WO2005107161A1 - Systeme et procede de communications d'un reseau de telecommunications ip et leur application - Google Patents

Systeme et procede de communications d'un reseau de telecommunications ip et leur application Download PDF

Info

Publication number
WO2005107161A1
WO2005107161A1 PCT/CN2005/000594 CN2005000594W WO2005107161A1 WO 2005107161 A1 WO2005107161 A1 WO 2005107161A1 CN 2005000594 W CN2005000594 W CN 2005000594W WO 2005107161 A1 WO2005107161 A1 WO 2005107161A1
Authority
WO
WIPO (PCT)
Prior art keywords
network
address
packet
multicast
edge gateway
Prior art date
Application number
PCT/CN2005/000594
Other languages
English (en)
French (fr)
Inventor
Lintao Jiang
Zhuhua Hu
Yufa Ma
Wenhong Liu
Linwei Jiang
Original Assignee
Beijing Jiaxun Feihong Electrical Co., Ltd.
China Academy Of Telecom Research, Mii
Yuanchuang Xintong Technology Of Telecom (Beijing) Co., Ltd.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from CN 200410037641 external-priority patent/CN1251450C/zh
Priority claimed from CNB2004100499459A external-priority patent/CN100393064C/zh
Priority claimed from CNB2004100497078A external-priority patent/CN100566325C/zh
Priority claimed from CNB2004100497082A external-priority patent/CN100444576C/zh
Priority claimed from CNB2004100626524A external-priority patent/CN100359876C/zh
Priority claimed from CNB2004100705028A external-priority patent/CN100393065C/zh
Priority claimed from CNB2004100917765A external-priority patent/CN100514930C/zh
Priority claimed from CNB2005100087877A external-priority patent/CN100433678C/zh
Priority claimed from CNB2005100087881A external-priority patent/CN100414907C/zh
Priority to US11/587,810 priority Critical patent/US7894458B2/en
Priority to EP05752258A priority patent/EP1748600A4/en
Application filed by Beijing Jiaxun Feihong Electrical Co., Ltd., China Academy Of Telecom Research, Mii, Yuanchuang Xintong Technology Of Telecom (Beijing) Co., Ltd. filed Critical Beijing Jiaxun Feihong Electrical Co., Ltd.
Publication of WO2005107161A1 publication Critical patent/WO2005107161A1/zh

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/46Interconnection of networks
    • H04L12/4641Virtual LANs, VLANs, e.g. virtual private networks [VPN]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/02Details
    • H04L12/16Arrangements for providing special services to substations
    • H04L12/18Arrangements for providing special services to substations for broadcast or conference, e.g. multicast
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L61/00Network arrangements, protocols or services for addressing or naming
    • H04L61/09Mapping addresses
    • H04L61/10Mapping addresses of different types
    • H04L61/106Mapping addresses of different types across networks, e.g. mapping telephone numbers to data network addresses
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2101/00Indexing scheme associated with group H04L61/00
    • H04L2101/60Types of network addresses
    • H04L2101/677Multiple interfaces, e.g. multihomed nodes

Definitions

  • IP telecommunication network system IP telecommunication network communication method and application thereof
  • the invention relates to an IP telecommunication network system, and also relates to a communication method used by the IP telecommunication network system, a method for implementing a virtual private network (hereinafter referred to as VPN) and a multicast function based on the IP telecommunication network system, and an IP telecommunication network.
  • VPN virtual private network
  • the method for resource management in the system belongs to the field of communication technology. Background technique
  • IP networks In some areas of the existing telecommunications network, attempts have been made to use IP networks to carry telecommunication services. This attempt has been partially successful, such as the IP phones that are commonly used today. However, the telecommunication service itself has high requirements for security and quality of service (QoS).
  • QoS quality of service
  • the Internet is a free and open network without a unified management mechanism. Its design philosophy is to provide users with a free and convenient work platform as much as possible. The network does not interfere with the user's work as much as possible. To maintain the survival of the network, a certain network access fee is charged. To this end, there are certain management mechanisms such as user authentication, and the rest of the network operator does not care.
  • next generation telecommunication network will be an IP network, but it is an IP telecommunication network that is very different from the existing IP network based on the Internet design concept.
  • IP telecommunication network must fully absorb the technical advantages brought by the non-connection-oriented IP network, on the other hand, it must be able to fully meet the high requirements of security and service quality of telecommunication services.
  • the object of the present invention is to provide a complete technical solution for realizing an IP telecommunication network.
  • the technical solution includes the basic architecture of the IP telecommunication network system and a method for implementing communication, a method for implementing a virtual private network and a multicast function based on the IP telecommunication network system, a method for resource management in the IP telecommunication network system, and a packet transmitted therein.
  • the present invention adopts the following technical solutions:
  • IP telecommunication network is a non-connection-oriented system based on the IP protocol, and is characterized in that the IP telecommunication network system is a system with a dual address structure, and the system includes at least one multiple address connectionless data A network, a plurality of IP networks, and a plurality of edge gateway devices, where the IP network is connected to the multiple-site connectionless data network through the edge gateway device;
  • Each of the multiple-address connectionless data networks further includes at least one address mapping device; the edge gateway device completes the mapping between the dual addresses through the address mapping device.
  • All the devices in the multiple-address connectionless data network and the edge gateway device are assigned a multiple-address connectionless data network address, and all devices in the IP network and the edge gateway device are assigned IP addresses, A mapping relationship between the IP address and the multiple address connectionless data network address is stored in an address mapping table in the address mapping device;
  • the edge gateway device is authenticated to establish a connection with the address mapping device.
  • the multiple-site connectionless data network has a hierarchical architecture and has a network management device for global management therein.
  • the multiple-site connectionless data network is divided into three layers: a core layer, an aggregation layer, and an access layer, and the core layer, the aggregation layer, and the access layer are respectively composed of a plurality of core layer devices, an aggregation layer device, and an access layer device. It is constituted that each access layer device is connected to at least one edge gateway device and is connected upward to an aggregation layer device; the aggregation layer device and core layer device are connected, the core layer device is connected to each other; the multiple address
  • the connectionless data network also has a network management device and an address mapping device, and the network management device simultaneously manages the access layer device, the aggregation layer device, and the core layer device.
  • the multiple-site connectionless data network establishes a connection with the IP network via the edge gateway device, and a trust relationship is established between the devices.
  • the address of the multiple-address connectionless data network uses the address of the multiple-address connectionless data network itself, and the allocation of the addresses of the multiple-address connectionless data network follows the address allocation rules according to the regional hierarchy.
  • the edge gateway device aggregates service flows from the IP network, and forwards the traffic to the destination edge gateway device on the other side of the data network, and the destination edge gateway device sends the device to the destination end IP network.
  • the IP network and the multiple-site connectionless data network are strictly separated in topology, and are connected through the edge gateway device.
  • the multiple-site connectionless data network has two connection-oriented (tunnel-oriented) and non-connection-oriented operating modes. In both operating modes, deterministic routing is used.
  • the edge gateway device is registered with the address mapping device after authentication, and transmits an address mapping relationship table to the address mapping device;
  • the source edge gateway device receives the IP packet from the IP network and sends the IP destination address in the IP packet to the address mapping device;
  • the address mapping device performs address resolution and mapping between the IP destination address of the IP network and the address of the multi-connection unconnected data network, and returns the data network address of the destination edge gateway device to the source edge gateway device;
  • the source edge gateway device sends a packet to the destination edge gateway device according to the multiple address connectionless data network address
  • the destination edge gateway device receives the packet and forwards the packet to the IP network according to the destination IP address.
  • All the devices in the multiple-address connectionless data network are addressed using the multiple-address connectionless data network address, and the packets transmitted in the multiple-address connectionless data network have a complete multiple-address connectionless data network address.
  • the address mapping relationship in step (2) refers to the mapping relationship between the data network address of the edge gateway device and the IP addresses of all the devices in the IP network connected to the edge gateway device.
  • the source edge gateway device transmits the message to the access layer device to which it belongs, and then forwards the message to the convergence layer.
  • the aggregation layer device judges whether it is forwarded to the access layer device to which it belongs according to the multiple address connectionless data network address, and sends it directly to the access layer device, and the access layer device then according to the multiple address connectionless data network address Sent to the edge gateway device of the destination.
  • the source edge gateway device transmits the message to the access layer device to which it belongs, and then forwards the message to the aggregation layer device, and the aggregation layer device. Forward it to the core layer device, which determines that it is forwarded to the access layer device to which it belongs according to the address of the multi-connection connectionless data network address, and then sends it to the access layer device through the aggregation layer device, and the access layer device And sending it to the destination edge gateway device according to the multiple address connectionless data network address.
  • the messages from the source edge gateway device are aggregated layer by layer, from the access layer device and the aggregation layer.
  • the device is forwarded to the core layer device, and then forwarded to other multiple-site connectionless data networks after passing through the core device, and then forwarded from the core layer device to the destination edge gateway device layer by layer in the other multiple-site connectionless data network.
  • a method for implementing communication in a tunnel mode in an IP telecommunication network system characterized in that: a network management device in the IP telecommunication network establishes a tunnel in a multiple-address connectionless data network, and the tunnel is an edge gateway at both ends A logical virtual circuit established between the device and a node device located in the middle;
  • the IP packet carrying the user communication service reaches the source edge gateway device of the tunnel through the IP network, and after address resolution and mapping, it is converted into a link frame in the multiple-address connectionless data network, transmitted along the tunnel, and arrives at the destination. After the gateway device at the destination end of the tunnel is described, the IP packet is restored to be transmitted outward.
  • connection identifier is used for addressing.
  • the source edge gateway device replaces the multiple address connectionless data network address therein with the connection identifier between the edge gateway device and the next-level network node to form a multiple address connectionless connection.
  • the link frame of the multiple address connectionless data network reaches the destination edge gateway device in this way, and the connection identifier is restored to the multiple address connectionless data network address at the destination edge gateway device.
  • the process of tunnel establishment includes the following steps:
  • the user submits an application for establishing a tunnel to the network management device, and the network management device approves the application;
  • the network management device sends a tunnel establishment command to the edge gateway device at the source end of the tunnel
  • the edge gateway device at the source After receiving the command, the edge gateway device at the source sends a request to establish a tunnel connection to the edge gateway device at the destination.
  • each node of the multiple-site unconnected data network node makes a judgment based on its own resources
  • the destination edge gateway device sends a response to the request to the source edge gateway device;
  • the source edge gateway device returns a tunnel establishment confirmation response to the network management device after receiving a response from the destination edge gateway device;
  • the network management device receives a tunnel establishment confirmation response, and the tunnel establishment is successful.
  • a method for implementing a virtual private network in an IP telecommunication network system which is characterized by including the following steps:
  • the user submits an application for establishing a virtual private network to the network management device, and submits a flow and flow direction table required for establishing the virtual private network;
  • the network management device determines the virtual private network number for the accepted application
  • the address mapping device generates a node address mapping table including the virtual private network number
  • the network management device sends a configuration command to the node device of the unconnected data network or the edge gateway device connected to the node based on the traffic and flow direction table, and the node device and the edge gateway device are allowed under the condition of resources. Accept the configuration command to establish a virtual private network.
  • the network management device calculates a link resource requirement table between corresponding nodes of the multiple-site connectionless data network according to the flow and flow direction table, and according to the calculation result, the network management device adds the multiple-site connectionless data network to the multiple-site connectionless data network.
  • the network management device send link resources including virtual private network number T N2005 / 000594 configuration command to establish a virtual private network accordingly.
  • the network management device sends a virtual private network configuration command to the relevant edge gateway device according to the traffic and flow direction table, and the source edge gateway device sends a virtual private network configuration request to the destination edge gateway device according to the route of the multiple-site connectionless data network. This establishes a virtual private network.
  • the submitted traffic and flow direction table is the traffic and flow direction table of the nodes in the IP network, and the network management device obtains each IP network through the address mapping device.
  • the address of the edge gateway device connected to the node is used to convert the flow and flow direction table into the flow and flow direction table between the edge gateway devices. If the user is a user in a multi-site connectionless data network, the submitted traffic and flow direction table is the traffic and flow direction table between the edge gateway devices.
  • the communication process includes the following steps:
  • the source edge gateway device sends a multiple-address connectionless data network packet to the destination edge gateway device.
  • the source edge gateway device sends an address mapping device containing the destination edge gateway.
  • the address mapping request command for parameters such as device address;
  • the address mapping device receives the address mapping request command. If the source edge gateway device address and the destination edge gateway device address belong to the same virtual private network, the source edge gateway device Send a response command including the virtual private network number, service type, and destination edge gateway device address parameters;
  • the source edge gateway device receives the response command, generates a multiple-address connectionless data network packet including the virtual private network number and service class parameters, and sends it to the destination edge gateway device;
  • the node devices in the multiple-connection unconnected data network transmit the packet within the scope of the resources assigned by the virtual private network according to the virtual private network number, service type, and destination edge gateway device address of the packet;
  • the destination edge gateway device receives the packet from the multiple address connectionless data network and sends it to the destination.
  • the communication process includes the following steps:
  • the source IP device sends an IP packet to the destination IP device
  • the source edge gateway device sends an address mapping request command including the destination IP address to the address mapping device;
  • the address mapping device receives the command. For example, the source IP address and the destination IP address belong to the same command.
  • a virtual private network send a response command including the virtual private network number, service type, and destination edge gateway device address parameters to the source edge gateway device;
  • the source edge gateway device receives the response command, forms a multiple-address connectionless data network packet with a virtual private network number and a service class, and sends it to the destination edge gateway device device;
  • the node devices in the multiple-connection unconnected data network are based on the virtual private network number, service type, and destination edge gateway device address in the multiple-connection unconnected data network packet.
  • the destination edge gateway device receives the packet of the duplicate address connectionless data network, recovers the destination IP address, reassembles it into an IP packet, and sends it to the destination.
  • a method for implementing multicast in an IP telecommunication network system, for implementing multicast initiated by a user to a network management device, the implementation of the multicast includes (1) a multicast application; (3 ⁇ 4 establishment of a multicast tree; ) Multicast communication; (4) Four steps of multicast termination, which are characterized in the implementation of multicast:
  • the user applies to the network management device to establish multicast.
  • the network management device instructs multiple addresses to set up a connectionless data network node device.
  • the network management device instructs the address mapping device to establish a multicast association table and construct a multicast tree.
  • a method for implementing multicast in an IP telecommunication network system for implementing multicast initiated by a user of an IP network includes (1) multicast notification; (2) establishment of a multicast tree; (3) group (4) The four steps of multicast termination are characterized in the multicast implementation process:
  • the edge gateway device and the address mapping device in the multiple-address connectionless data network implement conversion between a multicast packet using an IP address and a multicast packet using a multiple-address connectionless data network address.
  • a link alarm level and a resource threshold corresponding to the alarm level are set, and once a resource used by a user of the virtual private network exceeds the link alarm threshold, the node device alarms the network management device, The network management device notifies the address mapping device of the alarm information;
  • the edge gateway device connected to it first queries the address mapping device for the resource usage status of the user, and the connection can be established only if there is no alarm information in the address mapping device, otherwise it is rejected establish connection.
  • step 2) further includes the following steps:
  • the node device When the resources used by users of a certain service category do not exceed the link alarm threshold of the service category, the node device does not send an alarm message; when the resources used by users of a certain service category exceed the link alarm threshold of the service category, or A user of a service category virtual private network exceeds the virtual private network link alarm threshold, and the node device sends alarm information to the network management device;
  • the network management device notifies the address mapping device of the alarm information including the service category, virtual private network number, and alarm level parameters.
  • the step 3) further includes the following steps.-1) Once the user requests to establish a communication link, the edge gateway device first queries the address mapping device for the resource usage status of the user or the service network, for example, the address mapping device indicates the user or service. There is no link alarm for the network, and communication is established according to normal business processes;
  • the address mapping device finds the user or service network link alarm, the address mapping device will send a resource retrieval request to the network management device to query whether there is a link alarm for the link that this communication connection has passed.
  • Link alarm The address mapping device indicates that the user or service network does not have a link alarm. Communication is established according to the normal business process. If the link alarm passes, the address mapping device indicates that the user or the service network link alarm. The communication cannot be performed. set up.
  • the edge gateway device connected to it sends a signal with resource request parameters to the relevant nodes in the specific virtual private network, and the resources at each node are In the case that can be satisfied, the connection is allowed to be established to ensure the user's resource requirements.
  • a connection needs to be established in the virtual private network applied for by users who need to use resources, and the resource used by the connection is deducted from the resource table of the virtual private network applied for;
  • connection establishment process if the resources belonging to the virtual private network among the nodes along the route cannot meet the resources required by the connection, the connection cannot be established.
  • An encapsulation method for a multiple-address connectionless data network packet in an IP telecommunication network system which is characterized by including the following steps:
  • the edge gateway device sets the value of the packet type field according to whether it is a data packet or a control packet;
  • the edge gateway device determines the service type according to the characteristics of the bearer service network, and sets the value of the service category field;
  • the edge gateway device determines whether the incoming data packet needs header compression, and if necessary, proceeds to step D, otherwise proceeds to step G;
  • G Set the source address and destination address.
  • step B the method further includes the following steps:
  • the edge gateway device determines whether the data packet belongs to a certain VPN, and if so, proceeds to step C2); if not, proceeds to step C;
  • C3 set the value of the virtual private network number field; go to step? .
  • Step C3) includes setting a virtual private network flag field, and a multiple-address connectionless data network packet having the same origin, the same destination address, and the same service class, setting the extended header flag field of the packet, and marking the Different virtual private network number values, and the virtual private network number field is placed in the extended header.
  • step B the following steps are further included:
  • the edge gateway device ED determines whether the incoming data packet belongs to a certain multicast group, and if so, proceeds to step C12); if not, proceeds to step C;
  • step C14 set the value of the first packet flag field; if it is the first packet of the multicast service, the next step goes to step C15), if not, then go to step F);
  • At the source edge gateway device group the first packet with the same source address, the same destination address, and the same service category, and set the first packet flag, the packet compression flag not set, and assign the flow sequence number to determine the value; Subsequent grouping with the same destination address and the same business category, without marking the first packet Bit, the packet compression flag is set, and the value of the stream number is set.
  • the first packet of the same source address, the same destination address, and the same service category is grouped into IP packets as the payload of the multiple-address connectionless data network packet; the same source address, the same destination address, For subsequent packets of the same service category, only the payload of the IP packet is included in the payload of the multiple-address connectionless data network packet, excluding the IP header.
  • a method for header compression of a packet transmitted in an IP telecommunication network system includes the following steps:
  • IP network users send IP packets
  • the edge gateway device puts the IP packet including the IP header as the payload of the multiple-address connectionless data network packet; sends the multiple-address connectionless data network packet;
  • the packet whose header contains the same source IP address, same destination address, and same service class information as the first IP packet is determined to be a subsequent IP packet, and its corresponding multiple address is no connection data.
  • the first packet flag of the header of the network packet is not set, the packet compression flag is set, and the flow flag is determined, and then the source edge gateway device only puts the payload of the subsequent IP packet into the multiple address connectionless data network packet.
  • the destination edge gateway device determines whether it is the first packet according to the first packet mark and the header compression mark in the header of the received multiple-address connectionless data network packet;
  • the destination edge gateway device sends an IP packet to the IP network according to the IP address.
  • the technical solution of the present invention can realize an IP telecommunication network as a next-generation telecommunication network.
  • the IP telecommunications network is characterized by: 1. Possesses rich address resources and can support the sustainable development of telecommunication networks;
  • the network provides trust and security mechanisms and is a secure and trusted network
  • the Internet With the flexibility of the Internet, it can provide all the services of the existing Internet, and has the high stability, reliability and high manageability of the telecommunications network, and can autonomously schedule all network resources according to the operator's design requirements for the service To ensure the quality of service of existing telecommunication services and possible future services.
  • Figure 1 is a schematic diagram of the macro system of the IP telecommunication network system.
  • Figure 2 is a schematic diagram of the structure of an IP telecommunication network system.
  • Figure 3 shows the data communication method of the IP telecommunication network.
  • Figure 4 is a schematic diagram of establishing a tunnel connection in an IP telecommunication network system.
  • Figure 5 is a schematic diagram of the work flow of the tunnel establishment process.
  • FIG. 6 is a schematic diagram of a process of exchanging a connection identifier (ID) between different nodes during a packet transmission in a tunnel.
  • ID connection identifier
  • FIG. 7 is a flowchart of a method for implementing a VPN in an IP telecommunication network system.
  • FIG. 8 is a flowchart of a first technical solution for establishing an NCT VPN.
  • FIG. 9 is a flowchart of a second technical solution for establishing an NCT VPN.
  • FIG. 10 is a flowchart of the communication process in NCT VPN.
  • FIG 11 is a flowchart of the communication process in IP VPN.
  • Figure 12 is a flowchart of the VPN revocation process.
  • FIG. 13 is a flowchart of a method for implementing a multicast application initiated by a user from a network management system in an IP telecommunication network system.
  • FIG. 14 is a flowchart of a multicast tree establishment process in the method shown in FIG. 13.
  • FIG. 15 is a flowchart of a multicast communication process in the method shown in FIG. 13.
  • FIG. 16 is a flowchart of a multicast termination process in the method shown in FIG. 13.
  • FIG. 17 is a flowchart of a method for implementing multicast initiated by an IP network user in an IP telecommunication network system.
  • FIG. 18 is a flowchart of a multicast notification process in the method shown in FIG. 17.
  • FIG. 19 is a flowchart of a multicast tree establishment process in the method shown in FIG. 17.
  • FIG. 20 is a flowchart of a multicast communication process in the method shown in FIG. 17.
  • FIG. 21 is a flowchart of a resource management method based on a link alarm mechanism in an IP telecommunication network system Illustration.
  • FIG. 22 is a flowchart of a resource management method based on a signaling mechanism in an IP telecommunication network system.
  • FIG. 23 is a diagram illustrating an embodiment of the NCT packet format.
  • FIG. 24 is a flowchart of a packet encapsulation method in an NCT data network.
  • FIG. 25 is a flowchart of a method for header compression of a packet in the present invention.
  • FIG. 1 is a schematic diagram of a macro system of an IP telecommunication network implemented by the present invention.
  • Multiple multiple-site unconnected data networks (hereinafter referred to as NCT data networks) are connected to each other, and each NCT data network is respectively connected to a plurality of IP networks.
  • the IP network mentioned here includes, but is not limited to, an IP metropolitan area network, an access network, or a customer premises network.
  • the thin solid line in the figure indicates the connection between each IP network and the NCT data network to which the network belongs, and the thick solid line indicates the connection between each NCT data network.
  • the IP network is strictly separated from the NCT data network in topology.
  • Each IP network needs to establish a connection with an NCT data network, and a trust relationship must be established with the NCT data network to which the IP network belongs. If the trust relationship cannot be established, the IP network and the NCT data network cannot communicate. The same is true between NCT data networks.
  • This connection mode can on the one hand ensure that IP data packets from any IP network can reach any other IP network at any time, and on the other hand, ensure that any IP data packet transmitted on the network can be fully trusted. Therefore, this connection mode not only reflects the high flexibility of the IP network, but also fully realizes the high security required by the telecommunications network.
  • FIG. 2 is a schematic structural diagram of an IP telecommunication network system according to the present invention.
  • the NCT data network and the IP network are connected through the edge gateway device ED.
  • Each NCT data network communicates through its own core layer.
  • the address of the NCT data network itself is used for addressing within the NCT data network, and the data network address is different from the IP address of the IP network.
  • the devices in the NCT data network and the edge gateway device ED are assigned NCT data network addresses, while the devices in the IP network connected to the ED device, including the ED device itself, are assigned IP addresses according to the provisions of the IP protocol, which means
  • a dual address structure is used. This dual address structure is the key to the present invention.
  • the NCT data network is the main part of the IP telecommunications network. It uses a connection-free working method.
  • the NCT data network is composed of a core layer, an aggregation layer, an access layer, a network management device, and an address mapping device, and is a hierarchical architecture.
  • the three-layer structure of the NCT data network in FIG. 2 is only exemplary, and the three-layer structure described in this embodiment is the "classic three" commonly used in existing large-scale networks such as metropolitan area networks. Layer structure ", obviously, for networks of different sizes and user needs, this layered approach can be changed, so The three-layer structure does not constitute a limitation on the protection scope of the present invention.
  • the internal address allocation of the NCT data network can be based on the current address allocation principles commonly used in telecommunications networks, that is, according to the country, province (city), region, district (county) or other address allocation rules according to regional hierarchy to achieve effective addressing. Convergence and effectiveness.
  • the core layer, aggregation layer, and access layer are composed of multiple core layer devices CR (151,
  • Each access layer device AR is connected to at least one edge gateway device ED (301, 302), and is connected to an aggregation layer device upward. All convergence layer devices are respectively connected to a plurality of access layer devices and a plurality of core layer devices. The core layer devices are connected to each other, and a connection relationship can also be established between the core layer devices in different NCT data networks.
  • the network management device 18 manages the access layer device, the aggregation layer device, and the core layer device at the same time.
  • the ADT device is a device that implements address mapping on the network. It holds an address mapping table.
  • the address mapping table can be the mapping relationship between the IP address of the external network and the NCT data network address of the edge gateway device, or the mapping relationship between the NCT data network address and the ATM address, or the NCT data network address and the frame relay (F.R ) Address mapping.
  • the content of the address mapping table depends on the type of external network connected to the edge gateway device.
  • the foregoing IP address may be an IPv4 address or an IPv6 address, or another network address based on the IP protocol.
  • An NCT data network has at least one address mapping device 19, and all edge gateway devices connected to the NCT data network must register with the foregoing address mapping device 19 and establish a connection to implement address translation.
  • the address mapping device can be configured redundantly to ensure the reliability of the system. According to requirements, the connection relationship between the access layer devices can also be established directly.
  • Edge gateway device ED is a gateway device that connects the IP network with the NCT data network. It has at least two functions. One is to implement the conversion of NCT data network address and IP address, so that the network can be used to carry the existing IP data packets. The other function is to aggregate the service flows of the IP network from the IP network. The IP packets of the external device are aggregated by the source edge gateway device ED, and forwarded to the destination edge gateway device ED on the other side of the NCT data network, and the destination edge gateway device ED is sent to the destination IP network device.
  • the functions of the edge gateway device in the IP telecommunication network system can be implemented by combining existing routers and switches. For example, for an IP network, the edge gateway device can be directly implemented by a router.
  • Each of the above edge gateway devices has a determined NCT data network address and IP address.
  • Each edge gateway device knows the IP address of the device or network to which it is connected.
  • the edge gateway device must register with the corresponding address mapping device ADT, and it must be the corresponding address mapping device
  • the ADT trusts the registration process to perform authentication to confirm the trust relationship between the edge gateway device ED and the address mapping device ADT.
  • the newly registered edge gateway device ED will store the dual address mapping relationship with the address mapping device ADT, that is, the NCT data network address of the edge gateway device and its connection to it Association of the IP address of the device or network.
  • the edge gateway device After the IP address of the device or network connected to the edge gateway device is changed, the edge gateway device sends all the associations between the IP address of the device or network to be modified and the NCT data network address of the edge gateway device to the address mapping device ADT to ensure the address
  • the mapping device ADT has a complete and correct mapping table of the IP address of the network or device and the NCT data network address of the edge gateway device.
  • Both the device in the NCT data network and the edge gateway device ED have an NCT data network address.
  • the device or network connected to the edge gateway device ED uses an IP address. It is worth noting that the device or network can also use ATM addresses or Frame Relay (F.R.) addresses, so that this NCT data network can also carry ATM data packets or Frame Relay data packets. In this embodiment, only the IP address is taken as an example for description.
  • the NCT data network uses the NCT data network address and the NCT frame structure, and uses the NCT address for addressing.
  • the NCT data network address can be allocated according to the principle of address commonly used in telecommunication networks to achieve effective convergence of the address.
  • All devices in the NCT data network are assigned NCT addresses, and each edge gateway device ED is identified by an NCT address.
  • the header of each packet in the NCT data network has a complete NCT address, and devices in the NCT data network perform routing selection based on the NCT address.
  • Step 2) The edge gateway device registers with the address mapping device after authentication, and transmits an address mapping relationship table to the address mapping device;
  • Step 3) The source edge gateway device receives the IP packet from the external network, and sends the IP destination address in the IP packet to the address mapping device;
  • Step 4) The address mapping device performs address resolution and mapping between the external network IP destination address and the NCT data network address, and returns the obtained NCT data network address of the destination edge gateway device to the source edge gateway device;
  • Step 5 The source edge gateway device sends a packet to the destination edge gateway device according to the NCT data network address of the destination edge gateway device.
  • the header of each packet has a complete NCT address, and all devices in the NCT data network perform routing selection based on the NCT address.
  • the edge gateway device ED 301 transmits the packet to the access layer device 111 to which it belongs, and then forwards the packet to the convergence layer device 131.
  • the aggregation layer device 131 judges whether it is forwarded to the access layer device 112 to which it belongs according to the NCT address of the data network, and directly sends it to the access layer device 112.
  • the access layer device then sends the edge layer device 302 according to the NCT address.
  • packets can also be forwarded to the core layer device after passing through the aggregation layer device, and then forwarded to the destination edge gateway device layer by layer through the core layer device.
  • the packets from the edge gateway device ED are aggregated layer by layer, from the access layer device, the aggregation layer device to the core layer device, and then forwarded after passing through the core device. Go to other NCT data networks, and then forward from the core layer device to the edge gateway device layer by layer in other NCT data networks.
  • the NCT data network adopts a fixed routing technology or a moderate dynamic routing technology, which may be a single route, or may be composed of a dual route or a multiple route of a main route and a backup route.
  • the route through which packets are passed is fixed.
  • the dual address in the message may be parsed by using a method similar to the "tunnel" technology. As a well-known technology in the art, details are not described herein.
  • Step 6 The destination edge gateway device receives the packet and forwards the packet to the IP network according to the destination IP address.
  • the IP telecommunication network implemented by the present invention can carry existing IPv4 packets, IPv6 packets or other data packets. Specifically, regardless of the access to the source ED device, Whether the IP address of the device or network is an IPv4 address or an IPv6 address, and regardless of whether the IP address of the device or network connected to the destination ED device is an IPv4 address or an IPv6 address, it is possible to achieve unblocked communication in this IP telecommunication network Therefore, a seamless connection between the NCT data network and the external IP network is realized, and this communication process is established between network nodes that already have a trust mechanism, so end-to-end security is also guaranteed.
  • the source edge gateway device and the address mapping device complete the address resolution and mapping between the IP address and the NCT address, and convert the packets with IP addresses into Grouping of NCT addresses.
  • the nodes in the network transmit according to the NCT address of the NCT packet and follow the routing rules determined internally until reaching the destination edge gateway device.
  • the device will work with the address mapping device to convert its NCT address to an IP address, thereby restoring the NCT packet to an IP packet and transmitting it by the IP network.
  • This packet transmission mode is the basic working mode of the IP telecommunication network.
  • the IP telecommunication network may also have a working mode in which communications are implemented using NCT tunnels.
  • the NCT tunnel is the same as the tunnel used in the existing communication network, and it uses the logic and virtual circuit technology concept, but the implementation mechanism of the two is obviously different. The following is the use of NCT The working mode of the tunnel for communication is explained in detail.
  • the essence of the communication method using the NCT tunnel in the IP telecommunication network system is to establish multiple logical virtual circuits inside the NCT data network.
  • Each logical virtual circuit is jointly composed of ED devices located at both ends and a plurality of node devices located in the data network. OK, respectively assigned to different users.
  • the solid line indicates the logical virtual circuit determined by the tunnel, and the dotted line indicates the different paths that the packet may pass when using the traditional routing mode.
  • the logical virtual circuit is based on the network in the NCT data network.
  • the command issued by the management device is established, and once established, it is fixedly assigned to a user to engage in a specific communication service, such as a voice service or a data service, until the network management device issues a command to cancel the logical virtual circuit.
  • a specific communication service such as a voice service or a data service
  • the network management device issues a command to cancel the logical virtual circuit.
  • the devices in the IP network participating in the service first send IP packets to the ED device at one end of the logical virtual circuit to carry the communication service.
  • the IP packet reaches the ED device through the routing mechanism in the IP network, is converted into a link frame of the NCT in the ED device, and transmits the link frame according to the path determined by the logical virtual circuit, until it reaches the ED device at the other end of the route. So far 1 .
  • the ED device at the other end recovers the link frame of the NCT into an IP packet, and transmits the packet to the final destination determined by the communication service through a routing mechanism in the IP network.
  • This fixed transmission path is a kind of logical virtual circuit, which is usually called a "tunnel" in the telecommunication field. Therefore, we call the logical virtual circuit implemented inside the above-mentioned NCT data network an NCT tunnel.
  • the technical solution of header encapsulation for the link frame that needs to be transmitted through the tunnel is to add a new IP header to the head of the link frame at the entrance of the tunnel, and let the link frame be encapsulated. It is transmitted through the tunnel. At the exit of the tunnel, the IP header is deleted, the original packet is restored, and it is sent to the destination.
  • the tunnel belongs to the NCT data network.
  • the data network adopts a hierarchical system structure and is uniformly managed by the network management equipment.
  • the header frame is not used for the link frame in the tunnel, but a short connection identifier (ID) is used instead of the lengthy NCT address.
  • ID short connection identifier
  • the process of establishing a tunnel to achieve communication is as follows: What needs to be done before establishing the tunnel is all the work that must be performed before the IP telecommunication network system works: To the NCT data network All devices and each edge gateway device are assigned NCT addresses. This The process is also described above, and is not repeated here.
  • a user needs to use a tunnel to transmit certain communication service data, it first applies to a network management device in the IP telecommunication network for establishing a tunnel.
  • the network management device approves the application according to the internally determined working principles, it sends a tunnel establishment command to the ED device at the source end of the tunnel with parameters such as the destination address, service level, and resource requirements.
  • the source ED device uses the NCT data network command to send a request for establishing a tunnel connection to the ED device as the tunnel destination with parameters such as resource requirements, service level, and connection sequence number. This command is transmitted step by step in accordance with the existing routing mechanism inside the NCT data network.
  • the command is based on its own resources. If it is satisfied, the link resource is configured according to the request, a connection identifier (ID) is allocated, a link forwarding table is filled, and the request is forwarded to the next node until the destination ED device. If the resource status of the destination ED device supports the establishment of the tunnel connection, the destination ED device sends a response to the request for acceptance to the source ED device. After receiving the acceptance response from the destination ED device, the source ED device immediately sends a tunnel establishment confirmation response to the network management device. The network management device receives the tunnel establishment confirmation response from the source ED device and sends a command to the address mapping device.
  • ID connection identifier
  • the tunnel establishment After receiving the acknowledgement response from the address mapping device, the tunnel establishment is successful. After the tunnel is established, all IP packets of this type of communication services of the user will be transmitted according to the logical virtual circuit determined by the link forwarding table when passing through the NCT data network.
  • the source ED device may send a request to establish a tunnel connection to the destination ED, and at the same time, it may also start a backup route of the NCT data network to send a request to establish two primary and secondary tunnels.
  • the standby logical virtual circuit can be enabled in time to ensure smooth data transmission.
  • the node device or destination ED device whose path resources are not satisfied will send a rejection response to the source ED device.
  • the device immediately sends a tunnel establishment failure response to the network management device.
  • the source ED device sends a request to establish a tunnel, it starts the timer. If the timer expires, it has not received the accept / reject response, and the configuration is considered invalid. In both cases, the tunnel is considered unsuccessful.
  • the tunnels in the IP telecommunication network are the same as the tunnels in the existing VPN, which are "logical virtual circuits" in a logical sense.
  • the process of establishing and canceling it does not require physical operations. Therefore, the process of establishing and canceling a tunnel can be completely performed by the network management device: once the user has a demand, the tunnel connection is automatically established, and once the demand is over, the tunnel connection is automatically canceled.
  • the number in the circle in the figure represents the connection identification (ID).
  • connection identification is not an end (source ED device) to end (destination ED device) address, it has only a local meaning, and is only an identification of a link connection between a point (node device) and a point (node device). There is no global significance, so the length of the connection identifier (ID) must be smaller than the length of the network layer address relative to the global address of the network layer.
  • the ED device and the ADT device will add an NCT address before the IP address of the IP packet, and convert the IP packet into an NCT packet. Therefore, it can be transmitted in the NCT data network.
  • the original IP address is still retained as the packet payload itself.
  • the connection identifier (ID)
  • the correspondence is between the source ED, the destination ED, and the node device that the tunnel passes through. Storage, and once it is established, it will not be changed until the tunnel connection is removed. In this way, we can replace the global NCT address with a connection identifier (ID) inside the NCT data network.
  • the source ED replaces the NCT address in the NCT link frame with the connection identifier (ID) between the ED device and the next-level node device.
  • the NCT link frame is transmitted in the tunnel.
  • the node device deletes the connection identifier (ID) of the NCT link frame and uses itself to communicate with the latter.
  • the connection identifier (ID) determined between the node devices of the first level is replaced, and then the link frame of the NCT continues to be transmitted in the tunnel until it reaches the destination ED device.
  • the destination ED device restores the link frame into an IP packet and forwards it to the IP network.
  • a shorter connection identifier (ID) is used to replace the longer NCT address, thereby saving the address overhead and improving the efficiency of network transmission.
  • the basic communication mode between IP users using the tunnel is as follows:
  • the source IP user sends an IP packet, and the IP packet reaches the source ED device connected to the IP user through the IP network;
  • the source ED device receives the IP packet and sends the IP destination address in the IP packet to the address mapping device;
  • the address mapping device performs address resolution and mapping between the IP destination address and the NCT data network address of the destination ED device.
  • the included source will be included.
  • Information such as / destination IP address, source / destination NCT address, service type, and other parameters are sent back to the source ED device, and the tunnel ED device enables the tunnel connection;
  • the source ED device sends the link frame converted by the IP packet to the next-level node device according to the logical virtual circuit (represented in the link forwarding table) determined by the tunnel connection, thereby transmitting step by step. Go to the destination ED device.
  • each node device and the ED device that pass through the packet exchange corresponding connection identifiers (IDs) in the manner described above.
  • IDs connection identifiers
  • the destination ED device After the destination ED device receives the link frame through the tunnel, it returns to an IP packet and forwards it to the IP network according to the destination IP address.
  • VPN VPN
  • IP telecommunication network system IP telecommunication network system
  • IP VPN There are two types of VPNs in the IP telecommunication network system, one is IP VPN and the other is NCT VPN.
  • the IP VPN is based on a group of IP addresses specified by the user and the traffic and flow relationship between these IP addresses to establish a VPN that meets the corresponding requirements.
  • the NCT VPN is based on a group of NCT addresses and the flow and flow relationship between these NCT addresses.
  • NCT VPN is mainly used to provide transparent private line VPN. Both types of VPNs need to be implemented through ED and ADT.
  • a dedicated domain for VPN implementation is provided in the NCT packet-a VPN identification domain and a VPN number domain.
  • the VPN identification field indicates whether a packet transmitted in the NCT network belongs to a certain VPN, and the VPN number field indicates which VPN the packet belongs to.
  • FIG. 7 The overall flowchart of implementing VPN in the IP telecommunication network system is shown in FIG. 7 and includes the following steps:
  • the user submits an application for establishing a VPN to the network management device, and submits a flow and flow table required for establishing the VPN;
  • the flow and flow direction table is the flow and flow direction table between the EDs, and the procedure goes to step (4);
  • the flow and flow direction table is the flow and flow direction table of the nodes in the IP network, and the flow is turned into Step (3);
  • the network management device obtains the address of the ED connected to each IP network node through the ADT, converts the flow and flow direction table into the flow and flow direction table between the EDs, and proceeds to step (4);
  • the network management device calculates the corresponding link resource requirement table between the nodes of the NCT data network according to the traffic and flow direction table, and sends the node device in the NCT data network including the VPN number according to the calculation result.
  • Link resource configuration command to establish a VPN accordingly
  • the network management device sends the VPN configuration to the relevant ED according to the traffic and flow direction table. Setting command, the source ED sends a VPN configuration request to the destination ED according to the route of the NCT data network, and establishes a VPN accordingly.
  • the process of implementing VPN in NCT data network includes the following steps ⁇
  • a user requesting to establish a VPN submits a request for establishing a VPN to a network management device, and provides a flow and flow direction table required for establishing the VPN.
  • the first technical solution is shown in FIG. 8 and includes the following steps:
  • the network management device calculates the link resource requirement table between the corresponding nodes in the NCT data network according to the traffic and flow direction table of the VPN ED submitted by the user.
  • the network management device determines the VPN number according to the above calculation result,
  • the node device sends a link resource configuration command with parameters such as service type and VPN number.
  • the node device in the NCT data network responds according to its own resources; if the resource conditions support the establishment of the VPN, the node device in the NCT data network accepts the command, configures the link resources according to the command parameter requirements, and sends the link resource to the network management device. A confirmation response is returned.
  • the network management device After receiving the acknowledgment response from all relevant node devices in the NCT data network, the network management device sends a command with parameters such as service type and VPN number to the ADT.
  • the ADT receives the VPN command from the network management device and sends back a confirmation response.
  • the network management device received a confirmation response and the VPN was successfully established.
  • the node device in the reconnected unconnected data network rejects the command, and this configuration is invalid. VPN establishment was unsuccessful.
  • the configuration and control of the VPN establishment by the network management device can optimize the VPN resources, easily establish a fixed or optimal VPN tunnel, and establish it quickly.
  • the second technical solution is shown in FIG. 9 and includes the following steps:
  • the network management device sends a VPN establishment command to the source ED that needs to establish a VPN.
  • the command should include parameters such as VPN service type, VPN number, source ED address / destination ED address.
  • the source ED sends a VPN configuration request to the destination ED according to the primary route of the NCT, or at the same time, starts the NCT standby route to send a VPN configuration request.
  • Each NCT node device passing through responds according to its own resources after receiving the request: If the resource conditions support the establishment of the VPN, NCT T N2005 / 000594 The node device configures the link resource according to the VPN configuration request, and forwards the VPN configuration request to the next node until the destination ED; if the resource status of the destination ED supports the establishment of the VPN, the destination ED sends the request to the source. The end ED sends an accept response.
  • the source ED If the source ED receives an acceptance response from the destination ED, the source ED immediately sends a confirmation response back to the network management device.
  • the network management device receives confirmation responses from all relevant EDs of the VPN, and the network management device sends a command with parameters such as service type and VPN number to the ADT connected to the source ED.
  • the ADT receives the command from the network management device, establishes a VPN number, a service type, and a destination ED address mapping table, and then sends back a confirmation response.
  • the network management device received a confirmation response.
  • the VPN was successfully established.
  • the NCT node device or destination ED sends a rejection response to the source ED. This configuration is invalid. If the start-up timing of the source ED times out and no receive / reject response has been received, the source ED also considers this configuration to be invalid. In both cases, VPN establishment is considered unsuccessful.
  • the solution is established by each node to establish a VPN, which can establish a VPN according to the current network conditions.
  • the source ED sends an NCT packet to the destination ED.
  • the source ED sends an address mapping request command to the ADT with parameters such as the destination ED address and service class.
  • the ADT receives the address mapping request command. If it is judged that the source ED address and the destination ED address belong to the same VPN, the ADT sends a response command to the source ED with parameters such as VPN number, service type, and destination ED address.
  • the source ED receives a response command with parameters such as VPN number, service type, and destination ED address, forms an NCT packet with fields such as VPN tag, VPN number, service type, and data payload, and sends it to the destination ED. .
  • Node devices such as AR, MR, and CR in the NCT network transmit the NCT packet to the destination ED according to the VPN tag and VPN number of the NCT packet.
  • the destination ED receives the NCT packet and sends it to the destination.
  • IP network Users in the IP network submit the IP settings of the IP VPN to the network management device through the source ED. Table of flows and flows between devices.
  • the network management device receives the flow and flow direction table between the IP devices of the IP VPN submitted by the user.
  • the network management device submits an address resolution request to the ADT to resolve the NCT address of the corresponding ED.
  • the network management device converts the traffic and flow direction table between the IP devices into the corresponding traffic and flow direction table between the EDs.
  • the VPN establishment process in the NCT data network is the same as the aforementioned NCT VP establishment process.
  • All IP devices of the IP VPN are connected to the edge gateway device ED connected through tunnel technology or existing VPN technology, and the IPVPN is established.
  • the communication process is shown in FIG. 11 and includes the following steps:
  • the source IP device sends an IP packet to the destination IP device.
  • the source ED When the IP packet reaches the source ED, the source ED sends an address mapping request command with parameters such as the destination IP address to the ADT.
  • the ADT receives the address mapping request command. If the source IP address and the destination IP address belong to the same VPN, the ADT sends a response command to the source ED with parameters such as VPN number, service type, and destination ED address.
  • the source ED receives the parameter response command with the VPN number, the service type, and the destination ED address, forms an NCT packet with the VPN number, the service type, and sends it to the destination ED.
  • Node devices such as AR, MR, and CR in the NCT network are transmitted within the scope of the resources assigned by the VPN according to the VPN number, service type, and destination ED address of the NCT packet.
  • the destination ED receives the NCT packet, recovers the destination IP address, reassembles the IP packet, and sends it to the destination.
  • IP VPN establishes a VPN between IP devices based on the traffic and flow direction table between IP devices in the IP network.
  • the IP device here can be an IP that determines the IP address.
  • the device may also be a customer premise network (CPN) in an IP network.
  • the IP device and the corresponding ED are connected using a tunnel or an existing VPN technology such as MPLS VPN or IPSec VPN.
  • the access point of IP VP is IP network.
  • the access point of NCT VP is ED.
  • the process of revoking a VPN is shown in Figure 12, and includes the following steps: The user submits an application for revoking the VPN, the network management device sends a command to revoke the VPN to the reconnected unconnected data network node device and the address mapping device, and the reconnected unconnected data network node device is released Configured resources, address mapping The device clears the VPN address mapping table, and the VPN is revoked.
  • VPNs may need to be established.
  • a large-scale enterprise intranet at least 3 VPNs need to be established according to business needs.
  • One VPN is used for internal office automation and the other VPN is used for Establish a core data network within the enterprise, and a VPN for video conferencing. Therefore, it is necessary to perform number management for different VPN services.
  • This is the destination where the VPN number bits are set in the packet as described above.
  • the VPN number is unique within an NCT data network.
  • different service classes may also have the same VPN number, that is, there can be at most "VPN number X service class" VPNs in an operating network.
  • the VPN numbers may be different in different NCT data networks.
  • the core layer device CR connected between the NCT data networks matches the VP numbers. .
  • the process of implementing VPN inside the NCT data network is the core content.
  • packet address translation is a key technical content. Therefore, for ATM packets and Frame Relay (FR) packets, as long as the ATM address or the mapping table of the Frame Relay address and the NCT address is set in the ADT, and the address translation is completed in the ED, the ATM can also be implemented. Or Frame Relay VPN.
  • the IP telecommunication network system includes two parts: an NCT data network using an NCT data network address and an IP network using an IP address. Therefore, multicast in the IP telecommunication network system will be implemented across the network (IP network and NCT data network). Since the NCT data network can provide resource guarantee, the quality of multicast service can be guaranteed. In this way, the data network in the IP telecommunication network system includes two types of multicast: one is that the user applies to the network administrator to initiate multicast, and the other is that that is initiated by the IP network user.
  • IP addresses and NCT packets need an address translation in the process of cross-network transmission. the process of. This is the key technical step to implement multicast in this IP telecommunication network system.
  • Multicast application steps When a user applies to the network administrator to initiate multicast, four fields are defined for the multicast in the packet format: a multicast identification field, a packet type identification field, a multicast address field, and a multicast extension header. As shown in FIG. 13 to FIG. 16, the implementation process of the multicast includes four major steps of multicast notification, multicast tree establishment, multicast communication, and multicast termination, which are described in detail below respectively. 1. Multicast application steps:
  • the user submits to the network management device the IP multicast address with the multicast group, the address of the edge gateway device connected to the source endpoint, the address of all edge gateway devices connected to the destination endpoint, the relevant IP address, and the resource requirements of the multicast link And other parameters to establish a multicast request.
  • the NMS sends configuration commands to the multi-site connectionless data network node device with parameters such as the multi-site connectionless data network multicast address, the destination edge gateway device address, and the multicast link resource indicating the type of flow.
  • the node device with no connection data at the multiple address can send an acceptance / rejection response to the network management according to its own resources. If a rejection response is sent, it indicates that the multicast cannot be established.
  • the NMS After the multicast is established, the NMS sends an address mapping table with the IP multicast address, the multicast address of the multi-connection connectionless data network, and the address of all the edge gateway devices connected to the destination endpoint and the relevant IP address to the address mapping device. .
  • the source endpoint of the multicast group establishes a connection with the edge gateway device through technologies such as tunnels, and configures the resources required for multicast on the connection channel.
  • the destination endpoint of the multicast group establishes a connection with the edge gateway device through technologies such as tunnels, and connects the channels to configure the resources required for multicast.
  • the multicast source device sends multicast packets and reaches the edge gateway device connected to the source through the communication channel configured with resources, such as a tunnel;
  • the multi-address connectionless data network ensures that the multicast packet reaches the destination edge gateway device according to the set transmission quality requirements within the determined resource range according to the multicast address.
  • the destination edge gateway device sends the multicast destination device via a communication channel with a resource guarantee, such as a tunnel.
  • the NMS sends an end command to the node device of the multi-address connectionless data network.
  • the parameters include: the multicast address and the released resource configuration indicating the type of flow.
  • the network management sends a multicast end command to the address mapping device, and the address mapping device clears all entries related to the multicast address.
  • the first packet has a complete header and a complete multicast extension header, and the multicast extension header has all the NCT addresses of the destination EDs.
  • the first multicast packet and the leaf node modification packet need to be confirmed, so they are sent in the form of a command packet. Because all node devices in the NCT data network have the cache capability, after the first multicast packet is passed, the cache can be used to remember the NCT multicast address and the NCT addresses of all leaf nodes ED. When subsequent packets come, only NCT is required. The multicast address is sufficient. Therefore, the header of subsequent packets may not include the multicast extension header.
  • the multicast application initiated by the user to the network management can ensure the resources required for the service, thereby ensuring the quality of service of the multicast service, and there will be a wide range of applications.
  • multicast notification In the case of multicast initiated by a user in the IP network, three fields are defined for multicast in the packet format: a multicast identification field, a multicast address field, and a multicast extension header.
  • the implementation process of the multicast includes four major steps: multicast notification, multicast tree establishment, multicast communication, and multicast termination (not shown in the figure), which are described in detail below as follows ⁇
  • the multicast source endpoint of the IP network obtains the IP network multicast address according to the procedure for applying for a multicast address in the IP network.
  • IP network multicast address is the aforementioned class D IP address (224. 0. 0. 0 ⁇ 239. 255. 255. 255).
  • the multicast source endpoint sends a multicast notification packet to the network.
  • the multicast notification includes the multicast address of the multicast.
  • the multicast notification packet arrives at the edge gateway device connected to it through the IP network.
  • the edge gateway device sends a multicast request containing the IP network multicast address and other parameters to the address mapping device.
  • the address mapping device After the address mapping device receives a multicast application with parameters such as the IP network multicast address from the edge gateway device, it generates a mapping table between the IP multicast address and the multiple-address connectionless data network address in the address mapping device. , And send a multicast response with the multicast address parameter of the multiple address connectionless data network to the edge gateway device.
  • mapping table between the IP address and the NCT address is stored in the address mapping device ADT. Through this table, the multicast address in the NCT data network corresponding to the IP network multicast address can be obtained.
  • the device to join the multicast IP network sends parameters such as IP network multicast address to the IP network. Number of multicast join applications;
  • a multicast join request packet with parameters such as the IP network multicast address reaches the edge gateway device connected to the destination through the tunnel or the existing IP network to implement multicast communication technology, etc.
  • the edge gateway device is mapped to the address mapping device. Issue a multicast join request with parameters such as the IP network multicast address;
  • the address mapping device After the address mapping device receives a multicast join request with parameters such as the IP network multicast address, it saves the IP multicast address and the destination unconnected data network address of the destination edge gateway device, and forms it on the address mapping device.
  • a multicast source endpoint sends a multicast packet to the network.
  • the multicast packet arrives at the edge gateway device connected to the source end through technologies such as tunneling or IP network multicast protocol, and the edge gateway device connected to the multicast source endpoint maps to the address.
  • the device sends a multicast address resolution request with parameters such as the IP multicast address.
  • the address mapping device receives the multicast address resolution request, performs address resolution, and sends back to the edge gateway device connected to the multicast source endpoint with the multicast address of the connectionless data network multicast address, all destination edge gateway devices. Multicast address resolution response without parameters such as connectionless data network address.
  • the edge gateway device connected to the multicast source endpoint sends the first packet of the same multicast address as the first packet.
  • the first packet of the multicast packet has a complete header and a complete multicast extension header.
  • the multicast extension header has all the purposes.
  • the duplicate address of the edge gateway device has no connection data network address.
  • the edge gateway device connected to the end point of the multicast source sends the second and subsequent packets of the same multicast address as subsequent multicast packets.
  • the header of the subsequent packets may not include the multicast extension header.
  • the multicast packet contains: a multicast identification field, a multicast address field, and a packet payload.
  • the first multicast packet contains a multicast extension header.
  • the multicast source endpoint sends a multicast termination packet to the network.
  • the edge gateway device connected to the multicast source endpoint sends a multicast termination request packet with parameters such as the multicast address to the address mapping device.
  • the address mapping device clears the multicast address. All entries in the table are multicast terminated.
  • the IP telecommunication network must adopt a new resource management mechanism in order to make full use of the hardware resources of the IP telecommunication network, flexibly and efficiently meet the various needs of users, and make all the operations on the IP telecommunication network
  • the telecommunications business has obtained the expected quality of service guarantee.
  • the present inventors proposed two specific resource management methods based on the technical characteristics of the IP telecommunication network-a resource management method based on a link alarm mechanism and a resource management method based on a signaling mechanism.
  • the services in the IP network are divided into several types, and each type of service includes Ruoqian VPN, which provides communication resource guarantee for different telecommunications users.
  • Each VPN has independent communication resources, and a corresponding link alarm mechanism is established.
  • the link alarm mechanism Through the link alarm mechanism, the user's resource needs are adjusted, so as to control the communication resources of the entire network. Therefore, the above-mentioned resource management method based on the link alarm mechanism is actually based on the combination of classification services and VPNs. This method is very suitable for users who have a large number of resources, such as telecommunications service providers.
  • the first point is to have a network that supports classified services and a large number of independent VPNs.
  • the second point is that edge access devices that support classified service networks should have the ability to classify services and manage and control the traffic used by users.
  • the third point is that the classification of services should be scientific, that is, there should not be too many service categories, and the classification should be on the network edge node devices that the network operator can manage.
  • the fourth point is that the network node performance must be good enough and have strong resource queue management capabilities.
  • the NCT data network as the core network has a unified management mechanism and can allocate corresponding network resources according to the needs of various services for network resources.
  • the edge gateway equipment ED cooperates with the network management equipment, it is easy to have the ability of business classification and the ability to manage and control the traffic used by users, and the ED equipment can be completely controlled by the operator through the network management equipment.
  • the resource management in the IP telecommunication network system is divided into two levels, namely the resource management of the bearer network and the resource management of the service network.
  • the resource management of the bearer network includes two specific contents, one is to configure the resource of the network node device through the network management device, and the other is that the network node device reports the link alarm status of the device to the network management device.
  • its user-network (UNI) interface uses connection-oriented technology to establish a connection for each service and ensure the resources required for the service.
  • the network-network (bandit) interface uses non-connection-oriented technology. It works mainly and connection-oriented as a supplement. It is not necessary to establish a connection and reserve corresponding resources for each service.
  • a link alarm mechanism is used to manage resources.
  • the network edge gateway device ED retrieve the alarm status of the network manager.
  • the above resource management method based on the link alarm mechanism can be divided into three main stages, which are: Establishing a VPN to implement resource configuration, link alarm, and resource retrieval and access control. The following is a detailed description of these three stages.
  • a significant feature of the IP telecommunications network is that the VPN has independent resources.
  • the resource allocation is implemented during the VPN establishment process. For a detailed description of this process, reference may be made to the two specific methods for establishing a VPN in a network node device described above, which are not repeated here.
  • a resource alarm chain is composed of a node device, a network management device and an ADT device.
  • the above-mentioned resource alert chain is actually a series of network management devices, node devices, and ADT devices participating in the VPN.
  • the node device of the NCT data network When the resources used by a user of a certain service category do not exceed the link alarm threshold of the service category, the node device of the NCT data network does not send an alarm message; when the resources used by the users of a certain service category exceed the service category link alarm
  • the above link alarm threshold is determined at the beginning of resource allocation, that is, when the VPN is established.
  • the network management device notifies the ADT device of the alarm information with parameters such as service type, VPN number, and alarm level.
  • the network management device sends a link alarm notification to the ADT indicating the service type, alarm level, and corresponding VPN number, but according to the aforementioned network-network (question I) interface, the connection-oriented technology is mainly used, and the connection-oriented technology is used. To supplement the characteristics of the working mode, the network management device does not indicate the specific alarm link to the ADT device.
  • the ED device After the link alert mechanism is adopted, if a user requires the establishment of a communication link, the ED device first queries the ADT device for the user's VPN resource usage status. ADT can establish communication without corresponding VPN resource alarm information.
  • the above ED device queries the ADT device for resource usage status through resource retrieval and access
  • the implementation of the control mechanism includes the following steps:
  • the user or the business network requires the establishment of a communication link.
  • the ED first queries the ADT for the resource usage status of the user or the business network. If the ADT indicates that the user or the business network has no link alarm, the communication establishment is performed according to the normal business process.
  • ADT finds the user or service network link alarm, the ADT will send a resource retrieval request to the network management device to query whether there is a link alarm for the link passed by this communication connection.
  • ADT indicates that the user or service network has no link alarm, and communication is established according to the normal business process. If a link alarm passes, ADT indicates that the user or service network link alarm, the communication cannot be established.
  • the resource management method based on the link alarm mechanism is actually based on the combination of classified services and resource-independent VPN technology.
  • the VPN-based access control mechanism has been described above, and the specific content of the "classification service” is briefly introduced below.
  • classification service is to divide the business into several major categories, subdivide into several sub-categories for each major category of services, and give identification in the frame structure.
  • subclass different VPNs have their own resources.
  • resource management strategies for different business categories:
  • the rate admission control strategy will be determined based on the link alarm level, and no link alarm can accept the peak rate. As the link alarm level increases, the admission control rate is The peak rate is gradually changed to the committed rate. The link alarm level exceeds a certain level, and the connection cannot be established.
  • an emergency communication type service such as an alarm phone, a fire alarm phone, etc.
  • the emergency communication can be established, and the normal communication Business processes.
  • the transmission route of the data message is determined by the network. It can be a single route, or it can be a dual route or a multiple route that is a combination of a primary route and a backup route. The route traversed by any end-to-end message is fixed.
  • the combination of dual routing technology and control commands of network management equipment can realize the network's Fast protection switching.
  • the resource management method based on the signaling mechanism is particularly suitable for telecommunication users and enterprise users who have only a small amount of resources.
  • the technical requirements of establishing several VPNs can directly meet the resource requirements of telecommunications users. That is, the services in the IP network are divided into several categories, and each type of service contains several VPNs to meet different telecommunications users.
  • Each VPN has independent resources, and the resources in each VPN are managed through signaling to ensure the user's resource requirements.
  • the above-mentioned signaling mechanism-based resource management method can be divided into two main stages, namely: 1. Establishing a VPN to implement resource configuration; 2. Access control and resource management through signaling. The following is a detailed description of this.
  • One of the characteristics of the IP telecommunication network lies in the establishment of an independent VPN with different resources for resource management.
  • the process of resource allocation runs concurrently with the process of establishing a VPN.
  • this process please refer to the two specific methods for establishing a VPN in a network node device described above, which will not be repeated here.
  • the link resource threshold alarm mechanism For VPN users with a small amount of resources, it is obviously inappropriate to use the link resource threshold alarm mechanism, because even if the alarm threshold is set at 50%, such as: a link resource in the VPN is set to 2M, 900K is currently occupied because The alarm threshold has not been reached. At this time, the VPN will obviously not alarm. If there is a call that requires 1.2M to be accessed, it is impossible to know at the network access end that a link resource in the network is insufficient, because there is no resource alarm information. The incoming end still accesses the call. Obviously, the VPN will "crowd up" the resources of others. This will not be allowed because it cannot ensure the network's resource allocation.
  • a connection needs to be established between the ED (sender) and the ED (receiver).
  • the resources required for the sub-business are identified. If the link resources along the way can meet the needs of this service, the connection can be established, and if the resources cannot be met, the connection cannot be established.
  • the device directly issues a connection establishment request command with parameters such as the receiving ED address and resource requirements according to the user's resource requirements.
  • each node device through which the connection establishment request command passes receives a response according to the situation of the VPN stock resources. If the VPN stock resources of the node can support the resources required for the connection establishment request command, the connection establishment request command will be sent. Send to the next node device, If the VPN inventory resources of the node cannot support the resources required for the connection establishment request command, a connection establishment failure response is sent to the ED (sender) device.
  • the ED (receiver) device When the ED (receiver) device receives the connection establishment request command, it indicates that the resources of the VPN can meet the resource requirements of the call, and the ED (receiver) device sends a connection establishment confirmation response to the ED (sender) device .
  • connection establishment confirmation response deducts the resources used for the connection from its VPN resource table.
  • the ED (sender) device receives the connection establishment confirmation response, and the connection establishment is successful.
  • Both the ED (transmitting end) device and the ED (receiving end) device can initiate the connection teardown process.
  • each node device passing the connection removal request command releases the resources occupied by the connection.
  • the VPN resource table adds these resources accordingly, and sends the connection removal request command to the next node device.
  • the ED (receiver) device When the ED (receiver) device receives the connection removal request command, the ED (receiver) device sends a connection removal confirmation response to the ED (sender) device, and the ED (sender) device receives the connection removal confirmation response, the The secondary connection was successfully removed.
  • access control is performed only at the edge gateway device, and the node devices participating in the VPN do not perform resource control and management.
  • the NCT data network in the IP telecommunication network system transmits NCT packets.
  • the following first introduces the format of the NCT packet, and then explains the encapsulation method of the NCT packet. Finally, the transmission process of NCT packets will be explained.
  • the header of the NCT packet includes the following fields: version number, packet type, flow type, service classification, header compression flag, first packet flag, VPN flag, multicast Tag, address length, packet length, stream sequence number, address, destination address, and extended header.
  • version number refers to the version of the NCT protocol.
  • the current version number is 1.
  • the version number is a 2-bit packet type field.
  • the value of the packet category is 0, it indicates that the NCT packet is a data packet, which indicates that user data is placed in the payload; if the value is 1, it indicates that the NCT packet is a control packet, and that the control command is in the payload. The remaining values are reserved.
  • the 2-bit stream type field after the packet type indicates the type of the information flow. For example:
  • the service classification and flow category together represent different services. Examples are as follows:
  • the header compression field is located after the service classification and is 1 bit long. When it is not set, it means that the header is not compressed; when it is set, it means that the header is compressed.
  • the next 1 bit is the first packet identifier, which indicates the first packet of a packet with the same source address, same destination address, same flow class, and same service classification.
  • the NCT data network packet also indicates whether the packet is a VPN packet by a 1-bit VPN tag field located after the first packet identification. For example, when the VPN flag is set, it indicates that the packet is a VPN packet.
  • the 1-bit multicast flag field is located after the VPN flag and is set to indicate that the packet is a multicast packet; otherwise, it indicates a non-multicast packet.
  • a 2-bit address length field is set after the multicast flag.
  • the source and destination addresses are 32 bits; when the address length is 1, the source and destination addresses are 64 bits; when the address length is 2, the source and destination addresses are 96 bits; the address length When it is 3, it means that the source and destination addresses are 128 bits.
  • the default value of the address length is 2, that is, the length of the source address and the destination address is 64 bits.
  • Next is a 16-bit packet length field, which indicates that the maximum packet length is 64K bytes.
  • the stream sequence number field is 24 bits long and is located after the packet length. When used for header compression, it indicates the order of each packet with the same source address, same destination address, same flow class, and same service class.
  • the source address and the destination address refer to addresses in the NCT data network and are variable length.
  • the default value in this embodiment is 64 bits.
  • Extended headers are used as needed.
  • the role of the extended header in multicast services and VPN services will be explained in the following description of the packet encapsulation method.
  • the maximum length of the payload is 64K bytes.
  • the following describes a method for encapsulating NCT packets according to FIG. 24 and the foregoing NCT packet format, in combination with specific business processes such as VPN and multicast.
  • the ED performs encapsulation according to the content of the source end packet according to the method described in this embodiment to form an NCT packet.
  • the source ED receives the IP packet of the IP network and sends the IP destination address in the IP packet to the ADT; the ADT performs the address analysis and mapping between the IP destination address of the IP network and the NCT address, and obtains the NCT of the destination ED
  • the address is returned to the source ED; the source ED adds an NCT header to the IP packet according to the NCT address returned, and turns it into an NCT packet.
  • the packet is then sent to the destination ED; the destination ED receives the NCT packet, converts it into an IP packet, and forwards the packet to the IP network according to the destination IP address.
  • this node encapsulates the NCT packet according to the method described in this embodiment.
  • the NCT packet encapsulation method includes the following steps:
  • the edge gateway device ED sets the value of the packet type field according to whether it is a data packet or a control packet.
  • the edge gateway device ED determines the type of service according to the characteristics of its bearer service network.
  • the type of service consists of a 2-bit packet type field and a 4-bit service classification field.
  • the former determines the type of service and the latter is the details of the service. classification.
  • the service classification and flow category together represent different services.
  • the edge gateway device ED determines whether the incoming data packet requires header compression, VPN, or multicast, and then proceeds to steps 3), 31), and 32) respectively; if not, it skips directly to step 6).
  • the header compression field For a packet with the first packet flag field not set, it is determined as a subsequent packet of a certain first packet according to the IP source address, IP destination address, and service class information therein, and then it is judged whether it is to be compressed or not according to needs. If compression is required, the header compression field is set to indicate that the NCT packet is a header compressed packet. For packets of which the first packet flag field is not set, only the payload part of the IP packet is included in the payload, and the IP header is not included.
  • the destination address and source address refer to the NCT address of the destination ED device and the NCT address of the source ED, respectively.
  • step 21) if it is determined in step 21) that the bearer service is a VPN service, after step 21), there are the following steps:
  • step 31) Set the value of the VPN flag field. Setting the VPN identification field and setting the extended header identification field indicates that a packet transmitted within the NCT network belongs to a VPN packet. The method then proceeds to step 33), where the VPN number field is used to distinguish which VPN each VPN packet belongs to. 33) Set the value of the VPN number field. For NCT packets with the same origin, the same destination address, the same service class, and the VPN flag field is set, the value of the VPN number field must be determined during encapsulation. The VPN number field is placed in the extended header. The VPN number is unique within an NCT data network.
  • step 5 After the above steps are completed, go to step 5), and set the value of the stream number. Finally, go to step 5
  • step 21 If it is determined in step 21) that the bearer service is a multicast service, after step 21), the following steps are performed:
  • step 34 If it is the first packet of a multicast service, set the value of the first packet flag field, and go to step 36); if it is not the first packet, only set the value of the multicast flag field. Then, go to step 5).
  • the multicast extension header contains the NCT addresses of all the destinations (leaf nodes) ED, and then proceeds to step 5).
  • the NCT address of all destinations (leaf nodes) ED is provided by ADT.
  • Step 5 Perform the work of setting the sequence number of the multicast packet, and then proceed to step 6).
  • the multicast address is similar to the class D address in the IP protocol, and represents the NCT multicast address in the NCT network.
  • the multicast source endpoint in the IP network that initiates the multicast service request sends the IP network multicast address according to the IP protocol.
  • the ADT determines the group in the NCT network based on the association table between the IP multicast address and the NCT multicast address stored by it Broadcast address, and the ED device encapsulates this NCT multicast address into the destination address field of the NCT packet.
  • the multicast source endpoint that initiates the multicast service request is a node in the NCT data network
  • the node in the NCT data network sends a multicast service request to the ADT, and the ADT gives the NCT multicast address, and the ED device sets the NCT group
  • the broadcast address is encapsulated into the destination address field of the NCT packet.
  • the packet transmitted in the IP network is composed of an IP header and an IP payload.
  • the IP network it is addressed by an IP address.
  • an NCT packet is transmitted.
  • the NCT header is composed of the NCT payload.
  • the NCT payload of the NCT packet transmitted in the NCT data network is the IP packet.
  • the NCT packet it actually consists of the NCT header + IP header + IP payload.
  • the payload is often less than 40 bytes.
  • the NCT header + IP header will probably be twice the payload length. However, this will reduce the efficiency of data transmission throughout the network and increase the burden on network equipment, so it must be improved.
  • the following further introduces a method for compressing the header of an IP packet in an IP telecommunication network system.
  • the first packet flag, the packet compression flag, and the stream flag are set in the header part of the NCT packet.
  • the NCT packet format for setting the above flag fields is shown in Figure 23.
  • This format is only an example and is not unique. Its format borrows from the packet format specified by the IPv6 protocol, but it is obviously different from this packet format.
  • a first packet flag field, a packet compression flag field, and a flow flag field are specifically added.
  • the meaning of the first packet flag is the same as that specified in the IPv6 protocol, and its occupation lbit, which is set to indicate the first packet, not set to indicate a non-first packet; the header compression flag occupies lbit, and its set to indicate that the header is compressed, and not set to indicate that the header is not compressed; the flow flag is the system allocated for the stream service Stream number.
  • the source edge gateway device ED For an IP packet transmitted by an IP network user, at the source edge gateway device ED, it is first determined whether it is the first IP packet. If so, the first packet flag is set, and the packet compression flag is not set. , And assign a stream tag to determine the value. Then the ED device puts the first IP packet including the header in the corresponding NCT packet as the payload of the NCT packet, that is, the NCT packet generated at this time is: NCT header + IP header + IP payload.
  • the ED device judges the header of the subsequent packets transmitted from the IP network, and the packets that include the same source, the same destination address, and the same service category information in the header can be determined as the subsequent packets of the first packet group. For this packet, the first packet flag is not set, the packet compression flag is set, and the flow flag is determined. Then, in the NCT packet generated by the subsequent packet, the ED device only puts the payload of the subsequent packet into the payload of the NCT packet, and the IP header is no longer put, that is, the NCT packet is: NCT header + IP Load.
  • the NCT packet carrying the IP payload is addressed in the NCT5 data network according to the NCT address contained in the NCT header, and finally reaches the destination ED device.
  • the destination ED sets the received NCT data packet according to the first packet flag in the header, and does not set the header compression flag, and determines it as the first packet without the header compressed.
  • the flow label value and the IP header taken out from the payload of the NCT packet are mapped, stored at the destination ED, and used for subsequent header recovery work of the IP packet.
  • the IP complete packet including the IP header and the IP payload in the payload of the NCT packet is taken out and put into the sending queue of the ED.
  • the destination ED determines which subsequent packet of the first packet is based on the flow flag value of the packet.
  • the corresponding IP header is taken from the mapping table made by the flow tag value and the IP header, and together with the IP payload taken from the subsequent packet payload, a complete IP packet is reassembled and put into ED's send queue.
  • the first packet may be lost.
  • the destination end ED for the packets whose first packet flag is not set and the packet compression flag is set, the corresponding IP is taken from the mapping table of the stream flag value and the IP header according to the value of the stream flag.
  • the header if it is found that there is no corresponding entry in the header mapping table for the flow tag value, it indicates that the first packet of the flow tag value has not been received.
  • the destination ED must send a "first packet not received" message to the source ED. Error report packet. After receiving the error report packet, the source ED retransmits the first packet marked by the flow.
  • the IP header needs to be transmitted only once, so that the total amount of data to be transmitted in the network is reduced, and The purpose of header compression.
  • the first packet marking and the packet compression marking function independently, and not all packets are compressed. If the packet does not require compression, the packet compression flag is not needed, but the first packet flag may still be needed.
  • the above header compression scheme is not only applicable to the transmission of IP packets via the NCT data network, but also applies to the process of transmitting NCT packets via the IP network. Furthermore, for the ATM device or the frame relay device connected to the NCT data network, when the ATM packet or the frame relay packet transmitted by the NCT5 data network passes through the NCT5 data network, the header thereof may also be compressed.
  • the NCT address has been replaced by a connection identifier (ID), and the connection identifier (ID) has only a local meaning and cannot be compressed. Therefore, the object of further compression can only be an IP address as a packet payload. For this reason, for the first packet of the IP packet, a separate first packet flag, a packet compression flag, and a flow flag can be set in the header according to the method described above, and the first packet IP packet is still completely placed as the payload of the NCT packet. NCT grouping In 2005/000594, the header information is retained in the header. The marker bit does not change when the NCT address is replaced by the connection identifier (ID).
  • the above marker bit information can directly reach the destination ED device, and the destination ED device is taken out of it.
  • the flow tag value and the IP header are made into a mapping table.
  • the IP header is no longer transmitted during transmission, but only the flag bit information is transmitted.
  • the ED device at the destination can determine which subsequent packet of the first packet is based on the flow mark, and accordingly restore the IP header of the subsequent packet.
  • the above method can make the packet header compression method also be used in the tunnel working mode, thereby further improving the efficiency of network transmission.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Description

N2005/000594
IP电信网***、 IP电信网通信方法及其应用
技术领域
本发明涉及一种 IP电信网***, 同时也涉及到该 IP电信网***所使 用的通信方法、 基于 IP电信网***实现虚拟专网(以下简称为 VPN)及组播 功能的方法、 IP电信网***内进行资源管理的方法等,属于通信技术领域。 背景技术
当前, 电信网的发展已经进入十字路口。 传统的电信网日益受到新兴 的基于 Internet理念设计的 IP网络的强有力冲击, 正处于根本性的转型过 程之中。 在这一转型过程之中, 人们逐渐认识到下一代的电信网应该采用 基于分组交换技术和不面向连接的工作方式的 IP网, 网络设备间不采用复 杂流量控制技术的技术理念, 并开始将这一认识付诸实践。
在现有电信网的局部领域,人们开展了用 IP网来承载电信业务的尝试。 这种尝试取得了部分成功, 例如目前普遍使用的 IP电话就是典型的例子。 但是, 电信业务本身对安全性和服务质量(QoS )要求很高。 由于现有的 IP 网络的典型一 Internet是一个自由开放, 没有统一管理机制的网络, 它的 设计理念就是尽可能向用户提供一个自由方便的工作平台, 网络尽可能不 干预用户的工作, 除为了维持网络的生存收取一定的网络接入费, 为此有 一定的用户鉴权等管理机制外, 其余的事情网络运营者一概不管。 因此, 现有 Internet的不安全性和不可信任性使人们对在 Internet上开展要求高 度安全的电信业务缺乏信心。 目前, 重要的商用业务网, 甚至大型企业网 的业务数据都不敢加载到企业的公用 IP网上去。 象银行、 证券交易所等高 灵敏度, 要求高度安全的业务仍然加载在现有电信网的 X. 25网中。 在另一 方面, 正是由于 Internet网络缺乏管理, 服务质量缺乏保证, 目前在其上 运行服务质量要求不是很高的语音通信服务问题不大, 但是一旦要运行服 务质量要求较高的数据互连业务和实时视频业务, 现有的 Internet就不能 让人十分放心了。 这就是现在一些借助网络传播的重要活动往往需要电信 部门提供单独的通信保障的原因所在。
鉴于上述问题的存在, 人们开始认识到下一代的电信网不能是简单地 将电信业务移植到现有的 Internet上。 下一代电信网将会是 IP网, 但它 是一个与现有的基于 Internet设计理念的 IP网有很大区别的 IP电信网 (参看蒋林涛: 《IP电信网技术研究》 , 《中兴通讯技术》 2003年第 1期; 《下一代电信网的研究》 , 《电信科学》 2004年第 1期) 。 IP电信网一方 面要充分吸收 IP网不面向连接带来的技术优势,另一方面要能充分满足电 信业务对安全性和服务质量的高要求。这种 IP电信网的理念虽然已经提出 过一段时间了, 但到目前为止, 其具体的技术方案仍然是空白。
发明内容
本发明的目的在于提供一套实现 IP电信网的完整技术方案。该技术方 案包括 IP电信网***的基本架构及其实现通信的方法、 基于 IP电信网系 统实现虚拟专网及组播功能的方法、 IP电信网***内进行资源管理的方法、 对其中传送的分组进行报头压缩的方法,以及在 IP电信网***中传送的特 定分组格式及其实现机制等。
为实现上述的发明目的, 本发明采用下述的技术方案:
一种 IP电信网***,该 IP电信网是基于 IP协议的不面向连接的***, 其特征在于 - 所述 IP电信网***是一个双地址结构的***,该***包括至少一个复 址无连接数据网、 多数个 IP网, 以及多数个边缘关口设备, 所述 IP网通 过所述边缘关口设备与所述复址无连接数据网相连接;
所述每个复址无连接数据网中还包括至少一个地址映射设备; 边缘关 口设备通过地址映射设备完成双地址间的映射。
所述复址无连接数据网中的所有设备与所述边缘关口设备都分配有一 个复址无连接数据网地址,所述 IP网中的所有设备和所述边缘关口设备都 分配有 IP地址, 所述 IP地址和所述复址无连接数据网地址之间的映射关 系保存在所述地址映射设备内的地址映射表之中;
所述边缘关口设备经认证与所述地址映射设备之间建立连接。
其中, 所述复址无连接数据网具有层次型的体系结构, 在其中具有进 行全局管理的网络管理设备。
所述复址无连接数据网分为三层: 核心层、 汇聚层、 接入层, 所述核 心层、 汇聚层、 接入层分别由多数个核心层设备、 汇聚层设备和接入层设 备组成, 每一个接入层设备都与至少一个所述边缘关口设备连接, 并且向 上连接一个汇聚层设备; 所述汇聚层设备和核心层设备连接, 所述核心层 设备相互连接; 所述复址无连接数据网还具有网络管理设备以及地址映射 设备, 所述网络管理设备同时管理接入层设备、汇聚层设备和核心层设备。 所述复址无连接数据网为多个, 各复址无连接数据网之间建立有信任 关系。
所述复址无连接数据网经所述边缘关口设备与所述 IP网建立连接,设 备之间建立有信任关系。
所述复址无连接数据网内部采用复址无连接数据网本身的地址来进行 寻址, 所述复址无连接数据网地址的分配遵循按地域层次结构的地址分配 规则。
所述边缘关口设备汇聚来自所述 IP网的业务流,并转发到所述数据网 另一侧的目的端边缘关口设备,由目的端边缘关口设备发给目的端侧 IP网 的设备。
所述 IP网与所述复址无连接数据网在拓扑结构上严格分离,通过所述 边缘关口设备连接。
复址无连接数据网具有面向连接(隧道方式)和不面向连接两种工作方 式, 在两种工作方式下都采用确定路由。
一种上述 IP电信网***实现通信的方法,其特征在于,包括如下步骤:
(1) 向复址无连接数据网中所有设备分配复址无连接数据网地址;
(2) 所述边缘关口设备经认证向地址映射设备注册,并向地址映射设备 传送地址映射关系表;
(3) 源端边缘关口设备接收 IP网的 IP分组,并将 IP分组中的 IP 目的 地址送到地址映射设备;
(4) 地址映射设备进行 IP网的 IP目的地址与复址无连接数据网地址之 间的地址解析和映射, 将获得的目的端边缘关口设备的数据网地址回送给 源端边缘关口设备;
(5) 源端边缘关口设备根据复址无连接数据网地址发送报文到目的端 边缘关口设备;
(6) 目的端边缘关口设备接收到报文,根据目的 IP地址向 IP网转发报 文。
其中, 所述复址无连接数据网中所有设备利用复址无连接数据网地址 寻址, 并且复址无连接数据网中传送的报文都有完整的复址无连接数据网 地址。
步骤 (2)中地址映射关系是指所述边缘关口设备的数据网地址以及与之 连接的 IP网中的所有设备的 IP地址的映射关系。 在步骤 (5)中, 当报文仅在一个复址无连接数据网内进行发送的时候, 所述源端边缘关口设备将报文传送给其所属的接入层设备, 再转发至汇聚 层设备, 汇聚层设备根据复址无连接数据网地址来判断是转发到其所属的 接入层设备, 就直接发送给接入层设备, 接入层设备再根据所述复址无连 接数据网地址发送给目的端边缘关口设备。
或者, 当报文仅在一个复址无连接数据网内进行发送的时候, 所述源 端边缘关口设备将报文传送给其所属的接入层设备,再转发至汇聚层设备, 汇聚层设备将其转发至核心层设备, 所述核心层设备根据复址无连接数据 网地址来判断是转发到其所属的接入层设备, 就经过汇聚层设备发送给接 入层设备, 接入层设备再根据所述复址无连接数据网地址发送给目的端边 缘关口设备。
或者, 在报文需要从一个复址无连接数据网传送到其他复址无连接数 据网的情况下, 来自所述源端边缘关口设备的报文逐层汇聚, 从接入层设 备、 汇聚层设备至核心层设备, 经核心设备后再转发到其他复址无连接数 据网, 然后在其他复址无连接数据网中从核心层设备逐层转发至所述目的 端边缘关口设备。
一种在 IP电信网***中以隧道方式实现通信的方法, 其特征在于: 所述 IP电信网中的网络管理设备在复址无连接数据网中建立隧道,所 述隧道为位于两端的边缘关口设备和位于中间的节点设备之间建立的逻辑 虚电路;
承载用户通信业务的 IP分组通过 IP网到达所述隧道的源端边缘关口 设备, 经地址解析和映射之后转换成复址无连接数据网中的链路帧, 沿所 述隧道传送, 在到达所述隧道的目的端边缘关口设备之后, 恢复为 IP分组 向外传送。
其中, 所述链路帧在所述隧道中相邻的两个网络节点之间传送时, 使 用连接标识进行寻址。
所述复址无连接数据网分组由所述源端边缘关口设备将其中的复址无 连接数据网地址替换成该边缘关口设备与下一级网络节点之间的连接标 识, 形成复址无连接数据网的链路帧, 并向下一级传送; 所述下一级节点 再将所述复址无连接数据网的链路帧中的连接标识替换成该节点与再下一 级的连接标识, 形成新的复址无连接数据网的链路帧, 进一步沿所述隧道 传送; 4 所述复址无连接数据网的链路帧以此方式到达所述目的端边缘关口设 备, 在所述目的端边缘关口设备处将连接标识恢复成复址无连接数据网地 址。
所述隧道建立的过程包括如下的步骤:
(1) 用户向所述网络管理设备提出建立隧道的申请,所述网络管理设备 核准该申请;
(2) 所述网络管理设备向隧道源端的边缘关口设备发送建立隧道的命 令;
(3) 源端边缘关口设备接收到该命令之后,向目的端的边缘关口设备发 送建立隧道连接的请求;
(4) 该请求逐级传送,其途经的各复址无连接数据网节点设备在收到该 请求之后, 根据自有的资源情况作出判断;
(5) 如果所述节点设备满足资源请求, 则根据该请求配置链路资源, 并 分配连接标识, 填写链路转发表, 并向下一节点转发该请求, 直至目的端 边缘关口设备;
(6) 如果目的端边缘关口设备的资源状况支持建立该隧道连接,则目的 端边缘关口设备向源端边缘关口设备发送接受请求的响应;
(7) 源端边缘关口设备在收到目的端边缘关口设备的接受响应之后,向 所述网络管理设备回送隧道建立确认响应;
(8) 所述网络管理设备收到隧道建立确认响应, 隧道建立成功。
一种在 IP电信网***中实现虚拟专网的方法,其特征在于包括如下步 骤:
(1) 用户向网络管理设备提出建立虚拟专网的申请,并提交建立该虚拟 专网所需的流量、 流向表;
(2) 网络管理设备为接受的申请确定虚拟专网编号;
(3) 所述地址映射设备生成包含该虚拟专网编号的节点地址映射表;
(4) 网络管理设备根据所述流量、流向表, 向复址无连接数据网节点设 备或与之连接的边缘关口设备发送配置命令, 所述节点设备和边缘关口设 备在资源情况允许的条件下, 接受该配置命令, 建立虚拟专网。
其中, 建立虚拟专网的过程中, 网络管理设备根据所述流量、 流向表 计算出复址无连接数据网的相应节点间链路资源需求表, 并根据计算结果 向复址无连接数据网中的节点设备发送包括虚拟专网编号在内的链路资源 T N2005/000594 配置命令, 据此建立虚拟专网。
或者, 网络管理设备根据流量、 流向表向有关边缘关口设备发送虛拟 专网配置命令, 源端边缘关口设备根据复址无连接数据网的路由向目的端 边缘关口设备发送虚拟专网配置请求, 据此建立虚拟专网。
所述申请虚拟专网的过程中, 如果用户是 IP网中的用户, 则提交的流 量、 流向表为 IP网中节点的流量、 流向表, 所述网络管理设备通过地址映 射设备获得各 IP网节点连接的边缘关口设备地址, 将该流量、流向表换算 成各边缘关口设备之间的流量、 流向表。 如果用户是复址无连接数据网中 的用户, 则其提交的流量、 流向表为边缘关口设备之间的流量、 流向表。
在虚拟专网建立之后, 如果用户是复址无连接数据网中的用户, 则其 通信过程包括如下步骤:
(1) 源端边缘关口设备向目的端边缘关口设备发送复址无连接数据网 分组, 当该分组到达源端边缘关口设备时, 源端边缘关口设备向地址映射 设备发出包含有目的端边缘关口设备地址等参数的地址映射请求命令; (2) 地址映射设备收到地址映射请求命令,如源端边缘关口设备地址与 目的端边缘关口设备地址同属一个虚拟专网, 则向源端边缘关口设备发送 包含有虚拟专网编号、 业务类别和目的端边缘关口设备地址参数在内的响 应命令;
(3) 源端边缘关口设备收到该响应命令, 生成包含有虚拟专网编号、业 务类别参数在内的复址无连接数据网分组, 并将它发向目的端边缘关口设 备;
(4) 复址无连接数据网内的节点设备根据该分组的虚拟专网编号、业务 类别和目的端边缘关口设备地址, 在虚拟专网约定指配的资源范围内进行 传送;
(5) 目的端边缘关口设备收到该复址无连接数据网分组,将它发往目的 顺。
在虚拟专网建立之后, 如果用户是 IP网中的用户, 则其通信过程包括 如下步骤:
(1) 源端 IP设备向目的端 IP设备发送 IP分组;
(2) 当 IP分组到达源端边缘关口设备时, 源端边缘关口设备向地址映 射设备发出包含有目的端 IP地址在内的地址映射请求命令;
(3) 地址映射设备收到该命令,如源端 IP地址与目的端 IP地址同属一 个虚拟专网, 则向源端边缘关口设备发送包含有虚拟专网编号、 业务类别 和目的端边缘关口设备地址参数在内的响应命令;
(4) 源端边缘关口设备收到该响应命令, 形成带有虚拟专网编号、业务 类别的复址无连接数据网分组, 并将它发向目的端边缘关口设备设备;
(5) 复址无连接数据网内的节点设备按复址无连接数据网分组中的虚 拟专网编号、 业务类别、 目的端边缘关口设备地址, 在虚拟专网约定指配 的资源范围内进行传送;
(6) 目的端边缘关口设备收到该复址无连接数据网分组, 将目的端 IP 地址恢复出来, 重组成 IP分组, 将它发往目的端。
一种在 IP电信网***中实现组播的方法,用于实现由用户向网络管理 设备申请发起的组播,该组播实现包括 (1) 组播申请;(¾ 组播树建立;(3) 组 播通信; (4) 组播终结四个步骤, 其特征在于组播实现过程中:
由用户向网络管理设备申请建立组播, 网络管理设备指令复址无连接 数据网节点设备配置资源, 网络管理设备指令地址映射设备建立组播关联 表, 构建组播树。
一种在 IP电信网***中实现组播的方法, 用于实现由 IP网用户发起 的组播, 该组播实现包括 (1) 组播通告; (2) 组播树建立; (3) 组播通信; (4) 组播终结四个步骤, 其特征在于组播实现过程中:
由所述复址无连接数据网中的边缘关口设备和地址映射设备实现采用 IP地址的组播分组与采用复址无连接数据网地址的组播分组之间的转换。
一种在 IP电信网***中基于链路告警机制的资源管理方法,其特征在 于:
1 ) 将 IP网中的业务进行分类, 对每一类业务分别建立若干个资源独 立的虚拟专网, 为虚拟专网的链路配置确定资源;
2 )在建立虚拟专网的过程中设定链路告警的等级以及相应告警等级的 资源阈值, 一旦所述虛拟专网的用户使用的资源超过链路告警阈值, 节点 设备向网络管理设备报警, 网络管理设备将告警信息通知地址映射设备;
3 )对于所述用户新的资源需求, 与之连接的边缘关口设备首先向所述 地址映射设备查询该用户的资源使用状况, 只有所述地址映射设备中无告 警信息才可建立连接, 否则拒绝建立连接。
其中, 所述步骤 2 ) 进一步包括如下步骤:
1 )由参与虚拟专网的节点设备、.网络管理设备和地址映射设备组成一 条资源告警链;
2 )当某一业务类别的用户使用的资源没有超过该业务类别链路告警阈 值, 节点设备不发告警信息; 当某一业务类别的用户使用的资源超过该业 务类别链路告警阈值, 或某一业务类别虚拟专网的用户使用的资源超过该 虚拟专网链路告警阈值, 节点设备向网络管理设备发送告警信息;
3 ) 网络管理设备将包含有业务类别、 虚拟专网编号、 告警等级参数的 告警信息通知地址映射设备。
所述步骤 3) 进一步包括如下的步骤- . 1 )用户一旦要求建立通信连结, 边缘关口设备首先向地址映射设备査 询该用户或业务网的资源使用状况, 如地址映射设备指示该用户或业务网 没有链路告警, 通信建立则按正常业务流程进行;
2)如地址映射设备发现该用户或业务网链路告警, 地址映射设备将向 网络管理设备发出资源检索请求, 查询本次通信连接经过的链路有无链路 告警, 如经过的链路无链路告警, 地址映射设备指示该用户或业务网没有 链路告警, 通信建立则按正常业务流程进行; 如经过的链路告警, 地址映 射设备指示该用户或业务网链路告警, 该通信不能建立。
一种在 IP电信网***中基于信令机制的资源管理方法, 其特征在于:
1 ) 将 IP网中的业务进行分类, 对每一类业务分别建立若干个虚拟专 网, 为虚拟专网的链路配置确定资源;
2 )根据虚拟专网中用户的资源需求, 与之连接的边缘关口设备发出带 有资源要求参数的信令, 向该特定虚拟专网中有关的各个节点传递, 在所 述各节点的资源都能够满足的情况下, 允许建立连接, 以保证用户的资源 需求。
其中, 在通信开始之前, 要为需要使用资源的用户在其申请的虚拟专 网中建立连接, 并在其申请的虚拟专网的资源表中扣除该连接所使用的资 源;
当通信结束后, 拆除该连接, 并将释放的资源增添回虚拟专网的资源 表中。
在连接建立过程中, 沿途的节点中如果属于该虚拟专网的资源不能满 足该连接所需要的资源, 则该次连接不能建立。
通信进行过程中, 只在边缘关口设备处进行接入控制, 参与虚拟专网 的节点设备不进行资源控制和管理。 一种 IP电信网***中复址无连接数据网分组的封装方法,其特征在于 包括以下步骤:
A: 边缘关口设备根据是数据分组还是控制分组, 设定分组类别字段的 值;
B: 边缘关口设备根据其承载业务网的特性来决定业务类型, 设定业务 类别字段的值;
C: 边缘关口设备确定进入的数据分组是否需要进行报头压缩, 如果需 要则进入步骤 D, 否则转到步骤 G;
D: 确定首包标记字段的取值;
E: 确定报头压缩字段的取值;
F: 设定流序号取值;
G: 设定源地址和目标地址。
其中, 在步骤 B之后, 进一步包括以下步骤:
C1 ) 边缘关口设备判断数据分组是否是属于某一个 VPN, 如果是, 则 转入步骤 C2 ); 如果不是, 则转入步骤 C;
C2) 设定虚拟专网标记字段的值;
C3 ) 设定虚拟专网编号字段的值; 转入步骤?。
在步骤 C3 ) 中包括, 对于虚拟专网标记字段置位, 并且具有同源、 同 目的地址、 同业务类别的复址无连接数据网分组, 将该分组的扩展报头标 记字段置位, 标记上不同的虚拟专网编号值, 且虚拟专网编号字段放在扩 展报头中。
在步骤 B之后, 进一步包括以下步骤:
C11 )边缘关口设备 ED确定进入的数据分组是否是属于某一个组播群, 如果是, 则转入步骤 C12 ); 如果不是, 则转入步骤 C;
C12 ) 设定组播标记字段的值;
C13 ) 设定组播地址字段的值, 放入目的地址字段中;
C14 )设定首包标记字段的取值; 如果是组播业务的首包分组, 则下一 步转到步骤 C15 ) , 如果不是则进入步骤 F);
C15 ) 设定扩展报头字段的值, 并转入步骤 F)。
在源端边缘关口设备处, 对同源地址、 同目的地址、 同业务类别的首 包分组, 将首包标记置位、 分组压缩标记不置位、 并赋以流序号确定值; 对同源地址、 同目的地址、 同业务类别的后续分组, 将首包标记不置 位、 分组压缩标记置位、 并设定流序号取值。
在源端边缘关口设备处, 对同源地址、 同目的地址、 同业务类别的首 包分组, IP分组作为复址无连接数据网分组的载荷完整放入;对同源地址、 同目的地址、 同业务类别的后续分组, 复址无连接数据网分组的载荷中只 放入 IP分组的载荷, 不包括 IP报头。
一种对 IP电信网***中传送的分组进行报头压缩的方法,在分组报头 处设置有首包标记域、 分组压缩标记域、 流标记域, 其特征在于包括如下 步骤:
(1) IP网用户发送 IP分组;
(2) 在该 IP分组经由的源端边缘关口设备处, 判断其是否是首包;
(3) 如果是 IP分组的首包, 对该首包对应的首包复址无连接数据网分 组, 将首包标记置位, 分组压缩标记不置位、 并赋以流标记确定值, 然后 源端边缘关口设备将包含 IP报头在内的 IP分组作为复址无连接数据网分 组的载荷完整放入; 发送该复址无连接数据网分组;
(4) 如果不是 IP分组的首包, 对于报头中包含与首包 IP分组同源、 同 目的地址、 同业务类别信息的分组, 判定其为后续 IP分组, 将其对应的复 址无连接数据网分组的报头的首包标记不置位, 分组压缩标记置位、 并赋 以流标记确定值,然后该源端边缘关口设备只将该后续 IP分组的载荷放入 复址无连接数据网分组的载荷之中;
(5) 目的端边缘关口设备对接收到的复址无连接数据网分组,根据其报 头中的首包标记和报头压缩标记判定其是否为首包;
(6) 如果是复址无连接数据网的首包, 则按流标记的值, 将流标记值和 从该复址无连接数据网分组的载荷中取出的 IP报头作映射表,存放在目的 端边缘关口设备处,然后将首包复址无连接数据网分组中的载荷中的 IP分 组取出, 放入目的端边缘关口设备的发送队列中;
(7) 如果不是复址无连接数据网的首包分组,则根据该分组的流标记值 判断其为哪一个首包的后续包, 对于该后续分组, 按流标记的值从映射表 中取相应的 IP报头, 与该后续分组的载荷一起组装成完整的 IP分组, 放 入目的端边缘关口设备的发送队列中;
(8) 目的端边缘关口设备根据 IP地址向 IP网发送 IP分组。
本发明所述的技术方案可以实现作为下一代电信网的 IP 电信网。 该 IP电信网的特点是: 1. 拥有丰富的地址资源, 能够支持电信网的持续发展;
2. 是一个可管理的、 可维护的网络;
3. 网络提供信任度和安全机制, 是一个安全的可信任的网络;
4. 拥有 Internet的灵活性,能提供现有 Internet的全部业务,并拥有 电信网的高稳定性、 可靠性和高度的可管理性, 能够按运营者对业务的设 计要求自主地调度全部网络资源, 保证现有的电信业务以及今后可能产生 业务的服务质量。
附图说明
下面结合附图和具体实施方式对本发明作进一步的说明。
图 1为 IP电信网***的宏观体系示意图。
图 2为 IP电信网***的组成结构示意图。
图 3为 IP电信网实现数据通信的方法。
图 4为 IP电信网***中建立隧道连接的示意图。
图 5为隧道建立过程的工作流程示意图。
图 6为分组在隧道传输的过程中, 不同节点之间交换连接标识 (ID ) 的过程示意图。
图 7为 IP电信网***中实现 VPN的方法流程图。
图 8为建立 NCT VPN的第一种技术方案的流程图。
图 9为建立 NCT VPN的第二种技术方案的流程图。
图 10为 NCT VPN中通信过程的流程图。
图 11为 IP VPN中通信过程的流程图。
图 12为 VPN撤消过程的流程图。
图 13为 IP电信网***中由用户向网管申请发起组播的实现方法流程 图。
图 14为图 13所示方法中, 组播树建立过程的流程图。
图 15为图 13所示方法中, 组播通信过程的流程图。
图 16为图 13所示方法中, 组播终结过程的流程图。
图 17为 IP电信网***中由 IP网用户发起组播的实现方法流程图。 图 18为图 17所示方法中, 组播通告过程的流程图。
图 19为图 17所示方法中, 组播树建立过程的流程图。
图 20为图 17所示方法中, 组播通信过程的流程图。
图 21为 IP电信网***中, 基于链路报警机制的资源管理方法的流程 图。
图 22为 IP电信网***中, 基于信令机制的资源管理方法的流程图。 图 23是 NCT分组格式的一种实施方案的示例图。
图 24是 NCT数据网中的分组封装方法的流程图。
图 25是本发明中, 对分组进行报头压缩的方法的流程图。
具体实施方式
图 1是本发明所实现的 IP电信网的宏观体系示意图。 多个复址无连 结数据网 (以下简称为 NCT数据网)相互连接, 每个 NCT数据网分别连接 多数个 IP网。 这里所说的 IP网包括但不限于 IP城域网、 接入网或用户驻 地网。 图中的细实线表示各 IP网与该网所属的 NCT数据网之间的连接, 粗 实线表示各 NCT数据网之间的连接。 在本发明所述的 IP电信网中, IP网 与 NCT数据网在拓扑结构上严格分离。各 IP网需要与一个 NCT数据网建立 连接, 并且与该 IP网所属的 NCT数据网之间必须建立信任关系, 如果该信 任关系未能建立的话, IP网与 NCT数据网之间不能进行通信; 各 NCT数据 网之间也是这样。 这种连接模式一方面可以确保任一个 IP网的 IP数据包 可以随时到达另外的任何一个 IP网之中,另外一方面可以确保网络上传送 的任何一个 IP 数据包都是可以充分信任的。 因此, 该连接模式既体现了 IP网的高度灵活性, 又充分实现了电信网所要求的高安全性。
图 2是本发明所述 IP电信网***的组成结构示意图。 在图 2中, NCT 数据网与 IP网通过边缘关口设备 ED连接。 各个 NCT数据网之间通过各自 的核心层实现通信。 在本 IP电信网构成的***之中, 在 NCT数据网内部采 用 NCT数据网本身的地址来进行寻址, 该数据网地址不同于 IP网的 IP地 址。 NCT数据网中的设备与边缘关口设备 ED都分配有 NCT数据网地址, 而 与 ED设备相连接的 IP网中的设备, 包括 ED设备本身, 则根据 IP协议的 规定分配 IP地址, 这就意味着在本 IP电信网中釆用了双地址结构, 这种 双地址结构是本发明的关键所在。
NCT数据网是 IP电信网的主体部分, 它采用不面向连接的工作方式。 在本实施例中, NCT数据网由核心层、 汇聚层、 接入层、 网络管理设备以及 地址映射设备组成, 是一种层次型的体系结构。 需要特别加以说明的是, 图 2中 NCT数据网所具有的三层结构只是示例性的, 该实施例所描述的三 层结构即为现有大型网络如城域网所通常采用的 "经典三层结构" ,显然, 对于不同规模和用户需求的网络而言, 这种分层方式是可以改变的, 因此 该三层结构并不构成对本发明保护范围的限制。 NCT 数据网内部的地址分 配可以按目前电信网常用的地址分配原则, 即按国家、 省 (市)、 地区、 区 (县) 分配或其他按地域层次结构的地址分配规则, 以实现地址的有效收 敛性和有效性。
在图 2中,核心层、汇聚层、接入层分别是由多数个核心层设备 CR( 151、
152、 161、 162 )、 汇聚层设备 MR ( 131、 141、 142 )和接入层设备 AR ( 111、 112 )组成。每一个接入层设备 AR都与至少一个边缘关口设备 ED ( 301、 302 ) 连接, 并且向上连接一个汇聚层设备。 所有汇聚层设备分别连接多数个接 入层设备和多数个核心层设备, 核心层设备之间相互连接, 并且不同 NCT 数据网中的核心层设备之间也可以建立连接关系。 另外, 网络管理设备 18 同时管理接入层设备、 汇聚层设备和核心层设备。
地址映射设备 ADT设备是网络的实现地址映射的设备, 它保存地址映 射表。地址映射表中可以是外部网络的 IP地址和边缘关口设备的 NCT数据 网地址的映射关系,也可以是 NCT数据网地址和 ATM地址的映射关系或 NCT 数据网地址和帧中继(F. R)地址的映射关系。 地址映射表的内容依赖于与 边缘关口设备相连的外部网络的类型。 前述 IP地址既可以是 IPv4地址也 可以是 IPv6地址, 或其他基于 IP协议的网络地址。 一个 NCT数据网至少 有一个地址映射设备 19, 与该 NCT数据网连接的所有边缘关口设备都要在 前述地址映射设备 19进行注册, 建立连接, 以实现地址转换。 另外, 地址 映射设备可以有冗余配置, 以确保***的可靠性。 根据需要, 接入层设备 之间也可以直接建立连接关系。
边缘关口设备 ED是 IP网与 NCT数据网连接的关口设备。 它至少具有 两方面的功能, 其一是实现 NCT数据网地址和 IP地址的转换, 使网络可以 用于承载现存的 IP数据包; 另一个功能是对 IP网的业务流进行汇聚, 来 自 IP网的外部设备的 IP包由源端边缘关口设备 ED汇聚,并转发到 NCT数 据网另一侧的目的端边缘关口设备 ED, 由目的端边缘关口设备 ED发给目 的端侧的 IP网的设备。 本 IP电信网***中边缘关口设备的功能可以由现 有的路由器和交换机组合起来实现, 例如对 IP网而言, 该边缘关口设备可 以直接由路由器来实现。
上述每一个边缘关口设备都有确定的 NCT数据网地址和 IP地址。每一 个边缘关口设备确知与其相连接的设备或网络的 IP地址。边缘关口设备必 须向相应的地址映射设备 ADT进行注册, 而且必须是相应的地址映射设备 ADT所信任的, 注册过程需要进行认证, 以确认边缘关口设备 ED与地址映 射设备 ADT之间的信任关系。 边缘关口设备 ED在完成向地址映射设备 ADT 注册和认证后,新注册的边缘关口设备 ED将向地址映射设备 ADT存贮双地 址映射关系, 也就是边缘关口设备的 NCT数据网地址和与其相连接的设备 或网络的 IP地址的关联关系。 在边缘关口设备连接的设备或网络的 IP地 址变更后,边缘关口设备将要修改的设备或网络的 IP地址与边缘关口设备 的 NCT数据网地址的所有关联关系发送给地址映射设备 ADT, 以确保地址 映射设备 ADT中有完整的和正确的网络或设备的 IP地址与边缘关口设备的 NCT数据网地址的映射表。
NCT数据网中的设备与边缘关口设备 ED都有 NCT数据网地址, 接入到 边缘关口设备 ED的设备或网络采用 IP地址。 值得说明的是, 设备或网络 也可以采用 ATM地址或帧中继 (F. R. ) 地址, 这样本 NCT数据网也可以承 载 ATM数据包或者帧中继数据包。 在本实施例中, 仅以 IP地址为例进行说 明。 NCT数据网内采用该 NCT数据网地址和 NCT帧结构,并利用 NCT地址来 进行寻址。 NCT 数据网地址可以按电信网常用的地址分别原则进行分配, 以实现地址的有效收敛性。 NCT数据网中的所有设备都分配有 NCT地址, 每一个边缘关口设备 ED都由一个 NCT地址来标识。 NCT数据网中的每一个 报文的报头中拥有完整的 NCT地址, NCT数据网中的设备根据 NCT地址来 进行路由选择。
下面结合图 3具体说明本发明所述的 IP电信网实现数据通信的方法。 步骤 1 ) 向 NCT数据网中所有设备分配 NCT数据网地址;
步骤 2 ) 所述边缘关口设备经认证向地址映射设备注册, 并向地址映 射设备传送地址映射关系表;
步骤 3 ) 源端边缘关口设备接收外部网络的 IP分组, 并将 IP分组中 的 IP目的地址送到地址映射设备;
步骤 4 )地址映射设备进行外部网络 IP目的地址与 NCT数据网地址之 间的地址解析和映射, 将获得的目的边缘关口设备的 NCT数据网地址回送 给源端边缘关口设备;
步骤 5 ) 源端边缘关口设备根据目的边缘关口设备的 NCT数据网地址 发送报文到目的端边缘关口设备。
在这一步骤中, 每一个报文的报头中拥有完整的 NCT地址, NCT数据 网中的所有设备根据 NCT地址来进行路由选择。 当报文仅在一 NCT数据网 内进行发送的时候, 边缘关口设备 ED 301将报文传送给其所属的接入层设 备 111, 再转发至汇聚层设备 131。 汇聚层设备 131根据数据网 NCT地址来 判断是转发到其所属的接入层设备 112, 就直接发送给接入层设备 112, 接 入层设备再根据 NCT地址发送给边缘关口设备 302。 另外, 报文也可以经 过汇聚层设备之后再向上转发至核心层设备, 再经由核心层设备向下逐层 转发至目的端边缘关口设备。在报文需要从一个 NCT数据网传送到其他 NCT 数据网的情况, 来自边缘关口设备 ED的报文逐层汇聚, 从接入层设备、 汇 聚层设备至核心层设备, 经核心设备后再转发到其他 NCT数据网, 然后在 其他 NCT数据网中从核心层设备逐层转发至边缘关口设备。 可以理解, NCT 数据网采用固定路由技术或适度的动态路由技术, 可以是单路由, 也可以 是由主路由和备份路由双路由或多路由组成。 报文传递经过的路由则是固 定的。 对报文中的双地址可以采用类似 "隧道" 技术的方法进行解析, 作 为本领域的公知技术, 在此就不赘述了。
步骤 6 ) 目的端边缘关口设备接收到报文, 并根据目的 IP地址向 IP 网转发报文。
通过上述的边缘关口设备和通信方法,使本发明所实现的 IP电信网既 可以承载现存的 IPv4包, 也可以承载 IPv6包或其他数据包, 具体而言, 无论接入到源端 ED设备的设备或网络的 IP地址是 IPv4地址还是 IPv6地 址,也不论接入到目的端 ED设备的设备或网络的 IP地址是 IPv4地址还是 IPv6 地址, 都可以在本 IP 电信网中实现畅通无阻的通信, 从而实现 NCT 数据网与外部的 IP网之间的无缝连接,并且这一通信过程是建立在已经具 有信任机制的网络节点之间, 因此从端到端的安全性也是有保障的。
上文介绍的是边缘关口设备之间传送分组的路由工作方式, 即源端边 缘关口设备和地址映射设备完成 IP地址与 NCT 地址之间的地址解析和映 射,将具有 IP地址的分组转换成具有 NCT地址的分组。在 NCT数据网内部, 网内节点根据对 NCT分组的 NCT地址, 按照其内部确定的路由规则进行传 送, 直至到达目的端边缘关口设备。 NCT 分组到达目的端边缘关口设备之 后, 由该设备会同地址映射设备将其的 NCT地址转换成 IP 地址, 从而将 NCT分组还原成为 IP分组, 由 IP网进行传送。 该分组传送方式是 IP电信 网的基本工作方式。 但是, IP电信网还可以有利用 NCT隧道实现通信的工 作方式。 该 NCT隧道与现有通信网络中使用的隧道一样, 都釆用逻辑虚电 路的技术理念, 但两者的实现机制却有明显的不同。 下面即对该利用 NCT 隧道实现通信的工作方式予以详细的说明。
在 IP电信网***中利用 NCT隧道实现通信的方法的实质是在 NCT数据网 内部建立多个逻辑虚电路, 每一逻辑虚电路由位于两端的 ED设备和多数个 位于数据网内的节点设备共同确定, 分别分配给不同的用户使用。 如图 4 所示, 其中的实线表示隧道所确定的逻辑虚电路, 而虚线则表示采用传 统的路由工作方式时, 分组所可能经过的不同路径该逻辑虚电路是根据 NCT数据网中的网络管理设备发布的命令建立的,一旦建立后就固定分配给 某一用户从事某一具体的通信业务, 如语音业务、 数据业务等, 直至网络 管理设备发布取消该逻辑虚电路的命令为止。在该逻辑虚电路存续期间中, 如果某一通信业务被指定通过该逻辑虚电路进行, 则参与该业务的 IP网中 的设备首先向该逻辑虚电路一端的 ED设备发送 IP分组, 承载通信业务的 IP 分组通过 IP网中的路由机制到达该 ED设备, 在 ED设备中转换成 NCT的链路 帧, 并按照该逻辑虚电路确定的路径传送该链路帧, 直至到达路由另一端 的 ED设备为止1。 另一端的 ED设备将 NCT的链路帧恢复成 IP分组, 并通过 IP网 中的路由机制将该分组传送至通信业务所确定的最终目的地。 从上面的说 明可以看出, 在这一过程中, 分组在 NCT数据网内部的传输路径是固定的。 这种固定的传输路径作为一种逻辑虚电路, 在电信领域通常被称为 "隧 道" , 因此, 我们将上述 NCT数据网内部实现的逻辑虚电路称为 NCT隧道。
需要指出的是, 上述的 NCT隧道和现有如 VPN中的隧道虽然都是基于 逻辑虚电路的技术理念, 但其实现机制完全不同。 在 VPN中, 对于需要通 过隧道传送的链路帧釆取报头封装的技术方案, 即在隧道的入口处, 在链 路帧的头部加上新的 IP头标, 封装后让该链路帧通过隧道进行传送, 在隧 道的出口处, 则将该 IP 头标删除, 恢复原来的分组, 发向目的地。 而对 IP电信网而言, 隧道属于 NCT数据网内部, 该数据网采用层次型的体系结 构, 由网络管理设备进行统一管理。 因此, 隧道内的链路帧不采用头标封 装的方法, 而是使用简短的连接标识 (ID ) 替代冗长的 NCT地址, 这种做 法充分利用了 NCT数据网管理机制的特点, 有利于节省地址开销, 提高传 输效率。 这也就是本发明中所称的逻辑虚电路被命名为 NCT隧道的原因所 在。
如图 5所示,在 IP电信网***中,建立隧道以实现通信的过程是这样的: 在建立隧道之前需要进行的是所有 IP电信网***工作前所必须进行的 工作: 向 NCT数据网中所有设备和每一个边缘关口设备分配 NCT地址。 这一 过程在上文中也有说明, 在此不再赘述。
如果用户需要利用隧道传送某一通信业务数据, 则它首先向 IP 电 信网中的网络管理设备提出建立隧道的申请。 网络管理设备按照内部确 定的工作原则核准该申请之后, 向隧道源端的 ED 设备发送带有目的地 址、 业务等级、 资源要求等参数在内的建立隧道连接命令。 源端 ED设备接 收到该命令之后, 使用 NCT数据网的命令, 向作为隧道目的端的 ED设备发 送带有资源要求、业务等级和连接序号等参数在内的建立隧道连接的请求。 该命令按照 NCT数据网内部既有的路由机制逐级传送, 其途经的各 NCT数 据网节点设备在收到该命令所传达的建立隧道的请求之后, 根据自有的资 源情况作出判断, 如果资源满足, 则根据该请求配置链路资源, 并分配连 接标识 (ID ), 填写链路转发表, 并向下一节点转发该请求, 直至目的端 ED设备。 如果目的端 ED设备的资源状况支持建立该隧道连接, 则目的端 ED设备向源端 ED设备发送接受请求的响应。源端 ED设备在收到目的端 ED 设备的接受响应之后, 立即向网络管理设备回送隧道建立确认响应。 网络 管理设备收到源端 ED 设备的隧道建立确认响应, 向地址映射设备发送命 令, 在收到地址映射设备的确认响应后, 隧道建立成功。 隧道建立之后, 该用户的该类通信业务的所有 IP分组在经过 NCT数据网时,都将按照链路 转发表所确定的逻辑虚电路进行传送。 , 在建立隧道的过程中, 源端 ED设备在向目的端 ED发送建立隧道连接 的请求的同时, 也可以启动 NCT数据网的备用路由发送请求, 建立主 /备两 条隧道。 一旦主逻辑虚电路出现问题, 则可以及时启用备用逻辑虚电路, 确保数据传送畅通。
另外,如果途经的节点设备或目的端 ED设备资源状况不支持建立该隧 道, 则途径资源不满足的节点设备或目的端 ED设备会向源 ED设备发送拒 绝响应, 本次隧道配置无效, 源 ED设备会立即向网络管理设备回送隧道建 立失败响应。 源端 ED设备在发出建立隧道的请求的同时, 启动计时, 如果 计时超时, 尚未收到接收 /拒绝响应, 也认为本次配置无效。 上述两种情况 均认为隧道建立不成功。
从上面的说明可以看出, IP电信网中的隧道与现有 VPN中的隧道一样, 都是逻辑意义上的 "逻辑虚电路" 。 它的建立和取消的过程不需要物理上 的操作, 因此建立和取消隧道的过程完全可以由网络管理设备自动进行: 一旦用户有需求, 自动建立隧道连接, 一旦需求结束, 自动取消隧道连接。 如图 6所示, 图中圆圈内的数字即表示连接标识 (ID )。 该连接标识 ( ID ) 不是端 (源端 ED设备) 到端 (目的端 ED设备) 的地址, 它只有局 部意义, 只是点 (节点设备) 与点 (节点设备) 之间链路连接的标识, 并 无全局意义, 因而相对于网络层的全局地址, 连接标识 (ID ) 的长度肯定 要小于网络层地址的长度。 在前面的说明中已经提过, 在 IP电信网中, IP 分组在到达 ED设备时, ED设备会和 ADT设备一起, 在 IP分组的 IP地址 之前添加 NCT地址, 将 IP分组转换成 NCT分组, 从而才可以在 NCT数据网 中进行传送。 在 NCT分组中, 原 IP地址仍然作为分组载荷本身得到保留。 在通过隧道实现通信的过程中, 我们首先在隧道建立时就同时建立 NCT地 址与连接标识(ID )之间的对应关系, 该对应关系在隧道所经过的源端 ED、 目的端 ED及节点设备中进行存储, 并且一旦建立之后就不再改动, 直到隧 道连接拆除。 这样, 我们就可以在 NCT数据网内部用连接标识 (ID ) 替代 全局性的 NCT地址。 NCT分组在隧道中进行传输的时候, 在源 ED处用该 ED 设备与下一级节点设备之间的连接标识 (ID ) 替换 NCT链路帧中的 NCT地 址。 这样, 在隧道中传送的是 NCT的链路帧, 上述 NCT的链路帧到达下一 级节点设备时, 该节点设备删去 NCT的链路帧的连接标识(ID), 并用自己 与后一级的节点设备之间确定的连接标识 (ID ) 取代, 然后 NCT的链路帧 继续在隧道中传送, 直至到达目的端 ED设备为止。 由目的端 ED设备将该 链路帧恢复成 IP分组转发到 IP网。 这样就实现了在隧道内进行通信的时 候, 使用较短的连接标识 (ID ) 取代较长的 NCT地址, 从而节省了地址上 的开销, 提高了网络传输的效率。
在 IP电信网中实现隧道工作方式后, 使用隧道的 IP用户之间的基 本通信方式是这样的:
(1) 源端 IP用户发送 IP分组, 该 IP分组通过 IP网到达与该 IP用户 连接的源端 ED设备处;
(2) 源端 ED设备接收该 IP分组,并将 IP分组中的 IP目的地址送到地 址映射设备;
(3) 地址映射设备进行 IP目的地址与目的端 ED设备的 NCT数据网地址 之间的地址解析和映射, 当发现源端 ED设备与目的端 ED设备存在隧道连 接时, 将已经接收的包含源 /目的端 IP地址、 源 /目的端 NCT地址、 业务类 别、 等参数在内的信息回送给源端 ED设备, 由源端 ED设备启用该隧道连 接; (4) 源端 ED设备根据该隧道连接所确定的逻辑虚电路 (体现在链路转 发表之中), 发送该 IP分组转换成的链路帧到下一级节点设备, 由此逐级 传送到目的端 ED设备处。 在这一过程之中, 分组途经的各节点设备和 ED 设备之间按照上文所述的方式进行相应的连接标识 (ID ) 交换。
(5) 目的端 ED设备通过隧道接收到该链路帧之后, 恢复成为 IP分组, 并根据目的 IP地址向 IP网中进行转发。
下面, 进一步介绍本发明所述的 IP 电信网***用于实现 VPN ( VPN ) 和组播的具体方法。
IP电信网***的 VPN有两类,一类是 IP VPN, 另一类是 NCT VPN。 其中 的 IP VPN是根据用户指定的一群 IP地址以及这些 IP地址之间的流量、 流 向关系, 建立满足相应要求的 VPN; NCT VPN则是根据一群 NCT地址以及这 些 NCT地址之间的流量、 流向关系, 建立满足相应要求的 VPN。 NCT VPN主 要用于提供透明专线服务的 VPN。 这两类 VPN都需经过 ED和 ADT来实现。 为了在 IP电信网***中建立 VPN,在 NCT分组中为实现 VPN设有专用的域- VPN标识域和 VPN编号域。 VPN标识域表示在 NCT网内传送的分组是否属于 某一个 VPN, VPN编号域则表示该分组属于哪一个 VPN。 这两个域为我们建 立 IP电信网***的 VPN提供了便利。
在 IP电信网***中实现 VPN的总体流程图参照图 7所示,包括如下的 步骤:
(1) 用户向网络管理设备提出建立 VPN 的申请, 并提交建立该 VPN 所需的流量、 流向表;
(2) 根据流量、 流向表判断是何种类型的 VPN?
如果是 NCT VPN, 其流量、 流向表是 ED之间的流量、 流向表, 转入步 骤 (4) ; 如果是 IP VPN , 则流量、 流向表为 IP网中节点的流量、 流向表, 转入步骤 (3) ;
(3) 网络管理设备通过 ADT获得各 IP网节点连接的 ED的地址,将该 流量、 流向表换算成各 ED之间的流量、 流向表, 转入步骤 (4) ;
(4) 是否由网络管理设备配置资源?
(5) 如果是, 则网络管理设备根据所述流量、 流向表计算出相应 NCT 数据网节点间链路资源需求表, 并根据计算结果向 NCT数据网中的节点 设备发送包括 VPN编号在内的链路资源配置命令, 据此建立 VPN
(6) 如果否, 则网络管理设备根据流量、 流向表向有关 ED发送 VPN配 置命令, 源端 ED根据 NCT数据网的路由向目的端 ED发送 VPN配置请求, 据此建立 VPN。
下面对上述的整体过程分为在 NCT数据网中实现的 VPN和在 IP网中实 现的 VPN分别加以详细的说明。
NCT数据网中实现 VPN的过程包括如下的步骤-
1. 申请 VPN:
首先, 请求建立 VPN的用户向网络管理设备提出建立 VPN的请求, 并提供建立该 VPN所需的流量、 流向表。
2.建立 VPN:
建立 NCT VPN有两种技术方案。
第一种技术方案如图 8所示, 包括下列步骤:
网络管理设备根据用户提交的 VPN的 ED 间的流量、 流向表, 计算 出 NCT数据网内相应节点间链路资源需求表, 网络管理设备根据上述计 算结果, 确定 VPN编号, 向 NCT数据网的有关节点设备发送带有业务类 别、 VPN编号等参数的链路资源配置命令。
NCT数据网中的节点设备根据自有资源情况作出响应; 如果资源状况 支持建立该 VPN, 则 NCT数据网中的节点设备接受该命令, 按该命令参 数要求配置链路资源, 并向网络管理设备返回确认响应。 网络管理设备 收到 NCT数据网中相关的所有节点设备的确认响应后, 向 ADT发送带有 业务类别、 VPN编号等参数的命令。 ADT收到来自网络管理设备的 VPN命令, 即回送确认响应。 网络管理设备收到确认响应, VPN建立成功。
如果资源状况不足以支持建立 VPN , 则复址无连接数据网中的节点 设备拒绝该命令, 本次配置无效。 VPN建立不成功。
应用这种方案可以实现保证质量的 VPN。 由网络管理设备对 VPN建 立进行配置和控制, 可以实现 VPN资源的优化, 易于建立固定的或者最 优的 VPN隧道, 而且建立快速。
第二种技术方案如图 9所示, 包括下列步骤:
网络管理设备向需要建立 VPN的该源端 ED发送建立 VPN命令,该命令 应包含有 VPN业务类别、 VPN编号、 源端 ED地址 /目的端 ED地址等参数。
源端 ED根据 NCT的主路由向目的端 ED发 VPN配置请求, 或者, 同时 启动 NCT备用路由发 VPN配置请求。 途经的各 NCT节点设备, 收到该请求 后根据自有的资源情况作出响应: 如果资源状况支持建立该 VPN, 则 NCT T N2005/000594 节点设备根据该 VPN配置请求配置链路资源, 并向下一节点转发该 VPN配 置请求, 直至目的端 ED ; 如果目的端 ED的资源状况支持建立该 VPN, 则目 的端 ED向源端 ED发送接受响应。
如果源端 ED收到目的端 ED的接受响应,则源端 ED立即向网络管理设 备回送确认响应。 网络管理设备收到该 VPN的所有相关 ED的确认响应, 网 络管理设备向与源端 ED相连接的 ADT发送带有业务类别、 VPN编号等参数 的命令。
ADT收到来自网络管理设备的命令, 建立 VPN编号、 业务类别和目的 端 ED地址映射表, 然后回送确认响应。 网络管理设备收到确认响应。 VPN 建立成功。
如果节点设备或目的端 ED资源状况不支持建立该 VPN, 则 NCT节点设 备或目的端 ED向源端 ED发拒绝响应。 本次配置无效。 如果源端 ED的启动 计时超时, 尚未收到接收 /拒绝响应, 源端 ED也认为本次配置无效。 上述 两种情况均认为 VPN建立不成功。
这种由源端 ED发出 VPN配置请求后, 由各节点转发来建立 VPN的 方案, 能够根据当前网络情况建立 VPN。
3.通信过程:
NCT VPN中的通信过程如图 10所示:
源端 ED向目的端 ED发送 NCT分组, 当 NCT分组到达源端 ED时, 源端 ED向 ADT发出带有目的端 ED地址、 业务类别等参数的地址映射请 求命令。
ADT收到地址映射请求命令, 如判断源端 ED地址与目的端 ED地址 同属一个 VPN时, ADT即向源端 ED发带有 VPN编号、 业务类别和目的端 ED地址等参数响应命令。
源端 ED收到带有 VPN编号、 业务类别和目的端 ED地址等参数响应 命令, 形成带有 VPN标记、 VPN编号、 业务类别、 数据载荷等域的 NCT分 组, 并将它发向目的端 ED。
NCT网内的 AR、 MR、 CR等节点设备, 按 NCT分组的 VPN标记、 VPN 编号将 NCT分组传送到目的端 ED。
目的端 ED收到 NCT分组将它发往目的端。
由 IP网用户参与的 IP VPN的实现过程是这样的-
1. IP网内用户通过源端 ED向网络管理设备提交该 IP VPN的 IP设 备之间的流量、 流向表。
2. 网络管理设备接收到用户提交的该 IP VPN 的 IP设备之间的流 量、 流向表, 网络管理设备向 ADT 提出地址解析请求, 解析出相应 ED 的 NCT地址。 然后, 网络管理设备将 IP设备之间的流量、 流向表换算成 相应 ED间的流量、 流向表。
3. 对 NCT数据网内的 VPN建立过程与前述 NCT VP 的建立过程相 同。
4. 该 IP VPN的所有 IP设备分别与相连接的边缘关口设备 ED之间, 通过隧道技术或者现有的 VPN技术等建立连接, 至此 IPVPN建立完成。
5. IP VP 的通信过程:
该通信过程如图 11所示, 包括下列步骤:
源端 IP设备向目的端 IP设备发送 IP分组。
当 IP分组到达源端 ED时, 源端 ED向 ADT发出带有目的端 IP地址 等参数的地址映射请求命令。
ADT收到地址映射请求命令, 如源端 IP地址与目的端 IP地址同属 一个 VPN时, ADT即向源端 ED发送带有 VPN编号、 业务类别和目的端 ED 地址等参数响应命令。
源端 ED收到带有 VPN编号、 业务类别和目的端 ED地址等参数响应 命令, 形成带有 VPN编号、 业务类别的 NCT分组, 并将它发向目的端 ED。
NCT网内的 AR、 MR、 CR等节点设备, 按 NCT分组的 VPN编号、 业务 类别、 目的端 ED地址等参数, 在 VPN约定指配的资源范围内进行传送。
目的端 ED收到 NCT分组, 将目的端 IP地址恢复出来, 重组 IP分 组, 将它发往目的端。
概括地说, IP VPN与 NCT VPN相比, 由于在 IP VP 是根据 IP网内 IP设备之间的流量、 流向表来建立 IP设备间的 VPN, 这里的 IP设备可 以是一个确定 IP地址的 IP设备, 也可以是一个 IP 网中的一个用户驻 地网 (CPN )等, IP设备与相对应的 ED间用隧道或现有 VPN技术如 MPLS VPN或者 IPSec VPN等实现连接。 IP VP 的接入点是 IP网。 NCT VP 的 接入点是 ED。
撤销 VPN 的过程如图 12 所示, 包括下列步骤: 用户提出撤消 VPN 申请, 网络管理设备向复址无连接数据网节点设备与地址映射设备发送 撤消 VPN命令, 复址无连接数据网节点设备释放已配置的资源, 地址映 射设备清除 VPN地址映射表, VPN撤消。
在实际业务中, 可能需要建立多个 VPN, 例如在一个较大规模的企业 内部网中, 根据业务需要, 至少需要建立 3个 VPN, 其中一个 VPN用于内 部的办公自动化, 另外一个 VPN用于建立企业内部的核心数据网, 还有一 个 VPN用于召开视频会议。 因此, 不同的 VPN业务有必要进行编号管理。 这也就是前面所述的在分组内设置 VPN编号位的目的端所在。 该 VPN编号 在一个 NCT数据网内是唯一的。 在一个 NCT数据网内, 针对不同的业务类 另 lj, 也可以有相同的 VPN的编号, 即在一个运行网内最多可有 "VPN编号 X 业务类别"个 VPN。
由二个或二个以上的 NCT数据网组织 VPN时,在不同 NCT数据网中 VPN 的编号可以是不同的, 由 NCT数据网之间进行连接的核心层设备 CR进行 VP 的编号之间的匹配。
从上述的说明可以看出, 在上述 IP电信网***实现 VPN的方法中, NCT数据网内部实现 VPN的过程是最核心的内容, 对于 NCT数据网外部的 IP节点来说, 如果要加入某个 VPN, 分组地址的转换工作是关键的技术内 容。 因此, 对于 ATM分组和帧中继(F. R. )分组而言, 只要在 ADT中设 ATM 地址或者帧中继地址与 NCT地址的映射表,并在 ED中完成地址转换的工作, 同样可以实现有 ATM或者帧中继的 VPN。
上面对 VPN的实现过程进行了说明,下面进一步介绍 IP电信网中实现 组播的具体方式。
IP电信网***包括采用 NCT数据网地址的 NCT数据网和采用 IP地址 的 IP网两部分。 因此, IP电信网***中的组播将要跨网 (IP网与 NCT数 据网) 实现, 由于 NCT数据网可以提供资源保证, 从而可以保证组播的服 务质量。这样 IP电信网***中的数据网包括两种类型组播:一种是用户向 网管申请发起组播, 另一种是 IP 网用户发起的组播。 在用户向网管申 请发起组播的过程中, 由于 IP网内传送的是 IP分组, 而 NCT数据网中传 送的是 NCT分组, IP分组和 NCT分组在跨网传送的过程中需要有一个地址 转换的过程。 这是本 IP电信网***中实现组播的关键技术步骤。
在由用户向网管申请发起组播的情况下,在分组格式中为组播定义了 4个字段:组播标识字段、包类别标识字段、组播地址字段、组播扩展报头。 如图 13至图 16所示, 该组播的实现过程包括组播通告、 组播树建立、 组 播通信和组播终结四大步骤, 下面分别详细说明如下:。 1. 组播申请的步骤:
用户向网络管理设备提交带有该组播群的 IP组播地址、与源端点连接 的边缘关口设备地址、 所有与目的端点连接的边缘关口设备地址、 相关 IP 地址以及组播链路的资源需求等参数的建立组播请求。
2. 组播建立的步骤:
(1) 网管向复址无连接数据网节点设备发送带有复址无连接数据网组 播地址、 目的端边缘关口设备地址、 指明流类别的组播链路资源等参数的 配置命令。
(2) 复址无连接数据的节点设备可根据自有资源情况, 向网管发接受 / 拒绝响应, 如发拒绝响应则表明该组播无法建立, 如发接受响应则表明该 组播建立。
(3) 组播建立后, 网管向地址映射设备发送带有 IP组播地址、 复址无 连接数据网组播地址、 及所有与目的端点连接的边缘关口设备地址、 相关 IP地址的地址映射表。
3. 组播通信的步骤:
(1) 该组播群的源端点通过隧道等技术与边缘关口设备建立连结,连结 信道配置组播要求的资源。
(2) 该组播群的目的端点通过隧道等技术与边缘关口设备建立连结,连 结信道配置组播要求的资源。
(3) 组播源端设备发送组播分组,经隧道等配置了资源的通信信道到达 与源端连接的边缘关口设备;
(4) 复址无连接数据网根据组播地址在确定的资源范围内保证组播分 组按照设定的传送质量要求到达目的端边缘关口设备,
(5) 目的端边缘关口设备经隧道等具有资源保证的通信信道送交组播 目的端设备。
4. 组播终结的步骤:
(1) 组播结束时用户向网络申请结束组播请求。
(2) 网管向复址无连接数据网节点设备发送结束命令, 参数中含: 组播 地址和指明流类别的释放资源配置。
(3) 组播结束确认后, 网管向地址映射设备发送组播结束命令, 地址映 射设备清除与该组播地址相关的全部表项。
(4) 组播终结。 0594 在组播通信的过程中, 首包分组拥有完整的报头和完整的组播扩展报 头, 组播扩展报头中拥有全部目的端 ED的 NCT地址。 其中, 组播首包和叶 节点修改包需要确认, 因此以命令包形式发送。 由于 NCT数据网中的全部 节点设备均拥有 Cache能力, 在组播的首包通过后, 利用 Cache可以将 NCT 组播地址以及全部叶节点 ED的 NCT地址记住, 当后续分组来时只需要 NCT 组播地址即可。 因此, 后续分组的报头可以不含组播扩展报头。
由用户向网管申请发起的组播能保证业务所需的资源,从而保证组播 业务的服务质量, 将会有广泛的应用空间。
在由 IP网中用户发起组播的情况下,在分组格式中为组播定义了 3个 字段: 组播标识字段、 组播地址字段、 组播扩展报头。 如图 17至图 20所 示, 该组播的实现过程包括组播通告、 组播树建立、 组播通信和组播终结 (图中未示) 四大步骤, 下面分别详细说明如下-
1. 组播通告的步骤:
(1) IP网的组播源端点按照 IP网中申请组播地址的程序获得 IP 网组 播地址。
在 IP电信网***中,一个基本的技术思路就是尽可能釆用现有的实践 证明可行的技术实现方案。 该技术步骤就是典型的例子, 它采用的就是现 有技术。 上述的 IP 网组播地址即为前述的 D 类 IP 地址 (224. 0. 0. 0〜 239. 255. 255. 255 )。
(2) 组播源端点向网络发出组播通知分组。
在组播通知中包括有该组播的组播地址。
(3) 组播通知分组经过 IP网到达与之连接的边缘关口设备, 边缘关口 设备向地址映射设备发送包含有 IP网组播地址等参数的组播申请。
(4) 地址映射设备收到边缘关口设备发来的带有 IP网组播地址等参数 的组播申请后,在地址映射设备内生成 IP组播地址与复址无连接数据网地 址的映射表,并向边缘关口设备发送带有复址无连接数据网组播地址参数 的组播响应。
前面已经提到,在地址映射设备 ADT中存有 IP地址与 NCT地址之间的 映射关系表,通过该表可以获得与 IP网组播地址相对应的 NCT数据网中的 组播地址。
2. 组播树建立的步骤:
(1) 要加入组播的 IP网的设备, 向 IP网发出带有 IP网组播地址等参 数的组播加入申请;
(2) 带有 IP网组播地址等参数的组播加入申请分组通过隧道或现有 IP 网中实现组播通信的技术等到达与目的端连接的边缘关口设备, 边缘关口 设备向地址映射设备发出带有 IP网组播地址等参数的组播加入申请;
(3) 地址映射设备收到带有 IP网组播地址等参数的组播加入申请后, 保存该 IP组播地址和目的端边缘关口设备的复址无连接数据网地址,在地 址映射设备形成完整的复址无连接数据网组播地址以及全部目的端边缘关 口设备的复址无连接数据网地址。
(4) 所有要加入该组播树的节点都加入后, 组播树建成。
3. 组播通信的步骤:
(1) 组播源端点向网络发出组播分组, 组播分组通过隧道或 IP网组播 协议等技术到达与源端连接的边缘关口设备, 与组播源端点连接的边缘关 口设备向地址映射设备发出带有 IP组播地址等参数的组播地址解析请求。
(2) 地址映射设备收到组播地址解析请求, 作地址解析, 并向组播源端 点连接的边缘关口设备回发带有复址无连接数据网组播地址、 全部目的端 边缘关口设备的复址无连接数据网地址等参数的组播地址解析响应。
(3) 组播源端点连接的边缘关口设备发出相同组播地址的第一个分组 为首包, 组播首包分组拥有完整的报头和完整的组播扩展报头, 组播扩展 报头中拥有全部目的端边缘关口设备的复址无连接数据网地址。
(4) 组播源端点连接的边缘关口设备发出相同组播地址的第二个分组 及以后的分组为组播后续分组, 后续分组的报头可以不含组播扩展报头。
(5) 组播分组中包含: 组播标识字段、 组播地址字段和分组载荷。
首包组播分组中包含组播扩展报头。
4. 组播终结的步骤:
组播源端点向网络发出组播终结分组, 组播源端点连接的边缘关口设 备向地址映射设备发出带有组播地址等参数的组播终结申请分组, 地址映 射设备清除与该组播地址相关的全部表项, 组播终结。
对于不是基于 IP协议的 ATM设备或者帧中继 (FR) 设备而言, 只要在 ADT中准备 ATM地址或者帧中继地址与 NCT地址的映射表, 并在 ED中完成 地址转换的工作, 同样可以实现有 ATM或者帧中继设备参与的组播。
下面,进一步介绍本发明所述的 IP电信网***进行资源管理的具体方 法。 IP电信网作为下一代电信网的实施方案,必须采用新的资源管理机 制, 以便充分利用 IP 电信网的硬件资源, 灵活、 高效地满足用户多方 面的需求, 并使运行在 IP 电信网上的各项电信业务都获得预期的服务 质量保证。 为此, 本发明人针对 IP 电信网的技术特点, 提出了两种具 体的资源管理方法一基于链路告警机制的资源管理方法和基于信令机 制的资源管理方法。
下面首先介绍基于链路告警机制的资源管理方法。 该方法是将 IP 网中的业务分为几类, 每一类业务中包含若千 VPN, 分别为不同的电信 用户提供通信资源保障。 各 VPN均拥有独立的通信资源, 并建立相应的 链路告警机制。 通过链路告警机制对用户的资源需求进行调整, 从而实 现对整个网络通信资源的控制。 因此, 上述基于链路告警机制的资源管 理方法实际上是建立在分类服务和 VPN相结合的基础上的, 该方法十分 适合于用户拥有大量资源, 如电信业务提供商的场合。
实现分类服务和 VPN相结合的资源管理技术有四个关键点: 第一点 在于要有支持分类服务和大量资源独立 VPN的网络。 第二点是支持分类 业务网络的边缘接入设备应具有业务分类和对用户使用的业务量进行 管理和控制的能力。 第三点是业务的分类应该科学, 即业务类别不宜太 多, 并且分类应在网络运营商可管理的网络边缘节点设备上。 第四点在 于网络的节点性能要足够优良具有强大的资源队列管理能力。
在 IP电信网***中, NCT数据网作为核心网,具有统一的管理机制, 能够按各类业务对网络资源的需求分配相应的网络资源。 而边缘关口设 备 ED 与网络管理设备相配合, 很容易就具有业务分类能力和对用户使 用的业务量进行管理和控制的能力, 而且该 ED 设备可以由运营商通过 网络管理设备实现完全可控。
IP电信网***中的资源管理分为两个层面,即承载网的资源管理和 业务网的资源管理。 承载网的资源管理包括两方面的具体内容, 其一是 通过网络管理设备对网络节点设备进行资源配置, 其二是网络节点设备 向网络管理设备报告该设备的链路告警状态。 业务网中, 它的用户一网 络 (UNI ) 接口采用面向连结技术, 为每一项业务建立连结, 并确保该 业务所需的资源, 而网络一网络 (匪 I ) 接口采用以不面向连结技术为 主、 面向连接为辅的工作方式, 不必为每一项业务建立连结和保留相应 的资源, 采用链路告警机制来进行资源的管理, 由网络边缘关口设备 ED 进行对网络管理器告警状态的检索。
如图 21 所示, 概括地说, 上述基于链路报警机制的资源管理方法 可以分为三个主要的阶段, 分别是: 建立 VPN以实现资源配置、 链路告 警和资源检索与接入控制。 下面就对这三个阶段展开具体的说明。
IP电信网的一个显著特点就在于 VPN拥有独立的资源 VPN的建立过 程中实现了资源配置。 对于该过程的详细说明, 可以参阅上文中介绍的 两种在网络节点设备中建立 VPN的具体方法, 此处不再赘述。
VPN建立之后, 用户一般会在该 VPN所分配的资源框架内开展电信 业务。 但是, 电信业务本身具有资源需求起伏不定的特点, 而且最大值 与最小值之间会相差十倍以上, 因此, 需要通过链路告警机制来解决用 户资源需求超过 VPN供应极限的情况。
链路告警机制的具体歩骤为:
I ) 由节点设备、 网络管理设备和 ADT设备组成一条资源告警链。 上述的资源告警链实际上就是参与 VPN的一系列网络管理设备、 节 点设备和 ADT设备。
II )当某一业务类别的用户使用的资源没有超过该业务类别链路告 警阈值, NCT数据网的节点设备不发告警信息; 当某一业务类别的用户 使用的资源超过该业务类别链路告警阈值, 或某一业务类别 VPN的用户 使用的资源超过该 VPN链路告警阈值, NCT数据网的节点设备向网络管 理设备发送带有业务类别、 VPN编号、 告警等级等参数的告警信息。
上述的链路告警阈值在资源分配之初, 即建立 VPN的时候就已经确 定。
III ) 网络管理设备将带有业务类别、 VPN 编号、 告警等级等参数的 告警信息通知 ADT设备。
网络管理设备向 ADT发出链路告警通告中指示出业务类别、 告警等 级和相应的 VPN 编号, 但根据前面所提到的网络一网络 (題 I ) 接口采 用不面向连结技术为主、 面向连接技术为辅工作方式的特点, 网络管理 设备并不向 ADT设备指示具体的告警链路。
采用了链路告警机制之后, 用户如果要求建立通信连结, ED设备首 先会向 ADT设备查询该用户的 VPN的资源使用状况。 ADT中无相应 VPN 资源告警信息即可建立通信。
上述 ED设备向 ADT设备查询资源使用状况是通过资源检索与接入 控制机制实现的, 其具体包括如下的步骤:
I ) 用户或业务网要求建立通信连结, ED首先向 ADT查询该用户 或业务网的资源使用状况, 如 ADT指示该用户或业务网没有链路告警, 通信建立则按正常业务流程进行。
II ) 如 ADT发现该用户或业务网链路告警, ADT将向网络管理设备 发出资源检索请求, 查询本次通信连接经过的链路有无链路告警, 如经 过的链路无链路告警, ADT指示该用户或业务网没有链路告警, 通信建 立则按正常业务流程进行; 如经过的链路告警, ADT指示该用户或业务 网链路告警, 该通信不能建立。
前面已经提到, 基于链路告警机制的资源管理方法实际上是建立在 分类服务和资源独立 VPN技术相结合的基础上的。 上面已经对基于 VPN 的接入控制机制进行了说明, 下面简单介绍 "分类服务" 的具体内容。
所谓 "分类服务" 是将业务分成若干个大类, 对每一大类业务中再 分为若干个子类, 并在帧结构中给予标识。 在子类中, 不同的 VPN拥有 自己的资源。 对于不同的业务类别采用不同的资源管理策略:
I )对于承诺速率和峰值速率的统计复用类业务, 其速率接纳控制 策略将根据链路告警等级来定, 无链路告警可接纳峰值速率, 随着链路 告警等级的提高接纳控制速率则逐步由峰值速率转向承诺速率, 链路告 警等级超过一定级, 连接不能建立。
II )对于 "尽力而为" 类别的业务,通常具有特定的业务类别标识, 对于这类业务, 不启动链路告警机制, 网络采用常用的 '公平算法' 来 满足业务需求。
III ) 对于其余类别的业务, 将对链路资源设定不同的阈值, 根据不 同阈值的告警信息, 采用不同的速率接纳控制策略, 速率接纳控制在 ED 设备处实现。
另外, 对于紧急通信类型的业务, 如报警电话、 火警电话等, 如果 用户要求建立通信连结, 即使地址映射设备指示该用户或业务网的资源 有链路告警, 紧急通信也能够建立, 并按照正常的业务流程进行。
在 IP 电信网中, 网络对数据报文的传送路由是确定的。 它可以是 单路由, 也可以是由主路由和备份路由结合而成的双路由或多路由组 成。 对任何端到端的报文传递所经过的路由则是固定的。 双路由技术及 网络管理设备的控制命令相结合可以在确保资源的条件下实现网络的 快速保护倒换。
基于信令机制的资源管理方法特别适合于只拥有少量资源电信用 户和企业用户。 在此情况下, 可以通过建立若干 VPN的技术手段来直接 满足电信用户的资源需求, 即将 IP 网中的业务分为几类, 每一类业务 中包含若干 VPN, 分别满足不同的电信用户。 各 VPN均拥有独立的资源, 通过信令对各 VPN中的资源进行管理, 从而保证用户的资源需求。
如图 22 所示, 上述基于信令机制的资源管理方法可以分为两个主 要的阶段, 分别是: 1.建立 VPN以实现资源配置; 2.通过信令进行接入 控制和资源管理。 下面就对此展开具体的说明。
IP 电信网的一个特点就在于采用建立不同资源独立的 VPN方式进 行资源管理。 资源配置的过程与建立 VPN的过程同期进行。 对于该过程 的详细说明, 可以参阅上文中介绍的两种在网络节点设备中建立 VPN的 具体方法, 此处不再赘述。
对于拥有少量资源的 VPN用户釆用链路资源阈值告警机制显然是不 合适的, 因为即使告警阈值设在 50% , 如: VPN 中的某一条链路资源设 置为 2M, 目前已占用 900K , 因为没有达到告警阈值。 这时候 VPN显然 是不会告警的, 如果有一个需要 1. 2M 的呼叫要接入, 在网络接入端是 无法确知网络中的某一条链路资源已经不足, 因为没有资源告警信息, 接入端仍将该呼叫接入, 很显然该 VPN就会 "挤占" 他人的资源, 这将 是不允许的, 因为它无法确保网络的资源分配。
在这种场合, 就需要采用信令机制来对资源进行精确分配。
具体而言, 对于拥有少量资源的 VPN用户, 每一次业务 (呼叫) 的 接续, 就需要在 ED (发送端) 与 ED (接收端) 之间需建立一次连接, 在连接建立过程中, 将该次业务所需的资源确定下来。 如果沿途的链路 资源可以满足这次业务的需要, 则该次连接可以建立, 如果资源不能满 足则该次连接不能建立。
信令机制的具体步骤为-
I ) ED (发送端) 设备根据用户的资源需求直接发出带有收端 ED 地址、 资源要求等参数的连接建立请求命令。
II ) 连接建立请求命令途经的各节点设备收到该命令后, 根据 VPN 存量资源情况作出相应的反应, 该节点的 VPN存量资源能够支持连接建 立请求命令所需的资源, 则将连接建立请求命令发向下一个节点设备, 如果该节点的 VPN存量资源不能够支持连接建立请求命令所需的资源, 则向 ED (发送端) 设备发送连接建立失败响应。
III ) 当 ED (接收端) 设备收到连接建立请求命令, 表明该 VPN全程 的资源可以满足该次呼叫的资源要求, ED (接收端) 设备即向 ED (发送 端) 设备发送连接建立确认响应。
IV )连接建立确认响应经过的节点设备从其 VPN资源表中扣除该次 连接所用的资源, ED (发送端) 设备接收到连接建立确认响应, 该次连 接建立成功。
V ) 进入正常通信阶段。
通信完成将进入一个连接拆除过程。
VI ) ED (发送端)设备和 ED (收端)设备都可以发起连接拆除过程, 以 ED (发送端) 设备发起连接拆除过程为例: ED (发送端) 设备发出带 有收端 ED地址、 资源等参数的连接拆除请求命令。
W )连接拆除请求命令途经的各节点设备收到该命令后, 释放该次 连接所占用的资源, 其 VPN资源表中相应增加这部分资源, 并将连接拆 除请求命令发向下一个节点设备
VII ) 当 ED (接收端) 设备收到连接拆除请求命令, ED (接收端) 设 备即向 ED (发送端) 设备发送连接拆除确认响应, ED (发送端) 设备接 收到连接拆除确认响应, 该次连接拆除成功。
在通信进行的过程中,只在边缘关口设备处进行接入控制,参与 VPN 的节点设备不进行资源控制和管理。
下面, 介绍本发明所述的 IP 电信网***中, 针对 NCT数据网的特 殊需求而采用的 NCT分组的帧结构及其实现方法。
在 NCT数据网中, 可以有效地实现 VPN、 组播, 同时, 对分组的报头 也可以进行压縮。 但是, 现有的帧结构, 如 IPv6等协议中的帧结构, 无法 实现上述的这些功能。 因此, 需要提供一种新的帧结构以及利用该帧结构 来实现 NCT数据网的这些功能。
IP电信网***中的 NCT数据网中传输的是 NCT分组。 下面先介绍 NCT 分组的格式, 然后说明 NCT分组的封装方法。 最后, 还将说明 NCT分组的 传输过程。
参照图 23, 本发明所述的 NCT分组的报头包括以下的字段: 版本号、 分组类别、 流类别、 业务分类、 报头压缩标记、 首包标记、 VPN标记、 组播 标记、 地址长度、 分组长度、 流序号、 ^地址、 目的地址和扩展报头。 版本号指 NCT协议的版本,目前的版本号为 1。
版本号之后是 2比特的分组类别字段。 当分组类别取值为 0时, 表 示此 NCT分组为数据分组, 表示在载荷中放入的是用户数据; 如果取值 为 1, 则表示此 NCT分组为控制分组, 表示载荷中是控制命令, 其余取 值保留。
分组类别之后的 2比特的流类别字段, 表示信息流的类别。 举例如 下:
00 需要绝对保证的资源 (不进行统计复用)
01 优质统计复用的资源 (绝对保证约定数据速率, 但 允许数据速率超额)
10 保证一般统计复用的资源 (4 : 1复用比, 能基本保 证约定数据速率)
11 提供 "尽力而为" 的传送能力
在分组类别之后是 4比特的业务分类。 业务分类与流类别一起来表 示不同的业务。 举例如下:
流类别 =00时, 业务分类表示的业务:
0000 应急通信
0001 绝对保证的资源的 VPN
0010 多媒体会话业务
0011 多媒体会议业务
0100 多媒体检索业务 (流媒体业务)
0101 多媒体实时监测、 监控业务
流类别 =01时: 业务分类表示的业务:
0000 应急通信
0001 优质统计复用的资源的 VPN
流类别 =10时: 业务分类表示的业务:
0000 应急通信
0001 保证一般统计复用的资源的 VPN
0010 多媒体存储转发业务 (多媒体信箱业务) 流类别 =11时: 业务分类表示的业务- 0000 提供 "尽力而为" 的传送能力的 VPN 0001-0111 保留
报头压缩字段位于业务分类之后, 长 1比特。 其不置位时表示报头 不压缩; 置位表示报头压縮。
接下来的 1 比特是首包标识, 表示具有相同源地址、 相同目的地址、 相同流类别和相同业务分类的分组的首包。
NCT数据网分组还通过位于首包标识之后的 1 比特 VPN标记字段来表 示该分组是否是 VPN分组。 例如, 当 VPN标记置位时表示该分组是 VPN分 组。
1 比特的组播标记字段, 位于 VPN标记之后, 通过置位来表示该分组 是组播包; 否则, 表示是非组播包。
由于 NCT分组的源地址和目的地址长度可变, 因此, 在组播标记之后 来设置 2比特的地址长度字段。 地址长度为 0时, 表示源地址和目标地址 是 32比特; 地址长度为 1时, 表示源地址和目标地址是 64比特; 地址长 度为 2时, 表示源地址和目标地址是 96比特; 地址长度为 3时, 表示源地 址和目标地址是 128 比特。 在本实施例中, 地址长度的默认值是 2, 艮卩, 源地址和目的地址长度为 64比特。
接下来是 16比特的分组长度字段, 可表示最大分组长度为 64K字节。 流序号字段长 24比特, 位于分组长度之后。 其用于报头压缩时, 表示 具有相同源地址、 相同目的地址、 相同流类别和相同业务分类的各个分组 的顺序。
源地址和目的地址是指 NCT数据网内的地址, 是可变长的, 在本实施 例中的默认值是 64比特。
扩展报头根据需要使用。 将在下文对分组封装方法的说明中解释扩展 报头在组播业务和 VPN业务中的作用。
载荷的最大长度为 64K字节。
下面根据图 24及前述的 NCT分组格式, 结合具体的业务流程如 VPN、 组播等具体讲解进行 NCT分组封装的方法。
如果源端在 IP网, 则由 ED根据源端分组的内容按本实施例所述的方 法进行封装, 形成 NCT分组。 源端 ED接收 IP网的 IP分组, 并将 IP分组 中的 IP目的地址送到 ADT; ADT进行 IP网的 IP目的地址与 NCT地址之间 的地址解析和映射, 将获得的目的端 ED的 NCT地址回送给源端 ED ; 源端 ED根据回送的 NCT地址在 IP分组上添加 NCT报头, 将其变成 NCT分组, 再将该分组发送到目的端 ED; 目的端 ED接收到 NCT分组, 同样转换为 IP 分组, 并根据目的 IP地址向 IP网转发该分组。
如果源端是 NCT数据网内的节点, 则由此节点按照本实施例所述的方 法封装 NCT分组。
NCT分组封装方法包括以下步骤:
1 ) 边缘关口设备 ED根据是数据分组还是控制分组, 设定分组类别 字段的值。
2 ) 边缘关口设备 ED根据其承载业务网的特性来决定业务类型, 业 务类型由 2比特的分组类别字段和 4比特的业务分类字段组成, 前者是 决定业务的大类, 后者是业务的细分类。 业务分类与流类别一起来表示 不同的业务。
21 ) 边缘关口设备 ED确定进入的数据分组是否需要进行报头压缩、 VPN或者是组播, 则分别进入步骤 3)、 31 )、 32 ); 如果都不是, 则直接跳 转到步骤 6 )。
3 ) 确定首包标记字段的取值。首先判断该分组是否是首包,如果是, 就对首包标记字段置位; 如果不是, 则不置位。 对于首包分组, 封装时在 其载荷中要放入完整的 IP分组。这里,完整的 IP分组是指 IP报头和载荷。
4) 确定报头压缩字段的取值。对于首包标记字段未置位的分组, 则 根据其中的 IP源地址、 IP 目的地址和业务类别信息, 确定为某个首包的 后续分组, 再根据需要判断其是否要压缩。 如果要压缩, 则报头压缩字段 置位, 表示 NCT分组是经过报头压缩的分组。 对于此类首包标记字段未置 位的分组, 在其载荷中只有 IP分组的载荷部分, 不含 IP报头。
5 ) 设定流序号取值。 封装时, 用不同的流序号表示同源、 同目的地 址、 同业务类别的分组的顺序。 NCT分组拆装时, 根据流序号的值, 在流序 号值和 IP报头的映射表中取相应 IP报头。
6 ) 设定目的地址和源地址的取值。 目的地址和源地址分别是指目的 端 ED设备的 NCT地址和源端 ED的 NCT地址。
另外, 在步骤 21 ) 中判断承载的业务是 VPN业务, 则在步骤 21 )之后 还有以下步骤:
31 ) 设定 VPN标记字段的值。 对 VPN标识字段置位, 对扩展报头标识 字段置位,表示在 NCT网内传送的分组属于 VPN分组。接下来进入步骤 33 ), 用 VPN编号字段来区分各个 VPN分组分别是属于哪一个 VPN。 33) 设定 VPN编号字段的值。 对于具有同源、 同目的地址、 同业务类 另 lj, 而且 VPN标记字段置位的 NCT分组, 在封装时还要确定 VPN编号字段 的值, VPN编号字段放在扩展报头中。该 VPN编号在一个 NCT数据网内是唯 一的。
上述步骤完成之后, 转入步骤 5 ), 设定流序号的值。 最后, 转入步骤
6), 设定目标地址和源地址的值。
如果在步骤 21 ) 中判断承载的业务是组播业务, 则在步骤 21 )之后还 有以下步骤:
32 ) 设定组播标记字段的取值。 对组播标记字段置位, 表示发送的是 组播业务, 并转入步骤 34)。
34) 如果是组播业务的首包分组, 设定首包标记字段的值, 转入步骤 36 ); 如果不是首包, 则只对组播标记字段设定取值。 然后, 转入步骤 5 )。
36 ) 设定扩展报头字段的值。 如果是组播业务的首包分组, 则还需要 对扩展报头设定取值。在组播扩展报头中是全部目的端(叶节点) ED的 NCT 地址, 然后转入步骤 5 )。
全部目的端 (叶节点) ED的 NCT地址是由 ADT提供。
步骤 5 ) 进行设定组播分组的流序号的工作, 然后, 转入步骤 6 )。
在步骤 6 ) 中, 组播地址类似 IP协议中的 D类地址, 表示 NCT网内的 NCT组播地址。 由发起组播业务请求的 IP网内组播源端点按照 IP协议发 送 IP网组播地址, ADT根据其保存的 IP组播地址与 NCT组播地址之间的 关联表, 确定 NCT网内的组播地址, 交由 ED设备将此 NCT组播地址封装到 NCT 分组的目的地址字段中。 如果发起组播业务请求的组播源端点是 NCT 数据网内的节点, 则由 NCT数据网内的节点发出组播业务请求给 ADT, 由 ADT给出 NCT组播地址, ED设备将此 NCT组播地址封装到 NCT分组的目的 地址字段中。
在 IP电信网***中, IP网中传送的分组是由 IP报头和 IP载荷组 成的, 在 IP网中它是以 IP地址来进行寻址的; NCT网中传送的是 NCT 分组, 它是由 NCT报头和 NCT载荷组成, 在 NCT网中它是以 NCT地址来 进行寻址的, 而 NCT数据网中传送的 NCT分组的 NCT载荷就是 IP分组。 这样一来, 在 NCT分组中, 实际上是由 NCT报头 +IP报头 +IP载荷组成, 在 IP网中, 特别是对于传送实时业务的 IP分组, 如 VOIP分组, 其载 荷往往小于 40字节, 而 NCT报头 +IP报头将可能两倍于载荷长度, 很显 然这会使整个网络传送数据的效率降低, 同时也增加网络设备的负担, 因此必须加以改进。
下面进一步介绍一种在 IP电信网***中对 IP分组的报头进行压缩 的方法。 实现该方法首先要在 NCT分组的报头部分设置首包标记、 分组 压缩标记和流标记。
设置上述标记域的 NCT分组格式如图 23所示。 这一格式只是一个 示例, 并不是唯一的。 它的格式借鉴 IPv6 协议规定的分组格式, 但与 该分组格式又有明显的不同。 如图 23 所示, 在该分组格式中, 为报头 压缩的需要, 专门增加了首包标记域、 分组压缩标记域和流标记域, 其 中首包标记的含义同 IPv6协议中的规定, 其占用 lbit, 其置位表示首 包, 不置位表示为非首包; 报头压缩标记占用 lbit, 其置位表示报头经 过压缩, 不置位表示报头未经过压缩; 流标记即为***为该流业务分配 的流序号。
如图 25所示, 对于 IP网用户传送的 IP分组, 在源端边缘关口设 备 ED处, 首先判断其是否是首包 IP分组, 如果是的话, 将首包标记置 位, 分组压缩标记不置位、 并赋以流标记确定值。 然后 ED 设备在对应 生成的 NCT包中, 将包含报头在内的该首包 IP分组作为 NCT分组的载 荷完整放入, 即此时生成的 NCT分组为: NCT报头 + IP报头 + IP载荷。
ED设备对 IP网中传来的后续分组的报头进行判断, 对于报头中包 含同源、 同目的地址、 同业务类别信息的分组, 即可确定为上述首包分 组的后续分组。对于此分组,将其首包标记不置位, 分组压缩标记置位、 并赋以流标记确定值。 然后, ED设备在由后续分组生成的 NCT分组中, 只将该后续分组的载荷 (payload ) 放入 NCT分组的载荷之中, 而 IP报 头不再放入, 即 NCT分组为: NCT报头 + IP载荷。
承载 IP载荷的 NCT分组根据 NCT报头中包含的 NCT地址在 NCT5数 据网内寻址, 并最终到达目的端 ED设备处。
目的端 ED对接收到的 NCT数据包, 根据其报头中的首包标记置位, 报头压缩标记不置位, 将其判定为报头未经压缩的首包分组。 对于此首 包分组, 按流标记的值, 将流标记值和从 NCT 分组的载荷中取出的 IP 报头作映射, 存放在目的端 ED处, 用作后续 IP分组的报头恢复工作。 然后, 将 NCT分组的载荷中包括 IP报头和 IP载荷的 IP完整包取出, 放入 ED的发送队列中。 目的端 ED对于接受到的 NCT数据包, 如果其首包标记不置位, 分 组压缩标记置位, 则根据该数据包的流标记值, 判断其为哪一个首包的 后续包。 对于该后续包, 按流标记的值, 在流标记值和 IP 报头所作的 映射表中取相应的 IP报头, 与从该后续分组载荷中取出的 IP载荷一起 重组成完整的 IP分组, 放入 ED的发送队列中。
由于 IP电信网***是不面向连接、 不采用复杂流控技术的数据网, 首包分组有可能丢失。 在这种情况下, 在目的端 ED 处, 对接收到的首 包标记不置位、 分组压缩标记置位的分组, 按流标记的值在流标记值和 IP报头所作映射表中取相应的 IP报头, 如发现流标记值在报头映射表 中没有相应的表项, 则表明该流标记值的首包分组没有收到, <目的端 ED 要向源端 ED发 "首包没有收到" 的差错报告分组, 源端 ED收到该差错 报告分组之后, 重发该流标记的首包分组。
另外, 由于 IP 电信网***中传输的后续分组有可能丢失, 为了避 免该分组的流标记和 IP报头所作映射表长期占用 ED的内存而不发挥作 用, 可以在目的端 ED中为每一个分组设置定时器, 一旦超时, 则 ED自 动将该表项及映射表清除。
通过上述的技术步骤, 在 IP 电信网***中, 对于同源、 同目的地 址、 同业务类别的 IP分组而言, IP报头只需要传送一次, 这样就减少 网络中需要传输的数据总量, 实现了报头压缩的目的。
必须指出的是, 首包标记和分组压缩标记是分别独立起作用的, 并 不是所有的分组都要经过压缩。 如果分组不需要压缩的话, 分组压缩标 记是不需要的, 但首包标记却可能仍然需要。
上述的报头压缩方案不仅对 IP分组经由 NCT数据网进行传送适用, 对于 NCT分组经由 IP 网进行传送的过程也同样适用。 更进一步地说, 对于与 NCT数据网连接的 ATM设备或者帧中继设备, 其传送的 ATM分组 或者帧中继分组在经过 NCT5 数据网时, 其报头也可以采用上述的方案 进行压缩。
在隧道工作方式之中, NCT地址已经被连接标识 (ID ) 所替代, 而 连接标识 (ID ) 只具有局部的意义, 无法被压缩, 因此进一步压缩的对 象只能是作为分组载荷的 IP地址。 为此, 对于首包的 IP分组, 可以按 照上述的方法在其报头设置单独的首包标记、 分组压缩标记和流标记, 该首包 IP分组仍然作为 NCT分组的载荷完整放入, 同时, 在 NCT分组 2005/000594 中报头处保留上述标记位的信息, 该标记位不随 NCT 地址被连接标识 ( ID ) 替换而发生变动, 这样, 上述标记位信息可以直接到达目的端 ED 设备, 目的端 ED设备从中取出流标记值和 IP报头, 并制作成映射表。 对于后续的 IP分组,在传送时不再传送 IP报头,而只传送标记位信息。 这样, 目的端的 ED设备可以根据流标记判断是哪一个首包的后续包, 从而对应恢复该后续包的 IP 报头。 上述的方法可以使分组报头压縮的 方法在隧道工作方式中也可以使用, 从而进一步提升了网络传输的效 率。
上面对本发明所述的 IP电信网***的完整技术方案进行了详细的说 明, 但显然本发明的具体实现形式并不局限于此。 对于本技术领域的一般 技术人员来说, 在不背离本发明所述方法的精神和权利要求范围的情况 下对它进行的各种显而易见的改变都在本发明的保护范围之内。

Claims

权 利 要 求 书
1. 一种 IP电信网***, 该 IP电信网是基于 IP协议的不面向连接的 ***, 其特征在于:
所述 IP电信网***包括至少一个复址无连接数据网、 多数个 IP网, 以及多数个边缘关口设备,所述 IP网通过所述边缘关口设备与所述复址无 连接数据网相连接;
所述每个复址无连接数据网中还包括至少一个地址映射设备;
所述复址无连接数据网中的所有设备与所述边缘关口设备都分配有一 个复址无连接数据网地址,所述 IP网中的所有设备和所述边缘关口设备都 分配有 IP地址, 所述 IP地址和所述复址无连接数据网地址之间的映射关 系保存在所述地址映射设备内的地址映射表之中;
所述边缘关口设备经认证与所述地址映射设备之间建立连接。
2. 如权利要求 1所述的 IP电信网***, 其特征在于- 所述复址无连接数据网具有层次型的体系结构, 在其中具有进行全局 管理的网络管理设备。
3. 如权利要求 2所述的 IP电信网***, 其特征在于:
所述复址无连接数据网分为三层: 核心层、 汇聚层、 接入层, 所述核 心层、 汇聚层、 接入层分别由多数个核心层设备、 汇聚层设备和接入层设 备组成, 每一个接入层设备都与至少一个所述边缘关口设备连接, 并且向 上连接一个汇聚层设备; 所述汇聚层设备和核心层设备连接, 所述核心层 设备相互连接; 所述复址无连接数据网还具有网络管理设备以及地址映射 设备, 所述网络管理设备同时管理接入层设备、 汇聚层设备和核心层设备。
4. 如权利要求 1所述的 IP电信网***, 其特征在于:
所述复址无连接数据网为多个, 各复址无连接数据网之间建立有信任 关系。
5. 如权利要求 1所述的 IP电信网***, 其特征在于:
所述复址无连接数据网经所述边缘关口设备与所述 IP网建立连接,设 备之间建立有信任关系。
6. 如权利要求 1或 5所述的 IP电信网***, 其特征在于:
所述 IP网包括 IP城域网、 接入网或用户驻地网。
7. 如权利要求 1所述的 IP电信网***, 其特征在于: 所述复址无连接数据网内部采用复址无连接数据网本身的地址来进行 寻址, 所述复址无连接数据网地址的分配遵循按地域层次结构的地址分配 规则。
8. 如权利要求 1所述的 IP电信网***, 其特征在于:
所述边缘关口设备汇聚来自所述 IP网的业务流,并转发到所述数据网 另一侧的目的端边缘关口设备,由目的端边缘关口设备发给目的端侧 IP网 的设备。
9. 如权利要求 3所述的 IP电信网***, 其特征在于:
所述复址无连接数据网的接入层设备之间可以直连。
10. 如权利要求 1所述的 IP电信网***, 其特征在于:
所述 IP网与所述复址无连接数据网在拓扑结构上严格分离,通过所述 边缘关口设备连接。
11. 一种如权利要求 1所述的 IP电信网实现通信的方法,其特征在于, 包括如下步骤-
(1) 向复址无连接数据网中所有设备分配复址无连接数据网地址;
(2) 所述边缘关口设备经认证向地址映射设备注册,并向地址映射设备 传送地址映射关系表;
(3) 源端边缘关口设备接收 IP网的 IP分组,并将 IP分组中的 IP目的 地址送到地址映射设备;
(4) 地址映射设备进行 IP网的 IP目的地址与复址无连接数据网地址之 间的地址解析和映射, 将获得的目的端边缘关口设备的数据网地址回送给 源端边缘关口设备;
(5) 源端边缘关口设备根据复址无连接数据网地址发送报文到目的端 边缘关口设备;
(6) 目的端边缘关口设备接收到报文,根据目的 IP地址向 IP网转发报 文。
12. 如权利要求 11所述的 IP电信网实现通信的方法, 其特征在于: 所述复址无连接数据网中所有设备利用复址无连接数据网地址寻址, 并且复址无连接数据网中传送的报文都有完整的复址无连接数据网地址。
13. 如权利要求 12所述的 IP电信网实现通信的方法, 其特征在于: 步骤 (2)中地址映射关系是指所述边缘关口设备的数据网地址以及与之 连接的 IP网中的所有设备的 IP地址的映射关系。
14. 如权利要求 13所述的 IP电信网实现通信的方法, 其特征在于: 步骤 (5)中, 当报文仅在一个复址无连接数据网内进行发送的时候, 所 述源端边缘关口设备将报文传送给其所属的接入层设备, 再转发至汇聚层 设备, 汇聚层设备根据复址无连接数据网地址来判断是转发到其所属的接 入层设备, 就直接发送给接入层设备, 接入层设备再根据所述复址无连接 数据网地址发送给目的端边缘关口设备。
15. 如权利要求 13所述的 IP电信网实现通信的方法, 其特征在于- 步骤 (5)中, 当报文仅在一个复址无连接数据网内进行发送的时候, 所 述源端边缘关口设备将报文传送给其所属的接入层设备, 再转发至汇聚层 设备, 汇聚层设备将其转发至核心层设备, 所述核心层设备根据复址无连 接数据网地址来判断是转发到其所属的接入层设备, 就经过汇聚层设备发 送给接入层设备, 接入层设备再根据所述复址无连接数据网地址发送给目 的端边缘关口设备。
16. 如权利要求 13所述的 IP电信网实现通信的方法, 其特征在于: 步骤 (5)中, 在报文需要从一个复址无连接数据网传送到其他复址无连 接数据网的情况, 来自所述源端边缘关口设备的报文逐层汇聚, 从接入层 设备、 汇聚层设备至核心层设备, 经核心设备后再转发到其他复址无连接 数据网, 然后在其他复址无连接数据网中从核心层设备逐层转发至所述目 的端边缘关口设备。
17. 如权利要求 12所述的 IP电信网实现通信的方法, 其特征在于: 所述复址无连接数据网可以承载 IP、 ATM或帧中继数据包。
18. 一种在 IP电信网***中以隧道方式实现通信的方法, 其特征在于: 所述 IP电信网中的网络管理设备在复址无连接数据网中建立隧道,所述隧 道为位于两端的边缘关口设备和位于中间的节点设备之间建立的逻辑虚电路; 承载用户通信业务的 IP分组通过 IP网到达所述隧道的源端边缘关口设备, 经地址解析和映射之后转换成复址无连接数据网中的链路帧,沿所述隧道传送, 在到达所述隧道的目的端边缘关口设备之后, 恢复为 IP分组向外传送。
19. 如权利要求 18所述的在 IP电信网***中以隧道方式实现通信的方法, 其特征在于- 所述链路帧在所述隧道中相邻的两个网络节点之间传送时, 使用连接标识 进行寻址。
20. 如权利要求 18或 19所述的在 IP电信网***中以隧道方式实现通信的 方法, 其特征在于:
所述复址无连接数据网分组由所述源端边缘关口设备将其中的复址无连接 数据网地址替换成该边缘关口设备与下一级网络节点之间的连接标识, 形成复 址无连接数据网的链路帧, 并向下一级传送; 所述下一级节点再将所述复址无 连接数据网的链路帧中的连接标识替换成该节点与再下一级的连接标识, 形成 新的复址无连接数据网的链路帧, 进一步沿所述隧道传送;
所述复址无连接数据网的链路帧以此方式到达所述目的端边缘关口设备, 在所述目的端边缘关口设备处将连接标识恢复成复址无连接数据网地址。
21. 如权利要求 20所述的在 IP电信网***中以隧道方式实现通信的方法, 其特征在于:
所述连接标识与所述复址无连接数据网地址之间的映射关系在所述边缘关 口设备中进行保存。
22. 如权利要求 20所述的在 IP电信网***中以隧道方式实现通信的方法, 其特征在于:
在复址无连接数据网的链路帧报头设置首包标记、分组压缩标记和流标记; 对首包 IP分组,在源端边缘关口设备用所述连接标识替换其复址无连接数 据网地址之后, 将包含报头的完整分组作为复址无连接数据网的链路帧的载荷 完整放入;
所述目的端边缘关口设备在恢复复址无连接数据网的链路帧之后, 根据首 包标记和分组压縮标记判断其为首包,从中取出流标记值和 IP报头,并制作成 映射表;
对所述首包的后续链路帧, 在通过隧道进行传送时不传送完整的 IP报头, 只传送标记位内容;
所述目的端边缘关口设备利用流标记值判断是哪一个首包的后续包, 根据 所述映射表对应恢复所述后续分组的 IP报头。
23. 如权利要求 18所述的在 IP电信网***中以隧道方式实现通信的方法, 其特征在于- 所述隧道建立的过程包括如下的步骤-
(1) 用户向所述网络管理设备提出建立隧道的申请,所述网络管理设备核准 该申请;
(2)所述网络管理设备向隧道源端的边缘关口设备发送建立隧道的命令; (3)源端边缘关口设备接收到该命令之后,向目的端的边缘关口设备发送建 立隧道连接的请求;
(4) 该请求逐级传送,其途经的各复址无连接数据网节点设备在收到该请求 之后, 根据自有的资源情况作出判断;
(5) 如果所述节点设备满足资源请求,则根据该请求配置链路资源,并分配 连接标识, 填写链路转发表, 并向下一节点转发该请求, 直至目的端边缘关口 设备;
(6) 如果目的端边缘关口设备的资源状况支持建立该隧道连接,则目的端边 缘关口设备向源端边缘关口设备发送接受请求的响应;
(7)源端边缘关口设备在收到目的端边缘关口设备的接受响应之后,向所述 网络管理设备回送隧道建立确认响应;
(8)所述网络管理设备收到隧道建立确认响应, 隧道建立成功。
24. 如权利要求 23所述的在 IP电信网***中以隧道方式实现通信的方法, 其特征在于- 所述步骤 (3)中, 所述源端边缘关口设备在向目的端边缘关口设备发送建立 隧道连接的请求的同时, 启动复址无连接数据网的备用路由发送请求。
25. 如权利要求 23所述的在 IP电信网***中以隧道方式实现通信的方法, 其特征在于- 如果途径的节点设备或目的端边缘关口设备不满足建立隧道连接请求中的 资源要求, 则向源端边缘关口设备发送拒绝响应, 则隧道配置无效, 源端边缘 关口设备向所述网络管理设备回送隧道建立失败响应。
26. 如权利要求 23所述的在 IP'电信网***中以隧道方式实现通信的方法, 其特征在于:
如果源端边缘关口设备的启动计时超时, 尚未收到接收 /拒绝响应,则隧道 配置无效, 源端边缘关口设备向所述网络管理设备回送隧道建立失败响应。
27. 如权利要求 18所述的在 IP电信网***中以隧道方式实现通信的方法, 其特征在于:
所述隧道有多个, 通过不同的连接序号进行区分。
28. 一种在 IP电信网***中实现虚拟专网的方法,其特征在于包括如下步 骤:
(1)用户向网络管理设备提出建立虚拟专网的申请,并提交建立该虚拟专网 所需的流量、 流向表;
(2) 网络管理设备为接受的申请确定虚拟专网编号;
(3)所述地址映射设备生成包含该虚拟专网编号的节点地址映射表;
(4) 网络管理设备根据所述流量、流向表, 向复址无连接数据网节点设备或 与之连接的边缘关口设备发送配置命令, 所述节点设备和边缘关口设备在资源 情况允许的条件下, 接受该配置命令, 建立虚拟专网。
29. 如权利要求 28所述的在 IP电信网***中实现虚拟专网的方法, 其特 征在于:
所述建立虚拟专网的过程中, 网络管理设备根据所述流量、 流向表计算出 复址无连接数据网的相应节点间链路资源需求表, 并根据计算结果向复址无连 接数据网中的节点设备发送包括虚拟专网编号在内的链路资源配置命令, 据此 建立虚拟专网。
30. 如权利要求 29所述的在 IP电信网***中实现虚拟专网的方法, 其特 征在于还包括如下步骤:
(1)所述建立虚拟专网的过程中,复址无连接数据网中的节点设备根据自有 资源情况作出响应;
(2) 资源情况是否许可?
(3) 如果资源状况不足以支持建立虚拟专网,则复址无连接数据网中的设备 拒绝该命令, 本次配置无效; 如果资源状况支持建立该虚拟专网, 则复址无连 接数据网中的节点设备接受该命令;
(4)节点设备按该命令参数要求配置链路资源,并向网络管理设备回发确认 响应;
(5) 网络管理设备收到所有相关节点设备的确认响应后,向地址映射设备发 送包含有业务类别、 虚拟专网编号参数在内的命令;
(6)地址映射设备收到该命令, 回送确认响应;
(7) 网络管理设备收到确认响应, 虚拟专网建立。
31. 如权利要求 28所述的在 IP电信网***中实现虚拟专网的方法, 其特 征在于:
所述建立虚拟专网的过程中, 网络管理设备根据流量、 流向表向有关边缘 关口设备发送虚拟专网配置命令, 源端边缘关口设备根据复址无连接数据网的 路由向目的端边缘关口设备发送虚拟专网配置请求, 据此建立虚拟专网。
32. 如权利要求 31所述的在 IP电信网***中实现虚拟专网的方法,其特 征在于还包括如下步骤:
(1) 源端边缘关口设备根据复址无连接数据网路由向目的端边缘关口设备 发送虚拟专网配置请求;
(2) 途经的各复址无连接数据网节点设备收到该请求后根据自有的资源情 况作出响应;
(3) 资源情况是否许可?
(4)如果资源状况支持建立该虚拟专网,则复址无连接数据网节点设备根据 该请求配置链路资源, 并向下一节点转发该请求, 直至目的端边缘关口设备, 如果目的端边缘关口设备的资源状况支持建立该虚拟专网, 则目的端边缘关口 设备向源端边缘关口设备发送接受响应; 否则, 向源端边缘关口设备发拒绝响 应, 本次配置无效;
(5)源端边缘关口设备收到目的端边缘关口设备的接受响应,则立即向网络 管理设备回送确认响应;
(6) 网络管理设备收到所有边缘关口设备的确认响应,向地址映射设备设备 发送包含业务类别、 虚拟专网编号参数在内的命令;
(7)地址映射设备收到该命令, 回送确认响应;
(8) 网络管理设备收到确认响应, 虚拟专网建立成功。
33. 如权利要求 32所述的在 IP电信网***中实现虚拟专网的方法, 其特 征在于:
如果源端边缘关口设备在设定的时间内尚未收到接收 /拒绝响应,则认为本 次配置无效。
34. 如权利要求 32所述的在 IP电信网***中实现虚拟专网的方法, 其特 征在于:
所述步骤 (1)中, 源端边缘关口设备可以同时启动复址无连接数据网备用路 由向目的端边缘关口设备发送虚拟专网配置请求。
35. 如权利要求 28所述的在 IP电信网***中实现虚拟专网的方法, 其特 征在于:
所述申请虚拟专网的过程中, 如果用户是 IP网中的用户, 则提交的流量、 流向表为 IP网中节点的流量、流向表,所述网络管理设备通过地址映射设备获 得各 IP网节点连接的边缘关口设备地址,将该流量、流向表换算成各边缘关口 设备之间的流量、 流向表。
36. 如权利要求 28所述的在 IP电信网***中实现虚拟专网的方法, 其特 征在于:
所述申请虚拟专网的过程中, 如果用户是复址无连接数据网中的用户, 则 其提交的流量、 流向表为边缘关口设备之间的流量、 流向表。
37. 如权利要求 28所述的在 IP电信网***中实现虚拟专网的方法,其特 征在于:
在虚拟专网建立之后, 如果用户是复址无连接数据网中的用户, 则其通信 过程包括如下步骤:
(1)源端边缘关口设备向目的端边缘关口设备发送复址无连接数据网分组, 当该分组到达源端边缘关口设备时, 源端边缘关口设备向地址映射设备发出包 含有目的端边缘关口设备地址等参数的地址映射请求命令;
(2)地址映射设备收到地址映射请求命令,如源端边缘关口设备地址与目的 端边缘关口设备地址同属一个虚拟专网, 则向源端边缘关口设备发送包含有虚 拟专网编号、 业务类别和目的端边缘关口设备地址参数在内的响应命令;
(3)源端边缘关口设备收到该响应命令,生成包含有虚拟专网编号、业务类 别参数在内的复址无连接数据网分组, 并将它发向目的端边缘关口设备;
(4)复址无连接数据网内的节点设备根据该分组的虚拟专网编号、业务类别 和目的端边缘关口设备地址, 在虚拟专网约定指配的资源范围内进行传送; (5) 目的端边缘关口设备收到该复址无连接数据网分组, 将它发往目的端。
38. 如权利要求 28所述的在 IP电信网***中实现虚拟专网的方法, 其特 征在于:
在虚拟专网建立之后,如果用户是 IP网中的用户, 则其通信过程包括如下 步骤:
(1)源端 IP设备向目的端 IP设备发送 IP分组;
(2) 当 IP分组到达源端边缘关口设备时, 源端边缘关口设备向地址映射设 备发出包含有目的端 IP地址在内的地址映射请求命令;
(3)地址映射设备收到该命令,如源端 IP地址与目的端 IP地址同属一个虚 拟专网, 则向源端边缘关口设备发送包含有虚拟专网编号、 业务类别和目的端 边缘关口设备地址参数在内的响应命令;
(4)源端边缘关口设备收到该响应命令,形成带有虚拟专网编号、业务类别 的复址无连接数据网分组, 并将它发向目的端边缘关口设备设备;
(5) 复址无连接数据网内的节点设备按复址无连接数据网分组中的虚拟专 网编号、 业务类别、 目的端边缘关口设备地址, 在虚拟专网约定指配的资源范 围内进行传送;
(6) 目的端边缘关口设备收到该复址无连接数据网分组, 将目的端 IP地址 恢复出来, 重组成 IP分组, 将它发往目的端。
39. 如权利要求 28所述的在 IP电信网***中实现虚拟专网的方法, 其特 征在于虚拟专网的撤销过程包括如下步骤:
用户提出撤消虚拟专网申请, 网络管理设备向复址无连接数据网节点设备 与地址映射设备发送撤消虚拟专网命令, 节点设备释放已配置的资源, 地址映 射设备清除虚拟专网地址映射表, 虚拟专网撤消。
40. 如权利要求 28所述的在 IP电信网***中实现虚拟专网的方法, 其特 征在于- 在复址无连接数据网的分组格式中为虚拟专网设有专用域: 虚拟专网标识 域和虚拟专网编号域。
41. 如权利要求 28所述的在 IP电信网***中实现虚拟专网的方法, 其特 征在于- 所述虚拟专网编号在一个复址无连接数据网内是唯一的。
42. 如权利要求 28所述的在 IP电信网***中实现虚拟专网的方法, 其特 征在于- 在由二个或二个以上的复址无连接数据网参与组成虚拟专网时, 在不同的 复址无连接数据网中虚拟专网的编号可以是不同的, 由复址无连接数据网的核 心层设备进行不同虚拟专网的编号之间的匹配。
43. 如权利要求 35或 38所述的在 IP电信网***中实现虚拟专网的方法, 其特征在于:
在虚拟专网的用户是 IP网中用户的情况下,该用户与相对应的边缘关口设 备之间通过包括隧道技术在内的技术手段实现连接。
44. 一种在 IP电信网***中实现组播的方法,用于实现由用户向网络管理 设备申请发起的组播, 该组播实现包括 (1) 组播申请; (2) 组播树建立; (3) 组播 通信; (4) 组播终结四个步骤, 其特征在于组播实现过程中:
由用户向网络管理设备申请建立组播, 网络管理设备指令复址无连接数据 网节点设备配置资源, 网络管理设备指令地址映射设备建立组播关联表, 构建 组播树。
45. 如权利要求 44所述的在 IP电信网***中实现组播的方法, 其特征在 于:
所述组播申请的过程为:
用户向网络管理设备提交包含有组播群的与源端点连接的边缘关口设备地 址、所有与目的端点连接的边缘关口设备地址、相关 IP地址以及组播链路的资 源需求参数在内的建立组播请求。
46. 如权利要求 44所述的在 IP电信网***中实现组播的方法, 其特征在 于:
所述组播树建立的过程包括如下步骤:
(1) 网络管理设备向复址无连接数据网节点设备发送包含有组播地址、目的 端边缘关口设备地址、 组播链路资源参数在内的配置命令;
(2) 复址无连接数据网的节点设备根据自有资源情况,向网络管理设备发接 受 /拒绝响应,如发拒绝响应则表明该组播无法建立,如发接受响应则表明该组 播建立;
(3) 组播树建立后,网络管理设备向地址映射设备发送包含有 IP组播地址、 复址无连接数据网组播地址、 及所有与目的端点连接的边缘关口设备地址、 相 关 IP地址的地址映射表。
47. 如权利要求 44所述的在 IP电信网***中实现组播的方法, 其特征在 于:
所述组播通信过程包括如下步骤:
(1) 该组播群的源端点与边缘关口设备建立连结, 保留组播要求的资源;
(2) 该组播群的目的端点与边缘关口设备建立连结, 保留组播要求的资源;
(3) 组播源端设备发送组播分组, 到达与源端点连接的边缘关口设备;
(4) 复址无连接数据网根据组播地址在确定的资源范围内保证组播分组按 照设定的传送质量要求到达目的端边缘关口设备;
(5) 目的端边缘关口设备经具有资源保证的通信信道送交组播目的端设备。
48. 如权利要求 44所述的在 IP电信网***中实现组播的方法, 其特征在 于:
所述组播终结过程包括如下步骤: (1)用户向网络申请结束组播请求;
(2) 网络管理设备向复址无连接数据网节点设备发送结束命令,参数中包含 组播地址和释放资源配置指令;
(3)组播结束确认后, 网络管理设备向地址映射设备发送组播结束命令,地 址映射设备清除与该组播地址相关的全部表项;
(4)组播终结。
49. 如权利要求 45至 48中任意一项所述的在 IP电信网***中实现组播的 方法, 其特征在于:
所述组播源端点设备和目的端设备通过包含隧道在内的技术与所述边缘关 口设备建立连接。
50. 如权利要求 47所述的在 IP电信网***中实现组播的方法, 其特征在 于:
所述组播分组中包含组播标识字段、 包类别标识字段、 组播地址字段和分 组载荷;
具有相同组播地址的第一个分组为组播首包分组, 组播首包分组拥有完整 的报头和完整的组播扩展报头;
具有相同组播地址的第二个分组及以后的分组为组播后续包, 后续分组的 报头可以不含组播扩展报头。
51. 如权利要求 50所述的在 IP电信网***中实现组播的方法, 其特征在 于:
所述组播扩展报头中拥有全部目的端边缘关口设备的复址无连接数据网地 址。
52. 如权利要求 47所述的在 IP电信网***中实现组播的方法, 其特征在 于:
所述组播首包分组和叶节点修改包以命令包形式发送。
53. 如权利要求 44所述的在 IP电信网***中实现组播的方法, 其特征在 于- 所述资源配置命令中指明流类别。
54. 一种在 IP电信网***中实现组播的方法, 用于实现由 IP网用户发起 的组播, 该组播实现包括 (1) 组播通告; (¾ 组播树建立; (3) 组播通信; (4) 组 播终结四个步骤, 其特征在于组播实现过程中- 由所述复址无连接数据网中的边缘关口设备和地址映射设备实现采用 IP 地址的组播分组与采用复址无连接数据网地址的组播分组之间的转换。
55. 如权利要求 54所述的在 IP电信网***中实现由 IP网中用户发起的组 播的方法, 其特征在于:
所述组播通告过程包括如下步骤:
(1) IP网的组播源端点获取 IP网组播地址;
(2) 组播源端点向网络发出组播通知分组;
(3) 组播通知分组经过 IP网到达与之连接的边缘关口设备, 边缘关口设备 向地址映射设备发送包含 IP网组播地址参数在内的组播申请;
(4) 地址映射设备收到边缘关口设备发来的组播申请后,在地址映射设备内 生成 IP组播地址与复址无连接数据网地址的映射表,并向边缘关口设备发送带 有复址无连接数据网组播地址参数的组播响应。
56. 如权利要求 54所述的在 IP电信网***中实现由 IP网中用户发起的组 播实现方法, 其特征在于- 所述组播树建立过程包括如下步骤-
(1) 要加入组播的 IP网的设备, 向 IP网发出包含 IP网组播地址参数在内 的组播加入申请;
(2) 组播加入申请分组到达与目的端连接的边缘关口设备,边缘关口设备向 地址映射设备发出组播加入申请;
(3) 地址映射设备收到组播加入申请后, 保存该 IP组播地址和目的端边缘 关口设备的复址无连接数据网地址, 在地址映射设备形成完整的复址无连接数 据网组播地址以及全部目的端边缘关口设备的复址无连接数据网地址;
(4) 所有要加入该组播树的节点都加入后, 组播树建成。
57. 如权利要求 54所述的在 IP电信网***中实现由 IP网中用户发起的组 播实现方法, 其特征在于:
所述组播通信过程包括如下步骤:
(1) 组播源端点向网络发出组播分组,组播分组到达与源端连接的边缘关口 设备,与组播源端点连接的边缘关口设备向地址映射设备发出包含 IP组播地址 参数在内的组播地址解析请求;
(2) 地址映射设备收到组播地址解析请求, 作地址解析, 并向组播源端点连 接的边缘关口设备回发包含有复址无连接数据网地址、 全部目的端边缘关口设 备的复址无连接数据网地址参数在内的组播地址解析;
(3) 组播源端点连接的边缘关口设备发送组播分组。
58. 如权利要求 54所述的在 IP电信网***中实现由 IP网中用户发起的组 播实现方法, 其特征在于:
所述组播终结的过程为:
组播源端点向网络发出组播终结分组, 组播源端点连接的边缘关口设备向 地址映射设备发出包含有组播地址参数在内的组播终结申请分组,地址映射设 备清除与该组播地址相关的全部表项, 组播终结。
59. 如权利要求 55至 58中任意一项所述的在 IP电信网***中实现由 IP 网中用户发起的组播实现方法, 其特征在于:
所述组播源端点通过包括隧道在内的技术与所述边缘关口设备建立连接。
60. 如权利要求 57所述的在 IP电信网***中实现由 IP网中用户发起的组 播实现方法, 其特征在于:
所述组播分组中包含组播标识字段、 组播地址字段和分组载荷。
61. 如权利要求 57所述的在 IP电信网***中实现由 IP网中用户发起的组 播实现方法, 其特征在于:
具有相同组播地址的第一个分组为组播首包分组, 组播首包分组拥有完整 的报头和完整的组播扩展报头;
具有相同组播地址的第二个分组及以后的分组为组播后续分组, 后续分组 的报头可以不含组播扩展报头。
62. 如权利要求 61所述的在 IP电信网***中实现由 IP网中用户发起的组 播实现方法, 其特征在于:
所述组播扩展报头中拥有全部目的端边缘关口设备的复址无连接数据网地 址。
63. 如权利要求 57所述的在 IP电信网***中实现由 IP网中用户发起的组 播实现方法, 其特征在于- 所述组播首包分组和叶节点修改包以命令包形式发送。
64. —种在 IP电信网***中基于链路告警机制的资源管理方法,其特征在 于:
1 )将 IP网中的业务进行分类, 对每一类业务分别建立若干个资源独立的 虚拟专网, 为虚拟专网的链路配置确定资源; 2)在建立虚拟专网的过程中设定链路告警的等级以及相应告警等级的资源 阈值, 一旦所述虚拟专网的用户使用的资源超过链路告警阈值, 节点设备向网 络管理设备报警, 网络管理设备将告警信息通知地址映射设备;
3)对于所述用户新的资源需求,与之连接的边缘关口设备首先向所述地址 映射设备査询该用户的资源使用状况, 只有所述地址映射设备中无告警信息才 可建立连接, 否则拒绝建立连接。
65. 如权利要求 64所述的在 IP电信网***中基于链路告警机制的资源管 理方法, 其特征在于:
所述步骤 1 ) 中, 链路资源通过如下方式进行配置:
1 ) 用户向网络管理设备提出网络资源需求;
2)网络管理设备根据用户的资源需求计算出网络节点设备的每一条链路的 资源, 由网络管理设备向复址无连接数据网中的网络节点设备发出资源配置命 令;
3 )网络节点设备接收到资源配置命令,根据网络节点设备各链路资源的情 况, 发出确认响应或拒绝响应;
网络节点设备拥有的资源如果能满足资源配置命令所要求的资源则发确认 响应, 否则发拒绝响应;
确认响应发出表明资源配置成功;
4)网络管理设备向地址转换设备发出包含有业务类别、虚拟专网编号参数 在内的命令, 资源配置完成。
66. 如权利要求 64所述的在 IP电信网***中基于链路告警机制的资源管 理方法, 其特征在于:
所述步骤 1 ) 中, 链路资源通过如下方式进行配置:
1 )用户向网络管理设备提出对网络资源需求;
2) 网络管理设备向边缘关口设备发出资源配置命令;
3 )源端边缘关口设备向目的边缘关口设备发虚拟专网配置请求;
4)途经的各复址无连接数据网节点设备, 收到该请求后根据自有的资源情 况作出响应: 如果节点的资源能支持, 则复址无连接数据网节点设备根据该请 求配置链路资源, 并向下一节点转发该请求, 直至目的边缘关口设备; 如果目 的边缘关口设备的资源能支持, 目的端边缘关口设备向源端边缘关口设备发送 接受响应; 如果源边缘关口设备收到目的端边缘关口设备的接受响应, 则源端 边缘关口设备立即向网络管理设备回送确认响应;
5)网络管理设备收到该虚拟专网的所有边缘关口设备的确认响应, 网络管 理设备向地址映射设备发送带有业务类别、 虚拟专网编号参数在内的命令; 地 址映射设备收到来自网络管理设备的命令, 即回送确认响应; 网络管理设备收 到确认响应; 资源配置成功。
67. 如权利要求 64所述的在 IP电信网***中基于链路告警机制的资源管 理方法, 其特征在于:
所述步骤 2 ) 进一步包括如下步骤:
1 )由参与虚拟专网的节点设备、网络管理设备和地址映射设备组成一条资 源告警链;
2 ) 当某一业务类别的用户使用的资源没有超过该业务类别链路告警阈值, 节点设备不发告警信息; 当某一业务类别的用户使用的资源超过该业务类别链 路告警阈值, 或某一业务类别虚拟专网的用户使用的资源超过该虚拟专网链路 告警阈值, 节点设备向网络管理设备发送告警信息;
3)网络管理设备将包含有业务类别、虚拟专网编号、 告警等级参数的告警 信息通知地址映射设备。
68. 如权利要求 64所述的在 IP电信网***中基于链路告警机制的资源管 理方法, 其特征在于:
所述步骤 3 )进一步包括如下的步骤:
1 )用户一旦要求建立通信连结,边缘关口设备首先向地址映射设备查询该 用户或业务网的资源使用状况, 如地址映射设备指示该用户或业务网没有链路 告警, 通信建立则按正常业务流程进行;
2)如地址映射设备发现该用户或业务网链路告警,地址映射设备将向网络 管理设备发出资源检索请求, 查询本次通信连接经过的链路有无链路告警, 如 经过的链路无链路告警, 地址映射设备指示该用户或业务网没有链路告警, 通 信建立则按正常业务流程进行; 如经过的链路告警, 地址映射设备指示该用户 或业务网链路告警, 该通信不能建立。
69. 如权利要求 64所述的在 IP电信网***中基于链路告警机制的资源管 理方法, 其特征在于:
所述步骤 1)中, 将业务分成若干个类, 对不同类的分组通过在其帧结构中 设置标识予以区别, 并分别釆用不同的资源管理策略。
70. 如权利要求 69所述的在 IP电信网***中基于链路告警机制的资源管 理方法, 其特征在于:
对于承诺速率和峰值速率的统计复用类业务,无链路告警可接纳峰值速率, 随着链路告警等级的提高接纳控制速率逐步由峰值速率转向承诺速率, 链路告 警等级超过设定级, 连结则不能建立。
71. 如权利要求 69所述的在 IP电信网***中基于链路告警机制的资源管 理方法, 其特征在于- 对于尽力而为类别的业务, 不启动链路告警机匍 J。
72. 如权利要求 64所述的在 IP电信网***中基于链路告警机制的资源管 理方法, 其特征在于- 对于紧急通信类别的业务, 即使所述地址映射设备指示有链路告警, 紧急 通信业务也正常进行。
73. 如权利要求 64所述的在 IP电信网***中基于链路告警机制的资源管 理方法, 其特征在于- 所述 IP电信网对端到端的数据报文采用确定的传送路由;
所述固定的传送路由可以是单路由, 也可以是由主路由和备份路由结合而 成的双路由或多路由。
74. 一种在 IP电信网***中基于信令机制的资源管理方法, 其特征在于:
1 )将 IP网中的业务进行分类, 对每一类业务分别建立若干个虚拟专网, 为虚拟专网的链路配置确定资源;
2)根据虚拟专网中用户的资源需求,与之连接的边缘关口设备发出带有资 源要求参数的信令, 向该特定虚拟专网中有关的各个节点传递, 在所述各节点 的资源都能够满足的情况下, 允许建立连接, 以保证用户的资源需求。
75. 如权利要求 74所述的在 IP电信网***中基于信令机制的资源管理方 法, 其特征在于:
在通信开始之前, 要为需要使用资源的用户在其申请的虚拟专网中建立连 接, 并在其申请的虚拟专网的资源表中扣除该连接所使用的资源;
当通信结束后,拆除该连接,并将释放的资源增添回虚拟专网的资源表中。
76. 如权利要求 74或 75所述的在 IP电信网***中基于信令机制的资源管 理方法, 其特征在于:
在连接建立过程中, 沿途的节点中如果属于该虚拟专网的资源不能满足该 连接所需要的资源, 则该次连接不能建立。
77. 如权利要求 74或 75所述的在 IP电信网***中基于信令机制的资源管 理方法, 其特征在于:
通信进行过程中, 只在边缘关口设备处进行接入控制, 参与虚拟专网的节 点设备不进行资源控制和管理。
78. 如权利要求 74所述的在 IP电信网***中基于信令机制的资源管理方 法, 其特征在于:
所述步骤 1 ) 中, 链路资源通过如下方式进行配置:
1 ) 用户向网络管理设备提出网络资源需求;
2)网络管理设备根据用户的资源需求计算出网络节点设备的每一条链路的 资源, 由网络管理设备向复址无连接数据网中的网络节点设备发出资源配置命 令;
3)网络节点设备接收到资源配置命令,根据网络节点设备各链路资源的情 况, 发出确认响应或拒绝响应;
网络节点设备拥有的资源如果能满足资源配置命令所要求的资源则发确认 响应, 否则发拒绝响应;
确认响应发出表明资源配置成功;
4)网络管理设备向地址转换设备发出包含有业务类别、虚拟专网编号参数 在内的命令, 资源配置完成。
79. 如权利要求 74所述的在 IP电信网***中基于信令机制的资源管理方 法, 其特征在于- 所述步骤 1 ) 中, 链路资源通过如下方式进行配置:
1 )用户向网络管理设备提出对网络资源需求;
2) 网络管理设备向边缘关口设备发出资源配置命令;
3 )源端边缘关口设备向目的边缘关口设备发虚拟专网配置请求;
4)途经的各复址无连接数据网节点设备, 收到该请求后根据自有的资源情 况作出响应: 如果节点的资源能支持, 则复址无连接数据网节点设备根据该请 求配置链路资源, 并向下一节点转发该请求, 直至目的边缘关口设备; 如果目 的边缘关口设备的资源能支持, 目的端边缘关口设备向源端边缘关口设备发送 接受响应; 如果源边缘关口设备收到目的端边缘关口设备的接受响应, 则源端 边缘关口设备立即向网络管理设备回送确认响应; 5 )网络管理设备收到该虚拟专网的所有边缘关口设备的确认响应, 网络管 理设备向地址映射设备发送带有业务类别、 虚拟专网编号参数在内的命令; 地 址映射设备收到来自网络管理设备的命令, 即回送确认响应; 网络管理设备收 到确认响应; 资源配置成功。
80. 一种 IP电信网***中复址无连接数据网分组的封装方法,其特征在于 包括以下步骤:
A: 边缘关口设备根据是数据分组还是控制分组, 设定分组类别字段的值; B:边缘关口设备根据其承载业务网的特性来决定业务类型,设定业务类别 字段的值;
C;边缘关口设备确定进入的数据分组是否需要进行报头压缩,如果需要则 进入步骤1), 否则转到步骤 G;
D: 确定首包标记字段的取值;
E: 确定报头压縮字段的取值;
F: 设定流序号取值;
G: 设定源地址和目标地址。
81. 如权利要求 80所述的 IP电信网***中复址无连接数据网分组的封装 方法, 其特征在于:
在步骤 B之后, 进一步包括以下步骤:
C1 ) 边缘关口设备判断数据分组是否是属于某一个 VPN, 如果是, 则转入 步骤 C2 ); 如果不是, 则转入步骤 C;
C2 ) 设定虚拟专网标记字段的值;
C3 ) 设定虚拟专网编号字段的值; 转入步骤 P o
82. 如权利要求 81所述的 IP电信网***中复址无连接数据网分组的封装 方法, 其特征在于:
在步骤 C3 ) 中包括, 对于虚拟专网标记字段置位, 并且具有同源、 同目的 地址、 同业务类别的复址无连接数据网分组, 将该分组的扩展报头标记字段置 位, 标记上不同的虚拟专网编号值, 且虚拟专网编号字段放在扩展报头中。
83. 如权利要求 80所述的 IP电信网***中复址无连接数据网分组的封装 方法, 其特征在于:
在步骤 B之后, 进一步包括以下步骤:
C11 )边缘关口设备 ED确定进入的数据分组是否是属于某一个组播群, 如 果是, 则转入步骤 C12); 如果不是, 则转入步骤 C;
C12)设定组播标记字段的值;
C13) 设定组播地址字段的值, 放入目的地址字段中;
C14)设定首包标记字段的取值; 如果是组播业务的首包分组, 则下一步转 到步骤 C15), 如果不是则进入步骤 F);
C15)设定扩展报头字段的值, 并转入步骤 F)。
84. 如权利要求 83所述的 IP电信网***中复址无连接数据网分组的封装 方法, 其特征在于:
所述扩展报头字段中是全部目的端边缘关口设备的复址无连接数据网地 址。
85. 如权利要求 84所述的 IP电信网***中复址无连接数据网分组的封装 方法, 其特征在于:
如果发起组播业务请求的组播源端点是 IP网内的节点,则该组播源端点按 照 IP协议发送 IP网组播地址,地址映射设备根据其保存的 IP组播地址与复址 无连接数据网组播地址之间的关联表, 确定复址无连接数据网内的组播地址, 交由边缘关口设备将此复址无连接数据网组播地址封装到复址无连接数据网分 组的目的地址字段中。
86. 如权利要求 84所述的 IP电信网***中复址无连接数据网分组的封装 方法, 其特征在于:
如果发起组播业务请求的组播源端点是复址无连接数据网内的节点, 则由 复址无连接数据网内的节点发出组播业务请求给地址映射设备, 由地址映射设 备给出复址无连接数据网组播地址, 边缘关口设备将此复址无连接数据网组播 地址封装到复址无连接数据网分组的目的地址字段中。
87. 如权利要求 80所述的 IP电信网***中复址无连接数据网分组的封装 方法, 其特征在于- 在源端边缘关口设备处, 对同源地址、 同目的地址、 同业务类别的首包分 组, 将首包标记置位、 分组压縮标记不置位、 并赋以流序号确定值;
对同源地址、 同目的地址、 同业务类别的后续分组, 将首包标记不置位、 分组压缩标记置位、 并设定流序号取值。
88. 如权利要求 87所述的 IP电信网***中复址无连接数据网分组的封装 方法, 其特征在于: 在源端边缘关口设备处, 对同源地址、 同目的地址、 同业务类别的首包分 组, IP分组作为复址无连接数据网分组的载荷完整放入; 对同源地址、 同目的 地址、同业务类别的后续分组,复址无连接数据网分组的载荷中只放入 IP分组 的载荷, 不包括 IP报头。
89. 一种对 IP电信网***中传送的分组进行报头压缩的方法,在分组报头 处设置有首包标记域、 分组压缩标记域、流标记域, 其特征在于包括如下步骤:
(1) IP网用户发送 IP分组;
(2)在该 IP分组经由的源端边缘关口设备处, 判断其是否是首包;
(3) 如果是 IP分组的首包, 对该首包对应的首包复址无连接数据网分组, 将首包标记置位, 分组压缩标记不置位、 并赋以流标记确定值, 然后源端边缘 关口设备将包含 IP报头在内的 IP分组作为复址无连接数据网分组的载荷完整 放入; 发送该复址无连接数据网分组;
(4) 如果不是 IP分组的首包,对于报头中包含与首包 IP分组同源、 同目的 地址、 同业务类别信息的分组, 判定其为后续 IP分组, 将其对应的复址无连接 数据网分组的报头的首包标记不置位, 分组压缩标记置位、 并赋以流标记确定 值,然后该源端边缘关口设备只将该后续 IP分组的载荷放入复址无连接数据网 分组的载荷之中;
(5) 目的端边缘关口设备对接收到的复址无连接数据网分组,根据其报头中 的首包标记和报头压縮标记判定其是否为首包;
(6) 如果是复址无连接数据网的首包,则按流标记的值,将流标记值和从该 复址无连接数据网分组的载荷中取出的 IP报头作映射表,存放在目的端边缘关 口设备处,然后将首包复址无连接数据网分组中的载荷中的 IP分组取出,放入 目的端边缘关口设备的发送队列中;
(7)如果不是复址无连接数据网的首包分组,则根据该分组的流标记值判断 其为哪一个首包的后续包, 对于该后续分组, 按流标记的值从映射表中取相应 的 IP报头, 与该后续分组的载荷一起组装成完整的 IP分组, 放入目的端边缘 关口设备的发送队列中;
(8) 目的端边缘关口设备根据 IP地址向 IP网发送 IP分组。
90. 如权利要求 89所述的对 IP电信网***中传送的分组进行报头压缩的 方法, 其特征在于:
所述目的端边缘关口设备对于接受到的非首包复址无连接数据网分组, 如 果发现该分组中流标记值在报头映射表中没有相应的表项, 则目的端边缘关口 设备向源端边缘关口设备请求重发该分组的首包。
91. 如权利要求 89所述的对 IP电信网***中传送的分组进行报头压缩的 方法, 其特征在于:
所述目的端边缘关口设备中为每一组进行报头压缩的具有相同源地址、 目 标地址和业务类别的 IP分组设置定时器,一旦超时, 则边缘关口设备自动将该 IP分组的 IP报头对应的表项及映射表清除。
92. 如权利要求 89所述的对 IP电信网***中传送的分组进行报头压缩的 方法, 其特征在于:
所述首包标识置位表示首包, 不置位表示为非首包。
93. 如权利要求 89所述的对 IP电信网***中传送的分组进行报头压縮的 方法, 其特征在于- 所述报头压缩标记置位表示报头经过压縮, 不置位表示报头未经过压缩。
94. 如权利要求 89所述的对 IP电信网***中传送的分组进行报头压缩的 方法, 其特征在于- 所述 IP分组也可以是 ATM分组或者帧中继分组。
PCT/CN2005/000594 2004-04-28 2005-04-28 Systeme et procede de communications d'un reseau de telecommunications ip et leur application WO2005107161A1 (fr)

Priority Applications (2)

Application Number Priority Date Filing Date Title
EP05752258A EP1748600A4 (en) 2004-04-28 2005-04-28 SYSTEM AND COMMUNICATION METHOD OF AN IP TELECOMMUNICATIONS NETWORK AND APPLICATION THEREOF
US11/587,810 US7894458B2 (en) 2004-04-28 2005-04-28 System and communication method of IP telecommunication network and its application

Applications Claiming Priority (18)

Application Number Priority Date Filing Date Title
CN 200410037641 CN1251450C (zh) 2004-04-28 2004-04-28 Ip电信网***及其实现方法
CN200410037641.0 2004-04-28
CN200410049945.9 2004-06-21
CNB2004100499459A CN100393064C (zh) 2004-06-21 2004-06-21 Ip电信网***中对分组进行报头压缩的方法
CNB2004100497082A CN100444576C (zh) 2004-06-24 2004-06-24 Ip电信网***中实现组播的方法
CN200410049708.2 2004-06-24
CNB2004100497078A CN100566325C (zh) 2004-06-24 2004-06-24 Ip电信网***中实现组播的方法
CN200410049707.8 2004-06-24
CN200410062652.4 2004-07-08
CNB2004100626524A CN100359876C (zh) 2004-06-25 2004-07-08 Ip电信网***中实现虚拟专网的方法
CN200410070502.8 2004-08-05
CNB2004100705028A CN100393065C (zh) 2004-08-05 2004-08-05 Ip电信网***中复址无连接数据网分组的封装方法
CNB2004100917765A CN100514930C (zh) 2004-11-26 2004-11-26 Ip电信网***中以隧道方式实现通信的方法
CN200410091776.5 2004-11-26
CN200510008788.1 2005-03-01
CNB2005100087877A CN100433678C (zh) 2005-03-01 2005-03-01 Ip电信网***中基于链路告警机制的资源管理方法
CN200510008787.7 2005-03-01
CNB2005100087881A CN100414907C (zh) 2005-03-01 2005-03-01 Ip电信网***中基于信令机制的资源管理方法

Publications (1)

Publication Number Publication Date
WO2005107161A1 true WO2005107161A1 (fr) 2005-11-10

Family

ID=35242018

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2005/000594 WO2005107161A1 (fr) 2004-04-28 2005-04-28 Systeme et procede de communications d'un reseau de telecommunications ip et leur application

Country Status (3)

Country Link
US (1) US7894458B2 (zh)
EP (1) EP1748600A4 (zh)
WO (1) WO2005107161A1 (zh)

Families Citing this family (44)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP4727245B2 (ja) * 2005-02-08 2011-07-20 三菱電機株式会社 地図情報処理装置
KR20060115290A (ko) * 2005-05-04 2006-11-08 삼성전자주식회사 이동통신 시스템에서 다중 사용자 패킷 송수신 장치 및방법
US7590123B2 (en) * 2005-11-22 2009-09-15 Cisco Technology, Inc. Method of providing an encrypted multipoint VPN service
KR101457241B1 (ko) 2007-02-06 2014-10-31 엔트로픽 커뮤니케이션즈, 인크. 네트워크에서의 완전 메시 레이트 트랜잭션
US8204225B2 (en) * 2007-07-23 2012-06-19 Savi Technology, Inc. Method and apparatus for providing security in a radio frequency identification system
FR2919449B1 (fr) * 2007-07-25 2012-12-14 Eads Secure Networks Procede d'etablissement d'appel point a point, serveur d'appel et systeme de communication adapte a l'etablissement d'appel point a point.
CN101369907B (zh) * 2007-08-15 2011-09-28 华为技术有限公司 组播业务的实现方法及其装置和***
US8122213B2 (en) * 2009-05-05 2012-02-21 Dell Products L.P. System and method for migration of data
US8527659B2 (en) 2009-05-17 2013-09-03 Lg Electronics Inc. Method and system for optimizing CPNS enabler
US8374183B2 (en) 2010-06-22 2013-02-12 Microsoft Corporation Distributed virtual network gateways
CN102957711A (zh) * 2011-08-16 2013-03-06 广州欢网科技有限责任公司 在电视上通过语音进行网址定位的方法及***
US9369371B2 (en) 2012-10-05 2016-06-14 Cisco Technologies, Inc. Method and system for path monitoring using segment routing
US9049233B2 (en) 2012-10-05 2015-06-02 Cisco Technology, Inc. MPLS segment-routing
US10404582B1 (en) 2012-12-27 2019-09-03 Sitting Man, Llc Routing methods, systems, and computer program products using an outside-scope indentifier
US10411998B1 (en) 2012-12-27 2019-09-10 Sitting Man, Llc Node scope-specific outside-scope identifier-equipped routing methods, systems, and computer program products
US10397101B1 (en) 2012-12-27 2019-08-27 Sitting Man, Llc Routing methods, systems, and computer program products for mapping identifiers
US10397100B1 (en) 2012-12-27 2019-08-27 Sitting Man, Llc Routing methods, systems, and computer program products using a region scoped outside-scope identifier
US10476787B1 (en) 2012-12-27 2019-11-12 Sitting Man, Llc Routing methods, systems, and computer program products
US10212076B1 (en) 2012-12-27 2019-02-19 Sitting Man, Llc Routing methods, systems, and computer program products for mapping a node-scope specific identifier
US10419335B1 (en) 2012-12-27 2019-09-17 Sitting Man, Llc Region scope-specific outside-scope indentifier-equipped routing methods, systems, and computer program products
US10419334B1 (en) 2012-12-27 2019-09-17 Sitting Man, Llc Internet protocol routing methods, systems, and computer program products
US10404583B1 (en) 2012-12-27 2019-09-03 Sitting Man, Llc Routing methods, systems, and computer program products using multiple outside-scope identifiers
US10587505B1 (en) 2012-12-27 2020-03-10 Sitting Man, Llc Routing methods, systems, and computer program products
US10411997B1 (en) 2012-12-27 2019-09-10 Sitting Man, Llc Routing methods, systems, and computer program products for using a region scoped node identifier
US10374938B1 (en) 2012-12-27 2019-08-06 Sitting Man, Llc Routing methods, systems, and computer program products
US10447575B1 (en) 2012-12-27 2019-10-15 Sitting Man, Llc Routing methods, systems, and computer program products
US10904144B2 (en) 2012-12-27 2021-01-26 Sitting Man, Llc Methods, systems, and computer program products for associating a name with a network path
US9559954B2 (en) 2013-03-11 2017-01-31 Cisco Technology, Inc. Indexed segment ID
US9565160B2 (en) 2013-03-11 2017-02-07 Cisco Technology, Inc. Advertisement of adjacency segment identifiers
US9537769B2 (en) * 2013-03-15 2017-01-03 Cisco Technology, Inc. Opportunistic compression of routing segment identifier stacks
US9537718B2 (en) 2013-03-15 2017-01-03 Cisco Technology, Inc. Segment routing over label distribution protocol
CN104883687B (zh) * 2014-02-28 2019-02-26 华为技术有限公司 无线局域网隧道建立方法、装置及接入网***
US9762488B2 (en) 2014-03-06 2017-09-12 Cisco Technology, Inc. Segment routing extension headers
US11474767B1 (en) * 2014-05-28 2022-10-18 Amazon Technologies, Inc. Print from web services platform to local printer
US9401858B2 (en) 2014-06-30 2016-07-26 Cisco Technology, Inc. Loop avoidance during network convergence in switched networks
US9807001B2 (en) 2014-07-17 2017-10-31 Cisco Technology, Inc. Segment routing using a remote forwarding adjacency identifier
US9652212B2 (en) * 2014-09-24 2017-05-16 Oracle International Corporation Managing change events for devices in an enterprise system
US10341221B2 (en) 2015-02-26 2019-07-02 Cisco Technology, Inc. Traffic engineering for bit indexed explicit replication
US10887430B2 (en) * 2015-10-21 2021-01-05 Dragonwave-X, Llc Compression in communications
US10263881B2 (en) 2016-05-26 2019-04-16 Cisco Technology, Inc. Enforcing strict shortest path forwarding using strict segment identifiers
US11032197B2 (en) 2016-09-15 2021-06-08 Cisco Technology, Inc. Reroute detection in segment routing data plane
US10693715B1 (en) * 2017-10-26 2020-06-23 Amazon Technologies, Inc. Dynamic network address space allocation for virtual networks
CN112532563B (zh) * 2019-09-17 2022-04-05 华为技术有限公司 报文的发送方法和装置
US11140074B2 (en) 2019-09-24 2021-10-05 Cisco Technology, Inc. Communicating packets across multi-domain networks using compact forwarding instructions

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5159695A (en) * 1989-05-30 1992-10-27 Motorola, Inc. Communication system to communication system communication system
WO2003001717A2 (en) * 2001-06-21 2003-01-03 Telefonaktiebolaget Lm Ericsson (Publ) Multicast in a point-to-point oriented packet-switched telecommunication network
CN1398090A (zh) * 2001-07-18 2003-02-19 华为技术有限公司 一种无线虚拟私有网的隧道封装方法
WO2003051002A1 (en) * 2001-12-12 2003-06-19 Ktfreetel Co., Ltd. Method and apparatus for tunneling service of explicit multicast in mobile ip network
US20030134651A1 (en) * 2002-01-16 2003-07-17 Hsu Raymond T. Method and apparatus for flow treatment and mapping on multicast/broadcast services

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6717956B1 (en) * 2000-03-03 2004-04-06 Luminous Networks, Inc. Dual-mode virtual network addressing
JP4183379B2 (ja) * 2000-11-27 2008-11-19 富士通株式会社 ネットワーク及びエッジルータ
CN1214583C (zh) * 2002-08-23 2005-08-10 华为技术有限公司 一种三层虚拟私有网络及其构建方法

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5159695A (en) * 1989-05-30 1992-10-27 Motorola, Inc. Communication system to communication system communication system
WO2003001717A2 (en) * 2001-06-21 2003-01-03 Telefonaktiebolaget Lm Ericsson (Publ) Multicast in a point-to-point oriented packet-switched telecommunication network
CN1398090A (zh) * 2001-07-18 2003-02-19 华为技术有限公司 一种无线虚拟私有网的隧道封装方法
WO2003051002A1 (en) * 2001-12-12 2003-06-19 Ktfreetel Co., Ltd. Method and apparatus for tunneling service of explicit multicast in mobile ip network
US20030134651A1 (en) * 2002-01-16 2003-07-17 Hsu Raymond T. Method and apparatus for flow treatment and mapping on multicast/broadcast services

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See also references of EP1748600A4 *

Also Published As

Publication number Publication date
EP1748600A4 (en) 2013-03-06
US20080130661A1 (en) 2008-06-05
EP1748600A1 (en) 2007-01-31
US7894458B2 (en) 2011-02-22

Similar Documents

Publication Publication Date Title
WO2005107161A1 (fr) Systeme et procede de communications d&#39;un reseau de telecommunications ip et leur application
US7225259B2 (en) Service tunnel over a connectionless network
Ferguson et al. What is a VPN?
US9083656B2 (en) Service communication method and system for access network apparatus
JP3854607B2 (ja) Ipアクセスネットワークにおいて保証サービス品質を伴うサービスを提供する方法
CN104023006B (zh) 一种基于应用层中继的多径传输***及方法
US20040109414A1 (en) Method of providing differentiated service based quality of service to voice over internet protocol packets on router
JP2004531179A (ja) ポイントツーポイントパケット交換向きのネットワークにおけるマルチキャスト方法
JP2004515156A (ja) 分散されたサービス制御を有するプログラム可能なアクセス装置を含むネットワークアクセスシステム
JP2004515181A (ja) 分散されたネットワークアクセスシステムのための外部プロセッサ
KR20010099946A (ko) 음성/ip를 지원하는 무선 로컬 루프 시스템
US7593405B2 (en) Inter-domain traffic engineering
JP2004515182A (ja) 分散されたネットワークアクセスシステムのためのメッセージ、制御および報告インターフェイス
WO2005022824A1 (fr) Procede permettant de choisir une voie de transmission de donnees de trafic en temps reel
WO2006122481A1 (fr) MÉTHODE POUR ASSURER UNE QdS DYNAMIQUE D’UN SYSTÈME WIMAX
WO2007009347A1 (fr) Méthode et appareil de transmission de flux de service sur un système d’échange virtuel
JPH0281539A (ja) デジタル通信回路網およびその操作方法並びにデジタル通信回路網に用いるルータ
WO2005125104A1 (fr) Procede de transmission securisee de flux de services sur un reseau ip
WO2009082905A1 (fr) Procédé système et dispositif commutateur permettant l&#39;établissement dynamique de réseau local virtuel de multidiffusion
WO2008011818A1 (fr) Procédé de fourniture d&#39;un service réseau local privé virtuel à hiérarchie et système réseau
WO2012016526A1 (zh) 一种城域网通信方法及通信***
WO2009132500A1 (zh) 层次化有序地址分组网络中数据链路层信息传送和控制管理的方法及装置
WO2009103192A1 (zh) 资源分配方法及资源释放方法
WO2012003781A1 (zh) 一种控制业务接纳的方法及***
JP2004515179A (ja) 分散されたネットワークアクセスシステムのためのプログラム可能なアクセス装置

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BW BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE EG ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KM KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NA NI NO NZ OM PG PH PL PT RO RU SC SD SE SG SK SL SM SY TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): BW GH GM KE LS MW MZ NA SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LT LU MC NL PL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
WWE Wipo information: entry into national phase

Ref document number: 11587810

Country of ref document: US

NENP Non-entry into the national phase

Ref country code: DE

WWW Wipo information: withdrawn in national office

Country of ref document: DE

WWE Wipo information: entry into national phase

Ref document number: 2005752258

Country of ref document: EP

WWP Wipo information: published in national office

Ref document number: 2005752258

Country of ref document: EP

WWP Wipo information: published in national office

Ref document number: 11587810

Country of ref document: US