摘要:
A method of employing an encoding scheme for media independent handover, comprising: having at least some data type carry only required information to determine the end of data without a length value.
摘要:
The present invention advantageously provides several systems and methods for solving the trombone routing issues within an IMS/MMD network. These approaches avoid trombone routing, speed up handoff, and increase the efficiency of signaling and overall performance of an IMS/MMD network. These solutions can broadly be divided into the following categories. Piggy-backing SIP registration over MIP (Split at FA); Selective Reverse Tunneling and Tunneling between FA and P-CSCF; the SIP-based mobility protocol; use of CoA during SIP registration and call up in MIPv6; Piggy-backing SIP registration when HA and S-CSCF Co-exist; Using Dynamic Home Agents in MIPv4 FA-CoA; and the Interceptor-Caching Approach.
摘要:
A system for proactively authenticating includes a server having media independent access functions including media independent authentication functions that authenticates other entities attached via an interface to an end of a link specific to a media. A plurality of heterogeneous networks each having media specific access functions including authentication functions corresponding to the other entities attached via the interface to the end of the link specific to the media and mobile devices connected to the plurality of heterogeneous networks, and the server having predefined media independent handover protocols and media independent handover identities based on the media independent functions related to handover, in which the server authenticates candidate access networks prior to the handover of the mobile devices from serving access networks to the candidate access networks each of which belonging to the plurality of heterogeneous access networks having the link specific to the media.
摘要:
According to some of the preferred embodiments, a solution framework is employed that includes defining of a mechanism to run multiple queries in a single message exchange along with a priority on a per-query basis, In some embodiments, a system for facilitating handover of a mobile device across heterogeneous access networks by ensuring response to queries transmitted by the mobile device includes: a) a mobile device having a plurality of wireless network interfaces for communicating over a plurality of heterogeneous access networks, having a media independent handover (MIH) entity to facilitate handovers between the heterogeneous networks, and configured to transmit queries related to handover operation between the heterogeneous access networks to MIH entities within said heterogeneous access networks; and b) said media independent handover entity of said mobile device being configured to transmit multiple queries in a single message exchange to an MIH entity in an access network with prioritization among said multiple queries.
摘要:
In some of the preferred embodiments, methods for converting XML data to TLV format are provided for use in, e.g., query and/or response in, e.g., network discovery and the like applications.
摘要:
A self-organizing IP multimedia subsystem exhibiting node splitting and node merging functions wherein any node within the self organizing IP multimedia subsystem may assume any role thereby providing node balancing and fault tolerance to an overall network.
摘要:
A mobile device includes: multiple interfaces that are configured to support a various access technology such as 3G or Wi-Fi etc. A public land mobile network (PLMN) selector that generates a list for each of the PLMN networks that provide coverage to the mobile device. A PLMN selection policy parameter that is set to True or False to allow or prohibit the selection of PLMN networks by the mobile device based on the generated list where the generated list includes information as to different access technologies and selection priorities supported on the PLMN access networks providing coverage to the mobile device. In particular, when the PLMN selection policy parameter is set to True, multiple PLMN registrations are allowed; and when the A PLMN selection policy parameter is set to False, multiple PLMN registrations are prohibited.
摘要:
A mechanism by which handoff delay can be minimized while not compromising the IMS/MMD security and also protecting the media if required by certain applications is presented. One proactive method includes proactive authentication. Another proactive method includes proactive security association, such as transferring SA keys from old proxy to new proxy, or transferring keys through serving signal entities. Reactive methods include transferring SA keys from old proxy to new proxy, using either push or pull technology. Other reactive methods include transferring keys through serving signal entities using either push or pull technology.
摘要:
A system and method for network selection procedures for simultaneous network connectivity through multiple accesses comprises obtaining stored and registered PLMNs, determining whether PLMNs are both stored PLMN for access technology type Ai and registered PLMN, when no PLMNs are both, performing PLMN selection using a standard procedure, when only one PLMN is both, determining whether the PLMN satisfies a condition, and when the PLMN satisfies the condition, attempting to connect to the PLMN, and when more than one PLMN is both, creating a set of PLMNs, selecting one PLMN that satisfies the condition, from the set PLMN, attempting to connect to the selected PLMN, and when attempting to connect fails, removing the selected PLMN from the set, and selecting another PLMN. In one aspect, the PLMN that minimizes changes is selected. In one aspect, the PLMN that provides access to a larger number of access technologies is selected.
摘要:
The present invention, among other things, obviates the effects of an attack on a wireless network through appropriate isolation and recovery. An aspect of the present invention can include a system and method of isolating a victim of malicious behavior in a wireless access network, and in particular WLAN networks. By having software on the victim's device, the system provides the capability of recovering the victim from the effects of the intruder, and prevents the victim from being affected by subsequent attacks by the intruder. The preferred embodiments include two key components: a local monitor and a global monitor.