Communications system frequently include a plurality of network nodes which are coupled to access nodes through which end nodes, e.g., mobile devices, are coupled to the network. Network nodes may be arranged in a hierarchy. Access Authentication and Authorization (AAA) servers are nodes which are normally placed relatively high in the network hierarchy. They normally provide information used for security and access control purposes. Access nodes frequently have a secure link with an AAA server in cases where such servers are used. The secure link may be through one or more node in the hierarchy.
Operators typically manage access sessions in IP networks using the RADIUS protocol and associated RADIUS AAA servers. In the future, AAA systems may be based on new protocols such as DIAMETER. In a system using a RADIUS AAA server, when a user attempts to gain access to an operator network, for the duration of an access session, the local Access Router normally issues one or more RADIUS Access-Requests to an Authentication Server to authenticate that user based on its identity such as a Network Access Identifier (NAI). The AAA database typically has stored the identities of those users allowed to access its system along with the services features they are able to invoke. When the user is successfully authenticated, its access port on the access device is configured with policy state commensurate with the user's service Authorization. The service authorization is normally delivered via RADIUS to the Access Router by the Authorization Server. Whilst authorized, service usage during an access session is recorded by the Access Router, and sent as accounting records to an Accounting Server using Accounting-Request messages in the RADIUS protocol. The Accounting Server may be part of the AAA server or it may be an independent server using the same protocol with the authorization server. If the user is connected to multiple Access Routers during a single session then the multiple sessions need to be aggregated in the Accounting Servers.
In addition to authorization and accounting issues, communications systems which support mobile devices need to include mechanisms for conveying location information so that a mobile device can change its point of attachment to the network and still have signals, e.g., IP packets, routed to it.
Mobile IP, (versions 4 and 6) also known as MIPv4 [MIPv4] and MIPv6 [MIPv6], enables a mobile node (MN) to register its temporary location indicated by a care-of-address (CoA) to its Home Agent (HA). The HA then keeps a mapping (also called a binding) between the MN's permanent address, otherwise called Home Address (HoA), and the registered CoA so that packets for that MN can be redirected to its current location using IP encapsulation techniques (tunneling). The CoA used by a MN can be an address that belongs to a Foreign Agent (FA) in an Access Router when MIPv4 is used or it can be a temporarily allocated address to the MN itself, from the Access Router prefix, in which case it is called a collocated care-of-address (CCoA). The latter model also applies to MIPv4 while it is the only mode of operation in MIPv6. Note that for the purpose of this document the terms CCoA and CoA as well as Registration and Binding Update (BU) are interchangeable since they are the corresponding terms for MIPv4 and MIPv6. The methods and apparatus of the invention are applicable to both MIPv4 and MIPv6 unless otherwise mentioned.
AAA systems are typically used with mobile IP to manage IP address allocations (HoAs), to dynamically allocate HAs, to distribute MN profiles to the Access Router and also to distribute security keys to authenticate MIP messages and to secure the air-link. The Mobile Node, an end node which is capable of changing its point of network attachment, typically sends a MIP message to gain access to the system, which triggers a AAA request to authenticate and authorize the Mobile Node. The AAA MN profile and security state is then passed from the AAA system to the Access Router to control services consumed by the MN.
MNs may change their point of network attachment, e.g., as they move from one cell to another cell. This involves changing the MNs point of attachment from a first access node, e.g., a first router, to a second access node, e.g., a second router. This process is commonly known as a handoff. As part of a handoff the MN's CoA/CCoA needs to be updated and then transferred into the HA using MIP signaling so that packets are redirected to the MN via the new Access Router. As part of handoff process, it is necessary to transfer at least some of the first access router's state information corresponding to the MN involved in the handoff to the new access router so that the MN service is not interrupted. This process is known as State Transfer. State transfer may include, e.g., the transfer of AAA profile state information that was previously delivered via RADIUS to the AR, at which the MN access session commenced. It also may include, e.g., the transfer of air-link security vectors, MN-NAI, MN IP Address, MN-EUI-64, remaining MIP Registration Lifetime, MN multicast group membership, admission control state, resource reservation state, diff-serv state, SIP session state, compressor state, MN scheduling history and/or many other potential items of MN specific AR state information.
In at least one known system, the transfer of state information during a handoff is accomplished by the new access node to which a mobile node is connecting sending a state transfer message through the communications network to the old access node to which the mobile node was connected. In response the old access node forwards state information to the new access node. This technique, while effective, has the disadvantage of requiring that a message be sent between the old and new access nodes to initiate the transfer of the state information. The links between access nodes used for the transmission of such messages may become congested or could be used to convey other information and/or signals if the need for messages between access nodes used to initiate the transfer of state information could be eliminated.
In view of the above discussion, it should be appreciated that there is a need for new methods of implementing the communication of state information to a new access node in the case of a mobile node handoff or in other cases where a mobile node enters a new cell. It should also be appreciated that, for the reasons discussed above, avoiding the use of messages between access nodes to trigger the transfer of state information during a handoff is desirable.
In a wireless network, mobile end users use end nodes, e.g., wireless devices, to communicate with other network entities, e.g., wireless devices used by other end users, via access nodes. The access nodes may be implemented as wireless access routers. Associated with each end node there is state, e.g., a set of information comprising various parameters relating to service(s) and/or application(s) corresponding to the end node. This state is used by an access router which serves as the end node's point of network attachment. Each time the end node changes the point of attachment to the network, the state needs to be re-built or transferred to the access router which serves as the new point of network attachment so that the new access node can continue to provide communication services with regard to existing communications sessions or provide new communications services, e.g., as requested by the end node. This document describes the concept of state transfer between access points/routers as well as a novel way to gather the required state and transfer it from one point to the next.
This application describes methods for transfer of state to support events such as the movement of an end node (EN) between access nodes (ANs). The method uses Core State Management Nodes (CSMNs) located in the core of the network, to store, process and forward state information for the end nodes. The CSMNs used to store and transfer state information in accordance with the invention may be implemented as part of Authentication Authorization & Accounting (AAA) server similar to the type found in many systems.
In accordance with one feature of the invention, access nodes can store state information in a CSMN and can also retrieve, e.g., fetch, state corresponding to an end node from the CSMN used to store that information. Access nodes normally update the stored state for an end node for which they serve as the network point of attachment when the end node signals an intent to end communication with the access node or communication ceases, e.g., because communication with the access node is interrupted or terminated prior to completion of a handoff operation.
An access node normally retrieves state information from the CSMN when communication with an end node is initiated, e.g., when the end node enters the cell corresponding to the access node. However, in the case of a handoff, in some embodiments, state information is forwarded from the access node which was previously servicing the end node eliminating the need to retrieve state information from the CSMN.
In accordance with one feature of the invention, during handoff, the mobile node controls the forwarding of state from the first to the second access node being used by the end node. This is accomplished by the end node sending a message to the first access node to forward state information to the second access node. This approach avoids the need for the second node to send a message to the first node requesting the transfer of state information thereby reducing the amount of signaling between access nodes as compared to system which employ such state transfer messages between access nodes.
In cases where communication is lost with the first access node before the end node can transmit the state transfer signal, the second access node will retrieve the state information from the CSMN. Use of the transfer message is optional but has the advantage of reducing the number of information retrieval operations which need to be supported by the core node. In addition, the use of the transfer message directed from the end node to the first access node has the advantage of reducing delays in terms of the amount of time between when the end node begins communication with the second access node and when the second access node obtains the state information to be used in servicing the end node. The state transfer message may trigger updating of the state information in the core node in addition to the transfer of state information to the second access node.
State information stored by an access node in the CSMN and/or transferred to another access node will normally reflect any local changes to that state, e.g., changes made at the access node which is storing or transferring the state subsequent to the state information being received either from the CSMN or another access node. Stored state may also be manipulated and modified by the CSMN itself, e.g., as system or session requirements change during an end node access session or other communication operation.
Additional features and benefits of the present invention are discussed in the detailed description which follows.
The methods and apparatus of the present invention for storing, manipulating, retrieving, and forwarding state, e.g., context and other information, used to support communications sessions with one or more end nodes, e.g., mobile devices, can be used with a wide range of communications systems. For example the invention can be used with systems which support mobile communications devices such as notebook computers equipped with modems, PDAs, and a wide variety of other devices which support wireless interfaces in the interests of device mobility.
The
Each access node 140, 140′, 140″ is depicted as providing connectivity to a plurality of N end nodes (144, 146), (144′, 146′), (144″, 146″), respectively, via corresponding access links (145, 147), (145′, 147′), (145″, 147″), respectively. In the exemplary communication system 100, each access node 140, 140′, 140″ is depicted as using wireless technology, e.g., wireless access links, to provide access. A radio coverage area, e.g., communications cell, 148, 148′, 148″ of each access node 140, 140′, 140″, respectively, is illustrated as a circle surrounding the corresponding access node.
The exemplary communication system 100 is subsequently used as a basis for the description of various embodiments of the invention. Alternative embodiments of the invention include various network topologies, where the number and type of network nodes, the number and type of access nodes, the number and type of end nodes, the number and type of CSMNs, the number and type of links, and the interconnectivity between nodes may differ from that of the exemplary communication system 100 depicted in
In various embodiments of the present invention some of the functional entities depicted in
The wireless communication interface 230 provides a mechanism by which the internal components of the end node 200 can send and receive signals to/from external devices and network nodes, e.g., access nodes. The wireless communication interface 230 includes, e.g., a receiver circuit 232 with a corresponding receiving antenna 236 and a transmitter circuit 234 with a corresponding transmitting antenna 238 used for coupling the end node 200 to other network nodes, e.g., via wireless communications channels.
The exemplary end node 200 also includes a user input device 242, e.g., keypad, and a user output device 244, e.g., display, which are coupled to bus 206 via the user input/output interface 240. Thus, user input/output devices 242, 244 can exchange information, signals and data with other components of the end node 200 via user input/output interface 240 and bus 206. The user input/output interface 240 and associated devices 242, 244 provide a mechanism by which a user can operate the end node 200 to accomplish various tasks. In particular, the user input device 242 and user output device 244 provide the functionality that allows a user to control the end node 200 and applications, e.g., modules, programs, routines and/or functions, that execute in the memory 210 of the end node 200.
The processor 204 under control of various modules, e.g., routines, included in memory 210 controls operation of the end node 200 to perform various signaling and processing as discussed below. The modules included in memory 210 are executed on startup or as called by other modules. Modules may exchange data, information, and signals when executed. Modules may also share data and information when executed. In the
The signaling/control module 212 controls processing relating to receiving and sending signals, e.g., messages, for management of state information storage, retrieval, and processing. Signaling/control data 214 includes state information, e.g., parameters, status and/or other information relating to operation of the end node. In particular, the signaling/control data 214 may include configuration information 216, e.g., end node identification information, and operational information 218, e.g., information about current processing state, status of pending responses, etc. The module 212 may access and/or modify the data 214, e.g., update the configuration information 216 and/or the operational information 218.
The network/internetwork interface 320 provides a mechanism by which the internal components of the access node 300 can send and receive signals to/from external devices and network nodes. The network/internetwork interface 320 includes, a receiver circuit 322 and a transmitter circuit 324 used for coupling the node 300 to other network nodes, e.g., via copper wires or fiber optic lines. The wireless communication interface 330 also provides a mechanism by which the internal components of the access node 300 can send and receive signals to/from external devices and network nodes, e.g., end nodes. The wireless communication interface 330 includes, e.g., a receiver circuit 332 with a corresponding receiving antenna 336 and a transmitter circuit 334 with a corresponding transmitting antenna 338. The interface 330 is used for coupling the access node 300 to other network nodes, e.g., via wireless communication channels.
The processor 304 under control of various modules, e.g., routines, included in memory 310 controls operation of the access node 300 to perform various signaling and processing. The modules included in memory 310 is executed on startup or as called by other modules that may be present in memory 310. Modules may exchange data, information, and signals when executed. Modules may also share data and information when executed. In the
The State Management Module 312 controls the processing of received signals from end nodes or other network nodes regarding state storage and retrieval. The State Management Data 313 includes, e.g., end-node related information such as the state or part of the state, or the location of the current end node state if stored in some other network node. The State Management module 312 may access and/or modify the State Management data 313.
The Signaling/Control module 314 controls the processing of signals to/from end nodes over the wireless communication interface 330, and to/from other network nodes over the network/internetwork interface 320, as necessary for other operations such as basic wireless function, network management, etc. The Signaling/Control data 315 includes, e.g., end-node related data regarding wireless channel assignment for basic operation, and other network-related data such as the address of support/management servers, configuration information for basic network communications. The Signaling/Control module 314 may access and/or modify the Signaling/Control data 315.
The network/internetwork interface 420 provides a mechanism by which the internal components of the CSMN 400 can send and receive signals to/from external devices and network nodes. The network/internetwork interface 420 includes, a receiver circuit 422 and a transmitter circuit 424 used for coupling the node 400 to other network nodes, e.g., via copper wires or fiber optic lines.
The processor 404 under control of various modules, e.g., routines, included in memory 410 controls operation of the CSMN 400 to perform various signaling and processing. The module included in memory 410 is executed on startup or as called by other modules that may be present in memory 410. In the
The Core State Management Module 412 controls the processing of received signals from other CSMN, access nodes, or network nodes regarding state storage and retrieval. The Core State Management Data 413 includes, e.g., end-node state information. The Core State Management module 412 may access and/or modify the Core State Management data 413.
End node state information transferred between access nodes and core state management nodes in accordance with the present invention is state information relating to, e.g., used to support, communication with the end node which operates as part of the system. In one embodiment of this invention transferred state information will typically include static, long lived and short lived components. Static components may include parameters that do not change over long periods of time and multiple communication sessions. Examples of static state are end node profile information such as general quality of service parameters (e.g.: peak rates allowed) and generic authorization state (e.g.: type of data calls allowed). Examples of long lived state are parameters that do not change during the duration of a communication session (e.g.: a dynamically assigned Internet address or some long lived security information). Examples of short lived state are parameters that are very dynamic in nature and change multiple times during a communications session (e.g.: dynamic quality of service state, multicast group membership, etc.)
In one embodiment of this invention state information (static, short and long lived) is moved together according to methods described in the present invention. In an alternative embodiment static state resides permanently in CSMNs. In this case both static and dynamic state may be transferred between CSMNs located in different regions, or from CSMN to access nodes. However, while dynamic state information is normally transferred from access nodes to CSMNs, there is no need to communicate static state information to the CSMNs since they already include the information. In an alternative embodiment, all state resides in one or more CSMNs and access nodes and/or CSMNs may update said state as state changes occur.
CSMN Operation
CSMN operation in accordance with one feature of the invention will now be described with reference to
In
In addition to, or as an alternative to being triggered by a SSRQ message 510 from an end node, the Access node can monitor for the receipt of wide range of signals that will result in a change in state corresponding to an end node 146 and, in response to such signals or in response to some change in state that is not triggered by a received signal, the access node 140 will generate a state update message 520 which is sent to the CSMN 104. Thus, in such embodiments, when state corresponding to an end node changes at the access node 140, the CSMN 104 will be promptly updated. This approach of triggering state update messages 520 is particularly useful where state changes occur due to signals and/or internal access node operations which the end node 146 may not be aware of. While this method of triggering state updates at the access node 140 has been described in the context of the
The state update message, AN-STU message 520 comprises the End Node X 146 identifier and state associated with said end node as available to Access Node 140. As will be discussed further below, in various embodiments it also includes an Access Node identifier which identifies the access node sending the state update message. It may also include one or more of an Access Node independent count value such as a time stamp which is access node independent and can be interpreted without knowledge of the access node sending the time stamp and an access node dependent count. Given the difficulty in generating an access node independent count in a highly precise manner, e.g., due to the problem of synchronizing different elements in the system at a very fine level down to the time that two sequential state update messages may be sent from an access node, the access node independent count may be incremented on a slower time scale than the access node dependent count. The access node dependent count is incremented at a rate sufficient to distinguish between state update messages generated by an individual access node. If the access node independent count can be incremented at such a rate, the access node dependent count need not be used. However, by using the two counts in combination, a highly reliable decision can be made as to whether a received message includes state which is newer than a stored message. This reliability is due in part to the fact that mobile devices often switch between end nodes at a rate which is comparatively slower than the rate at which state update messages may be generated at an access node, e.g., due to repeated changes in service and/or service requests made by the end node.
On reception of the AN-STU message 520 the Core State Management Module 412 (
End Node X 146 sends a Retrieve State Request (RSRQ) message 550 to Access Node 140′ comprising the End Node X 146 identifier. On reception of said RSRQ message 550 Access Node 140′ sends a State Transfer Request (STRQ) message 560 comprising the identifier of End Node X 146 to CSMN node 104. On reception of said STRQ message 560, the Core State Management module 412 (
In an alternative embodiment of this invention the SSRQ message 510 additionally includes the identifier of Access Node 140′ that End Node X 146 wishes to exchange data with. In that case Access Node 140 sends an additional copy of the AN-STU message 520 to the Access Node 140′ as indicated by AN-STU message 521. Access Node 140′ receives said message and stores state included in said message and associated with said end node. In this embodiment of the invention when Access Node 140′ receives RSRQ message 550 it first checks its state management data 313 (
In the various embodiments described above in regard to
Removal of State from CSMN
State may be removed from the CSMN, e.g., upon expiration of a timer. State may also be removed by overwriting it with more recent state corresponding to the same end node as the state being overwritten such overwriting will result in resetting of the time associated with the stored state. In one embodiment of this invention, on reception of AN-STU message 520, the CSMN 104, in addition to the processing described in the previous two sections, starts a timer of predetermined or negotiated value and associates said timer with the state included in the received message 520 and stored in its core state management data 413 (
State Unavailable
In some cases, requested state information may not be available in the CSMN. In one embodiment of this invention, if no state is available for the end node indicated in a received STRQ message 560, the CSMN 104 returns a CSMN-STU message 570 including an indication that no state is available for said end node. In an alternative embodiment of this invention if no state is available for the end node indicated in a received STRQ message 560, the CSMN 104 starts a predetermined or negotiated timer and associates it with said message 560. If state for the end node identified in message 560 is received, say in a AN-STU message 520, prior to the timer expiring, the CSMN processes message 520 as described earlier and immediately stops the timer and sends a CSMN-STU message 570 to Access Node 140′. If the timer expires and no appropriate state is received then the CSMN node 104 returns a CSMN-STU message 570 including an indication that no state is available for said end node. In a third embodiment of this invention if no state is available for the end node indicated in a received STRQ message 560, the CSMN 104 sends an optional Transfer State Request (TSRQ) message 561, comprising the identifier of End Node X 146 and the identifier of Access Node 140′ that is currently requesting state, to the last access node that requested state for said end node X 146, i.e.: Access Node 140. In this case Access Node 140 sends the AN-STU message 521 to the Access Node 140′ as indicated in
State Updates
In one embodiment of this invention state information included in an AN-STU message 520, received by CSMN node 104 overwrites any existing state information in the core state management data 413 (
State Manipulation at CSMN
In one embodiment of this invention the CSMN modifies state associated with an end node according to local policy before it sends it to a requesting access node in a CSMN-STU message 570.
State Indication from AN to EN
In one embodiment of this invention the RSRP message 580 from access node 140′ includes an indication of the state received by the access node in a corresponding CSMN-STU message 570. In one embodiment of this invention the indication provided is a digest which allows the end node to compare the received digest with a digest of the state it had at the access node 140, and to recognize whether the state is correct or not. In cases where the end node knows that the state should match or should differ from the one stored through access node 140, the end node can take further action according to fault detection policies.
Loss of Link
In one embodiment of the present invention, Access Node 140 sends the AN-STU message 520 as soon as it detects the loss of connectivity with End Node X 146.
Core State Management Between Regions: Reactive Approach
In
State associated with End Node X 146 is stored in CSMN node 104 with the method described in
On reception of said Core-STRQ message 663, the Core State Management module 412 (
Region ID to CSMN Mapping
In one embodiment of this invention the Region ID referred to above identifies the CSMN node of the same region. In an alternative embodiment of this invention the Region ID is of a structure that allows the resolution of that ID to an ID that identifies the CSMN Node of that Region.
Core State Management Between Regions: Proactive
On reception of AN-STU message 720, the core state management module 412 (
Messages 650, 660, 670 and 680 are now generated, processed and exchanged in the same way as described in
Hierarchical Core State Management
On reception of said STU′ message 522 including said state and the identifier of End Node X 146, CSMN Node 104″ stores the state included in said message in its Core State Management data 413 (
State transfer in accordance with this invention may take place for a number of reasons. In one embodiment of this invention state transfer is initiated by an end node during a handoff process. The end node attempts to terminate connection with one access node and establish a new connection with another access node due to movement, in which case state transfer as part of a mobility management system, enables the efficient and speedy establishment of connectivity with the new access node with as little interruption as possible to the end node data communication. In one embodiment of this invention the state transfer method described is followed by a routing update message from the new access node or the end node redirecting any data traffic towards the new location of the end node. In one exemplary embodiment of this invention such a routing update would be in the form of Mobile IP registration, while in another embodiment would be a Mobile IPv6 binding update.
In an additional embodiment of this invention state transfer is initiated as part of the transition of an end node from an active state to a dormant state, where data communication is temporarily suspended. In this case state transfer ensures that when end node becomes active again at some future time and possibly at some different access node, connectivity can be initiated quickly and efficiently.
In a yet another embodiment of this invention state transfer is initiated when a link between an end node and an access node is lost, in which case the state transfer mechanism is used for robustness, since the end node may attempt to reconnect via another access node at a future time, again making the reconnection process quick and efficient.
In the
In one embodiment of the invention Aggregated State Request (ASR) messages 801, 803 are sent one at a time in a round robin way but also periodically where the periodicity is preconfigured. In an alternative embodiment of this invention Aggregated State Request (ASR) messages 801, 803 are sent in a round robin way but at times were the loading on the server is below a preconfigured threshold. Alternatively, other techniques for scheduling and/or timing messages 801, 803 may be used.
In one embodiment of this invention state transfer is implemented overlaid on the AAA system, in which case state transfer messages are novel extensions to already existing AAA messages (e.g.: RADIUS messages) or they are novel AAA messages. In such an embodiment, the CSMN node may be implemented as a AAA server and belongs to a AAA hierarchy. In an alternative embodiment of this invention the CSMN node is a Mobile Home Agent in which case state transfer messages are implemented as novel extensions to already existing Mobile IP messages or as novel Mobile IP messages. In one embodiment of this present invention, the system is a cellular network. In such an embodiment the access nodes maybe implemented as access routers. Network nodes may be implemented as routers and end nodes may correspond to, e.g., be implemented as, mobile nodes.
In the illustrated system 900 end node X 946 has communications links 510, 550 with the first and second access nodes 940, 940′, respectively. The system 900 includes one or more additional nodes 120 which perform routing operations. The
AAA protocols use different sets of messages for Authentication/Authorization (also call AA) e.g.: Access Requests/Replies and different messages for Accounting (also called A) e.g.: Accounting Requests/Replies. Also the AA part of the AAA server typically just reads the database to retrieve the user profile. That is, the authentication/authorization part normally does not write in the database. The Accounting part of the AAA server, however, typically writes in the database to store the accumulated accounting information for a given end node. Typically the records created by the Accounting server are separate from those created by the AA part of the AAA server. The AA and A parts of the AAA system are logically considered to be one thing (i.e.: AAA), yet in some case the AA and A parts of the AAA system may be physically separated, e.g., on different servers which comprise part of the database 910.
In one embodiment of the invention depicted in
On reception of the Access_Request message 520′ the AAA Server 904 processes the message and sends a database_write message 905 to the database to store the state included in said message such that said state is associated with the identifier of the end node also included in said message. The database 910 returns a database_write_ack message 906 to the AAA server 904 indicating the success of the write operation. The AAA node 904 also returns a novel version of Access_Accept message 530′ to Access Node 940 indicating the correct reception and storage of said state, rather than the typical grant of access to an end node.
End Node X 946 sends a Retrieve State Request (RSRQ) message 550 to Access Node 940′ comprising the End Node X 146 identifier (e.g.: its NAI). On reception of said RSRQ message 550 Access Node 940′ sends a Authentication/Authorization Access_Request message 560′ (equivalent to STRQ message 560 in
On reception of said Access request message 560′, AAA Server 904′ processes said message and sends database_read message 907, comprising the end node 946 NAI, to database 910. On reception of message 910 the database searches its memory for state information associated with the End Node X 946 indicated in said database_read message. State associated with End Node X 946 that was earlier stored is found and a the database 910 returns the state in message 908 to the AAA server 904′. On reception of said message 908, AAA server 904′ sends Access_Accept message 570′ (equivalent to CSMN-STU message 570 in
On reception of Access_Accept message 570′, Access Node 940′ stores state included in said message in its state management data 313 (
In one embodiment of this invention it is possible that on reception of message 907 the database 910 has no dynamic state associated with said end node 946. In this case database 910 may have static state associated with end node 946 in the form of user profile that is not context transferred. In this case the static state for end node 946 is returned to AAA Server 904′ via message 908. In this case AAA server 904′ may start normal authentication procedures between itself and End Node 946 before it returns Access_Accept. This characteristic of the invention integrates normal end node authentication with context transfer creating a consistent and robust method for accepting end nodes into the system wither for the first time or following a handoff.
The same or similar functionality can be implemented based on the Accounting part of the AAA server by any expert in the art.
In
In accordance with the exemplary embodiment shown in
In some applications, the state change in the Access Node 140 which triggers generation and transmission of message 520 is due to End Node X 146 requesting a service, e.g., via a Service Request signal 1005 transmitted from the end node 146 to the Access Node 140. Said signal 1005 causes Access Node 140 to send corresponding Core Service Request signal 1010 to Server 1000 which, in this example, is responsible for the service requested by End Node X 146. Server 1000, receives and processes Core Service Request signal 1010 and responds with Core Service Response signal 1020. The core service response signal 1020 may be, e.g., a service grant or a service reject signal. Signal 1020 may, and often does, include information about the service offered, e.g., being provided, to the requesting end node X 146. In response to core service response signal 1020 the Access Node 140 may generate, change or remove state associated with End Node X 146 in Access Node 140, e.g., to reflect service information provided in message 1020. This change in state information inside Access Node 140, relating to End Node X 146, will thus trigger the Access Node 140 to generate and transmit AN-STU message 520 from Access Node 140 to CSMN Node 104 to thereby update the CSMN 104 so that the stored state information for End Node X 146 in the core node 104 will reflect the recent changes in the access node 140.
In one exemplary embodiment of this invention Server 1000 is a AAA server that provides authentication and authorization services to End Node X 146 and Access Nodes 140 and 140′. In one such exemplary embodiment Service Request signal 1005 is an Access Request signal that includes information, e.g., an end node identifier, indicating the identity of said End Node X 146. The end node identifier may be, e.g., a Network Access Identifier corresponding to End Node X 146.
Access Node 140 sends, e.g., transmits, Core Service Request signal 1010, which in this example is an Access Request signal including the identity of said End Node X 146, to server 1000. AAA Server 1000 checks the identity of End Node X 146 by examining the access node identifier included in the Request signal 1010 and if the identity is confirmed and the requested service is authorized for the requesting end node X 146, the AAA server 1000 responds with a Core Service Response signal 1020, which in this example is an Access Accept signal. The access Accept signal 1020 will normally include the mobile node identifier of End Node X 146 together with said Node's user profile, e.g., End Node's X 146 static state corresponding to service(s) authorized to be provided to End node X 146 by Access Node 140. Access Node 140 receives state included in said signal 1020 and sends at least some of End Node's X 146 state, e.g., received user profile information, in an AN-STU signal 520 to CSMN Node 104 so that the CSMN Node 104 will include information reflecting the state for End Node 146 stored at the Access Node 140.
Part of the state returned in the Access Accept signal 1020 in some embodiments of this invention is a timer indicating the lifetime of the state included in the signal 1020. Expiration of said timer may also trigger a state transfer AN-STU signal 520, e.g., indicating to the CSMN 104 that the part of the state that has timed out should be removed from the CSMN 104. Thus, timing out and removal of outdated state at the Access Node 140 will trigger a state update message to the CSMN 104 so that the state there will also reflect the change in the state stored at the Access Node 140.
As discussed above, rather than being a AAA server, Server 1000 may be a Mobile IP Home Agent. In one such embodiment signal 1005 and 1010 are Mobile IP Registration Request Messages and signal 1020 is a Mobile IP Registration Reply message including a Home Address and a Mobile IP Lifetime. In such an exemplary embodiment, Access Node 140 sends AN-STU signal 520, including End Node X's Home Agent address, Home Address, and, optionally, Mobile IP Lifetime, to CSMN 104. This allows CSMN 104 to store and update such state information in response to changes at the Access Node 140 thereby keeping the content of the state information stored at CSMN 104 current.
In some embodiments of this invention expiration of said Mobile IP Lifetime at the Access Node 140 results in removal of the outdated state information in the Access Node. This will trigger a state transfer AN-STU signal 520 to the CSMN 104 signaling that the CSMN 104 should also remove the state which was deleted from the Access Node 140. Alternatively, where the CSMN 140 is supplied with the Mobile IP Lifetime, it may automatically remove the state when the Lifetime information indicates it is no longer valid.
In a yet another exemplary embodiment of this invention Server 1000 may be a Session Initiation Protocol (SIP) server. In such a case, request signals 1005 and 1010 are SIP INVITE Messages and response signal 1020 is a 200OK message. In one such embodiment the 200OK (or other appropriate session establishment) message includes call identifiers relating to a call corresponding to End Node X 146, as well as a SDP description of the call and the resources required for the call to proceed successfully. Access Node 140 sends AN-STU signal 520, including the resources required for said call to proceed successfully to CSMN Node 104 where this information is used to update stored state associated with End Node X 146.
200OK signal or other equivalent SIP signal 1020 in some embodiments of this invention includes a timer indicating the lifetime of the established session. Expiration of said timer, in some embodiments, will trigger a state transfer AN-STU signal 520 signaling to the CSMN 104 expiration of the portion of End Node X 146 state associated with the expired timer.
In some embodiments of the invention the AN-STU signal 520 includes an Access Node identifier, e.g.: an IP Address. In such embodiments signal 520 may also include a local update message count. The local update message count can be generated by a counter local, e.g., internal, to the sending Access Node, e.g., Access Node 140. In the case of an end node specific count, the message count is incremented each time an AN-STU 520 signal is sent for state associated with a given End Node, e.g., End Node X 146. In a more general case, the count is incremented each time a message 520 is sent by the particular Access Node 140. In addition to the local update message count, said message 520, may include a sequence number which is incremented with every AN-STU message across all Access Nodes. The sequence number maybe, e.g., a timestamp, and can be used in messages 520 which do not include the local update message count as well as messages 520 which include a local message count.
On reception of an AN-STU message 520 the CSMN 104 performs one or more of the following checks:
Compares the AN ID, in said message 520, with the current AN ID stored for state associated with an End Node in question, e.g., the End Node associated with the message being checked. If the current AN ID is NULL (e.g., doesn't exist in the CSMN 104) then the state in the received AN-STU 520 is stored in the CSMN 104 and becomes the current state. If Current AN ID matches an existing AN ID in the AN-STU message 520 then a counter value in message 520 is checked against a corresponding counter value stored in CSMN 104. If the counter in the received message 520 indicates that the message is older than the stored state, e.g., the counter is lower than the counter value stored in the CSMN 104, message 520 is rejected. If, however, said counter value included in message 520 is higher than the one stored the state in the CSMN 104, state from the AN-STU message 520 is used to replace corresponding state stored in the CSMN 104 thereby becoming the current state stored in CSMN 104 for the End Node X 146 corresponding to the received message 520. Particular exemplary embodiments which use multiple counter values to determine if a state updated message should be accepted at the CSMN 104 are described in detail with reference to the flow chart 1400 shown in
An End Node specific counter value, which is access node dependent, e.g., is local to the Access Node which sends the message and will vary depending on which access node generated the message, is included in message 520. This access node dependent, e.g., access node specific, count included in the AN-STU message 520 ensures that newer, more up-to-date state corresponding to a given End Node identified in the message 520 will replace previously stored state that is accessible to the CSMN 104 which was received from the same Access Node. It also makes sure that delayed and/or out of order messages 520 from an Access Node will not result in the overwriting of stored state obtained from more recent state update messages 520 received from the same access node as the delayed message 520. To facilitate this feature, in some embodiments, each access node maintains an AN specific state update message counter for each end node which uses the access node as the end nodes point of network attachment. As state update messages are sent for an end node over time, the access node dependent counter corresponding to the end node is modified, e.g., updated. The access node dependent counter corresponding to an end node may be a timer such as a clock or an state update message counter which monotonically changes (e.g.: increases or decreases) with each state update message transmitted by the end node. The access node dependent count need not be implemented on an end node specific basis and a single access node dependent count could be shared by multiple end nodes, e.g., with the access node modifying the count with each state update message transmitted or as time passes. The access node dependent count can be maintained independently by each Access node 140, 140′ and need not be synchronized between the access nodes.
If current AN ID does not match the AN ID in the AN-STU message 520 then the CSMN compares a Access Node independent count such as a timestamp that will be the same regardless of which access node generated the state update request signal 520. The access node independent count may be a timer value which is not access node dependent, e.g., a time stamp based on a signal received from the end node to which the updated state information corresponds or a time stamp corresponding to a timer which is synchronized across multiple end nodes in the system. If this access node independent value, e.g. timestamp, in message 520 indicates that the received message is not newer than the stored state corresponding to the end node identified in the message 520, e.g., if it has a lower or equal value, the update message 520 is rejected. If the AN independent count value, e.g., timestamp, in message 520 indicates the state is newer than the stored state, e.g., if the timestamp has a more recent, e.g., higher value than the store timestamp, then the state in AN-STU message 520 is used to replace the stored state corresponding to the end node identified in the state update message 520 and becomes the current stored state in CSMN node 104 for the identified end node. The full contents of the message 520 may be stored in the CSMN 104 when a state update message is accepted.
The access node independent count value included in a state update message may be, e.g., an End Node specific Sequence Number or timer value that is updated in a known manner, e.g., in an ascending sequence, across all Access Nodes and can be a timestamp that is used to make sure that the latest AN-STU messages will change the state stored in the CSMN while older previously rejected, previously processed or delayed AN-STU messages are rejected.
Wrong Old Access Node
Upon arriving at a new access node 140′ or seeking to initiate a handoff to the access node 140′, the End Node X 146 may send a signal 550 to the Access node 140′ indicating its arrival in cell corresponding to the access node and a desire to connect to and/or handoff to the access node 140′. The message 550 will normally include an End Node identifier identifying the End node 146, information indicating the Access Node 140 which is currently or was most previously servicing the End Node X 146, and may also include an identifier corresponding to Access Node 140′.
The Access Node 140′ which is the destination Access Node in the case of an exemplary handoff, requests state from CSMN 104, e.g., in response to message 550, by sending a STRQ message 560 to said CSMN 104. The STRQ message 560 will normally include the End Node X 146 identifier, and the Access Node 140 and 140′ identifiers.
On reception of said STRQ message 560, the Core State Management module 412 (see
The CSMN node 104 then compares the current Access Node identified in the stored state with the Access Node 140 included in the STRQ message 560. If these do not match the CSMN 104 sends a rejection in message 570 indicating that state is not being supplied in response to message 560. However, if they match, the CSMN 104 provides stored state corresponding to the End Node 146 to Access Node 140′ in message 570.
Thus, in embodiments where the information identifying the last used access node 140, e.g., form which a handoff is to occur, in the message 550 does not match the information stored in the CSM 104 indicating the access node most recently used by End Node X, indicating that the state in the CSMN 104 for End Node X 146 is out of date, state may not be returned to access node 140′. In response to a rejection of a state request, Access Node 140 may take steps to create new state for End Node X 146, e.g. by contacting a AAA server or other device.
Re-Synch on Handoff
In
In some embodiments of this invention End Node X 146 is able to maintain connectivity with at least two Access Nodes, e.g.: Access Node 140 and 140′ at the same time. In such an embodiment after initial state retrieval sequence with messages 550, 560 and 570, Access Node 140′ is state synchronized with Access Node 140 and thus offers equivalent service with End Node X 146. In some such embodiments it is possible that state in one of the Access Nodes is modified (e.g.: Access Node 140), for example due to End Node requesting additional resources from the network. The state change in one of the access nodes causes, e.g., triggers generation and transmission of an AN-STU message 520 to be sent from Access Node 140 where the change occurred to CSMN Node 104.
In some embodiments of this invention the AN-STU message 520 includes the identifier Access Node 140′, in which case the CSMN Node 104 sends the updated state to Access Node 140′ in a CSMN-STU message 570 in addition to storing it in the CSMN 104 thereby maintaining synchronization of the state in each of the Access Nodes 140, 140′ which are operating as points of attachment for the End Node 146.
In an alternative embodiment of this invention the CSMN node 104 keeps in memory (e.g.: core state management data 413 of
In a further embodiment of this invention the state synchronization is triggered by End Node X 146 sending a signal 1025. Is some embodiments of this invention said signal 1025 is the same as or similar to Retrieve State Request (RSRQ) message 550.
In some other embodiments End Node X 146 performs a Mobile IP registration via Access Node 140′, in which case signal 1025 is a Mobile IP Registration Request. This causes new state to be created in Access Node 140′ (e.g.: a new Mobile IP Lifetime to be set) causing Access Node 140′ to send a AN-STU message 520′ to CSMN node 104. Said AN-STU message 520′ includes the Access Node 140 identifier as well as the counter value included in the CSMN-STU message 570 received earlier. CSMN node 104 then compares the Access Node 140 identifier, counter value and/or timestamp in the message 520′ with the corresponding values in the current state stored. If the state stored appears to be newer that the state in the message (e.g.: the counter stored is higher) then the AN-STU message from Access Node 140′ is rejected and a CSMN-STU message with the stored state is sent to Access Node 140′ in CSMN-NACK message 1040. Following processing of said message 1040, Access Node 140′ may send AN-STU message 520″ now including the updated state. This time CSMN 104 performs the same checks but the state in AN-STU 520″ appears to be newer than the state store and thus state in AN-STU 520″ becomes current state in CSMN 104.
In
At some point while still connected to the network via access node 140, End Node X 146 sends a message, which is the same as or similar to Retrieve State Request (RSRQ) message 550′ of
In other embodiments, e.g., where the end node is able to communicate with multiple access nodes 140, 140′ at the same time or easily switch between communicating with two access nodes, the need to communicate with second access node 140′ via the first access node 140, prior to establishing a wireless communications link with the second access node 140′ may not exist although the mechanisms described are still applicable.
On reception of message 550′, Access Node 140 forwards the message 550′ or communicates the content of the message 550′ to the Access Node 140′ as message 550″. The reception of message 550″ by Access Node 140′ may be treated in the same way as the reception of message 550 in
In an embodiment where the CSMN 104 is implemented as a AAA server which is responsible for performing device authentication and service authorization operations, the AAA server 104 returns, prior to providing state 570, challenge information in challenge message 561. The challenge information is used by access node 140′ to construct a challenge message intended to elicit a response from the end node X which can be used to authenticate the end node 146. The challenge information may be a value generated by the CSMN 104 using a shared secret, e.g., a secure key known to the CSMN 104 and to the end node 146. The challenge information is communicated by the access node 140′ to the end node 146 via a challenge message 556″ directed to the end node 146 via access node 140. The access node forwards the challenge message as message 555′, e.g., using conventional IP routing to direct the message to the end node 146.
The end node 146 responds to the challenge message 555′ by generating a response using, e.g., the shared secret stored in the end node and a hash function. A response message 556′ is generated and directed to access node 140′ via access node 140. Access node 140 forwards the challenge response message 555′ as challenge response message 555″. The access node 140′ communicates the challenge response to the CSMN 104 in a message 563 which, in this example, is a AAA server. The CSMN 104 verifies (authenticates) the end node by comparing the received challenge response to what it expected to receive. Assuming the authentication operation is successful the CSMN then returns state 570 which includes end node configuration information as well as other state information which will be used by the Access Node 140′ to set up a communications session and thus provide a service to the end node 146′.
As an alternative to having the CSMN 104 verify that the expected response was received from the end node 146 in reply to the challenge, in some embodiments the CSMN 104 returns with state 570 challenge and expected response information and allows the access node to determine if the expected response is received prior to sending the end node the configuration message 558″. In such an implementation, messages 561, 563 can be avoided.
In another embodiment the CSMN 104 returns state 570 including key material that allows Access Node 140′ to generate the challenge message 555′ by itself. In this case messages 561, 563 can be avoided and the Access Node 140′ will perform the authentication operation by examining the challenge response 556″ to check if it includes the expected response.
The end node configuration information is communicated to end node 146, in this example, by way of a configuration message 558″ which is directed to the end node 146 via access node 140. The configuration message is sent from access node 140 to end node x 146 as message 558′. In this manner, end node X 146 can be authenticated for communication via Access Node 140′ and receive configuration information which will be used to communicate via Access Node 140′ prior to establishing communications with access node 140′ via a wireless communications link. When the end node X is ready to establish a communications link via a wireless connection, is signals access node via message 1060. This signal 1060, which may be a mobile IP registration message, may cause or trigger a state change in access node 140′. This will, in some embodiments, trigger generation of a state update message 520. Message 520 will be sent to the CSMN 104 which will be handled, e.g., as previously discussed with regard to
Challenge request and response messages are shown being communicated via the first access node 140, e.g., the access node from which a handoff is occurring. However, in some embodiments, the end node 146 connects to the second access node 140′ after sending the message 550′ via the first access node 140 and completes the challenge/response process via a wireless connection with access node 140′.
In some other embodiments of this invention the challenge/response exchange takes place between End Node 146 and Access Node 140′ via Access Node 140 but then configuration message 558 is sent directly from Access Node 140′ to End Node 146 over the wireless link.
In one embodiment of this invention the End Node X 146 ID is a link layer address, e.g.: EUI64. In another embodiment is an IP address while in still yet another embodiment a device identifier, such as a specific number assigned to identify the End Node. In one embodiment of this invention the Access Node 140′ identifier is a slope ID, in another embodiment a device ID and in another embodiment is an IP address.
In one embodiment of this invention signal 550′ is a link layer message while message 550″ is an IP layer message including the content of message 550′. In another embodiment of the invention message 550′ and 550″ is essentially the same IP layer message sent by End Node X 146 and forwarded by Access Node 140 to Access Node 140′.
Methods and apparatus for using End node identification information such as an end node ID, an Access node dependent count, an Access Node specific count value, and other information which may be included in a state update message sent to the CSMN 104 have been described with regard to the various figures discussed above. One exemplary routine, which can be stored in memory and used to control CSMN updates of state information corresponding to end nodes in accordance with the invention, is shown in
Before explaining the flow chart 1400 shown in
Message 520 as shown in
Access node identifier 1502 identifies the access node which is sending the message 520. End node identifier 1504 indicates, e.g., identifies, the end node to which the state 1516 corresponds. Access node independent count 1506 may be a time stamp or other value which can be used to correlate messages from different access nodes and is therefore access node independent. Access node independent count 1506 may be, e.g., a time stamp signal received from an end node or based on a signal from an end node, e.g., the end node identified by end node id 1504. The access node dependent count 1508 will vary in value depending on the access node which generated the message 520. The access node dependent count 1508 may be a message counter, e.g., corresponding to the identified end node or shared by a plurality of end nodes using the identified access node, which is incremented as state update messages 520 are generated. The access node dependent count may be a timer as opposed to a message count assuming the timer is modified at a sufficient rate that will cause state update messages generated sequentially to be assigned different access node dependent count values.
As will be discussed below, when a CSMN stores state corresponding to an end node, it normally stores the count values 1506, 1508 along with the state 1516. These values will be returned to and stored by an access node in response to a request for state information corresponding to an end node. Thus, when an access node receives and stores state from a CSMN 104, if the received state includes an access node ID 1502, and counts 1506, 1508 it will store these values and return them to the CSMN 104 when updating the state corresponding to the end node identified in field 1504 by including this information as an optional second access node id 1514, optional second access node dependent count 1510 and optional second access node dependent count 1512. These optional values will not be present in the state stored in the access node generating the state update request message 520 if the state in the access node was not generated from state supplied earlier to the CSMN 104 from another access node. Accordingly, these values may or may not be included in a state update message 520 depending on how the state information 1516 included in the message was generated.
Having discussed the general content of an exemplary state update request message 520, processing of such a message in accordance with the exemplary routine 1400 at a CSMN 104, which implements a method of the invention, will now be described in detail with reference to
The routine 1400 starts in step 1402 with the routine being executed by a CSMN 104. In step 1406, a state update message 520 is received. Thus, step 1406 will be performed each time a state update message 520 arrives at the CSMN 104. The message 520 includes, e.g., the content shown in
In step 1408, the CSMN 104 checks to determine if there is stored state available to the CSMN 104 corresponding to the identified end node for which state is provided in the received state update message. This may be done by checking a state database included in the CSMN 104 or accessible to the CSMN 104 for any state entries including the end node ID included in the received message. If no stored state corresponding to the end node identified in message 520 is found, operation proceeds to step 1420 wherein a new state entry is created for the identified end node with the information, e.g., the entire content, of the received state update message 520 being stored in the created entry.
However, if in step 1408 it is determined that there is stored state in a state entry corresponding to the end node identified in received state message, the state entry is retrieved and operation proceeds to step 1410. In step 1410, the access node identifier 1502 included in the received state message 520 is compared to an access node ID included in the retrieved stored state information corresponding to the identified end node.
If the received access node ID 1502 matches the access node ID included in the state retrieved from storage, operation proceeds to step 1412 where the access node dependent count is used to determine if the stored state is older than the stored state. For example, assuming an access node increments the access node dependent count each time it sends a state update message, in step 1412 a simple comparison can be used to determine if the received state is newer than the stored state. In such a case, if in step 1412, a comparison indicates that a received access node dependent count is greater than the stored access node dependent count, the state in the received message is newer than the stored state and operation will proceed to step 1420 wherein the stored state is updated.
If, however, in step 1412 it is determined that the state in the received message is older than the stored state, the state update request is rejected and operation proceeds to step 1416 with the stored state corresponding to the identified end node being left unchanged. In step 1416, an update request message is generated and transmitted to the access node which sent the state update message.
If in step 1410, it is determined that the received access node ID 1502 corresponding to the access node which sent the message does not equal the stored access node ID, indicating that the state update is from a different access node than the one which provided the stored state for the identified end node, operation proceeds to step 1414. In step 1414, the access node independent count 1508 in the received message is compared to the access node independent count included in the stored state corresponding to the identified end node to determine if the received state is newer than the stored state. In the case where the access node independent count is a time stamp, a more recent time stamp in the received message would indicate that the received state is newer than the stored state.
If the received state is determined to be older than the stored state in step 1414, the state update request is rejected and operation proceeds to step 1416 wherein a state update reject message is generated. Operation proceeds from reject message generation step 1416 to reject message transmission step 1418.
If in step 1414 if it is determined that the state received from the identified end node is newer than the stored state based on the access node independent count, operation proceeds to step 1417. In step 1417 the optional second access node specific count, which indicates the access node specific count associated with the last state update message received by the access node in regard to the identified end node is examined to determine if the state upon which the received update message 520 is based was at least partially out of date.
A state update message may be based on out of date state in the case where a mobile node maintains connections with multiple access nodes 140, 140′ at the same time, e.g., using dual receivers. The end node 146 may switch between using the two wireless communications links depending on which one is better at a given point in time. If a change in state occurs in one access node, e.g., access node 140, due to signals transmitted through the access node, the access node will update the state stored in CSMN 104. However, this change may not have been propagated to the second access node 140′. An attempt to communicate or request a service via access node 140′ may trigger a state update message from access node 140′ but the supplied state may be partially out of date if it includes information previously received from the CSMN 104, e.g., prior to one or more updates sent by access node 140 after an original update. In step 1417, it is possible to detect that the state update from the access node is based on out of date state because the second optional an dependent counter value included in the state will be different, e.g., lower that the an dependent counter value stored in the CSMN 104.
If in step 1417 it is determined the state upon which the update is based was not out of date, e.g., the optional second AN dependent count 1510 matches or is more current (e.g., greater than) the AN dependent count in the state stored at the CSMN 104, operation proceeds to step 1420 wherein the state is updated, e.g., overwritten, with the state information included in the received state update message 520. From step 1420 operation proceeds to step 1422 wherein an acknowledgement signal is transmitted to the access node which sent the state update message indicating that the state update was performed. Form step 1422 operation proceeds to STOP step 1422 where processing in regard to the received state update message stops.
However, if in step 1417 it is determined that the state upon which the state update message 520 is based is at least partially out of date, operation proceeds to step 1419, without updating the stored state. In step 1419 a state update reject message is generated. The reject message includes the stored state, corresponding to the end node, that was retrieved by the CSMN 104. Thus the reject message will include the most recent state obtained from the last access node to update the state stored in the core which, in the example, was a different access node than the one sending the current state update message being processed. Operation then proceeds to step 1418 where the generated reject message is sent to the access node.
In response to receiving a reject message including state information e.g., state which was originally supplied to the CSMN 104 from access node 140, the access node receiving the state in the reject message, e.g., access node 140′ will update its internal state by combining the received state with the most recently generated state changes which had triggered the rejected state update message. The updating of the state in the access node 140′ will trigger a new state update message. This time however, the check in step 1417 will be satisfied since the state message will now include a second optional access node dependent count which will match the access node dependent count stored in the CSMN 104.
After sending a reject message 1418, operation in regard to processing a received state message proceeds to step 1422 wherein CSMN processing with regard to the particular received state update message stops.
It should be appreciated that the access node independent count is likely to be used when an end node changes its point of attachment or node through which is has selected to communicate. Such a change is likely to be reflected at an access node to which communication is being switched by the receipt of a signal from the end node used to initiate the change. In some embodiments, the access node independent count is generated by the access node from one or more signals received from an end node, e.g., from time stamps included in one or more end node messages. When a state update is triggered by a message or event other than one related to an access node, it is unlikely to involve a change in what access node the mobile is communicating through. Accordingly, assuming updating of the access node independent count is based on receipt of a signal from a mobile node, this should be sufficient to allow the system to distinguish if a state update message from one access node through which a mobile device communicates is older than another state update message from a different access node through which the mobile device was or is communicating.
In various embodiments nodes described herein are implemented using one or more modules to perform the steps corresponding to one or more methods of the present invention, for example, signal processing, message generation and/or transmission steps. Thus, in some embodiments various features of the present invention are implemented using modules. Such modules may be implemented using software, hardware or a combination of software and hardware. Many of the above described methods or method steps can be implemented using machine executable instructions, such as software, included in a machine readable medium such as a memory device, e.g., RAM, floppy disk, etc. to control a machine, e.g., general purpose computer with or without additional hardware, to implement all or portions of the above described methods, e.g., in one or more nodes. Accordingly, among other things, the present invention is directed to a machine-readable medium including machine executable instructions for causing a machine, e.g., processor and associated hardware, to perform one or more of the steps of the above-described method(s).
Numerous additional variations on the methods and apparatus of the present invention described above will be apparent to those skilled in the art in view of the above description of the invention. Such variations are to be considered within the scope of the invention. The methods and apparatus of the present invention may be, and in various embodiments are, used with CDMA, orthogonal frequency division multiplexing (OFDM), or various other types of communications techniques which may be used to provide wireless communications links between access nodes and mobile nodes. In some embodiments the access nodes are implemented as base stations which establish communications links with mobile nodes using OFDM and/or CDMA. In various embodiments the mobile nodes are implemented as notebook computers, personal data assistants (PDAs), or other portable devices including receiver/transmitter circuits and logic and/or routines, for implementing the methods of the present invention.
This application is a continuation of U.S. Ser. No. 12/691,134, filed Jan. 21, 2010, entitled “Enhanced Techniques for Using Core Based Nodes for State Transfer, which claims priority to Continuation-in-Part U.S. Pat. No. 7,668,541, granted Feb. 23, 2010, which claims priority to U.S. Pat. No. 6,862,446, Granted Mar. 1, 2005 which claims priority to Provisional Application No. 60/444,299, filed Jan. 31, 2003, all are hereby expressly incorporated by reference.
Number | Name | Date | Kind |
---|---|---|---|
4833701 | Comroe et al. | May 1989 | A |
5117502 | Onoda et al. | May 1992 | A |
5128938 | Borras | Jul 1992 | A |
5200952 | Bernstein et al. | Apr 1993 | A |
5208837 | Richey | May 1993 | A |
5229992 | Jurkevich et al. | Jul 1993 | A |
5247516 | Bernstein et al. | Sep 1993 | A |
5251209 | Jurkevich et al. | Oct 1993 | A |
5267261 | Blakeney, II et al. | Nov 1993 | A |
5268933 | Averbuch | Dec 1993 | A |
5388102 | Griffith et al. | Feb 1995 | A |
5490139 | Baker et al. | Feb 1996 | A |
5491835 | Sasuta et al. | Feb 1996 | A |
5509027 | Vook et al. | Apr 1996 | A |
5539925 | Yli-Kotila et al. | Jul 1996 | A |
5561841 | Markus | Oct 1996 | A |
5572528 | Shuen | Nov 1996 | A |
5574720 | Lee | Nov 1996 | A |
5594943 | Balachandran | Jan 1997 | A |
5694548 | Baugher et al. | Dec 1997 | A |
5722044 | Padovani et al. | Feb 1998 | A |
5737328 | Norman et al. | Apr 1998 | A |
5794137 | Harte | Aug 1998 | A |
5854785 | Willey | Dec 1998 | A |
5870427 | Tiedemann et al. | Feb 1999 | A |
5940371 | Mitts | Aug 1999 | A |
5974036 | Acharya et al. | Oct 1999 | A |
5978366 | Massingill et al. | Nov 1999 | A |
6016316 | Moura et al. | Jan 2000 | A |
6018521 | Timbs et al. | Jan 2000 | A |
6031863 | Jusa et al. | Feb 2000 | A |
6034950 | Sauer et al. | Mar 2000 | A |
6049543 | Sauer et al. | Apr 2000 | A |
6055428 | Soliman | Apr 2000 | A |
6073021 | Kumar et al. | Jun 2000 | A |
6084969 | Wright et al. | Jul 2000 | A |
6094427 | Yi | Jul 2000 | A |
6097952 | Kawabata | Aug 2000 | A |
6101394 | Illidge | Aug 2000 | A |
6137787 | Chawla et al. | Oct 2000 | A |
6144671 | Perinpanathan et al. | Nov 2000 | A |
6151502 | Padovani et al. | Nov 2000 | A |
6157668 | Gilhousen et al. | Dec 2000 | A |
6157833 | Lawson-Jenkins et al. | Dec 2000 | A |
6157978 | Ng et al. | Dec 2000 | A |
6161008 | Lee et al. | Dec 2000 | A |
6163692 | Chakrabarti et al. | Dec 2000 | A |
6195552 | Jeong et al. | Feb 2001 | B1 |
6195705 | Leung | Feb 2001 | B1 |
6201971 | Purnadi et al. | Mar 2001 | B1 |
6256300 | Ahmed et al. | Jul 2001 | B1 |
6272129 | Dynarski et al. | Aug 2001 | B1 |
6285665 | Chuah | Sep 2001 | B1 |
6300887 | Le | Oct 2001 | B1 |
6308267 | Gremmelmaier | Oct 2001 | B1 |
6345043 | Hsu | Feb 2002 | B1 |
6347091 | Wallentin et al. | Feb 2002 | B1 |
6360100 | Grob et al. | Mar 2002 | B1 |
6366561 | Bender | Apr 2002 | B1 |
6370380 | Norefors et al. | Apr 2002 | B1 |
6397065 | Huusko et al. | May 2002 | B1 |
6400722 | Chuah et al. | Jun 2002 | B1 |
6445922 | Hiller et al. | Sep 2002 | B1 |
6446127 | Schuster et al. | Sep 2002 | B1 |
6449481 | Kwon et al. | Sep 2002 | B1 |
6456604 | Lee et al. | Sep 2002 | B1 |
6466964 | Leung et al. | Oct 2002 | B1 |
6473418 | Laroia et al. | Oct 2002 | B1 |
6493725 | Iwai et al. | Dec 2002 | B1 |
6496704 | Yuan | Dec 2002 | B2 |
6510153 | Inoue et al. | Jan 2003 | B1 |
6516352 | Booth et al. | Feb 2003 | B1 |
6519457 | Jiang et al. | Feb 2003 | B1 |
6529732 | Vainiomaki et al. | Mar 2003 | B1 |
6535493 | Lee et al. | Mar 2003 | B1 |
6535739 | Chen et al. | Mar 2003 | B1 |
6553227 | Ho et al. | Apr 2003 | B1 |
6587680 | Ala-Laurila et al. | Jul 2003 | B1 |
6611547 | Rauhala | Aug 2003 | B1 |
6640248 | Jorgensen | Oct 2003 | B1 |
6643612 | Lahat | Nov 2003 | B1 |
6654363 | Li et al. | Nov 2003 | B1 |
6671512 | Laakso | Dec 2003 | B2 |
6701155 | Sarkkinen et al. | Mar 2004 | B2 |
6708031 | Purnadi et al. | Mar 2004 | B2 |
6714524 | Kim et al. | Mar 2004 | B1 |
6714777 | Naqvi et al. | Mar 2004 | B1 |
6714788 | Voyer | Mar 2004 | B2 |
6728365 | Li et al. | Apr 2004 | B1 |
6754492 | Stammers et al. | Jun 2004 | B1 |
6763007 | La Porta et al. | Jul 2004 | B1 |
6768908 | Jalloul et al. | Jul 2004 | B1 |
6771962 | Saifullah et al. | Aug 2004 | B2 |
6785256 | O'Neill | Aug 2004 | B2 |
6807421 | Ahmavaara | Oct 2004 | B1 |
6842621 | Labun et al. | Jan 2005 | B2 |
6842630 | Periyalwar | Jan 2005 | B2 |
6862446 | ONeill et al. | Mar 2005 | B2 |
6901063 | Vayanos et al. | May 2005 | B2 |
6917605 | Kakemizu et al. | Jul 2005 | B2 |
6937566 | Forsloew | Aug 2005 | B1 |
6947401 | El-Malki et al. | Sep 2005 | B2 |
6950650 | Roeder | Sep 2005 | B2 |
6954442 | Tsirtsis et al. | Oct 2005 | B2 |
6961579 | Inukai et al. | Nov 2005 | B2 |
6965585 | Grilli et al. | Nov 2005 | B2 |
6970445 | O'Neill et al. | Nov 2005 | B2 |
6990088 | Madour | Jan 2006 | B2 |
6990337 | O'Neill et al. | Jan 2006 | B2 |
6990339 | Turanyi et al. | Jan 2006 | B2 |
6990343 | Lefkowitz | Jan 2006 | B2 |
6992994 | Das et al. | Jan 2006 | B2 |
6993332 | Pedersen et al. | Jan 2006 | B2 |
7003311 | Ebata et al. | Feb 2006 | B2 |
7006826 | Cao et al. | Feb 2006 | B2 |
7016317 | Pathak et al. | Mar 2006 | B1 |
7027400 | O'Neill | Apr 2006 | B2 |
7027449 | Garcia-Luna-Aceves et al. | Apr 2006 | B2 |
7047009 | Laroia et al. | May 2006 | B2 |
7068640 | Kakemizu et al. | Jun 2006 | B2 |
7068654 | Joseph et al. | Jun 2006 | B1 |
7069040 | Iwanaga et al. | Jun 2006 | B2 |
7079511 | Abrol et al. | Jul 2006 | B2 |
7089008 | Back et al. | Aug 2006 | B1 |
7116654 | Kim | Oct 2006 | B2 |
7123599 | Yano et al. | Oct 2006 | B2 |
7130291 | Kim et al. | Oct 2006 | B1 |
7155236 | Chen et al. | Dec 2006 | B2 |
7161913 | Jung | Jan 2007 | B2 |
7167447 | Puuskari et al. | Jan 2007 | B2 |
7177641 | Miernik et al. | Feb 2007 | B1 |
7184771 | Mouly et al. | Feb 2007 | B1 |
7197318 | Schwarz et al. | Mar 2007 | B2 |
7233583 | Asthana et al. | Jun 2007 | B2 |
7233794 | Grob et al. | Jun 2007 | B2 |
7263357 | Lee et al. | Aug 2007 | B2 |
7266100 | Le et al. | Sep 2007 | B2 |
7272122 | Trossen et al. | Sep 2007 | B2 |
7283495 | Lee et al. | Oct 2007 | B2 |
7283511 | Hans et al. | Oct 2007 | B2 |
7290063 | Kalliokulju et al. | Oct 2007 | B2 |
7315554 | Baum et al. | Jan 2008 | B2 |
7330542 | Kauhanen et al. | Feb 2008 | B2 |
7336953 | Kim et al. | Feb 2008 | B2 |
7369855 | ONeill et al. | May 2008 | B2 |
7369859 | Gallagher | May 2008 | B2 |
7376101 | Shim et al. | May 2008 | B2 |
7389110 | Lee | Jun 2008 | B2 |
7391741 | Kang | Jun 2008 | B2 |
7403789 | Takano et al. | Jul 2008 | B2 |
7408917 | Kyung et al. | Aug 2008 | B1 |
7408950 | Okuyama | Aug 2008 | B2 |
7409428 | Brabec et al. | Aug 2008 | B1 |
7418264 | Kim | Aug 2008 | B2 |
7420957 | Kim et al. | Sep 2008 | B2 |
7460504 | Tsirtsis et al. | Dec 2008 | B2 |
7492762 | Chowdhury | Feb 2009 | B2 |
7499401 | Buddhikot et al. | Mar 2009 | B2 |
7505765 | Frangione et al. | Mar 2009 | B2 |
7515561 | Koodli et al. | Apr 2009 | B2 |
7525940 | Trossen et al. | Apr 2009 | B2 |
7529239 | Seppanen | May 2009 | B2 |
7567639 | Huh et al. | Jul 2009 | B2 |
7583592 | Park et al. | Sep 2009 | B2 |
7593364 | Asthana | Sep 2009 | B2 |
7623493 | Baba et al. | Nov 2009 | B2 |
7653415 | Van Rooyen | Jan 2010 | B2 |
7668541 | ONeill et al. | Feb 2010 | B2 |
7672254 | Kim et al. | Mar 2010 | B2 |
7702309 | Faccin et al. | Apr 2010 | B2 |
7706739 | Kjellberg | Apr 2010 | B2 |
7729350 | Singh et al. | Jun 2010 | B2 |
7742781 | Chen et al. | Jun 2010 | B2 |
7773947 | Gerlach | Aug 2010 | B2 |
7962142 | O'Neill et al. | Jun 2011 | B2 |
8112102 | Fischer | Feb 2012 | B2 |
8134976 | Wallace et al. | Mar 2012 | B2 |
8144664 | Pani et al. | Mar 2012 | B2 |
8165587 | Dahlen et al. | Apr 2012 | B2 |
8184615 | Tsirtsis et al. | May 2012 | B2 |
8229120 | Iwamura et al. | Jul 2012 | B2 |
8509799 | Park et al. | Aug 2013 | B2 |
8583044 | Dua | Nov 2013 | B2 |
8588777 | Grob et al. | Nov 2013 | B2 |
8615241 | Gupta et al. | Dec 2013 | B2 |
8830818 | Damnjanovic | Sep 2014 | B2 |
8886180 | O'Neill et al. | Nov 2014 | B2 |
20010019545 | Okubo et al. | Sep 2001 | A1 |
20020061009 | Sorensen | May 2002 | A1 |
20020064144 | Einola et al. | May 2002 | A1 |
20020065785 | Tsuda | May 2002 | A1 |
20020067706 | Bautz et al. | Jun 2002 | A1 |
20020075859 | Mizell et al. | Jun 2002 | A1 |
20020082038 | Mochizuki | Jun 2002 | A1 |
20020085518 | Lim | Jul 2002 | A1 |
20020107908 | Dharanikota | Aug 2002 | A1 |
20020114308 | Takano et al. | Aug 2002 | A1 |
20020126701 | Requena et al. | Sep 2002 | A1 |
20020136226 | Christoffel et al. | Sep 2002 | A1 |
20020161927 | Inoue et al. | Oct 2002 | A1 |
20020168982 | Sorokine et al. | Nov 2002 | A1 |
20020199012 | Cable et al. | Dec 2002 | A1 |
20030009580 | Chen et al. | Jan 2003 | A1 |
20030009582 | Qiao et al. | Jan 2003 | A1 |
20030018774 | Flinck et al. | Jan 2003 | A1 |
20030026220 | Uhlik et al. | Feb 2003 | A1 |
20030027572 | Karlsson et al. | Feb 2003 | A1 |
20030032430 | Lee | Feb 2003 | A1 |
20030036392 | Yukie | Feb 2003 | A1 |
20030078047 | Lee et al. | Apr 2003 | A1 |
20030092444 | Sengodan et al. | May 2003 | A1 |
20030101307 | Gemelli et al. | May 2003 | A1 |
20030103496 | Lakshmi et al. | Jun 2003 | A1 |
20030104814 | Gwon et al. | Jun 2003 | A1 |
20030112766 | Riedel et al. | Jun 2003 | A1 |
20030119516 | Tomishima et al. | Jun 2003 | A1 |
20030204599 | Trossen et al. | Oct 2003 | A1 |
20030214922 | Shahrier | Nov 2003 | A1 |
20030216140 | Chambert | Nov 2003 | A1 |
20030217096 | McKelvie et al. | Nov 2003 | A1 |
20030227871 | Hsu et al. | Dec 2003 | A1 |
20030236103 | Tamaki et al. | Dec 2003 | A1 |
20040002362 | Chuah et al. | Jan 2004 | A1 |
20040004736 | Ogura et al. | Jan 2004 | A1 |
20040004967 | Nakatsugawa et al. | Jan 2004 | A1 |
20040008630 | Corson et al. | Jan 2004 | A1 |
20040008632 | Hsu et al. | Jan 2004 | A1 |
20040015607 | Bender et al. | Jan 2004 | A1 |
20040016551 | Bennett | Jan 2004 | A1 |
20040017792 | Khaleghi et al. | Jan 2004 | A1 |
20040017798 | Hurtta et al. | Jan 2004 | A1 |
20040018841 | Trossen | Jan 2004 | A1 |
20040076186 | Chen et al. | Apr 2004 | A1 |
20040085942 | Le | May 2004 | A1 |
20040087319 | Bos et al. | May 2004 | A1 |
20040090913 | Scudder et al. | May 2004 | A1 |
20040090937 | Chaskar et al. | May 2004 | A1 |
20040104544 | Fan et al. | Jun 2004 | A1 |
20040116153 | Kaminski et al. | Jun 2004 | A1 |
20040120317 | Forssell | Jun 2004 | A1 |
20040137888 | Ohki | Jul 2004 | A1 |
20040139201 | Chaudhary et al. | Jul 2004 | A1 |
20040151148 | Yahagi | Aug 2004 | A1 |
20040151193 | Rune et al. | Aug 2004 | A1 |
20040165551 | Krishnamurthi et al. | Aug 2004 | A1 |
20040166898 | Tajima | Aug 2004 | A1 |
20040179544 | Wilson et al. | Sep 2004 | A1 |
20040192307 | Watanabe et al. | Sep 2004 | A1 |
20040192390 | Tajima | Sep 2004 | A1 |
20040218607 | Hurtta et al. | Nov 2004 | A1 |
20040228301 | Rudolf et al. | Nov 2004 | A1 |
20040228304 | Riedel et al. | Nov 2004 | A1 |
20040242222 | An et al. | Dec 2004 | A1 |
20040253954 | Lee et al. | Dec 2004 | A1 |
20050020262 | Kim | Jan 2005 | A1 |
20050020265 | Funabiki et al. | Jan 2005 | A1 |
20050053043 | Rudolf et al. | Mar 2005 | A1 |
20050058151 | Yeh | Mar 2005 | A1 |
20050059417 | Zhang et al. | Mar 2005 | A1 |
20050063338 | Tsui | Mar 2005 | A1 |
20050063389 | Elliott et al. | Mar 2005 | A1 |
20050079823 | Kurek et al. | Apr 2005 | A1 |
20050089043 | Seckin et al. | Apr 2005 | A1 |
20050090260 | Semper et al. | Apr 2005 | A1 |
20050128949 | Ku et al. | Jun 2005 | A1 |
20050128990 | Eom et al. | Jun 2005 | A1 |
20050141468 | Kim et al. | Jun 2005 | A1 |
20050143072 | Yoon et al. | Jun 2005 | A1 |
20050201324 | Zheng | Sep 2005 | A1 |
20050265303 | Edwards et al. | Dec 2005 | A1 |
20050268153 | Armstrong et al. | Dec 2005 | A1 |
20060002344 | Ono et al. | Jan 2006 | A1 |
20060003768 | Chiou | Jan 2006 | A1 |
20060007936 | Shrum, Jr. et al. | Jan 2006 | A1 |
20060056348 | Marinier et al. | Mar 2006 | A1 |
20060067526 | Faccin et al. | Mar 2006 | A1 |
20060069809 | Serlet | Mar 2006 | A1 |
20060089141 | Ho et al. | Apr 2006 | A1 |
20060099948 | Hoghooghi et al. | May 2006 | A1 |
20060099950 | Klein et al. | May 2006 | A1 |
20060104232 | Gidwani | May 2006 | A1 |
20060121883 | Faccin | Jun 2006 | A1 |
20060149845 | Malin et al. | Jul 2006 | A1 |
20060183479 | Liu et al. | Aug 2006 | A1 |
20060217119 | Bosch et al. | Sep 2006 | A1 |
20060221883 | Damnjanovic et al. | Oct 2006 | A1 |
20060230019 | Hill et al. | Oct 2006 | A1 |
20060268924 | Marinier et al. | Nov 2006 | A1 |
20060285520 | Venkitaraman | Dec 2006 | A1 |
20070016637 | Brawn et al. | Jan 2007 | A1 |
20070019584 | Qi et al. | Jan 2007 | A1 |
20070064948 | Tsirtsis et al. | Mar 2007 | A1 |
20070066918 | Dewald et al. | Mar 2007 | A1 |
20070076653 | Park et al. | Apr 2007 | A1 |
20070078999 | Corson et al. | Apr 2007 | A1 |
20070083669 | Tsirtsis et al. | Apr 2007 | A1 |
20070086389 | Park et al. | Apr 2007 | A1 |
20070091810 | Kim et al. | Apr 2007 | A1 |
20070099618 | Kim | May 2007 | A1 |
20070105555 | Miernik et al. | May 2007 | A1 |
20070121542 | Lohr et al. | May 2007 | A1 |
20070147283 | Laroia et al. | Jun 2007 | A1 |
20070147286 | Laroia et al. | Jun 2007 | A1 |
20070147377 | Laroia et al. | Jun 2007 | A1 |
20070149126 | Rangan et al. | Jun 2007 | A1 |
20070149194 | Das et al. | Jun 2007 | A1 |
20070171875 | Suda | Jul 2007 | A1 |
20070189282 | Lohr et al. | Aug 2007 | A1 |
20070191054 | Das et al. | Aug 2007 | A1 |
20070191065 | Lee et al. | Aug 2007 | A1 |
20070195788 | Vasamsetti et al. | Aug 2007 | A1 |
20080019293 | Chang et al. | Jan 2008 | A1 |
20080031198 | Hwang et al. | Feb 2008 | A1 |
20080051091 | Phan et al. | Feb 2008 | A1 |
20080074994 | Jen | Mar 2008 | A1 |
20080076424 | Barber et al. | Mar 2008 | A1 |
20080089287 | Sagfors et al. | Apr 2008 | A1 |
20080146231 | Huang et al. | Jun 2008 | A1 |
20080160999 | Eklund | Jul 2008 | A1 |
20080240039 | Parekh | Oct 2008 | A1 |
20080242292 | Koskela et al. | Oct 2008 | A1 |
20080253332 | Ore et al. | Oct 2008 | A1 |
20080259855 | Yoon et al. | Oct 2008 | A1 |
20080261600 | Somasundaram et al. | Oct 2008 | A1 |
20090029706 | Prakash et al. | Jan 2009 | A1 |
20090175448 | Watanabe et al. | Jul 2009 | A1 |
20090181673 | Barrett | Jul 2009 | A1 |
20090190556 | Venkitaraman | Jul 2009 | A1 |
20090191878 | Hedqvist et al. | Jul 2009 | A1 |
20090274086 | Petrovic et al. | Nov 2009 | A1 |
20090285218 | Adamczyk et al. | Nov 2009 | A1 |
20100080126 | Higashida | Apr 2010 | A1 |
20110039546 | Narasimha et al. | Feb 2011 | A1 |
20110039552 | Narasimha et al. | Feb 2011 | A1 |
20110051660 | Arora et al. | Mar 2011 | A1 |
20110103347 | Dimou | May 2011 | A1 |
20110268085 | Barany et al. | Nov 2011 | A1 |
20120087312 | Laroia et al. | Apr 2012 | A1 |
20120327908 | Gupta et al. | Dec 2012 | A1 |
20130208709 | Corson et al. | Aug 2013 | A1 |
20130294324 | Corson et al. | Nov 2013 | A1 |
Number | Date | Country |
---|---|---|
2002353616 | May 2003 | AU |
0740440 | Oct 1996 | EP |
0813346 | Dec 1997 | EP |
0974895 | Jan 2000 | EP |
1088463 | Apr 2001 | EP |
1128704 | Aug 2001 | EP |
1345370 | Sep 2003 | EP |
0926608 | Mar 2004 | EP |
1458209 | Sep 2004 | EP |
1473872 | Nov 2004 | EP |
1489808 | Dec 2004 | EP |
1507421 | Feb 2005 | EP |
1565024 | Aug 2005 | EP |
1720267 | Nov 2006 | EP |
1764942 | Mar 2007 | EP |
2322046 | Aug 1998 | GB |
2395629 | May 2004 | GB |
2004297130 | Oct 2004 | JP |
2004328637 | Nov 2004 | JP |
2005531173 | Oct 2005 | JP |
2007527177 | Sep 2007 | JP |
2008053889 | Mar 2008 | JP |
9501706 | Jan 1995 | WO |
95012297 | May 1995 | WO |
9804094 | Jan 1998 | WO |
98033288 | Jul 1998 | WO |
9847302 | Oct 1998 | WO |
9856140 | Dec 1998 | WO |
9905828 | Feb 1999 | WO |
99027718 | Jun 1999 | WO |
9966748 | Dec 1999 | WO |
00018173 | Mar 2000 | WO |
00041401 | Jul 2000 | WO |
0041426 | Jul 2000 | WO |
0128160 | Apr 2001 | WO |
20010063947 | Aug 2001 | WO |
0178440 | Oct 2001 | WO |
0219746 | Mar 2002 | WO |
0243409 | May 2002 | WO |
0247407 | Jun 2002 | WO |
02056551 | Jul 2002 | WO |
2002103951 | Dec 2002 | WO |
20030017582 | Feb 2003 | WO |
03092316 | Nov 2003 | WO |
03096657 | Nov 2003 | WO |
03098816 | Nov 2003 | WO |
03105516 | Dec 2003 | WO |
2004039022 | May 2004 | WO |
04070989 | Aug 2004 | WO |
2004068739 | Aug 2004 | WO |
2004075468 | Sep 2004 | WO |
2004079949 | Sep 2004 | WO |
2004107638 | Dec 2004 | WO |
2005011231 | Feb 2005 | WO |
2005029790 | Mar 2005 | WO |
2005048629 | May 2005 | WO |
2005062633 | Jul 2005 | WO |
2005078966 | Aug 2005 | WO |
05084146 | Sep 2005 | WO |
2005120183 | Dec 2005 | WO |
2006002676 | Jan 2006 | WO |
2006083131 | Aug 2006 | WO |
2006105308 | Oct 2006 | WO |
2007073487 | Jun 2007 | WO |
07075671 | Jul 2007 | WO |
2007075736 | Jul 2007 | WO |
2007075955 | Jul 2007 | WO |
2008113373 | Sep 2008 | WO |
2008131401 | Oct 2008 | WO |
Entry |
---|
Evolved Universal Terrestrial Radio Access (E-UTRA) and Evolved Universal Terrestrial Radio Access Network (E-UTRAN); Overall description; Stage 2 (Release 9), 3GPP TS 36.300 V9.2.0, Dec. 2009, pp. 56-61, Retrieved from the internet: URL: http://www.3gpp.org/ftp/Specs/archive/36_series/36.300/36300-920.zip. |
Qualcomm Europe, T-Mobile, “Network based solutions to inbound mobility in the presence of PCI confusion”, 3GPP TSG-RAN WG3 #64, R3-091027, May 2008, pp. 1-4, Retrieved from the internet: URL: http://www.3gpp.org/ftp/tsg_ran/WG3_lu/TSGR3_64/Docs/R3-091027.zip. |
Qualcomm Incorporated, “UE context fetch procedure stage 2”, 3GPP TSG-RAN WG3 Meeting #67, R3-100893, Feb. 2010, pp. 1-4, Retrieved from the internet URL: http://www.3gpp.org/ftp/tsg_ran/WG3_lu/TSGR3_67/Docs/R3-100893.zip. |
Zhou, S., et al., “A Location Management Scheme for Mobility Suppon in Wireless IP Networks Using Session Initiation Protocol (SIP)”, 1531-2216/01 IEEE, pp. 486-491, Oct. 2001. |
ZTE, et al., “Handover Cause Report for Mobility Robustness Optimization”, 3GPP Draft; R3-092982, 3rd Generation Partnership Project (3GPP), Mobile Competence Centre ; 650, Route Des Lucioles ; F-06921 Sophia-Antipolis Cedex ; France, No. Jeju; Nov. 9, 2009, Nov. 9, 2009 (Nov. 9, 2009), XP050392455, 4 pgs. [retrieved on Nov. 19, 2009]. |
3GPP, “3rd Generation Partnership Project, Technical Specification Group Radio Access Network, E-UTRAN Mobility Evaluation and Enhancement,(Release 9)”, 3GPP Draft, R1-090856 TP for TR for Mobility Studies, 3rd Generation Partnership Project (3GPP), Mobile Competence Centre, 650, Route Des Lucioles, F-06921 Sophia-Antipolis Cedex, France, No. Athens, Greece, Feb. 3, 2009, Feb. 3, 2009 (Feb. 3, 2009), 16 pgs., XP050318707. |
3GPP TS 36.423, “3rd Generation Partnership Project; Technical Specification Group Radio Access Network; Evolved Universal Terrestrial Radio Access (E UTRA) and Evolved Universal Terrestrial Radio Access Network (EUTRAN); X2 Application Protocol (X2AP)”, version 0.0.1, Release 8, year 2007, pp. 9. |
“3rd Generation Partnership Project; Technical Specification Group Radio Access Network; Evolved Universal Terrestrial Radio Access (E-UTRA) Radio Resource Control (RRC); Protocol specification (Release 8)” 3GPP Standard; 3GPP TS 36.331, 3rd Generation Partnership Project (3GPP), Mobile Competence Centre; 650, Route Des Lucioles ; F-06921 Sophia-Antipolis Cedex; France, No. V8.2.0, May 1, 2008 (May 1, 2008), pp. 1-151, XP050377645. |
3rd Generation Partnership Project; Technical Specification Group Radio Access Network; Evolved Universal Terrestrial Radio Access (E-UTRA) Radio Resource Control (RRC); Protocol specification (Release 9), 3GPP Standard; 3GPP TS 36.331, 3rd Generation Partnership Project (3GPP), Mobile Competence Centre ; 650, Route Des Lucioles ; F-06921 Sophia-Antipolis Cedex ; France, No. V9.1.0, Jan. 7, 2010 (Jan. 7, 2010), pp. 1-221, XP050401822, [retrieved on Jan. 7, 2010]. |
Baker, F., IETF, “RSVP Management Information Base Using SMIv2,” Network Working Group, Request for Comments: 2206, pp. 1-64 (Sep. 1997). |
Basic Knowledge of Communications Term of Switching HUB, Nov. 9. 2006, 2 pgs. |
Berger, L., et al., “RSVP Extensions for IPSEC Data Flows,” IETF, Network Working Group, Request for Comments: 2207, pp. 1-14 (Sep. 1997). |
Berger, L., “RSVP Refresh Overhead Reduction Extensions,” IETF Network Working Group, Request for Comments: 2961, pp. 1-34 (Apr. 2001). |
Bos et al., “A Framework for End-to-End Perceived Quality of Service Negotiation”, IETF Internal Draft, draft-bos-mmusic-sdpqos-framework-00.txt, Nov. 2001, pp. 1-22. |
Braden, R., “Resource ReSerVation Protocol (RSVP)—Ver. 1, Message Processing Rules,” IETF, Network Working Group, Request for Comments: 2209, pp. 1-25 (Sep. 1997). |
Braden, R., “Resource ReSerVation Protocol (RSVP)—Ver. 1 Functional Specification”. IETF, Network Working Group, Request for Comments: 2205, pp. 1-112 (Sep. 1997). |
Camarillo, G., et al., “Integration of Resource Management and SIP,” IETF Internet Draft, draft-ietf-sip-manyfolks-resource-04.ps, Feb. 25, 2002, pp. 1-18. |
Campbell, Andrew T. et al., “IP Micro-Mobility Protocols”, Mobile Computing and Communications Review (MC2R), vol. 4, No. 4, pp. 45-53, (Oct. 2001). |
Co-pending U.S. Appl. No. 08/144,901, filed Oct. 28, 1993. |
Droms, R.: “Dynamic Host Configuration Protocol,” IETF Standard, RFC 2131, Internet Engineering Task Force, IETF, CH, pp. 1-45, (Mar. 1997) XP015007915. |
ETRI, “Source Specific Multicast (SSM) Explicit Multicast (Xcast)” pp. 1-27 (Jun. 28, 2001). |
Ho, Michael. “Integration AAA with Mobile IPv4”, Internet Draft, pp. 1-59, Apr. 2002. |
Huawei, et al.,“Clarification of definitions of HO failure cases”, RAN3, 3GPP Draft; 36300_CR0202_(REL-9)_R2-101906_R3-100635, 3rd Generation Partnership Project (3GPP), Mobile Competence Centre ; 650, Route Des Lucioles ; F-06921 Sophia-Antipolis Cedex ; France, vol. RAN WG2, No. San Francisco, USA; Feb. 22, 2010, Mar. 4, 2010 (Mar. 4, 2010), XP050422194, 3 pgs. [retrieved on Mar. 4, 2010]. |
Ian F.A., et al., “Mobility Management in Next-Generation Wireless Systems”, Proceedings of the IEEE, IEEE. New York, us, vol. 87, No. 8, Aug. 1, 1999 (Aug. 1, 1999) , XP011044241, ISSN: 0018-9219, pp. 1347-1384. |
International Search Report and Written Opinion, dated Apr. 26, 2006 from International Application No. PCT/US2005/027798, pp. 1-5. |
Johnson, D., et al., IETF Mobile IP Working Group, “Mobility Support in IPv6,” ; Feb. 26, 2003 Downloaded From http://www.join.uni-muenster.de on Dec. 29, 2004, p. 1-169. |
Karagiannis, Georgios. “Mobile IP: State of the Art Report,” Ericsson, No. 3/0362-FCP NB 102 88 UEN, pp. 1-63, (Jul. 13, 1999). |
Koodli, R. et al.: “Fast Handovers and Context Transfers in Mobile Networks” Computer Communication Review, ACM, New York, NY, US, vol. 31, No. 5, Oct. 1, 2001 (Oct. 1, 2001), pp. 37-47, XP001115324 ISSN: 0146-4833 abstract p. 2, right-hand column, last paragraph—p. 3, left-hand column, paragraph 3 p. 5, right-hand column, last paragraph—p. 7, right-hand column, last paragraph. |
Leon-Garcia, Alberto; “Communication Networks: Fundamental Concepts and Key Architectures” McGraw-Hill; 2nd Edition; Copyright 2004, pp. 44-52, 429-431. |
Li, Yalun et al. “Protocol Architecture for Universal Personal Computing,” IEEE Journal on Selected Areas in Communications, IEEE Inc. New York, US, vol. 15, No. 8, Oct. 1, 1997, pp. 1467-1476, XP000721278 ISSN: 0733-8716. |
Loughney, J. et al. “Context Transfer Protocol (CXTP)” IETF Standard, Request for Comments: 4067, Internet Engineering Task Force, IETF, CH, Jul. 2005 (Jul. 2005), XP015041932 ISSN: 0000-0003 pp. 1 to 33. |
Mankin, A., et al., “Resource ReSerVation Protocol (RSVP) Version 1, Applicability Statement: Some Guidelines on Deployment”, IETF, Network Working Group, Request for Comments: 2208, pp. 1-6 (Sep. 1997). |
Marshall, W. et al. “Integration of Resource Management and SIP: SIP Extensions for Resource Management,” IETF Internet Draft, draft-ietf-sip-manyfolks-resource-02.txt, Aug. 2001, pp. 1-28. |
Miorandi D., et al., “Analysis of master-slave protocols for real-time industrial communications over IEEE 802.11 WLANs” Industrial Informatics, 2004. INDIN '04, 2nd IEEE International Conference on Berlin, Germany Jun. 24-26, 2004. Piscataway, NJ, USA IEEE, Jun. 24, 2004, pp. 143-148, XP010782619, ISBN 0789385136, Para 3, point B. |
Mockapetris P., “Domain Names—Implentation and Specification”, IETF RFC 1035, Nov. 1987. |
Moy, J., “OSPF Version 2”, Network Working Group, Request for Comments: 2328, pp. 1-244 (Apr. 1998). |
“Network Layer Protocol,” Jul. 13, 2002, chap. 6, pp. 1-35, URL: http://www2.yamanashi-ken.ac.jp/˜itoyo/lecture/network/network06/index06.htm. |
Nortel: “Forward Hand-Off options”, R2-071980, 3GPP TSG-RAN WG2 Meeting #58, Kobe, Japan, May 7-11, 2007, sections 2-3. |
Panasonic, “Necessity of forward handover”, 3GPP Draft, R2-062146, 3rd Generation Partnership Project (3GPP), Mobile Competence Centre, 650, Route Des Lucioles, F-06921 Sophia-Antipolis Cedex, France, vol. RAN WG2, No. Tallinn, Aug. 23, 2006, Aug. 23, 2006 (Aug. 23, 2006), XP050131764. |
Papalilo, D. et al. “Extending SIP for QoS Support”, www.coritel.it/publications/IP_download/papalilo-salsano-veltri.pdf, Dec. 8, 2001, pp. 1-6. |
Perkins, C., “IP Mobility Support for IPv4”, Nokia Research Center, Network Working Group, Request for Comments: 3220, Jan. 2002, downloaded from http://www.ietf.org on Dec. 29, 2004, pp. 1-92. |
Perkins, C., “IP Mobility Support”, IBM, Network Working Group, Request for Comments: 2002, pp. 1-79 (Oct. 1996). |
Pollini, G P et al., “Trends in Handover Design” IEEE 34(3), pp. 82-90, Mar. 1, 1996 (Mar. 1, 1996), XP00557380. |
Rosenberg J et al:RFAC 3261: “SIP: Session Initiation Protocol” Jun. 1, 2002; Jun. 2002, Jun. 1, 2002, pp. 1-269, XP015009039. |
Schulzrinne et al., “Application-Layer Mobility Using SIP”, 0-7803-7133 IEEE, pp. 29-36, Jan. 2000. |
Supplementary Partial European Search Report—EP05779540 Search Authority—The Hague Patent Office Oct. 4, 2011. |
Thulasi, A., et al., “IPv6 Prefix Delegation Using ICMPv6”, Network Working Group, Hewlett-Packard, pp. 1-34, Apr. 2004. |
TIA/EIA/IS-707A.8 “Data Service Options for Spread Spectrum Systems: Radio Link Protocol Type 2” pp. 1-1:4:12 (Mar. 1999). |
Trossen, D. et al., “A Dynamic Protocol for Candidate Access-Router Discovery”, 35 pgs., Mar. 14, 2003. |
Valko, A.G. et al.: “Cellular IP: A New Approach to Internet Host Mobility” Computer Communication Review, Association for Computing Machinery. New York, USvol. 29, No. 1, Jan. 1999, pp. 50-65, XP000823873 ISSN: 0146-4833, p. 56, Line 7-Line13. |
Wedlund et al: “Mobility Support Using SIP”, Proc. of ACM/IEEE International Conference on Wireless and Mobile Multimedia (WoWMoM '99), Seattle, Washington, Aug. 1999. |
Wroclawski, J., “The Use of RSVP with IETF Integrated Services,” IETF, Network Working Group, Request for Comments: 2210, pp. 1-33 (Sep. 1997). |
“3rd Generation Partnership Project; Technical Specification Group Radio Access Network; Evolved Universal Terrestrial Radio Access (E-UTRA) and Evolved Universal Terrestrial Radio Access Network (E-UTRAN); Overall Description; Stage 2 (Release 9 )”, 3GPP Standard; 3GPP TS 36.300, 3rd Generation Partnership Project (3GPP), Mobile Compei Ence Centre; 650, Route Des Lucioles; F-06921 Sophia-Antipolis Cedex; France, No. V9.2.0 (Dec. 2009), server date Jan. 7, 2010, pp. 1-178. |
Item 1 Description Continued: XP050401821 [retrieved on Jan. 7, 2010]. |
Number | Date | Country | |
---|---|---|---|
20150030003 A1 | Jan 2015 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 12691134 | Jan 2010 | US |
Child | 14515415 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 10910960 | Aug 2004 | US |
Child | 12691134 | US |