摘要:
Disclosed is a technique whereby a tunnel entry point, which encapsulates a packet (generates a tunnel packet), can detect the presence of a tunneling loop causing a packet to loop the same path while encapsulated. According to this technique, upon receipt of a packet from a source node (source) 1100, TEP (tunnel entry point) 1120 inserts it into a tunnel packet header for encapsulation. Upon receipt of tunnel packets from TEP 1120 and TEP 1140, each of TEP 1140 and TEP 1160 copies the identifier of the original tunnel packet header to a new tunnel packet header for encapsulation. When this tunnel packet returns to TEP 1120 due to a tunneling loop, the tunneling loop is detected by referring to the identifier in the received tunnel packet.
摘要:
A technique is disclosed whereby, in the case of wherein a communication node includes both a mobility management function and a multihoming function, based on a condition that occurs due to moving, an appropriate address can be selected from multiple addresses in a multihomed state. According to the technique, a mobility condition determination unit 126, provided in an MIP controller 120 that manages moving of a communication node, obtains and examines various conditions that has occurred as a communication node is moving, selects an appropriate HoA (e.g., the home address of an MN1) for the current connection situation, and transmits, to a multihoming controller 130, a notification indicating that a set of the selected HoA and a CoA is appropriate addresses to be used. Upon receiving the notification from the mobility condition determination unit, the multihoming controller transmits, to the MIP controller, an address (Addr2) consonant with the received HoA, and the MIP controller performs packet communication using the HoA or the CoA consonant with the address.
摘要:
A technique is disclosed, according to which a mobile node, having a plurality of interfaces and performing communication according to flow information when an operator is performing communication based on the flow information as defined by a policy, can select an interface suitable for the flow and can perform communication. According to this technique, a mobile node (MN 10) having a plurality of interfaces has a list to indicate domain limited flows to be transmitted only within a specific network (a trusted network), and a list to indicate the trusted networks. When a certain interface performs handover, and in case there is a domain limited flow that uses the interface, it is decided whether the network of handover destination is a trusted network or not, and in case the network of the handover destination is not a trusted network, it is decided whether it is possible or not to transmit and receive the domain limited flow via another interface that is connected to the trusted network.
摘要:
Disclosed is a technique capable of proper execution of access control based on various security policies set by a home user with regards to a packet sent from a visitor node. According to the technique, a MR (Mobile Router) 10 which manages a mobile PAN 30 determines whether a sender of a packet from a communication terminal connected to the mobile PAN is a home user's node which is allowed direct access into a home network or a visitor node (VN 31), and forwards the packet from the home user's node to an HA 20 while forwarding the packet from the visitor node to a policy server 36 located in a DMZ 35. This allows the policy server to perform access control on every packet from a visitor node which attempts to gain access into the home network based on a security policy 36a.
摘要:
Disclosed is a technique which enables a mobile node (MN) connected to a mobile router (MR) to carry out flow filtering in a mobile network. This technique allows an MN 25 in a mobile network 24 to set a policy needed for the flow filtering in an MR 10 and, in the present invention, an MR inserts an egress characteristic thereof into, for example, a router advertisement message so that the egress characteristic, a node in a mobile network cannot grasp originally, can be advertised to the interior of the mobile network. Thus, the MN can grasp a characteristic of an access network (characteristic of access system 20) even in a case in which it is connected to the MR, which achieves intelligent flow filtering.
摘要:
Disclosed is a technique for switching a forwarding address of a packet destined for a mobile node in a local mobility domain when the mobile node has a plurality of interfaces so that the packet will be forwarded to the mobile node. According to the technique, an MN 101 receives network information 40 including a domain ID 402 from a network through two or more IFs 1010 and 1011. Based on the domain ID 402 in the network information received, when determining that the IFs 1010 and 1011 are attached to the same domain, the MN 101 decides to allocate the same address to the IFs 1010 and 1011, and requests MAGs 111 and 112 connected to the IFs 1010 and 1011, respectively, to bind the same address to each of link identifiers of the IFs 1010 and 1011. Based on the request, the MAGs 111 and 112 perform binding to forward, to the MN 101, packets destined to the same address of the MN 101.
摘要:
A technology is disclosed for actualizing route optimization on a network base, even when privacy-sensitive information, such as a position of a mobile node, is not revealed between two different networks. In the technology, a pHA 124 functions as a proxy home agent of a MN 130. When the pHA 124 receives a packet transmitted from the MN 130 (such as a packet destined for a MN 230), the pHA 124 transmits a query message inquiring about a current position to a home network 200 of the MN 230. In response to the query, a HA 220 gives notification of an address of a proxy home agent (pHA 224) in an overlay network to which the MN 230 is subscribing that is present nearest to the pHA 124. As a result, the pHA 124 sends the packet destined for the MN 230 to the pHA 224, and the packet is transmitted via the overlay network to which the MN 230 is subscribing.
摘要:
A technology is disclosed for appropriately providing a certain service desired by a mobile node, even in an environment including overlay network nodes providing different functions. In the technology, a mobile node (MN) 110 implements Monami6 protocol and transmits a binding update message requesting a service based on the Monami6 protocol. On the other hand, an overlay network is present on a network, the overlay network in which a home agent (MCHA) implementing the Monami6 protocol and a home agent (MSHA) not implementing the Monami6 protocol cooperate to provide functions of an HA. In this instance, for example, an MSHA 150 that receives a message from the mobile node via a path 112 sends the request to an MCHA implementing the Monami6 protocol (such as an MCHA 130) and makes the MCHA process the request.
摘要:
A technology is disclosed for reducing the number of encapsulations required when MAP forwards a packet to a mobile node which is layered within mobile networks, with mobile networks nested and multiple mobile routers chained behind MAP (Mobility Anchor Point). When a node 420 with Address A wants to send a packet to a node 450 with Address D, the node with Address A inserts a list of immediate addresses into the packet. The list includes a node 430 with Address B and a node 440 with Address C, and the destination address of the packet is set to a next hop destination Address B. The node with Address B receives the packet and swaps the destination address with Address C described in the list of immediate addresses. Similarly, the node with Address C processes the same swapping process, and then the packet reaches the node with Address D.
摘要:
Disclosed is a technique whereby a packet transferring apparatus (particularly, a tunnel entry point made to carry out packet encapsulation) becomes capable of detecting a tunneling loop signifying that a packet loops along the same route while undergoing encapsulation. With this technique, at packet transfer, a loop detection module of a router according to the present invention stores a TEL value (value of tunnel encapsulation limit for limiting the number of times of duplication of tunnel) set in an encapsulation header of this packet or stores a TEL value set in an encapsulation header of a packet sent back as an ICMP error In addition, the loop detection module analyzes an increase/decrease variation pattern of the stored TEL value relative to time and, in a case in which the pattern agrees with a unique pattern (sawtooth-like pattern) appearing at the occurrence of a tunneling loop, estimates that a tunneling loop has occurred.