WO2008017275A1 - Procédé et système de classification de paquet, leur noeud de cryptage et noeud de classification - Google Patents
Procédé et système de classification de paquet, leur noeud de cryptage et noeud de classification Download PDFInfo
- Publication number
- WO2008017275A1 WO2008017275A1 PCT/CN2007/070412 CN2007070412W WO2008017275A1 WO 2008017275 A1 WO2008017275 A1 WO 2008017275A1 CN 2007070412 W CN2007070412 W CN 2007070412W WO 2008017275 A1 WO2008017275 A1 WO 2008017275A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- classification
- node
- encrypted
- data packet
- encryption
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims description 35
- 230000003993 interaction Effects 0.000 claims description 26
- 230000005540 biological transmission Effects 0.000 claims description 5
- 238000012217 deletion Methods 0.000 claims description 2
- 230000037430 deletion Effects 0.000 claims description 2
- 238000010586 diagram Methods 0.000 description 5
- 238000005516 engineering process Methods 0.000 description 4
- 230000008569 process Effects 0.000 description 4
- 238000012545 processing Methods 0.000 description 3
- 238000004891 communication Methods 0.000 description 1
- 239000000284 extract Substances 0.000 description 1
- 238000001914 filtration Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/16—Implementing security features at a particular protocol layer
- H04L63/164—Implementing security features at a particular protocol layer at the network layer
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/03—Protecting confidentiality, e.g. by encryption
- H04W12/033—Protecting confidentiality, e.g. by encryption of the user plane, e.g. user's traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W28/00—Network traffic management; Network resource management
- H04W28/16—Central resource management; Negotiation of resources or communication parameters, e.g. negotiating bandwidth or QoS [Quality of Service]
- H04W28/18—Negotiating wireless communication parameters
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W80/00—Wireless network protocols or protocol adaptations to wireless operation
- H04W80/04—Network layer protocols, e.g. mobile IP [Internet Protocol]
Definitions
- the present invention relates to the field of wireless communication technologies, and in particular, to a packet classification technique. Background of the invention
- WiMAX Worldwide Interoperability for Microwave Access
- BS base station
- ASN-GW access service network gateway
- CSN including logical entities such as Policy Server (PF), Authentication and Accounting Server (AAA Server), Application Server (AF), etc.
- PF Policy Server
- AAA Server Authentication and Accounting Server
- AF Application Server
- Wireless Metropolitan Area Network Access Technology Based on IEEE 802.16d/e Standard on Wireless Side of WiMAX Network R1, R2, R3, etc. in Fig. 1 represent a reference point, that is, an interface.
- the ASN is a network function set that provides wireless access services for terminals, including the network element BS and the ASN-GW.
- the CSN provides an IP connection service for the terminal.
- the terminal is a mobile user equipment, and the user uses the terminal to access the WiMAX network.
- a classifier is used to classify various services carried by the network into specific service flows of the bearer network.
- the classifier of the uplink service is implemented on the terminal, and the downlink service is divided into The classifier is implemented on the BS or ASN-GW.
- the service flow is the minimum operational object guaranteed by the WiMAX bearer network quality of service (QoS). Different service flows can have different QoS guarantees.
- the classifier can allocate it to the corresponding service flow according to the different QoS requirements of the upper layer service.
- the classifier consists of a series of classification rules.
- the specific classification parameters are listed in the IEEE related standards. If the IP traffic is carried, one of the main classification parameters is the IP address. For example, for an IPv4 packet, a specific IP packet can be classified into a specific service flow based on the source/destination IP address, protocol type, and source/destination Transmission Control Protocol/User Data Protocol (TCP/UDP) port number.
- TCP/UDP Transmission Control Protocol/User Data
- the terminal and the home agent (HA) located at the CSN transmit data through the tunnel.
- the terminal and the home agent (HA) located at the CSN transmit data through the tunnel.
- different QoS data needs to be classified into different data channels for transmission, and corresponding to the WiMAX network, the IP data packets are classified into different service flows for transmission.
- the existing IEEE standard defines a series of classifier rules, there is one situation that cannot be handled after ⁇ is applied to a WiMAX network.
- IP security/encapsulated security load IPSec/ESP
- the HA receives the encrypted data when it is encrypted.
- the entire IP packet is encrypted and added to the tunnel IP header in front of the encrypted IP packet. Therefore, if the classifier relies on the information in the subsequent IP packet to distinguish different service flows, this IP packet cannot be implemented.
- the classifier can only be unpacked on the terminal or the HA, but the classifier needs to classify the data packets on the ASN-GW, access router (AR) or BS classification nodes between the two physical transmission paths. Summary of the invention
- the embodiment of the present invention provides a data packet classification method, and a method for counting A packet classification system, an encryption node, and a classification node are used to classify the encrypted data packets.
- An embodiment of the present invention provides a data packet classification method, where the method includes:
- the encryption node adds or configures a classification parameter in the non-encrypted portion of the encrypted IP data packet, and sends the encrypted IP data packet to the classification node;
- the classification node classifies the encrypted IP data packet according to the classification parameter.
- An embodiment of the present invention further provides a system for data packet classification, where the system includes: an encryption node, configured to add or configure a classification parameter in an unencrypted portion of an encrypted IP data packet, and add the encrypted IP data.
- the packet is sent to the classification node;
- a classifying node including a classifier, wherein the classifier is configured to classify the encrypted IP data packet according to the classification parameter in the encrypted IP data packet.
- An embodiment of the present invention further provides an encryption node, including:
- a sending unit configured to send the encrypted IP data packet to the classification node.
- the embodiment of the present invention further provides a classification node, including: a receiving unit, configured to receive an encrypted IP data packet carrying a classification parameter in a non-encrypted portion;
- a classifier configured to classify the encrypted IP data packet according to the classification parameter in the encrypted IP data packet.
- the encryption node adds the classification parameter for classification in the non-encrypted part of the encrypted IP data packet in the embodiment of the present invention
- the classifier can directly read The classification parameter of the non-encrypted part is taken, so that the data packet can be classified according to the classification parameter.
- the classification node can acquire the classification parameter without decrypting the data packet, and classify according to the classification parameter.
- Embodiments of the present invention provide multiple acquisitions The method of classifying parameters improves the flexibility of classification. BRIEF DESCRIPTION OF THE DRAWINGS
- FIG. 1 is a schematic diagram of a WiMAX network architecture in the prior art
- FIG. 2 is a schematic flow chart of a first embodiment of the present invention
- FIG. 3 is a schematic flow chart of a second embodiment of the present invention.
- FIG. 4 is a schematic flow chart of a third embodiment of the present invention.
- FIG. 5 is a schematic flowchart of a fourth embodiment of the present invention.
- FIG. 6 is a schematic structural diagram of a system according to a first embodiment of the present invention.
- FIG. 7 is a schematic structural diagram of a system according to a second embodiment and a third embodiment of the present invention.
- FIG. 8 is a schematic structural diagram of a system according to a fourth embodiment of the present invention. Mode for carrying out the invention
- the encryption node adds or configures a classification parameter in the non-encrypted part of the encrypted IP data packet, and the subsequent encrypted IP data packet carries the classification parameter, and the classification node encrypts the data according to the classification parameter.
- IP packets are classified.
- adding the classification parameter means adding a new parameter to the non-encrypted part of the IP data packet after encryption, and adding the new parameter as the classification parameter; configuring the classification parameter means that the non-encrypted part of the encrypted IP data packet is already existing.
- the parameters are configured and the configured parameters are used as encryption parameters.
- the IP packets before encryption include: tunnel IP header, tunnel IP extension header, original IP header, original IP extension header, upper layer protocol header, and data.
- the encrypted IP data packet when the IP data packet is encrypted and transmitted, for example, by IPSec/ESP encryption, the encrypted IP data packet includes: a tunnel IP header, a tunnel IP extension header, an ESP header, an encrypted data, and an ESP authentication (ESPAUTH).
- the encrypted part includes encrypted data
- the non-encrypted part includes a tunnel IP header, a tunnel IP extension header, an ESP header, and the like.
- the encrypted data is formed by encrypting the original IP header, the original IP extension header, the upper layer protocol header, and the data part in the IP packet before encryption; the tunnel IP header must be constructed according to the actual situation except the destination address and the source address, and other field contents.
- the corresponding field content of the original IP header may be constructed or copied by the encryption node according to the situation; the tunnel IP extension header is constructed by the encryption node itself, and the original IP extension header in the IP packet before encryption may not be copied.
- the classification parameters described in the embodiments of the present invention are as shown in Table 3, but are not limited thereto.
- the classification node can be classified according to any one of these parameters or any combination thereof.
- Step 101 to step 102 the encryption node extracts the classification information that may be used for classification before encrypting the IP data packet, and adds the classification parameters to the non-encrypted portion of the encrypted IP data packet.
- the tunnel IP extension header of this embodiment can be defined as follows: The name is a Filter Header; the Type can be determined; the structure can be as shown in Table 4. Referring to Table 4, the first 8 bits of the new tunnel IP extension header are the Next Header field, indicating the start of the Filter Header; the second 8 bits are the extended header length (Hdr Ext Len) field, indicating the length of the Filter Header. The following bits are the Options section, which is used to indicate the specific classification parameters.
- the definitions of the Next Header and Hdr Ext Len fields can be the same as those of the usual IPv6 extension headers, and are not mentioned here.
- the format of the Options section can be as shown in Table 5. It is arranged in the order of Filter type and Filter value.
- the Filter type is the type in Table 3.
- the Filter value is the value of the packet filter attribute in Table 3.
- the classification parameter is the destination port.
- the Filter type is 4, the Filter value is 8E.
- the padding bit can be padded at the end to be an integer multiple of 8 bytes.
- the encryption node may select the classification information to be added to the tunnel IP extension header of the encrypted IP data packet; if the encryption node does not know which classification node needs The information is classified and transmitted, and the encryption node can add all the classification information in Table 3 to the tunnel IP extension header of the encrypted IP data packet.
- classification parameters such as SPI can be added to the ESP header.
- Step 103 The encryption node sends the encrypted IP data packet with the classification parameter to the classifier in the classification node.
- Step 104 The classifier in the classification node receives the foregoing IP data packet from the encryption node, classifies according to the classification parameter in the tunnel IP extension header, allocates it to the corresponding service flow, and transmits the data to the corresponding data channel. Decrypt the node.
- the unnecessary partial or all classification parameters may be deleted.
- Step 105 The classification node sends the classified IP data packet to the decryption node through the corresponding data channel. If the decryption node receives a packet with a Filter Header extension header, it can ignore the tunnel IP extension header without any processing.
- the step includes querying the content that the classification parameter and the tunnel IP header of the encrypted IP data packet overlap, and in step 101, the non-coincident content of the classification parameter is formed into a tunnel IP extension header, and the tunnel of the encrypted IP data packet is filled in.
- step 101 the classification parameter is formed into a tunnel IP extension header, and Fill in the tunnel IP extension header of the encrypted IP packet.
- the classification node classifies according to the classification parameters in the tunnel IP header and the tunnel IP extension header.
- the above method of the embodiment can be realized by the system shown in Fig. 6.
- the system includes an encryption node and a classification node, and may further include a decryption node.
- the encryption node adds a classification parameter to the non-encrypted portion of the encrypted IP data packet, and sends the encrypted IP data packet.
- the encryption node includes at least an adding configuration unit and a sending unit, wherein the adding configuration unit adds or configures a classification parameter in the non-encrypted portion of the encrypted IP data packet, and the sending unit sends the encrypted IP data packet to the classification node.
- the classification node includes a receiving unit and a classifier, and the receiving unit receives the encrypted IP data packet that is sent by the encryption node and carries the classification parameter in the non-encrypted portion, and the classifier classifies the encrypted IP data packet according to the classification parameter, and The classified packet is sent to the decryption node.
- the decryption node decrypts and processes the received encrypted IP packet.
- the encryption node may further include an extracting unit and/or a query unit.
- the extracting unit is configured to extract the classification parameter from the pre-encrypted IP data packet;
- the query unit is configured to obtain the non-coincident content in the tunnel IP header of the encrypted IP data packet in the classification parameter, so as to fill in the encrypted IP data packet.
- Tunnel IP extension header section is configured to extract the classification parameter from the pre-encrypted IP data packet.
- the classification node shown in Fig. 6 may further include a deletion unit for deleting some or all of the classification parameters of the encrypted IP packet.
- the encryption node in this embodiment may be an HA in a WiMAX system, and the classification node may For a base station or ASN-GW or AR in a WiMAX system, the decryption node can be a terminal in a WiMAX system.
- the present invention is not limited to this.
- the encryption node assigns different classification parameters to different traffic flows in advance through interaction with the decryption node or the classification node.
- the present embodiment is described by taking a flow label as an example.
- Flow Label In the basic header of IPv6, there is a How Label field, which is used to uniquely identify a service flow from the source address to the destination address. This value is generally assigned by the source, that is, it is allocated at the encryption node. .
- Step 201 The encryption node and the decryption node exchange the classifier information of the classification node before the encryption, and assign different Flow Labels to different service flows. This process can be performed when the encryption node and the decryption node generate a security association (SA), or at other times.
- SA security association
- the decryption node has obtained the classifier information before the encryption of the classification node, for example, the decryption node acquires the classifier information by interacting with the classification node.
- Step 202 The encryption node notifies the classification node of the service flow classifier information and the corresponding Flow Label before encryption. Since the decryption node also has the traffic classifier information before encryption and the corresponding Flow Label, in this step, the decryption node may also notify the classification node of the traffic classifier information before encryption and the corresponding Flow Label.
- Step 203 The encryption node configures a Flow Label in the tunnel IP extension header of the encrypted IP data packet, and configures the flow label to be newly allocated in step 201 corresponding to the service flow to which the data packet belongs. In this way, the encryption node does not have to extract the original Flow Label from the pre-encrypted IP packet.
- Step 204 The encrypted node sends the encrypted IP data packet configured with the Flow Label. go with.
- Step 205 The classifier in the classification node receives the foregoing IP data packet from the encryption node, performs classification according to the Flow Label and other classification parameters in the tunnel IP extension header, and allocates the same to the corresponding service flow, thereby passing Different data channels are transmitted to the decryption node.
- Step 206 The classification node sends the classified IP data packet to the decryption node through the corresponding data channel.
- the encryption node and the classification node directly allocate different Flow Labds for different service flows by interaction.
- the third embodiment includes the following steps:
- Step 301 The encryption node and the decryption node generate an SA, and exchange the pre-encryption classifier signal.
- Step 302 The encryption node and the classification node allocate different Flow Labels for different service flows by interaction.
- Step 303 The encryption node configures a Flow Label in the tunnel IP extension header of the encrypted IP data packet, and configures the Flow Label in step 302 corresponding to the service flow to which the data packet belongs. In this way, the encryption node does not have to extract the original Flow Label from the pre-encrypted IP packet.
- Step 304 The encryption node sends the encrypted IP data packet configured with the Flow Label allocated in step 302.
- Step 305 The classifier in the classification node receives the foregoing IP data packet from the encryption node, performs classification according to the Flow Label and other classification parameters in the tunnel IP extension header, and assigns it to the corresponding service flow, thereby passing Different data channels are transmitted to the decryption node.
- Step 306 the classification node sends the classified IP data packet through the corresponding data channel. Give the decryption node. After decrypting the IP packet received by the node, the tunnel IP extension header can be ignored without any processing.
- the methods of the second embodiment and the third embodiment of the present invention can be realized by the system shown in Fig. 7.
- the system includes an encryption node and a classification node, and may further include a decryption node.
- the encryption node configures the classification parameter in the non-encrypted portion of the encrypted IP data packet, and sends the classification parameter to the classification node.
- the encryption node includes at least an adding configuration unit and a sending unit, wherein the adding configuration unit adds or configures a classification parameter in the non-encrypted portion of the encrypted IP data packet, and the sending unit sends the encrypted IP data packet to the classification node.
- the classification node includes a receiving unit and a classifier, and the receiving unit receives the encrypted IP data packet that is sent by the encryption node and carries the classification parameter in the non-encrypted portion, and the classifier classifies the encrypted IP data packet according to the classification parameter, and The classified packet is sent to the decryption node.
- the decryption node decrypts and processes the received encrypted IP packet.
- the encryption node further includes a first interaction unit
- the classification node further includes a second interaction unit
- the decryption node further includes a third interaction unit.
- the first interaction unit and the second interaction unit allocate different encrypted classification parameters for different service flows by interaction; corresponding to the second embodiment, the first interaction unit and the third interaction unit pass The interaction allocates different encrypted classification parameters for different service flows, and notifies the classification node of the service flow and the corresponding encrypted classification parameters.
- the encryption nodes in the second embodiment and the third embodiment may be HAs in the WiMAX system
- the classification nodes may be base stations in the WiMAX system or ASN-GWs or ARs
- the decryption nodes may be terminals in the WiMAX system.
- the invention is not limited thereto. Fourth embodiment:
- a fourth embodiment of the present invention is in encrypting nodes and classifications.
- the node directly sets different classification parameters for different service flows.
- a fourth embodiment of the present invention includes the following steps:
- Step 401 Set different encrypted classification parameters, such as manual setting or automatic setting, for the different service flows in the encryption node and the classification node.
- Step 402 The encryption node adds or configures an encrypted classification parameter corresponding to the service flow to which the data packet belongs in the non-encrypted portion of the encrypted IP data packet.
- Step 403 The encryption node sends the encrypted IP data packet with the encrypted classification parameter added or configured.
- Step 404 The classification node receives the foregoing IP data packet from the encryption node, classifies the classification parameter according to the non-encrypted part and the service flow information corresponding thereto, and allocates the same to the corresponding service flow, thereby transmitting through different data channels. Give the decryption node.
- Step 405 The classification node sends the classified encrypted IP data packet to the decryption node through the corresponding data channel.
- the decryption node receives the IP packet, it can ignore the classification parameters of the non-encrypted part without any processing.
- the above method of the embodiment can be realized by the system shown in Fig. 8.
- the system includes a decryption node and a classification node, and may further include a decryption node.
- the encryption node adds or configures a classification parameter in the non-encrypted portion of the encrypted IP data packet, and sends the encrypted IP data packet.
- the encryption node includes at least an adding configuration unit and a sending unit, wherein the adding configuration unit adds or configures a classification parameter in the non-encrypted portion of the encrypted IP data packet, and the sending unit sends the encrypted IP data packet to the classification node.
- the classification node includes a receiving unit and a classifier, and the receiving unit receives the encrypted IP data packet that is sent by the encryption node and carries the classification parameter in the non-encrypted portion, and the classifier classifies the encrypted IP data packet according to the classification parameter, and The classified packet is sent to the decryption node.
- the decryption node decrypts and processes the received encrypted IP data packet.
- the encryption node further includes a first configuration unit
- the classification node further includes a second configuration unit.
- the first configuration unit and the second configuration unit are configured to set different encrypted classification parameters for different service flows.
- the encryption node in the fourth embodiment may be HA in the WiMAX system
- the classification node may be a base station in the WiMAX system or an ASN-GW or an AR
- the decryption node may be a terminal in the WiMAX system.
- the invention is not limited thereto.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
L'invention concerne un procédé de classification de paquet, comprenant les étapes suivantes : le noeud de cryptage ajoute ou configure des paramètres de classification dans la partie non cryptée des paquets IP cryptés ; le noeud de classification classe le paquet IP crypté selon les paramètres de classification précités. Il existe toujours un système, un noeud de cryptage et un noeud de classification pour une classification de paquet. Le noeud de classification est apte à lire les paramètres de classification de la partie non cryptée après avoir reçu les paquets IP cryptés. Il existe encore de multiples procédés pour obtenir des paramètres de classification, et ainsi la souplesse de classification est améliorée.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNA2006101038622A CN101119289A (zh) | 2006-08-04 | 2006-08-04 | 一种数据包分类方法及其系统 |
CN200610103862.2 | 2006-08-04 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2008017275A1 true WO2008017275A1 (fr) | 2008-02-14 |
Family
ID=39032651
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2007/070412 WO2008017275A1 (fr) | 2006-08-04 | 2007-08-03 | Procédé et système de classification de paquet, leur noeud de cryptage et noeud de classification |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN101119289A (fr) |
WO (1) | WO2008017275A1 (fr) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109561046A (zh) * | 2017-09-26 | 2019-04-02 | 中兴通讯股份有限公司 | 一种融合通信公众账号内容加密的方法及装置 |
CN109819528A (zh) * | 2019-02-27 | 2019-05-28 | 努比亚技术有限公司 | 无网通讯方法、移动终端和计算机可读存储介质 |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2004274666A (ja) * | 2003-03-12 | 2004-09-30 | Mitsubishi Electric Information Systems Corp | 暗号装置及びコンソール端末及び管理装置及びプログラム |
JP2004274493A (ja) * | 2003-03-10 | 2004-09-30 | Toshiba Corp | 通信装置、中継装置、通信制御方法及び通信制御プログラム |
CN1668026A (zh) * | 2004-03-13 | 2005-09-14 | 鸿富锦精密工业(深圳)有限公司 | 网络品质服务系统及方法 |
US20050220091A1 (en) * | 2004-03-31 | 2005-10-06 | Lavigne Bruce E | Secure remote mirroring |
-
2006
- 2006-08-04 CN CNA2006101038622A patent/CN101119289A/zh active Pending
-
2007
- 2007-08-03 WO PCT/CN2007/070412 patent/WO2008017275A1/fr active Application Filing
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2004274493A (ja) * | 2003-03-10 | 2004-09-30 | Toshiba Corp | 通信装置、中継装置、通信制御方法及び通信制御プログラム |
JP2004274666A (ja) * | 2003-03-12 | 2004-09-30 | Mitsubishi Electric Information Systems Corp | 暗号装置及びコンソール端末及び管理装置及びプログラム |
CN1668026A (zh) * | 2004-03-13 | 2005-09-14 | 鸿富锦精密工业(深圳)有限公司 | 网络品质服务系统及方法 |
US20050220091A1 (en) * | 2004-03-31 | 2005-10-06 | Lavigne Bruce E | Secure remote mirroring |
Also Published As
Publication number | Publication date |
---|---|
CN101119289A (zh) | 2008-02-06 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11576079B2 (en) | Ethernet header compression in a wireless network | |
CA2814479C (fr) | Detection de flux de donnees de service dans un reseau d'acces 3gpp conforme ayant une fonction de modification de paquet | |
WO2019033920A1 (fr) | Procédé et dispositif permettant à un côté réseau d'identifier et de commander un équipement utilisateur distant | |
CN101442428B (zh) | 一种端到端QoS的申请方法、系统和设备 | |
CN101494538B (zh) | 一种数据传输控制方法及通讯系统以及加密控制网元 | |
CN110858822B (zh) | 媒体接入控制安全协议报文传输方法和相关装置 | |
KR20050048684A (ko) | 통신 시스템에서 마이크로-터널들을 사용하기 위한 방법 및장치 | |
JP2011512057A (ja) | Macプロトコル・データ・ユニット内のダミー・パディング用サブヘッダ | |
EP2625827B1 (fr) | Separation du trafic montant dans un noeud en bordure d'un reseau de communication | |
WO2018126692A1 (fr) | Procédé et appareil destinés à commander la transmission de données | |
EP2996282A1 (fr) | Gestion d'un trafic de réseau par l'intermédiaire d'un accès fixe | |
WO2011044808A1 (fr) | Procédé et système de suivi de communication anonyme | |
CN114205814B (zh) | 一种数据传输方法、装置、系统、电子设备及存储介质 | |
CN101374100B (zh) | 一种WiMAX业务数据流报文的分类方法、装置及系统 | |
KR102109704B1 (ko) | 데이터 트래픽의 전달 방법 및 장치 | |
WO2017035745A1 (fr) | Procédé et équipement de traitement de paquets de données | |
WO2020135011A1 (fr) | Procédé et dispositif de transmission et terminal de transmission de message et terminal de réception | |
WO2008031362A1 (fr) | Réseau support, système, dispositif et procédé de service de diffusion multidiffusion | |
CN112514490B (zh) | 无线通信的方法和设备 | |
WO2008017275A1 (fr) | Procédé et système de classification de paquet, leur noeud de cryptage et noeud de classification | |
CN101227417B (zh) | 数据包分类方法及其系统 | |
CN101399741B (zh) | 一种动态更新分类器信息的方法、系统和装置 | |
CN118104286A (zh) | 拥塞控制方法、装置、设备、介质、芯片、产品及程序 | |
WO2017210811A1 (fr) | Procédé et appareil d'exécution de stratégie de sécurité | |
WO2011109992A1 (fr) | Procédé, dispositif et système pour obtenir des données |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 07785408 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
NENP | Non-entry into the national phase |
Ref country code: RU |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 07785408 Country of ref document: EP Kind code of ref document: A1 |