WO2006046896A1 - Methods and nodes in a communication system for controlling the use of access resources - Google Patents

Methods and nodes in a communication system for controlling the use of access resources Download PDF

Info

Publication number
WO2006046896A1
WO2006046896A1 PCT/SE2004/001578 SE2004001578W WO2006046896A1 WO 2006046896 A1 WO2006046896 A1 WO 2006046896A1 SE 2004001578 W SE2004001578 W SE 2004001578W WO 2006046896 A1 WO2006046896 A1 WO 2006046896A1
Authority
WO
WIPO (PCT)
Prior art keywords
mobile router
data packet
home agent
packet
flow
Prior art date
Application number
PCT/SE2004/001578
Other languages
French (fr)
Inventor
Johan Rune
Tony Larsson
Mattias Pettersson
Original Assignee
Telefonaktiebolaget Lm Ericsson (Publ)
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Telefonaktiebolaget Lm Ericsson (Publ) filed Critical Telefonaktiebolaget Lm Ericsson (Publ)
Priority to US11/718,160 priority Critical patent/US20080186897A1/en
Priority to EP04793878A priority patent/EP1805961B1/en
Priority to PCT/SE2004/001578 priority patent/WO2006046896A1/en
Priority to CA002585155A priority patent/CA2585155A1/en
Publication of WO2006046896A1 publication Critical patent/WO2006046896A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/46Interconnection of networks
    • H04L12/4633Interconnection of networks using encapsulation techniques, e.g. tunneling
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/38Flow based routing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/40Network security protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W40/00Communication routing or communication path finding
    • H04W40/02Communication route or path selection, e.g. power-based or shortest path routing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
    • H04L69/14Multichannel or multilink protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W80/00Wireless network protocols or protocol adaptations to wireless operation
    • H04W80/04Network layer protocols, e.g. mobile IP [Internet Protocol]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W84/00Network topologies
    • H04W84/005Moving wireless networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W92/00Interfaces specially adapted for wireless communication networks
    • H04W92/04Interfaces between hierarchically different network devices
    • H04W92/14Interfaces between hierarchically different network devices between access point controllers and backbone network device

Definitions

  • the present invention relates to communication systems and methods, and more particularly it relates to communication systems and methods for controlling the use of access resources accessible by a mobile node or a r ⁇ obile network.
  • IP Internet Protocol
  • the mobile communication node could for example move such that it needs to change from communicating with a first access point belonging to a first Wireless Local Area Network (WLAN) to communicating with a second access point belonging to a second WLAN.
  • WLAN Wireless Local Area Network
  • Mobile IPv6 and Mobile IPv4 are prior art protocols enabling such mobility in IPv6 based and IPv4 based networks, respectively.
  • Mobile IPv6 is described e.g. in the document "Mobility Support in IPv6" by D. Johnson et al, RFC3775, published on the Internet by the Network Working Group in June 2004.
  • the process for achieving mobility in an IPv4 system is similar to the process for an IPv6 system.
  • the major differences between Mobile IPv4 and Mobile IPv6 is that in mobile IPv4 the messages Binding Update and Binding Acknowledge in Mobile IPv6 explained below are called Registration Request and Registration Reply, respectively.
  • Registration Request and Registration Reply there may be an additional node called Foreign Agent involved.
  • Figure 1 shows a Mobile IPv6 based system and below is explained how mobility is achieved for a mobile communication node in such a Mobile IPv6 based system.
  • the mobile com ⁇ runication node 105 which could be any communication device, for example a laptop or a mobile phone, has its original point of attachment to a home network 110, which home network has a Home Agent 111 and a Router 112.
  • the mobile communication node has a stable home address belonging to the address space of the home network.
  • Figure 1 also shows a first foreign network 120 having at least one Access Point 121 and an access router 122, and a second foreign network 13O comprising an access router 132 and a correspondent node 135 connected to the Access Router 132.
  • All networks are connected via an IP network 140, e.g. the Internet.
  • the mobile communication node 105 is in its home network: 110 and has established a connection, to the correspondent node 135 connected to the second foreign network 130.
  • the mobile communication node then moves from the home network to the first foreign network 120.
  • the mobile communication node will then, according to Mobile IPv6, send a Binding Update (BU) message (whichi corresponds to a Registration Request in Mobile IPv4) via the first foreign network to the Home Agent 111 of the home network 110 informing the Home Agent of the mobile node's new address, i.e. it's care-of address in the first foreign network.
  • BU Binding Update
  • the Home Agent 111 sends a Binding Acknowledge message (which corresponds to a Registration Reply in Mobile IPv4) to the mobile communication node and a tunnel is established between the mobile cor ⁇ unication node and the Home Agent, via the IP network 140.
  • the tunnel On the mobile communication node endpoint the tunnel has the mobile communication node's care-of address as its outer address and the mobile communication node's home address as the inner address.
  • the following traffic between the mobile communication node and the correspondent node 135 will then transit through the tunnel to the Home network and further to the correspondent node in the foreign network such that the previous connection between the mobile communication node and the correspondent node is preserved.
  • Packets in the other direction, originating from the correspondent node 135, are addressed to the ho ⁇ xe address of the mobile communication node 105, intercepted by the Home Agent 11 1 and forwarded through the tunnel to the mobile communication node 105.
  • the access router 122 in the first foreign network 120 may also act as a Foreign Agent through which all Mob>ile IPv4 communication between the mobile node 105 and its Home Agent 111 passes. In such case the tunnel is established between the Foreign Agent and the Home Agent instead of between the mobile communication node and the Home Agent. The Foreign Agent then forwards packets coming out of trie tunnel to the mobile node 105 and forwards packets from the mobile node 1O5 through the tunnel towards the Home Agent 111.
  • a route optimisation mechanism can be used to allow direct communication between thie mobile communication node 105 and the correspondent node 135.
  • a mobile communication node may be moving, but a whole network, for example a network within a transport vehicle (e.g. bus, train or airplane).
  • the moving network will have a router through which all communication nodes in the moving network can communicate.
  • the moving network will comprise communication nodes, which may be different users' communication devices, such as laptops, mobile phones, PDAs (Personal Digital Assistance) etc., which communication nodes communicate with the router "within the airplane, such that all communication destined to an external address will pass via the router.
  • a mobile network may also be e.g. a Personal Area Network (PAN), wherein a PAN comprises all communication devices belonging to a user and. situated within short range radio communication distance form each other, see for example co-pending patent application PCT/ SE2004/001027.
  • PAN Personal Area Network
  • the Network Mobility (NEMO) Basic Support Protocol is a protocol that enables a mobile network to attach, to different points in the Internet.
  • the protocol is an extension of Mobile IPv6 and allows session continuity for every communication node (or communication device) m the mobile network as the network moves. It allows a mobile router to maintain a stable network prefix for a moving network, even as the mobile router changes its, and thus the moving network's, point of attachment to a fixed network infrastructure.
  • This prefix stability is achieved through a solution similar to the mobile IPv6 solution ., by making a home agent (HA) a fixed point of attachment for the Mobile Router (MR) and maintaining connectivity between the HA and the MR through a tunnel.
  • the prefLx is allocated from the address range of the home network, and can thus remain the same even as the MR and its network: move.
  • the MR attaches to a network in a mew location, it acquires a new care-of address, but its home address and prefix are unchanged.
  • the MR has to register its new carre-of address in the HA in order to maintain the tunnel between the Mobile Router and. the Home Agent.
  • the communication nodes belonging to the network cluster that moves along with, the mobile router are called Mobile Network Nodes (MNNs).
  • MNNs Mobile Network Nodes
  • NEMO basic support they will not change their configuration as the MR changes its point of attachmeai:. In other words, the mobility is transparent to them. If, in the current NEMO solution, a bad tunnel is experienced, it will be replaced by a new tunnel by performing a new registration with the HA, this time with a different care-of address, unless the tunnel is re-established through the same interface and point of attachment, and possibly configured on a different interface, depending on the nature of the tunnel problems . If a communication node could get Internet access through multiple access media simultaneously, i.e.
  • NEMO basic support protocol does not allow this because it allows only a single care-of address to be registered in the Home Agent (HA) for a certain Mobile Router (MR) at any one time. Multiple simultaneous care-of addresses are not allowed and thus multiple simultaneous accesses and MR-HA tunnels are not possible for a MR.
  • a data flow comprises an uplink part and a downlink part, wherein the uplink part is in the direction from the mobile communication node to the home agent (and further to the correspondent node), and the downlink part is in the direction from the home agent to the mobile communication node.
  • a TCP (Transmission Control Protocol) connection is typically seen as a flow.
  • a node can have multiple flows towards different correspondent nodes and also multiple flows towards the same correspondent node.
  • a flow is typically defined by the source and destination IP addresses and port numbers, plus the transport protocol in use, such as TCP or UDP (User Datagram Protocol). It is also possible to instead define a flow by its flow label (in IPv6) or its SPI (Security Paraxneter Index) together with the source and destination IP addresses, and the protocol in case of the SPI.
  • the flow label is more specific ttxan the port numbers and should have precedence over them.
  • the SPI is used in IPsec (IP security as defined in RFC 2401 "Security Architecture for the Internet Protocol"), together with the destination IP address and the protocol to identify the security association, and the SPI-destination address-protocol triplet is typically used, as a (unidirectional) flow identifier when the packet is encrypted and the port numbers are visible only to the receiving end-node.
  • IPsec IP security as defined in RFC 2401 "Security Architecture for the Internet Protocol”
  • SPI-destination address-protocol triplet is typically used, as a (unidirectional) flow identifier when the packet is encrypted and the port numbers are visible only to the receiving end-node.
  • the object of the invention is to achieve a solution for managing the use of simultaneously accessible access resources connecting a mobile router and a. home agent in a home network by means of a tunnel in each access resource, such ttiat it is controlled which access resource a data packet travelling in any direction between the mobile router and the home agent is using.
  • the solution according to the present invention achieves the above mentioned object by having the mobile router controlling the use of the access resources both for data packets sent in the direction to the home agent and for data packets sent from, the home agent to the mobile router. For this reason, the mobile router classifies a. data packet based on information in the packet and selects an access resource for sending the packet based on the classification.
  • the mobile router also sends implicit or explicit information to the home agent regarding routing of data packets from the home agent to the mobile router, such that the home agent classifies these data packets and selects access resource for sending the data packets based on the information received from the mobile router.
  • a method in a mobile router for routing a data packet originating from a communication node to a home agent in a home network of the mobile router.
  • the mobile router has ability to access at least two different external accesses simultaneously, through which accesses one tunnel each is set up to the home agent in the home network.
  • the method comprises the steps of: classifying the data packet according to information in the data packet; selecting one of the at least two external accesses to be used for sending trie data packet based on the classification of the packet; sending the data packet from the mobile router to the home agent via the selected external access.
  • a method in a home a_gent in a home network of a mobile router for routing a first data packet originating from a correspondent communication node to the mobile router, wherein the mobile roxiter has ability to access at least two different external accesses simultaneously, through which one tunnel each is set up to the home agent.
  • the method comprises the steps of: receiving information from the mobile router regarding routing of the first data packet; storing the information received from the mobile router regarding routing of the first data packet; classifying the first data packet according to identification information of the first data packet and according to the stored information; selecting one of the at least two different tunnels for sending the first data, packet based on the classification, and. sending the first data packet to the mobile router (204) via the selected tunnel.
  • a mobile router in a mobile communication system, wherein the mobile router is adapted for sending a data packet originating from a. communication node in connection with the mo ⁇ bile router to a home agent in a home network of the mobile router.
  • the mobile router nas ability to access at least two different external accesses simultaneously, through wtrich accesses one tunnel eacti is set up to the home agent.
  • the mobile router comprises: means for classifying the data packet according to information in the data packet; means for selecting one of the at least two external accesses to be used for sending the data packet " based on the classification of the packet; means for sending the data packet to the home agent via the selected external access.
  • a home agent in a communication system, wherein the home agent belongs to a home network of a mobile router, and wherein the home agent is adapted for routing a first data packet originating from a correspondent communication node to the mobile router.
  • the mobile router has ability to access at least two different external accesses simultaneously, through which one tunnel each is set up to the home agent.
  • the home agent comprises: means for receiving information from the mobile router regarding routing of the first data packet; means for storing the information received from the mobile router regarding routing of the first data packet; means for classifying the first data packet according to identification information of the first data packet and according to the stored information; means for selecting one of the at least two different tunnels for sending the first data packet based on the classification, and means for sending the first data packet to the mobile router via. the selected tunnel.
  • the mobile router in addition to classifying the data packet according to information in the data packet, also classifies the data packet according to policies configured and stored in the mobile router.
  • Another advantage of the present invention is that it makes it possible to differentiate traffic belonging to different flows over different accesses. It will also be possible to differentiate traffic over different accesses depending on e.g. the type of mobile network node or the type of subscription that the mobile network node has.
  • Yet another advantage of the invention lies in that it allows the mobile router and the home agent to have multiple active tunnels to increase throughput, provide better redundancy and to be able to load-balance the traffic without downgrading e.g. transport layer characteristics.
  • a further advantage of the invention is that it allows the mobile router (or the single communication node) to make all decisions on over what access each particular flow is routed.
  • the home agent will follow the mobile router's (or the single communication node's) decisions.
  • the mobile router's decisions will be transparent to the mobile network nodes such that the mobile network nodes will not have to support multiple accesses that are available to the moving network, while still being able to use them.
  • Figure 1 shows a schematic block diagram of a communication system according to prior art.
  • Figure 2 illustrates a schematic block diagram of a communication system wherein the present invention can be used.
  • Figure 3 shows a schematic block diagram of a Mobile Router according to an embodiment of the invention.
  • Figure 4 shows a schematic block diagram of a Home Agent according to an embodiment of the invention.
  • Figure 5 shows a flow chart according to a method of the invention used in. a Mobile Router.
  • Figure 6 shows a flow chart according to a method of the invention used in. a Home Agent.
  • the invention deals with a routing function, which means selecting an access to be used for a packet and sending the packet via the selected access.
  • FIG. 2 shows a schematic block diagram of a communication system having a Vehicle Area Network (VA-N) 201 and multiple external network accesses for the VAN, wherein the system can be controlled according to the invention.
  • a VAN is an example of a moving network for which the present invention can be used.
  • the VLAN 201 is in this case situated on a train 200, which may be moving.
  • the VAN may be some sort of switched Ethernet that may have either Ethernet ports 202 or WLAN access points 203 or a combination of Ethernet ports and WLAN access points (as sl ⁇ own in the figure).
  • MNNs Mobile network nodes
  • 205, 206 may connect to an Ethernet port or to a WLAN access point.
  • Trie mobile network nodes may be any communication node such as laptops or mobile phones belonging to persons travelling on the train.
  • the VAN also has a Mobile Router (MR) 204, which acts as a default gateway for all MNNs inside the vehicle.
  • the mobile router 204 is responsible for mobility management for the entire VAN 201, i.e. mobility management is totally transparent to th. ⁇ MNNs 205, 206 entering the vehicle. This means that no new requirements are put on the MNNs when joining the VAN.
  • the external network accesses for the VAN comprise one or several different access technologies, in figure 2 exemplified by the radio access technologies General Packet Radio Service (GPRS) 211, Wideband Code Division Multiple Access (WCDMA) 213, and satellite radio communication 212.
  • GPRS General Packet Radio Service
  • WCDMA Wideband Code Division Multiple Access
  • FIG 2 also shows a Home Agent (HA) 216 in a home network 215, which is the home network for the MR. Communication from any of the MNNs and destined for e.g. a correspondent node in a foreign network (or communication in the opposite direction) is routed via. any of the access networks, an IP network 214 and via the home agent 216 in the home network 215.
  • HA Home Agent
  • the mobile router 204 will need to setup one tunnel to the home agent 216 for each available external access.
  • the example in figure 2 shows three tunnels between the mobile router 204 and the home agent 216, one for each of the three access technologies 211, 212, 213.
  • An end-user may have special requirements and may want to be able to control which external access to use.
  • the solution according to the invention suggests having the mobile router controlling the usage of the different external accesses such that these accesses are used in an efficient way to enable good communication possibilities for the mobile network nodes (MNNs) .
  • the Mobile Router (MR) according to the invention classifies the data packets sent from th.e MNNs and selects one of the available accesses for each uplink part of a flow.
  • the MR also instructs, implicitly or explicitly, the HA Ihow to classify packets and how to select access, regarding data going in the direction to the MNNs, i.e. regarding the downlink part of each flow.
  • the MR is a good point in the network to perform this type of flow management, because the MR is aware of and can monitor the available accesses and because most connections are initiated from the MNNs (i.e. at the connection end-point at the MR side of the external access link).
  • the MNNs themselves are generally not aware of the available accesses and they are certainly not aware of the current load of the accesses and the current mix of flows to and from the moving network. Even if the MNNs (or their users) may find it useful to select a certain access for a certain flow, no prior art means, i.e. protocols, to indicate such selections are available, except off-line means such as subscription profiles.
  • the Home Agent is also in a worse position than the MR to select tunnels or external accesses for different flows, because the HA is not aware of what access(es) the MR is using and because different routing policies may be applied in different moving networks (i.e. by different MRs).
  • the flow classification and the access selection are based on informa ⁇ ion in the data packet and on policies that are configured in the MR, e.g. including subscription profiles, access classifications, selection principles, load-sharing algorithms, etc.
  • a policy may either be statically configured by e.g. the operator, regarding for example how and if load sharing is to be used and which access selection principles that shall be used, or the policy may be dynamically configured, regarding for example the load sharing and access selection principles that are going to be used for ttie moment. Any user preferences may also be used in a policy.
  • the MR will try to create a care-of address on each interface that has connectivity to the fixed infrastructure, i.e. each external access, and, if successful, try to register each care-of address with the HA in order to establish a tuaanel, one tunnel per access.
  • a packet When a packet is sent from an MNN towards the Internet, it will reacli the MR, as the MR is the default router for the moving network.
  • the MR will inspect the packet in an attempt to classify what flow the packet belongs to, if it belongs to an already recorded flow, or to classify if it belongs to a previously unidentified flow. TThe classification is performed e.g. by looking at any flow identification (flow-ID) in the packet, and look-up if the flow-ID matches a flow-ID for an already recorded flow.
  • Any flow-ID parameter for classifying which, flow a packet belongs to may be used, such as the source and destination IP address plus at least one of e.g.:
  • TCP Transmission Control Protocol
  • SCTP Stream Control Transmission Protocol
  • SPI Security Parameter Index
  • protocol number While in this case will indicate a security protocol such as ESP (Encapsulating Security Payload) or AH
  • Any other parameter that can be used for classifying which flow a packet belongs to such as e.g. DiffServ code points, may also be used.
  • the MR selects the same access as for the previous packets of the same flow, such that the packet is sent over the same tunnel as the previous packets of the same flow.
  • the MR will select access based on policies in the MR and on information in the packet, information such as one or more of the following ) : - Source IP address;
  • Source port number (in a User Datagram Protocol (UDP), Transmission Control Protocol (TCP) or Stream Control Transmission Protocol (SCTP) header);
  • UDP User Datagram Protocol
  • TCP Transmission Control Protocol
  • SCTP Stream Control Transmission Protocol
  • Destination port number (in a UDP, TCP or SCTP header); - Protocol number;
  • the policies may include static rules, configured by e.g. the operator administrating the MR, consisting of e.g. selection principles, access classifications, load sharing algorithms etc. Trie policies may also include data of more dynamic nature, such as subscription profiles.
  • An example of a selection principle could e.g. be that a certain application, indicated by a certain port number, should be sent over the available access link that has the highest bandwidth.
  • a certain real ⁇ time application indicated by a certain port number, should be serrt over the available access link that lias the lowest latency.
  • An example of an access classification could be that a satellite access is classified as a high latency access.
  • Another example could be that an IEEE 802.11a access is classified as a high bandwidth access.
  • An example of a simple load sharing algorithm is to allocate flows to different accesses according to round robin principles. However, once an access has been selected for a certain flow, thq same access should preferably be kept for the entire lifetime of the flow.
  • Another example of a load sharing algorithm is to strive to maintain an equivalent relative saturation of the available bandwidth of the respective available accesses.
  • An example of information that could be included in a subscription profile could be that a concerned subscriber is allowed to use only low and medium bandwidth access like e.g. GPRS and WCDMA, whereas higher bandwidth access like IEEE 802.1 Ia may be used for the concerned subscriber only if no accesses with lower bandwidth are available.
  • the MR will create a state for each new flow and store the associated forwarding such that the same tunnel can be used for a following packet classified to belong to the same flow.
  • the HA When the HA receives a tunnelled packet from the MR, the HA will- according to a first embodiment of trie invention create a state for this flow, store a flo ⁇ V-ID and also store (a reference to) the tunnel over which this packet was received.
  • This flow state and tunnel reference ⁇ vill then according to the first embodiment of the invention be used for routing packets in the downlink direction for the same flow, as will now be described. I.e. the MR will implicitly instruct the HA how to route a packet belonging to the downlink part of the same flow.
  • a flow state will only be created, and a tunnel reference will only be stored, if the packet was the first packet in this flow or if the tunnel reference has changed, or any similar change influencing the tunnel selection for the downlink part of the same flow.
  • the HA When packets are routed downlink, i.e. from a correspondent node in an external network to a Mobile Network Node in the Mobile Network via the HA and the MR, the HA will attempt to classify packets to a certain flow when packets are received by the
  • the HA will forward the packet over the same tunnel as was recorded in the state of the flow. If the packet does not match, any of the stored flow states, i.e. the packet is classified as belonging to a previously unidentified flow, the HA will not take any decisions but simply forward the packet over a default tunnel towards the MR. The HA will not create any state for such a previously unidentified flow, but instead wait for the MR's decision, which for example will be indicated in the form of a packet belonging to the same flow, but to the uplink part of that flow. This packet may arrive through the same tunnel as the HA chose or another tunnel, i.e. the tunnel selection is entirely up to the MR, and the HA will follow this decision as previously described.
  • the downlink part of a data flow i.e. the direction from the HA to the MR
  • the MR instead of the HA using the same flow state and tunnel reference for the downlink part as for the uplink part of the same flow, the MR will send separate instructions to the HA how to route a certain flow in the downlink direction.
  • the MR will take all forwarding decisions for all flows, both uplink parts and downlink parts.
  • the HA will just follow the decisions of the MR and make sure the downlink traffic is forwarded via the same tunnel as the uplink traffic or via a tunnel as instructed by the MR in a separate message.
  • a tunnel has to be established over each external access that should be able to be used for routing messages between a mobile router and a home agent in a home network.
  • the mobile router For establishing such a tunnel for each different external access, the mobile router will have to configure a separate care-of address (CoA) for each external access that it wants to use.
  • CoA care-of address
  • at least three different care-of addresses will be established, at least one per access technology.
  • backup external accesses may be inactive until needed.
  • a policy function in the MR will monitor the status of each external access, e.g. the link status of each external access, the IP configuration status of each external access (whether it has a care-of address configured), and/ or the possibility to reach some point in the network, typically the HA.
  • Each external access that passes all status checks will be used for tunnel establishment. For each external access a tunnel is created with the associated CoA in the MR as one endpoint and the HA as the other endpoint. TIhe MR will register with the HA in one of the following ways:
  • MR sends a separate Binding Update (for Mobile IPv6) per external access/CoA that passes the status check.
  • MR sends an aggregated Binding Update (BU) for all external accesses/CoAs. Initially, it should wait a short while until a few CoAs are configured and can be sent as one BU; • MR sends a BU with all active CoAs in it as soon as something changes or the binding needs refreshment;
  • BU Binding Update
  • the MR uses a method similar to what is described in the prior art document "Multiple Care-of Addresses Registration", draft- wakikawa-mobileip-multiplecoa- 03.txt, also cited above, wherein Mobile IPv6 extensions or NEMO Basic support extensions are proposed which are designed to register ⁇ rultiple care-of addresses bound to a single home address. For doing so, a new identification number has to be carried in each binding for the receiver to distinguislh between the bindings corresponding to the same home address;
  • a mobile router according to an embodiment of the invention is described. Also, the routing decisions taken by a mobile router according to an embodiment of the invention, when routing a packet from a mobile node to a home agent -will be described.
  • the mobile router 204 which may be the mobile router described in figure 2, comprises ajn internal interface 301 for communicating with other nodes connected to the mobile network, e.g. the mobile network nodes, and a processor 302 for e.g. managing the communication within the mobile network and for managing the use of external accesses.
  • the mobile router in this example also comprises, for illustrative purposes compared to figure 2, three external interfaces 305, 306, 307, one for each external access technology that the mobile router can use for getting external access.
  • three external interfaces 305, 306, 307 three external interfaces 305, 306, 307, one for each external access technology that the mobile router can use for getting external access.
  • a first external interface 305 may be used for getting external access to the GPRS network 211, a second external interface 306 for getting external access to the satellite communication network 212 and a third external interface 307 for getting access to the WCDMA network 213.
  • the processor 302 has, among other things, one classification means 303 for identifying and classifying packets that are received from the mobile nodes and that are to be routed to the Home Agent 216 of the home network 215. It also has a selecting means 304 for selecting which external access that shcmld be used for each packet based on the identification and classification made in the classification means.
  • a packet is received on the internal interface 301 of the MR 204.
  • the packet is forwarded to the processor 302 wherein the processor will look up, in e.g. a memory 308, if the packet belongs to an already identified and recorded flow. If it does, the packet will be sent through the same tunnel as the previous packet in the same flow. If not, thte processor will take a routing policy decision in e.g. the classification means 303, preferably aided by policies stored e.g. in a policy database 309, which could be a separate database in the mobile router or which could be situated e.g. in the memory 308.
  • a packet belonging to a previously unidentified flow received in the MR in the downlink direction may also trigger the MR to select a tunnel (independently of what tunnel the downlink packet was received through) and store a state for the corresponding uplink part of the flow.
  • the processor 302 will take a routing policy decision for the flow and select an access based oxi available header fields such as source address, destination address, source port, destination port, protocol number or flow label (for IPv6 packets).
  • IPv6 packets For an encrypted packet a routing policy decision will be taken based on fields such as source address, destination address, Security Parameter Index (SPI) or flow label (for IPv6 packets).
  • SPI Security Parameter Index
  • a more unsophisticated decision procedure may be based on e.g.
  • the source address and the destination address or only the source address may be based on only the source and destination port numbers.
  • the decision forms the basis for selecting, e.g. in a selecting means 304, via which external interface 305, 306, 307 the packet will be routed and further in which outgoing tunnel the packet will be transported towards the Home Agent.
  • the processor 302 may also take into account any r-outing policy configured at the MR and stored in the policy database 309.
  • the routing policies may include e.g. subscription profiles, access classifications, selection principles, load-sharing algorithms, etc.
  • the processor also creates a state, which in this case is a flow identification and a routing decision for the flow-ID, for the same input parameters for the routing decision, which state is stored e.g. in the memory 308.
  • a state which in this case is a flow identification and a routing decision for the flow-ID, for the same input parameters for the routing decision, which state is stored e.g. in the memory 308.
  • the processor will check in the memory 308 and detect that this flow already exists, and as a result the packet will be routed over the same tunnel as the previous packets belorxging to the same flow.
  • tlxe MR should delete all flow- states pointing to the broken tunnel. Consequently, when the next packet of one of these flows arrives at the MR (i.e. a packet that would have matched one of the deleted flow-states), the MR finds no matching flow-state and selects a new tunnel for the flow according to the above-described principles.
  • An individual flow using TCP or SCTP as the transport protocol should not be load- shared over different tunnels, i.e. packets belonging to the same uplink part or downlink part of a flow should not be sent over different tunnels, as this may have negative consequences on the performance of the transport protocol Using different traffic paths for packets belonging to the same TCP flow in the same direction may also cause reordering of the packets, (e.g. TCP). As a result, the TCP sender would retransmit packets unnecessarily and also reduce its transmission rate such that the transmission performance would be lowered.
  • a Home agent (HA) 216 is shown.
  • the home agent comprises: an external interface 401 for sending and receiving packets; a processor 402 for inspecting the received packets in order to e.g. decide over which tunnel a packet should be sent, based on routing decisions of the mobile router 204; and a memory 403 for storing flow states for previous packets.
  • the MR will implicitly instruct the HA how to choose external access.
  • the home agent 216 receives via its external interface 401 an encapsulated (i.e. tunnelled) packet from the mobile router 204, the processor 402 in the home agent will inspect the packet.
  • the processor will create a state for the downlink part of the flow corresponding to the flow-state created by the mobile router for the uplink part of the flow, using the same principles as the mobile router, based on all of or a subset of source address, destination address, source port, destination port, protocol number and/or flow label for an unencrypted packet and based on all or a subset of source address, destination address, SPI and/or flow label for an encrypted packet.
  • Tine created state will be stored, in the memory 403. This flow state will be used for subsequent packets that belongs to the downlink part of the same flow, i.e. that will be sent from the HA to the MR for the same connection.
  • the created state points out the same tunnel to use for the subsequent packets belonging to the downlink part of the same flow as was used for the received packet belonging to the uplink part of the flow.
  • the Home Agent When the Home Agent intercepts traffic going in the direction towards the mobile router, it will inspect the packet in the same way, look up a. matching state in the memory 403 based on the parameters given above, and via the matching state identify the tunnel to use, which according to an embodiment of the invention will be the same tunnel as was used for the packets belonging to the uplink part of the same flow, and forward the packet to the MR via this tunnel.
  • the Home Agent will follow the MR's policy. (I.e. in a sense the MR will be the master and the HA the slave in terms of routing policy).
  • the HA If the HA cannot find a matching state for a packet directed to the mobile router, it will use a. default tunnel set for the MR.
  • the MR has preferably set one tunnel to default when it registered with its home agent. If the HA has no default tunnel for the MR, it will choose a tunnel arbitrarily.
  • the HA will not create a state for a floxv based on a packet received in the direction towards the mobile router. This means that a packet destined for a mobile network node in the moving network, for which packet the HA cannot find a matching state, will not trigger the HA to create a flow- state .
  • the HA creates its flow- states solely based on packets arriving from the mobile router. This ensures that the HA follows the routing decisions of the MR.
  • the MR does not have to take into account what tunnel a MNN-terminating packet belonging to a new flow arrived through, when making its tunnel selection decision.
  • the HA should delete all flow- states pointing to the broken tunnel, and subsequently arriving packets belonging to the affected flows will be treated as packets belonging to previously unidentified flows (as described above) .
  • the home agent will store the tunnel used for the uplink part of the flow, together with, a flow-ID, and, when a subsequent packet in the downlink part of the flow is detected, i.e. a packet that is to be sent from the HA to the MR, the HA will choose the same tunnel as is stored for the flow ID, i.e. the same tunnel as was used for the uplink packet.
  • the HA may use, at the discretion of the MR, a tunnel for the downlink part of a flow (i.e. from the HA to the MR) that is independent of the tunnel used in the uplink part of the same flow (i.e. from the MR to the HA).
  • the mobile router will send explicit routing instructions to the HA, instructions that are separate from any uplink packets for the same connection.
  • This embodiment will also cover the case where there is a unidirectional downlink flow, i.e. a downlink part of a flow without any corresponding uplink part for the same flow.
  • Selecting a tunnel is equivalent to selecting a caxe-of address, since there is a one-to- one mapping between tunnels and care-of addresses.
  • the MR can send explicit instructions to the HA in e.g. the two following ways:
  • the MR could send a Binding Update when it wants to send new or changed instructions to the HA, even if no Binding Update is needed from the NEMO Basic Support protocol perspective.
  • Tlie instructions can pertain to either:
  • a single care-of address (for example the care-of address that was used to convey the instructions);
  • the instructions can, according to one exemplary embodiment, include "selection records".
  • Each selection record comprises:
  • a number of selection parameters e.g. source and destination addresses, source and destination port numbers, protocol number and flow label. All or a subset of all possible selection parameters can be included. Those that are not included implicitly get the value "wildcard", which of course also could be indicated explicitly.
  • a wildcard value is a specially reserved value for a field in a message. During a matching procedure (see below) a wildcard value would match any value.
  • a care-of address indicating the tunnel to be used for a downlink part of a flow matching the selection parameters. If the care-of address is indicated implicitly by the source address of the instruction message, then the HA fills in the care-of address in the selection record, and, optionally, 3. A priority level.
  • Allowing the wildcard value for selection parameters means that a single flow can potentially match more than one selection records. This can also happen even without wildcard values, if the selection parameters that are applicable to a certain flow are identical in two different selection records.
  • the priority level is used in embodiments of the invention where identical selection records can occur, to resolve such an ambiguity. If a certain downlink part of a flow matches more than one selection record, the HA should use the selection record with the highest priority level.
  • the HA for instance has to choose between two matching selection records having the same priority level, it first checks the selection parameter with the highest importance, then the one with the second highest importance, etc. As soon as a wildcard value is found in one selection record (and the corresponding value for the same selection parameter in the other selection record is not wildcard), then the other selection record is chosen.
  • a selection parameter that is not applicable to the concerned flow is considered to have the wildcard value, irrespective of the value that is indicated for the parameter.
  • An example of a non- applicable selection parameter is a port number parameter when the flow does not use a transport protocol.
  • the HA can receive the instructions, resulting in selection records, in different ways, explicitly or implicitly, but the same selection process is used for all downlink flows and all selection records.
  • a mobile router receives a packet from a communication node, it classifies the data packet according to information in the data packet.
  • the classification procedure starts with a step of inspecting 501 information in the packet to detect whether the packet belongs to an already recorded flow. If the packet does not belong to a recorded flow 502 , e.g. if it is the first packet in the flow, a routing decision is taken 503 according to information in the data packet and preferably also according to policies residing in the mobile router. Thereafter the routing decision is recorded 504 by recording a flow state comprising the routing decision and a flow identification.
  • the routing decision is taken 505 according to the decision stored for ttie recorded flow.
  • an access is selected 506 to be used for sending the data packet based on the classification procedure.
  • trie packet is sent 507 via the selected access to the home agent.
  • the method used in a home agent for routing a packet from the home agent to a mobile router according to the invention is described in a flow chart.
  • the method starts with the home agent receiving 601 routing information from the mobile router regarding a first data packet to be sent from the HA to the MR.
  • the routing information may either be received in a second data packet belonging to the same flow as the first data packet, but sent in the opposite direction, or it may be received in a separate instruction message.
  • the received routing information is then stored 602 e.g. in a memory of the Home Agent together with a flow identification.
  • the Home agent receives the first data packet from e.g. a correspondent node, the first data packet is classified 603 according to identification information of the first data packet and according to the stored information.
  • the tunnel to be used for sending the first data packet is selected 604 based on the stored routing information for the matched identification.
  • the first data packet is sent 605 via the selected tunnel.
  • Corresponding means for performing ttie steps according to claims 1-8 may be implemented with computer program software in a Mobile Router. Also, the corresponding means for performing the steps according to claims 9-16 may be implemented with computer program software in a Home Agent.
  • the same mechanisms could be applied in an IPv4 environment. That is, the tunnel and flow management mechanisms of the invention can be used in the same way in an IPv4 as in an IPv6 environment.
  • the invention can easily be generalized to work for a single mobile communication node instead of a mobile router with a moving network.
  • the solution would be based on Mobile IPv6 (or Mobile IPv4) instead of the NEMO basic support protocol, but the principles would be the same.
  • the flow management mechanisms When applied to a single communication node, the flow management mechanisms would be applied to the flows originating and terminating in the node itself instead of flows pertaining to mobile network nodes in a moving network.
  • the router could be interpreted as residing internally in the single communication node.
  • the flow- management can be governed by configured policies, but it is also reasonable that the user of the communication node can affect the flow management manually, by editing the policies or selecting access for a particular flow, through a suitable interface.
  • this invention allows the mobile router in a moving network, or a single mobile communication node, to have multiple active tunnels to increase throughput, provide better redundancy and to be able to load-balance/ share the traffic, without downgrading e.g. transport layer characteristics such as TCP measurements or TCP performance by making arbitrary forwarding decisions over different paths per flow.
  • This invention also allows the moving network (or the single node) to differentiate traffic to and from each mobile network node in the moving network (or to and from the single communication node) over different accesses. It also allows the moving network (or the single communication node) to differentiate flows over different accesses. Flows of a particular type may be forwarded over a particular access, for instance.
  • the invention also allows the moving network (or the single communication node) to differentiate flows over different accesses based on the type of traffic, e.g. based on well-known port numbers associated with certain applications.
  • This invention further allows the mobile router (or the single node) to make all decisions on over what access each particular flow is routed.
  • the home agent will follow the mobile router's (or the single node's) decisions.
  • the mobile router's decisions will be transparent to the mobile network nodes such that the mobile network nodes will not have to support multiple accesses that are available to the moving network, while still being able to use them.

Abstract

The object of the invention is to achieve a solution for managing the use of simultaneously accessible access resources (211, 212, 213) connecting a mobile router (204) of a mobile network (201) and a home agent (216) in a home network (215) of the mobile router (204) by means of a tunnel in each access resource (211, 212, 213), such that it is controlled which access resource a data packet travelling in any direction between the mobile router (204) and the home agent (216) is using. This is achieved by having the mobile router (204) controlling the use of the access resources (211, 212, 213) both for packets sent in the direction to the home agent (216) and for packets sent from the home agent to the mobile router (204). For this reason, the mobile router classifies a data packet that is to be sent to the home agent based on information in the packet and selects an access resource for sending the packet based on the classification. The mobile router also sends implicit or explicit instructions to the home agent regarding how the packets should be routed from the home agent to the mobile router.

Description

METHODS AND NODES IN A COMMUNICATION SYSTEM FOR CONTROLLING THE
USE OF ACCESS RESOURCES
FIELD OF THE INVENTION
The present invention relates to communication systems and methods, and more particularly it relates to communication systems and methods for controlling the use of access resources accessible by a mobile node or a rαobile network.
BACKGROUND OF THE INVENTION
In communication systems based on packet data communication, for example based on the Internet Protocol (IP), there is a need for a mobile communication node to be able to communicate with a fixed network infrastructure even when the mobile commuLnication node moves such that it changes its point of attachment to the fixed network infrastructure: The mobile communication node could for example move such that it needs to change from communicating with a first access point belonging to a first Wireless Local Area Network (WLAN) to communicating with a second access point belonging to a second WLAN.
Mobile IPv6 and Mobile IPv4 are prior art protocols enabling such mobility in IPv6 based and IPv4 based networks, respectively. Mobile IPv6 is described e.g. in the document "Mobility Support in IPv6" by D. Johnson et al, RFC3775, published on the Internet by the Network Working Group in June 2004. The process for achieving mobility in an IPv4 system is similar to the process for an IPv6 system. The major differences between Mobile IPv4 and Mobile IPv6 is that in mobile IPv4 the messages Binding Update and Binding Acknowledge in Mobile IPv6 explained below are called Registration Request and Registration Reply, respectively. Also, in the Mobile IPv4 based system, there may be an additional node called Foreign Agent involved. Figure 1 shows a Mobile IPv6 based system and below is explained how mobility is achieved for a mobile communication node in such a Mobile IPv6 based system. The mobile comπrunication node 105, which could be any communication device, for example a laptop or a mobile phone, has its original point of attachment to a home network 110, which home network has a Home Agent 111 and a Router 112. Thus, the mobile communication node has a stable home address belonging to the address space of the home network. Figure 1 also shows a first foreign network 120 having at least one Access Point 121 and an access router 122, and a second foreign network 13O comprising an access router 132 and a correspondent node 135 connected to the Access Router 132. All networks are connected via an IP network 140, e.g. the Internet. In a scenario, the mobile communication node 105 is in its home network: 110 and has established a connection, to the correspondent node 135 connected to the second foreign network 130. The mobile communication node then moves from the home network to the first foreign network 120. The mobile communication node will then, according to Mobile IPv6, send a Binding Update (BU) message (whichi corresponds to a Registration Request in Mobile IPv4) via the first foreign network to the Home Agent 111 of the home network 110 informing the Home Agent of the mobile node's new address, i.e. it's care-of address in the first foreign network. Thereafter, the Home Agent 111 sends a Binding Acknowledge message (which corresponds to a Registration Reply in Mobile IPv4) to the mobile communication node and a tunnel is established between the mobile corππαunication node and the Home Agent, via the IP network 140. On the mobile communication node endpoint the tunnel has the mobile communication node's care-of address as its outer address and the mobile communication node's home address as the inner address. The following traffic between the mobile communication node and the correspondent node 135 will then transit through the tunnel to the Home network and further to the correspondent node in the foreign network such that the previous connection between the mobile communication node and the correspondent node is preserved. Packets in the other direction, originating from the correspondent node 135, are addressed to the hoπxe address of the mobile communication node 105, intercepted by the Home Agent 11 1 and forwarded through the tunnel to the mobile communication node 105. In case of Mobile IPv4 the access router 122 in the first foreign network 120 may also act as a Foreign Agent through which all Mob>ile IPv4 communication between the mobile node 105 and its Home Agent 111 passes. In such case the tunnel is established between the Foreign Agent and the Home Agent instead of between the mobile communication node and the Home Agent. The Foreign Agent then forwards packets coming out of trie tunnel to the mobile node 105 and forwards packets from the mobile node 1O5 through the tunnel towards the Home Agent 111. Furthermore, in Mobile IPv6 a route optimisation mechanism can be used to allow direct communication between thie mobile communication node 105 and the correspondent node 135.
In another scenario not just a mobile communication node may be moving, but a whole network, for example a network within a transport vehicle (e.g. bus, train or airplane). In this case, the moving network will have a router through which all communication nodes in the moving network can communicate. In the case o>f a moving network on e.g. an airplane, the moving network will comprise communication nodes, which may be different users' communication devices, such as laptops, mobile phones, PDAs (Personal Digital Assistance) etc., which communication nodes communicate with the router "within the airplane, such that all communication destined to an external address will pass via the router. A mobile network may also be e.g. a Personal Area Network (PAN), wherein a PAN comprises all communication devices belonging to a user and. situated within short range radio communication distance form each other, see for example co-pending patent application PCT/ SE2004/001027.
"The Network Mobility (NEMO) Basic Support Protocol", by Devarapalli et al, published June 2004 as an Internet Draft, which is a working document of the Internet Engineering Task Force, is a protocol that enables a mobile network to attach, to different points in the Internet. The protocol is an extension of Mobile IPv6 and allows session continuity for every communication node (or communication device) m the mobile network as the network moves. It allows a mobile router to maintain a stable network prefix for a moving network, even as the mobile router changes its, and thus the moving network's, point of attachment to a fixed network infrastructure. This prefix stability is achieved through a solution similar to the mobile IPv6 solution ., by making a home agent (HA) a fixed point of attachment for the Mobile Router (MR) and maintaining connectivity between the HA and the MR through a tunnel. The prefLx is allocated from the address range of the home network, and can thus remain the same even as the MR and its network: move. When the MR attaches to a network in a mew location, it acquires a new care-of address, but its home address and prefix are unchanged. However, just like in Mobile IPv6 the MR has to register its new carre-of address in the HA in order to maintain the tunnel between the Mobile Router and. the Home Agent.
The communication nodes belonging to the network cluster that moves along with, the mobile router are called Mobile Network Nodes (MNNs). In the NEMO basic support they will not change their configuration as the MR changes its point of attachmeai:. In other words, the mobility is transparent to them. If, in the current NEMO solution, a bad tunnel is experienced, it will be replaced by a new tunnel by performing a new registration with the HA, this time with a different care-of address, unless the tunnel is re-established through the same interface and point of attachment, and possibly configured on a different interface, depending on the nature of the tunnel problems . If a communication node could get Internet access through multiple access media simultaneously, i.e. could have multiple tunnels established simultaneously, a data, flow could be moved from a bad tunnel to a good tunnel much quicker than if only one tunnel at a time can be established. Also, for matters of cost, bandwidth, delay etc. it could be useful for a communication node to get Internet access through multiple simultaneous tunnels. However, the NEMO basic support protocol does not allow this because it allows only a single care-of address to be registered in the Home Agent (HA) for a certain Mobile Router (MR) at any one time. Multiple simultaneous care-of addresses are not allowed and thus multiple simultaneous accesses and MR-HA tunnels are not possible for a MR.
However, in the prior art document "Multiple Care-of Addresses Registration", draft- wakikawa-mobileip-multiplecoa-03.txt, by Wakikawa et al, an Internet Draft published 19 June 2004 as a working document of the IETF, a Mobile IPv6 and NEMO basic support protocol extension is proposed allowing multiple care-of addresses to a. single communication node or to a. mobile router, which would make it possible to use different tunnels simultaneously. This is accomplished by a new identification number- carried in each binding, i.e. for each different access interface that could be used by the mobile router.
When many different accesses are available simultaneously to a mobile network via. different tunnels as described above, it would be advantageous if the use of the resources of the different accesses could be managed such that the access resources are efficiently used for the mobile network. However, the extension to the NEMO basic support protocol does not describe any such possibility. Consequently, there exists εi need for a solution that can manage different access resources simultaneously accessible by a mobile network. In a similar fashion there exists a need for a solutiorα that can manage different access resources simultaneously accessible by a single mobile communication node, wrαerein a single mobile communication node being a communication node that is directly connecting to any of the different access resources, and not via a separate router as for a communication node belonging to s. mobile network. The term flow or data flow used in the application is a loose term for a connection between two end nodes. A flow between a first and a second end node may harve two directions: from the first node to the second node and vice versa. Thus, in the application, a data flow comprises an uplink part and a downlink part, wherein the uplink part is in the direction from the mobile communication node to the home agent (and further to the correspondent node), and the downlink part is in the direction from the home agent to the mobile communication node. A TCP (Transmission Control Protocol) connection is typically seen as a flow. A node can have multiple flows towards different correspondent nodes and also multiple flows towards the same correspondent node. A flow is typically defined by the source and destination IP addresses and port numbers, plus the transport protocol in use, such as TCP or UDP (User Datagram Protocol). It is also possible to instead define a flow by its flow label (in IPv6) or its SPI (Security Paraxneter Index) together with the source and destination IP addresses, and the protocol in case of the SPI. The flow label is more specific ttxan the port numbers and should have precedence over them. The SPI is used in IPsec (IP security as defined in RFC 2401 "Security Architecture for the Internet Protocol"), together with the destination IP address and the protocol to identify the security association, and the SPI-destination address-protocol triplet is typically used, as a (unidirectional) flow identifier when the packet is encrypted and the port numbers are visible only to the receiving end-node.
SUMMARY OF THE INVENTION
The object of the invention is to achieve a solution for managing the use of simultaneously accessible access resources connecting a mobile router and a. home agent in a home network by means of a tunnel in each access resource, such ttiat it is controlled which access resource a data packet travelling in any direction between the mobile router and the home agent is using.
The above stated object is achieved by means of a method in a mobile router according to claim 1, a method in a home agent according to claim 9, a mobile router according to claim 17 and a tiome agent according to claim 26.
The solution according to the present invention achieves the above mentioned object by having the mobile router controlling the use of the access resources both for data packets sent in the direction to the home agent and for data packets sent from, the home agent to the mobile router. For this reason, the mobile router classifies a. data packet based on information in the packet and selects an access resource for sending the packet based on the classification. The mobile router also sends implicit or explicit information to the home agent regarding routing of data packets from the home agent to the mobile router, such that the home agent classifies these data packets and selects access resource for sending the data packets based on the information received from the mobile router.
According to a first aspect of the invention, a method is provided in a mobile router for routing a data packet originating from a communication node to a home agent in a home network of the mobile router. The mobile router has ability to access at least two different external accesses simultaneously, through which accesses one tunnel each is set up to the home agent in the home network. The method comprises the steps of: classifying the data packet according to information in the data packet; selecting one of the at least two external accesses to be used for sending trie data packet based on the classification of the packet; sending the data packet from the mobile router to the home agent via the selected external access.
According to a second aspect of the invention, a method is provided in a home a_gent in a home network of a mobile router for routing a first data packet originating from a correspondent communication node to the mobile router, wherein the mobile roxiter has ability to access at least two different external accesses simultaneously, through which one tunnel each is set up to the home agent. The method comprises the steps of: receiving information from the mobile router regarding routing of the first data packet; storing the information received from the mobile router regarding routing of the first data packet; classifying the first data packet according to identification information of the first data packet and according to the stored information; selecting one of the at least two different tunnels for sending the first data, packet based on the classification, and. sending the first data packet to the mobile router (204) via the selected tunnel. According to a third aspect of the invention, a mobile router is provided in a mobile communication system, wherein the mobile router is adapted for sending a data packet originating from a. communication node in connection with the mo~bile router to a home agent in a home network of the mobile router. The mobile router nas ability to access at least two different external accesses simultaneously, through wtrich accesses one tunnel eacti is set up to the home agent. The mobile router comprises: means for classifying the data packet according to information in the data packet; means for selecting one of the at least two external accesses to be used for sending the data packet "based on the classification of the packet; means for sending the data packet to the home agent via the selected external access.
According to a fourth aspect of the invention, a home agent is provided in a communication system, wherein the home agent belongs to a home network of a mobile router, and wherein the home agent is adapted for routing a first data packet originating from a correspondent communication node to the mobile router. The mobile router has ability to access at least two different external accesses simultaneously, through which one tunnel each is set up to the home agent. The home agent comprises: means for receiving information from the mobile router regarding routing of the first data packet; means for storing the information received from the mobile router regarding routing of the first data packet; means for classifying the first data packet according to identification information of the first data packet and according to the stored information; means for selecting one of the at least two different tunnels for sending the first data packet based on the classification, and means for sending the first data packet to the mobile router via. the selected tunnel.
According to a preferred embodiment of the invention, the mobile router, in addition to classifying the data packet according to information in the data packet, also classifies the data packet according to policies configured and stored in the mobile router. An advantage of the invention is that with multiple simultaneously accessible tunnels, a flow could be moved from a bad to a good tunnel much quicker thatx if only one tunnel is accessible at a time.
Another advantage of the present invention is that it makes it possible to differentiate traffic belonging to different flows over different accesses. It will also be possible to differentiate traffic over different accesses depending on e.g. the type of mobile network node or the type of subscription that the mobile network node has.
Yet another advantage of the invention lies in that it allows the mobile router and the home agent to have multiple active tunnels to increase throughput, provide better redundancy and to be able to load-balance the traffic without downgrading e.g. transport layer characteristics.
A further advantage of the invention is that it allows the mobile router (or the single communication node) to make all decisions on over what access each particular flow is routed. The home agent will follow the mobile router's (or the single communication node's) decisions. The mobile router's decisions will be transparent to the mobile network nodes such that the mobile network nodes will not have to support multiple accesses that are available to the moving network, while still being able to use them. Further advantages of embodiments of the present invention will become apparent when reading the following detailed description in conjunction with the drawings.
BRIEF DESCRIPTION OF THE DRAWINGS
Figure 1 shows a schematic block diagram of a communication system according to prior art.
Figure 2 illustrates a schematic block diagram of a communication system wherein the present invention can be used.
Figure 3 shows a schematic block diagram of a Mobile Router according to an embodiment of the invention.
Figure 4 shows a schematic block diagram of a Home Agent according to an embodiment of the invention. Figure 5 shows a flow chart according to a method of the invention used in. a Mobile Router.
Figure 6 shows a flow chart according to a method of the invention used in. a Home Agent.
DETAILED DESCRIPTION
The present invention will be described more fully hereinafter with reference to the accompanying drawings, in which preferred embodiments of the invention are shown. This invention may, however, be embodied in many different forms and should not be construed as limited to trie embodiments set forth herein; rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the invention to those skilled in the art. In the drawings, like numbers refer to like elements.
The invention deals with a routing function, which means selecting an access to be used for a packet and sending the packet via the selected access.
Figure 2 shows a schematic block diagram of a communication system having a Vehicle Area Network (VA-N) 201 and multiple external network accesses for the VAN, wherein the system can be controlled according to the invention. A VAN is an example of a moving network for which the present invention can be used. The VLAN 201 is in this case situated on a train 200, which may be moving. The VAN may be some sort of switched Ethernet that may have either Ethernet ports 202 or WLAN access points 203 or a combination of Ethernet ports and WLAN access points (as slαown in the figure). Mobile network nodes (MNNs) 205, 206 may connect to an Ethernet port or to a WLAN access point. Trie mobile network nodes may be any communication node such as laptops or mobile phones belonging to persons travelling on the train. The VAN also has a Mobile Router (MR) 204, which acts as a default gateway for all MNNs inside the vehicle. The mobile router 204 is responsible for mobility management for the entire VAN 201, i.e. mobility management is totally transparent to th.<ε MNNs 205, 206 entering the vehicle. This means that no new requirements are put on the MNNs when joining the VAN. The external network accesses for the VAN comprise one or several different access technologies, in figure 2 exemplified by the radio access technologies General Packet Radio Service (GPRS) 211, Wideband Code Division Multiple Access (WCDMA) 213, and satellite radio communication 212. Each of these access technologies is available via geographically distributed access points belonging to each access technology, as is well known in the art. One or several of these access technologies can be available at the same time depending on for instance coverage and operator policies. Each access technology may as well have several different accesses. Figure 2 also shows a Home Agent (HA) 216 in a home network 215, which is the home network for the MR. Communication from any of the MNNs and destined for e.g. a correspondent node in a foreign network (or communication in the opposite direction) is routed via. any of the access networks, an IP network 214 and via the home agent 216 in the home network 215. For the communication to "be able to use any of the available external accesses, the mobile router 204 will need to setup one tunnel to the home agent 216 for each available external access. The example in figure 2 shows three tunnels between the mobile router 204 and the home agent 216, one for each of the three access technologies 211, 212, 213.
There are several reasons motivating why support for simultaneous usage of several accesses would be beneficial in this scenario:
It would be possible to handle the dynamic nature of the external access links, i.e. links will go up and down depending on access technology and coverage. This means that the mobile router in the vehicle must be able to move traffic between the different accesses when for instance one link goes down. An important case related to this is when the new access must be activated before the traffic can be moved to that particular access, e.g. the satellite access can be a back-up access to the other accesses and is in that case only activated when all other accesses are -unavailable;
Simultaneous use of multiple external accesses means more bandwidth to the users in the vehicle. It must therefore be possible to make use of these accesses at the same time, but also to do load-sharing using different load-sharing algorithms;
An end-user may have special requirements and may want to be able to control which external access to use.
Therefore, the solution according to the invention suggests having the mobile router controlling the usage of the different external accesses such that these accesses are used in an efficient way to enable good communication possibilities for the mobile network nodes (MNNs) . To achieve this, the Mobile Router (MR) according to the invention classifies the data packets sent from th.e MNNs and selects one of the available accesses for each uplink part of a flow. The MR also instructs, implicitly or explicitly, the HA Ihow to classify packets and how to select access, regarding data going in the direction to the MNNs, i.e. regarding the downlink part of each flow.
The MR is a good point in the network to perform this type of flow management, because the MR is aware of and can monitor the available accesses and because most connections are initiated from the MNNs (i.e. at the connection end-point at the MR side of the external access link). In contrast, the MNNs themselves are generally not aware of the available accesses and they are certainly not aware of the current load of the accesses and the current mix of flows to and from the moving network. Even if the MNNs (or their users) may find it useful to select a certain access for a certain flow, no prior art means, i.e. protocols, to indicate such selections are available, except off-line means such as subscription profiles. Likewise, the Home Agent (HA) is also in a worse position than the MR to select tunnels or external accesses for different flows, because the HA is not aware of what access(es) the MR is using and because different routing policies may be applied in different moving networks (i.e. by different MRs).
The flow classification and the access selection are based on informa±ion in the data packet and on policies that are configured in the MR, e.g. including subscription profiles, access classifications, selection principles, load-sharing algorithms, etc. A policy may either be statically configured by e.g. the operator, regarding for example how and if load sharing is to be used and which access selection principles that shall be used, or the policy may be dynamically configured, regarding for example the load sharing and access selection principles that are going to be used for ttie moment. Any user preferences may also be used in a policy.
Before data can be sent, a tunnel has to be created for each external access. For this reason, the MR will try to create a care-of address on each interface that has connectivity to the fixed infrastructure, i.e. each external access, and, if successful, try to register each care-of address with the HA in order to establish a tuaanel, one tunnel per access.
When a packet is sent from an MNN towards the Internet, it will reacli the MR, as the MR is the default router for the moving network. The MR will inspect the packet in an attempt to classify what flow the packet belongs to, if it belongs to an already recorded flow, or to classify if it belongs to a previously unidentified flow. TThe classification is performed e.g. by looking at any flow identification (flow-ID) in the packet, and look-up if the flow-ID matches a flow-ID for an already recorded flow. Any flow-ID parameter for classifying which, flow a packet belongs to may be used, such as the source and destination IP address plus at least one of e.g.:
Source and destination port number (in a User Datagrajn Protocol (UDP),
Transmission Control Protocol (TCP) or Stream Control Transmission Protocol (SCTP) header) plus protocol number, - Flow label, or
Security Parameter Index (SPI) and protocol number (whicli in this case will indicate a security protocol such as ESP (Encapsulating Security Payload) or AH
(Authentication Header)).
Any other parameter that can be used for classifying which flow a packet belongs to, such as e.g. DiffServ code points, may also be used.
If the packet belongs to an existing flow, i.e. the packet matches a flow that has earlier been identified by the MR and the MR has a state, i.e. stored information, for the flow, the MR selects the same access as for the previous packets of the same flow, such that the packet is sent over the same tunnel as the previous packets of the same flow.
If the packet belongs to a previously unidentified flow, the MR will select access based on policies in the MR and on information in the packet, information such as one or more of the following ) : - Source IP address;
Destination IP address;
Source port number (in a User Datagram Protocol (UDP), Transmission Control Protocol (TCP) or Stream Control Transmission Protocol (SCTP) header);
Destination port number (in a UDP, TCP or SCTP header); - Protocol number;
Flow label;
SPI.
The policies may include static rules, configured by e.g. the operator administrating the MR, consisting of e.g. selection principles, access classifications, load sharing algorithms etc. Trie policies may also include data of more dynamic nature, such as subscription profiles. An example of a selection principle could e.g. be that a certain application, indicated by a certain port number, should be sent over the available access link that has the highest bandwidth. Another example is that a certain real¬ time application, indicated by a certain port number, should be serrt over the available access link that lias the lowest latency. An example of an access classification could be that a satellite access is classified as a high latency access. Another example could be that an IEEE 802.11a access is classified as a high bandwidth access. An example of a simple load sharing algorithm is to allocate flows to different accesses according to round robin principles. However, once an access has been selected for a certain flow, thq same access should preferably be kept for the entire lifetime of the flow. Another example of a load sharing algorithm is to strive to maintain an equivalent relative saturation of the available bandwidth of the respective available accesses. An example of information that could be included in a subscription profile could be that a concerned subscriber is allowed to use only low and medium bandwidth access like e.g. GPRS and WCDMA, whereas higher bandwidth access like IEEE 802.1 Ia may be used for the concerned subscriber only if no accesses with lower bandwidth are available.
The MR will create a state for each new flow and store the associated forwarding such that the same tunnel can be used for a following packet classified to belong to the same flow.
When the HA receives a tunnelled packet from the MR, the HA will- according to a first embodiment of trie invention create a state for this flow, store a floΛV-ID and also store (a reference to) the tunnel over which this packet was received. This flow state and tunnel reference Λvill then according to the first embodiment of the invention be used for routing packets in the downlink direction for the same flow, as will now be described. I.e. the MR will implicitly instruct the HA how to route a packet belonging to the downlink part of the same flow. Of course, a flow state will only be created, and a tunnel reference will only be stored, if the packet was the first packet in this flow or if the tunnel reference has changed, or any similar change influencing the tunnel selection for the downlink part of the same flow.
When packets are routed downlink, i.e. from a correspondent node in an external network to a Mobile Network Node in the Mobile Network via the HA and the MR, the HA will attempt to classify packets to a certain flow when packets are received by the
HA. If a packet is found to belong to a previously known flow, the HA will forward the packet over the same tunnel as was recorded in the state of the flow. If the packet does not match, any of the stored flow states, i.e. the packet is classified as belonging to a previously unidentified flow, the HA will not take any decisions but simply forward the packet over a default tunnel towards the MR. The HA will not create any state for such a previously unidentified flow, but instead wait for the MR's decision, which for example will be indicated in the form of a packet belonging to the same flow, but to the uplink part of that flow. This packet may arrive through the same tunnel as the HA chose or another tunnel, i.e. the tunnel selection is entirely up to the MR, and the HA will follow this decision as previously described.
According to a second embodiment of the invention, the downlink part of a data flow, i.e. the direction from the HA to the MR, may use a different tunnel than the uplink part of the same flow, i.e. the direction from the MR to the HA. In this case, instead of the HA using the same flow state and tunnel reference for the downlink part as for the uplink part of the same flow, the MR will send separate instructions to the HA how to route a certain flow in the downlink direction.
Thereby, the MR will take all forwarding decisions for all flows, both uplink parts and downlink parts. The HA will just follow the decisions of the MR and make sure the downlink traffic is forwarded via the same tunnel as the uplink traffic or via a tunnel as instructed by the MR in a separate message.
Tunnel establishment
Before packets can be routed according to the invention, a tunnel has to be established over each external access that should be able to be used for routing messages between a mobile router and a home agent in a home network.
For establishing such a tunnel for each different external access, the mobile router will have to configure a separate care-of address (CoA) for each external access that it wants to use. In figure 2, at least three different care-of addresses will be established, at least one per access technology. Although, backup external accesses may be inactive until needed.
A policy function in the MR will monitor the status of each external access, e.g. the link status of each external access, the IP configuration status of each external access (whether it has a care-of address configured), and/ or the possibility to reach some point in the network, typically the HA.
Each external access that passes all status checks will be used for tunnel establishment. For each external access a tunnel is created with the associated CoA in the MR as one endpoint and the HA as the other endpoint. TIhe MR will register with the HA in one of the following ways:
• MR sends a separate Binding Update (for Mobile IPv6) per external access/CoA that passes the status check. The Binding Update concerning interface i comprises SA=CoAi and HoAOpt=HoA, which means Source Address = care-of address for interface i, and Home Address Option = Home Address;
• MR sends an aggregated Binding Update (BU) for all external accesses/CoAs. Initially, it should wait a short while until a few CoAs are configured and can be sent as one BU; • MR sends a BU with all active CoAs in it as soon as something changes or the binding needs refreshment;
• The MR "uses a method similar to what is described in the prior art document "Multiple Care-of Addresses Registration", draft- wakikawa-mobileip-multiplecoa- 03.txt, also cited above, wherein Mobile IPv6 extensions or NEMO Basic support extensions are proposed which are designed to register πrultiple care-of addresses bound to a single home address. For doing so, a new identification number has to be carried in each binding for the receiver to distinguislh between the bindings corresponding to the same home address;
Routing decisions and tunnel selection
With reference to figure 3, a mobile router according to an embodiment of the invention is described. Also, the routing decisions taken by a mobile router according to an embodiment of the invention, when routing a packet from a mobile node to a home agent -will be described.
The mobile router 204, which may be the mobile router described in figure 2, comprises ajn internal interface 301 for communicating with other nodes connected to the mobile network, e.g. the mobile network nodes, and a processor 302 for e.g. managing the communication within the mobile network and for managing the use of external accesses. The mobile router in this example also comprises, for illustrative purposes compared to figure 2, three external interfaces 305, 306, 307, one for each external access technology that the mobile router can use for getting external access. Of course, it is possible that only one external interface could be used for several accesses of the same technology, or any other possible combination of external interface and external access could be used. If compared to figure 2, a first external interface 305 may be used for getting external access to the GPRS network 211, a second external interface 306 for getting external access to the satellite communication network 212 and a third external interface 307 for getting access to the WCDMA network 213. The processor 302 has, among other things, one classification means 303 for identifying and classifying packets that are received from the mobile nodes and that are to be routed to the Home Agent 216 of the home network 215. It also has a selecting means 304 for selecting which external access that shcmld be used for each packet based on the identification and classification made in the classification means.
A packet is received on the internal interface 301 of the MR 204. The packet is forwarded to the processor 302 wherein the processor will look up, in e.g. a memory 308, if the packet belongs to an already identified and recorded flow. If it does, the packet will be sent through the same tunnel as the previous packet in the same flow. If not, thte processor will take a routing policy decision in e.g. the classification means 303, preferably aided by policies stored e.g. in a policy database 309, which could be a separate database in the mobile router or which could be situated e.g. in the memory 308. Optionally, a packet belonging to a previously unidentified flow received in the MR in the downlink direction may also trigger the MR to select a tunnel (independently of what tunnel the downlink packet was received through) and store a state for the corresponding uplink part of the flow. For an unencrypted packet, the processor 302 will take a routing policy decision for the flow and select an access based oxi available header fields such as source address, destination address, source port, destination port, protocol number or flow label (for IPv6 packets). For an encrypted packet a routing policy decision will be taken based on fields such as source address, destination address, Security Parameter Index (SPI) or flow label (for IPv6 packets). A more unsophisticated decision procedure may be based on e.g. the source address and the destination address or only the source address. Alternatively the decision procedure may be based on only the source and destination port numbers. The decision forms the basis for selecting, e.g. in a selecting means 304, via which external interface 305, 306, 307 the packet will be routed and further in which outgoing tunnel the packet will be transported towards the Home Agent.
When taking the routing policy decision and selecting what tunnel to use for a certain flow, the processor 302 may also take into account any r-outing policy configured at the MR and stored in the policy database 309. The routing policies may include e.g. subscription profiles, access classifications, selection principles, load-sharing algorithms, etc. By taking into account the current load on the respective accesses/tunnels, e.g. in a load-sharing algorithm or when identifying the access with the currently greatest unused bandwidth, the MR is able to utilize the different accesses as efficiently as possible.
The processor also creates a state, which in this case is a flow identification and a routing decision for the flow-ID, for the same input parameters for the routing decision, which state is stored e.g. in the memory 308. A_s mentioned above, when a subsequent packet belonging to the same flow, i.e. a packiet matching the parameters of the created state, is received by the mobile router, the processor will check in the memory 308 and detect that this flow already exists, and as a result the packet will be routed over the same tunnel as the previous packets belorxging to the same flow.
If a tunnel breaks, e.g. because of loss of radio contact, tlxe MR should delete all flow- states pointing to the broken tunnel. Consequently, when the next packet of one of these flows arrives at the MR (i.e. a packet that would have matched one of the deleted flow-states), the MR finds no matching flow-state and selects a new tunnel for the flow according to the above-described principles.
An individual flow using TCP or SCTP as the transport protocol should not be load- shared over different tunnels, i.e. packets belonging to the same uplink part or downlink part of a flow should not be sent over different tunnels, as this may have negative consequences on the performance of the transport protocol Using different traffic paths for packets belonging to the same TCP flow in the same direction may also cause reordering of the packets, (e.g. TCP). As a result, the TCP sender would retransmit packets unnecessarily and also reduce its transmission rate such that the transmission performance would be lowered. With reference to figure 4, a Home agent (HA) 216 according to the invention is shown. The home agent comprises: an external interface 401 for sending and receiving packets; a processor 402 for inspecting the received packets in order to e.g. decide over which tunnel a packet should be sent, based on routing decisions of the mobile router 204; and a memory 403 for storing flow states for previous packets.
According to an embodiment of the invention, the MR will implicitly instruct the HA how to choose external access. In this embodiment, when the home agent 216 receives via its external interface 401 an encapsulated (i.e. tunnelled) packet from the mobile router 204, the processor 402 in the home agent will inspect the packet. If the packet belongs to a flow that has previously not been identified by the home agent, the processor will create a state for the downlink part of the flow corresponding to the flow-state created by the mobile router for the uplink part of the flow, using the same principles as the mobile router, based on all of or a subset of source address, destination address, source port, destination port, protocol number and/or flow label for an unencrypted packet and based on all or a subset of source address, destination address, SPI and/or flow label for an encrypted packet. Tine created state will be stored, in the memory 403. This flow state will be used for subsequent packets that belongs to the downlink part of the same flow, i.e. that will be sent from the HA to the MR for the same connection. According to an embodiment of the invention, the created state points out the same tunnel to use for the subsequent packets belonging to the downlink part of the same flow as was used for the received packet belonging to the uplink part of the flow.
When the Home Agent intercepts traffic going in the direction towards the mobile router, it will inspect the packet in the same way, look up a. matching state in the memory 403 based on the parameters given above, and via the matching state identify the tunnel to use, which according to an embodiment of the invention will be the same tunnel as was used for the packets belonging to the uplink part of the same flow, and forward the packet to the MR via this tunnel. Through this method the Home Agent will follow the MR's policy. (I.e. in a sense the MR will be the master and the HA the slave in terms of routing policy).
If the HA cannot find a matching state for a packet directed to the mobile router, it will use a. default tunnel set for the MR. The MR has preferably set one tunnel to default when it registered with its home agent. If the HA has no default tunnel for the MR, it will choose a tunnel arbitrarily.
Note that the HA will not create a state for a floxv based on a packet received in the direction towards the mobile router. This means that a packet destined for a mobile network node in the moving network, for which packet the HA cannot find a matching state, will not trigger the HA to create a flow- state . The HA creates its flow- states solely based on packets arriving from the mobile router. This ensures that the HA follows the routing decisions of the MR. Moreover, the MR does not have to take into account what tunnel a MNN-terminating packet belonging to a new flow arrived through, when making its tunnel selection decision.
If a tunnel breaks, the HA should delete all flow- states pointing to the broken tunnel, and subsequently arriving packets belonging to the affected flows will be treated as packets belonging to previously unidentified flows (as described above) .
In an advantageous embodiment of the invention, the home agent will store the tunnel used for the uplink part of the flow, together with, a flow-ID, and, when a subsequent packet in the downlink part of the flow is detected, i.e. a packet that is to be sent from the HA to the MR, the HA will choose the same tunnel as is stored for the flow ID, i.e. the same tunnel as was used for the uplink packet.
According to another embodiment of the invention, the HA may use, at the discretion of the MR, a tunnel for the downlink part of a flow (i.e. from the HA to the MR) that is independent of the tunnel used in the uplink part of the same flow (i.e. from the MR to the HA). In this case, the mobile router will send explicit routing instructions to the HA, instructions that are separate from any uplink packets for the same connection. This embodiment will also cover the case where there is a unidirectional downlink flow, i.e. a downlink part of a flow without any corresponding uplink part for the same flow.
Selecting a tunnel is equivalent to selecting a caxe-of address, since there is a one-to- one mapping between tunnels and care-of addresses.
The MR can send explicit instructions to the HA in e.g. the two following ways:
Included in the Binding Update message when a care-of address is registered. In a new type of message any time.
If Binding Updates are used, the MR could send a Binding Update when it wants to send new or changed instructions to the HA, even if no Binding Update is needed from the NEMO Basic Support protocol perspective.
Tlie instructions can pertain to either:
A single care-of address (for example the care-of address that was used to convey the instructions);
Multiple care-of addresses (which then have to be explicitly indicated in the instruction message).
The instructions can, according to one exemplary embodiment, include "selection records". Each selection record comprises:
1 . A number of selection parameters (e.g. source and destination addresses, source and destination port numbers, protocol number and flow label). All or a subset of all possible selection parameters can be included. Those that are not included implicitly get the value "wildcard", which of course also could be indicated explicitly. A wildcard value is a specially reserved value for a field in a message. During a matching procedure (see below) a wildcard value would match any value. 2. A care-of address indicating the tunnel to be used for a downlink part of a flow matching the selection parameters. If the care-of address is indicated implicitly by the source address of the instruction message, then the HA fills in the care-of address in the selection record, and, optionally, 3. A priority level.
Allowing the wildcard value for selection parameters means that a single flow can potentially match more than one selection records. This can also happen even without wildcard values, if the selection parameters that are applicable to a certain flow are identical in two different selection records. The priority level is used in embodiments of the invention where identical selection records can occur, to resolve such an ambiguity. If a certain downlink part of a flow matches more than one selection record, the HA should use the selection record with the highest priority level.
If more than one matching selection record has tfcie same (highest) priority level, then, according to an embodiment of the invention, trie choice of which of these selection records to use is arbitrary. In an alternative embodiment of the invention, a (fixed) importance order between the selection parameters can be defined to use in this situation. If the HA for instance has to choose between two matching selection records having the same priority level, it first checks the selection parameter with the highest importance, then the one with the second highest importance, etc. As soon as a wildcard value is found in one selection record (and the corresponding value for the same selection parameter in the other selection record is not wildcard), then the other selection record is chosen. In this process, a selection parameter that is not applicable to the concerned flow is considered to have the wildcard value, irrespective of the value that is indicated for the parameter. An example of a non- applicable selection parameter is a port number parameter when the flow does not use a transport protocol.
Since this method for choosing tunnel for the downlink part of a flow independent of the tunnel used for the corresponding uplink part of the same flow can co-exist with the method described earlier wherein the tunnel selection made for the uplink part of the flow is implicitly defining the tunnel to use for the downlink part of the same flow, the care-of address/tunnel selection process for the downlink part of a flow must also be able to handle interaction with /interference from this earlier described selection mechanism.
To make the interaction between the explicit instruction selection mechanism and the implicit selection mechanism work smoothly tixe state information records created by the implicit selection mechanism are given a (fLxed) priority level. This priority level is not signalled but is always the same for all implicitly triggered state records. This priority level is placed in the middle of the priority level range. This way the implicitly triggered state records are smoothly incorporated in the selection mechanism, as they will become equivalent to the explicitly triggered selection records.
Thus, from the HA 's point of view, it can receive the instructions, resulting in selection records, in different ways, explicitly or implicitly, but the same selection process is used for all downlink flows and all selection records.
In figure 5, the method used in the mobile router for routing a packet from the mobile router to a home agent according to the invention is described in a flow chart. When a mobile router receives a packet from a communication node, it classifies the data packet according to information in the data packet. The classification procedure starts with a step of inspecting 501 information in the packet to detect whether the packet belongs to an already recorded flow. If the packet does not belong to a recorded flow 502 , e.g. if it is the first packet in the flow, a routing decision is taken 503 according to information in the data packet and preferably also according to policies residing in the mobile router. Thereafter the routing decision is recorded 504 by recording a flow state comprising the routing decision and a flow identification. If the packet is detected to belong to an already recorded flow 502, the routing decision is taken 505 according to the decision stored for ttie recorded flow. After the classification procedure, an access is selected 506 to be used for sending the data packet based on the classification procedure. Thereafter, trie packet is sent 507 via the selected access to the home agent.
In figure 6, the method used in a home agent for routing a packet from the home agent to a mobile router according to the invention is described in a flow chart. The method starts with the home agent receiving 601 routing information from the mobile router regarding a first data packet to be sent from the HA to the MR. The routing information may either be received in a second data packet belonging to the same flow as the first data packet, but sent in the opposite direction, or it may be received in a separate instruction message. The received routing information is then stored 602 e.g. in a memory of the Home Agent together with a flow identification. Later, when the Home agent receives the first data packet from e.g. a correspondent node, the first data packet is classified 603 according to identification information of the first data packet and according to the stored information. This implies that an identification of the first data packet is found via e.g. a rieader of the first data packet, and that the home agent compares the first data packet identification with the identification of the information stored until a match is found. Thereafter, the tunnel to be used for sending the first data packet is selected 604 based on the stored routing information for the matched identification. At last, the first data packet is sent 605 via the selected tunnel.
Corresponding means for performing ttie steps according to claims 1-8 may be implemented with computer program software in a Mobile Router. Also, the corresponding means for performing the steps according to claims 9-16 may be implemented with computer program software in a Home Agent. Although it is mainly described how to use the invention together with the NEMO basic support protocol, which is specified, only for IPv6, the same mechanisms could be applied in an IPv4 environment. That is, the tunnel and flow management mechanisms of the invention can be used in the same way in an IPv4 as in an IPv6 environment.
The invention can easily be generalized to work for a single mobile communication node instead of a mobile router with a moving network. In this case, the solution would be based on Mobile IPv6 (or Mobile IPv4) instead of the NEMO basic support protocol, but the principles would be the same. When applied to a single communication node, the flow management mechanisms would be applied to the flows originating and terminating in the node itself instead of flows pertaining to mobile network nodes in a moving network. For this application, the router could be interpreted as residing internally in the single communication node. Even in the case of a single communication node, the flow- management can be governed by configured policies, but it is also reasonable that the user of the communication node can affect the flow management manually, by editing the policies or selecting access for a particular flow, through a suitable interface.
As mentioned above, this invention allows the mobile router in a moving network, or a single mobile communication node, to have multiple active tunnels to increase throughput, provide better redundancy and to be able to load-balance/ share the traffic, without downgrading e.g. transport layer characteristics such as TCP measurements or TCP performance by making arbitrary forwarding decisions over different paths per flow. This invention also allows the moving network (or the single node) to differentiate traffic to and from each mobile network node in the moving network (or to and from the single communication node) over different accesses. It also allows the moving network (or the single communication node) to differentiate flows over different accesses. Flows of a particular type may be forwarded over a particular access, for instance. The invention also allows the moving network (or the single communication node) to differentiate flows over different accesses based on the type of traffic, e.g. based on well-known port numbers associated with certain applications. This invention further allows the mobile router (or the single node) to make all decisions on over what access each particular flow is routed. The home agent will follow the mobile router's (or the single node's) decisions. The mobile router's decisions will be transparent to the mobile network nodes such that the mobile network nodes will not have to support multiple accesses that are available to the moving network, while still being able to use them.
In the drawings and specification, there have been disclosed preferred embodiments and examples of the invention and, although specific terms are employed, th.ey are used in a generic and descriptive sense only and not for the purpose of limitation, the scope of the invention being set forth in the following claims.

Claims

1. A method in a mobile router (204) for routing a data packet originating from a communication node (205, 206) to a home agent (216) in a home network (215) of the mobile router (204), wherein the mobile router has ability to access at least two different external accesses (211, 212, 213) simultaneously, through which accesses one tunnel each is set up to the home agent in the home network, wherein the method comprises the steps of: classifying the data packet according to information in the data packet; selecting (506) one of the at least two external accesses (211, 212, 213) to t>e used for sending the data packet based on the classification of the packet; sending (507) the data packet from the mobile router to the home agent via. the selected external access.
2. A method according to claim 1 wherein the step of classifying the data paclket comprises: inspecting (501) the information in the packet to detect whether the packe~t belongs to a recorded flow; taking a routing decision (503, 505), depending on the result of the inspection; recording (504) a flow by storing a flow state comprising the routing decision and a flow identification, if the packet does not belong to a recorded flow.
3. A method according to claim 2 wherein, if the packet belongs to a recorded flow, the routing decision is taken (505) according to the decision stored for the recorded flow.
4. A method according to claim 3, wherein the information in the packet resides in at least one field in a header associated with the data packet.
5. A method according to claim 2 or 4, wherein, if the packet does not belong to a recorded flow, the routing decision is taken (503) based on policies residing in ttie mobile router.
6. A method according to any of claims 2, 4 or 5, wherein, if the packet does not belong to a recorded flow, the routing decision is taken (503) based on current load on the respective external access.
7. A method according to any of claims 1-6, wherein the mobile router (204) is a router for a moving network (201) and wherein the communication node (205, 206) is a node in the moving network.
8. A method according to any of claims 1-6, wherein the mobile router (204) is residing in the communication node (205, 206).
9. A method in a home agent (216) in a home network (215) of a mobile router (204) for routing a first data packet originating from a correspondent communication node to the mobile router (204), wherein the mobile router (204) has ability to access at least two different external accesses (211, 212, 213) simultaneously, through which one tunnel each is set up to the home agent (216), wherein the method comprises the steps of: receiving (6O 1) information from the mobile router (204) regarding routing of the first data packet; storing (602) the information received from the mobile router regarding routing of the first data packet; classifying (603) the first data packet according to identification information of the first data packet and according to the stored information; selecting (6O4) one of the at least two different tunnels for sending the first data packet based on the classification, and sending (6O5) the first data packet to the mobile router (204) via the selected tunnel.
10. A method according to claim 9, wherein the information received from the mobile router (204) comprises identification information matching identification information of the first data packet, and a routing decision for the first data, packet.
11. A method according to claim 9 or 10 wherein the information received from the mobile router (2O4) regarding routing of the first data packet is received in a second data packet belonging to the same flow as the first data packet but sent in the opposite direction.
12. A method according to claim 11 wherein the information received from the mobile router (204) implicitly indicates that the same tunnel should be selected for the first data packet as was used for the second data packet.
13. A method according to any of claims 9-12, wtierein the information received from the mobile router (204) is received in a separate instruction message.
14. A method according to any of claims 9-12, wherein the information received from the mobile router (204) is received in a Binding Update message.
15. A method according to claim 13 or 14, wherein the information received from the mobile router (204) includes at least one selection record comprising:
A number of access selection parameters, such as source and destination address for the first data packet;
A care-of address indicating the tunnel to be used for sending the first data packet; and, optionally,
A priority level given to the selection record.
16. A method according to claim 15, wherein the home agent (216) should select the selection record with the highest priority level, if the identification information of the first data packet matches more than one selection record.
17. A mobile router (204) in a mobile communication system, wherein the mobile router is adapted for sending a data packet originating from a communication node
(205, 206) in connection with the mobile router (204) to a home agent (216) in a home network (215) of the mobile router (204), wherein the mobile router has ability to access at least two different external accesses (21 1, 212, 213) simultaneously, through which accesses one tunnel each is set up to the home agent (216), wherein the mobile router comprises: means for classifying the data packet according to information in the data packet; means for selecting (506) one of the at least two external accesses to be used for sending the data packet based on the classification of the packet; means for sending (507) the data packet to the home agent (216) via the selected external access.
18. A mobile router according to claim 17, wherein the mobile router (204) also comprises means for: inspecting (501) the information in the packet to detect whether the packet belongs to a recorded flow; taking (503, 505) a routing decision, depending on the result of the inspection; recording (504) a flow by storing a flow state comprising the routing decision and a flow identification, if the packet does not belong to a recorded flow.
19. A mobile router according to claim 18, wherein, if the packet belongs to a recorded flow, the routing decision is taken (505) according to the decision stored for the recorded flow.
20. A mobile router according to claim 19, wherein the information in the packet resides in at least one field in a header associated with the data packet.
21. A mobile router according to claim 18 or 20, wherein, if the packet does not belong to a recorded flow, the routing decision is taken (503) based on policies residing in the mobile router.
22. A mobile router according to any of claims 18, 20 or 21, wherein, if the packet does not belong to a recorded flow, trαe routing decision is taken (503) based on current load on the respective external access (211, 212, 213).
23. A mobile router according to any of claims 17-22, wherein the mobile router (204) is a router for a moving network (201) and wherein the communication node (205, 206) is a node in the moving network.
24. A mobile router according to any of claims 17-22, wherein the mobile router (204) is residing in the communication node.
25. A mobile router according to any of claims 17-24, wherein the mobile router (204) also comprises means for: taking a routing decision for a data packet which data packet is to be sent from the home agent (216) to the mobile router (204); sending the routing decision to the home agent (216), including an identification of the data packet concerned by the routing decision.
26. A home agent irx a communication system, wherein the honαe agent (216) belongs to a home network (215) of a mobile router (204), and wherein the home agent
(216) is adapted for routing a first data packet originating from a correspondent communication node to the mobile router (204), and wherein the mobile router has ability to access at least two different external accesses (21 1, 212, 213) simultaneously, througli which one tunnel each is set up to the home agent, wherein the home agent (216) comprises: means for receiving (601) information from the mobile router regarding routing of the first data packet; means for storing (602) the information received from the mobile router regarding routing of the first data packet; means for classifying (603) the first data packet according to identification information of the first data packet and according to the stored information; means for selecting (604) one of the at least two different tunnels for sending the first data packet based on the classification, and means for sending (605) the first data packet to the mobile router via the selected tunnel.
27. A home agent according to claim 26, wherein the information received from the mobile router (204) comprises identification information matching identification information of the first data packet, and a routing decision for the first data packet.
28. A home agent according to claim 26 or 27 wherein the information received from the mobile router (20*4) regarding routing of the first data packet is received in a second data packet belonging to the same flow as the first data packet but sent in the opposite direction.
29. A home agent according to claim 28, wherein the information received from the mobile router (204) implicitly indicates that the same tunnel should be selected for the first data packet as was used for the second data packet.
30. A home agent according to any of claims 26-29, wherein the information received from the mobile router (204) is received in a separate instruction message.
31. A home agent according to any of claims 26-29, wherein the information received from the mobile router (204) is received in a Binding Update message.
32. A home agent according to claim 30 or 31, wherein the information received from the mobile router (204) includes at least one selection record comprising:
A number of access selection parameters, such as source and destination address for the first data packet;
A care-of address indicating the tunnel to be used, for sending the first data packet; and, optionally,
A priority level given to the selection record.
33. A home agent according to claim 32, w herein the home agent (216) is adapted to select the selection record with the highest priority level, if the identification information of the first data packet matches more than one selection record.
34. A computer program product loadable into a memory of a digital computer device residing in the mobile router (204), wherein the computer program product comprises software code portions for performing the rn.eth.od of any of claims 1-8 when the computer program product is run on the computer device.
35. A computer program product loadable into a memory of a digital computer device residing in the home agent (216), wherein the computer program product comprises software code portions for performing the method of any of claims 9-16 when the computer program product is run on the computer device.
PCT/SE2004/001578 2004-10-29 2004-10-29 Methods and nodes in a communication system for controlling the use of access resources WO2006046896A1 (en)

Priority Applications (4)

Application Number Priority Date Filing Date Title
US11/718,160 US20080186897A1 (en) 2004-10-29 2004-10-29 Methods and Nodes in a Communication System for Controlling the Use of Access Resources
EP04793878A EP1805961B1 (en) 2004-10-29 2004-10-29 Methods and nodes in a communication system for controlling the use of access resources
PCT/SE2004/001578 WO2006046896A1 (en) 2004-10-29 2004-10-29 Methods and nodes in a communication system for controlling the use of access resources
CA002585155A CA2585155A1 (en) 2004-10-29 2004-10-29 Methods and nodes in a communication system for controlling the use of access resources

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/SE2004/001578 WO2006046896A1 (en) 2004-10-29 2004-10-29 Methods and nodes in a communication system for controlling the use of access resources

Publications (1)

Publication Number Publication Date
WO2006046896A1 true WO2006046896A1 (en) 2006-05-04

Family

ID=36228076

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/SE2004/001578 WO2006046896A1 (en) 2004-10-29 2004-10-29 Methods and nodes in a communication system for controlling the use of access resources

Country Status (4)

Country Link
US (1) US20080186897A1 (en)
EP (1) EP1805961B1 (en)
CA (1) CA2585155A1 (en)
WO (1) WO2006046896A1 (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2007149886A1 (en) * 2006-06-19 2007-12-27 Qualcomm Incorporated Data routing via lower layers in a communication system
WO2008106324A2 (en) * 2007-02-28 2008-09-04 Motorola, Inc. Wireless wide area broadband coverage in a vehicular area network (van)
WO2008106297A1 (en) * 2007-02-28 2008-09-04 Motorola, Inc. Wireless wide area broadband coverage in a vehicular area network (van)
WO2011055272A3 (en) * 2009-11-06 2011-06-30 Telefonaktiebolaget L M Ericsson (Publ) Virtual care -of address for mobile ip
US20120036572A1 (en) * 2009-04-09 2012-02-09 Samsung Sds Co., Ltd. System-on-a-chip malicious code detection apparatus for a mobile device
US8677114B2 (en) * 2007-01-04 2014-03-18 Motorola Solutions, Inc. Application steering and application blocking over a secure tunnel
EP2713565A4 (en) * 2011-05-19 2015-03-18 Huawei Tech Co Ltd Method and network device for generating tunneling forwarding entries
EP2372977B1 (en) * 2008-08-26 2015-07-29 Nomad Spectrum Limited Method of providing data communication to a vehicle

Families Citing this family (33)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7636939B2 (en) * 2004-12-10 2009-12-22 Microsoft Corporation Endpoint identification and security
GB2422272A (en) * 2005-01-14 2006-07-19 King S College London Network mobility
US7813314B2 (en) * 2005-08-02 2010-10-12 Waav Inc. Mobile router device
US8588061B2 (en) * 2005-10-07 2013-11-19 Brixham Solutions Ltd. Application wire
KR100819036B1 (en) * 2005-12-08 2008-04-02 한국전자통신연구원 Traffic Authentication Equipment using Packet Header Information and Method thereof
EP2018711A2 (en) * 2006-05-16 2009-01-28 Autonet Mobile, Inc. Mobile router with serial device interface
US7877506B2 (en) * 2006-05-26 2011-01-25 International Business Machines Corporation System, method and program for encryption during routing
US8009566B2 (en) * 2006-06-26 2011-08-30 Palo Alto Networks, Inc. Packet classification in a network security device
CN101106490B (en) * 2006-07-11 2012-01-04 华为技术有限公司 Establishment method of preset stream classifier and its system and user terminal
US20100316018A1 (en) * 2006-12-14 2010-12-16 Zoltan Richard Turanyi Network-based handover control mechanism
US7822036B2 (en) * 2007-03-27 2010-10-26 Alcatel Lucent Method and system for policy-based routing in a private network-to-network interface protocol based network
US8594085B2 (en) * 2007-04-11 2013-11-26 Palo Alto Networks, Inc. L2/L3 multi-mode switch including policy processing
US10075376B2 (en) 2007-04-18 2018-09-11 Waav Inc. Mobile network operating method
US7729263B2 (en) * 2007-08-08 2010-06-01 Honeywell International Inc. Aircraft data link network routing
US8811265B2 (en) 2007-10-19 2014-08-19 Honeywell International Inc. Ad-hoc secure communication networking based on formation flight technology
US9264126B2 (en) * 2007-10-19 2016-02-16 Honeywell International Inc. Method to establish and maintain an aircraft ad-hoc communication network
US8570990B2 (en) 2007-12-04 2013-10-29 Honeywell International Inc. Travel characteristics-based ad-hoc communication network algorithm selection
US9467221B2 (en) 2008-02-04 2016-10-11 Honeywell International Inc. Use of alternate communication networks to complement an ad-hoc mobile node to mobile node communication network
US8432922B2 (en) * 2008-06-03 2013-04-30 Xtera Communications, Inc. Method for managing IP tunnels
US8190147B2 (en) 2008-06-20 2012-05-29 Honeywell International Inc. Internetworking air-to-air network and wireless network
US8873556B1 (en) 2008-12-24 2014-10-28 Palo Alto Networks, Inc. Application based packet forwarding
US8891432B2 (en) * 2009-03-27 2014-11-18 Panasonic Intellectual Property Corporation Of America Routing method, routing system, mobile node, home agent, and home base station
KR101317341B1 (en) * 2009-12-21 2013-10-11 한국전자통신연구원 Method for Reducing Packet Ordering Time of Layer 3 Handover and Mobile Satellite Terminal Using the same
KR20120071721A (en) * 2010-12-23 2012-07-03 한국전자통신연구원 Method and apparatus for supporting mobility based on flow in pmipv6
US9047441B2 (en) 2011-05-24 2015-06-02 Palo Alto Networks, Inc. Malware analysis system
US8695096B1 (en) 2011-05-24 2014-04-08 Palo Alto Networks, Inc. Automatic signature generation for malicious PDF files
CN102740428B (en) * 2012-06-20 2015-04-15 华为技术有限公司 Method for regulating and controlling transmitting power and wireless router equipment
US10104704B2 (en) * 2014-02-07 2018-10-16 Cisco Technology, Inc. Dynamic acceleration of prioritized mobile application traffic
US9755953B1 (en) * 2014-07-24 2017-09-05 Rockwell Collins, Inc. Multi-path routing control for an encrypted tunnel
US11070395B2 (en) * 2015-12-09 2021-07-20 Nokia Of America Corporation Customer premises LAN expansion
EP3417574A1 (en) * 2016-02-18 2018-12-26 Alcatel Lucent Data transmission
CN109587061B (en) * 2018-11-08 2022-04-22 华为技术有限公司 Method, device and equipment for processing route
US20230188459A1 (en) * 2021-12-09 2023-06-15 Marvell Israel (M.I.S.L) Ltd. Hierarchical path selection in a communication network

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040029555A1 (en) * 2002-08-09 2004-02-12 Hsien-Ming Tsai System and method for supporting mobile internet protocol using multiple separate tunnels
US20040208153A1 (en) * 2003-04-16 2004-10-21 Jerry Mizell Policy based mobile IP

Family Cites Families (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7436830B2 (en) * 2000-04-03 2008-10-14 P-Cube Ltd. Method and apparatus for wire-speed application layer classification of upstream and downstream data packets
US7027400B2 (en) * 2001-06-26 2006-04-11 Flarion Technologies, Inc. Messages and control methods for controlling resource allocation and flow admission control in a mobile communications system
WO2003043226A1 (en) * 2001-11-14 2003-05-22 Nokia Corporation MOBILE ROUTER SUPPORT FOR IPv6
US7023828B2 (en) * 2001-11-19 2006-04-04 Motorola, Inc. Method and apparatus for a mobile node to maintain location privacy from selected correspondent nodes
US7283472B2 (en) * 2002-08-30 2007-10-16 Redback Networks Inc. Priority-based efficient fair queuing for quality of service classification for packet processing
US7190678B2 (en) * 2002-10-28 2007-03-13 Cisco Technology, Inc. Arrangement for router attachments between roaming mobile routers in a clustered network
CN1729663B (en) * 2002-12-26 2010-10-13 松下电器产业株式会社 Mobile network control device and mobile network control method
US8146148B2 (en) * 2003-11-19 2012-03-27 Cisco Technology, Inc. Tunneled security groups
US8923256B2 (en) * 2004-06-24 2014-12-30 Intellectual Ventures I Llc Transfer of packet data in system comprising mobile terminal, wireless local network and mobile network

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040029555A1 (en) * 2002-08-09 2004-02-12 Hsien-Ming Tsai System and method for supporting mobile internet protocol using multiple separate tunnels
US20040208153A1 (en) * 2003-04-16 2004-10-21 Jerry Mizell Policy based mobile IP

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
WAKIKAWA R.: "Multiple Care-of Adresses Registration", INTERNET DRAFT, 19 June 2004 (2004-06-19), pages 1 - 27, XP015036592, Retrieved from the Internet <URL:http://www.watersprings.org/pub/id/draft-wakikawa-mobileip-multiplecoa-03.txt> *

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2007149886A1 (en) * 2006-06-19 2007-12-27 Qualcomm Incorporated Data routing via lower layers in a communication system
US9049096B2 (en) 2006-06-19 2015-06-02 Qualcomm Incorporated Data routing via lower layers in a communication system
US8677114B2 (en) * 2007-01-04 2014-03-18 Motorola Solutions, Inc. Application steering and application blocking over a secure tunnel
US8144672B2 (en) 2007-02-28 2012-03-27 Motorola Solutions, Inc. Wireless wide area broadband coverage in a vehicular area network (VAN)
WO2008106324A3 (en) * 2007-02-28 2008-10-16 Motorola Inc Wireless wide area broadband coverage in a vehicular area network (van)
WO2008106297A1 (en) * 2007-02-28 2008-09-04 Motorola, Inc. Wireless wide area broadband coverage in a vehicular area network (van)
WO2008106324A2 (en) * 2007-02-28 2008-09-04 Motorola, Inc. Wireless wide area broadband coverage in a vehicular area network (van)
EP2372977B1 (en) * 2008-08-26 2015-07-29 Nomad Spectrum Limited Method of providing data communication to a vehicle
US9497794B2 (en) 2008-08-26 2016-11-15 Nomad Spectrum Limited Modification of identifier data to identify intermediate devices
US20120036572A1 (en) * 2009-04-09 2012-02-09 Samsung Sds Co., Ltd. System-on-a-chip malicious code detection apparatus for a mobile device
US8990931B2 (en) * 2009-04-09 2015-03-24 Samsung Sds Co., Ltd. System-on-a-chip malicious code detection apparatus for a mobile device
WO2011055272A3 (en) * 2009-11-06 2011-06-30 Telefonaktiebolaget L M Ericsson (Publ) Virtual care -of address for mobile ip
EP2713565A4 (en) * 2011-05-19 2015-03-18 Huawei Tech Co Ltd Method and network device for generating tunneling forwarding entries
US9407532B2 (en) 2011-05-19 2016-08-02 Huawei Technologies Co., Ltd. Method for generating tunnel forwarding entry and network device

Also Published As

Publication number Publication date
US20080186897A1 (en) 2008-08-07
CA2585155A1 (en) 2006-05-04
EP1805961B1 (en) 2012-12-05
EP1805961A1 (en) 2007-07-11

Similar Documents

Publication Publication Date Title
EP1805961B1 (en) Methods and nodes in a communication system for controlling the use of access resources
JP4690465B2 (en) Method, communication system and mobile router for routing data packets from a mobile network to a home network of the mobile network
AU2003231839B2 (en) Flow-based selective reverse tunneling in wireless local area network (WLAN) -cellular systems
US8249086B2 (en) Apparatus for flow control
KR101367508B1 (en) Link aggregation in a heterogeneous communication system
EP2144416B1 (en) Mobile network managing apparatus and mobile information managing apparatus for controlling access requests
US7746876B2 (en) Method and mobile routers in a communications system for routing a data packet
US20070165572A1 (en) Method and system for seamless handover of mobile devices in heterogeneous networks
US7010299B2 (en) Method and apparatus for mobility in WLAN systems
US20100296443A1 (en) System, method and apparatus for route-optimized communication for a mobile node nested in a mobile network
GB2508355A (en) Virtual networks on vehicles with redundant bridges providing load sharing and or failover
Purohith et al. Network architecture supporting seamless flow mobility between LTE and WiFi networks
JP2010517344A (en) Data packet header reduction method by route optimization procedure
Fikouras et al. Experimental evaluation of load balancing for mobile internet real-time communications
Dawood et al. Assay of IP mobility management in SDN based mobile network architecture
Corici et al. Optimized low mobility support in massive mobile broadband evolved packet core architecture
Dawood et al. Improvements for DMM in SDN and Virtualization-Based Mobile Network Architecture
EP1705866A1 (en) Flow-based selective reverse tunneling in wireless local area network (WLAN)-cellular systems
Chaht et al. Towards a future mobile multihomed environment
Chowdhury et al. Design Issues for Mobility Management Schemes in Data Networks
Bonola et al. Per-application Mobility Management: Performance Evaluation of the UPMT Solution (SUBMITTED VERSION)
EP1733590A1 (en) Method and system for seamless handover of mobile devices in heterogenous networks

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BW BY BZ CA CH CN CO CR CU CZ DK DM DZ EC EE EG ES FI GB GD GE GM HR HU ID IL IN IS JP KE KG KP KZ LC LK LR LS LT LU LV MA MD MK MN MW MX MZ NA NI NO NZ PG PH PL PT RO RU SC SD SE SG SK SY TJ TM TN TR TT TZ UA UG US UZ VN YU ZA ZM

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): BW GH GM KE LS MW MZ NA SD SZ TZ UG ZM ZW AM AZ BY KG MD RU TJ TM AT BE BG CH CY DE DK EE ES FI FR GB GR HU IE IT MC NL PL PT RO SE SI SK TR BF CF CG CI CM GA GN GQ GW ML MR SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
DPE1 Request for preliminary examination filed after expiration of 19th month from priority date (pct application filed from 20040101)
WWE Wipo information: entry into national phase

Ref document number: 2004793878

Country of ref document: EP

WWE Wipo information: entry into national phase

Ref document number: 2959/DELNP/2007

Country of ref document: IN

WWE Wipo information: entry into national phase

Ref document number: 2585155

Country of ref document: CA

NENP Non-entry into the national phase

Ref country code: DE

WWP Wipo information: published in national office

Ref document number: 2004793878

Country of ref document: EP

WWE Wipo information: entry into national phase

Ref document number: 11718160

Country of ref document: US