摘要:
A communications terminal registered as a controlled terminal in a controlling terminal which controls the controlled terminal via a communications network, the communications terminal includes a receiving unit (15020) which receives a sleep message including information indicating whether or not the controlling terminal is sleeping and information indicating a timing when the controlling terminal leaves sleep mode and wakes up; a detecting unit (15030) which detects a transmission of a registration request for requesting that a new terminal be registered in the controlling terminal as a new controlled terminal, the new terminal being another communications terminal not yet registered in the controlling terminal; and a notifying unit (15040) which determines whether or not the controlling terminal is sleeping based on the sleep message, and notifies the new terminal of the timing by sending the sleep message when the controlling terminal is sleeping and when the transmission of the registration request is detected.
摘要:
A terminal apparatus includes: a transmission unit transmitting, to a master device, a first registration request indicating a request for registration as a new control target terminal; a reception unit receiving registration request acknowledgement information transmitted from the master device in response to reception of the first registration request; a notification unit notifying the outside of the terminal apparatus of notification information included in the registration request acknowledgement information and indicating the master device has received the first registration request; a detection unit detecting another terminal apparatus that is to transmit, to a master device, a second registration request indicating a request for registration as a new control target terminal; and a registration control unit controlling, when the detection unit detects the other terminal apparatus, at least a time when the first registration request is transmitted.
摘要:
A communications terminal registered as a controlled terminal in a controlling terminal which controls the controlled terminal via a communications network, the communications terminal includes a receiving unit (15020) which receives a sleep message including information indicating whether or not the controlling terminal is sleeping and information indicating a timing when the controlling terminal leaves sleep mode and wakes up; a detecting unit (15030) which detects a transmission of a registration request for requesting that a new terminal be registered in the controlling terminal as a new controlled terminal, the new terminal being another communications terminal not yet registered in the controlling terminal; and a notifying unit (15040) which determines whether or not the controlling terminal is sleeping based on the sleep message, and notifies the new terminal is of the timing by sending the sleep message when the controlling terminal is sleeping and when the transmission of the registration request is detected.
摘要:
A technique disclosed enables a node having a plurality of interfaces to conduct connection of the plurality of interfaces simultaneously in a communication network domain. A mobile node having a plurality of interfaces connects one of the interfaces with a MAG (mobile access gateway) 11a to take part in a NetLMM domain 18 using a NetLMM protocol, and a LMA (local mobility anchor) 13 includes association information with the MAG 11a registered therein. When the mobile node connects another interface with another MAG 11b, the LMA receives a registration request for association information of this mobile node with the MAG 11b, and makes an inquiry to the already registered MAG 11a as to whether link with the mobile node is still valid or not. If the link is valid, the LMA keeps association information of the mobile node with both of the MAGs 11a and 11b.
摘要:
There is provided a technique for reducing the number of messages handled in a Return Routability (RR) procedure for performing authentication between a mobile node (MN) and a peer communication node (CN). According to the technique, an MN 1 pairs two or more care-of addresses assigned respectively to one or more interfaces, and sends a CN 3 one or more first messages including a second care-of address by setting a first care-of address in each pair of care-of addresses as a source address. The CN 3 receives the one or more first messages, generates signature tokens for the first and second care-of addresses, and sends one or more second messages including the generated signature tokens to the second care-of address of the MN 2.
摘要:
The present invention provides a new technique, according to which a mobile router can fulfill functions as a dynamic home agent, in a system where a plurality of mobile routers are in operation, under the management of a service provider belonging to the home agent. According to this technique, the home agent verifies the legitimacy of the mobile router when it receives a Query message and a binding update message requesting permission to fulfill functions as dynamic home agent. Then, after confirming that no other mobile router is currently present, which is fulfilling the functions as dynamic home agent in a set of a plurality of mobile routers, to which this mobile router belongs, it allows said mobile router to operate as the dynamic home agent. Then, even when other mobile router requests the permission to fulfill functions as the dynamic home agent, the request is rejected, and said other mobile router utilizes the mobile router, which is fulfilling functions of the dynamic home agent, as its home agent.
摘要:
A technique to optimize packet transfer in a network is disclosed. According to this technique, a mobile node (MN) 1000 having a plurality of interfaces transmits a filter rule where setting conditions are defined to each of MAG (motility access gateway) 1060 and MAG 1080 connected for the purpose of setting the packet received by each of the interfaces. MAG transfers the received filter rule to a local mobility anchor (LMA) 1010. After analyzing the filter rule, LMA specifies the network node where the filter rule should be reflected and updates the filter rule only to this specific network node. For instance, in case MN desires that a packet from CN 1090 is received via a path 1002, LMA manages that a packet destined to MN as transmitted from CN is to be transferred to MAG 1060 with respect to MAG 1020.
摘要:
The invention discloses a technique to efficiently realize a routing based on preference of a mobile terminal in case the mobile terminal is connected to a mobility management domain of network base different from a home network domain. According to this technique, a mobile terminal (mobile node; MN) 101 has two interfaces, and these interfaces are connected to a mobility management domain (local mobility domain) 11 under the condition that these interfaces are connected to MAG 111 and MAG 112 respectively. In case MN itself decides one of the interfaces to be used for a specific packet flow communication, a routing preference to instruct that the packet flow is to be sent on a routing via the interface is notified to MAG. When MAG notifies the routing preference to LMA (filtering agent) 110, filtering based on the routing preference is carried out.
摘要:
A technique is disclosed, according to which a mobile node, having a plurality of interfaces and performing communication according to flow information when an operator is performing communication based on the flow information as defined by a policy, can select an interface suitable for the flow and can perform communication. According to this technique, a mobile node (MN 10) having a plurality of interfaces has a list to indicate domain limited flows to be transmitted only within a specific network (a trusted network), and a list to indicate the trusted networks. When a certain interface performs handover, and in case there is a domain limited flow that uses the interface, it is decided whether the network of handover destination is a trusted network or not, and in case the network of the handover destination is not a trusted network, it is decided whether it is possible or not to transmit and receive the domain limited flow via another interface that is connected to the trusted network.
摘要:
Disclosed is a technique capable of proper execution of access control based on various security policies set by a home user with regards to a packet sent from a visitor node. According to the technique, a MR (Mobile Router) 10 which manages a mobile PAN 30 determines whether a sender of a packet from a communication terminal connected to the mobile PAN is a home user's node which is allowed direct access into a home network or a visitor node (VN 31), and forwards the packet from the home user's node to an HA 20 while forwarding the packet from the visitor node to a policy server 36 located in a DMZ 35. This allows the policy server to perform access control on every packet from a visitor node which attempts to gain access into the home network based on a security policy 36a.