摘要:
Methods and apparatus for using end nodes, e.g., wireless terminals, to discover base stations and communicate information about discovered access nodes, e.g., base stations, to other access nodes in a system are described. As the wireless terminal roams in the system and new access nodes are encountered, one or more physically adjacent access nodes will be informed of the presence of the new access node as a result of communications with the wireless terminal. A message indicating an access node's inability to route a message to another access node which is known to a wireless terminal may trigger the wireless terminal to begin the process of updating access node routing and neighbor information.
摘要:
This invention proposes an integrated process for AAA (Authentication, Authorisation, and Accounting) with the order reversed whereby L2 follows L3. The L3 process treats the wireless link as any normal IP access link, and the L3 authorisation provides L3 processing, but also includes the L2 terminal authentication identifiers so that the L2 security parameters can also be returned. This means that the wireless link and the IP layer are not secured until after the L3 authorisation has completed and therefore the first IP messages that trigger authorisation are sent insecurely. This invention also provides methods to avoid these insecure messages presenting any opportunities to an attacker. Finally, the inventions include methods to enable L3 before L2 authorisation when a user is roaming in a foreign network.
摘要:
A device can connect to a network over a first interface to configure and obtain an IP address. To communicate with nodes in a second network, over a second interface, the IP address can be validated by a trusted third party. The validation can include conducting a return routability test to validate a Prefix of the IP address. Cryptographically Generated Address verification can be utilized to verify the validity of an Interface Identifier included in the IP address. If the IP address is validated, the trusted third party can include the address in a verification ticket, which can also include a signature of the trusted third party. The device can provide the verification ticket to nodes in the second network as authentication of the device.
摘要:
Aspects describe spectrum authorization, access control, and configuration parameters validation. Devices in an ad-hoc or peer-to-peer configuration can utilize a licensed spectrum if the devices are authorized to use the spectrum, which can be determined automatically. Aspects relate to distribution of authorization tickets by an authorization server as a result of validating a device's credentials and services to which the device is entitled. An exchange and verification of authorization tickets can be performed by devices as a condition for enabling a validated wireless link using the spectrum.
摘要:
Methods and apparatus for establishing communication links, used to support communications sessions with one or more end nodes, e.g., mobile devices, are described. Various features are directed to a mobile node controlling the establishment of initial links to a first access node and the establishment of new links from a first access node to a second access node during a handoff operation using highly efficient messages and signal.
摘要:
Described herein are mechanisms and methods that facilitate enabling a first network module to “take over” for a second network module. For instance, an access router can he configured to act as a regional mobility agent with respect to a wireless terminal. The wireless terminal can then identify a different access router that is to act as a regional mobility agent, and transmit such request to a mobility agent. The mobility agent can create a tunnel with the access router that is acting as the mobility agent, and such access router can create an add message and transmit such message to other access routers associated with the wireless terminal. The add message informs the access routers that a particular access router is acting as a regional mobility agent and aids in creating tunnels between access routers.
摘要:
Methods and apparatus for compressing messages used to support mobile communications are described. After transmission of a first mobile IP message which may be a conventional mobile IP message, a compressed mobile IP message is transmitted. The compressed message includes a new “compressed message” indicator and information which is to replace information in the previous message or to be added to the previous message to construct a new message. In some embodiments, the compressed message includes a mask field, e.g., a sequence of bits, each bit corresponding to one field of a standard registration request message or binding update message. If the mask flag bit corresponding to a field is set, it indicates that the compressed message includes information to replace the content in the corresponding field of the previous message or to be added to the previous message as a field corresponding to the asserted bit.
摘要:
Methods and apparatus for improving tunneling techniques and reducing packet loss in mobile communications systems are described. The methods and apparatus are well suited for use with Mobile IP and can facilitate handoff operations. A mobile node establishes multiple tunnels, representing downlinks, from the mobile node perspective. The different downlink tunnels are through different access nodes but terminate at the same home agent. The mobile node maintains, at most, a single uplink tunnel at any given time with the home agent. Tunnels representing uplinks and downlinks are managed independently. Thus, each of the uplink and downlink tunnels can have different lifetimes and can be created/removed independently allowing for flexibility in handoff operations.
摘要:
The claimed subject matter relates to systems and methods for roaming in a wireless communications environment. A method for roaming between networks is provided in one aspect. This includes receiving a request for network access at a visited network and receiving a profile from a home network in response to the request. Upon receiving the profile, selectively offering services to one or more access terminals based at least in part on the profile.
摘要:
Methods and apparatus for using end nodes, e.g., wireless terminals, to discover base stations and communicate information about discovered access nodes, e.g., base stations, to other access nodes in a system are described. As the wireless terminal roams in the system and new access nodes are encountered, one or more physically adjacent access nodes will be informed of the presence of the new access node as a result of communications with the wireless terminal. A message indicating an access node's inability to route a message to another access node which is known to a wireless terminal may trigger the wireless terminal to begin the process of updating access node routing and neighbor information.