throbber
1111111111111111 IIIIII IIIII 11111 1111111111 11111 lllll lllll lllll lllll 111111111111111 11111111
`US 20040085951Al
`
`(19) United States
`(12) Patent Application Publication
`Rezaiifar et al.
`
`(10) Pub. No.: US 2004/0085951 Al
`May 6, 2004
`(43) Pub. Date:
`
`(54) METHOD AND APPARATUS FOR THE USE
`OF MICRO-TUNNELS IN A
`COMMUNICATIONS SYSTEM
`
`(76)
`
`Inventors: Ramin Rezaiifar, San Diego, CA (US);
`Nikolai K.N. Leung, Takoma Park, MD
`(US); Paul E. Bender, San Diego, CA
`(US); Rajesh K. Pankaj, San Diego,
`CA(US)
`
`Correspondence Address:
`Qualcomm Incorporated
`Patents Department
`5775 Morehouse Drive
`San Diego, CA 92121-1714 (US)
`
`(21)
`
`Appl. No.:
`
`10/686,442
`
`(22)
`
`Filed:
`
`Oct. 14, 2003
`
`Related U.S. Application Data
`
`(60) Provisional application No. 60/418,815, filed on Oct.
`15, 2002.
`
`Publication Classification
`
`Int. Cl.7 ..................................................... H04L 12/66
`(51)
`(52) U.S. Cl. .............................................................. 370/352
`
`(57)
`
`ABSTRACT
`
`Micro-tunnels are used to provide multiple data service
`sessions to the same mobile node in a wireless communi(cid:173)
`cations system. Further, the flexibility of the micro-tunnels
`optimizes the resources of the system. On request for a data
`service, an encapsulation configuration record is generated.
`An encapsulation header is created in response to the
`encapsulation configuration. The encapsulation header
`includes a packet service identifier and a micro-tunnel
`identifier.
`
`100 ~
`
`PDSN
`
`102
`
`) C =)
`
`MN2
`
`(
`
`120 ~
`
`PCF/BSC
`
`104
`
`MSC
`114
`
`I
`
`~
`~
`
`\
`
`~
`~
`
`Microsoft
`Ex. 1006 - Page 1
`
`

`

`Patent Application Publication May 6, 2004 Sheet 1 of 3
`
`US 2004/0085951 Al
`
`Ovl
`
`en ,...
`~ ,...
`
`'
`
`(_)
`en
`ID
`u::
`(_)
`a..
`
`~I
`
`N z
`~
`
`n
`u
`
`r----.
`
`'-J
`
`z
`~
`
`r
`
`0
`,...
`C\J
`
`,... .
`C, -u.
`
`z
`en
`0
`a..
`
`~I
`
`r
`
`0
`
`0 ....
`
`Microsoft
`Ex. 1006 - Page 2
`
`

`

`Patent Application Publication May 6, 2004 Sheet 2 of 3
`
`US 2004/0085951 Al
`
`I-
`LU
`:::ii:::
`(.)
`
`<t: a..
`0
`<t:
`0
`
`....J >-<t: a..
`
`a:
`LU
`0
`<t:
`LU
`I
`LU a:
`
`(!)
`
`a:
`LU
`0
`<t:
`LU
`I
`
`>-a:
`LU >
`:J
`LU
`0
`
`(
`
`0
`0
`C\I
`
`~I
`
`~I
`
`~I
`
`C\I
`•
`C,
`
`-LL
`
`>-LU
`LU a:
`
`:::ii:::
`
`(!)
`
`gl
`
`0
`I-
`~
`
`gl
`
`C")
`•
`
`C, -LL
`
`gl
`
`CJ) a..
`
`w >-
`_J a:
`cc <t: (0
`<t: 0 0
`a:Z C")
`<t: :::> >g
`
`Microsoft
`Ex. 1006 - Page 3
`
`

`

`Patent Application Publication May 6, 2004 Sheet 3 of 3
`
`US 2004/0085951 Al
`
`Q)
`
`~ a.
`(J)
`,._
`Q)
`I+=
`:;::;
`C
`Q)
`"C
`
`--
`
`0
`
`z
`~
`
`C\I
`
`z
`~
`
`z
`~
`
`C\I
`
`z
`:E
`
`.
`(!J -LL
`
`----
`
`T""
`I
`
`~
`(\J
`
`Microsoft
`Ex. 1006 - Page 4
`
`

`

`US 2004/0085951 Al
`
`May 6, 2004
`
`1
`
`METHOD AND APPARATUS FOR THE USE OF
`MICRO-TUNNELS IN A COMMUNICATIONS
`SYSTEM
`[0001] The present Application for Patent claims priority
`to Provisional Application No. 60/418,815, entitled, "Micro(cid:173)
`Tunnels," filed Oct. 15, 2002, and assigned to the assignee
`hereof and hereby expressly incorporated by reference
`herein.
`
`routing until it arrives at the care-of address. Such encap(cid:173)
`sulation is also called tunneling, which suggests the packet
`burrows through the Internet, bypassing the usual effects of
`IP routing.
`[0010]
`In a mobile IP environment, there is a need to
`identify multiple tunnels each associated with a same mobile
`node. Further, there is a need for flexible tunnel set up which
`optimizes the resources of the system.
`
`BACKGROUND
`
`BRIEF DESCRIPTION OF THE DRAWINGS
`
`[0002] 1. Field
`[0003] The present invention relates generally to data
`packet transmission and specifically to the use of micro(cid:173)
`tunnels.
`[0004] 2. Background
`[0005]
`Internet Protocol (IP) "tunnels" have become a
`widespread mechanism to transport data units, referred to as
`datagrams, over the Internet. Using Tunneling involves
`incorporating an original IP packet inside of another IP
`packet. Tunneling also has additional connotations about
`changing the effects of Internet routing on the original IP
`packet.
`[0006] Typically, a tunnel is used to augment and modify
`the behavior of the deployed routing architecture, such as in
`multicast routing, mobile IP, and Virtual Private Network
`(VPN). From the perspective of traditional best-effort IP
`packet delivery, a tunnel behaves as any other link. Packets
`enter one end of the tunnel, and are delivered to the other end
`unless resource overload or error causes them to be lost.
`[0007]
`Information may be encapsulated and routed
`through a tunnel. In the most general case, a system has a
`packet, which is referred to as a payload packet, which needs
`to be encapsulated and routed. The payload packet is first
`encapsulated in a Generic Routing Encapsulation (GRE)
`packet, which possibly also includes a routing. The resulting
`GRE packet may then be encapsulated in some other pro(cid:173)
`tocol and then forwarded. This outer protocol is referred to
`as the delivery protocol.
`[0008] For mobile IP, a wireless system interfaces with an
`IP network. Tunnels are used for transporting data from the
`IP network to infrastructure elements in the wireless system.
`The data may involve multiple streams of data for transmis(cid:173)
`sion to and/or from a same mobile node. In this case, the
`system must establish individual tunnels for each stream.
`[0009]
`In mobile IP the home agent associated with the
`mobile node redirects packets from the home network to the
`care-of address by constructing a new IP header containing
`the mobile node's care-of address as the destination IP
`address. The home agent is a router on a mobile node's home
`network maintaining information about the device's current
`location, as identified in its care-of address. The care-of
`address is a temporary IP address for a mobile node enabling
`message delivery when the device is connecting from some(cid:173)
`where other than its home network. The care-of address
`identifies a mobile node's current point of attachment to the
`Internet and makes it possible to connect from a different
`location without changing the device's home address (per(cid:173)
`manent IP address). The new header then shields or encap(cid:173)
`sulates the original packet, causing the mobile node's home
`address to have no effect on the encapsulated packet's
`
`[0011] FIG. 1 is a wireless communication system sup(cid:173)
`porting mobile IP.
`[0012] FIG. 2 is a Generic Routing Encapsulation (GRE)
`format.
`[0013] FIG. 3 is a GRE key format.
`[0014] FIG. 4 is an illustration of the GRE key space.
`
`DETAILED DESCRIPTION
`
`[0015] The field of wireless communications has many
`applications including, e.g., cordless telephones, paging,
`wireless local loops, Personal Digital Assistants (PDAs),
`Internet telephony, and satellite communication systems. A
`particularly important application is cellular telephone sys(cid:173)
`tems for mobile subscribers. As used herein, the term
`"cellular" system encompasses both cellular and Personal
`Communication Services (PCS) frequencies. Various over(cid:173)
`the-air interfaces have been developed for such cellular
`telephone systems including, e.g., Frequency Division Mul(cid:173)
`tiple Access (FDMA), Time Division Multiple Access
`(TDMA), and Code Division Multiple Access (CDMA). In
`connection therewith, various domestic and international
`standards have been established including, e.g., Advanced
`Mobile Phone Service (AMPS), Global System for Mobile
`(GSM), and Interim Standard 95 (IS-95). IS-95 and its
`derivatives, IS-95A, IS-95B, ANSI J-STD-008 (often
`referred to collectively herein as IS-95), and proposed
`high-data-rate systems are promulgated by the Telecommu(cid:173)
`nication Industry Association (TIA) and other well known
`standards bodies.
`[0016] Cellular telephone systems configured in accor(cid:173)
`dance with the use of the IS-95 standard employ CDMA
`signal processing techniques to provide highly efficient and
`robust cellular telephone service. An exemplary system
`utilizing CDMA techniques is the cdma2000 ITU-R Radio
`Transmission Technology (RTT) Candidate Submission
`(referred to herein as cdma2000), issued by the TIA The
`standard for cdma2000 is given in the draft versions of
`IS-2000 and has been approved by the TIA and 3GPP2.
`[0017] Another CDMA standard is the W-CDMA stan(cid:173)
`dard, as embodied in 3'd Generation Partnership Project
`"3GPP," Document Nos. 3G TS 25.211, 3G TS 25.212, 3G
`TS 25.213, and 3G TS 25.214.
`[0018] A cellular communication system supporting
`mobile IP is illustrated in FIG. 1.
`[0019] System 100 supports communications of packets of
`data, wherein a packet is a logical grouping of information
`including a header containing control information and user
`data. Packets most often are used to refer to network layer
`units of data. Note the terms datagram, frame, message, and
`
`Microsoft
`Ex. 1006 - Page 5
`
`

`

`US 2004/0085951 Al
`
`May 6, 2004
`
`2
`
`segment also are used to describe logical information group(cid:173)
`ings at various layers of the Open Systems Interconnection
`(OSI) reference model.
`
`In the system 100, a Packet Data Service Node
`[0020]
`(PDSN) 102 interfaces between the wireless communication
`system and an IP network. In the mobile IP environment, the
`PDSN may also be referred to as a Foreign Agent (FA). The
`Home Agent (HA) is the node in the home network of the
`mobile node effectively causing the mobile node to be
`reachable at a home address even when the mobile node is
`not attached to the home network.
`
`[0021] Continuing with FIG. 1, the PDSN 102 commu(cid:173)
`nicates with the various Mobile Nodes (MNs) via a Packet
`Control Function/Base Station Controller (PCF/BSC) 104.
`
`[0022] Note the PCF and BSC may reside in separate
`infrastructure elements or may be combined in one element
`as illustrated in FIG. 1. The PDSN 102 provides commu(cid:173)
`nications for MN 108, 110 via the PCF/BSC 104. A Mobile
`Switching Center (MSC) is also in communication with
`PCF/BSC 104.
`
`[0023] For a typical packet data communication, the PCF/
`BSC 104 sends an All-Registration Request message to the
`PDSN 102 to establish an Al0/11 interface between itself
`and the PDSN. The various interfaces refer to the commu(cid:173)
`nication links or sessions between the infrastructure ele(cid:173)
`ments. The All interface is generally identified as the link
`between the PDSN 102 and the PCF/BSC 104.
`
`[0024] The PCF/BSC 104 binds the mobile station iden(cid:173)
`tifier, e.g. a Mobile Identification Number (MIN) such as an
`International Mobile Subscriber Identity (IMSI), to a Packet
`Session Identifier (PSI) unique within the PCF/BSC 104.
`The IMSI is a number used to uniquely identify personal
`mobile stations (i.e., mobile nodes). In some cases, ambi(cid:173)
`guity might arise when using only the 10-digit MIN. In one
`system, the first three (most significant) decimal numbers of
`the IMSI are the Mobile Country Code (MCC); the remain(cid:173)
`ing digits are the National Mobile Station Identity (NMSI).
`
`[0025] For each data communication to MN 108 or MN
`110, the PCF/BSC 104 establishes a separate link. When the
`PCF/BSC 104 establishes the link, the PCF/BSC 104
`includes the PSI in the All-Registration-Request message
`that is sent to the PDSN. In this way, a communication
`intended for a given MN, such as MN 108 or MN 110, is
`processed via the designated link. As the number of data
`services increases, a MN may desire to have multiple data
`communications concurrently. In this case, the PCF/BSC
`104 seeks to establish a link for each communication.
`
`[0026] As described herein "micro-tunnels" are logical
`connections between the PDSN 102 and the PCF/BSC 104
`that are identified by a source IP address and a destination
`IP address. For example, the source IP address may be
`identified as "src _ip _ address," and the destination IP address
`may be identified as "dest_ip_address." A micro-tunnel is
`then designated by the following:
`
`[0027] <src _ip _ address=PDSN _IP, dest_ip _ address=
`PCF_IP, GRE_key>.
`
`In this context, the source refers to the PDSN 102,
`[0028]
`the destination refers to the PCF/BSC 104. Note, micro(cid:173)
`tunnels are independent of the air-interface service instances
`
`(i.e., no one-to-one mapping is assumed between the micro(cid:173)
`tunnels and the air-interface service instances).
`
`[0029] Each micro-tunnel is assigned a separate commu(cid:173)
`nication for a given MN. As illustrated in FIG. 1, multiple
`micro-tunnels may be established for one MN. In the
`example of FIG. 1, three micro-tunnels are established for
`three separate communications to MN 108, while two
`micro-tunnels are established for two separate communica(cid:173)
`tions to MN 110. However, a single communication may
`utilize one or more micro-tunnels. The micro-tunnels are
`established when the PCF/BSC 104 sends a message to the
`PDSN 102. Specifically, the message is an All-Registration(cid:173)
`Request.
`
`[0030] Once a micro-tunnel is established, a communica(cid:173)
`tion may be transmitted via the established micro-tunnel.
`There is not necessarily a one-to-one mapping between the
`air-interface service instances and micro-tunnels.
`
`[0031] The micro-tunnel serves the following purposes:
`
`[0032]
`
`Identify the PPP context;
`
`[0033]
`
`Identify the IP context; and
`
`[0034] Differentiate services.
`
`[0035] The following discussion details each of these
`micro-tunnel functions.
`
`[0036] PPP Context:
`
`[0037] The micro-tunnels are used by the PDSN 102 to
`indicate to the Radio Access Network (RAN) 120 whether
`the data packets carried by the micro-tunnel may be dropped
`or not. In lieu of such indication, the RAN 120 may decide
`to drop packets if they get too stale. For example, if stateful
`compression or encryption is used, dropping packets in the
`RAN 120 may cause problems for de-compression. State is
`a collection of information maintained by an entity. Stateful
`encryption or compression means the encryptor/decryptor or
`the compressor/decompressor maintains state information.
`Dropped packets therefore will impact the compressor/
`decompressor processes. In such a case, the PDSN 102
`selects a "do not drop" attribute for the micro-tunnel.
`
`[0038] The micro-tunnels are further used by the PDSN
`102 to indicate those packets transported via a given micro(cid:173)
`tunnel are to be treated differently from the other packets
`transported via another micro-tunnel. For example, the
`PDSN 102 may indicate packets carried by a first micro(cid:173)
`tunnel have a particular header compression, such as zero(cid:173)
`byte-header compression. The PCF/BSC 104 then interprets
`this information and uses a Radio Link Protocol (RLP)-free
`service instance to carry these packets.
`
`[0039]
`
`IP Context:
`
`[0040] Using micro-tunnels the PDSN 102 indicates to the
`RAN 120 that re-ordering of data packets is allowed across
`micro-tunnels but not within
`the micro-tunnels. This
`approach is consistent with recommendations in section 4.1
`of "Differentiated Services and Tunnels" by D. Black,
`published October 2000, and identified as RFC 2983 by the
`Internet Engineering Task Force (IETF). In some situations,
`it may be desirable to enable reordering among packets in
`different micro-tunnels to coexist with an absence of packet
`reordering within each individual micro-tunnel.
`
`Microsoft
`Ex. 1006 - Page 6
`
`

`

`US 2004/0085951 Al
`
`May 6, 2004
`
`3
`
`[0041]
`In a first scenario, a node supporting various qual(cid:173)
`ity of service requirements and discriminate among packets,
`such as a Differentiated Services (DS) node, is instructed not
`to re-order packets belonging to the same micro-flow and the
`same quality of service requirements, such as an Assured
`Forwarding (AF) class. Note, DS and AF classes are defined
`in: (1) "Assured Forwarding PHB Group" by J. Heinanen et
`al., published June 1999 and identified as RFC 2597; (2)
`"Definition of the Differentiated Services Field (DS Field) in
`the IPv4 and IPv6 Headers" by K. Nichols, published
`December 1998, and identified as RFC 2474; and (3) "An
`Architecture for Differentiated Services" by S. Blake, pub(cid:173)
`lished December 1998, and identified as RFC 2475. Each of
`the RFC documents referenced herein is provided by the
`Network Working Group of the Internet Engineering Task
`Force (IETF).
`[0042] Differentiated Services (DS) are intended to pro(cid:173)
`vide a framework and building blocks to enable deployment
`of scalable service discrimination in the Internet. The dif(cid:173)
`ferentiated services approach aims to speed deployment by
`separating the architecture into two major components, one
`of which is fairly well-understood and the other of which is
`just beginning to be understood. Packet forwarding is a task
`which is performed on a per-packet basis as quickly as
`possible. Forwarding uses the packet header to find an entry
`in a routing table specifying the packet's output interface.
`Routing sets the entries in the table and may need to reflect
`a range of transit and other policies as well as to keep track
`of route failures. Routing tables are maintained as a back(cid:173)
`ground process to the forwarding task. A Differentiated
`Services Domain is a contiguous portion of the Internet over
`which a consistent set of differentiated services policies are
`administered in a coordinated fashion. A differentiated ser(cid:173)
`vices domain may
`represent different administrative
`domains or autonomous systems, different trust regions,
`different network technologies (e.g., cell/frame), hosts and
`routers, etc.
`[0043] Alternate embodiments may apply alternate meth(cid:173)
`ods whereby packets are discriminated among and unique
`treatment applied thereto. Alternate services also provide
`quality of service variations to different data packets.
`[0044] Assured Forwarding of IP packets over the Internet
`is desirable, for example, when a company uses the Internet
`to interconnect to geographically distributed sites and wants
`an assurance that IP packets within this intranet are for(cid:173)
`warded with high probability. In this situation, it is desirable
`for the network to not reorder packets belonging to the same
`microflow, wherein a microflow: is a single instance of an
`application-to-application flow of packets which is identi(cid:173)
`fied by source address, destination address, protocol id, and
`source port, destination port (where applicable).
`[0045] Assured Forwarding (AF) grouping provides a
`means for a provider DS domain to offer different levels of
`forwarding assurances for IP packets received from a cus(cid:173)
`tomer DS domain. Four AF classes are defined, wherein
`each AF class is, in each DS node, allocated a certain amount
`of forwarding resources, such as buffer space and band(cid:173)
`width. IP packets wishing to use the services provided by the
`AF group are assigned by the customer or the provider DS
`domain into one or more of these AF classes according to the
`services to which the customer has subscribed.
`[0046] Within each AF class, IP packets are marked with
`one of three possible drop precedence values. In case of
`
`congestion, the drop precedence of a packet determines the
`relative importance of the packet within the AF class. A
`congested DS node tries to protect packets with a lower drop
`precedence value from being lost by preferably discarding
`packets with a higher drop precedence value.
`[0047]
`In a DS node, the level of forwarding assurance of
`an IP packet thus depends on: (1) the amount of forwarding
`resources allocated to the AF class to which the packet
`belongs, (2) the current load of the AF class, and, in case of
`congestion within the class, (3) the drop precedence of the
`packet.
`[0048] For example, if traffic conditioning actions at the
`ingress of the provider DS domain make sure an AF class in
`the DS nodes is only moderately loaded by packets with the
`lowest drop precedence value and is not overloaded by
`packets with the two lowest drop precedence values, then the
`AF class may offer a high level of forwarding assurance.
`[0049]
`In another embodiment, the Assured Forwarding
`(AF) group provides forwarding of IP packets in N inde(cid:173)
`pendent AF classes. Within each AF class, an IP packet is
`assigned one of M different levels of drop precedence. An IP
`packet belonging to an AF class i and has drop precedence
`j is marked with the AF codepoint AFij, where 1 <=i<=N and
`l<=j<=M. Currently, four classes (N=4) with three levels of
`drop precedence in each class (M=3) are defined for general
`use. More AF classes or levels of drop precedence may be
`defined for local use.
`[0050] The identity of the micro-flow is hidden (due to
`GRE encapsulation) on the R-P interface between the RAN
`and the PDSN. Therefore, the DS nodes between the PDSN
`and RAN cannot distinguish different micro-flows from each
`other unless the PDSN uses a micro-tunnel for each micro(cid:173)
`flow in order to satisfy the in-sequence delivery require(cid:173)
`ment. Another example of the flows which are sensitive to
`re-ordering is flows protected by IPsec.
`[0051] The GRE format is illustrated in FIG. 2. The data
`packet format includes a delivery header 202, a GRE header
`204 and a payload packet 206. The GRE header 204 may
`include a key field containing a four octet number which was
`inserted by the encapsulator. The key may be used by the
`receiver to authenticate the source of the packet. In one
`embodiment, the key field is made up of two fields. Also, the
`GRE header 204 may include a sequence number field. The
`sequence number field contains an unsigned 32 bit integer
`which is inserted by an encapsulator. It may be used by the
`receiver to establish the order in which packets have been
`transmitted from the encapsulator to the receiver.
`[0052]
`In another scenario, certain packets, such as Layer
`2 Tunneling Protocol (L2TP) packets and IPsec packets,
`should not be re-ordered. By using a separate micro-tunnel
`for these types of traffic, the PDSN 102 instructs the
`PCF/BSC 104 that re-ordering is allowed among the IPsec/
`L2TP traffic, but not within a micro-tunnel. Note, L2TP is an
`industry-standard Internet tunneling protocol. Unlike Point(cid:173)
`to-Point Tunneling Protocol (PPTP), L2TP does not require
`IP connectivity between the client workstation and the
`server. L2TP requires only that the tunnel medium provide
`packet-oriented point-to-point connectivity. The protocol
`may be used over media such as ATM, Frame Relay, and
`X.25. L2TP provides the same functionality as PPTP. Based
`on Layer 2 Forwarding (L2F) and PPTP specifications,
`L2TP allows clients to set up tunnels across intervening
`networks.
`
`Microsoft
`Ex. 1006 - Page 7
`
`

`

`US 2004/0085951 Al
`
`May 6, 2004
`
`4
`
`[0053]
`In another aspect, for different micro-tunnels, the
`sequence space for the sequence field of the GRE header 204
`is different. If all the micro-tunnels share the same sequence
`space, then the R-P interface may not able to take advantage
`of treating the Differentiated Services Code Point (DSCP)
`marking differently. DSCP is used for implemented Quality
`of Service (QoS). A replacement header field, called the DS
`field, includes six bits of as a DSCP codepoint, to select the
`per-hop-behavior a packet experiences at each node. The
`DSCP is detailed in RFC 2474, described hereinabove.
`[0054] The receiver would re-order the packets based on
`the GRE sequence number and any gain which could have
`been achieved by the R-P interface giving packets with
`certain code-point a higher priority would be lost. If different
`micro-tunnels do not share the same sequence space, the
`PDSN may use a different micro-tunnel for sending packets
`with different DSCP.
`[0055] Service differentiation for the traffic carried by
`each micro-tunnel is independent of the micro-tunnel ID and
`is based on the outer DSCP or other signaling information
`exchanged between the PDSN and RAN (e.g., RSVP).
`[0056] Format of the GRE key field:
`[0057] FIG. 3 illustrates the GRE key field 300 of the
`GRE header 204 according to one embodiment, wherein the
`GRE key field 300 includes two fields: Packet Service
`Identifier (PSI) 302; and Micro-Tunnel Identifier (MTID)
`304. The boundary 306 between the two fields is not fixed,
`and therefore is illustrated to indicate the boundary may be
`adjusted or determined by the PCF/BSC 104 or the PDSN
`102. The GRE key field 300 is used by the PDSN 102 to
`identify the micro-tunnel for a given user by the MTID, as
`well as identifying the associated MN by the PSI.
`[0058] To build the GRE key field 300, the PCF/BSC 104
`receives a request for a data service from a MN, such as MN
`108. The PCF/BSC 104 requests the establishment of a link
`for servicing the data service for MN 108. The PCF/BSC
`108 sends a GRE key configuration record to the PDSN 104.
`The GRE key configuration record may be provided in the
`form <PSI,L>, wherein L indicates the length of the MTID
`field 304.
`
`[0059] For example, for if the record is given as <00,2>,
`the PSI is identified by digital value 00 and the last two bits
`are available for identifying the MTID. Each value of the
`GRE key field in the GRE tunnel between the PDSN 102 and
`the PCF/BSC 104 identifies a micro-tunnel. For the PSI field
`determination, the PCF/BSC 104 structures a list of <net(cid:173)
`work address, subnet mask>pairs from which the PCF
`chooses to associate a mobile node.
`
`[0060] A general scheme for constructing the GRE key
`field 300 allows the PCF to determine the available PSI
`values for a given mobile node. In other words, the PCF
`determines the GRE key configuration record. In one
`embodiment, the GRE key field 300 is specified as having a
`fixed number of bits, i.e., a fixed length. For example, the
`GRE key field 300 may be specified as 32 bits defining a
`GRE key space as illustrated in FIG. 4. Each value in the
`GRE key space is identified by four bits. The GRE key field
`300 is used to identify both the PSI field 302 and the MTID
`field 304 as illustrated in FIG. 3. Therefore, if two bits are
`used to identify the MN, i.e., the destination identifier PSI,
`there are two bits left to identify the micro-tunnel, i.e., for
`
`the micro-tunnel identifier MTID. In this way, the PCF is
`able to allocate the total available values in the GRE key
`space to multiple mobile nodes.
`
`[0061] As an example, the PCF may assign the two MSB
`bits 00 to MN 108. The configuration record would be
`<00,2>indicating that 2 bits remain for micro-tunnel iden(cid:173)
`tifiers, i.e., MTID. The corresponding to GRE key values
`available for MN 108 are then 0000, 0001, 0010, and 0011.
`The MN 108 would have 4 available identifiers for micro(cid:173)
`tunnels. The PCF may then assign the three MSB bits 010 to
`MN 110, wherein the configuration record would be <010,
`l>indicating there is one bit left for the MTID. In this case,
`MN 110 would have 2 identifiers available for micro(cid:173)
`tunnels. The resultant GRE key values available for MN 110
`would be 0100, 0101. In other words, the boundary 306
`between the PSI field 302 and the MTID field 304 is variable
`per mobile node. The ability to craft the PSI and MTID fields
`302, 304 available for different mobile nodes may result in
`a GRE key space which is fragmented. The fragmentation
`provides flexibility in resource allocation within the system.
`As described hereinabove, the PCF determines the assign(cid:173)
`ments within the GRE key space and provides this infor(cid:173)
`mation to the PDSN in the form of a configuration record.
`
`[0062]
`It is desirable to allocate the available identifiers
`for multiple mobile nodes, and therefore, the PCF deter(cid:173)
`mines a range of values for each mobile node. Such deter(cid:173)
`mination may be based on historical usage of mobile nodes,
`available services, or some other design criteria specific to
`the system. While the GRE key field 300 is specified as a
`fixed length, the PSI and MTID fields 302, 304 have variable
`length, as indicated by the variable boundary 306. The
`longer the PSI field 302, i.e., more bits allocated to PSI, the
`more mobile nodes may be identified, as the PSI is used to
`identify the mobile node. The longer PSI fields, however,
`leave fewer bits for the MTID, which identifies each of the
`micro-tunnels for a given mobile node, and therefore, the
`fewer micro-tunnels available per mobile node. Similarly,
`shorter PSI fields allow fewer MNs, but allow more micro(cid:173)
`tunnels per MN.
`
`[0063] Note, alternate embodiments may utilize an alter(cid:173)
`nate field having a different number of bits than the GRE key
`field 300. Still other embodiments may implement a field
`having a variable number of bits, the PSI and MTID fields
`302, 304 are then allocated within the variable length field.
`In these latter embodiments, the PSI and MTID length
`allocation may be determined proportionally, or may be
`specifically determined given the current length of the
`variable length field.
`
`[0064] When the PDSN 102 receives traffic destined for
`the PPP instance associated with a particular mobile node,
`the PDSN 102 encapsulates the traffic in a GRE tunnel and
`sets the GRE key field 300 as described herein. The PDSN
`102 sets the Most Significant Bits (MSBs) of the GRE key
`field 300 (i.e., PSI field 302) to the one of the network
`addresses which the PCF/BSC 104 has advertised in the
`All-Registration-Request message for a particular MN,
`wherein each PPP instance is associated with an IMSI. The
`length of the network address is determined by the subnet
`mask associated with the network address used.
`
`[0065] The PDSN 102 sets the LSBs of the GRE key field
`300 (i.e., MTID field 304) to identify the micro-tunnel in
`
`Microsoft
`Ex. 1006 - Page 8
`
`

`

`US 2004/0085951 Al
`
`May 6, 2004
`
`5
`
`which the packet should be carried. The numerical value of
`the LSBs has no significance and is only used to identify a
`micro-tunnel.
`
`[0066] The PCF/BSC 104 routes packets received via
`micro-tunnels to the mobile stations by examining the GRE
`key field 300 of the GRE header 204 and determining the
`associated mobile station ID based on the "routing tables"
`advertised to the PDSN in the All-Registration-Request
`message. In one case, the PCF/BSC 102 may specify the
`MSBs of the GRE key field 300 and allow the PDSN 104 to
`specify the LSBs of the GRE key field 300.
`
`[0067]
`In order to make the All-Registration Message
`backwards compatible, the PCF/BSC 104 may populate the
`PSI field in the All-Registration Request with the PSI field
`which is left-justified and append the length of the PSI field
`as a new information element to the All-Registration
`Request message.
`
`[0068] An alternative method of specifying the GRE Key
`associated with micro-tunnels is where the BSC/PCF sends
`to the PDSN (in an All-Registration Request message) the
`entire 32-bits of the GRE Key for the micro-tunnel along
`with the QoS characteristics of the micro-tunnel to be
`established.
`
`[0069] The PDSN 102 is the entity to drop packets if
`congestion occurs at the RAN 120, which is where a
`bottleneck may be expected. Note that the PDSN 102 is the
`entity which may drop a whole IP packet without the need
`to remove the link layer framing (the BSC gets the packets
`when HDLC is already applied to them). Also, the PDSN
`102 distinguishes a PPP control packet from a PPP frame
`containing data (again the PCF/BSC 102 has to peek into the
`packet in order to make this distinction). The RAN is where
`the queues associated with packets with different QoS
`requirements are formed.
`
`[0070] Because of the above facts, the PCF/BSC 104 may
`be the entity which provides back-pressure to the PDSN 102.
`The PCF/BSC 104 should apply back-pressure based on the
`DS code points. The idea is that the length of the PCF/BSC
`104 queues for different DSCPs may be different because the
`PCF/BSC services the bins for different DSCPs differently.
`More precisely, the PCF should be able to apply back(cid:173)
`pressure by specifying <PSI, DSCP, MTID> triplet. The
`mobile should be able to set any of the PSI, DSCP, or MTID
`to a wild-card value. For example, a <PSI, *, *> indicates a
`back-pressure for all the traffic destined for the mobile
`identified by the PSI.
`
`[0071] The current A-interface signaling maps each air
`interface service instance identified by an sr _id to a GRE
`tunnel identified by <src _ip=PDSN _IP, dest_ip=PCF _IP,
`GRE _ key=PSI>. It is also expected for the PDSN to map the
`received packets from the Internet side to an appropriate
`air-interface pipe which is identified by the sr _id. In the
`method, the following assumptions are made: (1) the air(cid:173)
`inter

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket