Traitement en cours

Veuillez attendre...

Paramétrages

Paramétrages

Aller à Demande

1. WO2011058494 - PRISE EN CHARGE DE TRANSFERT INTERCELLULAIRE EN WIMAX

Note: Texte fondé sur des processus automatiques de reconnaissance optique de caractères. Seule la version PDF a une valeur juridique

[ EN ]

CLAIMS

1. A method in a network element acting as an anchor ASN-GW (Access Service Network Gateway) for a hand-over of a mobile node within a WiMAX (Worldwide Interoperability for Microwave Access) network, the method comprising the steps of: providing network connectivity to the mobile node by the anchor ASN-GW prior to the hand-over, wherein there is a line card in each of a plurality of line card slots in the network element, and only one of these line cards stores R4 session information for the mobile node at any given time;

identifying a data path in a GRE (Generic Routing Encapsulation) tunnel between the anchor ASN-G W and a serving ASN-GW;

receiving data of an R4 session from the serving ASN-GW through the data path in the GRE tunnel for the hand-over, wherein R4 protocol is used for ASN-GW to ASN-GW type communication;

identifying a GRE key to traverse one or more of a plurality of tables, wherein the identified GRE key is used to identify the mobile node for the R4 session in the GRE tunnel for the hand-over;

accessing, with the GRE key, the one or more of the plurality of tables that are indexed by GRE keys and that are stored on each of the plurality of line cards to obtain the R4 session information for the mobile node;

locating that line card slot of the plurality of line card slots in the network element that contains the line card with the R4 session information as a result of the step of accessing the one or more of the plurality of tables, whereby setup of the data path in the GRE tunnel between the anchor ASN-GW and the serving ASN-GW is completed efficiently by limiting R4 session information for any given mobile node to be stored in only one of the plurality of lines cards and quickly by locating any given R4 session information through the one or more of the plurality of tables, thus minimizing data loss due to disruption of the mobile node subject to the hand-over; and completing the hand-over of the mobile node from the anchor ASN-GW to the serving ASN-GW over the GRE tunnel based on the obtained R4 session information after which IP connectivity to the mobile node is provided by the serving ASN-GW.

2 The method of claim 1 , wherein the line card is the only line card in the network element that contains the R4 session information for the mobile node.

3. The method of claim 2, wherein the step of accessing further comprises the steps of:

identifying a first line card slot in which traffic for the R4 session arrives upon initialization of the data path of the ORE tunnel;

determining whether the ORE key exists in a first table on a first line card in the first slot;

identifying the first line card as the only line card that contains the R4 session information upon determination that the ORE key exists in the first table on the first line card;

determining whether the ORE key exists in a second table on the first line card in the first line card slot upon determination that the ORE key does not exist in the first table on the first line card;

forwarding the traffic from the first line card slot to a second line card slot identified by the second table on the first line card in the first line card slot and

identifying the second line card as the only line card that contains the R4 session information upon determination that the ORE key exists in the second table on the first line card;

identifying, from a third (able on the first line card in the first slot, a third line card slot that corresponds to a hash value of the ORE key and forwarding the traffic from the first line card slot to the third line card slot upon determination that the ORE key does not exist in the second table on the first line card;

forwarding the traffic from the third line card slot to a fourth line card slot identified by the ORE key in a fourth table on a third line card in the third slot upon receiving the traffic at the third line card slot and identifying the ORE key in the fourth table on the third line card;

determining whether the ORE key exists in a fifth table on a fourth line card in the fourth line card slot upon forwarding of the traffic from the third line card slot to the fourth slot; and

identifying the fourth line card as the only line card that contains the session information upon determination that the ORE key exists in the fifth table of the fourth line card.

4. The method of claim 3, wherein the first table on the first line card and the fifth table on the fourth line card are indexed in a first manner, by ORE key and R4 session information, the second table on the first line card and the fourth table on the third line card are indexed in a second manner, by ORE key and line card slot, and the third table on the first line card is indexed in a third manner, by hash of ORE key and line card slot.

5. The method of claim 4, wherein all line cards of the network element contain the third type of table comprised of identical entries.

6. The method of claim 4, further comprising the step of:

copying an entry identifying the ORE key from the fourth table on the third line card to the second table on the first line card in response to determining that the ORE key does not exist in the second table on the first line card, whereby next time the session information is being located, a need to traverse the third table on the first line card is eliminated and therefore a need to forward the traffic from the first line card slot to the third line card slot is also eliminated.

7. The method of claim 3, wherein the traffic traverses no more than three line card slots to identify the only line card that contains the session information for any given line card slot in which traffic for the R4 session arrives upon the initialization of any data path in the ORE tunnel.

8. The method of claim 1 , further comprising the step of:

disassociating the data path of the ORE tunnel from the ORE key after the handover is complete.

9. The method of claim 1 , further comprising the steps of:

establishing an L2 (layer-2) session between the network element and the mobile node; and

tying the R4 session to the L2 session prior to the hand-over.

10. The method of claim 9, further comprising the step of:

continuing a Legal Intercept service on the L2 session during the hand-over that began prior to the hand-over.

11. The method of claim 9, further comprising the step of:

selectively continuing and disabling services on the L2 session that began prior to the hand-over during the hand-over.

12. A network element to act as a first ASN-GW (Access Service Network Gateway), to provide network connectivity to a mobile node and to facilitate a handover of the mobile node from the first ASN-GW to a second network element that acts as a second ASN-GW, the network element comprising:

a plurality of line card slots, each of which to hold a line card to support traffic between a plurality of mobile nodes and the network element, wherein only one line card will be adapted to contain session information for the mobile node at any given time, and wherein each of the plurality of mobile nodes is assigned a GRE (Generic Routing Encapsulation) key for a GRE tunnel; and

one or more control modules on one or more control cards to maintain a plurality of tables on each of the plurality of line cards, the pluralities of tables indexed based on the GRE keys to allow for traversal through the pluralities of tables using the mobile node's GRE key to locate the only one line card that contains the session information for the mobile node and match the only one line card that contains the session information for the mobile node with a data flow from the GRE tunnel between the first ASN-GW and the second ASN-GW for the hand-over of the mobile node, whereby the use of the GRE key speeds the traversal to quickly match the data flow from the GRE tunnel with the only one line card that contains the session information for the mobile node so as to minimize data loss due to disruption of services between the mobile node and the network element caused by the hand-over.

13. The network element of claim 12, wherein after the hand-over of the mobile node is complete, a path in the ORE tunnel that carries the data flow is disassociated from the mobile node's ORE key and the second network element provides the internet connectivity to the mobile node.

14. The network element of claim 12, wherein the plurality of tables in the only one line card comprises:

a first table adapted to identify the mobile node's ORE key that corresponds to the session information contained in the only one line card;

a second table adapted to identify another line card slot assigned to a second mobile node's ORE key that corresponds to a second mobile node's session information contained in the line card in the another line card slot; and

a third table adapted to identify a further line card slot assigned to a hash value that identifies a range of ORE keys, wherein the line card in the further line card slot to contain a fourth table of the with an entry for a third ORE key in the range of ORE keys that corresponds to a third session information.

15. The network element of claim 14, wherein the third table is to contain identical entries for each line card slot of the plurality of line card slots.

16. The network element of claim 14, wherein the second table and the fourth table are to be indexed in a same manner, by ORE key and line card slot

17. The network element of claim 14, wherein upon discovery that the second table does not include an entry for the third ORE key, the second table grows in size with an addition of the entry for the third ORE key copied from the fourth table, whereby traversal of the third table for subsequent attempts to locate the third session information is eliminated and therefore forwarding the traffic for the third session information based on the third table is also eliminated

18. A WiMAX (Worldwide Interoperability for Microwave Access) network for supporting a hand-over of a mobile node from an anchor ASN-GW (Access Service Network Gateway) to a serving ASN-GW, the WiMAX network comprising:

a first network element, acting as the anchor ASN-GW that provides internet connectivity to the mobile node prior to the handover, the first network element including:

a plurality of line card slots, each of which to hold a line card to support traffic between a plurality of mobile nodes and the first network element, wherein only one line card will be adapted to contain session information for the mobile node at any given time, and wherein each of the plurality of mobile nodes is assigned a GRE (Generic Routing Encapsulation) key for a GRE tunnel; and

one or more control modules on one or more control cards to maintain a plurality of tables on each of the plurality of line cards, the pluralities of tables indexed based on the GRE keys to allow for traversal through the pluralities of tables using the mobile node's GRE key to locate the only one line card that contains the session information for the mobile node and match the only one line card that contains the session information for the mobile node with a data flow from the GRE tunnel between the first ASN-GW and the second ASN-GW for the hand-over of the mobile node, whereby the use of the GRE key speeds the traversal to quickly match the data flow from the GRE tunnel with the only one line card that contains the session information for the mobile node so as to minimize data loss due to disruption of services between the mobile node and the first network element caused by the hand-over, and

a second network element, acting as the serving ASN-GW, that provides internet connectivity to the mobile node subsequent to the hand-over.

19. The WiMAX network of claim 18, wherein the first network element copies an entry for the GRE key in a table of the plurality of tables on the only one line card to another table of the plurality of tables for another line card when traversal of the another table occurs and the entry for the GRE key is not found.