Patent application number | Description | Published |
20100014455 | ACCESS NETWORK SELECTION - A network, computer readable medium, and method for ranking a plurality of available access networks by a provider, the provider serving a user equipment and the user equipment being configured to connect to at least one of the plurality of available access networks. The method includes receiving a selection request at a selection entity of the provider, where the selection request includes a vector parameter P that includes required characteristics of a data flow for the user equipment, sending from the selection entity a capability request, including the vector parameter P, to the plurality of available access networks, receiving at the selection entity a capability response from the plurality of available access networks, wherein each capability response includes a normalized value expressing a capability of a corresponding available access network to provide the required characteristics of the data flow, and generating a ranking list of the available access networks based on the received normalized values. | 01-21-2010 |
20100054217 | REGISTRATION OF MULTIPLE CARE-OF-ADDRESSES - Systems, methods, devices and software are described which provide for bulk registration of care-of-addresses (CoAs) associated with mobility signaling in communication networks. A mobile node transmits a bulk CoA registration message towards a correspondent node. The correspondent node receives the bulk CoA message, generates tokens associated with the CoAs and transmits the tokens back toward the mobile node. | 03-04-2010 |
20100067446 | EFFICIENT ROUTING BETWEEN A MOBILE NODE AND A CORRESPONDENT NODE IN A PROXY MOBILE IP NETWORK - Methods and nodes are provided for efficiently establishing a route between a mobile node and a correspondent node in a Proxy Mobile Internet Protocol network. A return routability procedure is used between a local mobility anchor and a media access gateway on one hand, and the correspondent node on the other hand. The procedure is made without involvement from the mobile node. The procedure is such that the correspondent node handles return routability as per standard mobile IP mechanisms. Following this return routability procedure, a binding of an address of the mobile node with an address of the media access gateway is stored in the correspondent node. This binding allows data traffic to flow between the mobile node and the correspondent node without passing through the local mobility anchor. | 03-18-2010 |
20100118879 | SESSION CONTINUITY FOR SUPPORT OF SIMULTANEOUS TERMINAL ACCESSES - Methods and nodes are provided for supporting session continuity for terminals capable of having simultaneous accesses while served by a plurality of gateways. Distinct binding cache entries (BCE) are stored for a terminal, each BCE being related to one of the gateways serving the terminal. The BCEs identify the terminal, provide an address allocated thereto for getting access at a gateway, and identify the gateway providing the access. When detection is made that two of more BCEs relate to the same terminal for distinct gateways, address information is sent to each other gateway. | 05-13-2010 |
20100135244 | REDUCTION OF HANDOVER DELAYS IN NESTED PROXY MOBILE IPv6/MOBILE IPv6 NETWORKS - A method for reducing handover delays of a mobile node moving from a first domain to a second domain, those domains being nested in a network, comprises, in a network node that manages connectivity between the first and second domains: establishing procedures for handover of the mobile node in the second domain, wherein establishing the procedures comprises receiving a binding request issued on behalf of the mobile node; and in response to the received binding request, establishing binding procedures in the first domain. Establishing the procedures for handover of the mobile node and the binding procedures occur in an overlapping manner. The network node for carrying such a method comprises a processing module for establishing procedures for handover in the second domain; and a binding processing module, responsive to the received binding request, for establishing binding procedures in the first domain. The processing and binding modules work in an overlapping manner. | 06-03-2010 |
20100154033 | METHOD AND NODES FOR SECURING A COMMUNICATION NETWORK - Methods for securing a communication network comprise the steps of: (in a first node) applying at least one security mechanism to a data packet; and setting a security indicator in the data packet upon application of the at least one security mechanism to the data packet; (in a second node) receiving the data packet; determining if a security indicator is present in the received data packet; applying at least one security mechanism to the received data packet upon determining that the security indicator is not present; and refraining from applying security to the received data packet upon determining that the security indicator is present. A mobile node and access node for securing the communication network, comprise respectively a security application module and a security module, and, an input for receiving a data packet; a security detector and a security application module responsive to the security detector. | 06-17-2010 |
20100296420 | METHOD AND NODES FOR REVOKING A BINDING IN A MOBILE IP NETWORK - A method for revoking a binding from a mobile node, having a least one binding, comprises providing a target binding with the binding revocation message, so that after the revocation, the mobile node can be reached through the target binding. | 11-25-2010 |
20110019610 | METHOD AND APPARATUS FOR PREVENTING TUNNEL LOOPING - The present invention relates to a method and apparatus for preventing endless tunnel looping in a mobile communication network. An originating home agent inserts an extended TEL option into a packet that is being forwarded by the originating home agent. The extended TEL option includes an address of the originating home agent and indicates the original tunnel entry point of the packet. When another home agent receives the forwarded packet containing the extended TEL option, the receiving home agent may send a loop risk indicator (LRI) to the originating home agent to inform the originating home agent of the tunnel looping risk. The originating home agent may then use the conventional TEL option for subsequent packets forwarded during that particular mobility session for the mobile terminal. | 01-27-2011 |
20110051659 | NETWORK PREFIX SELECTION - Method and nodes for selecting a network prefix to be advertised in an IP network comprising an access router and a mobile node (MN). From the access router, a first validity period is used to advertise at least a first and a second network prefixes towards the MN. The access router receives a message from the MN indicating an intended address thereof that it intends to use. In the access router, based on the message, only one of the first or second network prefix that the MN needs to use is then determined. The access router afterwards advertises towards the MN the only one network prefix with a second validity period longer than the first validity period. The access router may further acquire a current address and a current network prefix used by the MN and it may use these in the determination of the only one network prefix. | 03-03-2011 |
20110055551 | METHOD AND NETWORK NODES FOR GENERATING CRYPTOGRAPHICALLY GENERATED ADDRESSES IN MOBILE IP NETWORKS - A method for generating a cryptographically generated address (CGA) comprises steps of: generating, in a network node located on a communication path between a first node and a second node, the network node having unique information of the first node, a cryptographically generated address (CGA) for the first node using the unique information of the first node; and assigning the CGA to the first node. The network node further comprises a generator of CGA for the first node using the unique information of the first node, and an output for assigning the CGA to the first node. | 03-03-2011 |