[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

WO2013060190A1 - 一种路径建立方法以及漫游宽带远程接入服务器 - Google Patents

一种路径建立方法以及漫游宽带远程接入服务器 Download PDF

Info

Publication number
WO2013060190A1
WO2013060190A1 PCT/CN2012/080677 CN2012080677W WO2013060190A1 WO 2013060190 A1 WO2013060190 A1 WO 2013060190A1 CN 2012080677 W CN2012080677 W CN 2012080677W WO 2013060190 A1 WO2013060190 A1 WO 2013060190A1
Authority
WO
WIPO (PCT)
Prior art keywords
remote access
broadband remote
authentication
roaming
access server
Prior art date
Application number
PCT/CN2012/080677
Other languages
English (en)
French (fr)
Inventor
陈刚
刘建宇
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Publication of WO2013060190A1 publication Critical patent/WO2013060190A1/zh

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • H04W12/069Authentication using certificates or pre-shared keys
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor

Definitions

  • the present invention relates to communication technologies, and in particular, to a path establishment method and apparatus.
  • Background Art Mobile communication technologies have been widely used in modern society. Among them, the third generation mobile communication technology has become the mainstream technology in the field of mobile communication.
  • the three technical standards involved in the third generation mobile communication technology are Wideband Code Division Multiple Access, Code Division Multiple Access 2000, and Time Division Synchronous Code Division Multiple Access ( Time Division-Synchronous Code Division Multiple Access ). All of the above three technology standards support multimedia services and support users to roam around the world.
  • the prior art provides a mobile internet protocol (mobile IP), which solves the problem that after the mobile node leaves the home agent, the port continues to communicate with the application server through the foreign agent. Communication problems.
  • mobile IP mobile internet protocol
  • the host agent After the mobile node arrives at the foreign agent, the host agent needs to recalculate the route and perform route convergence according to the routing message sent by the foreign agent.
  • the embodiment of the invention provides a path establishment method and a roaming broadband remote access server, which can solve the problem that the host agent needs to recalculate the route and converge the route according to the routing message sent by the foreign agent after the mobile node arrives at the foreign agent.
  • a path establishment method provided by an embodiment of the present invention includes:
  • the roaming broadband remote access server receives an access request sent by the mobile station, where the access request includes a source internet protocol address, where the source internet protocol address is an internet protocol address obtained by the first authentication server, and the authentication causes the source internet protocol
  • the address forms a mapping table with the Internet Protocol address of the host broadband remote access server and enables the mobile station to obtain the remote access service through the host broadband Server access to the application server;
  • the roaming broadband remote access server sends an authentication request including the source internet protocol address to the second authentication server, so that the second authentication server responds to the authentication request according to the mapping table;
  • the roaming broadband remote access server sends a tunnel establishment request to the host broadband remote access server according to the internet protocol address of the host broadband remote access server, and the tunnel is used to transmit traffic between the mobile station and the application server.
  • a roaming broadband remote access server includes: a receiver, configured to receive an access request sent by a mobile station, where the access request includes a source internet protocol address, and the source internet protocol address Is an Internet Protocol address that obtains the authentication of the first authentication server, the authentication forms a mapping table between the source Internet Protocol address and the Internet Protocol address of the host broadband remote access server, and enables the mobile station to obtain access through the host broadband remote access server.
  • a receiver configured to receive an access request sent by a mobile station, where the access request includes a source internet protocol address, and the source internet protocol address Is an Internet Protocol address that obtains the authentication of the first authentication server, the authentication forms a mapping table between the source Internet Protocol address and the Internet Protocol address of the host broadband remote access server, and enables the mobile station to obtain access through the host broadband remote access server.
  • a requesting unit configured to send an authentication request including the source internet protocol address to the second authentication server, so that the second authentication server responds to the authentication request according to the mapping table; and the response unit is configured to: receive the authentication request Corresponding authentication response, the authentication response including an internet protocol address of the host broadband remote access server;
  • the tunnel establishing unit is configured to send a tunnel establishment request to the host broadband remote access server according to the internet protocol address of the host broadband remote access server, where the tunnel is used to transmit traffic between the mobile station and the application server.
  • the source internet protocol address of the mobile station can be sent to the authentication server, and provided according to the authentication server.
  • the Internet Protocol address of the host broadband remote access server, the roaming broadband remote access server and the host broadband remote access server A tunnel is established between the mobile station and the application server.
  • the path establishment method and apparatus can solve the problem that the host agent needs to recalculate the route and perform route convergence according to the routing message sent by the foreign agent after the mobile node arrives at the foreign agent.
  • FIG. 1 is a flowchart of a path establishment method according to an embodiment of the present invention.
  • FIG. 2 is a schematic diagram of a roaming broadband remote access server according to an embodiment of the present invention.
  • Embodiment 1 is a diagrammatic representation of Embodiment 1:
  • FIG. 1 is a flowchart of a path establishment method according to an embodiment of the present invention, where the method includes:
  • the roaming broadband remote access server receives an access request sent by the mobile station, where the access request includes a source internet protocol address.
  • the source internet protocol address is an internet protocol address that obtains authentication of the first authentication server.
  • the authentication forms a mapping table between the source internet protocol address and the internet protocol address of the host broadband remote access server and enables the mobile station to gain access to the application server through the host broadband remote access server.
  • the mobile station is a wireless communication terminal.
  • the mobile station can be a mobile phone, personal digital Assistant and personal computer.
  • the roaming broadband remote access server is a device that provides access services for mobile stations.
  • the roaming broadband remote access server can provide access services to the mobile station through an access point.
  • the roaming broadband remote access server may be a broadband remote access server, a service server, or a multi-service control gateway.
  • the roaming broadband remote access server may include an access control unit and a user management unit.
  • the access control unit can manage and control multiple access points.
  • the roaming broadband remote access server can sense the mobile station entering or leaving its jurisdiction through the access point.
  • the roaming broadband remote access server may use the Address Resolution Protocol to detect whether the mobile station leaves the jurisdiction of the mobile station;
  • the traffic received from the mobile station in unit time determines whether the mobile station leaves its jurisdiction. Specifically, if the traffic received by the roaming broadband remote access server from the mobile station is less than a predetermined threshold in a unit time, the mobile station is judged to have left its jurisdiction.
  • the roaming broadband remote access server can receive an access request sent by the mobile station.
  • the access request can be an access request message.
  • the following describes an example of a process in which a roaming broadband remote access server receives an access request sent by a mobile station.
  • the access point controlled by the roaming broadband remote access server senses that the mobile station enters its coverage range and receives an access request message sent by the mobile station. For example, an access point can perceive a mobile station in a manner defined by the Institute of Electrical and Electronics Engineers (IEEE) 802.1x. After receiving the access request packet, the access point can transparently transmit the packet to the roaming broadband remote access server. For example, the access point transparently transmits the access request message to the roaming broadband remote access server through the Control And Provisioning of Wireless Access Points protocol. The access point can also access first. The request packet is transparently transmitted to the switch, and the switch sends the access request packet to the roaming broadband remote access server.
  • IEEE Institute of Electrical and Electronics Engineers
  • the access request sent by the mobile station may include the source Internet Protocol address of the mobile station.
  • the source internet protocol address may be an internet protocol address assigned by the host broadband remote access server to the mobile station.
  • the host broadband remote access server assigns an internet protocol address to the mobile station via a Dynamic Host Configuration Protocol or a Point-to-Point Protocol over Ethernet over Ethernet.
  • the source internet protocol address may also be an internet protocol address that the user statically configures on the mobile station.
  • a host broadband remote access server is also a device that provides access to mobile stations.
  • the host broadband remote access server can also provide access services to the mobile station through the access point. For details on how the host broadband remote access server works, see the description above for roaming broadband remote access servers.
  • the source internet protocol address is an internet protocol address that obtains authentication of the first authentication server.
  • the first authentication server may be an authentication, authorization, and accounting (Authentication, Authorization, Accounting) server.
  • the process of obtaining the authentication of the first authentication server from the source internet protocol address is described below by way of an example.
  • the mobile station Before the mobile station arrives at the roaming broadband remote access server, the mobile station establishes a connection with the host broadband remote access server, and the host broadband remote access server sends an authentication request including the source internet protocol address to the first authentication server.
  • the first authentication server responds to the authentication request and establishes a mapping table between the source internet protocol address and the internet protocol address of the host broadband remote access server.
  • the mapping table can be stored in the first authentication server or in the user subscription information database.
  • the mobile station After the source Internet Protocol address is authenticated by the first authentication server, the mobile station gains access to the application server.
  • the application server can be a video server or a Wireless Application Protocol server.
  • the application server can be directly connected to the host broadband remote access server or connected to the host broadband remote access server through a router.
  • the roaming broadband remote access server sends the source network to the second authentication server An authentication request of the protocol address, so that the second authentication server performs an oral response to the authentication request according to the mapping table.
  • the second authentication server and the first authentication server may be the same device or different devices.
  • the mapping table may be stored in the user subscription information database.
  • the roaming broadband remote access server may send an authentication request (Access-Request) to the second authentication server through a Remote Authentication Dial In User Service protocol.
  • Access-Request an authentication request
  • RFC2865 and RFC2866 For details on the remote user dial-up authentication service protocol, see RFC2865 and RFC2866.
  • the second authentication server responds to the authentication request according to the mapping table.
  • the mapping table may be saved in the user subscription database.
  • the second authentication server searches the user subscription database for the source internet protocol address, and obtains the internet protocol address of the first authentication server according to the mapping table. After obtaining the Internet Protocol address of the first authentication server, the second authentication server sends an access-accept (Access-Accept) to the roaming broadband remote access server through the remote user dial-up authentication service protocol.
  • Access-Accept access-accept
  • the roaming broadband remote access server receives an authentication response corresponding to the authentication request, where the authentication response includes an internet protocol address of the host broadband remote access server.
  • the roaming broadband remote access server may receive the authentication response corresponding to the authentication request by using a remote user dialing authentication service protocol.
  • the roaming broadband remote access server sends a tunnel establishment request to the host broadband remote access server according to the internet protocol address of the host broadband remote access server.
  • the tunnel is used to transfer traffic between the mobile station and the application server.
  • the roaming broadband remote access server Before the roaming broadband remote access server sends a tunnel establishment request to the host broadband remote access server, the roaming broadband remote access server can determine that the mobile station is in a roaming state.
  • the roaming broadband remote access server may receive the authentication response corresponding to the authentication request, and the roaming broadband remote access server sends a tunnel establishment request to the host broadband remote access server.
  • the second authentication server generates a roaming token and sends the roaming token to the roaming broadband remote access server.
  • the roaming broadband remote access server generates a tunnel establishment request based on the roaming flag.
  • the roaming flag is used to identify that the mobile station is roaming.
  • the roaming flag can be carried in the authentication response.
  • the second authentication server may generate a roaming token according to the mapping table.
  • the authentication request sent by the roaming broadband remote access server to the second authentication server may include an internet protocol address of the roaming broadband remote access server.
  • the second authentication server finds the mapping table according to the source internet protocol address included in the authentication request.
  • the second authentication server obtains an internet protocol address of the host broadband remote access server according to the mapping table.
  • the second authentication server compares the Internet Protocol address of the host broadband remote access server with the Internet Protocol address of the roaming broadband remote access server, determines that the two Internet Protocol addresses are different, and determines that the mobile station is roaming.
  • the roaming broadband remote access server Before the roaming broadband remote access server sends a tunnel establishment request to the host broadband remote access server, the roaming broadband remote access server can determine that the mobile station is roaming. In a specific implementation, after the roaming broadband remote access server receives the authentication response corresponding to the authentication request, and the roaming broadband remote access server sends a tunnel establishment request to the host broadband remote access server, the roaming broadband remote access server compares the The internet protocol address of the host broadband remote access server and the internet protocol address of the roaming broadband remote access server determine that the two internet protocol addresses are different, thereby determining that the mobile station is in a roaming state.
  • the roaming broadband remote access server can establish a tunnel between the roaming broadband remote access server and the host broadband remote access server through a protocol.
  • the protocol may be a Roaming Access Auto-Tunneling Protocol (RA2P).
  • R2P Roaming Access Auto-Tunneling Protocol
  • the RA2P is based on the Generic Datagram Protocol.
  • the RA2P message includes an internet protocol header, a general data protocol header, an RA2P header, and a payload.
  • the internet protocol header includes a source address and a destination address for identifying the RA2P tunnel.
  • the length of the internet protocol header is 20 bytes.
  • the source port or destination port in the generic data protocol header can be 1710, or other values that have not been used yet.
  • RA2P The length of the header is 16 bytes.
  • the RA2P text can include the following types:
  • a tunnel establishment request (RA2P-Start-Tuneling-Request) is used to establish a control connection to the peer end;
  • R2P-Start-Tuneling-Ack a tunnel establishment response for responding to the tunnel establishment request
  • a tunnel removal request (RA2P-Stop-Tuneling-Request) is used to notify the peer to remove the control connection;
  • the tunnel removal response (RA2P-Stop-Tuneling-Ack) is used to respond to the tunnel removal request;
  • the RA2P-Tunneling-Authentication-Request is used to authenticate the peer request.
  • the RA2P-Tunneling-Authentication-Ack is used to respond to the tunnel authentication request.
  • R2P-Hello Connectivity detection
  • Length (L): 1 indicates that the length field exists. For signaling messages, this field is 1
  • Sequence(S): 1 indicates that the Ns and Nr fields exist. For signaling messages, this field is 1 Priority (P): 1 means the message should be transmitted preferentially. For signaling messages, this field is 0. Version (Ver): indicates the current version, this field is 1.
  • Length Indicates the total length of the RA2P header and payload, in bytes.
  • Type Indicates the type of signaling packets, including:
  • Tunnel ID Used to identify the control connection.
  • the tunnel identity (Tunnel ID) is assigned to the mobile station by the router that sends the tunnel establishment request. Different mobile stations correspond to different tunnel identities.
  • Ns indicates the serial number of the packet. This field can range from 0 to 65535.
  • Nr indicates the serial number of the next message desired. This field can range from 0 to 65535. For data messages, this field is reserved. Even if the S field is 1, the receiver will ignore the field.
  • Offset Size Indicates the starting position of the transmission payload relative to the RA2P header.
  • a tunnel between the roaming broadband remote access server and the host broadband remote access server can be used to transfer traffic between the mobile station and the application server.
  • the roaming broadband remote access server after receiving the traffic from the mobile station to the application server, forwards the traffic to the host broadband remote access server through the tunnel. After receiving the traffic, the host broadband remote access server forwards the traffic to the application server. Similarly, after receiving the traffic destined for the mobile station from the application server, the host broadband remote access server forwards the traffic to the roaming broadband remote access server through the tunnel. After receiving the traffic, the roaming broadband remote access server forwards the traffic to the mobile station through the access point.
  • the roaming broadband remote access server is based on the media access control (Media Access Control) protocol address of the mobile station. Traffic is forwarded to the mobile station through the data link layer.
  • the access request message sent by the mobile station may include the media access control protocol address of the mobile station.
  • the roaming broadband remote access server can obtain the media access control protocol address of the mobile station according to the access request message.
  • the source internet protocol address of the mobile station can be sent to the authentication server, and according to the host broadband remote access server provided by the authentication server
  • the Internet Protocol address establishes a tunnel between the roaming broadband remote access server and the host broadband remote access server for transmitting traffic between the mobile station and the application server.
  • the host agent needs to recalculate the route and perform route convergence according to the routing message sent by the foreign agent.
  • the mobile station needs to install the client software.
  • the mobile station does not need to install the above client software.
  • the method includes:
  • the roaming broadband remote access server generates the tunnel establishment request according to the roaming flag, where the roaming flag is a flag generated by the second authentication server according to the mapping table for identifying that the mobile station is in a roaming state, where the roaming flag is Certification response.
  • the method includes:
  • the roaming broadband remote access server compares the network of the host broadband remote access server The inter-protocol address and the internet protocol address of the roaming broadband remote access server determine that the mobile station is roaming.
  • the mapping table includes a media access control protocol address of the mobile station, where the authentication request includes a media access control protocol address of the mobile station, so that the second authentication server compares the media of the mobile station included in the authentication request Whether the access control protocol address is equal to the media access control protocol address of the mobile station included in the mapping table, and further responds to the authentication request.
  • the first authentication server and the second authentication server are the same device.
  • Embodiment 2 is a diagrammatic representation of Embodiment 1:
  • FIG. 2 is a schematic diagram of a roaming broadband remote access server according to an embodiment of the present invention, where the apparatus includes:
  • the receiver 201 is configured to receive an access request sent by the mobile station, where the access request includes a source internet protocol address.
  • the source internet protocol address is an internet protocol address that obtains authentication of the first authentication server.
  • the authentication forms a mapping table between the source Internet Protocol address and the Internet Protocol address of the host broadband remote access server and enables the mobile station to gain access to the application server through the host broadband remote access server.
  • the mobile station is a wireless communication terminal.
  • the mobile station can be a mobile phone, a personal digital assistant, and a personal computer.
  • a roaming broadband remote access server is a device that provides access services for mobile stations.
  • the roaming broadband remote access server can provide access services to the mobile station through the access point.
  • the roaming broadband remote access server may be a broadband remote access server, a service server, or a multi-service control gateway.
  • the roaming broadband remote access server may include an access control unit and a user management unit.
  • the access control unit can manage and control multiple access points.
  • the roaming broadband remote access server can enter or leave the tube through the access point to the mobile station.
  • the scope of jurisdiction is perceived.
  • the roaming broadband remote access server can detect whether the mobile station leaves its jurisdiction by using the address resolution protocol; or can receive the data in the unit time.
  • the traffic from the mobile station determines whether the mobile station is leaving its jurisdiction. Specifically, if the traffic received by the roaming broadband remote access server from the mobile station is less than a predetermined threshold in a unit time, the mobile station is determined to leave its jurisdiction.
  • the roaming broadband remote access server can receive an access request sent by the mobile station.
  • the access request can be an access request message.
  • the following describes an example of a process in which a roaming broadband remote access server receives an access request sent by a mobile station.
  • the access point controlled by the roaming broadband remote access server senses that the mobile station enters its coverage range and receives an access request message sent by the mobile station.
  • an access point can be aware of a mobile station in a manner defined by IEEE 802.1x.
  • the access point can transparently transmit the packet to the roaming broadband remote access server.
  • the access point transparently transmits the access request message to the roaming broadband remote access server through the wireless access point control and providing the protocol.
  • the access point may also transparently transmit the access request message to the switch, and then the switch sends the access request message to the roaming broadband remote access server.
  • the access request sent by the mobile station may include the source internet protocol address of the mobile station.
  • the source internet protocol address may be an internet protocol address assigned by the host broadband remote access server to the mobile station.
  • the host broadband remote access server assigns an internet protocol address to the mobile station via a dynamic host configuration protocol or a point-to-point protocol over Ethernet.
  • the source internet protocol address can also be an internet protocol address for static configuration on the mobile station.
  • a host broadband remote access server is also a device that provides access services for mobile stations.
  • the host broadband remote access server can also provide access services to the mobile station through the access point. For details on how the host broadband remote access server works, see the description above for roaming broadband remote access servers.
  • the source internet protocol address is an internet protocol address that obtains authentication of the first authentication server.
  • the first authentication server may be an authentication, authorization, and accounting server. The process of obtaining the authentication of the first authentication server by the source internet protocol address is described below by way of an example.
  • the mobile station Before the mobile station arrives at the roaming broadband remote access server, the mobile station establishes a connection with the host broadband remote access server, and the host broadband remote access server sends an authentication request including the source internet protocol address to the first authentication server.
  • the first authentication server responds to the authentication request and establishes a mapping table between the source internet protocol address and the internet protocol address of the host broadband remote access server.
  • the mapping table can be stored in the first authentication server or in the user subscription information database.
  • the mobile station After the source Internet Protocol address is authenticated by the first authentication server, the mobile station gains access to the application server.
  • the application server can be a video server or a wireless application protocol server.
  • the application server can be directly connected to the host broadband remote access server or connected to the host broadband remote access server through the router.
  • the requesting unit 202 is configured to send an authentication request including the source internet protocol address to the second authentication server, so that the second authentication server responds to the authentication request according to the mapping table.
  • the second authentication server and the first authentication server may be the same device or different devices.
  • the mapping table may be stored in the user subscription information database.
  • the roaming broadband remote access server can send an authentication request to the second authentication server through the remote user dialing authentication service protocol.
  • the remote user dial-up authentication service protocol see RFC2865 and RFC2866.
  • the second authentication server responds to the authentication request according to the mapping table.
  • the mapping table may be saved in the user subscription database.
  • the second authentication server searches the user subscription database for the source internet protocol address, and obtains the internet protocol address of the first authentication server according to the mapping table. After obtaining the Internet Protocol address of the first authentication server, the second authentication server sends the authentication reception to the roaming broadband remote access server through the remote user dialing authentication service protocol.
  • the response unit 203 is configured to receive an authentication response corresponding to the authentication request, where the authentication response includes an internet protocol address of the host broadband remote access server.
  • the roaming broadband remote access server may receive the authentication response corresponding to the authentication request by using a remote user dialing authentication service protocol.
  • the tunnel establishing unit 204 is configured to send a tunnel establishment request to the host broadband remote access server according to the internet protocol address of the host broadband remote access server.
  • the tunnel is used to transmit traffic between the mobile station and the application server.
  • the roaming broadband remote access server Before the roaming broadband remote access server sends a tunnel establishment request to the host broadband remote access server, the roaming broadband remote access server can determine that the mobile station is roaming.
  • the second authentication server After the roaming broadband remote access server receives the authentication response corresponding to the authentication request, and the roaming broadband remote access server sends a tunnel establishment request to the host broadband remote access server, the second authentication server generates a roaming token, and The roaming tag is sent to the roaming broadband remote access server.
  • the roaming broadband remote access server generates a tunnel establishment request based on the roaming flag.
  • the roaming tag is used to identify that the mobile station is roaming.
  • the roaming flag can be carried in the authentication response.
  • the second authentication server may generate a roaming token according to the mapping table.
  • the authentication request sent by the roaming broadband remote access server to the second authentication server may include an internet protocol address of the roaming broadband remote access server.
  • the second authentication server finds the mapping table according to the source internet protocol address included in the authentication request.
  • the second authentication server obtains an internet protocol address of the host broadband remote access server according to the mapping table.
  • the second authentication server compares the Internet Protocol address of the host broadband remote access server with the Internet Protocol address of the roaming broadband remote access server, determines that the two Internet Protocol addresses are different, and determines that the mobile station is roaming.
  • the roaming broadband remote access server Before the roaming broadband remote access server sends a tunnel establishment request to the host broadband remote access server, the roaming broadband remote access server can determine that the mobile station is in a roaming state. In a specific implementation, after the roaming broadband remote access server receives the authentication response corresponding to the authentication request, and the roaming broadband remote access server sends a tunnel establishment request to the host broadband remote access server, the roaming broadband remote access server compares the Hosting the internet protocol address of the broadband access server and the internet protocol address of the roaming broadband remote access server, determining two internet addresses The protocol address is different, and it is determined that the mobile station is in a roaming state.
  • the roaming broadband remote access server can establish a tunnel between the roaming broadband remote access server and the host broadband remote access server through a protocol.
  • the protocol can be RA2P.
  • the RA2P is based on the Generic Datagram Protocol.
  • the RA2P message includes an internet protocol header, a general data protocol header, an RA2P header, and a payload.
  • the internet protocol header includes a source address and a destination address for identifying the RA2P tunnel.
  • the length of the internet protocol header is 20 bytes.
  • the source or destination port in the Generic Data Protocol header can be 1710 or other values that have not been used.
  • the length of the RA2P header is 16 bytes.
  • the RA2P text can include the following types:
  • a tunnel establishment request (RA2P-Start-Tuneling-Request) is used to establish a control connection to the peer end;
  • a tunnel establishment response (RA2P-Start-Tuneling-Ack) is used to respond to the tunnel establishment request;
  • a tunnel removal request (RA2P-Stop-Tuneling-Request) is used to notify the peer to remove the control connection;
  • the tunnel removal response (RA2P-Stop-Tuneling-Ack) is used to respond to the tunnel removal request;
  • the RA2P-Tunneling-Authentication-Request is used to request authentication from the authentication server.
  • the RA2P-Tunneling-Authentication-Ack is used to respond to the tunnel authentication request.
  • R2P-Hello Connectivity detection
  • the contents of the RA2P header are as follows:
  • RA2 P header includes multiple fields.
  • the definition of each field is as follows:
  • Length (L): 1 indicates that the length field exists. For signaling messages, this field is 1
  • Sequence(S): 1 indicates that the Ns and Nr fields exist. For signaling messages, this field is 1
  • Priority (P): 1 means that the 4 text should be transmitted preferentially. For signaling messages, this field is 0.
  • Length Indicates the total length of the RA2P header and payload, in bytes.
  • Type Indicates the type of signaling packets, including:
  • Tunnel ID Used to identify the control connection.
  • the tunnel identity is assigned to the mobile station by the router that sent the tunnel setup request. Different mobile stations correspond to different tunnel identities.
  • Ns indicates the serial number of the packet. This field can range from 0 to 65535
  • Nr indicates the serial number of the next message desired.
  • the value of this field ranges from 0 to 65535. For data messages, this field is reserved. Even if the S field is 1, the receiver will ignore the field.
  • Offset Size Indicates the starting position of the transmission payload relative to the RA2P header.
  • the tunnel between the roaming broadband remote access server and the host broadband remote access server can Used to transfer traffic between the mobile station and the application server.
  • the roaming broadband remote access server after receiving the traffic from the mobile station to the application server, forwards the traffic to the host broadband remote access server through the tunnel. After receiving the traffic, the host broadband remote access server forwards the traffic to the application server. Similarly, after receiving the traffic destined for the mobile station from the application server, the host broadband remote access server forwards the traffic to the roaming broadband remote access server through the tunnel. After receiving the traffic, the roaming broadband remote access server forwards the traffic to the mobile station through the access point.
  • the roaming broadband remote access server forwards traffic to the mobile station through the data link layer according to the media access control protocol address of the mobile station.
  • the access request message sent by the mobile station may include the media access control protocol address of the mobile station.
  • the roaming broadband remote access server can obtain the media access control protocol address of the mobile station according to the access request message.
  • the source internet protocol address of the mobile station can be sent to the authentication server, and the remote connection is provided according to the host broadband provided by the authentication server.
  • the Internet Protocol address of the incoming server establishes a tunnel between the roaming broadband remote access server and the host broadband remote access server for transmitting traffic between the mobile station and the application server.
  • the roaming broadband remote access server provided by the embodiment of the present invention can solve the problem that the host agent needs to recalculate the route and perform route convergence according to the routing message sent by the foreign agent after the mobile node arrives at the foreign agent.
  • the mobile station needs to install the client software.
  • the mobile station does not need to install the above client software.
  • the roaming broadband remote access server may include:
  • a roaming tag processing unit configured to: after the roaming broadband remote access server receives the authentication response corresponding to the authentication request, and before the roaming broadband remote access server sends a tunnel establishment request to the host broadband remote access server, according to the roaming flag, Generating the tunnel establishment request, the The roaming flag is a flag generated by the second authentication server according to the mapping table for identifying that the mobile station is in a roaming state, and the roaming flag is carried in the authentication response.
  • the roaming broadband remote access server may include:
  • a roaming state determining unit configured to compare the host after the roaming broadband remote access server receives the authentication response corresponding to the authentication request and the roaming broadband remote access server sends a tunnel establishment request to the host broadband remote access server
  • the internet protocol address of the broadband remote access server and the internet protocol address of the roaming broadband remote access server determine that the mobile station is in a roaming state.
  • the mapping table includes a media access control protocol address of the mobile station, where the authentication request includes a media access control protocol address of the mobile station, so that the second authentication server compares the media of the mobile station included in the authentication request Whether the access control protocol address is equal to the media access control protocol address of the mobile station included in the mapping table, and further responds to the authentication request.
  • the first authentication server and the second authentication server are the same device.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

本发明实施例提供了一种路径建立方法,当移动台到达漫游宽带远程接入服务器时,可以将移动台的源网际协议地址发送至认证服务器,并根据认证服务器提供的宿主宽带远程接入服务器的网际协议地址,在漫游宽带远程接入服务器和宿主宽带远程接入服务器之间建立用于传输移动台与应用服务器之间的流量的隧道。此外,本发明实施例还提供了相应的漫游宽带远程接入服务器。通过本发明实施例提出的路径建立方法及漫游宽带远程接入服务器,可以解决移动节点到达外地代理后,宿主代理需要根据外地代理发送的路由消息,重新计算路由并进行路由收敛的问题。

Description

一种路径建立方法以及漫游宽带远程接入服务器 技术领域 本发明实施例涉及通信技术, 尤其涉及一种路径建立方法及装置。 背景技术 移动通信技术已广泛应用于现代社会。 其中第三代移动通信技术已成 为移动通信领域的主流技术。 第三代移动通信技术涉及的三个技术标准分 别是宽带码分多存取(Wideband Code Division Multiple Access ) 、 码分多 存取 2000 ( Code Division Multiple Access 2000 )和时分同步码分多存取 ( Time Division-Synchronous Code Division Multiple Access ) 。 以上三个技 术标准都支持多媒体业务, 并且支持用户在全球范围进行漫游。
现有技术提供了移动网际协议(mobile IP ) , 解决了移动节点(mobile node ) 离开宿主代理 ( home agent )后, 口何通过夕卜地代理 ( foreign agent ) 继续与应用服务器( application server )进行通信的问题。
发明人发现现有技术存在以下技术问题:
移动节点到达外地代理后, 宿主代理需要根据外地代理发送的路由消 息, 重新计算路由并进行路由收敛。
发明内容
本发明实施例提供一种路径建立方法以及一种漫游宽带远程接入服务 器, 可以解决移动节点到达外地代理后, 宿主代理需要根据外地代理发送 的路由消息, 重新计算路由并进行路由收敛的问题。
一方面, 本发明实施例提供的一种路径建立方法, 包括:
漫游宽带远程接入服务器接收移动台发送的接入请求, 该接入请求包 括源网际协议地址, 该源网际协议地址是获得第一认证服务器的认证的网 际协议地址, 该认证使得该源网际协议地址与宿主宽带远程接入服务器的 网际协议地址形成映射表并使得该移动台获得通过该宿主宽带远程接入服 务器访问应用服务器的权限;
该漫游宽带远程接入服务器向第二认证服务器发送包含该源网际协议 地址的认证请求, 以便于该第二认证服务器根据该映射表对该认证请求进 行响应;
该漫游宽带远程接入服务器接收该认证请求对应的认证响应, 该认证 响应包括该宿主宽带远程接入服务器的网际协议地址;
该漫游宽带远程接入服务器根据该宿主宽带远程接入服务器的网际协 议地址, 向该宿主宽带远程接入服务器发送隧道建立请求, 该隧道用于传 输该移动台与该应用服务器之间的流量。
另一方面, 本发明实施例提供的一种漫游宽带远程接入服务器, 包括: 接收器, 用于接收移动台发送的接入请求, 该接入请求包括源网际协 议地址, 该源网际协议地址是获得第一认证服务器的认证的网际协议地址 , 该认证使得该源网际协议地址与宿主宽带远程接入服务器的网际协议地址 形成映射表并使得该移动台获得通过该宿主宽带远程接入服务器访问应用 服务器的权限;
请求单元, 用于向第二认证服务器发送包含该源网际协议地址的认证 请求, 以便于该第二认证服务器根据该映射表对该认证请求进行响应; 响应单元, 用于接^:该认证请求对应的认证响应, 该认证响应包括该 宿主宽带远程接入服务器的网际协议地址;
隧道建立单元, 用于根据该宿主宽带远程接入服务器的网际协议地址, 向该宿主宽带远程接入服务器发送隧道建立请求, 该隧道用于传输该移动 台与该应用服务器之间的流量。
根据本发明实施例提供的路径建立方法及漫游宽带远程接入服务器, 当移动台到达漫游宽带远程接入服务器时, 可以将移动台的源网际协议地 址发送至认证服务器, 并根据认证服务器提供的宿主宽带远程接入服务器 的网际协议地址, 在漫游宽带远程接入服务器和宿主宽带远程接入服务器 之间建立用于传输移动台与应用服务器之间的流量的隧道。
可见, 通过本发明实施例提供的路径建立方法及装置, 可以解决移动 节点到达外地代理后, 宿主代理需要根据外地代理发送的路由消息, 重新 计算路由并进行路由收敛的问题。
附图说明 为了更清楚地说明本发明实施例或现有技术中的技术方案, 下面将对 实施例或现有技术描述中所需要使用的附图作一简单地介绍, 显而易见地, 下面描述中的附图是本发明的一些实施例, 对于本领域普通技术人员来讲, 在不付出创造性劳动的前提下, 还可以根据这些附图获得其他的附图。
图 1是本发明实施例提供的路径建立方法流程图;
图 2是本发明实施例提供的漫游宽带远程接入服务器示意图。
具体实施方式 为使本发明实施例的目的、 技术方案和优点更加清楚, 下面将结合本 发明实施例中的附图, 对本发明实施例中的技术方案进行清楚、 完整地描 述, 显然, 所描述的实施例是本发明一部分实施例, 而不是全部的实施例。 基于本发明中的实施例, 本领域普通技术人员在没有作出创造性劳动前提 下所获得的所有其他实施例, 都属于本发明保护的范围。
实施例一:
本发明实施例提供了一种路径建立方法。 参见图 1 , 图 1是本发明实施 例提供的路径建立方法流程图, 该方法包括:
101 : 漫游宽带远程接入服务器接收移动台发送的接入请求, 该接入请 求包括源网际协议地址。 该源网际协议地址是获得第一认证服务器的认证 的网际协议地址。 该认证使得该源网际协议地址与宿主宽带远程接入服务 器的网际协议地址形成映射表并使得该移动台获得通过该宿主宽带远程接 入服务器访问应用服务器的权限。
移动台是无线通信终端。 具体实现时, 移动台可以是手机、 个人数字 助理以及个人电脑。
漫游覔带远程接入月良务器 ( roaming broadband remote access server )是 为移动台提供接入服务的设备。 具体实现时, 漫游宽带远程接入服务器可 以通过接入点 ( access point ) 向移动台提供接入服务。
漫游宽带远程接入服务器可以是宽带远程接入服务器, 也可以是业务 服务器, 还可以是多业务控制网关(Multi-Service Control Gateway )。 当漫 游宽带远程接入服务器是多业务控制网关时, 漫游宽带远程接入服务器可 以包括接入控制( access control )单元以及用户管理单元。 接入控制单元可 以对多个接入点进行管理和控制。
漫游宽带远程接入服务器可以通过接入点对移动台进入或者离开其管 辖范围进行感知。 在移动台已经接入漫游宽带远程接入服务器的场景下, 漫游宽带远程接入服务器可以通过地址解析协议 (Address Resolution Protocol )探测报文对移动台是否离开其管辖范围进行判断; 也可以通过统 计单位时间内接收的来自移动台的流量对移动台是否离开其管辖范围进行 判断。 具体来说, 如果单位时间内, 漫游宽带远程接入服务器接收的来自 移动台的流量小于预定的阔值, 则判断移动台离开其管辖范围。
漫游宽带远程接入服务器可以接收移动台发送的接入请求。 该接入请 求可以是接入请求报文。 以下通过一个例子对漫游宽带远程接入服务器接 收移动台发送的接入请求的过程进行描述。
受漫游宽带远程接入服务器控制的接入点感知到移动台进入其覆盖范 围, 并接收移动台发送的接入请求报文。 例如, 接入点可以通过美国电气 和电子工程师协会 ( Institute of Electrical and Electronics Engineers , IEEE ) 802.1x定义的方式对移动台进行感知。 接入点接收到接入请求报文后, 可 以将该报文透传至漫游宽带远程接入服务器。 例如, 接入点通过无线接入 点控制及提供 ( Control And Provisioning of Wireless Access Points )协议, 将接入请求报文透传至漫游宽带远程接入服务器。 接入点也可以先将接入 请求报文透传至交换机, 交换机再将接入请求报文发送至漫游宽带远程接 入服务器。
移动台发送的接入请求可以包括移动台的源网际协议 ( Internet Protocol )地址。 该源网际协议地址可以是宿主宽带远程接入服务器为移动 台分配的网际协议地址。 例如, 宿主宽带远程接入服务器通过动态主机配 置协议 ( Dynamic Host Configuration Protocol )或者以太网上的点对点协议 ( Point-to-Point Protocol over Ethernet ) 为移动台分配网际协议地址。 该源 网际协议地址也可以是用户在移动台上静态配置的网际协议地址。 与漫游 宽带远程接入服务器类似, 宿主宽带远程接入服务器也是为移动台提供接 入服务的设备。 宿主宽带远程接入服务器也可以通过接入点向移动台提供 接入服务。 关于宿主宽带远程接入服务器的工作原理, 具体请参见上文关 于漫游宽带远程接入服务器的描述。
该源网际协议地址是获得第一认证服务器的认证的网际协议地址。 具 体实现时, 第一认证服务器可以是认证、 授权和计费 (Authentication , Authorization, Accounting )服务器。 以下通过一个例子对该源网际协议地 址获得第一认证服务器的认证的过程进行描述。
移动台到达漫游宽带远程接入服务器前, 移动台与宿主宽带远程接入 服务器建立连接, 宿主宽带远程接入服务器向第一认证服务器发送包括该 源网际协议地址的认证请求。 第一认证服务器对认证请求进行响应, 并建 立了该源网际协议地址与宿主宽带远程接入服务器的网际协议地址的映射 表。 该映射表可以存储在第一认证服务器, 也可以存储在用户签约信息数 据库。 该源网际协议地址在第一认证服务器获得认证后, 移动台获得访问 应用服务器的权限。 应用服务器可以是视频服务器或者是无线应用协议 ( Wireless Application Protocol )服务器。 应用服务器可以与宿主宽带远程 接入服务器直连, 也可以通过路由器与宿主宽带远程接入服务器连接。
102: 该漫游宽带远程接入服务器向第二认证服务器发送包含该源网际 协议地址的认证请求, 以便于该第二认证服务器根据该映射表对该认证请 求进行口向应。
具体实现时, 第二认证服务器与第一认证服务器可以是同一设备, 也 可以是不同设备。 当第二认证服务器与第一认证服务器是不同设备时, 该 映射表可以存储在用户签约信息数据库。
漫游宽带远程接入服务器可以通过远程用户拨号认证服务(Remote Authentication Dial In User Service )协议向第二认证服务器发送认证请求 ( Access-Request )。关于远程用户拨号认证服务协议,具体请参见 RFC2865 以及 RFC2866。
第二认证服务器根据该映射表对该认证请求进行响应。 具体实现时, 可以是该映射表保存在用户签约数据库。 第二认证服务器在用户签约数据 库中查找该源网际协议地址, 并根据该映射表获得第一认证服务器的网际 协议地址。 第二认证服务器获得第一认证服务器的网际协议地址后, 通过 远程用户拨号认证服务协议向漫游宽带远程接入服务器发送认证接收 ( Access-Accept ) 。
103: 该漫游宽带远程接入服务器接收该认证请求对应的认证响应, 该 认证响应包括该宿主宽带远程接入服务器的网际协议地址。
具体实现时, 漫游宽带远程接入服务器可以通过远程用户拨号认证服 务协议接收该认证请求对应的认证响应。
104: 该漫游宽带远程接入服务器根据该宿主宽带远程接入服务器的网 际协议地址, 向该宿主宽带远程接入服务器发送隧道建立请求。 该隧道用 于传输该移动台与该应用服务器之间的流量。
漫游宽带远程接入服务器向宿主宽带远程接入服务器发送隧道建立请 求前, 漫游宽带远程接入服务器可以确定该移动台处于漫游状态。 具体实 现时, 可以是漫游宽带远程接入服务器接收认证请求对应的认证响应后并 且漫游宽带远程接入服务器向宿主宽带远程接入服务器发送隧道建立请求 前, 第二认证服务器生成漫游标记, 并将漫游标记发送至漫游宽带远程接 入服务器。 漫游宽带远程接入服务器根据漫游标记生成隧道建立请求。 漫 游标记用于标识该移动台处于漫游状态。 漫游标志可以承载于认证响应。
第二认证服务器可以根据映射表生成漫游标记。 具体实现时, 漫游宽 带远程接入服务器向第二认证服务器发送的认证请求可以包括漫游宽带远 程接入服务器的网际协议地址。 第二认证服务器收到认证请求后, 根据认 证请求包含的该源网际协议地址, 查找到该映射表。 第二认证服务器根据 该映射表, 获得宿主宽带远程接入服务器的网际协议地址。 第二认证服务 器将宿主宽带远程接入服务器的网际协议地址与漫游宽带远程接入服务器 的网际协议地址进行比较, 确定两个网际协议地址不同, 进而确定该移动 台处于漫游状态。
漫游宽带远程接入服务器向宿主宽带远程接入服务器发送隧道建立请 求前, 漫游宽带远程接入服务器可以确定该移动台处于漫游状态。 具体实 现时, 还可以是漫游宽带远程接入服务器接收认证请求对应的认证响应后 并且漫游宽带远程接入服务器向宿主宽带远程接入服务器发送隧道建立请 求前, 漫游宽带远程接入服务器通过比较该宿主宽带远程接入服务器的网 际协议地址与该漫游宽带远程接入服务器的网际协议地址, 确定两个网际 协议地址不同, 进而确定该移动台处于漫游状态。
漫游宽带远程接入服务器可以通过协议构建漫游宽带远程接入服务器 与宿主宽带远程接入服务器之间的隧道。 具体实现时, 该协议可以是漫游 接入自动隧道协议 ( Roaming Access Auto-Tunneling Protocol, RA2P ) 。 以 下对 RA2P进行说明:
RA2P是基于通用数据报协议。 RA2P报文包括网际协议头、 通用数据 协议头、 RA2P头以及净荷。 其中, 网际协议头包括用于标识 RA2P隧道的 源地址以及目的地址。 网际协议头的长度为 20字节。 通用数据协议头中的 源端口或者目的端口可以是 1710, 也可以是其他尚未被使用的数值。 RA2P 头的长度为 16字节。
RA2P 文可以包括以下几种类型:
隧道建立请求 ( RA2P-Start-Tuneling-Request ) , 用于向对端请求建立 控制连接;
隧道建立响应( RA2P-Start-Tuneling-Ack ) , 用于对隧道建立请求进行 向应;
隧道拆除请求 ( RA2P-Stop-Tuneling-Request ) , 用来通知对端拆除控 制连接;
隧道拆除响应( RA2P-Stop-Tuneling-Ack ) , 用于对隧道拆除请求进行 向应;
隧道认证请求 ( RA2P-Tunneling- Authentication-Request) , 用于向对端 请求进行认证;
隧道认证响应(RA2P-Tunneling- Authentication- Ack), 用于对隧道认证 请求进行响应;
连通性检测 (RA2P-Hello) , 用于对隧道的连通性进行检测。
0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
T L x x S x O P x x x x Ver Length (opt)
Type Tunnel ID
Ns (opt) Nr (opt)
Offset Size (opt) Offset pad... (opt) 从上可以看出 RA2P头包括多个字段。 各字段的定义如下:
Type(T): 0表示数据报文; 1表示信令报文。
Length(L): 1表示长度字段存在。 对于信令报文该字段为 1
Sequence(S): 1表示 Ns以及 Nr字段存在。 对于信令报文该字段为 1 Priority (P): 1表示该报文应被优先传送。 对于信令报文, 该字段为 0 Version(Ver):表示当前版本, 该字段为 1。
Length: 表示 RA2P头及净荷的总长度, 单位为字节。
Type: 表示信令报文的类型, 具体包括:
Type=l , 隧道建立请求
Type=2, 隧道建立响应
Type=3 , 隧道拆除请求
Type=4, 隧道拆除响应
Type=5 , 隧道认证请求
Type=6, 隧道认证响应
Type=10, 连通性检测
Tunnel ID: 用于标识控制连接。 隧道身份(Tunnel ID )是发送隧道建 立请求的路由器为移动台分配的。 不同的移动台对应不同的隧道身份。
Ns:表示报文的序列号。 该字段的取值范围是 0至 65535。
Nr:表示期望的下一个报文的序列号。该字段的取值范围是 0至 65535。 对于数据报文, 该字段是保留字段。 即便 S字段为 1 , 接收方也将忽略该字 段。
Offset Size:表示传输净荷相对于 RA2P头的起始位置。
漫游宽带远程接入服务器和宿主宽带远程接入服务器之间的隧道可以 用于传输该移动台与该应用服务器之间的流量。 具体实现时, 漫游宽带远 程接入服务器通过接入点接收到来自移动台的目的地为应用服务器的流量 后, 通过隧道将该流量转发至宿主宽带远程接入服务器。 宿主宽带远程接 入服务器接收到该流量后, 将该流量转发至应用服务器。 类似的, 宿主宽 带远程接入服务器接收到来自应用服务器的目的地为移动台的流量后, 通 过隧道将该流量转发至漫游宽带远程接入服务器。 漫游宽带远程接入服务 器接收到该流量后, 通过接入点将该流量转发至移动台。 漫游宽带远程接 入服务器根据移动台的媒体接入控制 (Media Access Control )协议地址, 通过数据链路层向移动台转发流量。 移动台发送的接入请求报文中可以包 括移动台的媒体接入控制协议地址。 漫游宽带远程接入服务器可以根据接 入请求报文获得移动台的媒体接入控制协议地址。
根据本发明实施例提供的路径建立方法, 当移动台到达漫游宽带远程 接入服务器时, 可以将移动台的源网际协议地址发送至认证服务器, 并根 据认证服务器提供的宿主宽带远程接入服务器的网际协议地址, 在漫游宽 带远程接入服务器和宿主宽带远程接入服务器之间建立用于传输移动台与 应用服务器之间的流量的隧道。
可见, 通过本发明实施例提供的路径建立方法, 可以解决移动节点到 达外地代理后, 宿主代理需要根据外地代理发送的路由消息, 重新计算路 由并进行路由收敛的问题。
另外, 在移动网际协议中, 移动台需要安装客户端软件, 该客户端软 中, 移动台不需要安装上述客户端软件。
可选的,
该漫游宽带远程接入服务器接收该认证请求对应的认证响应后并且该 漫游宽带远程接入服务器向该宿主宽带远程接入服务器发送隧道建立请求 前, 包括:
该漫游宽带远程接入服务器根据漫游标记, 生成该隧道建立请求, 该 漫游标记为该第二认证服务器根据该映射表生成的用于标识该移动台处于 漫游状态的标记, 该漫游标志 载于该认证响应。
可选的,
该漫游宽带远程接入服务器接收该认证请求对应的认证响应后并且该 漫游宽带远程接入服务器向该宿主宽带远程接入服务器发送隧道建立请求 前, 包括:
该漫游宽带远程接入服务器通过比较该宿主宽带远程接入服务器的网 际协议地址与该漫游宽带远程接入服务器的网际协议地址, 确定该移动台 处于漫游状态。
可选的,
该映射表包含该移动台的媒体接入控制协议地址, 该认证请求包含该 移动台的媒体接入控制协议地址, 以便于该第二认证服务器通过比较该认 证请求中包含的该移动台的媒体接入控制协议地址是否等于该映射表包含 的该移动台的媒体接入控制协议地址, 进而对该认证请求进行响应。
可选的,
该第一认证服务器与该第二认证服务器为同一设备。
实施例二:
本发明实施例提供了一种漫游宽带远程接入服务器。 参见图 2, 图 2是 本发明实施例提供的漫游宽带远程接入服务器示意图, 该装置包括:
接收器 201 , 用于接收移动台发送的接入请求, 该接入请求包括源网际 协议地址。 该源网际协议地址是获得第一认证服务器的认证的网际协议地 址。 该认证使得该源网际协议地址与宿主宽带远程接入服务器的网际协议 地址形成映射表并使得该移动台获得通过该宿主宽带远程接入服务器访问 应用服务器的权限。
移动台是无线通信终端。 具体实现时, 移动台可以是手机、 个人数字 助理以及个人电脑。
漫游宽带远程接入服务器是为移动台提供接入服务的设备。 具体实现 时, 漫游宽带远程接入服务器可以通过接入点向移动台提供接入服务。
漫游宽带远程接入服务器可以是宽带远程接入服务器, 也可以是业务 服务器, 还可以是多业务控制网关。 当漫游宽带远程接入服务器是多业务 控制网关时, 漫游宽带远程接入服务器可以包括接入控制单元以及用户管 理单元。 接入控制单元可以对多个接入点进行管理和控制。
漫游宽带远程接入服务器可以通过接入点对移动台进入或者离开其管 辖范围进行感知。 在移动台已经接入漫游宽带远程接入服务器的场景下, 漫游宽带远程接入服务器可以通过地址解析协议探测报文对移动台是否离 开其管辖范围进行判断; 也可以通过统计单位时间内接收的来自移动台的 流量对移动台是否离开其管辖范围进行判断。 具体来说, 如果单位时间内, 漫游宽带远程接入服务器接收的来自移动台的流量小于预定的阔值, 则判 断移动台离开其管辖范围。
漫游宽带远程接入服务器可以接收移动台发送的接入请求。 该接入请 求可以是接入请求报文。 以下通过一个例子对漫游宽带远程接入服务器接 收移动台发送的接入请求的过程进行描述。
受漫游宽带远程接入服务器控制的接入点感知到移动台进入其覆盖范 围,并接收移动台发送的接入请求报文。例如,接入点可以通过 IEEE802.1x 定义的方式对移动台进行感知。 接入点接收到接入请求报文后, 可以将该 报文透传至漫游宽带远程接入服务器。 例如, 接入点通过无线接入点控制 及提供协议, 将接入请求报文透传至漫游宽带远程接入服务器。 接入点也 可以先将接入请求报文透传至交换机, 交换机再将接入请求报文发送至漫 游宽带远程接入服务器。
移动台发送的接入请求可以包括移动台的源网际协议地址。 该源网际 协议地址可以是宿主宽带远程接入服务器为移动台分配的网际协议地址。 例如, 宿主宽带远程接入服务器通过动态主机配置协议或者以太网上的点 对点协议为移动台分配网际协议地址。 该源网际协议地址也可以是用于在 移动台上静态配置的网际协议地址。 与漫游宽带远程接入服务器类似, 宿 主宽带远程接入服务器也是为移动台提供接入服务的设备。 宿主宽带远程 接入服务器也可以通过接入点向移动台提供接入服务。 关于宿主宽带远程 接入服务器的工作原理, 具体请参见上文关于漫游宽带远程接入服务器的 描述。
该源网际协议地址是获得第一认证服务器的认证的网际协议地址。 具 体实现时, 第一认证服务器可以是认证、 授权和计费服务器。 以下通过一 个例子对该源网际协议地址获得第一认证服务器的认证的过程进行描述。
移动台到达漫游宽带远程接入服务器前, 移动台与宿主宽带远程接入 服务器建立连接, 宿主宽带远程接入服务器向第一认证服务器发送包括该 源网际协议地址的认证请求。 第一认证服务器对认证请求进行响应, 并建 立了该源网际协议地址与宿主宽带远程接入服务器的网际协议地址的映射 表。 该映射表可以存储在第一认证服务器, 也可以存储在用户签约信息数 据库。 该源网际协议地址在第一认证服务器获得认证后, 移动台获得访问 应用服务器的权限。 应用服务器可以是视频服务器或者是无线应用协议服 务器。 应用服务器可以与宿主宽带远程接入服务器直连, 也可以通过路由 器与宿主宽带远程接入服务器连接。
请求单元 202 ,用于向第二认证服务器发送包含该源网际协议地址的认 证请求, 以便于该第二认证服务器根据该映射表对该认证请求进行响应。
具体实现时, 第二认证服务器与第一认证服务器可以是同一设备, 也 可以是不同设备。 当第二认证服务器与第一认证服务器是不同设备时, 该 映射表可以存储在用户签约信息数据库。
漫游宽带远程接入服务器可以通过远程用户拨号认证服务协议向第二 认证服务器发送认证请求。 关于远程用户拨号认证服务协议, 具体请参见 RFC2865以及 RFC2866。
第二认证服务器根据该映射表对该认证请求进行响应。 具体实现时, 可以是该映射表保存在用户签约数据库。 第二认证服务器在用户签约数据 库中查找该源网际协议地址, 并根据该映射表获得第一认证服务器的网际 协议地址。 第二认证服务器获得第一认证服务器的网际协议地址后, 通过 远程用户拨号认证服务协议向漫游宽带远程接入服务器发送认证接收。
响应单元 203 , 用于接收该认证请求对应的认证响应, 该认证响应包括 该宿主宽带远程接入服务器的网际协议地址。 具体实现时, 漫游宽带远程接入服务器可以通过远程用户拨号认证服 务协议接收该认证请求对应的认证响应。
隧道建立单元 204 ,用于根据该宿主宽带远程接入服务器的网际协议地 址, 向该宿主宽带远程接入服务器发送隧道建立请求。 该隧道用于传输该 移动台与该应用服务器之间的流量。
漫游宽带远程接入服务器向宿主宽带远程接入服务器发送隧道建立请 求前, 漫游宽带远程接入服务器可以确定该移动台处于漫游状态。 具体实 现时, 可以是漫游宽带远程接入服务器接收认证请求对应的认证响应后并 且漫游宽带远程接入服务器向宿主宽带远程接入服务器发送隧道建立请求 前, 第二认证服务器生成漫游标记, 并将漫游标记发送至漫游宽带远程接 入服务器。 漫游宽带远程接入服务器根据漫游标记生成隧道建立请求。 漫 游标记用于标识该移动台处于漫游状态。 漫游标志可以承载于认证响应。
第二认证服务器可以根据映射表生成漫游标记。 具体实现时, 漫游宽 带远程接入服务器向第二认证服务器发送的认证请求可以包括漫游宽带远 程接入服务器的网际协议地址。 第二认证服务器收到认证请求后, 根据认 证请求包含的该源网际协议地址, 查找到该映射表。 第二认证服务器根据 该映射表, 获得宿主宽带远程接入服务器的网际协议地址。 第二认证服务 器将宿主宽带远程接入服务器的网际协议地址与漫游宽带远程接入服务器 的网际协议地址进行比较, 确定两个网际协议地址不同, 进而确定该移动 台处于漫游状态。
漫游宽带远程接入服务器向宿主宽带远程接入服务器发送隧道建立请 求前, 漫游宽带远程接入服务器可以确定该移动台处于漫游状态。 具体实 现时, 还可以是漫游宽带远程接入服务器接收认证请求对应的认证响应后 并且漫游宽带远程接入服务器向宿主宽带远程接入服务器发送隧道建立请 求前, 漫游宽带远程接入服务器通过比较该宿主宽带远程接入服务器的网 际协议地址与该漫游宽带远程接入服务器的网际协议地址, 确定两个网际 协议地址不同, 进而确定该移动台处于漫游状态。
漫游宽带远程接入服务器可以通过协议构建漫游宽带远程接入服务器 与宿主宽带远程接入服务器之间的隧道。具体实现时,该协议可以是 RA2P。 以下对 RA2P进行说明:
RA2P是基于通用数据报协议。 RA2P报文包括网际协议头、 通用数据 协议头、 RA2P头以及净荷。 其中, 网际协议头包括用于标识 RA2P隧道的 源地址以及目的地址。 网际协议头的长度为 20字节。 通用数据协议头中的 源端口或者目的端口可以是 1710, 也可以是其他尚未被使用的数值。 RA2P 头的长度为 16字节。
RA2P 文可以包括以下几种类型:
隧道建立请求 ( RA2P-Start-Tuneling-Request ) , 用于向对端请求建立 控制连接;
隧道建立响应( RA2P-Start-Tuneling-Ack ) , 用于对隧道建立请求进行 口向应;
隧道拆除请求 ( RA2P-Stop-Tuneling-Request ) , 用来通知对端拆除控 制连接;
隧道拆除响应( RA2P-Stop-Tuneling-Ack ) , 用于对隧道拆除请求进行 口向应;
隧道认证请求 ( RA2P-Tunneling- Authentication-Request) , 用于向认证 服务器请求进行认证;
隧道认证响应(RA2P-Tunneling- Authentication- Ack), 用于对隧道认证 请求进行响应;
连通性检测 (RA2P-Hello) , 用于对隧道的连通性进行检测。
RA2P头的内容如下:
0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+
T|L|x|x|S|x|0|P|x|x|x|x Ver | Length (opt) I Type I Tunnel ID |
+-+ -+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
I Ns (opt) I Nr (opt) |
+-+ -+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
I Offset Si ze (opt) | Offset pad. . . (opt)
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
从上可以看出 RA2 P头包括多个字段。 各字段的定义如下:
Type(T): 0表示数据报文; 1表示信令报文。
Length(L): 1表示长度字段存在。 对于信令报文该字段为 1
Sequence(S): 1表示 Ns以及 Nr字段存在。 对于信令报文该字段为 1
Priority (P): 1表示该 4艮文应被优先传送。 对于信令报文, 该字段为 0
Version(Ver):表示当前版本, 该字段为 1
Length: 表示 RA2P头及净荷的总长度, 单位为字节。
Type: 表示信令报文的类型, 具体包括:
Type=l , 隧道建立请求
Type=2 , 隧道建立响应
Type=3 , 隧道拆除请求
Type=4, 隧道拆除响应
Type=5 , 隧道认证请求
Type=6, 隧道认证响应
Type=10, 连通性检测
Tunnel ID: 用于标识控制连接。 隧道身份是发送隧道建立请求的路由 器为移动台分配的。 不同的移动台对应不同的隧道身份。
Ns:表示报文的序列号。 该字段的取值范围是 0至 65535
Nr:表示期望的下一个报文的序列号。 该字段的取值范围是 0至 65535 对于数据报文, 该字段是保留字段。 即便 S字段为 1, 接收方也将忽略该字 段。
Offset Size:表示传输净荷相对于 RA2P头的起始位置。
漫游宽带远程接入服务器和宿主宽带远程接入服务器之间的隧道可以 用于传输该移动台与该应用服务器之间的流量。 具体实现时, 漫游宽带远 程接入服务器通过接入点接收到来自移动台的目的地为应用服务器的流量 后, 通过隧道将该流量转发至宿主宽带远程接入服务器。 宿主宽带远程接 入服务器接收到该流量后, 将该流量转发至应用服务器。 类似的, 宿主宽 带远程接入服务器接收到来自应用服务器的目的地为移动台的流量后, 通 过隧道将该流量转发至漫游宽带远程接入服务器。 漫游宽带远程接入服务 器接收到该流量后, 通过接入点将该流量转发至移动台。 漫游宽带远程接 入服务器根据移动台的媒体接入控制协议地址, 通过数据链路层向移动台 转发流量。 移动台发送的接入请求报文中可以包括移动台的媒体接入控制 协议地址。 漫游宽带远程接入服务器可以根据接入请求报文获得移动台的 媒体接入控制协议地址。
根据本发明实施例提供的漫游宽带远程接入服务器, 当移动台到达漫 游宽带远程接入服务器时, 可以将移动台的源网际协议地址发送至认证服 务器, 并根据认证服务器提供的宿主宽带远程接入服务器的网际协议地址, 在漫游宽带远程接入服务器和宿主宽带远程接入服务器之间建立用于传输 移动台与应用服务器之间的流量的隧道。
可见, 通过本发明实施例提供的漫游宽带远程接入服务器, 可以解决 移动节点到达外地代理后, 宿主代理需要根据外地代理发送的路由消息, 重新计算路由并进行路由收敛的问题。
另外, 在移动网际协议中, 移动台需要安装客户端软件, 该客户端软 中, 移动台不需要安装上述客户端软件。
可选的, 漫游宽带远程接入服务器可以包括:
漫游标记处理单元, 用于在该漫游宽带远程接入服务器接收该认证请 求对应的认证响应后并且该漫游宽带远程接入服务器向该宿主宽带远程接 入服务器发送隧道建立请求前, 根据漫游标记, 生成该隧道建立请求, 该 漫游标记为该第二认证服务器根据该映射表生成的用于标识该移动台处于 漫游状态的标记, 该漫游标志 载于该认证响应。
可选的, 漫游宽带远程接入服务器可以包括:
漫游状态确定单元, 用于在该漫游宽带远程接入服务器接收该认证请 求对应的认证响应后并且该漫游宽带远程接入服务器向该宿主宽带远程接 入服务器发送隧道建立请求前, 通过比较该宿主宽带远程接入服务器的网 际协议地址与该漫游宽带远程接入服务器的网际协议地址, 确定该移动台 处于漫游状态。
可选的,
该映射表包含该移动台的媒体接入控制协议地址, 该认证请求包含该 移动台的媒体接入控制协议地址, 以便于该第二认证服务器通过比较该认 证请求中包含的该移动台的媒体接入控制协议地址是否等于该映射表包含 的该移动台的媒体接入控制协议地址, 进而对该认证请求进行响应。
可选的,
该第一认证服务器与该第二认证服务器为同一设备。
本领域普通技术人员可以理解: 实现上述方法实施例的全部或部分步 骤可以通过程序指令相关的硬件来完成, 前述程序可以存储于一计算机可 读取存储介质中, 该程序在执行时, 执行包括上述方法实施例的步骤; 而 前述的存储介质包括: ROM、 RAM, 磁碟或者光盘等各种可以存储程序代 码的介质。
最后应说明的是: 以上实施例仅用以说明本发明的技术方案, 而非对 其限制; 尽管参照前述实施例对本发明进行了详细的说明, 本领域的普通 技术人员应当理解: 其依然可以对前述各实施例所记载的技术方案进行修 改, 或者对其中部分技术特征进行等同替换; 而这些修改或者替换, 并不 使相应技术方案的本质脱离本发明各实施例技术方案的精神和范围。

Claims

权利要求
1.一种路径建立方法, 其特征在于, 包括:
漫游宽带远程接入服务器接收移动台发送的接入请求, 所述接入请求 包括源网际协议地址, 所述源网际协议地址是获得第一认证服务器的认证 的网际协议地址, 所述认证使得所述源网际协议地址与宿主宽带远程接入 服务器的网际协议地址形成映射表并使得所述移动台获得通过所述宿主宽 带远程接入服务器访问应用服务器的权限;
所述漫游宽带远程接入服务器向第二认证服务器发送包含所述源网际 协议地址的认证请求, 以便于所述第二认证服务器根据所述映射表对所述 认证请求进行口向应;
所述漫游宽带远程接入服务器接收所述认证请求对应的认证响应, 所 述认证响应包括所述宿主宽带远程接入服务器的网际协议地址;
所述漫游宽带远程接入服务器根据所述宿主宽带远程接入服务器的网 际协议地址, 向所述宿主宽带远程接入服务器发送隧道建立请求, 所述隧 道用于传输所述移动台与所述应用服务器之间的流量。
2.根据权利要求 1所述方法, 其特征在于:
所述漫游宽带远程接入服务器接收所述认证请求对应的认证响应后并 且所述漫游宽带远程接入服务器向所述宿主宽带远程接入服务器发送隧道 建立请求前, 包括:
所述漫游宽带远程接入服务器根据漫游标记, 生成所述隧道建立请求, 所述漫游标记为所述第二认证服务器根据所述映射表生成的用于标识所述 移动台处于漫游状态的标记, 所述漫游标志承载于所述认证响应。
3.根据权利要求 1所述方法, 其特征在于:
所述漫游宽带远程接入服务器接收所述认证请求对应的认证响应后并 且所述漫游宽带远程接入服务器向所述宿主宽带远程接入服务器发送隧道 建立请求前, 包括: 所述漫游宽带远程接入服务器通过比较所述宿主宽带远程接入服务器 的网际协议地址与所述漫游宽带远程接入服务器的网际协议地址, 确定所 述移动台处于漫游状态。
4.根据权利要求 1至 3中任一权利要求所述方法, 其特征在于: 所述映射表包含所述移动台的媒体接入控制协议地址, 所述认证请求 包含所述移动台的媒体接入控制协议地址, 以便于所述第二认证服务器通 过比较所述认证请求中包含的所述移动台的媒体接入控制协议地址是否等 于所述映射表包含的所述移动台的媒体接入控制协议地址, 进而对所述认 证请求进行口向应。
5.根据权利要求 1至 4中任一权利要求所述方法, 其特征在于: 所述第一认证服务器与所述第二认证服务器为同一设备。
6.—种漫游宽带远程接入服务器, 其特征在于, 包括:
接收器, 用于接收移动台发送的接入请求, 所述接入请求包括源网际 协议地址, 所述源网际协议地址是获得第一认证服务器的认证的网际协议 地址, 所述认证使得所述源网际协议地址与宿主宽带远程接入服务器的网 际协议地址形成映射表并使得所述移动台获得通过所述宿主宽带远程接入 服务器访问应用服务器的权限;
请求单元, 用于向第二认证服务器发送包含所述源网际协议地址的认 证请求, 以便于所述第二认证服务器根据所述映射表对所述认证请求进行 向应;
响应单元, 用于接收所述认证请求对应的认证响应, 所述认证响应包 括所述宿主宽带远程接入服务器的网际协议地址;
隧道建立单元, 用于根据所述宿主宽带远程接入服务器的网际协议地 址, 向所述宿主宽带远程接入服务器发送隧道建立请求, 所述隧道用于传 输所述移动台与所述应用服务器之间的流量。
7.根据权利要求 6所述漫游宽带远程接入服务器, 其特征在于, 包括: 漫游标记处理单元, 用于在所述漫游宽带远程接入服务器接收所述认 证请求对应的认证响应后并且所述漫游宽带远程接入服务器向所述宿主宽 带远程接入服务器发送隧道建立请求前, 根据漫游标记, 生成所述隧道建 立请求, 所述漫游标记为所述第二认证服务器根据所述映射表生成的用于 标识所述移动台处于漫游状态的标记, 所述漫游标志承载于所述认证响应。
8.根据权利要求 6所述漫游宽带远程接入服务器, 其特征在于, 包括: 漫游状态确定单元, 用于在所述漫游宽带远程接入服务器接收所述认 证请求对应的认证响应后并且所述漫游宽带远程接入服务器向所述宿主宽 带远程接入服务器发送隧道建立请求前, 通过比较所述宿主宽带远程接入 服务器的网际协议地址与所述漫游宽带远程接入服务器的网际协议地址, 确定所述移动台处于漫游状态。
9.根据权利要求 6至 8中任一权利要求所述漫游宽带远程接入服务器, 其特征在于:
所述映射表包含所述移动台的媒体接入控制协议地址, 所述认证请求 包含所述移动台的媒体接入控制协议地址, 以便于所述第二认证服务器通 过比较所述认证请求中包含的所述移动台的媒体接入控制协议地址是否等 于所述映射表包含的所述移动台的媒体接入控制协议地址, 进而对所述认 证请求进行口向应。
10.根据权利要求 6至 9中任一权利要求所述漫游宽带远程接入服务器, 其特征在于:
所述第一认证服务器与所述第二认证服务器为同一设备。
PCT/CN2012/080677 2011-10-25 2012-08-29 一种路径建立方法以及漫游宽带远程接入服务器 WO2013060190A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201110327700.8 2011-10-25
CN201110327700A CN102333295A (zh) 2011-10-25 2011-10-25 一种路径建立方法以及漫游宽带远程接入服务器

Publications (1)

Publication Number Publication Date
WO2013060190A1 true WO2013060190A1 (zh) 2013-05-02

Family

ID=45484872

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2012/080677 WO2013060190A1 (zh) 2011-10-25 2012-08-29 一种路径建立方法以及漫游宽带远程接入服务器

Country Status (2)

Country Link
CN (1) CN102333295A (zh)
WO (1) WO2013060190A1 (zh)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102333295A (zh) * 2011-10-25 2012-01-25 华为技术有限公司 一种路径建立方法以及漫游宽带远程接入服务器

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1653772A (zh) * 2002-05-06 2005-08-10 思科技术公司 用于移动因特网协议动态本地代理分配的方法和装置
CN102075904A (zh) * 2010-12-24 2011-05-25 杭州华三通信技术有限公司 一种防止漫游用户再次认证的方法和装置
CN102333295A (zh) * 2011-10-25 2012-01-25 华为技术有限公司 一种路径建立方法以及漫游宽带远程接入服务器

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1653772A (zh) * 2002-05-06 2005-08-10 思科技术公司 用于移动因特网协议动态本地代理分配的方法和装置
CN102075904A (zh) * 2010-12-24 2011-05-25 杭州华三通信技术有限公司 一种防止漫游用户再次认证的方法和装置
CN102333295A (zh) * 2011-10-25 2012-01-25 华为技术有限公司 一种路径建立方法以及漫游宽带远程接入服务器

Also Published As

Publication number Publication date
CN102333295A (zh) 2012-01-25

Similar Documents

Publication Publication Date Title
US9743334B2 (en) Method and apparatus for enabling data path selection in a virtual home gateway
US9112909B2 (en) User and device authentication in broadband networks
JP5987122B2 (ja) デバイス固有のトラフィックフローステアリングのためのネットワークアドレス変換されたデバイスの特定
RU2015132107A (ru) Системы и способы доступа к сети
US20100332626A1 (en) Combining locally addressed devices and wide area network (wan) addressed devices on a single network
US11153207B2 (en) Data link layer-based communication method, device, and system
WO2008131634A1 (fr) Procédé et appareil permettant d'envoyer et de recevoir des paquets multidiffusion
WO2011143880A1 (zh) 一种无线组播数据的传输方法及系统
US9893907B2 (en) Managing multiple virtual area network memberships
US20140307651A1 (en) Internet Protocol Address Registration
WO2014101755A1 (zh) 业务数据分流方法及系统
KR101901341B1 (ko) 사용자 장치의 이동성을 지원하는 네트워크 접속 방법 및 장치
KR20180051621A (ko) 전기통신 네트워크와 적어도 하나의 사용자 장비 간의 적어도 하나의 통신 교환의 개선된 핸들링을 위한 방법, 전기통신 네트워크, 사용자 장비, 시스템, 프로그램 및 컴퓨터 프로그램 제품
US20230146807A1 (en) Supporting dynamic host configuration protocol-based customer premises equipment in fifth generation wireline and wireless convergence
WO2011032417A1 (zh) 发起通信、信息/数据报文的转发及路由配置方法和系统
WO2012041168A1 (zh) 用于IPv6网络的网络连接处理方法及其装置
WO2014124561A1 (zh) 实现在wlan中的通信的方法和系统
WO2011032478A1 (zh) 一种获取终端身份标识的方法、装置及终端
WO2010091562A1 (zh) 用于固定网络与第三方网络或应用服务器交互的方法及装置
WO2009124444A1 (zh) 地址解析协议请求消息处理方法及装置
WO2013026299A1 (zh) 一种地址解析方法、装置及信息传输方法
US9439127B2 (en) Method for data transmission and local network entity
WO2016074354A1 (zh) 共享wifi的方法及系统、家庭网关和无线局域网关
WO2013060190A1 (zh) 一种路径建立方法以及漫游宽带远程接入服务器
WO2010066144A1 (zh) 发送数据、转发数据的方法、设备和多地址空间移动网络

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 12843342

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 12843342

Country of ref document: EP

Kind code of ref document: A1