WO2006046896A1 - Methods and nodes in a communication system for controlling the use of access resources - Google Patents
Methods and nodes in a communication system for controlling the use of access resources Download PDFInfo
- Publication number
- WO2006046896A1 WO2006046896A1 PCT/SE2004/001578 SE2004001578W WO2006046896A1 WO 2006046896 A1 WO2006046896 A1 WO 2006046896A1 SE 2004001578 W SE2004001578 W SE 2004001578W WO 2006046896 A1 WO2006046896 A1 WO 2006046896A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- mobile router
- data packet
- home agent
- packet
- flow
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/28—Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
- H04L12/46—Interconnection of networks
- H04L12/4633—Interconnection of networks using encapsulation techniques, e.g. tunneling
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L45/00—Routing or path finding of packets in data switching networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L45/00—Routing or path finding of packets in data switching networks
- H04L45/38—Flow based routing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/40—Network security protocols
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W40/00—Communication routing or communication path finding
- H04W40/02—Communication route or path selection, e.g. power-based or shortest path routing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L69/00—Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
- H04L69/14—Multichannel or multilink protocols
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W80/00—Wireless network protocols or protocol adaptations to wireless operation
- H04W80/04—Network layer protocols, e.g. mobile IP [Internet Protocol]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W84/00—Network topologies
- H04W84/005—Moving wireless networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W92/00—Interfaces specially adapted for wireless communication networks
- H04W92/04—Interfaces between hierarchically different network devices
- H04W92/14—Interfaces between hierarchically different network devices between access point controllers and backbone network device
Definitions
- the present invention relates to communication systems and methods, and more particularly it relates to communication systems and methods for controlling the use of access resources accessible by a mobile node or a r ⁇ obile network.
- IP Internet Protocol
- the mobile communication node could for example move such that it needs to change from communicating with a first access point belonging to a first Wireless Local Area Network (WLAN) to communicating with a second access point belonging to a second WLAN.
- WLAN Wireless Local Area Network
- Mobile IPv6 and Mobile IPv4 are prior art protocols enabling such mobility in IPv6 based and IPv4 based networks, respectively.
- Mobile IPv6 is described e.g. in the document "Mobility Support in IPv6" by D. Johnson et al, RFC3775, published on the Internet by the Network Working Group in June 2004.
- the process for achieving mobility in an IPv4 system is similar to the process for an IPv6 system.
- the major differences between Mobile IPv4 and Mobile IPv6 is that in mobile IPv4 the messages Binding Update and Binding Acknowledge in Mobile IPv6 explained below are called Registration Request and Registration Reply, respectively.
- Registration Request and Registration Reply there may be an additional node called Foreign Agent involved.
- Figure 1 shows a Mobile IPv6 based system and below is explained how mobility is achieved for a mobile communication node in such a Mobile IPv6 based system.
- the mobile com ⁇ runication node 105 which could be any communication device, for example a laptop or a mobile phone, has its original point of attachment to a home network 110, which home network has a Home Agent 111 and a Router 112.
- the mobile communication node has a stable home address belonging to the address space of the home network.
- Figure 1 also shows a first foreign network 120 having at least one Access Point 121 and an access router 122, and a second foreign network 13O comprising an access router 132 and a correspondent node 135 connected to the Access Router 132.
- All networks are connected via an IP network 140, e.g. the Internet.
- the mobile communication node 105 is in its home network: 110 and has established a connection, to the correspondent node 135 connected to the second foreign network 130.
- the mobile communication node then moves from the home network to the first foreign network 120.
- the mobile communication node will then, according to Mobile IPv6, send a Binding Update (BU) message (whichi corresponds to a Registration Request in Mobile IPv4) via the first foreign network to the Home Agent 111 of the home network 110 informing the Home Agent of the mobile node's new address, i.e. it's care-of address in the first foreign network.
- BU Binding Update
- the Home Agent 111 sends a Binding Acknowledge message (which corresponds to a Registration Reply in Mobile IPv4) to the mobile communication node and a tunnel is established between the mobile cor ⁇ unication node and the Home Agent, via the IP network 140.
- the tunnel On the mobile communication node endpoint the tunnel has the mobile communication node's care-of address as its outer address and the mobile communication node's home address as the inner address.
- the following traffic between the mobile communication node and the correspondent node 135 will then transit through the tunnel to the Home network and further to the correspondent node in the foreign network such that the previous connection between the mobile communication node and the correspondent node is preserved.
- Packets in the other direction, originating from the correspondent node 135, are addressed to the ho ⁇ xe address of the mobile communication node 105, intercepted by the Home Agent 11 1 and forwarded through the tunnel to the mobile communication node 105.
- the access router 122 in the first foreign network 120 may also act as a Foreign Agent through which all Mob>ile IPv4 communication between the mobile node 105 and its Home Agent 111 passes. In such case the tunnel is established between the Foreign Agent and the Home Agent instead of between the mobile communication node and the Home Agent. The Foreign Agent then forwards packets coming out of trie tunnel to the mobile node 105 and forwards packets from the mobile node 1O5 through the tunnel towards the Home Agent 111.
- a route optimisation mechanism can be used to allow direct communication between thie mobile communication node 105 and the correspondent node 135.
- a mobile communication node may be moving, but a whole network, for example a network within a transport vehicle (e.g. bus, train or airplane).
- the moving network will have a router through which all communication nodes in the moving network can communicate.
- the moving network will comprise communication nodes, which may be different users' communication devices, such as laptops, mobile phones, PDAs (Personal Digital Assistance) etc., which communication nodes communicate with the router "within the airplane, such that all communication destined to an external address will pass via the router.
- a mobile network may also be e.g. a Personal Area Network (PAN), wherein a PAN comprises all communication devices belonging to a user and. situated within short range radio communication distance form each other, see for example co-pending patent application PCT/ SE2004/001027.
- PAN Personal Area Network
- the Network Mobility (NEMO) Basic Support Protocol is a protocol that enables a mobile network to attach, to different points in the Internet.
- the protocol is an extension of Mobile IPv6 and allows session continuity for every communication node (or communication device) m the mobile network as the network moves. It allows a mobile router to maintain a stable network prefix for a moving network, even as the mobile router changes its, and thus the moving network's, point of attachment to a fixed network infrastructure.
- This prefix stability is achieved through a solution similar to the mobile IPv6 solution ., by making a home agent (HA) a fixed point of attachment for the Mobile Router (MR) and maintaining connectivity between the HA and the MR through a tunnel.
- the prefLx is allocated from the address range of the home network, and can thus remain the same even as the MR and its network: move.
- the MR attaches to a network in a mew location, it acquires a new care-of address, but its home address and prefix are unchanged.
- the MR has to register its new carre-of address in the HA in order to maintain the tunnel between the Mobile Router and. the Home Agent.
- the communication nodes belonging to the network cluster that moves along with, the mobile router are called Mobile Network Nodes (MNNs).
- MNNs Mobile Network Nodes
- NEMO basic support they will not change their configuration as the MR changes its point of attachmeai:. In other words, the mobility is transparent to them. If, in the current NEMO solution, a bad tunnel is experienced, it will be replaced by a new tunnel by performing a new registration with the HA, this time with a different care-of address, unless the tunnel is re-established through the same interface and point of attachment, and possibly configured on a different interface, depending on the nature of the tunnel problems . If a communication node could get Internet access through multiple access media simultaneously, i.e.
- NEMO basic support protocol does not allow this because it allows only a single care-of address to be registered in the Home Agent (HA) for a certain Mobile Router (MR) at any one time. Multiple simultaneous care-of addresses are not allowed and thus multiple simultaneous accesses and MR-HA tunnels are not possible for a MR.
- a data flow comprises an uplink part and a downlink part, wherein the uplink part is in the direction from the mobile communication node to the home agent (and further to the correspondent node), and the downlink part is in the direction from the home agent to the mobile communication node.
- a TCP (Transmission Control Protocol) connection is typically seen as a flow.
- a node can have multiple flows towards different correspondent nodes and also multiple flows towards the same correspondent node.
- a flow is typically defined by the source and destination IP addresses and port numbers, plus the transport protocol in use, such as TCP or UDP (User Datagram Protocol). It is also possible to instead define a flow by its flow label (in IPv6) or its SPI (Security Paraxneter Index) together with the source and destination IP addresses, and the protocol in case of the SPI.
- the flow label is more specific ttxan the port numbers and should have precedence over them.
- the SPI is used in IPsec (IP security as defined in RFC 2401 "Security Architecture for the Internet Protocol"), together with the destination IP address and the protocol to identify the security association, and the SPI-destination address-protocol triplet is typically used, as a (unidirectional) flow identifier when the packet is encrypted and the port numbers are visible only to the receiving end-node.
- IPsec IP security as defined in RFC 2401 "Security Architecture for the Internet Protocol”
- SPI-destination address-protocol triplet is typically used, as a (unidirectional) flow identifier when the packet is encrypted and the port numbers are visible only to the receiving end-node.
- the object of the invention is to achieve a solution for managing the use of simultaneously accessible access resources connecting a mobile router and a. home agent in a home network by means of a tunnel in each access resource, such ttiat it is controlled which access resource a data packet travelling in any direction between the mobile router and the home agent is using.
- the solution according to the present invention achieves the above mentioned object by having the mobile router controlling the use of the access resources both for data packets sent in the direction to the home agent and for data packets sent from, the home agent to the mobile router. For this reason, the mobile router classifies a. data packet based on information in the packet and selects an access resource for sending the packet based on the classification.
- the mobile router also sends implicit or explicit information to the home agent regarding routing of data packets from the home agent to the mobile router, such that the home agent classifies these data packets and selects access resource for sending the data packets based on the information received from the mobile router.
- a method in a mobile router for routing a data packet originating from a communication node to a home agent in a home network of the mobile router.
- the mobile router has ability to access at least two different external accesses simultaneously, through which accesses one tunnel each is set up to the home agent in the home network.
- the method comprises the steps of: classifying the data packet according to information in the data packet; selecting one of the at least two external accesses to be used for sending trie data packet based on the classification of the packet; sending the data packet from the mobile router to the home agent via the selected external access.
- a method in a home a_gent in a home network of a mobile router for routing a first data packet originating from a correspondent communication node to the mobile router, wherein the mobile roxiter has ability to access at least two different external accesses simultaneously, through which one tunnel each is set up to the home agent.
- the method comprises the steps of: receiving information from the mobile router regarding routing of the first data packet; storing the information received from the mobile router regarding routing of the first data packet; classifying the first data packet according to identification information of the first data packet and according to the stored information; selecting one of the at least two different tunnels for sending the first data, packet based on the classification, and. sending the first data packet to the mobile router (204) via the selected tunnel.
- a mobile router in a mobile communication system, wherein the mobile router is adapted for sending a data packet originating from a. communication node in connection with the mo ⁇ bile router to a home agent in a home network of the mobile router.
- the mobile router nas ability to access at least two different external accesses simultaneously, through wtrich accesses one tunnel eacti is set up to the home agent.
- the mobile router comprises: means for classifying the data packet according to information in the data packet; means for selecting one of the at least two external accesses to be used for sending the data packet " based on the classification of the packet; means for sending the data packet to the home agent via the selected external access.
- a home agent in a communication system, wherein the home agent belongs to a home network of a mobile router, and wherein the home agent is adapted for routing a first data packet originating from a correspondent communication node to the mobile router.
- the mobile router has ability to access at least two different external accesses simultaneously, through which one tunnel each is set up to the home agent.
- the home agent comprises: means for receiving information from the mobile router regarding routing of the first data packet; means for storing the information received from the mobile router regarding routing of the first data packet; means for classifying the first data packet according to identification information of the first data packet and according to the stored information; means for selecting one of the at least two different tunnels for sending the first data packet based on the classification, and means for sending the first data packet to the mobile router via. the selected tunnel.
- the mobile router in addition to classifying the data packet according to information in the data packet, also classifies the data packet according to policies configured and stored in the mobile router.
- Another advantage of the present invention is that it makes it possible to differentiate traffic belonging to different flows over different accesses. It will also be possible to differentiate traffic over different accesses depending on e.g. the type of mobile network node or the type of subscription that the mobile network node has.
- Yet another advantage of the invention lies in that it allows the mobile router and the home agent to have multiple active tunnels to increase throughput, provide better redundancy and to be able to load-balance the traffic without downgrading e.g. transport layer characteristics.
- a further advantage of the invention is that it allows the mobile router (or the single communication node) to make all decisions on over what access each particular flow is routed.
- the home agent will follow the mobile router's (or the single communication node's) decisions.
- the mobile router's decisions will be transparent to the mobile network nodes such that the mobile network nodes will not have to support multiple accesses that are available to the moving network, while still being able to use them.
- Figure 1 shows a schematic block diagram of a communication system according to prior art.
- Figure 2 illustrates a schematic block diagram of a communication system wherein the present invention can be used.
- Figure 3 shows a schematic block diagram of a Mobile Router according to an embodiment of the invention.
- Figure 4 shows a schematic block diagram of a Home Agent according to an embodiment of the invention.
- Figure 5 shows a flow chart according to a method of the invention used in. a Mobile Router.
- Figure 6 shows a flow chart according to a method of the invention used in. a Home Agent.
- the invention deals with a routing function, which means selecting an access to be used for a packet and sending the packet via the selected access.
- FIG. 2 shows a schematic block diagram of a communication system having a Vehicle Area Network (VA-N) 201 and multiple external network accesses for the VAN, wherein the system can be controlled according to the invention.
- a VAN is an example of a moving network for which the present invention can be used.
- the VLAN 201 is in this case situated on a train 200, which may be moving.
- the VAN may be some sort of switched Ethernet that may have either Ethernet ports 202 or WLAN access points 203 or a combination of Ethernet ports and WLAN access points (as sl ⁇ own in the figure).
- MNNs Mobile network nodes
- 205, 206 may connect to an Ethernet port or to a WLAN access point.
- Trie mobile network nodes may be any communication node such as laptops or mobile phones belonging to persons travelling on the train.
- the VAN also has a Mobile Router (MR) 204, which acts as a default gateway for all MNNs inside the vehicle.
- the mobile router 204 is responsible for mobility management for the entire VAN 201, i.e. mobility management is totally transparent to th. ⁇ MNNs 205, 206 entering the vehicle. This means that no new requirements are put on the MNNs when joining the VAN.
- the external network accesses for the VAN comprise one or several different access technologies, in figure 2 exemplified by the radio access technologies General Packet Radio Service (GPRS) 211, Wideband Code Division Multiple Access (WCDMA) 213, and satellite radio communication 212.
- GPRS General Packet Radio Service
- WCDMA Wideband Code Division Multiple Access
- FIG 2 also shows a Home Agent (HA) 216 in a home network 215, which is the home network for the MR. Communication from any of the MNNs and destined for e.g. a correspondent node in a foreign network (or communication in the opposite direction) is routed via. any of the access networks, an IP network 214 and via the home agent 216 in the home network 215.
- HA Home Agent
- the mobile router 204 will need to setup one tunnel to the home agent 216 for each available external access.
- the example in figure 2 shows three tunnels between the mobile router 204 and the home agent 216, one for each of the three access technologies 211, 212, 213.
- An end-user may have special requirements and may want to be able to control which external access to use.
- the solution according to the invention suggests having the mobile router controlling the usage of the different external accesses such that these accesses are used in an efficient way to enable good communication possibilities for the mobile network nodes (MNNs) .
- the Mobile Router (MR) according to the invention classifies the data packets sent from th.e MNNs and selects one of the available accesses for each uplink part of a flow.
- the MR also instructs, implicitly or explicitly, the HA Ihow to classify packets and how to select access, regarding data going in the direction to the MNNs, i.e. regarding the downlink part of each flow.
- the MR is a good point in the network to perform this type of flow management, because the MR is aware of and can monitor the available accesses and because most connections are initiated from the MNNs (i.e. at the connection end-point at the MR side of the external access link).
- the MNNs themselves are generally not aware of the available accesses and they are certainly not aware of the current load of the accesses and the current mix of flows to and from the moving network. Even if the MNNs (or their users) may find it useful to select a certain access for a certain flow, no prior art means, i.e. protocols, to indicate such selections are available, except off-line means such as subscription profiles.
- the Home Agent is also in a worse position than the MR to select tunnels or external accesses for different flows, because the HA is not aware of what access(es) the MR is using and because different routing policies may be applied in different moving networks (i.e. by different MRs).
- the flow classification and the access selection are based on informa ⁇ ion in the data packet and on policies that are configured in the MR, e.g. including subscription profiles, access classifications, selection principles, load-sharing algorithms, etc.
- a policy may either be statically configured by e.g. the operator, regarding for example how and if load sharing is to be used and which access selection principles that shall be used, or the policy may be dynamically configured, regarding for example the load sharing and access selection principles that are going to be used for ttie moment. Any user preferences may also be used in a policy.
- the MR will try to create a care-of address on each interface that has connectivity to the fixed infrastructure, i.e. each external access, and, if successful, try to register each care-of address with the HA in order to establish a tuaanel, one tunnel per access.
- a packet When a packet is sent from an MNN towards the Internet, it will reacli the MR, as the MR is the default router for the moving network.
- the MR will inspect the packet in an attempt to classify what flow the packet belongs to, if it belongs to an already recorded flow, or to classify if it belongs to a previously unidentified flow. TThe classification is performed e.g. by looking at any flow identification (flow-ID) in the packet, and look-up if the flow-ID matches a flow-ID for an already recorded flow.
- Any flow-ID parameter for classifying which, flow a packet belongs to may be used, such as the source and destination IP address plus at least one of e.g.:
- TCP Transmission Control Protocol
- SCTP Stream Control Transmission Protocol
- SPI Security Parameter Index
- protocol number While in this case will indicate a security protocol such as ESP (Encapsulating Security Payload) or AH
- Any other parameter that can be used for classifying which flow a packet belongs to such as e.g. DiffServ code points, may also be used.
- the MR selects the same access as for the previous packets of the same flow, such that the packet is sent over the same tunnel as the previous packets of the same flow.
- the MR will select access based on policies in the MR and on information in the packet, information such as one or more of the following ) : - Source IP address;
- Source port number (in a User Datagram Protocol (UDP), Transmission Control Protocol (TCP) or Stream Control Transmission Protocol (SCTP) header);
- UDP User Datagram Protocol
- TCP Transmission Control Protocol
- SCTP Stream Control Transmission Protocol
- Destination port number (in a UDP, TCP or SCTP header); - Protocol number;
- the policies may include static rules, configured by e.g. the operator administrating the MR, consisting of e.g. selection principles, access classifications, load sharing algorithms etc. Trie policies may also include data of more dynamic nature, such as subscription profiles.
- An example of a selection principle could e.g. be that a certain application, indicated by a certain port number, should be sent over the available access link that has the highest bandwidth.
- a certain real ⁇ time application indicated by a certain port number, should be serrt over the available access link that lias the lowest latency.
- An example of an access classification could be that a satellite access is classified as a high latency access.
- Another example could be that an IEEE 802.11a access is classified as a high bandwidth access.
- An example of a simple load sharing algorithm is to allocate flows to different accesses according to round robin principles. However, once an access has been selected for a certain flow, thq same access should preferably be kept for the entire lifetime of the flow.
- Another example of a load sharing algorithm is to strive to maintain an equivalent relative saturation of the available bandwidth of the respective available accesses.
- An example of information that could be included in a subscription profile could be that a concerned subscriber is allowed to use only low and medium bandwidth access like e.g. GPRS and WCDMA, whereas higher bandwidth access like IEEE 802.1 Ia may be used for the concerned subscriber only if no accesses with lower bandwidth are available.
- the MR will create a state for each new flow and store the associated forwarding such that the same tunnel can be used for a following packet classified to belong to the same flow.
- the HA When the HA receives a tunnelled packet from the MR, the HA will- according to a first embodiment of trie invention create a state for this flow, store a flo ⁇ V-ID and also store (a reference to) the tunnel over which this packet was received.
- This flow state and tunnel reference ⁇ vill then according to the first embodiment of the invention be used for routing packets in the downlink direction for the same flow, as will now be described. I.e. the MR will implicitly instruct the HA how to route a packet belonging to the downlink part of the same flow.
- a flow state will only be created, and a tunnel reference will only be stored, if the packet was the first packet in this flow or if the tunnel reference has changed, or any similar change influencing the tunnel selection for the downlink part of the same flow.
- the HA When packets are routed downlink, i.e. from a correspondent node in an external network to a Mobile Network Node in the Mobile Network via the HA and the MR, the HA will attempt to classify packets to a certain flow when packets are received by the
- the HA will forward the packet over the same tunnel as was recorded in the state of the flow. If the packet does not match, any of the stored flow states, i.e. the packet is classified as belonging to a previously unidentified flow, the HA will not take any decisions but simply forward the packet over a default tunnel towards the MR. The HA will not create any state for such a previously unidentified flow, but instead wait for the MR's decision, which for example will be indicated in the form of a packet belonging to the same flow, but to the uplink part of that flow. This packet may arrive through the same tunnel as the HA chose or another tunnel, i.e. the tunnel selection is entirely up to the MR, and the HA will follow this decision as previously described.
- the downlink part of a data flow i.e. the direction from the HA to the MR
- the MR instead of the HA using the same flow state and tunnel reference for the downlink part as for the uplink part of the same flow, the MR will send separate instructions to the HA how to route a certain flow in the downlink direction.
- the MR will take all forwarding decisions for all flows, both uplink parts and downlink parts.
- the HA will just follow the decisions of the MR and make sure the downlink traffic is forwarded via the same tunnel as the uplink traffic or via a tunnel as instructed by the MR in a separate message.
- a tunnel has to be established over each external access that should be able to be used for routing messages between a mobile router and a home agent in a home network.
- the mobile router For establishing such a tunnel for each different external access, the mobile router will have to configure a separate care-of address (CoA) for each external access that it wants to use.
- CoA care-of address
- at least three different care-of addresses will be established, at least one per access technology.
- backup external accesses may be inactive until needed.
- a policy function in the MR will monitor the status of each external access, e.g. the link status of each external access, the IP configuration status of each external access (whether it has a care-of address configured), and/ or the possibility to reach some point in the network, typically the HA.
- Each external access that passes all status checks will be used for tunnel establishment. For each external access a tunnel is created with the associated CoA in the MR as one endpoint and the HA as the other endpoint. TIhe MR will register with the HA in one of the following ways:
- MR sends a separate Binding Update (for Mobile IPv6) per external access/CoA that passes the status check.
- MR sends an aggregated Binding Update (BU) for all external accesses/CoAs. Initially, it should wait a short while until a few CoAs are configured and can be sent as one BU; • MR sends a BU with all active CoAs in it as soon as something changes or the binding needs refreshment;
- BU Binding Update
- the MR uses a method similar to what is described in the prior art document "Multiple Care-of Addresses Registration", draft- wakikawa-mobileip-multiplecoa- 03.txt, also cited above, wherein Mobile IPv6 extensions or NEMO Basic support extensions are proposed which are designed to register ⁇ rultiple care-of addresses bound to a single home address. For doing so, a new identification number has to be carried in each binding for the receiver to distinguislh between the bindings corresponding to the same home address;
- a mobile router according to an embodiment of the invention is described. Also, the routing decisions taken by a mobile router according to an embodiment of the invention, when routing a packet from a mobile node to a home agent -will be described.
- the mobile router 204 which may be the mobile router described in figure 2, comprises ajn internal interface 301 for communicating with other nodes connected to the mobile network, e.g. the mobile network nodes, and a processor 302 for e.g. managing the communication within the mobile network and for managing the use of external accesses.
- the mobile router in this example also comprises, for illustrative purposes compared to figure 2, three external interfaces 305, 306, 307, one for each external access technology that the mobile router can use for getting external access.
- three external interfaces 305, 306, 307 three external interfaces 305, 306, 307, one for each external access technology that the mobile router can use for getting external access.
- a first external interface 305 may be used for getting external access to the GPRS network 211, a second external interface 306 for getting external access to the satellite communication network 212 and a third external interface 307 for getting access to the WCDMA network 213.
- the processor 302 has, among other things, one classification means 303 for identifying and classifying packets that are received from the mobile nodes and that are to be routed to the Home Agent 216 of the home network 215. It also has a selecting means 304 for selecting which external access that shcmld be used for each packet based on the identification and classification made in the classification means.
- a packet is received on the internal interface 301 of the MR 204.
- the packet is forwarded to the processor 302 wherein the processor will look up, in e.g. a memory 308, if the packet belongs to an already identified and recorded flow. If it does, the packet will be sent through the same tunnel as the previous packet in the same flow. If not, thte processor will take a routing policy decision in e.g. the classification means 303, preferably aided by policies stored e.g. in a policy database 309, which could be a separate database in the mobile router or which could be situated e.g. in the memory 308.
- a packet belonging to a previously unidentified flow received in the MR in the downlink direction may also trigger the MR to select a tunnel (independently of what tunnel the downlink packet was received through) and store a state for the corresponding uplink part of the flow.
- the processor 302 will take a routing policy decision for the flow and select an access based oxi available header fields such as source address, destination address, source port, destination port, protocol number or flow label (for IPv6 packets).
- IPv6 packets For an encrypted packet a routing policy decision will be taken based on fields such as source address, destination address, Security Parameter Index (SPI) or flow label (for IPv6 packets).
- SPI Security Parameter Index
- a more unsophisticated decision procedure may be based on e.g.
- the source address and the destination address or only the source address may be based on only the source and destination port numbers.
- the decision forms the basis for selecting, e.g. in a selecting means 304, via which external interface 305, 306, 307 the packet will be routed and further in which outgoing tunnel the packet will be transported towards the Home Agent.
- the processor 302 may also take into account any r-outing policy configured at the MR and stored in the policy database 309.
- the routing policies may include e.g. subscription profiles, access classifications, selection principles, load-sharing algorithms, etc.
- the processor also creates a state, which in this case is a flow identification and a routing decision for the flow-ID, for the same input parameters for the routing decision, which state is stored e.g. in the memory 308.
- a state which in this case is a flow identification and a routing decision for the flow-ID, for the same input parameters for the routing decision, which state is stored e.g. in the memory 308.
- the processor will check in the memory 308 and detect that this flow already exists, and as a result the packet will be routed over the same tunnel as the previous packets belorxging to the same flow.
- tlxe MR should delete all flow- states pointing to the broken tunnel. Consequently, when the next packet of one of these flows arrives at the MR (i.e. a packet that would have matched one of the deleted flow-states), the MR finds no matching flow-state and selects a new tunnel for the flow according to the above-described principles.
- An individual flow using TCP or SCTP as the transport protocol should not be load- shared over different tunnels, i.e. packets belonging to the same uplink part or downlink part of a flow should not be sent over different tunnels, as this may have negative consequences on the performance of the transport protocol Using different traffic paths for packets belonging to the same TCP flow in the same direction may also cause reordering of the packets, (e.g. TCP). As a result, the TCP sender would retransmit packets unnecessarily and also reduce its transmission rate such that the transmission performance would be lowered.
- a Home agent (HA) 216 is shown.
- the home agent comprises: an external interface 401 for sending and receiving packets; a processor 402 for inspecting the received packets in order to e.g. decide over which tunnel a packet should be sent, based on routing decisions of the mobile router 204; and a memory 403 for storing flow states for previous packets.
- the MR will implicitly instruct the HA how to choose external access.
- the home agent 216 receives via its external interface 401 an encapsulated (i.e. tunnelled) packet from the mobile router 204, the processor 402 in the home agent will inspect the packet.
- the processor will create a state for the downlink part of the flow corresponding to the flow-state created by the mobile router for the uplink part of the flow, using the same principles as the mobile router, based on all of or a subset of source address, destination address, source port, destination port, protocol number and/or flow label for an unencrypted packet and based on all or a subset of source address, destination address, SPI and/or flow label for an encrypted packet.
- Tine created state will be stored, in the memory 403. This flow state will be used for subsequent packets that belongs to the downlink part of the same flow, i.e. that will be sent from the HA to the MR for the same connection.
- the created state points out the same tunnel to use for the subsequent packets belonging to the downlink part of the same flow as was used for the received packet belonging to the uplink part of the flow.
- the Home Agent When the Home Agent intercepts traffic going in the direction towards the mobile router, it will inspect the packet in the same way, look up a. matching state in the memory 403 based on the parameters given above, and via the matching state identify the tunnel to use, which according to an embodiment of the invention will be the same tunnel as was used for the packets belonging to the uplink part of the same flow, and forward the packet to the MR via this tunnel.
- the Home Agent will follow the MR's policy. (I.e. in a sense the MR will be the master and the HA the slave in terms of routing policy).
- the HA If the HA cannot find a matching state for a packet directed to the mobile router, it will use a. default tunnel set for the MR.
- the MR has preferably set one tunnel to default when it registered with its home agent. If the HA has no default tunnel for the MR, it will choose a tunnel arbitrarily.
- the HA will not create a state for a floxv based on a packet received in the direction towards the mobile router. This means that a packet destined for a mobile network node in the moving network, for which packet the HA cannot find a matching state, will not trigger the HA to create a flow- state .
- the HA creates its flow- states solely based on packets arriving from the mobile router. This ensures that the HA follows the routing decisions of the MR.
- the MR does not have to take into account what tunnel a MNN-terminating packet belonging to a new flow arrived through, when making its tunnel selection decision.
- the HA should delete all flow- states pointing to the broken tunnel, and subsequently arriving packets belonging to the affected flows will be treated as packets belonging to previously unidentified flows (as described above) .
- the home agent will store the tunnel used for the uplink part of the flow, together with, a flow-ID, and, when a subsequent packet in the downlink part of the flow is detected, i.e. a packet that is to be sent from the HA to the MR, the HA will choose the same tunnel as is stored for the flow ID, i.e. the same tunnel as was used for the uplink packet.
- the HA may use, at the discretion of the MR, a tunnel for the downlink part of a flow (i.e. from the HA to the MR) that is independent of the tunnel used in the uplink part of the same flow (i.e. from the MR to the HA).
- the mobile router will send explicit routing instructions to the HA, instructions that are separate from any uplink packets for the same connection.
- This embodiment will also cover the case where there is a unidirectional downlink flow, i.e. a downlink part of a flow without any corresponding uplink part for the same flow.
- Selecting a tunnel is equivalent to selecting a caxe-of address, since there is a one-to- one mapping between tunnels and care-of addresses.
- the MR can send explicit instructions to the HA in e.g. the two following ways:
- the MR could send a Binding Update when it wants to send new or changed instructions to the HA, even if no Binding Update is needed from the NEMO Basic Support protocol perspective.
- Tlie instructions can pertain to either:
- a single care-of address (for example the care-of address that was used to convey the instructions);
- the instructions can, according to one exemplary embodiment, include "selection records".
- Each selection record comprises:
- a number of selection parameters e.g. source and destination addresses, source and destination port numbers, protocol number and flow label. All or a subset of all possible selection parameters can be included. Those that are not included implicitly get the value "wildcard", which of course also could be indicated explicitly.
- a wildcard value is a specially reserved value for a field in a message. During a matching procedure (see below) a wildcard value would match any value.
- a care-of address indicating the tunnel to be used for a downlink part of a flow matching the selection parameters. If the care-of address is indicated implicitly by the source address of the instruction message, then the HA fills in the care-of address in the selection record, and, optionally, 3. A priority level.
- Allowing the wildcard value for selection parameters means that a single flow can potentially match more than one selection records. This can also happen even without wildcard values, if the selection parameters that are applicable to a certain flow are identical in two different selection records.
- the priority level is used in embodiments of the invention where identical selection records can occur, to resolve such an ambiguity. If a certain downlink part of a flow matches more than one selection record, the HA should use the selection record with the highest priority level.
- the HA for instance has to choose between two matching selection records having the same priority level, it first checks the selection parameter with the highest importance, then the one with the second highest importance, etc. As soon as a wildcard value is found in one selection record (and the corresponding value for the same selection parameter in the other selection record is not wildcard), then the other selection record is chosen.
- a selection parameter that is not applicable to the concerned flow is considered to have the wildcard value, irrespective of the value that is indicated for the parameter.
- An example of a non- applicable selection parameter is a port number parameter when the flow does not use a transport protocol.
- the HA can receive the instructions, resulting in selection records, in different ways, explicitly or implicitly, but the same selection process is used for all downlink flows and all selection records.
- a mobile router receives a packet from a communication node, it classifies the data packet according to information in the data packet.
- the classification procedure starts with a step of inspecting 501 information in the packet to detect whether the packet belongs to an already recorded flow. If the packet does not belong to a recorded flow 502 , e.g. if it is the first packet in the flow, a routing decision is taken 503 according to information in the data packet and preferably also according to policies residing in the mobile router. Thereafter the routing decision is recorded 504 by recording a flow state comprising the routing decision and a flow identification.
- the routing decision is taken 505 according to the decision stored for ttie recorded flow.
- an access is selected 506 to be used for sending the data packet based on the classification procedure.
- trie packet is sent 507 via the selected access to the home agent.
- the method used in a home agent for routing a packet from the home agent to a mobile router according to the invention is described in a flow chart.
- the method starts with the home agent receiving 601 routing information from the mobile router regarding a first data packet to be sent from the HA to the MR.
- the routing information may either be received in a second data packet belonging to the same flow as the first data packet, but sent in the opposite direction, or it may be received in a separate instruction message.
- the received routing information is then stored 602 e.g. in a memory of the Home Agent together with a flow identification.
- the Home agent receives the first data packet from e.g. a correspondent node, the first data packet is classified 603 according to identification information of the first data packet and according to the stored information.
- the tunnel to be used for sending the first data packet is selected 604 based on the stored routing information for the matched identification.
- the first data packet is sent 605 via the selected tunnel.
- Corresponding means for performing ttie steps according to claims 1-8 may be implemented with computer program software in a Mobile Router. Also, the corresponding means for performing the steps according to claims 9-16 may be implemented with computer program software in a Home Agent.
- the same mechanisms could be applied in an IPv4 environment. That is, the tunnel and flow management mechanisms of the invention can be used in the same way in an IPv4 as in an IPv6 environment.
- the invention can easily be generalized to work for a single mobile communication node instead of a mobile router with a moving network.
- the solution would be based on Mobile IPv6 (or Mobile IPv4) instead of the NEMO basic support protocol, but the principles would be the same.
- the flow management mechanisms When applied to a single communication node, the flow management mechanisms would be applied to the flows originating and terminating in the node itself instead of flows pertaining to mobile network nodes in a moving network.
- the router could be interpreted as residing internally in the single communication node.
- the flow- management can be governed by configured policies, but it is also reasonable that the user of the communication node can affect the flow management manually, by editing the policies or selecting access for a particular flow, through a suitable interface.
- this invention allows the mobile router in a moving network, or a single mobile communication node, to have multiple active tunnels to increase throughput, provide better redundancy and to be able to load-balance/ share the traffic, without downgrading e.g. transport layer characteristics such as TCP measurements or TCP performance by making arbitrary forwarding decisions over different paths per flow.
- This invention also allows the moving network (or the single node) to differentiate traffic to and from each mobile network node in the moving network (or to and from the single communication node) over different accesses. It also allows the moving network (or the single communication node) to differentiate flows over different accesses. Flows of a particular type may be forwarded over a particular access, for instance.
- the invention also allows the moving network (or the single communication node) to differentiate flows over different accesses based on the type of traffic, e.g. based on well-known port numbers associated with certain applications.
- This invention further allows the mobile router (or the single node) to make all decisions on over what access each particular flow is routed.
- the home agent will follow the mobile router's (or the single node's) decisions.
- the mobile router's decisions will be transparent to the mobile network nodes such that the mobile network nodes will not have to support multiple accesses that are available to the moving network, while still being able to use them.
Abstract
Description
Claims
Priority Applications (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US11/718,160 US20080186897A1 (en) | 2004-10-29 | 2004-10-29 | Methods and Nodes in a Communication System for Controlling the Use of Access Resources |
EP04793878A EP1805961B1 (en) | 2004-10-29 | 2004-10-29 | Methods and nodes in a communication system for controlling the use of access resources |
PCT/SE2004/001578 WO2006046896A1 (en) | 2004-10-29 | 2004-10-29 | Methods and nodes in a communication system for controlling the use of access resources |
CA002585155A CA2585155A1 (en) | 2004-10-29 | 2004-10-29 | Methods and nodes in a communication system for controlling the use of access resources |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/SE2004/001578 WO2006046896A1 (en) | 2004-10-29 | 2004-10-29 | Methods and nodes in a communication system for controlling the use of access resources |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2006046896A1 true WO2006046896A1 (en) | 2006-05-04 |
Family
ID=36228076
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/SE2004/001578 WO2006046896A1 (en) | 2004-10-29 | 2004-10-29 | Methods and nodes in a communication system for controlling the use of access resources |
Country Status (4)
Country | Link |
---|---|
US (1) | US20080186897A1 (en) |
EP (1) | EP1805961B1 (en) |
CA (1) | CA2585155A1 (en) |
WO (1) | WO2006046896A1 (en) |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2007149886A1 (en) * | 2006-06-19 | 2007-12-27 | Qualcomm Incorporated | Data routing via lower layers in a communication system |
WO2008106324A2 (en) * | 2007-02-28 | 2008-09-04 | Motorola, Inc. | Wireless wide area broadband coverage in a vehicular area network (van) |
WO2008106297A1 (en) * | 2007-02-28 | 2008-09-04 | Motorola, Inc. | Wireless wide area broadband coverage in a vehicular area network (van) |
WO2011055272A3 (en) * | 2009-11-06 | 2011-06-30 | Telefonaktiebolaget L M Ericsson (Publ) | Virtual care -of address for mobile ip |
US20120036572A1 (en) * | 2009-04-09 | 2012-02-09 | Samsung Sds Co., Ltd. | System-on-a-chip malicious code detection apparatus for a mobile device |
US8677114B2 (en) * | 2007-01-04 | 2014-03-18 | Motorola Solutions, Inc. | Application steering and application blocking over a secure tunnel |
EP2713565A4 (en) * | 2011-05-19 | 2015-03-18 | Huawei Tech Co Ltd | Method and network device for generating tunneling forwarding entries |
EP2372977B1 (en) * | 2008-08-26 | 2015-07-29 | Nomad Spectrum Limited | Method of providing data communication to a vehicle |
Families Citing this family (33)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7636939B2 (en) * | 2004-12-10 | 2009-12-22 | Microsoft Corporation | Endpoint identification and security |
GB2422272A (en) * | 2005-01-14 | 2006-07-19 | King S College London | Network mobility |
US7813314B2 (en) * | 2005-08-02 | 2010-10-12 | Waav Inc. | Mobile router device |
US8588061B2 (en) * | 2005-10-07 | 2013-11-19 | Brixham Solutions Ltd. | Application wire |
KR100819036B1 (en) * | 2005-12-08 | 2008-04-02 | 한국전자통신연구원 | Traffic Authentication Equipment using Packet Header Information and Method thereof |
EP2018711A2 (en) * | 2006-05-16 | 2009-01-28 | Autonet Mobile, Inc. | Mobile router with serial device interface |
US7877506B2 (en) * | 2006-05-26 | 2011-01-25 | International Business Machines Corporation | System, method and program for encryption during routing |
US8009566B2 (en) * | 2006-06-26 | 2011-08-30 | Palo Alto Networks, Inc. | Packet classification in a network security device |
CN101106490B (en) * | 2006-07-11 | 2012-01-04 | 华为技术有限公司 | Establishment method of preset stream classifier and its system and user terminal |
US20100316018A1 (en) * | 2006-12-14 | 2010-12-16 | Zoltan Richard Turanyi | Network-based handover control mechanism |
US7822036B2 (en) * | 2007-03-27 | 2010-10-26 | Alcatel Lucent | Method and system for policy-based routing in a private network-to-network interface protocol based network |
US8594085B2 (en) * | 2007-04-11 | 2013-11-26 | Palo Alto Networks, Inc. | L2/L3 multi-mode switch including policy processing |
US10075376B2 (en) | 2007-04-18 | 2018-09-11 | Waav Inc. | Mobile network operating method |
US7729263B2 (en) * | 2007-08-08 | 2010-06-01 | Honeywell International Inc. | Aircraft data link network routing |
US8811265B2 (en) | 2007-10-19 | 2014-08-19 | Honeywell International Inc. | Ad-hoc secure communication networking based on formation flight technology |
US9264126B2 (en) * | 2007-10-19 | 2016-02-16 | Honeywell International Inc. | Method to establish and maintain an aircraft ad-hoc communication network |
US8570990B2 (en) | 2007-12-04 | 2013-10-29 | Honeywell International Inc. | Travel characteristics-based ad-hoc communication network algorithm selection |
US9467221B2 (en) | 2008-02-04 | 2016-10-11 | Honeywell International Inc. | Use of alternate communication networks to complement an ad-hoc mobile node to mobile node communication network |
US8432922B2 (en) * | 2008-06-03 | 2013-04-30 | Xtera Communications, Inc. | Method for managing IP tunnels |
US8190147B2 (en) | 2008-06-20 | 2012-05-29 | Honeywell International Inc. | Internetworking air-to-air network and wireless network |
US8873556B1 (en) | 2008-12-24 | 2014-10-28 | Palo Alto Networks, Inc. | Application based packet forwarding |
US8891432B2 (en) * | 2009-03-27 | 2014-11-18 | Panasonic Intellectual Property Corporation Of America | Routing method, routing system, mobile node, home agent, and home base station |
KR101317341B1 (en) * | 2009-12-21 | 2013-10-11 | 한국전자통신연구원 | Method for Reducing Packet Ordering Time of Layer 3 Handover and Mobile Satellite Terminal Using the same |
KR20120071721A (en) * | 2010-12-23 | 2012-07-03 | 한국전자통신연구원 | Method and apparatus for supporting mobility based on flow in pmipv6 |
US9047441B2 (en) | 2011-05-24 | 2015-06-02 | Palo Alto Networks, Inc. | Malware analysis system |
US8695096B1 (en) | 2011-05-24 | 2014-04-08 | Palo Alto Networks, Inc. | Automatic signature generation for malicious PDF files |
CN102740428B (en) * | 2012-06-20 | 2015-04-15 | 华为技术有限公司 | Method for regulating and controlling transmitting power and wireless router equipment |
US10104704B2 (en) * | 2014-02-07 | 2018-10-16 | Cisco Technology, Inc. | Dynamic acceleration of prioritized mobile application traffic |
US9755953B1 (en) * | 2014-07-24 | 2017-09-05 | Rockwell Collins, Inc. | Multi-path routing control for an encrypted tunnel |
US11070395B2 (en) * | 2015-12-09 | 2021-07-20 | Nokia Of America Corporation | Customer premises LAN expansion |
EP3417574A1 (en) * | 2016-02-18 | 2018-12-26 | Alcatel Lucent | Data transmission |
CN109587061B (en) * | 2018-11-08 | 2022-04-22 | 华为技术有限公司 | Method, device and equipment for processing route |
US20230188459A1 (en) * | 2021-12-09 | 2023-06-15 | Marvell Israel (M.I.S.L) Ltd. | Hierarchical path selection in a communication network |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20040029555A1 (en) * | 2002-08-09 | 2004-02-12 | Hsien-Ming Tsai | System and method for supporting mobile internet protocol using multiple separate tunnels |
US20040208153A1 (en) * | 2003-04-16 | 2004-10-21 | Jerry Mizell | Policy based mobile IP |
Family Cites Families (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7436830B2 (en) * | 2000-04-03 | 2008-10-14 | P-Cube Ltd. | Method and apparatus for wire-speed application layer classification of upstream and downstream data packets |
US7027400B2 (en) * | 2001-06-26 | 2006-04-11 | Flarion Technologies, Inc. | Messages and control methods for controlling resource allocation and flow admission control in a mobile communications system |
WO2003043226A1 (en) * | 2001-11-14 | 2003-05-22 | Nokia Corporation | MOBILE ROUTER SUPPORT FOR IPv6 |
US7023828B2 (en) * | 2001-11-19 | 2006-04-04 | Motorola, Inc. | Method and apparatus for a mobile node to maintain location privacy from selected correspondent nodes |
US7283472B2 (en) * | 2002-08-30 | 2007-10-16 | Redback Networks Inc. | Priority-based efficient fair queuing for quality of service classification for packet processing |
US7190678B2 (en) * | 2002-10-28 | 2007-03-13 | Cisco Technology, Inc. | Arrangement for router attachments between roaming mobile routers in a clustered network |
CN1729663B (en) * | 2002-12-26 | 2010-10-13 | 松下电器产业株式会社 | Mobile network control device and mobile network control method |
US8146148B2 (en) * | 2003-11-19 | 2012-03-27 | Cisco Technology, Inc. | Tunneled security groups |
US8923256B2 (en) * | 2004-06-24 | 2014-12-30 | Intellectual Ventures I Llc | Transfer of packet data in system comprising mobile terminal, wireless local network and mobile network |
-
2004
- 2004-10-29 CA CA002585155A patent/CA2585155A1/en not_active Abandoned
- 2004-10-29 WO PCT/SE2004/001578 patent/WO2006046896A1/en active Application Filing
- 2004-10-29 US US11/718,160 patent/US20080186897A1/en not_active Abandoned
- 2004-10-29 EP EP04793878A patent/EP1805961B1/en not_active Not-in-force
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20040029555A1 (en) * | 2002-08-09 | 2004-02-12 | Hsien-Ming Tsai | System and method for supporting mobile internet protocol using multiple separate tunnels |
US20040208153A1 (en) * | 2003-04-16 | 2004-10-21 | Jerry Mizell | Policy based mobile IP |
Non-Patent Citations (1)
Title |
---|
WAKIKAWA R.: "Multiple Care-of Adresses Registration", INTERNET DRAFT, 19 June 2004 (2004-06-19), pages 1 - 27, XP015036592, Retrieved from the Internet <URL:http://www.watersprings.org/pub/id/draft-wakikawa-mobileip-multiplecoa-03.txt> * |
Cited By (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2007149886A1 (en) * | 2006-06-19 | 2007-12-27 | Qualcomm Incorporated | Data routing via lower layers in a communication system |
US9049096B2 (en) | 2006-06-19 | 2015-06-02 | Qualcomm Incorporated | Data routing via lower layers in a communication system |
US8677114B2 (en) * | 2007-01-04 | 2014-03-18 | Motorola Solutions, Inc. | Application steering and application blocking over a secure tunnel |
US8144672B2 (en) | 2007-02-28 | 2012-03-27 | Motorola Solutions, Inc. | Wireless wide area broadband coverage in a vehicular area network (VAN) |
WO2008106324A3 (en) * | 2007-02-28 | 2008-10-16 | Motorola Inc | Wireless wide area broadband coverage in a vehicular area network (van) |
WO2008106297A1 (en) * | 2007-02-28 | 2008-09-04 | Motorola, Inc. | Wireless wide area broadband coverage in a vehicular area network (van) |
WO2008106324A2 (en) * | 2007-02-28 | 2008-09-04 | Motorola, Inc. | Wireless wide area broadband coverage in a vehicular area network (van) |
EP2372977B1 (en) * | 2008-08-26 | 2015-07-29 | Nomad Spectrum Limited | Method of providing data communication to a vehicle |
US9497794B2 (en) | 2008-08-26 | 2016-11-15 | Nomad Spectrum Limited | Modification of identifier data to identify intermediate devices |
US20120036572A1 (en) * | 2009-04-09 | 2012-02-09 | Samsung Sds Co., Ltd. | System-on-a-chip malicious code detection apparatus for a mobile device |
US8990931B2 (en) * | 2009-04-09 | 2015-03-24 | Samsung Sds Co., Ltd. | System-on-a-chip malicious code detection apparatus for a mobile device |
WO2011055272A3 (en) * | 2009-11-06 | 2011-06-30 | Telefonaktiebolaget L M Ericsson (Publ) | Virtual care -of address for mobile ip |
EP2713565A4 (en) * | 2011-05-19 | 2015-03-18 | Huawei Tech Co Ltd | Method and network device for generating tunneling forwarding entries |
US9407532B2 (en) | 2011-05-19 | 2016-08-02 | Huawei Technologies Co., Ltd. | Method for generating tunnel forwarding entry and network device |
Also Published As
Publication number | Publication date |
---|---|
US20080186897A1 (en) | 2008-08-07 |
CA2585155A1 (en) | 2006-05-04 |
EP1805961B1 (en) | 2012-12-05 |
EP1805961A1 (en) | 2007-07-11 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP1805961B1 (en) | Methods and nodes in a communication system for controlling the use of access resources | |
JP4690465B2 (en) | Method, communication system and mobile router for routing data packets from a mobile network to a home network of the mobile network | |
AU2003231839B2 (en) | Flow-based selective reverse tunneling in wireless local area network (WLAN) -cellular systems | |
US8249086B2 (en) | Apparatus for flow control | |
KR101367508B1 (en) | Link aggregation in a heterogeneous communication system | |
EP2144416B1 (en) | Mobile network managing apparatus and mobile information managing apparatus for controlling access requests | |
US7746876B2 (en) | Method and mobile routers in a communications system for routing a data packet | |
US20070165572A1 (en) | Method and system for seamless handover of mobile devices in heterogeneous networks | |
US7010299B2 (en) | Method and apparatus for mobility in WLAN systems | |
US20100296443A1 (en) | System, method and apparatus for route-optimized communication for a mobile node nested in a mobile network | |
GB2508355A (en) | Virtual networks on vehicles with redundant bridges providing load sharing and or failover | |
Purohith et al. | Network architecture supporting seamless flow mobility between LTE and WiFi networks | |
JP2010517344A (en) | Data packet header reduction method by route optimization procedure | |
Fikouras et al. | Experimental evaluation of load balancing for mobile internet real-time communications | |
Dawood et al. | Assay of IP mobility management in SDN based mobile network architecture | |
Corici et al. | Optimized low mobility support in massive mobile broadband evolved packet core architecture | |
Dawood et al. | Improvements for DMM in SDN and Virtualization-Based Mobile Network Architecture | |
EP1705866A1 (en) | Flow-based selective reverse tunneling in wireless local area network (WLAN)-cellular systems | |
Chaht et al. | Towards a future mobile multihomed environment | |
Chowdhury et al. | Design Issues for Mobility Management Schemes in Data Networks | |
Bonola et al. | Per-application Mobility Management: Performance Evaluation of the UPMT Solution (SUBMITTED VERSION) | |
EP1733590A1 (en) | Method and system for seamless handover of mobile devices in heterogenous networks |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BW BY BZ CA CH CN CO CR CU CZ DK DM DZ EC EE EG ES FI GB GD GE GM HR HU ID IL IN IS JP KE KG KP KZ LC LK LR LS LT LU LV MA MD MK MN MW MX MZ NA NI NO NZ PG PH PL PT RO RU SC SD SE SG SK SY TJ TM TN TR TT TZ UA UG US UZ VN YU ZA ZM |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): BW GH GM KE LS MW MZ NA SD SZ TZ UG ZM ZW AM AZ BY KG MD RU TJ TM AT BE BG CH CY DE DK EE ES FI FR GB GR HU IE IT MC NL PL PT RO SE SI SK TR BF CF CG CI CM GA GN GQ GW ML MR SN TD TG |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
DPE1 | Request for preliminary examination filed after expiration of 19th month from priority date (pct application filed from 20040101) | ||
WWE | Wipo information: entry into national phase |
Ref document number: 2004793878 Country of ref document: EP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2959/DELNP/2007 Country of ref document: IN |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2585155 Country of ref document: CA |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
WWP | Wipo information: published in national office |
Ref document number: 2004793878 Country of ref document: EP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 11718160 Country of ref document: US |