Research on the System Structure of IPV9 Based on TCP/IP/M

Research on the System Structure of IPV9 Based on TCP/IP/M

International Journal of Advanced Network, Monitoring and Controls Volume 04, No.03, 2019 Research on the System Structure of IPV9 Based on TCP/IP/M Wang Jianguo Xie Jianping 1. State and Provincial Joint Engineering Lab. of 1. Chinese Decimal Network Working Group Advanced Network, Monitoring and Control Shanghai, China 2. Xi'an, China Shanghai Decimal System Network Information 2. School of Computer Science and Engineering Technology Ltd. Xi'an Technological University e-mail: [email protected] Xi'an, China e-mail: [email protected] Wang Zhongsheng Zhong Wei 1. School of Computer Science and Engineering 1. Chinese Decimal Network Working Group Xi'an Technological University Shanghai, China Xi'an, China 2. Shanghai Decimal System Network Information 2. State and Provincial Joint Engineering Lab. of Technology Ltd. Advanced Network, Monitoring and Control e-mail: [email protected] Xi'an, China e-mail: [email protected] Abstract—Network system structure is the basis of network theory, which requires the establishment of a link before data communication. The design of network model can change the transmission and the withdrawal of the link after the network structure from the root, solve the deficiency of the transmission is completed. It solves the problem of original network system, and meet the new demand of the high-quality real-time media communication caused by the future network. TCP/IP as the core network technology is integration of three networks (communication network, successful, it has shortcomings but is a reasonable existence, broadcasting network and Internet) from the underlying will continue to play a role. Considering the compatibility with structure of the network, realizes the long-distance and the original network, the new network model needs to be large-traffic data transmission of the future network, and lays compatible with the existing TCP/IP four-layer model, at the a solid foundation for the digital currency and virtual same time; it can provide a better technical system to currency of the Internet. The system framework is verified by implement the future network. Based on the Internet practical application. It have been deployed to verify the three-layer/four-layer hybrid architecture TCP/IP/M and compatibility and reliable transmission between IPV9 network ISO/IEC next-generation Internet standard solutions, this and the existing network, under the independent, reliable, paper proposes the IPV9 system architecture, which can secure and controllable network architecture, a new directly transmit audio and video data with three layers on the generation of master root server and 13 root domain name premise of not affecting the existing four-layer network servers. transmission. The hybrid structure is a new transmission DOI: 10.21307/ijanmc-2019-054 1 International Journal of Advanced Network, Monitoring and Controls Volume 04, No.03, 2019 Keywords-TCP/IP/M; Next Generation Internet; IPV9; Big enterprises, research institutions and universities to Data Stream develop the IPV9 protocol with independent intellectual property of the digital domain name and I. NEW GENERATION NETWORK SYSTEM IPV9 other technical standards. By June 2016, the Ministry IPv9 protocol as one of the future network concepts, of Industry and Information Technology announced IETF proposed some basic dreams of IPv9 in 1994, the approval of the four standards of the IPV9 system. and looked forward to the idea of network in the 21st Through unremitting efforts in various aspects, the century. Such as: 1024-bit length address, direct IPV9 system mother root server, the main root server, routing and the 42 layer routing addressing method. and 13 root name servers named after N-Z letter have However, due to the lack of research results of basic been developed. theories, address stratification technology, high research and development costs, intellectual property II. THE DESIGN OF IPV9 ARCHITECTURE rights and other factors, the research publicly failed. In The conventional packet switching of TCP/IP 1997, the IPv9 working group was disbanded and protocol does not support real time application and intellectual property and patent results were not circuit switching application, that is, the transmission obtained. of sound or image by circuit in the four-layer protocol. TCP/IP is a connectionless unreliable packet protocol Inspired by IPv9, Chinese scholars have established with a maximum packet size of 1514 bytes. The main a new generation of network work expert teams. Based idea of IPV9 design is to combine the IP protocol of on the patent "Method of Using Whole Digital Code to TCP/IP with circuit switching, and make use of routers Assign Addresses for Computer", they have completed compatible with both protocols and a series of the development of a new generation of network protocols, so that the addresses of IPv4, IPv6 and IPV9 system after more than 20 years of research and can be used simultaneously on the Internet. development. The development of the system, its theory and practice has reflected the novelty and A. The hierarchy of IPV9 originality. The decimal network has experienced the IPV9 system adopts the mixed network architecture stages of assumption, theory, model, prototype, of three-layer circuit/four-layer grouping, adopts the small-scale trial and demonstration project rules of verify first and then communication, address implementation. Since September 2001, the Ministry encryption, the address length could alter from 16-bie of Information Industry of China has decided to to 2048-bit, resource reservation, and adopts character establish "Decimal Network Standard Working Group direct route transmission mode, which apply virtual (also known as IPV9 Working Group)", and real circuit to ensure the transmission security. The "New-generation Security and Controllable Network architecture diagram is shown in Figure 1. Expert Working Group", and "Electronic Label Working Group Data", united domestic and foreign 2 International Journal of Advanced Network, Monitoring and Controls Volume 04, No.03, 2019 FN Three/four Layer 1 Network Application Layer Model TCP/IP/M 2 TCP UDP M Application Layer 3 IP Transport ARP ARP Layer Virtual Internetw- Real orking Circuit Layer 4 Network Interface ENET ENET Layer Ethernet cable 1 Ethernet cable 2 Figure 1. The Architecture Diagram B. IPV9 connection method A four/three-layer transport protocol with a new transmit theory that is not removed connect link until TCP/IP/M protocol has developed absolute code finished the transmission. stream and long stream code classes, a long packet can reach more than tens of megabytes. It can transmit The connection mode is shown in Figure 2. telephone and cable TV data directly in three layers without affecting existing four-layer networks. Internet Internet four Virtual circuit layers connection Composite time division virtual Three circuit,User exclusive bandwidth Three layers (Network cable, optical fiber) layers Voice communication, file transfer, User Beta User Alpha video conferencing four Internet layers Internet four layers Figure 2. The connection mode 3 International Journal of Advanced Network, Monitoring and Controls Volume 04, No.03, 2019 IPV9 automatic allocation access system, the and realizing cross-level, cross-region, cross-system, system uses OpenVpn to set up virtual private network, cross-department and cross-business collaborative uses IP TUNNEL for 9over4 data transmission, TR069 management and services. We will build an integrated as the control protocol to push data to the terminal, to national big data center and gateway bureau through achieve the IPv4 subnet to subnet or IPV9 transmission. data centralization and sharing, and build a secure and It can be a transmission between different individual controllable information technology system. routes or between the same enterprise routes, or C. Root domain name server between enterprise or individual routes to backbone IPV9 root DNS server is mainly used to manage the routes. OpenVpn was adopted to penetrate the subnet Internet and decimal network home directory. IPV9 to form the proprietary virtual network, and on the root name server system consists of a parent root basis of the virtual network, IP TUNNEL was server, primary root server, 13 root name servers implemented to complete the data transmission of named by N-Z, Top-level domain server named 9over4.In the virtual private network, the TR069 by·CHN,·USA,·HKG,·MAC and other three protocol is used to push the automatically assigned characters 239 countries and regions, routing personal address or manually assigned business management system, application server and 10 Gigabit address, and at the same time, the 4to9 of the backbone routers. The China Decimal Network individual or business is automatically pushed to the Standards Working Group is responsible for device router.IPV9 network management system is a management of the decimal network root name server, set of comprehensive network management system domain name system, and IP address. based on web interface that provides network monitoring and other functions. It can monitor various The principle of root domain name server is that 13 network parameters and server parameters to ensure root domain servers first read the primary root server, the safe operation of server system. Both IPV4 and and then read the parent root server to obtain the data, IPV9 protocols are supported and flexible notification and then spread to the whole network. The 13 root mechanisms are provided

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    13 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us