摘要:
The present invention provides a method of route optimization. The method may include obtaining a packet associated with a first address associated, by a home agent, with a first mobile unit and routing the packet to a second address associated with a second mobile unit along a forward link of a communication path that bypasses the home agent.
摘要:
Example embodiments provide methods for handling the transition of a mobile device from a first network to a second network, the second network operating according to a different communications protocol from the first network. One example embodiment includes terminating forwarding of the data packets from the first network to the mobile device; rebuilding headers of unforwarded data packets at the first network; and sending the rebuilt data packets from the first network to the second network. Another example embodiment includes resetting a header compression state at the second network; receiving unforwarded data packets from the first network at the second network, the unforwarded data packets being data packets the first network had not yet forwarded to the mobile device; and sending the unforwarded data packets from the second network to the mobile device.
摘要:
Not Mobile IP (NMIP) comprises methods for implementing macro-mobility in an IP network, wherein macro-mobility means the ability of a node to change its network-layer, e.g., IP, address without disturbing existing transport-layer and application-layer sessions, e.g., conversations. When two NMIP nodes establish a new NMIP session, they exchange pseudo-random numbers, or nonces, and store the nonces in a session table. When a first node changes its IP address, the first node sends to the second node an address-update message that contains the new IP address and the first node's nonce. If the received nonce matches a nonce in the session table, then the second node updates its protocol control blocks with the new IP address, and sends an address-update reply message to the first node. Internet Protocol Security (IPsec) can be used to secure or replace the exchange of nonces.
摘要:
Techniques are disclosed for in-line storage of message authentication codes with respective encrypted data blocks. In one aspect, a given data block is encrypted and a message authentication code is generated for the encrypted data block. A target address is determined for storage of the encrypted data block in a memory. The target address is then modified to permit in-line storage of the message authentication code with the encrypted data block in the memory, and the encrypted data block and the message authentication code are transferred to the memory for storage at the modified address. Illustrative embodiments of the techniques advantageously facilitate secure off-chip storage of data in a processing system.
摘要:
Methods and systems are provided for securing integrated base stations, such as base station routers (BSRs), in which a SIM card is operatively coupled with a secured portion of a base station and a secure association is established therebetween to facilitate encryption key exchange between the secured portion of the base station and a core network.
摘要:
The present invention provides a method of allocating resources for transmission a broadcast data in a distributed network. One embodiment of the method may include selecting a first base station router from a plurality of base station routers. The first base station router is selected to allocate resources of the plurality of base station routers for providing the broadcast data. The method may also include providing the broadcast data to the plurality of base station routers. The broadcast data is configured for broadcast by each of the plurality of base station routers according to a resource allocation determined by the first base station router.
摘要:
The present invention provides a method of route optimization. The method may include obtaining a packet associated with a first address associated, by a home agent, with a first mobile unit and routing the packet to a second address associated with a second mobile unit along a forward link of a communication path that bypasses the home agent.
摘要:
Methods and systems are provided for securing integrated base stations, such as base station routers (BSRs), in which a SIM card is operatively coupled with a secured portion of a base station and a secure association is established therebetween to facilitate encryption key exchange between the secured portion of the base station and a core network.
摘要:
Methods and systems are provided for securing integrated base stations, such as base station routers (BSRs), in which a SIM card is operatively coupled with a secured portion of a base station and a secure association is established therebetween to facilitate encryption key exchange between the secured portion of the base station and a core network.
摘要:
A method in one example has: establishing communication between two mobile terminals in a base station routing architecture network; and optimizing routing between the two mobiles terminals without requiring all traffic to traverse an anchor point in the base station routing architecture network. An IP base station transceiver architecture utilizes network controlled mobility to provide a transparent connection between a mobile terminal and an anchor point in the network. This transparency hides the mobility associated with changing IP base station transceivers from the mobile terminal and reduces over-the-air signaling.