MX2010012919A - Ethernet service capability negotiation and authorization method and system. - Google Patents

Ethernet service capability negotiation and authorization method and system.

Info

Publication number
MX2010012919A
MX2010012919A MX2010012919A MX2010012919A MX2010012919A MX 2010012919 A MX2010012919 A MX 2010012919A MX 2010012919 A MX2010012919 A MX 2010012919A MX 2010012919 A MX2010012919 A MX 2010012919A MX 2010012919 A MX2010012919 A MX 2010012919A
Authority
MX
Mexico
Prior art keywords
ethernet
service
network
indicate
rei
Prior art date
Application number
MX2010012919A
Other languages
Spanish (es)
Inventor
Nanjian Qian
Cancan Huang
Yingzhe Wu
Original Assignee
Zte Usa Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zte Usa Inc filed Critical Zte Usa Inc
Publication of MX2010012919A publication Critical patent/MX2010012919A/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/18Processing of user or subscriber data, e.g. subscribed services, user preferences or user profiles; Transfer of user or subscriber data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W28/00Network traffic management; Network resource management
    • H04W28/16Central resource management; Negotiation of resources or communication parameters, e.g. negotiating bandwidth or QoS [Quality of Service]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Databases & Information Systems (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

Described herein are methods and systems for negotiating and authorizing one or more Ethernet and/or IP services among a plurality of network entities in a wireless communication system. In one embodiment, an Access Service Network Entity transmits Ethernet Service capability data to a Home Connectivity Service Entity. Optionally, the Ethernet Service capability data may include Ethernet Service capability data associated with a Visited Connectivity Service Entity. The Home Connectivity Service Entity then determines which Ethernet and/or IP Services are authorized for a particular mobile station associated with the Access Service Network Entity based upon the received Ethernet Service capability data, a subscriber profile, and a home network policy.

Description

EVERYTHING AND SYSTEM OF NEGOTIATION AND AUTHORIZATION OF OF ETHERNET SERVICE DESCRIPTION OF THE INVENTION The present invention is related by wireless communication networks, and more in p a method and system for the negotiation and au service of Ethernet, between several entities of With an increasing popularity of the dialects, there is a need to allow the u to several domains, depending on their location if a user requires access to the shares by a visited network instead of a store. The need for a network service requires, in several models, negotiation and au re the mobile device and the visited network.
More specifically, there is a need above, as well as additional features that will be apparent reference to the following detailed description along with the accompanying drawings.
An exemplary aspect of the present invention is a method for negotiating and authorizing Ethernet defects between a plurality of in a wireless communication system, the method includes: transmitting a first first network device to a second first adapted signal device; indicate the data of the Ethernet service associated with the network positive; receiving in the first second signal device of the second network device, adapted to indicate a set of authorized ernet for a mobile station ada together with authorized Ethernet services adapted to communicate with positive network based at least on par of the capacity of the Ethernet service; and second signal of the second network positive network device, the second signal adapted for the Ethernet services authorized mobile station.
In a third modality, the ibir method in an intermediate network device, or capacity data, the data set of data to indicate capacity data associated with a first device in the network, years of associated Ethernet capability. positive intermediary network for the conjunt capacity; transmit the data set of network device, wherein the first disp is adapted to provide mobile ethernet service based at least in part on authorization data.
In this way, the modalities described in this invention provide a method and a sis negotiation and authorization of the ernet capability between different network entities. Both the previous general description and the subsequent date are exemplary and are intended to provide the additional explanation of the vindicated.
BRIEF DESCRIPTION OF THE DRAWINGS The characteristics, nature and sale of this description will become more apparent in detailed description below, when wired according to a modality of the ention.
FIGURE 3 is an exemplary access service network block diagram according to the present invention.
FIGURE 4 is an exemplary connectivity service network block diagram q of the present invention.
FIGURE 5 is a block diagram of exemplary Ethernet method and negotiation of s according to an embodiment of the present invention.
FIGURE 6 is a flow chart exemplary of the negotiation and authorization of Ethernet defects between a plurality of ent in a wireless communication system of the mode of the present invention. embodiment of the present invention.
FIGURE 9 is a diagram of a message to indicate WiMAX capacity according to the present invention.
FIGURE 10 is a diagram of an exemplary defi-RADIUS to indicate various capacitance ASN and V-CSN according to a current invention.
FIGURE 11 is a diagram of a personal message that provides the IPv4 address of V-CS 4 according to one embodiment of the present in FIGURE 12 is a diagram of a personal message that provides the IPv6 address from HA to IP6 according to an embodiment of the message.
FIGURE 13 is a diagram of a message for the IPv4 address assignment of the mode of the present invention.
FIGURE 16 is a diagram of a mplar message that provides the IPv4 address of H-CS for the IPv4 address assignment of the mode of the present invention.
FIGURE 17 is a diagram of a personal message that provides the IPv4 address of V-CS for the IPv6 address assignment of the mode of the present invention.
FIGURE 18 is a diagram of a mplar message that provides the IPv4 address of H-CS1 for the IPv6 address assignment of the mode of the present invention.
FIGURE 19 is a diagram of a mplar message that provides the IPv4 address of V-C embodiment of the present invention.
FIGURE 22 is a diagram of a mplar message that provides the IPv4 address of H-C for the IPv6 address assignment of the mode of the present invention.
In the following description of the masks, reference is made to the drawings that are part of the same, and which are shown by specific elements of the illustration, in which the invention is embodied. It should be understood that these elements can be used and can be made in-line without departing from the scope of the ention.
As used herein, the "access terminus" (ASN) includes without limitation together network functions that provide access e IP connectivity capacity.
As used herein, the "mobile device" (MS) includes without limitation a mobile device that is intended to be used while in use or during putative interruptions.
As used herein, the term "reference" (RP) includes, without limitation, a concept that connects two groups of functions that emanate functional entities of an ASN, CSN that does not necessarily require that an entity "be a physical interface.
As used herein, the term "reference R3" includes, without limitation, a control plane co-locations between an ASN and an Ortho Authentication, Authorization and Admi or mobile.
As used herein, the Ethernet Service Terminology (eHA) introduces a module with the domestic regulatory functionality, as well as the functionality of the module, it can then forward, anchor, raise pure Ethernet frames. , instead of p As used herein, the term "(FA) includes, without limitation, an itada router that can channel / de-channelize a datag to a mobile node when it is away from the external node, it can also maintain information for the mobile node.
As used herein, the term Ethernet Service "(eFA) includes without As used herein, the term "mobile access" (MAG) includes, without limitation, one of resides the function of the mobile proxy agent.
As used herein, the Simple Ethernet service "includes, without limitation, that it utilizes functional entities without MIP Ethernet connection in a CSN) to provide Ethernet through a WiMAX network. a port of icada for each of the mobile stations to CSN.
As used herein, the "MIP-based Ethernet service" includes without service that the Mobile IP implements to provide dynamic channeling or RD configuration for r Skip jumper located within an ASN that s to provide feet traf routing services.
As used herein, the term "Ethernet Service Access Forwarding" (eAF limitation, a first hop function location in an ASN that is used for the Simple Ethernet Service Forwarding.) The eAFF could be routed by a router to channel a frame gives for the other end of a channeling point.
As used herein, the "central router" (CR) includes, without limitation, a connection located within a CSN that utilizes simple IP traffic, a route of being the counterpart of an access router.
As used in the present, the term "It is not necessarily interpreted as pragmatic about the other aspects or designs.
Reference will now be made in detail to the subject technology, examples of which are the attached drawings, where numbers of illars refer to similar elements in their design.
It should be understood that the special order of the stages in the processes described here is an example of exemplary methods. With design differences, it is understood that the order is an ark of the stages in the processes can be annotated while remaining within the invention. The demands of the met the elements of several stages in a stra, and do not intend to be limited to the order esp arquía presented. domestic activity (H-CSN), and / or a network of visited activities (V-CSN). Each network entity az to provide multiple IP services and Eth shares that can be associated with an ASN can example, DHCPv4 relay relay, DHC relay: Pv4, DHCPv6 proxy, FA, PMIP client, AR with tran 4, AR with IPv6 transport, eAFF transport F with transportation ??? ß. The capabilities that can be achieved with a V-CSN may include, for example, HCPv4, Server v-DHCPv6, MIP-HAv4, MIP-HAv6, M -eHAv6. Because each network entity has different IP Services service capabilities, various modalities of the invention are novel negotiation and service authorization between the various entities of the network.
Figure 1 is an illustration of an ar Cryption According to the modality represents ura 1, a wireless communication network in ación 100 mobile. An ASN 120 associated with a network connection (NAP) 150 can provide network connections that support access by mobile branch 100. In this way, when the company is in close proximity to an ASN 120, the mobile can try to acquire the IP services of the ASN 120.
In some embodiments, the ASN 120 may terminate which Ethernet services and / or will be provisioned to the mobile station 100 after vices have been authorized through the wireless communication H-CS of FIG. 1 to have a copy V-CSN 140 , which can act as .
As shown in FIGURE 1, there is a reference point between the station 10 connectivity service network entities (V S 130). To implement this configuration, mobile 100 can connect physically through a wireless connection or cable as the Rl connection. The ASN 120 itself can be e-connected via wireless or, failing that, through one or through the R4 connection. However, note the architectural position represented in the FI illustrative in nature; various entity inks and combinations thereof may be within the scope of the present invention.
Figure 2 is an illustration of an example in a wireless network communication mtop.
As shown in FIGURE 2, the exemplary mobile device 100 may include a receiver configured to support wireless alternative data protocols or protocols include, without limitation, IEEE 802.16 (such as 802. 16e, The transceiver module 200 can enable bi-directional communication between the entity and various network entities through which the transceiver module 200 can configure the Internet or WiMAX traffic, through an 802.3 Ethernet interface.
In some modes, the station turns on a processor module 210 that is config cretos or transistor logic, or other c ctronics.
In addition, the steps of a method or methods in relation to the described modalities can be directly understood in a software, in firmware, in a module software module 210 processor module or in any combination thereof. A software module may be a computer readable storage unit 220 such as RAM, Flash memory, EPROM memory, EEPROM memory, registers, a removable disk, a CD-ROM or any other storage form known in the art. In the case of storage 220 readable by computer, the processor module 210 is processed so that the processor can read the information from and The router may also include a weft structure base (not shown) according to the features of the present invention. This frame-based basis may be configured to have, and provide data as required by the functionality of a co-wired system. Additionally, in the frame-structured database, it may include a table for the purposes of storing the frame parameters. Note that the structure database consists of a local database (per module 210 processor), or a base ota (for example, a network database).
Figure 3 is an illustration of a mirror according to an embodiment of the ention. The ASN 120 can include a module 300 t To a remote module by means of a 300 trans SN 130 module, it is possible to use this caption data to determine a set of authorized IP services for the mobile station 100.
FIGURE 4 is an illustration of a CS example, an H-CSN 130 or a V-CSN 140), of the embodiment of the present invention. The CSN includes a coupled transceiver module 400 unicative to the antenna 440, as well as a computer readable core with similar functionality 200 transceiver module and the computer storage 22 as described with reference to The CSN 130 or 140 may also include cesator / server module 410 which may act as the Authentication, Authorization and Admi) switch in a H-CSN 130. Note that the Orisation to the proxy authenticator module of removing a set of Ornene services for the mobile station 100. It is then forwarded through the 430 proxy module to the ASN 120 for local storage.
Of course, someone with ordinary skill would realize that the 100-meter station, the ASN-120 described above, and the CSN-130 and reports are merely exemplary in different speakers and combinations of components well-used without departing from the scope of the description.
FIGURE 5 is a sequence diagram q exemplary method of the service negotiation of P according to a mode of the present to sequence may occur after the If a V-CSN 140 serves as a proxy for H-AAA, the AAA request 502 (1) may be sent to V-CSN 140 instead of H-CSN 130. In some modalities, after receiving the 502 (1) AAA Request Message, the V-CSN may add data from the AAA Capacity.
Ethernet of the V-CSN and the SN access capability for this data. Application 502 (2) of AAA then be sent to H-CSN 130.
The H-AAA server can then authenticate a set of Ethernet Services and / or mobile ation 100 based on the subscriber profile network policy associated with the station 100 capacity data contained within the Soli.
AAA Then, once the H-AAA Server successfully used a service set In accordance with the result of the authentication process, the ASN 120 can then offer Se and / or IP to the mobile station 100 (which includes Simple Ethernet Service, MIP Service, Simple IP, PMIP, or Internet service). C IP.
FIGURE 6 is a flowchart that I hear exemplary business and authorization of Ethernet vices between a plurality of ent and a wireless communication system of the mode of the present invention. Metering, for example, to allow a portion of a set of applicant mobile authorizing services.
In block 602, a request for a first-time solution from a station 100 Ethernet and IP vices capable of providing ). In some embodiments, the caption data is transmitted to an AAA Request 502 that has Authentication Call Attributes in RADIUS: (i) Et Service Capability; (ii) ASN IP Service Capacity. { iii) Ethernet Cabling of V-CSN; (iv) Capacity of S V-CSN. In this way, an ASN 120 can have only two attributes, namely: (i) ASN S ernet Capacity and (ii) Service Capacity? nter a V-CSN defines the last two Í) Ethernet Service Capability of V-CS IP Service V-CSN. Note that aliases, an alternative AAA protocol (for example, a DIAM protocol) can be used.
After it is determined that the orizations were received from a CSN (block Orizaron requested services.
Now an exemplary set is described governing the behavior of the AS in an environment where the following rules are only one particular modality of the present invention, it should be understood that multiple device rules may define the capability negotiation of the device. It is ernet and IP according to the scope of the ention.
In this way, in one modality, the attributes of the Service Capacity of the ASN and IP within the VSA of the Capacity W saje 502 Application for authentication of AAA and ree saje 502 towards the H-AAA in the H- CSN 130 to tra xy of AAA in a V-CSN 140 (if a V is used If AAA requires that the ASN 120 p Ethernet or IP service it can not support, ÑAS should consider the AAA message 504 as an Access Denied.
If the AS receives the IPv4 authorization via the Ethernet / IP Authentication Service attribute VSA of the IMA Acceptance WiMAx capability, the AS shall store this information available for later use by an IPv4 Simple anchored vice in accordance with the Authorized Anchor Location. If the NSA conducts simple IPv6 through the Ethernet / IP attribute authorized in the VSA of the RADIUS Access capability, the NIS is built locally and makes it available for the IPv6 anchored service.
MIP4 or hHA-IP-MIP4 in message AAA 504, the AS shall store these 4 locally and make them available for any of the services of Et Pv4, PMIPv4, or MIP to the mobile station 100. If any of the attributes vHA-IP-MIP6 and / or hHA-IP-saje of AAA authentication response, the accent these attributes HAv6 locally and wearable to use them later vices of CMIPv6 for the mobile station 100.
If the ÑAS receives any of the vDHCP or hDHCP attributes in the AAA message 504, the AS will store them and make them available for later DHCP use. These attributes also indicate that it enables the functionality of If the AS receives any of the attributes A in the authentication response message 504, it should store these available attributes for use in the PMIPvG terrestrial or the Mobile 100 Ethernet Service. If the AS receives the attributes FF, OR heCFF within the AAA message 504, the AS shall store these and make them available for the use of Simple Ethernet, Simple IPv4 or Sim teriores for the mobile station 100.
Finally, if the ÑAS receives the DHCP attributes in the aut response message 504, the ÑAS should store these available local attributes for use in a trans in a wireless communication system of a. embodiment of the present invention. Metering, such as, for example, to enable the H-CS to send a set of Etherne services to a mobile station 100.
In block 702 the service data is received. In some modalities, service capabilities include a set of (i) Ethernet Service Capabilities of the ASN IP Service; (iii) Ethernet capability of V-CSN; and (iv) Service Capacity. The data may be contained within an AAA authorization memos that are governed by AAA traffic (for example, RADIUS, DIAMETER, or have another format according to the present invention fashion.
Permitted authorization may be contained within the AAA authorization response that is governed by AAA (for example, RADIUS, DIAMETER, if it has another format according to the modality of the invention.) Note that if a V-CSN 140 fun > xy for an H-AAA server the message can tr to V-CSN 140 before being forwarded to the ASN 120.
Now we describe an exemplary set governing the behavior of the H-CSN 140 and respondent. Note that the following illustrative examples of a particular mode of invention. However, different rules must be understood and positive behavior can be defined to enable the Ethernet Service Capability and IP according to the present invention.
V-CSN). The H-AAA in the H-CSN 130 should send the AAA authentication response to the NAAS as the authentication response message through a V-CSN 140 in the case of the mobile station 100).
In one embodiment, the H-AAA must have Ethernet and IP Service ports authorize the Ethernet / IP services for the oriza mobile station 100. The H-AAA does not support Ethernet or IP that the H-CSN 130 and the ASN 120 can not support.
If the H-AAA has an orbited CMIPv4 service, the HAAA shall include attributes vHA-IP-MIP4 within the message 504 of the AAA resication. If the H-AAA has an authorized MIP Se ernet, the H-AAA must > x and DHCP only if the ASN 120 indicated the corresponding forecast. However, if the H-AAA attributes of the DHCP Server of the V-CSN 14, the H-AAA should indicate the authorized use of the DHCP Proxy in the ASN 120. The H-orize the functionality of the DHCP Proxy only previously indicated to me the corresponding support.
FIGURE 8 is a flowchart exemplary of negotiation and evaluation of Ethernet defects, among a plurality of in a wireless communication system of mode in the present invention. Metering, for example, to allow the serving a set of services authorizes mobile requestor 100.
In block 802, dat is received V-CSN; and (iv) IP V-CSN Service Capability was, the capabilities associated with the ASN 1 being powered by the first 2 attributes, the capabilities associated with the V-CSN 1 being attached to the last two attributes. The processing of V-CSN services to the caption data is shown in block 804.
In block 806, the service data is transmitted to the H-CSN 130. The H-CSN-cular then a set of services authorized mobile station 100 based at least on the service capabilities. Once the orifice of the H-CSN 130 is received in block 808 e then it is transmitted to ASN 120 in the b ASN 120 can then provide only vices of the mobile station 100 that are Thus, in one embodiment, if the V-CSN 140 receives the AAA solidation message 502 from the ASN of the ASN 120, it will join its own attributes of the E SN Service and the IP Service Capability. V-CSN Request for Original RADIUS Access Sent In consequence, V-CSN 140 shall reengray to H-AAA on H-CSN 130.
The V-CSN 140 must link the detection of A / V-eHA and / or vDHcP (v4 or v6) to message 502 of the AAA so that it is sent to the H-AAA in which the V-CSN 140 is able to provide these re SN should not provide an IP Service that is orchestrated in the 504 authentication response message. Likewise the V-CSN 140 should not provide Ethernet service that is not authorized in the m present invention. Of course, the protocol here is purely for the purpose of being understood that a wide range of other protocol learns in accordance with the scope of this i Note that Type 26 RADIUS is shown in FIGURES 9-22. However, other distributor attributes may be included, along with varying lengths and distributor specific attributes. { For RADIUS axis, Identification of Length and Distribution shown in FIGURES 9-22, you can represent any common values, and no tables are described. Note also that the following are specific Wi AX attributes, such as AX (Type-ID), as well as -responders and bitmask values. indicated are merely exemplary in n Real parameters can be defined in any more in accordance with the scope of this example, in some modalities, the capacity of T can be integrated into a single TLV, with the use of s to identify Ethernet capacity, the IP, and / or other service capabilities. AND alities, the Authorized Ethernet Service and Authorized vice can be integrated into a single erent bits that identify different information vice .
Table 1, pe-ID 1 for the WiMAX Capacity Attribute encryption In an Access Request, it identifies the WiMAX Capabilities on the ASN or the HA. In an Attribute Grant identifies the sele options by the RADIUS server. 6 + 3 + TLV C-bit tinuation = 0 Notification of Mode Inactive Capacities of 6 l [d], [f] 0 IP service of the ASN Capacities of 6 0-0 IP service l [e], [f] of the VCSN Services of 6 0 l [f] | Authorized IP Locations of 3 0 * ltf] Anchor Authorized Capacities of 6 1 [d], [f] 0 Service Ethernet from ASN Capacities of 6 0-0 Service of l [e], [f] VCSN Ethernet Services of 6 0 l [f] Ethernet Authorized Note that in Table 2, it is provided Additional notations [a] - [f]. The not - that (AA) which means that H-AAA does not require the Inactive Mode. The HAAA should not e -TLV to an HA. An HA must discretely ignore. The notation [d] indicates that this sub-TLV comes from the ASN to indicate its capabilities of s The notation [e] indicates that this sub-TLV d stands when the mobile station is bound through it, included by the V- CSN for supported IP service applications. Note that this TLV should not be included for iMAX eration before Release 1.5.
FIGURE 10 illustrates an exemplary definition that can be used to indicate various C services of the ASN and the V-CSN (e.g., Ethernet and / or IP VOICE layer) in accordance with a present invention. Note that a number or code Table 3 pe-ID? IP Service Capability of the ASCtion This attribute can be included in a m RADIUS Access Request for the RADIUS and indicates the IP Capabilities related to the ASN 6 + 3 + 4 C-bit tinuation = 0 or 4 Bit Mask octets with the values 0x00000001 = DHCP Relay 0x00000002 = Proxy DHCP 0x00000004 = FA 0x00000008 = PMIP Client 0x00000010 = MAG with Ip Transportation 0x00000020 = MAG with Ip Transportation 0x00000040 = AR with Ipv Transportation 0x00000080 = AR with Ipv Transportation Inactive bits are reserved Table 4 summarizes the exemplary information RADIUS saje that can be used for i ASN Ethernet Service: Table 4 0x00000001 = eAFF with Transportation I 0x00000002 = eAFF with Transportation I 0x00000004 = eFA Inactive bits are reserved Table 5 summarizes the exemplary RADIUS information that can be used to indicate the IP address of the V-CSN: Table 5 pe-ID? IP Service Capability of V-encryption This attribute can be included in a m RADIUS Access Request for the RADIUS and indicates the IP Capabilities related to the V-CSN 6 + 3 + 4 C-bit tinuation = 0 0x00000040 with Ipv Transportation 0x00000080 with Ipv Transportation Inactive bits are reserved Table 6 summarizes the exemplary RADIUS information that can be used for the Ethernet Service of the V-CSN: Table 6 pe-ID? Ethernet Service Capability of Ciphering This attribute can be included in a m RADIUS Access Request for the RADIUS and indicates the Ethernet Capabilities related to the V-CSN 6 + 3 + 4 C-bit tinuation = 0 Or 4 bytes of Bit Mask with the s they provide TLV RADIUS specs that define the parameters, such as the IP address of the vLMA IP address, etc. Note that these TLVs are mplares in nature; other TLVs can be defied from the scope of the present invention.
FIGURE 11 illustrates an exemplary definition, establishing that the capabilities of the ASN 120 and / or V-CSN 140 include vHA-IP erdo with one embodiment of the invention. By supramation it can be included in a RADIUS message. esume the exemplary information in the message of FIGURE 11: Table 7 esume the exemplary information in the message FIGURE 12: Table 8 pe-ID? for vHA-IP-MIP6 The IPv6 address of the HA used parity 6 + 3 + 16 C-bit tinuation = 0 or Chain of octets that contains a IPv6 (first the most important bit) FIGURE 13 illustrates an example definition RADIUS, establishing the address of a CPv4, according to a modality of the invention other information can be included in an IUS. Table 9 summarizes the exemplary RADIUS information of FIGURE 13: Table 9 RADIUS, establishing the IPv6 address of a ~ Pv6, according to one embodiment of the invention, other information may be included in an IUS. Table 10 summarizes the exemplary RADIUS information of FIGURE 14: Table 10 ß-ID? for DHCPv6 Server The IPv6 address of the V-CSN Server used for the address assignment 6 + 3 + 16 C-bit tinuation = 0 or Chain of octets that contains a IPv6 (first the most important bit) FIGURE 15 illustrates an example definition, establishing the IPv4 address of the V-CS for the IPv4 address assignment, from a 6 + 3 + 4 C-bit tincture = 0 or Chain of octets that contains a Ipv4 (first the most important bit) FIGURE 16 illustrates an exemplary definition, establishing the IPv4 address of the H-CS for the IPv4 address assignment, of the mode of the invention. Of course another i to be included in a RADIUS message. The Table exemplary information in the RADIUS message of Table 12 pe- ID? for hL A with IPv4 transport encryption The IPv4 address of the H-CSN LMA for IPv4 address assignment 6 + 3 + 4 summarize the exemplary information in the message of FIGURE 17 Table 13 pe-ID? for vLMA with IPv6 transport encryption The IPv4 address of the V-CSN LMA for the IPv6 address assignment 6 + 3 + 16 C-bit tinuation = 0 or Chain of octets that contains a IPv6 (first the most important bit) FIGURE 18 illustrates an exemplary definition, establishing the IPv6 address of the H-CS for the IPv6 address assignment, of the mode of the invention. Of course another i to be included in a RADIUS message. The Table exemplary information in the RADIUS message of IPv6 (first the most important bit) FIGURE 19 illustrates an exemplary definition, establishing the IPv4 address of the V-C for the IPv4 address assignment, of the mode of the invention. Of course another i to be included in a RADIUS message. Table 15 exemplary ormation in the RADIUS message of FIG Table 15 ype-ID? for vCR with IPv4 Transportation The IPv4 address of the V-CSN CR by utili escripting IPv4 address assignment 6 + 3 + 4 ntinuation C-bit = 0 Octet string that contains a direc tor (first the most important bit) FIGURE 20 illustrates an IUS axis definition, establishing the IPv4 address of the H-C FIGURE 21 illustrates an example definition IUS, setting the IPv6 address of the V-lize for the assignment of the address ??? ß, of the mode of the invention. Of course another i to be included in a RADIUS message. Table 17 exemplary ormation in the RADIUS message of FIG Table 17 Type- ID? for vCR with IPv6 Transport The IPv4 address of the V-CSN CR by a description of the IPv6 address assignment 6 + 3 + 16 ontinuación C-bit = 0 Octet string containing a value (first the most important bit) FIGURE 22 illustrates a definition eg IUS, establishing the IPv6 address of the HOLIZ for the IPv6 address assignment, from a Additionally, Table 19 summarizes i mplar for a TLV that indicates the Services orizados, while Table 20 summarizes i mplar for a TLV that indicates the Services d Orizados Table 19 TLV- ID 7 for Authorized IP Services Description This TLV is included in a RADIUS Access Grant to indicate the related Servi Capabilities that the ASN has auto Support Length 2 + 4 octets Value 4 octets of Bits Mask values: 0x00000001 = CMIP4 0x00000002 = PMIP4 0x00000004 = Ipv4 Simple 0x00000008 = CMIP6 0x00000010 = PMIP6 0x00000020 = Simple IPv6 Inactive bits are reserved Tables 21 and 22 illustrate an exemplary type (TLV) of the IP and E capability of ASN 120 / V-CSN 140 for an authorized S ernet / IP definition according to another modality of the invention. Note that the parameters above are merely exemplary in real naturometers can be defined in any more according to the scope of the present example, in some modalities, the capacity V-CSN can be integrated in a single TLV, with different bits to identify the IP Etciency capacity, and / or other capabilities of a few modalities, the Authorized Service Authorized Ethernet Service can be integrated in a different bit that identifies different info vice.
Table 22 Note that in Table 22, additional notations [a] - [f] are provided. The no that (AA) which means that H-AAA does not require the Inactive Mode. The HAAA should not e -TLV to an HA. An HA must discretely ignore. The notation [d] indicates that this sub-TLV comes from the ASN to indicate its capabilities, which includes the IP service, ernet, etc. The notation [e] indicates that this is present when the mobile station joins a visited tr, included by the V-CSN for supported IP services, is ernet, etc. The notation [f] indicates that this TLV should be set for any WiMAX release 1.5.
Table 23 summarizes the example RADIUS information that can be used to indicate the ASN Service (eg, Ethernet, I Table 23 Type- ID? Service Capacity of the ASN This attribute can be included in a subscription. RADIUS Access Request for the service indicates the ASN relation Service Capabilities, ie, IP, Ethernet, or other applicable future. 6 + 3 + 4 ontinuación C-bit = 0 4 Bit Mask octets with the values alue: 0x00000001 = DHCP Relay 0x00000002 = DHCP Proxy 0x00000004 = FA 0x00000008 = PMIP Client 0x00000010 = MAG with Ipv4 Transportation 0x00000020 = MAG with Ipv6 Transportation 0x00000040 = AR with Ipv4 Transportation 0x00000080 = AR with Ipv6 Transportation 0x00000100 = eAFF with Ipv4 Transportation 0x00000200 = eAFF with Ipv6 Transportation 0x00000400 = eFA Inactive bits are reserved Table 24 summarizes the information Table 24 T pe- ID? Serviceability of the V-CSN This attribute can be included in an escription. RADIUS Access Request for the server indicates the Service Capabilities related to the V-CSN, that is, IP, Ethernet, etc. 6 + 3 + 4 ontinuación C-bit = 0 4 Bit Mask octets with the values alue: 0x00000001 = DHCPv4 server 0x00000002 = DHCPv6 server 0x00000004 = HAv4 0x00000008 «HAv6 0x00000010 = LMA with Ipv4 Transportation 0x00000020 = LMA with Ipv6 Transportation 0x00000040 = CR with Ipv4 Transportation 0x00000080 = CR with Ipv6 Transportation 0x00000100 = eCFF with Ipv4 Transportation 0x00000200 = eCFF with Ipv6 Transportation 0x00000400 = eHAv4 0x00000800 = eHAv6 Inactive bits are reserved Table 25 summarizes the exemplary RADIUS information that can be used to indicate the Table 25 pe-ID? for VHA-IP-MIP4 The IPv4 address of the V-CSN HA for MIP4. scripting 6 + 3 + 4 ntinuation C-bit = 0 Octet string containing a dir lor (first the most important bit) Table 26 summarizes the exemplary RADIUS information that can be used to indicate 6 of an HA for MIP6 in accordance with a modal invention. Note that an exemplary definition can be used to indicate the vHA-IP-stra in FIGURE 12.
Table 26 to indicate the Server vDHCPv4 is already FIGURE 13.
Table 27 ype- ID? for Server vDHCPv4 The IPv4 address of the V-CSN DHCP Server or subscription for the IPv4 address assignment. 6 + 3 + 4 ntinuation C-bit = 0 Octet string containing a direc tor (first the most important bit) Table 28 summarizes the exemplary RADIUS information that can be used to indicate the DHCP Server 6 for the assignment of address according to an embodiment of the present invention an exemplary definition TLV RADIUS which can indicate the Server vDHCPv6 already shown in Table 28 with an embodiment of the present invention an exemplary definition TLV RADIUS that can indicate the vLMA with the IPv4 Transport and the FIGURE 15.
Table 29 ype-ID? for vLMA with IPv4 Transportation The IPv4 address of the V-CSN LMA by using IPv4 address assignment. 6 + 3 + 4 ntinuation C-bit = 0 Octet string containing a direc tor (first the most important bit) Table 30 summarizes the exemplary RADIUS information that can be used to indicate 4 of the LMA H-CSN for address allocation with one embodiment of the present invention.
Table 31 summarizes the RADIUS example information that can be used to indicate I 4 of the LMA V-CSN for the address assignment with an embodiment of the present invention and an exemplary TLV RADIUS definition which may indicate the VLMA with the Transportation. IPv6 and FIGURE 17.
Table 31 ype-ID? for vLMA with IPv6 Transportation The IPv4 address of the V-CSN LMA by utilization of IPv6 address assignment. 6 + 3 + 16 ntinuation C-bit = 0 Octet string containing a dir lor (first the most important bit) Table 32 summarizes the example RADIUS information that can be used to indicate the Table 33 summarizes the RADIUS message information that can be used to indicate the v4 of the V-CSN CR for the address assignment with an embodiment of the present invention and an exemplary TLV RADIUS definition that can be used. indicate vCR with the IPv4 Transport already FIGURE 19.
Table 33 ype-ID? for vCR with IPv4 Transportation The IPv4 address of the V-CSN CR by using IPv4 address assignment. 6 + 3 + 4 ntinuation C-bit = 0 Octet string containing a dir lor (first the most important bit) Table 34 summarizes the RADIUS example information that can be used to indicate the Table 34 pe- ID? for hCR with IPv4 Transport The IPv4 address of the H-CSN CR by use of IPv4 address assignment. 6 + 3 + 4 C-bit tinuation = 0 Octet string that contains an address (first the most important bit) Table 35 summarizes the RADIUS example information that can be used to indicate the v4 of the V-CSN CR for the address assignment with an embodiment of the present invention and an exemplary TLV RADIUS definition which may indicate vCR with the transport? ?? ß already FIGURE 21.
Table 35 ype-ID? for vCR with IPv6 Transport - an exemplary TLV RADIUS definition that to indicate hCR with IPv6 Transport FIGURE 22 Table 36 ype-ID? for hCR with IPV6 Transportation The IPv4 address of the H-CSN CR by utilization of IPv6 address assignment. 6 + 3 + 16 ntinuation C-bit = 0 Octet string containing a di lor (first the most important bit.}.
In addition, Table 37 summarizes the information a TLV that indicates Authorized Services.
Table 37 V-ID 7 for Authorized Services This TLV is included in a RADIUS Access message for the AS and related Service Capabilities In this way, the various methods described herein provide for the denaturing of the Ether service capability of different network entities. In addition, the present invention mods are able to take advantage of the provisioning and authorization of network access for adequate Ethernet and / or IP re-browsing between various networks using the authentication protocols.
Although the present invention is incomplete in relation to the modalities of reference to the appended drawings, verses should be made, changes and modifications will appear to be those experts in. The technique. Such modifications should be understood as including the scope of the present invention as defined by the appended claims.
Ordinary, "standard", "known" and standard terms should not be interpreted as limiting and writing for a given period or for a given period of time, but otherwise they should be read to understand conventional, traditional, normal, or they are available or known in the future, and a group of laces with the conjunction "and" should not want each of these elements to be pressable, on the contrary, it should be read as "and / e the opposite is expressly established. In the same way, a group of elements linked to the conj must be read as requiring mutual exclusivity, but must also be read as "and / or" to expressly express otherwise. Further,

Claims (1)

  1. CLAIMS 1. A method of negotiating and authorizing S Ethernet services between a plurality of networks in a wireless communication system, characterized in that it comprises: transmitting a first signal from the network device to a second signal device adapted to indicate the data of the Ethernet service associated with the first network; receiving, in the first network device of the second network device, the selected one to indicate a set of services for a mobile station adapted to the first network device; Y store data in the first device Furthermore, the signal is adapted to indicate an authorized IP service for the mobile data station, and is also adapted to indicate the authorized IP services for the mobile station. 4. The method of conformance with the rei characterized in that the first signal comprises authentication request AAA. 5. The method of conformance with the rei characterized in that the first device comprises an access service network entity. 6. The method of conformance with the rei characterized in that the first signal purchased us a RADIUS attribute adapted to indicate the Ethernet Service of the network entity of s ceso. 7. The method of compliance with the law AAA authentication response. 10. The method of compliance with the reiv characterized further because it comprises: receiving a third signal in the first network, the third signal transmitted from the latter to indicate an Ethernet service sol determined in the first device Ethernet Authorized Services service Ethernet service requested. 11. A method of negotiating and authorizing Ethernet services between a plurality of networks in a wireless communication system, acterized because it comprises: receiving a second signal device from a first network device, adapted to indicate the data of the network; gunda signal adapted to indicate the set of Ethernet authorized by the mobile station. 12. The method of compliance with the rei, characterized in that the wired system comprises a communication system Wi 13. The method of conformance with the rei, characterized in that the first signal in addition to indicating the data of the capacity of services with the first network device, terminating a set of Ethernet services to a mobile station further comprises of a set of IP services. authorized for the mobile, and where the second signal is also given the set of mobile IP authorization services. 1 . The method of compliance with the law 17. The method of compliance with the. rei, characterized in that determining a set of authorized Ethernet for a mobile station s less in part in a mobile subscriber profile. 18. The method of compliance with the rei, characterized in that determining a set of authorized Ethernet for a mobile station s less in part in a home network policy. 19. The method of conformance with the rei, characterized in that the second device comprises a service network entity of cosmetics. 20. The method of conformance with the rei characterized in that the second signal comprises authentication response AAA. 21. A method of authorization authorizes with the intermediate network device at capacity c; transmitting the data set of a single network device layer, the second device to generate a set of data to indicate a set of Ethernet services to a mobile station in communication with the network device, wherein the set of is based at least in part on capacity c; receive in the network device int authorization data together; Y transmitting the author data set imer network device, wherein the first device is adapted to provide the mobile telephone service based at least in part on the The data of the Ethernet capability associated with the intermediate network device also includes the capacity of the IP associated with the intermediate device, wherein the authorization data is adapted to indicate a set of services for the mobile station, and where The network device is also adapted for Ethernet propo- sition to the mobile station with part of the author data set 24. The method of conformance with the rei, characterized in that the first device triggers an access service network entity. 25. The method of conformance with the rei, characterized in that the network device fires a service network entity of cited. imer network device up to a second device, the first signal adapted to indicate the Ethernet service dities associated with network device; means for receiving in the first device a second signal from the second network device, adapted to indicate a set of authorized networks for a mobile station to communicate with the first network device; Y means to store data in a network device, where the data is adhered to the set of Ethernet services autori mobile station. 28. The system according to the rei, characterized in that the wired system comprises a communication system Wi characterized by the first co-sign signal of AAA authentication request. 31. The system according to the rei characterized in that the first device turns on an access service network entity. 32. The system in accordance with the rei, characterized in that the first signal acquires a RADIUS attribute adapted to indicate the Ethernet service of the network entity of s ceso. 33. The system according to the rei, characterized in that the second device triggers a service network entity of cited. 34. The system in accordance with the rei, characterized because the second device
MX2010012919A 2008-05-30 2009-05-29 Ethernet service capability negotiation and authorization method and system. MX2010012919A (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US5776608P 2008-05-30 2008-05-30
PCT/US2009/045710 WO2009155120A2 (en) 2008-05-30 2009-05-29 Ethernet service capability negotiation and authorization method and system

Publications (1)

Publication Number Publication Date
MX2010012919A true MX2010012919A (en) 2010-12-20

Family

ID=41434667

Family Applications (1)

Application Number Title Priority Date Filing Date
MX2010012919A MX2010012919A (en) 2008-05-30 2009-05-29 Ethernet service capability negotiation and authorization method and system.

Country Status (4)

Country Link
ES (1) ES2380526B1 (en)
MX (1) MX2010012919A (en)
RU (1) RU2010154288A (en)
WO (1) WO2009155120A2 (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115484230A (en) * 2022-09-01 2022-12-16 中国电信股份有限公司 Network access method, system, device and storage medium

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB0423301D0 (en) * 2004-10-20 2004-11-24 Fujitsu Ltd User authorization for services in a wireless communications network
CN101072231A (en) * 2006-05-13 2007-11-14 华为技术有限公司 Method and device for negotiating mobile IP capability for communication network
US7616962B2 (en) * 2006-06-07 2009-11-10 Cisco Technology, Inc. QoS support for VoIP and streaming services
US20080108322A1 (en) * 2006-11-03 2008-05-08 Motorola, Inc. Device and / or user authentication for network access
US8660555B2 (en) * 2006-11-03 2014-02-25 Core Wireless Licensing S.A.R.L. Quality of service mechanism

Also Published As

Publication number Publication date
WO2009155120A3 (en) 2010-02-25
RU2010154288A (en) 2012-07-10
ES2380526A1 (en) 2012-05-16
WO2009155120A2 (en) 2009-12-23
ES2380526B1 (en) 2013-02-22

Similar Documents

Publication Publication Date Title
JP7252305B2 (en) Data transmission method, device and system
US9602365B2 (en) System and method of infrastructure service discovery
US7573904B2 (en) Ad hoc networking of terminals aided by a cellular network
KR101814969B1 (en) Systems and methods for accessing a network
EP1796342B1 (en) A method for transmitting requests
JP5661207B2 (en) Method, system, and computer-readable medium for diameter-based guidance of mobile device network access
CN109997334A (en) Session management with the relaying being indirectly connected with and charge applied for Internet of Things in 3GPP network
TW200904208A (en) Packet data network connectivity domain selection and bearer setup
WO2011144134A1 (en) Method, apparatus and system for pushing information
WO2013166913A1 (en) Uplink/downlink transmission method for small amount of data, and corresponding terminal and mobility management unit
WO2014183260A1 (en) Method, device and system for processing data service under roaming scenario
TWI429308B (en) Method and mobile communication system capable of establishing peer-to-peer transmission
WO2008151557A1 (en) Method, equipment and proxy mobile ip system for triggering route optimization
US8411666B1 (en) Location-based geographical routing
WO2013170449A1 (en) Method, device and system for processing network sharing
US8634394B1 (en) Mechanism to verify packet data network support for internet protocol mobility
WO2015089969A1 (en) Accessibility management method and device for m2m terminal/terminal peripheral
JP2002232949A (en) Mobile communication system and data transfer method in mobile communication system
US20090300726A1 (en) Ethernet service capability negotiation and authorization method and system
WO2013107243A1 (en) Session establishing method and device
MX2010012919A (en) Ethernet service capability negotiation and authorization method and system.
JP2003134140A (en) Data transfer system utilizing mobile ip
WO2016034018A1 (en) Method, device and home subscriber server for device to device service recovery
US8495186B1 (en) Managing termination of point-to-point sessions between electronic devices
WO2008083609A1 (en) Method for transmitting the subscription information of a user to a visiting network and a initiating method thereof

Legal Events

Date Code Title Description
FG Grant or registration