摘要:
A self-organizing IP multimedia subsystem exhibiting node splitting and node merging functions wherein any node within the self organizing IP multimedia subsystem may assume any role thereby providing node balancing and fault tolerance to an overall network.
摘要:
A mechanism by which handoff delay can be minimized while not compromising the IMS/MMD security and also protecting the media if required by certain applications is presented. One proactive method includes proactive authentication. Another proactive method includes proactive security association, such as transferring SA keys from old proxy to new proxy, or transferring keys through serving signal entities. Reactive methods include transferring SA keys from old proxy to new proxy, using either push or pull technology. Other reactive methods include transferring keys through serving signal entities using either push or pull technology.
摘要:
A self-organizing IP multimedia subsystem exhibiting node splitting and node merging functions wherein any node within the self organizing IP multimedia subsystem may assume any role thereby providing node balancing and fault tolerance to an overall network.
摘要:
The present invention advantageously provides several systems and methods for solving the trombone routing issues within an IMS/MMD network. These approaches avoid trombone routing, speed up handoff, and increase the efficiency of signaling and overall performance of an IMS/MMD network. These solutions can broadly be divided into the following categories. Piggy-backing SIP registration over MIP (Split at FA); Selective Reverse Tunneling and Tunneling between FA and P-CSCF; the SIP-based mobility protocol; use of CoA during SIP registration and call up in MIPv6; Piggy-backing SIP registration when HA and S-CSCF Co-exist; Using Dynamic Home Agents in MIPv4 FA-CoA; and the Interceptor-Caching Approach.
摘要:
A mechanism by which handoff delay can be minimized while not compromising the IMS/MMD security and also protecting the media if required by certain applications is presented. One proactive method includes proactive authentication. Another proactive method includes proactive security association, such as transferring SA keys from old proxy to new proxy, or transferring keys through serving signal entities. Reactive methods include transferring SA keys from old proxy to new proxy, using either push or pull technology. Other reactive methods include transferring keys through serving signal entities using either push or pull technology.
摘要:
An overlay service network and method for delivering a multimedia service. The overlay service network comprises a user interface for subscribers to request an available service as a requested service, a register server for registering and storing a database of available services, a plurality of service nodes for executing at least one available service and a controller for receiving a request for an available service, searching the register server for the requested service, selecting one or more of the plurality of service nodes to execute the requested service and establishing a chaining sequence between a node requesting the service, the one or more selected execution nodes and a destination node to execute the requested service.
摘要:
The present invention advantageously provides several systems and methods for solving the trombone routing issues within an IMS/MMD network. These approaches avoid trombone routing, speed up handoff, and increase the efficiency of signaling and overall performance of an IMS/MMD network. These solutions can broadly be divided into the following categories. Piggy-backing SIP registration over MIP (Split at FA); Selective Reverse Tunneling and Tunneling between FA and P-CSCF; the SIP-based mobility protocol; use of CoA during SIP registration and call up in MIPv6; Piggy-backing SIP registration when HA and S-CSCF Co-exist; Using Dynamic Home Agents in MIPv4 FA-CoA; and the Interceptor-Caching Approach.
摘要:
The steps and the data amount are reduced by using a PPP non-standard message to shorten a time needed for call setting, and even when a terminal or PDSN is not adapted to the non-standard message, a call setting procedure can be continued according to a PPP standard procedure. The procedure contains the steps of: establishing a wireless link between MS and PDSN, transmitting PPP standard LCP Cfg-Request from PDSN to MS, transmitting PPP non-standard AltPPP Cfg-Request from PDSN to MS, responding to AltPPP Cfg-Request and returning non-standard AltPPP Cfg-Response if MS is adapted to the non-standard message while responding to LCP Cfg-Request and returning standard LCP Cfg-Response if MS is not adapted to the non-standard message, and authenticating MS on the basis of the standard or non-standard Cfg-Response by PDSN.
摘要:
A system and method for route optimization in PMIP having a first mobile node having a local mobility anchor and anchored at an access router and a second mobile node anchored at an access router is presented. The method includes establishing a binding cache at one access router comprising a mapping of mobile node addresses to access router addresses, populating the binding cache, and updating the mapping of the mobile node addresses in response to a handoff of a mobile node from one access router to another access router, so that a packet is transmitted from the first mobile node to the second mobile node using the mapping in the binding cache. The second access router address is obtained by either transmitting the packet from the first mobile node to the local mobility anchor, or querying neighboring access routers, or broadcasting access router addresses from the local mobility anchor.
摘要:
A method and system for setting up and maintaining an IMS session. The method comprising transmitting an invite message from a registered user equipment, forwarding the invite message to a selected SIP proxy (P-CSCF), forwarding the invite message to a specified SIP server (S-CSCF) and relaying said invite message to a destination. The invite message contains a header and a payload. The header includes an identifier for the load balancing node. The load balancing node is assigned to the user equipment. There are at least two load balancing node, a primary and a secondary load balancing node. The identifier for the load balancing node does not change even if there is a failure of one of a primary load balancing node, the P-CSCFs or S-CSCFs. During registration, the routing information for the load balancing node is added into both via and record-route headers in a SIP registration request.