Abstract:
Reduction of overhead normally caused by the addition of a second IP header in case of tunneling between a home agent and a mobile node located in a foreign network is achieved by replacing an encapsulated first IP header by a tunnel identifier. The home agent and the mobile node agree on a tunnel identifier value at the time of binding update and acknowledgement. The tunnel identifier may be used independently at the home agent and at the mobile node to reconstruct the first IP header, which identifies a correspondent node. Because the encapsulated first IP header is not terminated at either of the home agent or mobile node, overhead reduction is not impacted by eventual transmission error or loss between these two nodes.
Abstract:
A method for revoking a binding from a mobile node, having a least one binding, comprises providing a target binding with the binding revocation message, so that after the revocation, the mobile node can be reached through the target binding.
Abstract:
A method, a proxy and a host are provided for securing neighbor discovery (ND) signaling between hosts when the hosts are connected through the proxy. A first host sends an original ND message comprising a first signature based on an address of the first host. The proxy removes the address of the first host and substitutes its own address in a modified ND message. The proxy then places a copy of the address of the first host in a new field and builds a proxy signature based on the own address of the proxy and on the new field. The new field and the proxy signature are added to the modified ND message. A second host receives the modified ND message from the proxy and verifies the proxy signature. The second host reconstructs the original ND message content and then verifies the first signature.
Abstract:
Devices, systems, methods and software are described which provide identity assignment and redistribution capabilities for software components of a distributed application. Identity value ranges can be fixed or variable. Identity assignment schemes according to exemplary embodiments facilitate the continuation of traffic between the components and clients during redistribution of the identities.
Abstract:
A method, a proxy and a host are provided for securing neighbor discovery (ND) signaling between hosts when the hosts are connected through the proxy. A first host sends an original ND message comprising a first signature based on an address of the first host. The proxy removes the address of the first host and substitutes its own address in a modified ND message. The proxy then places a copy of the address of the first host in a new field and builds a proxy signature based on the own address of the proxy and on the new field. The new field and the proxy signature are added to the modified ND message. A second host receives the modified ND message from the proxy and verifies the proxy signature. The second host reconstructs the original ND message content and then verifies the first signature.
Abstract:
A method and system for seamlessly handing off a Mobile Node (MN) equipped with a Wireless Local Area Network (WLAN) adaptor from a cellular network such as a GRPS/UMTS network to a WLAN network without interrupting the ongoing IP connection/session. When entering a WLAN coverage area, the roaming MN sends mobility information to a WLAN Integration Gateway (WIG) node allowing the WIG node to identify the source Service GPRS Support Node (SGSN). The WIG node contacts the source SGSN to obtain PDP Context information relative to the roaming MN, and establishes a new GTP tunnel with the servicing GGSN in order to complete the handoff. The WIG node may route data traffic for the MN by assigning a new IP address to the MN and by either performing IP-in-IP encapsulation or Network Address Translation (NAT).