摘要:
Disclosed is a technique of, in a network conducting network based local mobility management, suppressing generation of signaling and an increase of processing load on a network entity and preventing a delay. According to this technique, a mobile node (MN 130) receives specific information (a token) including an interface identifier and a binding identifier, for example, from a network side (MAG 120) when connecting therewith first. When the mobile node conducts a handover, the mobile node notifies a next connecting MAG 122 of the token. The MAG receiving the token can judge based on this token whether the connection by the mobile node is due to a handover changing a connection point for a certain interface or due to a new connection using a different interface without making an inquiry to other network nodes.
摘要:
Disclosed is a technique whereby a tunnel entry point, which encapsulates a packet (generates a tunnel packet), can detect the presence of a tunneling loop causing a packet to loop the same path while encapsulated. According to this technique, upon receipt of a packet from a source node (source) 1100, TEP (tunnel entry point) 1120 inserts it into a tunnel packet header for encapsulation. Upon receipt of tunnel packets from TEP 1120 and TEP 1140, each of TEP 1140 and TEP 1160 copies the identifier of the original tunnel packet header to a new tunnel packet header for encapsulation. When this tunnel packet returns to TEP 1120 due to a tunneling loop, the tunneling loop is detected by referring to the identifier in the received tunnel packet.
摘要:
A technique disclosed enables a node having a plurality of interfaces to conduct connection of the plurality of interfaces simultaneously in a communication network domain. A mobile node having a plurality of interfaces connects one of the interfaces with a MAG (mobile access gateway) 11a to take part in a NetLMM domain 18 using a NetLMM protocol, and a LMA (local mobility anchor) 13 includes association information with the MAG 11a registered therein. When the mobile node connects another interface with another MAG 11b, the LMA receives a registration request for association information of this mobile node with the MAG 11b, and makes an inquiry to the already registered MAG 11a as to whether link with the mobile node is still valid or not. If the link is valid, the LMA keeps association information of the mobile node with both of the MAGs 11a and 11b.
摘要:
There is provided a technique for reducing the number of messages handled in a Return Routability (RR) procedure for performing authentication between a mobile node (MN) and a peer communication node (CN). According to the technique, an MN 1 pairs two or more care-of addresses assigned respectively to one or more interfaces, and sends a CN 3 one or more first messages including a second care-of address by setting a first care-of address in each pair of care-of addresses as a source address. The CN 3 receives the one or more first messages, generates signature tokens for the first and second care-of addresses, and sends one or more second messages including the generated signature tokens to the second care-of address of the MN 2.
摘要:
The present invention provides a new technique, according to which a mobile router can fulfill functions as a dynamic home agent, in a system where a plurality of mobile routers are in operation, under the management of a service provider belonging to the home agent. According to this technique, the home agent verifies the legitimacy of the mobile router when it receives a Query message and a binding update message requesting permission to fulfill functions as dynamic home agent. Then, after confirming that no other mobile router is currently present, which is fulfilling the functions as dynamic home agent in a set of a plurality of mobile routers, to which this mobile router belongs, it allows said mobile router to operate as the dynamic home agent. Then, even when other mobile router requests the permission to fulfill functions as the dynamic home agent, the request is rejected, and said other mobile router utilizes the mobile router, which is fulfilling functions of the dynamic home agent, as its home agent.
摘要:
A technique to optimize packet transfer in a network is disclosed. According to this technique, a mobile node (MN) 1000 having a plurality of interfaces transmits a filter rule where setting conditions are defined to each of MAG (motility access gateway) 1060 and MAG 1080 connected for the purpose of setting the packet received by each of the interfaces. MAG transfers the received filter rule to a local mobility anchor (LMA) 1010. After analyzing the filter rule, LMA specifies the network node where the filter rule should be reflected and updates the filter rule only to this specific network node. For instance, in case MN desires that a packet from CN 1090 is received via a path 1002, LMA manages that a packet destined to MN as transmitted from CN is to be transferred to MAG 1060 with respect to MAG 1020.
摘要:
The invention discloses a technique to efficiently realize a routing based on preference of a mobile terminal in case the mobile terminal is connected to a mobility management domain of network base different from a home network domain. According to this technique, a mobile terminal (mobile node; MN) 101 has two interfaces, and these interfaces are connected to a mobility management domain (local mobility domain) 11 under the condition that these interfaces are connected to MAG 111 and MAG 112 respectively. In case MN itself decides one of the interfaces to be used for a specific packet flow communication, a routing preference to instruct that the packet flow is to be sent on a routing via the interface is notified to MAG. When MAG notifies the routing preference to LMA (filtering agent) 110, filtering based on the routing preference is carried out.
摘要:
Disclosed is a technique to prevent the registration of false information that a mobile router is managing prefix information that is not actually managed. According to the technique, when a mobile network prefix is registered from an MR (mobile router 20) to a CN 30 (correspondent node), an HA (home agent) 10, for example, intervenes in signaling related to the registration to prevent the registration of false prefix information. For example, in process 150, the MR notifies the prefix information and the HA detects a test message 120 sent from the CN to the MR to check whether the prefix information used for the destination address is valid. If the prefix information is invalid, the packet is discarded.
摘要:
Disclosed in a technique for more accurately checking a network condition such as a transmission delay generated in packet transmission between two nodes and other network conditions. A buffering node 10 is a network node having the function of transferring a packet. When a packet received by a network interface 11 is buffered in a cache 14, a buffer time processor 12 refers to an internal clock 13 to record the time of that moment (the buffered time). Then, when this packet is transferred, the buffer time processor refers again to the current time indicated by the internal clock and subtracts the buffered time from the current time to calculate a buffering time generated by a buffering delay in packet transmission. This buffering time is added to the packet and transmitted.
摘要:
A technique is disclosed, according to which a mobile node, having a plurality of interfaces and performing communication according to flow information when an operator is performing communication based on the flow information as defined by a policy, can select an interface suitable for the flow and can perform communication. According to this technique, a mobile node (MN 10) having a plurality of interfaces has a list to indicate domain limited flows to be transmitted only within a specific network (a trusted network), and a list to indicate the trusted networks. When a certain interface performs handover, and in case there is a domain limited flow that uses the interface, it is decided whether the network of handover destination is a trusted network or not, and in case the network of the handover destination is not a trusted network, it is decided whether it is possible or not to transmit and receive the domain limited flow via another interface that is connected to the trusted network.