Abstract:
One embodiment includes tracking utilization of the backhaul wireless bandwidth of a mesh network related to time sensitive packet data, receiving a call admission request for a call from a client station of a first mesh access point of the mesh, ascertaining using the tracked utilization whether to approve the call admission request using a backhaul call admission control method, and approving the call by sending a positive call admission response if the backhaul call admission control method approves the call and if an access level call admission control method ascertains to approve the call admission request at the access level.
Abstract:
A system for providing a tree topology for a network having an interior gateway protocol. A first router receives a hello message (305) from all connected routers in the network. The hello messages include tree topology information (310). The first router then uses the tree topology information to determine a parent of the router (315). The first router then establishes connections with directly connected routes at the same level in the tree topology. The first router also generates link messages that include all of the prefixes for children of the first router and broadcasts the link messages.
Abstract:
Each mobile router in an ad hoc mobile network is configured for concurrently attaching to multiple parents advertising respective parent depths relative to a clusterhead of the ad hoc mobile network. The mobile router selects an advertised depth relative to the clusterhead based on adding a prescribed increment to a maximum one of the parent depths, enabling the mobile routers to form a directed acyclic graph relative to the clusterhead. Each mobile router sends to each of its parents a neighbor advertisement message specifying at least one reachable prefix, a corresponding cost for reaching the reachable prefix, and a corresponding sequence identifier that enables the parents to validate the neighbor advertisement message relative to stored router entries . Hence, mobile routers automatically can form a directed acylic graph relative to the clusterhead, and can distribute routing information with minimal overhead.
Abstract:
Mobile routers in a tree-based network topology with a single clusterhead in an ad hoc network establish connectivity based on each attached mobile router sending a neighbor advertisement message to an attachment mobile router via a corresponding egress interface. Any neighbor advertisement message received by a mobile router is used to identify specified network prefixes that are reachable via the source of the neighbor advertisement message. Each attached mobile router outputs to its attachment router another neighbor advertisement message that specifies the network prefix used by the mobile router, and the specified network prefixes from its attached mobile routers. The mobile router also identifies peer mobile routers having the same depth, and selectively shares limited routing information with the peer routers, enabling the mobile router to bypass the clusterhead and reach remote prefixes via the peer routers without burdening the tree.
Abstract:
A mobile router and a correspondent router, each configured for routing services for nodes within their routing prefixes associated with their respective routing tables, establish a secure, bidirectional tunnel based on a messaging protocol between each other and a route server resource having a prescribed security relationship with the mobile router and correspondent router. The mobile router sends a query via its home agent to the route server resource to identify the correspondent router serving the correspondent node. The mobile router sends a binding update request, specifying a home address and care-of address for the mobile router, to the correspondent router for establishment of a bidirectional tunnel. The correspondent router, upon validating the home address is reachable via the care-of address, establishes the bidirectional tunnel, and updates its routing tables to specify that prescribed address prefixes are reachable via the mobile router home address.
Abstract:
Methods and apparatus for registering with a Home Agent are disclosed. The network device sends a registration request having a home address field including an IP address to a Home Agent associated with the IP address. The registration request indicates one or more ports of the network device via which data packets or server requests addressed to the IP address are to be received. The ports may be specified in a port extension to the registration request. In addition, the registration request may indicate a priority to be associated with the registration. The Home Agent updates its mobility binding table with the IP address and care-of address, as well as other information specified in the registration request, such as port and/or priority information. The Home Agent then sends a registration reply to the network device. When the registration request is not sent directly by the network device (e.g., via a collocated care-of address), the Foreign Agent updates its visitor table upon receipt of the registration reply with the Home Agent address and IP address, as well as port and/or priority information. The registration reply is then sent to the network device. In this manner, multiple registrations for a single device or user may be established according to specified port(s), thereby enabling various applications and/or devices to be prioritized.
Abstract:
A mobile router is configured for attaching to a selected router in a clustered network (e.g., a mobile ad hoc network) based on identifying a network topology model of the clustered network from received router advertisement messages that include tree information option fields specifying attributes of the network topology model. The mobile router selects which router advertisement originator to attach to based on correlating the attributes of the router advertisement originators relative to identified priorities, and orders the router advertisement originators within a default router list based on the identified priorities. If the mobile router detects a router from a second clustered network, the mobile router advertises to the attachment router that the second clustered network is reachable, enabling the two clustered networks to communicate using a point-to-point link between the respective attachment routers.
Abstract:
A mobile router is configured for attaching to a selected router in a mobile network based on identifying a network topology model of the mobile network from received router advertisement messages that include tree information option fields specifying attributes of the network topology model. The mobile router selects which router advertisement originator to attach to based on correlating the attributes of the router advertisement originators relative to identified priorities, and orders the router advertisement originators within a default router list based on the identified priorities. The mobile router attaches to one of the routers in the ordered default router list having a higher priority, and upon attaching to the router advertisement originator as its attachment router, the mobile router transmits its own corresponding router advertisement message including a corresponding tree option field that specifies the attributes of the mobile router within the network topology model, enabling other routers to selectively connect and/or reconnect within the mobile network based on their respective identified preferences.
Abstract:
Optimal determination of wireless network pathway configurations may be provided. A computing device may receive an error profile and a response instruction associated with the error profile, as generated by a network controller. The computing device may then monitor, for an error, on a communication Track, in a network, between an ingress node and an egress node. Then, the computing device, upon detecting the error, can determine that the error is similar to the error profile, and based on the determination that the error is similar to the error profile, enact the response instruction. The response instruction can direct the computing device to switch from the communication Track to a communication sub Track between the ingress node and the egress node.
Abstract:
Systems and methods may include sending, to a network registrar, an extended duplicate address request (EDAR) message including a first nonce generated by a host computing device, and receiving, from the network registrar, an extended duplicate address confirmation (ED AC) message including a second nonce, the second nonce being signed by the network registrar via a private key of a first public key infrastructure (PKI) key pair of the network registrar via a first signature. The method further includes sending a first neighbor advertisement (NA) message to the host computing device including the second nonce. The second nonce and the private key of the network registrar verifies the first signature from the network registrar, the verification of the first signature indicating that the router is not impersonating the network.