US20110141976A1 - Fast path packet destination mechanism for network mobility via secure pki channel - Google Patents
Fast path packet destination mechanism for network mobility via secure pki channel Download PDFInfo
- Publication number
- US20110141976A1 US20110141976A1 US13/032,033 US201113032033A US2011141976A1 US 20110141976 A1 US20110141976 A1 US 20110141976A1 US 201113032033 A US201113032033 A US 201113032033A US 2011141976 A1 US2011141976 A1 US 2011141976A1
- Authority
- US
- United States
- Prior art keywords
- network
- top level
- mobile router
- central authority
- authority server
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W40/00—Communication routing or communication path finding
- H04W40/24—Connectivity information management, e.g. connectivity discovery or connectivity update
- H04W40/246—Connectivity information discovery
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L45/00—Routing or path finding of packets in data switching networks
- H04L45/02—Topology update or discovery
- H04L45/025—Updating only a limited number of routers, e.g. fish-eye update
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W40/00—Communication routing or communication path finding
- H04W40/02—Communication route or path selection, e.g. power-based or shortest path routing
- H04W40/20—Communication route or path selection, e.g. power-based or shortest path routing based on geographic position or location
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W80/00—Wireless network protocols or protocol adaptations to wireless operation
- H04W80/04—Network layer protocols, e.g. mobile IP [Internet Protocol]
Definitions
- the present disclosure relates to routing systems in wireless networks, and, more particularly, to a fast packet destination mechanism for network mobility via a secure PKI channel.
- an MNN utilizes Mobile Internet Protocol Version 6 (MIPv6) to communicate with another node on a network that couples to the Internet.
- MIPv6 Mobile Internet Protocol Version 6
- a point of attachment for example, may be a link to an access point (wired or wireless) for a network that couples to the Internet.
- the network that couples to the Internet may include, but is not limited to, wired or wireless local area networks (LAN/WLAN), wide area networks (WAN/WWAN), metropolitan area networks (MAN), personal area networks (PAN) and cellular or wireless broadband telephony networks.
- a network address (e.g., IPv4 or IPv6 address) is associated with the MNN's point of attachment to the Internet.
- another network address is associated with the MNN's new point of attachment to the Internet. This may result in a corresponding change in the MNN's network address.
- Simply changing the MNN's network address based on a change in the point of attachment may allow the MNN to communicate with another node uninterrupted, for example, at the Open Systems Interconnection (OSI) data link layer.
- OSI Open Systems Interconnection
- the MNN may be a mobile handheld or notebook personal computer that has established higher layer connections (e.g., transport and higher levels) with another node.
- These higher layer connections may be based on the MNN maintaining a specific network address. Due to authentication requirements, these higher layer connections between the MNN and the node likely cannot be maintained by just changing the network address.
- VPN virtual private network
- RFC 3775 describes a MIPv6-based communication protocol that allows an MNN to move from one point of attachment to another without changing the network address some or most other nodes may use to communicate with that MNN. This is accomplished by giving the MNN a home address that is associated with its original or initial point of attachment to the Internet.
- This original or initial point of attachment is typically referred to as the home link.
- Other nodes will forward communications to a node (e.g., a router) on the home link using that home address associated with the home link. Communications are then forwarded to the MNN by the node on the home link.
- a node e.g., a router
- Communications are then forwarded to the MNN by the node on the home link.
- RFC 3963 Another industry initiative addresses instances where an MNN is part of a network that also moves and/or becomes mobile (“mobile network”).
- mobile network is the Internet Engineering Task Force, Network Working Group, Request for Comments: 3963, Network Mobility (NEMO) Basic Support Protocol, published Jan. 2005 (“RFC 3963”).
- RFC 3963 describes a protocol that allows every node coupled to a mobile network to maintain communications with other nodes in or outside of the mobile network while the mobile network moves around and changes its point of attachment to the Internet.
- the mobile network may couple to the Internet through a node that is also mobile or becomes mobile and has routing capabilities, e.g., a mobile router. In that sense, the mobile network is commonly called a nested network when coupled to another router that is part of another network.
- FIG. 1 is a schematic diagram of a traditional system illustrating a plurality of Mobile Routers (MRs) communicating amongst each other using a NEtwork MObility (NEMO) protocol in a network;
- MRs Mobile Routers
- NEMO NEtwork MObility
- FIG. 2 is a schematic diagram of the traditional system illustrating a flow of a data through the plurality of MRs in a NEMO protocol network;
- FIG. 3 is a schematic diagram of a routing system for reducing routing overheads in a network, according to an exemplary embodiment of the present disclosure in the network;
- FIG. 4 is a flow diagram of a method for reducing overheads in the network.
- first, second, and the like, herein do not denote any order, quantity, or importance, but rather are used to distinguish one element from another.
- the terms “a” and “an” herein do not denote a limitation of quantity, but rather denote the presence of at least one of the referenced items.
- FIG. 1 is a schematic diagram of a traditional system illustrating a plurality of Mobile Router (MR)s 110 , 118 , 122 , 126 and 130 communicating among each other using a NEtwork MObility (NEMO) protocol in a network 144 , for example Internet.
- the network 144 may be a wireless network, for example, a Global System (GSM) network, a Code Division Multiple Access (CDMA) network, and a Wireless Fidelity (WiFi) network.
- GSM Global System
- CDMA Code Division Multiple Access
- WiFi Wireless Fidelity
- the NEMO protocol defines support for mobility of devices, for example, the plurality of MRs 110 , 118 , 122 , 126 and 130 in the network 144 .
- the ultimate goal of NEMO protocol is to ensure session continuity for all MRs within the network 144 . Further, the NEMO protocol ensures uninterrupted communication between the MRs, when a MR, for example, MR 110 changes position and attaches with a set of plurality of MRs. The MR 110 changes the position and attaches to the set of MRs 118 , 122 and 126 , before finally attaching to the MR 130 . Furthermore, the NEMO protocol provides connectivity and reachability to a Mobile Network Node (MNN), for example, 112 attached to the MR 110 in the network 144 .
- MNN Mobile Network Node
- the NEMO protocol uses an Internet Protocol Security (IPSec) Encapsulating Security Payload (ESP) protected bi-directional tunneling between MRs and Home Agents (HA) operationally attached to the MRs, for example HA 108 of the MR 110 .
- IPSec Internet Protocol Security
- HA Home Agents
- MIPv6 Mobile Internet Protocol Version 6
- the HA 108 maintains a cache that stores the current location of the MR or MNN, for example, the HA 108 maintains a cache for storing the current location of the MR 110 .
- MR 110 roams to another subnet (for example, MR 110 attaches to the MR 118 , thereafter the MR 110 attaches to the MR 130 ), then MR 110 sends information to the HA 108 to inform HA 104 that MR 110 is attached to the MR 118 and may be reached via a CoA (Care of Address), in compliance with the MIPv6 protocol.
- the CoA is a temporary IP address for the MR 110 which enables the MR 110 to receive data packets from the plurality of MRs 118 , 122 , 126 and 130 , when the MR 110 roams to another subnet.
- the CoA is then registered in the HA 104 and the CoA is contained within a Binding Update (BU). Thereafter, an end-to-end IPSec ESP protected bi-directional tunnel is setup between the HA 104 and the MR 118 .
- BU Binding Update
- FIG. 2 is a diagram of the traditional system illustrating a flow of a data through the plurality of MRs 110 , 118 , 122 , 126 and 130 , when the MR 110 roams to another subnet, for example, MR 110 attaches to the MR 118 , thereafter the MR 110 attaches to the MR 130 .
- the flow of data is initiated when the data packet is send by the CN 102 , the data packet being sent to the MR 110 .
- the data packet will first arrive to MR 110 home link and being intercepted by the HA 108 . If the MR 110 is at the home link, which is connected to the AR 136 , then the HA 108 will just route the data packet directly to MR 110 (using standard MIPv 6 protocol, and/or other routing mechanism).
- the CN 102 does not know the position of MR 110 and does not know that the MR 110 has roamed away and attached to the MR 118 and is reachable at a newly assigned CoA on a different subnet. Since MR 110 has informed HA 104 regarding MR 110 's new position via the BU, the HA 104 will map to the newly assigned CoA of the MR 110 to the HoA.
- the MR 118 after checking the outer layer of the IP header realizes that the data packet is destined for MR 110 and realizes that the MR 110 is attached to one of MR 118 ingress interfaces. MR 118 will then route the data packet over to the MR 110 for further processing.
- the data packet from the CN 102 will have to travel to many routing paths and many bi-directional tunnels.
- the path followed by the data packet will be CN 102 to HA 104 , HA 104 to MR 118 , MR 118 to MR 122 , MR 122 to MR 126 , and MR 126 to MR 130 .
- the routing paths may be visualized as a network tree structure with HA 104 being overloaded as the MR 110 dived deep and have n-depth of branches of routes.
- the MRs 118 , 122 , 126 and 130 that are attached to the plurality of ARs 136 , 138 , 140 and 142 may be visualized as the top level tree node.
- the routing path to reach MR 110 will go to n th deeper when MR 110 roamed n th times.
- the processing cost for transferring the data packet is high due to n th depths in terms of cryptography used in the NEMO protocol.
- the network tree will be stressed to grow to n th path deep and the routing cost will be extremely high and intangible. Because of processing due to cryptography, the situation become worsened due to the fact of loading on IPSec ESP protected bi-directional tunneling, as there exists a need of involvement of multiple levels and repetition of encryption-decryption processes.
- the overheads of NEMO protocol i.e. the security features such as cryptography, will become a burden to the mobility and reliability of the network and will jeopardize the communications among the plurality of MRs 108 , 118 , 122 , 126 and 130 .
- FIG. 3 is a schematic diagram of a routing system for reducing overheads in a network 144 .
- the routing system includes all the components as described in the FIG. 1 and FIG. 2 .
- the routing system further includes a Central Authority (CA) server 302 .
- the CA server 302 is an Internet Service Provider (ISP).
- the plurality of MRs 110 , 118 , 122 , 126 and 130 are capable of roaming within the network 144 .
- the MRs 110 , 118 , 122 and 126 act as top level MRs.
- the top level MRs 110 , 118 , 122 and 126 are directly connected to the network 144 through the plurality of ARs 136 , 138 , 140 and 142 .
- Each of the plurality of MRs is capable of operationally attaching to the top level MRs 110 , 118 , 122 and 126 , for example, the MR 110 is attached to the top level MR 118 .
- the CN 102 is capable of sending the data packets to a destination MR, for example, the MR 110 and the destination MR is attached to the top level MR 130 .
- the data packets are send to the home link of the MR 110 attached to the network 144 through the AR 136 . Since the routing paths of the MRs attached to the top level MRs 110 , 118 , 122 and 126 is send by the CA server 302 to all the top level MRs 110 , 118 , 122 and 126 , accordingly, once the data packets reach the HA 108 of MR 110 , the HA 108 sends the data packet directly to the MR 126 using the information stored in the CA 302 . The MR 126 upon receiving the data packets will send the data packets to the destination MR 110 .
- the routing system of the present disclosure provides significant improvement for reducing overheads and uses a faster routing path.
- the routing path of the data packets by-passes the MR 118 and the MR 122 as compared to the traditional system described in conjunction with FIG. 1 and FIG. 2 .
- FIG. 4 is a flow diagram of a method for reducing overheads during data transmissions to the destination MR from the plurality of MRs 110 , 118 , 122 , 126 and 132 roaming in the network 144 .
- the method initiates at 402 .
- each of the top level MRs for example, the MRs 110 , 118 , 122 and 126 , register with the CA server 302 , the registration comprises sending information about MRs attached to each of the top level MRs 110 , 118 , 122 and 126 to the CA server 302 .
- the CN 102 sends the data packets to the destination MR, for example, the MR 110 .
- the destination MR 110 is operationally attached to the top level MR 130 .
- the position of the MR 110 is located by the HA 108 of the MR 110 , because the data packets destined for the destination MR 110 reaches the HA 108 of MR 110 .
- the data packets are routed to the top level MR 126 of the destination MR 110 using the information stored in the CA server 302 .
- the destination MR 110 receives the data packets from the top level MR 126 . The method terminates at 414 .
- the embodiments of the disclosure may be in the form of computer-implemented processes and apparatuses for practicing those processes.
- Embodiments of the disclosure may also be in the form of computer program code containing instructions embodied in tangible media, such as floppy diskettes, CD-ROMs, hard drives, or any other computer-readable storage medium, wherein, when the computer program code is loaded into and executed by a computer, the computer becomes an apparatus for practicing the disclosure.
- the present disclosure may also be embodied in the form of computer program code, for example, whether stored in a storage medium, loaded into and/or executed by a computer, or transmitted over some transmission medium, such as over electrical wiring or cabling, through fiber optics, or via electromagnetic radiation, wherein, when the computer program code is loaded into and executed by a computer, the computer becomes an apparatus for practicing the disclosure.
- the computer program code segments configure the microprocessor to create specific logic circuits.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
Disclosed is a method for reducing routing overheads during data transmission to a destination mobile router of a plurality of mobile routers roaming in a network. The method comprises registering by top level mobile routers with a central authority server, sending data packets by a corresponding node of the network to the destination mobile router operationally attached to a corresponding top level mobile router, locating a position of the destination mobile router by identifying attachment of the destination mobile router to the corresponding top level mobile router from the information registered by the plurality of mobile routers with the central authority server, routing the data packet directly to the corresponding top level mobile router to which the destination mobile router is operationally attached and receiving the data packet by the destination mobile router from the corresponding top level mobile router, thereby reducing routing overheads in the network.
Description
- This application is a continuation of U.S. patent application Ser. No. 11/776,926 filed on Jul. 12, 2007, now U.S. Pat. No. 7,894,420, which is herein incorporated by reference in its entirety.
- The present disclosure relates to routing systems in wireless networks, and, more particularly, to a fast packet destination mechanism for network mobility via a secure PKI channel.
- In networking environments that include devices or nodes on a network coupled to the Internet, the nodes may move and/or become mobile (e.g., mobile network nodes “MNNs”). In this environment, maintaining a continuous network connection with these MNNs due to that movement is difficult. For example, an MNN utilizes Mobile Internet Protocol Version 6 (MIPv6) to communicate with another node on a network that couples to the Internet. In this example, the MNN moves such that its point of attachment to the Internet has changed and is different than its previous point of attachment. A point of attachment, for example, may be a link to an access point (wired or wireless) for a network that couples to the Internet. The network that couples to the Internet may include, but is not limited to, wired or wireless local area networks (LAN/WLAN), wide area networks (WAN/WWAN), metropolitan area networks (MAN), personal area networks (PAN) and cellular or wireless broadband telephony networks.
- Typically, a network address (e.g., IPv4 or IPv6 address) is associated with the MNN's point of attachment to the Internet. When the MNN's point of attachment changes, another network address is associated with the MNN's new point of attachment to the Internet. This may result in a corresponding change in the MNN's network address. Simply changing the MNN's network address based on a change in the point of attachment may allow the MNN to communicate with another node uninterrupted, for example, at the Open Systems Interconnection (OSI) data link layer. However, the MNN may be a mobile handheld or notebook personal computer that has established higher layer connections (e.g., transport and higher levels) with another node. These higher layer connections (e.g., a virtual private network (VPN) connection) may be based on the MNN maintaining a specific network address. Due to authentication requirements, these higher layer connections between the MNN and the node likely cannot be maintained by just changing the network address.
- Industry initiatives have tried to address a possible interruption in communications via higher level connections. These initiatives allow an MNN to move from one point of attachment to another without changing the address to which other nodes may forward data to the MNN. Thus, the MNN's network address from the perspective of other nodes has not changed. One such initiative is the Internet Engineering Task Force, Network Working Group, Request for Comments: 3775, Mobility Support in IPv6, published Jun. 2004 (“RFC 3775”). RFC 3775 describes a MIPv6-based communication protocol that allows an MNN to move from one point of attachment to another without changing the network address some or most other nodes may use to communicate with that MNN. This is accomplished by giving the MNN a home address that is associated with its original or initial point of attachment to the Internet. This original or initial point of attachment is typically referred to as the home link. Other nodes will forward communications to a node (e.g., a router) on the home link using that home address associated with the home link. Communications are then forwarded to the MNN by the node on the home link. Thus, as the MNN moves to different points of attachment, that movement is transparent to higher layer connections with other nodes.
- Another industry initiative addresses instances where an MNN is part of a network that also moves and/or becomes mobile (“mobile network”). One such initiative is the Internet Engineering Task Force, Network Working Group, Request for Comments: 3963, Network Mobility (NEMO) Basic Support Protocol, published Jan. 2005 (“RFC 3963”). RFC 3963 describes a protocol that allows every node coupled to a mobile network to maintain communications with other nodes in or outside of the mobile network while the mobile network moves around and changes its point of attachment to the Internet. The mobile network may couple to the Internet through a node that is also mobile or becomes mobile and has routing capabilities, e.g., a mobile router. In that sense, the mobile network is commonly called a nested network when coupled to another router that is part of another network.
- The advantages and features of the present disclosure will become better understood with reference to the following detailed description and claims taken in conjunction with the accompanying drawings, wherein like elements are identified with like symbols, and in which:
-
FIG. 1 is a schematic diagram of a traditional system illustrating a plurality of Mobile Routers (MRs) communicating amongst each other using a NEtwork MObility (NEMO) protocol in a network; -
FIG. 2 is a schematic diagram of the traditional system illustrating a flow of a data through the plurality of MRs in a NEMO protocol network; -
FIG. 3 is a schematic diagram of a routing system for reducing routing overheads in a network, according to an exemplary embodiment of the present disclosure in the network; and -
FIG. 4 is a flow diagram of a method for reducing overheads in the network. - Like reference numerals refer to like parts throughout the description of several views of the drawings.
- For a thorough understanding of the present disclosure, reference is to be made to the following detailed description, including the appended claims, in connection with the above-described drawings. Although the present disclosure is described in connection with exemplary embodiments, the disclosure is not intended to be limited to the specific forms set forth herein. It is understood that various omissions and substitutions of equivalents are contemplated as circumstances may suggest or render expedient, but these are intended to cover the application or implementation without departing from the spirit or scope of the claims of the present disclosure. Also, it is to be understood that the phraseology and terminology used herein is for the purpose of description and should not be regarded as limiting.
- The terms “first,” “second,” and the like, herein do not denote any order, quantity, or importance, but rather are used to distinguish one element from another. The terms “a” and “an” herein do not denote a limitation of quantity, but rather denote the presence of at least one of the referenced items.
-
FIG. 1 is a schematic diagram of a traditional system illustrating a plurality of Mobile Router (MR)s 110, 118, 122, 126 and 130 communicating among each other using a NEtwork MObility (NEMO) protocol in anetwork 144, for example Internet. Thenetwork 144 may be a wireless network, for example, a Global System (GSM) network, a Code Division Multiple Access (CDMA) network, and a Wireless Fidelity (WiFi) network. The NEMO protocol defines support for mobility of devices, for example, the plurality ofMRs network 144. The ultimate goal of NEMO protocol is to ensure session continuity for all MRs within thenetwork 144. Further, the NEMO protocol ensures uninterrupted communication between the MRs, when a MR, for example,MR 110 changes position and attaches with a set of plurality of MRs. TheMR 110 changes the position and attaches to the set ofMRs MR 130. Furthermore, the NEMO protocol provides connectivity and reachability to a Mobile Network Node (MNN), for example, 112 attached to theMR 110 in thenetwork 144. - The NEMO protocol uses an Internet Protocol Security (IPSec) Encapsulating Security Payload (ESP) protected bi-directional tunneling between MRs and Home Agents (HA) operationally attached to the MRs, for
example HA 108 of theMR 110. Further, in the NEMO protocol as part of protocol extension to an existing Mobile Internet Protocol Version 6 (MIPv6), the HA 108 maintains a cache that stores the current location of the MR or MNN, for example, the HA 108 maintains a cache for storing the current location of theMR 110. - The traditional system further includes a plurality of Access Routers (ARs) 134, 136, 138, 140 and 142, a Corresponding Node (CN) 102 and a
HA 104 of theCN 102. The plurality ofARs network 144 and provide a communication path for theCN 102 and plurality ofMRs CN 102 is capable of sending data packets to the plurality ofMRs MRs CN 102 may include a Local Area Network (LAN) 114, 120, 124, 128, 132 and 106 in which the plurality ofMRs CN 102 may transfer the data packets to other mobile devices and fixed devices. In alternative embodiments, wireless LANs (WLAN) and/or PANs and/or other network topologies may be used in addition to, or in replacement of, the aforementioned LANs. For example, the MR 110 may transfer the data packets received from the plurality ofMRs CN 102 to other mobile devices and fixed devices within theLAN 114. Also, the other mobile devices and the fixed devices within theLAN 114 may transfer the data packets to the plurality ofMRs CN 102 through theMR 110. - In the traditional system, if the
MR 110 is at its home link, that is,MR 110 is connected directly to theAR 136, thenMR 110 relies on the IPSec ESP protected bi-directional tunnel to provide communications between theMNN 112 andCN 102. The MNN is given a Home of Address (HoA) upon first boot up at the home link by the MR110. TheMR 110 has a subnet address and assigns network address to theMNN 112 attached to an ingress interface of theMR 110 through DHCPv6 (Dynamic Host Configuration Protocol for IPv6) mechanism. In addition, theMR 110 may be configured for other communications, for example, router advertisement and router solicitation, each of which may enable MR to discover at least one other MR and to communicate with same. - In case the
MR 110 roams to another subnet (for example,MR 110 attaches to theMR 118, thereafter theMR 110 attaches to the MR 130), thenMR 110 sends information to theHA 108 to informHA 104 thatMR 110 is attached to theMR 118 and may be reached via a CoA (Care of Address), in compliance with the MIPv6 protocol. The CoA is a temporary IP address for theMR 110 which enables theMR 110 to receive data packets from the plurality ofMRs MR 110 roams to another subnet. The CoA is then registered in theHA 104 and the CoA is contained within a Binding Update (BU). Thereafter, an end-to-end IPSec ESP protected bi-directional tunnel is setup between theHA 104 and theMR 118. -
FIG. 2 is a diagram of the traditional system illustrating a flow of a data through the plurality ofMRs MR 110 roams to another subnet, for example,MR 110 attaches to theMR 118, thereafter theMR 110 attaches to theMR 130. - The flow of data is initiated when the data packet is send by the
CN 102, the data packet being sent to theMR 110. The data packet will first arrive toMR 110 home link and being intercepted by theHA 108. If theMR 110 is at the home link, which is connected to theAR 136, then theHA 108 will just route the data packet directly to MR 110 (using standard MIPv6 protocol, and/or other routing mechanism). However, theCN 102 does not know the position ofMR 110 and does not know that theMR 110 has roamed away and attached to theMR 118 and is reachable at a newly assigned CoA on a different subnet. SinceMR 110 has informedHA 104 regardingMR 110's new position via the BU, theHA 104 will map to the newly assigned CoA of theMR 110 to the HoA. - In order for the data packet to flow through the IPSec ESP protected bi-directional tunnel, the
HA 104 will construct an outer layer of IP header with a source and a destination of the outer layer of IP header as the entrance and exit point of the IPSec ESP protected bi-directional tunnel. TheHA 104 will then forward the data packet to theMR 118 via the IPSec ESP protected bi-directional tunnel. OnceMR 118 receives the data packet, theMR 118 will strip off the outer layer of the IP header and retrieve an inner IP header for inspection. Due to the security design of MIPv6 and NEMO on the recommendation of using IPSec ESP, the process of encryption and decryption will take place when the data packet enters and exits the IPSec ESP protected bi-directional tunnel. - The
MR 118 after checking the outer layer of the IP header realizes that the data packet is destined forMR 110 and realizes that theMR 110 is attached to one ofMR 118 ingress interfaces.MR 118 will then route the data packet over to theMR 110 for further processing. - Further, when
MR 110 roams and attaches to theMR 130, then the data packet from theCN 102 will have to travel to many routing paths and many bi-directional tunnels. The path followed by the data packet will beCN 102 toHA 104,HA 104 toMR 118,MR 118 toMR 122,MR 122 toMR 126, andMR 126 toMR 130. The routing paths may be visualized as a network tree structure withHA 104 being overloaded as theMR 110 dived deep and have n-depth of branches of routes. TheMRs ARs MR 110 will go to nth deeper whenMR 110 roamed nth times. - The processing cost for transferring the data packet is high due to nth depths in terms of cryptography used in the NEMO protocol. The network tree will be stressed to grow to nth path deep and the routing cost will be extremely high and intangible. Because of processing due to cryptography, the situation become worsened due to the fact of loading on IPSec ESP protected bi-directional tunneling, as there exists a need of involvement of multiple levels and repetition of encryption-decryption processes.
- The overheads of NEMO protocol, i.e. the security features such as cryptography, will become a burden to the mobility and reliability of the network and will jeopardize the communications among the plurality of
MRs -
FIG. 3 is a schematic diagram of a routing system for reducing overheads in anetwork 144. The routing system includes all the components as described in theFIG. 1 andFIG. 2 . The routing system further includes a Central Authority (CA)server 302. In one embodiment, theCA server 302 is an Internet Service Provider (ISP). The plurality ofMRs network 144. TheMRs top level MRs network 144 through the plurality ofARs top level MRs MR 110 is attached to thetop level MR 118. - The
CA server 302 may be used as a trusted Central Certificate Authority, which may be used in public and private key infrastructures. In addition, consistent with this disclosure, theCA server 302 may used to manage the routings and channeling whenever a MR of the plurality ofMRs MR 110 attaches to theMR 118. TheCA server 302 is capable of storing information about the top level MRs and the MRs attached to the top level MRS. Each of the top level MRs will be required to register their routing table to theCA server 302 through MR route registration channeling. The MR route registration channeling is done periodically and contains information of the number of subnets each top level MR supports. TheCA servers 302 consolidates the information and channels the routing paths of the MRs to thetop level MRs - The
CN 102 is capable of sending the data packets to a destination MR, for example, theMR 110 and the destination MR is attached to thetop level MR 130. The data packets are send to the home link of theMR 110 attached to thenetwork 144 through theAR 136. Since the routing paths of the MRs attached to thetop level MRs CA server 302 to all thetop level MRs HA 108 ofMR 110, theHA 108 sends the data packet directly to theMR 126 using the information stored in theCA 302. TheMR 126 upon receiving the data packets will send the data packets to thedestination MR 110. - The routing system of the present disclosure provides significant improvement for reducing overheads and uses a faster routing path. For example, as mentioned above, the routing path of the data packets by-passes the
MR 118 and theMR 122 as compared to the traditional system described in conjunction withFIG. 1 andFIG. 2 . -
FIG. 4 is a flow diagram of a method for reducing overheads during data transmissions to the destination MR from the plurality ofMRs network 144. The method initiates at 402. At 404, each of the top level MRs, for example, theMRs CA server 302, the registration comprises sending information about MRs attached to each of thetop level MRs CA server 302. At 406, theCN 102 sends the data packets to the destination MR, for example, theMR 110. Thedestination MR 110 is operationally attached to thetop level MR 130. At 408, the position of theMR 110 is located by theHA 108 of theMR 110, because the data packets destined for thedestination MR 110 reaches theHA 108 ofMR 110. At 410, the data packets are routed to thetop level MR 126 of thedestination MR 110 using the information stored in theCA server 302. At 412, thedestination MR 110 receives the data packets from thetop level MR 126. The method terminates at 414. - As described above, the embodiments of the disclosure may be in the form of computer-implemented processes and apparatuses for practicing those processes. Embodiments of the disclosure may also be in the form of computer program code containing instructions embodied in tangible media, such as floppy diskettes, CD-ROMs, hard drives, or any other computer-readable storage medium, wherein, when the computer program code is loaded into and executed by a computer, the computer becomes an apparatus for practicing the disclosure. The present disclosure may also be embodied in the form of computer program code, for example, whether stored in a storage medium, loaded into and/or executed by a computer, or transmitted over some transmission medium, such as over electrical wiring or cabling, through fiber optics, or via electromagnetic radiation, wherein, when the computer program code is loaded into and executed by a computer, the computer becomes an apparatus for practicing the disclosure. When implemented on a general-purpose microprocessor, the computer program code segments configure the microprocessor to create specific logic circuits.
- The foregoing descriptions of specific embodiments of the present disclosure have been presented for purposes of illustration and description. They are not intended to be exhaustive or to limit the disclosure to the precise forms disclosed, and obviously many modifications and variations are possible in light of the above teaching. The embodiments were chosen and described in order to best explain the principles of the disclosure and its practical application, to thereby enable others skilled in the art to best utilize the disclosure and various embodiments with various modifications as are suited to the particular use contemplated. It is understood that various omission and substitutions of equivalents are contemplated as circumstance may suggest or render expedient, but such modifications are intended to cover the application or implementation without departing from the spirit or scope of the claims of the present disclosure.
Claims (20)
1. A routing system using a NEtwork MObility (NEMO) protocol, the routing system comprising:
a plurality of mobile routers capable of roaming in a network, the plurality of mobile routers comprising at least one top level mobile router coupled to the network via an access router; and
a central authority server configured to store information about the top level mobile routers and any mobile routers operationally attached to each of the top level mobile routers,
wherein a corresponding node is configured to determine a position of a destination mobile router based on the information stored with the central authority server and to route data packets directly to the destination mobile router through a corresponding top level mobile router using the information stored with the central authority server, thereby reducing routing overheads in the network.
2. The routing system of claim 1 , wherein each of the plurality of mobile routers is configured to use Internet Protocol Security (IPSec) Encapsulating Security Payload (ESP) protected bi-directional tunnel for transferring data packets.
3. The routing system of claim 1 , wherein storing information about the top level mobile routers and the mobile routers operationally attached to each of the top level mobile routers is done periodically.
4. The routing system of claim 1 , wherein the central authority server is an Internet Service Provider (ISP).
5. A method comprising:
storing, by a central authority server, information about each of at least one top level mobile router and any mobile routers operationally attached to each top level mobile router of a plurality of mobile routers in a network;
locating a position of a destination mobile router for receiving a data transmission based on the information stored by the central authority server; and
routing the data packets directly to a corresponding top level mobile router to which the destination mobile router is operationally attached, thereby reducing routing overheads in the network.
6. The method of claim 5 , wherein the network is compatible with a NEtwork MObility (NEMO) protocol.
7. The method of claim 5 , wherein each of the plurality of mobile routers use Internet Protocol Security (IPSec) Encapsulating Security Payload (ESP) protected bi-directional tunnel for transferring data packets.
8. The method of claim 7 , wherein the Internet Protocol Security Encapsulating Security Payload is capable of using cryptography when the plurality of data packets are sent and received by each of the plurality of mobile routers.
9. The method of claim 5 , wherein the storing by the central authority server is done periodically.
10. The method of claim 5 , wherein the central authority server is an Internet Service Provider (ISP).
11. The method of claim 5 , wherein the network is a wireless network.
12. The method of claim 11 , wherein the wireless network is one of a Global System (GSM) network, a Code Division Multiple Access (CDMA) network, and a Wireless Fidelity (WiFi) network.
13. A computer program product embodied on a tangible computer readable medium, which when executed by a processor, cause the processor to perform operations, the computer program product comprising a program module having instructions for:
storing, by a central authority server, information about each of at least one top level mobile router and any mobile routers operationally attached to each top level mobile router of a plurality of mobile routers in a network;
locating a position of a destination mobile router for receiving a data transmission based on the information stored by the central authority server; and
routing the data packets directly to a corresponding top level mobile router to which the destination mobile router is operationally attached, thereby reducing routing overheads in the network.
14. The computer program product of claim 13 , wherein the network is compatible with a NEtwork MObility (NEMO) protocol.
15. The computer program product of claim 13 , wherein each of the plurality of mobile routers use Internet Protocol Security (IPSec) Encapsulating Security Payload (ESP) protected bi-directional tunnel for transferring data packets.
16. The computer program product of claim 15 , wherein the Internet Protocol Security Encapsulating Security Payload is capable of using cryptography when the plurality of data packets are sent and received by each of the plurality of mobile routers.
17. The computer program product of claim 13 , wherein the storing by the central authority server is done periodically.
18. The computer program product of claim 13 , wherein the central authority server is an Internet Service Provider (ISP).
19. The computer program product of claim 13 , wherein the network is a wireless network.
20. The computer program product of claim 19 , wherein the wireless network is one of a Global System (GSM) network, a Code Division Multiple Access (CDMA) network, and a Wireless Fidelity (WiFi) network.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US13/032,033 US20110141976A1 (en) | 2007-07-12 | 2011-02-22 | Fast path packet destination mechanism for network mobility via secure pki channel |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US11/776,926 US7894420B2 (en) | 2007-07-12 | 2007-07-12 | Fast path packet destination mechanism for network mobility via secure PKI channel |
US13/032,033 US20110141976A1 (en) | 2007-07-12 | 2011-02-22 | Fast path packet destination mechanism for network mobility via secure pki channel |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US11/776,926 Continuation US7894420B2 (en) | 2007-07-12 | 2007-07-12 | Fast path packet destination mechanism for network mobility via secure PKI channel |
Publications (1)
Publication Number | Publication Date |
---|---|
US20110141976A1 true US20110141976A1 (en) | 2011-06-16 |
Family
ID=40253060
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US11/776,926 Expired - Fee Related US7894420B2 (en) | 2007-07-12 | 2007-07-12 | Fast path packet destination mechanism for network mobility via secure PKI channel |
US13/032,033 Abandoned US20110141976A1 (en) | 2007-07-12 | 2011-02-22 | Fast path packet destination mechanism for network mobility via secure pki channel |
Family Applications Before (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US11/776,926 Expired - Fee Related US7894420B2 (en) | 2007-07-12 | 2007-07-12 | Fast path packet destination mechanism for network mobility via secure PKI channel |
Country Status (1)
Country | Link |
---|---|
US (2) | US7894420B2 (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2013506388A (en) * | 2010-12-22 | 2013-02-21 | インテル コーポレイション | Efficient NEMO security with IBE |
US11665087B2 (en) | 2021-09-15 | 2023-05-30 | International Business Machines Corporation | Transparent service-aware multi-path networking with a feature of multiplexing |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7894420B2 (en) * | 2007-07-12 | 2011-02-22 | Intel Corporation | Fast path packet destination mechanism for network mobility via secure PKI channel |
US8744078B2 (en) | 2012-06-05 | 2014-06-03 | Secure Channels Sa | System and method for securing multiple data segments having different lengths using pattern keys having multiple different strengths |
CN108449318B (en) * | 2018-02-08 | 2019-10-29 | 广东电网有限责任公司信息中心 | It is a kind of based on the zone permission control method of CIM model zone routing, apparatus and system |
Citations (33)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20010047407A1 (en) * | 2000-04-24 | 2001-11-29 | Moore Timothy M. | Systems and methods for determining the physical location of a computer's network interfaces |
US20030093691A1 (en) * | 2001-11-13 | 2003-05-15 | Reefedge, Inc., A Delaware Corporation | Enabling secure communication in a clustered or distributed architecture |
US20030196084A1 (en) * | 2002-04-12 | 2003-10-16 | Emeka Okereke | System and method for secure wireless communications using PKI |
US20040117653A1 (en) * | 2001-07-10 | 2004-06-17 | Packet Technologies Ltd. | Virtual private network mechanism incorporating security association processor |
US20040223491A1 (en) * | 2003-05-06 | 2004-11-11 | Levy-Abegnoli Eric M. | Arrangement in a router for distributing a routing rule used to generate routes based on a pattern of a received packet |
US20040228343A1 (en) * | 2003-05-16 | 2004-11-18 | Marco Molteni | Arrangement for retrieving routing information for establishing a bidirectional tunnel between a mobile router and a correspondent router |
US6836765B1 (en) * | 2000-08-30 | 2004-12-28 | Lester Sussman | System and method for secure and address verifiable electronic commerce transactions |
US20050055576A1 (en) * | 2003-09-04 | 2005-03-10 | Risto Mononen | Location privacy in a communication system |
US20050099971A1 (en) * | 2003-11-10 | 2005-05-12 | Droms Ralph E. | Arrangement in an access router for optimizing mobile router connections based on delegated network prefixes |
US20050144439A1 (en) * | 2003-12-26 | 2005-06-30 | Nam Je Park | System and method of managing encryption key management system for mobile terminals |
US6954790B2 (en) * | 2000-12-05 | 2005-10-11 | Interactive People Unplugged Ab | Network-based mobile workgroup system |
US7016682B2 (en) * | 2002-03-04 | 2006-03-21 | Air Broadband Communications, Inc. | Hybrid wireless access bridge and mobile access router system and method |
US7031328B2 (en) * | 2003-03-10 | 2006-04-18 | Cisco Technology, Inc. | Arrangement for traversing an IPv4 network by IPv6 mobile routers |
US7046647B2 (en) * | 2004-01-22 | 2006-05-16 | Toshiba America Research, Inc. | Mobility architecture using pre-authentication, pre-configuration and/or virtual soft-handoff |
US20060159050A1 (en) * | 2005-01-20 | 2006-07-20 | Samsung Electronics Co., Ltd | System and method for handover in a wireless communication system |
US7143282B2 (en) * | 2000-05-23 | 2006-11-28 | Kabushiki Kaisha Toshiba | Communication control scheme using proxy device and security protocol in combination |
US20070006296A1 (en) * | 2005-06-29 | 2007-01-04 | Nakhjiri Madjid F | System and method for establishing a shared key between network peers |
US7174018B1 (en) * | 1999-06-24 | 2007-02-06 | Nortel Networks Limited | Security framework for an IP mobility system using variable-based security associations and broker redirection |
US7203175B2 (en) * | 2002-08-15 | 2007-04-10 | Cisco Technology, Inc. | Arrangement for router attachments between roaming mobile routers in a mobile network |
US20070081512A1 (en) * | 2003-07-09 | 2007-04-12 | Yukiko Takeda | Terminal and communication system |
US20070082673A1 (en) * | 2005-10-12 | 2007-04-12 | Christope Janneteau | Autonomous mode for a plurality of nested mobile networks |
US20070230410A1 (en) * | 2006-03-29 | 2007-10-04 | Pascal Thubert | Route optimization for a mobile IP network node in a mobile ad hoc network |
US7313631B1 (en) * | 1999-09-06 | 2007-12-25 | University Of Bristol | DNS updating in communication network |
US7333461B2 (en) * | 2003-06-05 | 2008-02-19 | Cisco Technology, Inc. | Arrangement in a router of a mobile network for generating a local router prefix for anonymous route connections |
US20080043664A1 (en) * | 2006-08-21 | 2008-02-21 | Kim Sung Hei | Method and system for reducing transmission route of packet in internet based nested mobile network |
US20080176560A1 (en) * | 2006-12-22 | 2008-07-24 | Ashutosh Dutta | Flexible mobility framwork for heterogeneous roaming in next generation wireless networks |
US20080310323A1 (en) * | 2007-06-15 | 2008-12-18 | Qualcomm Incorporated | Method and Apparatus for DNS Update Triggered IPv6 Neighbor Advertisement |
US20090016362A1 (en) * | 2007-07-12 | 2009-01-15 | Intel Corporation | Fast path packet destination mechanism for network mobility via secure pki channel |
US20090016253A1 (en) * | 2007-07-10 | 2009-01-15 | Motorola, Inc. | Combining mobile vpn and internet protocol |
US20090247155A1 (en) * | 2002-02-04 | 2009-10-01 | Qualcomm Incorporated | Controlling hand-off in a mobile node with two mobile ip clients |
US7701937B2 (en) * | 2005-10-13 | 2010-04-20 | Motorola, Inc. | Method and apparatus for IP multicasting |
US7710956B2 (en) * | 2003-02-05 | 2010-05-04 | Ntt Docomo, Inc. | Mobile communication control system, network management server, mobile node, access node and anchor node |
US8068833B2 (en) * | 2002-04-26 | 2011-11-29 | Nokia Corporation | Candidate access router discovery |
-
2007
- 2007-07-12 US US11/776,926 patent/US7894420B2/en not_active Expired - Fee Related
-
2011
- 2011-02-22 US US13/032,033 patent/US20110141976A1/en not_active Abandoned
Patent Citations (36)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7174018B1 (en) * | 1999-06-24 | 2007-02-06 | Nortel Networks Limited | Security framework for an IP mobility system using variable-based security associations and broker redirection |
US7313631B1 (en) * | 1999-09-06 | 2007-12-25 | University Of Bristol | DNS updating in communication network |
US20010047407A1 (en) * | 2000-04-24 | 2001-11-29 | Moore Timothy M. | Systems and methods for determining the physical location of a computer's network interfaces |
US7143282B2 (en) * | 2000-05-23 | 2006-11-28 | Kabushiki Kaisha Toshiba | Communication control scheme using proxy device and security protocol in combination |
US6836765B1 (en) * | 2000-08-30 | 2004-12-28 | Lester Sussman | System and method for secure and address verifiable electronic commerce transactions |
US6954790B2 (en) * | 2000-12-05 | 2005-10-11 | Interactive People Unplugged Ab | Network-based mobile workgroup system |
US20040117653A1 (en) * | 2001-07-10 | 2004-06-17 | Packet Technologies Ltd. | Virtual private network mechanism incorporating security association processor |
US20030093691A1 (en) * | 2001-11-13 | 2003-05-15 | Reefedge, Inc., A Delaware Corporation | Enabling secure communication in a clustered or distributed architecture |
US20090247155A1 (en) * | 2002-02-04 | 2009-10-01 | Qualcomm Incorporated | Controlling hand-off in a mobile node with two mobile ip clients |
US7016682B2 (en) * | 2002-03-04 | 2006-03-21 | Air Broadband Communications, Inc. | Hybrid wireless access bridge and mobile access router system and method |
US20030196084A1 (en) * | 2002-04-12 | 2003-10-16 | Emeka Okereke | System and method for secure wireless communications using PKI |
US8068833B2 (en) * | 2002-04-26 | 2011-11-29 | Nokia Corporation | Candidate access router discovery |
US7203175B2 (en) * | 2002-08-15 | 2007-04-10 | Cisco Technology, Inc. | Arrangement for router attachments between roaming mobile routers in a mobile network |
US7710956B2 (en) * | 2003-02-05 | 2010-05-04 | Ntt Docomo, Inc. | Mobile communication control system, network management server, mobile node, access node and anchor node |
US7031328B2 (en) * | 2003-03-10 | 2006-04-18 | Cisco Technology, Inc. | Arrangement for traversing an IPv4 network by IPv6 mobile routers |
US7760701B2 (en) * | 2003-05-06 | 2010-07-20 | Cisco Technology, Inc. | Arrangement in a router for distributing a routing rule used to generate routes based on a pattern of a received packet |
US20040223491A1 (en) * | 2003-05-06 | 2004-11-11 | Levy-Abegnoli Eric M. | Arrangement in a router for distributing a routing rule used to generate routes based on a pattern of a received packet |
US20040228343A1 (en) * | 2003-05-16 | 2004-11-18 | Marco Molteni | Arrangement for retrieving routing information for establishing a bidirectional tunnel between a mobile router and a correspondent router |
US7333461B2 (en) * | 2003-06-05 | 2008-02-19 | Cisco Technology, Inc. | Arrangement in a router of a mobile network for generating a local router prefix for anonymous route connections |
US20070081512A1 (en) * | 2003-07-09 | 2007-04-12 | Yukiko Takeda | Terminal and communication system |
US20050055576A1 (en) * | 2003-09-04 | 2005-03-10 | Risto Mononen | Location privacy in a communication system |
US7039035B2 (en) * | 2003-11-10 | 2006-05-02 | Cisco Technology, Inc. | Arrangement in an access router for optimizing mobile router connections based on delegated network prefixes |
US20050099971A1 (en) * | 2003-11-10 | 2005-05-12 | Droms Ralph E. | Arrangement in an access router for optimizing mobile router connections based on delegated network prefixes |
US20050144439A1 (en) * | 2003-12-26 | 2005-06-30 | Nam Je Park | System and method of managing encryption key management system for mobile terminals |
US7046647B2 (en) * | 2004-01-22 | 2006-05-16 | Toshiba America Research, Inc. | Mobility architecture using pre-authentication, pre-configuration and/or virtual soft-handoff |
US20060159050A1 (en) * | 2005-01-20 | 2006-07-20 | Samsung Electronics Co., Ltd | System and method for handover in a wireless communication system |
US20070006296A1 (en) * | 2005-06-29 | 2007-01-04 | Nakhjiri Madjid F | System and method for establishing a shared key between network peers |
US20070082673A1 (en) * | 2005-10-12 | 2007-04-12 | Christope Janneteau | Autonomous mode for a plurality of nested mobile networks |
US7701937B2 (en) * | 2005-10-13 | 2010-04-20 | Motorola, Inc. | Method and apparatus for IP multicasting |
US20070230410A1 (en) * | 2006-03-29 | 2007-10-04 | Pascal Thubert | Route optimization for a mobile IP network node in a mobile ad hoc network |
US20080043664A1 (en) * | 2006-08-21 | 2008-02-21 | Kim Sung Hei | Method and system for reducing transmission route of packet in internet based nested mobile network |
US20080176560A1 (en) * | 2006-12-22 | 2008-07-24 | Ashutosh Dutta | Flexible mobility framwork for heterogeneous roaming in next generation wireless networks |
US20080310323A1 (en) * | 2007-06-15 | 2008-12-18 | Qualcomm Incorporated | Method and Apparatus for DNS Update Triggered IPv6 Neighbor Advertisement |
US20090016253A1 (en) * | 2007-07-10 | 2009-01-15 | Motorola, Inc. | Combining mobile vpn and internet protocol |
US20090016362A1 (en) * | 2007-07-12 | 2009-01-15 | Intel Corporation | Fast path packet destination mechanism for network mobility via secure pki channel |
US7894420B2 (en) * | 2007-07-12 | 2011-02-22 | Intel Corporation | Fast path packet destination mechanism for network mobility via secure PKI channel |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2013506388A (en) * | 2010-12-22 | 2013-02-21 | インテル コーポレイション | Efficient NEMO security with IBE |
US11665087B2 (en) | 2021-09-15 | 2023-05-30 | International Business Machines Corporation | Transparent service-aware multi-path networking with a feature of multiplexing |
Also Published As
Publication number | Publication date |
---|---|
US20090016362A1 (en) | 2009-01-15 |
US7894420B2 (en) | 2011-02-22 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Bernardos | Proxy mobile IPv6 extensions to support flow mobility | |
US8514864B2 (en) | System and method for providing network mobility | |
ES2394930T3 (en) | Private addressing procedure in mobile IP networks seized | |
Soliman et al. | Hierarchical mobile IPv6 (HMIPv6) mobility management | |
US7039035B2 (en) | Arrangement in an access router for optimizing mobile router connections based on delegated network prefixes | |
US8095130B2 (en) | Controlling hand-off in a mobile node with two mobile IP clients | |
KR100689500B1 (en) | System and method for route optimization using piggybacking in mobile network | |
US8040845B2 (en) | Efficient routing between a mobile node and a correspondent node in a proxy mobile IP network | |
US8594073B2 (en) | Method and apparatus for roaming between communications networks | |
KR20070093979A (en) | Communication route optimization method, corresponding apparatus and system | |
US20100097992A1 (en) | Network controlled overhead reduction of data packets by route optimization procedure | |
US20090129314A1 (en) | Route optimization with location privacy support | |
US20110141976A1 (en) | Fast path packet destination mechanism for network mobility via secure pki channel | |
FI114190B (en) | A method to support mobility in wireless networks | |
Leung et al. | Network mobility (NEMO) extensions for Mobile IPv4 | |
KR20050027340A (en) | Method for secure nested tunnels optimization using nested path information in mobile network | |
Chan et al. | Distributed mobility anchoring | |
EP2449800B1 (en) | Methods and systems for mobile ip route optimization | |
EP2071807A1 (en) | Advanced Mobile IP system employing distributed home agents | |
Cho et al. | A dynamic load sharing mechanism in multihomed mobile networks | |
Lim et al. | An efficient multihoming scheme to support seamless handover in SDN-based network mobility | |
Soliman et al. | Rfc 5380: Hierarchical mobile ipv6 (hmipv6) mobility management | |
Ki et al. | Modeling and simulation of partially distributed mobility management scheme | |
Al-Adhal et al. | Mobile IP: A Study Of Issus, Challenges, And Comparison Of Ipv4 & Ipv6 | |
Lam et al. | Cellular universal IP for nested network mobility |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |