MX2008009996A - Triggering migration to a network access agent - Google Patents

Triggering migration to a network access agent

Info

Publication number
MX2008009996A
MX2008009996A MXMX/A/2008/009996A MX2008009996A MX2008009996A MX 2008009996 A MX2008009996 A MX 2008009996A MX 2008009996 A MX2008009996 A MX 2008009996A MX 2008009996 A MX2008009996 A MX 2008009996A
Authority
MX
Mexico
Prior art keywords
network
access
agent
access terminal
base station
Prior art date
Application number
MXMX/A/2008/009996A
Other languages
Spanish (es)
Inventor
Moshe Feder Peretz
P Nair Sureshbabu
Rajkumar Ajay
D Turner Michael
H Zhu Lily
Original Assignee
Alcatellucent Usa Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alcatellucent Usa Inc filed Critical Alcatellucent Usa Inc
Publication of MX2008009996A publication Critical patent/MX2008009996A/en

Links

Abstract

A method is provided for triggering migration of call session state information. The method includes determining whether to migrate a network access agent associated with an access terminal in a wireless communication system based on at least one of mobility information associated with the access terminal and status information associated with the wireless communication system.

Description

MIGRATION OF THE SHOT OF A NETWORKED ACCESS AGENT FIELD OF THE INVENTION This invention relates generally to a communication system and more particularly to a wireless communication system.
BACKGROUND OF THE INVENTION In conventional wireless telecommunications, one or more access terminals may establish a wireless link to a Radio Access Network (RAN). The RAN architecture is typically hierarchical and the call status information, associated with each call session of the access terminal, is stored in a central repository, such as a Radio Network Controller (RNC, for its acronym in English ), a Packet Data Service Node (PDSN), and the like. An alternative to the conventional hierarchical network architecture is a distributed architecture that includes a network of routers in the base station. For example, each router of the base station may combine the functions of RNC and / or PDSN into a single entity that handles radio links between one or more access terminals and an external network, such as the Internet. In comparison to hierarchical networks, REF. : 194782 distributed have the potential to reduce the cost and / or complexity of network deployment, as well as the cost and / or complexity of adding additional wireless access points, for example, station routers, to expand coverage of an existing network. Distributed networks can also reduce (relative to hierarchical networks) experimental delays by users because delays in packet queuing in the RNC and the PDSN of hierarchical networks can be reduced or eliminated. In a distributed architecture, the router of the base station incorporates the functionality of RNC and PDSN. One or more network access agents associated with the access terminals in the service area of the base station router may implement mobile IP (MIP). The network access agents are typically a part of the PDSN protocol collection and responsible for providing connectivity between the access terminal and the distributed network. For example, the network access agent can be an external agent that provides the point of attachment (PoA) and / or Management Care functionality (CoA) for the access terminal. The access terminal is also registered with a Home Agent (HA) that provides a permanent / semi-permanent link to a Internet Protocol (IP) network and maintains the information that identifies the external agent that is serving the access terminal. Accordingly, the information transmitted by the access terminal can travel over an air interconnection to the router of the base station and then be directed to the IP network via the home agent. The information destined for the access terminal can travel from the IP network to the router of the base station via the domestic agent, and then to the access terminal on the interconnection by air. The router of the base station that provides the interconnection by air to the access terminal may change if the access terminal moves through the wireless network. For example, if an access terminal having an active call session is moved from a geographic area served by a first router of the base station to a different geographical area that is served by a second router of the base station, then the agent network access associated with the access terminal can be migrated or transferred from the router of the first base station to the router of the second base station, and the router of the second base station then becomes the router of the service station . The home agent typically remains the same as the access terminal moves through the network. If the access terminal it moves frequently, then the waste of additional bandwidth associated with the repetitive transfer of the network access agent can undesirably consume scarce resources of the network. When an access terminal becomes inactive or asleep, the interconnection by air with the router of the service base station and any data path in the radio access network are disarmed to conserve scarce resources of the network. The migration of the network access agent associated with an idle, traveling access terminal also consumes scarce network resources. For example, an external agent may reveal traffic between the home agent and the access terminal according to mobile IP techniques, in which case the external agent may be referred to as a layer 3 anchor. layer 3 from a router of the base station to another base station router requires the formation of a new radio connection to the access terminal, which adds waste of signaling bandwidth and brings the access terminal back to the mode active. If the inactive access terminal moves frequently, then the waste of additional bandwidth associated with the repeated transfer of the layer 3 anchor can consume scarce resources from the network, potentially frustrating the purpose of placing the access terminal in the mode inactive. Accordingly, conventional distributed networks typically do not migrate the external agents associated with the inactive access terminals until the access terminal is activated in response to incoming or outgoing communications. However, the failure to migrate the foreign agent associated with the inactive access terminals may also have a number of drawbacks. Depending on the circumstances, the inactive access terminal may travel to a geographic area associated with a router of the base station that is distant from the router of the previous service base station. In this way, when the access terminal wakes up and attempts to resume the idle dormant call session, the external agent can be migrated to the new router of the base station. For example, the access terminal may need to re-register with the network and may need to perform a repositioning of agent external to the router of the new base station before an active communication link can be established with the router of the base station. The repositioning procedure of the external agent can increase the reactivation delay of the session for the access terminal. The delay of the reactivation of the session can be particularly problematic if the call session associated with the access terminal is designed to respond quickly to the incoming and / or outgoing information. For example, push to talk applications are designed to respond substantially immediately to incoming and / or outgoing information and can not operate in the desired manner when the reactivation delay of the session is significant.
BRIEF DESCRIPTION OF THE INVENTION The present invention is directed to face the effects of one or more of the problems described above. The following presents a simplified summary of the invention, in order to provide a basic understanding of some aspects of the invention. This summary is not an exhaustive overview of the invention. It is not intended to identify key or critical elements of the invention or to delineate the scope of the invention. Its sole purpose is to present some concepts in a simplified form as a prelude to the more detailed description that is discussed later. In one embodiment of the present invention, a method for triggering the migration of a network access agent is provided. The method includes determining whether to migrate a network access agent associated with an access terminal in a wireless communication system based on at least one mobility information associated with the terminal of access and status information, associated with the wireless communication system.
BRIEF DESCRIPTION OF THE FIGURES The invention can be understood by reference to the following description, taken in conjunction with the appended figures, in which like reference numbers identify similar elements, and in which: Figure 1 conceptually illustrates an exemplary embodiment of a wireless communication system, in accordance with the present invention; Figure 2 conceptually illustrates an exemplary embodiment of a base station router, in accordance with the present invention; Figure 3 illustrates conceptually an exemplary embodiment of a method for determining whether or not a network access agent is migrated before entering inactive mode, in accordance with the present invention; Figure 4 conceptually illustrates an exemplary embodiment of a method for determining whether or not to migrate a network access agent in the idle mode, in accordance with the present invention; Figure 5 conceptually illustrates an exemplary embodiment of a method for determining whether or not to migrate a network access agent while leaving the mode inactive, in accordance with the present invention; and Figure 6 conceptually illustrates an exemplary embodiment of a method for determining whether or not to migrate a network access agent associated with an active access terminal, in accordance with the present invention. While the invention is susceptible to various modifications and alternative forms, the specific embodiments thereof have been shown by way of example in the figures and are described here in detail. It should be understood, however, that the description herein in the specific embodiments is not intended to limit the invention to the particular forms described, but on the contrary, the intention is to cover all modifications, equivalents and alternatives that fall within the spirit and scope of the invention as defined by the appended claims.
DETAILED DESCRIPTION OF THE INVENTION Illustrative embodiments of the invention are described below. In the interest of clarity, not all the characteristics of an effective implementation are described in this specification. Obviously, it will be appreciated that in the development of any such effective modality, numerous specific decisions of the implementation must be made to achieve the goals specific to the developers, such as compliance with the constraints related to the system and related to the business, which will vary from one implementation to another. Furthermore, it will be appreciated that such developmental forces can be complex and time-consuming, but nonetheless it would be a routine endeavor for those of ordinary skill in the art who have the benefit of this description. The portions of the present invention and the corresponding detailed description are presented in terms of software or algorithms and symbolic presentations of the operations on the data bits within a computer memory. These descriptions and representations are those by which those of ordinary experience in the art effectively transfer the substance of their work to others of ordinary skill in the art. An algorithm, as the term is used here, and as it is used in general, is conceived as a self-consistent sequence of steps that lead to a desired result. The steps are those that require physical manipulations of physical quantities. Usually, although not necessarily, these quantities take the form of optical, electrical, or magnetic signals, capable of being stored, transferred, combined, compared and otherwise manipulated. It has been proven that it is convenient sometimes, mainly for reasons of common use, to refer to these signals as bits, values, elements, symbols, characters, terms, numbers or similar. It should be kept in mind, however, that all of these and similar terms will be associated with the appropriate physical quantities, and are merely convenient labels applied to these quantities. Unless otherwise specified, and as is apparent from the discussion, terms such as "processing" or "computation" or "calculation" or "determination" or "deployment" or the like, refer to the action and the processes of a computer system, or similar electronic computing device that manipulates and transforms the data represented as electronic, physical quantities within the registers and the computer system memories in other data similarly represented as physical quantities within the memories or registers of the computer system or other devices such storage, transmission or display of information. Note also that the aspects implemented by the software (computer hardware) of the invention are typically encoded on some form of program storage medium or implemented on some type of transmission medium. The storage medium of programs can be magnetic (for example, floppy disk or a hard disk) or optical (for example, a CD-ROM read-only memory, or "Cederrón") and can be random access or read-only. transmission may be twisted pair cables, coaxial cable, optical fiber, or any other suitable means or transmission known in the art.The invention is not limited by those aspects of any given implementation.The present invention will now be described with reference to the figures Various structures, systems, and devices are schematically described in the figures for purposes of explanation only, and so as not to obscure the present invention with details are well known to those skilled in the art, however, the appended figures are included for describe and explain the illustrative examples of the present invention The words and phrases used herein should be understood and interpreted to have a meaning consistent with the understanding of these words and phrases by those skilled in the relevant art. No special definition of a term or phrase, for example, a definition is different from the ordinary meaning customary as understood by those skilled in the art, is intended to be implied by the consistent use of the term or phrase herein. To the degree a The term or phrase is intended to have a special meaning, for example, a meaning different from understood by those skilled in the art, such a special definition will be expressly described in the specification in a definitional way directly and unambiguously provides the special definition. for the term or phrase. Figure 1 conceptually illustrates an exemplary embodiment of a distributed wireless communication system 100. In the illustrated embodiment, the distributed wireless communication system 100 may operate according to one or more wireless communication standards or protocols. For example, the wireless or distributed communication system 100 may implement one or more of a Universal Mobile Telecommunication System (UMTS), a Code Division Multiple Access protocol (CDMA, CDMA 2000), 3GIX data services, Evolved Data Optimized Devices (IX-EV-DO), High Speed Data Packet Access (HSPDA), a WiMAX system, and the like. The illustrated embodiment, the distributed wireless communication system 100 implements a Mobile Internet Protocol (MIP) to handle layer 3 mobility. However, persons of ordinary skill in the art should appreciate the present invention is not limited to these standards and / or exemplary wireless communication protocols. In alternative embodiments, portions of the wireless communication system 100 may be implemented in a standard and / or wired and / or wireless protocol. In the illustrated embodiment, the access points for the distributed wireless telecommunication system 100 include a distributed network of routers of the base station 105 (1-3). Hereinafter, with the interest of clarity, the base station routers 105 (1-3) will be collectively referred to by the index 105, unless the description is referring to a specific base station router 105, such as the base station router 105 (1). Although the present invention will be described in the context of distributed wireless telecommunication system 100, which comprises a plurality of base station routers 105, persons of ordinary skill in the art should appreciate the present invention is not limited to systems 100 of Distributed wireless telecommunication in which the access points are base station routers 105. In alternative embodiments, the distributed wireless telecommunication system 100 may include any desirable number and / or type of access point. In the illustrated embodiment, the routers 105 of The base station is communicatively coupled to a home agent 105, which can act as the permanent and / or semi-permanent link or link to an IP 120 network. The home agent 115 can implement one or more versions of MIP. The base station routers 105 may also be configured to communicate with other routers 105 of the base station, other home agents 115, other devices, other networks 120, and the like, in a manner known to persons of ordinary skill in the art. The techniques for configuring and / or operating the base station routers 105 and / or the 'home agents 115' are known to persons of ordinary skill in the art and, in the interest of clarity, only those experts of the configuration and / or the operation of the routers 105 of the base station and / or the domestic agents 115 that are relevant to the present invention will be discussed later herein. Figure 2 conceptually illustrates an exemplary embodiment of a router 200 of the base station. In the illustrated embodiment, the router 200 of the base station includes one or more agents 105 for accessing the network. As used herein, the term "network access agent" will be used to refer to the entity within router 200 of the base station, which is used to provide point of attachment and / or care functionality address for an access terminal. In this way, the router 200 of the base station may include one or more network access agents 205 that may be responsible for managing the connectivity between one or more access terminals and the home agent (s) associated with the access terminals . For example, a network access agent may be responsible for moving a local Internet address (or network address identifier) associated with an access terminal to the appropriate global Internet address, assigned to the access terminal by its domestic agent. The network access agents 205 can be implemented in the application layer (or layer 3). Examples of network access agents include the external agent defined by MIP version 4 and the access router defined by MIP version 6. The network access agents 205 on the router 200 of the base station may be associated with the access terminals that currently have an active or inactive communication link with the router 200 of the base station. In addition, in some cases, router 200 of the base station may include network access agents 205 associated with access terminals that have had an active or inactive communication link with router 200 of the base station, but since then. have moved and established an active and inactive communication link with a different base station router. Router 200 of the base station may include a media access control layer 210 (e.g., one or more layer 2 entities) that handles access to shared media, such as air interconnections associated with router 200 from the base station. Router 200 of the base station may also include a physical layer 215 (e.g., one or more layer 1 entities) that provides radio transmission and / or reception capabilities. In one embodiment, the media access control layer 210 and / or the physical layer 215 may operate according to the information stored by the network access agent 205. Those of ordinary skill in the art having the benefit of the present disclosure should appreciate that the network access agent 205, the media access control layer 210 and / or the physical layer 215 can be implemented in physical equipment (hardware), microprogramming, computer software (software) or any combination thereof. Referring again to Figure 1, routers 105 of the base station provide wireless communication link 125 to access terminals 110 within a geographic region or associated cell. As used herein, the term "communication link" refers to the association between an access terminal and a router of the base station and may therefore include a radio interconnect, a session context of the access terminal, and the like. The access terminals 110 can also be referred to using terms such as "mobile unit", "mobile terminal" and the like. Each of the routers 105 of the base station may be capable of initiating, establishing, maintaining, transmitting, receiving, terminating and performing any other desired action, related to a call session with one or more access terminals 110. For example, each router 105 of the base station can combine the functions of Radio Network Controller (RNC) and Packet Data Service Node (PDSN) in a single entity. The access terminals 110 may be in either an active mode or an inactive mode. In the illustrated embodiment, the communication links 125 (1) and 125 (3) are active links and thus routers 105 (1) and 105 (3) of the base station are providing traffic channels and data paths associated with the respective active access terminals 110 (1) and 110 (2). The access terminal 110 (2) is inactive in the illustrated mode. For example, the access terminal 110 (2) may be in an idle or sleep mode. The modes of the active, inactive and sleeping modes are defined by the IEEE 802.16 standard and / or the WiMAX standard. Sleeping modes can be defined by the CDMA lx standards. A sleeping access terminal is not currently transmitting or receiving transmission, but otherwise maintains an active communication link with one or more routers of the base station. An inactive or silent access terminal does not have radio interconnection with a router of the base station, but a valid session context associated with the access terminal is maintained in the base station router for the communication flows that were open and They have not been closed yet. Accordingly, the access terminal 110 (2) may still have a communication link 125 (2) with the router 105 (2) of the base station. For example, when the access terminal 110 (2) enters the idle mode, the traffic channel consisting of the access terminal 110 (2) and the base station router 105 (2) has been broken, but the context of session is maintained, as indicated by dashed line 125 (2). In various alternative embodiments, entry to inactive mode can be triggered by a user that decreases the power of the access terminal 110 (2), silence in a voice communication, the absence of data requiring transmission and the like. For example, access terminal 110 (2) may include a timer that starts when voice or data are not being transmitted or received. If the timer expires, the terminal Access 110 (2) becomes inactive and the traffic channel can be broken. One or more of the mobile units 110 can be moved throughout the geographic area served by the routers 105 of the base station. For example, one or more mobile units 110 may be traveling while in an active mode, and one or more of the mobile units 110 may be traveling while in an inactive mode. In addition, one or more of the mobile stations 110 can enter an idle mode while traveling. Accordingly, the network access agents associated with the traveling mobile units 110 may be migrated between the routers 105 of the base station while in the idle mode, before becoming inactive, during an idle mode, and / or while it goes out of the inactive mode, while it will be discussed later, in detail. The distributed wireless communication system 100 can determine whether or not the network access agents associated with the access terminal (s) 110 are migrated based on the mobility information associated with one or more of the access terminals 110. In various alternative modalities, the mobility information may include the information indicating an activity mode (eg, an active or inactive mode) associated with the access terminal 110, a transport delay associated with the information reliable from a router 105 of the base station to another, the waste of control signaling bandwidth (eg, the waste of bandwidth for the control signaling used for a hands-free of a traveling access terminal 110) , a call reactivation time, a location of an access terminal 110, a location of a network access agent for an access terminal 110, a frequency or mobility speed of the mobility access of the physical layer, a Stopwatch based on the action plan, and the like, as well as any combination thereof. In one embodiment, the mobility information may include information associated with one or more applications running on one or more access terminals 110. As used herein, the term "application" shall be understood to refer to programs, processes and / or connections that run over the access terminals 110 and / or the routers 105 of the base station. The applications may also be referred to as layer 3 entities and may be used to provide voice services to users of access terminals 110. Exemplary applications include, but are not limited to, voice over Internet protocol (VolP), Video and / or audio streams, press to talk and the like. Applications can be implemented in hardware, microprogramming, software or any combination of them. In various alternative modalities, the mobility information associated with one or more applications may include the information indicating the delay tolerances, the quality of the service requirements (QoS) associated with the user and / or the application, a degree of service associated with the user and / or the application, and the like. The distributed wireless communication system 100 may also determine if the network access agents associated with the access terminal (s) 110 are migrated based on the status information associated with the wireless communication system 100. The status information may include any information indicating the current operating status of the wireless communication system 100 and / or the future operating status of the wireless communication system 100. Examples of the status information associated with the wireless communication system 100 may include, but are not limited to information indicating a measured or projected network load, a planned or unplanned service interruption, scheduled maintenance and the like. In one embodiment, the distributed wireless communication system 100 (or a router 105 of the base station) may force the migration of an access agent to the network, for example, to manage resources or to maintain the station's router 105. current base.
This process may be referred to as re-selecting the base station or re-selecting the cell. Persons of ordinary skill in the art who have the benefit of the present disclosure should appreciate that mobility information and status information can be used independently in conjunction with one another. Figure 3 conceptually illustrates an exemplary embodiment of a method 300 for determining whether or not to migrate an access agent to the network before entering inactive mode. In the illustrated embodiment, a router of the base station may receive (at 305) a request from an access terminal to enter inactive mode. For example, the access terminal can determine that it has no pending transmissions and / or receptions and can therefore transmit the request to enter inactive mode to conserve battery power. For yet another example, the network can determine that it has no pending transmissions and / or receptions for the access terminal and can therefore transmit the request to enter inactive mode to conserve battery power. In the router of the base station you can then determine (in 310) whether or not the network access agent is in the router of the service base station. The router of the base station can grant (in 315) the request and the access terminal can enter the inactive module if the agent accesses the network is on the router of the base station, for example, the router of the base station is the router of the service base station. If the network access agent associated with the access terminal is not in the router of the base station, then the router of the base station can trigger (in 320) the migration of the network access agent to a router of the base station. the target base station. For example, if the base station router operates according to MIP, a call processing context function in the base station router can verify, validate and approve the request to enter inactive mode. In this way, the call processing context function in the current external agent can trigger an external agent router advertisement in the target external agent through the signaling of the network, which can in turn fire the terminal of the external agent. access to terminate a MIP record with the target external agent for a layer 3 anchor transfer from the network access agent to the router of the target base station. The request to enter inactive mode can then be granted (in 315). In one embodiment, the transfer of the network access agent to the service base station router occurs just before the access terminal enters idle mode. In this way, the network access agent is repositioned to the router of the service base station (or the nearest node where the network access agent can be located) before the access terminal enters idle mode, which it can reduce the need to perform a transfer of the agent accessing the network during idle mode or at the beginning of the re-establishment of the session. Figure 4 conceptually illustrates an exemplary embodiment of a method 400 for determining whether or not to migrate a network access agent associated with an access terminal, in idle mode. In the illustrated embodiment, a router of the first base station may receive (at 405) a location update message indicating that an access terminal has been moved to a geographic area served by a router of the second base station. As used herein, the term "location update message" shall be understood to refer to a message that includes the indicator information of a message. position or location of an access terminal and / or the movement of the access terminal. The inactive access terminal may provide a location update message to the router of the second base station when it enters the served geographical area, by the router of the second base station. In response to the reception of the location update message, the router of the second The base station may provide information indicating the position of the access terminal and / or the movement of the access terminal to the router of the first (service) base station. In the illustrated embodiment, the router of the first base station includes the network access agent associated with the inactive access terminal. The router of the first base station can determine (at 410) whether or not to migrate the access agent to the router of the second base station, based on the information associated with one or more applications on the access terminal. In the illustrated embodiment, the router of the first base station includes the network access agent which maintains the retention information of the idle mode, and which includes the call session context and may be aware of the update information messages of location, newspapers, from inactive access terminal. Consequently, the router of the first base station (or any other node that acts as the call anchor) can determine (at 410) whether or not it migrates to the network access agent based on network topologies or limits of MIP registration. The router of the first base station (or any other node that acts as the call anchor) can also determine (at 410) whether or not it migrates to the network access agent, based on the availability of the tunnels between different routers of the base station in the path to the last router of the reported base station, the travel time of the data path, one or more movement characteristics of the inactive access terminal (for example, it is the inactive access terminal) which moves relatively quickly or relatively slowly between the coverage areas of the router of the base station) and the predetermined movement patterns such as may be associated with highways, roads, railroad tracks and the like. In each of these scenarios a specific FA migration algorithm and the strategy could be formulated based on the information associated with one or more applications on the inactive access terminal and one or more routers of the base station. If the router of the first base station determines (at 410) that the network access agent associated with the inactive access terminal should be migrated, then the network access agent can be migrated (at 415) to the network access router. the second base station. In one embodiment, the router of the first base station can act as an MIP client proxy (PMIP) for the access terminal. The router of the first base station can therefore handle the MIP signaling on behalf of the inactive access terminal. The network can initiate migration of the network access agent (at 415) to the router of the second base station, based on the location information associated with the inactive access terminal (or any information associated with the communication link) without specific signaling from the terminal inactive access. Therefore, in a deployment scenario with PMIP, the network can migrate (in 415) the network access agent to the router of the last reported base station, to reduce the re-establishment time in eventual session when the terminal inactive access moves from one router on the base station to another. Method 400 can finish (at 420). Figure 5 conceptually illustrates an exemplary embodiment of a method 500 for determining whether an access agent is migrated to the network while an access terminal is exiting idle mode. In the illustrated embodiment, a router of the base station may receive (at 505) a notification that an inactive access terminal is to be re-activated, for example, in response to the information to be transmitted by, or received through the access terminal. For example, the access terminal may transmit a message indicating that the access terminal plans to resume transmissions and therefore must be reactivated. For yet another example, the network can provide a message indicating that the access terminal must be reactivated in response to receiving information destined for the access terminal. The router of the base station can then determine (at 510) whether the network access agent should be migrated or not before the inactive access terminal is reactivated. For example, the router of the base station can determine (at 510) that one or more applications associated with the communication link of the access terminal are sensitive to the reactivation latency. An example of an application that is sensitive to reactivation latency is the press to talk service. The base station router can determine (in 510) that the network access agent must be migrated when the inactive access terminal leaves the idle mode in the CMIP or PMIP configuration so that the network access agent will be at the router node of the service base station, so that the transport delay can be reduced. Since the access terminal will be reactivated, if the network access agent is migrated or not, there is no additional cost over the air (OTA) for the MIP signaling. If the base station router determines (at 510) that the agent accessing the network must be migrated, then the agent accessing the network can be migrated (at 515). In one modality, an agent accessing the network can be migrated (at 515) before the access terminal is reactivated (at 520). Alternatively, the network access agent may be migrated (at 515) concurrently with the reactivation process. If the base station router determines (by 510) that the network access agent should not be migrated, and the access terminal can be reactivated (by 520) without performing any migration. Figure 6 conceptually illustrates an exemplary embodiment of a method 600 for determining whether or not to migrate a network access agent associated with an active access terminal. In the illustrated embodiment, a router of the first base station can receive (at 605) an information indicating a position of an access terminal and / or the movement of the access terminal. The information may indicate that the access terminal has been moved to a geographical area served by a router of the second base station. For example, the access terminal may provide information indicating the position / movement of the access terminal to the router of the second base station when it enters the geographical area served by the router of the second base station. In response to receiving the position / movement information, the router of the second base station can provide information indicating the position / movement of the access terminal to the router of the first (service) base station. In In the illustrated embodiment, the router of the first base station includes the network access agent associated with the access terminal. The router of the first base station can determine (at 610) whether the network access agent is migrated or not, to the router of the second base station, based on the information associated with one or more applications on the access terminal. In one embodiment, the router of the first base station can determine (by 610) whether or not the access agent to the network is migrated based on whether the network access node is available or not in the router of the second base station or its neighborhood. The router of the first base station can also determine (in 610) whether the network access agent is migrated or not based on the values of a network delay (tunneling) and / or one or more network load parameters. In various mobility characteristics of the access terminal, such as a speed of the access terminal, a speed of the crossing limits of the BSR limits, the movement along a pre-determined route such as along of a highway, etc., can also be considered when they are determined (in 610) if the agent of access to the network is migrated or not. The QoS type of the service flows associated with the applications, can also be considered. Exemplary QoS types may include types such as the Service Unsolicited Granting (UGS), Real Time Variable Speed (RT-VR), Extended RT-VR (ERT-VR), No RT-VR (NRT-VR) and Best Effort (BE), as defined in the standards Wimax A Degree of Service (GOS) associated with the user and / or application, such as gold, silver, bronze, may also be considered. If it is determined (in 610) that the network access agent should not be migrated, and the 600 method can terminate (in 615). However, if it is determined at 610 that the network access agent should be migrated, then the agent accessing the network can be migrated (at 620). In one embodiment, the migration (in 620) of the network access agent may include sending IP packets from the router of the base station of the source to the router of the target base station until the router of the base station target becomes the access agent to the network for the access terminal, and a new HA-FA link is formed. The HA-FA link occurs when the access terminal re-registers (at 625) with HA in response to receiving an announcement from the agent from the router of the target base station. In one embodiment, the re-registration schedule (at 625) may be under the control of the router call control of the source and target base station. In various alternative modalities, migration (in 620) can be classified as reliable (for example, migration can occur without any packet loss but can be slower) or unreliable (for example, migration can occur with packet loss but can be faster). The classification could be based on QoS of the active flows associated with one or more applications. In the FA migration process, the buffer sizes of the source and target base station router are, and the time to synchronize the intermediate figures of the network access agent on the routers of the source and target base station can be determined based on one or more of the guaranteed QoS flow parameters defined for the flow such as the Maximum Sustained Traffic Rate (MSTR), Maximum Latency (ML), Tolerated Agitation (TJ), Request Action Plan / Transmission (R / TP), Minimum Reserved Traffic Speed (MRTR), Traffic Priority (TP), and the like. The particular embodiments described above are illustrative only, since the invention can be modified and practiced in different but equivalent ways, apparent to those skilled in the art having the benefit of the teachings herein. Furthermore, no limitations are intended to the details of construction or design shown here, other than those described in the following claims. It is evident therefore, that the particular embodiments described above may be altered or modified and all such variations are considered within the scope and spirit of the invention. Accordingly, the protection sought herein is as set forth in the following claims. It is noted that in relation to this date the best method known by the applicant to carry out the aforementioned invention, is that which is clear from the present description of the invention.

Claims (10)

  1. CLAIMS Having described the invention as above, the content of the following claims is claimed as property: 1. A method, characterized in that it comprises: determining if an access agent is migrated to the network, associated with an access terminal in a system of wireless communication based on at least one of the mobility information associated with the access terminal and the status information associated with the wireless communication system. The method according to claim 1, characterized in that the determination of whether or not the access agent is migrated to the network comprising determining whether the access agent to the network is migrated based on the information indicating at least one from a replacement transport delay, the control signaling disk, a call reactivation time, an access terminal position, the movement of the access terminal, a frequency or mobility speed of the layer mobility access physical, and a stopwatch based on the action plan. The method according to claim 1, characterized in that it is determined whether or not the access agent to the network is migrated, which comprises determining to migrate the access agent to the network associated with a base station of service for the access terminal, in response to the determination that the access agent to the network associated with the access terminal is not in the service base station for the access terminal. . The method in accordance with the claim 1, characterized in that the determination of whether or not the network access agent is migrated comprises determining whether or not to migrate the access agent to the network before the access terminal enters an inactive mode. 5. The method of compliance with the claim 4, characterized in that it comprises: receiving, in a router of the service base station, a request to enter the inactive mode from the access terminal; determining whether the network access agent, associated with the access terminal, is in a router of the service base station, in response to receiving the request to enter the inactive mode; migrate the access agent to the network associated with the access terminal, to the service base station, in response to the determination that the network access agent associated with the access terminal is not in a service base station for the access terminal; and grant the request to enter inactive mode substantially after the agent accessing the network has been migrated to the base service station. 6. The method according to claim 1, characterized in that the determination of whether or not the access agent to the network is migrated, comprises determining whether or not to migrate the access agent to the network while the access terminal is in an inactive mode, determining whether or not the access agent to the network is migrated in response to the information indicating at least one position of the access terminal, and determining whether or not to migrate the access agent to the network with base in at least one of a network topology, a registration limit, a tunnel availability between a router of the base station recently reported and at least one router of a base station associated with at least one position of the access terminal, a time of travel of the data path, at least one movement characteristic associated with the access terminal and at least one predetermined movement pattern associated with the access terminal. The method according to claim 1, characterized in that the determination of whether the access agent is migrated to the network, comprises determining if the access agent to the network is migrated concurrently with the activation of an inactive access terminal, determining whether or not to migrate the agent accessing the network in response to the information indicating the reactivation of the terminal of inactivated access, and determining if the access agent to the network is migrated or not based on a reactivation latency associated with the access terminal. The method according to claim 1, characterized in that the determination of whether or not the network access agent is migrated comprises determining whether or not to migrate the access agent to the network based on at least one of a network access agent. availability of a network access agent node, a network or tunneling delay, one or more network load parameters, a mobility feature of the access terminal, a quality of the service type associated with the application , a degree of service associated with the application, and comprising registering the access terminal with a home agent in response to the determination of whether the agent accessing the network is migrated or not. The method according to claim 1, characterized in that the determination of whether or not the network access agent is migrated comprises forcing the migration of the access agent to the network based on the status information associated with the system of wireless communication. 10. The method according to claim 1, characterized in that it comprises the migration of the access agent to the network.
MXMX/A/2008/009996A 2006-02-10 2008-08-04 Triggering migration to a network access agent MX2008009996A (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US11351805 2006-02-10

Publications (1)

Publication Number Publication Date
MX2008009996A true MX2008009996A (en) 2008-10-03

Family

ID=

Similar Documents

Publication Publication Date Title
US9544809B2 (en) Triggering migration of a network access agent associated with an access terminal
JP5258083B2 (en) Method and system for distributed roaming service for mobile users in wireless mesh networks
US9723522B2 (en) Event context transfer in a heterogeneous communication system
MXPA05003788A (en) Handoff in dormant mode in a packet data network.
WO2009024466A1 (en) Method of performing a handover and corresponding networks units
KR20090093928A (en) System for fa relocation with context transfer in wireless networks
EP1613114B1 (en) Handover mechanism for mobile IP
JP7387020B2 (en) Methods, computer readable storage media and devices for determining quality of service
MX2008009996A (en) Triggering migration to a network access agent
JP2005143085A (en) Method for implementing hand-off between packet matching apparatuses
JP5234366B2 (en) Mobile communication system, mobility management apparatus, and mobility management control method
JP2002191066A (en) Mobile communication terminal management method, mobile communication terminal management system, mobile communication terminal, mobile communication terminal communication method, mobile communication terminal communication system, and storage medium
Tlais et al. Distributed mobility prediction in a hierarchical infostation systems
Sajjad et al. A flexible IPv6 mobility management architecture for SDN‐based 5G mobile networks
Tlais et al. Distributed communication model in hierarchical Infostation systems
Tlais et al. Centralized mobility prediction support in a hierarchical architecture
Perera Network mobility management for next generation mobile systems
Perera Network Mobility Management for
Pierre Mobility Management in Mobile Computing and Networking Environments
Azhari Capacity Deficit and Link Loss in WLAN to Cellular Vertical Handoff
Deb Modified limited data rate usage algorithm using Markovian decision process model
Kumar et al. A new boundary location register signalling protocol for inter-system roaming