US20050250491A1 - System and method for inter-domain mobility management - Google Patents
System and method for inter-domain mobility management Download PDFInfo
- Publication number
- US20050250491A1 US20050250491A1 US11/181,635 US18163505A US2005250491A1 US 20050250491 A1 US20050250491 A1 US 20050250491A1 US 18163505 A US18163505 A US 18163505A US 2005250491 A1 US2005250491 A1 US 2005250491A1
- Authority
- US
- United States
- Prior art keywords
- gatekeeper
- visiting
- mobility
- mobile node
- domain
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
- 238000000034 method Methods 0.000 title claims abstract description 27
- 238000004891 communication Methods 0.000 claims abstract description 79
- 238000012790 confirmation Methods 0.000 claims description 23
- 230000001105 regulatory effect Effects 0.000 claims description 6
- 230000004044 response Effects 0.000 claims description 4
- 230000000977 initiatory effect Effects 0.000 claims description 3
- 238000004590 computer program Methods 0.000 claims 11
- 238000007726 management method Methods 0.000 description 45
- 230000008859 change Effects 0.000 description 14
- 230000011664 signaling Effects 0.000 description 8
- 101000798114 Homo sapiens Lactotransferrin Proteins 0.000 description 6
- 102100032241 Lactotransferrin Human genes 0.000 description 6
- 230000007246 mechanism Effects 0.000 description 4
- VYMDGNCVAMGZFE-UHFFFAOYSA-N phenylbutazonum Chemical compound O=C1C(CCCC)C(=O)N(C=2C=CC=CC=2)N1C1=CC=CC=C1 VYMDGNCVAMGZFE-UHFFFAOYSA-N 0.000 description 4
- 238000001514 detection method Methods 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 108010066082 tartrate-sensitive acid phosphatase Proteins 0.000 description 2
- 238000013519 translation Methods 0.000 description 2
- 230000006978 adaptation Effects 0.000 description 1
- 238000013475 authorization Methods 0.000 description 1
- 230000008901 benefit Effects 0.000 description 1
- 230000001413 cellular effect Effects 0.000 description 1
- 238000010295 mobile communication Methods 0.000 description 1
- 238000012544 monitoring process Methods 0.000 description 1
- 230000006855 networking Effects 0.000 description 1
- 230000008520 organization Effects 0.000 description 1
- 230000008569 process Effects 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
- 238000012795 verification Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L65/00—Network arrangements, protocols or services for supporting real-time applications in data packet communication
- H04L65/10—Architectures or entities
- H04L65/102—Gateways
- H04L65/1043—Gateway controllers, e.g. media gateway control protocol [MGCP] controllers
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L65/00—Network arrangements, protocols or services for supporting real-time applications in data packet communication
- H04L65/1066—Session management
- H04L65/1101—Session protocols
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L65/00—Network arrangements, protocols or services for supporting real-time applications in data packet communication
- H04L65/1066—Session management
- H04L65/1101—Session protocols
- H04L65/1106—Call signalling protocols; H.323 and related
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/40—Network security protocols
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M3/00—Automatic or semi-automatic exchanges
- H04M3/42—Systems providing special services or facilities to subscribers
- H04M3/42229—Personal communication services, i.e. services related to one subscriber independent of his terminal and/or location
- H04M3/42263—Personal communication services, i.e. services related to one subscriber independent of his terminal and/or location where the same subscriber uses different terminals, i.e. nomadism
- H04M3/42272—Personal communication services, i.e. services related to one subscriber independent of his terminal and/or location where the same subscriber uses different terminals, i.e. nomadism whereby the subscriber registers to the terminals for personalised service provision
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M7/00—Arrangements for interconnection between switching centres
- H04M7/006—Networks other than PSTN/ISDN providing telephone service, e.g. Voice over Internet Protocol (VoIP), including next generation networks with a packet-switched transport layer
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W80/00—Wireless network protocols or protocol adaptations to wireless operation
- H04W80/08—Upper layer protocols
- H04W80/10—Upper layer protocols adapted for application session management, e.g. SIP [Session Initiation Protocol]
Definitions
- the present invention relates to a method and apparatus for inter-domain mobility management for a telephony network.
- the present invention also relates generally to the H.323 standard for transmitting audio and video data streams, and more particularly to extending the H.323 standard to support mobility in a multimedia communication system with services over packet-based networks.
- ITU-T Recommendation H.323 describes terminals and other entities that provide multimedia communications services over packet based networks (PBN) which may not provide a guaranteed Quality of Service.
- PBN packet based networks
- H.323 entities may provide real-time audio, video and/or data communications. Support for audio is mandatory, while data and video are optional, but if supported, the ability to use a specified common mode of operation is required, so that all terminals supporting that media type can interwork.
- inter-domain mobility management of this invention needs to be independent of the underlying architectural configurations and is not “hard-wired” for any particular configuration of any architectural or functional entity as done in the prior art.
- H.225.0 RAS Intra-domain communication
- inter-domain mobility management we need to extend H.225.0 Annex G, as disclosed in ITU-T Recommendation H.225.0 Annex G (1999), “Communications Between Administrative Domains.”
- the new messages such as, disclosed in R. R. Roy, AT&T, “H.323 Mobility Architecture and Protocol for Terminal, User, and Service Mobility,” D-354, ITU-T SG 16 Q.13/16, WP2, Geneva, Switzerland, Feb. 7-18, 2000, the disclosure of which is entirely incorporated herein by reference, required for mobility binding and updating will also be applicable for inter-domain communication with additional parameters like hopcounts and others in the header as required per H.225.0 Annex G.
- H.225.0 RAS messages like LRQ Location Request
- LRQ Location Request
- H.323 Mobility Management Services, Scenarios, and Information Flows in an Administrative Domain MD012, Ad Hoc Mobility Conference Call, February-May 2000
- MD012 Ad Hoc Mobility Conference Call
- H.225.0 Annex G the messages like accessRequest and others of H.225.0 Annex G are also need to be extended for inter-domain mobility management as described in this embodiment.
- the mobility related parameters that specify the information related to the mobile entity used in the LRQ and call signaling messages of H.225.0 RAS/Q.931 also need to be passed to the accessRequest and other messages of H.225.0 Annex G while the mobile entity is visiting a foreign domain.
- H.323 As an adaptation of H.320, which addresses videoconferencing over ISDN and other circuit-switched networks and services.
- ITU-T Recommendation H.320 describes terminals and other entities that provide multimedia communications services over circuit-switched networks which provide a guaranteed Quality of Service.
- H.320 entities may provide real-time audio, video and/or data communications.
- H.320 was ratified in 1990, and corporations expanded their networks to include Local Area Networks (LANs) and LAN gateways to the Wide Area Network (WAN). Then, H.323 was expanded beyond being an extension of H.320 so that H.323 now covers the corporate intranets and packet-switched networks in general.
- LANs Local Area Networks
- WAN Wide Area Network
- the ITU published a set of standards for multimedia communication over packet-based networks (PBNs) under the H.323 designation, which includes standards for data channels, monitoring channels, and control channels. It includes provision of real-time audio, video and/or data communications.
- the H.323 components defined by the standard include: terminals, gateways, gatekeepers and multipoint control units (MCUs).
- the terminals provide real-time communications, must support audio/voice communications and optionally support data and video.
- the most common H.323 terminals are the applications that run on a personal computer (PC).
- H.323 gateways provide services to H.323 clients and allow communication with non-H.323 entities, such as communication between H.323 terminals and telephone in a circuit-switched network.
- Gatekeepers provide call control services for H.323 endpoints, e.g., address translation and bandwidth management. Gatekeepers are optional in the H.323 standard, but, if they are present, the endpoints must use the services of the gatekeepers. The H.323 standard specifies certain mandatory services that gatekeepers, if utilized, must provide.
- the multipoint control units provide support for conferences of three or more endpoints by managing conference resources, manage negotiations between the endpoints to specify which audio or video code(s) to use and may manage the media stream.
- the H.323 standard defines how audio and video conferencing systems communicate over packet-switched networks defines call control and management practices for point-to-point and broadcast/multicast/unicast multipoint conferences, addresses QoS issues with a centralized gatekeeper that LAN administrators use to manage media traffic, bandwidth and user participation, and describes functionality that allows calls to connect from the LAN to the Public Switched Telephone Network (PST) as well as to other H.32x standards-based terminals.
- PST Public Switched Telephone Network
- video and audio data streams are compressed and packetized in accordance with a real-time transport protocol (RTP/RTCP) standard from the Internet Engineering Task Force (IETF) and are used to support video conferencing and other communications over the Internet.
- RTP/RTCP real-time transport protocol
- Packets include data and header information which facilitates detection of packet loss, detection of packet status and synchronization of the packets.
- the video data streams may use H.261, H.262, or H.263 protocols.
- Audio data streams may use G.711, G.722, G.723.1 G.728 or G.729 protocols.
- the H.323 standard supports teleconferencing in networks that utilize TCP/IP, such as, for example, the Internet.
- the H.323 system supports interoperability and assumes that users, terminals, and services are fixed. If an H.323 terminal is moved form one network to another, its point of attachment or network address changes. In this situation, the address of the mobile terminal needs to be resolved to set up a new call or continue a same call. Thus, there is a need for an H.323 mobility architecture that provides for terminal, user and service mobility for inter-domain mobility management.
- the present invention provides an H.323-based mobility protocol for real-time inter-domain mobility management for a telephony network between the administrative domains.
- the invention is an inter-domain mobility management method, comprising:
- the invention is an inter-domain mobility management method, comprising:
- the invention is an inter-domain mobility management method, comprising:
- the invention is an inter-domain mobility management method, comprising:
- the invention is an inter-domain mobility management method, comprising:
- the invention is an inter-domain mobility management method, comprising:
- this invention is an H.323-based mobility protocol for real-time mobile multimedia communications and conferencing over packet-based networks by a Mobile Terminal/Node/Entity having a Home Gatekeeper/Home Database, comprising the steps of:
- this invention is a computer-readable medium having computer-executable steps for implementing, by a Mobile Terminal/Node/Entity, an H.323-based mobility protocol for real-time mobile multimedia communications and conferencing over packet-based networks wherein a plurality of H.323 gatekeepers provide notification of H.323 mobility services availability by periodically broadcasting/multicasting/unicasting a Mobility Gatekeeper Advertisement, comprising the computer-executable steps of:
- FIG. 1 illustrates an embodiment of the Inter-Domain Mobility Management system of this invention which illustrates communications between two administrative domains.
- FIG. 2 illustrates another embodiment of the Inter-Domain Mobility Management system of this invention with backend services.
- FIG. 3 illustrates yet another embodiment of the Inter-Domain Mobility Management system of this invention where requests are resolved by the backend server shared among multiple administrative domains.
- FIG. 4 illustrates still another embodiment of the Inter-Domain Mobility Management system of this invention where requests are resolved by the backend server not shared among multiple administrative domains.
- FIG. 5 illustrates yet another embodiment of the Inter-Domain Mobility Management system of this invention using centralized home location function servers/databases.
- FIG. 6 illustrates still another embodiment of the Inter-Domain Mobility Management system of this invention using distributed home location function servers/databases.
- the present invention provides for extending the H.323 standard to support mobility in a multimedia communication system with services over packet-based networks.
- the present H.323 standard is known to those skilled in the art and is hereby incorporated by reference.
- the invention supports extending H.323 to support mobility in a transport independent way, create new H.323 messages and/or message elements that needed to support mobility, and facilitate interoperability for implementation of H.323 mobility over specific networking environments such as wireless/PSTN-IP-LAN.
- the invention provides for extension to existing H.225.0 (H.323) messages to accommodate mobility. Messages are provided to facilitate mobility binding as the mobile entity moves form one place to another.
- IWF interworking function
- a mobile unit implementing H.323 uses a packet-based network, e.g., the IP subnet, together with an H.323-based point of attachment (e.g., network point of attachment, zone, domain), the mobility information is managed via a gatekeeper.
- a gatekeeper at the transmitting end and at the receiving end also. If necessary, the gatekeeper can also perform bandwidth management, address translation, maps LAN aliases to IP addresses, and sets up a real-time transport control protocol (RTCP) for exchanging status information between the transmitting end and the receiving end.
- RTCP real-time transport control protocol
- a H.245 control channel is set up to provide control functions such as, for example, opening and closing data channels.
- H.323 mobility The functional requirements of H.323 mobility are primarily described at the H.323 application level as:
- Terminal Mobility the ability for a terminal to changes location, network point of attachment, and H.323 point of attachment and still be able to communicate.
- a fixed or mobile H.323 terminal must be able to reach an H.323 mobile user and vice versa. Conversations are provided even when the mobile terminal moves from one place to another with a different point of attachment or network address. Where desired, communications are also provided among the H.323 mobile users.
- Intra-zone, inter-zone (intra-domain) and/or inter-domain handoff is supported. Handoff between intra-zone, inter-zone (intra-domain) and or inter-domain users is supported.
- User Mobility the ability for a user to maintain the same user identity on different terminals or terminal types.
- An H.323 user maintains the same identity and may receive the same or, where desired, different services even when the user moves. Service providers may be switched with the user maintaining the same identity.
- Mobility Management The H.323 mobility management is supported to provide registration, call establishment, roaming and handoff.
- QoS Support QoS service is maintained during intra-zone, inter-zone (intra-domain) and/or inter-domain roaming for the H.323 user.
- Authentication and security mechanisms are provided in support of H.323 mobility.
- a gatekeeper manages a zone.
- a zone is generally a collection of H.323 entities such as terminals, gateways (GWs) or interworking functions (IWFs) and multi-point controllers (MCs).
- H.323 entity has a unique network point of attachment or address, and each zone may contain many network points of attachment, subnets, or addresses under the management of a GK.
- GWs gateways
- IWFs interworking functions
- MCs multi-point controllers
- Each H.323 entity has a unique network point of attachment or address, and each zone may contain many network points of attachment, subnets, or addresses under the management of a GK.
- a zone many have multiple networks in the case of an IP, ATM, or other network. If a user or terminal moves within a zone, its network attachment or subnetwork address may also change.
- a domain may consist of a single or of multiple zones.
- H.323 mobility is addressed in terms of zones and domains as well. If an H.323 user, entity or terminal crosses a zone boundary, such a change may be termed as a change of H.323 point of attachment because an H.323 gatekeeper manages the registration of all H.323 entities in a given zone.
- H.323 services are ensured during the call and between calls while users or terminals move from place to place.
- Discrete terminal mobility or roaming the ability for a terminal to make discrete changes of physical location, i.e., to change location while no media streams are active to
- Continuous terminal mobility or handover the ability for a terminal to change location while media streams are active.
- Such a change may be seamless, i.e., without loss of data, or alternatively, may not be seamless, i.e., wherein some media stream data is lost.
- Service mobility the ability for a user to obtain a particular service independent of user and terminal mobility, i.e., wherein a foreign network has the means to obtain the parameters required for the service.
- Network Point of Attachment the attachment or address, e.g., an IP address, of an H.323 entity, e.g., terminals, MCUs, MCs, and/or GWs, to a network.
- an H.323 entity e.g., terminals, MCUs, MCs, and/or GWs
- Each H.323 entity has at least one network address which uniquely identifies the H.323 entity on the network. The address is specific to the network environment in which the endpoint is located. Different network environments may have different network address formats. H.323 permits an endpoint to use different network addresses for different channels within the same call.
- H.323 Point of Attachment the gatekeeper with which an H.323 terminal, GW (IWF), MC, or MCU is Databased.
- Mobile Entity the H.323 entity that changes its point of attachment (network and/or H.323 point of attachment) from one attachment to another.
- a mobile entity can continue to communicate with other H.323 entities at any location as it moves from place to place.
- Home GK a gatekeeper in the mobile entity's home zone which performs the necessary management functions for departed mobile entities and maintains current location information for each. Any H.323 GK that provides the support for H.323 mobile entities can act as a home GK.
- Home Network the network in the mobile entity's home network and the network which has been declared by the mobile entity as its home network, e.g., an IP subnetwork in the home zone declared as a home network by a mobile entity.
- IP address the address of the network point of attachment in the home network of a mobile entity, e.g., IP address (RAS transport address) in a home IP subnetwork. If the transport address contains the network address in addition to the TSAP, the home transport address will also contain the home network address.
- RAS transport address IP address
- Foreign GK a gatekeeper on a mobile entity's visited- or visiting-zone which cooperates with the home GK to have the information related to the mobile entity while it is away from its home zone. Any H.323 GK that provides the support for H.323 mobile entities can act as a foreign GK.
- Foreign Network the network in the mobile entity's foreign zone where the said network has been declared by the mobile entity as its foreign network, e.g., an IP subnetwork in a foreign zone of a mobile entity.
- Care-of Network Address the address of the network point of attachment in a foreign network of a mobile entity, e.g., IP address (RAS transport address) in a foreign IP subnetwork. If the transport address contains the network address in addition to the TSAP, the care-of transport address will also contain the care-of network address.
- IP address RAS transport address
- Visiting GK a foreign GK that the mobile entity is presently visiting, i.e., the mobile entity is currently residing within a foreign zone that is managed by a foreign GK.
- Visited GK the foreign GK that had been visited by the mobile entity previously.
- Target GK the foreign GK that the mobile entity intends to visit.
- Target Network the target network that the mobile entity intends to visit.
- Mobile GK either a home GK or a foreign GK.
- Home Zone a zone that is managed by a home GK of a mobile entity.
- Foreign Zone a zone managed by a foreign GK.
- Visiting Zone a zone other than a mobile entity's home zone in which the mobile entity is currently residing, i.e., a foreign zone in which the mobile entity is presently visiting.
- Visited Zone a zone other than a mobile entity's home zone that the mobile entity has visited previously, i.e., the foreign zone which had been visited by the mobile entity previously.
- Target Zone a zone other than a mobile entity's home zone that the mobile entity intends to visit.
- Visiting Entity a mobile entity that is residing in a visiting zone managed by a visiting GK.
- Visiting Terminal a mobile H.323 terminal that is residing in a visiting zone managed by a visiting GK.
- Visiting User a mobile H.323 terminal that is residing in a visiting zone managed by a visiting GK.
- Visitor List the list of mobile entities currently visitng a foreign zone.
- GK Advertisement for Mobility Services foreign gatekeepers advertise their presence by using a special message to provide services for mobile entities.
- Care-of Address the terminal address of the point of attachment, e.g., care-of network address of mobile entity or care-of address of a foreign GK where a mobile entity is residing.
- care-of address There are two different types of care-of address: a foreign GK care-of address with which a mobile entity is Databased; a care-of network address which the mobile entity has associated with one of its own network interfaces, e.g., a temporary IP address of the visitor may be acquired dynamically using the Dynamic Host Configuration Protocol (DHCP).
- DHCP Dynamic Host Configuration Protocol
- a location area may constitute a cell or a certain group of cells in a given geographical area that resides within a zone.
- Administrative Domain An administrative domain is a collection of H.323 entities administered by one administrative entity and may contain one or more gatekeepers (that is, one or more zones). It may also contain one or more border elements for communications between the domains. Like zone, an administrative domain can also be termed as home or foreign (visited, visiting, or target) domain.
- Mobile H.323 (Mobile H.323 Protocol): the extended and existing H.323/H.225.0/H.245 messages that are used to support mobility in H.323 are termed as mobile H.323 protocol or simply as mobile H.323.
- FIG. 1 illustrates an embodiment of the Inter-Domain Mobility Management system of this invention which illustrates communications between two administrative domains.
- Administrative domain 10 has a GK/BE 1b 12 , a GK 1a 14 and a GK 1c 16 .
- Administrative domain 20 has a GK/BE 2b 22 , a GK 2a 24 and a GK 2c 26 .
- a mobile H.323 entity 28 contacts the GK 2c 26 after moving from administrative domain 10 to administrative domain 20 . Basically, the mobile entity 28 will discover the gatekeeper (GK) and then communicate with the gatekeeper (GK) for registration using the procedures as described in ITU-T Recommendation H.323, such as, GK 2c 26 of the administrative domain 20 of a given administrative domain.
- GK gatekeeper
- GK gatekeeper
- the Gate-keeper (GK) 26 will find from the registration request message that the mobile user has moved from another administrative domain and needs to communicate with the other administrative domain. As result, GK 2c 26 of the administrative domain 20 will then communicate with a border element (BE) 22 of that administrative domain 20 as appropriate depending on the needs dictated by the optimal routing so that minimal resources are used. The border element (BE) 22 will then communicate with another border element (BE) 12 of administrative domain 10 for resolving the information (e.g., address, registration, verification, authentication, etc.).
- the information e.g., address, registration, verification, authentication, etc.
- Gatekeeper discovery is the process an endpoint uses to determine which Gatekeeper to register with. This may be done manually or automatically. Manual discovery relies on methods outside the scope of this recommendation to determine which Gatekeeper an endpoint is associated with.
- the endpoint may multicast (or use other methods as described in Appendix IV/H.225.0) a Gatekeeper Request (GRQ) message, asking “Who is my Gatekeeper?”. This is sent to the Gatekeeper's well-known Discovery Multicast Address.
- GCF Gatekeeper Confirmation
- a Gatekeeper does not want the endpoint to register to it, it shall return Gatekeeper Reject (GRJ).
- FIG. 1 shows the logical communications model between the two administrative domains where no backend services (BES) are considered.
- BES provide additional value-added services, such as, for example, permanent and/or temporary address resolution/allocation services, authentication, and others using the database/server not defined in H.323 and also not shown in FIG. 1 .
- FIG. 2 shows that the backend services (BES) are being accessed from another administrative domain via the border elements (BEs).
- BES backend services
- BEs border elements
- Administrative domain 30 will have a plurality of gatekeepers 14 , 16 and backend services 34 (BES 1a ), 36 (BES 1c ).
- the Administrative domain 40 will have a plurality of gatekeepers 24 , 26 and backend services 42 (BES 2b ), 44 (BES 2 a), 46 (BES 2c ).
- FIG. 2 also shows that the backend services (BES) (e.g., home location functions (HLFs)) information resolution is provided from another administrative domain for an H.323 mobile entity if the information is not available in a given administrative domain.
- BES backend services
- HLFs home location functions
- the services from the non-sharing back end services (BES) server has to be accessed using the normal procedure of the H.323 protocol via gatekeepers (GKs) and/or border elements (BEs). Also shown is a mobile H.323 entity 38 in the administrative domain that would also be sharing the back end services (BES) server 55 , and getting similar information whether it is within the home domain or in a foreign domain.
- GKs gatekeepers
- BEs border elements
- a given back end services (BES) server may be shared because of the overlapping administrative domains, and where requests are resolved by the backend server and are not shared among multiple administrative domains.
- the services from a back end server (BES) 34 can only be requested by an H.323 endpoint 28 , 38 via a gate keeper (GK) 14 (because a border element (BE) is not directly accessible by an H.323 endpoint (e.g., terminal, GW (gateway)).
- GK gate keeper
- BE border element
- the mobile entity 28 , 38 moves from one place to another and may not be aware whether it is attached to its home network address, home zone, and/or home domain.
- FIG. 5 illustrates yet another embodiment of the Inter-Domain Mobility Management system of this invention using a centralized home location function (HLF) server/database.
- FIG. 5 also shows the communications flows when a mobile entity moves from one administrative domain to another where each domain has only one home location function (HLF) configured in a centralized architecture.
- the mobile entity discovers the gatekeeper (GK 2c ) and finds that its is in a foreign (visiting) domain. Then the mobile entity proceeds with registration with the gatekeeper (GK) (GK 2c ).
- the gatekeeper (GK 2c ) finds that mobile H.323 entity 28 is a visitor and keeps the information in the visitor location function (VLF) (not shown in FIG. 5 for simplicity).
- VLF visitor location function
- FIG. 6 illustrates still another embodiment of the Inter-Domain Mobility Management system of this invention showing the inter-domain communication flow using distributed home location function (HLF) servers/databases.
- FIG. 6 also shows a configuration for communications between the two administrative domains where the home location function (HLF) function is distributed in a domain.
- the communications scenarios are almost similar as shown in FIG. 5 , but with the difference that a gate-keeper (GK) has the intelligence to decide which home location function (HLF) is needed to be accessed for resolving the information.
- GK gate-keeper
- how the decision is made by the gatekeeper (GK) for contacting a particular gate keeper (GK) and/or home location function (HLF) is not the subject of standardization.
- This information relating to the mobile entity 28 may be temporarily or permanently stored in HLF 2 b 92 in the foreign administrative domain 90 .
- Both administrative domains 80 and 90 may have additional home location functions HLF 1 c ( 86 ), HLF 2 a ( 94 ), HLF 2 b ( 92 ), HLF 2 c ( 96 ) that may be available for additional information.
- VLF visitor location function
- HPF home location function
- the new mobility binding and updating messages proposed in contribution can also be used for inter-domain communications.
- Gatekeepers can have any architectural relationships: centralized, distributive, and/or hybrid architecture.
- HDFs Home location function
- BEs Border elements
- GKs Gate keepers
- the administrative domains can also be arranged logically among themselves in any form: centralized, distributive, and/or hybrid architecture.
- HLF Home location function
- This invention also shows various relationships for communications between border elements (BEs), home location function (HLFs), visitor location function (VLFs), and gate keepers (GKs).
- BEs border elements
- HLFs home location function
- VLFs visitor location function
- GKs gate keepers
- the administrative domains can also be arranged among themselves, such as (a) centralized, (b) distributed, or (c) hybrid architectural relationship from logical communications point of view.
- a border element (BE) element configures itself with all address information obtaining the address templates in the following ways (a) static configuration with explicit provisioning with address templates for all zones for which it is responsible, (b) receiving descriptors containing the address information from other border elements (BEs) in response to general requests, and (c) receiving responses to specific queries.
- HLFs home location function
- VLFs visitor location function
- BEs border elements
- GKs gatekeepers
- a mobile entity can only communicate with the gatekeeper (GK) directly (not the border element (BE)).
- the registering includes the steps of broadcasting/multicasting/unicasting/sending, by the Home Gatekeeper, a Mobility Gatekeeper Advertisement (MGA) message periodically; broadcasting/multicasting/unicasting/sending a registration request message (RRQ) to the Home Gatekeeper by the Mobile Terminal/Node/Entity; and sending, by the Home Gatekeeper, a registration confirmation/registration rejection (RCF/RRJ) to the Mobile Terminal/Node/Entity.
- MGA Mobility Gatekeeper Advertisement
- RRQ registration request message
- RCF/RRJ registration confirmation/registration rejection
- the registering steps can also include the steps of: upon determining, by the Mobile Terminal/Node/Entity, that a network point of attachment has changed/a foreign zone has been entered, broadcasting/multicasting/unicasting/sending, by the Mobile Terminal/Node/Entity, a registration request message (RRQ) to a Foreign/Visiting Gatekeeper; broadcasting/multicasting/unicasting/sending, by the Foreign/Visiting Gatekeeper, a binding update message (BuRQ) to the Home Gatekeeper; broadcasting/multicasting/unicasting/sending, by the Home Gatekeeper, a binding update confirmation/rejection (BuCF/BuRJ) to the Foreign/Visiting Gatekeeper; broadcasting/multicasting/unicasting/sending, by the Foreign/Visiting Gatekeeper, the binding update confirmation/rejection to the Mobile Terminal/Node/Entity.
- RRQ registration request message
- BuRQ binding update message
- BuCF/BuRJ binding update confirmation/rejection
- the H.323-based mobility would also include a situation wherein, where the Mobile Terminal/Node/Entity has already visited another zone regulated by a Visited Gatekeeper within the first administrative domain, registering includes: broadcasting/multicasting/unicasting/sending, by the Home Gatekeeper, a mobility unbinding message (UbRQ) to the Visited Gatekeeper; and broadcasting/multicasting/unicasting/sending, by the Visited Gatekeeper, a mobility unbinding confirmation/rejection (UbCF/UbRJ) to the Home Gatekeeper.
- UbRQ mobility unbinding message
- UbCF/UbRJ mobility unbinding confirmation/rejection
- the H.323-based mobility wherein at least one Visiting/Foreign Gatekeeper utilizes a combined Home/Visitor Location Database.
- the H.323-based mobility wherein a plurality of Visiting/Foreign Gatekeepers each utilize an individual Visitor Location Database and share a Home Location Database.
- This invention provides a communication link between a telephone device and/or another telephone device(s) and/or server(s). It also allows for programming a telephone device to accept or reject communications between administrative domains. This invention also allows a mobile entity unit to be in communication with a telephone network, especially when a user moves between different administrative domains.
Abstract
The present invention relates to a method and apparatus for inter-domain mobility management for a telephony network. The present invention also relates generally to the H.323 standard for transmitting audio and video data streams, and more particularly to extending the H.323 standard to support mobility in a multimedia communication system with services over packet-based networks.
Description
- This application claims the benefit of U.S. Provisional Application No. 60/201,195, entitled “Framework for H.323 inter-domain mobility management”, filed May 2, 2000, and is also related to “H.323 Mobility Architecture for Terminal User and Service Mobility”, U.S. patent application Ser. No. 09/642,279, filed Aug. 18, 2000, “Intelligent Signaling Scheme for Computer-Readable Medium for H.323 Mobility Architecture”, U.S. patent application Ser. No. 09/642,298, filed Aug. 18, 2000, and “H.323 Mobility Protocol for Terminal User and Service Mobility”, U.S. patent application Ser. No. 09/642,142, filed Aug. 18, 2000, all assigned to the assignee of the instant application, and the disclosure of each is hereby entirely incorporated herein by reference.
- The present invention relates to a method and apparatus for inter-domain mobility management for a telephony network. The present invention also relates generally to the H.323 standard for transmitting audio and video data streams, and more particularly to extending the H.323 standard to support mobility in a multimedia communication system with services over packet-based networks.
- A framework on how the inter-domain communications need to be done in H.323 for mobility management has been provided in the context of the existing H.225.0 Annex G standard, as disclosed in ITU-T Recommendation H.225.0 Annex G (1999), “Communications Between Administrative Domains”. The communication flows for mobility management considering the BE (Border Elements), Gatekeepers (GKs), Home location function (HLFs), and domains where each entity can be arranged in any logical architectural relationship: Centralized, Distributed, and/or Hybrid Architecture. ITU-T Recommendation H.323 describes terminals and other entities that provide multimedia communications services over packet based networks (PBN) which may not provide a guaranteed Quality of Service. H.323 entities may provide real-time audio, video and/or data communications. Support for audio is mandatory, while data and video are optional, but if supported, the ability to use a specified common mode of operation is required, so that all terminals supporting that media type can interwork.
- The inter-domain mobility management of this invention needs to be independent of the underlying architectural configurations and is not “hard-wired” for any particular configuration of any architectural or functional entity as done in the prior art.
- The new messages for mobility management within a domain has been proposed for H.225.0 RAS (Intra-domain communication) messages. Similarly, for inter-domain mobility management we need to extend H.225.0 Annex G, as disclosed in ITU-T Recommendation H.225.0 Annex G (1999), “Communications Between Administrative Domains.” The new messages, such as, disclosed in R. R. Roy, AT&T, “H.323 Mobility Architecture and Protocol for Terminal, User, and Service Mobility,” D-354, ITU-T SG 16 Q.13/16, WP2, Geneva, Switzerland, Feb. 7-18, 2000, the disclosure of which is entirely incorporated herein by reference, required for mobility binding and updating will also be applicable for inter-domain communication with additional parameters like hopcounts and others in the header as required per H.225.0 Annex G.
- In addition, the existing H.225.0 RAS messages like LRQ (Location Request) such as, disclosed in R. R. Roy, AT&T, “H.323 Mobility Management Services, Scenarios, and Information Flows in an Administrative Domain,” MD012, Ad Hoc Mobility Conference Call, February-May 2000, have been extended to manage mobility for intra-domain communications. Similarly, the messages like accessRequest and others of H.225.0 Annex G are also need to be extended for inter-domain mobility management as described in this embodiment. However, the mobility related parameters that specify the information related to the mobile entity used in the LRQ and call signaling messages of H.225.0 RAS/Q.931 also need to be passed to the accessRequest and other messages of H.225.0 Annex G while the mobile entity is visiting a foreign domain.
- It is also the critical need for a mobile entity to have an option whether it will let others to know its present location in a foreign domain because of security or other reasons while it is away from its home domain. If the mobile entity does not want to make its address public while it is visiting in a foreign domain, the communications need to be done via mobile entity's home network address that it may want make to public.
- Originally, the International Telecommunications Union (ITU) developed H.323 as an adaptation of H.320, which addresses videoconferencing over ISDN and other circuit-switched networks and services. ITU-T Recommendation H.320 describes terminals and other entities that provide multimedia communications services over circuit-switched networks which provide a guaranteed Quality of Service. H.320 entities may provide real-time audio, video and/or data communications. H.320 was ratified in 1990, and corporations expanded their networks to include Local Area Networks (LANs) and LAN gateways to the Wide Area Network (WAN). Then, H.323 was expanded beyond being an extension of H.320 so that H.323 now covers the corporate intranets and packet-switched networks in general. The ITU published a set of standards for multimedia communication over packet-based networks (PBNs) under the H.323 designation, which includes standards for data channels, monitoring channels, and control channels. It includes provision of real-time audio, video and/or data communications. The H.323 components defined by the standard include: terminals, gateways, gatekeepers and multipoint control units (MCUs). The terminals provide real-time communications, must support audio/voice communications and optionally support data and video. The most common H.323 terminals are the applications that run on a personal computer (PC). H.323 gateways provide services to H.323 clients and allow communication with non-H.323 entities, such as communication between H.323 terminals and telephone in a circuit-switched network. Gatekeepers provide call control services for H.323 endpoints, e.g., address translation and bandwidth management. Gatekeepers are optional in the H.323 standard, but, if they are present, the endpoints must use the services of the gatekeepers. The H.323 standard specifies certain mandatory services that gatekeepers, if utilized, must provide. The multipoint control units provide support for conferences of three or more endpoints by managing conference resources, manage negotiations between the endpoints to specify which audio or video code(s) to use and may manage the media stream. The H.323 standard defines how audio and video conferencing systems communicate over packet-switched networks defines call control and management practices for point-to-point and broadcast/multicast/unicast multipoint conferences, addresses QoS issues with a centralized gatekeeper that LAN administrators use to manage media traffic, bandwidth and user participation, and describes functionality that allows calls to connect from the LAN to the Public Switched Telephone Network (PST) as well as to other H.32x standards-based terminals.
- In
version 2 of the H.323 standard, video and audio data streams are compressed and packetized in accordance with a real-time transport protocol (RTP/RTCP) standard from the Internet Engineering Task Force (IETF) and are used to support video conferencing and other communications over the Internet. Packets include data and header information which facilitates detection of packet loss, detection of packet status and synchronization of the packets. The video data streams may use H.261, H.262, or H.263 protocols. Audio data streams may use G.711, G.722, G.723.1 G.728 or G.729 protocols. Generally, the H.323 standard supports teleconferencing in networks that utilize TCP/IP, such as, for example, the Internet. - The H.323 system supports interoperability and assumes that users, terminals, and services are fixed. If an H.323 terminal is moved form one network to another, its point of attachment or network address changes. In this situation, the address of the mobile terminal needs to be resolved to set up a new call or continue a same call. Thus, there is a need for an H.323 mobility architecture that provides for terminal, user and service mobility for inter-domain mobility management.
- The present invention provides an H.323-based mobility protocol for real-time inter-domain mobility management for a telephony network between the administrative domains.
- Therefore, in one aspect the invention is an inter-domain mobility management method, comprising:
-
- (a) a mobile H.323 entity communicating information related to the mobile entity with a first gatekeeper in a first administrative domain;
- (b) said first gatekeeper being unable to verify information on said mobile H.323 entity and sending information to a first border element within said first administrative domain;
- (c) said first border element communicating information with a second border element in a second administrative domain to resolve said information related to the mobile entity;
- (d) said second border element communicates back with said first border element with information to resolve said information related to the mobile entity;
- (e) said second border element accepting said resolved information related to the mobile entity and communicates said information with said mobile H.323 entity via said first gatekeeper.
- In another aspect the invention is an inter-domain mobility management method, comprising:
-
- (a) a mobile H.323 entity communicating information related to the mobile entity with a first gatekeeper in a first administrative domain having a first backend services;
- (b) said first gatekeeper being unable to verify information on said mobile H.323 entity and sending information to a first border element within said first administrative domain;
- (c) said first border element communicating information with a second border element in a second administrative domain to resolve said information related to the mobile entity;
- (d) said second border element obtains information from a second backend services in said second administrative domain and communicates back with said first border element with information to resolve said information related to the mobile entity;
- (e) said second border element accepting said resolved information related to the mobile entity and communicates said information with said mobile H.323 entity via said first gatekeeper.
- In yet another aspect the invention is an inter-domain mobility management method, comprising:
-
- (a) a mobile H.323 entity communicating information related to the mobile entity with a first gatekeeper in a first administrative domain having a first backend services;
- (b) said first gatekeeper being unable to verify information on said mobile H.323 entity and sending information to a first border element within said first administrative domain;
- (c) said first border element communicating information with a first backend services to resolve said information related to the mobile entity, wherein said first backend services is shared with both said first administrative domain and a second administrative domain;
- (d) said second border element obtains information from said first backend services in said first and said second administrative domain and communicates it back to said first border element with information to resolve said information related to the mobile entity;
- (e) said second border element accepting said resolved information to related to the mobile entity and communicates said information with said mobile H.323 entity via said first gatekeeper.
- In still another aspect the invention is an inter-domain mobility management method, comprising:
-
- (a) a mobile H.323 entity communicating information related to the is mobile entity with a first gatekeeper in a first administrative domain having a first backend services;
- (b) said first gatekeeper being unable to verify information on said mobile H.323 entity and sending information to a first border element within said first administrative domain;
- (c) said first border element communicating information with a second border element in a second administrative domain to resolve said information related to the mobile entity;
- (d) said second border element obtains information from a second backend services in said second administrative domain via at least one gatekeeper in said second administrative domain and communicates back with said first border element with information to resolve said information related to the mobile entity;
- (e) said second border element accepting said resolved information related to the mobile entity and communicates said information with said mobile H.323 entity via said first gatekeeper.
- In still yet another aspect the invention is an inter-domain mobility management method, comprising:
-
- (a) a mobile H.323 entity communicating information related to the mobile entity with a first gatekeeper in a first administrative domain having a first home location function;
- (b) said first gatekeeper being unable to verify information on said mobile H.323 entity and sending information to a first border element within said first administrative domain;
- (c) said first border element communicating information with a second border element in a second administrative domain to resolve said information related to the mobile entity;
- (d) said second border element obtains information from a second home location function in said second administrative domain and communicates back with said first border element with information to resolve said information related to the mobile entity;
- (e) said second border element accepting said resolved information related to the mobile entity and communicates said information with said mobile H.323 entity via said first gatekeeper.
- In yet another aspect the invention is an inter-domain mobility management method, comprising:
-
- (a) a mobile H.323 entity communicating information related to the mobile entity with a first gatekeeper in a first administrative domain having a first home location function;
- (b) said first gatekeeper being unable to verify information on said mobile H.323 entity and sending information to a first border element within said first administrative domain;
- (c) said first border element communicating information with a second border element in a second administrative domain to resolve said information related to the mobile entity;
- (d) said second border element obtains information from a second home location function in said second administrative domain via at least one gatekeeper in said second administrative domain and communicates back with said first border element with information to resolve said information related to the mobile entity;
- (e) said second border element accepting said resolved information related to the mobile entity and communicates said information with said mobile H.323 entity via said first gatekeeper.
- In still another aspect this invention is an H.323-based mobility protocol for real-time mobile multimedia communications and conferencing over packet-based networks by a Mobile Terminal/Node/Entity having a Home Gatekeeper/Home Database, comprising the steps of:
-
- upon becoming mobile and initiating an H.323 communication that includes at least one of: audio, video and data, by the Mobile Terminal/Node/Entity, with respect to notification, one of:
- providing, by at least one of a plurality of available H.323 Visiting/Foreign Gatekeepers in a first administrative domain, notification of H.323 mobility services availability by periodically broadcasting/multicasting/unicasting a Mobility Gatekeeper Advertisement; and
- where the Mobile Terminal/Node/Entity lacks notification of H.323 mobility services availability, broadcasting/multicasting/unicasting/sending, by the Mobile Terminal/Node/Entity, a message to the Home Gatekeeper/Home Location Database in a second administrative domain, which notifies H.323 Visiting/Foreign Gatekeepers that the Mobile Terminal/Node/Entity needs H.323 mobility services and notifying, by the H.323 Visiting/Foreign Gatekeepers, to the Mobile Terminal/Node/Entity of available H.323 Visiting/Foreign Gatekeepers within the first administrative domain;
- registering, by the Mobile Terminal/Node/Entity, with a H.323 Visiting/Foreign Gatekeeper of the available H.323 Visiting/Foreign Gatekeepers that support H.323 mobility services; and
- providing, for the Mobile Terminal/Node/Entity by the H.323 Visiting/Foreign Gatekeeper with which the Mobile Terminal/Node/Entity is registered, support for the H.323 communication that includes at least one of: audio, video and data.
- In yet another aspect this invention is a computer-readable medium having computer-executable steps for implementing, by a Mobile Terminal/Node/Entity, an H.323-based mobility protocol for real-time mobile multimedia communications and conferencing over packet-based networks wherein a plurality of H.323 gatekeepers provide notification of H.323 mobility services availability by periodically broadcasting/multicasting/unicasting a Mobility Gatekeeper Advertisement, comprising the computer-executable steps of:
-
- where the Mobile Terminal/Node/Entity becomes mobile and initiates an H.323 communication that includes at least one of: audio, video and data, by the Mobile Terminal/Node/Entity, with respect to notification, one of:
- providing, by at least one of a plurality of available H.323 Visiting/Foreign Gatekeepers within a first administrative domain, notification of H.323 mobility services availability by periodically broadcasting/multicasting/unicasting/sending a Mobility Gatekeeper Advertisement; and
- where the Mobile Terminal/Node/Entity lacks notification of H.323 mobility services availability, broadcasting/multicasting/unicasting/sending, by the Mobile Terminal/Node/Entity, a message to the Home Gatekeeper/Home Location Database in a second administrative domain, which notifies H.323 Visiting/Foreign Gatekeepers that the Mobile Terminal/Node/Entity needs H.323 mobility services and notifying, by the H.323 Visiting/Foreign Gatekeepers, to the Mobile Terminal/Node/Entity of available H.323 Visiting/Foreign Gatekeepers within the first administrative domain;
- registering, by the Mobile Terminal/Node/Entity, with a H.323 Visiting/Foreign Gatekeeper of the available H.323 Visiting/Foreign Gatekeepers that support H.323 mobility services; and
- providing, for the Mobile Terminal/Node/Entity by the H.323 Visiting/Foreign Gatekeeper with which the Mobile Terminal/Node/Entity is registered, support for the H.323 communication that includes at least one of: audio, video and data.
- The features of the invention believed to be novel and the elements characteristic of the invention are set forth with particularity in the appended claims. The drawings are for illustration purposes only and are not drawn to scale. Furthermore, like numbers represent like features in the drawings. The invention itself, however, both as to organization and method of operation, may best be understood by reference to the detailed description which follows taken in conjunction with the accompanying drawings in which:
-
FIG. 1 illustrates an embodiment of the Inter-Domain Mobility Management system of this invention which illustrates communications between two administrative domains. -
FIG. 2 illustrates another embodiment of the Inter-Domain Mobility Management system of this invention with backend services. -
FIG. 3 illustrates yet another embodiment of the Inter-Domain Mobility Management system of this invention where requests are resolved by the backend server shared among multiple administrative domains. -
FIG. 4 illustrates still another embodiment of the Inter-Domain Mobility Management system of this invention where requests are resolved by the backend server not shared among multiple administrative domains. -
FIG. 5 illustrates yet another embodiment of the Inter-Domain Mobility Management system of this invention using centralized home location function servers/databases. -
FIG. 6 illustrates still another embodiment of the Inter-Domain Mobility Management system of this invention using distributed home location function servers/databases. - The present invention provides for extending the H.323 standard to support mobility in a multimedia communication system with services over packet-based networks. The present H.323 standard is known to those skilled in the art and is hereby incorporated by reference. The invention supports extending H.323 to support mobility in a transport independent way, create new H.323 messages and/or message elements that needed to support mobility, and facilitate interoperability for implementation of H.323 mobility over specific networking environments such as wireless/PSTN-IP-LAN. The invention provides for extension to existing H.225.0 (H.323) messages to accommodate mobility. Messages are provided to facilitate mobility binding as the mobile entity moves form one place to another. H.323 mobility service varies from traditional services such as cellular wireless/PSTN, and mobile IP, mobility services in that the IETF=s mobile protocol may be modified to include an interworking function (IWF) to provide interoperability between the mobile H.323 system and the wireless-PSTN mobile network.
- When a mobile unit implementing H.323 uses a packet-based network, e.g., the IP subnet, together with an H.323-based point of attachment (e.g., network point of attachment, zone, domain), the mobility information is managed via a gatekeeper. There may be a gatekeeper at the transmitting end and at the receiving end also. If necessary, the gatekeeper can also perform bandwidth management, address translation, maps LAN aliases to IP addresses, and sets up a real-time transport control protocol (RTCP) for exchanging status information between the transmitting end and the receiving end. A H.245 control channel is set up to provide control functions such as, for example, opening and closing data channels.
- The functional requirements of H.323 mobility are primarily described at the H.323 application level as:
- Terminal Mobility: the ability for a terminal to changes location, network point of attachment, and H.323 point of attachment and still be able to communicate. A fixed or mobile H.323 terminal must be able to reach an H.323 mobile user and vice versa. Conversations are provided even when the mobile terminal moves from one place to another with a different point of attachment or network address. Where desired, communications are also provided among the H.323 mobile users. Intra-zone, inter-zone (intra-domain) and/or inter-domain handoff is supported. Handoff between intra-zone, inter-zone (intra-domain) and or inter-domain users is supported.
- User Mobility: the ability for a user to maintain the same user identity on different terminals or terminal types. An H.323 user maintains the same identity and may receive the same or, where desired, different services even when the user moves. Service providers may be switched with the user maintaining the same identity.
- Mobility Management: The H.323 mobility management is supported to provide registration, call establishment, roaming and handoff.
- QoS Support: QoS service is maintained during intra-zone, inter-zone (intra-domain) and/or inter-domain roaming for the H.323 user.
- Authentication and Security: Authentication and security mechanisms are provided in support of H.323 mobility.
- Typically, a gatekeeper (GK) manages a zone. A zone is generally a collection of H.323 entities such as terminals, gateways (GWs) or interworking functions (IWFs) and multi-point controllers (MCs). Each H.323 entity has a unique network point of attachment or address, and each zone may contain many network points of attachment, subnets, or addresses under the management of a GK. For example, a zone many have multiple networks in the case of an IP, ATM, or other network. If a user or terminal moves within a zone, its network attachment or subnetwork address may also change.
- A domain may consist of a single or of multiple zones. Thus, H.323 mobility is addressed in terms of zones and domains as well. If an H.323 user, entity or terminal crosses a zone boundary, such a change may be termed as a change of H.323 point of attachment because an H.323 gatekeeper manages the registration of all H.323 entities in a given zone. In addition, H.323 services are ensured during the call and between calls while users or terminals move from place to place.
- Other terminology used herein is:
- Discrete terminal mobility or roaming: the ability for a terminal to make discrete changes of physical location, i.e., to change location while no media streams are active to Continuous terminal mobility or handover: the ability for a terminal to change location while media streams are active. Such a change may be seamless, i.e., without loss of data, or alternatively, may not be seamless, i.e., wherein some media stream data is lost.
- Service mobility: the ability for a user to obtain a particular service independent of user and terminal mobility, i.e., wherein a foreign network has the means to obtain the parameters required for the service.
- Network Point of Attachment: the attachment or address, e.g., an IP address, of an H.323 entity, e.g., terminals, MCUs, MCs, and/or GWs, to a network. Similarly, the network point of attachment for ATM and other network can also be defined. Each H.323 entity has at least one network address which uniquely identifies the H.323 entity on the network. The address is specific to the network environment in which the endpoint is located. Different network environments may have different network address formats. H.323 permits an endpoint to use different network addresses for different channels within the same call.
- H.323 Point of Attachment: the gatekeeper with which an H.323 terminal, GW (IWF), MC, or MCU is Databased.
- Mobile Entity: the H.323 entity that changes its point of attachment (network and/or H.323 point of attachment) from one attachment to another. A mobile entity can continue to communicate with other H.323 entities at any location as it moves from place to place.
- Home GK: a gatekeeper in the mobile entity's home zone which performs the necessary management functions for departed mobile entities and maintains current location information for each. Any H.323 GK that provides the support for H.323 mobile entities can act as a home GK.
- Home Network: the network in the mobile entity's home network and the network which has been declared by the mobile entity as its home network, e.g., an IP subnetwork in the home zone declared as a home network by a mobile entity.
- Home Network Address: the address of the network point of attachment in the home network of a mobile entity, e.g., IP address (RAS transport address) in a home IP subnetwork. If the transport address contains the network address in addition to the TSAP, the home transport address will also contain the home network address.
- Foreign GK: a gatekeeper on a mobile entity's visited- or visiting-zone which cooperates with the home GK to have the information related to the mobile entity while it is away from its home zone. Any H.323 GK that provides the support for H.323 mobile entities can act as a foreign GK.
- Foreign Network: the network in the mobile entity's foreign zone where the said network has been declared by the mobile entity as its foreign network, e.g., an IP subnetwork in a foreign zone of a mobile entity.
- Care-of Network Address: the address of the network point of attachment in a foreign network of a mobile entity, e.g., IP address (RAS transport address) in a foreign IP subnetwork. If the transport address contains the network address in addition to the TSAP, the care-of transport address will also contain the care-of network address.
- Visiting GK: a foreign GK that the mobile entity is presently visiting, i.e., the mobile entity is currently residing within a foreign zone that is managed by a foreign GK.
- Visited GK: the foreign GK that had been visited by the mobile entity previously.
- Target GK: the foreign GK that the mobile entity intends to visit.
- Target Network: the target network that the mobile entity intends to visit.
- Mobile GK: either a home GK or a foreign GK.
- Home Zone: a zone that is managed by a home GK of a mobile entity.
- Foreign Zone: a zone managed by a foreign GK.
- Visiting Zone: a zone other than a mobile entity's home zone in which the mobile entity is currently residing, i.e., a foreign zone in which the mobile entity is presently visiting.
- Visited Zone: a zone other than a mobile entity's home zone that the mobile entity has visited previously, i.e., the foreign zone which had been visited by the mobile entity previously.
- Target Zone: a zone other than a mobile entity's home zone that the mobile entity intends to visit.
- Visiting Entity: a mobile entity that is residing in a visiting zone managed by a visiting GK.
- Visiting Terminal: a mobile H.323 terminal that is residing in a visiting zone managed by a visiting GK. Visiting User: a mobile H.323 terminal that is residing in a visiting zone managed by a visiting GK.
- Visitor List: the list of mobile entities currently visitng a foreign zone.
- GK Advertisement for Mobility Services: foreign gatekeepers advertise their presence by using a special message to provide services for mobile entities.
- Care-of Address: the terminal address of the point of attachment, e.g., care-of network address of mobile entity or care-of address of a foreign GK where a mobile entity is residing.
- There are two different types of care-of address: a foreign GK care-of address with which a mobile entity is Databased; a care-of network address which the mobile entity has associated with one of its own network interfaces, e.g., a temporary IP address of the visitor may be acquired dynamically using the Dynamic Host Configuration Protocol (DHCP).
- Location Area: a location area may constitute a cell or a certain group of cells in a given geographical area that resides within a zone.
- Administrative Domain: An administrative domain is a collection of H.323 entities administered by one administrative entity and may contain one or more gatekeepers (that is, one or more zones). It may also contain one or more border elements for communications between the domains. Like zone, an administrative domain can also be termed as home or foreign (visited, visiting, or target) domain.
- Mobile H.323 (Mobile H.323 Protocol): the extended and existing H.323/H.225.0/H.245 messages that are used to support mobility in H.323 are termed as mobile H.323 protocol or simply as mobile H.323.
- Clearly, H.323 mobility provides two kinds of changes in point of attachment: changing Network Point of Attachment in H.323 to H.323 calls (it can also be termed as a part of change in H.323 point of attachment), and changing H.323 Point of Attachment (e.g., change in zone or domain). Broadly speaking, both kinds of change in attachment can be termed as change in H.323 point of attachment. The change of attachment can also occur during calls, i.e., handover, and between calls, e.g., roaming. A change in point of attachment, e.g., a change in IP address or a change in zone/domain boundary, may result in handover during the call.
-
FIG. 1 illustrates an embodiment of the Inter-Domain Mobility Management system of this invention which illustrates communications between two administrative domains.Administrative domain 10 has a GK/BE 1b 12, aGK 1a 14 and aGK 1c 16.Administrative domain 20 has a GK/BE 2b 22, aGK 2a 24 and aGK 2c 26. A mobile H.323entity 28 contacts theGK 2c 26 after moving fromadministrative domain 10 toadministrative domain 20. Basically, themobile entity 28 will discover the gatekeeper (GK) and then communicate with the gatekeeper (GK) for registration using the procedures as described in ITU-T Recommendation H.323, such as,GK 2c 26 of theadministrative domain 20 of a given administrative domain. The Gate-keeper (GK) 26, will find from the registration request message that the mobile user has moved from another administrative domain and needs to communicate with the other administrative domain. As result,GK 2c 26 of theadministrative domain 20 will then communicate with a border element (BE) 22 of thatadministrative domain 20 as appropriate depending on the needs dictated by the optimal routing so that minimal resources are used. The border element (BE) 22 will then communicate with another border element (BE) 12 ofadministrative domain 10 for resolving the information (e.g., address, registration, verification, authentication, etc.). - Gatekeeper discovery is the process an endpoint uses to determine which Gatekeeper to register with. This may be done manually or automatically. Manual discovery relies on methods outside the scope of this recommendation to determine which Gatekeeper an endpoint is associated with. The endpoint may multicast (or use other methods as described in Appendix IV/H.225.0) a Gatekeeper Request (GRQ) message, asking “Who is my Gatekeeper?”. This is sent to the Gatekeeper's well-known Discovery Multicast Address. One or more Gatekeepers may respond with the Gatekeeper Confirmation (GCF) message indicating “I can be your Gatekeeper.”, and return the Transport Address of the Gatekeeper's RAS Channel. If a Gatekeeper does not want the endpoint to register to it, it shall return Gatekeeper Reject (GRJ).
- It should be appreciated that
FIG. 1 shows the logical communications model between the two administrative domains where no backend services (BES) are considered. BES provide additional value-added services, such as, for example, permanent and/or temporary address resolution/allocation services, authentication, and others using the database/server not defined in H.323 and also not shown inFIG. 1 . -
FIG. 2 illustrates another embodiment of the Inter-Domain Mobility Management system of this invention which basically describes the communications flow when the backend services (BES) (e.g., home location functions (HLFs)) are considered. LikeFIG. 1 , it is assumed thatmobile entity 28 has moved fromadministrative domain 30 toadministrative domain 40 and performs the GK discovery and registers with theGK 2c 26 using H.323 procedures as described earlier. The relationships for communications between border elements (BEs) and backend services (BES) (e.g., home location function (HLFs)) and gate keepers (GKs) needs to be done in accordance with H.323 standards. The backend services (BES) of a given administrative domain can equally be accessed by both the gatekeeper (GK) and the border element (BE). However, a user can send the request for any services via the gatekeeper (GK). Upon receipt of a request for backend services the GK will examine the request and will determine that the user has moved from another administrative domain and that the related service information needs to be known from the earlier BES that is not located in thisdomain 40. Then the gatekeeper (GK) decides how the backend services (BES) can be accessed to another administrative domain using the Border elements (BEs). Depending on the configuration between the administrative domains optimal routing will be provided to optimize the resource utilization. Normally the Border element (BE) is accessed if the services information needs to be resolved from another administrative domain. In this contextFIG. 2 shows that the backend services (BES) are being accessed from another administrative domain via the border elements (BEs). As described earlier, a user or mobile H.323entity 28 needs to send the service request to the GK where the user or H.323 mobile entity has registered. As a result, when theuser 28 entersadministrative domain 40, the communication is sent to agatekeeper 26, which routes it to theborder element 22. The communication is then sent toborder element 12 inadministrative domain 30 and then routed tobackend services 32. The request that is sent from the mobile user or H.323mobile entity 28 located inadministrative domain 40 to theBES 1b 32 viaGK 26, BE 22, and BE 12, is resolved inBES 32 ofadministrative domain 30 and, a reply is sent back by theBES 32 to themobile entity 28 viaBE 12, BE 22, andGK 26.Administrative domain 30 will have a plurality ofgatekeepers Administrative domain 40 will have a plurality ofgatekeepers FIG. 2 also shows that the backend services (BES) (e.g., home location functions (HLFs)) information resolution is provided from another administrative domain for an H.323 mobile entity if the information is not available in a given administrative domain. -
FIG. 3 illustrates yet another embodiment of the Inter-Domain Mobility Management system of this invention where the backend services (BES) (e.g., home location function (HLFs)) overlap or are common to both the administrative domains, and where requests are resolved by the backend server shared among multiple administrative domains.FIG. 3 shows a configuration 50 where a given back end services (BES)server 55 is being shared or is common between the two administrative domains, namely,administrative domain 30 andadministrative domain 40. It should also be noted that there may be other back end services (BES) servers in those domains whose services are not being shared. As a result, the services from the non-sharing back end services (BES) server has to be accessed using the normal procedure of the H.323 protocol via gatekeepers (GKs) and/or border elements (BEs). Also shown is a mobile H.323entity 38 in the administrative domain that would also be sharing the back end services (BES)server 55, and getting similar information whether it is within the home domain or in a foreign domain. -
FIG. 4 illustrates still another embodiment of the Inter-Domain Mobility Management system of this invention showing the accessing of a non-sharing back end services (BES) server in two overlapping administrative domains. The non-shared backend services (BES) server (e.g., BES1a 34) needs to be accessed although a given back end services (BES) server (or servers) may be shared because of the overlapping administrative domains, and where requests are resolved by the backend server not shared among multiple administrative domains.FIG. 4 also illustrates how the inter-domain communication needs to be done in the context of H.323 communications protocol. The H.323 signaling messages for inter-domain communications flows from the border element (BEs) 22, to theborder element 12 between theadministrative domains server BES 1a 34 is then accessed although thegatekeeper 14. However, it should be understood that a given back end services (BES) server (or servers) may be shared because of the overlapping administrative domains, and where requests are resolved by the backend server and are not shared among multiple administrative domains. The services from a back end server (BES) 34 can only be requested by an H.323endpoint mobile entity - Inter-zone communications and the inter-domain communications will also need the following: (a) Gate-keeper (GK) discovery and identification whether it is in its home domain or in foreign domain, (b) Registration with the gate keeper (GK), (c) Location updates, (d) Smooth location updates, (e) Call establishment.
- Communications between the administrative domains are done via border elements (BEs) and gate-keepers (GKs) when there are back end services (BES) servers as discussed earlier. The back end services (BES) server resides behind the gate-keepers (GKs) and border elements (BEs). The home location function (HLF) and visitor location function (VLF) are also considered as back end services (BES) servers that are used for storage of information related to mobility. The relationship between the border elements (BEs), home location function (HLFs), visitor location function (VLFs), and gate keepers (GKs) for H.323 communications protocol is the same as described in the context of Back end services (BES) servers.
-
FIG. 5 illustrates yet another embodiment of the Inter-Domain Mobility Management system of this invention using a centralized home location function (HLF) server/database.FIG. 5 also shows the communications flows when a mobile entity moves from one administrative domain to another where each domain has only one home location function (HLF) configured in a centralized architecture. In this embodiment the mobile entity discovers the gatekeeper (GK2c) and finds that its is in a foreign (visiting) domain. Then the mobile entity proceeds with registration with the gatekeeper (GK) (GK2c). The gatekeeper (GK2c) finds that mobile H.323entity 28 is a visitor and keeps the information in the visitor location function (VLF) (not shown inFIG. 5 for simplicity). There can be some communications between the visitor location function (VLF), GK2 c, and HLF2 b to find out if mobile H.323entity 28 is a visitor from another domain (similar one described in R. R. Roy, AT&T, “H.323 Inter-Zone Mobility Management,” MD018, Ad Hoc Mobility Conference Call, February-May 2000, the disclosure of which is entirely incorporated herein by reference, in the context of inter-zone mobility management), and the communication flow between gatekeeper and gatekeeper from or within one domain has not been shown inFIG. 5 for simplicity. Then,GK2 c 26 contacts the border element (GK/BE2 b) 22 to contact theadministrative domain 75 for verifying the visitor's profile. The border element (GK/BE2 b) 22 of theforeign domain 75 being unable to provide the information related to the mobile H.323entity 28 then contacts the border element (GK/BE1 b) 12 of mobile entity'shome domain 70. There is only one home location function (HLF) 72 in the homeadministrative domain 70 because of the centralized configuration, and GK/BE1 b 12 communicates withHLF1 b 72 directly to verify the profile of themobile entity 28 that is currently residing inadministrative domain 75. The information is then sent back from thehome domain 70 to the foreign (visiting)administrative domain 75 after verifying the profile of themobile entity 28. (These information flows are not shown inFIG. 5 for simplicity.)Administrative domain 75 may have additional home location functions HLF2 b (78) that may be available for additional information. -
FIG. 6 illustrates still another embodiment of the Inter-Domain Mobility Management system of this invention showing the inter-domain communication flow using distributed home location function (HLF) servers/databases.FIG. 6 also shows a configuration for communications between the two administrative domains where the home location function (HLF) function is distributed in a domain. The communications scenarios are almost similar as shown inFIG. 5 , but with the difference that a gate-keeper (GK) has the intelligence to decide which home location function (HLF) is needed to be accessed for resolving the information. However, how the decision is made by the gatekeeper (GK) for contacting a particular gate keeper (GK) and/or home location function (HLF) is not the subject of standardization. For example, when the border element (GK/BE2 b) 22 of the foreign (visiting)domain 75 communicates with border element (GK/BE1 b) 12 of the homeadministrative domain 70, GK/BE1 b 12 decides that this particularmobile entity 28 is managed by GK1 a 14 and contacts GK1 a 14. The gatekeeper (GK1 a) 14 will then communicate with HLF1 a 84 to verify the profile of themobile entity 28 that is currently residing in aforeign domain 90. The information relating to themobile entity 28 that is obtained is then routed back from the homeadministrative domain 80 to the foreignadministrative domain 90. This information relating to themobile entity 28 may be temporarily or permanently stored in HLF2 b 92 in the foreignadministrative domain 90. Bothadministrative domains - It may be noted that the communications between the visitor location function (VLF) and home location function (HLF) after registration of the mobile entity in a visiting (foreign) domain in view of the distributed Home location function (HLF) will be almost similar to that described in AT&T's contribution for inter-zone mobility management, namely, R. R. Roy, AT&T, “H.323 Inter-Zone Mobility Management,” MD018, Ad Hoc Mobility Conference Call, February-May 2000, the disclosure of which is entirely incorporated herein by reference.
- In R. R. Roy, AT&T, AH.323 “Mobile Communications Environments and Intra-Zone Mobility Management,” MD017, Ad Hoc Mobility Conference Call, February-May 2000, and R. R. Roy, AT&T, “Needs for Creation of New Mobility Binding Messages Exclusively for H.323 Mobility Management”, APC-1769, SG16, Q.13/16, WP2, Osaka, Japan, May 15-19, 2000, the disclosures of which are entirely incorporated herein by reference, it has been explained why there is a need for creation of separate signaling messages for mobility binding and updating in addition to extensions of existing messages to support mobility. The characteristics of the mobility binding and updating messages are such that the existing H.323 signaling messages do not have the properties to satisfy those requirements. The new mobility binding and updating messages proposed in contribution, such as, R. R. Roy, AT&T, “H.323 Mobility Architecture and Protocol for Terminal, User, and Service Mobility,” D-354, ITU-
T SG 16 Q.13/16, WP2, Geneva, Switzerland, Feb. 7-18, 2000, the disclosure of which is entirely incorporated herein by reference, can also be used for inter-domain communications. - However, the existing accessRequest and other messages of H.225.0 Annex G, for inter-administrative domain communications also need to be extended to support mobility. It may be noted that we still need to create new messages for mobility binding and updating as suggested in R. R. Roy, AT&T, “H.323 Mobility Architecture and Protocol for Terminal, User, and Service Mobility,” D-354, ITU-
T SG 16 Q.13/16, WP2, Geneva, Switzerland, February 7-18, 2000, the disclosure of which is entirely incorporated herein by reference. - The new messages that support mobility binding and updating has been proposed in R. R. Roy, AT&T, “H.323 Mobility Architecture and Protocol for is Terminal, User, and Service Mobility,”. D-354, ITU-
T SG 16 Q.13/16, WP2, Geneva, Switzerland, Feb. 7-18, 2000, the disclosure of which is entirely incorporated herein by reference. The same messages can be used for both intra-domain and inter-domain communications. For inter-domain communications additional message headers like hopcount and others need to be added. - Like LRQ (Location Request), we also need to extend the accessRequest and few other messages to indicate where the RAS (Registration, Admission, and Status) and call signaling addresses need to be sent for the mobile entity while the mobile entity will move from one place to another. Moreover, a mechanism that allows whether the mobile entity will let others know its actual location other than its original home network address for a single, multiple or all media (may be based subscription policy like security or otherwise) while it is in a foreign domain is also need to be kept as an option.
- It has clearly been articulated how the inter-domain communications need to be made to manage mobile entity users that conforms the existing H.323 standard. In particular, it has been shown that the relationship and communications flows among the border elements (BEs), gate keepers (GKs), home location function (HLFs), and visitor location function (VLFs) considering the following:
-
- (a) Border elements (BEs) can be configured as centralized, distributive, and/or hybrid architecture.
- (b) Gatekeepers (GKs) can have any architectural relationships: centralized, distributive, and/or hybrid architecture.
- (c) Home location function (HLFs) that are considered as the backend servers behind the Border elements (BEs) and Gate keepers (GKs) can also be arranged in any architectural relationship with respect to the Border elements (BEs) and Gate keepers (GKs): centralized, distributive, and/or hybrid architecture.
- (d) The administrative domains can also be arranged logically among themselves in any form: centralized, distributive, and/or hybrid architecture.
- (e) The overlapping administrative domains that can have the shared backend services (e.g., Home location function (HLF)).
- The inter-domain communications protocol for mobility management needs to be robust enough to satisfy all probable configurations of all functional entities (e.g., border elements (BEs), gate keepers (GKs), home location function (HLFs), visitor location function (VLFs), zones, domains) whether each architectural element is configured as centralized, distributed, and/or hybrid manner. However, the back end services (BES) server (e.g., home location function (HLF)) to back end services (BES) (e.g., home location function (HLF)) server communications protocol is not the scope of H.323.
- The invention provides a framework how the inter-domain communications need to be done in H.323 for mobility management. It has been shown the communication flows for mobility management considering the border elements (BEs), gate keepers (GKs), home location function (HLFs), and domains where each entity can be arranged in any logical architectural relationship: centralized, distributed, and/or hybrid architecture.
- In addition, the messages like accessRequest and other are also need to be extended to let know the RAS and the call signaling addresses of the mobile entity while it is visiting a foreign domain. Furthermore, it is the critical need for a mobile entity to have an option whether it will let others to know its present location in a foreign domain while it is away from its home domain because the communications can also be done via its home network address that it may want make to public.
- This invention also shows various relationships for communications between border elements (BEs), home location function (HLFs), visitor location function (VLFs), and gate keepers (GKs).
- H.225.0 Annex G provides the communications between the administrative domains via the border elements (BEs). A domain may have one or more border elements (BEs) while these border elements (BEs) may have the logical relationship, such as, (a) centralized, (b) distributed, or (c) hybrid architecture.
- A Border element (BE) is usually co-located with a gatekeeper (GK). If they are not co-located, the communications between the border element (BE) and the gatekeeper (GK) will be done using the H.225.0 RAS signaling messages (e.g., LRQ/LCF/LRJ) for the address resolution and location update.
- However, it is felt that it would be more efficient to use the H.225.0 Annex G messages between the gatekeepers (GKs) as well as between the gatekeeper (GK) and the border element (BE).
- Furthermore, the administrative domains can also be arranged among themselves, such as (a) centralized, (b) distributed, or (c) hybrid architectural relationship from logical communications point of view.
- There may also be overlapping administrative domains and more than one administrative domain that may be able to resolve a given address.
- A border element (BE) element configures itself with all address information obtaining the address templates in the following ways (a) static configuration with explicit provisioning with address templates for all zones for which it is responsible, (b) receiving descriptors containing the address information from other border elements (BEs) in response to general requests, and (c) receiving responses to specific queries.
- It is important to understand that home location function (HLFs)/visitor location function (visitor location function (VLFs)) can be accessed equally by border elements (BEs) and gatekeepers (GKs). However, a mobile entity can only communicate with the gatekeeper (GK) directly (not the border element (BE)).
- The H.323-based mobility registers with the H.323 Visiting/Foreign Gatekeeper including sending registration information for the Mobile Terminal/Node/Entity using a Base Station to Base Station Controller to Mobile Switching Center to H.323 Visiting/Foreign Gatekeeper system. Wherein registering with the at least one H.323 Visiting/Foreign Gatekeeper includes sending registration information for the Mobile Terminal/Node/Entity using a wireless/wire-line Local Area Network to Router/Switch to H.323 Visiting/Foreign Gatekeeper system. Furthermore, the registering includes the steps of broadcasting/multicasting/unicasting/sending, by the Home Gatekeeper, a Mobility Gatekeeper Advertisement (MGA) message periodically; broadcasting/multicasting/unicasting/sending a registration request message (RRQ) to the Home Gatekeeper by the Mobile Terminal/Node/Entity; and sending, by the Home Gatekeeper, a registration confirmation/registration rejection (RCF/RRJ) to the Mobile Terminal/Node/Entity. The registering steps can also include the steps of: upon determining, by the Mobile Terminal/Node/Entity, that a network point of attachment has changed/a foreign zone has been entered, broadcasting/multicasting/unicasting/sending, by the Mobile Terminal/Node/Entity, a registration request message (RRQ) to a Foreign/Visiting Gatekeeper; broadcasting/multicasting/unicasting/sending, by the Foreign/Visiting Gatekeeper, a binding update message (BuRQ) to the Home Gatekeeper; broadcasting/multicasting/unicasting/sending, by the Home Gatekeeper, a binding update confirmation/rejection (BuCF/BuRJ) to the Foreign/Visiting Gatekeeper; broadcasting/multicasting/unicasting/sending, by the Foreign/Visiting Gatekeeper, the binding update confirmation/rejection to the Mobile Terminal/Node/Entity.
- The H.323-based mobility would also include a situation wherein, where the Mobile Terminal/Node/Entity has already visited another zone regulated by a Visited Gatekeeper within the first administrative domain, registering includes: broadcasting/multicasting/unicasting/sending, by the Home Gatekeeper, a mobility unbinding message (UbRQ) to the Visited Gatekeeper; and broadcasting/multicasting/unicasting/sending, by the Visited Gatekeeper, a mobility unbinding confirmation/rejection (UbCF/UbRJ) to the Home Gatekeeper. Or, where the H.323-based Mobile Terminal/Node/Entity has already visited another zone regulated by a Visited Gatekeeper within the first administrative domain, registering would include: broadcasting/multicasting/unicasting/sending, by the Mobile Terminal/Node/Entity, a registration request message (RRQ) to a Foreign/Visiting Gatekeeper; broadcasting/multicasting/unicasting/sending, by the Foreign/Visiting Gatekeeper, a mobility unbinding update message (UbRQ) to the Visited Gatekeeper, broadcasting/multicasting/unicasting/sending, by the Visited Gatekeeper, a mobility unbinding confirmation/rejection (UbCF/UbRJ) to the Foreign/Visiting Gatekeeper; broadcasting/multicasting/unicasting/sending, by the Foreign/Visiting Gatekeeper, a provisional registration confirmation to the Mobile Terminal/Node/Terminal and broadcasting/multicasting/unicasting/sending, by the Foreign/Visiting Gatekeeper, a binding update message (BuRQ) to the Home Gatekeeper; and broadcasting/multicasting/unicasting/sending, by the Home Gatekeeper, a binding update confirmation/rejection (BuCF/BuRJ) to the Foreign/Visiting Gatekeeper.
- The H.323-based Mobile Terminal/Node/Entity having already visited another zone regulated by a Visited Gatekeeper within the first administrative domain, and wherein registration could include: broadcasting/multicasting/unicasting/sending, by the Mobile Terminal/Node/Entity, a registration request message (RRQ) to a Foreign/Visiting Gatekeeper; broadcasting/multicasting/unicasting/sending, by the Visited Gatekeeper, a mobility unbinding confirmation/rejection (UbCF/UbRJ) to the Foreign/Visiting Gatekeeper; broadcasting/multicasting/unicasting/sending, by the Foreign/Visiting Gatekeeper, a provisional registration confirmation to the Mobile Terminal/Node/Terminal and broadcasting/multicasting/unicasting/sending, by the Foreign/Visiting Gatekeeper, a binding update message (BuRQ) to the Home Gatekeeper, broadcasting/multicasting/unicasting/sending, by the Home Gatekeeper, a binding update confirmation/rejection (BuCF/BuRJ) to the Foreign/Visiting Gatekeeper; broadcasting/multicasting/unicasting/sending, by the Home Gatekeeper, a mobility unbinding update message (UbRQ) to the Visited Gatekeeper; and broadcasting/multicasting/unicasting/sending, by the Visited Gatekeeper, a mobility unbinding confirmation/rejection (UbCF/UbRJ) to the Home Gatekeeper.
- The H.323-based mobility wherein at least one Visiting/Foreign Gatekeeper utilizes a combined Home/Visitor Location Database. The H.323-based mobility wherein a plurality of Visiting/Foreign Gatekeepers each utilize an individual Visitor Location Database and share a Home Location Database.
- The H.323-based mobility wherein the communication utilizes an Internet Protocol.
- This invention provides a communication link between a telephone device and/or another telephone device(s) and/or server(s). It also allows for programming a telephone device to accept or reject communications between administrative domains. This invention also allows a mobile entity unit to be in communication with a telephone network, especially when a user moves between different administrative domains.
- While the present invention has been particularly described, in conjunction with a specific preferred embodiment, it is evident that many alternatives, modifications and variations will be apparent to those skilled in the art in light of the foregoing description. It is therefore contemplated that the appended claims will embrace any such alternatives, modifications and variations as falling within the true scope and spirit of the present invention.
Claims (23)
1-62. (canceled)
63. A method for use at a mobile node for real-time mobile multimedia communications and conferencing over an H.323-based packet network, said Mobile Node having an associated Home Gatekeeper in a first domain and said network comprising a plurality of Visiting Gatekeepers that support H.323 mobility services in a second domain, said method comprising the steps of:
if a Mobility Gatekeeper Advertisement is received, obtaining via said Mobility Gatekeeper Advertisement notification of the availability of an H.323 mobility service;
if no Mobility Gatekeeper Advertisement is received, sending a message to said Home Gatekeeper, said message initiating notification from said Home Gatekeeper to said Visiting Gatekeeper of the desirability for said H.323 mobility service;
registering said Mobile Node with said Visiting Gatekeeper; and
receiving an H.323 mobility service communication from said Visiting Gatekeeper.
64. The method of claim 63 wherein the step of registering said Mobile Node with said Visiting Gatekeeper includes sending registration information to said Visiting Gatekeeper via a wireless Base Station.
65. The method of claim 63 wherein the step of registering said Mobile Node with said Visiting Gatekeeper includes sending registration information to said Visiting Gatekeeper via a Local Area Network.
66. The method of claim 63 wherein the step of registering said Mobile Node with said Visiting Gatekeeper includes the steps of:
transmitting a registration request message to said Home Gatekeeper; and
in response to said registration request message, receiving a registration confirmation message or registration rejection message.
67. The method of claim 63 wherein the step of registering said Mobile Node with said Visiting Gatekeeper includes the steps of:
determining that a network point of attachment has changed;
broadcasting a registration request message to said Visiting Gatekeeper; and
receiving a binding update confirmation or binding update rejection message from said Visiting Gatekeeper.
68. The method of claim 63 wherein said step of registering said Mobile Node with said Visiting Gatekeeper includes:
if said Mobile Node has already visited a zone regulated by a Visited Gatekeeper within the first domain, then:
broadcasting a registration request message to said Visiting Gatekeeper; and
receiving a provisional registration confirmation from said Visiting Gatekeeper.
69. The method of claim 63 wherein said communication utilizes an Internet Protocol.
70. A computer readable medium at a Mobile Node, said computer readable medium comprising computer program instructions defining computer-executable steps for real-time mobile multimedia communications and conferencing over an H.323-based packet network, said Mobile Node having an associated Home Gatekeeper in a first domain and said network comprising a plurality of Visiting Gatekeepers that support H.323 mobility services in a second domain, said compute-executable steps comprising the steps of:
if a Mobility Gatekeeper Advertisement is received, obtaining via said Mobility Gatekeeper Advertisement notification of the availability of a H.323 mobility service;
if no Mobility Gatekeeper Advertisement is received, sending a message to said Home Gatekeeper, said message initiating notification from said Home Gatekeeper to said Visiting Gatekeeper of the desirability for said H.323 mobility service;
registering said Mobile Node with said Visiting Gatekeeper; and
receiving said H.323 mobility service communication from said Visiting Gatekeeper.
71. The computer readable medium of claim 70 wherein the computer program instructions defining the step of registering said Mobile Node with said Visiting Gatekeeper further include computer program instructions defining the step of sending registration information to said Visiting Gatekeeper via a wireless Base Station.
72. The computer readable medium of claim 70 wherein the computer program instructions defining the step of registering with said Visiting Gatekeeper further include computer program instructions defining the step of sending registration information to said Visiting Gatekeeper via a Local Area Network.
73. The computer readable medium of claim 70 wherein the computer program instructions defining the step of registering further include computer program instructions defining the steps of:
transmitting a registration request message to said Home Gatekeeper; and
in response to said registration request message, receiving a registration confirmation message or registration rejection message.
74. The computer readable medium of claim 70 wherein the computer program instructions defining the step of registering further include computer program instructions defining the steps of:
determining that a network point of attachment has changed;
broadcasting a registration request message to said one Visiting Gatekeeper; and
receiving a binding update confirmation or binding update rejection message from said one Visiting Gatekeeper.
75. The computer readable medium of claim 70 wherein the computer program instructions defining the step of registering further include computer program instructions defining the steps of:
if the Mobile Node has already visited a zone regulated by a Visited Gatekeeper within the first domain, then:
broadcasting a registration request message to said Visiting Gatekeeper; and
receiving a provisional registration confirmation from said Visiting Gatekeeper.
76. The computer readable medium of claim 70 wherein said communication utilizes an Internet Protocol.
77. A method for use at Visiting Gateway in an H.323-based packet network for real-time mobile multimedia communications and conferencing, said network comprising a plurality of Visiting Gatekeepers that support H.323 mobility services in a corresponding plurality of zones in a second domain, said method comprising one of the steps of:
a) notifying a Mobile Node of the availability of at least a first H.323 mobility service via said Mobility Gatekeeper Advertisement; and
b) receiving notification from a Home Gatekeeper in a first domain associated with said Mobile Node of the need at said Mobile Node for said at least a first H.323 mobility service; and the steps of:
registering said Mobile Node with said Visiting Gatekeeper; and
transmitting an H.323 mobility service communication to said Mobile Node.
78. The method of claim 77 wherein the step of registering said Mobile Node with said Visiting Gatekeeper includes receiving registration information for said Mobile Node via a wireless Base Station.
79. The method of claim 77 wherein the step of registering said Mobile Node with said Visiting Gatekeeper includes receiving registration information for said Mobile Node via a Local Area Network.
80. The method of claim 77 wherein the step of registering said Mobile Node with said Visiting Gatekeeper includes the steps of:
receiving a registration request message from said Mobile Node;
transmitting a binding update message to said Home Gatekeeper;
receiving a binding update confirmation message or a binding update rejection message from said Home Gatekeeper; and
transmitting said binding update confirmation message or said binding update rejection message to said Mobile Node.
81. The method of claim 77 wherein said step of registering said Mobile Node with said Visiting Gatekeeper includes:
if the Mobile Node has already visited another zone in said second domain, said another zone regulated by a Visited Gatekeeper, then:
receiving a registration request message from said Mobile Node;
transmitting a mobility unbinding update message to said Visited Gatekeeper;
receiving a mobility unbinding confirmation message or a mobility unbinding rejection message from said Visited Gatekeeper;
transmitting a provisional registration confirmation to said Mobile Node;
transmitting a binding update message to the Home Gatekeeper; and
receiving a binding update confirmation message or a binding update rejection message from said Home Gatekeeper.
82. The method of claim 77 wherein said Visiting Gatekeeper utilizes a combined Home/Visitor Location Database.
83. The method of claim 77 wherein said plurality of Visiting Gatekeepers each utilize an individual Visitor Location Database and share a Home Location Database.
84. The method of claim 77 wherein said communication utilizes an Internet Protocol.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US11/181,635 US20050250491A1 (en) | 2000-05-02 | 2005-07-14 | System and method for inter-domain mobility management |
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US20119500P | 2000-05-02 | 2000-05-02 | |
US09/847,915 US6967941B2 (en) | 2000-05-02 | 2001-05-02 | System and method for inter-domain mobility management |
US11/181,635 US20050250491A1 (en) | 2000-05-02 | 2005-07-14 | System and method for inter-domain mobility management |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US09/847,915 Division US6967941B2 (en) | 2000-05-02 | 2001-05-02 | System and method for inter-domain mobility management |
Publications (1)
Publication Number | Publication Date |
---|---|
US20050250491A1 true US20050250491A1 (en) | 2005-11-10 |
Family
ID=22744865
Family Applications (3)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US09/847,915 Ceased US6967941B2 (en) | 2000-05-02 | 2001-05-02 | System and method for inter-domain mobility management |
US11/181,635 Abandoned US20050250491A1 (en) | 2000-05-02 | 2005-07-14 | System and method for inter-domain mobility management |
US11/657,636 Expired - Lifetime USRE42920E1 (en) | 2000-05-02 | 2007-01-24 | System and method for inter-domain mobility management |
Family Applications Before (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US09/847,915 Ceased US6967941B2 (en) | 2000-05-02 | 2001-05-02 | System and method for inter-domain mobility management |
Family Applications After (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US11/657,636 Expired - Lifetime USRE42920E1 (en) | 2000-05-02 | 2007-01-24 | System and method for inter-domain mobility management |
Country Status (3)
Country | Link |
---|---|
US (3) | US6967941B2 (en) |
CA (1) | CA2405044C (en) |
WO (1) | WO2001084341A1 (en) |
Cited By (25)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20030104807A1 (en) * | 2001-12-05 | 2003-06-05 | Morihisa Momona | Mobile communication method and system |
US20080020759A1 (en) * | 2006-07-20 | 2008-01-24 | Symbol Technologies, Inc. | Techniques for home wireless switch redundancy and stateful switchover in a network of wireless switches supporting layer 3 mobility within a mobility domain |
US20090024765A1 (en) * | 2005-09-21 | 2009-01-22 | Siemens Aktiengesellschaft | Method and Arrangement for Position-Dependent Configuration of a Mobile Appliance |
US20090034470A1 (en) * | 2007-07-31 | 2009-02-05 | Symbol Technologies, Inc. | Forwarding broadcast/multicast data when wireless clients layer 3 roam across ip subnets in a wlan |
US20090251529A1 (en) * | 2008-04-02 | 2009-10-08 | Freeport Technologies | Network management server for managing multiple operating modes of a conferencing network with different sets of policies |
US20090271491A1 (en) * | 2008-04-23 | 2009-10-29 | Lemko, Corporation | System and method to control wireless communications |
US20100100639A1 (en) * | 2006-09-29 | 2010-04-22 | Electronics And Telecommunications Research Instit Ute | Method for providing internet protocol handoff of mobile node under multiple mobile agent platform environment |
US8014367B2 (en) * | 2003-11-12 | 2011-09-06 | Interdigital Technology Corporation | System for application server autonomous access across different types of access technology networks |
US20120040635A1 (en) * | 2010-08-13 | 2012-02-16 | Boucher Joseph N | Mobile Interoperability Workstation Controller Having Video Capabilities Within an Incident Communications Network |
US8140112B2 (en) | 2002-07-02 | 2012-03-20 | Interdigital Technology Corporation | Method and apparatus for handoff between a wireless local area network (WLAN) and a universal mobile telecommunication system (UMTS) |
US8224322B2 (en) | 2006-06-12 | 2012-07-17 | Lemko Corporation | Roaming mobile subscriber registration in a distributed mobile architecture |
US8310990B2 (en) | 2008-07-14 | 2012-11-13 | Lemko Corporation | System, method, and device for routing calls using a distributed mobile architecture |
US8326286B2 (en) | 2008-09-25 | 2012-12-04 | Lemko Corporation | Multiple IMSI numbers |
US8340667B2 (en) | 2008-06-26 | 2012-12-25 | Lemko Corporation | System and method to control wireless communications |
US8359029B2 (en) | 2006-03-30 | 2013-01-22 | Lemko Corporation | System, method, and device for providing communications using a distributed mobile architecture |
US8548478B2 (en) | 2003-11-13 | 2013-10-01 | Interdigital Technology Corporation | Method and system for facilitating handover from a third generation (3G) cellular communication system to a wireless local area network (WLAN) |
US8676197B2 (en) | 2006-12-13 | 2014-03-18 | Lemko Corporation | System, method, and device to control wireless communications |
US8706105B2 (en) | 2008-06-27 | 2014-04-22 | Lemko Corporation | Fault tolerant distributed mobile architecture |
US8780804B2 (en) | 2004-11-08 | 2014-07-15 | Lemko Corporation | Providing communications using a distributed mobile architecture |
US8811940B2 (en) | 2005-07-18 | 2014-08-19 | Mutualink, Inc. | Dynamic asset marshalling within an incident communications network |
US9198020B2 (en) | 2008-07-11 | 2015-11-24 | Lemko Corporation | OAMP for distributed mobile architecture |
US9380501B2 (en) | 2004-03-12 | 2016-06-28 | InterDigital Technology Corporation, Inc. | Method and system for switching a radio access technology between wireless communication systems with a multi-mode wireless transmit/receive unit |
US20160269851A1 (en) * | 2012-03-14 | 2016-09-15 | Digi International Inc. | Spatially aware smart device provisioning |
US9654200B2 (en) | 2005-07-18 | 2017-05-16 | Mutualink, Inc. | System and method for dynamic wireless aerial mesh network |
US9871767B2 (en) | 2005-07-18 | 2018-01-16 | Mutualink, Inc. | Enabling ad hoc trusted connections among enclaved communication communities |
Families Citing this family (24)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2002033764A (en) * | 2000-07-14 | 2002-01-31 | Fujitsu Ltd | Communication service providing system, mobile terminal equipment to be used for the same, address server device and router system |
US20040088333A1 (en) * | 2002-01-25 | 2004-05-06 | David Sidman | Apparatus method and system for tracking information access |
WO2002060110A2 (en) * | 2001-01-25 | 2002-08-01 | David Sidman | Apparatus, method, and system for accessing digital rights management information |
US6868059B1 (en) * | 2001-04-24 | 2005-03-15 | Cisco Technology, Inc. | Clusters of devices, softwares and methods for improved handling of a gatekeeper load in VoIP communication |
US7809806B1 (en) | 2001-08-02 | 2010-10-05 | Cisco Technology, Inc. | Neighbor discovery using address registration protocol over ELMI |
US20030046400A1 (en) * | 2001-08-22 | 2003-03-06 | Owen Friel | Contacting a destination terminal from an originating terminal via a packet-based communications network |
DE60233255D1 (en) * | 2001-12-03 | 2009-09-17 | Nokia Corp | GUIDELINES-BASED MECHANISMS FOR SELECTION OF ACCESS ROUTERS AND MOBILE CONTEXT |
US7489667B2 (en) * | 2002-11-08 | 2009-02-10 | Faccin Stefano M | Dynamic re-routing of mobile node support in home servers |
US20040121764A1 (en) * | 2002-12-23 | 2004-06-24 | Rivero Juan S. | Dynamic device configuration through automated domain detection |
US7487537B2 (en) * | 2003-10-14 | 2009-02-03 | International Business Machines Corporation | Method and apparatus for pervasive authentication domains |
US6999774B2 (en) * | 2003-10-15 | 2006-02-14 | Motorola, Inc. | Method and system for handling messages addressed to multiple mobile nodes |
CN100359942C (en) * | 2003-11-05 | 2008-01-02 | 华为技术有限公司 | Visual conference system and its managing method |
US7907934B2 (en) * | 2004-04-27 | 2011-03-15 | Nokia Corporation | Method and system for providing security in proximity and Ad-Hoc networks |
KR100643762B1 (en) * | 2005-02-01 | 2006-11-10 | 삼성전자주식회사 | Method for assigning address of mobile node |
WO2006132487A1 (en) * | 2005-06-06 | 2006-12-14 | Samsung Electronics Co., Ltd. | Method for discovering neighbor networks in mobile station and network system for enabling the method |
US20060274743A1 (en) * | 2005-06-06 | 2006-12-07 | Alper Yegin | System and method for a mobile device to learn information about the access networks within its neighborhood |
US8548487B2 (en) * | 2005-06-07 | 2013-10-01 | Nokia Corporation | Signaling for administrative domain change during location tracking |
CN101496387B (en) | 2006-03-06 | 2012-09-05 | 思科技术公司 | System and method for access authentication in a mobile wireless network |
US7715562B2 (en) | 2006-03-06 | 2010-05-11 | Cisco Technology, Inc. | System and method for access authentication in a mobile wireless network |
US7916682B2 (en) * | 2006-07-14 | 2011-03-29 | Symbol Technologies, Inc. | Wireless switch network architecture implementing layer 3 mobility domains |
CN101001195A (en) * | 2006-12-19 | 2007-07-18 | 科博技术有限公司 | Data transmission system and method |
JP6454971B2 (en) * | 2014-03-18 | 2019-01-23 | 富士ゼロックス株式会社 | Relay device, system and program |
US10574664B2 (en) | 2017-08-04 | 2020-02-25 | Dish Network L.L.C. | Device zoning in a network gateway device |
US11792131B2 (en) * | 2021-06-28 | 2023-10-17 | Tencent America LLC | Techniques for receiver enforcement of load-balancing steering mode |
Citations (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6374302B1 (en) * | 1998-03-31 | 2002-04-16 | At&T Corp. | Method and system to provide an action control point master gatekeeper |
US6426945B1 (en) * | 1998-10-06 | 2002-07-30 | Nokia Telecommunications, Oy | Method and apparatus for providing resource discovery using multicast scope |
US6539237B1 (en) * | 1998-11-09 | 2003-03-25 | Cisco Technology, Inc. | Method and apparatus for integrated wireless communications in private and public network environments |
US20030119500A1 (en) * | 1998-12-30 | 2003-06-26 | Subrata Mukherjee | System and method for providing terminal mobility in h.323 systems |
US20030137991A1 (en) * | 2002-01-23 | 2003-07-24 | Doshi Parag M. | Apparatus and method for enabling optimized gateway selection for inter-working between circuit-switched and internet telephony |
US6604142B1 (en) * | 2000-05-05 | 2003-08-05 | Telefonaktiebolaget Lm Ericsson (Publ) | Method of filtering responses to gatekeeper discovery multicast request message |
US6614784B1 (en) * | 1999-01-15 | 2003-09-02 | Telefonaktiebolaget L M Ericsson (Publ) | System and method for providing supplementary services (SS) in an integrated telecommunications network |
US6628943B1 (en) * | 1999-02-25 | 2003-09-30 | Telcordia Technologies, Inc. | Mobility management utilizing active address propagation |
US6667968B1 (en) * | 1998-12-03 | 2003-12-23 | Telefonaktiebolaget L M Ericsson (Publ) | System and method for providing multiple endpoints in a device disposed in a packet-switched network |
US6674734B1 (en) * | 1999-07-12 | 2004-01-06 | Nokia Corporation | Scheme to relocate H. 323 gatekeeper during a call when endpoint changes its zone |
US6775253B1 (en) * | 1999-02-25 | 2004-08-10 | Telcordia Technologies, Inc. | Adaptive signaling for wireless packet telephony |
US6788660B1 (en) * | 1999-02-25 | 2004-09-07 | Telcordia Technologies, Inc. | Adaptive mobile signaling for wireless internet telephony |
US6888803B1 (en) * | 1998-12-22 | 2005-05-03 | Nortel Networks Limited | System, method, and computer program product for connectivity of wireless base station to PSTN via an IP data network |
US6920126B2 (en) * | 1998-08-19 | 2005-07-19 | Siemens Aktiengesellschaft | Method for routing links through a packet-oriented communication network |
US6940847B1 (en) * | 1999-01-15 | 2005-09-06 | Telefonaktiebolaget Lm Ericsson (Publ) | System and method for providing access to service nodes from entities disposed in an integrated telecommunications network |
Family Cites Families (38)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5793762A (en) | 1994-04-12 | 1998-08-11 | U S West Technologies, Inc. | System and method for providing packet data and voice services to mobile subscribers |
US5867494A (en) * | 1996-11-18 | 1999-02-02 | Mci Communication Corporation | System, method and article of manufacture with integrated video conferencing billing in a communication system architecture |
GB9711788D0 (en) * | 1997-06-06 | 1997-08-06 | Northern Telecom Ltd | Method and interface for connecting communication traffic between narrowband and broadband networks |
SE513246C2 (en) | 1997-06-23 | 2000-08-07 | Ericsson Telefon Ab L M | Procedure and device in an IP-based network |
US6154463A (en) | 1997-08-26 | 2000-11-28 | Lucent Technologies, Inc. | System and method for multicast conferencing and online discussion groups |
US6201805B1 (en) * | 1997-10-21 | 2001-03-13 | Dialogic Corporation | Apparatus and method for computer telephone integration in packet switched telephone networks |
FI107979B (en) * | 1998-03-18 | 2001-10-31 | Nokia Mobile Phones Ltd | A system and device for utilizing mobile network services |
US6421339B1 (en) | 1998-06-12 | 2002-07-16 | Nortel Networks Limited | Methods and systems for call forwarding |
US6195705B1 (en) * | 1998-06-30 | 2001-02-27 | Cisco Technology, Inc. | Mobile IP mobility agent standby protocol |
US6360265B1 (en) | 1998-07-08 | 2002-03-19 | Lucent Technologies Inc. | Arrangement of delivering internet protocol datagrams for multimedia services to the same server |
US6584093B1 (en) | 1998-08-25 | 2003-06-24 | Cisco Technology, Inc. | Method and apparatus for automatic inter-domain routing of calls |
US6965591B1 (en) * | 1998-09-14 | 2005-11-15 | At&T Corp. | System and method for gatekeeper-to-gatekeeper communication |
US6240449B1 (en) | 1998-11-02 | 2001-05-29 | Nortel Networks Limited | Method and apparatus for automatic call setup in different network domains |
US6731627B1 (en) | 1998-11-17 | 2004-05-04 | Cisco Technology, Inc. | Virtual loop carrier system |
US6229804B1 (en) * | 1998-11-17 | 2001-05-08 | 3Com Corporation | Gatekeeper election methods for internet telephony |
CA2353626A1 (en) | 1998-12-03 | 2000-06-08 | Telefonaktiebolaget Lm Ericsson | System and method for mobile terminal registration in an integrated wireless packet-switched network |
US6614774B1 (en) | 1998-12-04 | 2003-09-02 | Lucent Technologies Inc. | Method and system for providing wireless mobile server and peer-to-peer services with dynamic DNS update |
US6519242B1 (en) | 1998-12-09 | 2003-02-11 | Nortel Networks Limited | Apparatus and method of PSTN based network roaming and SCP based subscriber management for internet telephony systems |
US6519249B1 (en) | 1998-12-23 | 2003-02-11 | Nortel Networks Ltd | Scalable gatekeepers in an internet telephony system and a method of operation |
US6314284B1 (en) | 1998-12-30 | 2001-11-06 | Ericsson Inc. | System and method for providing service transparency for mobile terminating calls within an H.323 system |
US6996716B1 (en) * | 1999-04-15 | 2006-02-07 | Avaya Technology Corp. | Dual-tier security architecture for inter-domain environments |
US6785223B1 (en) | 1999-04-22 | 2004-08-31 | Siemens Information And Communication Networks, Inc. | System and method for restarting of signaling entities in H.323-based realtime communication networks |
AU5022500A (en) | 1999-06-21 | 2001-01-09 | Nokia Networks Oy | Mobility between ip telephony networks and cellular networks |
AU5096400A (en) | 1999-06-21 | 2001-01-09 | Nokia Networks Oy | Gateway, system and method for supporting roaming |
US6611516B1 (en) | 1999-06-21 | 2003-08-26 | Nokia Telecommunications Oyj | Short message service support over a packet-switched telephony network |
US6400950B1 (en) | 1999-07-28 | 2002-06-04 | Ericsson Inc. | System and method for de-registration of multiple H.323 end points from a H.323 gatekeeper |
US6487602B1 (en) | 1999-08-17 | 2002-11-26 | Ericsson Inc. | System and method for accessing the internet in an internet protocol-based cellular network |
US6732177B1 (en) * | 1999-09-16 | 2004-05-04 | At&T Corp. | Intelligent signaling scheme for computer-readable medium for H.323 mobility architecture |
US6775255B1 (en) * | 1999-09-16 | 2004-08-10 | At&T Corp. | H.323 mobility architecture for terminal, user and service mobility |
US6859448B1 (en) * | 1999-09-16 | 2005-02-22 | At&T Corp. | H.323 mobility protocol for terminal, user and service mobility |
US7346022B1 (en) * | 1999-09-28 | 2008-03-18 | At&T Corporation | H.323 user, service and service provider mobility framework for the multimedia intelligent networking |
US6675014B1 (en) | 1999-10-15 | 2004-01-06 | Nokia Corporation | Apparatus, and associated method, for updating a location register in a mobile, packet radio communication system |
US6714987B1 (en) * | 1999-11-05 | 2004-03-30 | Nortel Networks Limited | Architecture for an IP centric distributed network |
NO314329B1 (en) | 1999-12-06 | 2003-03-03 | Ericsson Telefon Ab L M | Arrangements by telecommunication and method for the same |
US6947432B2 (en) * | 2000-03-15 | 2005-09-20 | At&T Corp. | H.323 back-end services for intra-zone and inter-zone mobility management |
US6992995B2 (en) * | 2000-04-17 | 2006-01-31 | Telcordia Technologies, Inc. | Telecommunication enhanced mobile IP architecture for intra-domain mobility |
US6993359B1 (en) * | 2000-04-28 | 2006-01-31 | Cisco Technology, Inc. | Method and apparatus for inter-cell handover in wireless networks using multiple protocols |
US6934534B1 (en) * | 2001-04-25 | 2005-08-23 | At&T Corp. | Common mobility management protocol for multimedia applications, systems and services |
-
2001
- 2001-05-02 WO PCT/US2001/014237 patent/WO2001084341A1/en active Application Filing
- 2001-05-02 CA CA002405044A patent/CA2405044C/en not_active Expired - Lifetime
- 2001-05-02 US US09/847,915 patent/US6967941B2/en not_active Ceased
-
2005
- 2005-07-14 US US11/181,635 patent/US20050250491A1/en not_active Abandoned
-
2007
- 2007-01-24 US US11/657,636 patent/USRE42920E1/en not_active Expired - Lifetime
Patent Citations (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6374302B1 (en) * | 1998-03-31 | 2002-04-16 | At&T Corp. | Method and system to provide an action control point master gatekeeper |
US6920126B2 (en) * | 1998-08-19 | 2005-07-19 | Siemens Aktiengesellschaft | Method for routing links through a packet-oriented communication network |
US6426945B1 (en) * | 1998-10-06 | 2002-07-30 | Nokia Telecommunications, Oy | Method and apparatus for providing resource discovery using multicast scope |
US6539237B1 (en) * | 1998-11-09 | 2003-03-25 | Cisco Technology, Inc. | Method and apparatus for integrated wireless communications in private and public network environments |
US6667968B1 (en) * | 1998-12-03 | 2003-12-23 | Telefonaktiebolaget L M Ericsson (Publ) | System and method for providing multiple endpoints in a device disposed in a packet-switched network |
US6888803B1 (en) * | 1998-12-22 | 2005-05-03 | Nortel Networks Limited | System, method, and computer program product for connectivity of wireless base station to PSTN via an IP data network |
US20030119500A1 (en) * | 1998-12-30 | 2003-06-26 | Subrata Mukherjee | System and method for providing terminal mobility in h.323 systems |
US6614784B1 (en) * | 1999-01-15 | 2003-09-02 | Telefonaktiebolaget L M Ericsson (Publ) | System and method for providing supplementary services (SS) in an integrated telecommunications network |
US6940847B1 (en) * | 1999-01-15 | 2005-09-06 | Telefonaktiebolaget Lm Ericsson (Publ) | System and method for providing access to service nodes from entities disposed in an integrated telecommunications network |
US6628943B1 (en) * | 1999-02-25 | 2003-09-30 | Telcordia Technologies, Inc. | Mobility management utilizing active address propagation |
US6775253B1 (en) * | 1999-02-25 | 2004-08-10 | Telcordia Technologies, Inc. | Adaptive signaling for wireless packet telephony |
US6788660B1 (en) * | 1999-02-25 | 2004-09-07 | Telcordia Technologies, Inc. | Adaptive mobile signaling for wireless internet telephony |
US6674734B1 (en) * | 1999-07-12 | 2004-01-06 | Nokia Corporation | Scheme to relocate H. 323 gatekeeper during a call when endpoint changes its zone |
US6604142B1 (en) * | 2000-05-05 | 2003-08-05 | Telefonaktiebolaget Lm Ericsson (Publ) | Method of filtering responses to gatekeeper discovery multicast request message |
US20030137991A1 (en) * | 2002-01-23 | 2003-07-24 | Doshi Parag M. | Apparatus and method for enabling optimized gateway selection for inter-working between circuit-switched and internet telephony |
Cited By (51)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7203492B2 (en) * | 2001-12-05 | 2007-04-10 | Nec Corporation | Mobile communication method and system |
US20030104807A1 (en) * | 2001-12-05 | 2003-06-05 | Morihisa Momona | Mobile communication method and system |
US8140112B2 (en) | 2002-07-02 | 2012-03-20 | Interdigital Technology Corporation | Method and apparatus for handoff between a wireless local area network (WLAN) and a universal mobile telecommunication system (UMTS) |
US9237503B2 (en) | 2002-07-02 | 2016-01-12 | Interdigital Technology Corporation | Method and apparatus for handoff between a wireless local area network (WLAN) and a universal mobile telecommunication system (UMTS) |
US8014367B2 (en) * | 2003-11-12 | 2011-09-06 | Interdigital Technology Corporation | System for application server autonomous access across different types of access technology networks |
US8548478B2 (en) | 2003-11-13 | 2013-10-01 | Interdigital Technology Corporation | Method and system for facilitating handover from a third generation (3G) cellular communication system to a wireless local area network (WLAN) |
US10045271B2 (en) | 2003-11-13 | 2018-08-07 | Interdigital Technology Corporation | Method and system for facilitating inter-system handover for wireless communication |
US10165478B2 (en) | 2004-03-12 | 2018-12-25 | Interdigital Technology Corporation | Method and system for switching a radio access technology between wireless communication systems with a multi-mode wireless transmit/receive unit |
US9380501B2 (en) | 2004-03-12 | 2016-06-28 | InterDigital Technology Corporation, Inc. | Method and system for switching a radio access technology between wireless communication systems with a multi-mode wireless transmit/receive unit |
US8780804B2 (en) | 2004-11-08 | 2014-07-15 | Lemko Corporation | Providing communications using a distributed mobile architecture |
US10003397B2 (en) | 2005-07-18 | 2018-06-19 | Mutualink, Inc. | Dynamic wireless aerial mesh network |
US9654200B2 (en) | 2005-07-18 | 2017-05-16 | Mutualink, Inc. | System and method for dynamic wireless aerial mesh network |
US10630376B2 (en) | 2005-07-18 | 2020-04-21 | Mutualink, Inc. | Apparatus for adaptive dynamic wireless aerial mesh network |
US8929851B2 (en) | 2005-07-18 | 2015-01-06 | Mutualink, Inc. | System and method for establishing an incident communications network |
US8811940B2 (en) | 2005-07-18 | 2014-08-19 | Mutualink, Inc. | Dynamic asset marshalling within an incident communications network |
US9871767B2 (en) | 2005-07-18 | 2018-01-16 | Mutualink, Inc. | Enabling ad hoc trusted connections among enclaved communication communities |
US11902342B2 (en) | 2005-07-18 | 2024-02-13 | Mutualink, Inc. | Incident communications network with dynamic asset marshaling and a mobile interoperability workstation |
US8386655B2 (en) * | 2005-09-21 | 2013-02-26 | Siemens Enterprise Communications Gmbh & Co. Kg | Method and arrangement for position-dependent configuration of a mobile appliance |
US20090024765A1 (en) * | 2005-09-21 | 2009-01-22 | Siemens Aktiengesellschaft | Method and Arrangement for Position-Dependent Configuration of a Mobile Appliance |
US8458374B1 (en) | 2005-09-21 | 2013-06-04 | Siemens Enterprise Communications Gmbh & Co. Kg | Method and arrangement for position-dependent configuration of a mobile appliance |
US8688111B2 (en) | 2006-03-30 | 2014-04-01 | Lemko Corporation | System, method, and device for providing communications using a distributed mobile architecture |
US8359029B2 (en) | 2006-03-30 | 2013-01-22 | Lemko Corporation | System, method, and device for providing communications using a distributed mobile architecture |
US9253622B2 (en) | 2006-06-12 | 2016-02-02 | Lemko Corporation | Roaming mobile subscriber registration in a distributed mobile architecture |
US8224322B2 (en) | 2006-06-12 | 2012-07-17 | Lemko Corporation | Roaming mobile subscriber registration in a distributed mobile architecture |
US20080020759A1 (en) * | 2006-07-20 | 2008-01-24 | Symbol Technologies, Inc. | Techniques for home wireless switch redundancy and stateful switchover in a network of wireless switches supporting layer 3 mobility within a mobility domain |
US7639648B2 (en) * | 2006-07-20 | 2009-12-29 | Symbol Technologies, Inc. | Techniques for home wireless switch redundancy and stateful switchover in a network of wireless switches supporting layer 3 mobility within a mobility domain |
US20100100639A1 (en) * | 2006-09-29 | 2010-04-22 | Electronics And Telecommunications Research Instit Ute | Method for providing internet protocol handoff of mobile node under multiple mobile agent platform environment |
US8676197B2 (en) | 2006-12-13 | 2014-03-18 | Lemko Corporation | System, method, and device to control wireless communications |
US9515770B2 (en) | 2006-12-13 | 2016-12-06 | Lemko Corporation | System, method, and device to control wireless communications |
US7885233B2 (en) * | 2007-07-31 | 2011-02-08 | Symbol Technologies, Inc. | Forwarding broadcast/multicast data when wireless clients layer 3 roam across IP subnets in a WLAN |
US20090034470A1 (en) * | 2007-07-31 | 2009-02-05 | Symbol Technologies, Inc. | Forwarding broadcast/multicast data when wireless clients layer 3 roam across ip subnets in a wlan |
US20090251529A1 (en) * | 2008-04-02 | 2009-10-08 | Freeport Technologies | Network management server for managing multiple operating modes of a conferencing network with different sets of policies |
US8149262B2 (en) | 2008-04-02 | 2012-04-03 | Freeport Technologies | Network management server for managing multiple operating modes of a conferencing network with different sets of policies |
US8046420B2 (en) * | 2008-04-23 | 2011-10-25 | Lemko Corporation | System and method to control wireless communications |
US20120002607A1 (en) * | 2008-04-23 | 2012-01-05 | Lemko Corporation | System and method to control wireless communications |
US20090271491A1 (en) * | 2008-04-23 | 2009-10-29 | Lemko, Corporation | System and method to control wireless communications |
US9191980B2 (en) * | 2008-04-23 | 2015-11-17 | Lemko Corporation | System and method to control wireless communications |
US9215098B2 (en) | 2008-06-26 | 2015-12-15 | Lemko Corporation | System and method to control wireless communications |
US8340667B2 (en) | 2008-06-26 | 2012-12-25 | Lemko Corporation | System and method to control wireless communications |
US10547530B2 (en) | 2008-06-27 | 2020-01-28 | Lemko Corporation | Fault tolerant distributed mobile architecture |
US8706105B2 (en) | 2008-06-27 | 2014-04-22 | Lemko Corporation | Fault tolerant distributed mobile architecture |
US9755931B2 (en) | 2008-06-27 | 2017-09-05 | Lemko Corporation | Fault tolerant distributed mobile architecture |
US9198020B2 (en) | 2008-07-11 | 2015-11-24 | Lemko Corporation | OAMP for distributed mobile architecture |
US9332478B2 (en) | 2008-07-14 | 2016-05-03 | Lemko Corporation | System, method, and device for routing calls using a distributed mobile architecture |
US8310990B2 (en) | 2008-07-14 | 2012-11-13 | Lemko Corporation | System, method, and device for routing calls using a distributed mobile architecture |
US8744435B2 (en) | 2008-09-25 | 2014-06-03 | Lemko Corporation | Multiple IMSI numbers |
US8326286B2 (en) | 2008-09-25 | 2012-12-04 | Lemko Corporation | Multiple IMSI numbers |
US8364153B2 (en) * | 2010-08-13 | 2013-01-29 | Mutualink, Inc. | Mobile interoperability workstation controller having video capabilities within an incident communications network |
US20120040635A1 (en) * | 2010-08-13 | 2012-02-16 | Boucher Joseph N | Mobile Interoperability Workstation Controller Having Video Capabilities Within an Incident Communications Network |
US9894459B2 (en) * | 2012-03-14 | 2018-02-13 | Digi International Inc. | Spatially aware smart device provisioning |
US20160269851A1 (en) * | 2012-03-14 | 2016-09-15 | Digi International Inc. | Spatially aware smart device provisioning |
Also Published As
Publication number | Publication date |
---|---|
US6967941B2 (en) | 2005-11-22 |
CA2405044C (en) | 2007-01-23 |
CA2405044A1 (en) | 2001-11-08 |
WO2001084341A8 (en) | 2002-03-07 |
US20020018476A1 (en) | 2002-02-14 |
WO2001084341A1 (en) | 2001-11-08 |
USRE42920E1 (en) | 2011-11-15 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
USRE42920E1 (en) | System and method for inter-domain mobility management | |
US6775255B1 (en) | H.323 mobility architecture for terminal, user and service mobility | |
US6732177B1 (en) | Intelligent signaling scheme for computer-readable medium for H.323 mobility architecture | |
US6859448B1 (en) | H.323 mobility protocol for terminal, user and service mobility | |
US8276197B1 (en) | Cascading network login | |
US10178543B2 (en) | Common mobility management protocol for multimedia applications, systems and services | |
CN100484141C (en) | Method for realizing terminal ability interaction and route control in IMS and CS service concurrence | |
US8184590B2 (en) | Method and system for handoff between wireless networks | |
US6839323B1 (en) | Method of monitoring calls in an internet protocol (IP)-based network | |
US6947432B2 (en) | H.323 back-end services for intra-zone and inter-zone mobility management | |
US20020085517A1 (en) | Gatekeeper supporting handoff and handoff method in IP telephony system | |
US20070116011A1 (en) | Method and apparatus for communications of user equipment using internet protocol address in a mobile communication system | |
US20040003046A1 (en) | System and methods for providing instant services in an internet protocol network | |
US20030214958A1 (en) | Linking of bearer and control for a multimedia session | |
AU2011000A (en) | System and method for providing multiple endpoints in a device disposed in a packet-switched network | |
CA2317980C (en) | H.323 mobility architecture for terminal, user and service mobility | |
US6604142B1 (en) | Method of filtering responses to gatekeeper discovery multicast request message | |
JP2002507869A (en) | Method and system for routing calls between cellular subsystems | |
EP1361722B1 (en) | Method, system and VoIP endpoint for service feature configuration | |
Liao | Mobile internet telephony: Mobile extensions to H. 323 | |
KR100401262B1 (en) | An apparatus and method for providing a video telephone service over the packet data network | |
US7342905B1 (en) | Communications system | |
CA2565938A1 (en) | System and method for inter-domain mobility management | |
EP1526684A1 (en) | Communication system | |
KR100738195B1 (en) | System and method for route optimization in SIP using DHCP |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |