摘要:
A self-organizing IP multimedia subsystem exhibiting node splitting and node merging functions wherein any node within the self organizing IP multimedia subsystem may assume any role thereby providing node balancing and fault tolerance to an overall network.
摘要:
A self-organizing IP multimedia subsystem exhibiting node splitting and node merging functions wherein any node within the self organizing IP multimedia subsystem may assume any role thereby providing node balancing and fault tolerance to an overall network.
摘要:
A virtualized telecom system and a method for managing service continuity and mobility in a virtualized telecom system. The system comprises a plurality of execution nodes each configured to execute a network function by registering; and a manager node for registering each of the plurality of execution nodes, assigning a node identifier (Node ID) to each of the plurality of execution nodes, periodically polling each of the plurality of execution nodes for a status, and issuing control instructions to each of the plurality of execution nodes based upon the status of a respective execution node. Each of the plurality of execution node responds to the polling by transmitting its status to the manager node. The status includes runtime information and pre-configuration information.
摘要:
An overlay service network and method for delivering a multimedia service. The overlay service network comprises a user interface for subscribers to request an available service as a requested service, a register server for registering and storing a database of available services, a plurality of service nodes for executing at least one available service and a controller for receiving a request for an available service, searching the register server for the requested service, selecting one or more of the plurality of service nodes to execute the requested service and establishing a chaining sequence between a node requesting the service, the one or more selected execution nodes and a destination node to execute the requested service.
摘要:
A method and system for setting up and maintaining an IMS session. The method comprising transmitting an invite message from a registered user equipment, forwarding the invite message to a selected SIP proxy (P-CSCF), forwarding the invite message to a specified SIP server (S-CSCF) and relaying said invite message to a destination. The invite message contains a header and a payload. The header includes an identifier for the load balancing node. The load balancing node is assigned to the user equipment. There are at least two load balancing node, a primary and a secondary load balancing node. The identifier for the load balancing node does not change even if there is a failure of one of a primary load balancing node, the P-CSCFs or S-CSCFs. During registration, the routing information for the load balancing node is added into both via and record-route headers in a SIP registration request.
摘要:
A mechanism by which handoff delay can be minimized while not compromising the IMS/MMD security and also protecting the media if required by certain applications is presented. One proactive method includes proactive authentication. Another proactive method includes proactive security association, such as transferring SA keys from old proxy to new proxy, or transferring keys through serving signal entities. Reactive methods include transferring SA keys from old proxy to new proxy, using either push or pull technology. Other reactive methods include transferring keys through serving signal entities using either push or pull technology.
摘要:
A system and method for route optimization in PMIP having a first mobile node having a local mobility anchor and anchored at an access router and a second mobile node anchored at an access router is presented. The method includes establishing a binding cache at one access router comprising a mapping of mobile node addresses to access router addresses, populating the binding cache, and updating the mapping of the mobile node addresses in response to a handoff of a mobile node from one access router to another access router, so that a packet is transmitted from the first mobile node to the second mobile node using the mapping in the binding cache. The second access router address is obtained by either transmitting the packet from the first mobile node to the local mobility anchor, or querying neighboring access routers, or broadcasting access router addresses from the local mobility anchor.
摘要:
A mechanism by which handoff delay can be minimized while not compromising the IMS/MMD security and also protecting the media if required by certain applications is presented. One proactive method includes proactive authentication. Another proactive method includes proactive security association, such as transferring SA keys from old proxy to new proxy, or transferring keys through serving signal entities. Reactive methods include transferring SA keys from old proxy to new proxy, using either push or pull technology. Other reactive methods include transferring keys through serving signal entities using either push or pull technology.
摘要:
A mechanism by which handoff delay can be minimized while not compromising the IMS/MMD security and also protecting the media if required by certain applications is presented. One proactive method includes proactive authentication. Another proactive method includes proactive security association, such as transferring SA keys from old proxy to new proxy, or transferring keys through serving signal entities. Reactive methods include transferring SA keys from old proxy to new proxy, using either push or pull technology. Other reactive methods include transferring keys through serving signal entities using either push or pull technology.
摘要:
A mechanism by which handoff delay can be minimized while not compromising the IMS/MMD security and also protecting the media if required by certain applications is presented. Methods for mitigating delay during SA re-association and mitigating the IPSec tunnel overhead for signaling and media at the Mobile Node are given. In one embodiment, SA keys can be transferred from the old P-CSCF to new P-CSCF, enabling the establishment of SAs before Mobile Node physically moves to the new subnet in a network. Proactive handover is used. In another embodiment, SA keys are transferred from S-CSCF to new P-CSCF. In this case, the SA keys are transferred to the new P-CSCF by S-CSCF through a context transfer mechanism well in advance so that SAs may be established before Mobile Node physically moves to new subnet. In another embodiment, methods for mitigating IPSec tunnel overhead are presented.