throbber
United States Patent
`US 7,280,505 B2
`(10) Patent No.:
`(12)
`Chaskaret al.
`(45) Date of Patent:
`Oct. 9, 2007
`
`
`US007280505B2
`
`(54) METHOD AND APPARATUS FOR
`PERFORMING INTER-TECHNOLOGY
`HANDOFF FROM WLAN TO CELLULAR
`NETWORK
`Inventors: Hemant Chaskar, Woburn, MA (US),
`Govind Krishnamurthi, Arlington, MA
`(US); Dirk Trossen, Cambridge, MA
`(US)
`
`(75)
`
`(73) Assignee: Nokia Corporation, Espoo (FI)
`(*) Notice:
`Subject to any disclaimer, the term ofthis
`.
`,
`patent is extended or adjusted under 35
`US.C. 154(b) by 15 days.
`
`.
`(21) Appl. No.: 10/600,156
`(22)
`Filed:
`Jun. 19, 2003
`(65)
`Prior Publication Data
`US 2004/0090937 Al
`May 13, 2004
`
`Related U.S. Application Data
`ee
`(60) nal application No. 60/425,801, filed on Nov.

`.
`(51)
`Int. Cl
`(2006.01)
`H040 7100
`,
`370/331; 370/401
`US. Cl
`52)
`370/331
`oe Fi ld f aue.feativeeSoe1.
`(58)
`Fie
`*370/338 359.356,401: 455/432.1 436 ‘439.
`200A
`OOM
`?
`i
`TOO
`79
`lication
`file

`let
`hen 171
`tor complete search
`ile
`ee application
`References Cited
`U.S. PATENT DOCUMENTS
`
`S
`
`(56)
`
`Austory.
`
`6,137,791 A * 10/2000 Frid et al... 370/352
`6,243,581 B1*
`6/2001 Jawanda..........
`«. 455/432.2
`
`
`6,708,031 B2*
`3/2004 Purnadi et al. «0.0.0.0... 455/436
`
`6,760,444 B1*
`6,876,640 B1*
`6,904,055 B2*
`
`7/2004 Leung oo... 380/270
`4/2005 Bertrandetal. ...
`
`............... 370/467
`6/2005 Pichnaet al.
`(Continued)
`FOREIGN PATENT DOCUMENTS
`2003-333639
`11/2003
`(Continued)
`
`JP
`
`OTHER PUBLICATIONS
`Perkins et al, Mobile IP Joins Forces with AAA, IEEE, pp. 59-61,
`Aug. 2000.
`.
`(Continued)
`Primary Examiner—Frank Duong
`(74) Attorney, Agent, or Firm—Harrington & Smith, PC
`(57)
`ABSTRACT
`A method, system and computer program are disclosed to
`perform a low latency inter-technology handoff of a MN
`from a WLANto a cellular network. The method includes
`transmitting a Bearer Context from the MN for use by the
`cellular network, the Bearer Context containing information
`required to establish access network bearers in the cellular
`network for an ongoing Internet session of the MN; and
`responding to the Bearer Context with a Router Advertise-
`ment that is forwarded to the MN. The Bearer Context may
`be piggybacked on another message, or it may be sent as a
`Presy
`8
`y
`separate message. The Bearer Context includes information
`expressive of: (a) a QoS requirement of an ongoing appli-
`cation or applications of the MN; (b) a uniqueidentity of the
`MN that is recognizable by the cellular network; (c) param-
`eters to facilitate the creation of a Point-to-Point Protocol
`state in the cellular network; and (d) parameters to enable
`establishment of packetfilters in the cellular network. The
`method also includes authenticating and authorizing with the
`target cellular network for the purpose of executing handoff.
`
`43 Claims, 4 Drawing Sheets
`
`
` AAA IN HONE
`
`OPERATOR NETWORK
`
`
`
`
`SECURITY ASSOCIATION
`
` I
`
`LOCAL AAA IN VISITED
`CDMA 2000 NETWORK
`12
`
`XK t~
`
`z
`4
`.
`z
`m
`fa4
`
`5B
`
`

`

`US 7,280,505 B2
`Page 2
`
`U.S. PATENT DOCUMENTS
`
`1/2007 Shoaib et al. ........0.... 370/331
`7,161,914 B2
`2/2007 Shaheen et al.
`............ 370/338
`7,173,924 B2*
`1/2004 Janevski etal.
`. 370/331
`2004/0008645 Al*
`
`4/2004 Koodli et al... 370/329
`2004/0081122 Al
`6/2004 Jiang et al. ow. 370/328
`2004/0114553 Al*
`FOREIGN PATENT DOCUMENTS
`
`Malki et al (Low Latency Handoff in Mobile IPv4, Internet Draft,
`pp. 1-65, May 2001.*
`Pahlavan et al, Handoff in Hybrid Mobile Data Networks, IEEE,pp.
`34-47, 2000.*
`Tsao et al (Design and Evaluation of UMTS-WLANInterworking
`Strategies, IEEE, pp. 777-781, Sep. 2002).*
`Salberg, WLAN-GPRSInterworking, Graduate Thesis, pp. 1-50,
`May 2001.*
`34 Generation Partnership Project 2; “Wireless IP Network Stan-
`WoO WO-03/101025 A2=12/2003
`
`dard” (3G PP2 P.SO001-A,version 3.0), Jul. 2001.
`WO
`WO 2004/023249
`3/2004
`3" Generation Partnership Project 2; “Wireless IP Architecture
`Based on IETF Protocols” (3G PP2 P.ROOOI, version 1.0.0), Jul.
`2000.
`IETF Mobile IP Working Group; “Low Latency Handoffs in Mobile
`IPv4”, Jun. 2002.
`IETF Mobile IP Working Group; “Fast Handovers for Mobile
`IPv6”, Mar. 2003.
`IETF Seamoby Working Group; “Issues in Candidate Access Router
`Discovery for Seamless IP-level Handoffs”, Oct. 2002.
`Malki et al., “Low Latency Handoff in Mobile [Pv4”, Internet Draft,
`May 2001, pp. 1-65.
`Wuet al., “MIRAI Architecture for Heterogeneous Network,” IEEE
`Communications Magazine, Feb. 2002, vol. 40, No. 2, pp. 126-134.
`Watanabe et al., “Multimedia Integrated network by radio Access
`Innovation (MIRAI), A Combined WLAN and PHS Multi-service
`User Terminal,” 2002 IEICE General Conference B-5-15.
`
`Srikaya et al, Packet Mode in Wireless Network : Overview of
`Transition to Third Generation, IEEE, pp. 164-172, Sep. 2000.*
`3GPP2P.S0001, Wireless IP Network Standard, 3GPP2 Project, pp.
`1-52, 1999.*
`Karagiannis, Mobility Support for Ubiquitous Internet Access,
`ERICSSON,pp. 1-70, 2000.*
`Xu et al, Mobile IP Based Micro Mobility Management Protocol in
`The Third Generation Wireless Network, Internet Draft, pp. 1-16,
`Nov. 2000.*
`Choi et al, A Fast Handoff Scheme for Packet Data Service in the
`CDMA 2000 System, IEEE, pp. 1747-1753, 2001.*
`Parikh et al, Seamless Handoff of Mobile Terminal from WLAN to
`cdma2000 Network, download at http:/‘www.nokia.com/library/
`
`files/docs/Seamless__Handoff_of_Mobile_Terminal_ from
`WLAN_to__cdma2000_Network.pdf.*
`
`OTHER PUBLICATIONS
`
`* cited by examiner
`
`

`

`U.S. Patent
`
`Oct. 9, 2007
`
`Sheet 1 of 4
`
`US 7,280,505 B2
`
`INTERNET
`<+NN
`
`z
`
`("NOTG‘SNIVHOO
`
`JWOHNIWW
`
`
`
`MYOMLINYOLVYAdO
`
`GAISIANIWYTV901
`
`
`
`
`
`MYOMLIN0002YNGO
`
`
`
`cLOldVY0007—LAI
`
`MYOMLIN
`
`4SJOONVH'S
`
`LSls
`
`
`
`
`
`

`

`U.S. Patent
`
`Oct. 9, 2007
`
`Sheet 2 of 4
`
`US 7,280,505 B2
`
`
`nosKeXKoeNOLLVIOOSSY
`
`
`elOldve0007—LAlNVIM
`
`
`
`MYOMIGNYOLVYAdOINIOVYOLVaIdO
`3NOHNIWVJNOH9YIHLONY
`
`
`=AYOMLINSINIOdSSIOOV
`clGl
`
`JIOGNVH&
`—Zl
`
`aa8
`
`6
`
`ALIYNISS
`
`|
`
`VS
`
`vl
`
`

`

`U.S. Patent
`
`Oct. 9, 2007
`
`Sheet 3 of 4
`
`US 7,280,505 B2
`
`Vo?
`
`JJOONVH
`
` SUFI
`
`SNOIWNdSYO4TWLLNILOdNOLIWIS3SVa
`
`
`
`000ZVNGO
`
`JOVYSAOD
`
`02
`
`

`

`U.S. Patent
`
`Oct. 9, 2007
`
`Sheet 4 of 4
`
`US 7,280,505 B2
`
`LASVHd
`
`@ASVHd
`
`3JSNOdS3Y
`
`(139IL)
`
`p'LINYAINI
`
`me
`
`
`
`
`JONITIVHDVI-NN-IWN-NAWSNIVINOD)LS3NOIYNOLLVYLSIOIY
`
`
`(NOISN3LX3SNIGVY-NN-"LX4NOLWOLUNSHINYINW“LG
`
`SNIVINOO)IN3NGSUNGAGYuaLnoyAPWIYAKO1d
`
`
`
`(NOISN3LX3JONSTIVHOVJ-NNswine
`
`
`
`dn13Syauvad1V/ev/Ol¥YOS3YNdIOONdOOOZLNI|(LX4L
`
`YWFTONILaNOLLSNIVINOD)OV©P|eo
`
`
`
`JAXOLLGALdAYONA
`
`
`
`
`
`NSQduvNWNat\g“¢
`
`
`
`
`
`
`
`(LXGNODYauvaa)NOLWLIONOSYaLNOYjOSTyAXOdd
`
`vols
`
`
`
`
`
`MYOMLANSSIOOVOOOCYNGO
`
`
`
`
`

`

`US 7,280,505 B2
`
`1
`METHOD AND APPARATUS FOR
`PERFORMING INTER-TECHNOLOGY
`HANDOFF FROM WLAN TO CELLULAR
`NETWORK
`
`CLAIM OF PRIORITY TO PROVISIONAL
`PATENT APPLICATION
`
`This patent application claims priority under 35 U.S.C.
`119(e)
`from U.S. Provisional Patent Application No.:
`60/425,801, filed Nov. 13, 2002, incorporated by reference
`herein in its entirety.
`
`
`
`TECHNICAL FIELD
`
`This invention relates generally to wireless communica-
`tions systems and methods and, more specifically, relate to
`techniques for handing off a Mobile Node (MN) between
`wireless network providers that operate with different tech-
`nologies, such as wireless local area network (WLAN) and
`a cellular network.
`
`BACKGROUND
`
`Cellular wireless technologies, such as cdma2000 and
`Universal Mobile Telecommunication System (UMTS),are
`expected to provide high speed wireless Internet connectiv-
`ity to mobile users over a wide coverage area. At the same
`time, WLANtechnologies, such as IEEE 802.11 and Euro-
`pean HiperLAN,are becoming increasingly popular, as they
`provide a low cost and high speed wireless access solution
`for localized “hot spots”. According to one prediction
`regarding the future of mobile networking, wide area cel-
`lular networks and WLANswill complement each other to
`provide mobile users with ubiquitous high-speed wireless
`Internet connectivity. In such an environment the mobile
`users can be expected to experience a need to seamlessly
`switch between the WLAN and the cellular network, even
`during an ongoing Internet session.
`Mobile terminals, also referred to herein as mobile nodes,
`that combine different radio interfaces, such as cellular and
`WLAN,in one device will be available soon. Further, the
`developmentof mobility aware Internet protocols has picked
`up pacein recent years. These and other factors will combine
`and converge in the near future to provide enhanced mobile
`user features and connectivity. This will, however, require
`that the inter-technology handoff issues and problems be
`addressed and resolved., such as the inter-technology hand-
`off from a WLANto a cellular network. In particular, when
`the mobile node moves from WLANto cellular network
`coverageit has been found that the WLANsignal fades very
`fast. As a result, the time and signal margin available for
`execution of handoff or handover procedures is very small.
`The Internet Engineering Task Force (IETF) has devel-
`oped a Mobile IP protocol to enable IP-layer handoffs during
`an ongoing Internet session. To minimize disruption to the
`mobile node’s Internet connectivity during such handoffs,
`protocols such as Fast Handoff and Context Transfer are also
`under development. While these protocols provide the core
`framework for seamless inter-technology handoffs, addi-
`tional effort is required to apply them to specific environ-
`ments. Further, these protocols assume the existence of a
`“trusting” relationship between the source (e.g., WLAN)
`and destination (e.g., cdma2000) access networks, which is
`not alwaysthe case.
`
`10
`
`15
`
`20
`
`25
`
`30
`
`35
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`2
`SUMMARY OF THE PREFERRED
`EMBODIMENTS
`
`The foregoing and other problems are overcome, and
`other advantages are realized, in accordance with the pres-
`ently preferred embodiments of these teachings.
`This invention provides a method for inter-technology
`handoff of a mobile node from, in the preferred but not
`limiting environment, a WLANto a cellular network. The
`handoff procedure incorporates enhancements to basic IP-
`layer handoff techniques in the following areas: (i) rapid set
`up of access network bearers in the cellular access network;
`and (ii) a dynamic authentication and authorization with the
`cellular network at the time of handoff.
`
`The method advantageously requires no significant modi-
`fication to existing cellular network protocol architectures.
`Further,
`the method is compatible with IP-layer handoff
`techniques such as low-latency Mobile IPv4 and fast Mobile
`IPv6.
`
`A method, system and computer program are disclosed to
`perform a low latency inter-technology handoff of a MN
`from a WLANto a cellular network. The method includes
`transmitting a Bearer Context from the MN for use by the
`cellular network, the Bearer Context containing information
`required to establish access network bearers in the cellular
`network for an ongoing Internet session of the MN; and
`responding to the Bearer Context with a Router Advertise-
`mentthat is forwarded to the MN. The Bearer Context may
`be piggybacked on another message, or it may be sent as a
`separate message. The Bearer Context includes information
`expressive of: (a) a QoS requirement of an ongoing appli-
`cation or applications of the MN; (b) a uniqueidentity of the
`MN that is recognizable by the cellular network; (c) param-
`eters to facilitate the creation of a Point-to-Point Protocol
`state in the cellular network; and (d) parameters to enable
`establishment of packetfilters in the cellular network. The
`methodalso includes authenticating and authorizing with the
`target cellular network for the purpose of executing handoff.
`
`BRIEF DESCRIPTION OF THE DRAWINGS
`
`The foregoing and other aspects of these teachings are
`made moreevident in the following Detailed Description of
`the Preferred Embodiments, when read in conjunction with
`the attached Drawing Figures, wherein:
`FIG. 1 is a simplified block diagram of a first, most
`preferred, embodimentof a reference network architecture,
`and is illustrative of one suitable type of multi-technology
`wireless system architecture in which this invention can be
`deployed to advantage;
`FIG. 2 is a simplified block diagram of a second, less
`preferred, embodimentof a reference network architecture,
`and is illustrative of another suitable type of multi-technol-
`ogy wireless system architecture in which this invention can
`be deployed to advantage;
`FIG.3 illustrates a typical indoor WLAN environment
`that lies within the coverage area of a cellular network; and
`FIG. 4 is a message diagram showing MN, WLANand
`cellular network inter-technology handoff signal flow in
`accordance with an aspect of this invention.
`
`DETAILED DESCRIPTION OF THE
`PREFERRED EMBODIMENTS
`
`Those skilled in the art may appreciate that the following
`publications contain information related to this invention,
`and may be incorporated as necessary into this Patent
`
`

`

`US 7,280,505 B2
`
`3
`Application in whole or in part: IETF MobileIP Working
`Group (www.ietf.org): Low Latency Mobile IPv4 and Fast
`Mobile IPv6 specifications; IETF Seamoby Working Group
`(www.ictf.org): Context Transfer Framework specification;
`3GPP2 Specifications: “Wireless IP architecture based on
`IETF protocols” (3GPP2#P.R0001) and “Wireless IP Net-
`work Standard (3GPP2#P.S0001-A v3.0)”, www.3gpp2.org;
`3GPP2 Specification: “Access Network Interfaces Interop-
`erability
`Specification”, Revision A (G-IOSv4.1),
`3GPP2#A.S0001-A, www.3gpp2.org; 3GPP Specification:
`“QoS
`Concept
`and Architecture’,
`TS
`23.107,
`www.3gpp.org; and 3GPP Specification: “General Packet
`Radio
`Service:
`Service Description”,
`TS
`03.60,
`www.3gpp.org.
`FIG. 1 shows a reference network deployment embodi-
`ment, also referred to as an independent AAA (Authentica-
`tion, Authorization, Accounting) embodiment. For the pur-
`poseof illustration, and not by wayoflimitation, in FIG. 1
`the cdma2000 specification is used as a representative
`cellular network 2 architecture. In the architecture of FIG.1,
`the WLAN 1 access and cdma2000 network 2 access are
`
`10
`
`15
`
`20
`
`4
`it should be noted that the handoff method of this
`ever,
`invention can be adapted for use as well
`in the shared
`deployment model of FIG. 2.
`Referring again to FIG. 1, consider a handoff from the
`WLAN network 1 to the cdma2000 network 2. In this
`environment, assumethat the mobile user initiates an Inter-
`net 4 session, such as a voice over IP (VoIP) call or a
`multimedia conferencing call, from the WLAN1, andlater
`moves away from the WLANhotspot coverage area. Before
`attempting an inter-technology handoff from the WLAN1 to
`the wide area cdma2000 network 2, the MN 3 should first
`perform authentication and authorization procedures with
`the cdma2000 network 2. Note that the home agent 6 for MN
`3 mayreside in the same realm as that of the WLAN 1 (e.g.,
`in the enterprise case), or in the same realm as that of the
`homeoperator network 2, or in a completely different realm
`(e.g., in the bookstore or free access case).
`In addition, a numberof procedures, including those for
`IP access and quality of service (QoS) setup, should be
`performed before the MN 3 can exchange IP packets with
`the Internet 4 via the cdma2000 access network 2. These
`
`include procedures for setting up a PPP (Point to Point
`Protocol) connection with the PDSN 12, Mobile IP proce-
`dures, and procedures for setting up access network bearers
`with appropriate QoS characteristics in the cdma2000 net-
`work 2.
`
`The latency in performing these procedures should be
`minimized to avoid a service disruption at
`the time of
`handoff from the WLAN1 to the cdma2000 network 2, such
`as a handoff that occurs during an ongoing session, such as
`a VoIP session, or a multimedia streaming session, or a
`gaming session. This invention provides a technique to
`efficiently and quickly perform an inter-technology handoff
`that avoids the problems inherent in the priorart.
`In general, the performance of the handoff can be con-
`siderably improvedif at least some of the handoff messaging
`is performed proactively, i.e., while the MN3 still sees a
`strong signal from the WLAN Access Point 9. These pro-
`actively performed steps may include, for example, fast
`handoff signaling, authenticating with the cellular network
`2, and informing the cellular network 2 about QoS and other
`requirements of current MN 3 application(s). Then, as soon
`as the WLAN signal strength diminishes,
`the MN 3 is
`enabled to send a final trigger to the cellular network 2 to
`complete the handoff process (i.e., to actually commit the
`radio resources, arrange for packet rerouting, and perform
`any other necessary procedures to complete the handoff).
`It should be noted that it
`is generally not possible to
`FIG. 2 shows another network deployment embodiment,
`reliably perform this task based on MN3signal strength
`50
`referred to as a shared AAA architecture. Here, a trusted
`measurements alone. For example, if the proactive handoff
`relationship is assumed to exist between the WLAN 1 and
`procedures are initiated after the WLAN signal strength
`the cdma2000 network 2. Note in this embodiment
`the
`begins to decline noticeably, the MN 3 Internet connectivity
`overlapping domains 5A and 5B. This embodiment may
`may be disrupted before these steps are completed. On the
`exist, for example, if WLAN hotspot access is operated by
`other hand, if the handoff proceduresare initiated too early
`the cdma2000operator. Alternatively, a roaming agreement
`(when the WLANsignalis still strong), it may result in large
`may exist between the WLAN1 operator and the cdma2000
`numberoffalse starts. In other words, the mobile user may
`network 2 operator. Thus, at the time of inter-technology
`actually never leave the coverage area of the WLAN1, even
`handoff,
`the authentication and authorization performed
`though the proactive handoff steps have begun. This may
`with the WLAN1 can be reused for the cdma2000 2 access
`create an unnecessary signaling burden on the cellular
`network 2.
`as well. Further, a security association 5C may exist between
`the AR 8 in the WLAN1 and the PDSN 12 in the cdma2000
`Reference is made to FIG. 3 for showing an exemplary
`WLAN/cellular network environment, such as may be
`encountered within a hotel or other type of building. In FIG.
`3 is can be seen that a cellular network (e.g., a cdma2000
`network) base station coverage area (footprint) 20 encom-
`passesa structure 22 containing a plurality of WLAN access
`point (AP) coverage areas (footprints) 24.
`
`independently managed, and no peering relationship (such
`as common ownership or roaming agreement) is assumed to
`exit between them. A non-limiting example of this type of
`arrangement is a WLANhotspot in a bookstore that charges
`access fees to a user readership account. Another example
`would be an enterprise WLAN, which only employeesof the
`enterprise are authorized to access(i.e., there are no access
`fees for the employees). Or, in some cases, WLANaccess at
`a hot spot could be free of charge, and hence, no localAAA
`functionality is required at the WLAN. This could be the
`case for a WLAN hot spot
`in, as an example, a small
`restaurant. On the other hand, cdma2000 cellular access
`would typically always be charged to a user’s subscription
`account with the (home) cellular operator.
`In the illustrated example there are a plurality of domains
`5 in each of the WLAN1 andthe cdma2000 network 2. For
`
`example, the WLAN 1 includes a home agent domain 6, and
`a WLAN AAA function 7 connected via an access router
`(AR) 8 to WLAN Access Points 9. The cdma2000 network
`2 can include an AAA function 10 located in the Home
`Operator Network, as well as a local AAA function 11 in a
`Visited cdma2000 network, connected via a PDSN (Packet
`Data Support Node) 12 to an IMT-2000 Radio Network 13.
`The MN 3 is assumed to handoff from the WLAN1 to the
`cdma2000 network 2 via the WLAN Access Points 9 and the
`IMT-2000 Radio Network 13.
`
`network 2. For completeness, there is shown outside of the
`trusted WLAN/cellular network arrangement another opera-
`tor 14 having an access router 15 connected to the WLAN
`Access Points 9.
`
`Of most interest to the teachings of this invention is the
`independent network architecture shown in FIG. 1. How-
`
`30
`
`35
`
`40
`
`45
`
`55
`
`60
`
`65
`
`

`

`US 7,280,505 B2
`
`10
`
`6
`5
`First described is a handoff procedure that is adapted to
`In addition to providing an inter-technology handoff tech-
`Low Latency Mobile IPv4 (ETF MobileIP Working Group:
`nique that can be cleanly partitioned into proactive and
`reactive steps, this invention provides a method to anticipate
`“Low latency Mobile IPv4 and Fast Mobile IPv6 specifica-
`the need for a handoff from the WLAN1to the cellular
`tions”, www.ietf.org) in a “pre-registration” mode. This
`modeis useful, as Mobile IPv4 has been incorporated in the
`cdma2000 specifications. The corresponding signaling
`schemeis shownin FIG. 4. The adaptation of the invention
`to Fast Mobile IPvé6 (in the “anticipated handoff’ mode) is
`conceptually similar, and a description for this embodiment
`is also provided below.
`Referring now also to FIG.4, after the MN 3 determines
`to initiate an inter-technology handoff from the WLAN 1 to
`the cdma2000 network 2 (based on whatever suitable param-
`eter(s) are employed, such as signal strength and/or signal
`quality and/or the use of borderbits), it sends, by a wireless
`connection, a Proxy Router Solicitation (ProxyRtSol) to an
`AR 8, which in turn sends, via the Internet 4, a Router
`Solicitation to the PDSN 12. In addition, the MN 3 arranges
`to transfer what is referred to herein as a “Bearer Context”
`
`network 2, with sufficient time for the execution of proactive
`handoff steps. In this regard handoff trigger mechanismsare
`desired for initiating Phase 1 and Phase 2 aspects of the
`handoff technique (the Phase 1 and Phase 2 operations are
`described in detail below).
`A signal strength criterion, among others, can be used to
`generate handoff triggers, and the signal strength criterion
`may be employed to generate the ultimate handoff trigger.
`However, in the context of WLAN to cdma2000 handoff,
`this approach provides an opportunity for generating spuri-
`ous handoff triggers. To further explain, consider the handoff
`scenario depicted in FIG. 3, which shows the WLAN
`footprint in a hot spot, which in this case is the indoor
`environment such as a hotel (structure 22). The areas 24A
`and 24B indicate strong signal footprints of different WLAN
`message to the PDSN 12 via the AR 8. The Bearer Context
`APs located at the hot spot. Note that the WLAN 1 geo-
`message contains parameters for use in establishing access
`graphical coverage area is subsumed in cdma2000 network
`network bearers in the cdma2000 network 2 for the ongoing
`2 geographical coverage area, as typically is the case.
`Assume that a mobile user having a multi-radio (e.g.,
`Internet session(s) of the MN 3. The Bearer Context mes-
`
`dual-mode WLAN and cdma2000) MN3initiates an Inter- sage can be sent from the MN 3 to the AR 8 piggybacked on
`25
`net session over the WLANaccess, and then walks along the
`the ProxyRtSol, or piggybacked on another message,orit
`path 26. Along the path 26, whenthe userarrives at locations
`can be sent as a separate message. From the AR 8 to the
`where WLANsignal strength drops due to local factors such
`PDSN 12 the Bearer Context message can be piggybacked
`as metal objects, walls, etc., the MN 3 detects a drop in
`on a Router Solicitation message, or it can be sent in a
`WLANsignal strength, but still detects a strong cellular
`separate message. The Bearer Context message includes at
`signal. In these cases the MN 3 would attempt to initiate a
`least one or more of the following, or similar or equivalent
`handoff from the WLAN 1 to the cellular network 2.
`information:
`
`20
`
`30
`
`35
`
`40
`
`45
`
`However, seconds or moments later the MN 3 again detects
`the QoS requirement of the MN’s ongoing application(s),
`such as one or more of the desired bandwidth, reliabil-
`
`a strong signal from the WLAN1and, hence, initiates
`handoff back to the WLAN network 1. Such a ping-pong
`ity and latency characteristics,
`effect
`is undesirable as it causes unnecessary signaling
`the MSID: Mobile Station Identity recognizable by the
`traffic, as well as possibly causing more disruption to the
`cdma2000 network 2, e.g.,
`the IMSI (International
`user’s service than what would have been caused due to a
`Mobile Subscriber Identity) of the MN 3,
`momentary lack of the WLANsignal. Of course, the MN 3
`LCP (Link Control Protocol) configuration parameters
`could wait for a short time after the loss of the WLANsignal
`such as MRU (Maximum Receive Unit), ACCM
`before initiating handoff to the cellular network 2. However,
`(Asyne Character Control Map) and a link quality
`this approach degrades the (latency) performance of the
`monitoring protocol to be used,to facilitate the creation
`of PPP state in the PDSN 12,
`handoff when the user actually exits from the structure 22
`through the door 22A and, hence, actually loses connectivity
`TFT (Traffic Flow Templates) to enable establishment of
`to the WLAN network 1.
`packet filters in the PDSN 12, and any other desired
`strength criterion may be
`As
`such, while a signal
`service parameters, such as a requested security level.
`employed to initiate the inter-technology handoff, and to
`The foregoing parameters that comprise the Bearer Con-
`generate the final WI,AN/cellular network handoff, those
`text message are not to be read in a limiting sense. For
`skilled in the art should realize that other considerations and
`example, it is also within the scope of this invention to also
`criteria, such as packet error rate and/or the number of
`provide, or to provide in lieu of one of the foregoing
`requests for retransmission generated per unit of time, as
`parameters, other parameters that request resources from the
`well as other signal quality-related parameters, may be
`cellular network 2, such as a location tracking service and/or
`employed instead of, or in conjunction with, the use of the
`a transcoding service for use in certain packet sessions.
`signal strength received at the MN 3.
`The PDSN 12 responds to the Bearer Context message
`Another technique that is more presently preferred for
`with a Router Advertisement message that is forwarded to
`performing proactive handoff control relies on the use of
`the MN 3 via the Internet 4 and the AR 8 (as a Proxy Router
`“border bits”, i.e., information provided by border access
`Advertisement or ProxyRtAdv). The ProxyRtAdv contains,
`nodes that provide geographical coverage or region infor-
`among other items, a challenge (e.g., a Mobile Node-
`mation for use by a mobile nodein controlling the initiation
`Foreign Agent (MN-FA) challenge extension) for authenti-
`of a handoff from one technology network to another tech-
`cation and authorization purposes.
`nology network. Reference in this regard can be made to
`The MN 3 responds by sending a Registration Request
`U.S. Provisional Patent Application No.: 60/426,385,
`(RegReq) message to the PDSN 12 via the AR 8 (shown as
`entitled “Smart Inter-Technology Handover Control”, by H.
`step 2 in FIG. 4). This message contains, among other items,
`Chaskar et al.,
`incorporated by reference herein in its
`the MN 3 network address identifier (MN-NAJ) that iden-
`tifies the home AAA 10 of the MN 3, authentication data to
`entirety.
`Described now is a handoff procedure, with specific
`be used for registering with the HA 6, and the response
`reference to the cdma2000 network 2 architecture,
`that
`(MN-Radius extension) calculated over the MN-FA chal-
`operates in accordance with this invention.
`lenge received in the ProxyRtAdvfor the purpose of authen-
`
`50
`
`55
`
`60
`
`65
`
`

`

`US 7,280,505 B2
`
`7
`tication and service authorization with the cdma2000 net-
`work 2. It should be noted that the Bearer Context message
`can be piggybacked on this message as well, if it is not sent
`earlier.
`
`Upon the receipt of the Registration Request, the PDSN
`12 uses the NAI extension to determine the home AAA
`domain of the MN 3, and issues a query to the identified
`home AAA 10 of the MN 3. In the preferred embodimentthe
`PDSN 12 actually queries the local (visited) AAA 11 in the
`cdma2000 access network 2. The visited AAA 11 then
`
`8
`12 and AR 8). The MN 3 may then use this key to
`authenticate or encrypt future message transactions with the
`PDSN12 (e.g., ACK).
`Now described is a technique to adapt the foregoing
`handoff embodiments to the Fast Mobile IPv6 environment
`
`(ETF MobileIP Working Group: “low latency Mobile IPv4
`and Fast Mobile IPv6 specifications”, www.ietf.org). In this
`approach communication between the AR 8 and the PDSN
`12 in step 1 of FIG. 4 is performed via a HI/HACK
`(Handover Initiate/Handover ACK) message exchange, and
`in this embodimentit is desirable to piggyback the Bearer
`forwards the query to the home AAA 10 of the MN 3,
`Context message and the MN-FA challenge on the HI and
`possibly via one or more intermediate broker AAAs. The
`the HACK messages, respectively. In this case a new mes-
`PDSN 12 supplies the home AAA 10 with the challenge
`sage may be used to implement step 2, wherein the MN 3
`issued by the PDSN 12 in the MN-FAchallenge extension,
`sends responses for authenticating and authorizing with the
`and the reply of the MN 3 to it obtained in the MN-Radius
`cdma2000 network 2. Such a message is not specified as yet
`extension. The PDSN 12 also provides the home AAA 10
`in the Fast Mobile IPv6 protocol, as the design of this
`with the description of the access service (e.g., the QoS)
`protocol assumes a solid security association between the
`requested by the MN 3. Upon a successful authentication
`AR 8 and the PDSN 12. In step 4, another new message may
`and service authorization, the home AAA 10 sends to the
`be used to send the ticket to the MN 3, while the ACKin step
`PDSN 12 (this response would typically follow the same
`5 can be sent to the AR 8 using a F-BU (Fast Binding
`path asthatof the query, but in a reverse direction) a success
`Update) message with the ticket piggybacked on it. Another
`indication authorizing the access by the MN 3. The home
`new message can be used the AR 8 to sendthe indication to
`AAA 10 also sends a “ticket” to the PDSN 12 in clear text,
`the PDSN 12 tostart step 6. In step 6, the PDSN 12 does not
`as well as in encrypted form. Theticket is encrypted using
`the shared secret between the home AAA 10 and the MN 3.
`perform registration with the HA 6. Further, a temporary
`tunnel is preferably established between the AR 8 and the
`These procedures are shown as step 3 in FIG.4.
`PDSN 12 until the MN 3 performs a binding update.
`As shown in step 4, the PDSN 12 stores the ticket in a
`While described above in the context of certain presently
`clear text form and sends the encrypted copy to the MN 3 via
`preferred embodiments, it should be realized that the prac-
`the AR. The PDSN 12 also sends in this message any
`tice of this invention is not limited to only these embodi-
`configuration parameters for the MN 3. At this point one
`ments. For example, the Bearer Context can be sent by the
`may consider that a first phase (Phase 1) of the inter-
`MN 3 in context transfer signaling. Further by example, and
`technology handoff process is completed.
`as was mentioned above, other service specification param-
`The second phase (Phase 2) of the inter-technology hand-
`eters, in addition to those mentioned above, may be included
`off process is initiated when the MN3sends an acknowl-
`in the Bearer Context message, such as location tracking
`edgment (ACK) to the PDSN 12 via the AR 8, and includes
`services and transcoding services for certain packet sessions.
`the ticket in clear text form with the ACK(step 5 of FIG.4),
`Further by example, the Bearer Context message can be
`thereby proving to the PDSN 12 that
`the ACK indeed
`encrypted using the shared secret between the MN 3 andthe
`originated from the MN 3. This is a security measure thatis
`home AAA 10. This maybe useful to prevent compromising
`useful
`to avoid denial of service (DOS) attacks where
`privacyover the AR 8 to PDSN 12 path. When the PDSN 12
`malicious nodes spoof the ACK, causing the burden offalse
`receives the encrypted Bearer Context, it passes it on to the
`bearer set up on the cdma2000 network 2.
`home AAA 10 in a query. The home AAA10 deciphers the
`Tt should be noted that there can be a time delay between
`encrypted Bearer Context and sendsit to the PDSN 12 ina
`the completion of Phase 1 and the start of Phase 2. This
`response.
`would occur if the MN 3 begins Phase 1 while the WLAN
`Also, it should be appreciated that this invention encom-
`signal
`is still quite strong (but fading)
`in the hope of
`passes computer program code embodiedonor in a tangible
`completing Phase 1 before losing connectivity with the
`medium for directing one or more data processors to imple-
`Internet 4. Phase 2 would typically begin when the MN3is
`ment the various steps of the methods discussed above.
`about to leave the WLAN coverage area 24. After sending
`These data process

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket