in the data message; wherein, the location identifier of the source user in the data message is the location identifier of the first access device; the storage module is further configured to record the identity of the destination user in the data packet into the connection binding relationship when recording the connection binding relationship between the identity of the source user and the location identity of the source user in the data packet;
the searching module is used for searching the position identifier of the source user recorded by the storage module from the connection binding relationship after receiving the data message sent to the source user; the searching module is also used for searching the position identifier of the source user recorded by the storage module according to the identity identifier of the destination user and the identity identifier of the source user; and
and the sending module is used for sending the data message sent to the source user to the first access equipment corresponding to the position identifier of the source user inquired by the searching module.
11. The access device of claim 10, wherein:
if the receiving module receives data messages which are sent to the same target user and contain the identity identifiers of the same source user in sequence, the sending module is also used for inquiring the position identifiers of the source user from the authentication node to which the source user belongs;
the receiving module is further configured to receive different location identifiers, corresponding to different access modes, of the source user, which are returned by the authentication node;
the storage module is further configured to update the connection binding relationship with the queried location identifier.
12. The access device of claim 11, wherein the storage module is configured to update the connection binding relationship with the queried location identifier as follows:
and judging whether the different position identifiers, corresponding to different access modes, of the source user returned to the receiving module by the authentication node contain the position identifier of the source user in the next data message, and if so, updating the position identifier of the source user in the connection binding relationship into the position identifier of the source user in the next data message.
13. The access device of claim 10, wherein:
the receiving module is further configured to receive a data packet sent by a user terminal accessed to the access device; receiving position identifiers, corresponding to different access modes, of a target user returned by an authentication node to which the target user belongs in a data message sent by the user terminal;
the searching module is further configured to determine whether the connection binding relationship of the storage module has the identity of the source user and the identity of the destination user in the data packet sent by the user terminal; if so, finding out the position identifier corresponding to the identity identifier of the target user in the data message sent by the user terminal from the connection binding relationship, and indicating a sending module to send the data message; if not, indicating the sending module to inquire the position identification of the target user from the authentication node to which the target user belongs;
the sending module is further configured to send the data packet to the access node corresponding to the location identifier of the destination user after receiving the indication of sending the data packet from the searching module; after receiving the instruction of the searching module for inquiring the position identification of the target user from the authentication node to which the target user belongs; sending a query message to an authentication node to which the target user belongs; and sending a data message to an access node which is inquired by a certification and authentication node to which the target user belongs and corresponds to the position identification associated with one access mode.
14. The access device of claim 10, wherein:
the searching module is further configured to determine, after receiving the data packet sent by the first access device, whether the identity of the source user and the identity of the destination user in the data packet sent by the first access device are stored in the connection binding relationship; and if not, indicating a storage module to record the connection binding relationship between the identity identifier of the source user and the position identifier of the source user in the data message, and indicating a sending module to send the data message sent by the first access equipment to the destination user.
15. The access device of claim 14, wherein:
the searching module is further configured to, if the connection binding relationship between the source user identity and the destination user identity in the data packet sent by the first access device is determined to have been stored in the connection binding relationship, determine whether the location identity in the connection binding relationship between the source user identity and the destination user identity in the data packet sent by the first access device is the same as the location identity of the source user in the data packet sent by the first access device; if the data messages are the same, the sending module is instructed to send the data messages sent by the first access equipment to the target user; if not, indicating a sending module to inquire the position identification of the source user to the authentication node to which the source user belongs; after receiving different position identifiers corresponding to different access modes and returned by the authentication node to which the source user belongs, judging whether the position identifiers returned by the authentication node contain the position identifier of the source user in the data message sent by the first access equipment, and if so, indicating the sending module to send the data message to the target user; if not, discarding the data message sent by the first access device;
the receiving module is further configured to receive different location identifiers corresponding to different access manners, which are returned by the authentication node to which the source user belongs, and send the location identifiers to the searching module.
16. The access device of any of claims 10 to 15, wherein:
the network with separated identity and position identification is a user identity and position separation network SILSN; the access node is an access server ASN, the authentication node is an identity identifier and a position register ILR, the identity identifier is an access identifier AID, and the position identifier is a routing identifier RID.
17. The access device of any of claims 10 to 15, wherein:
the access equipment comprises one of a serving general packet radio service support node SGSN, a gateway general packet radio service support node GGSN, a packet data service node PDSN and a broadband access server BRAS.
CN201010608250.5A 2010-12-27 2010-12-27 Data transmission method by adopting multiple access modes and access device Active CN102573013B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201010608250.5A CN102573013B (en) 2010-12-27 2010-12-27 Data transmission method by adopting multiple access modes and access device
PCT/CN2011/084038 WO2012089032A1 (en) 2010-12-27 2011-12-15 Data transmission method using multiple access methods, and access device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201010608250.5A CN102573013B (en) 2010-12-27 2010-12-27 Data transmission method by adopting multiple access modes and access device

Publications (2)

Publication Number Publication Date
CN102573013A CN102573013A (en) 2012-07-11
CN102573013B true CN102573013B (en) 2015-07-22

Family

ID=46382295

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201010608250.5A Active CN102573013B (en) 2010-12-27 2010-12-27 Data transmission method by adopting multiple access modes and access device

Country Status (2)

Country Link
CN (1) CN102573013B (en)
WO (1) WO2012089032A1 (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104579969B (en) * 2013-10-29 2019-04-23 中兴通讯股份有限公司 File transmitting method and device
CN108123916B (en) * 2016-11-28 2021-10-29 中国移动通信集团辽宁有限公司 Network security protection method, device, server and system
CN109151800B (en) * 2017-06-15 2021-12-31 华为技术有限公司 Communication method and apparatus
CN109167729B (en) * 2018-09-14 2021-01-05 迈普通信技术股份有限公司 Topology discovery method and device and multi-service transmission network system

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101883048A (en) * 2010-06-25 2010-11-10 陶洋 Routing method of multi-dimensional network

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7140549B2 (en) * 2004-02-24 2006-11-28 Sun Microsystems, Inc. Method and apparatus for selecting a desired application on a smart card
CN101123536B (en) * 2007-09-19 2010-12-15 北京交通大学 Method for managing integrated network locations

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101883048A (en) * 2010-06-25 2010-11-10 陶洋 Routing method of multi-dimensional network

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
《一体化网络下移动性管理的索引结构模型》;袁坚;《电子学报》;20090430;第37卷(第4期);第706至第711页,图1-5 *

Also Published As

Publication number Publication date
WO2012089032A1 (en) 2012-07-05
CN102573013A (en) 2012-07-11

Similar Documents

Publication Publication Date Title
CN112153098B (en) Application migration method and device
EP2477428B1 (en) Method for anonymous communication, method for registration, method and system for transmitting and receiving information
JP4616732B2 (en) Packet transfer device
JP5427952B2 (en) Method and system for realizing roaming between networks
US7406064B2 (en) Communication system, server, router, and mobile communications terminal
KR20120069721A (en) Communication method, method for forwarding data message during the communication process and communication node thereof
WO2006136646A2 (en) Fixed gateway access point for a mobile terminal device
WO2006104065A1 (en) Mobile router, home agent, and terminal position management method
CN102123378A (en) Method for switching terminal and corresponding communication network
CN103067857A (en) System and method using user bearer identification to obtain user position
CN102573013B (en) Data transmission method by adopting multiple access modes and access device
WO2011153777A1 (en) Method, system, mapping forward server and access router for mobile communication controlling
EP2479932A1 (en) Method and system for allocating position identifier and transmitting message
EP3373621A1 (en) Roaming solution
WO2012088830A1 (en) Communication method, method and system for processing message
CN102546555B (en) User terminal is when plurality of access modes and the interoperability methods of external network and equipment
CN102572774B (en) Network access method in multiple modes, access device and authentication device
CN103096461B (en) System and method of acquiring user location information
CN102573014B (en) To the method and apparatus of user's data message transmission of employing plurality of access modes
CN103634776B (en) A kind of method and identity information server of the access mark obtaining terminal
KR101110307B1 (en) Internet system supporting built-in mobility
CN102572999B (en) A kind of method and system of data message route
JP2004208053A (en) Communication system using global ip address, and method for securing communication
JP6078683B1 (en) Mobile communication system control method, mobile communication system, and proxy server
CN102572772B (en) Method and system for constructing data route by reverse triggering

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20210113

Address after: Room 705, 7 / F, room 9, 1699, Zuchongzhi South Road, Kunshan City, Suzhou City, Jiangsu Province

Patentee after: Kunshan chuangzhihui Intellectual Property Operation Co.,Ltd.

Address before: 518057 Ministry of justice, Zhongxing building, South Science and technology road, Nanshan District hi tech Industrial Park, Shenzhen, Guangdong

Patentee before: ZTE Corp.

TR01 Transfer of patent right
CP02 Change in the address of a patent holder

Address after: 215300 rooms 107 and 108, area C, 55 Xiaxi street, Kunshan Development Zone, Suzhou City, Jiangsu Province

Patentee after: Kunshan chuangzhihui Intellectual Property Operation Co.,Ltd.

Address before: Room 705, 7 / F, room 9, 1699, Zuchongzhi South Road, Kunshan City, Suzhou City, Jiangsu Province

Patentee before: Kunshan chuangzhihui Intellectual Property Operation Co.,Ltd.

CP02 Change in the address of a patent holder