摘要:
Methods and apparatus for establishing communication links, used to support communications sessions with one or more end nodes, e.g., mobile devices, are described. Various features are directed to a mobile node controlling the establishment of initial links to a first access node and the establishment of new links from a first access node to a second access node during a handoff operation using highly efficient messages and signal.
摘要:
Methods and apparatus for storing, manipulating, retrieving, and forwarding state, e.g., context and other information, used to support communications sessions with one or more end nodes, e.g., mobile devices, are described. Various features are directed to a mobile node controlling the transfer of state from a first access node to a second access node during a handoff operation thereby eliminating any need for state transfer messages to be transmitted between the second access node and the first access node during handoff. Other features of the invention are directed to the use of a core network node to store state information. State information stored in the core node can be accessed and used by access nodes in cases where a mobile node does not send a state transfer message during a handoff, e.g., because communication with the first access node is lost or because such messages are not supported.
摘要:
Methods and apparatus (14) for storing, manipulating, retrieving, and forwarding state, e.g., context and other information, used to support communications sessions with one or more end nodes, e.g., mobile devices, are described. Various features are directed to a mobile node controlling the transfer of state from a first access node to a second access node during a handoff operation thereby eliminating any need for state transfer messages to be transmitted between the second access node and the first access node during handoff. Other features of the invention are directed to the use of a core network node to store state information. State information stored in the core node can be accessed and used by access nodes in cases where a mobile node does not send a state transfer message during a handoff, e.g., because communication with the first access node is lost or because such messages are not supported.
摘要:
The invention proposes an integrated process of authorizing and securing at layer 2 (L2) followed by layer 3 (L3). The L3 process treats the wireless link as any normal IP access link, and the L3 authorisation provides L3 processing, but also includes the L2 terminal authentication identifiers so that the L2 security parameters can also be returned. This means that the wireless link and the IP layer are not secured until after the L3 authorisation has completed and therefore the first IP messages that trigger authorisation are sent insecurely. This invention also provides methods to avoid these insecure messages presenting any opportunities to an attack. This inventions include methods to enable L3 before L2 authorisation when a user is roaming in a foreign network (480). These enable different types of AAA servers (450) in the foreign domain (480) to work with different types of AAA servers (460) in the home domain (470) to provide dynamic assignment of foreign mobility agents and the associated security associations between home and foreign mobility agents, as well a temporary account in the foreign domain (480). These methods apply both to standard MIP as well as Nested MIP, and to different types of Mobile Node apparatus and a range of user, host and terminal authentication models.
摘要:
Methods and apparatus for routing messages between an end node and an access node via another access node are described. Physical layer identification information is used when identifying a remote, e.g., adjacent, access node as a message destination. Thus, when a connection identifier based on one or more physical layer identifiers is available to a wireless terminal, e.g., from one or more downlink signals received from a destination access node, the wireless terminal can use the connection identifier corresponding to the destination node to route a message via an access node with which it has an established uplink connection. Such connection identifier information can be used even when other addressing information, e.g., network layer address information, associated with the destination access node, may not be available to the wireless terminal.
摘要:
Methods and apparatus for using end nodes, e.g., wireless terminals, to discover base stations and communicate information about discovered access nodes, e.g., base stations, to other access nodes in a system are described. As the wireless terminal roams in the system and new access nodes are encountered, one or more physically adjacent access nodes will be informed of the presence of the new access node as a result of communications with the wireless terminal. A message indicating an access node's inability to route a message to another access node which is known to a wireless terminal may trigger the wireless terminal to begin the process of updating access node routing and neighbor information.
摘要:
Methods and apparatus for routing messages between an end node and an access node via another access node are described. Physical layer identification information is used when identifying a remote, e.g., adjacent, access node as a message destination. Thus, when a connection identifier based on one or more physical layer identifiers is available to a wireless terminal, e.g., from one or more downlink signals received from a destination access node, the wireless terminal can use the connection identifier corresponding to the destination node to route a message via an access node with which it has an established uplink connection. Such connection identifier information can be used even when other addressing information, e.g., network layer address information, associated with the destination access node, may not be available to the wireless terminal.
摘要:
Methods and apparatus for storing, manipulating, retrieving, and forwarding state, e.g., context and other information, used to support communications sessions with one or more end nodes, e.g., mobile devices, are described. Various features are directed to a end node controlling the transfer of state from a first access node to a second access node during a handoff operation thereby eliminating any need for state transfer messages to be transmitted between the second access node and the first access node during handoff or the use of a core network node to support state transfer. As part of a handoff state information is obtained by an end node from the current access node in encrypted form and then communicated to the new access node to which the handoff operation is to be completed. The new access node, e.g., base station decrypts the state information and then uses it to support communications with the end node. While the information is communicated to and from the end node over wireless links, since it is encrypted by the first access node it is secure and can be trusted by the receiving, e.g., target, access node.
摘要:
Methods and apparatus for supporting network layer protocol version independent mobility management are described. In accordance with the present invention, the signaling method used to set-up the redirection (encapsulation or tunnel) is separated from the type of redirection being set-up. Through the use of a Protocol Independent Mobility Management Protocol and/or modules for implementing one or more aspects of the Protocol of the present Invention, Mobile IPv4 and IPv6 may run an top of any version of the network layer and can set-up tunnels of any network layer version over any other network layer version. Various features of the invention are used to establish tunnels which are capable of being used to commutate IPv4 and/or IPv6 packets (520, 530). Other features are directed to storing and using state information which allows IPv4 and/or IPv6 packets (520, 530) to be sent through a tunnel established using IPv4 or IPv6 type signaling (512).