摘要:
Disclosed is a technique to reduce the number of messages to register mobile node position information with a home agent when a mobile node roams into a foreign network domain having a roaming relationship with a home network domain. Upon reception of network information 40, when the network information 40 contains a foreign prefix, a MN 11 creates a care-of address (CoA) using the foreign prefix (Step S44). The MN 11 further checks whether the network information 40 contains a home prefix (Step S45). When no home prefix is included in the prefix 203, a BU message is transmitted to a home MAP 1000 (Step S46). When a home prefix exists in the prefix 203, the BU message is not transmitted to the home MAP 1000 (Step S47).
摘要:
The present invention provides a new technique, according to which a mobile router can fulfill functions as a dynamic home agent, in a system where a plurality of mobile routers are in operation, under the management of a service provider belonging to the home agent. According to this technique, the home agent verifies the legitimacy of the mobile router when it receives a Query message and a binding update message requesting permission to fulfill functions as dynamic home agent. Then, after confirming that no other mobile router is currently present, which is fulfilling the functions as dynamic home agent in a set of a plurality of mobile routers, to which this mobile router belongs, it allows said mobile router to operate as the dynamic home agent. Then, even when other mobile router requests the permission to fulfill functions as the dynamic home agent, the request is rejected, and said other mobile router utilizes the mobile router, which is fulfilling functions of the dynamic home agent, as its home agent.
摘要:
The invention discloses a technique to efficiently realize a routing based on preference of a mobile terminal in case the mobile terminal is connected to a mobility management domain of network base different from a home network domain. According to this technique, a mobile terminal (mobile node; MN) 101 has two interfaces, and these interfaces are connected to a mobility management domain (local mobility domain) 11 under the condition that these interfaces are connected to MAG 111 and MAG 112 respectively. In case MN itself decides one of the interfaces to be used for a specific packet flow communication, a routing preference to instruct that the packet flow is to be sent on a routing via the interface is notified to MAG. When MAG notifies the routing preference to LMA (filtering agent) 110, filtering based on the routing preference is carried out.
摘要:
A technique of acquiring a binding ID when a mobile node performs handover is disclosed. According to the technique, when an MN 10 is initially booted on a Non-3GPP network 30, a AAA server 50 generates and stores the binding ID, transmits it to a proxy node 31, and transmits, to the MN, allocation information indicating that the binding ID is allocated to the proxy node. When performing handover to a 3GPP network 20, the MN requests an HA 32 for the binding ID. Then, the HA requests the AAA server for the binding ID, and the AAA server transmits the binding ID to the HA. The HA receives the binding ID and transmits it to the MN.
摘要:
Disclosed is a technique which enables a mobile node (MN) connected to a mobile router (MR) to carry out flow filtering in a mobile network. This technique allows an MN 25 in a mobile network 24 to set a policy needed for the flow filtering in an MR 10 and, in the present invention, an MR inserts an egress characteristic thereof into, for example, a router advertisement message so that the egress characteristic, a node in a mobile network cannot grasp originally, can be advertised to the interior of the mobile network. Thus, the MN can grasp a characteristic of an access network (characteristic of access system 20) even in a case in which it is connected to the MR, which achieves intelligent flow filtering.
摘要:
A technique is disclosed, according to which a mobile node, having a plurality of interfaces and performing communication according to flow information when an operator is performing communication based on the flow information as defined by a policy, can select an interface suitable for the flow and can perform communication. According to this technique, a mobile node (MN 10) having a plurality of interfaces has a list to indicate domain limited flows to be transmitted only within a specific network (a trusted network), and a list to indicate the trusted networks. When a certain interface performs handover, and in case there is a domain limited flow that uses the interface, it is decided whether the network of handover destination is a trusted network or not, and in case the network of the handover destination is not a trusted network, it is decided whether it is possible or not to transmit and receive the domain limited flow via another interface that is connected to the trusted network.
摘要:
Disclosed is a technique capable of proper execution of access control based on various security policies set by a home user with regards to a packet sent from a visitor node. According to the technique, a MR (Mobile Router) 10 which manages a mobile PAN 30 determines whether a sender of a packet from a communication terminal connected to the mobile PAN is a home user's node which is allowed direct access into a home network or a visitor node (VN 31), and forwards the packet from the home user's node to an HA 20 while forwarding the packet from the visitor node to a policy server 36 located in a DMZ 35. This allows the policy server to perform access control on every packet from a visitor node which attempts to gain access into the home network based on a security policy 36a.
摘要:
Disclosed is a technique which enables a mobile node (MN) connected to a mobile router (MR) to carry out flow filtering in a mobile network. This technique allows an MN 25 in a mobile network 24 to set a policy needed for the flow filtering in an MR 10 and, in the present invention, an MR inserts an egress characteristic thereof into, for example, a router advertisement message so that the egress characteristic, a node in a mobile network cannot grasp originally, can be advertised to the interior of the mobile network. Thus, the MN can grasp a characteristic of an access network (characteristic of access system 20) even in a case in which it is connected to the MR, which achieves intelligent flow filtering.
摘要:
Disclosed is a technique for switching a forwarding address of a packet destined for a mobile node in a local mobility domain when the mobile node has a plurality of interfaces so that the packet will be forwarded to the mobile node. According to the technique, an MN 101 receives network information 40 including a domain ID 402 from a network through two or more IFs 1010 and 1011. Based on the domain ID 402 in the network information received, when determining that the IFs 1010 and 1011 are attached to the same domain, the MN 101 decides to allocate the same address to the IFs 1010 and 1011, and requests MAGs 111 and 112 connected to the IFs 1010 and 1011, respectively, to bind the same address to each of link identifiers of the IFs 1010 and 1011. Based on the request, the MAGs 111 and 112 perform binding to forward, to the MN 101, packets destined to the same address of the MN 101.
摘要:
A technique is disclosed, according to which a mobile node, having a plurality of interfaces and performing communication according to flow information when an operator is performing communication based on the flow information as defined by a policy, can select an interface suitable for the flow and can perform communication. According to this technique, a mobile node (MN 10) having a plurality of interfaces has a list to indicate domain limited flows to be transmitted only within a specific network (a trusted network), and a list to indicate the trusted networks. When a certain interface performs handover, and in case there is a domain limited flow that uses the interface, it is decided whether the network of handover destination is a trusted network or not, and in case the network of the handover destination is not a trusted network, it is decided whether it is possible or not to transmit and receive the domain limited flow via another interface that is connected to the trusted network.