专利摘要:
The computer device includes a processor, a memory connected to the processor, and an application program executable by the processor to generate data stored in the memory and communicated to a remote computer system via a network based on the symbol control information. The communication protocol stack may be stored in memory and executed by a processor to effect communication of data from a mobile device to a remote system. The protocol stack receives data from an application program and receives application layer protocol data units from the application layer and application layer that locates the received data within the application layer protocol data unit, and locates the application layer protocol data unit within the network layer protocol data unit. And a network layer that locates the symbol control information in a network layer protocol data unit separate from the application layer protocol data unit and delivers the network layer protocol data unit to the network for transmission to a remote system.
公开号:KR20040008181A
申请号:KR10-2003-7014957
申请日:2002-04-11
公开日:2004-01-28
发明作者:칼 바인딩;프랑스아 돌리보;레토 헤르만;디르크 후스만;안드레아스 샤드
申请人:인터내셔널 비지네스 머신즈 코포레이션;
IPC主号:
专利说明:

PACKET-ORIENTED DATA COMMUNICATIONS BETWEEN MOBILE AND FIXED DATA NETWORKS}
[2] A typical packet-oriented data network is a network interface that couples a processor, memory coupled to the processor, computer program code stored in memory and executable by the processor, and nodes to the network. and a plurality of data processing nodes having a network interface. The computer program code includes an application program capable of executing data communication with other nodes in the network under program control via a network interface. Data traffic communicates from a source node to a destination in discrete packets called protocol data units (PDUs). Each PDU includes a header portion and a payload portion. The payload portion carries the data being communicated. The header part conveys control information for performing communication of the PDU to the destination. These PDUs are communicated from an application program in a source node to an application program in a destination node according to the International Standards Organization (ISO) reference model. The ISO reference model defines a stack of logical data processing protocol layers between an application program and a network in a source node and a destination node. Data communicated from the source application program to the destination application program is transferred from the source application program to the network via a protocol stack at the source node. When received, data is passed from the network to the destination application program via a protocol stack at the destination node.
[1] FIELD OF THE INVENTION The present invention generally relates to packet data communication between mobile and fixed data networks, and more particularly to address processing for such data communication.
[19] 1 is a block diagram of an example of a data processing system;
[20] 2 is a block diagram of an example of a mobile data communication environment;
[21] 3 is a simplified block diagram of a datagram for communication in an environment;
[22] 4 is a block diagram of a communication path from a source node to a destination via a network;
[23] 5 is another block diagram of a communication path,
[24] 6 is another block diagram of a datagram from communication in an environment;
[25] 7 is another block diagram of a datagram from communication in an environment;
[26] 8 is a block diagram of a tunneling datagram.
[3] The stack at both the source node and the destination node includes an application layer, a presentation layer, a session layer, a transport layer, a network layer, a link layer, And a physical layer. The application layer provides a user interface that spans the entire network, such as file transfer access and management, as well as general message interworking services such as e-mail. The application layer is located between the application program and the presentation layer. The presentation layer negotiates and selects the appropriate transfer syntax used during the transaction so that the syntax of the message exchanged between the two application entities is maintained. The presentation layer is placed between the application layer and the session layer. The session layer allows two application layer protocol entities to manage data exchange, for example by establishing and clearing communication channels between the entities. The session layer is disposed between the presentation layer and the transport layer. The transport layer acts as an interface between the higher application oriented layer and the lower network oriented layer by providing the session layer with message delivery functionality independent of the underlying network type. The transport layer is disposed between the session layer and the network layer. By providing a predefined set of message delivery functions at the session layer, the transport layer hides the detailed operation of the underlying network from the session layer. The network layer serves to establish and clear network connections between transport layer protocol entities and includes such functionality as network routing. The network layer is disposed between the transport layer and the link layer. The link layer establishes a physical connection provided by the network, and provides the network layer with information transfer functions such as error correction and retransmission of messages in the event of transmission errors. The link layer is disposed between the network layer and the physical layer. The physical layer provides the physical and electrical interface between the node and the network.
[4] At each layer of the protocol stack in the source, the PDU containing data and control information from the previous layer is augmented by the control information from the current layer. Data from the source application program is augmented by a header portion containing application layer protocol control information at the application layer to form an application layer PDU (APDU). The APDU is augmented by a header portion containing presentation layer protocol control information in the presentation layer to form a presentation layer PDU (PPDU). The PPDU is augmented by a header portion containing session layer protocol control information in the session layer to form a session layer PDU (SPDU). The SPDU is augmented by a header portion containing transport layer protocol control information in the transport layer to form a transport layer PDU (TPDU). The TPDU is augmented by a header portion containing network layer protocol control information at the network layer to form a network layer PDU (NPDU). NPDUs are augmented by link layer protocol control information at the link layer to form datagrams for communicating to destinations in the physical layer (PDU) or physical network.
[5] In some data communication environments, the application layer, presentation layer, and session layer functions may be combined into a single protocol layer. An example of such an environment is the Transmission Control Protocol / Internet Protocol (TCP / IP) environment. In a TCP / IP environment, the combined functionality of the application layer, presentation layer, and session layer is such as File Transfer Protocol (FTP), Remote Terminal Protocol (TELNET), Simple Mail Transfer Protocol (SMTP), and Name Server Protocol (NSP). It is provided via a plurality of protocols. The transport layer is provided by a transmission control protocol and / or User Datagram Protocol (UDP). The network layer is provided by the Internet Protocol (IP). Data from the source application is augmented by a header portion containing TCP control information at the TCP layer to form a TCP PDU. TCP PDUs are augmented by header information, including IP protocol control information, at the IP layer to form TCP / IP datagrams.
[6] In a typical TCP / IP network, the address and source and destination nodes are stored in each datagram that is communicated. In the application program in the source, the address of the destination is typically in the form of a symbol. For example, the name of a remote host system connected to the network may be considered a symbolic address. In order to perform communication of the PDU from the source node to the destination node, the symbolic network address is interpreted as a binary network layer address. The interpretation process is commonly known as address resolution. Address resolution is typically performed at the transport layer and network layer of the protocol stack at the source node. Next, the network performs routing at the intermediate node based on the address of the destination node. Routing tables are employed at intermediate nodes to send datagrams in suboptimal hops on their path to the destination. More details on address resolution can be found in Douglas E. Comer on "Internetworking with TCP / IP" (Volume 1, Second Edition, Prentice Hall 1991).
[7] Address resolution typically includes a lookup function in a distributed database. In operation, the database maps symbolic addresses to corresponding binary network layer addresses. In general, a source node has a replica to it that is connected to a database or stored locally. For example, in a typical TCP / IP network, a Domain Name System (DNS) is generally provided in which distributed name servers are employed to facilitate TCP / IP communication between nodes. Conventionally, nodes in the fixed network have enough computers to perform cache excerpts of the address lookup function on the aforementioned network or otherwise the name service required to perform address resolution. Have a resource. In addition, network infrastructure generally has sufficiently low latency and sufficiently high bandwidth to quickly deliver the data needed for address resolution on demand.
[8] Typical mobile data communications networks, such as wireless application protocol (WAP) networks, include a plurality of mobile data processing devices. Mobile devices can communicate with each other over a wireless network and also with a remote host data processing node within a fixed network. Such devices typically include a processor, memory coupled to the processor, computer program code stored in the memory and executable by the processor, and a network interface coupling the nodes to the network. The computer program code includes an application program for executing data communication with another device in the network via a network interface under program control. Examples of such devices include mobile phones and personal digital assistants. Mobile devices typically communicate with a fixed network via a gateway connected to the fixed network. In a WAP network, host systems in a wired network are known as origin servers. In general, mobile data processing devices do not have the same amount of available memory as in data processing nodes in fixed networks. In addition, mobile devices generally have limited data storage capacity for several reasons, such as power consumption, physical volume and weight. Mobile networks have lower bandwidth and higher latency compared to fixed networks. Therefore, the data traffic processing function of the mobile network is generally more limited than the data traffic processing function of the fixed network. In addition, a permanent connection between the mobile network and the devices therein is generally not maintained to conserve power storage. In addition, as the device moves from one area of network coverage to another area, there is a location dependent interruption in the connection of the mobile device with the mobile network. Therefore, it will be appreciated that keeping a record of the address resolution information in the mobile device up to date is also very difficult.
[9] The conventional solution to this problem is that the mobile device delays address resolution for the network gateway through being connected to the mobile network. The network gateway performs address resolution from the symbolic address to the network layer address. An example of this approach can be found in the WAP network. Typically, mobile devices are connected to a WAP network via a pull proxy server, commonly known as a WAP gateway. The WAP gateway performs address resolution. The mobile device has an application layer protocol for executing data communication between the resident application and the WAP gateway.
[10] However, since the mobile device does not perform address resolution, the symbolic destination address is sent from the mobile device to the WAP gateway in the form of a universal resource locator (URL). The session layer protocol, also known as the Wireless Session Protocol (WSP), performs the communication of a URL from a mobile device to a gateway. The URL is resolved by the Hypertext Transfer Protocol / Transmission Control Protocol / Internet Protocol (HTTP / TCP / IP) stack at the gateway. In particular, the HTTP element performs IP address resolution. More details on WSP can be found in the "WAP Forum: Wireless Application Protocol: Wireless Session Protocol Specification, May 2000".
[11] If the session layer and / or lower layer data payloads are encrypted according to a security protocol, such as the Wireless Transport Layer End to End Security (WTLS) protocol described in the WAP Forum, employ such a mobile network to encrypt the encrypted information. It would be desirable to communicate. More details on the WTLS protocol can be found in the "WAP Forum: Wireless Application Protocol: Wireless Transport Layer End to End Security Specification, July 2000". However, such security protocols typically involve the encryption of symbolic destination addresses. The encrypted address can then be decrypted before address resolution is performed at the gateway. Decryption releases end-to-end security. Therefore, a secure communication channel, known as a WTLS session in the WAP network, extends from the mobile device to the gateway, not to exceed it. For security sensitive applications, such as financial or medical applications, this is undesirable.
[12] A conventional solution to this problem of providing end-to-end security in a mobile data communication network is to redirect session layer traffic to a secondary full proxy server residing in a secure domain established by a communication service provider. It includes). Providing information in the form of a navigation document is provided to the mobile device by the secondary server, causing the mobile device to redirect communication at the session layer. Another conventional solution is to perform destination address resolution at the mobile device with subsequent tunneling at the transport layer by the gateway. The transport layer tunnel is established by a peer-proxy protocol that conforms to either UDP or wireless datagram protocols, and the WAP communication protocol is the same as UDP. However, this approach leads to additional processing.
[13] Next, in accordance with the present invention, an application executable by the processor to generate data stored in the memory, stored in the memory, and communicated to a remote computer system via a network based on the symbol control information. A communication protocol stack stored in a memory and executable by a processor to execute communication of data from a mobile device to a remote system (the protocol stack receives data from an application program and stores the received data in an application layer protocol data unit). Having an application to deploy), receiving an application layer protocol data unit from the application layer, placing the application layer protocol data unit within the network layer protocol data unit, Network layer protocol data to the application layer control information in the symbol unit and a protocol data unit and provides the computer apparatus including a network layer which is located and, forwarding the network layer protocol data unit to the network for transmission to the remote system separately.
[14] Preferably, the control information includes a network address of the remote system. The control information can be located in the options field in the network layer protocol data unit by the network layer. In a preferred embodiment of the present invention, an unused option code is assigned to the control information. In another preferred embodiment of the present invention, the control information is recorded in the existing option code. Alternatively, the control information is located in the network layer protocol data unit by network tunneling. The invention also extends to a mobile telephone comprising a computer device as described above. Similarly, the invention extends to a server computer system comprising a computer device as described above.
[15] Next, in another aspect, the present invention provides a method for communicating data between a computer device and a remote computer, the method comprising: a computer device for communicating to a remote system over a network based on symbol control information. Generating data by an application program within, receiving data by an application layer of a communication protocol stack in a computer device, placing the data into an application layer protocol data unit by the application layer, and an application layer Forwarding the application layer protocol data unit to the network layer of the protocol stack, receiving the application layer protocol data unit from the application layer at the network layer, and Positioning the application layer protocol data unit in the network layer protocol data unit, placing the symbol control information in the network layer protocol data unit separately from the application layer protocol data unit by the network layer, and transmitting to the remote system. Delivering, by the network layer, the network layer protocol data unit to the network. The invention also extends to computer program elements comprising computer program code means, when loaded into a processor of a computer system, the processor being configured to perform the method described above.
[16] In a preferred embodiment of the present invention, the symbol address information is stored in a network layer datagram separately from the data payload. Next, data communication is executed via the gateway. The network layer at the gateway detects the symbolic address and resolves it to a network layer address. The storage is executed so that the payload of the network layer protocol data unit remains unchanged. Address resolution is performed independently of the protocol stack on top of the stack. The decoding of payload data is not necessary. Therefore, network security between terminals can be maintained. The present invention is equally applicable to the types of stored control information other than address data.
[17] Since the embodiment of the present invention avoids the introduction of additional traffic generated by the provision of a navigation document to the mobile device between the server, the gateway, and the mobile device, it also avoids the session redirection and / or the execution of the peer proxy protocol. Therefore, it is superior to the conventional solution mentioned above. The conventional solutions described above, which also lead to other burdens such as the reconfiguration of the mobile device and the management of navigation documents, etc., in both the mobile device and the network infrastructure, are likewise avoided by the embodiments of the present invention. The redirection of communication via the navigation document involves setting up two connections to all destination servers beyond the gateway. Therefore, the set up time is doubled. This adds a response time recognized by the end user. In a preferred embodiment of the present invention, only a single connection needs to be established. The same connection can then be used to communicate with a plurality of different destination servers.
[18] Next, preferred embodiments of the present invention will be described by way of example only with reference to the accompanying drawings.
[27] Referring first to FIG. 1, an example of a data processing system 80 is a central processing unit (CPU) 10, a memory subsystem 20, and a user input subsystem 30. And a user output subsystem 40 and a network interface 50, all of which are interconnected by a bus sub system 60. In operation, the central processing unit 10 executes computer program instruction code stored in the memory subsystem 20. The computer program code includes operating system software and application program software for execution with the operating system software. Application program software operates on data stored in memory subsystem 20. The user may control the execution of the application software via the user input subsystem 30. Application software and data may communicate between the memory subsystem 20 and the external data network 70 via the network interface 50.
[28] Referring next to FIG. 2, an example of a mobile data communication environment includes a mobile data processing apparatus 100 connected to a mobile data communication network 110. Mobile network 110 is connected to fixed data communication network 130 via gateway 120. The origin server 140 is connected to the gateway 120 via the fixed network 130. Mobile device 100, gateway 120, and origin server 140 each include a data processing system 80 described below with reference to FIG. The mobile device 100 may be a built-in system such as a mobile telephone, personal digital assistant, or the like, for example a mobile sensor.
[29] Data communication between the mobile device 100, the gateway 120, and the origin server 140 is via the mobile network 100, the gateway 120, and the server via the fixed network 130 and the mobile network 110. It is executed by executing the computer program code by the central processing unit 10 of 140. Referring to FIG. 3, as mentioned above, data traffic is communicated from a source node to destinations in discrete packets or protocol data units (PDUs) 200. Each PDU 200 includes a header portion 220 and a payload portion 210. The payload portion 210 delivers the data communicated. The header portion 220 conveys control information for performing communication of the PDU 200 to the destination.
[30] Referring next to FIG. 4, data is communicated from the source application program 300 in the mobile device 100 to the destination application program 310 in the server 140 according to the ISO reference model. The ISO reference model defines a stack of logical data processing protocol layers between source and destination application programs 300 and 310 and a network infrastructure that intervenes between mobile device 100 and server 140. This protocol stack 330 resides in mobile device 100. Similar protocol stack 320 resides within server 140. The data communicated from the source application program 300 to the destination application program 310 is in the PDU 200 from the source application program 300 toward the network infrastructure via the protocol stack 330 in the mobile device 100. Pass through. Once received, the PDU 200 is communicated from the network infrastructure to the destination application program 310 via the protocol stack 320 in the server 140.
[31] Protocol stacks 320 and 330 are application layer 340, presentation layer 350, session layer 360, transport layer 370, network layer 380, link layer 390, and physical layer 400, respectively. ). The application layer 340 provides a user interface with a range of services distributed across a network, such as file transfer access and management, as well as general message interchange services such as e-mail. The application layer 340 is disposed between the application program 300 and the presentation layer 350. Presentation layer 350 negotiates and selects appropriate transfer syntaxes used during a transaction such that the syntax of the messages exchanged between the two application entities is maintained. Presentation layer 350 is disposed between application layer 340 and session layer 360. Session layer 360 enables two application layer protocol entities to handle data exchange, for example, by establishing and clearing communication channels between entities. Session layer 360 is disposed between presentation layer 350 and transport layer 370. The transport layer 370 acts as an interface between the higher application oriented layer and the lower network oriented layer by providing a session layer 360 with message transport means independent of the underlying network type. The transport layer 370 is disposed between the session layer 360 and the network layer 380. By providing the session layer 360 with a predefined set of message delivery means, the transport layer 370 hides the detailed operation of the underlying network from the session layer 360. Network layer 380 serves to establish and clear network connections between transport layer protocol entities and includes such functionality as network routing. The network layer 380 is disposed between the transport layer 370 and the link layer 390. The link layer 390 establishes a physical connection provided by the network, and provides the network layer 380 with information transmission means such as error correction and message retransmission when a transmission error occurs. The link layer 390 is disposed between the network layer 380 and the physical layer 400. Physical layer 400 provides the physical and electrical interfaces between nodes and the network.
[32] Next, referring to FIG. 5, in each layer of the source protocol stack 330, the PDU containing data and control information from the previous layer is augmented by the control information from the current layer. Data 500 from source application program 300 is augmented by header portion 510 containing application layer protocol control information at application layer 340 to form application layer PDU (APDU) 570. . APDU 570 is augmented by a header portion 520 containing presentation layer protocol control information in presentation layer 350 to form presentation layer PDU (PPDU) 580. PPDU 580 is augmented by a header portion 530 containing session layer protocol control information at session layer 360 to form session layer PDU (SPDU) 590. The SPDU 590 is augmented by a header portion 540 containing transport layer protocol control information at the transport layer 370 to form a transport layer PDU (TPDU) 600. The TPDU 600 is augmented by a header portion 550 containing network layer protocol control information at the network layer 380 to form a network layer PDU (NPDU) 610. NPDU 610 is augmented by a header portion 560 containing link layer protocol control information at link layer 390 to form a physical layer (PDU) that communicates to server 140 over a physical network. PDUs transmitted over a network are sometimes referred to as datagrams. At server 140, the received PDUs are gradually reduced as they pass through the layers of stack 320 until data 500 is recovered and provided to destination application program 310.
[33] 2, 4, and 5 in combination, the gateway 120 also includes a protocol stack similar to the protocol stack of the mobile device and server 140. However, the gateway stack has been omitted in FIGS. 4 and 5 to simplify the description.
[34] 2 and 3, addresses of both the source mobile device 100 and the destination server 140 are stored in each PDU and transmitted from the mobile device 100 to the server 140. In the application program 300 in the mobile device 100, the address of the server 140 is in the form of a symbol. In particular, the address of server 140 is presented in an application program in mobile device 100, such as the name of server 140 such as www.server.com. In order to perform communication of the PDU from the mobile device 100 to the server 140, the symbol network address is interpreted as a binary network layer address by the address resolution function. Inter-terminal security in the communication environment is maintained by storing protocol control information such as symbol address information in a datagram of the network layer 380 of the protocol stack 300.
[35] Referring next to FIG. 6, the header portion 550 of the NPDU 610 includes a variable length option field 551. The option field 551 is employed to generate additional parameter data in the header portion 550 of the NPDU 610. Referring to FIG. 7, in a preferred embodiment of the present invention, control information 552, such as a symbol address, is stored in an option field 551 in the header portion 550 of each NPDU 610. Control information may be stored in option field 551 in a number of different ways.
[36] For example, in a particularly preferred embodiment of the present invention, a new option code is specified to convey control information 552 within the new option field 551. The control information is then duplicated with a new option code at the source network layer 380 when the header portion 550 of the NPDU 610 is generated. Intermediate routers, which are not suitable for the new option code, forward the datagram containing the new option code towards the unchanged destination from the source. This has the advantage that control information 240 can pass through a plurality of routing hops to reach a point along the route where the option code is finally detected and address resolution is performed.
[37] Referring again to FIG. 2, the network layer 380 on the gateway 120 blocks any symbolic address information 552 included in the option field 551 of the NPDU 610 received from the mobile device 100. And extract, and serve as an agent for performing address resolution. The original encrypted payload 600 remains unchanged while being transferred from the mobile device 100 to the final destination server 140, which will not be confirmed until address resolution is performed. Thus, terminal security is achieved.
[38] In another particularly preferred embodiment of the present invention, the control information 552 is duplicated in the existing option code in the option field 551 at the source network layer 380. The existing option code is selected and configured such that the arbitration router does not block the control information 552 before the control information 552 reaches the intended destination. Referring to FIG. 2, the network layer 380 on the gateway 120 may also block any symbol address information 552 contained in the option field 551 of the NPDU 610 received from the mobile device 100 and It can be extracted and act as a substrate for performing address analysis. The original payload 600 remains unchanged as it is passed from the mobile device 100 to the final destination server 140. Accordingly, end-to-end security is also achieved.
[39] An example of a PDU with an option field is a TCP / IP PDU. As indicated above, in a TCP / IP environment, the network layer protocol is IP. The IP header 610 of the NPDU 610 includes an optional field 551. Pre-assigned option codes for inclusion in the IP option field include source routing option codes, such as "loose source and record route" and "strict source and record route" option codes. Both LSRR and SSRR are suitable for redefinition and include control information such as symbol address data and the like. If the SSRR option is employed, it is set to indicate that there can be only a single hop between the origin of the datagram and the point at which address resolution occurs. Otherwise, the intermediate router implementing source routing will interpret it incorrectly and potentially modify the symbolic address information in the SSRR option field. Since mobile device 100 and fixed network 130 are typically separated by a single access hop at gateway 120, a single hop is not limited in most practical devices. For example, referring back to FIG. 2, mobile device 100 is removed from gateway 120 by one access hop through mobile network 110.
[40] Referring to Fig. 8, in another particularly preferred embodiment of the present invention, control information 552, such as symbol address data and the like, is stored in the datagram via network layer tunneling. Tunneling is a technique that encapsulates a PDU of one protocol layer with optional additional information to become another tunneling PDU 700 of the same or another layer of the stack. Tunneling PDU 700 has a header 720 and payload 710 similar to the header and payload of original PDU 610. The control information 552 is located with the original PDU 610 in the payload 710 of the tunneling PDU 700. Tunneling PDU 700 allows control information 552 to be passed along with NPDU 610 along a route—in other cases, followed by an NPDU 610 via an application layer implementation. This has the advantage of preventing any modification of the protocol stack. Referring back to FIG. 2, the network layer 380 on the gateway 120 may block and extract control information 240 delivered in the tunneling PDU 700 from the mobile device 100 and perform address resolution. Can serve as a substrate. The original PDU 610 remains unchanged as it passes from the mobile device 100 to the final destination server 140. Therefore, again, end-to-end security is achieved.
权利要求:
Claims (15)
[1" claim-type="Currently amended] Processor,
A memory connected to the processor,
An application program stored in the memory and executable by the processor to generate data communicated via a network to a remote computer system based on symbol control information;
Communications protocol stack stored in the memory and executable by a processor to effect communication of data from a mobile device to the remote system, the protocol stack receiving data from the application program and receiving the received data Having an application layer for placing the in an application layer protocol data unit;
Receive the application layer protocol data unit from the application layer, locate the application layer protocol data unit within a network layer protocol data unit, and transmit the symbol control information into the application layer protocol data unit within the network layer protocol data unit; Is located separately and delivers the network layer protocol data unit to the network for transmission to the remote system.
Computer device comprising a.
[2" claim-type="Currently amended] The method of claim 1,
And the control information comprises a symbolic network address of the remote system.
[3" claim-type="Currently amended] The method according to claim 1 or 2,
And said control information is located in said options field of said network layer protocol data unit by said network layer.
[4" claim-type="Currently amended] The method of claim 3, wherein
Unused option code is assigned to the control information by the network layer.
[5" claim-type="Currently amended] The method of claim 3, wherein
And the control information is recorded in an existing option code by the network layer.
[6" claim-type="Currently amended] The method according to claim 1 or 2,
The control information is located in the network layer protocol data unit by network tunneling.
[7" claim-type="Currently amended] A mobile telephone comprising the computer device according to any one of claims 1 to 6.
[8" claim-type="Currently amended] A server computer system comprising the computer device according to any one of claims 1 to 7.
[9" claim-type="Currently amended] In a method of communicating data between a computer device and a remote computer,
Generating the data by an application program in the computer device for communicating to a remote system via a network based on the preference control information;
Receiving data by an application layer of a communication protocol stack in the computer device;
Positioning, by the application layer, data in an application layer protocol data unit;
Sending, by the application layer, the application layer protocol data unit to the network layer of the protocol stack;
At the network layer, receiving the application layer protocol data unit from the application layer;
Positioning, by the network layer, the application layer protocol data unit within a network layer protocol data unit;
Positioning the preference control information in the network layer protocol data unit separately from the application layer protocol data unit by the network layer;
Forwarding, by the network layer, the network layer protocol data unit to the network for transmission to the remote system.
Data communication method between a computer device and a remote computer comprising a.
[10" claim-type="Currently amended] The method of claim 9,
And the control information comprises a symbolic network address of the remote system.
[11" claim-type="Currently amended] The method according to claim 9 or 10,
And said control information is located in said option field of said network layer protocol data unit by said network layer.
[12" claim-type="Currently amended] The method of claim 11,
Assigning, by the network layer, an unused option code to the control information.
[13" claim-type="Currently amended] The method of claim 11,
And recording, by the network layer, the control information to an existing option code.
[14" claim-type="Currently amended] The method according to claim 9 or 10,
And said control information is located in said network layer protocol data unit by network tunneling.
[15" claim-type="Currently amended] A computer program element comprising computer program code means,
15. A computer program element configured to, when loaded into a processor of a computer system, configure the processor to perform the method of any one of claims 9-14.
类似技术:
公开号 | 公开日 | 专利标题
US10021034B2|2018-07-10|Application aware multihoming for data traffic acceleration in data communications networks
US9325764B2|2016-04-26|Apparatus and method for transparent communication architecture in remote communication
US9832169B2|2017-11-28|Method and system for communicating over a segmented virtual private network |
KR101567386B1|2015-11-09|Method and apparatus for internet protocol based content router
EP2400693B1|2016-04-20|Routing and service performance management in an application acceleration environment
US8261318B2|2012-09-04|Method and apparatus for passing security configuration information between a client and a security policy server
Gilligan et al.2000|Transition mechanisms for IPv6 hosts and routers
KR20170026541A|2017-03-08|Methods and apparatus for optimizing tunneled traffic
EP1971105B1|2012-08-15|Location-independent packet routing and secure access in short-range wireless networking environment
US7171489B2|2007-01-30|Method to synchronize and upload an offloaded network stack connection with a network stack
DE60221917T2|2008-05-15|Data transmission from a hostserver via tunnelserver to a wireless device and allocation of a temporary ipv6 address to a temporary ipv4 address for communication in an ipv4 wireless network with the device
US9100370B2|2015-08-04|Strong SSL proxy authentication with forced SSL renegotiation against a target server
US8996657B2|2015-03-31|Systems and methods for multiplexing network channels
EP1186146B1|2011-03-16|A method and arrangement for providing security through network address translations using tunneling and compensations
ES2198267T3|2004-02-01|Connection selection method.
EP1653704B1|2007-11-07|Method and system for establishing a bidirectional tunnel
US8200957B1|2012-06-12|Using SYN-ACK cookies within a TCP/IP protocol
US6353614B1|2002-03-05|Method and protocol for distributed network address translation
US7028335B1|2006-04-11|Method and system for controlling attacks on distributed network address translation enabled networks
US7584500B2|2009-09-01|Pre-fetching secure content using proxy architecture
JP2637901B2|1997-08-06|Routing method of information packet to mobile host
Stewart et al.2011|Sockets API extensions for stream control transmission protocol |
US7969976B2|2011-06-28|Gateway apparatus, packet forwarding method, and program
US8122140B2|2012-02-21|Apparatus and method for accelerating streams through use of transparent proxy architecture
EP1156626B1|2008-09-03|Mobile communication network, terminal equipment and packet communication control method
同族专利:
公开号 | 公开日
WO2002103986A1|2002-12-27|
DE60205485D1|2005-09-15|
EP1397900A1|2004-03-17|
US20040184456A1|2004-09-23|
JP3906204B2|2007-04-18|
DE60205485T2|2006-06-01|
JP2004531157A|2004-10-07|
KR100574157B1|2006-04-25|
EP1397900B1|2005-08-10|
CN1518827A|2004-08-04|
TW560151B|2003-11-01|
引用文献:
公开号 | 申请日 | 公开日 | 申请人 | 专利标题
法律状态:
2001-06-18|Priority to EP01810589
2001-06-18|Priority to EP01810589.0
2002-04-11|Application filed by 인터내셔널 비지네스 머신즈 코포레이션
2002-04-11|Priority to PCT/IB2002/001347
2004-01-28|Publication of KR20040008181A
2006-04-25|Application granted
2006-04-25|Publication of KR100574157B1
优先权:
申请号 | 申请日 | 专利标题
EP01810589|2001-06-18|
EP01810589.0|2001-06-18|
PCT/IB2002/001347|WO2002103986A1|2001-06-18|2002-04-11|Packet-oriented data communications between mobile and fixed data networks|
[返回顶部]