GB2422272A - Network mobility - Google Patents

Network mobility Download PDF

Info

Publication number
GB2422272A
GB2422272A GB0500655A GB0500655A GB2422272A GB 2422272 A GB2422272 A GB 2422272A GB 0500655 A GB0500655 A GB 0500655A GB 0500655 A GB0500655 A GB 0500655A GB 2422272 A GB2422272 A GB 2422272A
Authority
GB
United Kingdom
Prior art keywords
network
traffic
data packet
mobile
address
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
GB0500655A
Other versions
GB0500655D0 (en
Inventor
Abdol Hamid Aghvami
Paul Pangalos
Andrej Mihailovic
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Kings College London
Original Assignee
Kings College London
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Kings College London filed Critical Kings College London
Priority to GB0500655A priority Critical patent/GB2422272A/en
Publication of GB0500655D0 publication Critical patent/GB0500655D0/en
Priority to US11/332,036 priority patent/US20060159088A1/en
Publication of GB2422272A publication Critical patent/GB2422272A/en
Withdrawn legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/24Multipath
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/302Route determination based on requested QoS
    • H04L45/306Route determination based on the nature of the carried application
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/302Route determination based on requested QoS
    • H04L45/308Route determination based on user's profile, e.g. premium users
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W40/00Communication routing or communication path finding
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/60Scheduling or organising the servicing of application requests, e.g. requests for application data transmissions using the analysis and optimisation of the required network resources
    • H04L67/63Routing a service request depending on the request content or context
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W80/00Wireless network protocols or protocol adaptations to wireless operation
    • H04W80/04Network layer protocols, e.g. mobile IP [Internet Protocol]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W84/00Network topologies
    • H04W84/005Moving wireless networks

Abstract

Data flows from a mobile router in a mobile network e.g. aboard a train are routed according to the type of traffic present in each data packet. Thus a first type e.g. browsing, e-mail, short FTP or peer-peer, is forwarded by a first route and a second type e.g. FTP, VOIP or streaming is forwarded by a second route. Using only one method of routing is not optimal for all types of traffic. Discrimination between types can be determined by typical transport layer connections required by the traffic. The first type of traffic requires shorter transport layer connection and can be route optimised by replacing the source address of the data packet by the address of an interface in the foreign network which the mobile router s currently attached. The second traffic type requires greater connection time and is routed via a NEMO-type bidirectional tunnel between the mobile router and its home Agent and hence indirectly towards its destination. This makes the mobility of the mobile router indistinguishable to the source. Where handover of the mobile router is imminent, a third routing may be used where the source address is replaced by the address of an interface in the new foreign network.

Description

iMPROVEMENTS IN OR RELATING TO NETWORK MOBILITY FIELI) OF THE INVENTION
The present invention relates to a method of routing packet data flows from a mobile router in a mobile network, to a computer program, to a computer program product, to a mobile router, to a mobile network, to a mobile network comprising such as mobile router, to a vehicle comprising such a mobile router, and to a method of route optimising data packet flows from a mobile network.
BACKGROUND TO THE INVENTION
Network mobility support is concerned with managing the mobility of an entire network, viewed as a single unit, which changes its point of attachment to a fixed network infrastructure and thus its reachability in the network topology, most frequently the Internet. The mobile part of the network is referred to as a "mobile network", that can be installed in a train for example, and which includes one or more "mobile routers" (MRs) which act as gateways to the mobile network and connect it to the global Internet. Nodes behind the MR(s) can be classified as "Local Fixed Nodes" (LFN5) such as wired Internet access point on the train, Local Mobile Nodes (LMNs) such as mobile PDAs carried by personnel working on the train, and Visiting Mobile Nodes (VMNs) such as notebook computers and mobile telephones carried by passengers on the train. In most cases, the internal structure of the mobile network will in effect be relatively stable (no dynamic change of the topology), subject to joining and leaving of VMNs and LMNs. The MR provides wireless access for the network nodes via access routers that are part of the fixed network infrastructure.
Access routers include satellites, UMTS Node Bs, GSM base stations, E)VB transmitters and wireless access points.
The mobility of mobile networks does not cause the network nodes to change their own physical point of attachment, although they happen to change their topological location with respect to the global Internet. If network mobility is not explicitly supported by some mechanisms, the mobility of the MR results in mobile nodes losing Internet access and breaking ongoing connections with correspondent nodes (hereinafter CNs) in the global Internet. In addition, the communication path between the network nodes and the CNs becomes sub-optimal, and nested mobility The current solution to provide network mobility is promoted by the NEtworks in MOtion (NEMO) working group of the Internet Engineering Task Force (see www.ietforglhtml.charters/ncmo-chartcr.html). "NEMO Basic Support" (see <draft-ietf-nemo-basic-support-03.txt> at the same website) aims to provide connection continuity for nodes in the mobile network, whilst optimization mechanisms will be provided in "NEMO Extended Support" of which there is an Internet Draft by Perera et al. (see below).
NEMO Basic Support provides connection (or session) continuity (e.g. continuity for TCP connections) by creating a "bi-directional tunnel" between the MR and its home network. This bi-directional tunnel is formed by encapsulating IF packets to and from the network nodes in IP packets addressed between the MR and a Home Agent on the MR's home network. In this way traffic flows are routed via the MR and its llome Agent and the mobility of the mobile network is transparent to all network nodes attached thereto. I lowever, network nodes (particularly VMNs) can establish their own tunnels under Mobile lPv4 (MlPv4) and Mobile lPv6 (MlPv6) for example to their respective Home Agents and CNs. Thus each data packet flow between a network node in the mobile network and a CN passes through multiple tunnels before packets can be routed toward their destination as more fully described herein. This will result in high encapsulation overhead and routing delays, particularly at the MR's Home Agent since all traffic flows must be routed therethrough.
The Internet Draft "Route Optimization for Mobile Nodes based on Prefix Delegation" by Lee et al. (<draft-leekj-nemo-ro-pd-OO.txt presently available at www.icft.org) provides route optimization by using a prefix delegation protocol.
When a mobile router undergoes handover at the network layer it advertises the network prefix of its new access router in Router Advertisements, instead of advertising the network prefix of its home network as suggested by NEMO Basic Support. Mobile nodes behind the mobile router can then use the access router network prefix to auto configure a new primary care-of address that is topologically correct, which is notified to their respective Home Agents and any CNs in binding updates. In this way the Route Optimisation suggested in M1Pv6 (RFC 3775) can be implemented for mobile nodes behind the mobile router, thereby mitigating the need for all traffic flows to be routed via the mobile node's Home Agent or the MR's Home Agent. One disadvantage of this method is the mobility of the mobile network becomes transparent to the network nodes behind the MR, in contravention of one of the aims set out in "Network Mobility Support Goals and Requirements" (<draft-ietf- nemo-requirements-02.txt>): each time the MR undergoes a network layer handover, all network nodes attached to the mobile network that have configured a topologically correct new care-of address will have to send binding updates. This results in high signalling overhead that should be avoided if possible, particularly in view of the limited radio resource on the wireless link between the MR and the access router.
The Internet Draft "Extended Network Mobility Support" by Perera et al. (<draft-perera-nemo-extended-OO.txt> presently available at www.ietf.org) attempts to deal with these problems. Furthermore it aims to overcome the problem of indirect routing of datagrams to and from the mobile network via the NEMO bidirectional tunnel. The solution is to force the MR to act as an access router for the mobile nodes behind it. When it has moved to a new network, the MR advertises the new network prefix to mobile nodes attached to it. The mobile nodes can use the new network prefix to configure a topologically correct care-of address (e.g. by stateless address auto configuration) in a similar fashion to that described by Lee et al. En addition the mobile router acts as the Home Agent for LFNs and LMNs in the mobile network.
The LFNs and LMNs send binding updates to the mobile router, acting as Ilome Agent, as usual under MlPv6. Since the LFNs and LMNs then have a Home Agent on the mobile network, it is not necessary for binding updates to be sent outside the mobile network (other than to CNs in Route Optimised mode) thereby reducing signalling overhead. Furthermore, all types of MIPv6 capable network nodes attached to the mobile network can use the MIPv6 Route Optimisation option to reduce routing packet delay, etc. associated with the NEMO bi-directional tunnel.
The solutions proposed by Lee et al. and Perera et al. enable MlPv6 Route Optimisation for network nodes behind the NEMO network with the benefits of reduced encapsulation overhead and routing delay. However, this is done at the expense of transport layer connection/transmission stability. In particular, ongoing connections will be broken when the MR undergoes a network layer handover.
Thus the proposals of Basic NEMO Support and the route optimisation proposal of' Lee and Perera provide two different levels of connection stability for network nodes in the NEMO network: one provides connection stability through establishment of a NEMO bi-directional tunnel between the MR and its Home Agent, and the other provides route optimisation at the expense of a higher probability of connection breakage due to handovers of the MR.
From the foregoing it is apparent that there is a need for an improved method of providing data packet (or traffic) flow management for data packets passing through a mobile router in a mobile network which avoids routing all traffic through a bi-directional tunnel when possible, but which also does not expose transport layer connections to a high risk of interruption and thereby a lower quality of service for IS users.
SUMMARY OF THE PRESENT INVENTION
Preferred embodiments of the present invention are based on the insight by the applicant that the same routing policy should not be applied to all data packet flows passing through a mobile router. In particular, the relative duration of different transport layer connections between hosts on the mobile network and hosts outside the mobile network can be used to select a routing method for each data packet flow.
Based on this insight, traffic flow management can be enabled that reduces encapsulation overhead and the overall packet routing delay for nodes behind the mobile router and the remote hosts with which they correspond.
According to the present invention there is provided a method of routing data packet flows from a mobile router in a mobile network, which method comprises the steps of - (a) receiving a data packet from a first host within said mobile network addressed to a second host; (b) estimating which type of traffic is present in said data packet: and (c) Forwarding said data packet by applying a first routing method for a first type oftraffic and a second routing method for a second type of traffic. A packet data flow may be defined as a flow of data packets generated by one application running on a host in the mobile network. Thus each packet data flow is associated with one application of one user. One advantage of this method is that data packet flows can be differentiated on the basis of expected transport layer connection duration and routed by an appropriate routing method. For example, shorter duration connections can be routed by a first routing method that has a relatively high probability of connection interruption per unit time compared to a second routing method that has a lower probability per unit time. A connection interruption may occur when the mobile router undergoes a network layer handover. Another advantage is that no new hardware or software functionality is required other than in a mobile router. Therefore reduction in routing delays and encapsulation overhead can be obtained with a software update of a mobile router for example. Preferably, the second host is not part of the mobile network but is reachable via an external network such as the Internet or WAN.
A data packet may be defined as a piece of an electronic message that is transmitted over a packet-switched network such as the Internet. Traffic may be differentiated into types by a large number of different variables, for example by application, by user of the application (represented by a network interface address for example), by Quality of Service flags in the data packet header, by source address in the data packet header, etc. However, it is advantageous if expected connection or transmission duration is used as the primary differentiator between traffic types. In the present context "connection" may mean the time taken by the transport layer protocol in the first host to establish a connection with the second host, receive all of the data from the second host that is requested and to close the connection.
"Transmission" may mean the time taken for the first host to forward all of the data packets toward the second host, which therefore may be shorter than the corresponding connection time. Routing method may mean a way of forwarding the data packet from the mobile network such as by IP- in-IP tunnelling.
Preferably, said first type of traffic comprises data generated by an application that typically requires a shorter duration of transport layer connection or transmission than said second type of traffic. For example, the application may be a Web-browsing application and an e-mail application.
Advantageously, said duration of transport layer connection or transmission is defined with reference to a duration between network layer handovers of said mobile router, whereby said data packet is routed by said first routing method if said transport layer connection or transmission is expected to last less than said duration between network layer handovers or by said second routing method if said transport layer connection or transmission is expected to last longer than said duration between network layer handovers. In one embodiment the mobile router may monitor and record times between network layer handover and update the routing policy accordingly. Thus the mobile router may respond dynamically to frequency of network layer handover.
Preferably, the method further comprises the step of monitoring types of traffic flows through said mobile router and implementing said first and/or second routing methods depending on the relative proportions thereof. This helps to increase Is quality of service for all users attached to the mobile router.
Advantageously, the method further comprises the step of selecting said first or second routing method based on a source network layer address in said data packet, whereby different users on said mobile network may be offered different levels of quality of service. Use of the source network layer address provides a means to differentiate between users based on information already present in each data packet flow.
Preferably, the method further comprises the steps of storing a routing database in a memory of said mobile router, which routing database comprises a mapping between said first traffic type and said first routing method, and a mapping between said second traffic type and said second routing method, and searching said routing database when said traffic type has been estimated to determine the routing policy for said data packet.
Advantageously, said first type of traffic comprises data generated by use of a Web browsing application, an e-mail application, a short FTP application and/or a peer-to-peer application for example. These applications generally generate transport layer connections or transmissions of shorter duration and therefore less sensitive to network layer handovers. It will be appreciated, however, that in one embodiment, a short-lived application is defined according to the frequency of network layer handover such that, depending on where the invention is implemented, traffic from applications may be classified either as said first or second types.
Preferably, said second type of traffic comprises data generated by use of a File Transfer Protocol application, a Voice over IP application and/or a streaming application for example. These applications generally generate transport layer connections or transmissions of longer duration and therefore more sensitive to network layer handovers. I0
Advantageously, said first routing method comprises a route optimised method in which said data packet can be sent toward said second host directly from the network to which the mobile router is attached. This helps to avoid the encapsulation overhead of a bi-directional tunnel, such as a NEMO bi-directional is tunnel between the mobile router and its home agent.
Preferably, said first routing method comprises the steps of replacing a source address of said data packet with a network layer address of an interface within a foreign network to which said mobile router is attached, whereby said data packet may be routed directly from said foreign network toward said second host. This has the advantage that the second host will address packets to the interface in the foreign network, avoiding the need for routing via the mobile router's home agent.
In one embodiment said network layer address is different for each traffic flow passing through said mobile router. For example IP packets in each traffic flow may have their source address replaced with a respective topologically correct IP address on the foreign network to which the mobile router is attached. The mobile router would then store a mapping between the each host's actual IP address and the assigned IP address. The second host would then address packets to the topologically correct that IP addresses, unaware that the actual IP address of the first host is different. On receipt, the mobile router would replace the topologically correct destination IP address of each packet with the actual IP address of the first host using the mapping stored in memory and send the packets on toward the first host.
In another embodiment said network layer address is the same for all traffic flows passing through said mobile router. Traffic flows may be differentiated on the basis of some means other than a topologically correct IP address on the foreign network to which the mobile router is attached. The means may be a destination port number in a header of a transport layer segment for example.
Advantageously, the method further comprises the step of storing in electronic memory a unique identifier for each data packet flow, such that a return data packet flow sent from said second host in reply to said first host comprises said unique identifier, whereby said mobile router may forward said return data packet flow over the correct link toward said first host on said mobile network.
Preferably, the method further comprises the step of replacing an identifier of said traffic type in said data packet with said unique identifier.
Advantageously, the method further comprises the step of storing a binding database in said electronic memory, which binding database comprises a mapping between an identity of said first host and said unique identifier, whereby data packets from said second host may be routed toward said first host.
Preferably, said unique identifier comprises an arbitrarily assigned port number that has not already been assigned to another data packet flow passing through said mobile router. The port number may be a TCP source port number for
example.
Advantageously, step (b) comprises the step of examining said data packet for a traffic type identifier to identify said type of traffic carried therein.
Preferably, the method further comprises the step of examining a transport layer segment carried by said data packet to determine said type of traffic.
Advantageously, said traffic type identifier comprises a destination port number in a header of said transport layer segment, the method further comprising the step of using said destination port number to determine whether or not said data packet carries traffic of said first or second types.
Preferably, said header comprises a l'ransmission Control Protocol (TCP) or User Datagram Protocol (UDP) header.
Advantageously, said second routing method comprises the step of indirectly routing said data packet from said mobile router toward said second host, in which mobility of said mobile router at the network layer is substantially transparent to said first host. In this way packet flows that typically require a longer duration of transport layer connection/transmission can be protected from network layer handovers. This may be using a NEMO bi-directional tunnel for example. I0
A method according to any preceding claim, further comprising the step of monitoring the status of network layer handover of said mobile router and implementing a third routing method if and when said mobile router detects or is undergoing network layer handover between access routers. The third routing method helps to maintain of quality of service for users. The handover may be detected by a layer 3 trigger such as a Neighbour Unreachability Detection, or a layer 2 trigger such as a change in MAC address of the wireless interface of the access router to which the mobile router is attached.
Preferably, said third routing method comprises the step of inspecting said data packet for an indication that said first host is attempting to establish a transport layer connection with or has just begun data transmission to said second host. Such an indication might be provided by a TCP segment with the SYN flag set for
example.
Advantageously, if said indication is present the method further comprises the steps of replacing a source address of said data packet with an address of an interface within a new foreign network to which said mobile router is to be handed over, whereby said data packet may be routed directly from said new foreign network toward said second host.
Preferably, the method further comprises the step of maintaining existing transport layer connections that are routed by said first routing method via the old foreign network during said handover.
- 10 - Advantageously, said data packet comprises an lPv4 datagram or an lPv6 datagram.
Preferably, said mobile network operates under a NEMO, NEMO-like or NEMOderived protocol.
According to another aspect of the present invention there is provided a computer program comprising computer executable instructions for causing a mobile network to perform the method steps set out above.
According to another aspect of the present invention there is provided a computer program comprising computer executable instructions for causing a mobile router to perform the method steps set out above. The computer executable instructions may be downloaded from the network infrastructure to a mobile router in the form of a software upgrade. Alternatively they may be installed at point of manufacture.
According to another aspect of the present invention there is provided a computer program product storing computer executable instructions in accordance with those mentioned above. The product may be useable to upgrade one or more mobile router.
The computer program product may be embodied on a record medium, in a computer memory, in a read-only memory or on an electrical carrier signal.
According to another aspect of the present invention there is provided a mobile router comprising an electronic memory storing computer executable instructions that when executed cause the mobile router to perform the method steps as set out above.
According to yet another aspect of the present invention there is provided a mobile network comprising a mobile router as aforesaid. There a wide range of mobile networks and potential mobile networks reference is made to the examples given herein.
- 11 - In one embodiment there is provided a vehicle comprising a mobile router as aforesaid. It will be appreciated that the number of vehicles where the invention is applicable is wide-ranging; for example: boats, planes, trains, cars, buses, coaches, lorries, military vehicles and construction vehicles.
Preferred embodiments of the present invention also provide an alternative route optimising method in which mobility of the mobile network is transparent to the network nodes in the mobile network that results in lower signalling and encapsulation overhead According to another aspect of the present invention there is provided a method of route optimising data packet flows from a mobile router, which method comprises the steps of (a) receiving a data packet from a first host within said mobile network addressed to a second host; (b) replacing a source address in said packet with a topologically correct address on a foreign network to which said mobile router is presently attached; and (c) forwarding said packet toward said second host; whereby data packets sent by said second host in reply will be addressed to said topologically correct address on said foreign network. This reduces the encapsulation overhead associated with a NEMO bi-directional tunnel. In one aspect this route optimising is performed on those packet flows that are less sensitive to network layer handovers i.e. those that have relatively short transport layer connection/transmission duration, such as Web- browsing and e-mail applications. In this way the route optimising is dynamic i.e. it is not applied to all packet flows from one user, and may only be applied from time to time as needed for example. The mobile router may monitor network layer handover frequency and take a decision whether or not to use this optimising method based on a typical duration between network layer handovers. Advantageously, said source address is a public (i.e. routable) IP address and said topologically correct address is a public IP address.
BRIEF DESCRIPTION OF THE DRAWINGS
For a better understanding of how the invention may be put into practice, a preferred embodiment of the invention implemented on a train will be described, by - 12 - way of example only, to the accompanying drawings, in which: - Fig. I is schematic block diagram of a wireless network environment with a mobile network in accordance with the present invention passing therethrough; Figs. 2 and 3 are schematic representations of the tunnels established between various network nodes in Fig. 1 when operating under NEMO Basic Support and MIPv6; Fig. 4 is a schematic representation of the IP-in-IP encapsulation of data by the tunnels and Figs. 2 and 3; Figs. 5 and 6 are schematic representations of the tunnel established between various network nodes in Fig. 1 when operating under NEMO Basic Support and MlPv6 Route Optimised mode; Fig. 7 is a schematic representation of the IP-in-IP encapsulation of data by the tunnel and Figs. 5 and 6; Fig. 8 is a schematic block diagram of a mobile router in accordance with the present invention; Fig. 9 is a schematic block diagram of software modules of the present invention that are stored and operated by the mobile router of Fig. 8; Fig. 10 is a generic policy table in accordance with the present invention; Fig. 11 is a policy table in accordance with the present invention; Fig. 12 is a schematic block diagram of a traffic flow management method in accordance with the present invention; Fig. 13 is a flowchart of the traffic flow management method of Fig. 12; and Fig. 14 is a schematic block diagram of a mobile router handover method according to the present invention.
I)ETAILED DESCRIPTION OF THE PREFERRED EMBODIMENT
Referring to Fig. I a mobile network generally identified by reference numeral 10 comprises a mobile router (MR) 12, serving a Visiting Mobile Node (VMN) 14 (that is multi-mode) via an access point (AP) 16. The AP 16 may be a wireless access point or a wired access point. The mobile network 10 is part of a train 18 that moves relative to a number of physically fixed access routers 20, 22 and 24 that are not part of the train 18: access router 20 operates under a wireless local area network (WLAN) comniunication protocol such as IEEE8O2. II; access router 22 is a - 13 Digital Video Broadcast (DVB) access router operating under a DVB transmission protocol; and access router 24 is a Universal Mobile Telecommunication System (UMTS) access router operating under a UMTS communication protocol, or other IMT-2000 communication protocol. Each of the access routers 20, 22 and 24 provides wireless access for the MR 12 and the VMN 14 to a fixed packet-switched network, such as the Internet, so that the VMN 14 can send and receive packet data from the train, both whilst moving and stationary. The MR 12 has an ingress interface for receiving IP packets from and transmitting IP packets to network nodes in the mobile network 1 0, and an egress interface for receiving IP packets from and transmitting IP packets to the fixed packet-switched network. As explained above, one of the aims of the NEMO Basic Support is to ensure that the motion of the train 18 is transparent to any network nodes (LFN, LMN and/or VMN) behind the MR 12.
Motion of the train past the access routers 20, 22, 24 necessitates network layer handover of service from one access router to another. Since the MR 12 connects an entire network to remote packet networks, each change in point of attachment (i.e. change in access router) to the remote packet networks causes the reachability of the entire mobile network 10 to change. Without appropriate mechanisms, connections established between nodes in the mobile network 10 and nodes in the remote packet networks cannot be maintained across each handover. Connection continuity is primarily achieved in NEMO Basic Support through establishment of a bidirectional tunnel (herein NEMOBT) between the MR 12 and a Home Agent(HA_MR) 26 of the MR 12. Aspects of the operation of the NEMOBT relevant to the present invention will be briefly described below. Further details can be found in "Basic Network Mobility Support", Wakikawa, R et al. (draft-wakikawa-nemo-basic-00.txt) and "Network Mobility (NEMO) Basic Support Protocol" Devarapalli, V. Ct al., both presently available at www.ietf.org/html.charters/nemo-charter.htm I. The Mobile Internet Protocol (Mobile IP) was designed specifically to handle the routing of IP data packets to and/or from mobile nodes (i.e. mobile terminals that frequently change their point of attachment to the Internet. Moreover, Mobile IP was designed to handle the routing of IP data packets to and/or from mobile nodes without significantly interrupting on-going communications and without requiring mobile nodes to restart applications. Presently there are two versions of Mobile IP that have been proposed by the Internet Engineering l'askforce (IETF): Mobile IPv4 and Mobile IPv6. One of the common features between the two protocols is that an - 14 interface on each mobile node has (I) a "home address" i.e. a permanent IP address for an interface associated with the mobile node's point of attachment to the Internet at its home network, and (2) a "care-of address" i.e. a temporary IP address that is assigned to the interface when the mobile node attaches to a foreign network.
Whenever a mobile node (e.g. the VMN 14) attaches to a foreign network it sends a "binding update" to a special agent called a "Home Agent" (herein HA_VMN) on the home network. The HA VMN maintains a binding database that maps the VMN's home address to the latest care-of address. IP data packets arriving at the HA_VMN are encapsulated in another IP header and sent to the care-of address where the VMN decapsulates the packet to reveal the original IP packet from the CN addressed to the VMN's home address. A similar process happens for packets from the mobile node addressed to the CN. This process is known as "bidirectional tunnelling" (herein MIPBT) between the mobile node and Home Agent. Mobile lPv6 adds some extra functionality over Mobile lPv4. In particular, each VMN sends the binding updates to the HA VMN and each CN. In this way, each CN can send IP packets directly to the care-of address of the VMN and vice versa, whereby the use of the MIPBT is mitigated. This is known as Route Optimisation.
If the MR 12 is at its home network the prefix advertised over the ingress interface matches the prefix of the egress interface of the MR 12. Accordingly, when a VMN 14 moves into the area served by the MR 12 and AP 16 the newly configured care-of address is topologically correct i.e. IP packets addressed to the care-of address configured using the prefix of the ingress interface will be routed correctly and reach the egress interface of the MR 12 where they are routed to the VMN 14.
However, when the mobile network 10 moves away from its home network (for example the station where the train 1 8 commences its journey), the careof address configured by the VMNs from the ingress interface of the MR 12 is no longer topologically correct and IP packets sent by CNs will not reach their destination.
The NEMO standard deals with this problem by establishment of a NEMOBT between the MR 12 and a HAMR 26, and specifies that all incoming and outgoing IP tratlic should be routed via this NEMOBT. It is to be noted that the NEMOBT separate and distinct from any MIPBT used under Mobile lP.
Thus from the point of view of the mobile network 10, there are two scenarios - 15 - to consider (assuming all nodes are Mobile lPv6 capable): - (1) the VMN 14 moves within range of the AP 16 during a TCP connection with one or more CNs; and (2) the VMN 14 is brought into range of the AP 16 whilst not running a 1'CP connection.
Within each scenario there is two further possibilities: - (a) the VMN 14 is communicating (or will communicate) with a CN using a MIPBT (for example if the CN is only MIPv4 enabled or if the Return Routability test has failed); and (b) the VMN 14 is communicating (or will communicate) directly with the CN in the MIPv6 Route Optirnised mode.
In scenario (l)(a) and (l)(b) TCP connection continuity is maintained as described in Mobile IPv6. Briefly, the VMN 14 configures a new care-of address based on the network prefix advertised by the ingress interface of the MR 12 (this is the MR home network prefix assigned by the home network of the MR and is a static IP address). In (1)(a) the VMN 14 then sends binding updates to the HA_VMN and to the CN using a MIPBT. The HA_VMN will forward packets to the home network of the MR 12 and vice versa, and the home network of the MR will forward packets to the MR 12 using the NEMOBT. In (1)(b) the VMN 14 will send a binding update to the CN using a MIPBT and the NEMOBT. These tunnels will also be used for the Return Routability test. Once the correspondent host has tested the new care-of address it will send packets to the VMN 14 in the Route Optimised mode. Packets will be addressed to the MR's home network (instead of the HA VMN) and then tunnelled to the MR using the NEMOBT. Packets from the VMN 14 will be sent to the CN via the NEMOBT but not via the HA_VMN since the new care-of address is topologically correct for the home network of the MR. All subsequent changes in point of attachment of the MR 12 will be transparent to the VMN 14 due to use of the NEMOBT.
If the MR 12 has the capability described in the Lee or Perera Internet Drafts, it will advertise the new network prefix and the VMN 14 will be able to configure a care-of address that is topologically correct for the MR's new point of attachment to the global Internet. In that case, if the VMN 14 has an ongoing TCP connection when - 16 - it attaches to the MR 12, binding updates and the Return Routability test can be performed as per MIPv6 i.e. using a MIPBT. After this, the VMN 14 can communicate with CNs either indirectly using a MIPBT (i.e. via the I IA_VMN) or directly in the Route Optimised mode. In both cases, use of the NEMOBT is mitigated since the care-of address of the VMN 14 is topologically correct for its present point of attachment to the network.
In scenario (2), assuming that the MR 12 advertises the network prefix of its home network as suggested by NEMO Basic Support, the VMN 14 configures a new care-of address and performs a binding update with the HA_VMN before initialising a TCP connection with the CN. The communication may be performed under (a) or (b) above depending on whether the CN is MIPv6 enabled and if the Return Routability test is successful. However, in both cases use of the NEMOE31' is required since the care-of address is defined on the basis of the network prefix of the home network of the MR 12.
If the MR 12 has the capability in the Lee or Perera Internet drafts, it will advertise the new network prefix and the VMN 14 will be able to configure a care-of address that is topologically correct for the MR's new point of attachment to the network. The VMN 14 can then perform binding updates with the I-IA_VMN and any CNs in its binding cache. Should a TCP connection need to be established the VMN 14 can use the new care-of address as the source address in IP packets and correspond either using a MIPBT or in the Mobile IP Route Optimised mode. In both cases the need to use the NEMOBT is mitigated.
The MIPBT and NEMOBT are illustrated in Figs. 2 to 7. In Figs. 2 and 3 scenario (1)(a) and (2)(a) is shown. In particular, a TCP connection is under way and the VMN 14 has addressed a packet with IP header IPI-JI (Fig. 4) from its home network address to the CN 28 IP address. This addressing is represented by line 30.
According to Mobile IPv6 in this scenario, the VMN 14 encapsulates the first IP packet with a new IP header IPH2 addressed to the HA_VMN 32 from its present care-of address (i.e. that configured from the prefix advertised by the ingress interface of the MR 12). This establishes a MIPBT 34. The VMN 14 then transmits the encapsulated packet to the MR 12. Upon receipt of the IP packet the MR 12 encapsulates the packet with a further IP header IPH3 addressed to the IIA MR 26 - 17 - from the MR 12 to establish a NEMOBT 36. Thus the original lP data packet has been encapsulated two further times. When the IP packet reaches the HA_MR 26, it is decapsulated (represented by the end of the NEMOBT 36) to reveal the IP packet IPH2 addressed to the HA_VMN 32 and is forwarded accordingly. When that IP packet reaches the HA_VMN 32 it is decapsulated (represented by the end of the MIPBT 34) to reveal the IP packet 11111 addressed to the CN and is forwarded accordingly. It will be appreciated that the extra encapsulation required by the NEMO standard in the form of the NEMOBT will result in high encapsulation overhead and latency since all traffic must by routed via the HA_MR 26 and via the HA_VMN 32. Fig. 3 shows the Mobile IP and NEMO tunnels when IP packets are sent from the CN 28 to the VMN 14. It is also necessary for all traffic to be routed via the IlA MR 26 in this direction.
Referring to Figs. 5 to 7 scenario (1)(b) and (2)(b) is illustrated. The VMN 14 has initialised one or more TCP connection (after having moved into the area covered by AP 16) with the CN 28 and the Return Routability Test has been successful, thereby mitigating the need for a MIPBT and permitting the VMN 14 and CN 28 to communicate in the MIPv6 Route Optimised mode. The VMN 14 addresses packets to the CN 28 with a source address indicating the care-of address configured by the VMN 14 in the 1P header IPHI (Fig. 7). The line 38 indicates this addressing. Upon receiving the IP packet the MR 12 encapsulates it with another IP header IPH2 addressed to the HA_MR 26. This establishes a NEMOBT 40. When the HA_MR 26 receives the IP packet it is decapsulated to reveal the first IP header IPI-Il addressed to the CN 28 and is forwarded accordingly. Fig. 5 shows the NEMOBT when IP packets are sent from the CN 28 to the VMN 14. In both cases it is necessary for all traffic to be routed via the MR 12 and HA_MR 26. Although routing via the HA_VMN 32 is avoided there is still a relatively high encapsulation overhead and routing latency.
Although the proposals by Lee et al. and Perera et al. mitigate the use of a NEMOB'I' and permit network nodes behind the MR 12 to be routed more efficiently to CNs, no consideration has been given to how data packet flows through a MR might be handled to achieve good throughput and reduced congestion delay. In particular, the applicant has realised that by managing the data packet flows and not applying the same routing policy to all data packet flows, overall performance can be - 18 - enhanced and routing delays reduced.
Fig. 8 shows the mobile router 12 that comprises a case 41 having network interface ports 42 and 43 to which respective cables 44 and 45 provide a physical link to respective ll networks. Two network interface cards 46 and 47 are connected to their respective network interface ports 42 and 43 and form the ingre'ss interface and egress interface respectively. A hardware packet switch 48 connects the network interface cards 46, 47 and a central processing unit (CPU) 49 can communicate with a routing table 50 and router management tables 5 1.
Each network interface card 46, 47 comprises a link layer protocol controller 52 that has access to an interface management table 53 and a hardware address table 54 (e.g. Address Resolution Protocol cache). In communication with the link protocol controller 52 is a network protocol-forwarding engine 55 having access to a forwarding table 56 (route cache), and an interface queue manager 57. Both the network protocol forwarding engine 55 and interface queue manager 57 have an interface to and from the packet switch 48 respectively.
In use, frames are received by the link layer protocol controller 52 that handles the link layer protocol (e.g. I-IDLC, Ethernet) used over the physical link.
Frame integrity is checked and valid frames are converted into packets by removing the link layer header and, if necessary, the packets are queued in a queue 58. Storage capacity is often in the form of a ring of memory bufi'ers. One packet at a time is removed from the queue 58 by the network protocol-forwarding engine 55 and the forwarding table 56 determines whether or not the packet requires detailed examination by the CPU 49. Via the CPU 49 the next router to which the packet should be sent is looked up in the routing table 50. If the IP packet arrived on the ingress interface (i.e. from the mobile network 10) the CPU 49 instructs encapsulation of the IP packet with an IP header addressed to the HA_MR, in order to reverse tunnel the packet over a NEMOBT as described above. If the packet has been received on the egress interface (i.e. from the access router over the wireless link) the CPU 49 instructs decapsulation of the IP packet to reveal an IP header addressed to a care-of address valid on the ingress interface as described above. Once the destination [P address is found the CPU 49 searches the ARP cache for a Media Access Control (MAC) address for that destination. The CPU 49 now knows where - 19 - to send the packet and the new link layer header to use. The link layer address is added and the packet is linked into the list of frames to be sent on from the appropriate network interface card. The packet is then forwarded to the packet switch 48 and onto the network interface card where the packet joins a queue 59 to be processed by the interface queue manager 57. From here the packet joins one of a number of link output queues 60 until the link layer protocol controller 52 can process it. The link layer protocol controller 52 encapsulates the packet in a link layer header that includes the Media Access Control (MAC) address of the next router to which the packet is to be sent. The MAC address is obtained from the hardware address table 54. The packet is then placed on the physical channel by the link layer protocol controller 52.
Various types of mobile router are available and the present invention is not limited to that described above. Further examples are available from Cisco Systems, Inc. (www.cisco.com) for example.
Referring also to Fig. 9 an electronic memory 71 stores computer executable instructions that when executed by the CPU 49 bring about a traffic flow controller in the MR 12 that comprises a "Policy Table" (P1') 72, "Monitor/Policy Enforcer" (MPE) 73, "Route Optimiser" (RO) 74 and "NEMO Routing" (NR) 75. These logical entities co-operate to improve traffic flow control in the MR 12, for example by reducing the round trip time of lP packets sent between the VMN 14 and the CN 28 and vice versa.
The traffic flow controller 70 provides an intelligent routing function for traffic originating behind the MR 12 by selecting a routing method for each data packet flow based on rules set out in the PT 72. When traffic type is used as the basis of selecting the routing method, overall performance is enhanced as encapsulation overhead and routing delay are reduced. In particular, the standard NEMO routing option provides stable connectivity at the expense of increased encapsulation overhead and end-to-end packet delays. Therefore it is suitable for relatively longlived TCP connections that must survive layer 3 (i.e. network layer) handovers of the MR 12, such as FTP. In contrast the route optimised method described herein (and those of Lee et al. and Perera et al.) provides lower end-to-end packet delay and reduced encapsulation overhead at the expense of less stable connectivity. l'herefore - 20 - the route optimised routing method is most suitable for relatively short- lived TCP connections, by which is meant those connections that have duration less than the time between handover of the MR 12 from one access router to another; in contrast the NEMOBT routing method is more suitable for those TCP connections that need to survive network layer handover. The PT 72 enables the traffic flow controller 70 to select different routing methods according to the TC1 connection sensitivity as defined by the rules imposed by the MPE 73. In this way, the benefits of both routing methods are combined to improve the overall performance of the MR 12. In particular, since a portion of the traffic that would have been routed by the standard NEMOBT is routed by the route optimised method, the performance of the NEMOBT is expected to improve as a result of smaller traffic volume and less congestion and processing delays.
Short-lived TCP connections include both persistent (either with pipelining or without pipelining) and non-persistent TCP connections, such as Web browsing using I-ITTP, VoIP, etc. Such short-lived TCP connections tend to be burst-like in nature e.g. when a user opens a Web page TCP undergoes a short period of activity (typically between Is and 30s) until all objects are loaded and displayed to the user.
There then is often a period of l'CP inactivity whilst the user digests the content of the Web page before selecting a further link, followed by more short-lived TCP activity, or closes the Web browsing application. This is in contrast to applications that generate comparatively long TCP connections, such as those that use FTP and streaming, where data is sent continuously over a period of about 30s or more.
Because the care-of address used as the source address of each IP packet is only lopologically correct for the particular foreign network to which the MR 12 is presently attached, route optimisation cannot survive handover at layer 3 i.e. the network layer. It will be appreciated that the time between handovers may vary considerably depending on where the mobile network is installed. For example, if the mobile network 10 is installed in a plane, the time between access router handovers may be of the order of several hours since the access routers are likely to be satellites with large areas of coverage. However, if the mobile network 10 is installed in a train, bus or car for example, the time between access router handovers may be of the order of tens of minutes or a number of hours depending on the speed and direction of the vehicle. For example, when travelling at speed across the area of coverage provided by an access router, the time between handovers may be relatively short: if - 21 - a vehicle is travelling at 70mph across a cell of approximately 2 miles radius, the maximum time between handover may be of the order of about lOOs. However, if the vehicle is travelling more slowly or if the vehicle is a bus with a twisting path through the area of coverage provided by the cell, the time between access router handover might be much longer. Accordingly the network operator will be able to configure the rules in PT 72 in the traffic flow controller 70 via the MPE 73 depending on the specific application where the MR 12 will be employed. It may also be possible for the MPE 73 to monitor and record time elapsed between network layer handovers of the MR 12 and to adjust the PT 72 accordingly. For example, if the MPF 73 detects that network layer handover is occurring every two or three minutes, the MPE 73 may adjust the PT 72 to route more data packet flows via the NEMOBT to preserve TCP connections and thereby the quality of service experienced by users. However, if the traffic flow controller detects network layer handover only every 30 minutes, the MPE 73 may adjust the PT 72 so that more Is packet data flows are routed via the RO routing method.
The PT 72 stores all traffic rules by which routing decisions are made by the MR 12. The traffic rules are stored in the electronic memory 71 in the form of a routing database 80 as shown in Fig. 10. The database 80 comprises four columns: a service description column 81, a traffic identifier column 82, a differentiation parameter 83 and a routing instructions column 84. Referring to Fig. 11, in this particular embodiment the service description column 81 is divided into the type of IF traffic, for example Web browsing traffic, Voice over IP (VoIP) traffic and all other tratlic; the traffic identifier column is divided by host, for example by a care-of address configured by the VMN 14; the differentiation parameter column is divided by port number (i.e. an endpoint to a logical connection established by TCP for example), for example port 80 for Web browsing traffic, port 5004 for VoIP, etc.; the routing instructions column 84 details how the different types of traffic (as identified in the service description column) should be routed. In this particular PT, Web traffic on TCP port 80 from any host behind the MR 12 and VoIP traffic from interface 137.0.0.45 on TCP port 5004 is sent to the RO 74. All other traffic is sent via the ordinary NEMOBT. The MR 12 is configured to examine all data packets passing through the MR 12 and to examine the destination (or source) port number of the TCP segment therein. Each output port number is compared against the traffic identifier column of the PT 72. The rules in the PT 72 determine how the packet - 22 - should be routed based on the destination port number. Once this has been determined, the packet is routed according to whichever rule is applicable to that packet.
The MPh 73 is responsible for configuring and implementing the traffic rules in the PT 72 and has network inputs 85 (Fig. 9), such as inputs from the MR 12 and/or home network of the MR 12, and user inputs 86 from the network operator and/or users. The MPE 73 may act dynamically to update the PT 72 in response to the inputs. I0
If the MPE 73 receives user inputs, it may operate as follows: - (1) the VMN 14 logs into the MR 12 after the user has boarded the train (the VMN 14 may do this automatically or the user may control login manually); is (2) the VMN 14 obtains an IP address in the subnet of the MR 12; (3) via VMN 14 the user is offered choice of upgrading to better quality of service by payment ofa fee; (4) the user starts web browser on VMN 14 and logs into portal on MR 12; (5) once payment is complete, MPE 73 is notified about the IP address assigned to the VMN 14 so that PT 72 can be updated to route oplimise data packets originating from the VMN 14.
If the MPE 73 receives inputs from the MR 12, it may operate in one of the following ways: - Scenario A (1) first class customers may be given a premium account on the MR 12; (2) details of all accounts are maintained in a database with a field for indicating whether or not the account is premium, a login name field, and an assigned
IP address field;
(3) the VMN 14 logs into the MR 12 after the user has boarded the train (the VMN 14 may do this automatically or the user may control login manually); (4) the VMN 14 obtains an IP address in the subnet of the MR 12; - 23 - (5) login name of user is used to search database to determine whether or not user has premium account; (6) IP addresses are extracted from database for those accounts designated as premium; (7) the MR 12 updates the MPE 73 with the extracted IP addresses such that data packets originating from any of the premium account holders will be route optirnised.
Scenario B (I) the MR 12 monitors all traffic flows from the hosts on the train; (2) MR 12 detects an increase in the number of TCP connections; (3) MR 12 instructs MPE 73 to route optimise all Web traffic on TCP port for example, to reduce encapsulation overhead and routing delays caused by the NEMOBT.
Under control of the PT 72, IP traffic passing through the MR 12 is either forwarded for ordinary NEMO routing or is forwarded the to RO 74. The RO 74 provides a route optimisation function for some or all of the IP traffic passing through the MR 12. In use, the RO 74 receives all traffic to be route optimised as directed by the PT 72.
Referring to Figs. 12 and 13 an example of the operation of the traffic flow controller 70 is shown from which the operation of the RO 74 will become clear. The VMN 14 arrives in the mobile network 10. As such it must configure a new care-of address, for example by combining the subnet of the MR 12 and the 64-bit Extended Unique Identifier (EUI) or MAC address of the VMN's network interface using stateless address auto configuration. Once the VMN 14 has completed all of the necessary binding update procedures with the HA_VMN, Return Routability test, etc. the VMN 14 is free to commence TCP connections from its new point of attachment in the network. To facilitate this, the MPE 73 should be configured by the network operator to enforce the necessary rules in the PT 72. For example, PT 72 may contain a rule that all traflic should be NEMO routed which has an IP header that is extended with the Mobility Header (MH) having a MH Type value of 1, 2 and 5 which indicates a Home Test mit Message, a Care-of Test Init Message and a Binding - 24 - Update message (for further details see RFC 3775). Thus in scenarios (1) (a) and (1)(b) above the traffic flow controller 70 will ensure that mobility messages are handled by the more reliable routing method (i.e. the NEMOBT) before making any routing selection based on traffic type. Other rules may be implemented to route other flows of traffic as desired by the network operator.
For example, some VMNs may wish to operate under a secure transmission protocol, such as lPsec (see e.g. RFC 2401 and 2411). The RO 74 may or may not be useable with this type of traffic, depending on the level of security used. If the entire original IP packet is encrypted (as under one option of the ESP protocol for example), the route optimisation function of the invention cannot be used as the source IP address cannot be read by the RO 74, and therefore the rules of the PT 72 cannot be enforced. If the payload of the IP packet is encrypted, the RO 74 can determine whether or not that traffic is to be route optimised, but since the TCP/UDP segment header is encrypted it is not possible to change the source port number. If only the payload of the TCP/UDP segment is encrypted (or if a protocol such as the Authentication Header protocol is used where there is no encryption), then the traffic can be route optimised according to the invention.
The user of the VMN 14 starts a Web browsing application. The transport layer (e.g. TCP) goes about initialising a TCP connection with the CN 90 requested by the Web browsing application, in this case represented by the interface 165.0.0.1.
The first TCP segment from the VMN 14 indicates a source port number of 1234, a destination port number of 80 (i.e. Web traffic) and has the SYN flag set to indicate that it wishes to initialise a TCP connection. The TCP segment is appended to an IP header having a source address of the care-of address of the interface on the VMN 14 (137.0.0.1) and a destination address of the CN 90 (165.0.0.1). The IP packet is passed down to the link layer and physical layer where it is transmitted to the MR 12 either directly or indirectly via other routers.
Referring also to Fig. 13, upon receipt of the IP packet at the MR 12, the traffic flow controller 70 applies the rules in the PT 72. In particular, at step Si it determines whether or not the packet arrived on the ingress or egress interface of the MR 12. For each packet arriving on the ingress interface the traffic flow controller 70 determines which destination port is indicated in the TCP segment at step S2. At step - 25 - S3, the traffic flow controller 70 determines which rule in the PT 72 applies to each packet based on the destination port number. If a packet is Web traffic or VoIP traffic it is forwarded to the RO 74. If the packet does not fall into either of these classes it is sent at step S4 for standard NEMO routing using the NEMOBT. Since the IP S packet from the VMN 14 is a Web browsing packet it is forwarded to the RO 74. The RO 74 comprises a binding database 91 having a VMN CoA/destination port field 92 and a foreign networklassigned port field 93. At step S5 the RO 74 interrogates the traffic flow controller 70 to determine whether or not a layer 3 handover is imminent or underway. If a "no" signal is returned, the RO 74 replaces at step S6 the source IP address of the 1P packet (which is apublic i.e. routable IP address) with a topologically correct 1P address (which is also a public IP address) of an interface in the MR 12 on the network to which the MR 12 is currently attached (this will be the care-of address configured by the MR 12 for that interface when it attaches to that network during handover). At step S7 the RO 74 replaces the source port number in the TCP segment with an arbitrary port number that is not already used in the binding database 91. The RO 74 then makes a binding entry at step S8 in the binding database 91 which maps the field 92 to the field 93 for the VMN 14, which in this case will be: VMN CoA/port FN/assigned port 137.0.0.1/80 176.0.0.1/19876 Finally, the MR 12 forwards the amended IP packet (containing the amended TCP packet) toward the CN 90 at step S9. Since the source IP address has been changed to a topologically correct care-of address for the MR 12, the NEMOBT can be bypassed for this packet (and all other packets handled by the RO 74 for the VMN 14 in the same data packet flow). Thus the encapsulation and routing overhead are reduced for the VMN 14. Furthermore, By selecting a routing method based on expected TCP connection duration, those flows that are relatively short-lived can be routed by a first routing method that has a higher probability per unit time of connection interruption; whereas those TCP connections that are relatively long-lived can be sent by a second routing method that has a lower probability per unit time of connection interruption.
- 26 - Upon receiving the IP packet, the application running on the CN 90 notes that the packet originated from interface 176.0.0.1 at port 19876 on the MR 12 and responds in the usual way, in this case with a SYNACK segment. The SYNACK segment will have a source port of 80 and a destination port of 19876. The SYNACK segment is encapsulated in an lP header in which the destination address is the interface of the MR 12 i.e. 176.0.0.1.
If at step S5, the traffic flow controller 70 indicates that handover is imminent or underway, the method proceeds to steps Sb to S12 described in greater detail below in conjunction with Fig. 14.
When the IP packet from the CN 90 arrives at the MR 12, step SI of the method determines that the packet arrived on the egress interface. In that case the method proceeds to step S13 in which the RO 74 searches the field 93 of the mapping database 91 for a port number that matches the destination port number in the TCP SYNACK segment. If a match is found the RU 74 outputs the entry in the field 92 associated therewith i.e. the care-of address of the VMN 14 in the MR subnet and the source port assigned by the VMN 14. At step S14 the RU 74 changes the destination port number of the SYNACK segment to the source port number used by the VMN 14, and changes the destination lP address to the care-of address of the VMN 14.
Finally the amended IP segment containing the amended TCP segment are forwarded to the VMN 14 on the MR subnet at step S15. Upon receiving the IP packet the process running on the network node believes that the TCP SYNACK segment was addressed to the correct port number and routed to the correct IP address. The RU 74 handles all further packets in the same way. The binding entry in the binding database 9Iis maintained until the TCP connection is closed when the CN 90 sends a FIN segment.
Referring to Fig. 14 the MR 12 is shown in handover between two foreign networks: foreign network A and foreign network B. As mentioned above, the care-of address used by the RU 74 in the source address of IP packets is configured from a prefix advertised by the network to which it attaches. Accordingly during a handover, the MR 12 receives a new network prefix that it uses to configure a new care-of address. Use of the new care-of address by the RU 74 in ongoing TCP connections would cause termination of those connections and frustration for the users of VMNs - 27 - since Web pages would appear unreachable until a "refresh" command is initiated.
To avoid this problem the traffic flow controller 70 is provided with additional functionality as exemplified by steps Sb to S12 in Fig. 13. In particular, when the MR 12 receives a trigger (which might be a layer 3 trigger such as a Neighbour Unreachability Detection, or a layer 2 trigger such as a change in MAC address of the wireless interface of the access router), it may assume that a handover will follow shortly. Upon receiving the trigger the traffic flow controller 70 will respond with a "yes" signal when interrogated about handover by the RO 74 at step S5, and the MPE 73 enforces a temporary rule in the PT 72. In particular the PT 72 now also searches at step SlO for TCP segments in which the SYN flag is set i.e. an indication of a new TCP connection. If no SYN flag is detected the method proceeds to steps S6-S9 as described above. If the RO 74 detects a packet with the SYN flag set, the rule in the PT 72 forces the RO 74 to replace the source address of the IP packet at step SI I with the new care-of address configured from the network prefix advertised by foreign network B. At step S12 the packet is forwarded towards the CN. All TCP connections that are in existence and ongoing when the MPE 73 enforces the new rule in the PT 72 use the care-of address in foreign network A. Since the route optimising method is used for relatively short-lived TCP connections, the old TC1 connections through foreign network A will expire relatively quickly.
The PT 72 monitors all of the old TCP connections and, once they have all finished or expired, the MR 12 detaches from foreign network A. All incoming IP packets now have their source address replaced with the careof address for an interface on the MR 1 2 in foreign network B, which is now the current care-of address such that RO proceeds using steps S6-S9. Steps SI0-S12 are only used during and just before a layer 3 handover. In this way, the user of the VMN 14 is given the impression of substantially seamless service since packet loss is reduced and TCE connections are less likely to be interrupted.
Although the preferred embodiment of the invention has been described with reference to the TCP protocol, it will be appreciated that the invention is applicable to any other transport layer protocol e.g. User Datagram Protocol (UDP) or network layer protocol in which the type of application which generated the payload of the segment can be determined. II tJDP is used it is to be noted that this is a connectionless protocol and thus no UDP "connection" can be said to exist. More - 28 - appropriate is UDP "transmission" since all UDP data requests are sent regardless of the state of the receiving host.
Examples of mobile networks include, but are not limited to: (a) networks attached to people ("Personal Area Networks" or PANs): a mobile phone with one cellular interface and one Bluetooth interface together with a Bluetooth-enabled PDA. The mobile phone is the MR while the PDA is used for web browsing or runs a personal web server; (b) networks of sensors and computers deployed in vehicles: vehicles are provided with an increasing number of processing units for safety and ease of driving, as well as Internet access for passengers; (c) access networks deployed in public transportation (buses, trains, taxis, aircrafl, etc.): they provide Internet access to IP devices carried by passengers (e.g. laptop, camera, mobile phone representing host mobility within network mobility, or PANs i.e. network mobility within network mobility or "nested mobility"); and (d) ad-hoc networks connected to the Internet via a MR: for example students in a train that need to set up an ad-hoc network amongst themselves and then enable the ad-hoc network with Internet access through the MR.
Mobile routers may be installed in a wide range of vehicles including private vehicles (e.g. cars, motorbikes), public transport and military vehicles (aircraft, tanks, lorries, boats, etc.) Although the embodiment of the invention described with reference to the drawings comprises computer apparatus and methods performed in computer apparatus, the invention also extends to computer programs, particularly computer programs on or in a carrier, adapted for putting the invention into practice. The program may be in the form of source code, object code, a code intermediate source and object code such as in partially compiled form, or in any other form suitable for use in the implementation of the methods according to the invention. The carrier may be any entity or device capable of carrying the program. For example, the carrier may - 29 - comprise a storage medium, such as a ROM, for example a CD RUM or a semiconductor RUM, or a magnetic recording medium, for example a floppy disc or hard disk. Further, the carrier may he a transmissible carrier such as an electrical or optical signal that may be conveyed via electrical or optical cable or by radio or other means.
When the program is embodied in a signal that may be conveyed directly by a cable or other device or means, the carrier may be constituted by such cable or other device or means. Alternatively, the carrier may be an integrated circuit in which the program is embedded, the integrated circuit being adapted for performing, or for use in the performance of, the relevant methods.

Claims (36)

- 30 - CLAIMS
1. A method of routing data packet flows from a mobile router in a mobile network, which method comprises the steps of: - (a) receiving a data packet from a first host within said mobile network addressed to a second host; (b) estimating which type of traffic is present in said data packet; and (c) forwarding said data packet by applying a first routing method for a first type of traffic and a second routing method for a second type of traffic. I0
2. A method according to claim 1, wherein said first type of traffic comprises data generated by an application that typically requires a shorter duration of transport layer connection or transmission than said second type of traffic.
3. A method according to claim 2, wherein said duration of transport layer connection or transmission is defined with reference to a duration between network layer handovers of said mobile router, whereby said data packet is routed by said first routing method if said transport layer connection or transmission is expected to last less than said duration between network layer handovers or by said second routing method if said transport layer connection or transmission is expected to last longer than said duration between network layer handovers.
4. A method according to any of claims I to 3, further comprising the step of monitoring types of traffic flows through said mobile router and implementing said first and/or second routing methods depending on the relative proportions thereof
5. A method according to any of claims I to 4, further comprising the step of selecting said first or second routing method based on a source network layer address in said data packet, whereby different users on said mobile network may be offered different levels of quality of service.
6. A method according to any of claims Ito 5, further comprising the steps of storing a routing database in a memory of said mobile router, which routing database comprises a mapping between said first traffic type and said first routing method, and a mapping between said second traffic type and said second routing method, and - 31 - searching said routing database when said traffic type has been estimated to determine the routing policy for said data packet.
7. A method according to any preceding claim, wherein said first type of traffic comprises data generated by use of a Web browsing application, an e-mail application, a short FTP application and/or a peer-to-peer application.
8. A method according to any preceding claim, wherein said second type of traffic comprises data generated by use of a File Transfer Protocol application, a Voice over IP application and/or a streaming application.
9. A method according to any of any preceding claim, wherein said first routing method comprises a route optimised method in which said data packet can be sent toward said second host directly from the network to which the mobile router is attached.
10. A method according to claim 9, wherein said first routing method comprises the steps of replacing a source address of said data packet with a network layer address of an interface within a foreign network to which said mobile router is attached, whereby said data packet may be routed directly from said foreign network toward said second host.
11. A method according to claim 10, wherein said network layer address is different for each traffic flow passing through said mobile router.
12. A method according to claim 10, wherein said network layer address is the same for all traffic flows passing through said mobile router.
13. A method according to any of claims 9 to 12, further comprising the step of storing in electronic memory a unique identifier for each data packet flow, such that a return data packet flow sent from said second host in reply to said first host comprises said unique identifier, whereby said mobile router may forward said return data packet flow over the correct link toward said first host on said mobile network.
14. A method according to claim 13, further comprising the step of replacing an - 32 - identifier of said traffic type in said data packet with said unique identifier.
15. A method according to claim 13 or 14, further comprising the step of storing a binding database in said electronic memory, which binding database comprises a mapping between an identity of said first host and said unique identifier, whereby data packets from said second host may be routed toward said first host.
16. A method according to claim 13, 14 or 15, wherein said unique identifier comprises an arbitrarily assigned port number that has not already been assigned to another data packet flow passing through said mobile router.
17. A method according to any preceding claim, wherein step (b) comprises the step of examining said data packet for a traffic type identifier to identify said type of traffic carried therein.
IS
18. A method according to claim 17, further comprising the step of examining a transport layer segment carried by said data packet to determine said type of traffic.
19. A method according to claim 18, wherein said traffic type identifier comprises a destination port number in a header of said transport layer segment, the method further comprising the step of using said destination port number to determine whether or not said data packet carries traffic of said first or second types.
20. A method according to claim 19, wherein said header comprises a Transmission Control Protocol (TCP) or User Datagram Protocol (UDP) header.
21. A method according to any preceding claim, wherein said second routing method comprises the step of indirectly routing said data packet from said mobile router toward said second host, in which mobility of said mobile router at the network layer is substantially transparent to said first host.
22. A method according to any preceding claim, further comprising the step of monitoring the status of network layer handover of said mobile router and implementing a third routing method if and when said mobile router detects or is undergoing network layer handover between access routers.
- 33 -
23. A method according to claim 22, wherein said third routing method comprises the step of inspecting said data packet for an indication that said Iirst host is attempting to establish a transport layer connection with or has just begun data transmission to said second host.
24. A method according to claim 23, wherein if said indication is present replacing a source address of said data packet with an address of an interface within a new foreign network to which said mobile router is to be handed over, whereby said data packet may be routed directly from said new foreign network toward said second host.
25. A method according to claim 22, 23 or 24, further comprising the step of maintaining existing transport layer connections that are routed by said first routing method via the old foreign network during said handover.
26. A method according to any preceding claim wherein said data packet comprises an lPv4 datagram or an lPv6 datagrarn.
27. A method according to any preceding claim, wherein said mobile network operates under a NEMO, NEMO-like or NEMO-derived protocol.
28. A computer program comprising computer executable instructions for causing a mobile network to perform the method steps of any preceding claim.
29. A computer program comprising computer executable instructions for causing a mobile router to perform the method steps of any of claims I to 27.
30. A computer program product storing computer executable instructions in accordance with claim 28 or claim 29.
3 I. A computer program product as claimed in claim 30, embodied on a record medium, in a computer memory, in a read-only memory or on an electrical carrier signal.
- 34 -
32. A mobile router comprising an electronic memory storing computer executable instructions that when executed cause the mobile router to perform the method steps of any of claims I to 27.
33. A mobile network comprising a mobile router as claimed in claim 32.
34. A vehicle comprising a mobile router as claimed in claim 32.
35. A method of route optimising data packet flows from a mobile network, which method comprises the steps of: (a) receiving a data packet from a first host within said mobile network addressed to a second host; (b) replacing a source address in said packet with a topologically correct address on a foreign network to which said mobile router is presently attached; and (c) forwarding said packet toward said second host; whereby data packets sent by said second host in reply will be addressed to said topologically correct address on said foreign network.
36. A method according to claim 35, wherein said source address is a public IP address and said topologically correct address is a public IP address.
GB0500655A 2005-01-14 2005-01-14 Network mobility Withdrawn GB2422272A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
GB0500655A GB2422272A (en) 2005-01-14 2005-01-14 Network mobility
US11/332,036 US20060159088A1 (en) 2005-01-14 2006-01-13 Network mobility

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
GB0500655A GB2422272A (en) 2005-01-14 2005-01-14 Network mobility

Publications (2)

Publication Number Publication Date
GB0500655D0 GB0500655D0 (en) 2005-02-23
GB2422272A true GB2422272A (en) 2006-07-19

Family

ID=34224541

Family Applications (1)

Application Number Title Priority Date Filing Date
GB0500655A Withdrawn GB2422272A (en) 2005-01-14 2005-01-14 Network mobility

Country Status (2)

Country Link
US (1) US20060159088A1 (en)
GB (1) GB2422272A (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2012070044A1 (en) * 2010-11-24 2012-05-31 Elta Systems Ltd. Architecture and methods for traffic management by tunneling in moving hierarchical cellular networks
US9451476B2 (en) 2010-11-24 2016-09-20 Elta Systems Ltd. Various routing architectures for dynamic multi-hop backhauling cellular network and various methods useful in conjunction therewith
US9769871B2 (en) 2010-01-28 2017-09-19 Elta Systems Ltd. Cellular communication system with moving base stations and methods and apparatus useful in conjunction therewith
US10375622B2 (en) 2016-07-14 2019-08-06 Icomera Ab Train communication system with silent compartments
US10506395B2 (en) 2015-12-04 2019-12-10 Icomera Ab Method and system for dynamic selection of communication paths for a moving vehicle

Families Citing this family (49)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8782654B2 (en) 2004-03-13 2014-07-15 Adaptive Computing Enterprises, Inc. Co-allocating a reservation spanning different compute resources types
US20070266388A1 (en) 2004-06-18 2007-11-15 Cluster Resources, Inc. System and method for providing advanced reservations in a compute environment
US8176490B1 (en) 2004-08-20 2012-05-08 Adaptive Computing Enterprises, Inc. System and method of interfacing a workload manager and scheduler with an identity manager
CA2827035A1 (en) 2004-11-08 2006-05-18 Adaptive Computing Enterprises, Inc. System and method of providing system jobs within a compute environment
US7698430B2 (en) 2005-03-16 2010-04-13 Adaptive Computing Enterprises, Inc. On-demand compute environment
US8863143B2 (en) 2006-03-16 2014-10-14 Adaptive Computing Enterprises, Inc. System and method for managing a hybrid compute environment
US9015324B2 (en) 2005-03-16 2015-04-21 Adaptive Computing Enterprises, Inc. System and method of brokering cloud computing resources
US9231886B2 (en) 2005-03-16 2016-01-05 Adaptive Computing Enterprises, Inc. Simple integration of an on-demand compute environment
US8782120B2 (en) 2005-04-07 2014-07-15 Adaptive Computing Enterprises, Inc. Elastic management of compute resources between a web server and an on-demand compute environment
CA2603577A1 (en) 2005-04-07 2006-10-12 Cluster Resources, Inc. On-demand access to compute resources
JP4776412B2 (en) * 2006-03-23 2011-09-21 エヌ・ティ・ティ・コミュニケーションズ株式会社 Packet transfer apparatus, packet transfer method, and program
US8412207B2 (en) * 2006-12-21 2013-04-02 Core Wireless Licensing S.A.R.L. Method of providing a mobility service
US8089952B2 (en) * 2007-08-31 2012-01-03 Intelepeer, Inc. Intelligent call routing
US8041773B2 (en) 2007-09-24 2011-10-18 The Research Foundation Of State University Of New York Automatic clustering for self-organizing grids
FR2926427B1 (en) * 2008-01-16 2012-12-28 Alstom Transport Sa IP COMMUNICATION ARCHITECTURE BETWEEN SOIL AND A VEHICLE
US8825109B2 (en) 2008-02-15 2014-09-02 Blackberry Limited Policy-based data routing for a multi-mode device
US8126509B2 (en) 2008-08-01 2012-02-28 Mediatek Inc. Methods for handling packet-switched data transmissions by mobile station with subscriber identity cards and systems utilizing the same
US9401855B2 (en) * 2008-10-31 2016-07-26 At&T Intellectual Property I, L.P. Methods and apparatus to deliver media content across foreign networks
JPWO2011010657A1 (en) * 2009-07-22 2013-01-07 住友電気工業株式会社 Data communication system including traffic control device
US8887144B1 (en) 2009-09-04 2014-11-11 Amazon Technologies, Inc. Firmware updates during limited time period
US10177934B1 (en) 2009-09-04 2019-01-08 Amazon Technologies, Inc. Firmware updates inaccessible to guests
US9565207B1 (en) 2009-09-04 2017-02-07 Amazon Technologies, Inc. Firmware updates from an external channel
US8214653B1 (en) 2009-09-04 2012-07-03 Amazon Technologies, Inc. Secured firmware updates
US8971538B1 (en) 2009-09-08 2015-03-03 Amazon Technologies, Inc. Firmware validation from an external channel
US8601170B1 (en) 2009-09-08 2013-12-03 Amazon Technologies, Inc. Managing firmware update attempts
US8102881B1 (en) 2009-09-08 2012-01-24 Amazon Technologies, Inc. Streamlined guest networking in a virtualized environment
US8155146B1 (en) * 2009-09-09 2012-04-10 Amazon Technologies, Inc. Stateless packet segmentation and processing
US8640220B1 (en) 2009-09-09 2014-01-28 Amazon Technologies, Inc. Co-operative secure packet management
US8300641B1 (en) 2009-09-09 2012-10-30 Amazon Technologies, Inc. Leveraging physical network interface functionality for packet processing
US8959611B1 (en) 2009-09-09 2015-02-17 Amazon Technologies, Inc. Secure packet management for bare metal access
US8381264B1 (en) 2009-09-10 2013-02-19 Amazon Technologies, Inc. Managing hardware reboot and reset in shared environments
US11720290B2 (en) 2009-10-30 2023-08-08 Iii Holdings 2, Llc Memcached server functionality in a cluster of data processing nodes
US10877695B2 (en) 2009-10-30 2020-12-29 Iii Holdings 2, Llc Memcached server functionality in a cluster of data processing nodes
US9853904B2 (en) * 2010-02-23 2017-12-26 Alcatel Lucent Source-based queue selection mechanism in the routing environment
JP5365738B2 (en) * 2010-03-12 2013-12-11 富士通株式会社 Communication section setting method, relay station, mobile communication system
KR101539834B1 (en) * 2010-04-16 2015-07-27 인터디지탈 패튼 홀딩스, 인크 Inter-unit transfer support using mobile internet protocol
US8428087B1 (en) 2010-09-17 2013-04-23 Amazon Technologies, Inc. Framework for stateless packet tunneling
IL218046B (en) 2012-02-12 2018-11-29 Elta Systems Ltd Multi-directional relay architecture and apparatus and methods of operation useful in conjunction therewith
US8462780B2 (en) 2011-03-30 2013-06-11 Amazon Technologies, Inc. Offload device-based stateless packet processing
US20190287068A1 (en) * 2012-04-03 2019-09-19 Transform Sr Brands Llc Methods and systems for connected sales associate services
US10242343B2 (en) * 2012-04-03 2019-03-26 Sears Brands, L.L.C. Methods and systems for connected sales associate services
US9338089B2 (en) 2013-01-25 2016-05-10 Landis+Gyr Innovations, Inc. Method and system for using extension headers to support protocol stack migration
US10033644B2 (en) 2013-02-12 2018-07-24 Adara Networks, Inc. Controlling congestion controlled flows
WO2015014189A1 (en) 2013-08-02 2015-02-05 优视科技有限公司 Method and device for accessing website
US9974115B2 (en) * 2013-12-30 2018-05-15 Google Technology Holdings LLC Method and device for policy-based routing
WO2015109583A1 (en) * 2014-01-26 2015-07-30 华为技术有限公司 Data packet sending method and mobile router
CN105207858B (en) * 2014-06-16 2017-04-12 华为技术有限公司 Access device and method for connecting user equipment to network executed by access device
US9923874B2 (en) * 2015-02-27 2018-03-20 Huawei Technologies Co., Ltd. Packet obfuscation and packet forwarding
US10277514B2 (en) * 2016-07-21 2019-04-30 Viasat, Inc. Methods and systems for dynamic policy based traffic steering over multiple access networks

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030040316A1 (en) * 2001-03-22 2003-02-27 Peter Stanforth Prioritized-routing for an ad-hoc, peer-to-peer, mobile radio access system based on battery-power levels and type of service
US20030086411A1 (en) * 2001-11-02 2003-05-08 Dan Vassilovski System and method for routing voice over IP calls
US20030099220A1 (en) * 2001-11-27 2003-05-29 Lg Electronics Inc. Routing of client data service and packet data service
US20030169771A1 (en) * 2002-01-24 2003-09-11 Hong-Jin Ahn Apparatus and method for reordering traffic flow templates in a mobile communication system
US6639898B1 (en) * 1999-05-25 2003-10-28 Motient Communications, Inc. Wide area mobile communication networks with multiple routing mode options
US20040098511A1 (en) * 2002-11-16 2004-05-20 Lin David H. Packet routing method and system that routes packets to one of at least two processes based on at least one routing rule
US6754188B1 (en) * 2001-09-28 2004-06-22 Meshnetworks, Inc. System and method for enabling a node in an ad-hoc packet-switched wireless communications network to route packets based on packet content
GB2400278A (en) * 2003-02-21 2004-10-06 Samsung Electronics Co Ltd Traffic flow template filtering

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH11163947A (en) * 1997-09-22 1999-06-18 Toshiba Corp Gateway device, radio terminal, router device and gateway control method for communication network
US20050232286A1 (en) * 2004-04-20 2005-10-20 Samsung Electronics Co., Ltd. System and method for route optimization using piggybacking in a mobile network
US20080186897A1 (en) * 2004-10-29 2008-08-07 Johan Rune Methods and Nodes in a Communication System for Controlling the Use of Access Resources

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6639898B1 (en) * 1999-05-25 2003-10-28 Motient Communications, Inc. Wide area mobile communication networks with multiple routing mode options
US20030040316A1 (en) * 2001-03-22 2003-02-27 Peter Stanforth Prioritized-routing for an ad-hoc, peer-to-peer, mobile radio access system based on battery-power levels and type of service
US6754188B1 (en) * 2001-09-28 2004-06-22 Meshnetworks, Inc. System and method for enabling a node in an ad-hoc packet-switched wireless communications network to route packets based on packet content
US20030086411A1 (en) * 2001-11-02 2003-05-08 Dan Vassilovski System and method for routing voice over IP calls
US20030099220A1 (en) * 2001-11-27 2003-05-29 Lg Electronics Inc. Routing of client data service and packet data service
US20030169771A1 (en) * 2002-01-24 2003-09-11 Hong-Jin Ahn Apparatus and method for reordering traffic flow templates in a mobile communication system
US20040098511A1 (en) * 2002-11-16 2004-05-20 Lin David H. Packet routing method and system that routes packets to one of at least two processes based on at least one routing rule
GB2400278A (en) * 2003-02-21 2004-10-06 Samsung Electronics Co Ltd Traffic flow template filtering

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9769871B2 (en) 2010-01-28 2017-09-19 Elta Systems Ltd. Cellular communication system with moving base stations and methods and apparatus useful in conjunction therewith
US10660007B2 (en) 2010-01-28 2020-05-19 Elta Systems Ltd. Cellular communication system with moving base stations and methods and apparatus useful in conjunction therewith
US10142906B2 (en) 2010-01-28 2018-11-27 Elta Systems Ltd. Cellular communication system with moving base stations and methods and apparatus useful in conjunction therewith
US9924439B2 (en) 2010-01-28 2018-03-20 Elta Systems Ltd. Cellular communication system with moving base stations and methods and apparatus useful in conjunction therewith
US10075895B2 (en) 2010-11-24 2018-09-11 Elta Systems Ltd. Various routing architectures for dynamic multi-hop backhauling cellular network and various methods useful in conjunction therewith
US9648517B2 (en) 2010-11-24 2017-05-09 Elta Systems Ltd. Architecture and methods for traffic management by tunneling in hierarchical cellular networks
WO2012070044A1 (en) * 2010-11-24 2012-05-31 Elta Systems Ltd. Architecture and methods for traffic management by tunneling in moving hierarchical cellular networks
US10091690B2 (en) 2010-11-24 2018-10-02 Elta Systems Ltd. Architecture and methods for traffic management by tunneling in hierarchical cellular networks
US9451476B2 (en) 2010-11-24 2016-09-20 Elta Systems Ltd. Various routing architectures for dynamic multi-hop backhauling cellular network and various methods useful in conjunction therewith
EP3528534A1 (en) * 2010-11-24 2019-08-21 Elta Systems Ltd. Architecture and methods for traffic management by tunneling in moving hierarchical cellular networks
US9351173B2 (en) 2010-11-24 2016-05-24 Elta Systems Ltd. Architecture and methods for traffic management by tunneling in hierarchical cellular networks
US10506395B2 (en) 2015-12-04 2019-12-10 Icomera Ab Method and system for dynamic selection of communication paths for a moving vehicle
US10375622B2 (en) 2016-07-14 2019-08-06 Icomera Ab Train communication system with silent compartments

Also Published As

Publication number Publication date
GB0500655D0 (en) 2005-02-23
US20060159088A1 (en) 2006-07-20

Similar Documents

Publication Publication Date Title
US20060159088A1 (en) Network mobility
US8553689B2 (en) Home agent acting as a proxy for a Mobile Node
EP1389887B1 (en) Optimized packet routing method in mobile IPv6 supporting localized mobility management
De la Oliva et al. IP flow mobility: smart traffic offload for future wireless networks
US8279807B2 (en) Communication control method, network node, and mobile terminal
US8134969B2 (en) IP layer-handoff using mobility domains and IP caching
US8539554B2 (en) Mobile network managing apparatus and mobile information managing apparatus for controlling access requests
US8155078B2 (en) Systems and methods for using internet mobility protocols with non internet mobility protocols
US20080254768A1 (en) Packet data network connectivity domain selection and bearer setup
US20110103260A1 (en) Binding cache creating method, binding cache creating system, home agent, and mobile node
WO2010041440A1 (en) Interface switching system, mobile node, proxy node, and mobile management node
JP2003526297A (en) Hierarchical mobility management for wireless networks
JP2004274733A (en) Mobile router apparatus, mobile network system, and mobility management method for mobile router apparatus
EP1723764B1 (en) Network mobility support and access control for movable networks
US20100208663A1 (en) Communication system, mobile terminal, and network node
US8243685B2 (en) IP handoff method in mobile agent platform environment
Céspedes et al. An efficient hybrid HIP-PMIPv6 scheme for seamless Internet access in urban vehicular scenarios
KR100759465B1 (en) Methods and system for available bandwidth-guaranteed high-speed parallel mobility management with multiple identical interfaces in wireless lan/man system
US20100100639A1 (en) Method for providing internet protocol handoff of mobile node under multiple mobile agent platform environment
Hossain et al. Analysis of Proxy Mobile IPv6: A network-based mobility solution
McCarthy et al. Supporting nested NEMO networks with the unified MANEMO architecture
Isah An Improved Locator Identifier Split Architecture (ILISA) to Enhance Mobility
Wolf et al. Evaluation of mobility management approaches for IPv6 based mobile car networks
Bochow et al. Internet integration
Noor et al. Route optimization schemes in mobile networks: a theoretical and empirical analysis

Legal Events

Date Code Title Description
WAP Application withdrawn, taken to be withdrawn or refused ** after publication under section 16(1)