摘要:
The invention discloses a technique to efficiently realize a routing based on preference of a mobile terminal in case the mobile terminal is connected to a mobility management domain of network base different from a home network domain. According to this technique, a mobile terminal (mobile node; MN) 101 has two interfaces, and these interfaces are connected to a mobility management domain (local mobility domain) 11 under the condition that these interfaces are connected to MAG 111 and MAG 112 respectively. In case MN itself decides one of the interfaces to be used for a specific packet flow communication, a routing preference to instruct that the packet flow is to be sent on a routing via the interface is notified to MAG. When MAG notifies the routing preference to LMA (filtering agent) 110, filtering based on the routing preference is carried out.
摘要:
The invention provides a method for trust relationship detection between a core and access network for a user equipment. The gist is that a security tunnel establishment procedure is used so one entity, be it part of the core network or be it the user equipment itself, is provided with information to determine whether the access network is trusted or untrusted. The information may comprise a first IP address/prefix, which is initially assigned to the user equipment, upon attaching to the access network. The necessary information may further comprise a second IP address/prefix, which is an address/prefix that is allocated at a trusted entity of the core network. Depending which entity determines the trust relationship of the access network, it might be necessary to transmit either the first IP address/prefix or the second IP address/prefix or the first and the second IP address/prefix using the security tunnel establishment procedure.
摘要:
Disclosed is a technique to prevent the registration of false information that a mobile router is managing prefix information that is not actually managed. According to the technique, when a mobile network prefix is registered from an MR (mobile router 20) to a CN 30 (correspondent node), an HA (home agent) 10, for example, intervenes in signaling related to the registration to prevent the registration of false prefix information. For example, in process 150, the MR notifies the prefix information and the HA detects a test message 120 sent from the CN to the MR to check whether the prefix information used for the destination address is valid. If the prefix information is invalid, the packet is discarded.
摘要:
A technology is disclosed for providing a packet transfer control method that can transmit a DU message to a specific CN or a specific flow to prompt a change in destination, while maintaining a transfer request to a CoA from a HA. In the technology, when a home agent receives a packet addressed to a mobile terminal from a predetermined communication terminal, the mobile terminal transmits a second message to the home agent, the second message including information required for the home agent to transmit a first message to the predetermined communication terminal. The first message states that a currently used address addressed to the mobile terminal cannot be used. The home agent generates the first message based on the information included in the second message and transmits the generated first message to the predetermined communication terminal.
摘要:
Disclosed in a technique for more accurately checking a network condition such as a transmission delay generated in packet transmission between two nodes and other network conditions. A buffering node 10 is a network node having the function of transferring a packet. When a packet received by a network interface 11 is buffered in a cache 14, a buffer time processor 12 refers to an internal clock 13 to record the time of that moment (the buffered time). Then, when this packet is transferred, the buffer time processor refers again to the current time indicated by the internal clock and subtracts the buffered time from the current time to calculate a buffering time generated by a buffering delay in packet transmission. This buffering time is added to the packet and transmitted.
摘要:
Disclosed is a technique capable of proper execution of access control based on various security policies set by a home user with regards to a packet sent from a visitor node. According to the technique, a MR (Mobile Router) 10 which manages a mobile PAN 30 determines whether a sender of a packet from a communication terminal connected to the mobile PAN is a home user's node which is allowed direct access into a home network or a visitor node (VN 31), and forwards the packet from the home user's node to an HA 20 while forwarding the packet from the visitor node to a policy server 36 located in a DMZ 35. This allows the policy server to perform access control on every packet from a visitor node which attempts to gain access into the home network based on a security policy 36a.
摘要:
The present invention provides a technique to optimize communication route when two end nodes separated away from own home perform data communication with each other. According to this technique, a communication node (the initiator node 174) adds a predetermined destination option including own home address to a header of a packet to be transmitted to a correspondent node (LFN 151) under control of MR 141. HA 121 of MR copies a predetermined destination option and inserts it into a tunnel packet header when this packet is tunneled to MR. When the packet is transferred to the communication node under control, MR checks, by using the server, whether the predetermined destination option is inserted into the tunnel packet header or not. If it is inserted into the packet, a route optimization processing is started with the transmitter of the packet including the predetermined destination option with home address.
摘要:
In order to verify if upper-level router information, or ULRI (information on the upper-level router with respect to a predetermined node) is valid, MN (Mobile Node) 220 associated to ULMR (Upper-Level Mobile Router) 210 acquires ULRI such as the address of ULMR (310), inserts ULRI into a BU (Binding Update) message, and sends it to HA (Home Agent) 235 (320). On receiving the BU message with ULRI, HA sends a BA (Binding Acknowledgement) message set to pass through the router that is specified in ULRI (330). If ULRI is valid, ULMR forwards the BA message to MN (340). If ULRI is not valid, ULMR discards the BA message.
摘要:
A technology is disclosed for reducing the number of encapsulations required when MAP forwards a packet to a mobile node which is layered within mobile networks, with mobile networks nested and multiple mobile routers chained behind MAP (Mobility Anchor Point). MAP 120 manages the binding information between RCoA and LCoA for each of lower-level nodes and grasps the prefixes of each of lower-level mobile routers, for example, the prefix of mobile network 104 of MR 140 or the prefix of mobile network 106 of MR 142. For example, MAP 120 informs MR 140 of the prefix of the mobile network 106 and the binding information between RCoA and LCoA. In this way, MR 140 can grasp a next forwarding destination of the packet transmitted from MAP 120 to MN 150, and the packet can be reached at MN 150 unless the packet is encapsulated multiple times.
摘要:
There is disclosed a technology in which a packet to be sent to a mobile terminal (an MN), distributed from a correspondent node (a CN), can surely reach the MN even in a situation in which the MN is moving. According to the technology, identification information of a plurality of access routers (ARs) 300 potentially currently connected to the MN is added to an IP packet to be transmitted from a CN 500 to an MN 200. When the AR receives this IP packet, the AR judges whether or not the MN is connected thereunder. If the MN exists under the AR, the IP packet is transmitted to the MN. On the other hand, if any MN does not exist under the AR, the IP packet is transferred to another AR based on the identification information added to the IP packet. As a result, the IP packet is successively transferred between the plurality of ARs so that the IP packet can be passed to the MN under the AR currently connected to the MN.