摘要:
A technique disclosed enables a node having a plurality of interfaces to conduct connection of the plurality of interfaces simultaneously in a communication network domain. A mobile node having a plurality of interfaces connects one of the interfaces with a MAG (mobile access gateway) 11a to take part in a NetLMM domain 18 using a NetLMM protocol, and a LMA (local mobility anchor) 13 includes association information with the MAG 11a registered therein. When the mobile node connects another interface with another MAG 11b, the LMA receives a registration request for association information of this mobile node with the MAG 11b, and makes an inquiry to the already registered MAG 11a as to whether link with the mobile node is still valid or not. If the link is valid, the LMA keeps association information of the mobile node with both of the MAGs 11a and 11b.
摘要:
There is provided a technique for reducing the number of messages handled in a Return Routability (RR) procedure for performing authentication between a mobile node (MN) and a peer communication node (CN). According to the technique, an MN 1 pairs two or more care-of addresses assigned respectively to one or more interfaces, and sends a CN 3 one or more first messages including a second care-of address by setting a first care-of address in each pair of care-of addresses as a source address. The CN 3 receives the one or more first messages, generates signature tokens for the first and second care-of addresses, and sends one or more second messages including the generated signature tokens to the second care-of address of the MN 2.
摘要:
The present invention provides a new technique, according to which a mobile router can fulfill functions as a dynamic home agent, in a system where a plurality of mobile routers are in operation, under the management of a service provider belonging to the home agent. According to this technique, the home agent verifies the legitimacy of the mobile router when it receives a Query message and a binding update message requesting permission to fulfill functions as dynamic home agent. Then, after confirming that no other mobile router is currently present, which is fulfilling the functions as dynamic home agent in a set of a plurality of mobile routers, to which this mobile router belongs, it allows said mobile router to operate as the dynamic home agent. Then, even when other mobile router requests the permission to fulfill functions as the dynamic home agent, the request is rejected, and said other mobile router utilizes the mobile router, which is fulfilling functions of the dynamic home agent, as its home agent.
摘要:
A technique to optimize packet transfer in a network is disclosed. According to this technique, a mobile node (MN) 1000 having a plurality of interfaces transmits a filter rule where setting conditions are defined to each of MAG (motility access gateway) 1060 and MAG 1080 connected for the purpose of setting the packet received by each of the interfaces. MAG transfers the received filter rule to a local mobility anchor (LMA) 1010. After analyzing the filter rule, LMA specifies the network node where the filter rule should be reflected and updates the filter rule only to this specific network node. For instance, in case MN desires that a packet from CN 1090 is received via a path 1002, LMA manages that a packet destined to MN as transmitted from CN is to be transferred to MAG 1060 with respect to MAG 1020.
摘要:
The invention discloses a technique to efficiently realize a routing based on preference of a mobile terminal in case the mobile terminal is connected to a mobility management domain of network base different from a home network domain. According to this technique, a mobile terminal (mobile node; MN) 101 has two interfaces, and these interfaces are connected to a mobility management domain (local mobility domain) 11 under the condition that these interfaces are connected to MAG 111 and MAG 112 respectively. In case MN itself decides one of the interfaces to be used for a specific packet flow communication, a routing preference to instruct that the packet flow is to be sent on a routing via the interface is notified to MAG. When MAG notifies the routing preference to LMA (filtering agent) 110, filtering based on the routing preference is carried out.
摘要:
Disclosed is a technique of, in a network conducting network based local mobility management, suppressing generation of signaling and an increase of processing load on a network entity and preventing a delay. According to this technique, a mobile node (MN 130) receives specific information (a token) including an interface identifier and a binding identifier, for example, from a network side (MAG 120) when connecting therewith first. When the mobile node conducts a handover, the mobile node notifies a next connecting MAG 122 of the token. The MAG receiving the token can judge based on this token whether the connection by the mobile node is due to a handover changing a connection point for a certain interface or due to a new connection using a different interface without making an inquiry to other network nodes.
摘要:
Disclosed is a technique whereby a tunnel entry point, which encapsulates a packet (generates a tunnel packet), can detect the presence of a tunneling loop causing a packet to loop the same path while encapsulated. According to this technique, upon receipt of a packet from a source node (source) 1100, TEP (tunnel entry point) 1120 inserts it into a tunnel packet header for encapsulation. Upon receipt of tunnel packets from TEP 1120 and TEP 1140, each of TEP 1140 and TEP 1160 copies the identifier of the original tunnel packet header to a new tunnel packet header for encapsulation. When this tunnel packet returns to TEP 1120 due to a tunneling loop, the tunneling loop is detected by referring to the identifier in the received tunnel packet.
摘要:
A technique is disclosed, according to which a mobile node, having a plurality of interfaces and performing communication according to flow information when an operator is performing communication based on the flow information as defined by a policy, can select an interface suitable for the flow and can perform communication. According to this technique, a mobile node (MN 10) having a plurality of interfaces has a list to indicate domain limited flows to be transmitted only within a specific network (a trusted network), and a list to indicate the trusted networks. When a certain interface performs handover, and in case there is a domain limited flow that uses the interface, it is decided whether the network of handover destination is a trusted network or not, and in case the network of the handover destination is not a trusted network, it is decided whether it is possible or not to transmit and receive the domain limited flow via another interface that is connected to the trusted network.
摘要:
Disclosed is a technique capable of proper execution of access control based on various security policies set by a home user with regards to a packet sent from a visitor node. According to the technique, a MR (Mobile Router) 10 which manages a mobile PAN 30 determines whether a sender of a packet from a communication terminal connected to the mobile PAN is a home user's node which is allowed direct access into a home network or a visitor node (VN 31), and forwards the packet from the home user's node to an HA 20 while forwarding the packet from the visitor node to a policy server 36 located in a DMZ 35. This allows the policy server to perform access control on every packet from a visitor node which attempts to gain access into the home network based on a security policy 36a.
摘要:
Disclosed is a technique which enables a mobile node (MN) connected to a mobile router (MR) to carry out flow filtering in a mobile network. This technique allows an MN 25 in a mobile network 24 to set a policy needed for the flow filtering in an MR 10 and, in the present invention, an MR inserts an egress characteristic thereof into, for example, a router advertisement message so that the egress characteristic, a node in a mobile network cannot grasp originally, can be advertised to the interior of the mobile network. Thus, the MN can grasp a characteristic of an access network (characteristic of access system 20) even in a case in which it is connected to the MR, which achieves intelligent flow filtering.