CN1726727A - Method and apparatus for performing inter-technology handoff from WLAN to cellular network - Google Patents

Method and apparatus for performing inter-technology handoff from WLAN to cellular network Download PDF

Info

Publication number
CN1726727A
CN1726727A CN 200380106093 CN200380106093A CN1726727A CN 1726727 A CN1726727 A CN 1726727A CN 200380106093 CN200380106093 CN 200380106093 CN 200380106093 A CN200380106093 A CN 200380106093A CN 1726727 A CN1726727 A CN 1726727A
Authority
CN
China
Prior art keywords
cellular networks
context information
message
loading context
router
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN 200380106093
Other languages
Chinese (zh)
Inventor
赫门特·查斯卡
戈文德·克里纳默西
迪尔克·特罗森
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nokia Oyj
Original Assignee
Nokia Oyj
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nokia Oyj filed Critical Nokia Oyj
Publication of CN1726727A publication Critical patent/CN1726727A/en
Pending legal-status Critical Current

Links

Images

Abstract

A method, system and computer program are disclosed to perform a low latency inter-technology handoff of a MN from a WLAN to a cellular network. The method includes transmitting a Bearer Context from the MN for use by the cellular network, the Bearer Context containing information required to establish access network bearers in the cellular network for an ongoing Internet session of the MN; and responding to the Bearer Context with a Router Advertisement that is forwarded to the MN. The Bearer Context may be piggybacked on another message, or it may be sent as a separate message. The Bearer Context includes information expressive of: (a) a QoS requirement of an ongoing application or applications of the MN; (b) a unique identity of the MN that is recognizable by the cellular network; (c) parameters to facilitate the creation of a Point-to-Point Protocol state in the cellular network; and (d) parameters to enable establishment of packet filters in the cellular network.

Description

Be used to carry out the method and apparatus that switches between the technology from WLAN to the Cellular Networks
The cross reference of related application
The application requires in the U.S. Provisional Patent Application No.60/425 of submission on November 13rd, 2002, and 801 priority is introduced the application with its full content as reference at this.
Technical field
The present invention relates generally to wireless communication system and method, and more particularly, relate to the technology that is used for switching mobile node (MN) between the wireless network supplier, this wireless network supplier is with different technology operations, for example wireless lan (wlan) and Cellular Networks.
Background technology
Cellular wireless technologies, for example cdma2000 and universal mobile telecommunications system (UMTS) are desirably in one and provide wireless internet connection at a high speed for the mobile subscriber on the overlay area widely.Simultaneously, the WLAN technology, for example IEEE 802.11 and European HiperLAN, it is more and more general to become, because they provide a kind of low cost and radio access scheme at a high speed for localization " focus ".Wide area cellular networks and WLAN will complement each other about mobile network's prediction in future according to one, think that the mobile subscriber provides ubiquitous high speed wireless internet to connect.In so a kind of environment, the mobile subscriber can expect to experience a kind of demand, carries out seamless switching exactly between WLAN and Cellular Networks, even during carrying out internet session.
Soon, can obtain in an equipment combination has different wave points, and for example the portable terminal of Cellular Networks and WLAN is called mobile node again at this.In addition, in recent years, speed had been accelerated in the exploitation with Internet protocol of mobile perception.These and some other factor will be in conjunction with convergences in soon future, with mobile subscriber's feature that enhancing is provided be connected.Yet, this will need to handle and technical solution between the problem switched, for example switch between the technology from WLAN to the Cellular Networks.Particularly, when mobile node from WLAN when cellular network coverage moves, can find that WLAN signal attenuation is very fast.As a result, can be used for carrying out switch or the time and the signal margin of hand-over very little.
A kind of mobile IP protocol has been developed in the Internet engineering duty group (IETF), switches can carry out the IP layer during carrying out internet session.For between this transfer period, the interruption of the Internet connection of mobile node is reduced to minimum, also developing some agreements, for example switch (Fast Handoff) and context transfer (Context Transfer) fast.Though these agreements provide core frame for switching between seamless technology, need extra effort in the particular environment yet they are applied to.In addition, the supposition of these agreements in the source (for example, WLAN) and target (for example, cdma2000) exist a kind of " trust " to concern between the Access Network, but this and be not suitable for all situations.
Summary of the invention
According to the present preferred implementation of the present invention, can overcome aforementioned and some other problem, and can realize some other benefit.
The invention provides a kind of being used for carries out the method for switching between the technology of mobile node at environment preferred rather than that limit from WLAN to the Cellular Networks.This handoff procedure has strengthened basic IP layer handoff technique in following field: (i) set up the Access Network carrying in the honeycomb Access Network fast; And (ii) when switching, with Cellular Networks dynamic authentication and mandate.
The advantage of this method do not need to be existing Cellular Networks protocol architecture is carried out great modification.In addition, this method is adapted to the handoff technique of IP layer, for example low time delay mobile IPv 4 and fast moving IPv6.
The invention discloses a kind of method, system and computer program, be used to carry out between the low time delay technology of the MN from WLAN to the Cellular Networks and switch.This method comprises that the bearer context (Bearer Context) that sends from MN is used for the Cellular Networks use, and this bearer context is included in the Cellular Networks and sets up the required information of Access Network carrying for the ongoing internet session of this MN; And to this bearer context response router advertisement (RouterAdvertisement), this announcement is transmitted to MN.Bearer context can appendix on another message, perhaps as one independently message send.Bearer context comprises information, to express: (a) qos requirement of one or more application of ongoing MN; (b) can be by the unique identification of the MN of Cellular Networks identification; (c) help the parameter that point-to-point protocol status is created in Cellular Networks; And the parameter that (d) makes it possible in Cellular Networks, set up packet filter.This method also comprises the authentication and authorization with target cellular network, its objective is to carry out to switch.
Description of drawings
When the detailed description of the preferred embodiment below reading in conjunction with the accompanying drawings, aforementioned and some other aspect of the present invention can be more obvious, wherein:
Fig. 1 is the first of reference network architecture, and is most preferred, the simplified block diagram of execution mode, and a kind of suitable type of many technology wireless system architecture has been described, advantageously, the present invention can dispose therein;
Fig. 2 is the second of grid of reference structure, and is less preferred, the simplified block diagram of execution mode, and the another kind of suitable type of many technology wireless system arrangements has been described, advantageously, the present invention can dispose therein;
Fig. 3 has illustrated a kind of typical indoor WLAN environment that is positioned at cellular network coverage; And
Fig. 4 is a message diagram, shows switching signal stream between MN, WLAN according to one aspect of the invention and Cellular Networks technology.
Embodiment
It will be appreciated by those skilled in the art that, following disclosing comprises information related to the present invention, and can whole or partly introduce present patent application: IETF in case of necessity and move IP working group (www.ietf.org): low time delay mobile IPv 4 and fast moving IPv6 standard; IETF Seamody working group (www.ietf.org): context (context) shifts framework specification; The 3GPP2 standard: " based on the wireless IP architecture of IETF agreement " (3GPP2#P.R0001) and " Wireless IP network standard (3GPP2#P.S0001-A v3.0) ", www.3gpp2.org; 3GPP2 standard: " Access Network interface inter-operability specification ", RevisionA (3G-IOSv4.1), 3GPP2#A.S0001-A, www.3gpp2.org; The 3GPP standard: " QoS notion and architecture ", TS 23.107, www.3gpp.org; With the 3GPP standard: " GPRS: service description ", TS 03.60, www.3gpp.org.
Fig. 1 shows a kind of grid of reference and disposes execution mode, is also referred to as independently AAA (authentication is authorized, and charges) execution mode.For the purpose of illustrating, not in order to limit, in Fig. 1, to use of the representative of cdma2000 standard as Cellular Networks 2 architectures.In the architecture of Fig. 1, the access of the access of WLAN 1 and cdma2000 net 2 is managed independently, and there is not peer-to-peer (for example co-ownership or roaming agreement) between the two in supposition.A nonrestrictive example of this arrangement is the WLAN focus (hotspot) in bookstore, and its account to user's readership is collected access fee and used.Another example is the WLAN of an enterprise, has only the employee of enterprise just to authorize its access (that is, not having access fee to use for the employee).Perhaps, in some cases, it may be free that the WLAN at the focus place inserts, and therefore, does not need local aaa functionality at this WLAN.The situation about coming to this of the WLAN focus in a cafe for example.On the other hand, the cdma2000 honeycomb inserts normally by the order account charge of (ownership) cellular carrier to the user.
In illustrated example, in each of WLAN 1 and cdma2000 net 2, a plurality of territories 5 are arranged.For example, WLAN 1 comprises home agent territory 6 and WLAN aaa functionality parts 7, and these WLAN aaa functionality parts 7 are connected to WLAN access point 9 by couple in router (AR) 8.Cdma2000 net 2 can comprise the aaa functionality parts 10 that are arranged in ownership operation network (Home Operator Network), and the local aaa functionality parts 11 in visit cdma2000 net, these this locality aaa functionality parts 11 are connected to IMT-2000 wireless network 13 by PDSN (packet data support node) 12.Suppose that MN 3 switches to cdma2000 net 2 by WLAN access point 9 and IMT-2000 wireless network 13 from WLAN 1.
Fig. 2 shows another network design execution mode, is called sharing A AA architecture.Here, suppose between WLAN 1 and cdma2000 net 2 and have a kind of trusting relationship.Note in this embodiment overlapping territory 5A and 5B.For example, if the WLAN focus inserts the operation by cdma2000 operator, this execution mode can exist.Perhaps, between WLAN 1 operator and cdma2000 net 2 operators, there is roaming agreement.Therefore, when switching between technology, the authentication and authorization of being carried out by WLAN 1 also can be reused for 2 accesses of cdma2000 net.In addition, can there be security association 5C between AR in WLAN 18 and the PDSN in cdma2000 net 2 12.For the purpose of complete, the outside in that the WLAN/ of mutual trust Cellular Networks is arranged has illustrated another operator 14, and this operator 14 has a couple in router 15 that is connected to WLAN access point 9.
What the present invention was most interested in is the separate network architecture shown in Fig. 1.Yet, it should be noted that changing method of the present invention can be applicable to the shared deployment model of Fig. 2 equally.
Referring again to Fig. 1, consider switching from WLAN net 1 to cdma2000 net 2.In such environment, suppose that the mobile subscriber initiates a Internet (Internet) 4 sessions from WLAN 1, for example IP-based voice (VoIP) are called out or multi-media conference call control, and leave from the WLAN hot spot coverage afterwards.Before switching the technology of attempting carrying out from WLAN 1 to wide area cdma2000 net 2, MN 3 at first should carry out the authentication and authorization processes with cdma2000 net 2.Notice that the home agent 6 that is used for MN 3 (for example can be positioned at the zone identical with WLAN1, under the situation of enterprise), perhaps be arranged in the zone identical, perhaps be positioned at diverse zone (for example, under bookstore or situation about freely inserting) with home-operator net 2.
In addition, before MN 3 can divide into groups with Internet 4 exchange IP by cdma2000 Access Network 2, should carry out a plurality of processes, comprise being used for the process that IP inserts and service quality (QoS) is provided with.These comprise the Access Network load bearing process that is used for setting up process, the mobile IP process that is connected with the PPP (peer-peer protocol) of PDSN 12 and is used for having in 2 foundation of cdma2000 net suitable QoS characteristic.
Should be reduced to the time delay of these processes of execution minimum, to avoid that service disconnection is taking place when WLAN 1 switches to cdma2000 net 2, for example in the switching of carrying out taking place during the session, for example voip conversation, perhaps media stream session, perhaps contest session.The invention provides a kind of technology, effectively and apace switch between execution technique, avoided problem intrinsic in the prior art.
Usually, some switches message at least if initiatively carry out, that is, when MN 3 still can see strong signal from WLAN access point 9, the performance of switching can be thought and has suitable raising.These steps of initiatively carrying out can comprise that for example quick switch signaling and Cellular Networks 2 authentications and QoS and other requirements that current MN 3 is used are notified to Cellular Networks 2.Then, in case the WLAN signal strength signal intensity reduces, just make MN 3 send final triggering to finish handoff procedure (that is, distributing radio resource for grouping arrangement re-routes, and is carried out any other the necessary process that is used for finishing switching practically) for Cellular Networks 2.
It should be noted, only carry out this task reliably based on MN 3 signal strength metrics, normally impossible.For example, if initiate proactive handoff procedures after the WLAN signal strength signal intensity begins to descend significantly, MN 3 Internet connections will be interrupted before finishing these steps.On the other hand, if initiate handoff procedure (when the WLAN signal is still very strong) prematurely, will produce a large amount of false starts.In other words, even initiatively switch step begins, the mobile subscriber does not in fact leave the overlay area of WLAN 1 at all yet.This can increase the weight of the unnecessary signaling burden of Cellular Networks 2.
With reference to figure 3, it shows an exemplary WLAN/ Cellular Networks environment, for example can run in the building of hotel or other types.Can see that in Fig. 3 Cellular Networks (for example, the cdma2000 net) base station coverage area (footprint) 20 comprises structure 22, this structure 22 comprises a plurality of WLAN access points (AP) overlay areas (footprints) 24.
The invention provides handoff technique between a kind of technology, can clearly be divided into active step and passive step, in addition, the present invention also provides a kind of method, can predict 2 demands of switching from WLAN 1 to Cellular Networks, and making has time enough to carry out initiatively switch step.In this, need handover trigger mechanism to be used to initiate stage 1 and stages 2 aspect (the operation meeting in stage 1 and stage 2 is described in detail below) of handoff technique.
Wherein, signal strength criterion can be used in the generation handover trigger, and this signal strength criterion can be used for producing final handover trigger.Yet, switching to from WLAN the environment of cdma2000, this method might produce pseudo-handover trigger.In order to further specify, consider the handover situations described among Fig. 3, Fig. 3 shows the WLAN coverage territory in focus, and this focus is an indoor environment in this case, for example hotel (structure 22).What zone 24A and 24B represented is the strong signal coverage areas that is positioned at the different WLAN AP of focus.The geographical coverage area of noticing WLAN 1 is included in the geographical coverage area of cdma2000 net 2, and this is a kind of typical situation.Suppose that the mobile subscriber with how wireless (for example, bimodulus WLAN and cdma2000) MN 3 inserts internet session of initiation by WLAN, and 26 walkings along the path then.Along the path 26, when the user arrives the specific region, the WLAN signal strength signal intensity is owing to local factor when for example metal object, wall etc. descend, and MN 3 detects the decline of WLAN signal strength signal intensity, still still can detect strong cellular signal.Under these circumstances, MN 3 will attempt initiating from WLAN 1 to Cellular Networks 2 switching.Yet MN 3 detects the strong signal from WLAN 1 again after several seconds or a moment, and therefore, needs to initiate to switch to turn back to WLAN net 1.A kind of like this ping-pong is unwelcome, because it can bring unnecessary signaling traffic, and may cause that the interruption of customer service is also more than what disappear and cause owing to the WLAN signal transient.Certainly, after the WLAN dropout, before the switching that is initiated to Cellular Networks 2, MN 3 can wait for a bit of time.Yet, to leave structure 22 when in fact the user passes a 22A, and therefore in fact lost when arriving the connection of WLAN net 1, this method has reduced (time delay) performance of switching.
Therefore, adopt switch between signal strength criterion initiation technology and produce final WLAN/ Cellular Networks and switch in, those skilled in the art will recognize that, can adopt other considerations and criterion, the number of times of the repeat requests that produces of Packet Error Ratio and/or time per unit for example, and other parameters relevant with signal quality, replace or in conjunction with the use of the signal strength signal intensity that MN 3 places are received.
More preferably be used at present carry out the initiatively another kind of technology of switching controls, depend on the use of " border bits ", promptly, the information that provides by border access node, provide geographical and cover or area information, be used for by the switching of mobile node controlling initiation from a kind of technical network to another kind of technical network.This point can be with reference to the U.S. Provisional Patent Application No.60/426 by people such as H.Chaskar application, and 385, name is called " Smart Inter-Technology HandoverControl ", and its full content is by with reference to introducing.
What will describe now is a kind of handoff procedure of the cdma2000 of being specifically related to net 2 architectures, and it is operated according to the present invention.
What at first describe is a kind of like this handoff procedure, it be suitable in " pre-registration " pattern low time delay mobile IPv 4 (IETF moves IP working group: " low time delay mobile IPv 4 and fast moving IPv6 standard ", www.ietf.org).Because mobile IPv 4 has been introduced in the cdma2000 standard, therefore this pattern is useful.Corresponding signaling schemes as shown in Figure 4.The basic thought that the present invention is suitable for fast moving IPv6 (in " anticipated switching " pattern) is similar, and has also provided the description of present embodiment below.
Now equally with reference to Fig. 4, initiate after switch the technology of WLAN 1 to cdma2000 net 2 (based on adopting any suitable parameter in MN 3 decision, the for example use of signal strength signal intensity and/or signal quality and/or border bits), it sends proxy router solicitation (ProxyRtSol) by wireless connections and gives AR 8, then, AR 8 sends router solicitation to PDSN 12 via the Internet 4.In addition, MN 3 arrangements are given PDSN 12 via the message that AR 8 shifts be known as " bearer context ".Loading context information comprises parameter, and this parameter is used to the ongoing internet session of MN 3 to set up the Access Network carrying in cdma2000 net 2.This loading context information can appendix on ProxyRtSol or other message, be sent to AR 8 from MN 3, perhaps it can be sent out with a kind of independent message.From AR 8 to PDSN 12, loading context information can appendix on router request message, perhaps it can be sent out with a kind of independent message.Loading context information comprises following one or more similar or suitable information at least:
The qos requirement of the ongoing application of MN, one or more bandwidth, reliability and time-delay characteristics that need for example,
MSID: can be by the travelling carriage identification code of cdma2000 net 2 identification, for example, the IMSI of MN 3 (international mobile subscriber identity),
LCP (LCP) configuration parameter, MRU (maximum receive unit) for example,
ACCM (asynchronous control character mapping) and a kind of link-quality that will use monitor agreement, so that the establishment of ppp state in PDSN 12,
TFT (traffic flow template) is so that can set up the service parameter of packet filter and other any needs, for example level of security of being asked in PDSN 12.
Can not treat the parameter of aforementioned component loading context information with a kind of eye of restriction.For example, also can provide within the scope of the invention, perhaps replace one of aforementioned parameters that other parameters of the resource of request from Cellular Networks 2 are provided, for example be used for the position tracking service and/or the code conversion business of specific cluster session.
12 pairs of loading context information responses of PDSN router advertisement message, this router advertisement message is transmitted to MN 3 via the Internet 4 and AR 8 (as agent router announcement or ProxyRtAdv).Wherein, ProxyRtAdv comprises the challenge (for example, mobile node-Foreign Agent (MN-FA) challenge extension) that is used for the authentication and authorization purpose.
MN 3 sends register requirement (RegReq) message to PDSN 12, with respond (shown in step 2 among Fig. 4) via AR 8.Wherein, this message comprises MN 3 network address identifiers (MN-NAI), the ownership AAA of its sign MN 3, the response (MN-Radius expansion) that will be used for the verify data registered to home agent 6 and be calculated by the MN-FA challenge that receives at ProxyRtAdv are used for authenticating with cdma2000 net 2 and the purpose of service authorization.It should be noted, if loading context information did not send in the past, so it can appendix on this message.
In case receive register requirement, PDSN 12 just uses the ownership AAA territory of NAI expansion with definite MN 3, and sends inquiry to the ownership AAA 10 of the MN 3 that discerns.In a preferred embodiment, in fact PDSN 12 inquires about this locality (visit) AAA 11 in the cdma2000 net 2.Visit AAA 11 then inquiry is transmitted to the ownership AAA 10 of MN 3, can be via one or more intermediate transit AAA.PDSN 12 provides the challenge of being sent by PDSN 12 to ownership AAA 10 in the MN-FA challenge extension, and the replying this challenge of the MN 3 that obtains in the MN-Radius expansion.The explanation that PDSN 12 also provides the access service that MN 3 asked to home agent AAA 10 (for example, QoS).In case the authentication and the service authorization of succeeing, home agent AAA 10 just send successfully to indicate to PDSN 12 (this response can be followed usually and inquire about identical path, and just direction is opposite) and insert to authorize by MN 3.Home agent AAA 10 is also expressly and with the form of encrypting to send " bill " to PDSN 12.The secret that use is shared between ownership AAA 10 and MN 3 is encrypted this bill.These processes are shown in the step 3 of Fig. 4.
Shown in step 4, PDSN 12 stores the bill of plaintext forms and sends the copy of encryption to MN 3 via AR.PDSN 12 also sends all configuration parameters that are used for MN 3 in this message.At this point, can think the phase I (stage 1) of having finished inter-technology handoff process.
MN 3 sends via AR 8 and confirms to reply (ACK) to PDSN 12, and this ACK comprises the expressly bill (step 5) of Fig. 4 of form, thereby be derived from MN 3 really to PDSN 12 proof ACK, at this moment just begun the second stage (stage 2) of inter-technology handoff process.This is a kind of safety measure, helps avoid denial of service (DOS) and attacks, and wherein pernicious node is cheated ACK, thereby causes the burden of the mistake carrying of setting up on cdma2000 net 2.
It should be noted, the stage 1 finish and the beginning in stage 2 between can have time delay.If 1 o'clock 3 incipient stage of MN, the WLAN signal (is still decayed) still quite by force and want to finish the stage 1 before the connection that loses with the Internet 4, this situation will occur.Stage 2 can begin when MN 3 will leave WLAN coverage territory 24 usually.After sending ACK, MN 3 just waits for the information of collecting from cdma2000 net 2.
When MN 3 waits for, cdma2000 net 2 is carried out the A10/A8/A1 carrying and is set up (the step 6) of Fig. 4, just as the cdma2000 standard, described in 3GPP2 Access Network interface inter-operability specification (3G-IOS v4.0.1) Release A (1999) Revision 0, " the netinit carrying is set up " chapter of 3GPP2#A.S0001-0.1.In addition, PDSN 12 carries out registration to the HA 6 of MN 3 in step 7.In case receive the registration reply (RegRep) from HA 6, PDSN 12 just passes through one of access bearer of being set up it is transmitted to MN 3.
As another execution mode of the process in the step 4 of Fig. 4, ownership AAA 10 can produce session key, and as expressly and with the form of encrypting (for example, use MN then 3 and ownership AAA 10 between the secret shared) it is transmitted to PDSN 12.PDSN 12 stores these clear text key, and encryption version is transmitted to MN 3 (via PDSN 12 and AR 8).MN 3 can use the following message of this key authentication or encryption and PDSN 12 to come and go (for example, ACK) then.
Now described be a kind of make aforesaid switching execution mode be suitable for fast moving IPv6 environment (IETF moves IP working group: " low time delay mobile IPv 4 and fast moving Ipv6 standard ", technology www.ietf.org).In the method, AR 8 in the step 1 of Fig. 4 and the communication between the PDSN 12 are carried out by HI/HACK (switching starting/switching ACK) message, and in this embodiment, loading context information and MN-FA challenge difference appendix is on HI and HACK message.In this case, a kind of new message can be used for execution in step 2, and wherein, MN 3 sends the authentication and authorization that response is used for cdma2000 net 2.A kind of like this message also is not put into fast moving IPv6 agreement, has firm security association because this design of protocol is supposition between AR 8 and PDSN 12.In step 4, another kind of new message can be used to send bill to MN 3, and the ACK in the step 5 can be sent to AR 8 simultaneously, uses a kind of F-BU (Binding Update fast) message and makes the bill appendix on it.Another kind of new message can be used for indicating to PDSN 12 with setting up procedure 6 into AR 8 sends.In step 6, PDSN 12 does not carry out registration to HA 6.In addition, between AR 8 and PDSN 12, preferably set up interim tunnel, carry out Binding Update up to MN 3.
Although carried out above description in conjunction with present some preferred implementation, should be realized that practice of the present invention is not limited to these execution modes.For example, bearer context can be sent with the context transfer signaling by MN 3.Again for example, and as mentioned above the same, those, other specification parameters can be included in the loading context information, for example are used for the position tracking service and the code conversion business of specific cluster session except above-mentioned.Again for example, can use the secret of sharing between MN 3 and the ownership AAA 10 that loading context information is encrypted.This can help to prevent to betray a secret by AR 8 to PDSN 12 paths.When PDSN 12 received the bearer context of encryption, the bearer context that it will be encrypted passed to ownership AAA 10 with inquiry mode.Ownership AAA 10 decodes the bearer context of encrypting and responds it is sent to PDSN 12.
Be also to be understood that the present invention comprises computer program code, it is included in the tangible medium, is used to instruct one or more data processors to finish each step of said method.These data processors can reside among MN 3 and the PDSN 12 at least, perhaps in cellular network node that is equal to and functional part.
Although be described in conjunction with the WLAN/cdma2000 Cellular Networks, should be appreciated that these theories also are applicable to the wireless system of other type, for example, theory of the present invention also is applicable to digital TDMA and FDMA system.In addition, although be described, should be realized that these all are exemplary, can not be interpreted as the restriction to practice of the present invention in conjunction with various concrete message, message name and type of message.For example, the message that sends from MN 3 is known as load-bearing context message for convenience's sake, but can be known as other title.

Claims (41)

1. method is used to carry out between the technology of the low time delay of mobile node (MN) from the wireless lan (wlan) to the Cellular Networks and switches, and this method comprises:
The loading context information of sending from described MN is used for described Cellular Networks, and this loading context information comprises the information that is used for setting up for the ongoing grouping data conversation of described MN in described Cellular Networks at least one access bearer; And
To receiving described loading context information response router advertisement message, this router advertisement message is transmitted to described MN.
2. according to the process of claim 1 wherein, described loading context information appendix is on another message.
3. according to the process of claim 1 wherein, described loading context information comprises the information of the qos requirement of the ongoing one or more application that are used for expressing described MN.
4. according to the process of claim 1 wherein, described loading context information comprises that be used for expressing can be by the uniquely identified information of the described MN of described Cellular Networks identification.
5. according to the process of claim 1 wherein, described loading context information comprises the information that is used for expressing the help parameter that point-to-point protocol status is created in described Cellular Networks.
6. according to the process of claim 1 wherein, described loading context information comprises and is used for expressing the information that makes it possible to set up the parameter of packet filter in described Cellular Networks.
7. according to the process of claim 1 wherein, described loading context information appendix is on router request message, and this router request message is that response receives from the proxy requests solicitation message of described MN and sends from couple in router (AR).
8. according to the method for claim 7, wherein, described router advertisement sends to described AR, and described in response AR sends agent router and announces to described MN.
9. method according to Claim 8, wherein, described router advertisement comprises the challenge that is used for the authentication and authorization purpose.
10. method according to Claim 8, wherein, described MN responds described agent router announcement by sending login request message to described Cellular Networks.
11. method according to claim 10, wherein, described agent router announcement comprises the challenge that is used for the authentication and authorization purpose, and wherein, described login request message comprises the information of the attribution authentication that is used at the described MN of described Cellular Networks identification, mandate, charging (AAA) functional part and to the response of the described challenge that receives in described agent router announcement.
12. according to the method for claim 11, wherein, response receives described login request message, sends the described ownership AAA of inquiry to described MN.
13. according to the method for claim 12, wherein, described inquiry directly sends via visit AAA, perhaps sends via at least one intermediate transit AAA.
14. method according to claim 12, wherein, the described inquiry that sends to described ownership AAA comprises information of indicating the described challenge that sends to described MN and the described response to described challenge that receives from described MN, is used for by the described MN of described ownership aaa authentication.
15. according to the method for claim 14, wherein, the described inquiry that sends to described ownership AAA comprises the information of indicating the access service that described MN asked.
16. the method according to claim 14 also comprises, response success identity described MN sends the access that the successful indication from described ownership AAA is used to authorize described MN.
17. according to the method for claim 16, wherein, this is successfully indicated and also comprises with expressly and so that be used in the bill that form that the secret shared between described ownership AAA and the described MN encrypts sends.
18. according to the method for claim 17, wherein, the described plaintext form of described bill is stored in the cellular network node, and wherein, the bill of described encryption sends to described MN via described AR.
19. according to the method for claim 18, comprise also sending and reply (ACK) that this ACK comprises described plaintext bill to described Cellular Networks from the affirmation of described MN.
20. according to the method for claim 19, response receives the described plaintext bill from described MN, also is included in to carry out access bearer foundation in the described Cellular Networks, is used to described MN to set up at least one access bearer.
21. method according to claim 20, further response receives the described plaintext bill from described MN, in a single day register described MN to described HA, and receive registration reply, just described registration reply is transmitted to described MN from described Cellular Networks by the access bearer of setting up from described HA.
22. method according to claim 17, also comprise, generate session key at described ownership AAA with plaintext and so that be used in the form of the secret encryption of sharing between described MN and the described ownership AAA, the described plaintext session key of storage in cellular network node, and the described encrypted form of described session key is transmitted to described MN, by described MN use in the following message contact of authentication and encryption and described Cellular Networks at least a.
23. according to the process of claim 1 wherein, described bearer context is sent by the form that described MN uses the secret shared between the attribution authentication, mandate, charging (AAA) functional part of described MN and the described MN in described Cellular Networks to encrypt.
24. according to the process of claim 1 wherein, the communication between described MN and the described Cellular Networks comprises HI/HACK (switching starting/switching ACK) message, and wherein, described loading context information appendix is on described HI message.
25. according to the method for claim 24, wherein, described Cellular Networks responds with mobile node-Foreign Agent (MN-FA) challenge extension of appendix on described HACK message and receives described loading context information.
26. according to the process of claim 1 wherein, described MN sends described loading context information responding a kind of variation, this variation is the signal strength signal intensity relevant with WALN, signal quality and such as at least one variation of the out of Memory of geographical domain information.
27. a data communication system comprises mobile node (MN), wireless lan (wlan) and Cellular Networks, this system also comprises:
Transmitter is used to send loading context information from described MN to described Cellular Networks, and this loading context information comprises the information that is used for setting up for the ongoing grouping data conversation of described MN in described Cellular Networks access bearer; And
To receiving described loading context information response router advertisement message, this router advertisement message is transmitted to described MN.
28. according to the system of claim 27, wherein, described loading context information appendix is on another message.
29. according to the system of claim 28, wherein, described loading context information appendix is on router request message, this router request message is that response receives from the proxy requests solicitation message of described MN and sends from couple in router (AR).
30. system according to claim 28, wherein, communication between described MN and the described Cellular Networks comprises HI/HACK (switching starting/switching ACK) message, wherein said loading context information appendix is on HI message, and wherein, described Cellular Networks is to receiving described loading context information response mobile node-Foreign Agent (MN-FA) challenge extension, and this expansion appendix is on HACK message.
31. system according to claim 27, wherein, described loading context information comprises at least one the information that is used for expressing following aspect: the qos requirement of the ongoing application of at least one of described MN, can be by the unique identification of the described MN of described Cellular Networks identification, the parameter that helps the parameter that point-to-point protocol status is created in described Cellular Networks and make it possible to set up packet filter in described Cellular Networks.
32. according to the system of claim 27, wherein, described loading context information is received by packet data support node (PDSN).
33. computer program, be used to control the operation of mobile node (MN), this node can be operated with wireless lan (wlan) or Cellular Networks, the variation of the WLAN signal strength signal intensity that described computer program response receives and at least one of signal quality, send loading context information from described MN to described Cellular Networks, this loading context information comprises the information that is used for setting up for the ongoing grouping data conversation of described MN in described Cellular Networks at least one access bearer.
34. according to the computer program of claim 33, wherein, described loading context information appendix is on another message.
35. according to the computer program of claim 34, wherein, described loading context information appendix is on router request message, this router request message is that response receives from the proxy requests solicitation message of described MN and sends from couple in router (AR).
36. computer program according to claim 34, communication between wherein said MN and the described Cellular Networks comprises HI/HACK (switching starting/switching ACK) message, wherein said loading context information appendix is on HI message, and wherein said Cellular Networks is to receiving described loading context information response mobile node-Foreign Agent (MN-FA) challenge extension, and this expansion appendix is on HACK message.
37. according to the computer program of claim 33, wherein said loading context information comprises in order to express at least one information of following aspect: the qos requirement of the ongoing application of at least one of described MN, can be by the unique identification of the described MN of described Cellular Networks identification, help the parameter that point-to-point protocol status is created in described Cellular Networks and make it possible in described Cellular Networks, set up the parameter of packet filter.
38. computer program, be used to control the operation of the network node of Cellular Networks, described computer program response receives the loading context information from the mobile node (MN) of current and wireless lan (wlan) wireless connections, begin to described MN sets up the Cellular Networks access bearer, this loading context information comprises the information that is used for setting up for the ongoing grouping data conversation of described MN in described Cellular Networks at least one access bearer.
39. according to the computer program of claim 38, wherein, described cellular network node comprises packet data support node (PDSN).
40. according to the computer program of claim 39, wherein, described Cellular Networks comprises the cdma2000 Cellular Networks.
41. computer program according to claim 38, wherein, described cellular network node is by sending router advertisement message to described MN, and this router advertisement message is drawn together mobile node-Foreign Agent challenge extension message, and response receives described loading context information.
CN 200380106093 2002-11-13 2003-11-11 Method and apparatus for performing inter-technology handoff from WLAN to cellular network Pending CN1726727A (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US42580102P 2002-11-13 2002-11-13
US60/425,801 2002-11-13
US10/600,156 2003-06-19

Publications (1)

Publication Number Publication Date
CN1726727A true CN1726727A (en) 2006-01-25

Family

ID=35925203

Family Applications (1)

Application Number Title Priority Date Filing Date
CN 200380106093 Pending CN1726727A (en) 2002-11-13 2003-11-11 Method and apparatus for performing inter-technology handoff from WLAN to cellular network

Country Status (1)

Country Link
CN (1) CN1726727A (en)

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2008098439A1 (en) * 2007-02-15 2008-08-21 Huawei Technologies Co., Ltd. Method and system for switching route
CN101222319B (en) * 2007-01-10 2010-05-26 华为技术有限公司 Cryptographic key distribution method and system in mobile communication system
CN101540789B (en) * 2008-03-20 2011-12-14 电信科学技术研究院 Method and device for allocating mobile-node network address identifiers
CN101336532B (en) * 2006-02-05 2012-01-11 艾利森电话股份有限公司 Method and apparatus for mounting packet filter in data transmission
CN102368860A (en) * 2011-08-23 2012-03-07 李秀川 Network switch method and device
CN101651882B (en) * 2008-08-11 2012-03-21 华为技术有限公司 Pre-registration method and pre-registration system
CN101047987B (en) * 2006-04-24 2012-04-04 华为技术有限公司 Method of R3 information transmission when R3 transport
CN103533610A (en) * 2012-07-05 2014-01-22 瀚宇彩晶股份有限公司 Wireless-network selection method and portable electronic device thereof
CN105072651A (en) * 2006-09-29 2015-11-18 高通股份有限公司 Method and apparatus for system interoperability in wireless communications
CN105122884A (en) * 2013-04-13 2015-12-02 瑞典爱立信有限公司 Network-instructed handover from WLAN to another radio access network
CN105376219A (en) * 2011-06-30 2016-03-02 英特尔公司 Mobile device and method for automatic connectivity, data offloading and roaming between networks
CN107534994A (en) * 2015-05-12 2018-01-02 瑞典爱立信有限公司 Handle the method and node of the access serviced via non-3 GPP network to EPC

Cited By (20)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101336532B (en) * 2006-02-05 2012-01-11 艾利森电话股份有限公司 Method and apparatus for mounting packet filter in data transmission
CN101047987B (en) * 2006-04-24 2012-04-04 华为技术有限公司 Method of R3 information transmission when R3 transport
CN105072651B (en) * 2006-09-29 2018-11-20 高通股份有限公司 For providing the method and apparatus of interoperability of system in wireless communications
CN105072651A (en) * 2006-09-29 2015-11-18 高通股份有限公司 Method and apparatus for system interoperability in wireless communications
CN101222319B (en) * 2007-01-10 2010-05-26 华为技术有限公司 Cryptographic key distribution method and system in mobile communication system
CN101247317B (en) * 2007-02-15 2011-07-20 华为技术有限公司 Routing switching method and system
WO2008098439A1 (en) * 2007-02-15 2008-08-21 Huawei Technologies Co., Ltd. Method and system for switching route
US9049625B2 (en) 2007-02-15 2015-06-02 Huawei Technologies Co., Ltd. Route switching methods and systems
CN101540789B (en) * 2008-03-20 2011-12-14 电信科学技术研究院 Method and device for allocating mobile-node network address identifiers
CN101651882B (en) * 2008-08-11 2012-03-21 华为技术有限公司 Pre-registration method and pre-registration system
CN105376219A (en) * 2011-06-30 2016-03-02 英特尔公司 Mobile device and method for automatic connectivity, data offloading and roaming between networks
CN102368860A (en) * 2011-08-23 2012-03-07 李秀川 Network switch method and device
CN102368860B (en) * 2011-08-23 2018-07-06 李秀川 A kind of method for switching network and device
CN103533610B (en) * 2012-07-05 2016-08-03 瀚宇彩晶股份有限公司 Wireless network system of selection and portable electronic devices thereof
CN103533610A (en) * 2012-07-05 2014-01-22 瀚宇彩晶股份有限公司 Wireless-network selection method and portable electronic device thereof
CN105122884A (en) * 2013-04-13 2015-12-02 瑞典爱立信有限公司 Network-instructed handover from WLAN to another radio access network
US11290927B2 (en) 2013-04-13 2022-03-29 Telefonaktiebolaget L M Ericsson (Publ) Network-instructed handover from WLAN to another radio access network
CN107534994A (en) * 2015-05-12 2018-01-02 瑞典爱立信有限公司 Handle the method and node of the access serviced via non-3 GPP network to EPC
CN107534994B (en) * 2015-05-12 2021-09-21 瑞典爱立信有限公司 Method and node for handling access to EPC services via non-3 GPP networks
US11271937B2 (en) 2015-05-12 2022-03-08 Telefonaktiebolaget Lm Ericsson (Publ) Method and nodes for handling access to EPC services via a non-3GPP network

Similar Documents

Publication Publication Date Title
US7280505B2 (en) Method and apparatus for performing inter-technology handoff from WLAN to cellular network
KR101268892B1 (en) Methods for common authentication and authorization across independent networks
EP1974554B1 (en) System and method for mobility management on wireless networks
TWI430634B (en) Wireless communication method and system for implementing media independent handover between technologically diversified access networks
JP5503620B2 (en) Communication system and access network information transfer manager
JP5706471B2 (en) Inter-system handoff in a multi-access environment
US8011001B2 (en) Method for managing security in a mobile communication system using proxy mobile internet protocol and system thereof
JP2006506930A5 (en)
WO2005002267A2 (en) Seamless inter-system handover using pre-authentication and session pre-activation
JP2007505531A (en) Secure intra-domain and inter-domain handover
KR20110045796A (en) Method and system for managing security in mobile communication system
CN1989756A (en) Framework of media-independent pre-authentication support for pana
WO2003065738A2 (en) Access terminal profile in a data cellular network
CN101711473B (en) Multiple bindings having independent forward and reverse link bindings for mobile internet protocols
KR20120051039A (en) Pre-registration security support in multi-technology interworking
KR20100010936A (en) Method, system and device for location update in networks
CN1726727A (en) Method and apparatus for performing inter-technology handoff from WLAN to cellular network
KR100700887B1 (en) Method for Vertical Handoff between WLAN and CDMA Based on Mobile Internet Protocol
US20090161624A1 (en) Registering a mobile communication device with an access network
US20080298301A1 (en) Method to switch between network-controlled and mobile-controlled mobile ip functionality
JP2003234740A (en) Method for making access to mobile ip network safe
CN101031133B (en) Method and apparatus for determining mobile-node home agent
Lin et al. Mobile intelligent agent technologies to support intelligent handover strategy
Damic Introducing L3 network-based mobility management for mobility-unaware IP hosts
Sheng et al. Security mechanisms for delivering ubiquitous services in next generation mobile networks

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
REG Reference to a national code

Ref country code: HK

Ref legal event code: DE

Ref document number: 1086148

Country of ref document: HK

C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Open date: 20060125

REG Reference to a national code

Ref country code: HK

Ref legal event code: WD

Ref document number: 1086148

Country of ref document: HK