摘要:
There is disclosed a technique which provides a node discovery method and others capable of detecting a TA allowing a quasi-optimized data route for the achievement of a quasi-optimized data route while guarding the location privacy of an MN. This technique comprises a step in which a mobile node 101 transmits a first message, which is a message with a predetermined format, for the discovery of a processing node to a communication node 102, a step in which a relay node capable of processing the message with the predetermined format makes a judgment on the basis of the first message, received, as to whether the relay node itself is the processing node, and a step in which, when the judgment shows that the relay node itself is the processing node, the relay node which has made the judgment and which is capable of processing the message with the predetermined format transmits a second message, indicating that it becomes the processing node, to the mobile node.
摘要:
A technique for flexibly performing processes depending on the type of a path for providing an additional service when there are a plurality of paths for providing additional services for the same session between terminals communicating with each other over a network is disclosed. According to the technique, when a mobile terminal (MN 100) establishes a QoS path using NSIS to a corresponding node (CN 124) on different types of data communication paths, a signaling message including information (MIE) representing the path type is created and transmitted. Each node (QNE) with an NSIS QoS function, which has received the message, identifies a plurality of QoS paths by comparing the MIE, a session identifier and a flow identifier, and performs processing of the QoS paths according to control information (CI) from MNs or/and the policy which the QNE has.
摘要:
A technology that can provide a node discovery method that can detect a TA that can provide a quasi-optimal data path to acquire the quasi-optimal path while protecting location privacy of a MN and the like are disclosed. The technology includes a step in which a first proxy node 105 that is a proxy node that discovers a processing node 102 as a proxy of a mobile node 101 transmits a first message in a predetermined format used to discover the processing node to a second proxy node 106 that is a proxy node that discovers the processing node as a proxy of a corresponding node. The technology also includes a step in which a relay node that has received the first message and can process the message in the predetermined format judges whether the relay node itself is the processing node based on the first message. The technology also includes a step in which, when judged that the relay node itself is the processing node, the relay node that has made the judgment and can process the message in the predetermined format transmits a second message to the first proxy node stating that the relay node itself will become the processing node.
摘要:
A technique for flexibly performing processes depending on the type of a path for providing an additional service when there are a plurality of paths for providing additional services for the same session between terminals communicating with each other over a network is disclosed. According to the technique, when a mobile terminal (MN 100) establishes a QoS path using NSIS to a corresponding node (CN 124) on different types of data communication paths, a signaling message including information (MIE) representing the path type is created and transmitted. Each node (QNE) with an NSIS QoS function, which has received the message, identifies a plurality of QoS paths by comparing the MIE, a session identifier and a flow identifier, and performs processing of the QoS paths according to control information (CI) from MNs or/and the policy which the QNE has.
摘要:
An object is, when a mobile terminal performs a handover, to more quickly reset a path after the handover and reduce interrupt time (particularly interrupt time of a QoS path) of packet communication. For example, in a state in which a MN 101 has not acquired an address (NCoA) of a new connection destination (AR 109), the MN 101 requests that a QNE (proxy) 123 start a process of establishing a QoS path used when the MN 101 is connected to a new connection destination. The QNE (proxy) makes a resource reservation between the ONE (proxy) itself and a CN 121. As a result, in an upper stream above a QNE (CRN 115), new path information (filter B) is correlated with path information (filter A) used when the MN is connected to an AR 105. Until when the MN uses the actual new CoA and updates the QoS path after movement, the data packet is encapsulated by a proxy node and transmitted based on the path information (filter B).
摘要:
A technique is disclosed, according to which communication can be achieved with high efficiency by selecting access points to be connected based on the quality of end-to-end communication between a mobile node and a correspondent node when there are a plurality of access points. According to this technique, a mobile node 100 transmits to the access point a first message to request the selection of access points to be connected, and the access point, upon receipt of the first message, transmits a second message including specified information necessary for the selection of access points to be connected to a communication apparatus 108. A relay node, upon receipt of said message, updates the specified information based on a providable QoS information, transfers the updated second message to the communication apparatus, and in case another second message has been received subsequently and the relay node itself is a crossover node, optimal communication path between the mobile node and the communication apparatus is decided, and a third message is transmitted to notify the results of decision to the access point on the optimal communication path.
摘要:
A technology for providing an aggregation management system and the like which can quickly and efficiently manage aggregation in a mobile-environment is disclosed. According to the technology, an aggregate node adds mobile status information to signaling messages of end-to-end signaling sessions received from mobile terminals 101 to 105, and sends the signaling messages added with the mobile status information to a deaggregate node 117 in new aggregated sessions where the aggregate node is shifted. The deaggregate node in the new aggregated sessions where the aggregate node is shifted (or relay nodes 131 to 135 as a crossover node) which receives the signaling messages added with the mobile status information, based on the mobile status information, release aggregated sessions before the aggregate node is shifted, or sends a message to release the aggregated sessions to a deaggregate node 113 before the aggregate node is shifted.
摘要:
Disclosed is a technique so arranged that, after handover, a mobile terminal can promptly and continuously accept an additional service (for example, QoS assurance), the mobile terminal has accepted before the handover. With this technique, when the mobile terminal (MN 10) carries out the handover, the MN selects, as a proxy, a node (QNE (proxy) 68) having NSLP for QoS, which exists in the vicinity of an AR (access router) 31 pertaining to a subnet 30 which is a movement destination of the MN (near an AR in a network configuration), and transmits, to this proxy, a message including a flow identifier and a session identifier, which are related to a path 24 established with respect to a CN 60 before the handover. This proxy transmits a message including these flow identifier and session identifier to the CN for, on the basis of a response result to this message, establishing a new path 34 and finding a crossover node at which two paths start to intersect with each other.
摘要:
A technique for flexibly performing processes depending on the type of a path for providing an additional service when there are a plurality of paths for providing additional services for the same session between terminals communicating with each other over a network is disclosed. According to the technique, when a mobile terminal (MN 100) establishes a QoS path using NSIS to a corresponding node (CN 124) on different types of data communication paths, a signaling message including information (MIE) representing the path type is created and transmitted. Each node (QNE) with an NSIS QoS function, which has received the message, identifies a plurality of QoS paths by comparing the MIE, a session identifier and a flow identifier, and performs processing of the QoS paths according to control information (CI) from MNs or/and the policy which the QNE has.
摘要:
By introducing a hierarchical encryption scheme and the use of asymmetric cryptography, the critical information in message exchanges is concealed from unauthorized entities. This helps greatly in preventing man-in-the-middle attacks faced by inter-working. In addition, access control is conducted by introducing a network structure having a rule interpreter that is capable of mapping general rules to WLAN specific commands. It obviates the needs for mobile user's home network to understand information about every WLAN it is inter-worked with. A common interface independent of WLAN technologies could be used by the home network for all the WLANs. The above conception provides a solution to the problems of the protection of user identification information and access control in the inter-working of WLAN.