摘要:
A first aspect of the invention relates to a method for verifying an attachment of a mobile node to a network element in a network. A second aspect of the invention relates to a method to be implemented in a mobility anchor node, which detects whether a race condition between registration messages occurs and resolves the most recent location of a mobile node. A third aspect of the invention relates to a method for detecting whether a binding cache entry for a mobile at a correspondent node has been spoofed and to a method for registering a care-of address of a mobile node at a correspondent node. A fourth aspect of the invention relates to a method for providing from a mobile node to a local mobility anchor information on an attachment of a mobile node to a network element.
摘要:
The invention relates to a method for informing two access gateways about each other's presence and identity, in order to establish a data path between them, thereby shortening the overall data path of data packets exchanged between two mobile nodes (MN), that are located in different networks. In particular, each access gateway is provided with the other gateway's address and additionally with the other MN's address for forwarding by the access gateway those data packets destined to the other MN to the other access gateway. A combination of Session Initiation Protocol messages (Invite and Ringing) and route optimization messages are used, so as to confer the information on the gateway's ID and MN's address to the gateways.
摘要:
The invention relates to a method for informing two access gateways about each other's presence and identity, in order to establish a data path between them, thereby shortening the overall data path of data packets exchanged between two mobile nodes (MN), that are located in different networks. In particular, each access gateway is provided with the other gateway's address and additionally with the other MN's address for forwarding by the access gateway those data packets destined to the other MN to the other access gateway. A combination of Session Initiation Protocol messages (Invite and Ringing) and route optimization messages are used, so as to confer the information on the gateway's ID and MN's address to the gateways.
摘要:
The invention provides a method for trust relationship detection between a core and access network for a user equipment. The gist is that a security tunnel establishment procedure is used so one entity, be it part of the core network or be it the user equipment itself, is provided with information to determine whether the access network is trusted or untrusted. The information may comprise a first IP address/prefix, which is initially assigned to the user equipment, upon attaching to the access network. The necessary information may further comprise a second IP address/prefix, which is an address/prefix that is allocated at a trusted entity of the core network. Depending which entity determines the trust relationship of the access network, it might be necessary to transmit either the first IP address/prefix or the second IP address/prefix or the first and the second IP address/prefix using the security tunnel establishment procedure.
摘要:
The invention provides a method for trust relationship detection between a core and access network for a user equipment. The gist is that a security tunnel establishment procedure is used so one entity, be it part of the core network or be it the user equipment itself, is provided with information to determine whether the access network is trusted or untrusted. The information may comprise a first IP address/prefix, which is initially assigned to the user equipment, upon attaching to the access network. The necessary information may further comprise a second IP address/prefix, which is an address/prefix that is allocated at a trusted entity of the core network. Depending which entity determines the trust relationship of the access network, it might be necessary to transmit either the first IP address/prefix or the second IP address/prefix or the first and the second IP address/prefix using the security tunnel establishment procedure.
摘要:
The invention relates to a method for ensuring IP session continuity upon a handover of a mobile node to a non-3GPP network, wherein an ongoing IP session of the mobile node goes via a packet data network gateway. For non-3GPP networks it is necessary to discover a security gateway and to then establish the corresponding tunnels to the ePDG to form the new data path; a security tunnel between the mobile node and the security gateway, and an IP tunnel between the packet data network gateway and the security gateway. In order to prepare the handover to possible non-3GPP accesses, the two tunnels are pre-established, however maintained deactivated until their use is actually needed. Accordingly, when handing over to the non-3GPP network, the IP session may be continued without any significant interruption by activating the already established tunnels.
摘要:
The invention relates to a method for ensuring IP session continuity upon a handover of a mobile node to a non-3GPP network, wherein an ongoing IP session of the mobile node goes via a packet data network gateway. For non-3GPP networks it is necessary to discover a security gateway and to then establish the corresponding tunnels to the ePDG to form the new data path; a security tunnel between the mobile node and the security gateway, and an IP tunnel between the packet data network gateway and the security gateway. In order to prepare the handover to possible non-3GPP accesses, the two tunnels are pre-established, however maintained deactivated until their use is actually needed. Accordingly, when handing over to the non-3GPP network, the IP session may be continued without any significant interruption by activating the already established tunnels.
摘要:
The invention relates to optimizing a data path between two communication nodes. A route optimization agent (ROA) is determined in the current network of the second communication node, preferably on the data path between the two communication nodes. Then, an IP tunnel is established between the first communication node and the ROA, the IP tunnel and the corresponding security association of said IP tunnel being based on the home address of the first communication node in its home network. The first communication node may have two IP tunnels based on the same home address, one to its home agent and one to the ROA. Corresponding routing entries and binding cache entries need to be established in the ROA and the first communication node so that all data packets between the two communication nodes are exchanged via the established IP tunnel over the ROA.
摘要:
The invention relates to optimizing a data path between two communication nodes. A route optimization agent (ROA) is determined in the current network of the second communication node, preferably on the data path between the two communication nodes. Then, an IP tunnel is established between the first communication node and the ROA, the IP tunnel and the corresponding security association of said IP tunnel being based on the home address of the first communication node in its home network. The first communication node may have two IP tunnels based on the same home address, one to its home agent and one to the ROA. Corresponding routing entries and binding cache entries need to be established in the ROA and the first communication node so that all data packets between the two communication nodes are exchanged via the established IP tunnel over the ROA.
摘要:
The invention relates to a method for discovering a home agent serving a mobile node upon the mobile node changing its mobility management scheme in a packet-switched network and the implementation of such method in a mobile node or home agent. In order to propose a home agent discover scheme that maintains session continuity in a seamless manner upon a mobile node changing its mobility management scheme, a mobile node comprises information on its location prior to changing the mobility management scheme to one of the first signaling messages transmitted upon changing the mobility management scheme (home agent discovery message). The receiving node uses this information to identify the home agent serving the mobile node or to provide a hint to the home agent where the mobile node is registered in a response message to the mobile node. This approach may also be used for path optimization when a mobile node moves from a trusted to an un-trusted access network.