Language selection

Search

Patent 2400575 Summary

Third-party information liability

Some of the information on this Web page has been provided by external sources. The Government of Canada is not responsible for the accuracy, reliability or currency of the information supplied by external sources. Users wishing to rely upon this information should consult directly with the source of the information. Content provided by external sources is not subject to official languages, privacy and accessibility requirements.

Claims and Abstract availability

Any discrepancies in the text and image of the Claims and Abstract are due to differing posting times. Text of the Claims and Abstract are posted:

  • At the time the application is open to public inspection;
  • At the time of issue of the patent (grant).
(12) Patent Application: (11) CA 2400575
(54) English Title: TELECOMMUNICATIONS ROUTING
(54) French Title: ROUTAGE DE TELECOMMUNICATION
Status: Deemed Abandoned and Beyond the Period of Reinstatement - Pending Response to Notice of Disregarded Communication
Bibliographic Data
(51) International Patent Classification (IPC):
  • H04L 12/28 (2006.01)
  • H04L 12/46 (2006.01)
  • H04L 45/00 (2022.01)
  • H04L 45/24 (2022.01)
(72) Inventors :
  • CORSON, MATHEW S. (United States of America)
  • O'NEILL, ALAN W. (United Kingdom)
(73) Owners :
  • BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY
(71) Applicants :
  • BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
(74) Agent: GOWLING WLG (CANADA) LLP
(74) Associate agent:
(45) Issued:
(86) PCT Filing Date: 2001-02-16
(87) Open to Public Inspection: 2001-08-23
Examination requested: 2003-12-03
Availability of licence: N/A
Dedicated to the Public: N/A
(25) Language of filing: English

Patent Cooperation Treaty (PCT): Yes
(86) PCT Filing Number: PCT/US2001/004975
(87) International Publication Number: US2001004975
(85) National Entry: 2002-08-19

(30) Application Priority Data:
Application No. Country/Territory Date
0003934.7 (United Kingdom) 2000-02-18
00301286.1 (European Patent Office (EPO)) 2000-02-18

Abstracts

English Abstract


In a mobile packet network, data is transmitted concurrently from two base
stations to a mobile node, for example during handover.


French Abstract

Selon l'invention, dans un réseau à commutation par paquets mobile, les données sont transmises concurremment à partir de deux stations de base vers un noeud mobile, par exemple lors d'un transfert.

Claims

Note: Claims are shown in the official language in which they were submitted.


33
CLAIMS
1. A method of operation of a packet network, the packet network
including a plurality of packet switching nodes interconnected by packet
transport links,
the switching nodes including a plurality of access nodes, and at least some
of the
access nodes being wireless access nodes arranged to communicate packets with
a
mobile node via a wireless transmission system,
characterised by sending packets directed to the mobile node to at least two
wireless access nodes, and concurrently transmitting the same packets
synchronously
from each of the at least two wireless access nodes to the mobile node.
2. A method according to claim 1, including caching the packets for a
selected period at one of the at least two wireless access nodes to achieve
synchronisation.
3. A method according to claim 1 or 2, including outputting a packet
synchronisation signal from the mobile node.
4. A method according to claim 1, 2 or 3, including tunnelling packets from
one of the at least two wireless access nodes to another of the at least two
wireless
access nodes.
5. A method according to any one of the preceding claims, comprising
selectively sending packets to at least two wireless access nodes during a
soft
handover process.

34
6. A method according to claim 5, in which, during the process of
handover, one of the two wireless access nodes:
i) copies packets addressed to the mobile node,
ii) forwards one of the copies to another of the two wireless access nodes,
and
iii) transmits the other of the copies via the wireless transmission system to
the mobile node.
7. A method according to claim 5 or 6, in which the network includes
routing paths defined by routing data held in packet switching nodes located
along said
routing paths, and during the process of handover, routing updates are
performed
altering routing in at least some of said packet switching nodes such that at
least one
routing path is redirected between said at least two wireless access nodes.
8. A method of operation of a packet network, the packet network
including a plurality of packet switching nodes interconnected by packet
transport links,
the switching nodes including a plurality of access nodes, and at least some
of the
access nodes being wireless access nodes arranged to communicate packets with
a
mobile node via a wireless transmission system,
characterised by sending packets directed to the mobile node to at least two
wireless access nodes, and concurrently transmitting packets from one source
via one
of the at least two wireless access nodes, and packets from another source via
another access node.

Description

Note: Descriptions are shown in the official language in which they were submitted.


WO 01/61934 CA 02400575 2002-08-19 pCT/USOl/04975
1
TELECOMMUNICATIONS ROUTING
This invention relates to the routing of telecommunications signals. More
particularly it relates to a method of routing such signals to both fixed and
mobile
telecommunications mediums, such that similar services can be used in the same
way
by users on either medium, and to allow system operators to reduce costs by
greater
commonality of switching and other network-based facilities. The present
invention is
concerned with the routing of packet-based communications such as those used
in the
"Internet" using the so-called "Internet Protocol" (1P).
Present mobile medium systems are arranged such that a mobile user and
associated systems collaborate at the interface with the network (typically
the radio
base station) to enable a mobile node to change from communicating with one
base
station to communicating with another, and to enable the network to update
intelligence points of the new location. In cellular networks, these
intelligence points
are the Home and Visitor Location Registers (HLR and VLR), whilst in "Mobile
IP"
these locations are known as the Home and Foreign Agent. In both cases the
"Visitor"
Location Register or "Foreign" Agent maintains a record only of those users
currently
co-operating with base stations under their supervision, whilst their "Home"
counterparts maintain a permanent record of their associated users, including
a record
of which VLR or Foreign Agent each one is currently working with. The address
on an
incoming message identifies the relevant HLR/Home Agent, to which reference is
made to identify the appropriate VLR/Foreign Agent for more specific routing
details.
This allows minor changes in location to be effected within the VLR/Foreign
Agent,
locally to the user's current location without informing the HLR/Home Agent,
which
could be some distance away, thereby greatly reducing the signalling overhead.

WO 01/61934 _ CA 02400575 2002-08-19 PCT/USOl/04975
2
The additional cost of mobility is the provision of this Home Agent/ Foreign
Agent interface, and especially with packet systems, the cost of tunnelling
(forwarding
messages from one address to another), address exhaustion (the inability to re-
use an
address from which forwarding is taking place) and triangular routing.
In a fixed medium system, IP routing is based on the distribution of IP
address
blocks or prefixes, with an associated metric or route cost, from potential
destinations
to potential senders so that they and intermediate routers can determine the
best next
hop (neighbour router) towards that destination. These routes are pre-computed
for all
destinations in the network so that senders can immediately send information
when
generated. Pre-computation of routes, and deployed routing exchange
technology, is
possible when the sources and destinations have a fixed location, and
communication
bandwidth is rich enough for exhaustive exchange of routes. As the proportion
of
roaming increases however, such models break down and a more dynamic routing
approach is required.
A proposal referred to as "HAWAII" was published 19 February, 1999 as an
Internet-draft entitled "1P Micro-Mobility Support Using HAWAII", R. Ramjee,
T. La Por,
S. Thuel, K. Varadh (see <Internet-drafts/draft-rimjee-micro-mobility-hawaii-
OO.txt>
IETF). HAWAII uses specialised path set up schemes which install host-based
forwarding entries in specific routers when in a routing domain to support
intra-domain
micro-mobility, and defaults to using "Mobile-IP" for inter-domain micro-
mobility. In
HAWAII, mobile hosts retain their network address while moving within the
domain.
The HAWAII architecture relies on a gateway router into a domain, referred to
as the
domain root router, to which default routes within the domain are directed.
Each
mobile host is assigned a home domain based on its permanent IP address. The
path
set up scheme updates a single routing path in a domain so that connectivity
to the
mobile host is possible both before and after handoff at the wireless link
layer. Only

WO 01/61934 CA 02400575 2002-08-19 PCT/USOl/04975
3
routers located along a single routing path between the domain root router and
the
base station currently serving the mobile host have routing table entries for
the mobile
host's IP address. The remainder of the routers in the domain route any
packets
addressed to the mobile host upwards along default routes which rely on the
tree-like
nature of the routing domain, rooted at the domain root router, to provide an
intersection with the downrouting towards the mobile host along the single
routing path
for which the routers have individual host entries for the mobile host's IP
address.
In HAWAII, mobility between domains is supported by "Mobile IP"
mechanisms. The home domain root router is designated as the Home Agent, and
encapsulated IP packets are forwarded via the Foreign domain root router.
Drawbacks with the HAWAII proposals include the concentration of Mobile IP
tunnels in few nodes in the core of the network, the domain root routers, such
that
failure of any of these nodes may result in large-scale failure of all Mobile
IP state and
associated sessions handled by the failing node. Furthermore, since all
routing from
outside the home domain into the home domain, and in the reverse direction,
must
occur via the home domain root router, failure of the home domain root router
may
also result in large-scale failure.
In an alternative protocol called "Cellular IP", A. Campbell, J. Gome~, C-Y
Wan, S. Kim, published January 2000 (see <draft-ietf-mobileip-cellularip-
OO.txt>,
IETF), to inhibit packet loss during handover, a concept called "semi-soft"
handover is
introduced. In which the incoming packets are copied at a crossover router and
sent to
both the new and old base stations. However, since the distances from the
crossover
router to the old and new base stations is variable, the packets transmitted
over the
respective wireless links at the base stations are received at the mobile node
at
different times. It is proposed that packets sent to the new base station may
be
delayed to ensure that there is no packet loss during handover.

WO 01/61934 CA 02400575 2002-08-19 pCT/USOl/04975
4
According to a first ;aspect of the present invention, there is provided a
method
of operation of a packet network, the packet network including a plurality of
packet
switching nodes interconnected by packet transport links, the switching nodes
including a plurality of access nodes, and at least some of the access nodes
being
wireless access nodes arranged to communicate packets with a mobile node via a
wireless transmission system,
characterised by sending packets directed to the mobile node to at least two
wireless access nodes, and concurrently transmitting the same packets
synchronously
from each of the at least two wireless access nodes to the mobile node.
This aspect of the present invention takes advantage of the potential of a
packet network supporting mobility to route packets simultaneously two
wireless
access nodes. The mobile node can then receive the total power from both base
stations, thereby optimising the received power, or can select between signals
received from both base stations, thereby minimising data errors. The
invention is
particularly valuable as a way of enhancing the performance of a mobile node
during
handover as the mobile node passes from the locality of one base station to
another
base station.
According to a further aspect of the invention there is provided a method of
operation of a packet network, the packet network including a plurality of
packet
switching nodes interconnected by packet transport links, the switching nodes
including a plurality of access nodes, and at least some of the access nodes
being
wireless access nodes arranged to communicate packets with a mobile node via a
wireless transmission system,
characterised by sending packets directed to the mobile node to at least two
wireless access nodes, and concurrently transmitting packets from one source
via one

WO 01/61934 CA 02400575 2002-08-19 pCT/USOl/04975
of the at least two wireless access nodes, and packets from another source via
another access node.
Further aspects and advantages of the invention will become apparent from
embodiments which will now be described, by way of example only, with
reference to
5 the accompanying drawings, in which:
Figure 1 schematically illustrates an example of a fixed/mobile topology in
accordance with an embodiment of the present invention;
Figures 2 to 11 schematically illustrate inter-base station handover and the
accompanying routing updates in accordance with an embodiment of the present
invention;
Figures 12 to 16 illustrate inter-base station handover and the accompanying
routing updates in accordance with a further embodiment of the invention;
Figures 17 to 25 illustrate the restoration of routing to a home base station
in
accordance with an embodiment of the invention;
Figure 26 schematically illustrates a routing protocol data table held in a
routing node in accordance with an embodiment of the invention; and
Figure 27 illustrates a next-hop forwarding table held in the routing node in
accordance with an embodiment of the invention.
Figures 28 to 30 show in further detail the soft handover process.
Referring now to Figure 1, an example of a fixed/mobile topology in
accordance with an embodiment of the present invention is shown. The topology
includes, by way of example, three packet switching networks 2, 4, 6 forming
an
Autonomous System (AS), the extent of which is schematically indicated by dark
shading in Figure 1. One definition given for the term Autonomous System, is
"a set of
routers and networks under the same administration" ("Routing in the
Internet",
Christian Huitema, Prentice-Hall, 1995, page 158). Herein, the term Autonomous

WO 01/61934 CA 02400575 2002-08-19 PCT/USO1104975
6
System, also referred to as a routing domain in the art, is also intended to
mean a
network, or a set of networks, having routers running the same routing
protocol. An
Autonomous System may be connected to other Autonomous Systems forming a
global internetwork such as the Internet (used by way of example hereinafter).
The
routing protocol is an interior gateway protocol, and communications with
other
Autonomous Systems are achieved via exterior gateway protocols such as the
Border
Gateway Protocol (BGP). Examples of known interior gateway protocols are the
Routing Information Protocol (RIP) and Open Shortest Path First (OSPF).
The networks 2, 4, 6 forming a fixed infrastructure of the Autonomous System
include a plurality of Internet Protocol (1P) packet switching nodes in the
form of a
plurality of Core Routers (CR), a plurality of Edge Routers (ER) and Bridge
Routers
(BR) interconnecting the different networks 2, 4, 6 in the AS. All of these
packet
switching nodes run a single IP routing protocol, one embodiment of which is
to be
described in further detail below.
One or more Exterior Gateway Routers (EGRs) connect the Autonomous
System to further Autonomous Systems of the global Internet.
The Autonomous System illustrated in Figure 1 performs routing for both
mobile hosts, for which routing within the AS is altered as a result of
mobility of the
mobile, and fixed, that is to say stationary, hosts, for which no such routing
alterations
occur.
Mobile nodes may be connected to an Edge Router via a wireless link, in the
example shown, a cellular radio link (a further possible type of wireless link
is an infra-
red link) using a Base Station (BS) Router provided by a mobile network
operator. The
cellular radio link may be a Time Division Multiplier Access (TDMA) system
link, such
as "GSM", or a Code Division Multiple Access (CDMA) system link, such as "CDMA
2000". Mobile nodes take the form of individual mobile hosts 14, and/or mobile
routers

WO 01/61934 CA 02400575 2002-08-19 PCT/USOl/04975
7
16 having a plurality of hosts attached thereto, which respectively conduct
radio
communication with one or more (e.g. in the case of a CDMA "soft handover") of
the
BSs at any given time. A BS may control a number of Base Transceiver Stations
(BTSs) which are co-located with radio antennae around which individual
"cells" of the
cellular system are formed
The mobile nodes 14, 16 move between cells of the cellular radio
communications network. If a BS serves a number of cells, a mobile node handed
over between cells may continue to receive packet data via the same BS.
However,
once a mobile node moves outside the range of a BS via which it is receiving
service,
handing over to a new cell may necessitate a change of routing within the AS.
Data
packets originating from and destined to the mobile node in question, which
are
routed, using the identifier of the, or an, IP address of the node, via a
given BS prior to
handover, may require routing, for the same IP address, via a different BS
following
handover. A mobile node may be participating in a communications session with
a
different host via the AS during handover from one BS to another. Because
connections at the transport layer (in, for example, a TCP/IP connection) are
defined in
part by the IP address of the mobile node, such a change in routing is desired
to allow
such connections to continue using the same IP address when a mobile node
r~.:~ceives
service from a different BS.
Fixed hosts may be connected to an Edge Router via a Local Area Network
(LAN) 10, running a local area network protocol such as an Ethernet protocol.
Fixed
hosts may also be connected to an Edge Router via a Public Services Telephone
Network (PSTN) 12 using a Network Access Server (NAS) 20 provided by an
Internet
access provider. The NAS 20 dynamically allocates fixed IP addresses on a dial-
up
basis to fixed hosts connecting to the NAS 20 using a protocol such as PPP or
SLIP,
and routes IP packets originating from, or destined to, each fixed host via an

WO 01/61934 CA 02400575 2002-08-19 PCT/USOl/04975
8
associated Edge Router. Whilst the NAS 20 allocates IP addresses on a dynamic
basis, the Edge Router via which packets are routed for the IP address
allocated does
not change, either during an access session or over a longer-term period.
Thus,
routing within the Autonomous System does not need to change for each of the
fixed
hosts other than due to factors internal to the AS such as link failure or
traffic
management.
The interior gateway protocol, the single IP routing protocol used in the AS
in
this embodiment of the present invention is a modified version of the
Temporally-
Ordered Routing Algorithm (TORA) routing protocol, which is described in,
inter alia, "A
Highly Adaptive Distributed Routing Algorithm for Mobile Wireless Networks"
Vincent D
Park and M Scott Corson, Proceedings of INFOCOM '97, April 7-11, Kobe, Japan;
and
"A Performance Comparison of the Temporally-Ordered Routing Algorithm and
Ideal
Link-State Routing" Vincent D Park and M Scott Corson, Proceedings of ISCC
'98, 30
June - 2 July, 1999, Athens, Greece.
The TORA routing protocol algorithm executes distributedly, provides loop-
free routes, provides multiple routing (to alleviate congestion), establishes
routes
quickly (so they may be used before the topology changes), and minimises
communication overhead by localising algorithmic reaction to topological
changes
when possible (to conserve available bandwidth and increase scalability).
The algorithm is distributed in that nodes need only maintain information
about adjacent nodes (i.e. one hop knowledge). It ensures all routes are loop-
free,
and typically provides multipath routing for any source/ destination pair
which requires
a route. Since multiple routes are typically established, many topological
changes do
not require routing updates within the AS as having a single route is
sufficient.
Following topological changes which do require reaction, the protocol re-
establishes
valid routes.

WO 01/61934 CA 02400575 2002-08-19
PCT/USO1/04975
9
The TORA protocol models a network as a graph G = (N, L), where N is a
finite set of nodes and L is a set of initially undirected links. Each node i
E N has a
unique node identifier (ID), and each link (i, j) E L allows two-way
communication (i.e.
nodes connected by a link can communicate with each other in either
direction). Each
initially undirected link (i, j) E L may subsequently be assigned one of three
states; (1 )
undirected, (2) directed from node i to node j, or (3) directed from node j to
node i. If a
link (i, j) E L is directed from node i to node j, node i is said to be
"upstream" from node
j while node j is said to be "downstream" from node i. For each node i, the
"neighbours" of i, N; E N, are defined to be the set of nodes j such that (i,
j) E L. Each
node i is always aware of its neighbours in the set N;.
A logically separate version of the protocol is run for each destination
(identified by e.g. a host IP address) to which routing is required.
The TORA protocol can be separated into three basic functions: creating
routes, maintaining routes, and erasing routes. Creating a route from a given
node to
the destination requires establishment of a sequence of directed links leading
from the
node to the destination. Creating routes essentially corresponds to assigning
directions to links in an undirected network or portion of the network. The
method
used to accomplish this is a query/reply process which builds a directed
acyctic graph
(DAG) rooted at the destination (i.e. the destination is the only node with no
downstream links). Such a DAG may be referred to as a "destination-oriented"
DAG.
Maintaining routes involves reacting to topological changes in the network in
a manner
such that routes to the destination are re-established within a finite time.
Upon
detection of a network partition, all links (in the portion of the network
which has
become partitioned from the destination) are marked undirected to erase
invalid
routes.

WO 01/61934 CA 02400575 2002-08-19
PCT/USOl/04975
The protocol accomplishes these three functions through the use of three
distinct control packets: query (CORY), update (UPD), and clear (CLR). QRY
packets
are used for creating routes, UPD packets are used for both creating and
maintaining
routes, and CLR packets are used for erasing routes.
5 At any given time, an ordered quintuple, referred to as a "height", H; _
(i;, oid;,
r;, 8;, i) is associated with each node i E N. Conceptually, the quintuple
associated with
each node represents the height of the node as defined by two parameters: a
reference level and a delta with respect to the reference level. The reference
level is
represented by the first three values in the quintuple while the delta is
represented by
10 the last two values. A new reference level is defined each time a node
loses its last
downstream link due to a link failure. The first value representing the
reference level,
i;, is a time tag set to the "time" of the link failure. The second value,
oid;, is the
originator-ID (i.e. the unique ID of the node which defined the new reference
level).
This ensures that the reference levels can be totally ordered
lexicographically. The
third value, r;, is a single bit used to divide each of the unique reference
levels into two
unique sub-levels. This bit is used to distinguish between the original
reference level
and its corresponding, higher reflected reference level. The first value
representing
the delta, 8;, is an integer used to order nodes with respect to a common
reference
level. This value is instrumental in the propagation of a reference level.
Finally, the
second value representing the delta i, is the unique ID of the node itself.
This ensures
that nodes with a common reference level and equal values of 8; (and in fact
all nodes)
can be totally ordered lexicographically at all times.
Each node i (other than the destination) maintains its height, H;. Initially
the
height of each node in the network (other than the destination) is set to
NULL, H; _ (-, -
, -, -, i). Subsequently, the height of each node i can be modified in
accordance with
the rules of the protocol. In addition to its own height, each node i
maintains, in a

WO 01/61934 CA 02400575 2002-08-19 PCT/USO1/04975
11
routing protocol data table, entries against host IP addresses having an
existing DAG
in the network, the entries including a height array with an entry HN;~, for
each
neighbour j E N;.
Each node i (other than the destination) also maintains, in the routing
protocol
data table, a link-state array with an entry LS;~ for each link (i, j) E L.
The state of the
links is determined by the heights H; and HN;~ and is directed from the higher
node to
the lower node. If a neighbour j is higher than node i, the link is marked
upstream. If a
neighbour j is lower than node i, the link is marked downstream.
The TORA protocol was originally designed for use in a Mobile Ad-Hoc
Network (MANET) in which the routers are mobile and are interlinked via
wireless links.
However, in this embodiment of the invention a modified TORA protocol is used
in an
Autonomous System including a fixed infrastructure of fixed routers
interconnected by
fixed links, such as that illustrated in Figure 1, to provide for routing
alterations in the
fixed infrastructure when a mobile host alters its point of attachment to the
infrastructure.
Figure 26 illustrates schematically an example of a routing protocol data
table
which may be held in a router in accordance with this embodiment.
Against each host IP address (or address prefix in the case of an aggregated
DAG, to be described in further detail below) IP1, IP2, etc having a DAG in
the network
is stored the height of the storing node H;(IP1), H;(IP2), etc. Also, the
identity of each
adjacent neighbour for example w, x, y, z and that neighbour's height
HN;W(IP1, IP2,
etc), HN;X(IP1, IP2, etc), HN;y(IP1, IP2, etc) and HN;Z(IP1, IP2, etc).
Finally, the link
state array for each IP address (or prefix) may be stored in the form of
markings
signifying an upstream link (U), a downstream link (D), or an undirected link
(-) against
each link identity (L1, L2, L3, L4) corresponding to each neighbour.

CA 02400575 2002-08-19
WO 01/61934 PCT/USO1/04975
12
The link-state array held in the routing protocol data table allows a next-hop
forwarding decision to be made locally in the router holding the data. For a
sufficiently
interconnected network, each router should have at least one downstream link.
If only
one downstream link exists, that link is selected as the next-hop forwarding
link. If
more than one downstream link exists, an optimum downstream link may be
selected,
for example on the basis of current traffic loading on the two links. In any
case, the
selected link is entered into a next-hop forwarding data table against the IP
address. A
next-hop forwarding table, such as that illustrated in Fig. 27, is held in
cache memory
for fast access as IP packets requiring routing arrive at the router. The
table stores the
next-hop forwarding link (L2, L1, etc) selected, against each IP address (or
prefix) IP1,
I P2, etc.
The use of a fixed infrastructure of routers, and other aspects of the
invention
to be described below, allow for routing aggregation within the AS, in
particular for the
IP addresses of mobile hosts. What follows is a brief description of IP
addressing, in
particular how variable length prefixes are used to provide routing
aggregation in an IP
routing network.
1P addresses currently consist of a predetermined number (32) of bits. 1P
addresses were in the past allocated on an unstructured basis (referred to as
a "flat"
addressing plan). Glassful addressing introduced the concept of a two level
routing
hierarchy by splitting addresses into network prefix and host fields. Users
were
allocated IP addresses as either a class A, class B or class C to simplify
routing and
administration.
In class A, bit 0 identifies class A, bits 1-7 identify network (126 networks)
and
bits 8-31 identify host (16 million hosts).
In class B, bits 0-1 identify class B, bits 2-15 identify network (16,382
networks) and bits 16-31 identify host (64,000 hosts).

WO 01/61934 CA 02400575 2002-08-19 PCT/USOl/04975
13
In class C bits 0-2 identify class C, bits 3-23 identify network (2,097,152
networks) and bits 24-31 identify host (256 hosts).
A two-level hierarchy still left a flat routing hierarchy between hosts within
a
network. For example, a class A address block could have 16 million hosts
which
would result in all routers within the network containing 16 million routing
table entries.
Subnetting was developed to allow a host address block to be split into a
variable
length subnet field and host field. This allows routers within an AS to keep
routing
table entries for subnets only (providing the aggregation of routing for all
the hosts on
each subnet). A subnet mask is used to enable routers to identify the subnet
part of
the address.
In accordance with this embodiment of the invention, routing aggregation is
provided by assigning a host IP address block (i.e. a contiguous sequence of
IP
addresses sharing one or more prefixes) to an access node such as a BS, and
dynamically allocating IP addresses from within the block to mobile hosts for
the
duration of their access sessions. When a mobile host registers with the
cellular
network on power up, the serving BS allocates an IP address and caches a
binding
between the mobile host's wireless link identifier and the allocated IP
address. An
aggregated routing plan, in this embodiment an aggregated DAG is pre-c~amputed
within the AS before the mobile host is allocated the IP address it is to use
throughout
its access session. Following power down of the mobile host, the IP address is
returned to the owning BS, which may then allocate the IP address to another
mobile
host. Mobile host IP addresses allocated by a BS will have an aggregated DAG,
until
at least one of the mobile hosts moves away, in which case the aggregated DAG
will
remain in place, but a host-specific exception will be created on the routers
affected by
a mobility-specific routing updating procedure (the update only changes
routing for the
single mobile which has moved away).

WO 01/61934 CA 02400575 2002-08-19 pCT~S01/04975
14
Pre-computation of routes in are AS for address prefixes owned by a BS is
achieved by the owning BS injecting an update message, referred to herein as
an
"optimization" (OPT) packet, for each prefix which floods out across the AS
and
effectively acts as a prefix announcement as well as building the aggregated
DAG.
The OPT packet is transmitted by the BS owning the IP address prefix, or
prefixes,
and controlling the aggregated DAG. The OPT packet propagates to all other
nodes in
the network (regardless of their current heights (if set)), and (re)sets these
heights to
the "all-zero" reference level, that is to say the first three values (T;,
oid;, r;) of the
TORA heights are all set to zero. The fourth height value, 8;, is set to the
number of
hops taken by the OPT packet since transmission from the BS (this is similar
to UPD
packet propagation in known TORA source-initiated DAG creation mechanisms). An
increment of 1 may be added to represent the hop from the BS to the mobile
node.
The fifth height value, i, is set to the node ID.
Once an aggregated DAG exists in the AS, each packet switching node in the
AS has a next-hop forwarding table entry for the IP address prefix in
question. When a
packet arrives at a node which requires routing, the node searches its next-
hop
forwarding table for the longest matching address entry on which to base the
next
routing decision, which, providing the mobile node using the IP address has
not moved
away from the owning BS, will be the IP address prefix. By providing for
aggregated
DAGs within the AS, routing table size and routing processing may be minimised
at
each packet switching node.
However, when a mobile node is handed over at the wireless link layer away
from the BS at which it first received service in the network, an individual
host address
entry is created in both the routing protocol data table and the next-hop
forwarding
table in (a limited number of) packet switching nodes affected by routing
updates
caused by the mobility of the mobile node. These nodes continue to store the

WO 01/61934 CA 02400575 2002-08-19 pCT/USOl/04975
corresponding aggregated address entries, but use the host address entry for
routing
packets to the IP address of the mobile node by virtue of a longest match
search.
The TORA height maintenance algorithm falls into the same general class of
algorithms originally defined in "Distributed Algorithms for Generating Loop-
Free
5 Routes in Networks with Frequently Changing Topology", E Gafni and D
Bertsekas,
IEEE Trans. Commun., January 1991. Within this class, a node may only
"increase"
its height; it may never decrease its height. However, in this embodiment of
the
invention, an algorithmic modification is provided to ensure that, after an
inter-BS
handover, a node's forwarding behaviour is such that, when a plurality of
routing
10 interfaces to neighbouring nodes exist, it forwards packets over a routing
interface to a
neighbouring node from which a mobility-related routing update was most
recently
received. The i time value in the height quintuple (i;, oid;, r;, 8;, i)
stored in the router's
routing protocol data table as an entry against the mobile node's IP address
and the
neighbour in question is permitted to become "negative", i.e. less than zero,
to indicate
15 a mobility-related update having occurred, and the magnitude of the
negative i time
value increases for each occurrence of a mobility-related routing update for a
given IP
address. Thus, the most recent mobility-related update is indicated by the
greater
negative i time value. It is to be noted, that whilst mobility-related routing
updates are
distinguished by a negative i time value, other indicators may also be used,
such as a
one-bit flag, to replace the negative flag.
When a mobile node changes BS affiliation, it decreases its height value by
decreasing the i time value, for example by an integer, and the new value is
propagated to a limited number of nodes in the AS as part of a mobile-
initiated update
of the DAG associated with the mobile node's IP address, to be described in
further
detail below. A node having multiple downstream neighbours routes onto the
most

WO 01/61934 CA 02400575 2002-08-19 pCT/USO1/04975
16
recently-activated downstream link. The heights are still totally-ordered
(hence routing
loop freedom is preserved).
A further aspect of this embodiment of the invention is that, during a
handover
of a mobile node at the wireless link layer, a temporary, short term,
tunnelling
mechanism is provided whereby data packets arriving at the BS from which the
mobile
node is being handed over may be forwarded to the BS to which the mobile node
is
being handed over. Tunnelling in an IP packet switching network may be
achieved by
encapsulation of the data packet with a new IP header (addressed to the IP
address of
the new BS), referred to as "IP-in-IP tunnelling". At the new BS, the packet
is
decapsulated and forwarded to the mobile node via the wireless link. Tunnel
setup,
signalling and authentication mechanisms may be those used in "Mobile IP", as
described in, inter alia, "1P Mobility Support", C Perkins, ed., 1 ETF RFC
2002, October
1996. With all BSs enabled with "Mobile IP", "Mobile IP" may also be used to
allow
packet forwarding to mobile nodes moving to a different AS. Other possible
tunnelling
protocols include UDP tunnelling (in which a UDP header is added to incoming
packets), GRE tunnelling (a CISCO (TM) protocol), the Layer 2 Tunnelling
Protocol
(L2TP), and negotiated or configured IPSEC tunnel modes.
When a mobile node is to be handed over from a BS, that BS interacts with
the new BS, to which the mobile node is being handed over to, to undertake the
following steps:
(a) to prepare a unidirectional tunnel to the new BS, so that packets may be
forwarded to the mobile node after the wireless link between the old BS and
the mobile
node is lost. The tunnel may be prepared by a mapping to a pre-existing inter-
BS
tunnel, or a host-specific tunnel, dynamically negotiated via Mobile IP
mechanisms.
(b) to handover the mobile node at the wireless link layer.

WO 01/61934 CA 02400575 2002-08-19 PCT/USOl/04975
17
(c) to inject a routing update for the mobile node's IP address (or
addresses, in the case of a mobile router) from the new BS.
(d) to forward data packets destined to the mobile node's IP address and
arriving at the old BS though a tunnel link to the new BS.
(e) to update the invalid routing to the old BS.
(f) to tear down the tunnel, if host specific, or to remove the host-specific
state in a pre-existing tunnel, following the convergence of routing.
Prior to handover, all packets are routed directly to the mobile node via a
route, or routes, in the infrastructure passing through the old BS. Following
the
convergence of routing, all packets are routed directly to the mobile node via
a route,
or routes, in the infrastructure passing through the new BS.
When handover is signalled to the new BS (either from the old BS as part of
tunnel establishment, or from the mobile node via a mobile-assisted handover),
the
new BS generates a directed routing update message which is unicast to the old
BS
using the existing DAG for the mobile node's IP address (which remains
directed to the
old BS). This update selectively modifies the mobile's DAG along the reverse
lowest-
neighbour path (an approximate shortest path) to the old BS. At the end of
this
update, the old BS will have a new downstream link in the DAG for the mobile:
node's
IP address after the mobile node is handed over at the radio link layer. A
crossover
router will, during the update process, receive the unicast-directed update at
which
point an existing data flow is redirected to the mobile node's new BS.
This update procedure is not topologically dependent, and is employed
regardless of the topological distance between the new and old BSs (which can
vary
substantially depending on the BSs' relative positions).

WO 01/61934 PCT/USO1/04975
18
The short term tunn=I avoids packet loss in the case routing to the new BS is
not established by the time the wireless link to the old BS is lost, and if no
significant
amount of caching is performed at the old BS.
The use of a short-term tunnel may nevertheless not always be necessary,
depending on the relative ordering of the two events:
(i) loss of the BS-to-mobile node wireless link at the old BS and
(ii) arrival of the directed routing update at the old BS.
If the routing update arrives before the old wireless link is lost, there is
no
need for the tunnel as no further data packets will arrive at the old BS due
to the
rerouting (providing control and data packets have equal queuing priority and
treatment; if not, then data packets already queued may still arrive after the
routing
update) and all past data packets will have been forwarded to the mobile over
the old
wireless link. If no tunnel is required, the premature triggering of a TORA
update at
the old BS, due to a loss of all downstream links when the old wireless link
is lost, may
be prevented by marking a virtual downstream link at the old BS until routing
converges. Thus, routing hold-down at the old BS may be achieved purely by
signalling.
Routing hold-down purely by signalling may also be used where the old BS
functions as a cache, for example a transparent cache, allowing the old BS to
store
relatively large volumes of data until routing converges, and retransmitting
the data
once routing converges.
As mentioned above, when a mobile node ends its access session, the
routing for the mobile node's IP address may be returned to the BS from which
it
originated, i.e. the IP address's home BS. A mechanism is provided to
efficiently
restore the destination of the DAG to the home BS, which requires the
participation of
only a limited number of nodes in the AS.
CA 02400575 2002-08-19

WO 01/61934 CA 02400575 2002-08-19 pCT/USOl/04975
19
When a mobile node ends its access session, the current BS contacts the IP
address's home BS and initiates the transfer of the destination of the DAG to
the home
BS. Again, a tunnel link can be used as a hold-down mechanism to suppress the
initiation of a routing update at the current BS or, more simply, a virtual
link (a non-
functioning downstream link marking at the current BS) may be used if no data
is to be
forwarded. The current BS establishes a tunnel link or a virtual downstream
link
directed to the home BS. In response, the home BS generates a directed
"restore"
update which is sent towards the current BS using the existing DAG for the
mobile
node's IP address (which remains directed to the current BS). This update
deletes all
the host-specific routing protocol data table entries and next-hop forwarding
table
entries created by the previous mobility of the mobile node, to restore the
pre-
computed aggregated DAG as the active routing plan for the mobile node's IP
address. The update travels over the path previously created by routing
updates
caused by the mobile node's past mobility. Thus, the set of negative height
values that
the mobility-specific updates generated are erased, and the aggregated DAG
with its
"all-zero" reference level (assuming there have been no failures in the
network causing
new height generations and reversals) is reactivated. The tunnel link or the
virtual link
can be maintained until reception of the restore update at the current BS, at
which time
either the tunnel is torn down or the virtual link is removed.
Periodically, or on detection of a triggering event, the mobile node, or a BS
acting on behalf of the mobile node, may re-initialise the DAG for an IP
Address, using
a TORA update mechanism, with "all-zero" reference levels thereby removing any
mobility-related routing table entries for the DAG. "All-zero" reference
levels
propagated in this manner take precedence over all other height values (both
positive
and negative) and may propagate throughout the AS (an AS-wide DAG re-

WO 01/61934 CA 02400575 2002-08-19 pCT/USOl/04975
optimisation). This provides a mechanism for soft-state route maintenance,
which
overrides the mobility-related updating mechanism.
A detailed example of inter-BS handover at the wireless link layer and routing
updates within the fixed infrastructure of an AS will now be described with
reference to
5 Figures 2 to 11. A further example is described with reference to Figures 12
to 16.
Finally, a detailed example of the restoration of routing to a home BS after
the end of a
mobile host access session is described in relation to Figures 17 to 25. In
each of the
TORA height quintuples illustrated in Figures 2 to 25, the node ID is depicted
using the
reference i, for simplicity. However, it will be appreciated that this value
will be
10 different for each node, so as to uniquely identify the node within the AS.
It will also be
noted that only a part of the AS is illustrated, for the sake of simplicity.
In all of the following examples, the AS includes a plurality of fixed core
routers (CR1, CR2 ...), a plurality of fixed intermediate routers (1R1,
IR2...) and a
plurality of fixed edge routers (ER1, ER2...), classified in accordance with
their relative
15 proximity to the topological "edge" of the fixed infrastructure. The core
routers may be
adapted to handle higher quantities of traffic than the intermediate routers,
and the
intermediate routers, in turn, may be adapted to handle higher quantities of
traffic than
the edge routers. For example, the core routers may handle national traffic,
the
intermediate routers regional traffic, and the edge routers sub-regional
traffic.
20 In the case of all of the examples described below, the hop-by-hop routing
directionality at the interfaces is indicated by arrows marked along links
between nodes
of the network, and between access nodes and mobile nodes (which links include
a
wireless link). The distributed routing plan is in the form of a TORA DAG
directed at a
single receiving mobile host, MH2. Before the mobile host MH2 begins an access
session, and is dynamically allocated an IP address, a pre-computed and
aggregated
DAG exists for the IP address within the AS, having been injected as an AS-
wide

WO 01/61934 CA 02400575 2002-08-19 pCT/USOl/04975
21
update from the access node allocating the IP address, node BS2. In Figures 2
to 25,
nodes involved in routing updates or packet forwarding are marked with their
TORA
height quintuple (i;, oid;, r;, 8;, i). As previously described, this TORA
height is also
stored within the routing protocol data table of each neighbouring node,
having been
advertised from the node to which the height applies.
When the mobile node MH2 registers with the home access node BS2, the
home access node caches the identity of the mobile host at the wireless link
layer
against the IP address which is allocated, thus forming a mobile-specific
entry in a
routing table held in node BS2.
Figure 2 illustrates an exemplary communications session (for example, a
TCP/IP connection) occurring between the mobile node MH2 and a further host,
in this
case a mobile host, MH1. In the following examples, mobility of the
correspondent
mobile host MH1 does not occur, although such mobility is possible using the
same
functionality which is to be described in relation to the mobility of the node
MH2. A
similar communications session may also be conducted with a correspondent
fixed
host. Notably, a separate DAG exists within the AS directed towards the node
MH1,
whereby data packets originated from the node MH2 are routed to the node MH1.
As
this DAG directed to the node MH1 does not alter, and routing exists towards
thsc mode
MH1 from each access node which the node MH2 affiliates with, no further
description
of routing towards the node MH1 will be provided.
Data packets originated from the node MH1 and destined to the node MH2
are initially routed to the home access node BS2 via its aggregated DAG, for
example
via fixed nodes BS1, ER1, IR1, and ER2, as shown in Figure 2.
Referring now to Figure 3, a wireless link layer inter-BS handover decision
may be made either by the node MH2 itself, or by the node BS2. In the case of
a
mobile node-initiated handover, the decision may be made based on a comparison
of

WO 01/61934 CA 02400575 2002-08-19 PCT/USOl/04975
22
wireless link quality between signals received from the nodes BS2 and BS3. As
the
mobile node MH2 moves, tl~e signal received from access node BS3 may improve,
whilst the signal received from access node BS2 worsens, and at a threshold
decision
event, the mobile host responds by initiating a handover between nodes BS2 and
BS3.
In the case of a handover decision made at node BS2, the decision may be made
based on other considerations, such as traffic load. In such a case, the
access node
BS2 transmits a handover instruction to node MH2.
Whether the inter-BS handover is initiated by the mobile node MH2 or the
home access node BS2, the mobile node MH2 selects a new access node BS3 and
transmits a tunnel initiation (TIN) packet to the home access node BS2. The
TIN
packet includes the IP address of the new access node BS3, which the mobile
node
reads from a beacon channel broadcast by access node BS3. Mobile node MH2 also
computes a new height, by decreasing the i time value of its height to a
negative
value, -1 (indicating a first mobility-related routing update away from the
home access
node BS2), and includes this in the TIN packet.
Referring now to Figure 4, when the home access node BS2 receives the TIN
packet from mobile node MH2, the home access node BS2 establishes a short term
IP-in-IP tunnel link towards the new access node BS3. The home access node BS2
enters the tunnel interface to BS3 in its routing table, the TORA height of
the new
access node BS3 being set equal to (-1, 0, 0, 1, i) to ensure the tunnel
interface being
marked as a downstream link for data packet forwarding during the remainder of
the
handover procedure.
When the short-term tunnel link has been established from home access
node BS2 to new access node BS3, the home access node BS2 forwards the TIN
packet received from mobile node MH2 to the new access node BS3 via the tunnel
interface.

WO 01/61934 CA 02400575 2002-08-19 PCT/USOl/04975
23
In the present example, the nature of the wireless link system used is such
that the mobile node MH2 is (as in a CDMA cellular radio system allowing soft
handover) able to communicate via two wireless links to each access node BS2
and
BS3 during a handover. Thus, next, the mobile node MH2 establishes a second
wireless link with the new access node BS3, and a routing table entry is made
in node
BS3 indicating a downstream link towards mobile node MH2.
In soft-handover, the two wireless links are used in parallel to send the same
data packets. The mobile receives the total power from both basestations which
enables the mobile to optimise receive performance (power/data). This requires
the
new basestation to mobile link and the existing link to be tightly
synchronised together
so that the same packet is being received over both mobile interfaces at the
same
time. This can be achieved by the new base station sending a data request
packet, on
processing the TIN packet, to the old base station so that packets arriving at
the old
basestation are copied down the tunnel to the new basestation and onto the
mobile via
the new concurrent link. Synchronisation can be achieved in a variety of ways,
with
one example being by the mobile broadcasting a timing or pacing signal to the
two
basestations which cache, and pace packets out the interfaces, during soft-
handover
phase. The mobile to basestation paths cannot use this feature although the
old base
station could delay transmission of packets into the core network until the
same packet
is received via the new basestation and redirect tunnel. This may allow lost
and
errored packets to be recovered. Another way of achieving synchronisation is
by the
old basestation copying packets to the new basestation via the tunnel, and
caching its
version for a predetermined time prior to transmission over its mobile link.
The
predetermined time corresponds to the amount of time taken for the copied
packet to
arrive at the new basestation and be sent, which is approximately constant and
known
at the old basestation.

WO 01/61934 CA 02400575 2002-08-19 pCT~S01/04975
24
Figures 28 to 30 show in further detail the soft handover process. As shown
in Figure 28, the TIN packet in general arrives before the mobile arrives and
is cached.
On arrival of the TIN packet at the new access node BS3 a virtual link is
established in
advance of the arrival of the mobile. In addition, on arrival of the TIN
packet, the new
access node BS3 transmits a data request DR to the home access node BS2. As
shown in Figure 29, the arrival of the data request DR causes data to be
tunnelled to
the new access nodes BS3, where it is dropped until the mobile arrives. If it
is already
known to the home access node BS2 that the new access node BS3 has soft hand-
off
capability, then the home access node sends data immediately following the TIN
packet, without waiting for a data request DR from the new access node BS3. In
the
stage shown in Figure 29, the new access node BS3 is still waiting until a
layer 2
"make" event occurs. Figure 30 shows the state of the network when that event
occurs. Tunnelled data is now forwarded to the mobile via the new link from
new
access node BS3, in addition to data arriving at the mobile via the old like
through
home access node BS2. Subsequently, when the new link is preferred, hand-off
is
triggered by the new access node BS3 generating a UUPD packet, as further
described below.
Other handover models are possible though. The old and new basestations
may collaborate to support concurrent routing paths through load-sharing
extensions
based on, for example, IP source address prefix so that all packets from the
same
source go via the same link to the mobile, but multiple sources will use
different
(closest) links which makes better use of total bandwidth available to the
mobile.
When the mobile identifies the preferred link, then soft-handover is
completed.
The new access node BS3 generates a unicast-directed update (UUPD)
packet and transmits the packet to its neighbouring node in the fixed
infrastructure,
node ER3. The UUPD packet is to travel along a unicast path between the new

WO 01/61934 CA 02400575 2002-08-19 pCT~S01/04975
access node BS3 and the home access node BS2, updating entries in the routing
protocol data tables, and consequently also in at least some of the next-hop
forwarding
tables, of all nodes along the update path, and all nodes immediately adjacent
to the
nodes along that path (the nodes along the path transmit an advertisement of
their
5 new heights to each immediately neighbouring node, the propagation of the
advertisements being limited to one hop).
Referring now to Figure 6, after the mobile host MH2 establishes a new
wireless link with the new access node BS3, the old wireless link to the home
access
node BS2 is pulled down. Data packets directed to the mobile node MH2 arriving
at the
10 home access node BS2 are forwarded to the new access node BS3 via the short-
term
tunnel, and onward to the mobile node MH2 via the new wireless link.
Although the old wireless link is now lost, no routing update is yet triggered
at
the home access node BS2 (as would otherwise occur according to the TORA
protocol), since a remaining downstream link exists along the tunnel which has
been
15 established between the home access node BS2 and the new access node BS3.
Thus, routing towards the home access node BS2 remains in place until the
routing
update initiated from the new access node BS3 arrives at the home access node
BS2.
As shown in Figure 6, the UUPD packet is forwarded from the first node ER3
re~;civing
the UUPD packet, which also updates its height with the negative i time value
20 associated with the mobility update (-1), to node IR2. Node IR2, in turn,
updates its
height with the negative i time value associated with the mobility-related
update.
Each node along the routing update unicast route also increments its b value
in the TORA height quintuple by one for each hop of the routing update UUPD
packet,
so that the S value represents the number of hops to the mobile node via the
new
25 access node BS3, in place of the 8 values of the previous routing table
entry which
indicated the number of hops to the mobile node via the home access node BS2.

WO 01/61934 CA 02400575 2002-08-19 pCT/USOl/04975
26
Each link in turn along the micast directed update route is thus directed
towards the
new access node BS3.
Referring now to Figure 7, the UUPD packet is next forwarded to the
subsequent node along the unicast updating route, node ER2. Node ER2 is a
router
which marks the cross-over point between the routing path followed from the
transmitting node MH1 to the home access node BS2 and the routing path to be
followed by packets transmitted from the node MH1 to the new access node BS3
(the
routing path being established). As shown in Figure 8, once the routing
protocol data
table entries in node ER2 are updated on receipt of the UUPD packets, the
cross-over
node ER2 has two downstream links, one directed towards the home access node
BS2
and one directed towards the new access node BS3. However, because the
downstream link directed towards the new access node BS3 includes a negative i
time
value, which indicates a (most-recent) mobility-related update, the downstream
link
directed towards the new access node BS3 is preferentially selected as the
next-hop
forwarding link. Data packets arriving at node ER2 directed to the mobile host
MH2
are forwarded to node IR2, along the routing path to the new access node BS3.
Following the diversion of the routing path at the cross-over router ER2, no
further data
packets are forwarded to BS2 and no further data packets are forwarded through
the
tunnel interface between the node BS2 and the node BS3. However, the tunnel
interface remains in place for the time being at the home access node BS2, in
order to
ensure that no routing update is generated from home access node BS2 (due to
loss
of all its downstream links) until the UUPD packet arrives at the home access
node
BS2. On arrival of the UUPD packet at the home access node BS2, the tunnel
state
entries in the routing table of BS2 are removed, thereby tearing down the
tunnel
interface for MH2.

WO 01/61934 CA 02400575 2002-08-19 pCT/LTSOl/049'75
27
Referring now to Figure 9, it will be noted that the height of the home access
node BS2 is not redefined on receipt of the UUPD packet (however, the link
direction
between the node BS2 and ER2 is reversed because of the negative i time value
defined in the height for node ER2, thus allowing other mobile hosts receiving
service
via BS2 to transmit packets to MH2), since the home access node BS2 forms the
end
of the unicast update path.
Finally, on receipt of the UUPD message, the home access node BS2 may
transmit an update-complete acknowledgement (UUPD-Ack) towards the new access
node BS3. The UUPD-Ack packet follows the unicast-updated routing path
established in the DAG towards new access node BS3. On transmission of the
UUPD-
Ack packet, old access node BS3 relinquishes tentative control for the DAG for
the IP
address it originally allocated to the mobile node MH2. On receipt of the UUPD-
Ack
packet, the new access node BS3 takes tentative control of the DAG for the IP
address of the mobile node.
The routing update associated with the inter-BS handover of the mobile
station at the radio link layer is now complete, involving the redefinition of
the height of
only a limited number of nodes (In the example shown in Figure 9, only five
nodes)
along the unicast update path. Furthermore, the updating of routing protocol
data
table entries is also limited, such updates only being required in the nodes
receiving
the UUPD message and each immediately adjacent node (which receive an
advertisement of the new heights and store the new heights in their routing
tables). In
the example shown in Figure 9, routing protocol data table updates are also
performed
in each of nodes IR1, CR1, CR2 and CR3.
Figures 10 and 11 show the state of the DAG within the AS prior to, and
following, a subsequent mobility-related update. In this case, the mobile node
MH2 is
handed over to a further access node BS4 from the access node BS3, to which
the

WO 01/61934 CA 02400575 2002-08-19 PCT/USOl/04975
28
mobile node was previously handed over from access node BS2. The procedure
employed is the same as that described in relation to the mobility-related
update
caused by the first handover of the mobile node from access node BS2 to access
node
BS3, except that the new height generated by the unicast update sent from the
new
access node BS4 include a further increment in the negative i time value
(which is
increased in magnitude to -2), to differentiate the mobility-related updated
heights
caused by the second occurrence of mobility from the mobility-related updated
heights
of the first occurrence of mobility (having a i time value of -1 ), and from
the mobility-
related updated heights from the heights assigned in the pre-computed DAG
(having a
i time value of 0). As shown in Figure 1, the nodes involved in the new update
initially
have heights including a i time value of 0, indicating that the heights are as
defined in
the pre-computed DAG.
A further example of mobility-related routing updating, in which the mobile
node is (as in a GSM cellular radio system) capable of communicating only via
a single
wireless link at any particular time, will now be described with reference to
Figures 12
to 16. In this case, the steps described in relation to Figures 2 to 4 in the
previous
example are identical. As shown in Figure 12, the UUPD packet sent from the
new
access node BS3 is generated in response to receipt of a TIN packet along the
tunnel
interface.
Referring now to Figure 13, the mobile node MH2 first loses it wireless link
with the home access node BS2, and a short time period elapses (to allow for
re-
synchronisation with the new access node BS3 at the wireless link layer, ETC)
before
the new wireless link with the new access node BS3 may be established. During
the
period that the mobile node MH2 has no wireless links, packets arriving at the
home
access node BS2 are forwarded by the tunnel interface from the home access
node
BS2 and are queued at the new access node BS3 until the new wireless link is

WO 01/61934 CA 02400575 2002-08-19 PCT/USO1/04975
29
established. Next, either the new wireless link is established or the UUPD
packet
arrives at the home access node BS2. If the new wireless link is established
first, the
new access node BS3 immediately assumes tentative control of the DAG for the
IP
address of the mobile node. Otherwise, the new access node BS3 waits until it
receives the UUPD-Ack message from the home access node BS2. Remaining steps
described in relation to the previous example (tunnel tear down, subsequent
mobility,
etc.) also apply in relation to the present example.
Figures 17 to 25 illustrate a procedure whereby, when a mobile node ends an
access session, routing updates are performed which restore the DAG for the IP
address of the mobile node to the condition of the DAG before the IP address
was
originally allocated to the mobile node. The routing update procedure involves
routing
updates being transmitted to only a limited number of nodes in the AS (along
the paths
along which unicast mobility-related updates were previously performed), and
updates
are required in the routing protocol data tables of only a limited number of
nodes (the
nodes along which the restored directed routing update messages pass and each
immediately adjacent node).
Referring to Figure 17, when the mobile node MH2 ends the access session,
the current access node BS4 transmits a restore request (RR) to the homy
access
node BS2 for the IP address. This may be achieved by knowledge of the identity
of
the "home" access node for the IP address at the current access node. This
knowledge can be provided by transmitting the identity of the owning BS when
creating
the aggregated DAG using the OPT packet update mechanism, and storing that
identity as routing protocol data, in addition to the other routing protocol
data held in
the access nodes. This knowledge may alternately be provided by the mobile
node
storing the identity of the home BS when its IP address is first allocated,
and
transmitting this identity to each access node, for temporary storage therein,
from

WO 01/61934 CA 02400575 2002-08-19 pCT/USOl/04975
which the mobile node recE Ives service during its access session. Thus, when
the
mobile node MH2 ends this access session, the current access node BS4
transmits
the RR packet, initially addressed with the IP address of the mobile node and
encapsulated with the IP address of the home access node BS2, along an IP-in-
IP
5 tunnel link to the home access node BS2.
As an alternative to requiring knowledge of the identity of the home BS for an
IP address, the RR packet may be transmitted with the mobile node's IP address
as
the destination address, however with an identifier in its header indicating
to each
forwarding node that the packet is to be routed along the aggregated DAG
routing
10 path, which remains directed at the home BS throughout the access session.
In response to receipt of the RR packet, home access node BS2 marks a
downstream link in its routing tables to mobile host MH2. This downstream link
is a
virtual link, since the mobile host is currently not in wireless
communications with any
access node and is in fact located in a service area of a different access
node (that of
15 access node BS4). Any packet arriving at BS4 for the mobile node MH2
following the
end of its access session may be forwarded along the tunnel to the home access
node
BS2, and may be stored for future forwarding to the mobile node MH2 when it
begins a
new access session.
On receipt of the RR packet, the home access node BS2 also resets the
20 height of the (now virtual) mobile node MH2 to an "all-zero" reference
level, and sends
a unicast-directed restore update (UDRU) packets towards the current access
node
BS4, via the fixed infrastructure of the AS, as illustrated in Figure 18. The
UDRU
packet is forwarded along a unicast route, which includes only nodes having
heights
which were previously redefined as a result of mobility-related updating. In
the
25 example shown in Figure 18, these nodes are nodes ER2, IR2, ER3, IR3, CR4,
IR4,
ER4 and BS4.

WO 01/61934 CA 02400575 2002-08-19 PCT/USOl/04975
31
As the UDRU packet is received at each of the nodes along the unicast path,
the TORA heights at each node are reset to an "all-zero" reference level, and
the b
values of the heights are redefined so as to represent the number of hops to
the (now
virtual) mobile node via the home access node, in place of the previous entry
values
which indicated the number of hops to the mobile node via the current access
node.
This process is illustrated in each of Figures 18 to 22.
In addition to the updating of heights along the unicast update route, the
updated heights are advertised to each immediately adjacent node. Any node
having
a negative i time value in its own height which receives an advertisement
indicating
the resetting of a negative i time value to 0, as in the case of access node
BS3 (as
illustrated in Figure 20), also resets its own height to an "all-zero"
reference level,
defines its b value to indicate the number of hops to the (now virtual) mobile
station via
the home access node, and generates an advertisement of its own new height and
transmits it to all of its own neighbours. Any neighbours receiving an
advertised new
height which do not reset their own height do not propagate the advertisement
any
further.
As illustrated in Figure 23, once the UDRU packet is received at the current
access node BS4, the current access node deletes the state associated with the
mobile node MH2 in its routing tables and transmits a UDRU-Ack message, along
the
routing path just created by the unicast-update, towards the home access node
BS2,
thereby relinquishing tentative control of the DAG for the IP address
previously used
by the mobile node MH2.
As shown in Figure 24, the UDRU-Ack packet eventually propagates to the
home access node BS2. On receipt, the home access node BS2 removes all state
associated with the mobile node MH2 and assumes control of the DAG for the IP
address. The IP address may then once again be dynamically allocated, to a
different

WO 01/61934 CA 02400575 2002-08-19 PCT/USOl/04975
32
mobile node MH3 starting an access session in the service area of the access
node
BS2, as shown in Figure 25.
In summary, the following modifications, which may be used alone or in any
combination, to a routing protocol provided by the present invention include:
1. Storing distinctive routing protocol data ("negative" height reference
levels in the case of the TORA protocol) generated as a consequence of
mobility, so
that packets are forwarded towards the most recently-assigned downstream
neighbour.
2. Incorporating unicast-directed mobility updates to adjust routing on
handover by altering routing protocol data stored in only a limited set of the
nodes of
an AS.
3. Incorporating unicast-directed restoration updates to erase the effects
of handover-based mobility ("negative" height reference levels in the case of
TORA).
It is to be appreciated that the above-described embodiments are not intended
to be limited, and that modifications and variations will be envisaged by the
person
skilled in the art.
The above-described embodiments describe a modified routing protocol
based on the TORA routing protocol. However, aspects of the invention may be
utilised to modify other known routing protocols, such as OSPF, RIP, etc.
Furthermore, although in the above-described embodiments the infrastructure
of the Autonomous System is fixed, it is to be appreciated that one or more of
the
routers in the infrastructure may be mobile routers, such as used in the field
of satellite
communications, and other systems in which one or more routers in the
infrastructure
exhibit long-term mobility. Furthermore, mobile nodes may also be connected to
an
access node via a movable non-wireless communications link, such as a plug-in
cable
connection.

Representative Drawing
A single figure which represents the drawing illustrating the invention.
Administrative Status

2024-08-01:As part of the Next Generation Patents (NGP) transition, the Canadian Patents Database (CPD) now contains a more detailed Event History, which replicates the Event Log of our new back-office solution.

Please note that "Inactive:" events refers to events no longer in use in our new back-office solution.

For a clearer understanding of the status of the application/patent presented on this page, the site Disclaimer , as well as the definitions for Patent , Event History , Maintenance Fee  and Payment History  should be consulted.

Event History

Description Date
Inactive: IPC from PCS 2022-01-01
Inactive: IPC from PCS 2022-01-01
Inactive: IPC expired 2022-01-01
Inactive: IPC expired 2013-01-01
Inactive: IPC expired 2009-01-01
Inactive: IPC expired 2009-01-01
Time Limit for Reversal Expired 2007-02-16
Application Not Reinstated by Deadline 2007-02-16
Inactive: Abandoned - No reply to s.30(2) Rules requisition 2006-06-20
Inactive: IPC from MCD 2006-03-12
Inactive: IPC from MCD 2006-03-12
Inactive: IPC from MCD 2006-03-12
Inactive: IPC from MCD 2006-03-12
Inactive: IPC from MCD 2006-03-12
Deemed Abandoned - Failure to Respond to Maintenance Fee Notice 2006-02-16
Inactive: S.30(2) Rules - Examiner requisition 2005-12-20
Letter Sent 2003-12-29
Request for Examination Requirements Determined Compliant 2003-12-03
All Requirements for Examination Determined Compliant 2003-12-03
Request for Examination Received 2003-12-03
Letter Sent 2003-07-28
Inactive: Correspondence - Formalities 2003-06-05
Inactive: Single transfer 2003-06-05
Inactive: Courtesy letter - Evidence 2002-12-23
Inactive: Cover page published 2002-12-20
Inactive: Notice - National entry - No RFE 2002-12-18
Application Received - PCT 2002-10-08
National Entry Requirements Determined Compliant 2002-08-19
Application Published (Open to Public Inspection) 2001-08-23

Abandonment History

Abandonment Date Reason Reinstatement Date
2006-02-16

Maintenance Fee

The last payment was received on 2004-12-06

Note : If the full payment has not been received on or before the date indicated, a further fee may be required which may be one of the following

  • the reinstatement fee;
  • the late payment fee; or
  • additional fee to reverse deemed expiry.

Patent fees are adjusted on the 1st of January every year. The amounts above are the current amounts if received by December 31 of the current year.
Please refer to the CIPO Patent Fees web page to see all current fee amounts.

Fee History

Fee Type Anniversary Year Due Date Paid Date
Basic national fee - standard 2002-08-19
MF (application, 2nd anniv.) - standard 02 2003-02-17 2003-02-04
Registration of a document 2003-06-05
Request for examination - standard 2003-12-03
MF (application, 3rd anniv.) - standard 03 2004-02-16 2004-01-12
MF (application, 4th anniv.) - standard 04 2005-02-16 2004-12-06
Owners on Record

Note: Records showing the ownership history in alphabetical order.

Current Owners on Record
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY
Past Owners on Record
ALAN W. O'NEILL
MATHEW S. CORSON
Past Owners that do not appear in the "Owners on Record" listing will appear in other documentation within the application.
Documents

To view selected files, please enter reCAPTCHA code :



To view images, click a link in the Document Description column (Temporarily unavailable). To download the documents, select one or more checkboxes in the first column and then click the "Download Selected in PDF format (Zip Archive)" or the "Download Selected as Single PDF" button.

List of published and non-published patent-specific documents on the CPD .

If you have any difficulty accessing content, you can call the Client Service Centre at 1-866-997-1936 or send them an e-mail at CIPO Client Service Centre.

({010=All Documents, 020=As Filed, 030=As Open to Public Inspection, 040=At Issuance, 050=Examination, 060=Incoming Correspondence, 070=Miscellaneous, 080=Outgoing Correspondence, 090=Payment})


Document
Description 
Date
(yyyy-mm-dd) 
Number of pages   Size of Image (KB) 
Representative drawing 2002-08-18 1 12
Description 2002-08-18 32 1,394
Drawings 2002-08-18 29 467
Abstract 2002-08-18 1 55
Claims 2002-08-18 2 60
Reminder of maintenance fee due 2002-12-17 1 106
Notice of National Entry 2002-12-17 1 189
Courtesy - Certificate of registration (related document(s)) 2003-07-27 1 106
Acknowledgement of Request for Examination 2003-12-28 1 188
Courtesy - Abandonment Letter (Maintenance Fee) 2006-04-12 1 177
Courtesy - Abandonment Letter (R30(2)) 2006-08-28 1 167
PCT 2002-08-18 3 87
Correspondence 2002-12-18 1 25
PCT 2002-08-19 5 209
Correspondence 2003-06-04 2 60