Mobile IP communication scheme for supporting mobile...

Multiplex communications – Communication techniques for information carried in plural... – Adaptive

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C370S401000

Reexamination Certificate

active

06501767

ABSTRACT:

BACKGROUND OF THE INVENTION
1. Field of the Invention
The present invention relates to a mobile IP communication scheme, and more particularly, to a mobile computer device capable of carrying out communications while moving over a plurality of inter-connected networks, and a packet relay device for relaying data packets having the mobile computer device as destination or source, as well as a packet relay method, a packet transmission method and a packet transfer method used by these devices.
2. Description of the Background Art
In conjunction with availability of a computer system in smaller size and lower cost and a more enriched network environment, the use of computer system has been rapidly expanded into variety of fields, and there is also a transition from a centralized system to a distributed system. In this regard, in recent years, because of the advance and spread of the computer network technology in addition to the progress and improved performance of the computer system itself, it has become possible to realize not only a sharing of resources such as files and printers within an office but also communications (electronic mail, electronic news, file transfer etc.) with outside of an office or organization, and these communications are now widely used.
In particular, in recent years, the use of the world's largest computer network called “Internet” has become very popular, and there are new computer businesses for connecting to the Internet and utilizing open information and services, or for providing information and services to external users who make accesses through the Internet. In addition, new technological developments are made in relation to the use of the Internet.
Also, in conjunction with the spread of such networks, there are technological developments regarding the mobile computing. In the mobile computing, a user carries along a portable computer terminal and makes communications while moving over networks. In some cases, the user may change a location on a network while continuing the communication, so that there is a need for a scheme that manages a changing address of a mobile computer on a network during such a communication in order to route the communication content correctly.
In general, in a case of realizing the mobile computing, a router (home agent) for managing the visiting site information of the mobile computer is provided at a network (home network) to which the mobile computer belongs, and when the mobile computer is away from the home network, the mobile computer sends a registration message for indicating a current location to this home agent. When this registration message is received, the transmission of data destined to the mobile computer is realized by capturing it by the home agent, and carrying out the data routing control with respect to the mobile computer by encapsulating an IP packet destined to an original address of the mobile computer within a packet destined to a current location address of the mobile computer.
For example, in
FIG. 1
, this role is played by a home agent (HA)
105
in a case where the mobile computer
102
that originally belongs to the home network
101
a
moves to another network
101
b
and carries out the communication with another computer (correspondent host: CH)
103
within the other network
101
c.
This is a scheme called mobile IP which is currently in a process of being standardized by the mobile-IP working group of the IETF which is the standardizing organization for the Internet (see, IETF RFC 2002, IP mobility support (C. Perkins)).
Also, when the networks are wide spread and free connections among networks are realized so that huge amount of data and services can be exchanged, there arises a need to account for the problem of security.
For example, there is a problem as to how to prevent the leakage of the secret information of the organization to the external network, and there is also a problem as to how to protect resources and information connected to the domestic network. The Internet was developed originally for the academic purpose so that the primary concern was the free data and service exchanges by the network connections and the above described problem of security has not been accounted for.
However, in recent years, many corporations and organizations are connecting to the Internet so that there is a need for a mechanism to guard the own network in view of the above described problem of security.
To this end, there is a known scheme for use at a time of exchanging a data packet on the Internet, in which the content of the data packet is to be encrypted and an authentication code is to be attached before the transmission of the data packet to the external, and the authentication code is to be verified and the data packet is to be decrypted at a received site. According to this scheme, even when an outside user picks up the data packet on the external network, the leakage of data content can be prevented because the data content is encrypted, and therefore the secure communication can be realized.
A mutual cipher communication is possible between networks which are protected (guarded) by gateway computers that support such a cipher communication, and when the above described mobile computer itself supports a function of the packet encryption and decryption, a cipher communication between any gateways or a gateway and a mobile computer can be supported.
For example, in an exemplary case shown in
FIG. 1
, a mobile computer
102
that originally belongs to a home network
101
a
moves to another network
101
b
and carries out a cipher communication with another computer (CH: Correspondent Host)
103
in a network
101
c,
through gateways
104
a
and
104
c
that support the encryption/decryption function.
In
FIG. 1
, when the communications are carried out by using the mobile IP scheme in combination with the packet encryption scheme, a packet transfer route will be as follows: correspondent host (CH)
103
→gateway
104
c
→gateway
104
a
→home agent (HA)
105
→gateway
104
a
→mobile computer
102
. At the gateway
104
a,
the packet is decrypted once and sent to the home agent
105
, and later on, the packet transmitted from the home agent
105
is encrypted again.
Now, in the mobile IP scheme, the protocol is configured by presupposing only the case where the mobile computer moves over a single address space. Namely, it is assumed that the current location registration message from the visited site is always capable of reaching to the home agent on the home network. However, nowadays, when a large scale organization is connected to the Internet, it is rare to allocate global IP addresses to all the hosts within the organization due to the problem of IP address shortage, and it is more common to operate within the organization using private addresses (RFC 1597) and carry out the address translation into the global address in the case of communicating with the external.
In general, a scheme called NAT (Network Address Translation) is often employed as a scheme for transferring a packet originated from a private address to a global address region. The NAT is a scheme in which a correspondence between the private address on an inner side and the global address on an outer side is managed according to information such as a port number of an IP packet, and a packet is transferred by applying appropriate address translation.
However, when the packet encryption scheme is used in combination as described above, this mechanism for distributing packets according to the port numbers does not work properly. Also, when the mobile IP scheme is used in combination, the registration request message is initially transmitted from the mobile computer that has moved to the external, and the correspondence between the private address on an inner side and the global address on an outer side is established at a timing of this message, so that the direction of actions involved is opposite to that of the conventional NAT scheme.
In other words, in the system which uses t

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Mobile IP communication scheme for supporting mobile... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Mobile IP communication scheme for supporting mobile..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Mobile IP communication scheme for supporting mobile... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-2918346

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.