摘要:
Disclosed is a technique which enables a mobile node (MN) connected to a mobile router (MR) to carry out flow filtering in a mobile network. This technique allows an MN 25 in a mobile network 24 to set a policy needed for the flow filtering in an MR 10 and, in the present invention, an MR inserts an egress characteristic thereof into, for example, a router advertisement message so that the egress characteristic, a node in a mobile network cannot grasp originally, can be advertised to the interior of the mobile network. Thus, the MN can grasp a characteristic of an access network (characteristic of access system 20) even in a case in which it is connected to the MR, which achieves intelligent flow filtering.
摘要:
Disclosed is a technique for switching a forwarding address of a packet destined for a mobile node in a local mobility domain when the mobile node has a plurality of interfaces so that the packet will be forwarded to the mobile node. According to the technique, an MN 101 receives network information 40 including a domain ID 402 from a network through two or more IFs 1010 and 1011. Based on the domain ID 402 in the network information received, when determining that the IFs 1010 and 1011 are attached to the same domain, the MN 101 decides to allocate the same address to the IFs 1010 and 1011, and requests MAGs 111 and 112 connected to the IFs 1010 and 1011, respectively, to bind the same address to each of link identifiers of the IFs 1010 and 1011. Based on the request, the MAGs 111 and 112 perform binding to forward, to the MN 101, packets destined to the same address of the MN 101.
摘要:
A technology is disclosed for actualizing route optimization on a network base, even when privacy-sensitive information, such as a position of a mobile node, is not revealed between two different networks. In the technology, a pHA 124 functions as a proxy home agent of a MN 130. When the pHA 124 receives a packet transmitted from the MN 130 (such as a packet destined for a MN 230), the pHA 124 transmits a query message inquiring about a current position to a home network 200 of the MN 230. In response to the query, a HA 220 gives notification of an address of a proxy home agent (pHA 224) in an overlay network to which the MN 230 is subscribing that is present nearest to the pHA 124. As a result, the pHA 124 sends the packet destined for the MN 230 to the pHA 224, and the packet is transmitted via the overlay network to which the MN 230 is subscribing.
摘要:
A technology is disclosed for appropriately providing a certain service desired by a mobile node, even in an environment including overlay network nodes providing different functions. In the technology, a mobile node (MN) 110 implements Monami6 protocol and transmits a binding update message requesting a service based on the Monami6 protocol. On the other hand, an overlay network is present on a network, the overlay network in which a home agent (MCHA) implementing the Monami6 protocol and a home agent (MSHA) not implementing the Monami6 protocol cooperate to provide functions of an HA. In this instance, for example, an MSHA 150 that receives a message from the mobile node via a path 112 sends the request to an MCHA implementing the Monami6 protocol (such as an MCHA 130) and makes the MCHA process the request.
摘要:
A technology is disclosed for reducing the number of encapsulations required when MAP forwards a packet to a mobile node which is layered within mobile networks, with mobile networks nested and multiple mobile routers chained behind MAP (Mobility Anchor Point). When a node 420 with Address A wants to send a packet to a node 450 with Address D, the node with Address A inserts a list of immediate addresses into the packet. The list includes a node 430 with Address B and a node 440 with Address C, and the destination address of the packet is set to a next hop destination Address B. The node with Address B receives the packet and swaps the destination address with Address C described in the list of immediate addresses. Similarly, the node with Address C processes the same swapping process, and then the packet reaches the node with Address D.
摘要:
Disclosed is a technique whereby a packet transferring apparatus (particularly, a tunnel entry point made to carry out packet encapsulation) becomes capable of detecting a tunneling loop signifying that a packet loops along the same route while undergoing encapsulation. With this technique, at packet transfer, a loop detection module of a router according to the present invention stores a TEL value (value of tunnel encapsulation limit for limiting the number of times of duplication of tunnel) set in an encapsulation header of this packet or stores a TEL value set in an encapsulation header of a packet sent back as an ICMP error In addition, the loop detection module analyzes an increase/decrease variation pattern of the stored TEL value relative to time and, in a case in which the pattern agrees with a unique pattern (sawtooth-like pattern) appearing at the occurrence of a tunneling loop, estimates that a tunneling loop has occurred.
摘要:
There is disclosed a technique which can detect a packet routing loop (in particular, a nesting loop formed by MRs (mobile routers). According to this technique, an MR 114 connected as a subordinate to an MR 110 transmits a BU (Binding Update) message, to which added is an ARO (Access Router Option) including an address of a router (MR 110) connected at present, to an HA (Home Agent) 140 to which it pertains. Moreover, an MR 112 is connected as a subordinate to the MR 114 and, when connected to the MR 112, the MR 110 transmits a BU message, to which added is an ARO including an address of the MR 112, to the HA 140. At this time, the MR 112 also transmits a BU message, to which added is an ARO including an address of the MR 114, to the HA 140. Thus, the HA 140 can detect a routing loop formed by connections 120, 122 and 124.
摘要:
According to the present invention, connection can be always maintained between the mobile node and the access router, and disruption of on-going transport session can be prevented by making effective use of two architectures (hierarchical and mesh architectures). The mobile nodes 1000-1, 1000-2 and 1000-3 are attached to the access router 1100-1. When the mobile node maintains link layer connectivity with the access router, it is in the hierarchical mode, whereas when the link layer connectivity is lost, it enters the mesh mode. In the mesh mode, the mobile node attempts to establish virtual link layer connectivity with the access router through other nodes by using mesh network protocol such as MANET. In the mesh mode, the packet is capsulated between the mobile node and the access router when the mobile node and the peer 1400-1 communicate with each other.
摘要:
There is disclosed a technology which improves scalability in an overlay network system and which efficiently supplies a service with respect to a user, and according to the technology, for example, in a case where a mobile node (110) transmits an update message including a specific flow filtering rule to an HA (120) in order to receive a service concerning functions of multiple interfaces, the HA (120) interprets the flow filtering rule, specifies an HA 160 to transfer a data packet from CNs (180, 190), an HA (150) to transfer a data packet from the CN (190) and an HA (140) to transfer a data packet from a CN (1100), and selectively transmits to each HA a message including information useful for the respective HA.
摘要:
Disclosed is a technique that, in a network-based local mobility management method, reduces the load of a network node for managing position information of a mobile terminal and achieves a high scalability with respect to the number of mobile terminals. According to the technique, a LMA (Local Mobility Anchor) (1000) assigns a primary network prefix to each of MAGs (Mobility Access Gateways) (1010, 1020) under the control of the LMA and registers, in a routing table, the correspondence relationship between the position information of each of the MAGs and the primary network prefix assigned to each of the MAGs. In addition, among MNs (MobileNodes) (1030, 1040) connected under the MAGs, for a MN that uses an address including a secondary network prefix, the LMA registers, in a binding cache, the correspondence relationship between the MN and the position information of an MAG to which the MN is connected.