首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
In a next generation network, the IPv6‐enabled IP multimedia subsystem (IMS) network may connect to an IPv4 network. When an IPv4/IPv6 dual‐stack user equipment (UE) initiates a call by sending an IPv6 SIP INVITE message to an IPv4‐only user agent (UA), the call cannot be established correctly. To resolve this problem, the IMS‐application layer gateway solution, the redirect solution, and the interactive connectivity establishment solution have been proposed. In this paper, we propose an effective solution where only the IPv6 INVITE message is translated into an IPv4 INVITE message. Upon receipt of the IPv4 200 OK message replied from the IPv4‐only UA, the dual‐stack UE learns that the correspondent UA supports IPv4‐only and utilizes IPv4 instead of IPv6 to send the subsequent SIP messages and real‐time transport protocol (RTP) packets. The proposed solution is compared with the existing solutions in terms of network node modification, call setup complexity, and RTP transmission latency. Our study indicates that the proposed solution outperforms the other three solutions in the call setup and the RTP transmission. Copyright © 2009 John Wiley & Sons, Ltd.  相似文献   

2.
Based on Bump-In-the-API (BIA) architecture, this letter proposes a Socket-layer Translator called NCTU SLT that translates IPv4 applications to IPv4/IPv6-capable applications on dual-stack hosts. Like previously proposed approaches, NCTU SLT can translate NAT-friendly applications (e.g., HTTP and TELNET) without modifying the source codes of the IPv4 applications. Furthermore, NCTU SLT has the advantages over the previous approaches for translating non-NAT friendly applications (i.e., SIP and FTP).  相似文献   

3.
IPv4-IPv6组播过渡技术   总被引:2,自引:0,他引:2  
要使IPv4主机与IPv6主机进行组播通信,必须做协议转换工作。采用多播转换网关(MTG)技术方案能较好地实现IPv4网和IPv6网之间的组播互通。方法是将MTG部署在lPv4和IPv6网络的边界,将IPv4网络和IPv6网络视为地位对等的两个异构网络。IPv6主机可以加入组播源位于IPv4网络的组播组,IPv4主机也可以加入组播源位于IPv6网络的组播组。在IPv4中,MTG作为IPv6的代理,参与IPv4的组播;同样,MTG在IPv6中则作为IPv4的代理。在MTG系统内部,两个代理之间进行协议转换。  相似文献   

4.
To support real-time multimedia services in UMTS all-IP network, Third-Generation Partnership Project TR 25.936 proposed two approaches to support real-time serving radio network controller (SRNC) switching, which require packet duplication during SRNC relocation. These approaches significantly consume extra system resources. This paper proposes the fast SRNC relocation (FSR) approach that does not duplicate packets. In FSR, a packet buffering mechanism is implemented to avoid packet loss at the target RNC. We propose an analytic model to investigate the performance of FSR. The numerical results show that packet loss at the source RNC can be ignored. Furthermore, the expected number of packets buffered at the target RNC is small, which does not prolong packet delay.  相似文献   

5.
This article describes the UMTS all-IP approach for third-generation mobile systems, with emphasis on the core network architecture. Following the introduction of the core network nodes, we elaborate on application-level registration, circuit-switched call origination, packet-switched call origination, and packet-switched call termination.  相似文献   

6.
曾井泉  刘镇 《通信技术》2009,42(3):132-134
IPv6是IP协议的新版本,它最终会取代IPv4成为未来互联网的核心网络协议,然而,过渡时会有一段IPv4与IPv6共存时期。由IETF定义,SIP已成为多媒体通信的最重要技术之一。文中在分析SIP机制和常见的IPv4向IPv6过渡技术的基础上,提出了一种双协议栈与TURN相结合的解决方案。  相似文献   

7.
随着互联网的发展,IPv6最终会成为未来互联网网络层的核心协议。而SIP作为下一代多媒体通信中的重要技术也受到普遍的欢迎和认可。本文描述了在IPv6环境下使用SIP的优势,并提出了IPv4和IPv6网络环境下SIP通信的解决方案。  相似文献   

8.
A Next Generation Network (NGN) is an advanced, packet‐based network that exploits broadband and QoS‐enabled transport technologies for enabling multimedia services. In NGNs, the principles and requirements of IP Multimedia Sub‐system (IMS), which are used to deliver the desired benefits, should be carefully examined and studied. Internet Protocol version 6 (IPv6) is adopted by Third‐generation Partnership Project (3GPP) to solve address storage problem and provide new features (e.g. plug‐and‐play and mobility) for IMS. However, in the early stage of IPv6 deployment, the existing Voice‐over‐IP (VoIP) networks support Internet Protocol version 4 (IPv4) only. For IPv4–IPv6 interworking between IMS and the existing VoIP networks, the IMS‐Application Level Gateway (IMS‐ALG) and the Transition Gateway (TrGW) are proposed to translate Session Initiation Protocol (SIP) and Real‐time Transport Protocol (RTP) packets, respectively. In this paper, we focus on the IPv4–IPv6 translation for RTP packets, which is the bottleneck of VoIP performance. Specifically, we developed a TrGW called National Information and Communications Initiative (NICI)‐TrGW. In NICI‐TrGW, we perform IPv4–IPv6 translation at the Linux kernel and adjust the header room of kernel‐level packet buffer for each packet to reduce memory‐copy operations. We evaluate the performance of NICI‐TrGW and the existing solutions by using the SmartBits. Our study indicates that NICI‐TrGW outperforms the existing solutions in terms of three different output measures including packet loss rate, maximum throughput, and average latency. Copyright © 2009 John Wiley & Sons, Ltd.  相似文献   

9.
针对移动通信业务的飞速发展与当前使用的互联网通信协议IPv4的不足,结合下一代互联网通信协议IPv6自身的移动性、安全性等方面的特征,讨论了IPv6在UMTS系统中的实现。  相似文献   

10.
首先对当前互联网和通信业的发展形势进行了分析,然后重点介绍了SIP协议,并讨论了SIP在IPv6网络环境中应用的优点,最后提出在当前IP异构网络中实现SIP应用的解决方案。  相似文献   

11.
屈毅 《现代电子技术》2004,27(10):30-32
会话初始协议 ( SIP)是下一代网络多媒体通信的信令协议。网络环境从 IPv4到 IPv6的过渡 ,必然会影响原本基于 IPv4制定的 SIP协议。SIP协议如何适应其变化 ?本文描述了采用 IPv6技术对 SIP协议带来的影响 ,并提出了一种在IPv4/IPv6混合网络模式下的 SIP结构  相似文献   

12.
It is commonly believed that the IPv6 protocol can provide good protection against network worms that try to find victims through random address scanning due to its huge address space. However, we discover that there is serious vulnerability in terms of worm propagation in IPv6 and IPv4-IPv6 dual-stack networks. It is shown in this article that a new worm can collect the IPv6 addresses of all running hosts in a local subnet very quickly, leading to accelerated worm propagation. Similar to modeling the self-replicating behaviors of biological viruses, a Species-Patch model and a discrete-time simulator are developed to study how the dual-stack worm spreads in networks with various topologies. It is shown that the worm could propagate in the IPv6 and IPv4-IPv6 dual-stack networks much faster than in the current IPv4 Internet. Several effective defense strategies focusing on network deployment are proposed.  相似文献   

13.
Recently, a network-based mobility management protocol called Proxy Mobile IPv6 (PMIPv6) is being actively standardized by the IETF NETLMM working group, and is starting to attract considerable attention among the telecommunication and Internet communities. Unlike the various existing protocols for IP mobility management such as Mobile IPv6 (MIPv6), which are host-based approaches, a network-based approach such as PMIPv6 has salient features and is expected to expedite the real deployment of IP mobility management. In this article, starting by showing the validity of a network-based approach, we present qualitative and quantitative analyses of the representative host-based and network-based mobility management approaches (i.e., MIPv6 and PMIPv6), which highlight the main desirable features and key strengths of PMIPv6. Furthermore, a comprehensive comparison among the various existing well-known mobility support protocols is investigated. Although the development of PMIPv6 is at an early stage yet, it is strongly expected that PMIPv6 will be a promising candidate solution for realizing the next-generation all-IP mobile networks.  相似文献   

14.
NAT—PT过渡机制解决IPv4主机和IPv6主机互访的问题,是IPv6过渡技术中的一种。介绍NAT—PT的主要功能和工作机制。  相似文献   

15.
目前WAP业务访问的主机均为IPv4主机,随着3G时代的到来以及IPv4地址的枯竭,将业务引入到IPv6网络是发展趋势,文章将WAP业务从终端到最终访问的业务主机过程进行了贯穿性的描述,重点说明了该业务由IPv4网络向IPv6网络过渡阶段的一些技术实现。  相似文献   

16.
The Internet has evolved from a wired infrastructure to a hybrid of wired and wireless domains. As network access is now provided with much of the last mile being a wireless mobile environment, delivering rich multimedia to users is now a necessity. However, despite the advent of new technology and standards such as Mobile Internet protocol version 6 (MIPv6), there is still an important dilemma over the choice of systems that either achieve high levels of performance or offer easier deployment. The very deployment of IPv6 is delayed for this reason; network providers continue to use legacy systems. The goal of this paper then is to offer insight into this issue by examining the case of data streaming to MIPv6 users through the use of multicast. By specifically considering the debate over network and application layer multicast, we examine a spectrum of possible alternatives and evaluate the potential of enhancing the functionality of access routers. The result is an overlay architecture that can bring the desired balance between deployment complexity and performance.  相似文献   

17.
The coupling of mobility and quality-of-service with security is a challenge that should be addressed in future wireless overlay systems. The mobility of a node can disrupt or even intermittently disconnect an ongoing real-time session because a secure handover must be performed to ensure continuous connectivity. The duration of the such interruptions is called disruption time or handover delay and can heavily affect the user satisfaction. The handover procedure needs to protect its integrity and confidentiality-otherwise, the packets may be rerouted to a malicious node and the legitimate handover may not be performed. The security procedure to ensure this should not lengthen significantly the handover delay to provide good quality real-time services. In this paper, we focus on the network-layer mobility, specifically, on Mobile Internet protocol version 6 (MIPv6) since it is the natural candidate for providing such mobility in future systems. To solve the problem of on-path attackers and prevent leakage of secrets, we propose a security architecture for MIPv6 based on leakage resilient-authenticated key establishment (LR-AKE) protocol and its cooperation with public key infrastructure. The proposed architecture prevents against on-path attackers which was not addressed in the specifications of MIPv6, and also provides robustness against leakage of secret values. Using analytical models, we evaluate MIPv6 handover delay for real-time services. We identify the crucial factors affecting the handover delay among transmission delays of MIPv6, security and LR-AKE messages, queueing delays and en/decryption delays.  相似文献   

18.
针对云南大学多校区、多信息点、应用系统集中的网络特点,在研究如何逐步升级和如何避免升级过程中对现有应用系统运行带来的风险的基础上,提出了一种在多校区的学校内逐步实施并保证IPv4和IPv6应用系统并行的网络升级方案.该方案可以为情况相同的其他高校的校园网升级的提供一定参考.  相似文献   

19.
IPv4/IPv6过渡方案的研究与应用网络部署   总被引:2,自引:0,他引:2  
荆山  孙润元  陈贞翔  杨波 《通信学报》2006,27(Z1):35-39
为深入研究IPv6网络技术并全面部署应用网络,在探讨组建IPv6网络的基本原则和研究IPv6过渡技术的基础上,提出了相应的网络过渡策略.结合济南大学IPv6应用网的建设过程,对方案的可行性进行了充分论证,重点研究了地址分配方案和实现关键技术,并最终实现了全网部署.开展了IPv6网络环境下的一系列测试和应用建设.  相似文献   

20.
Distributed denial of service attacks currently represent a serious threat to the appropriate operation of Internet services. To deal with this threat, we propose an overlay network that provides an IP-traceback scheme at the level of autonomous systems. Our proposed autonomous system-level IP-traceback system contrasts with previous works because it does not require a priori knowledge of the network topology and allows single-packet traceback and incremental deployment. Our first contribution is a new extension to the Border Gateway Protocol update-message community attribute that enables information to be passed across autonomous systems that are not necessarily involved in the overlay network. The second contribution is a new sequence-marking process to remove ambiguities in the traceback path. Two different strategies for incremental system deployment are investigated and evaluated. We show that strategic placement of the system on highly connected autonomous systems produces relevant results for IP traceback even if the system operates on only a few autonomous systems. The main conclusion is that the proposed system is suitable for large-scale networks such as the Internet because it provides efficient traceback and allows incremental deployment.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号