Communications in relay networks

Abstract
A system and method for transmitting data in a communication system. First encapsulated data is received at a first node, and second encapsulated data associated with the first encapsulated data is generated at the first node. The first encapsulated data and the second encapsulated data are transmitted independently to one or more further nodes.
Description

BRIEF DESCRIPTION OF THE DRAWINGS

The present invention will now be described in more detail and by way of example only, with respect to the following specific embodiments and drawings, in which:



FIG. 1 shows a communications system comprising a relay network in which the present invention may be implemented;



FIG. 2 shows a representation of signaling between nodes in a first embodiment of the present invention;



FIG. 3 shows an alternative representation of signaling steps in the first embodiment of the present invention;



FIG. 4 shows a representation of signaling between nodes in a second embodiment of the present invention; and



FIG. 5 is a schematic representation of the circuitry that can exist in a device that is involved in the implementation of various embodiments of the present invention.





DETAILED DESCRIPTION OF VARIOUS EMBODIMENTS


FIG. 1 shows a mobile node 1, such as a mobile telephone or laptop computer, which wishes to access network services. The mobile node is registered to public access network 6, containing a gateway 5. The mobile node is currently located in proximity to a private local network 2 owned by a third party, such as a personal area network. Local network 2 comprises a first relay node 3 and a second relay node 4. Although only 2 relay nodes are shown in FIG. 1, the network may comprise any number of further nodes which relay data in a similar way to those illustrated.


Mobile node 1 can communicate with the first relay node 3 via a wireless link. First node 3, second node 4 and gateway 5 may also communicate via wireless or wired connections.


Some components of the first relay node 3 are shown in FIG. 1. These components may also be present in further nodes, such as the second node. The first relay node 3 comprises a receiver or transceiver means 10 for receiving data from and/or transmitting data to the mobile node 1. The first relay node also comprises a transmission or transceiver means 14 for enabling communication with the second relay node 4. The transceiver means 10 and 14 may comprise, for example, a wireless or wired transmitter device as are known in the art.


The first relay node 3 further comprises a data generation means 8 for generating second data, for instance control data, associated with encapsulated data received from e.g. the mobile node 1. The first relay node 3 also comprises an encapsulation means 9 for encapsulating the second data for transmission to a further node such as the second relay node 4. The data generation means 8 and the encapsulation means 9 may, for example, be implemented by virtue of an appropriated programmed processor in the first relay node.


It may be desirable to provide services to mobile node 1 from access network 6, via local network 2. One way in which to do this is to provide a communication tunnel 7 between the mobile node 1 and the gateway 5 of the access network 6.


Data (e.g. Internet Protocol (IP) packet data) may be trafficked between two nodes in a communication system (e.g. the mobile node and the access network) using a communication tunnel. A tunnel comprises a forwarding path between two nodes for carrying tunnel packets, wherein each tunnel packet encapsulates an original packet. During encapsulation, a header is prepended to the original packet, which specifies the tunnel end-points as source and destination. Security associations (SAs) between the end-points of the tunnel allow data to be securely transmitted through the tunnel over the intervening network elements, such as the local network 2. The entry-point of a tunnel may perform security algorithms on the packet and prepend as part of the tunnel header one or more security headers. The exit-point node decapsulates the packet by performing security algorithms and processing the tunnel security header. The degree of integrity, authentication and confidentiality performed on a tunnel packet at entry and exit points may depend on the type of security header and parameters configured in the SA for the tunnel.


In order to communicate with the gateway 5 via tunnel 7, the mobile node 1 thus encapsulates communication data, e.g. traffic data, and sends it to the first relay node 3. The mobile node is therefore the entry-point of the tunnel. The first relay node 3 forwards the encapsulated data to the second relay node 4, which forwards it on to the gateway 5. The gateway 5 is the tunnel exit-point which decapsulates the tunnel packets. The first and second relay nodes 3 and 4 in the local network 2 are not able to interpret the encapsulated tunnel packets which they relay.



FIG. 2 shows a simple relay network with two relay nodes 3 and 4 and a single mobile node 1 as discussed in relation to FIG. 1. Each of nodes 1, 3 and 4 has an SA with a node in access network 6 and uses the encrypted tunnels to transfer data. Thus the relay nodes 3 and 4 are not able to interpret the encapsulated and encrypted data which they relay. The establishment of SAs is a known technique and thus will not be discussed further.


In the embodiment shown, the mobile node 1 and relay nodes 3 and 4 each has its own, separate tunnel to access network 6. The tunnels 11, 12 and 13 shown in FIG. 2 are independent from one another. Nodes that create data encapsulate it. Control data generated by relay nodes 3 and 4 is transmitted to the access network using tunnels 12 and 13 respectively, which are independent from tunnel 11. The access network is able to use the control data for verifying network topology information. This method may thus provide user (traffic) and data (control) plane differentiation. In some cases user and control traffic can be transported over different channels.


As shown in FIG. 2 and additionally in FIG. 3, mobile node 1 sends encapsulated communication data towards access network to first relay node 3. After receiving the encapsulated communication data, first relay node 3 identifies the previous hop (from mobile node 1) and forwards the encapsulated communication data to second relay node 4, for further transmission towards the access network, via tunnel 11. First relay node 3 generates charging and other control data and sends it encapsulated towards access network to relay node 4, via tunnel 12.


Second relay node 4 receives the encapsulated communication data and encapsulated control data and identifies the previous hop (from first relay node 3). Second relay node 4 then forwards all received data (i.e. the encapsulated control data and encapsulated communication data) towards the access network via tunnels 11 and 12. Second relay node 4 generates charging and control data for both received data. Second relay node 4 encapsulates the created (charging and control) data and sends it towards the access network via tunnel 13.


It will be appreciated from the above that the encapsulated communication data and encapsulated control data are not necessarily sent by a relay node 3 or 4 to the same node. For instance traffic going downlink (i.e. from the access network towards the mobile node) should also be reported to the access network. Thus the down link receiver has to be identified and similar control/charging data, as described for the uplink traffic above, has to be encapsulated for transmission towards the access network. For instance, encapsulated traffic data may be sent from the access network to the second relay node 4, for forwarding to the first relay node 3 and on to the mobile node 1. The second relay node 4 generates control data, encapsulates it and sends it towards the access network 6, but forwards the traffic data to first relay node 3. First relay node 3 operates in a similar way for traffic going to the mobile node 1.


From the encapsulated control data received from the relay nodes, the access network can reconstruct the traffic forwarding locations through the relay network. If there are contradicting reports from the relay nodes, the access network can employ a separate topology discovery function to verify traffic routing/switching.


The charging and/or topology information comprised in the control information received by the access network may be used for billing purposes for the mobile node or to ensure that the relay node operator/owner receives appropriate compensation for relaying data. The method can also be used to perform relay switching/routing control of the relays in traffic forwarding. This is beneficial as typically the access network will have an overview of network status and can perform proper traffic handling optimizations. The present method, employing a separate tunnel for each mobile node or relay node, provides secure and flexible control.


Although in the above specific embodiment it is assumed that the relay accounting and topology verification are handled by the access network, in alternative embodiments these functions can be handled at other entities such as access brokers. Furthermore, although in the above embodiment the relay nodes are comprised in a different network to an access network, it will be appreciated that the present invention may be employed whenever it is desired to transmit packet data via a secure tunnel between two nodes in a communication system, using intervening relay nodes. Thus in alternative embodiments, the mobile node may tunnel data to a node in an access network via relay stations which are also comprised in the same access network.


In a further alternative embodiment, shown in FIG. 4, instead of generating control data such as charging and/or topology information the first and second relay nodes merely report that they have forwarded data originating at another node. The relay nodes also provide an indication of the node from which the data originated. Thus the first relay node 3 sends a verification towards the access network that it has received data from the mobile node and has forwarded this data. Likewise the second relay node 4 sends a verification towards the access network that it has forwarded data originating at the mobile node 1 and a verification that it has forwarded data originating at the first relay node. The node from which the data originated may be indicated by using an identifier in a layer such as the IP layer. Once the access network has received the communication data and related control data, it can then calculate compensations for each relay node involved, since it knows the message sizes.


Thus the present invention provides a method to monitor and to report relay network traffic, for instance in a relay network comprising a mobile node and relay nodes which have security associations with an access network and which use encrypted tunnels for data transfer.


The reporting of relay network traffic contains charging information and additional control information. By using encapsulation for charging and control information the access network can verify its topology information and relay nodes can be compensated accordingly.



FIG. 5 shows components which can exist in devices that implement various aspects of the present invention. It should be understood, however, that the present invention is not intended to be limited to one particular type of electronic device. The components included in FIG. 5 include a display 32 in the form of a liquid crystal display, a keypad 34, a microphone 36, an ear-piece 38, an infrared port 42, an antenna 44, a smart card 46 in the form of a UICC according to one embodiment, a card reader 48, radio interface circuitry 52, codec circuitry 54, a controller or processor 56 and a memory unit 58. Individual circuits and elements are all of a type well known in the art, for example in the Nokia range of mobile telephones.


The present invention is described in the general context of method steps, which may be implemented in one embodiment by a program product including computer-executable instructions, such as program code, which can be embodied in computer-readable media and executed by computers in networked environments. Generally, program modules include routines, programs, objects, components, data structures, etc. that perform particular tasks or implement particular abstract data types. Computer-executable instructions, associated data structures, and program modules represent examples of program code for executing steps of the methods disclosed herein. The particular sequence of such executable instructions or associated data structures represents examples of corresponding acts for implementing the functions described in such steps.


Software and web implementations of the present invention could be accomplished with standard programming techniques with rule based logic and other logic to accomplish the various database searching steps, correlation steps, comparison steps and decision steps. It should also be noted that the words “component” and “module,” as used herein and in the claims, is intended to encompass implementations using one or more lines of software code, and/or hardware implementations, and/or equipment for receiving manual inputs.


The foregoing description of embodiments of the present invention have been presented for purposes of illustration and description. It is not intended to be exhaustive or to limit the present invention to the precise form disclosed, and modifications and variations are possible in light of the above teachings or may be acquired from practice of the present invention. The embodiments were chosen and described in order to explain the principles of the present invention and its practical application to enable one skilled in the art to utilize the present invention in various embodiments and with various modifications as are suited to the particular use contemplated.

Claims
  • 1. A method for transmitting data in a communication system, comprising: receiving first encapsulated data at a first node;generating second encapsulated data associated with the first encapsulated data at the first node; andtransmitting independently the first encapsulated data and second encapsulated data to one or more further nodes.
  • 2. A method according to claim 1, wherein the second encapsulated data comprises control data.
  • 3. A method according to claim 1, wherein the first encapsulated data comprises traffic data.
  • 4. A method according to claim 1, wherein: the first encapsulated data and the second encapsulated data are forwarded to a second node;the second node generates at least one of third encapsulated data associated with the first encapsulated data and fourth encapsulated data associated with the second encapsulated data;the second node transmits the first encapsulated data independently from a) the second encapsulated data and b) the at least one of the third and fourth encapsulated data to a third node.
  • 5. A method according to claim 4, wherein the third encapsulated data comprises control data associated with the first encapsulated data and the fourth encapsulated data comprises control data associated with the second encapsulated data.
  • 6. A method according claim 1, wherein the first encapsulated data is generated, encapsulated and transmitted to the first node by a mobile node.
  • 7. A method according to claim 2, wherein the control data comprises charging information associated with transmission of the first encapsulated data via the first node.
  • 8. A method according to claim 1, wherein the first encapsulated data and second encapsulated data are sent to different nodes.
  • 9. A method according to claim 1, wherein the first encapsulated data and second encapsulated data are transmitted in separate data tunnels.
  • 10. A method according to claim 1, wherein the second encapsulated data is sent towards an access network providing access to services for a mobile node, the first encapsulated data being generated by or terminating at the mobile node.
  • 11. A method according to claim 10, wherein the first encapsulated data is transmitted between the mobile node and the access network by a first tunnel, and the second encapsulated data is transmitted between the first node and the access network by a second tunnel, the first and second tunnels being independent from one another.
  • 12. A method according to claim 11, wherein at least one of third and fourth encapsulated data is transmitted between a second node and the access network by a third tunnel, the third tunnel being independent from the first and second tunnels.
  • 13. A method according to any of claim 12, wherein the second encapsulated data provides first topology information, associated with at least one of the mobile node and the first node, to the access network.
  • 14. A method according to claim 13, wherein the third encapsulated data provides second topology information, associated with the mobile node, and at least one of the first node and second node, to the access network.
  • 15. A method according to claim 14, wherein the access network compares the first and second topology information, and resolves any ambiguities therein via a verification function.
  • 16. A method according to claim 1, wherein at least one of the first and second nodes are relay nodes comprised in a relay network.
  • 17. A method according to claim 16, wherein at least one of the first and second nodes are comprised in one of a wireless local area network, a wireless personal area network and a wireless cellular network.
  • 18. A method according to claim 1, wherein the second encapsulated data comprises first verification information confirming that the first node has forwarded the first encapsulated data.
  • 19. A method according to claim 4, wherein the third encapsulated data comprises second verification information confirming that the first encapsulated data has been forwarded by the second node, and the fourth encapsulated data comprises third verification information confirming that the second encapsulated data has been forwarded by the second node.
  • 20. A method according to claim 18, wherein the first verification information comprises an indication of the node from which the forwarded data originated.
  • 21. A method according to claim 1, wherein the encapsulated data comprises a marker indicating that it is traffic data or control data.
  • 22. A method according to claim 21, wherein at least one of the first and second nodes generates charging information for transmission in the second, third or fourth encapsulated data only in respect of traffic data forwarded by that node.
  • 23. A node in a communication system, wherein the node is configured to receive first encapsulated data, generate second encapsulated data associated with the first encapsulated data, and independently transmit the first encapsulated data and the second encapsulated data to one or more further nodes.
  • 24. A node according to claim 23, wherein the node is further configured to receive third encapsulated data, generate fourth encapsulated data associated with the third encapsulated data, and to transmit the fourth encapsulated data to at least one further node independently from the first third encapsulated data.
  • 25. A node in a communication system, comprising: a memory unit including:computer code for for generating second data associated with first encapsulated data received at the node;computer code for encapsulation means for encapsulating the second data to produce second encapsulated data; andcomputer code for transmission means for independently transmitting the first encapsulated data and the second encapsulated data to one or more further nodes.
  • 26. A computer program product comprising a set of instructions which when executed by a processor in a node in a communication system, causes the node to generate second encapsulated data associated with first encapsulated data received at the node, and independently transmit the first encapsulated data and second encapsulated data to one or more further nodes.
  • 27. A communication system comprising: a first node; andat least one further node;wherein the first node is configured to receive first encapsulated data, generate second encapsulated data associated with the first encapsulated data, and independently transmit the first encapsulated data and second encapsulated data to the at least one further node.
Priority Claims (1)
Number Date Country Kind
GB 0608385.1 Apr 2006 GB national