摘要:
A method is provided in one example and includes receiving signaling data associated with a request for a multicast channel, the request includes an Internet protocol version 6 (IPv6) source and an IPv6 group address. The method may also include identifying an Internet protocol version 4 (IPv4) source and an IPv4 group address to be mapped to the IPv6 source and the IPv6 group address. The signaling data can be converted from a first protocol to a second protocol. The converted signaling data can be communicated to a network element. In more particular embodiments, the network element is an IP edge router configured to join the multicast channel and stream data in response to receiving the converted signaling data. The IP edge router can be configured to perform an encapsulation operation to transport IPv6 multicast packets within an IPv4 multicast channel.
摘要:
A method is provided in one example and includes receiving signaling data associated with a request for a multicast channel, the request includes an Internet protocol version 6 (IPv6) source and an IPv6 group address. The method may also include identifying an Internet protocol version 4 (IPv4) source and an IPv4 group address to be mapped to the IPv6 source and the IPv6 group address. The signaling data can be converted from a first protocol to a second protocol. The converted signaling data can be communicated to a network element. In more particular embodiments, the network element is an IP edge router configured to join the multicast channel and stream data in response to receiving the converted signaling data. The IP edge router can be configured to perform an encapsulation operation to transport IPv6 multicast packets within an IPv4 multicast channel.
摘要:
A response to a Domain Name System (DNS) query can be protected with authentication information to be used by a host that originated the query. In one example, a DNS server is not among servers that can be authenticated by the Domain Name System Security Extensions (DNSSEC). The DNS server generates a public-private key pair and uses the private key for signing DNS resolutions. The corresponding public key can be distributed to hosts that will communicate with the DNS server. In various implementations, the public key is distributed by the DNS server and/or routers or as part of a neighbor discovery interaction. In one example, the public key is distributed in certificate path advertisements of the IPv6 Secure Neighbor Discovery Protocol (SEND) protocol.
摘要:
A method, in accordance with particular embodiments, includes receiving an interest solicitation message advertising an availability of data from at least one source of a plurality of sources. The solicitation message comprises a source identifier indentifying the at least one source and a group identifier identifying at least one group. The method also includes sending a null message to a rendezvous node. The null message comprises the source identifier and the group identifier. The method additionally includes receiving, via the rendezvous node, a join message indicating that at least one endpoint has requested to join the at least one group identified by the group identifier. The method further includes sending a start message to the at least one source. The start message indicates that at least one endpoint has requested to join the group. The method also includes, receiving a first portion of the data after sending the start message.
摘要:
A response to a Domain Name System (DNS) query can be protected with authentication information to be used by a host that originated the query. In one example, a DNS server is not among servers that can be authenticated by the Domain Name System Security Extensions (DNSSEC). The DNS server generates a public-private key pair and uses the private key for signing DNS resolutions. The corresponding public key can be distributed to hosts that will communicate with the DNS server. In various implementations, the public key is distributed by the DNS server and/or routers or as part of a neighbor discovery interaction. In one example, the public key is distributed in certificate path advertisements of the IPv6 Secure Neighbor Discovery Protocol (SEND) protocol.