CN102378284B - Inter-domain switching method of proxy mobile IPv6 (Internet Protocol Version 6) - Google Patents

Inter-domain switching method of proxy mobile IPv6 (Internet Protocol Version 6) Download PDF

Info

Publication number
CN102378284B
CN102378284B CN201110378780.XA CN201110378780A CN102378284B CN 102378284 B CN102378284 B CN 102378284B CN 201110378780 A CN201110378780 A CN 201110378780A CN 102378284 B CN102378284 B CN 102378284B
Authority
CN
China
Prior art keywords
message
address
lma2
hoa2
mails
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201110378780.XA
Other languages
Chinese (zh)
Other versions
CN102378284A (en
Inventor
马争鸣
王可
张飞
王波涛
王琳
张荀
梁艳盈
梁雨淇
黄燕美
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Sun Yat Sen University
National Sun Yat Sen University
Original Assignee
National Sun Yat Sen University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by National Sun Yat Sen University filed Critical National Sun Yat Sen University
Priority to CN201110378780.XA priority Critical patent/CN102378284B/en
Publication of CN102378284A publication Critical patent/CN102378284A/en
Application granted granted Critical
Publication of CN102378284B publication Critical patent/CN102378284B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Mobile Radio Communication Systems (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention relates to an inter-domain switching method of a proxy mobile IPv6 (Internet Protocol Version 6). When a mobile node (MN) is switched from a local mobile anchor (LAM1) to the other local mobile anchor (LAM2), a binding of a former home address (HoA1) and a new home address (HoA2) is established on the LMA1 by the MN. In a non-routing optimization mode, a source address of a data report which is sent to a non-switched communication node (CN) by the switched MN is the HoA1, and a purpose address of the data report which is sent to the MN by the CN is the HoA1. Therefore, the communication between the MN and the CN is transferred through the LMA1. In a routing optimization mode, an address binding which is maintained by the switched CN is changed to a binding of the HoA1 and the HoA2, the source address of the data report which is sent to the CN by the MN is changed to the HoA2, a home address item expansion head is filled with the HoA1, the purpose address of the data report which is sent to the MN by the CN is changed to the HoA1, and a second kind route head is filled with the HoA1. Accordingly, the CN and the MN can directly be communicated with each other.

Description

The method of switching between a kind of proxy mobile IPv 6 territory
Technical field
The present invention relates to the communications field, be specifically related to the method for switching between a kind of proxy mobile IPv 6 territory.
Background technology
The world today, in the IT industry of develop rapidly, the most noticeable mobile communication and the Internet service of surely belonging to.The crystallization that mobile communication technology merges mutually with IP network---mobile IP technology (MIP), has held global communication field business especially.A distinguishing feature of MIP is that the movement of mobile node (MN) has the transparency for the application of carrying in network layer, briefly, be exactly that MN moves between different networks, transport layer and application more than transport layer all needn't change source address and the destination address of communication, thereby keep the continuity of communication.The application of MIP technology has bright prospects, and its exploitation has become the focus of research in the industry.
Along with the development of network technology and the expansion of network size, IPv4 address depletion problem is appeared suddenly, and the test of IPv6 and deployment start to become the focus of industry, is accompanied by the widespread deployment of IPv6, mobile IP v 6 (MIPv6), as a Killer application of IPv6, is expected to have been used in a large scale.MIPv6 technology makes IPv6 mobile node can use " home address " to move in network, thereby the continuity that has kept upper layer conversation, but be also that network and terminal have been brought extra signaling consumption, the protocol stack of complexity and the larger problems such as network delay simultaneously.At present, a plurality of working groups of IETF are just carrying out the patulous research of MIPv6, comprising completed standard achievement PMIPv6 (Proxy Mobile IPv6--RFC5213).
PMIPv6 has introduced local mobile anchor (LMA) and two new functional entitys of Mobile Access Gateway (MAG) on the basis of MIPv6.LMA has the function of home agent in similar MIPv6 (HA), is the topological anchor point of MN home network prefix (MN-HNP), is responsible for maintaining the reachable state of mobile node.MAG replaces MN to carry out the entity of mobile management function, be responsible for detecting MN access, leave, initialization and upgrade the upper banding cache entry about MN of LMA.The schematic network structure of PMIPv6 as shown in Figure 1.
MN access can be assigned to unique MN-HNP during PMIPv6 territory, and it is according to obtained MN-HNP configuration home address.The flow process in MN access PMIPv6 territory as shown in Figure 2.First, the MAG that MN connects to it sends route requests (RS) message.MAG sends agent binding update (PBU) message to LMA, to set up the upper MN-HNP of LMA and the current binding of acting on behalf of between Care-of Address (Proxy-CoA) of MN.LMA sets up after corresponding banding cache entry according to the PBU message receiving, then to MAG, replys agent binding and confirm (PBA) message, is established to the end node of the bidirectional tunnel of MAG simultaneously.MAG will be established to the end node of the bidirectional tunnel of LMA after receiving the PBA that LMA sends, and now, has set up one for transmitting the bidirectional tunnel of packet between MAG and LMA.Finally, MAG crosses route announcement (RA) message by the information exchanges such as MN-HNP that comprise in PBA and is sent to MN, and MN is according to the information configuration home address (HoA) such as MN-HNP received, and keeps its home address constant while moving in this PMIPv6 territory.
MN has obtained after initial address configuration in PMIPv6 territory, when MN changes Network Access Point (AP), IAD before (MAG1) detects MN and leaves to LMA transmission agent binding releasing (DeReg PBU) message, the MN-HNP of request LMA releasing MN and the binding between its current Proxy-CoA.LMA removes this banding cache after receiving DeReg PBU message, and replys PBA to MAG1.After this, LMA allows current new IAD (MAG2) to upgrade this banding cache the one given period of wait, if also confiscate corresponding updating message after the arrival of given time, LMA will delete this banding cache.MAG2 can send PBU to LMA to upgrade banding cache while MN access being detected.The flow process that MN switches to MAG2 from MAG1 as shown in Figure 3.
PMIPv6 is supported the mobility of MN and is participated in without MN by the signaling message between MN and HA in expansion MIPv6 agreement.The MAG that acts on behalf of mobile management function in network carry out and HA between Signalling exchange and replace MN to carry out mobile management, MN will no longer participate in and the Signalling exchange of HA.With respect to MIPv6, PMIPv6 can effectively reduce signaling consumption and handover delay, alleviates the complexity of mobile terminal protocol stack, improves service quality.
Yet, in PMIPv6, how to carry out switching in RFC5213 and not relating between territory, when moving to another LMA as MN, how to keep and the communicating by letter of Correspondent Node CN1 current not authoritative method.According to above-mentioned situation, the method switched between a kind of proxy mobile IPv 6 territory is proposed herein, when can making MN be switched to another LMA by a LMA, the method still keeps the continuity of communication.
Summary of the invention
The object of this invention is to provide the method for switching between a kind of proxy mobile IPv 6 territory.When can making MN be switched to another LMA by a LMA, the method still keeps the continuity of communication.The object of the present invention is achieved like this:
1, the method for switching between the PMIPv6 territory under non-route optimization mode
Our hypothesis, MN by MAG1 and LMA1 to CN1 initiating communication.At this moment, MAG1 distributes an address Proxy-CoA1 to MN, LMA1 distributes a home address network prefix MN-HNP1 to MN, and the binding of having set up MN-HNP1 and Proxy-CoA1 in LMA1, MN has configured address HoA1 according to MN-HNP1, and with in the communicating by letter of CN1, HoA1 is used as to home address and uses.MN mails to the data message of CN1, and destination address is CNA1, and source address is HoA1, and CN1 mails to the data message of MN, and destination address is HoA1, and source address is CNA1.Between the PMIPv6 territory under non-route optimization mode, switching flow figure as shown in Figure 4.
1.1, MN's leaves
(1) MN leaves MAG1, and MAG1 sends DeReg PBU message to LMA1;
(2) LMA1 receives DeReg PBU message, removes the binding of MN-HNP1 and Proxy-CoA1, and replys PBA message to MAG1;
1.2, the access of MN
(1) MN is by RS message access MAG2.
(2) MAG2 receives after RS message, to aaa server, sends query messages.Aaa server is received after query messages, carries out necessary authentication, then to MAG2, transmits a reply message.Reply the address that comprises LMA2 in message.
(3) MAG2 receives after the reply message of aaa server, for MN distributes an address Proxy-CoA2, and sends PBU message to LMA2, comprises Proxy-CoA2 in message.
(4) LMA2 receives after PBU message, for MN distributes an address MN-HNP2, and the binding of setting up MN-HNP2 and Proxy-CoA2.LMA2 replys PBA message to MAG2, comprises MN-HNP2 in message.
(5) MAG2 receives after PBA message, by RA message, MN-HNP2 is informed to MN.
(6) MN receives after RA message, utilizes MN-HNP2 configuration HoA2.
1.3, the foundation of LMA1 address binding
(1) MN sends BU message to LMA1.The destination address of BU message is the address of LMA1, and source address is HoA2, and in message, HoA1 is inserted in home address territory, and HoA2 is inserted in Care-of Address territory.BU message mails to LMA1 through the tunnel between MAG2 and LMA2.
(2) LMA1 receives the binding of setting up HoA1 and HoA2 after BU message, and replys BA message to MN.The destination address of BA message is HoA2, and source address is the address of LMA1.BA message mails to LMA2, and LMA2 extracts MN-HNP2 from HoA2, searches the binding of MN-HNP2 and Proxy-CoA2 according to MN-HNP2, then by the tunnel between LMA2 and MAG2, BA message is mail to MN.
1.4, the communication after switching between territory
(1) MN mails to the data message of CN1, and destination address is CNA1, and source address is HoA1.MN will encapsulate data message, the data message after encapsulation, and destination address is the address of LMA1, source address is HoA2.Data message after encapsulation mails to LMA1 through the tunnel between MAG2 and LMA2.LMA1, to the data message decapsulation of receiving, then mails to CN1 the data message after decapsulation.
CN1 mails to the data message of MN, and destination address is HoA1, and source address is CNA1.Such data message mails to LMA1.LMA1 receives after data message, and the binding of searching HoA1 and HoA2 according to HoA1, then encapsulates data message.Data message after encapsulation, destination address is HoA2, source address is the address of LMA1.Data message after encapsulation mails to LMA2.LMA2 extracts MN-NHP2 according to HoA2, searches the binding of MN-NHP2 and Proxy-CoA2 according to MN-NHP2, then by the tunnel between LMA2 and MAG2, the data message after encapsulation is mail to MN.
(2) while communicating with new communication node CN2 after having switched between MN territory, the source data packet address of being mail to CN2 by MN is HoA2, and destination address is CNA2; The source data packet address of being mail to MN by CN2 is CNA2, and destination address is HoA2.
After switching between MN territory, the communication process of non-routing optimality as shown in Figure 5.
2, the method for switching between the PMIPv6 territory under route optimization mode
Our hypothesis, MN by MAG1 and LMA1 to CN1 initiating communication.At this moment, MAG1 distributes an address Proxy-CoA1 to MN, and LMA1 distributes a home address network prefix MN-HNP1 to MN, and the binding of having set up MN-HNP1 and Proxy-CoA1 in LMA1, and MN has configured address HoA1 according to MN-HNP1.In order to observe the technical specification of MIPv6, under the pattern of routing optimality, HoA1, by both having served as home address with the communicating by letter of CN1, also serves as Care-of Address.CN1 maintains the binding of HoA1 and HoA1.CN1 mails to the data message of MN, and destination address is HoA1, and source address is CNA1, and Equations of The Second Kind route head is filled out HoA1.MN mails to the data message of CN1, and destination address is CNA1, and source address is HoA1, and home address option extension head is filled out HoA1.Between the PMIPv6 territory under route optimization mode, switching flow figure as shown in Figure 6.
2.1, MN's leaves
(1) MN leaves MAG1, and MAG1 sends DeReg PBU message to LMA1;
(2) LMA1 receives DeReg PBU message, removes the binding of MN-HNP1 and Proxy-CoA1, and replys PBA message to MAG1;
2.2, the access of MN
(1) MN is by RS message access MAG2.
(2) MAG2 receives after RS message, to aaa server, sends query messages.Aaa server is received after query messages, carries out necessary authentication, then to MAG2, replys message, replys the address that message comprises LMA2.
(3) MAG2 receives after the reply message of aaa server, for MN distributes an address Proxy-CoA2, and sends PBU message to LMA2, comprises Proxy-CoA2 in message.
(4) LMA2 receives after PBU message, for MN distributes an address MN-HNP2, and the binding of setting up MN-HNP2 and Proxy-CoA2.LMA2 replys PBA message to MAG2, comprises MN-HNP2 in message.
(5) MAG2 receives after PBA message, by RA message, MN-HNP2 is informed to MN.
(6) MN receives after RA message, utilizes MN-HNP2 configuration HoA2.
2.3, the foundation of LMA1 binding
(1) MN sends BU message to LMA1.The destination address of BU message is the address of LMA1, and source address is HoA2, and in message, HoA1 is inserted in home address territory, and HoA2 is inserted in Care-of Address territory.BU message mails to LMA1 through the tunnel between MAG2 and LMA2.
(2) LMA1 receives the binding of setting up HoA1 and HoA2 after BU message, and replys BA message to MN.The destination address of BA message is HoA2, and source address is the address of LMA1.BA message mails to LMA2, and LMA2 extracts MN-HNP2 from HoA2, searches the binding of MN-HNP2 and Proxy-CoA2, then by the tunnel between LMA2 and MAG2, BA message is mail to MN.
2.4, the renewal of CN1 binding
(1) MN sends HoTI message and CoTI message to CN1.The destination address of HoTI message is CNA1, and source address is HoA1, and in message, HoA1 is filled out in home address territory, and HoA2 is filled out in Care-of Address territory.MN need to encapsulate HoTI message.HoTI message after encapsulation, destination address is the address of LMA1, source address is HoA2.HoTI message after encapsulation mails to LMA1 through the tunnel between MAG2 and LMA2.The HoTI message of LMA1 after to the encapsulation of receiving is carried out decapsulation, obtains HoTI message, then HoT1 message is mail to CN1.The destination address of CoTI message is CNA1, and source address is HoA2, and in message, HoA1 is filled out in home address territory, and HoA2 is filled out in Care-of Address territory.CoTI message mails to CN through the tunnel between MAG2 and LMA2.
(2) CN1 receives after HoTI message and CoTI message, through necessary authentication, then to MN, replys HoT message and CoT message.The destination address of HoT message is HoA1, and source address is CNA1.HoT message mails to LMA1.LMA1 receives after HoT message, searches the binding of HoA1 and HoA2 according to HoA1, then HoT message is encapsulated.HoT message after encapsulation, destination address is HoA2, source address is the address of LMA1.HoT message after encapsulation mails to LMA2.LMA2 extracts MN-HNP2 from HoA2, searches the binding of MN-HNP2 and Proxy-CoA2 according to MN-HNP2, then by the tunnel between LMA2 and MAG2, the HoT message after encapsulation is mail to MN.The destination address of CoT message is HoA2, and source address is CNA1.CoT message mails to LMA2.LMA2 extracts MN-HNP2 from HoA2, searches the binding of MN-HNP2 and Proxy-CoA2 according to MN-HNP2, then by the tunnel between LMA2 and MAG2, CoT message is mail to MN.
(3) MN receives after HoT message and CoT message, to CN1, sends BU message.The destination address of BU message is CNA1, and source address is HoA2, and in message, HoA1 is filled out in home address territory, and HoA2 is filled out in Care-of Address territory.BU message mails to CN1 through the tunnel between MAG2 and LMA2.
(4) CN1 receives after BU message, and the address binding that oneself is maintained is updated to the binding of HoA1 and HoA2, then to MN, replys BA message.The destination address of BA message is HoA2, source address CNA1.BA message mails to LMA2, then through the tunnel between LMA2 and MAG2, mails to MN.
2.5, the communication after switching between territory
(1) MN mails to the data message of CN1, and destination address is CNA1, and source address is HoA2, and home address option extension head is filled out HoA1.The data message that MN mails to CN directly mails to CN1 through the tunnel between MAG2 and LMA2.
CN1 mails to the data message of MN, and destination address is HoA2, and source address is CNA1, and Equations of The Second Kind route head is filled out HoA1.The data message that CN mails to MN mails to LMA2.LMA2 extracts MN-HNP2 from HoA2, searches the binding of MN-HNP2 and Proxy-CoA2 according to MN-HNP2, then by the tunnel between LMA2 and MAG2, data message is mail to MN.
(2) while communicating with new communication node CN2 after having switched between MN territory, the source data packet address of being mail to CN2 by MN is HoA2, and destination address is CNA2; The source data packet address of being mail to MN by CN2 is CNA2, and destination address is HoA2.
The communication process of the routing optimality after switching between MN territory as shown in Figure 7.
Accompanying drawing explanation
The schematic network structure of Fig. 1 PMIPv6
The flow chart in Fig. 2 MN access PMIPv6 territory
The flow chart switching in Fig. 3 MN territory
Switching flow figure between the PMIPv6 territory under the non-route optimization mode of Fig. 4
The communication flow diagram of non-routing optimality after switching between Fig. 5 MN territory
Switching flow figure between the PMIPv6 territory under Fig. 6 route optimization mode
The communication process of the routing optimality after switching between Fig. 7 MN territory
The schematic network structure of Fig. 8 embodiment
Embodiment
The territory method for switching between that the object of this invention is to provide a kind of proxy mobile IPv 6, the method comprises non-route optimization mode and two kinds of situations of route optimization mode.Below we introduce the idiographic flow switching between the territory of proxy mobile IPv 6 in detail in conjunction with Fig. 8.
1, the method for switching between the PMIPv6 territory under non-route optimization mode
Our hypothesis, MN by MAG1 and LMA1 to CN1 initiating communication, the address of LMA1 be aec0:0:0:1::1/64 at this moment, the address of MAG1 is cec0:0:0:1::1/64, MAG1 distributes an address Proxy-CoA1 to MN, Proxy-CoA1 is the address of MAG1.LMA1 distributes a home address network prefix MN-HNP1 to MN, and the binding of having set up MN-HNP1 and Proxy-CoA1 in LMA1, MN has configured address HoA1 according to MN-HNP1, and HoA1 is aea0:0:0:1::2/64, and with in the communicating by letter of CN1, HoA1 is used as to home address and uses.The address of CN1 is eec0:0:0:1::1/64.After switching between MN territory, the address of LMA2 is bec0:0:0:1::1/64, and the address of MAG2 is dec0:0:0:1::1/64, and the address of HoA2 is bea0:0:0:1::2/64, and the address of the new communication node CN2 initiating after MN switches is fec0:0:0:1::1/64.
(1) MN leaves MAG1, and MAG1 sends DeReg PBU message to LMA1, and the source address of message is cec0:0:0:1::1/64, and destination address is aec0:0:0:1::1/64;
(2) LMA1 receives DeReg PBU message, removes the binding of MN-HNP1 and Proxy-CoA1, and replys PBA message to MAG1, and the source address of message is aec0:0:0:1::1/64, and destination address is cec0:0:0:1::1/64;
(3) MN is by RS message access MAG2.
(4) MAG2 receives after RS message, to aaa server, sends query messages.Aaa server is received after query messages, carries out necessary authentication, then to MAG2, transmits a reply message.Reply the address that comprises LMA2 in message.
(5) MAG2 receives after the reply message of aaa server, for MN distributes an address Proxy-CoA2, and sends PBU message to LMA2, comprises Proxy-CoA2 in message, and Proxy-CoA2 is the address of MAG2.The source address of PBU message is dec0:0:0:1::1/64, and destination address is bec0:0:0:1::1/64.
(4) LMA2 receives after PBU message, for MN distributes an address MN-HNP2, and the binding of setting up MN-HNP2 and Proxy-CoA2.LMA2 replys PBA message to MAG2, comprises MN-HNP2 in message, and the source address of PBA message is bec0:0:0:1::1/64, and destination address is dec0:0:0:1::1/64;
(5) MAG2 receives after PBA message, by RA message, MN-HNP2 is informed to MN;
(6) MN receives after RA message, utilizes MN-HNP2 configuration HoA2, and the address of HoA2 is bea0:0:0:1::2/64;
(7) MN sends BU message to LMA1.The destination address of BU message is aec0:0:0:1::1/64, and source address is bea0:0:0:1::2/64, and in message, HoA1 is inserted in home address territory, and HoA2 is inserted in Care-of Address territory.BU message mails to LMA1 through the tunnel between MAG2 and LMA2.
(8) LMA1 receives the binding of setting up HoA1 and HoA2 after BU message, and replys BA message to MN.The destination address of BA message is bea0:0:0:1::2/64, and source address is aec0:0:0:1::1/64.BA message mails to LMA2, and LMA2 extracts MN-HNP2 from HoA2, searches the binding of MN-HNP2 and Proxy-CoA2 according to MN-HNP2, then by the tunnel between LMA2 and MAG2, BA message is mail to MN.
(9) MN mails to the data message of CN1, and destination address is eec0:0:0:1::1/64, and source address is aea0:0:0:1::2/64.MN will encapsulate data message, the data message after encapsulation, and destination address is aec0:0:0:1::1/64, source address is bea0:0:0:1::2/64.Data message after encapsulation mails to LMA1 through the tunnel between MAG2 and LMA2.LMA1, to the data message decapsulation of receiving, then mails to CN1 the data message after decapsulation.
CN1 mails to the data message of MN, and destination address is aea0:0:0:1::2/64, and source address is eec0:0:0:1::1/64.Such data message mails to LMA1.LMA1 receives after data message, and the binding of searching HoA1 and HoA2 according to HoA1, then encapsulates data message.Data message after encapsulation, destination address is HoA2, source address is the address of LMA1.Data message after encapsulation mails to LMA2.LMA2 extracts MN-NHP2 according to HoA2, searches the binding of MN-NHP2 and Proxy-CoA2 according to MN-NHP2, then by the tunnel between LMA2 and MAG2, the data message after encapsulation is mail to MN.
(10) while communicating with new communication node CN2 after having switched between MN territory, the source data packet address of being mail to CN2 by MN is bea0:0:0:1::2/64, and destination address is fec0:0:0:1::1/64; The source data packet address of being mail to MN by CN2 is fec0:0:0:1::1/64, and destination address is bea0:0:0:1::2/64.
2, the method for switching between the PMIPv6 territory under route optimization mode
Our hypothesis, MN by MAG1 and LMA1 to CN1 initiating communication, the address of LMA1 be aec0:0:0:1::1/64 at this moment, the address of MAG1 is cec0:0:0:1::1/64, MAG1 distributes an address Proxy-CoA1 to MN, Proxy-CoA1 is the address of MAG1.LMA1 distributes a home address network prefix MN-HNP1 to MN, and the binding of having set up MN-HNP1 and Proxy-CoA1 in LMA1, MN has configured address HoA1 according to MN-HNP1, and HoA1 is aea0:0:0:1::2/64, and with in the communicating by letter of CN1, HoA1 is used as to home address and uses.The address of CN1 is eec0:0:0:1::1/64.After switching between MN territory, the address of LMA2 is bec0:0:0:1::1/64, and the address of MAG2 is dec0:0:0:1::1/64, and the address of HoA2 is bea0:0:0:1::2/64, and the address of the new communication node CN2 initiating after MN switches is fec0:0:0:1::1/64.
(1) MN leaves MAG1, and MAG1 sends DeReg PBU message to LMA1, and the source address of message is cec0:0:0:1::1/64, and destination address is aec0:0:0:1::1/64;
(2) LMA1 receives DeReg PBU message, removes the binding of MN-HNP1 and Proxy-CoA1, and replys PBA message to MAG1, and the source address of message is aec0:0:0:1::1/64, and destination address is cec0:0:0:1::1/64;
(3) MN is by RS message access MAG2.
(4) MAG2 receives after RS message, to aaa server, sends query messages.Aaa server is received after query messages, carries out necessary authentication, then to MAG2, transmits a reply message.Reply the address that comprises LMA2 in message.
(5) MAG2 receives after the reply message of aaa server, for MN distributes an address Proxy-CoA2, and sends PBU message to LMA2, comprises Proxy-CoA2 in message, and Proxy-CoA2 is the address of MAG2.The source address of PBU message is dec0:0:0:1::1/64, and destination address is bec0:0:0:1::1/64.
(4) LMA2 receives after PBU message, for MN distributes an address MN-HNP2, and the binding of setting up MN-HNP2 and Proxy-CoA2.LMA2 replys PBA message to MAG2, comprises MN-HNP2 in message, and the source address of PBA message is bec0:0:0:1::1/64, and destination address is dec0:0:0:1::1/64;
(5) MAG2 receives after PBA message, by RA message, MN-HNP2 is informed to MN;
(6) MN receives after RA message, utilizes MN-HNP2 configuration HoA2, and the address of HoA2 is bea0:0:0:1::2/64;
(7) MN sends BU message to LMA1.The destination address of BU message is aec0:0:0:1::1/64, and source address is bea0:0:0:1::2/64, and in message, HoA1 is inserted in home address territory, and HoA2 is inserted in Care-of Address territory.BU message mails to LMA1 through the tunnel between MAG2 and LMA2.
(8) LMA1 receives the binding of setting up HoA1 and HoA2 after BU message, and replys BA message to MN.The destination address of BA message is bea0:0:0:1::2/64, and source address is aec0:0:0:1::1/64.BA message mails to LMA2, and LMA2 extracts MN-HNP2 from HoA2, searches the binding of MN-HNP2 and Proxy-CoA2 according to MN-HNP2, then by the tunnel between LMA2 and MAG2, BA message is mail to MN.
(9) MN sends HoTI message and CoTI message to CN1.The destination address of HoTI message is CNA1, and source address is HoA1, and in message, HoA1 is filled out in home address territory, and HoA2 is filled out in Care-of Address territory.MN need to encapsulate HoTI message.HoTI message after encapsulation, destination address is the address of LMA1, source address is HoA2.HoTI message after encapsulation mails to LMA1 through the tunnel between MAG2 and LMA2.The HoTI message of LMA1 after to the encapsulation of receiving is carried out decapsulation, obtains HoTI message, then HoTI message is mail to CN1.The destination address of CoTI message is CNA1, and source address is HoA2, and in message, HoA1 is filled out in home address territory, and HoA2 is filled out in Care-of Address territory.CoTI message mails to CN1 through the tunnel between MAG2 and LMA2.
(10) CN1 receives after HoTI message and CoTI message, through necessary authentication, then to MN, replys HoT message and CoT message.The destination address of HoT message is HoA1, and source address is CNA1.HoT message mails to LMA1.LMA1 receives after HoT message, searches the binding of HoA1 and HoA2 according to HoA1, then HoT message is encapsulated.HoT message after encapsulation, destination address is HoA2, source address is the address of LMA1.HoT message after encapsulation mails to LMA2.LMA2 extracts MN-HNP2 from HoA2, searches the binding of MN-HNP2 and Proxy-CoA2 according to MN-HNP2, then by the tunnel between LMA2 and MAG2, the HoT message after encapsulation is mail to MN.The destination address of CoT message is HoA2, and source address is CNA1.CoT message mails to LMA2.LMA2 extracts MN-HNP2 from HoA2, searches the binding of MN-HNP2 and Proxy-CoA2 according to MN-HNP2, then by the tunnel between LMA2 and MAG2, CoT message is mail to MN.
(11) MN receives after HoT message and CoT message, to CN1, sends BU message.The destination address of BU message is CNA1, and source address is HoA2, and in message, HoA1 is filled out in home address territory, and HoA2 is filled out in Care-of Address territory.BU message mails to CN1 through the tunnel between MAG2 and LMA2.
(12) CN1 receives after BU message, and the address binding that oneself is maintained is updated to the binding of HoA1 and HoA2, then to MN, replys BA message.The destination address of BA message is HoA2, source address CNA1.BA message mails to LMA2, then through the tunnel between LMA2 and MAG2, mails to MN.
(13) MN mails to the data message of CN1, and destination address is CNA1, and source address is HoA2, and home address option extension head is filled out HoA1.The data message that MN mails to CN1 directly mails to CN1 through the tunnel between MAG2 and LMA2.
CN1 mails to the data message of MN, and destination address is HoA2, and source address is CNA1, and Equations of The Second Kind route head is filled out HoA1.The data message that CN1 mails to MN mails to LMA2.LMA2 extracts MN-HNP2 from HoA2, searches the binding of MN-HNP2 and Proxy-CoA2 according to MN-HNP2, then by the tunnel between LMA2 and MAG2, data message is mail to MN.
(14) while communicating with new communication node CN2 after having switched between MN territory, the source data packet address of being mail to CN2 by MN is HoA2, and destination address is CNA2; The source data packet address of being mail to MN by CN2 is CNA2, and destination address is HoA2.

Claims (4)

1. a method of switching between proxy mobile IPv 6 territory, is characterized in that:
A, under non-route optimization mode, mobile node MN is from a local mobile anchor LMA1 is switched to another local mobile anchor LMA2, MN registers to LMA2, obtain new home address HoA2, on LMA1, set up the binding of original home address HoA1 and HoA2, then, MN will forward through LMA1 with communicating by letter of communication node CN1 before switching;
B, under route optimization mode, before switching generation, CN1 maintains the address binding of HoA1 and HoA1, the data message that MN sends to CN1, destination address is the address of CN1, source address is HoA1, and home address option extension head is filled out HoA1, and CN1 mails to the data message of MN, destination address is HoA1, source address is the address of CN1, and Equations of The Second Kind route head is filled out HoA1, after switching generation, MN will set up the binding of HoA1 and HoA2 on LMA1, also the address binding of CN1 to be changed to the binding of HoA1 and HoA2, then, the mutual direct communication of MN and CN1;
C, after having switched between territory, if MN by LMA2 to new communication node CN2 initiating communication, no matter be under non-route optimization mode, or under route optimization mode, all HoA2 both as home address, also as Care-of Address.
2. method according to claim 1, is characterized in that described steps A specifically comprises:
A1, MN are switched to after LMA2, the home network address prefix distributing according to LMA2 configures after new home address HoA2, then to LMA1, send BU message, the destination address of BU message is the address of LMA1, source address is HoA2, in message, HoA1 is inserted in home address territory, and HoA2 is inserted in Care-of Address territory, and BU message mails to LMA1 through the IAD MAG2 in LMA2 territory and the tunnel between LMA2;
A2, LMA1 receive the binding of setting up HoA1 and HoA2 after BU message, and reply BA message to MN, and the destination address of BA message is HoA2, and source address is the address of LMA1, and BA message mails to LMA2, and LMA2 mails to MN by the tunnel between MAG2 and LMA2 BA message;
After A3, switching, MN mails to the data message of CN1, destination address is the address of CN1, source address is HoA1, MN will encapsulate data message, the data message after encapsulation, and destination address is the address of LMA1, source address is HoA2, data message after encapsulation mails to LMA1 through the tunnel between MAG2 and LMA2, and LMA1, to the data message decapsulation of receiving, then mails to CN1 the data message after decapsulation;
A4, CN1 mail to the data message of MN, and destination address is HoA1, and source address is the address of CN1, such data message mails to LMA1, LMA1 receives after data message, and the binding of searching HoA1 and HoA2 according to HoA1, then encapsulates data message, data message after encapsulation, destination address is HoA2, and source address is the address of LMA1, and the data message after encapsulation mails to LMA2, LMA2, by the tunnel between LMA2 and MAG2, mails to MN the data message after encapsulation.
3. method according to claim 1, is characterized in that described step B specifically comprises:
B1, MN are switched to after LMA2, the home network address prefix distributing according to LMA2 configures after new home address HoA2, then to LMA1, send BU message, the destination address of BU message is the address of LMA1, source address is HoA2, in message, HoA1 is inserted in home address territory, and HoA2 is inserted in Care-of Address territory, and BU message mails to LMA1 through the tunnel between MAG2 and LMA2;
B2, LMA1 receive the binding of setting up HoA1 and HoA2 after BU message, and reply BA message to MN, and the destination address of BA message is HoA2, and source address is the address of LMA1, and BA message mails to LMA2, and LMA2 mails to MN by the tunnel between MAG2 and LMA2 BA message;
B3, MN receives after BA message, to CN1, send HoTI message and CoTI message, the destination address of HoTI message is CNA1, source address is HoA1, in message, HoA1 is filled out in home address territory, HoA2 is filled out in Care-of Address territory, MN need to encapsulate HoTI message, HoTI message after encapsulation, destination address is the address of LMA1, source address is HoA2, HoTI message after encapsulation mails to LMA1 through the tunnel between MAG2 and LMA2, the HoTI message of LMA1 after to the encapsulation of receiving is carried out decapsulation, obtain HoTI message, then HoTI message is mail to CN1, the destination address of CoTI message is CNA1, source address is HoA2, in message, HoA1 is filled out in home address territory, HoA2 is filled out in Care-of Address territory, CoTI message mails to CN1 through the tunnel between MAG2 and LMA2,
B4, CN1 receives after HoTI message and CoTI message, through necessary authentication, then to MN, reply HoT message and CoT message, the destination address of HoT message is HoA1, source address is CNA1, HoT message mails to LMA1, LMA1 receives after HoT message, according to HoA1, search the binding of HoA1 and HoA2, then HoT message is encapsulated, HoT message after encapsulation, destination address is HoA2, source address is the address of LMA1, HoT message after encapsulation mails to LMA2, LMA2 by and LMA2 and MAG2 between tunnel encapsulation after HoT message mail to MN, the destination address of CoT message is HoA2, source address is CNA1, CoT message mails to LMA2, LMA2 mails to MN by the tunnel between LMA2 and MAG2 CoT message,
B5, MN receive after HoT message and CoT message, to CN1, send BU message, and the destination address of BU message is CNA1, source address is HoA2, in message, HoA1 is filled out in home address territory, and HoA2 is filled out in Care-of Address territory, and BU message mails to CN1 through the tunnel between MAG2 and LMA2;
B6, CN1 receive after BU message, and the address binding that oneself is maintained is updated to the binding of HoA1 and HoA2, then to MN, replys BA message, the destination address of BA message is HoA2, source address CNA1, BA message mails to LMA2, then through the tunnel between LMA2 and MAG2, mails to MN;
After B7, switching, MN mails to the data message of CN1, and destination address is CNA1, and source address is HoA2, and home address option extension head is filled out HoA1, and the data message that MN mails to CN1 directly mails to CN1 through the tunnel between MAG2 and LMA2;
B8, CN1 mail to the data message of MN, and destination address is HoA2, and source address is CNA1, and Equations of The Second Kind route head is filled out HoA1, and the data message that CN1 mails to MN mails to LMA2, and LMA2 mails to MN by the tunnel between LMA2 and MAG2 data message.
4. method according to claim 1, is characterized in that described step C specifically comprises:
C1, under the pattern of non-routing optimality, MN mails to the data message of CN2, destination address is the address of CN2, source address is HoA2, the data message that MN mails to CN2 mails to CN2 through the tunnel between MAG2 and LMA2; CN2 mails to the data message of MN, and destination address is HoA2, and source address is the address of CN2, and the data message that CN2 mails to MN is intercepted and captured by LMA2, and mails to MN by the tunnel between LMA2 and MAG2;
C2, under the pattern of routing optimality, CN2 will set up the address binding of HoA2 and HoA2, MN mails to the data message of CN2, destination address is the address of CN2, source address is HoA2, home address option extension head is filled out HoA2, the data message that MN mails to CN2 mails to CN2 through the tunnel between MAG2 and LMA2, CN2 mails to the data message of MN, destination address is HoA2, and source address is the address of CN2, and Equations of The Second Kind route head is filled out HoA2, the data message that CN2 mails to MN is intercepted and captured by LMA2, and mails to MN by the tunnel between LMA2 and MAG2.
CN201110378780.XA 2011-11-23 2011-11-23 Inter-domain switching method of proxy mobile IPv6 (Internet Protocol Version 6) Expired - Fee Related CN102378284B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201110378780.XA CN102378284B (en) 2011-11-23 2011-11-23 Inter-domain switching method of proxy mobile IPv6 (Internet Protocol Version 6)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201110378780.XA CN102378284B (en) 2011-11-23 2011-11-23 Inter-domain switching method of proxy mobile IPv6 (Internet Protocol Version 6)

Publications (2)

Publication Number Publication Date
CN102378284A CN102378284A (en) 2012-03-14
CN102378284B true CN102378284B (en) 2014-03-19

Family

ID=45796066

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201110378780.XA Expired - Fee Related CN102378284B (en) 2011-11-23 2011-11-23 Inter-domain switching method of proxy mobile IPv6 (Internet Protocol Version 6)

Country Status (1)

Country Link
CN (1) CN102378284B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105376230B (en) * 2015-11-16 2018-05-04 东北大学 A kind of HMIPv6 network bi-directional access authentication methods of oriented multilayer MAP
CN109729520B (en) * 2017-10-31 2020-09-29 华为技术有限公司 Method and apparatus for wireless communication

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101400045A (en) * 2007-09-30 2009-04-01 华为技术有限公司 Method, system for forwarding packet and anchor point device

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR100885748B1 (en) * 2007-08-07 2009-02-26 포스데이타 주식회사 Method and Apparatus for supporting Mobile IPv6 service in Wireless Communication Network

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101400045A (en) * 2007-09-30 2009-04-01 华为技术有限公司 Method, system for forwarding packet and anchor point device

Non-Patent Citations (4)

* Cited by examiner, † Cited by third party
Title
An Approach for Building Scalable Proxy Mobile IPv6 Domains;Hongbin Luo等;《IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT》;20110930;第8卷(第3期);第176-182页 *
Hongbin Luo等.An Approach for Building Scalable Proxy Mobile IPv6 Domains.《IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT》.2011,第8卷(第3期),第176-182页.
任三阳等.基于PM IPv6的域间切换管理方法及性能分析.《计算机应用研究》.2010,第27卷(第3期),第1118-1121页.
基于PM IPv6的域间切换管理方法及性能分析;任三阳等;《计算机应用研究》;20100331;第27卷(第3期);第1118-1121页 *

Also Published As

Publication number Publication date
CN102378284A (en) 2012-03-14

Similar Documents

Publication Publication Date Title
CN101810015B (en) Traffic localization with proxy mobility
CN100596095C (en) Hierarchical mobility IPv6 rapid switching method and system
CN101686576B (en) Mobile terminal device and hand-off method thereof
JP4968328B2 (en) Mobile IP communication system, mobile IP communication apparatus, and mobile IP communication method
US20100103876A1 (en) Mobile terminal and communication management device
JP5079866B2 (en) Mobile communication terminal, location management device, mobile communication terminal communication method, and location management device registration method
US20120201222A1 (en) System and protocols for inter-mobility access gateway tunneling for fast handoff transition
US8824353B2 (en) Mobility route optimization in a network having distributed local mobility anchors
CN102547890A (en) Intra-domain switching method for proxy mobile IPv6 (Internet protocol version 6) based on AAA server
CN101822081A (en) Support for multi-homing protocols
CN102868612A (en) Mobility realization method based on LISP and tunnel router
CN102378284B (en) Inter-domain switching method of proxy mobile IPv6 (Internet Protocol Version 6)
CN102664970A (en) Method for hierarchical mobile IPV6 based on mobile sub-net
CN102158564B (en) Optimized communication method of mobile node in proxy mobile IPv6 (Internet Protocol Version 6) domain and communication node in mobile IPv6 domain
CN102630084A (en) Agent mobile IPv6 (Internet Protocol Version 6) inter-domain switching method based on network mobility management
KR100700526B1 (en) Method for handover on mobility network
KR101225640B1 (en) AN ENHANCED ROUTE OPTIMIZATION SCHEME FOR MUTIPLE LMAs IN PMIPv6 DOMAIN
CN102572790A (en) Distributed mobile IPV6 (Internet Protocol Version 6) method based on AR (Access Router) level
Zhong et al. EFLoM: An Efficient Framework for Local Mobility
CN103906155A (en) Proxy mobile IPv6 group switching solving method based on link layer grouping
KR20060125392A (en) Hand off excution method for mobile internet protocol
CN104410729A (en) Distributed PMIPv6 deployment system and communication method
KR20090058367A (en) System and method for supporting mobility to provide personalized service based on ipv6 between different wireless networks

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20140319

Termination date: 20141123

EXPY Termination of patent right or utility model