摘要:
A method, apparatus and system extend a mobile home agent functionality to enable mobile nodes to use private address to correspond with nodes having public addresses. Specifically, according to an embodiment of the present invention, a home agent may be configured to assign a private address to a mobile node according to predetermined policies. In one embodiment, the packets from the mobile node may be destined for other mobile nodes that belong to the same administrative domain as the home agent. If so, the home agent may decapsulate and forward the packet directly to the destination mobile node. In an alternate embodiment, the packets from the mobile node may be destined for mobile nodes belonging to a different administrative domain than the home agent. If so, the home agent may decapsulate and perform address and port translation on the packet prior to transmission.
摘要:
Methods and devices are disclosed for communicating in a wireless network using multi-protocol label switching (MPLS). A network service node is configured to send identical packets substantially simultaneously to each of a serving network access station and one or more target network access stations via two or more respective MPLS tunnels in response to a handoff trigger message. Additional embodiments and variations are also disclosed.
摘要:
Methods and devices are disclosed for communicating in a wireless network using multi-protocol label switching (MPLS). A network service node is configured to send identical packets substantially simultaneously to each of a serving network access station and one or more target network access stations via two or more respective MPLS tunnels in response to a handoff trigger message. Additional embodiments and variations are also disclosed.
摘要:
Access to 3rd generation cellular services may be provided for a mobile Internet Protocol (IP) client which may be connected via a wireless local area network (WLAN) by maintaining in a home agent a plurality of IP addresses assigned to the MIP client.
摘要:
Systems and methods provide a secure network path through an inner and outer firewall pair between a mobile node on a foreign network and a corresponding node on a home network. One aspect of the systems and methods includes providing a mobile IP proxy between the mobile node and a VPN gateway inside the firewalls. The mobile IP proxy acts as a surrogate home agent to the mobile node, and acts as a surrogate mobile node to a home agent residing on the home network.
摘要:
Network devices on mobile networks may be configured to improve and optimize packet processing and routing. Specifically, a home agent device may be decomposed into its major functionality, namely processing and routing. Various processors on the device are assigned to specific tasks and each processor may be optimized for its specific tasks, thus improving packet processing and routing. The home agent device may comprise one or more physical components.
摘要:
A method for correctly routing packets is described. The method includes receiving an encapsulated packet from a sending mobile node destined for a receiving mobile node. The method determines whether the encapsulated packet is from a mobile node with the recipient as its home agent (reverse tunneled packet), whether the inner packet is destined to a mobile node with the recipient as its foreign agent, and whether the packet had been received in a previous reception. If the answers for all the three are yes, the packet is then delivered to the receiving mobile node. If the answers are yes only for the first two questions, the packet is routed and transmitted away normally and a copy of the packet IP header is cached locally. For all other cases, the packet is routed and transmitted away normally.
摘要:
Telephone service is supplied using a distributed architecture that employs a collection of resources each of which exposes a hierarchical namespace. The architecture includes two fundamental resource types, the device server and the call coordinator, which are interconnected by a network employing a common protocol, e.g., TCP/IP. The interaction between the various resources follows “client-server” principles to implement end-to-end communication. Device servers represent physical/logical telephone devices, which include a) end-point device servers and b) gateway device servers. End-point device servers 1) represent controls for communication, such as keypads, indicator lamps, and displays, and 2) perform media rendering, e.g., voice digitization, transport, and reconstruction. Gateway device servers have two “sides”. One side is implemented to appear to a call coordinator as if it were a device server, and the other side has an interface adapted to interwork with a preexisting island of telephone service. In the term “device server”, “server” is used in the conventional manner of the “client-server” architecture, where the server serves request from the clients and does not take action unless it is in response to a client request. A call coordinator functions in the role of the “client”. The device servers are unaware of communication state, which is maintained by the call coordinator and exposed as a hierarchical namespace. The call coordinator treats the processing of a call as a sequence of steps each of which can be implemented by a small piece of computer executable code called a “feature applet”.
摘要:
This invention uses network stack information to enforce context-based policies. The combination of policies, user/application context information and packet filtering is used to enable fine-grained control of network resources.
摘要:
To reduce a delay between a time that a user of an originating mobile station (MS) requests to set up a Push-To-Talk (PTT) call and the time that the user may begin to speak, a communication system provides a ‘wake up list’ of other mobile stations (MSs) that may be awakened prior to the originating MS requesting to set up a PTT call. To further reduce the delay, the user may begin speaking prior to completion of the call setup. The speech is stored and is conveyed to a called MS when the call is setup. If the call does not get setup or a user of the called MS is not present, the stored speech may be conveyed to the called MS as a voice message. The stored speech, or new speech, may also be used as an announcement of a call instead of the typical “beep” or “chirp.”