Patent application number | Description | Published |
20110090815 | SYSTEM AND METHOD FOR PROVIDING A TRANSLATION MECHANISM IN A NETWORK ENVIRONMENT - An example method is provided and includes receiving a packet associated with a flow, determining a tunnel identifier for the flow, and determining a flow identifier for the flow. The method includes associating the flow identifier and the tunnel identifier to an Internet protocol (IP) address to generate a binding to be used for a network address and port translation (NAPT). In other embodiments, a routing decision is executed based on the binding between the identifiers and the IP address. The flow identifier can be a context identifier (CID), and the tunnel identifier can be a softwire tunnel ID. In yet other embodiments, the packet can be tagged as part of an encapsulation operation, which includes providing information about a network location at which the network address and port translation is to be executed. | 04-21-2011 |
20120082073 | SYSTEM AND METHOD FOR OFFLOADING DATA IN A COMMUNICATION SYSTEM - A method is provided in one example embodiment and includes receiving a data packet transported on a backhaul link at a first network element; identifying whether the data packet is an upstream data packet; identifying whether the data packet matches an internet protocol (IP) access control list (ACL) or a tunnel endpoint identifier; performing a network address translation on the data packet; and offloading the data packet from the backhaul link. In certain implementations, the method can include identifying that the data packet does not match the IP ACL or the tunnel endpoint identifier; and communicating the data packet to a second network element. In other instances, the method can include identifying that the data packet is a downstream data packet; and restoring a tunnel header and tunnel identification based on an IP address of the data packet. | 04-05-2012 |
20120082093 | SYSTEM AND METHOD FOR OFFLOADING DATA IN A COMMUNICATION SYSTEM - A method is provided in one example embodiment and includes communicating an in-band message packet from a first network element; receiving a response to the in-band message from a second network element, the response contains tunnel identification binding data that identifies a tunnel on a backhaul link on which traffic from a user equipment can flow; and receiving instructions from the second network element to offload a received data packet from the backhaul link. In particular instances, the in-band message is set to loopback when the in-band message is sent from the first network element. In other embodiments, the tunnel identification binding data is provided in the payload of the in-band message when the in-band message is sent from the first network element. In other examples, the method can include receiving an assigned Internet protocol (IP) address of the user equipment in the response to the in-band message. | 04-05-2012 |
20120082094 | SYSTEM AND METHOD FOR OFFLOADING DATA IN A COMMUNICATION SYSTEM - A method is provided in one example embodiment and includes receiving a downstream data packet transported on a backhaul link at a first network element, the downstream data packet is associated with a user equipment; identifying whether a downstream tunnel used to communicate the data packet to the user equipment has become dormant; and communicating an in-band message to a second network element that the downstream tunnel is dormant. In other examples, the method can include dropping the data packet when a network address port translation binding has expired or does not exist. In certain implementations, the method can include identifying the downstream tunnel as dormant when an activity timer has expired, or identifying the downstream tunnel as dormant based on a stale state setting. | 04-05-2012 |
20120082132 | SYSTEM AND METHOD FOR OFFLOADING DATA IN A COMMUNICATION SYSTEM - A method is provided in one example embodiment and includes receiving a data packet over a first link at a first network element; establishing an out-of-band channel over a second link between the first network element and a second network element; and receiving instructions at the first network element to offload the data packet from the first link. In more particular embodiments, the first network element is a mobile enabled router, and the second network element is a gateway general packet radio service support node or a packet data network gateway. The method can also include receiving a discovery message from the second network element, the discovery message triggering the establishment of the out-of-band channel. In certain cases, the data packet is offloaded based on a type of data in the data packet. | 04-05-2012 |
20120082146 | SYSTEM AND METHOD FOR OFFLOADING DATA IN A COMMUNICATION SYSTEM - A method is provided in one example embodiment and includes receiving a data packet transported on a backhaul link at a first network element; de-capsulating the data packet; identifying whether the data packet is an upstream data packet; identifying whether the data packet matches an internet protocol (IP) access control list (ACL) or a tunnel endpoint identifier; and offloading the data packet from the backhaul link. In more specific embodiment, the method can include identifying that the data packet does not match the IP ACL or the tunnel endpoint identifier; and communicating the data packet to a second network element. In other examples, the method can include identifying that the data packet is a downstream data packet; identifying a service to be performed for the data packet that cannot be performed at the first network element; and communicating the data packet to a second network element. | 04-05-2012 |
20120173661 | SYSTEM AND METHOD FOR EXCHANGING INFORMATION IN A MOBILE WIRELESS NETWORK ENVIRONMENT - A method is provided in one example embodiment and includes communicating a message to a remote data plane element in order to request a data plane resource for hosting a session. The method also includes receiving a response at a network element acknowledging the message. Data plane traffic is managed at the remote data plane element based on enforcement rules. The enforcement rules are provisioned in a table element at the remote data plane element, and the table element reflects a portion of a master table element included in the network element. | 07-05-2012 |
20140026206 | SYSTEM AND METHOD FOR SUPPORTING WEB AUTHENTICATION - A method is provided in one example embodiment and includes receiving a discover message over a network; determining that the discover message is associated with an unauthenticated client (e.g., identifying a media access control (MAC) address); communicating a proxy binding update (PBU) having a binding type value set to a temporary status; and establishing a bidirectional tunnel for transporting traffic for the client. | 01-23-2014 |
20140056290 | Multi-Operator Wireless Networking - Multi-operator networking techniques are provided for allowing two or more operators to share a wireless local area network (WLAN). In particular, mobile access gateway functionality is integrated in a wireless network controller of a WLAN that is accessible to first and second operators. Operator-specific tunnels are created through the network for each of the first and second operators that link a core network of each of the first and second operators with an associated client device. Packets are then forwarded between the core networks of the first and second operators and their associated client devices via the operator-specific tunnels. | 02-27-2014 |
20140169374 | SYSTEM AND METHOD FOR PROVIDING A TRANSLATION MECHANISM IN A NETWORK ENVIRONMENT - An example method is provided and includes receiving a packet associated with a flow, determining a tunnel identifier for the flow, and determining a flow identifier for the flow. The method includes associating the flow identifier and the tunnel identifier to an Internet protocol (IP) address to generate a binding to be used for a network address and port translation (NAPT). In other embodiments, a routing decision is executed based on the binding between the identifiers and the IP address. The flow identifier can be a context identifier (CID), and the tunnel identifier can be a softwire tunnel ID. In yet other embodiments, the packet can be tagged as part of an encapsulation operation, which includes providing information about a network location at which the network address and port translation is to be executed. | 06-19-2014 |
20140282986 | CONTENT SERVICE ON DEMAND - A method is provided and may include receiving a request for a network content delivery service from an access device; directing the access device to a network service provider for authentication for the network content delivery service; receiving a network authorization token from the access device, where the network authorization token is associated with the access device; obtaining a network access token from the network service provider; and binding the network access token to a content access token. | 09-18-2014 |
20140372293 | Client App Service on Mobile Network - A system is disclosed for measuring data utilization attributable to use by an application being executed on a mobile device. The system has a server operable to register the application and transmit information to establish a connection between the application and a proxy server. The system also has a proxy server operable to establish a first connection with the application, receive direction to establish a second connection with a target endpoint, establish the second connection between the proxy server and the target endpoint, pass data between the target endpoint and the application using the established connections, and measure the amount of data passed between the target endpoint and the application. | 12-18-2014 |
20150029947 | SYSTEM FOR SUPPORTING LOGICAL MOBILE NODES ON A MOBILE ACCESS GATEWAY - In one embodiment, a mobile access gateway (MAG) includes a processor, a communications interface, and logic. The communications interface is configured to communicate with at least one mobile network and at least one local mobility anchor. The logic includes a mobile node logical instance module and an selection module. The mobile node logical instance module is configured to cooperate with the processor to create a first logical instance of a first mobile node on the MAG, and the address selection module is configured to cooperate with the processor to configure an egress roaming interface for the MAG. | 01-29-2015 |
Patent application number | Description | Published |
20080198810 | METHODS AND APPARATUS FOR BROADCAST OPTIMIZATION IN MOBILE IP - Methods and apparatus for supporting broadcast traffic in Mobile IP are disclosed. When a Mobile Node registers via a Foreign Agent supporting Mobile IP, the Foreign Agent receives a registration request from a Mobile Node and sends the registration request to a Home Agent. A registration reply received from the Home Agent has a network mask extension including a network mask associated with the home address of the Mobile Node. The Foreign Agent then sends the registration reply to the Mobile Node. Alternatively, the Mobile Node may register via a collocated care-of address, in which case the registration reply is received directly from the Home Agent. Once the Mobile Node has obtained its network mask, it may send packets such as broadcast packets, as well as roam to its Home Agent. Additionally, in accordance with various embodiments, the Foreign Agent duplicates broadcast packets for transmission to Mobile Nodes, rather than receiving the duplicated packets from the Home Agent. In this manner, broadcast traffic in a Mobile IP environment is optimized. | 08-21-2008 |
20090080370 | Methods and apparatus for home agent discovery in mobile IP using link state advertisements - In one embodiment, an apparatus receives an advertisement from each of one or more Home Agents, the advertisement including a first set of information associated with a corresponding one of the Home Agents, each advertisement being in a first protocol. The apparatus obtains the first set of information associated with a corresponding one of the Home Agents from each advertisement. The apparatus composes a router advertisement including a second set of information associated with at least one of the Home Agents, the router advertisement being in a second protocol. The apparatus then sends the router advertisement. | 03-26-2009 |
20090300217 | METHOD AND APPARATUS FOR DYNAMICALLY ASSIGNING UNIQUE ADDRESSES TO ENDPOINTS - The present disclosure generally provides techniques for establishing a unique, ephemeral home address (hoa)/home agent address (ha′) address pair that may be limited to use in a session having a defined lifetime. Limiting the use of this dynamic address pair to a session lifetime and by preventing a mobile node from knowing the static address of a home agent may help protect the home agent from attacks. | 12-03-2009 |
20100088400 | INTERNET PROTOCOL ADDRESS MANAGEMENT FOR COMMUNICATING PACKETS IN A NETWORK ENVIRONMENT - A method is provided in one example implementation and the method includes identifying through a home bearer manager that an Internet Protocol (IP) address has been previously sent to an access terminal, the IP address being issued by a visited bearer manager as a result of the access terminal requesting registration in a visited network. The method further includes communicating the IP address to the access terminal in response to the access terminal registering in a home network. The registrations in the home and the visited network allow a plurality of packets to be communicated to the access terminal via the IP address. In more specific embodiments, the IP address serves as a care of address (CoA) address and a home IP address concurrently. The IP address can be exchanged via a mobile IP (MIP) exchange. The home and visited bearer managers are independent or interdependent. | 04-08-2010 |
20120047263 | ATTRIBUTE DRIVEN MOBILE SERVICE CONTROL LOGIC - The disclosed embodiments enable service policies to be provisioned for a Mobile Node dynamically. A network device receives a message including at least one of one or more attributes of a Mobile IP session and one or more user preferences associated with the Mobile Node. One or more rules to be applied to the Mobile Node may then be identified. One or more of the identified rules are executed according to at least one of one or more of the attributes of the Mobile IP session and one or more of the user preferences associated with the Mobile Node. | 02-23-2012 |
20120250509 | SOFT RETENTION FOR CALL ADMISSION CONTROL IN COMMUNICATION NETWORKS - Systems and methods are disclosed for receiving a request at a packet gateway to allocate a new bearer for a mobile device on a wireless telecommunications network; identifying, at the packet gateway, existing bearers that have a quality of service (QoS) that can be reduced without dropping the existing bearers; reducing, at the packet gateway, the QoS of the existing bearers; reclaiming resources at the packet gateway that were previously in use by the existing bearers; and allocating the new bearer for the mobile device using the reclaimed resources at the packet gateway without causing any of the existing bearers to be disconnected, wherein the existing bearers have a lower priority than the new bearer, and wherein the existing bearers have previously been designated as capable of being preempted. | 10-04-2012 |
20130142182 | MOBILITY IN MULTI-DEVICE MULTI-HOMED DEPLOYMENTS - Systems and methods for providing identity management and mobility management are disclosed. The management scheme provides mobility in multi-device and multi-homed deployments. A collection of three identities, a device identity, a link layer identity, and a user identity, can be used to provide mobility for a number of devices under different use scenarios. In one embodiment, a method is disclosed for receiving messages from a mobile device at a mobility gateway, the messages including identifiers such as a user identifier, a link layer identifier, and a device identifier where identifiers are stored or retained at the mobility gateway. When a subsequent network attach request is received including one or more identifiers, a reconnection can occur, based on a result of comparing the stored identifiers with the received one or more identifiers. | 06-06-2013 |
20150029935 | METHODS AND APPARATUS FOR HOME AGENT DISCOVERY IN MOBILE IP USING LINK STATE ADVERTISEMENTS - In one embodiment, an apparatus receives an advertisement from each of one or more Home Agents, the advertisement including a first set of information associated with a corresponding one of the Home Agents, each advertisement being in a first protocol. The apparatus obtains the first set of information associated with a corresponding one of the Home Agents from each advertisement. The apparatus composes a router advertisement including a second set of information associated with at least one of the Home Agents, the router advertisement being in a second protocol. The apparatus then sends the router advertisement. | 01-29-2015 |
Patent application number | Description | Published |
20090080399 | METHODS AND APPARATUS FOR SUPPORTING PROXY MOBILE IP REGISTRATION IN A WIRELESS LOCAL AREA NETWORK - Methods and apparatus for enabling mobility of a node that does not support Mobile IP are disclosed. When an AP receives a data packet, the AP may compare the data packet (e.g., source address) with the AP information for one or more APs to determine whether to send a registration request on behalf of the node. More particularly, the AP determines from the source address whether the node is located on a subnet identical to a subnet of the AP. If the node is located on the subnet of the AP, no Mobile IP service is required on behalf of the node. However, when it is determined from the source address that the node is not located on the subnet identical to the subnet of the Access Point, the AP composes and sends a mobile IP registration request on behalf of the node. For instance, the mobile IP registration request may be composed using the gateway associated with the “home” AP (e.g., having a matching subnet) as the node's Home Agent. | 03-26-2009 |
20090141688 | METHODS AND APPARATUS FOR SECURING PROXY MOBILE IP - An invention is disclosed that enables proxy Mobile IP registration to be performed in a secure manner. Various security mechanisms may be used independently, or in combination with one another, to authenticate the identity of a node during the registration process. First, an Access Point receiving a packet from a node verifies that the source MAC address identified in the packet is in the Access Point's client association table. In addition, as a second mechanism, the Access Point ensures that a one-to-one mapping exists for the source MAC address and source IP address identified in the packet in a mapping table maintained by the Access Point. As a third mechanism, a binding is not modified in the mobility binding table maintained by the Home Agent unless there is a one-to-one mapping in the mobility binding table between the source MAC address and the source IP address. Similarly, the Foreign Agent may also maintain a mapping between the source IP address and the source MAC address in its visitor table to ensure a one-to-one mapping between a source IP address and the associated MAC address. The MAC address is preferably transmitted in a MAC address extension to the registration request and registration reply packets. In this manner, the Access Point, Home Agent, and Foreign Agent may ascertain the node's MAC address and ensure a one-to-one mapping between the IP address and the MAC address during the registration process. | 06-04-2009 |
20120281612 | METHODS AND APPARATUS FOR BROADCAST OPTIMIZATION IN MOBILE IP - In accordance with various embodiments, a Home Agent receives a registration request and sends a registration reply having a network mask extension including a network mask associated with the home address of the Mobile Node. Once the Mobile Node has obtained its network mask, it may send packets such as broadcast packets, as well as roam to its Home Agent. Additionally, in accordance with various embodiments, when a Home Agent receives a broadcast packet, it forwards the broadcast packet to a care-of address of the broadcast packet without duplicating the broadcast packet. Instead, the Foreign Agent obtains the subnet from the broadcast packet, identifies the Mobile Node(s) on that subnet, and duplicates the broadcast packet for transmission to the identified Mobile Node(s). | 11-08-2012 |