Communication system, node, control device, communication method and program

FIELD: physics, communications.

SUBSTANCE: invention relates to means of controlling packet processing. The method includes generating a processing rule which sets a matching and processing rule for a packet corresponding to a matching rule; generating processing and first identifier rules for identifying said first processing rule, wherein the processing rule includes a matching rule for matching with information included in the packet, and a packet processing instruction corresponding to the matching rule; sending the processing and first identifier rules to a node, said node determining whether to process the received packet according to the instruction depending on whether a second identifier attached to the first packet corresponds to the first identifier.

EFFECT: shorter time for establishing a connection.

21 cl, 33 dwg

 

The technical field to which the invention relates

(Description of a related application)

The present invention claims priority on patent application of Japan 2010-123054 (filed may 28, 2010), the contents of which are incorporated herein in its entirety by reference to this description.

The invention relates to a communication system, node, control device, communication method and program, and more specifically to a communication system, node, control device, communication method and program for communication by forwarding packets through nodes arranged in the network.

The level of technology

Recently a technology called OpenFlow that is described in non-patent literature 1 and 2. OpenFlow identifies communications as end-to-end flows and performs the control path (transmission), failover, load balancing and optimization on papatoony basis. The OpenFlow switch, which functions as a host redirect, has a secure channel for communication with an OpenFlow controller, and operates in accordance with the streaming table, to which is added information and content, which is rewritten in accordance with instructions from the OpenFlow controller as necessary. In a flow table, a set of the following three is defined for each flow: the rule matches FlowKey/key matches), which is mapped to the packet header, an action that determines the contents of processing, and streaming of statistical information (Stats) (see Fig.30).

Fig.31 depicts an example of action names and action content, defined in non-patent literature 2. OUTPUT is an action to output the packet to a specified port (interface). SET_VLAN_VID-SET_TP_DST represent action for modifying the fields of the packet header.

For example, when receiving the first packet, the OpenFlow switch searches the stream table element that has a rule matches (FlowKey) that matches header information of the received packet. If the found element is coincident with the packet, as a result of the search, the OpenFlow switch executes the contents of processing described in the "Action" element of the received packet. On the other hand, if you do not find the item that matches with the packet, as a result of the search, the OpenFlow switch forwards the received packet to the OpenFlow controller via the secure channel, requests the OpenFlow controller to the packet path based on the source/destination of transmission of the received packet, receives a streaming element for the batch path, and updates the stream table.

List of links

Patent literature

[Non-patent literature 1]

Nick McKeown and seven d�ugih authors, “OpenFlow: Enabling Innovation in Campus Networks”, [online], [search performed on February 26, 2010], Internet <URL: http://www.openflowswitch.org//documents/openflow-wp-latest.pdf>

[Non-patent literature 2]

“OpenFlow Switch Specification Version 1.0.0 (Wire Protocol 0x01) [search performed on April 1, 2010], Internet <URL: http://www.openflowswitch.org/documents/openflow-spec-v1.0.0.pdf>

Summary of the invention

Technical problem

Disclosure of non-patent literature cited above, is incorporated herein by reference to this description.

The following analysis is given by the present inventor. The OpenFlow controller, which adopts the above query to determine the path of the received packet (see s2 Packet-In line package) Fig.33), determines the path of the forwarding of the received packet. To redirect the received packet and the subsequent packets that belong to a single thread on the host (B), the stream element must be installed in all the OpenFlow switches in the path redirect (node #1 and node #2 in Fig.33). Furthermore, based on instructions from the network administrator, the OpenFlow controller must sometimes change the action of the stream element that is already installed, and in this case should edit or delete stream element.

When a stream element, described above, is installed, modified or deleted using the OpenFlow Protocol (see “4.6 Flow Table Modification Messages” in non-patent literature�the atur 2), the delay is sometimes generated between the OpenFlow controller and the OpenFlow switch. This delay, in turn, causes a delay in establishing, modifying or deleting the streaming element in some of OpenFlow switches. As a result, in the OpenFlow switch in the path of the packet is mapped to an unintended stream element in a flow table with the problem that unintended action will be executed.

Fig.32 is a diagram showing an example in which, when an OpenFlow switch (unit #1) receives a packet that should be transferred from the host (A) host (B), and requests the controller to create a streaming element, called the delay in establishing the streaming element, which has the X key score relay switch (unit #2). In the example of Fig.32 node #2 has a streaming element with the key In the match, which conflicts with the X key matches streaming element, which must be installed (partial OpenFlow Protocol match any header field is allowed as a key match, and the exclusion of the conflict between the stream elements is controlled in accordance with the procedure of finding the streaming element). Therefore, in the node #2, the packet transmitted from the host (A), is not transmitted to the port #2 to which the packet must be transmitted, but on port #1, to be completed� the establishment of the streaming element (ST8 in Fig.32). Thus, when using the OpenFlow Protocol, an unintended path redirect (action) can be easily induced due to the delay of the establishment of the streaming element.

One possible way to solve this problem is shown in Fig.33. I.e. controller (OpenFlow) transmits a stream element at nodes #1 and #2 (see FlowMod(Add) indicated by s3 and s6 in Fig.33) and simultaneously transmits the request of barrier (Barrier Request), as defined by the OpenFlow Protocol (see “5.3.7 Barrier Message” in non-patent literature 2 for barrier request; the request/response barrier, indicated by s4 in Fig.33). When is the barrier request, the node completes the execution of the processing, which was adopted before a request was received barrier, and meets the "Response of the barrier" (s5 in Fig.33). This response allows the controller (OpenFlow) confirm that the streaming element has been properly installed. The problem with this method is that the controller (OpenFlow) have to exchange request/response barrier with all nodes that have a stream element, thus increasing the time before a custom package can be sent to (s1(Custom package)-s10(Custom package) Fig.33).

Another way is to use request/response Stats instead of request/response barrier, described above, to check whether every� node corresponding element. As to the method that uses request/response barrier, this method also requires the exchange of messages to all nodes that have a stream element, to check that it is installed correctly stream element, thus increasing the time before a custom package can be sent to (s1(Custom package)-s10(Custom package) Fig.33).

In addition, if some stream elements are lost due to node failure, after the stream elements are installed as a method that uses request/response barrier and method that uses request/response Stats can't prevent the execution of an unintended action.

The object of the present invention is to provide a communication system, node, control device, communication method and program to prevent problems such as those described above in which the rule of incorrect processing (stream element) enters the node and marks the unintended processing.

The solution to the problem

According to the first aspect of the present invention provides the communication system, containing the node (s) that processes the received packet; and a control device that sets a processing rule in the node, and the processing rule specifies that the rule matches and the processing for the packet, kotoryservisnaya rule matches, in which node holds the identifier in Association with the processing rule and determines whether to perform processing for a received packet depending on whether the identifier of the received packet identifier associated with a processing rule corresponding to the rule matches, which is consistent with the packet, and processing is performed in accordance with a processing rule corresponding to the rule matches, which is consistent with the adopted package.

According to the second aspect of the present invention provides a node that holds a processing rule in Association with the identifier, the processing rule specifies the rule for matching and processing for a packet that conforms with the rule matches, and determines whether to perform processing for a received packet depending on whether the identifier of the received packet identifier associated with a processing rule corresponding to the rule matches, which is consistent with the adopted service and, therefore, handles the received packet, and processing is performed in accordance with a processing rule corresponding to the rule matches, which is consistent with the adopted package.

According to a third aspect of the present invention provides a control device that GE�uriroot the processing rule, which sets the rule for matching and processing for a packet that conforms with the rule matches, generates an identifier that is associated with the processing rule and which allows a node (s) to determine whether to perform processing for a received packet, and processing is performed in accordance with a processing rule corresponding to the rule matches, which is consistent with the packet, and sets the processing rule and the identifier in the node (s) arranged in the communication system, for processing a received packet.

According to the fourth aspect of the present invention provides a method of communication, comprising stages: the deduction of a processing rule in Association with the identifier, the processing rule specifies the rule for matching and processing for a packet that conforms with the rule matches; and determining whether to perform processing for a received packet depending on whether the identifier of the received packet identifier associated with a processing rule corresponding to the rule matches, which is consistent with the adopted package, and thus, processing of the received packet, and processing is performed in accordance with a processing rule corresponding to the rule matches which is consistent with the adopted package. This method is combined with the concrete structure�a combined machine, called by a node for processing of the received packet.

According to the fifth aspect of the present invention provides a communication method containing the steps of generating processing rules that specifies the rule for matching and processing for a packet that conforms with the rule matches; generating an identifier that is associated with the processing rule and which allows a node (s) to determine whether to perform processing for a received packet, and processing is performed in accordance with a processing rule corresponding to the rule matches, which is consistent with the packet; and setting the processing rule and the identifier in the node (s) arranged in the communication system, for processing a received packet. This method is combined with a specific machine, called a control device that sets a processing rule in the node (s) that processes the received packet.

According to the sixth aspect of the present invention is provided a program prompting the node (s) provided in the communication system for processing a received packet, to perform processing save processing rules in Association with the identifier, the processing rule specifies the rule for matching and processing for a packet that conforms with the rule matches; and determining whether to execute processing for p�intago package depending on, whether the identifier of the received packet identifier associated with a processing rule corresponding to the rule matches, which is consistent with the packet, and processing is performed in accordance with a processing rule corresponding to the rule matches, which is consistent with the adopted package. This program may be recorded on a computer-readable recording media may not be temporary. I.e., the present invention can be embodied in the form of a computer software product.

According to the seventh aspect of the present invention is provided a program prompting a control device provided in the communication system to control the host (s) that processes the received packet, for performing processing of generating the rules for processing that specifies the rule for matching and processing for a packet that conforms with the rule matches; generating an identifier that is associated with the processing rule and which allows a node (s) to determine whether to perform processing for a received packet, and processing is performed in accordance with a processing rule corresponding to the rule matches, which is consistent with the adopted package; and setting the processing rule and the identifier in the node (s). This program may be recorded charged by the computer recording medium. I.e., the present invention can be embodied in the form of a computer software product.

The beneficial effects of the invention

According to the present invention, the execution of an unintended treatment can be prevented in the node (s) arranged in the network redirects the data.

Brief description of the drawings

Fig.1 is a diagram showing a summary of the content of the present invention.

Fig.2 is another diagram depicting the summary of the present invention.

Fig.3 is a diagram showing the configuration of a communication system in the first exemplary embodiment of the present invention.

Fig.4 is a block diagram showing the configuration of the control device (controller) in the first exemplary embodiment of the present invention.

Fig.5 is a diagram showing information held in a database (DB) of stream elements of the control device (controller) shown in Fig.4.

Fig.6 is a diagram showing information held in the information DB verification of the control device (controller) shown in Fig.4.

Fig.7 is a block diagram showing the configuration of a node in the first exemplary embodiment of the present invention.

Fig.8 PR�dstanley a scheme depicting information that is kept in the streaming node table shown in Fig.7.

Fig.9 is a diagram showing an example of a package that includes information verification (or appended information verification).

Fig.10 is a diagram showing an example configuration additional header added information verification shown in Fig.9.

Fig.11 is a block diagram of the sequence of operations depicting the operation of the control device (controller) in the first exemplary embodiment of the present invention.

Fig.12 is a block diagram of the sequence of operations depicting the operation of the node (s) in the first exemplary embodiment of the present invention.

Fig.13 is a model diagram showing the sequence flow in the communication system in the first exemplary embodiment of the present invention.

Fig.14 is a sequence diagram depicting the flow sequence in the communication system in the first exemplary embodiment of the present invention.

Fig.15 is a diagram showing information held in the DB stream elements of the control device (controller) in the second exemplary embodiment of the infusion�of his invention.

Fig.16 is a diagram showing information held in the information DB verification of the control device (controller) in the second exemplary embodiment of the present invention.

Fig.17 is a block diagram showing the configuration of a node in the second exemplary embodiment of the present invention.

Fig.18 is a diagram showing information held in the streaming node table shown in Fig.17.

Fig.19 is a diagram showing an example of a package that included (embedded) information verification.

Fig.20 is a block diagram of the sequence of operations depicting the operation of the control device (controller) in the second exemplary embodiment of the present invention.

Fig.21 is a block diagram of the sequence of operations depicting the operation of the node in the second exemplary embodiment of the present invention.

Fig.22 is a diagram showing information held in the DB stream elements of the control device (controller) in the third exemplary embodiment of the present invention.

Fig.23 is a diagram showing information held in the information DB verification of the control device (controller) in the third prima�nom embodiment of the present invention.

Fig.24 is a diagram showing information held in a flow table of the node in the third exemplary embodiment of the present invention.

Fig.25 is a diagram showing information held in the DB stream elements of the control device (controller) in the fourth exemplary embodiment of the present invention.

Fig.26 is a diagram showing information held in the information DB verification of the control device (controller) in the fourth exemplary embodiment of the present invention.

Fig.27 is a diagram showing information held in the streaming node table in the fourth exemplary embodiment of the present invention.

Fig.28 is a diagram showing an example of a packet used in the fifth exemplary embodiment of the present invention.

Fig.29 is a diagram showing an example configuration additional header added information verification Fig.28.

Fig.30 is a diagram showing the configuration of the streaming element described in non-patent literature 2.

Fig.31 is a diagram showing the operation names and the contents of the actions described in non-patent literature 2.

Fig.32 pre�is a scheme, depicting the work of the OpenFlow controller (controller) and streaming switch (node) described in non-patent literature 2.

Fig.33 is a model diagram and sequence diagram depicting the sequence of operation for establishing reliable stream element using the OpenFlow Protocol, described in non-patent literature 2.

Description of embodiments of

First, the following describes a summary of the exemplary embodiment of the present invention. It should be noted that the reference position of the drawings added to this summary are approximate only, in order to help to understand, but without intention to limit the present invention mode, shown in the figures. As shown in Fig.1, when a packet is received, the node 10 (see node #2 in Fig.1) the communication system of an exemplary embodiment of the present invention extracts a processing rule that is consistent with the adopted package, using a rule matches (key matches) included in the processing rule held in the device itself (step 1). Then, the node 10 (see node #2 in Fig.1) checks whether the ID associated with the retrieved processing rule that is identical to the identifier included in the received packet (step 2). Although in the above description, the node 10 provera�, what is the ID associated with the processing rule that is identical to the identifier included in the received packet, the present invention is not limited to this method. For example, the present invention includes the case in which the node 10 checks that the identifier is associated with a processing rule that corresponds to the identifier included in the received packet. This also applied to subsequent stages and approximate variants of implementation. If confirmed as a result of checking that the ID associated with the processing rule matches the ID of the received packet, the node 10 (see node #2 in Fig.1) performs processing in accordance with the processing rule (step 3).

Above the ID represents the information generated by the management device 20 (controller) in Association with the processing rule. The ID is generated and attached, so can be identified processing rules that may be consistent with the adopted package. Therefore, if the processing rule is retrieved by a search using a rule matches (key matches), but if the ID does not match with the identifier of the received packet, the action is not processing rules. The user identifier is included in the package in various ways, for example, �identificator added to the user package as shown in Fig.1 and Fig.2, or is embedded in a specific area of the user of the package (see Fig.19).

The configuration described above prevents the execution of an unintended operation, even when the condition mentioned above in this description of the invention, for example, when establishing the rules for processing is delayed or when a part of the streaming element is lost because of an error in the node.

In the example of Fig.1, the node retrieves the processing rule that is consistent with the adopted package, using a rule matches (key matches), and then checks if the ID associated with the retrieved processing rule with the identifier of the received packet. Instead, another method is also possible, as shown in Fig.2, in which the host retrieves the processing rule that is consistent with the adopted package using the ID, and then checks if the rule matches (key matches) extracted rules for processing with the contents of the received packet (header information, compare rule matches (key, match)).

In this case also, if the processing rule is retrieved by a search using the ID, but if the rule matches (key matches) does not coincide with the contents (header information) of the received packet, in breach�tsya rule action processing. As in the configuration shown in Fig.1, this configuration also prevents unintended execution of the action, for example, when the delayed establishment of processing rules.

(First exemplary variant of implementation)

Below describes in detail the first exemplary embodiment of the present invention with reference to the drawings. Fig.3 is a diagram showing the configuration of a communication system in the first exemplary embodiment of the present invention. As shown in Fig.3, the communication system contains three nodes 10, the control device 20 (controller) and hosts (A) and (B) that perform communication with each other through node 10. Although three nodes 10, the control device 20 (controller) and two hosts (Host(A)), Host(B)) shown in the example in Fig.3, can be used any number of nodes, control devices (controllers) and host.

Fig.4 is a diagram showing the detailed configuration of the device 20 controls (controller). As shown in Fig.4, the control device 20 (controller) 21 contains the data stream elements (DB stream elements) that stores processing rules (stream elements) and information verification associated with the processing rules; block 22 control topology that creates the network topology information, based on the ratio of �of soedinenii nodes 10, collected by the communication unit 26 unit; a calculation unit 23 tract/operation, which computes the path forwarding the packet and the action that should be performed by the node 10 in the path of redirection based on the network topology information generated by the control unit 22 topology; block 24 control stream element, which establishes the Association between a processing rule (stream element) and information verification, which are calculated respectively by the unit 23 of the computation of the path/steps and unit 28 for generating information verification registers associated processing rule (stream element) and information verification in DB 21 stream elements, handles the upload request processing rules (streaming feature), adopted from the node 10, and updates the processing rule (stream element) and information verification; unit 25 of the processing of the control message; a communication unit 26 of the host that performs communication with the host 10; and a unit 28 for generating information verification, which, in response to a request from the control block 24 stream element, generates information verification, which must be associated with a processing rule, or extracts information verification from database 27 data information, the verification information DB verification). Information verification refers to the information relevant�General ID, used for verification of the comparison result (match or not) between packet and a processing rule based on the rule matches.

In addition, the unit 25 of the processing of the control message comprises a unit 251 of the analysis/processing of the message, which analyzes the control message received from node 10, and performs necessary processing, and the block 252 generate messages, which generates a message that should be transmitted to the node 10.

Fig.5 is a graph schematically depicting the information held in the DB 21 stream-elements (stream element and information verification). For example, elements from the first to the third from the top in Fig.5 specify the rules for processing (stream elements) that are installed in nodes DPID (node ID 10: identifiers tract data) which is equal to 1-3, and information verification associated with processing rules (items four through six on the top show similar content).

When a packet is received that matches the key "A" matches the node DPID equal to 1 (for example, node #1 in Fig.3), performs processing specified by the first element at the top. I.e., the node adds a header that includes information "CA" verification, to the packet and outputs the packet from the ninth port in accordance with a field of Action (Action�). Similarly, when a packet that matches the key "A" matches, is taken from the node, DPID equal to 1 (for example, node #1 in Fig.3), the node DPID equal to 2 (e.g., the node #2 in Fig.3), outputs the packet from the sixth port. When a packet that matches the key "A" matches, is taken from the node, DPID equal to 2 (e.g., the node #2 in Fig.3), the node DPID equal to 3 (e.g., the node #3 in Fig.3), removes the header, which includes information "CA" verification from the packet and outputs the packet from the first port. As a result of the above processing path redirection is controlled so that the information "CA" verification is added to the packet that matches the key "A" match, and the packet is routed according to a given tract, during which information "CA" verification is used for comparison. In actual DB stream elements 21 each of the keys "A", "B" and "X" coincidences, shown in Fig.5, consists of a rule (FlowKey; can be used special character) to compare the header of the received packet, such as the one shown in Fig.30.

Fig.6 is a graph schematically depicting information verification), held in 27 DB information verification. As shown in Fig.6, 27 DB information verification stores the correspondence between the keys "A", "B", ..., "X" with�fall and information "CA", "CB", ..., "CX" verification. Unit 28 for generating information generates verification information verification corresponding to the processing rule (flow element), in response to a request from the control block 24 stream element and registers the generated information verification in DB 27 information verification. Such information verification may be generated by the given function (the hash function, etc.), which uses a rule matches (below in this document called the "key match") or other information as an argument (parameter) so that the information verification is unique at least among the many rules, and each corresponds to multiple rules match, which is consistent with the adopted package, i.e. in such a way that the same information verification is not assigned to at least numerous processing rules. Statistically unique information verification also can be generated using random numbers (explained in detail below the example). DB 27 information verification provided to prevent duplication of information verification among numerous processing rules (of stream elements), which may conflict with each other, not always must be in the format shown in Fig.6. Chrome�, DB 27 information verification can be eliminated by preventing duplication of information verification or stochastically statistically.

It should be noted that, if there is no need to keep the processing rule (streaming feature), the control device 20 (controller) instructs the node 10 to add or update, and information verification associated with the processing rule may be expelled DB 21 stream elements. Similarly, if there is no need to withhold information verification generated in Association with the processing rule may be expelled DB 27 information verification. In addition, another configuration is possible in which DB stream elements 21 and/or 27 DB information verification is provided separately on an external server.

The control device 20 (controller) described above can be realized by adding at least the following two to the OpenFlow controller described in non-patent literature 1 and 2. One is unit 28 for generating information verification, and the other function is to establish rules for processing (streaming element) and information verification associated with the processing rule in the node 10.

Fig.7 is a diagram showing the detailed configuration of the node 10. As shown in Fig.7, node 10 contains� communication unit 11 of the control device, which performs communication with the management device 20 (controller), the control unit 12 stream table that manages the streaming table 13, the packet buffer 14 and the block 15 handling the redirection. It should be noted that the node 10 does not always have to contain the packet buffer 14.

Unit 15 processing the redirect contains the block 153 table search unit 154 of the execution of the action. Block 153 table search includes block 152 mapping information verification, which compares information verification associated with the processing rule (stream element), with information verification, added to the adopted package, to determine whether they match. Block 153 table search searches the streaming table 13 processing rules (streaming feature) that has the key of the match, which is consistent with the adopted package, and information verification which coincides with the information of the received packet, and outputs the contents (action) processing at block 154 the execution of the action. The block 154 of the execution of the action takes the contents (action) processing output from block 153 table lookup.

The node 10 described above can be implemented by adding a block of 152 mapping information verification to the OpenFlow switch through configuration and streaming of the table 13 so that information� verification may be retained in Association with the processing rule (stream element). Block 153 table search (streaming feature), which includes block 152 mapping information verification, the node 10 can be configured by a program executed by a computer configuring the node 10.

Fig.8 is a graph schematically depicting information (stream element and information verification), held in a flow table 13 of the node of Fig.5 (node #2 in Fig.3), DPID equal to 2. As shown in Fig.8, streaming table 13 includes streaming elements and information verification, which are the same as those of the elements in DB 21 stream elements in Fig.5 with the corresponding DPID. For each of the nodes in Fig.5, DPID equal to 1 or 3 (nodes #1 or #3), stream table 13 includes streaming elements and information verification corresponding to each DPID likewise.

Fig.9 is a diagram showing the configuration of a package with the added information verification created by the node 10 based on the action ("Set header", which includes "CA"; see action (s) of the site DPID=1 in Fig.5), which is set by the control device 20 (the controller). In the example of Fig.9 pack 32-added information verification has a configuration in which an additional header 33-added information verification, which includes in�ormatio verification is added to the beginning of the custom package 31.

Fig.10 is a diagram showing an example configuration additional header 33-added information verification. In the example of Fig.10 additional title 33-added information verification has a configuration in which information verification is added to the destination address control access to the transmission medium (DA MAC), the MAC source address (MAC SA), the type of higher-level Protocol (type of environment) and the total header length (Total length). In the example of Fig.10 significance (f(key coincidences, random number)) computed by the given function (the hash function, etc.) with the key coincidences and random number as an argument, is used as information verification.

Next, the following describes the operation of the device 20 controls (controller) and node 10 described above. Fig.11 is a block diagram of the sequence of operations depicting the operation of the device 20 controls (controller). As shown in Fig.11, when a request (request for the establishment of processing rules; see step S111 in Fig.12) is received from the host 10 (step S001; Packet-In), the control device 20 (controller) checks whether the service request information verification (step S002). If the request packet includes information verification (Yes in step S002), the rule processing�, the corresponding package is already created and therefore, the control device 20 (controller) remove the processing rule corresponding to the packet, and information verification associated with the processing rule, from 21 DB of stream elements (step S012), and passes control to step S008.

On the other hand, if the request packet does not include information verification (No in step S002), the control device 20 (controller) receives the network topology information compiled by the control unit 22 of the topology and computes the path forwarding the packet (step S003).

Except, when it is determined from the result of calculation of a path of forwarding the packet, the packet cannot be forwarded because the tract redirection cannot be created or since rejected node in the path (No in step D004), the control device 20 (controller) computes the action corresponding to the computed path forwarding (step S005). Then, the control device 20 (controller) generates information verification associated with the processing rule (stream element) applied to each of the nodes 10 in the path (step S006). In addition, the control device 20 (controller) generates a processing rule (stream element) that is applied to each of the 10 nodes in the path, and the processing rule (stream element) includes � the key matches for stream identification, the package belongs to, query, and action (step S007).

When the completed receiving or generating processing rules (streaming element) and information verification device 20 of the control (controller) generates a statement of the establishment (Flow Mod(Add)) to make the generated rule processing (streaming element) and information verification (step S008), and transmits the instruction of the establishment (Flow Mod(Add)) to establish rules for processing (streaming element) and information verification to the nodes 10 in the path of a redirection package, created processing rule (stream element) (step S009).

Thereafter, if the node 10 is not Supersoul packet (No in step S010), the control device 20 (controller) transmits the instruction output of the packet (Packet-Out) (step S011). This manual output is done by setting packet to be output (packet, received via a Packet-In in step S001), and an action that should be executed for package (added information verification and withdrawal of the package from the specified port) or by setting the package that needs to be displayed (packet, received via a Packet-In in step S001), and action which must be performed for the package (search, stream table). It should be noted that if node 10 has Supersoul packet (Yes in step S010), the control device 20 (�ontroller) can force the node 10 to the output of the package as described below, and therefore, the control device 20 (controller) omits this treatment.

Fig.12 is a block diagram of the sequence of operations depicting the operation of the node 10. As shown in Fig.12, when a packet is received from the host or a different host 10 (step S101), the node 10 performs a lookup in a flow table 13 processing rules (streaming feature), having the key of the match, which is consistent with the packet (step S102).

If the processing rule (stream element) is extracted in step S102 (Yes in step S103), the node 10 checks, does it include the adopted package information verification (step S104). In this exemplary embodiment of the node 10 checks whether the received packet extra header to see whether the information verification.

If the received packet does not include information verification, the node 10 performs the action described in the retrieved processing rule (stream-element) (step S107).

On the other hand, if is determined in step S104 that the received packet includes information verification, the node 10 compares the information verification, included in the received packet with information verification associated with the retrieved processing rule (stream element) (step S105).

If two pieces of information verification match, the node 10 performs the action described in the retrieved processing rule (stream-element) (step S107). I.e. to perform an action for a packet that includes information verification, it is necessary that the matching rule processing (stream element) was found during the search key matches the information verification associated with the processing rule (stream element), coincided with the information included in the received packet.

On the other hand, if the processing rule (streaming feature), which is consistent with the adopted package that is not in step S103 or if the processing rule (streaming feature), which is consistent with the adopted package is, but two pieces of information verification do not match, the node 10 transfers control to step S111 without execution of the action described in the retrieved processing rule (stream-element), and transmits the request to the management device 20 (controller) (request for the creation and transfer of processing rules (streaming element) and information verification, corresponding to the adopted package).

In step S111, the node 10 stores the received packet in the packet buffer 14, and simultaneously transmits the received packet to the management device 20 (controller), requesting it to create a processing rule, and information verification. After that, in response to this request, the control device 20 (controller) creates and sets the processing rule and the information�Oia verification in accordance with the procedure shown in Fig.11.

When manual establish (Flow Mod(ADD)) to establish rules for processing (streaming element) and information verification is accepted from the device 20 management (controller), node 10 sets the processing rule (stream element) and information verification associated with the processing rule, in his own stream table 13 in accordance with a Flow Mod(Add) (step S112).

Then, the node 10 checks, stored the received packet in the packet buffer 14 (step S113). If the received packet is stored (Yes in step S113), the node 10 reads the received packet (step S114) and executes the contents of the processing (step; adding information verification and conclusion of the received packet from the specified port), a specific processing rule (stream element) that has been set as described above (step S107). This encourages the redirection of the received packet at the node of the next segment (hops).

On the other hand, if the node 10 does not retain the custom package, for example, when the node 10 does not have the packet buffer 14 (No in step S113), the node 10 receives the instruction output of the packet (Packet-Out) from the device 20 controls (controller) (step S116).

If the packet buffer 14 is provided, the node 10 which has received the instruction output of the packet (Packet-Out) checks that the stored packet in the packet buffer 14 (step S117). If the package is stored(Yes in step S117), the host 10 reads the packet (step S118) and executes the contents of the processing (action; in this case, adding information verification to the adopted package, the output of the received packet from the specified port or search for stream table) taken from the instruction output of the packet (Packet-Out) (step S107). If the packet is not stored (No in step S117), the node 10 performs content processing (action; in this case, adding information verification to the packet and the output packet from the specified port or search for stream table) taken from the instruction output of the packet (Packet-Out) for package adopted with the instruction output of the packet (Packet-Out) (step S107). This encourages the redirection of the received packet at the node of the next segment.

Fig.13 and 14 represent a standard diagram and the sequence diagram depicting the sequence of flow from the point in time at which the node #1 that received the packet to be transmitted from the host (A) host (B), passes the request (the request to create rules for processing and information verification) to the control device 20 (controller), to a point of time at which the packet is delivered to the host (B).

As shown in Fig.13 and 14, when the host (A) sends a custom package that needs to be transferred to the host (B), the node #1 (ST1; custom package of Fig.13 and 14), the node #1 searches (streaming feature) in streams�th table 13 and, as a result, determines that the packet is an unknown package that does not have processing rules (streaming element) matching the packet (No in step S103 in Fig.12). The node #1 transmits a request (request for the establishment of a processing rule (streaming element) and information verification) to the control device 20 (controller) (ST2; Packet-In Fig.13 and 14).

When it has received the request (the request to create processing rules (streaming element) and information verification), the control device 20 (controller) creates a processing rule (stream element) and information (CA) verification to establish in nodes #1-#3 in the path of the redirection of the packet in accordance with a flowchart the sequence of operations in Fig.11 and transmits them to the nodes #1-#3 (ST3-1-ST5-1; Flow Mod(Add) CA Fig.13 and 14).

Each of the nodes #1-#3 adds the processing rule (stream element) and information (CA) verification transmitted from the device 20 management (controller), to streaming table 13 of his own device and, if the added buffer identifier (ID), performs the action for packets (ST3-2-ST5-2 in Fig.13 and 14). In the description below, the inventors suggest that the processing rule (stream element) and information (CA) verification passed in ST4-1 in Fig.13 and 14 do not reach node #2 for some reason and therefore the processing rule (streaming elements�) and information (CA) verification is not added to the streaming table 13 node #2.

And then, the node #1 generates a custom package to which to add an additional header, which includes information (CA) verification (see Fig.9), and outputs the generated packet to a specified port (the port connected to the node #2) in accordance with the action (see the action (s) in the element of Fig.5, the corresponding DPID=1, the key match = A and information verification = CA) included in the processing rule, adopted in ST3-1 (ST6 in Fig.13 and 14).

If it is a custom package to which to add the header, which includes information (CA) verification, the node #2 searches the streaming table 13 and, as a result, determines that there is no rule processing (streaming element) matching the packet, or that there is a processing rule (stream element) matching the packet, but information verification does not match the information verification of the received packet (No in step S103 or Not in step 106 of Fig.12). The node #2 transmits a request (request for the establishment of a processing rule (streaming element) and information verification) to the control device 20 (controller) (ST8; Packet-In Fig.13 and 14).

When accepted the request (the request to create processing rules (streaming element) and information verification), the control device 20 (controller) receives a processing rule (stream element) and inform�tion (CA) verification which must be set in the node #2 in the path of the packet (step S012 in Fig.11), and transmits them to the node #2 in accordance with the block diagram of the sequence of operations in Fig.11 (ST9; Flow Mod(Add) CA Fig.13 and 14).

Node #2 adds the processing rule (stream element) and information verification transmitted from the device 20 management (controller), to streaming table 13 of his own device and, if the added buffer ID, performs the action (ST10 in Fig.13 and 14).

And then, the node #2 to display the user package, which added an additional header, which includes information (CA) verification, at the specified port (the port connected to the node #3) in accordance with the action (see the action (s) in the element of Fig.5, the corresponding DPID=2, the key match = A and information verification = CA) in the processing rule, adopted in ST10 (ST11 in Fig.13 and 14).

If it is a custom package, to which is added an additional header, which includes information (CA) verification, the node #3 searches the streaming table 13 and, as a result, determines that one of the rules processing (stream elements) consistent with the adopted service and information verification also coincides with the information of verification of the received packet (Yes in step S103 and Yes in step 106 of Fig.12), and performs the action specified in the extracted and confirmed�the data processing rule (stream-element) (ST12 in Fig.13 and 14).

More specifically, the node #3 removes the additional header, which includes information (CA) verification from the user packet and outputs the packet from the specified port (the port connected to the host (B)) in accordance with the action (see the action (s) in the element of Fig.5, the corresponding DPID=3, the key match = A and information verification = CA) in the processing rule (stream-element), extracted and confirmed in ST12 (ST13 in Fig.13 and 14).

As described above, the action is executed in this exemplary embodiment of the subject that is not only the key matches the processing rule (streaming feature) matches the header information of the received packet, but also information verification, separately generated by the control device 20 (the controller) corresponds with the information the verification of the received packet. Thus, this exemplary variant of the implementation can prevent the condition described at the beginning of this description of the invention when executed unintended action specified in the processing rule (stream-element).

In this exemplary variant implementation, if it is determined in step S104 that the information verification is not included in the received packet, the action is executed without comparison information verification, considering the package to which should be added the information verify�ation. Instead, it is also possible to always prevent the execution of the action, if the information verification is not included in the received packet.

(Second exemplary variant of implementation)

Next, the following describes in detail a second exemplary embodiment of the present invention with reference to the drawings. Although information verification will be added to the package, using an additional header that includes information verification in the first exemplary embodiment of the present invention described above, information verification may also be included in the package without the use of additional header. The following describes a second exemplary variant implementation, in which data verification is included in the package without the use of additional header. Since the basic configuration of the node 10 and the device 20 controls (controller) in the second exemplary variant implementation is similar to the basic configuration of the node 10 and the device 20 controls (controller) in the first exemplary variant of implementation, the following describes the configuration, giving particular significance to the difference.

Fig.15 is a graph schematically depicting information (stream elements), held in DB stream elements 21 of the device 20 controls (controller) in this approximate VA�iante implementation. This exemplary variant of implementation differs from the first exemplary embodiment of the fact that independent field of information verification is not included in DB 21 stream elements, but the key matches, which includes information (CA) verification is stored in the key field matches the streaming element, and that the processing to record information verification in (or restore) the DA field of the MAC is defined as the action (more strictly, the replacement of the DA field of the MAC value Dn' (see Fig.19) and the restoration of the DA field of the MAC). In the description below, the value of the original DA field of the MAC is referred to as "Dn", and the value of the DA field of the MAC, converted to include information (CA) verification, listed as "Dn'".

For example, when a packet is received that matches the key "A" matches the node in Fig.15, DPID equal to 1 (for example, node #1 in Fig.3), sets the value of D1', which includes information (CA) verification in DA field of the MAC packet in accordance with the field actions (Actions), and then outputs the packet from the ninth port. When a packet (a packet that matches the key of A' coincidence), DA field of the MAC which includes information (CA) verification is taken from the node, DPID equal to 1 (e.g., node #1 in Fig.3), the node DPID equal to 2 (e.g., the node #2 in Fig.3), outputs the packet from the sixth port. When a packet (a packet that matches the key of A' �of ovpadeniya), field DA MAC which includes information (CA) verification is taken from the node, DPID equal to 2 (e.g., node #2 in Fig.3), the node DPID equal to 3 (e.g., the node #3 in Fig.3), restores the DA field of the MAC to the same content (D1), and DA content source MAC of the received packet, and then outputs the packet from the first port. As a result of the above processing path redirection is controlled so that the information "CA" verification is added to the node of the first segment in the path redirection and the packet is routed according to a given tract, during which information "CA" verification is used for matching.

Fig.16 is a graph schematically depicting information verification), held in 27 DB information verification device 20 of the control (controller) in this exemplary variant implementation. Information differs from the information in the first exemplary variant of the implementation that is added to the contents of the source field DA MAC (corresponding to D1, D2 and DX in Fig.15) to restore the DA field of the MAC to the same content as that content is DA source MAC of the received packet, and the number of the last segment to perform the recovery processing.

Fig.17 is a diagram showing the detailed configuration of the node 10A in this exemplary embodiment, the implementation�tion. The configuration differs from the configuration of Fig.7, which depicts the configuration of the node 10 in the first exemplary variant of implementation, the fact that the unit 152a mapping information verification unit 153a table search unit 15a handling the redirection replaces the corresponding blocks, as the information verification and the comparison operation unit 152a mapping information verification differs in the two exemplary embodiments (details described below).

Fig.18 is a graph schematically depicting information (stream elements), held in a flow table node 13 in Fig.15, DPID equal to 2 (node #2 in Fig.3). As shown in Fig.18, streaming elements corresponding DPID extracted from the DB stream elements 21 in Fig.15, installed in a flow table 13. At the nodes, DPID equal to 1 and 3 in Fig.15 (nodes #1 and #3 in Fig.3), like the stream elements are related to each DPID.

Fig.19 is a diagram showing the configuration of a package, written in the node 10, based on action (Install DA MAC on D1'; see step (Action) node, the node whose DPID=1 in Fig.15), which is set by the control device 20 (the controller). In the example of Fig.19, the package 32a-added information verification has a configuration in which the 48-bit inform�tion, shown below Fig.19, is recorded in the DA MAC custom package 31. Although 8-bit fixed data indicating that the information verification is enabled, the function f1(DPID last node of the segment, the original DA MAC) and the function f2(key coincidences, random number) are recorded in the example of Fig.19, this configuration is only exemplary. A field for storing information verification, content, information, verification, and function to reduce the original data can be changed as needed.

Next, the following describes the operation of this exemplary embodiment. Fig.20 is a block diagram of the sequence of operations describing the operation of the control device (controller) in the second exemplary embodiment of the present invention. The work shown in this figure, different from that of Fig.11, which depicts the operation of the control device (controller) in the first exemplary variant of implementation, in that, when the control device checks whether the information of the verification request packet in step S002a, the control unit checks an additional header, but recorded whether the above fixed data (see Fig.19) in DA MAC. Other stages similar to the stages in the first exemplary variant of implementation, and therefore description here is oposkie�Xia.

Fig.21 is a block diagram of the sequence of operations depicting the operation of the node 10a in the second exemplary embodiment of the present invention. Work is different from that of Fig.12, which depicts the operation of the node 10 in the first exemplary variant of implementation, the fact that, when a node checks whether information verification in the received packet in step S104a, the node checks an additional header, but recorded whether the above fixed data (see Fig.19) in DA MAC, and that the last node of the segment does not remove the additional header, but restores the original DA field of the MAC in accordance with the action followed by the redirection of the package. The other steps are similar to the steps in the first exemplary variant of implementation, and therefore description here is omitted.

As described above, the present invention can be implemented in a mode in which data verification is included in a specific field of an existing package.

(Third exemplary variant of implementation)

Next, the following describes in detail a third exemplary embodiment of the present invention with reference to the drawings. Although the same information verification is stored in the nodes by associating information verification with streaming stream element of the table in the first exemplary variant implementation�ment of the present invention, also another possible configuration in which nodes use different information verification for comparison. The following describes a third exemplary variant of implementation, in which the nodes use different information verification for comparison. Since the basic configuration of the node 10 and the device 20 controls (controller) in the third exemplary variant implementation is similar to the configuration of the host 10 and the device 20 controls (controller) in the first exemplary variant of implementation, the following describes the configuration, giving particular significance to the difference.

Fig.22 is a graph schematically depicting information (stream element and information verification), held in DB stream elements 21 of the device 20 controls (controller) in this exemplary variant implementation. Contrast to the first exemplary embodiment is that the processing for generating information verification (step S006 in Fig.11) for the nodes, once for each node, and that, instead of providing an independent field of information verification in DB 21 stream elements, processing is added to the field steps to add additional header, which includes other information verification. (Header, which includes other information verification, is added to each have�Lou, therefore information verification associated with the stream element, is described in the stream element. This means that the information field verification is not required, as there is no need to independently maintain the correspondence between the information verification and flow elements.)

For example, when a packet is received that matches the key "A1" coincidences, the node in Fig.22, DPID equal to 1 (for example, node #1 in Fig.3) adds an additional header, which stores information (C2A) verification, to the adopted packet and outputs the packet from the ninth port in accordance with the field actions (Actions). Similarly, when a packet (a packet that matches the key A2 coincidence), to which it adds an additional header that stores information (C2A) verification is taken from the node, DPID equal to 1 (for example, node #1 in Fig.3), the node DPID equal to 2 (e.g., the node #2 in Fig.3) that rewrites information (C2A) verification of additional header information (C3A) verification and then outputs the packet from the sixth port. And when the package (the package that matches the key A3 coincidence), to which it adds an additional header that stores information (C3A) verification is taken from the node, DPID equal to 2 (e.g., the node #2 in Fig.3), the node DPID equal to 3 (e.g., the node #3 in Fig.3), removes additional�separate the header from the packet and then outputs the packet from the first port. As a result of the above processing path redirection on a given tract is controlled so that the packet is routed sequentially from the node of the first segment in the path redirection, during which information verification rewritten, and information verification is used for matching.

Fig.23 is a graph schematically depicting information verification), held in 27 DB information verification device 20 of the control (controller) in this exemplary variant implementation. Contrast to the first exemplary embodiment is that the field is added to the DPID and the relationship between key matches and information verification is stored for each node. It should be noted that this configuration is only exemplary and that the information contained in DB 27 information verification, can be changed as needed depending on the functions to generate information verification.

Fig.24 is a graph schematically depicting information (stream elements and information verification), held in a flow table node 13 in Fig.22, DPID equal to 2 (node #2 in Fig.3). As shown in Fig.24, streaming elements and information verification corresponding DPID is retrieved from DB 21 streaming elements�tov Fig.22 and is installed in a flow table 13. For each of the nodes in Fig.22, DPID equal to 1 and 3 (nodes #1 and #3 in Fig.3), are mounted respectively stream elements and information verification, the corresponding DPID.

This exemplary variant of implementation differs from the first exemplary embodiment only in that the control device generates information verification for each node and what is the difference between action that is executed in the nodes. The main work is the same as that of the first exemplary embodiment, and therefore description is omitted (see Fig.11 and Fig.12).

This exemplary variant implementation, in which each node rewrites the information of verification in accordance with the action included in the processing rule, as described above, differs from the first exemplary embodiment of the fact that the stream elements with different keys matches can be installed in the nodes in the path for one thread context.

(Fourth exemplary variant of implementation)

Next, the following describes a fourth exemplary embodiment of the present invention with reference to the drawings. In the fourth exemplary embodiment of the present invention, which is a combination of the second exemplary embodiment and third exemplary embodiment of the present invention, d�additional header is not used, and each node uses different information verification for comparison. Since the basic configuration of the node 10 and the device 20 controls (controller) to the fourth exemplary variant implementation is similar to the configuration of the host 10 and the device 20 controls (controller) in the first through third exemplary embodiments, the following describes the configuration, giving special importance to the distinction.

Fig.25 is a graph schematically depicting information (stream elements), held in DB stream elements 21 of the device 20 controls (controller) in this exemplary variant implementation. This exemplary variant of implementation differs from the third exemplary embodiment of the fact that the field of action includes processing for adding an additional header that includes a variety of information verification, but the processing for rewriting the value of the field DA MAC on a value that includes information verification for each node, and to restore the values on the last segment.

For example, when a packet is received that matches the key "A" matches the node in Fig.25, DPID equal to 1 (for example, node #1 in Fig.3), sets the value of D1', which includes information (C2A) verification, in DA field of the MAC packet and then outputs the packet from the ninth port in accordance � field of action (Action). Similarly, when a packet (a packet that matches the key of A' coincidence), DA field of the MAC which includes information (C2A) verification is taken from the node, DPID equal to 1 (for example, node #1 in Fig.3), the node DPID equal to 2 (e.g., the node #2 in Fig.3), rewrites the DA field of the MAC packet on the value of D1, which includes information (C3A) verification, and then outputs the packet from the sixth port. When a packet (a packet that coincides with A key" matches), the DA MAC which includes information (C3A) verification is taken from the node, DPID equal to 2 (e.g., the node #2 in Fig.3), the node DPID equal to 3 (e.g., the node #3 in Fig.3), restores the DA field of the MAC to the same content (D1), and DA content source MAC of the received packet, and then outputs the packet from the first port. As a result of the above processing path redirection on the specified path is controlled so that the information verification is sequentially overwritten, and information verification is used to map the node of the first segment of path redirection.

Fig.26 is a graph schematically depicting information verification), held in 27 DB information verification device 20 of the control (controller) in this exemplary variant implementation. Information differs from the information in the third� exemplary variant of implementation of the what is added to the contents of the source field DA MAC to restore the DA field of the MAC to the same content DA source MAC of the received packet (corresponding to D1, D2 and DX in Fig.25) and the node number of the last segments that perform this treatment recovery. It should be noted that this configuration is only exemplary and that the information contained in DB 27 information verification, can be changed as needed depending on the functions to generate information verification.

Fig.27 is a graph schematically depicting information (stream elements), held in a flow table node 13 in Fig.25, DPID equal to 2 (node #2 in Fig.3). As shown in Fig.27, streaming elements corresponding DPID retrieved from DB 21 stream elements in Fig.25 and installed in a flow table 13. For each of the nodes in Fig.25, DPID equal to 1 and 3 (nodes #1 and #3 in Fig.3), are respectively the stream elements corresponding DPID.

This exemplary variant of implementation differs from the first exemplary embodiment only in that the control device generates information verification for each node and what is the difference between action that is executed in the nodes. The main work is the same as that of the first exemplary embodiment, and therefore description is omitted see Fig.11 and Fig.12).

This exemplary variant implementation, in which each node rewrites the information of verification in accordance with the action included in the processing rule, as described above, is different from the second exemplary embodiment of the fact that the stream elements with different keys matches can be installed in the nodes in the path for one thread context.

(Fifth exemplary variant of implementation)

Next, the following describes in detail a fifth exemplary embodiment of the present invention with reference to the drawings. Although only one piece of information of the verification is stored in the optional header in the third exemplary embodiment of the present invention described above, another configuration is possible in which information verification, which is used to compare nodes in the path redirection, stored in an auxiliary header, one for each node. In this configuration, when a packet is received that an additional header is added, the node identifies information verification, to which the node refers to be used when comparison operation. The following describes the fifth exemplary variant of implementation, in which multiple pieces of information verification may be stored in the optional header. So to�to the basic configuration of the node 10 and the device 20 controls (controller) to the fifth exemplary variant implementation is similar to the configuration of the host 10 and the device 20 controls (controller) in the third exemplary variant of implementation, as described above, the following describes the configuration, giving particular significance to the difference.

Fig.28 is a diagram showing an example of a packet used in the fifth exemplary embodiment of the present invention. In the example of Fig.28 package 32b-added information verification has a configuration in which an additional header 33b-added information verification, which includes information verification, is added to the beginning of the custom package 31.

Fig.29 is a diagram showing an example configuration additional header 33b-added information verification described above. In the example of Fig.29 additional header 33b-added information verification contains a MAC destination address (DA MAC), a MAC source address (MAC SA), the type of Protocol of a higher level (Type environment), the total length of the header (Total length) and numerous sets DPID and information verification. In the example of Fig.29 the value of (f(key coincidences, random number)) computed by the given function (the hash function, etc.), which uses a key that matches each node and a random number as arguments, is used as information verification.

This exemplary variant of implementation differs from the first exemplary embodiment only in that the mouth�eusto generates control information verification for each node and that each node removes its own information verification using DPID, and performs comparison operation. The main work is the same as that of the first exemplary embodiment, and therefore description is omitted (see Fig.11 and Fig.12).

As described above, the present invention can be implemented through configuration, which adds an additional header that stores information verification individual nodes. This exemplary variant of implementation has the advantage relative to the third exemplary embodiment in that each node can skip processing for overwriting information verification.

Although there have been described preferred exemplary embodiments of the present invention, it is necessary to understand that the present invention is not limited to the exemplary embodiments of the implementation described above and which can be added additional modifications, substitutions and deletions to the extent that, without departing from the basic technological idea of the present invention. Devices 20 and 20a of the control (controllers) in the exemplary embodiments described above can be implemented by a dedicated server, and the nodes 10, 10a and 10b may be implemented by the OpenFlow switch described above, as well as the router on the network Internet Protocol (IP network) or switch Multiprotocol� switching based on labels (MPLS) MPLS network. In addition, the present invention is applicable to the network where the server manages the nodes in the network.

In the fifth exemplary variant of implementation described above, the node identifiers (DPID) is included in an additional header that allows each node to identify information verification, which should be compared in the device. It is also possible to use a method in which information verification is used starting from the first or last information verification in the additional header, and usage flag is set to indicate that the information verification is already in use, or the way in which each node sequentially removes the additional header information verification, which he uses for comparison.

Although the last segment node removes the additional header, or restores the DA field of the MAC, in exemplary embodiments, described above, is also another possible configuration in which the host performs this processing.

As information verification described in the exemplary embodiments described above can also be used the information generated by the controller, allowing the stream element to be uniquely identified, such as streaming a cookie in non-patent literature 2.

Although the control device 20 with�refer to the unit 28 for generating information verification in exemplary embodiments, as described above, it is also possible a configuration in which the block information generation verification is generated at each node if each node 10 may generate information verification by establishing synchronization among the nodes 10 or between the node 10 and the control device 20 or by assigning the function information generation verification and its arguments, each node 10.

Finally, the following summarizes the preferred modes of the present invention.

(The first mode)

(Cm. the communication system in the first aspect above)

(The second mode)

The communication system described in the first mode, in which

an identifier is used to verify the result of the match between the packet and a processing rule, the result of the match based on the rule matches.

(Third mode)

The communication system described in the first or second mode, in which

the node searches for a handling rule corresponding to the rule matches, which is consistent with the packet, by comparing (matching) of the received packet with the rule matches and if the identifier of the received packet corresponds to an identifier associated with a search rule processing, performs processing for the received packet in accordance with a search rule processing.

(Fourth mode)

The communication system described in the first or second mode, in which

the node performs the search processing rules associated with the identifier corresponding to the identifier of the received packet, and if the rule matches, the corresponding processing rule, consistent with the packet, performs processing for the received packet in accordance with a search rule processing.

(Fifth mode)

The communication system described in one of the first to fourth modes in which

the ID is unique at least among the set of processing rules, wherein each corresponds to a set of rules matches, which is consistent with the adopted package.

(Sixth mode)

The communication system described in one of the first to fourth modes in which

the ID is a unique statistically.

(Seventh mode)

The communication system described in one of the first to sixth modes, in which

the node determines whether the received packet identifier of the received packet by checking whether to add an additional header that contains an identifier to the adopted package.

(Eighth mode)

The communication system described in one of the first to sixth modes, in which

the node determines whether the received packet identifier of the received packet by checking whether the identifier is stored in a predetermined field of the received packet.

(Ninth mode)

The communication system described in one of the first to sixth and eighth modes of the mode in which

the control device controls each node so that the node positioned at the beginning of a path of forwarding the packet, replaces the information in a predetermined field of the received packet of information that includes the identifier, followed by a redirection package,; and

a node located at the end of the tract redirects, and restores information in a predetermined field of the received packet to the content before replacing, followed by a redirection of the package.

(Tenth mode)

The communication system described in one of the first to ninth modes, in which

the control device sets different identity in the processing rule, which is installed in the actuator in the path of forwarding the packet, and controls each node so that the node in the path redirection consistently rewrites the identifier of the received packet to the node ID of the next segment.

(Eleventh mode)

The communication system described in one of the first to seventh and tenth modes of the mode in which

the control device controls each node so that the node positioned at the beginning of a path of forwarding the packet, adds an additional header that includes � identifier, to the adopted package, followed by the redirection of the packet, and a node located at the end of the path redirect that removes the additional header, followed by a redirection of the package.

(Twelfth mode)

The communication system described in one of the seventh mode and eleventh mode, in which

additional header stores a set of identifiers, and each is used to determine the host path forwarding the packet.

(Thirteenth mode)

(Cm. mode in the second aspect above.)

(Fourteenth mode)

(Cm. the control device in the third aspect above.)

(Fifteenth mode)

(Cm. the communication method in the fourth aspect above.)

(Sixteenth mode)

(Cm. the communication method in the fifth aspect above.)

(Seventeenth mode)

(Cm. the program in the sixth aspect above.)

(Eighteenth mode)

(Cm. the program in the seventh aspect above.)

Thirteenth to eighteenth modes described above may be embodied in the second to twelfth modes in the same manner as that of the first mode described above.

Disclosure of non-patent literature cited above, hereby incorporated by reference in this description of the invention. Exemplary embodiments of the implementation can be changed and adjusted in the scope of the entire disclosure (including claims) of the present invention and�nowany on basic technological idea. With the scope of the claims of the present invention the various elements described can be combined and chosen the many way. I.e. it is obvious that the present invention includes various modifications and changes can be made by a specialist in the art according to the entire disclosure including the claims, and his technological ideas.

The list of reference positions

10, 10a, 10b - node

11, the communication unit of the control device

12 - control unit streaming table

13 - streaming table

14 - batch buffer

15, 15a - processing unit redirection

20 is a control unit

21 - a database of stream elements (DB stream elements)

22 - the control unit topology

23 is a unit for computing the path/action

24 - the control unit stream element

25 - processing unit control message

26, the communication unit of the node

27 - database information, the verification information DB verification)

28 is a block for generating information verification

31 - custom package

32, 32a, 32b - package-added information verification

33, 33b - the additional header added information verification

152, 152a - block mapping information verification

153, 153a - block table search

154 - block execution of the action

251 - block Ana�iza/processing the message

252 - unit generating messages

1. Communication system containing:
node (s) that processes the packet; and
a control unit that reports the processing rule and the first identifier to identify the rule mentioned processing node, the processing rule includes a rule approvals to be consistent with the information included in the package, and instructions for processing the packet that matches the rule harmonization, in which
mentioned host determines whether to process the received packet according to the instruction depending on whether the second identifier attached to the received packet to the first identifier notified by the mentioned control device.

2. The communication system according to claim 1, in which
the first and second identifiers are used to verify the result of comparison between a packet and a processing rule, wherein the comparison is based on the rule of agreement.

3. The communication system according to claim 1 or 2, in which
mentioned node performs the search processing rules corresponding to rule harmonization, which is in accordance with the packet by comparing the received packet with the rule harmonization and in the case where the second identifier of the received packet corresponds to the first identifier associated � found processing rule, performs processing for the received packet according to a found rule processing.

4. The communication system according to claim 1 or 2, in which
mentioned node performs the search processing rules associated with the first identifier corresponding to the second identifier of the received packet, and in the case where the rule harmonization corresponding to the processing rule, is in accordance with the received packet, performs processing for the received packet according to a found rule processing.

5. The communication system according to claim 1 or 2, in which
the first and second identifiers are statistically unique or unique at least among the set of processing rules, each corresponds to a set of negotiation rules, which conforms to the adopted package.

6. The communication system according to claim 1 or 2, in which
the first and second identifier are statistically unique.

7. The communication system according to claim 1, in which
mentioned the node determines whether the received packet of the second identifier of the received packet by checking it has a stored second identifier in a predefined field of the received packet.

8. The communication system according to claim 1 or 2, in which
mentioned the node determines whether the received packet of the second identifier of the received packet by checking it has a stored second identifier in predoped�Lenno field of the received packet.

9. The communication system according to claim 1 or 2, in which
the said control device controls each of the mentioned node so that the node positioned at the beginning of the route shipment of a package, replaces the information in a predetermined field of the received packet of information that includes the second identifier, followed by the shipment of the package; and
the site, located at the end of the route forwarding recovers information in a predetermined field of the received packet to the content before replacing, followed by shipment of the package.

10. The communication system according to claim 1 or 2, in which
the said control device sets the other of the first identifier in the processing rule set in the node EN-route shipment of a package, and controls each of the mentioned node so that the node on the route forwarding sequentially rewrites the second identifier of the received packet to the node ID of next hop.

11. The communication system according to claim 1, in which
the said control device controls each of the mentioned node so that the node positioned at the beginning of the route shipment of a package, adds an additional header that includes a second identifier to the adopted package, followed by shipment of the package; and
the site, located at the end of the route Perez�LCI, removes the additional header, followed by the shipment of the package.

12. The communication system according to claim 7 or 11, in which
additional header stores a lot of second identifiers, each is used to determine the node on the route shipment of a package.

13. A node processing a packet containing:
the first block for the reception of a processing rule and a first identifier for identifying the mentioned processing rules, the processing rule includes a rule approvals to be consistent with the information included in the package, and instructions for processing the packet that matches the rule approval; and
the second block to determine whether to process the received packet according to the instruction depending on whether the second identifier attached to the received packet, the first identifier, taken from the control device.

14. An Assembly according to claim 13, in which
the first and second identifiers are used to verify the result of comparison between a packet and a processing rule, and a comparison result based on rule matching.

15. An Assembly according to claim 13, in which
the mentioned second block performs search processing rules corresponding to rule harmonization, which is in accordance with the package, by comparison�message received packet with the rule harmonization, and in the case where the second identifier of the received packet corresponds to the first identifier associated with the retrieved processing rule, performs processing for the received packet according to a found rule processing.

16. An Assembly according to claim 13, in which
the mentioned second block performs search processing rules associated with the first identifier corresponding to the second identifier of the received packet, and in the case where the rule harmonization corresponding to the processing rule, is in accordance with the received packet, performs processing for the received packet according to a found rule processing.

17. The device control packet that contains:
the first block for generating rules for processing and the first identifier to identify the mentioned processing rules, the processing rule includes a rule approvals to be consistent with the information included in the package, and instructions for processing the packet that matches the rule harmonization,
the second block to send the rules for processing and the first node ID, the node determines whether to process the received packet according to the instruction depending on whether the second identifier attached to the received packet, the first identifier.

18. The method of communication, sod�Rashi:
the reception processing rules and the first identifier, the processing rule includes a rule approvals to be consistent with the information included in the package, and instructions for processing the packet that matches the rule approval; and
determining, whether to process the received packet according to the instruction depending on whether the second identifier of the received packet to the first identifier.

19. The method of communication, comprising:
the generation processing rules that specifies the rule for matching and processing for the package, which is in accordance with the rule harmonization;
the generation processing rules and the first identifier to identify the mentioned processing rules, the processing rule includes a rule approvals to be consistent with the information included in the package, and instructions for processing the packet that matches the rule approval; and
sending processing rules and the first node ID, the node determines whether to process the received packet according to the instruction depending on whether the second identifier attached to the received packet, the first identifier.

20. Machine-readable storage medium that stores the program, encouraging the node (s) provided in the communication system, for processing�e of the received packet, to perform the processing, consisting in:
the reception processing rules and the first identifier, the processing rule includes a rule approvals to be consistent with the information included in the packet, and processing for a packet that matches the rule approval; and
determining whether to perform processing for a received packet depending on whether the second identifier of the received packet to the first identifier.

21. Machine-readable storage medium storing a program that prompts provided in the communication system control device to control the host (s) that processes the received packet, to perform processing comprising:
generating rules for processing and the first identifier to identify the mentioned processing rules, the processing rule includes a rule approvals to be consistent with the information included in the package, and instructions for processing the packet that matches the rule approval; and
send processing rules and the first node ID, the node determines whether to process the received packet according to the instruction depending on whether the second identifier attached to the received packet, the first identifier.



 

Same patents:

FIELD: radio engineering, communication.

SUBSTANCE: invention discloses a system for achieving traffic wholesale based on a soft switch, which includes a soft switch and one or more trunk gateways connected with the soft switch via an IP network. Logical resources of the soft switch include one or more trunk groups, and each trunk group includes a plurality of trunk circuits. Each trunk gateway corresponds to one or more trunk groups, and part or all of main circuits of the trunk gateways establish a corresponding relationship with the trunk circuits of corresponding trunk groups. The logical resources including the trunk groups and the trunk circuits of the trunk groups are allocated to lessees, and charging and service configurations for the trunk groups allocated to the lessees are set.

EFFECT: improved efficiency of allocating traffic.

12 cl, 2 dwg

FIELD: radio engineering, communication.

SUBSTANCE: invention relates to a communication unit, a communication system, a communication method for measurement of state of a communication route. The communication system contains an adder section, a measurement section, a section of notification on measurement results, a processing rule storage section and a processing section. The adder section adds data for measurement of the communication state to the reception frame when the communication unit is an input boundary node of a network. The measurement section measures the communication state on the basis of data of measurement of the communication state when the communication unit is an output boundary node of a network. The section of notification notifies on measurement result the control unit which controls a network. The processing rule storage section addresses to data of the reception frame identifier and saves the processing rule, correlating the data of identification of the reception frame and processing of the reception frame. The processing section processes the reception frame on the basis of the processing rule.

EFFECT: possibility to switch a route at a high rate by means of server control according to network communication network.

16 cl, 15 dwg

FIELD: radio engineering, communication.

SUBSTANCE: invention relates to means of enabling one communication device to obtain access to data, such as a set of media items, accessible through another communication device. The method includes transmitting identification code information between a first communication device, a second communication device and a server; associating the identification code with the first communication device or providing said identification code with a set of media items accessible through the first communication device, wherein the set of media items is associated with access rules; sending, by the first communication device, information relating to said set of media items to the server, wherein the information includes access rules; receiving, by the server, the information relating to said set of media items; generating, by the server, account data relating to said set of media items and associated access rules; sending, by the server, the account data to the second communication device; receiving the account data by the second communication device, which enables the second communication device to access said set of media items.

EFFECT: obtaining access to a set of media items accessible through a different communication device.

39 cl, 9 dwg

FIELD: radio engineering, communication.

SUBSTANCE: method comprises: detecting change in the connection between an external station (E1) and a proxy gateway (G1); generating, if change has been detected, a proxy information serial number (PISN) either (i) through increment of the existing proxy information serial number (EPISN) for a specific MAC address pair (SMACAP) by at least one, or (ii) using the serial number of a message of item encoded by a standard hybrid wireless mesh protocol, wherein said serial number is greater than the serial number of a previously created message or item, encoded by the standard hybrid wireless mesh protocol; generating an extended proxy information item (EPI) through: a first field (F1), which indicates addition or removal of a connection, presence of a third field (F3) and presence of a fifth field (F5); a second field (F2), which includes an external MAC address (EMACA); a third field (F3), which includes a proxy MAC address (PMACA), wherein presence of the third field (F3) is indicated by the first field (F1); a fourth field (F4), which includes the proxy information serial number (PISN); a fifth field (F5), which includes the proxy information life (PILIFE), wherein presence of the fifth field (F5) is indicated by the first field (F1).

EFFECT: faster data transmission in a network.

7 cl, 5 dwg

FIELD: physics, computer engineering.

SUBSTANCE: invention relates to a method of transmitting information over a network. The method comprises transmitting from a first station to a second station, wherein the first station comprises at least one buffer memory for storing data packets intended for transmission, wherein the method includes steps where (a) the first station estimates the status of at least one buffer memory, (b) the first station transmits at least one buffer status packet which is the buffer memory status, wherein the method further includes a step (c) of adapting the value of the first parameter of the buffer status packets based on data traffic characteristics.

EFFECT: buffer status reporting (BSR) providing sufficient information on the real state of buffers of the second station during high activity thereof.

13 cl, 6 dwg

FIELD: physics, computer engineering.

SUBSTANCE: invention relates to wireless cellular/self-organizing (ad hoc) networks, particularly, to processing of route request messages at routing protocols to request. Proposed is the method of detection of route between source node and destination node including intermediate replay flag of reply of route request message by source node, avalanche distribution in said wireless network and reply to said request by means of the first intermediate node and having an actual route to destination node. Described are system and method for detection of the best route. Note here that route reply message becomes the first route message. Here, selection of the best route is effected between them and source node on the basis of cumulative metrics received in route request messages receive by destination node. Extra route reply message is created to perform single-address transmission thereof to source node.

EFFECT: fast detection of the route with optimum metrics between source node and one or more destination nodes.

26 cl, 6 dwg

FIELD: radio engineering, communication.

SUBSTANCE: invention relates to means of receiving/transmitting data in a wireless communication system. The method includes fragmenting a data packet into two or more fragments; configuring a medium access control protocol data unit (MAC PDU), the MAC PDU including at least one of the two or more fragments, a first header containing control information about the MAC PDU which includes the at least one of the two or more fragments, and a fragmentation extended header (FEH) providing information on the data packet fragment, wherein the first header contains an indicator indicating that the FEH is present following the first header, wherein the FEH contains a type field identifying a type of the FEH and the FEH has a variable length depending on whether the fragmented data packet is a real-time data packet or not, and wherein the FEH has a shorter length when the fragmented data packet is a real-time data packet than when the fragmented data packet is a non-real-time data packet; and transmitting the configured MAC PDU to a receiving side.

EFFECT: shorter header processing time.

12 cl, 13 dwg, 17 tbl

FIELD: physics, computer engineering.

SUBSTANCE: invention relates to Internet communication. The system employs network elements, which include an acceleration server, clients, agents and peers, where communication requests generated by applications are intercepted by a client in the same computer. The IP address of the server is transmitted to the acceleration server, which provides a list of agents for use for said IP address. One or more agents respond with a list of peers who previously possessed some or all of the content, which is a response to said request. The client then downloads data from said peers in parallel and in parts.

EFFECT: reducing network overload for content owners and Internet service providers.

16 cl, 15 dwg

FIELD: radio engineering, communication.

SUBSTANCE: invention relates to handover between technologies for multi-mode mobile devices and is designed for handover of a multi-mode mobile device from a first network technology to a second network technology. The method includes initiating by the multi-mode mobile device a first packet session in a first wireless network in an area of multi-technology wireless coverage and detecting by a multi-mode mobile device a second wireless network supporting a different access network technology than the first wireless network; determining a quality of service requirement for services supported by the session, and completing initial network entry and session establishment procedures by the multi-mode mobile device for a second session in the second wireless network when the first session includes at least one of a QoS sensitive service and real time service by the first wireless network and mobile device, and not completing initial network entry and session establishment procedures by the multi-mode mobile device when no QoS sensitive service and real time services are supported by the mobile device and first wireless network.

EFFECT: high throughput.

8 cl, 4 dwg

FIELD: measurement equipment.

SUBSTANCE: invention relates to drilling equipment, namely, to devices of sensor switching, which measure drilling parameters directly in process of drilling within a telemetering system. The device comprises a body and contact elements, is located inside a drilling pipe and made in the form of a jet element, including a supply balloon with compressed gas, a jet unit of command signal generation, jet triggers with a count input, jet units of inverters, jet logical elements "AND" and "OR" and a jet unit of output signal generation, besides, the output of the jet unit of command signal generation is connected with the input of jet triggers, outputs of which are connected with inputs of the jet unit of inverters, and outputs of inverters are connected with inputs of jet logical elements "AND" connected to outlets of bottomhole sensors, outputs of elements "AND" are connected with inputs of the logical element "OR", the output of which is connected to the input of the jet unit of output signal generation.

EFFECT: increased reliability of bottomhole sensor switching within a telemetering system.

1 dwg

FIELD: computer science, in particular, engineering of device for input-output of information in electronic computing machine, transferred along communication channels for transferring information; in particular, device is meant for acting as an intellectual multi-port telecommunication port of personal computer, used in mode of central transport station in data transfer networks for specialized use.

SUBSTANCE: multiplexer has system block, wherein four-channeled telegraph one-polar and two-polar modules are positioned, as well as four-channeled standard-joint C2 module, bi-impulse one-channeled and two-channeled modules, one-channeled telephone module, m modules of four-channeled asynchronous adapter, group control electronic board, and also block for adjustment and control, and combination board.

EFFECT: expanded functional capabilities, possible increase of number and types of connected input-output channels, possible synchronization with several types of specialized equipment.

4 cl, 4 dwg, 1 tbl

FIELD: network control; data acquisition on network topology.

SUBSTANCE: message requesting data acquisition on network topology that incorporates field limiting number of operations for message transfer from local station to adjacent ones is sent and following steps are repeated: request message receiving station returns response message and network topology data acquisition device finds out if number of message transfer operations has reached certain threshold value and terminates process if it is so, otherwise it sends request message to all adjacent stations.

EFFECT: facilitated procedure, reduced number of control errors.

7 cl, 2 dwg

FIELD: technology for serial addressing of following devices in networks with bus topology with one leading device of network and several following devices, possible use primarily for querying devices, used for automation of technological processes.

SUBSTANCE: method for serial addressing by leading device of following devices in networks with bus topology with one network leading device and several following devices includes receipt by following devices of flush impulse, of information about address from leading device, comparison of received information about address by each following device with its own address and switching of one following device to data transfer mode if information received about address matches its own address. As information about address, received by following device, number of addressing impulses is used, and during transfer of one following device to data exchange mode other following devices are maintained in active mode.

EFFECT: decreased addressing time during serial querying of all following devices in the network.

1 dwg

FIELD: technology for determining solutions concerning possibility of connection between network elements using functions of network control system.

SUBSTANCE: in accordance to method, each network element contains input ports and output ports, while each provides a set of connection points. Connection possibility tables contains data about possible internal connections between connection points of any input port and any output port of any network elements, controlled by network control system. Method allows each time during selection of certain network element for use in a route with its input port and its output port to receive solution at network control device level concerning connection capabilities for certain network element.

EFFECT: increased searching efficiency at level of network control system.

2 cl, 5 dwg

FIELD: engineering of technical means for complex protection of information during its storage and transfer.

SUBSTANCE: method for complex information protection is realized in following order: prior to transfer into communication channel or prior to recording into memory, state of used communication channel or information storage environment is analyzed, from M possible codes parameters of optimal (n,k) code for current status of channel or information storage end are determined, information subject to protection is split on q-nary symbols l bits long (q=2l) for each q-nary system gamma combinations l bits long are formed independently from information source, for each set of k informational q-nary symbols (n-k) excessive q-nary symbols are formed in accordance to rules of source binary (n,k) code, each q-nary symbol is subjected to encrypting stochastic transformation with participation of gamma, after receipt from communication channel or after reading from memory for each q-nary symbol combination of gamma with length l is generated, synchronously with transferring side, reverse stochastic decrypting transformation is performed for each q-nary symbol with participation of gamma, by means of checking expressions of source binary code localized are correctly read from memory or received q-nary symbols, untrustworthily localized symbols are deleted, integrity of message is restored by correcting non-localized and erased q-nary symbols of each block, expressing their values through values of trustworthily localized or already corrected q-nary symbols, if trustworthy restoration of integrity of code block is impossible it is deleted, number of deleted blocks is counted, optimality is determined within observation interval of used code with correction of errors for current state of channel, if code optimum criterion exceeds given minimal and maximal limits, code is replaced with optimal code synchronously at transferring and receiving parts of channel in accordance to maximum transfer speed criterion.

EFFECT: efficiency of each protection type and increased quality of maintenance of guaranteed characteristics of informational system.

18 cl

FIELD: transmitting messages with broadcast servicing parameters in wireless communication system supporting broadcast service.

SUBSTANCE: one of methods involves identification of service option number corresponding to set of broadcast transmission parameters. As an alternative, message identifies bit block corresponding to broadcast transmission parameters. Message can be transferred over service information transmission channel. Message for system supporting broadcast service identifies protocol stack for processing broadcast service and also identifies protocol stack for processing broadcast content.

EFFECT: enhanced efficiency and precision of data transfer and specific service rendering.

12 cl, 24 dwg

FIELD: data transmission in computer networks.

SUBSTANCE: in accordance to the invention, expandable, usable with various client-server informational systems, system of dynamically created program objects is used, wherein program objects are divided onto a fixed number of categories, which are matched with predetermined program interfaces, where creation of request to server and processing of response from server represent predetermined chains of program object method calls.

EFFECT: reduced load on communication line in client-server system.

2 cl, 6 dwg

FIELD: communications engineering, in particular, systems for controlling information exchange process in communication networks of industrial enterprises, in-plant networks and field communication units.

SUBSTANCE: system for controlling passage of documental information contains station for managing system for controlling information passage with operative-dispatching equipment, data transmission lines and phone communication connecting lines, station for controlling passage of documental information based on duty workplace for controlling passage of documental information and workplaces of two dispatchers, where each one of aforementioned workplaces is equipped with personal computer, containing system block, monitor, standard keyboard, "mouse" type graphical manipulator, printer and interface expander, block of adapters, block for connecting and distributing communication lines, client and connecting lines of service communications, service communications equipment, consisting of line commutation block and three control panels, one for each of aforementioned workplaces for controlling passage of documental information and of first and second dispatchers, n client stations for transferring documental information, each one of which contains group equipment block, four telegrapher panels and four end talking panels, data transmission lines and client phone communication lines, connected in a certain way.

EFFECT: increased trustworthiness of control over passage of documental information and increased quality of services, provided to consumers of aforementioned information.

2 cl, 2 dwg

FIELD: multi-layered content delivery.

SUBSTANCE: in accordance to the invention the network contains a content release layer, content delivery layer with at least one level of delivery sub-layer and a layer of boundary servicing, where the service release layer contains at least one node of Internet service provider (ICP), and is connected to first level delivery sub-layer in the content delivery layer, each delivery sub-layer contains at least one delivery unit, and the delivery sub-layer of the lowest level is connected to boundary service layer, the boundary service layer contains at least one boundary service area, and content, which is subject to release in a content release layer, is distributed through delivery node of first level delivery sub-layer, which is connected to content release layer, and further downwards level after level until the boundary service layer is reached.

EFFECT: distributed provision of services, optimized dispatching mode and local balancing of servicing load.

2 cl, 6 dwg

FIELD: mobile communications.

SUBSTANCE: each time when it is necessary to output information on available mobile telecommunication networks, it is required to determine if output of information on available mobile telecommunication networks is allowed on the basis of the number of information transmissions performed within certain period of time. If the transmission is allowed, information on available mobile telecommunication networks is transmitted and number of performed transmissions is registered; otherwise information transmission is stopped. When value of the period for decision making is changed, the record of transmission number is updated. If after stop of information transmission a request is received for information output, this request is left without answer or the information is transmitted after delay.

EFFECT: protection of Wireless Local Area Network (WLAN) against frequent interaction operations of network selection.

19 cl, 8 dwg

Up!