摘要:
The present invention introduces a method for managing the route to be used for the user's local device access traffic through the use of intelligent switching performed by the breakout node (eNodeB, home NodeB, or home eNodeB) together with the local access gateway node of the local service domain. Essential information pertaining to performance of this intelligent switching is obtained through the communication of specific tokens using selected channels of communication. A variety of combinations pertaining to the setup, selection and composition of token and channel is possible and described.
摘要:
The present invention introduces a method for the network to optimize the route for user's local IP access, without affecting the access to operator's core network. With this mechanism, no excessive signalling is needed for the optimization. The present invention is also applicable to the corporate network that has multiple home NodeBs or home eNodeBs. Finer grain control on the services to be provided over different home NodeB or home eNodeB is also possible. Further, path optimization and continuation of the service upon handover can be controlled, and hence flexibility of the service can be secured.
摘要:
Disclosed is a technique which provides a handover processing method and the like which enable a smooth handover without service interruption and allow a desired handover to be performed. The technique includes the steps of: generating by a mobile node 100 a message including certain information to prioritize a connection of the mobile node to a desired access network among multiple access networks; transmitting the generated message from the mobile node to a base station located in the desired access network or a base station located in a currently-connected access network; and rejecting by a connection managing apparatus 104 for managing connections of the mobile node a path switching request from a base station of an access network other than the desired access network, the rejection being made according to certain information acquired through a base station that receives the transmitted message.
摘要:
The present invention introduces a method for managing the route to be used for the user's local device access traffic through the use of intelligent switching performed by the breakout node (eNodeB, home NodeB, or home eNodeB) together with the local access gateway node of the local service domain. Essential information pertaining to performance of this intelligent switching is obtained through the communication of specific tokens using selected channels of communication. A variety of combinations pertaining to the setup, selection and composition of token and channel is possible and described.
摘要:
The invention relates to a method for performing a handover of a mobile node (MN) from a source to a target network, wherein a handover proxy node (HPN) is used to relay the handover of the MN to one of previously measured cells. The MN discovers an appropriate HPN and triggers the handover to the HPN by reporting the measurements together with the HPN ID as destination of the handover. When receiving the Handover Initiation message for handing over the MN to the HPN, the HPN will not proceed with the handover but adapts said handover to indicate a handover of the MN from the HPN to the target base station. Upon receiving the Handover Initiation message in the target network, system resources are configured for data forwarding between the source and target network, and for the data path used by the MN when attaching to the target base station.
摘要:
The invention provides a method for trust relationship detection between a core and access network for a user equipment. The gist is that a security tunnel establishment procedure is used so one entity, be it part of the core network or be it the user equipment itself, is provided with information to determine whether the access network is trusted or untrusted. The information may comprise a first IP address/prefix, which is initially assigned to the user equipment, upon attaching to the access network. The necessary information may further comprise a second IP address/prefix, which is an address/prefix that is allocated at a trusted entity of the core network. Depending which entity determines the trust relationship of the access network, it might be necessary to transmit either the first IP address/prefix or the second IP address/prefix or the first and the second IP address/prefix using the security tunnel establishment procedure.
摘要:
The current invention relates to a method for a network attachment procedure and a user equipment in a wireless mobile network, the wireless mobile network comprising a user equipment with a temporary identity and at least one mobility management entity. The method comprises the steps of providing an estimation whether the user equipment is unknown at the mobility management entity and sending the user equipment's temporary identity during the network attachment procedure. If the user equipment has been estimated to be unknown at the at least one mobility management entity, the user equipment's identity is sent during the network attachment procedure. These steps are carried out by the user equipment.
摘要:
Disclosed is a technique to enable a user equipment at a remote place to perform local IP access to a locally-accessible network with simpler procedure and such a configuration while achieving the efficiency of costs and facility. According to the technique, a network (LIA-PDN 161) capable of dealing with a local IP access by a user equipment (UE 101) is placed on a core network 141. When the UE establishes a PDN connection with the LIA-PDN, the UE simultaneously transmits information concerning the LIA domain network 111 as well, to which the UE wants a local IP access. On the basis of this information, the LIA-PDN establishes a PDN connection with the LIA domain network, and the LIA-PDN transfers a packet, whereby the UE can access the LIA domain network via these PDN connections.
摘要:
The invention relates to a method for ensuring IP session continuity upon a handover of a mobile node to a non-3GPP network, wherein an ongoing IP session of the mobile node goes via a packet data network gateway. For non-3GPP networks it is necessary to discover a security gateway and to then establish the corresponding tunnels to the ePDG to form the new data path; a security tunnel between the mobile node and the security gateway, and an IP tunnel between the packet data network gateway and the security gateway. In order to prepare the handover to possible non-3GPP accesses, the two tunnels are pre-established, however maintained deactivated until their use is actually needed. Accordingly, when handing over to the non-3GPP network, the IP session may be continued without any significant interruption by activating the already established tunnels.
摘要:
The current invention relates to a method for a network attachment procedure and a user equipment in a wireless mobile network, the wireless mobile network comprising a user equipment with a temporary identity and at least one mobility management entity. The method comprises the steps of providing an estimation whether the user equipment is unknown at the mobility management entity and sending the user equipment's temporary identity during the network attachment procedure. If the user equipment has been estimated to be unknown at the at least one mobility management entity, the user equipment's identity is sent during the network attachment procedure. These steps are carried out by the user equipment.