摘要:
A mobile communication system wherein the upstream radio channel interference of a macrocell connection terminal with a femtocell base station can be reduced while the consumption of radio resources caused by increase in signaling is being suppressed. The macrocell connection terminal (401) performs, based on an instruction from a macrocell base station (402), an upstream channel transmission and further reports a peripheral-femtocell detection result obtained by a measuring unit to the macrocell base station. The macrocell base station (402) instructs the terminal to perform a peripheral-femtocell detection. The identifier of the terminal and the peripheral-femtocell detection result obtained by the terminal are transmitted to a network management apparatus (404). An interference reduction instruction (frequency band allocation) and the identifier of the terminal to be interference-controlled are received from the network management apparatus, and the frequency band allocation in the upstream channel transmission of the terminal to be interference-controlled is so controlled as to satisfy the interference reduction instruction.
摘要:
A technique for flexibly performing processes depending on the type of a path for providing an additional service when there are a plurality of paths for providing additional services for the same session between terminals communicating with each other over a network is disclosed. According to the technique, when a mobile terminal (MN 100) establishes a QoS path using NSIS to a corresponding node (CN 124) on different types of data communication paths, a signaling message including information (MIE) representing the path type is created and transmitted. Each node (QNE) with an NSIS QoS function, which has received the message, identifies a plurality of QoS paths by comparing the MIE, a session identifier and a flow identifier, and performs processing of the QoS paths according to control information (CI) from MNs or/and the policy which the QNE has.
摘要:
There is disclosed a technique which provides a node discovery method and others capable of detecting a TA allowing a quasi-optimized data route for the achievement of a quasi-optimized data route while guarding the location privacy of an MN. This technique comprises a step in which a mobile node 101 transmits a first message, which is a message with a predetermined format, for the discovery of a processing node to a communication node 102, a step in which a relay node capable of processing the message with the predetermined format makes a judgment on the basis of the first message, received, as to whether the relay node itself is the processing node, and a step in which, when the judgment shows that the relay node itself is the processing node, the relay node which has made the judgment and which is capable of processing the message with the predetermined format transmits a second message, indicating that it becomes the processing node, to the mobile node.
摘要:
A technology is disclosed that provides an aggregation management method, an aggregate node, and a deaggregate node that can quickly and efficiently manage aggregation. The technology includes a step at which, when an aggregate node 111 moves from an aggregated area 120, the moved aggregate node transmits a release request message to a deaggregate node 113 positioned on the edge of the area before movement. The release request message requests release of a QoS path within the area configured from the position on the edge of the area before movement of the aggregate node itself to the position of the deaggregate node. The technology also includes a step at which the deaggregate node that receives the release request message releases the QoS path configured within the area based on the release request message.
摘要:
By introducing a hierarchical encryption scheme and the use of asymmetric cryptography, the critical information in message exchanges is concealed from unauthorized entities. This helps greatly in preventing man-in-the-middle attacks faced by inter-working. In addition, access control is conducted by introducing a network structure having a rule interpreter that is capable of mapping general rules to WLAN specific commands. It obviates the needs for mobile user's home network to understand information about every WLAN it is inter-worked with. A common interface independent of WLAN technologies could be used by the home network for all the WLANs. The above conception provides a solution to the problems of the protection of user identification information and access control in the inter-working of WLAN.
摘要:
A technology is disclosed that can provide a high-speed QoS handover method and a processing node used in the method, in which a QoS path reconfigured before a handover becomes as optimal a QoS path as possible after the handover, thereby reducing load of route reconfiguration of the QoS path performed after the handover, shortening a segment of QoS path setting performed immediately after the handover, and minimizing a QoS interruption time. The technology includes a step at which a mobile node 10 transmits a first signaling for configuring a predetermined QoS path to a processing node that performs a predetermined process for reducing a load of a modification process for a QoS path after a handover, and a step at which the processing node that receives the first signaling generates a second signaling for performing a QoS setting of the predetermined QoS path based on the received first signaling and transmits the generated second signaling to a predetermined correspondence partner that performs the QoS setting of the predetermined QoS path.
摘要:
A header compression/decompression apparatus that improves the throughput of an overall multilayer protocol stack at a network node. In this apparatus, an encoding section 106 compresses multilayer header information included in a protocol data unit on a multilayer protocol stack 101. A session context ID manager 112 generates a session context ID 401 which is formed by integrating information on compression of multilayer header information by the encoding section 106 and, for example, information for identifying a scheme for compressing multilayer header information.
摘要:
In a data communication network, data route changes happen frequently due to various reasons. For the path specific resource management signaling, such route changes would trigger large amount of signaling actions. Some of the signaling action requires a complicated process and may take a long time. This may cause service interruption in extreme cases. This invention proposed a method for signaling state management along the old data path to achieve fast signaling state re-establishment. Instead of removing the signaling states along the old data path explicitly or by time-out, the invention preserved the signaling state along the old data path with reduced state management. In the reduced state management, network resources that are held by the states along the old data path are released and minimum information is retained. The states become “dormant” states that do not require active monitoring from the network. When the old path is in use again, the states could be restored and network resources be re-allocated fast. This would be much faster than re-establishing the whole state from scratch. This invention also provides a method for fast recovery from transient route changes by allowing the signaling aware nodes at the crossover point of the data path to monitor the status of old path. This way, the signaling system could quickly re-establish the necessary state along the old path once it's found available again.
摘要:
By introducing a hierarchical encryption scheme and the use of asymmetric cryptography, the critical information in message exchanges is concealed from unauthorized entities. This helps greatly in preventing man-in-the-middle attacks faced by inter-working. In addition, access control is conducted by introducing a network structure having a rule interpreter that is capable of mapping general rules to WLAN specific commands. It obviates the needs for mobile user's home network to understand information about every WLAN it is inter-worked with. A common interface independent of WLAN technologies could be used by the home network for all the WLANs. The above conception provides a solution to the problems of the protection of user identification information and access control in the inter-working of WLAN.
摘要:
The communication terminal apparatus measures reception quality and reports the measurement result to the base station apparatus, and the base station apparatus switches the transmission rate based on the reported result of the reception quality. In this way, the transmission rate is switched starting at the point in time at which the reception quality of the communication terminal apparatus deteriorates. Furthermore, the transmission rate is switched so that the amount of interference with others is within the allowable range according to the channel condition between the communication terminal apparatus and base station apparatus.