The present application claims priority from Japanese patent application Ser. Nos. 2005-062072, filed on Mar. 7, 2005 and 2005-376177, filed on Dec. 27, 2005, the contents of which are hereby incorporated by reference into this application.
The present invention relates to a communication network system that executes authentication for each domain. More specifically, the invention relates to a communication node, communication network and a method for updating database, wherein, when a terminal moves between two domains, an authentication database is updated based on a domain movement signal, thus enabling an improvement in identity of the authentication database.
The present invention further relates to a communication system that executes authentication in units of domain, and more specifically to a communication system, wherein, when requests for authentication reach to a communication node in the amount that exceeds the processing capacity of a communication node, another communication node carries out authentication for that communication node.
A ubiquitous network is expected to have a mode in which terminals on the order of one million units repeat participation in and pulling out from the network per second to use information distribution services or pier-to-pier services. In addition, since a terminal has a high mobility and is connected to an access point by wireless, it is likely to be subjected to fraudulent attacks from outside sources. For this reason, a ubiquitous network requires an authentication function for each terminal to ensure security thereof. However, when authentication is carried out for each terminal with a single server of a network, a delay in processing time will occur due to concentrated authentication traffics.
To solve the problem, a decentralized type of authentication system is proposed in Japanese Laid-Open Patent Publication No. 2005-244405. This publication states that an authentication control agent is allocated for each domain and authentication is performed in units of domain. In other words, for terminals within a domain, concentration of traffics can be avoided since an authentication control agent which functions in conjunction with a communication node will perform alternate processing, thus enabling high-speed authentication processing. Further, the communication node holds an authentication database, and processing to synchronize statuses of authentication databases among a plurality of communication nodes included in the core network is realized.
With a decentralized type of authentication system, an authentication control agent (hereafter AGT) which is a communication node is allocated in units of domain to perform authentication for each domain. In other words, since the AGT carries out authentication for terminals within a domain, it is possible to prevent concentration of authentication traffics, thus enabling faster authentication processing. Here, a domain implies an administrative unit of a network, and a typical example thereof is a local unit.
In addition, the AGT which is a communication node holds an authentication database within the AGT, and processing is realized for synchronizing status of authentication database among a plurality of communication nodes included in the core network.
US 2005/0232263 A1 is a counterpart application of JP 2005-244405 A.
In Non-patent Reference 1, the progress status of studies of a ubiquitous network authentication and agent technology group is stated.
[Non-Patent Reference 1]
Hitachi, Ltd., the University of Tokyo, Nippon Telegraph and Telephone Corporation, and Osaka University, “Ubiquitous network authentication and agent technology outline”, Nov. 29 to 30, 2004, Ubiquitous Authentication Agent Group, P. 5.
In the environment for the usage where many information terminals are connected to a network, not only such existing terminals whose data required for authentication has already been registered in an authentication database, but also many new terminals whose data has not been registered yet will participate in the network. Therefore, the status of the authentication database varies from hour to hour, since, for such new terminals, data registration is carried out in real time. On the other hand, a user moves from a domain to another domain at high speed, while carrying an information terminal with the user. At this time, the user wishes to immediately start communication even at the movement destination without re-registering data required for authentication. In addition, since data volume of the authentication database is enormous, it is difficult to identify the authentication databases in the whole network within a short period of time, and a system that transfers the authentication database after reducing the volume is required.
In the conventional decentralized type of authentication, synchronization of an authentication database is performed in units of new registration and it is not synchronized with shifting of a terminal. Therefore, when a terminal shifts, there is no guarantee that the authentication database at the movement destination and the authentication database before the shift are the same. In addition, when synchronization is performed in units of new registration, useless traffics occur. Further, the conventional decentralized type of authentication has a problem in that, since data volume of the authentication database is huge, transmission of information of all the authentication databases to a communication node at the movement destination presses traffics, thus causing deteriorated efficiency of use of a network.
In a ubiquitous network, a terminal moves from a domain to another, which generates deviation in the number of terminals that are located in each domain.
The AGT which executes authentication processing in a domain with concentrated terminals poses a problem in that load on a CPU increases and thus time required for authentication processing also increases, which decreases access processing capability (access throughput) of the entire network.
An object of the present invention is to provide a communication node, a communication network system and a method for updating database which enable to initiate communication at the time of handover without allowing a user to register terminal information anew at the movement destination.
Another object of the present invention is to provide a communication node and a communication system which will not deteriorate the access throughput of the entire network even when requests for authentication has reached to a communication node in the amount exceeding the processing capability thereof.
To achieve the object stated above, the present invention executes transfer of an authentication database by using a shift signal (a message to change the transfer destination) of the terminal as a trigger. In addition, new registration data is stored in the authentication database as differential data. As a result, since synchronization processing occurs at a point when a terminal that has registered new information makes a domain shift, registration data of the terminal has been transferred to the authentication database at the movement destination when the terminal reaches the movement destination. Therefore, a user can initiate communication at the movement destination without making a new registration anew. In addition, since the new registration data is stored as differential data and the differential data is transferred in bulk as block data, it is possible to reduce traffic volume, thus enabling to realize synchronization at high speed.
According to an aspect of the present invention, there is provided a communication system, which includes a plurality of communication nodes each incorporating a processor that executes authentication processing according to an authentication request from a terminal, the communication nodes being connected logically with one another. The communication system is characterized in that the communication nodes includes a first communication node that receives the authentication request and a second communication node that is connected logically to the first communication node; and the first communication node, upon receiving an authentication request from the terminal, judges the load status of the processor of the first communication node and transfers the authentication request to the second communication node if the processor is in a high-load status, or executes authentication processing from the terminal within the node if the processor is in a low-load status.
According to the aspect of the present invention, it is possible to prevent deterioration in access throughput of the entire network even if the number of simultaneous accesses has increased. Further, by effectively utilizing network resources, it is possible to realize reduction in operation costs.
Other problems, features and operation modes that are to be solved by the present invention will be more clearly understood from the description of the preferred embodiments which follow with reference to the accompanying drawings.
Preferred embodiments of the present invention will now be described in conjunction with the accompanying drawings, in which:
Hereinafter, preferred embodiments of the present invention will be described with reference to the accompanying drawings. Note that like elements are given like reference numerals, and descriptions thereof will not be repeated.
[Embodiment 1]
Terminals 10 (10A-1 to 10A-n) belongs to the domain 200A, and other terminals 10 (10B-1 to 10B-m) belongs to the domain 300B. Each terminal (10A-1 to 10A-n) is connected to the communication node 20-1 via communication lines 80 (80A-1 to 80A-n) and each terminal (10B-1 to 10B-m) is connected to the communication node 20-2 via communication lines 80 (80B-1 to 80B-m). With the embodiment, a wireless LAN (IEEE802.11) is applied to the communication lines 80.
A user moves around with the terminal 10A-n and participates in the domain 200A. At this time, the terminal 10A-n carries out authentication with the communication node 20-1, and communication with the communication network 100 becomes possible when the authentication is approved. When the authentication is not approved, the terminal 10A-n registers terminal information with the communication node 20-1 and repeats registration processes until the authentication is approved. The terminal 10A-n for which the authentication is once approved can move around with the communication on-going while the terminal 10A-n remains belonging to the domain 200A.
However, when the terminal 10A-n moves to the domain 300B from the domain 200A, it is normally necessary to carry out authentication again at the moving destination, or in the domain 300B. It should be noted that, with the embodiment, a description will be made assuming that the terminal 10A-n before movement and the terminal 10B-m at the moving destination are the same. The terminal 10 is under control of a communication node 20 which controls the domain concerned.
The I/O control processor 150 is connected to the data channels 40 and the authentication channels 50 via signal control lines 155 (155-1 to 155-n) to control signal flows between opposing communication nodes. In addition, the switching control processor 160 is connected to switching elements (not shown) of communication nodes to control signal flows between ports. The route calculation processor 170 determines the optimal route of a packet by referring to the network topology DB 190 and the routing table 310. The signaling processing processor 180 sets a communication route of the packet based on the calculation result.
The binding update message monitoring program 1403 monitors a binding update message (BU message) that is transmitted from the terminals 10 and transfers the BU message to the HA 30 after adding accompanying information. An authentication DB 210 is adapted to store therein authentication information, etc. of terminals included in a domain for referral when the terminals is authenticated. In addition, the authentication control agent program 1404 monitors a control message concerning terminal authentication.
It should be noted that, as is clear from
The terminal 10A-n which received ACK transmits a BU message containing address information on the terminal 10A-n and a communication node 20-1 to the HA 30 (T305). The HA 30 which received the BU message records the address information on the terminal 10A-n and the communication node 20-1 in the address control table. Thereafter, the terminal 10A-n transmits a communication message via the communication node 20-1 (T306) and initiates communication with a server (not shown) that is included in the communication network 100.
The description will be continued assuming that the terminal 10A-n moves from the domain A to a domain B after a while. Before making a move, the terminal 10A-n transmits a communication end message to the communication node 20-1 (T307). At a movement destination, a terminal 10B-m (the terminal 10A-n before the movement) receives an RA (Router Advertisement) from the communication node 20-2 (T311). In this case, since the prefix is different from the one of its own, the terminal 10B-m generates CoA (Care of Address) and transmits a BU message containing the CoA and address information on the terminal 10B-m to the HA 30 (T312). Thereafter, the HA 30 compares the terminal address contained in the received message and the information pre-recorded in the address control table, determines an address of communication node before the terminal movement, and transmits the address to the communication node 20-2 (T314).
Thereafter, the communication node 20-2 in the domain B transmits a DB update request message to the address of the communication node 20-1 in the domain A which was a domain before the terminal 10B-m moved (T315). Being triggered by the reception of the request message, the communication node 20-1 transmits a DB update message which contains the content of new registration to the authentication DB 210 to the communication node 20-2 (T316). The communication node which received the Update message updates the content of the authentication DB of its own.
Next, the terminal 10B-m transmits a participation request to the communication node 20-2 (T317). Since the communication node 20-2 has updated the content of the authentication DB 210 and owns data on the terminal 10B-m (terminal 10A-n) which is already registered on-line in the domain A, the communication node 20-2 transmits a participation permit to the terminal 10B-m (T318). In response to this, the terminal 10B-m transmits a communication message signal and resumes communication with the server included in the communication network 100 (T319).
Here, the method for registration to the authentication DB 210 is explained by way of example of the method for on-line registration wherein registration information is transmitted from a terminal. However, another method is possible in which a network administrator will directly communicate with the communication node 20-1 and add information on a terminal that participated in the domain anew. The same method will apply to other embodiments.
For a method for investigating an address of a communication node which controls the before-movement domain of the terminal 10B-m which made a movement to a new domain, a method for making an inquiry to the HA 30 has been described here. However, the inquiry may be made by including an address of the communication node which controls the before-movement domain of the terminal 10B-m in the terminal 10B-m.
Conversely, a DB update request message may be transmitted to the other communication nodes without the retrieval of the address of the communication node which controls the before-movement domain. Alternatively, the address of a communication node which is under communication processing may be acquired before a terminal transmits a communication end message to a communication node, and the message may be transmitted after movement of the terminal by adding the before-movement address information on the communication node to the BU.
Hereinafter, operation flows of the terminal 10 will be described with reference to
Referring to
Referring to
Hereinafter, operation flows of the communication node 20 will be described with reference to FIGS. 6 to 8. Here,
Referring to
Referring to
Upon receiving a participation request from the terminal 10B-m (S708), the communication node 20-2 retrieves the authentication DB 210 (S709). The communication node 20-2 makes a judgment on the retrieval result (S710). If user information exists (YES), the communication node 20-2 transmits a signal to permit participation (S712). If no user information exists (NO), the communication node 20-2 transmits a signal of authentication request (S712). Thereafter, the communication node 20-2 receives a terminal information registration (S713) and add the registration to the authentication DB (S714). Next, the communication node 20-2 makes a judgment on the addition result (S715). If addition is performed correctly, the communication node 20-2 transmits a participation permit (S711). When addition is not performed correctly, the process returns to Step 712 and the communication node 20-2 repeats Steps 712 to 715 until the terminal information registration is completed correctly. Note that, however, the upper limit of the number of repeating times will be set, and if the number of repetitions exceeds the specified number of times, the processes will be treated as time out.
Referring to
Hereinafter, flows of BU reception operations of the HA will be described with reference to
Hereinafter, a logic structure of the authentication DB will be described by using
It should be noted that an example of terminal registration has been shown here. However, the similar procedures may be employed to add registration information for the case wherein profile information of a user is used. Then, at a point when a DB update request signal is received, a DB update signal is transmitted while the differential registration information a to n (280-1 to 280-n) are put together as the block information 280. In addition, a logic structure of the authentication DB 210 is shown here, but, for actual mounting, the logic unit shall be divided in accordance with the file structure of a hard disk, an optical disk or a semiconductor memory.
Hereinafter, a method for updating an authentication DB will be described by using FIGS. 11 to 13. Here, FIGS. 11 to 13 are block diagrams of communication network. In addition, FIGS. 11 to 13 illustrate the transfer status of block information to communication nodes at the movement destination of terminals.
Referring to
By updating the authentication DB with such method, it is possible that the terminal 10B-m can initiate communication without registering terminal information anew in the movement-destination domain B (300B).
Referring to
By adopting such an updating method, it is possible to keep all authentication DBs that are connected to a network under the synchronized status, thus enabling to initiate communication without registering terminal information anew irrespective of terminal movement to any domain.
Referring to
In this case, the authentication DB of the communication node 20-5 which is in a domain E and is not directly connected to the communication node 20-1 will not be updated. However, the authentication DB will be updated when a terminal 10 which is in the domain B (300B) containing the communication node 20-2 moves to the domain A (200A) which contains the communication node 20-1.
By updating the authentication DB 210 with such a method, it is possible to reduce the volume of. authentication traffics in a network in comparison with a broadcast system shown in
According to the embodiment, a user who uses a terminal can resume communication without registering terminal information anew in the database at the destination even when conducting handover (movement between domains).
[Embodiment 2]
Next, a second embodiment will be described with reference to
An FA (Foreign Agent) 290A and terminals 10 (10A-1 to 10A-n) belongs to the domain 200A and another FA 290B and other terminals 10 (10B-1 to 10B-m) belongs to the domain 300B. Each terminal (10A-1 to 10A-n) is connected to the FA 290A via communication lines 80 (80A-1 to 80A-n) and each terminal (10B-1 to 10B-m) is connected to the FA 290B via communication lines 80 (80B-1 to 80B-m). With the embodiment, a wireless LAN (IEEE802.11) is applied to the communication lines 80.
The communication node 20 which is applied in the embodiment is similar to the communication node shown in
Next, operations of respective apparatuses which configure the communication network shown in
Upon receiving the ACK, the terminal 10A-n transmits a RR (Registration Request) message containing the addresses of the terminal 10A-n and the communication node 20-1 to the HA 30 (T335). Upon receiving the RR message, the HA 30 writes the addresses of the terminal 10A-n and the communication node 20-1 in an address management table. Thereafter, the terminal 10A-n transmits a communication message to the communication node 20-1 (T336) to initiate communication with a server or the like.
After a while, the terminal 10A-n moves from the domain A to the domain B. Before the movement, the terminal 10A-n transmits a communication end message to the communication node 20-1 (T337). At the destination, the terminal 10B-m (before-movement terminal 10A-n) receives an AA (Agent Advertisement) from an FA 290B (T341). Since the prefix of AA is different form the prefix of its own, the terminal 10B-m generates CoA (Care of Address) and transmits an RR (Registration Request) message containing the CoA to the FA 290B (T342). The FA 290B transfers the message to the HA 30 (T343). Upon receiving the message, the HA 30 retrieves the address control table for the address of the before-movement communication node 20-1, and transmits a registration response message to which the address thus found is added to the communication node 20-2 (T345).
The communication node 20-2 in the domain B transmits a DB update request message to the communication node 20-1 in the domain A which was the before-movement domain of the terminal 10B-m (T346). Being triggered by the reception of the message, the communication node 20-1 transmits a DB update message containing new registration content in the authentication DB 210 to the communication node 20-2 (T347). Upon receiving the message, the communication node 20-2 updates content of the authentication DB 210 of its own.
Thereafter, the terminal 10B-m transmits a participation request to the communication node 20-2 (T348). Since the communication node 20-2 has already updated the content of the authentication DB 210 and owns data on the terminal 10B-m (terminal 10A-n) which is already on-line registered in the authentication DB 210 in the domain A, the communication node 20-2 transmits a participation permit to the terminal 10B-m (T349). In response to this, the terminal 10B-m transmits a communication message signal and resumes communication with the server (T350).
According to the embodiment, a user who uses a terminal can resume communication without registering terminal information anew in the database at the destination even when conducting handover (movement between domains).
[Third Embodiment]
Next, a third embodiment will be described with reference to FIGS. 16 to 22.
Referring to
The domain 700 is an administrative unit of a network. For example, an ISP (Internet Service Provider) is a local unit for administrating a network. The domain 700 includes a communication node (AGT) which executes authentication processing according to an authentication request. Further, the domain 700 includes a zone 70 which is an area in which an AGT 80 is connectable to the terminal 100. For example, the domain A (700A) includes zones 70A-1 to 70A-5. These zones 70A-1 to 70C-5 will be generically referred to as the zone 70. At least one AGT among the domain 700 is connected with at least one AGT of another domain 700 via an authentication channel 50 and a data channel 40. The authentication channel 50 exchanges authentication data mainly for executing authentication of a terminal. The data channel 40 exchanges a packet from a terminal not shown.
The AGT 80 of a zone 70A-3 included in the domain A (700A), the AGT 80 of the zone 70A-5 included in the domain B (700B) and the AGT 80 of the zone 70C-5 included in the domain C (700C) are connected with each other with the authentication channel 50 and the data channel 40 via the communication network 100. The AGT 80 includes a HUB-type AGT and an associated AGT. The HUB-type AGT is an agent that is connected in a loop formed with unicursal polygons. The associated AGT is an agent that is not connected in a loop. Since the associated AGT is connected to a HUB-type AGT that is located nearest thereto, the packet transfer time between the HUB-type AGT and the associated AGT can be minimized.
For example, in the domain A (700A), the AGT 80 of the zone 70A-1, the AGT 80 of the zone 70A-3 and the AGT 80 of the zone 70A-4 are of the HUB-type AGTs, and the AGT 80 of the zone 70A-2 and the AGT 80 of the zone 70A-5 are of the associated AGT. The AGT 80 of the zone 70A-2 and the AGT 80 of the zone 70A-5 are each connected to the HUB-type AGT located nearest thereto. That is, the AGT 80 of the zone 70A-2 and the AGT 80 of the zone 70A-5 are connected to the AGT 80 of the zone 70A-1 and the AGT 80 of the zone 70A-3, respectively.
The I/O control processor 150, the CPU 120, the switching control processor 160, the main memory 140, the network topology DB 190, the route calculation processor 170, the signaling processing processor 180, the authentication DB 210 and the authentication processing processor 290 are connected with each other via the bus 110. The I/O control processor 150 is a processor that controls communication trough I/O lines 155-1 to 155-n. For example, the I/O lines include the links 90, etc. which connect AGTs 80, or connect terminals 10 and the AGT 80. It should be noted that the I/O output control processor 150 includes a buffer memory 151 which temporarily stores packets to be input or output by the I/O control lines 155-1 to 155-n. The CPU 120 includes an arithmetic and logic unit (ALU) 121 and a cache memory 122. The ALU 121 is a circuit that executes four-function calculations, logical operations, etc. The cache memory 122 is a storage area in which data frequently used by the CPU 120 is stored. The CPU 120 executes various programs to process authentication, etc.
The switching control processor 160 controls a switch fabric, not shown, to switch the I/O port from the I/O output lines 155-1 to 155-n. The main memory 140 is a storage area in which various programs to be executed by the CPU 120 are stored. The network topology DB 190 stores topologies of the AGTs 80 in the domain 700. The route calculation processor 170 is a processor that calculates a route for connecting the AGTs 80 in the domain 700. The signaling processing processor 180 sets out a logical path on the route calculated by the route calculation processor 170.
The authentication DB 210 stores authentication data that is required for authentication of the terminal 10. The authentication processing-processor 290 includes an arithmetic processing module which executes programs and a memory 291 that stores programs to be executed by the arithmetic processing module. In the memory 291, an authentication control agent program is stored. In addition, the authentication control agent program includes a CPU monitoring program and an event control program.
The AGT 80C, when judging that the CPU 120 of the AGT 80C is in the low-load status, executes authentication processing of the terminal 10 and transmits an ACK packet to the AGT 80A. On the other hand, the AGT 80B, when judging that the CPU 120 of the AGT 80B is in the high-load status, does not execute authentication processing. The AGT 80A, upon receiving an ACK packet from the AGT 80C, transfers the ACK packet to the terminal 10.
For example, the event control table 860 illustrated in
The AGT 80A, upon receiving a request packet, judges a load on the CPU 120 included in the AGT 80A (T702). In the processing for judging the CPU load, a judgment is made as to whether the load on the CPU of each AGT 80 is larger or not than the prescribed threshold. As a result, if the load on the CPU 120 is larger than the threshold, the load is judged to be high. If the load on the CPU 120 is smaller than the threshold, the load is judged to be low. Here, it shall be supposed that the AGT 80A makes judgment that the load on the CPU 120 is high. At this time, since it takes time when the AGT 80A executes the authentication processing, which deteriorates the throughput of the network, the AGT 80A tries to make another AGT to carry out the authentication processing for the AGT 80A. Thereafter, the AGT 80A transfers the request packet to the AGT 80B and the AGT 80C which are directly connected to the AGT 80A (T703).
The AGT 80B, upon receiving the transferred request packet, executes judgment 704. The AGT 80B judges that the load on the CPU 120 included in the AGT 80B is high and does not execute authentication processing. On the other hand, the AGT 80C, upon receiving a transferred request packet 703, executes judgment processing (T704). The AGT 80C judges that the load on CPU 120 included in the AGT 80C is low and execute authentication processing (T705). The AGT 80C, upon completing the authentication processing, transmits an ACK packet which includes an authentication result to the AGT 80A (T706). The AGT 80A, upon receiving the ACK packet, transfers the ACK packet to the terminal 10 (T707).
On the other hand, when the packet that the AGT 80 received is a request packet, the AGT 80 calculates load (the usage rate of the CPU) of the CPU 120 included in the AGT 80 (S804), and judges the load status of the CPU 120 (S805). For example, the AGT 80 judges the load is high when the occupancy rate of the CPU 120 is 80% or over, or alternatively, the AGT 80 can judge that the load is low when load on the CPU 120 is less than 80%.
The AGT 80, when judging that the CPU 120 is in a high-load status, transfers the request packet to all linked AGTs 80 connected directly to the current AGT 80 (S808) and returns to a stand-by status (S801). On the other hand, the AGT 80, when judging that the CPU 120 is in a low-load status, executes authentication processing (S806), transmits the ACK packet to the terminal which transmitted the request packet (S807) and returns to a stand-by status (S801).
With the third embodiment, as described above, the AGT 80A and the AGT 80B whose CPU 120 are in a high-load status do not execute authentication processing of the terminal 10, and, instead, the AGT 80C whose CPU 120 is in a low-load status executes authentication processing of the terminal 10. Therefore, it is possible to prevent deterioration in the access processing capability (access throughput) of the entire network without allowing time required for authentication processing to increase. It should be noted that, in Step 808, the request packet may be transferred to all AGTs 80 in the domain 700.
[Fourth Embodiment]
A fourth embodiment will be described with reference to FIGS. 23 to 27. In the fourth embodiment, the AGT 80A which received a request packet from the terminal 10 transmits a retrieval query to the AGT 80A and all AGTs 80 in a domain 700 if the CPU 120 included in the AGT 80A is in a high-load status. Then, the AGT 80A identifies an AGT 80 that is suitable for processing the request packet and transfers the request packet to the AGT 80 thus identified. It should be noted that, for the same configuration as that referred to for the third embodiment, the same reference numerals will be given to the same configurations, and redundant descriptions thereof will be omitted.
First, flows of packets of the embodiment will be described.
The AGT 80A, upon receiving a request packet from the terminal 10, transmits a retrieval query to the AGTs 80B to 80E if the CPU 120 included in the AGT 80A is in a high-load status. Each of the AGTs 80B to 80E, upon receiving the retrieval query, transmits a response packet to the AGT 80A.
Next, referring to
The AGT number 901 is a unique identifier of an AGT 80 which is in the same domain as the AGT 80A. The status 902 shows loading status of the CPU 120 included in the AGT 80. More specifically, the status 902 shows whether the CPU 120 is in a low-load status or in a high-load status. The round-trip time (RTT) 903 shows time from a point when the AGT 80A transmits a retrieval query to each of the AGTs 80B to 80E to a point when the AGT 80A receives a response packet from each of the AGTs 80B to 80E.
Each of the AGTs 80B to 80E, upon receiving the retrieval query, acquires the occupancy rate of the CPU 120 which is included in each of the AGTs. Then, each of the AGTs 80B to 80E transmits a response packet which includes identifiers for identifying the AGTs and information on the occupancy rate of the CPU 120 of each AGT to the AGT 80A (T1104).
The AGT 80A, upon receiving the response packet from each of the AGTs 80B to 80E, creates the retrieval table 900 based on the response packet. More specifically, the AGT 80A judges whether the CPU 120 included in each AGT is in a high-load status or in a low-load status based on information on the occupancy rate of the CPU 120 contained in the response packet and writes the status of the CPU 120 thus judged in the field of the status 902 of the retrieval table. In addition, the AGT 80A also writes time from a point when transmitting a query to receiving the response packet in the field of the round-trip time 903 of the retrieval table 900.
Next, the AGT 80A selects an AGT 80 that is suitable for executing authentication processing by referring to the retrieval table (T1105). In a status illustrated in
The AGT 80C that received the request packet executes authentication processing (T1107). The AGT 80C, upon completing authentication processing, transmits an ACK packet which contains an authentication result to the AGT 80A (T1108). The AGT 80A, upon receiving the ACK packet, transfers the ACK packet to the terminal 10 (T1109).
When the packet received by the AGT 80 is an ACK packet, the AGT 80 transmits the ACK packet to a terminal that transmitted a request packet (S1211) and returns to the stand-by status (S1201). On the other hand, when the packet received by the AGT 80 is a request packet, the process goes to Step 1204. In addition, when the packet received by the AGT 80 is a response packet to a query, the process goes to Step 1209. In Step 1203, when the packet received by the AGT 80 is a request packet, the AGT 80 calculates load. (an occupancy rate of the CPU) on the CPU 120 included in the AGT 80 (S1204).
Then, the AGT 80 judges the load status of the CPU 120 (S1205). For example, as with the third embodiment stated earlier, the AGT 80 can judge that the CPU 120 is in a high-load status if the occupancy rate of the CPU 120 is 80% or over, and that the CPU 120 is in a low-load status if the load on the CPU 120 is less than 80%. The AGT 80, when judging that the CPU.120 is in a high-load status, transmits a retrieval query to all AGTs in the domain (S1208) and returns to the stand-by status (S1201).
On the other hand, the AGT 80, when judging that the CPU 120 is in a low-load status, executes authentication processing (S1206), transmits an ACK packet to the terminal that transmitted a request packet (S1207) and returns to the stand-by status (S1201). In Step 1203, when the packet received by the AGT 80 is a response packet to a retrieval query, the AGT 80 creates the retrieval table 900 based on the response packet (S1209).
Thereafter, the AGT 80, by referring to the status 902 of the retrieval table 900, chooses an AGT wherein the CPU 120 is in a low-load status and the round-trip time is shortest. In a status illustrated in
With the fourth embodiment, as described above, since an AGT having low load and the shortest round-trip time is chosen as the terminal that executes authentication processing, it is possible to make the authentication time shortest by transferring the request packet to the chosen AGT and executing authentication processing at the transfer destination. As a result, it is possible to prevent deterioration in the access processing capability (access throughput) of the entire network.
[Fifth Embodiment]
A fifth embodiment will be described with reference to FIGS. 28 to 33. In this the embodiment, upon receiving a request packet from a terminal, an AGT 80 transfers the request packet to another AGT 80 that is chosen by an AGT control node 80F as an AGT suitable for processing the request packet. It should be noted that, the same configurations as those referred to in the third embodiment are given the same reference numerals, and redundant descriptions thereof will be omitted.
Upon receiving the request packet from the terminal 10, the AGT 80A, if the load status of the CPU 120 included in the AGT 80A is high, transmits a query packet to the AGT control node 80F. The AGT control node 80F chooses the AGT 80B that is suitable for executing authentication processing and transmits a response containing information adapted to identify the chosen AGT 80B to the AGT 80A. The AGT 80A transfers the request packet to the chosen AGT 80B based on the response transmitted from the AGT control node 80F. The AGT 80B, upon receiving the request packet, transmits an ACK packet containing an authentication result to the AGT 80A after the authentication processing is completed. The AGT 80A, upon receiving the ACK packet, transmits the ACK packet to the terminal 10.
The AGT control node 80F, upon receiving the query packet, retrieves the CPU control table 830 for the status 832 and chooses an AGT whose CPU 120 is in a low-load status. At this time, if CPUs 120 of a plurality of AGTs 80 are in a low-load status, the AGT control node 80F will choose an AGT that is positioned at the top of the CPU control table 830. With the status illustrated in
The AGT 80A, upon receiving the response packet, transfers the request packet to the AGT 80B which is chosen by the AGT control node 80F (T1405). The AGT 80B, upon receiving the request packet, carries out authentication processing for the AGT 80A (T1406) and transmits an ACK packet containing an authentication result to the AGT 80A (T1407). The AGT 80A, upon receiving the ACK packet, transfers the ACK packet to the terminal 10 (T1408).
On the other hand, in Step 1505, the AGT 80A, if judging that the CPU 120 is in a high-load status, transmits a query packet to the AGT control node 80F (S1508). Thereafter, the AGT 80A, upon receiving a response packet from the AGT control node 80F, transfers the request packet to the AGT chosen by the AGT control node 80F (S1509) and returns to the stand-by status (S1501).
If the packet received by the AGT control node 80F is of an update packet, the AGT control node 80F updates the status 832 of the CPU control table 830 based on the information contained in the update packet (S1604). On the other hand, when the packet received by the AGT control node 80F is a query packet, the AGT control node 80F retrieves for AGTs in which the status 832 of the CPU control table 830 is “low load” and choose an AGT that is suitable for executing authentication processing (S1605). Next, the AGT control node 80F transmits a response packet containing identification information on the chosen AGT to the AGT 80A (S1606) and returns to the AGT monitoring status (S1601).
With the embodiment, as described above, time required for choosing an AGT 80 that is suitable for executing authentication processing will not increase since the AGT control node 80F chooses an AGT 80 that is suitable for executing the authentication processing. In other words, since the AGT control node 80F performs processing such that it chooses in a domain an AGT 80 being in a low-load status, not the AGT 80A whose CPU 120 is in a high-load status, it is possible to prevent deterioration in the access processing capability (access throughput) of the entire network.
[Sixth Embodiment]
A Sixth embodiment will be described with reference to
All AGTs that belong to the domain A and domain B transmit an update packet at a prescribed interval to the AGT control node 80F. The method for updating the CPU control table 830 by the AGT control node 80F is the same as that of the fifth embodiment referred to earlier. The CPU control table of the sixth embodiment holds information on the status of the CPUs 120 included in all AGTs in the domains A and B. The other components are configured the same as those of the CPU control table 830 (
The AGT control node 80F, upon receiving the query packet, chooses an AGT that is suitable for executing authentication processing by referring to the status 832 of the CPU control table 830 and transmits a response packet to an AGT 80A that includes the identifier of the AGT thus chosen (T1704). The AGT 80A, upon receiving the response packet, transfers the request packet to the AGT 80G chosen by the AGT control node 80F (T1705). The AGT 80G, upon receiving the request packet, executes authentication processing (T1706) and transmits an ACK packet containing an authentication result to the AGT 80A (T1707).
The AGT 80A, upon receiving the ACK packet, transfers the ACK packet to the terminal 10 (T1708). It should be noted that, in the fourth embodiment, the AGT control node 80F is connected to all AGTs that belong to the domain A (700A) and domain B (700B). However, it is of course possible that the AGT control node 80F may further have connections with all AGTs belonging to a domain C (700C).
With the sixth embodiment, as described above, in addition to the advantages of the fifth embodiment referred to earlier, since the AGT control node 80F chooses an AGT 80 that is suitable for executing authentication processing among a plurality of domains, time required for choosing the AGT 80 that is suitable for executing the authentication processing will not increase.
In addition, since the AGT control node 80F holds information on the status of the CPU 120 included in all AGTs 80 that belong to other domains, the range for choosing the AGT that executes authentication processing becomes wider, which enables choosing of a more suitable AGT and preventing deterioration in the access processing capability (access throughput) of the entire network.
Number | Date | Country | Kind |
---|---|---|---|
2005-062072 | Mar 2005 | JP | national |
2005-376177 | Dec 2005 | JP | national |