WO2012074353A1 - A method of distributing data traffic - Google Patents
A method of distributing data traffic Download PDFInfo
- Publication number
- WO2012074353A1 WO2012074353A1 PCT/MY2011/000085 MY2011000085W WO2012074353A1 WO 2012074353 A1 WO2012074353 A1 WO 2012074353A1 MY 2011000085 W MY2011000085 W MY 2011000085W WO 2012074353 A1 WO2012074353 A1 WO 2012074353A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- traffic
- mapping table
- data
- source
- data path
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W40/00—Communication routing or communication path finding
- H04W40/02—Communication route or path selection, e.g. power-based or shortest path routing
- H04W40/22—Communication route or path selection, e.g. power-based or shortest path routing using selective relaying for reaching a BTS [Base Transceiver Station] or an access point
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W40/00—Communication routing or communication path finding
- H04W40/24—Connectivity information management, e.g. connectivity discovery or connectivity update
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W40/00—Communication routing or communication path finding
- H04W40/34—Modification of an existing route
- H04W40/36—Modification of an existing route due to handover
Definitions
- the present invention relates to a method of distributing data traffic to predetermined destinations in wireless multi hop networks.
- a method of distributing data traffic to predetermined destinations in wireless multi hop networks includes the steps of receiving data traffic from a source, breaking out received traffic and redistributing traffic to predetermined destinations which are configurable as recorded in a mapping table.
- a method of distributing data traffic to predetermined destinations in wireless multi hop networks includes the steps of receiving data traffic from a source, instantiating and managing data bearer between a data path function, selecting a payload traversing the data bearer, scanning a chain of headers from data traffic, identifying a plurality of fields to be amended, calling up a mapping t ble, determining encapsulation of traffic, changing source and destination addresses of the header when there is no encapsulation of traffic and sending data traffic to the predetermined destination.
- Figure 1 shows an example of a method of distributing data traffic to predetermined destinations in wireless multi hop networks wherein two base stations forward or route data traffic in Worldwide Interoperability tor Microwave Access (WiMAX) in the preferred embodiment of the invention
- Figure 2 shows a method of distributing data traffic to predetermined destinations in wireless multi hop networks in a location of distributed date path function and a mapping table in the preferred embodiment of the invention
- FIG. 3 shows a flowchart of steps performed by the distributed data path function ( UPF);
- Figure 4 shows an example of a chain of headers followed by the user payload in an embodiment of the invention
- Figure 5 shows a chart depicting IP and encapsulation details of fields in both types of headers
- Figure 6 shows an example of a topology with data traffic distribution as recorded in the mapping table
- Figure 7 shows a flow of messages flowing to and from the distributed data path function using WiMAX
- Figure 8 shows the contributing functions of the distributed data path function and the mapping table.
- the present invention relates to a method of distributing data traffic to predetermined destinations in wireless multi hop networks. More particularly, the method is a method of incorporating multiple performance metrics into a shortest routing protocol in wireless mesh networks.
- this specification will describe the present invention according to the preferred embodiment of the present invention. However, it is to be understood that limiting the description to the preferred embodiment of the invention is merely to facilitate discussion of the present invention and it is envisioned that those skilled in the art may devise various modifications and equivalents without departing from the scope of the appended claims.
- Figure 2 illustrates a method of distributing data traffic to predetermined destinations in wireless multi hop networks.
- the method includes the steps of receiving data traffic from a source, breaking out received traffic and redistributing traffic to predetermined destinations which are configurable as recorded in a mapping table.
- a distributed data path function refers to a mapping table in order to guide or breakout traffic.
- the mapping table describes a configuration of a network where the source, destination and data path identifications are recorded in the mapping table.
- the mapping table allows for single or multi-hdp configurations.
- the mapping table can be configured for fixed topology or the mapping table may be adapted b an operator as part of Operation and Maintenance.
- FIG 1 shows an example of this embodiment wherein two base stations cannot forward or route data traffic in Worldwide Interoperability for Microwave Access (WiMAX).
- a data path function at the source such as in Access Service Network Gateway (ASN GW) in WiMAX, forwards or routes data traffic to the distributed data path function (DDPF) in the method.
- the DDPF performs breakout of traffic and redistributes the traffic to destinations as configured in the mapping table.
- Hie destinations can be configured in single hop, multi hop, random, mesh or any topology as seen fit for application by one skilled in the art.
- a preferred embodiment of the method of distributing data traffic to predetermined destinations in wireless multi hop networks includes the steps of receiving data traffic from a source, instantiating and managing data bearer between a data path function, selecting a payload traversing the data bearer, scanning a chain of headers from data traffic, identifying a plurality of fields to be amended, calling up a mapping table, determining encapsulation of traffic, changing source and destination addresses of the header when there is no encapsulation of traffic and sending data traffic to the predetermined destination as seen in Figure 3.
- data path identification field is changed.
- the DDPF may be located in a router, device, module or chip of a gateway or a router or another device.
- the DDPF receives traffic from the source wherein the traffic includes user payload with a chain of headers preceding the user payload.
- the headers include transport Internet Protocol (IP) header, encapsulation header and other headers that may be used in the traffic.
- Figure 4 shows an example of a chain of headers followed by the user payload.
- the DDPF scans the headers to identify their types and amendable fields in each type. If the traffic is simple IP traffic, this means that the IP header exists with relevant fields. If the traffic is tunneled traffic, then the encapsulation header is found following IP header. Details of fields in both types of headers are depicted in Figure 5. It is to be understood that headers of other types may also be used depending on application of the method.
- the DDPF changes two fields in the IP header (501 and 502 in Figure 5) if the traffic is not capsulated. For encapsulated traffic, three fields (501, 502 and 503 in Figure 5) are changed by DDPF.
- Source address (501 in Figure 5) of the IP header refers to the source IP address of the traffic.
- Destination IP addresses (502 in Figure 5) of the IP header refers to a destmation of the traffic.
- a traffic path for the traffic to follow is represented by data path identification (503 in Figure 5).
- a mapping table (MMT) is created.
- the MMT explains topology configuration and can handle single or multihop scenarios as well as be part of Operation and Maintenance.
- the MMT may include setup of any tunnels and additional functionality that may be required. As described earlier, the mapping table guides traffic to destinations siich as mesh topology.
- FIG. 6 shows a topology, where source data traffic is distributed amongst network elements configured in any fashion. Topology map for this example is illustrated in Table 1.
- Table 1 Example of mapping table for a topology
- DDPFl receives source traffic (either tunneled or not), which follows the steps of the method as seen in Figure 3 for mapping or disseminating traffic to two paths.
- path 1 is mapped towards network element 1 followed by end users 1, 2 and 3 as well as path 2 towards DDPF2.
- DDPF2 maps or disseminates traffic to path 3 and path 4 then to network elements and DDPF towards end users.
- Traffic mapping or distribution is done by referring to the MMT which is broadcast to all neighboring nodes. The MMT should be updated in case of mobility, handover, configuration change, classification rule change or any other reason that causes topology change that allows for single hop or multi hop topology.
- Values of the source, destination and key, tag or connection identification values in Table 1 are obtained by the DDPF from the IP headers and encapsulation headers after de-capsulation. The values are recorded in the MMT for further reference in routing.
- a set of messages are present for each wireless standard to set up, modify or remove the data path.
- a flow of messages fof standards such as WiMAX are changed to cater to required processes of DDPF. This flow of messages is shown in Figure 7.
- the data path function is used to set up a bearer plane between base stations or between other entities such as gateways or between gateways and base stations. Each date path function is responsible for instantiating and managing data bearer between the data path function and another data path function as well as selecting the user payload traversing an established data bearer.
- User Datagram Protocol Internet Protocol (UDP/IP) is an example of a transport protocol for communication between peer DPFs. Other types of traffic may be used as well.
- a peer DPF at each end is addressed by the ID of network component which hosts the data path such as base station ID (BSID).
- BSID base station ID
- Many technologies are used for tunneling or setting up path such as Generic Route Encapsulation (GRE), Multiprotocol Label Switching (MPLS) and 802.1Q Virtual LANS (VLANs). Granularity of tunnels are defined and handled by the DPF.
- GRE Generic Route Encapsulation
- MPLS Multiprotocol Label Switching
- VLANs Virtual LANS
- Figure 8 illustrates a contributed function DDPF and the mapping table.
- the traffic breakout step further includes the steps of building a DDPF to negotiate with DPF at different peer or network element of classification rules, building a MMT to save a source and destination addresses captured from TP headers or forwarded traffic, saving the data path identifications of different service flow captured from encapsulation headers for tunneled traffic after de- capsulating traffic, identifying the source and destination addresses for the TP header and deciding on a correct route accordingly, identifying a key, tag values or data path identification for the service flow to be routed and the MMT may be broadcasted to all neighboring devices wherein each neighboring device selects relevant trafific.
- a router includes at least one switch configured to switch incoming traffic to at least one traffic paths, a data path function and a network address translation function or network address port translation function.
- T e switch is selected from at least one of a layer 3 switch and a public or private switch.
- the switch is provided between the data path function or a gateway output, and other traffic tunnel end point.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
- Radio Relay Systems (AREA)
Abstract
A method of distributing data traffic to predetermined destinations in wireless multi hop networks is provided, the method includes the steps of receiving data traffic from a source, breaking out received traffic and redistributing traffic to predetermined destinations which are configurable as recorded in a mapping table.
Description
A METHOD FOR DISTRIBUTING DATA TRAFFIC
FIELD OF INVENTION The present invention relates to a method of distributing data traffic to predetermined destinations in wireless multi hop networks.
BACKGROUND OF INVENTION Popular designs of wireless networks today are Point-to-Point, Point-to-Muhipoint and mesh topologies. In point-to-multipoint (PMP) designs, end nodes can exchange control signals but data or bearer packets cannot traverse from one node to another. The challenge here is making end nodes exchange data packets and control messages without modifying standards. US 20090073995 Al describes an apparatus configures to receive traffic of different types such as internet service domain traffic and operators service domain traffic. However, in this solution, the apparatus requires permission from an authentication module to allow a local breakout Further, breakout rules in this case are only applicable to home agent and not beyond that
However, as most of the prior art is focussed on internet service domain traffic and mobility, a more comprehensive solution that allows for mapping of data is needed in wireless networks.
SUMMARY OF INVENTION
Accordingly, there is provided a method of distributing data traffic to predetermined destinations in wireless multi hop networks, the method includes the steps of receiving data traffic from a source, breaking out received traffic and redistributing traffic to predetermined destinations which are configurable as recorded in a mapping table.
Further, there is provided a method of distributing data traffic to predetermined destinations in wireless multi hop networks, the method includes the steps of receiving data traffic from a source, instantiating and managing data bearer between a data path function, selecting a payload traversing the data bearer, scanning a chain of headers from data traffic, identifying a plurality of fields to be amended, calling up a mapping t ble, determining encapsulation of traffic, changing source and destination addresses of the header when there is no encapsulation of traffic and sending data traffic to the predetermined destination.
The present invention consists of several novel features and a combination of parts hereinafter fully described and illustrated in the accompanying description and drawings, it being understood that various changes in the details may be made without departing from the scope of the invention or sacrificing any of the advantages of the present invention.
BRIEF DESCRIPTION OF THE DRAWINGS
The present invention will be fully understood from the detailed description given herein below and the accompanying drawings which are given by ay of illustration only, and thus are not limitative of the present invention, wherein:
Figure 1 shows an example of a method of distributing data traffic to predetermined destinations in wireless multi hop networks wherein two base stations forward or route data traffic in Worldwide Interoperability tor Microwave Access (WiMAX) in the preferred embodiment of the invention; Figure 2 shows a method of distributing data traffic to predetermined destinations in wireless multi hop networks in a location of distributed date path function and a mapping table in the preferred embodiment of the invention;
Figure 3 shows a flowchart of steps performed by the distributed data path function ( UPF);
Figure 4 shows an example of a chain of headers followed by the user payload in an embodiment of the invention;
Figure 5 shows a chart depicting IP and encapsulation details of fields in both types of headers;
Figure 6 shows an example of a topology with data traffic distribution as recorded in the mapping table; Figure 7 shows a flow of messages flowing to and from the distributed data path function using WiMAX; and
Figure 8 shows the contributing functions of the distributed data path function and the mapping table.
DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENT
The present invention relates to a method of distributing data traffic to predetermined destinations in wireless multi hop networks. More particularly, the method is a method of incorporating multiple performance metrics into a shortest routing protocol in wireless mesh networks. Hereinafter, this specification will describe the present invention according to the preferred embodiment of the present invention. However, it is to be understood that limiting the description to the preferred embodiment of the invention is merely to facilitate discussion of the present invention and it is envisioned that those skilled in the art may devise various modifications and equivalents without departing from the scope of the appended claims.
The following detailed description of the preferred embodiment will now be described in accordance with the attached drawings, either individually or in combination.
Figure 2 illustrates a method of distributing data traffic to predetermined destinations in wireless multi hop networks. The method includes the steps of receiving data traffic from a source, breaking out received traffic and redistributing traffic to predetermined destinations which are configurable as recorded in a mapping table. For example, a distributed data path function (DDPF) refers to a mapping table in order to guide or breakout traffic. The mapping table describes a configuration of a network where the source, destination and data path identifications are recorded in the mapping table. The mapping table allows for single or multi-hdp configurations. The mapping table can be configured for fixed topology or the
mapping table may be adapted b an operator as part of Operation and Maintenance. Figure 1 shows an example of this embodiment wherein two base stations cannot forward or route data traffic in Worldwide Interoperability for Microwave Access (WiMAX). A data path function at the source, such as in Access Service Network Gateway (ASN GW) in WiMAX, forwards or routes data traffic to the distributed data path function (DDPF) in the method. The DDPF performs breakout of traffic and redistributes the traffic to destinations as configured in the mapping table. Hie destinations can be configured in single hop, multi hop, random, mesh or any topology as seen fit for application by one skilled in the art.
A preferred embodiment of the method of distributing data traffic to predetermined destinations in wireless multi hop networks is described herein. The method includes the steps of receiving data traffic from a source, instantiating and managing data bearer between a data path function, selecting a payload traversing the data bearer, scanning a chain of headers from data traffic, identifying a plurality of fields to be amended, calling up a mapping table, determining encapsulation of traffic, changing source and destination addresses of the header when there is no encapsulation of traffic and sending data traffic to the predetermined destination as seen in Figure 3. When there is encapsulation, data path identification field is changed.
The DDPF may be located in a router, device, module or chip of a gateway or a router or another device. The DDPF receives traffic from the source wherein the traffic includes user payload with a chain of headers preceding the user payload. Examples of the headers include transport Internet Protocol (IP) header, encapsulation header and other headers that may be used in the traffic.
Figure 4 shows an example of a chain of headers followed by the user payload. The DDPF scans the headers to identify their types and amendable fields in each type. If the traffic is simple IP traffic, this means that the IP header exists with relevant fields. If the traffic is tunneled traffic, then the encapsulation header is found following IP header. Details of fields in both types of headers are depicted in Figure 5. It is to be understood that headers of other types may also be used depending on application of the method.
In order to breakout traffic to an intended destination within a configure topology, the DDPF changes two fields in the IP header (501 and 502 in Figure 5) if the traffic is not capsulated. For encapsulated traffic, three fields (501, 502 and 503 in Figure 5) are changed by DDPF. Source address (501 in Figure 5) of the IP header refers to the source IP address of the traffic. Destination IP addresses (502 in Figure 5) of the IP header refers to a destmation of the traffic. A traffic path for the traffic to follow is represented by data path identification (503 in Figure 5). In order for the DDPF to get correct values of the fields to amend, a mapping table (MMT) is created. The MMT explains topology configuration and can handle single or multihop scenarios as well as be part of Operation and Maintenance. The MMT may include setup of any tunnels and additional functionality that may be required. As described earlier, the mapping table guides traffic to destinations siich as mesh topology.
Figure 6 shows a topology, where source data traffic is distributed amongst network elements configured in any fashion. Topology map for this example is illustrated in Table 1.
Table 1 : Example of mapping table for a topology
Referring to Figure 6 and Table 1, for example DDPFl receives source traffic (either tunneled or not), which follows the steps of the method as seen in Figure 3 for mapping or disseminating traffic to two paths. As seen in Figure 6, path 1 is mapped towards network element 1 followed by end users 1, 2 and 3 as well as path 2 towards DDPF2. Similarly, DDPF2 maps or disseminates traffic to path 3 and path 4 then to network elements and DDPF towards end users.
Traffic mapping or distribution is done by referring to the MMT which is broadcast to all neighboring nodes. The MMT should be updated in case of mobility, handover, configuration change, classification rule change or any other reason that causes topology change that allows for single hop or multi hop topology. Values of the source, destination and key, tag or connection identification values in Table 1 are obtained by the DDPF from the IP headers and encapsulation headers after de-capsulation. The values are recorded in the MMT for further reference in routing. A set of messages are present for each wireless standard to set up, modify or remove the data path. A flow of messages fof standards such as WiMAX are changed to cater to required processes of DDPF. This flow of messages is shown in Figure 7.
The data path function (DPF) is used to set up a bearer plane between base stations or between other entities such as gateways or between gateways and base stations. Each date path function is responsible for instantiating and managing data bearer between the data path function and another data path function as well as selecting the user payload traversing an established data bearer. User Datagram Protocol Internet Protocol (UDP/IP) is an example of a transport protocol for communication between peer DPFs. Other types of traffic may be used as well. A peer DPF at each end is addressed by the ID of network component which hosts the data path such as base station ID (BSID). Many technologies are used for tunneling or setting up path such as Generic Route Encapsulation (GRE), Multiprotocol Label Switching (MPLS) and 802.1Q Virtual LANS (VLANs). Granularity of tunnels are defined and handled by the DPF.
Figure 8 illustrates a contributed function DDPF and the mapping table. The traffic breakout step further includes the steps of building a DDPF to negotiate with DPF at different peer or
network element of classification rules, building a MMT to save a source and destination addresses captured from TP headers or forwarded traffic, saving the data path identifications of different service flow captured from encapsulation headers for tunneled traffic after de- capsulating traffic, identifying the source and destination addresses for the TP header and deciding on a correct route accordingly, identifying a key, tag values or data path identification for the service flow to be routed and the MMT may be broadcasted to all neighboring devices wherein each neighboring device selects relevant trafific.
A router includes at least one switch configured to switch incoming traffic to at least one traffic paths, a data path function and a network address translation function or network address port translation function. T e switch is selected from at least one of a layer 3 switch and a public or private switch. The switch is provided between the data path function or a gateway output, and other traffic tunnel end point This invention is adapted for use with single hop and multi hop wireless networks of various topologies. The disclosed invention is suitable, but not restricted to, for use in performance forwarding data traffic to destinations in any wireless networks such as WiMAX.
Claims
1. A method of distributing data traffic to predetermined destinations in wireless multi hop networks, the method includes the steps of: i. receiving date traffic from a source;
ii. breaking out received traffic; and
in. redistributing traffic to predetermined destinations which are configurable as recorded in a mapping table.
2. The method as claimed in claim 1, wherein a distributed data path function (DDPF) refers to the mapping table in order to guide or breakout traffic.
3. The method as claimed in claim 1, wherein the mapping table allows for single configurations.
4. The method as claimed in claim 1, wherein the mapping table allows for multi-hop configurations.
5. The method as claimed in claim 1, wherein the mapping table is configured for fixed topology.
6. The method as claimed in claim 1, wherein the mapping table is adapted by an operator as part of Operation and Maintenance.
A method of distributing data traffic to predetermined destinations in wireless multi hop networks, the method includes the steps of:
i. receiving data traffic from a source;
ii. instantiating and managing data bearer between data path functions;
iii. selecting a payload traversing the data bearer;
iv. scanning a chain of headers from data traffic;
v. identifying a plurality of fields to be amended;
vi. calling up a mapping table;
vii. determining encapsulation of traffic;
viii. changing source and destination addresses of the header when there is no encapsulation of traffic; and
ix. sending data traffic to the predetermined destination.
The method as claimed in claim 7, wherein if traffic is encapsulated, data path identification of header is changed before sending data traffic to the predetermined destination.
The method as claimed in claim 7, wherein a distributed data path function (DDPF) is located in a router, device, module or chip of a gateway or a router or another device.
10. The method as claimed in claim 9, wherein the DDPF receives traffic from the source wherein the traffic includes user payload with a chain of headers preceding the user payload.
11. The method as claimed in claim 9, wherein the DDPF scans the headers to identify their types and amendable fields in each type.
12. The method as claimed in claim 7, wherein the mapping table (MMT) is updated in case of mobility, handover, configuration change, classification rule change or any other reason that causes topology change that allows for single hop or multi hop topology.
13. The method as claimed in claim 7, wherein the data path function (DPF) is used to set up a bearer plane between base stations or between other entities.
14. The method as claimed in claim 7, wherein the method further includes the steps of:
i. building a DDPF to negotiate with DPF at different peer or network element of classification rules; ii. building a MMT to save a source and destination addresses captured from TP headers or forwarded traffic; iii. saving the data path identifications of different service flow captured from encapsulation headers for tunneled traffic after de-capsulating traffic; iv. identifying the source and destination addresses for the LP header and deciding on a correct route accordingly; v. identifying a key, tag values or data path identification for the service flow to be routed; and vi. broadcasting the MMT to all neighboring devices wherein each neighboring device selects relevant traffic.
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| MY2010700085 | 2010-11-29 | ||
| MYPI2010700085A MY175206A (en) | 2010-11-29 | 2010-11-29 | A method for distributing data traffic |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| WO2012074353A1 true WO2012074353A1 (en) | 2012-06-07 |
Family
ID=46172114
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/MY2011/000085 Ceased WO2012074353A1 (en) | 2010-11-29 | 2011-06-08 | A method of distributing data traffic |
Country Status (2)
| Country | Link |
|---|---|
| MY (1) | MY175206A (en) |
| WO (1) | WO2012074353A1 (en) |
Cited By (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US10785143B1 (en) * | 2012-12-27 | 2020-09-22 | Sitting Man, Llc | Routing methods, systems, and computer program products |
Citations (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20070072604A1 (en) * | 2005-08-17 | 2007-03-29 | Nortel Networks Limited | Method and system for a wireless multi-hop relay network |
-
2010
- 2010-11-29 MY MYPI2010700085A patent/MY175206A/en unknown
-
2011
- 2011-06-08 WO PCT/MY2011/000085 patent/WO2012074353A1/en not_active Ceased
Patent Citations (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20070072604A1 (en) * | 2005-08-17 | 2007-03-29 | Nortel Networks Limited | Method and system for a wireless multi-hop relay network |
Cited By (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US10785143B1 (en) * | 2012-12-27 | 2020-09-22 | Sitting Man, Llc | Routing methods, systems, and computer program products |
Also Published As
| Publication number | Publication date |
|---|---|
| MY175206A (en) | 2020-06-15 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| KR100747616B1 (en) | Selective Reverse Tunneling Based on Flow in Wireless LAN Cellular Systems | |
| US7596110B2 (en) | Routing in virtual private network | |
| US9131366B2 (en) | Unifying virtualizations in a core network and a wireless access network | |
| CN101534239B (en) | Method and device for installing routers | |
| CN105814945B (en) | VPNv4 route control for LTE X2 SON using import route map and outgoing route filtering | |
| US9264971B2 (en) | VPNv4 route control for LTE X2 son using unique route targets | |
| US9641422B2 (en) | X2 son for LTE networks through automated X2 address discovery | |
| EP3754914B1 (en) | Class-based traffic engineering in an ip network | |
| CN104620637A (en) | Method and system for mobility management in label switched networks | |
| CN101005644A (en) | Method and a system for transmitting control data traffic between a base station of a 3G mobile communication network and a network management station | |
| CN106416153B (en) | LDP handoff threshold TLV representing LSP handoff threshold | |
| CN103368806A (en) | Method and system for processing data flow and device | |
| US9578551B2 (en) | Method and apparatuses for establishing a link between two devices | |
| WO2012074353A1 (en) | A method of distributing data traffic | |
| CN101753419B (en) | Method for transmitting and forwarding data, equipment, and multiple-address space mobile network | |
| US7792110B2 (en) | Method and system for updating a virtual local area network (VLAN) status of a node in a mesh network | |
| WO2012084626A1 (en) | Method for inter-domain communications | |
| Al-Talib et al. | Data Path Management Mechanism to Mesh Base Stations in WiMAX | |
| US8842682B2 (en) | Method and device for forwarding data transport frames |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| 121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 11844556 Country of ref document: EP Kind code of ref document: A1 |
|
| NENP | Non-entry into the national phase |
Ref country code: DE |
|
| 122 | Ep: pct application non-entry in european phase |
Ref document number: 11844556 Country of ref document: EP Kind code of ref document: A1 |