摘要:
Disclosed is a technique so arranged that, after handover, a mobile terminal can promptly and continuously accept an additional service (for example, QoS assurance), the mobile terminal has accepted before the handover. With this technique, when the mobile terminal (MN 10) carries out the handover, the MN selects, as a proxy, a node (QNE (proxy) 68) having NSLP for QoS, which exists in the vicinity of an AR (access router) 31 pertaining to a subnet 30 which is a movement destination of the MN (near an AR in a network configuration), and transmits, to this proxy, a message including a flow identifier and a session identifier, which are related to a path 24 established with respect to a CN 60 before the handover. This proxy transmits a message including these flow identifier and session identifier to the CN for, on the basis of a response result to this message, establishing a new path 34 and finding a crossover node at which two paths start to intersect with each other.
摘要:
A technology that can provide a node discovery method that can detect a TA that can provide a quasi-optimal data path to acquire the quasi-optimal path while protecting location privacy of a MN and the like are disclosed. The technology includes a step in which a first proxy node 105 that is a proxy node that discovers a processing node 102 as a proxy of a mobile node 101 transmits a first message in a predetermined format used to discover the processing node to a second proxy node 106 that is a proxy node that discovers the processing node as a proxy of a corresponding node. The technology also includes a step in which a relay node that has received the first message and can process the message in the predetermined format judges whether the relay node itself is the processing node based on the first message. The technology also includes a step in which, when judged that the relay node itself is the processing node, the relay node that has made the judgment and can process the message in the predetermined format transmits a second message to the first proxy node stating that the relay node itself will become the processing node.
摘要:
A technique for flexibly performing processes depending on the type of a path for providing an additional service when there are a plurality of paths for providing additional services for the same session between terminals communicating with each other over a network is disclosed. According to the technique, when a mobile terminal (MN 100) establishes a QoS path using NSIS to a corresponding node (CN 124) on different types of data communication paths, a signaling message including information (MIE) representing the path type is created and transmitted. Each node (QNE) with an NSIS QoS function, which has received the message, identifies a plurality of QoS paths by comparing the MIE, a session identifier and a flow identifier, and performs processing of the QoS paths according to control information (CI) from MNs or/and the policy which the QNE has.
摘要:
An object is, when a mobile terminal performs a handover, to more quickly reset a path after the handover and reduce interrupt time (particularly interrupt time of a QoS path) of packet communication. For example, in a state in which a MN 101 has not acquired an address (NCoA) of a new connection destination (AR 109), the MN 101 requests that a QNE (proxy) 123 start a process of establishing a QoS path used when the MN 101 is connected to a new connection destination. The QNE (proxy) makes a resource reservation between the ONE (proxy) itself and a CN 121. As a result, in an upper stream above a QNE (CRN 115), new path information (filter B) is correlated with path information (filter A) used when the MN is connected to an AR 105. Until when the MN uses the actual new CoA and updates the QoS path after movement, the data packet is encapsulated by a proxy node and transmitted based on the path information (filter B).
摘要:
A mobile communication system wherein the upstream radio channel interference of a macrocell connection terminal with a femtocell base station can be reduced while the consumption of radio resources caused by increase in signaling is being suppressed. The macrocell connection terminal (401) performs, based on an instruction from a macrocell base station (402), an upstream channel transmission and further reports a peripheral-femtocell detection result obtained by a measuring unit to the macrocell base station. The macrocell base station (402) instructs the terminal to perform a peripheral-femtocell detection. The identifier of the terminal and the peripheral-femtocell detection result obtained by the terminal are transmitted to a network management apparatus (404). An interference reduction instruction (frequency band allocation) and the identifier of the terminal to be interference-controlled are received from the network management apparatus, and the frequency band allocation in the upstream channel transmission of the terminal to be interference-controlled is so controlled as to satisfy the interference reduction instruction.
摘要:
By introducing a hierarchical encryption scheme and the use of asymmetric cryptography, the critical information in message exchanges is concealed from unauthorized entities. This helps greatly in preventing man-in-the-middle attacks faced by inter-working. In addition, access control is conducted by introducing a network structure having a rule interpreter that is capable of mapping general rules to WLAN specific commands. It obviates the needs for mobile user's home network to understand information about every WLAN it is inter-worked with. A common interface independent of WLAN technologies could be used by the home network for all the WLANs. The above conception provides a solution to the problems of the protection of user identification information and access control in the inter-working of WLAN.
摘要:
A technology is disclosed that can provide a high-speed QoS handover method and a processing node used in the method, in which a QoS path reconfigured before a handover becomes as optimal a QoS path as possible after the handover, thereby reducing load of route reconfiguration of the QoS path performed after the handover, shortening a segment of QoS path setting performed immediately after the handover, and minimizing a QoS interruption time. The technology includes a step at which a mobile node 10 transmits a first signaling for configuring a predetermined QoS path to a processing node that performs a predetermined process for reducing a load of a modification process for a QoS path after a handover, and a step at which the processing node that receives the first signaling generates a second signaling for performing a QoS setting of the predetermined QoS path based on the received first signaling and transmits the generated second signaling to a predetermined correspondence partner that performs the QoS setting of the predetermined QoS path.
摘要:
A header compression/decompression apparatus that improves the throughput of an overall multilayer protocol stack at a network node. In this apparatus, an encoding section 106 compresses multilayer header information included in a protocol data unit on a multilayer protocol stack 101. A session context ID manager 112 generates a session context ID 401 which is formed by integrating information on compression of multilayer header information by the encoding section 106 and, for example, information for identifying a scheme for compressing multilayer header information.
摘要:
In a data communication network, data route changes happen frequently due to various reasons. For the path specific resource management signaling, such route changes would trigger large amount of signaling actions. Some of the signaling action requires a complicated process and may take a long time. This may cause service interruption in extreme cases. This invention proposed a method for signaling state management along the old data path to achieve fast signaling state re-establishment. Instead of removing the signaling states along the old data path explicitly or by time-out, the invention preserved the signaling state along the old data path with reduced state management. In the reduced state management, network resources that are held by the states along the old data path are released and minimum information is retained. The states become “dormant” states that do not require active monitoring from the network. When the old path is in use again, the states could be restored and network resources be re-allocated fast. This would be much faster than re-establishing the whole state from scratch. This invention also provides a method for fast recovery from transient route changes by allowing the signaling aware nodes at the crossover point of the data path to monitor the status of old path. This way, the signaling system could quickly re-establish the necessary state along the old path once it's found available again.
摘要:
By introducing a hierarchical encryption scheme and the use of asymmetric cryptography, the critical information in message exchanges is concealed from unauthorized entities. This helps greatly in preventing man-in-the-middle attacks faced by inter-working. In addition, access control is conducted by introducing a network structure having a rule interpreter that is capable of mapping general rules to WLAN specific commands. It obviates the needs for mobile user's home network to understand information about every WLAN it is inter-worked with. A common interface independent of WLAN technologies could be used by the home network for all the WLANs. The above conception provides a solution to the problems of the protection of user identification information and access control in the inter-working of WLAN.