This application relates to the following patent applications as were filed on even date herewith (wherein the contents of such patent applications are incorporated herein by this reference):
ADDRESS RESOLUTION PROTOCOL-BASED WIRELESS ACCESS POINT METHOD AND APPARATUS (U.S. patent application Ser. No. 11/913,940);
METHOD AND APPARATUS FOR REDUCING LATENCY DURING WIRELESS CONNECTIVITY CHANGES (U.S. patent application Ser. No. 11/913,936);
METHOD AND APPARATUS TO FACILITATE MOBILE STATION COMMUNICATIONS USING INTERNET PROTOCOL-BASED COMMUNICATIONS (U.S. patent application Ser. No. 11/913,944);
METHOD, APPARATUS, AND SYSTEM FOR ESTABLISHING A DIRECT ROUTE BETWEEN AGENTS OF A SENDER NODE AND A RECEIVER NODE (U.S. patent application Ser. No. 11/913,935);
SYSTEM AND METHOD FOR PROVIDING A DISTRIBUTED VIRTUAL MOBILITY AGENT (U.S. patent application Ser. No. 11/913,937); and
SYSTEM AND METHOD FOR PAGING AND LOCATION UPDATE IN A NETWORK (U.S. patent application Ser. No. 11/913,942).
This invention relates generally to networked communications and more particularly to communication systems characterized by a plurality of hierarchically layered mobility management agents.
One-way and two-way wireless communications are a relatively well-understood area of endeavor. In many cases, various network elements comprise an infrastructure that supports the communications needs of one or more mobile stations. These communications needs can comprise voice calls, data communications, and so forth. In many cases, modern communications networks comprise a large number of geographically differentiated wireless access points that essentially define the network's edge. Such geographic differentiation, in turn, facilitates significant reuse of various network resources such as radio frequency bearer channels, control channels, time slots, spreading codes, and so forth. Aggressive reuse of such resources then facilitates viably supporting a relatively large user population.
Such communication networks, however, have become ever more complex. Pursuant to one approach, geographically parsed points of access couple to one another and to a plurality of mobility management agents (such as, but not limited to, Home Agents) that are hierarchically differentiated from those wireless access points and, in many cases, from each other as well. These coupled relationships serve to facilitate various mobility management functions such as, but not limited to:
Unfortunately, while such an architectural approach indeed successfully supports the intended service capability, there are issues of concern. For example, such proposals often tend to present significant scaling difficulties and barriers to feature growth and expansion. The end result represents increased costs (both for service providers and for subscribers) as pertain both to the infrastructure and to the mobile stations themselves, rapid obsolescence, and/or delayed expansion or upgrades with respect to capacity and/or features.
The above needs are at least partially met through provision of the method and apparatus to facilitate communications using surrogate and care-of Internet Protocol addresses described in the following detailed description, particularly when studied in conjunction with the drawings, wherein:
Skilled artisans will appreciate that elements in the figures are illustrated for simplicity and clarity and have not necessarily been drawn to scale. For example, the dimensions and/or relative positioning of some of the elements in the figures may be exaggerated relative to other elements to help to improve understanding of various embodiments of the present invention. Also, common but well-understood elements that are useful or necessary in a commercially feasible embodiment are often not depicted in order to facilitate a less obstructed view of these various embodiments of the present invention. It will further be appreciated that certain actions and/or steps may be described or depicted in a particular order of occurrence while those skilled in the art will understand that such specificity with respect to sequence is not actually required. It will also be understood that the terms and expressions used herein have the ordinary meaning as is accorded to such terms and expressions with respect to their corresponding respective areas of inquiry and study except where specific meanings have otherwise been set forth herein. For example, the expression “Internet Protocol” will be readily understood to refer generally to all presently existing and hereafter developed Internet protocols including, but not limited to, IPv4 and IPv6.
Generally speaking, pursuant to these various embodiments, a wireless access point (and in particular a wireless access point having native mobility agent functionality) facilitates a communication need of a mobile station with respect to a communication system that comprises a plurality of hierarchically layered mobility management agents (such as, but not limited to, Mobile Internet Protocol Home Agents). In a preferred approach, the wireless access point acquires a surrogate Internet Protocol address to use on behalf of the mobile station and then uses that surrogate Internet Protocol address as a surrogate address for the mobile station and its own Internet Protocol address as a care-of address for the mobile station when interacting with a first mobility management agent to support the communication need of the mobile station.
Pursuant to one approach, the wireless access point provides the surrogate Internet Protocol address by detecting the mobile station (as when, for example, the mobile station becomes attached to the wireless access point), acquiring the surrogate Internet Protocol address (from, for example, a local Dynamic Host Configuration Protocol (DHCP) Server), and transmitting a registration request (such as a Mobile Internet Protocol registration request) to that first mobility management agent. In a preferred approach, that registration request presents the surrogate Internet Protocol address as a surrogate address for the mobile station and the Internet Protocol address of the wireless access point as a care-of address for the mobile station. It may be noted that the surrogate Internet Protocol address need not be the same as a home address assigned to the mobile.
So configured, the wireless access point can establish a data path between itself and the first mobility management agent to support the back-and-forth transmission of both real time and non-real time data packets as correspond to the mobile station. If necessary and/or as desired, a similar approach can be employed with other mobility management agents of other hierarchical layers of the communication network. Accordingly, those skilled in the art will appreciate the relative ease by which these teachings can be scaled upwardly to accommodate essentially any sized communication network.
These teachings are also applicable to handover scenarios and other mobility management events. When handing over the mobile station to another wireless access point that shares the first mobility management agent with the aforementioned wireless access point (as when, for example, both wireless access points share a common subnet), it may be possible to persist the surrogate Internet Protocol address by communicating that address to the second wireless access point. This, in turn, can avoid the necessity of altering or re-defining any already-existing data paths or tunnels associated with mobility management agents serving higher levels within the hierarchy of the communication system.
When handing over the mobile station to a wireless access point that does not share the same mobility management agent (as when, for example, the two wireless access points do not share a common subnet and the resources thereof), the wireless access point that receives the hand over can benefit from these teachings by acquiring a surrogate Internet Protocol address as suggested above and employing that surrogate address along with its own Internet Protocol address (again as a care-of address) when interacting with its own mobility management agent to establish a new data tunnel on behalf of the mobile station. This, in turn, may further entail interactions with mobility management agents serving higher levels within the hierarchy of the communication system in order to establish a data path from the mobile station to the desired end point (such as the Home Agent that serves the mobile station's home subnet).
Again, those skilled in the art will appreciate that these solutions are readily scalable. In many instances, these approaches also serve to establish and/or maintain the necessary data paths in a manner that tends to minimize, at least to some extent, the tearing down and building up of at least some data tunnels, as at least some existing data tunnels that serve to connect various layers of the communication system are often reusable.
These and other benefits may become clearer upon making a thorough review and study of the following detailed description. Referring now to the drawings, and in particular to
Provision 101 of the surrogate Internet Protocol address (and referring now momentarily to
The wireless access point can then, in a preferred approach, transmit 203 a Mobile Internet Protocol registration request (as is known in the art) to a mobility management agent to present the surrogate Internet Protocol address as a surrogate for the mobile station and the wireless access point's own Internet Protocol address as a care-of address for the mobile station.
In a preferred approach, the mobility management agent will typically comprise a local resource that is directly associated with the wireless access point's local subnet. For the purposes of illustration, this mobility management agent can comprise, for example, a local Home Agent.
In some cases, of course, this local Home Agent will not comprise the Home Agent for the mobile station's own home subnet. In such a case, the Home Agent for the mobile station's home subnet comprises a hierarchically different mobility management agent as viewed with respect to the local Home Agent. By these teachings, and in a preferred approach, in such a case the wireless access point can then transmit another Mobile Internet Protocol registration request, this time to the Home Agent for the mobile station's home subnet. This Mobile Internet protocol registration request will preferably present the mobile station's home Internet Protocol address (wherein it shall be understood herein that a “home” address can comprise a traditional home address as is assigned to that mobile station or a primary Internet Protocol address as is otherwise associated with that mobile station) as a home address and the surrogate Internet Protocol address as a care-of address.
So configured, and referring again to
As one illustration of such use, and referring again to the illustrative scenario presented earlier, the Home Agent for the mobile station will now tunnel all packets destined for the mobile station (which this Home Agent identifies by the mobile station's home Internet Protocol address and which again may comprise a previously assigned address or a more recently acquired address) to the surrogate Internet Protocol address first obtained by the wireless access point on behalf of the mobile station. In the above scenario, the local Home Agent (i.e., the Home Agent that comprises a part of the wireless access point's local subnet) will then use its information to further tunnel such packets to the wireless access point using the surrogate Internet Protocol address in the role of a home address and the wireless access point's own Internet Protocol address as a care-of address. The wireless access point can then decapsulate both tunnels and forward the packets to the mobile station based upon its earlier correlation of the acquired surrogate Internet Protocol address with the mobile station itself.
In many cases, of course, the hierarchical structure of the communication system will comprise more layers than those suggested above in the provided example. Notwithstanding such increased complexity, these same teachings are readily applied in such a setting. Those skilled in the art will appreciate that these teachings are deployable in such a context without presenting significant scaling problems. In general, with additional hierarchical layers (supporting a corresponding plurality of hierarchically layered mobility management agents) one can further acquire, for each level of the plurality of hierarchically layered mobility management agents save one level, a surrogate Internet Protocol address to again use as described above on behalf of the mobile station. The highest hierarchical layer mobility management agent will typically not benefit from itself acquiring such a surrogate Internet Protocol address and hence can be excluded from this practice in many instances.
The mobility management agent at each level of a plurality of hierarchically differentiated mobility management agents can then employ usage of these Internet Protocol addresses as described earlier to effect the establishment of corresponding tunnels to facilitate the passage of mobile station packets to and from the mobile station with respect to sources and targets that are external to the local subnet to which the mobile station is presently attached.
A wireless access point can be configured in any of many ways to participate in and otherwise facilitate such a process. Those skilled in the art will appreciate that the above-described processes are readily enabled using any of a wide variety of available and/or readily configured platforms, including partially or wholly programmable platforms as are known in the art or dedicated purpose platforms as may be desired for some applications. Referring now to
In this illustrative embodiment, the wireless access point 300 comprises, in relevant part, a mobility agent 301. This mobility agent 301 operably couples, in turn, to a mobile station interface 302 (such as, for example, a wireless base station) and a local network interface 303 (where the local network may comprise, for example, an Internet Protocol-compatible subnet as is known in the art). In a preferred approach this mobility agent 301 also has access to an Internet Protocol address 304 (comprising, for example, its own Internet Protocol address) and one or more surrogate Internet Protocol addresses 305 (multiple such surrogate Internet Protocol addresses may be provided when supporting, for example, the communication needs of a corresponding plurality of mobile stations or in settings where multiple surrogate addresses are employed with a single mobile station). These addresses can be stored, for example, in one or more memories using well understood prior art techniques in this regard.
In a preferred approach, the mobility agent 301 is configured and arranged (for example, via suitable programming using prior art practice in this regard) to selectively support the creation of a tunnel with a first mobility management agent (such as, for example, a local Home Agent) using a surrogate Internet Protocol address on behalf of a given mobile station and the wireless access point's own Internet Protocol address to support the mobile station's communication need or needs in accordance with the previously described processes. In particular, the mobility agent 301 can serve to acquire a surrogate Internet Protocol address for a given mobile station and to effect the usage of that surrogate Internet Protocol address as described above.
Referring now to
In this example, a mobile station 401 becomes attached to a first wireless access point 300A. This first wireless access point 300A has its own (likely previously acquired) Internet Protocol address IP1. In this example, regardless of whether the mobile station 401 is Mobile Internet Protocol proficient and in accordance with the teachings presented above, this first wireless access point now acquires a surrogate Internet Protocol address IP2 from a suitable local resource (for example, from a Dynamic Host Configuration Protocol Server (not shown) as may comprise a part of the local subnet that comprises the first wireless access point 300A itself).
Upon acquiring this surrogate Internet Protocol address IP2, the wireless access point 300A then transmits a Mobile Internet Protocol registration request to a local mobility management agent 402. In some instances, this mobility management agent also comprises a part of the local subnet that comprises this wireless access point 300A. In this embodiment, the local subnet fabric comprises a first Internet Protocol network 403 as is known in the art. The registration request presents the surrogate Internet Protocol address IP2 as a home address for the mobile station and the wireless access point's Internet Protocol address IP1 as a care-of address. The local mobility management agent 402 (which may comprise, for example, a local Home Agent) and this wireless access point 300A then establish a data tunnel via the Internet Protocol network 403 to carry data packets to (and optionally from if desired) the mobile station under the auspices of the addressing scheme described.
In this example, this local mobility management agent 402 is not the home mobility management agent, i.e. the mobility management agent on the subnet corresponding to the home address for this particular mobile station 401. Accordingly, and again in conformance with the teachings set forth above, the wireless access point 300A now transmits another Mobile Internet Protocol registration request to a home mobility management agent 404 as corresponds to this particular mobile station 401. This registration request presents the mobile station's home Internet Protocol address as a home address and the surrogate Internet Protocol address IP2 as a care-of address.
Accordingly, the home mobility management agent 404 will now tunnel packets destined to the mobile station's home Internet Protocol address to the local mobility management agent 402 using the surrogate Internet Protocol address IP2 as the destination. Upon receiving such a packet, the local mobility management agent 402 will use its own address correlations and further tunnel those packets to the wireless access point 300A. The latter will then decapsulate both tunnels and forward the packets on to the mobile station 401.
Those skilled in the art will appreciate that this approach permits a fully Internet Protocol-based infrastructure to compatibly interact with a non-Internet Protocol capable mobile station. Skilled practitioners will also understand and appreciate that this approach avoids the need to decapsulate data packets at network elements such as the local mobility management agent 402. Instead, all de-tunneling (including de-tunneling of multiple levels of tunnels-within-tunnels) occurs at the wireless access point; i.e., at a lowest layer within the hierarchically differentiated strata of the communication network itself.
In this next example, which might be viewed as a continuation of events beyond that described in EXAMPLE 1 presented above, the mobile station 401 has moved and is now attached to a second wireless access point 300B. In this example, this second wireless access point 300B also comprises a part of the same subnet as includes the original wireless access point 300A. In this example, this second wireless access point has its own Internet Protocol address IP3.
As per the teachings described above, the second wireless access point 300B can now use that previously acquired surrogate Internet Protocol address IP2 on behalf of the mobile station 401 as and when the latter hands over to the second wireless access point 300B.
The second wireless access point 300B then transmits a Mobile Internet Protocol registration request to the mobility management agent 402. Again, in accordance with these teachings, this registration request presents the surrogate Internet Protocol address IP2 as a home address and the Internet Protocol address IP3 of the second wireless access point 300B as a care-of address. This permits establishing a corresponding data tunnel as between the first mobility management agent 402 and the second wireless access point 300B to again support the communication needs of the mobile station 401.
In a preferred approach, the previously established tunnel between the first wireless access point 300A and the first mobility management agent 402 can now be torn down. Those skilled in the art will appreciate, however, that the tunnel as was previously established with the home mobility management agent 404 need not be altered. Instead, that network element can continue to operate as before and data packets destined for the mobile station 401 will be effectively routed to the second wireless access point 300B where they can be decapsulated and forwarded to the mobile station 401.
In this example, the mobile station 401 has roamed beyond the coverage area of the wireless access points as were previously discussed and is now attached to a third wireless access point 300C that comprises a part of a different subnet. As before, this third wireless access point 300C has its own corresponding Internet Protocol address IP4. Accordingly, in a preferred approach, this third wireless access point 300C will essentially repeat the steps set forth in the first example above. This includes acquiring a new surrogate Internet Protocol address IP5 from a local resource and using that surrogate Internet Protocol address IP5 and its own Internet Protocol address IP4 with both a local mobility management agent 405 and the home mobility management agent 404 for the mobile station to establish corresponding data tunnels as described above.
Those skilled in the art will appreciate that these teachings are generally applicable without requiring reprogramming or other alteration of the mobile stations themselves. In particular, these teachings can be effectuated in a relatively transparent manner to the mobile station. As a result, these teachings can be employed with Internet Protocol and Mobile Internet Protocol capable mobile station, but are also useful when employed with non-Mobile Internet Protocol and/or non-Internet Protocol capable mobile stations. Those skilled in the art will also appreciate that these teachings are readily employed to good effect in a network that comprises multiple hierarchical levels of mobility management agents.
Those skilled in the art will recognize that a wide variety of modifications, alterations, and combinations can be made with respect to the above described embodiments without departing from the spirit and scope of the invention, and that such modifications, alterations, and combinations are to be viewed as being within the ambit of the inventive concept.
Number | Date | Country | Kind |
---|---|---|---|
537/KOL/2005 | Jun 2005 | IN | national |
Filing Document | Filing Date | Country | Kind | 371c Date |
---|---|---|---|---|
PCT/US2006/023726 | 6/19/2006 | WO | 00 | 11/9/2007 |
Publishing Document | Publishing Date | Country | Kind |
---|---|---|---|
WO2007/001948 | 1/4/2007 | WO | A |
Number | Name | Date | Kind |
---|---|---|---|
5506838 | Flanagan | Apr 1996 | A |
6195555 | Dent | Feb 2001 | B1 |
6230012 | Willkie et al. | May 2001 | B1 |
6285880 | Gagnon et al. | Sep 2001 | B1 |
6430698 | Khalil et al. | Aug 2002 | B1 |
6473413 | Chiou et al. | Oct 2002 | B1 |
6567664 | Bergenwall et al. | May 2003 | B1 |
6578085 | Khalil et al. | Jun 2003 | B1 |
6711408 | Raith | Mar 2004 | B1 |
6721565 | Ejzak et al. | Apr 2004 | B1 |
6795857 | Leung et al. | Sep 2004 | B1 |
6795891 | Lin | Sep 2004 | B2 |
6813501 | Kinnunun et al. | Nov 2004 | B2 |
6859653 | Ayoub et al. | Feb 2005 | B1 |
6977938 | Alriksson et al. | Dec 2005 | B2 |
7016682 | Won et al. | Mar 2006 | B2 |
7096273 | Meier | Aug 2006 | B1 |
7139833 | Heller | Nov 2006 | B2 |
7162529 | Morishige et al. | Jan 2007 | B2 |
7289463 | Ozugur | Oct 2007 | B2 |
7336670 | Calhoun et al. | Feb 2008 | B1 |
7349380 | Barker, Jr. et al. | Mar 2008 | B2 |
7450544 | Rue | Nov 2008 | B2 |
7486670 | Kinoshita et al. | Feb 2009 | B2 |
7512687 | Jung | Mar 2009 | B2 |
7606194 | He | Oct 2009 | B2 |
7649866 | Chari et al. | Jan 2010 | B2 |
7733829 | Lee et al. | Jun 2010 | B2 |
7860067 | Na et al. | Dec 2010 | B2 |
20010024443 | Alriksson et al. | Sep 2001 | A1 |
20020009066 | Shimizu et al. | Jan 2002 | A1 |
20020015395 | Karagiannis | Feb 2002 | A1 |
20020015396 | Jung | Feb 2002 | A1 |
20020021680 | Chen | Feb 2002 | A1 |
20020026527 | Das et al. | Feb 2002 | A1 |
20020034166 | Barany et al. | Mar 2002 | A1 |
20020046287 | La Porta et al. | Apr 2002 | A1 |
20020057657 | La Porta et al. | May 2002 | A1 |
20020075844 | Hagen | Jun 2002 | A1 |
20020080752 | Johansson et al. | Jun 2002 | A1 |
20020094813 | Koshimizu et al. | Jul 2002 | A1 |
20030016655 | Gwon | Jan 2003 | A1 |
20030018810 | Karagiannis et al. | Jan 2003 | A1 |
20030035387 | Kim | Feb 2003 | A1 |
20030076837 | Whitehill et al. | Apr 2003 | A1 |
20030104813 | Julka et al. | Jun 2003 | A1 |
20030148777 | Watanabe et al. | Aug 2003 | A1 |
20030174709 | Shankar | Sep 2003 | A1 |
20030202505 | Ozugur | Oct 2003 | A1 |
20030235176 | Zhang et al. | Dec 2003 | A1 |
20040005884 | Nieminen et al. | Jan 2004 | A1 |
20040013099 | O'Neill | Jan 2004 | A1 |
20040022212 | Chowdhury et al. | Feb 2004 | A1 |
20040023653 | O'Neill | Feb 2004 | A1 |
20040024901 | Agrawal et al. | Feb 2004 | A1 |
20040034705 | Focsaneanu | Feb 2004 | A1 |
20040043791 | Reddy | Mar 2004 | A1 |
20040047322 | O'Neill | Mar 2004 | A1 |
20040063455 | Eran et al. | Apr 2004 | A1 |
20040066760 | Thubert et al. | Apr 2004 | A1 |
20040071109 | Herle et al. | Apr 2004 | A1 |
20040082330 | Marin | Apr 2004 | A1 |
20040114559 | Wang | Jun 2004 | A1 |
20040133684 | Chan et al. | Jul 2004 | A1 |
20040185852 | Son et al. | Sep 2004 | A1 |
20040213181 | Grech et al. | Oct 2004 | A1 |
20040213260 | Leung et al. | Oct 2004 | A1 |
20040242233 | Lutgen | Dec 2004 | A1 |
20040259567 | Valko et al. | Dec 2004 | A1 |
20050047399 | Lee et al. | Mar 2005 | A1 |
20050057499 | Lee et al. | Mar 2005 | A1 |
20050088994 | Maenpaa et al. | Apr 2005 | A1 |
20050113091 | Rodriguez et al. | May 2005 | A1 |
20050122946 | Won | Jun 2005 | A1 |
20050128975 | Kobayashi et al. | Jun 2005 | A1 |
20050135286 | Nurminen et al. | Jun 2005 | A1 |
20050135422 | Yeh | Jun 2005 | A1 |
20050148368 | Scheinert et al. | Jul 2005 | A1 |
20050163080 | Suh et al. | Jul 2005 | A1 |
20050180372 | Cho et al. | Aug 2005 | A1 |
20050185632 | Draves, Jr. et al. | Aug 2005 | A1 |
20050213546 | Reitter et al. | Sep 2005 | A1 |
20050232286 | Lee et al. | Oct 2005 | A1 |
20060104247 | Dommety et al. | May 2006 | A1 |
20060112183 | Corson et al. | May 2006 | A1 |
20060142034 | Wentink et al. | Jun 2006 | A1 |
20060193272 | Chou et al. | Aug 2006 | A1 |
20070115883 | Narayanan et al. | May 2007 | A1 |
20080167037 | Bedekar et al. | Jul 2008 | A1 |
20080186964 | Bedekar et al. | Aug 2008 | A1 |
20080192663 | Bedekar et al. | Aug 2008 | A1 |
20080194271 | Bedekar et al. | Aug 2008 | A1 |
20080205362 | Bedekar et al. | Aug 2008 | A1 |
20080240037 | Bedekar et al. | Oct 2008 | A1 |
Number | Date | Country |
---|---|---|
0777396 | Jun 1997 | EP |
1259026 | Nov 2002 | EP |
1404143 | Mar 2004 | EP |
1263182 | Dec 2008 | EP |
0045560 | Aug 2000 | WO |
03049377 | Jun 2003 | WO |
2004073324 | Aug 2004 | WO |
2004073325 | Aug 2004 | WO |
Entry |
---|
Wikipedia Article from Internet: “Global System for Mobile Communications”, Apr. 17, 2005,http://web.archive.org/web/20050417021658/http://de.wikipedia.org/wiki/Global—System—for—Mobile—Communications, Mar. 27, 2008, pp. 1-13. |
Chuah, M.C. et al.: Mobile Virtual Private Dial-up Services:, Bell Labs Technical Journal; Bell Laboratories; U.S., vol. 4, No. 3, Jul. 1999, pp. 51-72. |
Perkins, Charles et al: “IMHP: A Mobile Host Protocol for the Internet”, in Proceedings of INET'94/JENC5, (1994), all pages. |
Wu, Chun-Hsin et al.: “Bi-direction Route Optimization in Mobile IP over Wireless LAN”, Vehicular Technology Conference, 2002, Proceedings. VTC 2002-Fall, 2002 IEEE 56th, all pages. |
Perkins, C.: “IP Mobility Support for IPv4”, Network Working Group, Request for Comments: 3344, Nokia Research Center, Aug. 2002, all pages. |
R. Caceres and V.N. Padmanbhan: “Fast and Scalable Wireless Handoffs in Support of Mobile Internet Audio”, ACM J. Mobile Net. and Appl., v3, No. 4, Dec. 1998, all pages. |
Gustafsson Eva et al.: “Mobile IPv4 Regional Registration”, draft-ietf-mobileip-reg-tunnel-09.txt, Mobile IP Working Group Internet Draft, Jun. 25, 2004, all pages. |
Ericsson, “low Latency Handoffs in Mobile IPv4”, Network Working Group, Internet-Draft, Expires Dec. 2004, Jun. 2004, draft-ietf-mobileip-lowlatency-handoffs-v4-09.txt, all pages. |
Soliman, Hesham et al.: Hierarchical Mobile IPv6 Mobility management (HMIPv6), draft-ietf-mipshop-hmipv6-03.txt, Network Working Group, Expires: Apr. 2005, Oct. 2004, all pages. |
Kempf, James et al.: “Post-handover Mobile Initiated Tunneling for Fast Mobile IPv4 Handover”, draft-kempf-mobileip-postmit-handover-00.txt, Expires: Jun. 2002, all pages. |
Fathi, Hanane et al.: “Mobility Management for VolP in 3G Systems: Evaluation of Low-Latency Handoff Schemes”, IEEE Wireless Communications, Apr. 2005, 1536-1284/05, pp. 96-104. |
Perkins, C: “IP Mobility Support”, Network Working Group, Request for Comments: 2002 IBM, Oct. 1996, all pages. |
Translation of the Official Communication from the German Patent and Trademark Office date Aug. 19, 2011, all pages. |
German Patent and Trademark Office, Office Action for German Patent Application No. 10 2006 001 7101 dated Sep. 6, 2012, 8 pages. |
Andy Wilton, “The Benefits of ALL-IP Networks”, Presentation for the 3G Mobile Summit, Brussels, Jun. 2001. http://ipv6tf.org/PublicDocuments/ThebenefitsofALL-IPnetworks.pdf [accessed on Aug. 16, 2012]. |
Ramjee, R. et al. “IP-base access network infrastructure for next-generation wireless data networks”, Personal Communications, IEEE, vol. 7 (4) 34-41, Aug. 2000; DOI:10.1109/98.863994. |
Ulrich Trick et al. “Modeling heterogeneous telecommunications networks” ITG Technical Report, Presentation at the 10th ITG Symposium from Jun. 1, 2005 to Jun. 2, 2005 in Osnabrück, p. 41-49, Jun. 2005. |
United States Patent and Trademark Office, “Non-Final Rejection” for U.S. Appl. No. 11/913,944 dated Nov. 29, 2012, 15 pages. |
United States Patent and Trademark Office, “Non-Final Rejection” for U.S. Appl. No. 11/913,942 dated Nov. 28, 2012, 16 pages. |
United States Patent and Trademark Office, “Non-Final Rejection” for U.S. Appl. No. 11/913,944 dated Oct. 21, 2013, 14 pages. |
Government of India, Patent Office, Examination Report for Indian Patent Application No. 537/KOL/2005, dated Jun. 4, 2014 (1 page). |
Patent Cooperation Treaty; International Search Report and Written Opinion of the International Searching Authority for International Patent Application No. PCT/US2006/023726; Feb. 28, 2007 (7 pages). |
Number | Date | Country | |
---|---|---|---|
20080212562 A1 | Sep 2008 | US |