摘要:
The invention relates to a method for discovering a home agent serving a mobile node upon the mobile node changing its mobility management scheme in a packet-switched network and the implementation of such method in a mobile node or home agent. In order to propose a home agent discover scheme that maintains session continuity in a seamless manner upon a mobile node changing its mobility management scheme, a mobile node comprises information on its location prior to changing the mobility management scheme to one of the first signaling messages transmitted upon changing the mobility management scheme (home agent discovery message). The receiving node uses this information to identify the home agent serving the mobile node or to provide a hint to the home agent where the mobile node is registered in a response message to the mobile node. This approach may also be used for path optimization when a mobile node moves from a trusted to an un-trusted access network.
摘要:
A technique disclosed enables a node having a plurality of interfaces to conduct connection of the plurality of interfaces simultaneously in a communication network domain. A mobile node having a plurality of interfaces connects one of the interfaces with a MAG (mobile access gateway) 11a to take part in a NetLMM domain 18 using a NetLMM protocol, and a LMA (local mobility anchor) 13 includes association information with the MAG 11a registered therein. When the mobile node connects another interface with another MAG 11b, the LMA receives a registration request for association information of this mobile node with the MAG 11b, and makes an inquiry to the already registered MAG 11a as to whether link with the mobile node is still valid or not. If the link is valid, the LMA keeps association information of the mobile node with both of the MAGs 11a and 11b.
摘要:
The invention discloses a technique, by which the number of messages can be decreased when RR (Return Routability) procedure is performed to give authentication between a mobile node (MN) and a correspondent node (CN). According to this technique, CN 3 receives a plurality of CoTi messages transmitted from each of a plurality of interfaces of MN 1, generates a signature token for each of a plurality of care-of addresses, and transmits the signature token in each of a plurality of CoT messages to MN. Then, MN generates a common key for a plurality of care-of addresses by using each signature token of said plurality of CoT messages, generates a common authentication code for said plurality of care-of addresses by using said common key, transmits a bulk binding update message containing said plurality of care-of addresses and the common authentication code to CN. CN authenticates the common authentication code for said plurality of care-of addresses in the bulk binding update message. Also, CoTi and CoT are transmitted in a bulk message, and BU messages are transmitted individually to each CoA.
摘要:
Disclosed is a technique of efficiently collecting communication quality information with excellent responsiveness in wireless resource management. According to the technique, a RRM 110 distributes measurement content information showing measurement contents for recognizing a wireless communication status to each AP 230, and each AP stores the measurement content information. For example, to recognize a wireless resource use status of an AP, the RRM transmits trigger transmission instruction information to an eNB 150, as a result of which trigger information is transmitted throughout a communication area of the eNB. A UE 301 that has received the trigger information acquires the measurement content information from an AP (for example, AP_a 230a) to which it is connected, and performs a measurement process and reports a measurement result to the RRM via the eNB based on the measurement content information.
摘要:
A transmission-reception apparatus does not configure ARQ control information from only sequence number, but the transmission-reception apparatus configures the ARQ control information such that the ARQ control information is comprised of one sequence number containing first occurrence of a corresponding packet's error, and bit information representing existence of retransmission requirements about sequence numbers followed on the heels of such the one sequence number.
摘要:
Disclosed is a technique allowing a transmission-end of data and a message to confirm a destination address in a transmission request from a reception-end so as to prevent an attack by a transmission request from an unauthorized third person. According to the technique, (1) MN1 transmits a HoTI message to CN2 via HA3, (2) CN2 transmits a HoT message to MN1 via HA3 in response to the HoTI message, (3) MN1 generates CoA from Home Token in the HoT message, and transmits a CoTIβ including CoA to CN2, and (4) CN2 compares CoA in the CoTIβ message with CoA generated from Home Token in the Hot message transmitted to MN1.
摘要:
A technique is disclosed of, when a mobile node has moved outside of a domain using a local address, enabling an old path of the mobile node in the domain to be torn down without using special means such as a STUN server. According to this technique, a MN 101 and a SANE 103 register a group to a group server 201 using a group registration request message 3001 and a group join request message 3007, respectively. When the MN 101 moves to a new location (MN 110) outside of a NAT domain 100, the MN 110 transmits a MN trigger message 3011 to the group server 201. Receiving the MN trigger message 3011 from the MN 110, the group server 201 transmits a group trigger message 3013 to all SANEs 103 in a group member list. Receiving the group trigger message 3013, the SANEs 103 tear down a state of an old path of the MN 101 before movement and release a resource thereof.
摘要:
The present invention relates to a method and computer-readable medium for loop detection in data packet communication utilizing a tunnel in a network comprising a plurality of nodes. The method comprises the steps of, when a first node transmits a data packet, encoding an identification of the first node in at least two header fields of the data packet to be transmitted, and when the first node receives a data packet, analysing the at least two header fields of the data packet, deciding if a loop exists by determining if the data packet was sent by the first node itself, based on the analysis of the at least two header fields of the data packet.
摘要:
Disclosed is a technique in which, when a plurality of packet routing paths exist, a sender of the packet selects an optimum packet length so as to use network resources effectively. According to the technique, when a plurality of routing paths like a network A (104) and a network B (105) exist for a packet transmitted from a data transmitting apparatus (103) to a data receiving apparatus (102) via a network relay apparatus (101), the network relay apparatus or the data receiving apparatus searches path MTU information of each path, and notifies the data transmitting apparatus of multipath MTU information including each search result. The data transmitting apparatus refers to this multipath MTU information to compare the plurality of paths about their path MTU information to decide a packet length suitable for the packet transmitted to the data receiving apparatus.
摘要:
There is provided a wireless transmitting device, the reception quality of which can be improved by effectively using the cyclic prefix. In the wireless transmitting device, a data mapping determination unit (204) determines a data mapping method according to tmax information, and a data mapping unit (207) performs data mapping on the signals outputted from modulation units (205, 206) according to the data mapping method determined by the data mapping determination unit (204). The data mapping determination unit (204) acquires the tmax information transmitted from a communication party and determines to map important information, such as of a control channel, a systematic bit, a resending bit, ACK/NACK information (ACK or NACK), a CQI (Channel Quality Indicator), a TFCI (Transport Format Combination Indicator), information necessary for modulation, a pilot, a power control bit, etc., on the data from its tail end to the portion corresponding to (TGI-tmax).