US20120201198A1 - Method and Apparatus for Route Optimization in a Telecommunication Network - Google Patents

Method and Apparatus for Route Optimization in a Telecommunication Network Download PDF

Info

Publication number
US20120201198A1
US20120201198A1 US13/398,450 US201213398450A US2012201198A1 US 20120201198 A1 US20120201198 A1 US 20120201198A1 US 201213398450 A US201213398450 A US 201213398450A US 2012201198 A1 US2012201198 A1 US 2012201198A1
Authority
US
United States
Prior art keywords
packet
node
mode
address
home
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US13/398,450
Inventor
Zoltán Richárd Turányi
Csaba Keszei
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Telefonaktiebolaget LM Ericsson AB
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to US13/398,450 priority Critical patent/US20120201198A1/en
Assigned to TELEFONAKTIEBOLAGET LM ERICSSON (PUBL) reassignment TELEFONAKTIEBOLAGET LM ERICSSON (PUBL) ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: KESZEI, CSABA, TURANYI, ZOLTAN RICHARD
Publication of US20120201198A1 publication Critical patent/US20120201198A1/en
Abandoned legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/02Processing of mobility data, e.g. registration information at HLR [Home Location Register] or VLR [Visitor Location Register]; Transfer of mobility data, e.g. between HLR, VLR or external networks
    • H04W8/08Mobility data transfer
    • H04W8/082Mobility data transfer for traffic bypassing of mobility servers, e.g. location registers, home PLMNs or home agents
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
    • H04L69/22Parsing or analysis of headers
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W40/00Communication routing or communication path finding
    • H04W40/02Communication route or path selection, e.g. power-based or shortest path routing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W80/00Wireless network protocols or protocol adaptations to wireless operation
    • H04W80/04Network layer protocols, e.g. mobile IP [Internet Protocol]

Definitions

  • the current invention relates to routing of traffic in a telecommunication network. It has particular relevance to traffic from a mobile node in an IP-based mobile telecommunication network.
  • IP address describes a topological location of a node in the network.
  • the IP address is used to route the packet from the source node to the destination.
  • the IP address is generally also used to identify the node, providing two different functions in one entity. This can be considered to be akin to a person responding with their home address when asked who they are.
  • mobility is also considered, the situation becomes even more complicated: since IP addresses act as host identifiers in this scheme, they must not be changed; however, since IP addresses also describe topological locations, they must necessarily change when a host changes its location in the network.
  • the solution is to use a fixed home location providing a “home address” for the node.
  • the home address both identifies the node and provides a stable location for it when it is at home.
  • the current location information is available in the form of a care-of address, which is used for routing purposes when the node is away from home.
  • Cellular networks provide roaming capabilities, where visited networks provide connectivity to roaming users.
  • the traffic of roaming users may be tunnelled back to the home network or it may leave or be terminated in the visited network.
  • Possible reasons for using home tunnelling include: the ability to charge at home; enabling policy control at home; having a mobility anchor at home; providing location privacy; and allowing for the possibility that servers providing user service are in the home network.
  • Possible reasons for local breakout include: optimal routing; shorter (and hence cheaper) access to the Internet; and access to services provided locally in the visited network.
  • IP2 allows full control for the network to decide routing (including home tunnelling or route optimization), it is a complex system requiring IP2 to be implemented at to the visited and home networks and also in the network of the CN. Its complexity makes it unsuitable for a number of purposes.
  • Another form of route optimization is the use of a locally-assigned IP address for communication by the MN instead of the home address. In this case, no specific mechanisms are needed to ensure direct routing between the CN and the MN; however, the transport session may break if the MN moves away. The MN may choose to initiate communication using a locally-assigned address at its own discretion.
  • Mobile IP is a mechanism for maintaining transparent network connectivity to and from a Mobile Node (MN), such as a mobile terminal or telephone over an IP based network.
  • MN Mobile Node
  • Mobile IP enables a Mobile Node to be addressed by the IP address it uses in its home network (Home Address), regardless of the network to which it is currently physically attached. Therefore, ongoing network connections to and from a Mobile Node can be maintained even as the Mobile Node is moving from one subnet to the other.
  • Mobile IP can be implemented using IP protocol version 4, IPv4 or IP protocol version 6, IPv6.
  • IPv6 is generally preferred as IPv4 has a number of limitations in a mobile environment. The IPv6 protocol as such is specified in RFC 2460.
  • each mobile node is always identified by its Home Address. While away from its home IP subnet (Home Subnet) a Mobile Node is also associated with a Care-of Address which indicates the Mobile Node's current location. The association of the Mobile Node's Home Address and the Care-of Address is known as Binding. A router in the Home Subnet, known as the Home Agent, maintains a record of the current Binding of the Mobile Node. The Mobile Node can acquire its Care-of Address through conventional IPv6 mechanisms called auto-configuration at the visited (or foreign) IP subnet.
  • Correspondent Node Any node with which a Mobile Node is communicating is referred to as a Correspondent Node.
  • the Correspondent Node could itself be either mobile or stationary.
  • the first mode bidirectional tunnelling to/from the Home Agent, does not require Mobile IPv6 support from the Correspondent Node and is available even if the Mobile Node has not registered its current Binding with the Correspondent Node.
  • the first mode is illustrated in FIG. 1 .
  • IP packets from the Correspondent Node are routed to the Home Agent and then tunnelled to the Mobile Node.
  • Packets to the Correspondent Node are tunnelled from the Mobile Node to the Home Agent (“reverse tunnelled”) and then routed normally from the Home Network to the Correspondent Node.
  • the Home Agent intercepts any IPv6 packets addressed to the Mobile Node's Home Address and each intercepted packet is tunnelled to the Mobile Node's primary Care-of Address. This tunnelling is performed using IPv6 encapsulation.
  • the second mode requires the Mobile Node to register its current binding at the Correspondent Node.
  • the second mode is illustrated in FIG. 2 .
  • Packets from the Correspondent Node can be routed directly to the Care-of Address of the Mobile Node.
  • the Correspondent Node checks its cached bindings for an entry for the packet's destination address. If a cached binding for this destination address is found, the node uses a new type of IPv6 routing header to route the packet to the Mobile Node by way of the Care-of Address indicated in this binding.
  • a routing header may be present as an IPv6 header extension, and indicates that the payload has to be delivered to a destination socket in some way that is different from what would be carried out by standard receiver host processing.
  • Mobile IPv6 defines a new routing header variant, the type 2 routing header, to allow the packet to be routed directly from a correspondent to the mobile node's care-of address.
  • Use of the term “routing header” typically refers to use of a type 2 routing header.
  • the mobile node's care-of address is inserted into the IPv6 Destination Address field. Once the packet arrives at the care-of address, the mobile node extracts the final destination address (equal to its home address) from the routing header, and delivers the packet to the appropriate socket as if the packet were addressed to the extracted address.
  • the new routing header uses a different type than defined for “regular” IPv6 source routing, enabling firewalls to apply different rules to source routed packets than to Mobile IPv6.
  • This routing header type (type 2) is restricted to carry only one IPv6 address and can only be processed by the final destination and not intermediate routers.
  • All IPv6 nodes which process this routing header must verify that the address contained within is the node's own home address in order to prevent packets from being forwarded outside the node.
  • the IP address contained in the routing header since it is the mobile node's home address, must be a unicast routable address.
  • the mobile node must discard the packet.
  • the Mobile Node registers its current binding at the Correspondent Node using a Binding Update message sent from the Mobile Node to the Correspondent Node (which the Correspondent Node acknowledges with a Binding Update Acknowledgement message).
  • the Binding Update message contains as its destination address the address of the Correspondent Node.
  • the source address of the message is the Care-of Address of the Mobile Node, whilst the home address of the Mobile Node is contained within a home address field of the message header.
  • Route optimisation requires the inclusion of a routing header (a type 2 routing header) in the packet headers, indicating that the packets must be dealt with in a special way.
  • a “proof-of-address” mechanism may be employed.
  • One such mechanism requires that, prior to issuing a (first) Binding Update message, a roaming Mobile Node send to a Correspondent Node a first message (HoTI) to the Correspondent Node employing route optimisation and a second message (CoTI) not employing route optimisation.
  • the second message travels via the Home Agent whilst the second does not.
  • the Correspondent Node replies to the first message with a first part of a random number generated by the Correspondent Node, and replies to the second message with a second part of the random number.
  • the Mobile Node will only receive both parts of the random number if it has given both a valid Care-of Address and a valid Home Address.
  • the Mobile Node includes both parts of the random number in the message to prove ownership of the Care-of and Home Addresses.
  • Route Optimisation allows the Mobile Node to send packets directly to the Correspondent Node.
  • the Care-of Address is included as the source address in these “outgoing” packets. This is done by the Mobile IP protocol layer at the Mobile Node, which replaces the home address with the Care-of Address as the source address in outgoing packets.
  • the Home Address is included in a further header field.
  • the Mobile IP protocol layer at the Correspondent Node screens incoming mails by comparing the source addresses of the packets with Care-of Addresses held in its binding cache. If a match is found, the Care-of Address is replaced with the corresponding Home address, in the source address field, before passing the message to higher layers. Transit through the home network is thus avoided.
  • packets from the Correspondent Node can be routed directly to the Care-of Address of the Mobile Node.
  • the Correspondent Node checks its cached bindings for an entry for the packet's destination address. If a cached binding for this destination address is found, the node substitutes the destination address for the corresponding Care-of Address, whilst including the destination address (i.e. the Home address) in a further header field.
  • the Mobile IP protocol layer replaces the Care-of Address in the destination field with the home address of the Mobile Node. The packet is then passed to higher protocol layers. Again, transit through the home network is avoided.
  • Routing packets directly to the Mobile Node's Care-of Address with ‘route optimization’ allows the shortest communications path to be used. It also eliminates congestion at the Mobile Node's Home Agent. In addition, the impact of any possible failure of the Home Agent or networks on the path to or from it is reduced.
  • a method of controlling the routing of data packets sent from a first node towards a second node of a telecommunication network the first node being a mobile node having an associated home network
  • the method comprising: intercepting such a data packet; determining if the packet relates to a first mode of communication between the first and second nodes in which data packets generally bypass a home agent associated with the first node's home network, through which home agent packets would generally pass in a second mode of communication between the first and second nodes different to the first mode; and dropping the packet if it is so determined and if dropping of the packet is determined to be in accordance with a predetermined routing policy.
  • the method may comprise determining whether the dropping of the packet is in accordance with the routing policy in dependence on the packet's destination address.
  • the destination address may be one of a home address and a care-of address.
  • the method may comprise determining whether the dropping of the packet is in accordance with the routing policy in dependence on the packet's source address.
  • the method may comprise determining that the packet should be dropped if the packet's source address is a local address, unless the delivery of such a packet is allowed by the routing policy according to the packet's destination address.
  • the method may comprise determining whether the dropping of the packet is in accordance with the routing policy in dependence on a routing header in the packet.
  • the method may comprise determining that the packet relates to the first mode of communication if it relates to a control message associated with the first mode.
  • the first mode of communication may be a route optimization mode of the Mobile IP standard and the second mode may be a bidirectional tunnelling mode of the Mobile IP standard.
  • Control messages associated with the first mode may comprise at least one type of IPv6 mobility message.
  • Control messages associated with the first mode may comprise at least one of the following types of message: a Binding Update message; a Home Test Init Message; and a Care-of Test Init message.
  • the method may comprise determining whether the packet relates to the first mode of communication in dependence on at least one of the packet's source and destination address.
  • the second node may be a stationary node.
  • the method may further comprise sending an error message to the first node if the packet is dropped.
  • the error message may be an ICMP Administratively prohibited message.
  • the routing policy may specify at least one IP address range, the routing policy specifying for the or each range whether a packet having a source address that falls within that range is to be dropped or allowed.
  • the routing policy may specify at least one IP address range, the routing policy specifying for the or each range whether a packet having a destination address that falls within that range is to be dropped or allowed.
  • the telecommunication network may be an IP based telecommunication network.
  • the IP network may be based on at least one of the IP protocols IPv4 and IPv6.
  • the method may comprise intercepting the packet in a visited network if the first node has roamed outside of its home network into the visited network, else intercepting the packet in the home network.
  • the routing policy may be stored in the network entity that intercepts the packet.
  • the method may comprise performing the steps in an Access Router.
  • the method may comprise managing the routing policy from a remote location.
  • the method may comprise managing the routing policy remotely via management signalling.
  • the management signalling may use any of the Diameter or COPS protocols.
  • an apparatus for controlling the routing of data packets sent from a first node towards a second node of a telecommunication network the first node being a mobile node having an associated home network
  • the apparatus comprising: means for intercepting such a data packet; means for determining if the packet relates to a first mode of communication between the first and second nodes in which data packets generally bypass a home agent associated with the first node's home network, through which home agent packets would generally pass in a second mode of communication between the first and second nodes different to the first mode; and means for dropping the packet if it is so determined and if dropping of the packet is determined to be in accordance with a predetermined routing policy.
  • a method of controlling the sending of data packets from a first node towards a second node of a telecommunication network the first node being a mobile node having an associated home network
  • the method comprising: not sending such a packet if it would relate to a first mode of communication between the first and second nodes in which data packets generally bypass a home agent associated with the first node's home network, through which home agent packets would generally pass in a second mode of communication between the first and second nodes different to the first mode, unless the sending of such a packet is determined to be in accordance with a predetermined routing policy.
  • the method may comprise determining whether the sending of such a packet is in accordance with the routing policy in dependence on the packet's destination address.
  • the method may comprise determining whether the sending of such a packet is in accordance with the routing policy in dependence on the packet's source address.
  • the method may comprise determining that such a packet would relate to the first mode of communication if it is a control message associated with the first mode.
  • the method may comprise managing the routing policy in dependence on error messages received in response to the previous sending of such packets, the error messages indicating that the packets have been dropped.
  • the routing policy may specify at least one IP address range, the routing policy specifying for the or each range whether a packet having a destination address that falls within that range is allowed to be sent.
  • an apparatus for controlling the sending of data packets from a first node towards a second node of a telecommunication network the first node being a mobile node having an associated home network
  • the apparatus comprising: means for preventing the sending of such a packet if it would relate to a first mode of communication between the first and second nodes in which data packets generally bypass a home agent associated with the first node's home network, through which home agent packets would generally pass in a second mode of communication between the first and second nodes different to the first mode, unless the sending of such a packet is determined to be in accordance with a predetermined routing policy.
  • an operating program which, when run on an apparatus, causes the apparatus to carry out a method according to the first or third aspect of the present invention.
  • an operating program which, when loaded into an apparatus, causes the apparatus to become apparatus according to the second or fourth aspect of the present invention.
  • the operating program may be carried on a carrier medium.
  • the carrier medium may be a transmission medium.
  • the carrier medium may be a storage medium.
  • a problem with the ‘route optimization’ option of the Mobile IP standard is that the Mobile Node's home network has little control over the routing of the traffic flow between the Mobile Node and the Correspondent Node.
  • the bidirectional tunnelling option allows the home network to control functions such as charging, policies, user services etc related to ‘its’ Mobile Node.
  • An embodiment of the present invention retains the benefits of the known ‘route optimization’ method, whilst addressing the above problem relating to the lack of control for the home network.
  • An embodiment of the present invention relates to a policing function and a policing device that can be controlled from a remote location (such as, for example, the home network).
  • a remote location such as, for example, the home network.
  • optimized routing can be controlled and restricted for certain destinations.
  • the policing function and device can be implemented in an Access Router (AR) or in the Mobile Node or a combination of these.
  • a management protocol is used.
  • the home network is able to exercise more control over how or whether a terminal does route optimization (the Visited Network or a third party policy repository may also exercise this control; additionally, a combination of home and visited network policies is also possible).
  • the Visited Network or a third party policy repository may also exercise this control; additionally, a combination of home and visited network policies is also possible).
  • One element may be a policing unit in the MN's Access Router (AR, or other access node), which checks BU messages sent by MN's and/or user data packets. It is able to reject those messages and/or traffic if the MN is not entitled to perform route optimization towards that particular CN.
  • AR Access Router
  • An embodiment of the present invention thereby enables network operators of the home network to have more control of the routing of ‘its’ mobile node.
  • An embodiment of the present invention also arrives at the same technical result as more complex solutions previously known.
  • An embodiment of the present invention provides a method of controlling the flow of IP packets between a Mobile Node and Correspondent Nodes over an IP network, where the Mobile Node has a subscription to a home network and is currently attached to a different, visited network, the method comprising: installing flow control policies at the Mobile Node and/or at an access router of the visited network, from the home network, these policies identifying IP addresses which the Mobile Node may communicate with without having to route packets via the home network; and at the Mobile Node and/or at the access router, rejecting at least certain packets sent directly to prohibited IP addresses.
  • An advantage of an embodiment of the invention is that the solution may be used by an operator of the home network to provide more control of the routing of traffic associated with its mobile nodes.
  • the allowed IP addresses of the flow control policies may be defined by one or both of a set of allowed IP addresses and a set of prohibited IP addresses.
  • a set of addresses may be specified as one or more address ranges.
  • said flow control policies cause the Mobile Node and/or the access router to intercept packets associated with a route optimisation procedure as defined for Mobile IP. Only packets relating to a Binding process may be intercepted, e.g. a Binding Update message or a HoTI/CoTI message, and their destination addresses subjected to comparison with allowed or denied addresses.
  • the method comprises comparing the destination address of a packet at the Mobile Node or access router against IP addresses identified by the policies. Additionally, where the packet contains a type 2 Routing Header according to Mobile IP, the method may comprise comparing the type 2 Routing Header address against IP addresses identified by the policies, the message being rejected either the destination address or the type 2 Routing Header address is disallowed.
  • the flow control policies may comprise a rule disallowing the sending of packets from the Mobile Node and which have a local address of the visited network as source address. This may be used to prevent the Mobile Node setting up direct, i.e. non-Mobile IP based, sessions with a Correspondent Node.
  • said flow control policies are installed at the access router.
  • a notification may be sent to the Mobile Node.
  • the Mobile Node may record this fact to prevent subsequent retries at sending the same packet.
  • the Mobile Node may record the error message to prevent subsequent attempts to communicate directly or perform route optimisation with the same Correspondent Node.
  • the policing function and device can be implemented in an Access Router (AR) or in the Mobile Node.
  • AR Access Router
  • Mobile Node Mobile Node
  • a management protocol is used.
  • said access router may be a GPRS Gateway Support Node (GGSN), in which case the policies are installed in the GGSN via a Policy Charging Rules Function (PCRF) of the visited network.
  • GGSN GPRS Gateway Support Node
  • PCRF Policy Charging Rules Function
  • the home network may deliver general policy statements to the visited network, the visited network translating these statements into explicit IP addresses or address ranges.
  • the visited network may install its own policies into the access router and/or Mobile Node in addition to those installed by the home network.
  • FIG. 1 illustrates the bidirectional tunnelling mode of Mobile IP
  • FIG. 2 also discussed hereinbefore, illustrates the route optimization mode of Mobile IP
  • FIG. 3 is a block diagram showing an Access Router according to an embodiment of the present invention.
  • FIG. 4 is a block diagram showing a Mobile Node according to an embodiment of the present invention.
  • An embodiment of the present invention proposes extensions to the Mobile Node and/or in one or more of the Access Routers described above with reference to FIGS. 1 and 2 .
  • FIGS. 3 and 4 Before specific embodiments of the present invention are described with reference to FIGS. 3 and 4 , an overview of techniques embodying the present invention will first be provided.
  • the first approach relies upon policy enforcement at access routers within a visited network.
  • the other approach relies upon policy enforcement at the Mobile Node.
  • an allowed and/or disallowed set of IP addresses typically in the form of address ranges.
  • an allowed range of address may be IP addresses belonging to the home network and/or to the visited network.
  • the list(s) is(are) contained in a subscriber profile downloaded by the access router at registration of a subscriber.
  • this profile is obtained from the subscriber's home network (HSS) by a Policy Charging Rules Function (PCRF) which installs the profile into the access router (in this case a GPRS Gateway Support Node or GGSN).
  • HSS subscriber's home network
  • PCRF Policy Charging Rules Function
  • Packets received at the access router from a visiting Mobile Node are screened to identify packets which relate to Route Optimisation: in particular, Binding Update messages (and/or HoTO and CoTI messages where employed) are intercepted by the access router. When such packets are identified, the destination address of the packet is compared against the IP addresses contained in the allowed and/or denied lists.
  • a destination address is an allowed address
  • the message is allowed to proceed through the access router.
  • the access router will drop the message and respond to the Mobile Node with an error message, e.g. an Internet Control Message Protocol (ICMP) message.
  • ICMP Internet Control Message Protocol
  • the Mobile Node may drop repeat attempts to implement route optimisation with the same Correspondent Node.
  • the Mobile Node may include functionality that places a flag against Correspondent Node addresses (e.g. in an address book) to indicate that route optimisation is disallowed for these Correspondent Nodes.
  • the policy control function may check not only the destination address field of the IP packet, but also any type 2 Routing Headers, as the Correspondent Node itself can be mobile.
  • the policy may allow or disallow packets to type 2 Routing Headers according to the same lists defined for destination addresses (at the discretion of the home network).
  • a Mobile Node will only attempt to communicate directly with a Correspondent Node using the route optimisation procedure.
  • a Mobile Node may try to circumvent the solution, deliberately or not, by communicating directly with a Correspondent Node without invoking Mobile IP, i.e. omitting the Mobile IP header from packets and including the Care-of Address as the source address and the address of the Correspondent Node as the destination address.
  • the resulting IP session would be terminated when the Mobile Node switches to a new access router, but this may not be a problem for say web browsing where a new (Care-of) IP address is allocated for each web download.
  • a solution to this problem is to implement a policy at the access router which rejects outgoing packets where the source address of the packets is a local address (of the access router) and where the IP address of the Correspondent Node is disallowed for the Mobile Node.
  • the access router may check if there is a Home Address Destination option in the outgoing packet. If so, then it is a packet sent using MIPv6 route optimisation. If not, then it is simply a packet sent from the local destination.
  • the policy list may include rules for either or both cases.
  • the units of the AR can also govern the use of a local IP address by the MN for communication. That is, a second list can be managed in the AR and allow the MN to communicate toward CNs, which are positively on the list using a local IP address as source address. Such communication achieves optimal routing between CN and MN and, in addition, it omits the overhead of MIPv6 route optimization (at the expense of sessions breaking at handover).
  • Policy control may be based upon one or a combination of the approaches described above.
  • An alternative approach to policy enforcement is to implement the enforcement function at the Mobile Node as opposed to the access router. This might employ either or both of the approaches described above, i.e. the message type approach and the source address approach.
  • the allowed and/or denied lists may be managed by the home network using an explicit Mobile Node to home network protocol.
  • Policies may be pushed to the Mobile Node, e.g. using the Short Messaging Service.
  • Some anti-tampering functionality may be required at the Mobile Node to prevent users altering the policies defined by the home network.
  • FIG. 3 is a block diagram showing an Access Router 10 according to an embodiment of the present invention.
  • the Access Router 10 comprises a Binding Update (BU) Checking Unit 12 , a Traffic Checking Unit 14 , a List Storage Unit 16 , and a List
  • BU Binding Update
  • the AR 10 here refers to the AR in the visited network of the MN (or its home network if no roaming is involved); no changes would be required in the AR of the CN.
  • Both the Binding Update Checking Unit 12 and the Traffic Checking Unit 14 have access to a list of IPv6 address ranges stored in the List Storage Unit 16 that specify which CNs a particular MN is allowed to perform route optimization toward.
  • a list can contain a combination of allow/deny rules.
  • the list may be managed from the home network, visited network, a combination of the two, or from an independent policy repository, using the List Managing Unit 18 of the Access Router 10 .
  • the list items may refer to any or both of the local or home address of the CNs.
  • the Binding Update Checking Unit 12 captures each packet sent by a MN and checks if it formed as a BU message and/or a Home Test Init (HoTI) message and/or a Care-of Test Init (CoTI) message. If yes, and the destination CN is not allowed according to the list in the List Storage Unit 16 , the AR 10 drops the message and responds with an error message, such as an ICMP (Internet Control Message Protocol) Administratively prohibited (or other) message. Sending an error message is not required but may enhance performance, as the MN will then drop the attempt for route optimization without lengthy retries, if it understands the reply.
  • ICMP Internet Control Message Protocol
  • the Traffic Checking Unit 14 captures each packet sent to a CN and discards any packet that is sent to a CN with a local IP address as the source address, unless the CN address is allowed by the list of IPv6 addresses in the List Storage Unit 16 .
  • the unit 14 may check if there is a Home Address Destination option in the uplink packet. If so, then it is a packet sent using MIPv6 route optimization. If not, then it is simply a packet sent from the local destination.
  • the policy list may include rules for either or both cases.
  • the two units 12 and 14 can be used in conjunction, and may each have separate policy lists in the List Storage Unit 16 .
  • the units 12 and 14 check not only the Destination Address field of the IP packet, but also any potential type 2 Routing Headers, as the CN itself might be mobile too. In case of a mobile CN, the policy of the list might be applied to both the home and care-of address of the CN, at the discretion of the Home Network, for example.
  • MIPv6 route optimization applications use the home address of the MN, so that sockets are bound to that address in both the MN and CN. Additional mechanisms (MIPv6 route optimization) are used to still deliver the packets directly between the MN and CN (that is using their local or care-of addresses).
  • the units 12 and 14 of the AR 10 can also govern the use of a local IP address by the MN for communication. That is, a further list can be managed by the List Managing Unit 18 in the List Storage Unit 16 of the AR 10 , and allow the MN to communicate toward CNs that are positively on the further list, using a local IP address as source address. With the further list, the AR 10 looks for non-MIPv6 route optimization packets and checks the destination of those. Such communication achieves optimal routing between CN and MN and, in addition, omits the overhead of MIPv6 route optimization. This alternative is weaker, as sessions break on mobility, but is still attractive; for example Web browsing may not need such mobility.
  • an embodiment of the present invention does not require the MN to have any extensions over existing Mobile Nodes; the MN will try to initiate route optimization towards CNs with which it frequently communicates, and will simply be rejected if such is not allowed.
  • a MN that does have extensions over existing Mobile Nodes will now be described with reference to FIG. 4 ; the MN of FIG. 4 can be used in conjunction with, or instead of, the extensions to the AR described above with reference to FIG. 3 .
  • the MN of FIG. 4 comprises a unit that decides on route optimization.
  • FIG. 4 is a block diagram showing a Mobile Node 30 according to an embodiment of the present invention.
  • the mobile Node 30 comprises a Route Optimization Decision Unit 32 , a Message Checking Unit 34 , a List Storage Unit 36 , a List Managing Unit 38 and a MIPv6 Unit 40 .
  • the Route Optimization Decision Unit 32 has access to a list of IPv6 address ranges stored in the List Storage Unit 36 similar to the lists described above with reference to the Access Router 10 of FIG. 3 , specifying which CNs the MN 30 is allowed to perform route optimization toward.
  • the list in the List Storage Unit 36 is managed from the home network, using the List Managing Unit 38 of the Mobile Node 30 .
  • the Route Optimization Decision Unit 32 of the Mobile Node 30 will only cause route optimization to be initiated towards those CNs whose address is allowed by the list in the List Storage Unit 36 .
  • An explicit Home Network to MN protocol can be applied in this case.
  • the list is managed by using the Message Checking Unit 34 to intercept the ICMP (Internet Control Message Protocol) Administratively Prohibited messages, sent by the AR 10 in response to MIPv6 Route Optimization signalling messages as described above with reference to FIG. 3 .
  • the List Managing Unit 38 of the MN 30 would then put the destination CN in question on the list (with prohibit flag) stored in the List Storage Unit 36 , and this would prevent the Optimization Decision Unit 32 attempting to initiate route optimization towards those destinations using the MIPv6 Unit 40 .
  • the Optimization Decision Unit 32 of the MN 30 can also govern the use of a local IP address for communication. That is, a further list can be managed in the MN 30 and communication toward CNs that are positively on the list can be then performed using a local IP address. Such communication achieves optimal routing between CN and MN and, in addition, omits the overhead of MIPv6 route optimization (at the expense of possible session breaking at handover). This is also discussed above in relation to FIG. 3 .
  • the visited network executes some of these services (or components thereof) on behalf of the home network based on a roaming agreement between the home and visited network operators.
  • the home network Since the home network is responsible to provide the service, it needs complete control over how the service is delivered. Part of the benefit of an embodiment of the present invention derives from the possibility for the home network to control route optimization (i.e., one aspect of service delivery).
  • Route optimization i.e., one aspect of service delivery.
  • Existing policy control nodes and interfaces e.g., of the 3GPP or TISPAN architectures, where TISPAN is the Telecoms & Internet converged Services & Protocols for Advanced Networks
  • route optimization control e.g., of the 3GPP or TISPAN architectures, where TISPAN is the Telecoms & Internet converged Services & Protocols for Advanced Networks
  • the home network would send a list of IP address ranges for which to allow or deny route optimization, for example when the MN attaches to the visited network. (The home network would also specify for each item on the list whether that item is allowed or denied as a local or home CN address.)
  • the home network may also dynamically adjust the initial list, for example when a particular service is instantiated and for example when the address of a serving network node becomes known.
  • the visited network can also play a part in composing the address list.
  • the home network might send only a general description for parts of the list instead of specific IP address ranges.
  • Such a description could relate, for example, to particular services, user groups situations and correspondent nodes. Examples include:
  • home networks are able to control route optimization for their MN's traffic.
  • the assistance of the visited network is usually required and assumed.
  • the home network may execute various policies, such as:
  • a management protocol is used. This protocol can be based on enhancements to known protocols such as the COPS (Common Open Policy Service) protocol (RFC 2748), the Diameter protocol (RFC3588, RFC4004) or it can also be an explicit new protocol.
  • COPS Common Open Policy Service
  • RFC3588, RFC4004 the Diameter protocol
  • the most common situation is to manage the lists from the home network as it is the network operator for the home network that wants to control how the mobile node performs route optimization.
  • operation of one or more of the above-described components can be controlled by a program operating on the device or apparatus.
  • Such an operating program can be stored on a computer-readable medium, or could, for example, be embodied in a signal such as a downloadable data signal provided from an Internet website.
  • the appended claims are to be interpreted as covering an operating program by itself, or as a record on a carrier, or as a signal, or in any other form.

Abstract

A method, access node, and mobile node for controlling the routing of a data packet sent from the mobile node towards a correspondent node of a foreign Internet Protocol (IP)-based telecommunication network different from a home network associated with the mobile node. The access router intercepts the data packet and determines whether the packet relates to a route optimization mode of the Mobile IP standard in which data packets bypass a home agent associated with the mobile node's home network, or whether the packet relates to a bidirectional tunneling mode of the Mobile IP standard in which home agent packets pass through the home agent. The access router drops the packet when the packet relates to the route optimization mode and when dropping of the packet is determined to be in accordance with the predetermined routing policy.

Description

    BACKGROUND OF THE INVENTION
  • 1. Field of the Invention
  • The current invention relates to routing of traffic in a telecommunication network. It has particular relevance to traffic from a mobile node in an IP-based mobile telecommunication network.
  • 2. Description of the Related Art
  • When the Internet was originally devised, hosts were fixed in location and there was implicit trust between users despite the lack of real security or host identification protocols, and this situation continued even upon wider uptake and use of the technology. There was little need to consider techniques for dealing with host mobility since computers were relatively bulky and immobile.
  • With the revolution in telecommunications and computer industry in the early 1990's, smaller communication equipment and computers became more widely available and the invention of the World Wide Web, and all the services that emerged with it, finally made the Internet attractive for the average person. The combination of increasing usage of the network and mobile telecommunications created the need for secure mobility management in the Internet.
  • Taking into account the above mobility management, the Mobile IP standard (C. Perkins, “IP Mobility Support for IPv4”, RFC 3220, IETF, 2002) and the Mobile IPv6 standard (D. Johnson, C. Perkins, J. Arkko, “Mobility Support in IPv6”, RFC3775, IETF, 2004) have been introduced. Together these specifications are planned to provide mobility support for the next generation Internet.
  • An IP address describes a topological location of a node in the network. The IP address is used to route the packet from the source node to the destination. At the same time the IP address is generally also used to identify the node, providing two different functions in one entity. This can be considered to be akin to a person responding with their home address when asked who they are. When mobility is also considered, the situation becomes even more complicated: since IP addresses act as host identifiers in this scheme, they must not be changed; however, since IP addresses also describe topological locations, they must necessarily change when a host changes its location in the network.
  • With Mobile IP, the solution is to use a fixed home location providing a “home address” for the node. The home address both identifies the node and provides a stable location for it when it is at home. The current location information is available in the form of a care-of address, which is used for routing purposes when the node is away from home.
  • Cellular networks provide roaming capabilities, where visited networks provide connectivity to roaming users. The traffic of roaming users may be tunnelled back to the home network or it may leave or be terminated in the visited network. Possible reasons for using home tunnelling include: the ability to charge at home; enabling policy control at home; having a mobility anchor at home; providing location privacy; and allowing for the possibility that servers providing user service are in the home network. Possible reasons for local breakout include: optimal routing; shorter (and hence cheaper) access to the Internet; and access to services provided locally in the visited network.
  • The following two mechanisms for providing home tunnelling and optimal routing (local breakout) dynamically while being reachable at the same IP address are known:
      • IP2, where route optimization is entirely network centric.
      • The Mobile IP standard, as mentioned above, where Mobile Nodes (MN) themselves send location update messages (Binding Updates, BU) to Correspondent Nodes (CN). Then Correspondent Nodes direct their traffic to the current location of the MN.
  • While IP2 allows full control for the network to decide routing (including home tunnelling or route optimization), it is a complex system requiring IP2 to be implemented at to the visited and home networks and also in the network of the CN. Its complexity makes it unsuitable for a number of purposes.
  • Another form of route optimization (albeit a less powerful one) is the use of a locally-assigned IP address for communication by the MN instead of the home address. In this case, no specific mechanisms are needed to ensure direct routing between the CN and the MN; however, the transport session may break if the MN moves away. The MN may choose to initiate communication using a locally-assigned address at its own discretion.
  • The Mobile IP standard will now be described in more detail with reference to FIGS. 1 and 2 of the accompanying drawings.
  • Mobile IP is a mechanism for maintaining transparent network connectivity to and from a Mobile Node (MN), such as a mobile terminal or telephone over an IP based network. Mobile IP enables a Mobile Node to be addressed by the IP address it uses in its home network (Home Address), regardless of the network to which it is currently physically attached. Therefore, ongoing network connections to and from a Mobile Node can be maintained even as the Mobile Node is moving from one subnet to the other. Mobile IP can be implemented using IP protocol version 4, IPv4 or IP protocol version 6, IPv6. IPv6 is generally preferred as IPv4 has a number of limitations in a mobile environment. The IPv6 protocol as such is specified in RFC 2460.
  • In Mobile IPv6, each mobile node is always identified by its Home Address. While away from its home IP subnet (Home Subnet) a Mobile Node is also associated with a Care-of Address which indicates the Mobile Node's current location. The association of the Mobile Node's Home Address and the Care-of Address is known as Binding. A router in the Home Subnet, known as the Home Agent, maintains a record of the current Binding of the Mobile Node. The Mobile Node can acquire its Care-of Address through conventional IPv6 mechanisms called auto-configuration at the visited (or foreign) IP subnet.
  • Any node with which a Mobile Node is communicating is referred to as a Correspondent Node. The Correspondent Node could itself be either mobile or stationary.
  • There are two possible modes for communications between the Mobile Node and the Correspondent Node. The first mode, bidirectional tunnelling to/from the Home Agent, does not require Mobile IPv6 support from the Correspondent Node and is available even if the Mobile Node has not registered its current Binding with the Correspondent Node. The first mode is illustrated in FIG. 1. IP packets from the Correspondent Node are routed to the Home Agent and then tunnelled to the Mobile Node. Packets to the Correspondent Node are tunnelled from the Mobile Node to the Home Agent (“reverse tunnelled”) and then routed normally from the Home Network to the Correspondent Node. In this mode, the Home Agent intercepts any IPv6 packets addressed to the Mobile Node's Home Address and each intercepted packet is tunnelled to the Mobile Node's primary Care-of Address. This tunnelling is performed using IPv6 encapsulation.
  • The second mode, referred to as ‘route optimization’, requires the Mobile Node to register its current binding at the Correspondent Node. The second mode is illustrated in FIG. 2. Packets from the Correspondent Node can be routed directly to the Care-of Address of the Mobile Node. When sending a packet to an IPv6 destination, the Correspondent Node checks its cached bindings for an entry for the packet's destination address. If a cached binding for this destination address is found, the node uses a new type of IPv6 routing header to route the packet to the Mobile Node by way of the Care-of Address indicated in this binding.
  • In this regard, a routing header may be present as an IPv6 header extension, and indicates that the payload has to be delivered to a destination socket in some way that is different from what would be carried out by standard receiver host processing. Mobile IPv6 defines a new routing header variant, the type 2 routing header, to allow the packet to be routed directly from a correspondent to the mobile node's care-of address. Use of the term “routing header” typically refers to use of a type 2 routing header. The mobile node's care-of address is inserted into the IPv6 Destination Address field. Once the packet arrives at the care-of address, the mobile node extracts the final destination address (equal to its home address) from the routing header, and delivers the packet to the appropriate socket as if the packet were addressed to the extracted address.
  • The new routing header uses a different type than defined for “regular” IPv6 source routing, enabling firewalls to apply different rules to source routed packets than to Mobile IPv6. This routing header type (type 2) is restricted to carry only one IPv6 address and can only be processed by the final destination and not intermediate routers.
  • All IPv6 nodes which process this routing header must verify that the address contained within is the node's own home address in order to prevent packets from being forwarded outside the node. The IP address contained in the routing header, since it is the mobile node's home address, must be a unicast routable address.
  • Furthermore, if the scope of the home address is smaller than the scope of the care-of address, the mobile node must discard the packet.
  • With route optimization, the Mobile Node registers its current binding at the Correspondent Node using a Binding Update message sent from the Mobile Node to the Correspondent Node (which the Correspondent Node acknowledges with a Binding Update Acknowledgement message). The Binding Update message contains as its destination address the address of the Correspondent Node. The source address of the message is the Care-of Address of the Mobile Node, whilst the home address of the Mobile Node is contained within a home address field of the message header. Route optimisation requires the inclusion of a routing header (a type 2 routing header) in the packet headers, indicating that the packets must be dealt with in a special way.
  • In order to enhance security of the Optimised Routing process, a “proof-of-address” mechanism may be employed. One such mechanism requires that, prior to issuing a (first) Binding Update message, a roaming Mobile Node send to a Correspondent Node a first message (HoTI) to the Correspondent Node employing route optimisation and a second message (CoTI) not employing route optimisation. The second message travels via the Home Agent whilst the second does not. The Correspondent Node replies to the first message with a first part of a random number generated by the Correspondent Node, and replies to the second message with a second part of the random number. The Mobile Node will only receive both parts of the random number if it has given both a valid Care-of Address and a valid Home Address. When the Binding Update is subsequently sent to the Correspondent Node, the Mobile Node includes both parts of the random number in the message to prove ownership of the Care-of and Home Addresses.
  • Once implemented, Route Optimisation allows the Mobile Node to send packets directly to the Correspondent Node. The Care-of Address is included as the source address in these “outgoing” packets. This is done by the Mobile IP protocol layer at the Mobile Node, which replaces the home address with the Care-of Address as the source address in outgoing packets. The Home Address is included in a further header field. The Mobile IP protocol layer at the Correspondent Node screens incoming mails by comparing the source addresses of the packets with Care-of Addresses held in its binding cache. If a match is found, the Care-of Address is replaced with the corresponding Home address, in the source address field, before passing the message to higher layers. Transit through the home network is thus avoided.
  • Considering the reverse direction, packets from the Correspondent Node can be routed directly to the Care-of Address of the Mobile Node. When sending a packet to an IPv6 destination, the Correspondent Node checks its cached bindings for an entry for the packet's destination address. If a cached binding for this destination address is found, the node substitutes the destination address for the corresponding Care-of Address, whilst including the destination address (i.e. the Home address) in a further header field. Upon receipt of a packet at the Mobile Node, the Mobile IP protocol layer replaces the Care-of Address in the destination field with the home address of the Mobile Node. The packet is then passed to higher protocol layers. Again, transit through the home network is avoided.
  • Routing packets directly to the Mobile Node's Care-of Address with ‘route optimization’ allows the shortest communications path to be used. It also eliminates congestion at the Mobile Node's Home Agent. In addition, the impact of any possible failure of the Home Agent or networks on the path to or from it is reduced.
  • However, the possibility of ‘route optimization’ that MIPv6 provides leads to a very terminal centric solution, as the establishment of home address to care-of address bindings in the correspondent node is decided, initiated and executed by the mobile node itself. This does not allow network operators to influence whether traffic is tunnelled home or routed locally. For example, home networks have no influence if a particular piece of traffic is route via them or not. This is true even if the visited network fully co-operates with the home network in this regard. The simple use of a local IP address is also decided by the terminal. If (home) network control of route optimization is requested, the use of local addresses needs to be controlled too.
  • It is desirable to address the above-mentioned issues concerning the existing approaches.
  • SUMMARY OF THE INVENTION
  • According to a first aspect of the present invention there is provided a method of controlling the routing of data packets sent from a first node towards a second node of a telecommunication network, the first node being a mobile node having an associated home network, and the method comprising: intercepting such a data packet; determining if the packet relates to a first mode of communication between the first and second nodes in which data packets generally bypass a home agent associated with the first node's home network, through which home agent packets would generally pass in a second mode of communication between the first and second nodes different to the first mode; and dropping the packet if it is so determined and if dropping of the packet is determined to be in accordance with a predetermined routing policy.
  • The method may comprise determining whether the dropping of the packet is in accordance with the routing policy in dependence on the packet's destination address.
  • The destination address may be one of a home address and a care-of address.
  • The method may comprise determining whether the dropping of the packet is in accordance with the routing policy in dependence on the packet's source address.
  • The method may comprise determining that the packet should be dropped if the packet's source address is a local address, unless the delivery of such a packet is allowed by the routing policy according to the packet's destination address.
  • The method may comprise determining whether the dropping of the packet is in accordance with the routing policy in dependence on a routing header in the packet.
  • The method may comprise determining that the packet relates to the first mode of communication if it relates to a control message associated with the first mode.
  • The first mode of communication may be a route optimization mode of the Mobile IP standard and the second mode may be a bidirectional tunnelling mode of the Mobile IP standard.
  • Control messages associated with the first mode may comprise at least one type of IPv6 mobility message.
  • Control messages associated with the first mode may comprise at least one of the following types of message: a Binding Update message; a Home Test Init Message; and a Care-of Test Init message.
  • The method may comprise determining whether the packet relates to the first mode of communication in dependence on at least one of the packet's source and destination address.
  • The second node may be a stationary node.
  • The method may further comprise sending an error message to the first node if the packet is dropped.
  • The error message may be an ICMP Administratively prohibited message.
  • The routing policy may specify at least one IP address range, the routing policy specifying for the or each range whether a packet having a source address that falls within that range is to be dropped or allowed.
  • The routing policy may specify at least one IP address range, the routing policy specifying for the or each range whether a packet having a destination address that falls within that range is to be dropped or allowed.
  • The telecommunication network may be an IP based telecommunication network.
  • The IP network may be based on at least one of the IP protocols IPv4 and IPv6.
  • The method may comprise intercepting the packet in a visited network if the first node has roamed outside of its home network into the visited network, else intercepting the packet in the home network.
  • The routing policy may be stored in the network entity that intercepts the packet.
  • The method may comprise performing the steps in an Access Router.
  • The method may comprise managing the routing policy from a remote location.
  • The method may comprise managing the routing policy remotely via management signalling.
  • The management signalling may use any of the Diameter or COPS protocols.
  • According to a second aspect of the present invention there is provided an apparatus for controlling the routing of data packets sent from a first node towards a second node of a telecommunication network, the first node being a mobile node having an associated home network, and the apparatus comprising: means for intercepting such a data packet; means for determining if the packet relates to a first mode of communication between the first and second nodes in which data packets generally bypass a home agent associated with the first node's home network, through which home agent packets would generally pass in a second mode of communication between the first and second nodes different to the first mode; and means for dropping the packet if it is so determined and if dropping of the packet is determined to be in accordance with a predetermined routing policy.
  • According to a third aspect of the present invention there is provided a method of controlling the sending of data packets from a first node towards a second node of a telecommunication network, the first node being a mobile node having an associated home network, and the method comprising: not sending such a packet if it would relate to a first mode of communication between the first and second nodes in which data packets generally bypass a home agent associated with the first node's home network, through which home agent packets would generally pass in a second mode of communication between the first and second nodes different to the first mode, unless the sending of such a packet is determined to be in accordance with a predetermined routing policy.
  • The method may comprise determining whether the sending of such a packet is in accordance with the routing policy in dependence on the packet's destination address.
  • The method may comprise determining whether the sending of such a packet is in accordance with the routing policy in dependence on the packet's source address.
  • The method may comprise determining that such a packet would relate to the first mode of communication if it is a control message associated with the first mode.
  • The method may comprise managing the routing policy in dependence on error messages received in response to the previous sending of such packets, the error messages indicating that the packets have been dropped.
  • The routing policy may specify at least one IP address range, the routing policy specifying for the or each range whether a packet having a destination address that falls within that range is allowed to be sent.
  • According to a fourth aspect of the present invention there is provided an apparatus for controlling the sending of data packets from a first node towards a second node of a telecommunication network, the first node being a mobile node having an associated home network, and the apparatus comprising: means for preventing the sending of such a packet if it would relate to a first mode of communication between the first and second nodes in which data packets generally bypass a home agent associated with the first node's home network, through which home agent packets would generally pass in a second mode of communication between the first and second nodes different to the first mode, unless the sending of such a packet is determined to be in accordance with a predetermined routing policy.
  • According to a fifth aspect of the present invention there is provided an operating program which, when run on an apparatus, causes the apparatus to carry out a method according to the first or third aspect of the present invention.
  • According to a sixth aspect of the present invention there is provided an operating program which, when loaded into an apparatus, causes the apparatus to become apparatus according to the second or fourth aspect of the present invention.
  • The operating program may be carried on a carrier medium. The carrier medium may be a transmission medium. The carrier medium may be a storage medium.
  • As described above, a problem with the ‘route optimization’ option of the Mobile IP standard is that the Mobile Node's home network has little control over the routing of the traffic flow between the Mobile Node and the Correspondent Node. The bidirectional tunnelling option, on the other hand, allows the home network to control functions such as charging, policies, user services etc related to ‘its’ Mobile Node.
  • An embodiment of the present invention retains the benefits of the known ‘route optimization’ method, whilst addressing the above problem relating to the lack of control for the home network.
  • An embodiment of the present invention relates to a policing function and a policing device that can be controlled from a remote location (such as, for example, the home network). By using this policing function, optimized routing can be controlled and restricted for certain destinations. The policing function and device can be implemented in an Access Router (AR) or in the Mobile Node or a combination of these.
  • To manage the lists from a remote location, a management protocol is used.
  • In this way, the home network is able to exercise more control over how or whether a terminal does route optimization (the Visited Network or a third party policy repository may also exercise this control; additionally, a combination of home and visited network policies is also possible). To this end, various solutions are presented below.
  • One element may be a policing unit in the MN's Access Router (AR, or other access node), which checks BU messages sent by MN's and/or user data packets. It is able to reject those messages and/or traffic if the MN is not entitled to perform route optimization towards that particular CN.
  • An embodiment of the present invention thereby enables network operators of the home network to have more control of the routing of ‘its’ mobile node. An embodiment of the present invention also arrives at the same technical result as more complex solutions previously known.
  • An embodiment of the present invention provides a method of controlling the flow of IP packets between a Mobile Node and Correspondent Nodes over an IP network, where the Mobile Node has a subscription to a home network and is currently attached to a different, visited network, the method comprising: installing flow control policies at the Mobile Node and/or at an access router of the visited network, from the home network, these policies identifying IP addresses which the Mobile Node may communicate with without having to route packets via the home network; and at the Mobile Node and/or at the access router, rejecting at least certain packets sent directly to prohibited IP addresses.
  • An advantage of an embodiment of the invention is that the solution may be used by an operator of the home network to provide more control of the routing of traffic associated with its mobile nodes.
  • The allowed IP addresses of the flow control policies may be defined by one or both of a set of allowed IP addresses and a set of prohibited IP addresses. A set of addresses may be specified as one or more address ranges.
  • In an embodiment of the present invention, said flow control policies cause the Mobile Node and/or the access router to intercept packets associated with a route optimisation procedure as defined for Mobile IP. Only packets relating to a Binding process may be intercepted, e.g. a Binding Update message or a HoTI/CoTI message, and their destination addresses subjected to comparison with allowed or denied addresses.
  • The method comprises comparing the destination address of a packet at the Mobile Node or access router against IP addresses identified by the policies. Additionally, where the packet contains a type 2 Routing Header according to Mobile IP, the method may comprise comparing the type 2 Routing Header address against IP addresses identified by the policies, the message being rejected either the destination address or the type 2 Routing Header address is disallowed.
  • The flow control policies may comprise a rule disallowing the sending of packets from the Mobile Node and which have a local address of the visited network as source address. This may be used to prevent the Mobile Node setting up direct, i.e. non-Mobile IP based, sessions with a Correspondent Node.
  • In an embodiment of the invention, said flow control policies are installed at the access router. In the event that a packet is rejected by the access router on the basis of the policies, a notification may be sent to the Mobile Node. The Mobile Node may record this fact to prevent subsequent retries at sending the same packet. The Mobile Node may record the error message to prevent subsequent attempts to communicate directly or perform route optimisation with the same Correspondent Node.
  • The policing function and device can be implemented in an Access Router (AR) or in the Mobile Node.
  • To manage the lists from a remote location, a management protocol is used.
  • In the case of a 3GPP architecture, said access router may be a GPRS Gateway Support Node (GGSN), in which case the policies are installed in the GGSN via a Policy Charging Rules Function (PCRF) of the visited network.
  • In an embodiment of the invention, the home network may deliver general policy statements to the visited network, the visited network translating these statements into explicit IP addresses or address ranges.
  • The visited network may install its own policies into the access router and/or Mobile Node in addition to those installed by the home network.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • FIG. 1, discussed hereinbefore, illustrates the bidirectional tunnelling mode of Mobile IP;
  • FIG. 2, also discussed hereinbefore, illustrates the route optimization mode of Mobile IP;
  • FIG. 3 is a block diagram showing an Access Router according to an embodiment of the present invention; and
  • FIG. 4 is a block diagram showing a Mobile Node according to an embodiment of the present invention.
  • DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS
  • An embodiment of the present invention proposes extensions to the Mobile Node and/or in one or more of the Access Routers described above with reference to FIGS. 1 and 2. Before specific embodiments of the present invention are described with reference to FIGS. 3 and 4, an overview of techniques embodying the present invention will first be provided.
  • It is desirable to provide a network operator with an option to force traffic travelling between a roaming Mobile Node (“owned” by the network operator) and a Correspondent Node through the home network. There are a number of reasons why such home network routing may be desirable, both from the operator's point of view and from the user point of view, for example to facilitate legal interception of voice calls within the home network.
  • Two general approaches to providing the necessary control are presented here. The first approach relies upon policy enforcement at access routers within a visited network. The other approach relies upon policy enforcement at the Mobile Node.
  • Policy Enforcement at the Access Router
  • This approach relies upon the provision at an access router of an allowed and/or disallowed set of IP addresses, typically in the form of address ranges. For example, an allowed range of address may be IP addresses belonging to the home network and/or to the visited network. The list(s) is(are) contained in a subscriber profile downloaded by the access router at registration of a subscriber. In the case of 3GPP, this profile is obtained from the subscriber's home network (HSS) by a Policy Charging Rules Function (PCRF) which installs the profile into the access router (in this case a GPRS Gateway Support Node or GGSN). Packets received at the access router from a visiting Mobile Node are screened to identify packets which relate to Route Optimisation: in particular, Binding Update messages (and/or HoTO and CoTI messages where employed) are intercepted by the access router. When such packets are identified, the destination address of the packet is compared against the IP addresses contained in the allowed and/or denied lists.
  • In the event that a destination address is an allowed address, the message is allowed to proceed through the access router. On the other hand, if the address is not allowed, the access router will drop the message and respond to the Mobile Node with an error message, e.g. an Internet Control Message Protocol (ICMP) message. Upon receipt of the error message, the Mobile Node may drop repeat attempts to implement route optimisation with the same Correspondent Node. Indeed, the Mobile Node may include functionality that places a flag against Correspondent Node addresses (e.g. in an address book) to indicate that route optimisation is disallowed for these Correspondent Nodes.
  • It is noted that the policy control function may check not only the destination address field of the IP packet, but also any type 2 Routing Headers, as the Correspondent Node itself can be mobile. The policy may allow or disallow packets to type 2 Routing Headers according to the same lists defined for destination addresses (at the discretion of the home network).
  • The above solution assumes that a Mobile Node will only attempt to communicate directly with a Correspondent Node using the route optimisation procedure. However, in some cases, a Mobile Node may try to circumvent the solution, deliberately or not, by communicating directly with a Correspondent Node without invoking Mobile IP, i.e. omitting the Mobile IP header from packets and including the Care-of Address as the source address and the address of the Correspondent Node as the destination address. Of course, the resulting IP session would be terminated when the Mobile Node switches to a new access router, but this may not be a problem for say web browsing where a new (Care-of) IP address is allocated for each web download.
  • A solution to this problem is to implement a policy at the access router which rejects outgoing packets where the source address of the packets is a local address (of the access router) and where the IP address of the Correspondent Node is disallowed for the Mobile Node. The access router may check if there is a Home Address Destination option in the outgoing packet. If so, then it is a packet sent using MIPv6 route optimisation. If not, then it is simply a packet sent from the local destination. The policy list may include rules for either or both cases.
  • Alternatively the units of the AR can also govern the use of a local IP address by the MN for communication. That is, a second list can be managed in the AR and allow the MN to communicate toward CNs, which are positively on the list using a local IP address as source address. Such communication achieves optimal routing between CN and MN and, in addition, it omits the overhead of MIPv6 route optimization (at the expense of sessions breaking at handover).
  • Policy control may be based upon one or a combination of the approaches described above.
  • Policy Enforcement at the Mobile Node
  • An alternative approach to policy enforcement is to implement the enforcement function at the Mobile Node as opposed to the access router. This might employ either or both of the approaches described above, i.e. the message type approach and the source address approach. Again, the allowed and/or denied lists may be managed by the home network using an explicit Mobile Node to home network protocol. Policies may be pushed to the Mobile Node, e.g. using the Short Messaging Service. Some anti-tampering functionality may be required at the Mobile Node to prevent users altering the policies defined by the home network.
  • Specific embodiments of the present invention will now described with reference to FIGS. 3 and 4.
  • FIG. 3 is a block diagram showing an Access Router 10 according to an embodiment of the present invention. The Access Router 10 comprises a Binding Update (BU) Checking Unit 12, a Traffic Checking Unit 14, a List Storage Unit 16, and a List
  • Managing Unit 18. The AR 10 here refers to the AR in the visited network of the MN (or its home network if no roaming is involved); no changes would be required in the AR of the CN.
  • Both the Binding Update Checking Unit 12 and the Traffic Checking Unit 14 have access to a list of IPv6 address ranges stored in the List Storage Unit 16 that specify which CNs a particular MN is allowed to perform route optimization toward. Such a list can contain a combination of allow/deny rules. The list may be managed from the home network, visited network, a combination of the two, or from an independent policy repository, using the List Managing Unit 18 of the Access Router 10. The list items may refer to any or both of the local or home address of the CNs.
  • The Binding Update Checking Unit 12 captures each packet sent by a MN and checks if it formed as a BU message and/or a Home Test Init (HoTI) message and/or a Care-of Test Init (CoTI) message. If yes, and the destination CN is not allowed according to the list in the List Storage Unit 16, the AR 10 drops the message and responds with an error message, such as an ICMP (Internet Control Message Protocol) Administratively prohibited (or other) message. Sending an error message is not required but may enhance performance, as the MN will then drop the attempt for route optimization without lengthy retries, if it understands the reply.
  • The Traffic Checking Unit 14 captures each packet sent to a CN and discards any packet that is sent to a CN with a local IP address as the source address, unless the CN address is allowed by the list of IPv6 addresses in the List Storage Unit 16. The unit 14 may check if there is a Home Address Destination option in the uplink packet. If so, then it is a packet sent using MIPv6 route optimization. If not, then it is simply a packet sent from the local destination. The policy list may include rules for either or both cases.
  • The two units 12 and 14 can be used in conjunction, and may each have separate policy lists in the List Storage Unit 16. The units 12 and 14 check not only the Destination Address field of the IP packet, but also any potential type 2 Routing Headers, as the CN itself might be mobile too. In case of a mobile CN, the policy of the list might be applied to both the home and care-of address of the CN, at the discretion of the Home Network, for example.
  • With MIPv6 route optimization, applications use the home address of the MN, so that sockets are bound to that address in both the MN and CN. Additional mechanisms (MIPv6 route optimization) are used to still deliver the packets directly between the MN and CN (that is using their local or care-of addresses).
  • Alternatively, the units 12 and 14 of the AR 10 can also govern the use of a local IP address by the MN for communication. That is, a further list can be managed by the List Managing Unit 18 in the List Storage Unit 16 of the AR 10, and allow the MN to communicate toward CNs that are positively on the further list, using a local IP address as source address. With the further list, the AR 10 looks for non-MIPv6 route optimization packets and checks the destination of those. Such communication achieves optimal routing between CN and MN and, in addition, omits the overhead of MIPv6 route optimization. This alternative is weaker, as sessions break on mobility, but is still attractive; for example Web browsing may not need such mobility.
  • With an Access Router 10 as described above, an embodiment of the present invention does not require the MN to have any extensions over existing Mobile Nodes; the MN will try to initiate route optimization towards CNs with which it frequently communicates, and will simply be rejected if such is not allowed. However, a MN that does have extensions over existing Mobile Nodes will now be described with reference to FIG. 4; the MN of FIG. 4 can be used in conjunction with, or instead of, the extensions to the AR described above with reference to FIG. 3. In particular, the MN of FIG. 4 comprises a unit that decides on route optimization.
  • FIG. 4 is a block diagram showing a Mobile Node 30 according to an embodiment of the present invention. The mobile Node 30 comprises a Route Optimization Decision Unit 32, a Message Checking Unit 34, a List Storage Unit 36, a List Managing Unit 38 and a MIPv6 Unit 40.
  • The Route Optimization Decision Unit 32 has access to a list of IPv6 address ranges stored in the List Storage Unit 36 similar to the lists described above with reference to the Access Router 10 of FIG. 3, specifying which CNs the MN 30 is allowed to perform route optimization toward.
  • The following two methods of managing this list, using the List Managing Unit 38, may apply; one or both of these methods can be active at any one time:
  • First Method: the list in the List Storage Unit 36 is managed from the home network, using the List Managing Unit 38 of the Mobile Node 30. With this method, the Route Optimization Decision Unit 32 of the Mobile Node 30 will only cause route optimization to be initiated towards those CNs whose address is allowed by the list in the List Storage Unit 36. An explicit Home Network to MN protocol can be applied in this case.
  • Second Method: the list is managed by using the Message Checking Unit 34 to intercept the ICMP (Internet Control Message Protocol) Administratively Prohibited messages, sent by the AR 10 in response to MIPv6 Route Optimization signalling messages as described above with reference to FIG. 3. The List Managing Unit 38 of the MN 30 would then put the destination CN in question on the list (with prohibit flag) stored in the List Storage Unit 36, and this would prevent the Optimization Decision Unit 32 attempting to initiate route optimization towards those destinations using the MIPv6 Unit 40.
  • Alternatively, the Optimization Decision Unit 32 of the MN 30 can also govern the use of a local IP address for communication. That is, a further list can be managed in the MN 30 and communication toward CNs that are positively on the list can be then performed using a local IP address. Such communication achieves optimal routing between CN and MN and, in addition, omits the overhead of MIPv6 route optimization (at the expense of possible session breaking at handover). This is also discussed above in relation to FIG. 3.
  • Further details of how the home network can control routing in an embodiment of the present invention will now be described.
  • It is the home network that has a subscription with the user (of the mobile node) to provide telecommunication services. In a roaming situation, the visited network executes some of these services (or components thereof) on behalf of the home network based on a roaming agreement between the home and visited network operators.
  • Since the home network is responsible to provide the service, it needs complete control over how the service is delivered. Part of the benefit of an embodiment of the present invention derives from the possibility for the home network to control route optimization (i.e., one aspect of service delivery). Existing policy control nodes and interfaces (e.g., of the 3GPP or TISPAN architectures, where TISPAN is the Telecoms & Internet converged Services & Protocols for Advanced Networks) can be extended to include route optimization control.
  • The actual list of Correspondent Node addresses towards which route optimization is permitted/denied can be assembled during a process co-ordinated between the home and visited networks.
  • In the simplest case, the home network would send a list of IP address ranges for which to allow or deny route optimization, for example when the MN attaches to the visited network. (The home network would also specify for each item on the list whether that item is allowed or denied as a local or home CN address.)
  • The home network may also dynamically adjust the initial list, for example when a particular service is instantiated and for example when the address of a serving network node becomes known.
  • The visited network can also play a part in composing the address list. In this case, the home network might send only a general description for parts of the list instead of specific IP address ranges. Such a description could relate, for example, to particular services, user groups situations and correspondent nodes. Examples include:
      • “Video servers in the visited network”. This example refers to a pre-agreed set of servers in the visited network. It is the responsibility of the visited network to substitute the correct IP addresses. This method enables the visited network to change the number and address of the servers in question without notifying the home network.
      • “Public internet destinations”. In this case the IP address range is assembled from the public Border Gateway Protocol (BGP) advertisements heard by the visited network. This method alleviates the need to communicate the (potentially long) list of these address ranges.
      • “Local destinations”. This method may refer to all MNs currently served by the visited network.
  • With an embodiment of the present invention, home networks are able to control route optimization for their MN's traffic. The assistance of the visited network is usually required and assumed.
  • The home network may execute various policies, such as:
      • All traffic of the user must always be sent home.
      • All traffic of the user can be route optimized.
      • All traffic of the user can be route optimized except for the ones sent to the home service network or any affiliated third party service networks.
      • Traffic that is to be lawfully intercepted at home can be denied route optimization.
      • Traffic towards particular networks can be selectively allowed or denied route optimization. For example, if the given network has better or guaranteed connectivity through the home network, traffic to it may be denied route optimization.
      • Traffic towards (a portion of) the visited network's service network can be allowed route optimization, for example based on a service delivery agreement between the home and visited networks, which specifies that the visited network provides certain resources to provide the service in question.
  • To manage the lists from a remote location, such as the home network, the visiting network, an independent policy repository or a combination thereof, a management protocol is used. This protocol can be based on enhancements to known protocols such as the COPS (Common Open Policy Service) protocol (RFC 2748), the Diameter protocol (RFC3588, RFC4004) or it can also be an explicit new protocol. The most common situation is to manage the lists from the home network as it is the network operator for the home network that wants to control how the mobile node performs route optimization.
  • It will be appreciated that operation of one or more of the above-described components can be controlled by a program operating on the device or apparatus. Such an operating program can be stored on a computer-readable medium, or could, for example, be embodied in a signal such as a downloadable data signal provided from an Internet website. The appended claims are to be interpreted as covering an operating program by itself, or as a record on a carrier, or as a signal, or in any other form.

Claims (37)

1. A method of controlling the routing of data packets sent from a first node towards a second node of a telecommunication network, the first node being a mobile node having an associated home network, and the method comprising:
intercepting such a data packet;
determining if the packet relates to a first mode of communication between the first and second nodes in which data packets generally bypass a home agent associated with the first node's home network, through which home agent packets would generally pass in a second mode of communication between the first and second nodes different to the first mode; and
dropping the packet if it is so determined and if dropping of the packet is determined to be in accordance with a predetermined routing policy.
2. A method as claimed in any preceding claim, comprising determining whether the dropping of the packet is in accordance with the routing policy in dependence on the packet's destination address.
3. A method as claimed in claim 2, wherein the destination address is one of a home address and a care-of address.
4. A method as claimed in any preceding claim, comprising determining whether the dropping of the packet is in accordance with the routing policy in dependence on the packet's source address.
5. A method as claimed in claim 4, when dependent on claim 2, comprising determining that the packet should be dropped if the packet's source address is a local address, unless the delivery of such a packet is allowed by the routing policy according to the packet's destination address.
6. A method as claimed in any preceding claim, comprising determining whether the dropping of the packet is in accordance with the routing policy in dependence on a routing header in the packet.
7. A method as claimed in any preceding claim, comprising determining that the packet relates to the first mode of communication if it relates to a control message associated with the first mode.
8. A method as claimed in any preceding claim, wherein the first mode of communication is a route optimization mode of the Mobile IP standard and the second mode is a bidirectional tunnelling mode of the Mobile IP standard.
9. A method as claimed in claim 8, when dependent on claim 7, wherein control messages associated with the first mode comprise at least one type of IPv6 mobility message.
10. A method as claimed in claim 8 or 9, when dependent on claim 7, wherein control messages associated with the first mode comprise at least one of the following types of message: a Binding Update message; a Home Test Init Message; and a Care-of Test Init message.
11. A method as claimed in any preceding claim, comprising determining whether the packet relates to the first mode of communication in dependence on at least one of the packet's source and destination address.
12. A method as claimed in any preceding claim, wherein the second node is a stationary node.
13. A method as claimed in any preceding claim, further comprising sending an error message to the first node if the packet is dropped.
14. A method as claimed in claim 13, wherein the error message is an ICMP Administratively prohibited message.
15. A method as claimed in any preceding claim, wherein the routing policy specifies at least one IP address range, the routing policy specifying for the or each range whether a packet having a source address that falls within that range is to be dropped or allowed.
16. A method as claimed in any preceding claim, wherein the routing policy specifies at least one IP address range, the routing policy specifying for the or each range whether a packet having a destination address that falls within that range is to be dropped or allowed.
17. A method as claimed in any preceding claim, wherein the telecommunication network is an IP based telecommunication network.
18. A method as claimed in claim 17, wherein the IP network is based on at least one of the IP protocols IPv4 and IPv6.
19. A method as claimed in any preceding claim, comprising intercepting the packet in a visited network if the first node has roamed outside of its home network into the visited network, else intercepting the packet in the home network.
20. A method as claimed in any preceding claim, wherein the routing policy is stored in the network entity that intercepts the packet.
21. A method as claimed in any preceding claim, comprising performing the steps in an Access Router.
22. A method as claimed in any preceding claim, comprising managing the routing policy from a remote location.
23. A method as claimed in claim 22, comprising managing the routing policy remotely via management signalling.
24. A method as claimed in claim 23, wherein the management signalling uses any of the Diameter or COPS protocols.
25. An apparatus for controlling the routing of data packets sent from a first node towards a second node of a telecommunication network, the first node being a mobile node having an associated home network, and the apparatus comprising:
means for intercepting such a data packet;
means for determining if the packet relates to a first mode of communication between the first and second nodes in which data packets generally bypass a home agent associated with the first node's home network, through which home agent packets would generally pass in a second mode of communication between the first and second nodes different to the first mode; and
means for dropping the packet if it is so determined and if dropping of the packet is determined to be in accordance with a predetermined routing policy.
26. A method of controlling the sending of data packets from a first node towards a second node of a telecommunication network, the first node being a mobile node having an associated home network, and the method comprising: not sending such a packet if it would relate to a first mode of communication between the first and second nodes in which data packets generally bypass a home agent associated with the first node's home network, through which home agent packets would generally pass in a second mode of communication between the first and second nodes different to the first mode, unless the sending of such a packet is determined to be in accordance with a predetermined routing policy.
27. A method as claimed in claim 26, comprising determining whether the sending of such a packet is in accordance with the routing policy in dependence on the packet's destination address.
28. A method as claimed in claim 26 or 27, comprising determining whether the sending of such a packet is in accordance with the routing policy in dependence on the packet's source address.
29. A method as claimed in claim 26, 27 or 28, comprising determining that such a packet would relate to the first mode of communication if it is a control message associated with the first mode.
30. A method as claimed in any one of claims 26 to 29, comprising managing the routing policy in dependence on error messages received in response to the previous sending of such packets, the error messages indicating that the packets have been dropped.
31. A method as claimed in any one of claims 26 to 30, wherein the routing policy specifies at least one IP address range, the routing policy specifying for the or each range whether a packet having a destination address that falls within that range is allowed to be sent.
32. An apparatus for controlling the sending of data packets from a first node towards a second node of a telecommunication network, the first node being a mobile node having an associated home network, and the apparatus comprising: means for preventing the sending of such a packet if it would relate to a first mode of communication between the first and second nodes in which data packets generally bypass a home agent associated with the first node's home network, through which home agent packets would generally pass in a second mode of communication between the first and second nodes different to the first mode, unless the sending of such a packet is determined to be in accordance with a predetermined routing policy.
33. An operating program which, when run on an apparatus, causes the apparatus to carry out a method as claimed in one of claims 1 to 24 and 26 to 31.
34. An operating program which, when loaded into an apparatus, causes the apparatus to become an apparatus as claimed in claim 25 or 32.
35. An operating program as claimed in claim 33 or 34, carried on a carrier medium.
36. An operating program as claimed in claim 35, wherein the carrier medium is a transmission medium.
37. An operating program as claimed in claim 35, wherein the carrier medium is a storage medium.
US13/398,450 2005-12-23 2012-02-16 Method and Apparatus for Route Optimization in a Telecommunication Network Abandoned US20120201198A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US13/398,450 US20120201198A1 (en) 2005-12-23 2012-02-16 Method and Apparatus for Route Optimization in a Telecommunication Network

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
PCT/EP2005/057141 WO2007073773A1 (en) 2005-12-23 2005-12-23 Method and apparatus for route optimization in a telecommunication network
US12/097,909 US8144645B2 (en) 2005-12-23 2005-12-23 Method and apparatus for route optimization in a telecommunication network
US13/398,450 US20120201198A1 (en) 2005-12-23 2012-02-16 Method and Apparatus for Route Optimization in a Telecommunication Network

Related Parent Applications (2)

Application Number Title Priority Date Filing Date
US12/097,909 Continuation US8144645B2 (en) 2005-12-23 2005-12-23 Method and apparatus for route optimization in a telecommunication network
PCT/EP2005/057141 Continuation WO2007073773A1 (en) 2005-12-23 2005-12-23 Method and apparatus for route optimization in a telecommunication network

Publications (1)

Publication Number Publication Date
US20120201198A1 true US20120201198A1 (en) 2012-08-09

Family

ID=35809664

Family Applications (2)

Application Number Title Priority Date Filing Date
US12/097,909 Active 2028-02-16 US8144645B2 (en) 2005-12-23 2005-12-23 Method and apparatus for route optimization in a telecommunication network
US13/398,450 Abandoned US20120201198A1 (en) 2005-12-23 2012-02-16 Method and Apparatus for Route Optimization in a Telecommunication Network

Family Applications Before (1)

Application Number Title Priority Date Filing Date
US12/097,909 Active 2028-02-16 US8144645B2 (en) 2005-12-23 2005-12-23 Method and apparatus for route optimization in a telecommunication network

Country Status (7)

Country Link
US (2) US8144645B2 (en)
EP (1) EP1964327B1 (en)
JP (1) JP5080490B2 (en)
CN (1) CN101346947B (en)
AT (1) ATE434890T1 (en)
DE (1) DE602005015147D1 (en)
WO (1) WO2007073773A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160301960A1 (en) * 2015-04-09 2016-10-13 Dejero Labs Inc. Systems, devices and methods for distributing data with multi-tiered encoding

Families Citing this family (25)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP4705863B2 (en) * 2006-03-07 2011-06-22 ソフトバンクBb株式会社 Session control system, session control method, and mobile terminal device
US8599787B2 (en) * 2006-07-03 2013-12-03 Cisco Technology, Inc. Routing packet flows along an optimized path in an IMS network
US8605677B2 (en) * 2006-07-03 2013-12-10 Cisco Technology, Inc. Routing packet flows along an optimized path
US8155077B2 (en) * 2006-07-10 2012-04-10 Cisco Technology, Inc. Active mode internet protocol gateway relocation in a partial meshed deployment
DE602007011676D1 (en) * 2007-08-20 2011-02-10 Ericsson Telefon Ab L M LOCAL BREAKOUT IN A MOBILE NETWORK
FI20075631A0 (en) * 2007-09-10 2007-09-10 Nokia Siemens Networks Oy Procedure, radio system and base station
EP2241064B1 (en) 2008-01-08 2011-07-20 Telefonaktiebolaget L M Ericsson (publ) Technique for route optimization in a communication network
RU2010140817A (en) * 2008-03-06 2012-04-20 Панасоник Корпорэйшн (Jp) MOBILE TERMINAL AND NETWORK ASSEMBLY
AU2013211557B2 (en) * 2008-03-12 2015-09-24 Qualcomm Incorporated Providing multiple levels of service for wireless communication
US8179903B2 (en) * 2008-03-12 2012-05-15 Qualcomm Incorporated Providing multiple levels of service for wireless communication devices communicating with a small coverage access point
US8856387B2 (en) * 2008-04-24 2014-10-07 Qualcomm Incorporated Local IP access scheme
CN101651604B (en) * 2008-08-15 2013-10-02 华为技术有限公司 Method and system for route optimization
CN101772193A (en) * 2008-12-26 2010-07-07 华为技术有限公司 Method, system and mobile access gateway for optimizing local routing
US9107048B2 (en) * 2009-06-29 2015-08-11 Telefonaktiebolaget Lm Ericsson (Publ) Methods and systems for mobile IP route optimization
US8477685B2 (en) * 2009-07-30 2013-07-02 Avaya, Inc. Enhanced mobility management at a mobile access gateway
KR101091300B1 (en) 2009-08-21 2011-12-07 엘지전자 주식회사 Server for control plane at mobile communication network and method for controlling Local IP Access Service
US20110286597A1 (en) * 2009-11-17 2011-11-24 Qualcomm Incorporated HOME AGENT PROXIED MIPv6 ROUTE OPTIMIZATION MODE
WO2013006379A1 (en) 2011-07-01 2013-01-10 Dinan Esmael Hejazi Synchronization signal and control messages in multicarrier ofdm
US8582527B2 (en) 2011-07-01 2013-11-12 Ofinno Technologies, Llc Hybrid automatic repeat request in multicarrier systems
US8369280B2 (en) 2011-07-01 2013-02-05 Ofinno Techologies, LLC Control channels in multicarrier OFDM transmission
US8427976B1 (en) 2011-12-04 2013-04-23 Ofinno Technology, LLC Carrier information exchange between base stations
ES2410361B1 (en) * 2011-12-14 2014-05-05 Telefonica, S.A. METHOD OF COMMUNICATION TO MINIMIZE THE CONSUMPTION OF INFORMATION TECHNOLOGY RESOURCES AND NETWORK IN CONVERGENT NETWORKS WHEN SERVICES ARE PROVIDED
US9497756B2 (en) 2012-03-25 2016-11-15 Comcast Cable Communications, Llc Base station radio resource management
US9949265B2 (en) 2012-05-04 2018-04-17 Comcast Cable Communications, Llc Control channel in a wireless communication system
CN105162728B (en) 2015-07-31 2018-07-31 小米科技有限责任公司 Method for network access, equipment and system

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060239216A1 (en) * 2005-04-26 2006-10-26 Wai Chen Cross-layer self-healing in a wireless ad-hoc network
US20080069009A1 (en) * 2005-03-15 2008-03-20 Huawei Technologies Co., Ltd. Method and mobile node for packet transmission in mobile internet protocol network
US7650522B2 (en) * 2005-06-28 2010-01-19 Symbol Technologies, Inc. Mobility policy manager for mobile computing devices
US7711122B2 (en) * 2001-03-09 2010-05-04 Arcot Systems, Inc. Method and apparatus for cryptographic key storage wherein key servers are authenticated by possession and secure distribution of stored keys
US20100215019A1 (en) * 2007-07-10 2010-08-26 Panasonic Corporation Detection of mobility functions implemented in a mobile node

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6958983B2 (en) 2000-01-25 2005-10-25 Telefonaktiebolaget Lm Ericsson (Publ) Method and system for optimal routing of calls in a base station system
GB0124323D0 (en) * 2001-10-10 2001-11-28 Nokia Corp Setting mode of communication
WO2004010668A1 (en) * 2002-07-19 2004-01-29 Nokia Corporation Route optimizing in mobile ip providing location privacy
GB0226289D0 (en) 2002-11-11 2002-12-18 Orange Personal Comm Serv Ltd Telecommunications
US7668145B2 (en) * 2003-12-22 2010-02-23 Nokia Corporation Method to support mobile IP mobility in 3GPP networks with SIP established communications
JP2007533279A (en) 2004-04-19 2007-11-15 テレコム・イタリア・エッセ・ピー・アー Routing method and system for IP mobile network, corresponding network and computer program product
US7385946B2 (en) * 2004-06-03 2008-06-10 Nokia Corporation Service based bearer control and traffic flow template operation with mobile IP

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7711122B2 (en) * 2001-03-09 2010-05-04 Arcot Systems, Inc. Method and apparatus for cryptographic key storage wherein key servers are authenticated by possession and secure distribution of stored keys
US20080069009A1 (en) * 2005-03-15 2008-03-20 Huawei Technologies Co., Ltd. Method and mobile node for packet transmission in mobile internet protocol network
US20060239216A1 (en) * 2005-04-26 2006-10-26 Wai Chen Cross-layer self-healing in a wireless ad-hoc network
US7650522B2 (en) * 2005-06-28 2010-01-19 Symbol Technologies, Inc. Mobility policy manager for mobile computing devices
US20100215019A1 (en) * 2007-07-10 2010-08-26 Panasonic Corporation Detection of mobility functions implemented in a mobile node

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
Johnson, RFC 3775, Mobility Support in IPv6 June 2004 *

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160301960A1 (en) * 2015-04-09 2016-10-13 Dejero Labs Inc. Systems, devices and methods for distributing data with multi-tiered encoding
US9800903B2 (en) * 2015-04-09 2017-10-24 Dejero Labs Inc. Systems, devices and methods for distributing data with multi-tiered encoding
US11153610B2 (en) 2015-04-09 2021-10-19 Dejero Labs Inc. Systems, devices, and methods for distributing data with multi-tiered encoding
US11770564B2 (en) 2015-04-09 2023-09-26 Dejero Labs Inc. Systems, devices and methods for distributing data with multi-tiered encoding

Also Published As

Publication number Publication date
JP5080490B2 (en) 2012-11-21
CN101346947A (en) 2009-01-14
DE602005015147D1 (en) 2009-08-06
EP1964327A1 (en) 2008-09-03
EP1964327B1 (en) 2009-06-24
CN101346947B (en) 2011-08-03
ATE434890T1 (en) 2009-07-15
WO2007073773A1 (en) 2007-07-05
JP2009521143A (en) 2009-05-28
US8144645B2 (en) 2012-03-27
US20080316956A1 (en) 2008-12-25

Similar Documents

Publication Publication Date Title
EP1964327B1 (en) Method and apparatus for route optimization in a telecommunication network
US8379599B2 (en) Local mobility anchor relocation and route optimization during handover of a mobile node to another network area
US8670333B2 (en) Policy enforcement within an IP network
KR100904168B1 (en) Packet data filtering
US8320329B2 (en) Policy for a roaming terminal based on a home internet protocol (IP) address
KR101086349B1 (en) Method And System For Controlling Operation Of A Communication Network, Related Network And Computer Program Product Therefor
US8594073B2 (en) Method and apparatus for roaming between communications networks
US8942193B2 (en) Routing different subsets of an internet protocol flow over different points of attachment
EP1990953B1 (en) A method and device for determining home agent attached by mobile node
JP2007533279A (en) Routing method and system for IP mobile network, corresponding network and computer program product
Arkko et al. Internet protocol version 6 (IPv6) for some second and third generation cellular hosts
Sun et al. Mobile IP applicability: When do we really need it?
Isah An Improved Locator Identifier Split Architecture (ILISA) to Enhance Mobility
Arkko et al. RFC3316: Internet Protocol Version 6 (IPv6) for Some Second and Third Generation Cellular Hosts
Loughney et al. Network Working Group J. Arkko Request for Comments: 3316 G. Kuijpers Category: Informational H. Soliman Ericsson
Dorai et al. A Novel Architecture-Peer to Peer and Closed Network Mobile Multimedia File Transfer in 4G MIPV6 Network

Legal Events

Date Code Title Description
AS Assignment

Owner name: TELEFONAKTIEBOLAGET LM ERICSSON (PUBL), SWEDEN

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:TURANYI, ZOLTAN RICHARD;KESZEI, CSABA;SIGNING DATES FROM 20080728 TO 20080804;REEL/FRAME:028175/0274

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION