摘要:
Disclosed is a technique of, in a network conducting network based local mobility management, suppressing generation of signaling and an increase of processing load on a network entity and preventing a delay. According to this technique, a mobile node (MN 130) receives specific information (a token) including an interface identifier and a binding identifier, for example, from a network side (MAG 120) when connecting therewith first. When the mobile node conducts a handover, the mobile node notifies a next connecting MAG 122 of the token. The MAG receiving the token can judge based on this token whether the connection by the mobile node is due to a handover changing a connection point for a certain interface or due to a new connection using a different interface without making an inquiry to other network nodes.
摘要:
A technique is disclosed, by which generation of redundant signaling caused by processing to establish route optimization can be suppressed. According to this technique, an overlay network is formed on a network, and an overlay network service of home agent is provided by a pHA (proxy home agent) 124. An MR (mobile router) 130 and a VMN (visiting mobile node) 140 connected to the mobile network are both subscribed in the overlay network service. In this case, when MR is going to perform optimization processing of a route to a home agent of VMN, pHA transmits change-HA messages 216 and 218 to notify VMN to change the home agent to the home agent of MR. When VMN changes the home agent to the home agent of MR, MR recognizes that processing of route optimization to the home agent of VMN is not needed.
摘要:
The present invention provides a technique to prevent the generation of a large number of binding update messages in an overlay network when a mobile node changes connection points. According to this technique, in a communication system where a home agent HA 1210 for holding BCE (Binding Cache Entry) of a mobile node MN 1220 and a plurality of proxy home agents pHA 1212, pHA 1214 and pHA 1216 each capable to operate as a proxy of HA 1210 are overlaid on a global communication network 1200, and BCE of MN 1220 held by HA 1210 is delegated to pHA 1214 where MN 1220 is connected. Further, when MN 1220 is re-connected to pHA 1216 of move destination different from pHA 114 of move source, BCE of MN 1220 delegated to pHA 1214 of move source is re-delegated to pHA 1216 of move destination.
摘要:
The present invention provides a solution to the mobile terminal address management in the WLAN inter-working. By using the access control framework, the mobile terminal could obtain the address, and setup the tunnel together with the granting of service access. The management process would be shielded by the inherent encryption and protection of the access control process, and thus does not need extra security setup procedures to be performed. The invention also provides a method for the terminal to obtain address that binds to the session, using a fine grain service authorization procedure. The terminal could maintain multiple addresses when accessing multiple parallel sessions. The address management is also integrated with the policy control mechanisms. The policy control would provide means for the terminal and its home network to configure the WLAN when necessary after an address alternation. QoS, or tunnelling information would be modified and provisioned according to the new status using channels available in the existing policy control procedures. By this, a smooth address transition in the roaming time could be achieved, and QoS interruption could be minimized.
摘要:
By introducing a hierarchical encryption scheme and the use of asymmetric cryptography, the critical information in message exchanges is concealed from unauthorized entities. This helps greatly in preventing man-in-the-middle attacks faced by inter-working. In addition, access control is conducted by introducing a network structure having a rule interpreter that is capable of mapping general rules to WLAN specific commands. It obviates the needs for mobile user's home network to understand information about every WLAN it is inter-worked with. A common interface independent of WLAN technologies could be used by the home network for all the WLANs. The above conception provides a solution to the problems of the protection of user identification information and access control in the inter-working of WLAN.
摘要:
A method for accessing a Personal Network (PN) from a Guest device. In this method, the Guest device (18) receives a service key from a Master device (16) of the Personal Network (15) to which the Guest device wishes to access. The Guest device (18) then sends the Device ID of the Master device (16) to a Proxy (12) The Proxy (12) associates a route for accessing the Master device (16) from the Guest device (18) based on the Device ID of the Master device (16) and the Device ID of the Guest device (18), and sends an acknowledgement to the Guest device (13). The Proxy (12) may use its Proxy data to further filter requests based on pre-registration status of requesting Guest Devices (18). If already pre-registered, the Proxy (12) routes the PN request of the Guest Device (18) to the Personal Network Management (11). The Personal Network Management (11) verifies the service key to authenticate the Guest device (18).
摘要:
Disclosed is a technique whereby a tunnel entry point, which encapsulates a packet (generates a tunnel packet), can detect the presence of a tunneling loop causing a packet to loop the same path while encapsulated. According to this technique, upon receipt of a packet from a source node (source) 1100, TEP (tunnel entry point) 1120 inserts it into a tunnel packet header for encapsulation. Upon receipt of tunnel packets from TEP 1120 and TEP 1140, each of TEP 1140 and TEP 1160 copies the identifier of the original tunnel packet header to a new tunnel packet header for encapsulation. When this tunnel packet returns to TEP 1120 due to a tunneling loop, the tunneling loop is detected by referring to the identifier in the received tunnel packet.
摘要:
A technique is disclosed whereby, in the case of wherein a communication node includes both a mobility management function and a multihoming function, based on a condition that occurs due to moving, an appropriate address can be selected from multiple addresses in a multihomed state. According to the technique, a mobility condition determination unit 126, provided in an MIP controller 120 that manages moving of a communication node, obtains and examines various conditions that has occurred as a communication node is moving, selects an appropriate HoA (e.g., the home address of an MN1) for the current connection situation, and transmits, to a multihoming controller 130, a notification indicating that a set of the selected HoA and a CoA is appropriate addresses to be used. Upon receiving the notification from the mobility condition determination unit, the multihoming controller transmits, to the MIP controller, an address (Addr2) consonant with the received HoA, and the MIP controller performs packet communication using the HoA or the CoA consonant with the address.
摘要:
A technique for flexibly performing processes depending on the type of a path for providing an additional service when there are a plurality of paths for providing additional services for the same session between terminals communicating with each other over a network is disclosed. According to the technique, when a mobile terminal (MN 100) establishes a QoS path using NSIS to a corresponding node (CN 124) on different types of data communication paths, a signaling message including information (MIE) representing the path type is created and transmitted. Each node (QNE) with an NSIS QoS function, which has received the message, identifies a plurality of QoS paths by comparing the MIE, a session identifier and a flow identifier, and performs processing of the QoS paths according to control information (CI) from MNs or/and the policy which the QNE has.
摘要:
A system of access control in a data communication network comprising of a privacy unaware Guest Device, a privacy unaware Slave device, a PN Server and a Master Device wherein the access of a privacy unaware Slave device by a privacy unaware Guest Device is restricted by a PN Server, which intercepts all session initiations concerned with the Slave Device. A method of access control of the system comprises the steps of Access request by Guest Device privacy mode processing by PN Server privacy decision processing by Master Device; and privacy response processing by PN Server.