摘要:
The present invention introduces a method for managing the route to be used for the user's local device access traffic through the use of intelligent switching performed by the breakout node (eNodeB, home NodeB, or home eNodeB) together with the local access gateway node of the local service domain. Essential information pertaining to performance of this intelligent switching is obtained through the communication of specific tokens using selected channels of communication. A variety of combinations pertaining to the setup, selection and composition of token and channel is possible and described.
摘要:
A technique is disclosed, according to which a mobile node, having a plurality of interfaces and performing communication according to flow information when an operator is performing communication based on the flow information as defined by a policy, can select an interface suitable for the flow and can perform communication. According to this technique, a mobile node (MN 10) having a plurality of interfaces has a list to indicate domain limited flows to be transmitted only within a specific network (a trusted network), and a list to indicate the trusted networks. When a certain interface performs handover, and in case there is a domain limited flow that uses the interface, it is decided whether the network of handover destination is a trusted network or not, and in case the network of the handover destination is not a trusted network, it is decided whether it is possible or not to transmit and receive the domain limited flow via another interface that is connected to the trusted network.
摘要:
Disclosed is a technique capable of proper execution of access control based on various security policies set by a home user with regards to a packet sent from a visitor node. According to the technique, a MR (Mobile Router) 10 which manages a mobile PAN 30 determines whether a sender of a packet from a communication terminal connected to the mobile PAN is a home user's node which is allowed direct access into a home network or a visitor node (VN 31), and forwards the packet from the home user's node to an HA 20 while forwarding the packet from the visitor node to a policy server 36 located in a DMZ 35. This allows the policy server to perform access control on every packet from a visitor node which attempts to gain access into the home network based on a security policy 36a.
摘要:
Disclosed is a technique which enables a mobile node (MN) connected to a mobile router (MR) to carry out flow filtering in a mobile network. This technique allows an MN 25 in a mobile network 24 to set a policy needed for the flow filtering in an MR 10 and, in the present invention, an MR inserts an egress characteristic thereof into, for example, a router advertisement message so that the egress characteristic, a node in a mobile network cannot grasp originally, can be advertised to the interior of the mobile network. Thus, the MN can grasp a characteristic of an access network (characteristic of access system 20) even in a case in which it is connected to the MR, which achieves intelligent flow filtering.
摘要:
A terminal apparatus includes: a transmission unit transmitting, to a master device, a first registration request indicating a request for registration as a new control target terminal; a reception unit receiving registration request acknowledgement information transmitted from the master device in response to reception of the first registration request; a notification unit notifying the outside of the terminal apparatus of notification information included in the registration request acknowledgement information and indicating the master device has received the first registration request; a detection unit detecting another terminal apparatus that is to transmit, to a master device, a second registration request indicating a request for registration as a new control target terminal; and a registration control unit controlling, when the detection unit detects the other terminal apparatus, at least a time when the first registration request is transmitted.
摘要:
The present invention introduces a method for the network to optimize the route for user's local IP access, without affecting the access to operator's core network. With this mechanism, no excessive signalling is needed for the optimization. The present invention is also applicable to the corporate network that has multiple home NodeBs or home eNodeBs. Finer grain control on the services to be provided over different home NodeB or home eNodeB is also possible. Further, path optimization and continuation of the service upon handover can be controlled, and hence flexibility of the service can be secured.
摘要:
The present invention discloses a technique for avoiding a signal collision in a wireless medium to improve communication throughput. According to this technique, in a radio communication system composed of a plurality of radio communication devices in such a manner that other radio communication devices exist within the communication area of a radio communication device, a given radio communication device is assigned a time slot periodically so that it can access the wireless medium in the time slot at higher priority than the other radio communication devices. This is achieved as follows: The radio communication device monitors the wireless medium, detects other radio communication devices operating within the communication area of the radio communication device, and divide communication time on the wireless medium into time slots of equal width according to the number of other radio communication devices. Then, each radio communication device selects one of these time slots so as not to share the selected time slot with any other radio communication device, and uses a waiting time shorter than those of the other radio communication devices to access the wireless medium in the selected time slot.
摘要:
Disclosed is a technique for switching a forwarding address of a packet destined for a mobile node in a local mobility domain when the mobile node has a plurality of interfaces so that the packet will be forwarded to the mobile node. According to the technique, an MN 101 receives network information 40 including a domain ID 402 from a network through two or more IFs 1010 and 1011. Based on the domain ID 402 in the network information received, when determining that the IFs 1010 and 1011 are attached to the same domain, the MN 101 decides to allocate the same address to the IFs 1010 and 1011, and requests MAGs 111 and 112 connected to the IFs 1010 and 1011, respectively, to bind the same address to each of link identifiers of the IFs 1010 and 1011. Based on the request, the MAGs 111 and 112 perform binding to forward, to the MN 101, packets destined to the same address of the MN 101.
摘要:
A technology is disclosed for actualizing route optimization on a network base, even when privacy-sensitive information, such as a position of a mobile node, is not revealed between two different networks. In the technology, a pHA 124 functions as a proxy home agent of a MN 130. When the pHA 124 receives a packet transmitted from the MN 130 (such as a packet destined for a MN 230), the pHA 124 transmits a query message inquiring about a current position to a home network 200 of the MN 230. In response to the query, a HA 220 gives notification of an address of a proxy home agent (pHA 224) in an overlay network to which the MN 230 is subscribing that is present nearest to the pHA 124. As a result, the pHA 124 sends the packet destined for the MN 230 to the pHA 224, and the packet is transmitted via the overlay network to which the MN 230 is subscribing.
摘要:
A technology is disclosed for appropriately providing a certain service desired by a mobile node, even in an environment including overlay network nodes providing different functions. In the technology, a mobile node (MN) 110 implements Monami6 protocol and transmits a binding update message requesting a service based on the Monami6 protocol. On the other hand, an overlay network is present on a network, the overlay network in which a home agent (MCHA) implementing the Monami6 protocol and a home agent (MSHA) not implementing the Monami6 protocol cooperate to provide functions of an HA. In this instance, for example, an MSHA 150 that receives a message from the mobile node via a path 112 sends the request to an MCHA implementing the Monami6 protocol (such as an MCHA 130) and makes the MCHA process the request.