摘要:
Disclosed is a technique for reducing delay when a mobile communication terminal starts communication and reducing consumption of a power resource of the mobile communication terminal. An MN (mobile node) (1012) has plural interfaces (IF-1 (1030) and IF-2 (1028)). One interface IF-1 is connected to a connection point (serving PoA (1008)). When switching over from communication using the IF-1 to communication using the IF-2, the MN transmits a paging request message via the IF-1 and the serving PoA to a connection point (target PoA (1010)) attempted to connect using the IF-2. The target PoA that has received the paging request message reduces a beacon transmission cycle and sets transmission slots for the MN so that the connection of the MN can be established efficiently.
摘要:
Disclosed is a technique for reducing delay when a mobile communication terminal starts communication and reducing consumption of a power resource of the mobile communication terminal. An MN (mobile node) (1012) has plural interfaces (IF-1 (1030) and IF-2 (1028)). One interface IF-1 is connected to a connection point (serving PoA (1008)). When switching over from communication using the IF-1 to communication using the IF-2, the MN transmits a paging request message via the IF-1 and the serving PoA to a connection point (target PoA (1010)) attempted to connect using the IF-2. The target PoA that has received the paging request message reduces a beacon transmission cycle and sets transmission slots for the MN so that the connection of the MN can be established efficiently.
摘要:
Disclosed is a technique which provides a handover processing method and the like which enable a smooth handover without service interruption and allow a desired handover to be performed. The technique includes the steps of: generating by a mobile node 100 a message including certain information to prioritize a connection of the mobile node to a desired access network among multiple access networks; transmitting the generated message from the mobile node to a base station located in the desired access network or a base station located in a currently-connected access network; and rejecting by a connection managing apparatus 104 for managing connections of the mobile node a path switching request from a base station of an access network other than the desired access network, the rejection being made according to certain information acquired through a base station that receives the transmitted message.
摘要:
A technique disclosed enables a node having a plurality of interfaces to conduct connection of the plurality of interfaces simultaneously in a communication network domain. A mobile node having a plurality of interfaces connects one of the interfaces with a MAG (mobile access gateway) 11a to take part in a NetLMM domain 18 using a NetLMM protocol, and a LMA (local mobility anchor) 13 includes association information with the MAG 11a registered therein. When the mobile node connects another interface with another MAG 11b, the LMA receives a registration request for association information of this mobile node with the MAG 11b, and makes an inquiry to the already registered MAG 11a as to whether link with the mobile node is still valid or not. If the link is valid, the LMA keeps association information of the mobile node with both of the MAGs 11a and 11b.
摘要:
A technique to optimize packet transfer in a network is disclosed. According to this technique, a mobile node (MN) 1000 having a plurality of interfaces transmits a filter rule where setting conditions are defined to each of MAG (motility access gateway) 1060 and MAG 1080 connected for the purpose of setting the packet received by each of the interfaces. MAG transfers the received filter rule to a local mobility anchor (LMA) 1010. After analyzing the filter rule, LMA specifies the network node where the filter rule should be reflected and updates the filter rule only to this specific network node. For instance, in case MN desires that a packet from CN 1090 is received via a path 1002, LMA manages that a packet destined to MN as transmitted from CN is to be transferred to MAG 1060 with respect to MAG 1020.
摘要:
The invention discloses a technique to efficiently realize a routing based on preference of a mobile terminal in case the mobile terminal is connected to a mobility management domain of network base different from a home network domain. According to this technique, a mobile terminal (mobile node; MN) 101 has two interfaces, and these interfaces are connected to a mobility management domain (local mobility domain) 11 under the condition that these interfaces are connected to MAG 111 and MAG 112 respectively. In case MN itself decides one of the interfaces to be used for a specific packet flow communication, a routing preference to instruct that the packet flow is to be sent on a routing via the interface is notified to MAG. When MAG notifies the routing preference to LMA (filtering agent) 110, filtering based on the routing preference is carried out.
摘要:
A technique disclosed enables a node having a plurality of interfaces to conduct connection of the plurality of interfaces simultaneously in a communication network domain. A mobile node having a plurality of interfaces connects one of the interfaces with a MAG (mobile access gateway) 11a to take part in a NetLMM domain 18 using a NetLMM protocol, and a LMA (local mobility anchor) 13 includes association information with the MAG 11a registered therein. When the mobile node connects another interface with another MAG 11b, the LMA receives a registration request for association information of this mobile node with the MAG 11b, and makes an inquiry to the already registered MAG 11a as to whether link with the mobile node is still valid or not. If the link is valid, the LMA keeps association information of the mobile node with both of the MAGs 11a and 11b.
摘要:
There is provided a technique for reducing the number of messages handled in a Return Routability (RR) procedure for performing authentication between a mobile node (MN) and a peer communication node (CN). According to the technique, an MN 1 pairs two or more care-of addresses assigned respectively to one or more interfaces, and sends a CN 3 one or more first messages including a second care-of address by setting a first care-of address in each pair of care-of addresses as a source address. The CN 3 receives the one or more first messages, generates signature tokens for the first and second care-of addresses, and sends one or more second messages including the generated signature tokens to the second care-of address of the MN 2.
摘要:
The present invention provides a new technique, according to which a mobile router can fulfill functions as a dynamic home agent, in a system where a plurality of mobile routers are in operation, under the management of a service provider belonging to the home agent. According to this technique, the home agent verifies the legitimacy of the mobile router when it receives a Query message and a binding update message requesting permission to fulfill functions as dynamic home agent. Then, after confirming that no other mobile router is currently present, which is fulfilling the functions as dynamic home agent in a set of a plurality of mobile routers, to which this mobile router belongs, it allows said mobile router to operate as the dynamic home agent. Then, even when other mobile router requests the permission to fulfill functions as the dynamic home agent, the request is rejected, and said other mobile router utilizes the mobile router, which is fulfilling functions of the dynamic home agent, as its home agent.
摘要:
A technique is disclosed, according to which a mobile node, having a plurality of interfaces and performing communication according to flow information when an operator is performing communication based on the flow information as defined by a policy, can select an interface suitable for the flow and can perform communication. According to this technique, a mobile node (MN 10) having a plurality of interfaces has a list to indicate domain limited flows to be transmitted only within a specific network (a trusted network), and a list to indicate the trusted networks. When a certain interface performs handover, and in case there is a domain limited flow that uses the interface, it is decided whether the network of handover destination is a trusted network or not, and in case the network of the handover destination is not a trusted network, it is decided whether it is possible or not to transmit and receive the domain limited flow via another interface that is connected to the trusted network.