摘要:
A technology is disclosed for reducing the number of encapsulations required when MAP forwards a packet to a mobile node which is layered within mobile networks, with mobile networks nested and multiple mobile routers chained behind MAP (Mobility Anchor Point). When a node 420 with Address A wants to send a packet to a node 450 with Address D, the node with Address A inserts a list of immediate addresses into the packet. The list includes a node 430 with Address B and a node 440 with Address C, and the destination address of the packet is set to a next hop destination Address B. The node with Address B receives the packet and swaps the destination address with Address C described in the list of immediate addresses. Similarly, the node with Address C processes the same swapping process, and then the packet reaches the node with Address D.
摘要:
Disclosed is a technique whereby a packet transferring apparatus (particularly, a tunnel entry point made to carry out packet encapsulation) becomes capable of detecting a tunneling loop signifying that a packet loops along the same route while undergoing encapsulation. With this technique, at packet transfer, a loop detection module of a router according to the present invention stores a TEL value (value of tunnel encapsulation limit for limiting the number of times of duplication of tunnel) set in an encapsulation header of this packet or stores a TEL value set in an encapsulation header of a packet sent back as an ICMP error In addition, the loop detection module analyzes an increase/decrease variation pattern of the stored TEL value relative to time and, in a case in which the pattern agrees with a unique pattern (sawtooth-like pattern) appearing at the occurrence of a tunneling loop, estimates that a tunneling loop has occurred.
摘要:
A technique is disclosed to decrease unnecessary routing during communication between a mobile node and a correspondent node in case a home agent of the mobile node is a mobile home agent. According to this technique, HA 112 positioned in a home network 102 and HA 114 of MN 130 are included. In a communication system, where HA 114 is a mobile home agent, and a mobile network 104 of HA 114 is hierarchized under the home network 102, HA 114, which is a home agent, discovers HA 112 positioned in the home network 102 when it is detected that it is away from the home network 102 and delegates binding cache entry of MN 130 under its own management to HA 112 so that HA 112 acts as a home agent for MN 130.
摘要:
There is disclosed a technique which can detect a packet routing loop (in particular, a nesting loop formed by MRs (mobile routers). According to this technique, an MR 114 connected as a subordinate to an MR 110 transmits a BU (Binding Update) message, to which added is an ARO (Access Router Option) including an address of a router (MR 110) connected at present, to an HA (Home Agent) 140 to which it pertains. Moreover, an MR 112 is connected as a subordinate to the MR 114 and, when connected to the MR 112, the MR 110 transmits a BU message, to which added is an ARO including an address of the MR 112, to the HA 140. At this time, the MR 112 also transmits a BU message, to which added is an ARO including an address of the MR 114, to the HA 140. Thus, the HA 140 can detect a routing loop formed by connections 120, 122 and 124.
摘要:
A technology is disclosed for efficiently and effectively conveying location and mobility related information about a mobile node to the network in order to facilitate Location and mobility related functions and services. According to this technology, in order to detect location and mobility (for example, movement velocity) of the mobile node, dissemination of information including the identification information of the mobile node and the count metric indicating the distance to the mobile node is performed among adjacent network nodes. The network node, upon receiving this message, stores the information in the message, and generates a new count metric by decreasing the count metric. The network node then sends the message including the identification information of the mobile node and this newly generated count metric to the other network nodes. For example the network node determines the priority of resource reservation for each mobile node based on the count metric of each mobile node.
摘要:
A technology is disclosed for reducing the burst of DAD messages which may be triggered due to the change of the network prefix when using the technique of the neighbor discovery proxy. According to this technology, in roaming from the access network link 101 to the access network link 102, MR 121 receives advertisement of a new prefix 172 from AR 112. MR 121 selects either one of MR 122 and MR 123 which are connected behind MR 121, and informs, for example only MR 122, that it is necessary to change the prefix. Thus, MR 122 and VMN 132 which is connected to the link 142 behind MR 122, configure new addresses, respectively. When address configuration is completed at the mobile network of MR 122, MR 121 informs another MR 123 that it is necessary to change the prefix, and then MR 123 and VMN 133 configure new addresses, respectively. This can prevent DAD messages generated along with the address configuration from flocking in a short period.
摘要:
Route optimization between a mobile network and correspondent node may be achieved by having the mobile router of the mobile network sending prefix-scoped binding update messages to the correspondent node. In order to allow the recipient of a prefix-scoped binding update message to verify the mobile network prefix information contained in the said prefix-scoped binding update message, the present invention provides a system, and associated methods and apparatus thereof, of using special cryptographic certificates to prove the ownership of the network prefixes. The certificates, or parameters derived from the certificates, are transmitted alongside the network prefix in the binding update message sent to the correspondent node. By verifying the network prefix against the certificates, or parameters derived from the certificates, a correspondent node can determine the validity of a prefix-scoped binding update message.
摘要:
Disclosed is a technique which enables a communication node connected to a router made to advertise a plurality of prefixes to use an address including an appropriate prefix. According to this technique, an MR (Mobile Router) (10) multicasts, to a mobile PAN (31), a router advertisement message including a prefix (MNPNEMO) derived from a home network to which it pertains, a prefix (MNPAR) advertised from an AR (access router) (10a) and prefix choice information indicative of one of the prefixes to be selected on the basis of a function relative to the mobile PAN (31). A node (VN 20a, LN 20b) connected to the mobile PAN refers to the prefix choice information of the router advertisement message so as to select a prefix appropriate thereto for configuring its own global address.
摘要:
The present invention provides a method and system for efficiently scheduling wireless LAN traffic, giving the network the ability to serve both real-time and non-real time applications concurrently, while maintaining a requested level of quality of service for the real time application. It describes a method for scheduling quality of service traffic and a method to optimize this schedule thereby reducing the overall amount of time that is required for serving quality of service traffic (which is coordinated by a centralized network coordinator entity) and increasing the bandwidth available for non-real-time traffic. One application of such a scheduler would be WLANs that carry AV streams, such as may be found in a home based WLAN. Furthermore, a method is provided for announcing the schedule to all nodes in a wireless network to, for example, implement a power savings feature, thereby optimizing battery life and reducing the size and weight of portable network access terminals.
摘要:
According to the present invention, connection can be always maintained between the mobile node and the access router, and disruption of on-going transport session can be prevented by making effective use of two architectures (hierarchical and mesh architectures). The mobile nodes 1000-1, 1000-2 and 1000-3 are attached to the access router 1100-1. When the mobile node maintains link layer connectivity with the access router, it is in the hierarchical mode, whereas when the link layer connectivity is lost, it enters the mesh mode. In the mesh mode, the mobile node attempts to establish virtual link layer connectivity with the access router through other nodes by using mesh network protocol such as MANET. In the mesh mode, the packet is capsulated between the mobile node and the access router when the mobile node and the peer 1400-1 communicate with each other.