Title of Invention | "A METHOD FOR SHARING NETWORK RESOURCES BETWEEN TWO NETWORK OPERATORS' |
---|---|
Abstract | This invention relates in general to All-IP Wireless Networks. The invention explains a method of sharing of the network resource between the operators operating in same area using the mobility management techniques, where at the AR1 the said method comprising the steps of the user call sending the Rl message to the AR2 on overload and unable to handle condition; creating of new address for the user to use at AR2; sending a Router Advertisement for Redirect message to user (MN) on reception of RIACK; and transferring the buffered packets to the user via AR2 on reception of Notify packet from MN/AR2. In the said process, at the MN the steps involves processing of RAR message and make L2 association with the AR2; sending FNA message to the AR2 with the address send by the AR1 in RAR message; and sending the Notify message to AR1 on successful authentication with AR2. At the AR2 the said method involves, finding the uniqueness of the address mentioned in the Rl message on reception of Rl and if the address is not unique find new unique address; sending the RIACK message to the AR1 with the unique address that a user can use in the AR2 network; processing of FNA message from the user and authenticate the user; sending the acknowledgement to the user (MN) on successful authentication; and sending the Notify message to AR1. |
Full Text | FIELD OF INVENTION This invention relates in general to All-IP Wireless Networks. Further, this invention proposes a method to assist in sharing the Network Resources of one operator when other operator's (within the same coverage area) Network resources are exhausted. More particularly, this invention encompasses a method for sharing network resources between two network operators. DESCRIPTION OF RELATED ART Related art does not exist in All-IP Networks. In All-IP networks, IP protocol will be used end-to-end. All information (voice, video and data) will be transmitted over IP protocol whereas the current wireless networks use circuit switching for voice and IP for data. In current wireless networks the IP is not used end-to-end. Some operators use IP in their core networks. In these wireless networks, the network resources are shared in the form of roaming where the original service provider does not have the presence. For this purpose the service provider (operator) will establish pre-relationship with another operator where the former operator does not have presence. In All IP networks, if the operator has exhausted all of its resources then it cannot provide services to its subscribers. This operator cannot utilize the resources of another operator in the same region to provide the services to its subscriber. SUMMARY OF THE INVENTION In an All-IP network, the mobile network element will be IP enabled. IP network handles the Mobility Management using different techniques. The primary objective of this invention is to invent a method for sharing the network resources of another operator when one operator exhausts its resources. This method treats the change of the operator as mobility issue and allows a user to communicate using another operator's resource. The invention satisfies the following criteria: • Operator will be able to provide the service to its subscriber when it exhausts its resources, using the resources of another operator with whom it has arrangement to the effect. • Implementation of this method requires minimal change at the operators end. • This method is interoperable with existing standards and is simple and easily deployable. This invention helps in sharing operator network resources with another operator within the same coverage area. If a user is trying to make a call when his/her operator network is unable to handle the calls (Network Overloaded), the call will be diverted through another operator with whom the former operator has an arrangement to the effect. The user will be provided with the configuration information using which he/she will be connected to the other operator. The problem of sharing bandwidth is raised to Mobility Problem and subsequently Mobile IP techniques will be used to communicate with other CNs using original address/number. Accordingly, this invention explains a method of sharing of the network resource between the operators operating in same area using the mobility management techniques, comprising the steps of: attheARI: (a) on overload and unable to handle condition the user call sending the Rl message to the AR2; (b) creating of new address for the user to use at AR2; (c) on reception of RIACK sending a Router Advertisement for Redirect message to user (MN); and (d) transferring the buffered packets to the user via AR2 on reception of Notify packet from MN/AR2; at the MN: (i) processing of RAR message and make L2 association with the AR2; (ii) sending FNA message to the AR2 with the address send by the AR1 in RAR message; and (iii) sending the Notify message to AR1 on successful authentication with AR2; at the AR2: (A) on reception of Rl, finding the uniqueness of the address mentioned in the Rl message and if the address is not unique find new unique address; (B) sending the RIACK message to the AR1 with the unique address that a user can use in the AR2 network; (C) processing of FNA message from the user and authenticate the user; (D) sending the acknowledgement to the user (MN) on successful authentication; and (E) sending the Notify message to AR1. When the service provider gets exhausted with its resources, service provider's Router AR1 diverts the subscriber to another service provider's Router AR2. The user on reception of RAR message does L2 association with AR2 where AR2 authenticates the user and sends the acknowledgement to the user for starting the communication. After sending the acknowledgement to the user for starting the communication, the user updates HA and CNs with new care of address to achieve route optimization. When AR1 wants to transfer the call to AR2, then AR1 computes the address for user to be used at the AR2 network and sends Rl message to the AR2 with the new address and the security parameters. AR2 checks the uniqueness of the address and if the address is not unique it gets new unique address for the user and sends the RIACK message to AR1. After receiving the RIACK, AR1 updates the user with details of new router and address to be used at new operator. After updating the user, AR1 starts buffering packets for the MN and AR1 forwards packets to the MN when MN/AR2 send the notify message. Handling the request of user and diverting call to another operator involves a user MN trying to connect/make a call through the AR1 and AR1 determining that the call cannot be handled. AR1 sends a Router Advertisement for Redirect RAR with the Configuration information required at AR2 to MN and the MN on reception of RAR determines that it has to MOVE to another access router AR2 where it configures a new IPv6 address and Security association and Sends Fast Neighbor Advertisement to connect to AR2. MN sends FNA to AR2 and on reception of FNA, AR2 challenges MN request either at L2 association or L3 connectivity using PANA. After authentication, AR2 grants the connectivity by sending Fast NA Acknowledgement and MN starts communication after receiving the ACK where MN uses MIPv6 to inform the HA and CNs about it new location. Transferring of the call to another operator with the user's detail involves a user MN trying to connect/make a call through the AR1 and determining that the call cannot be handled. AR1 creates new address for the user MN at AR2 and sends Redirect Initiate message with the probable address that is used at AR2 where AR2 sends Rl Ack after confirming the uniqueness of the new address. If the address proposed by AR1 is not unique in new link it sends another new address that can be used. AR1 sends a Router Advertisement for Redirect (RAR) with the Configuration information required at AR2 to MN and the address which is used in another operators network and AR1 buffers the packets for the User MN. The MN on reception of RAR determines that it has to MOVE to another access router AR2 and it configures a new IPv6 address and Security association and Sends Fast Neighbor Advertisement to connect to AR2. After an authentication AR2 grants the connectivity by sending Fast NA Acknowledgement and MN starts communication after receiving the ACK. MN/AR2 sends Notify to AR1 to forward the packets to MN through AR2 and AR1 transfers all the buffered packets to Mobile Node. The other objects, features and advantages of the present invention will be apparent from ensuing the detailed description of the invention taken in conjunction with the accompanying drawings. BRIEF DESCRIPTION OF THE ACCOMPANYING DRAWINGS Figure 1 shows an All IP network deployment scenario for two service providers. Figure 2 shows an operation of a method at service provider's Router AR1 when it has exhausted its resources and it diverts the subscriber to another service provider's Router AR2. Figure 3 shows an operation of when AR1 transfers the call to the AR2. DETAILED DESCRIPTION OF THE INVENTION The preferred embodiments of the present invention will now be explained with reference to the accompanying drawings. It should be understood however that the disclosed embodiments are merely exemplary of the invention, which may be embodied in various forms. The following description and drawings are not to be construed as limiting the invention and numerous specific details are described to provide a thorough understanding of the present invention, as the basis for the claims and as a basis for teaching one skilled in the art how to make and/or use the invention. However in certain instances, well-known or conventional details are not described in order not to unnecessarily obscure the present invention in detail. Operation of the Invention In this invention, we propose a method for Sharing Network Resources between two Network Operators. Figure 1 depicts an example deployment scenario for this method. Sharing of the resource of another service provider is treated as an issue of mobility and handled appropriately. Both the Service Providers make agreement to share the network either mutual sharing or one operator (SP A) sharing the other operator (SP B) resources. SP A configures his network with the configuration information (Prefix to be used at AR2, Security related information etc.) Figure 1 shows an All IP network deployment scenario for two service providers. Both the service providers cover same geographical area. SP (Service Provider) A and B are the two operators and mobile node is a subscriber of SP A, whose resources are exhausted. Subscriber can be diverted to the SP B as mobility and the resources of SP B will be used by the subscriber of SP A. Figure 2 shows an operation of a method at service provider's Router AR1 when he is exhausted with the resources and it diverts subscriber to another service provider's Router AR2. The user on reception of RAR message does L2 association with AR2. AR2 authenticate the user and the send the acknowledgement to the user for starting the communication. The user then updates it HA and CNs with new care of address to achieve route optimization. Figure 3 shows an operation of when AR1 to transfer the call to the AR2. AR1 compute the address for user to be used at the AR2 network and sends Rl message to the AR2 with the new address and the security parameters. AR2 will check the uniqueness of the address, if the address is not unique it tries to get new unique address for the user and send the RIACK message to AR1. After receiving the RIACK, AR1 will update the user with details of new router and address to be used at new operator. AR1 starts buffering packets for the MN and when MN/AR2 send the notify message AR1 forwards packet to the MN. The following is the step-by-step operation of handling the request of user and diverting call to another operator: (Refer to Figure.2) 1. A user (MN) tries to connect/make a call through the AR1. 2. AR1 determines that it cannot handle the call. 3. AR1 sends a Router Advertisement for Redirect (RAR) with the Configuration information required at AR2 to MN. 4. The MN on reception of RAR determines that it has to MOVE to another access router AR2 it configures a new IPv6 address and Security association and Sends Fast Neighbor Advertisement to connect to AR2. 5. MN sends FNA to AR2. 6. On reception of FNA, AR2 challenges MN request either at L2 association or L3 connectivity (using PANA). Contact either SP B's AAA Server (if configured manually) or Contacts SP A's AAA Server 7. After authentication AR2 grants the connectivity by sending Fast NA Acknowledgement. 8. MN can start communication after receiving the ACK. 9. MN uses MIPv6 to inform the HA and CNs about it new location (IPv6 Address). The following is the step-by-step operation of the invention to transfer the call to another operator with the user's detail: (Refer to Figure.3) 1. When a user (MN) try to connect/make a call through the AR1. 2. Determines that it cannot handle the call. 3. AR1 creates new address for the user (MN) at AR2 and sends Redirect Initiate message with the probable address that will be used at AR2. 4. AR2 sends Rl Ack after confirming the uniqueness of the new address. If the address proposed by AR1 is not unique in new link it sends another new address that can be used. 5. AR1 sends a Router Advertisement for Redirect (RAR) with the Configuration information required at AR2 to MN and the address which can be used in the another operators network. 6. AR1 starts buffering the packets for the User (Mobile Node). 7. The MN on reception of RAR determines that it has to MOVE to another access router AR2 it configures a new IPv6 address and Security association and Sends Fast Neighbor Advertisement to connect to AR2. 8. After authentication AR2 grants the connectivity by sending Fast NA Acknowledgement. 9. MN can start communication after receiving the ACK. 10.MN/AR2 sends Notify to AR1 to forward the packets to MN through AR2. 11. AR1 transfer all the buffered packets to Mobile Node. Effects / Advantages of the Invention a. Operator is able to provide the service to his subscribers using the resources of another operator with whom he has business agreement, when it exhausts with its resources. b. This method helps one operator handle more number of subscribers in particular area for shorter time using another operator's resources. c. This method does not violate the existing standards. d. This method is very easy to implement and requires very minimal implementation changes to existing equipments. In All-IP Network, sharing of the network resource between the operators operating in same area is handled in this method using the mobility management techniques, comprised the steps of: AttheARI: On overload and unable to handle the user call sending the Rl message to the AR2. Creation of new address for the user to use at AR2. On reception of RIACK send a Router Advertisement for Redirect message to user (MN). Transferring the buffered packets to the user via AR2 on reception of Notify packet from MN/AR2. AttheMN: Processing of RAR message and make L2 association with the AR2. Sending FNA message to the AR2 with the address send by the AR1 in RAR message. Sending the Notify message to AR1 on successful authentication with AR2. At the AR2: On reception of Rl, finding the uniqueness of the address mentioned in the Rl message. If the address is not unique find new unique address. Send the RIACK message to the AR1 with the unique address that a user can use in the AR2 network. Processing of FNA message from the user and authenticate the user. Send the acknowledgement to the user (MN) on successful authentication. Sending the Notify message to AR1. The above-presented description is of the best mode contemplated for carrying out the present invention. The manner and process of making and using it is in such a full, clear, concise and exact terms as to enable to any person skilled in the art to which it pertains to make and use this invention. New embodiments in particular, which also lie within the scope of the invention can be created, in which different details of the different examples can in a purposeful way be combined with one another. This invention is however, susceptible to modifications and alternate constructions from that disclosed above which are fully equivalent. Consequently, it is not the intention to limit this invention to the particular embodiment disclosed. On the contrary, the intention is to cover all modifications and alternate constructions coming within the spirit and scope of the invention as generally expressed by the following claims which particularly point out and distinctly claim the subiect matter of the invention. GLOSSARY OF TERMS AND THEIR DEFINITIONS AAA Authentication Authorization and Accounting Server AR Access Router ARn Access Router n CN Correspondent Node FNA Fast Neighbor Advertisement HA Home Agent IPv6 Internet Protocol version 6 L2 Layer 2 L3 Layer 3 MIPv6 Mobile IPv6 MN Mobile Node Notify to forward the buffered packets Rl Redirect Initiate RIACK Rl Ack RAR Router Advertisement for Redirect SP Service Provider REFERENCES [IPv6] Deering S. and R. Hinden, "Internet Protocol, Version 6 (IPv6) Specification", RFC 2460, December 1998. [MIPv6] D. Johnson, C. Perkins and J. Arkko, "Mobility Support in IPv6", RFC 3775, June 2004. [FMIPV6] Rajeev Koodli, "Fast Handovers for Mobile IPv6" ,draft-ietf-mipshop-fast-mipv6, October, 2004. WE CLAIM 1. A method of sharing of the network resource between the operators operating in same area using the mobility management techniques, comprising the steps of: attheARI: (a) on overload and unable to handle condition the user call sending the Rl message to the AR2; (b) creating of new address for the user to use at AR2; (c) on reception of RIACK sending a Router Advertisement for Redirect message to user (MN); and (d) transferring the buffered packets to the user via AR2 on reception of Notify packet from MN/AR2; attheMN: (i) processing of RAR message and make L2 association with the AR2; (ii) sending FNA message to the AR2 with the address send by the AR1 in RAR message; and (iii) sending the Notify message to AR1 on successful authentication with AR2; at the AR2: (A) on reception of Rl, finding the uniqueness of the address mentioned in the Rl message and if the address is not unique find new unique address; (B) sending the RIACK message to the AR1 with the unique address that a user can use in the AR2 network; (C) processing of FNA message from the user and authenticate the user; (D) sending the acknowledgement to the user (MN) on successful authentication; and (E) sending the Notify message to AR1. 2. A method as claimed in claim 1 wherein when the service provider's resources are exhausted, service provider's Router AR1 diverts the subscriber to another service provider's Router AR2. 3. A method as claimed in claim 1 wherein the user on reception of RAR message does L2 association with AR2 where AR2 authenticates the user and sends the acknowledgement to the user for starting the communication. 4. A method as claimed in claim 3 wherein after sending the acknowledgement to the user for starting the communication, the user updates HA and CNs with new care of address to achieve route optimization. 5. A method as claimed in claim 4 wherein when AR1 wants to transfer the call to AR2 then AR1 compute the address for user to be used at the AR2 network and sends Rl message to the AR2 with the new address and the security parameters. 6. A method as claimed in claim 5 wherein AR2 checks the uniqueness of the address and if the address is not unique it gets new unique address for the user and send the RIACK message to AR1. 7. A method as claimed in claim 6 wherein after receiving the RIACK, AR1 updates the user with details of new router and address to be used at new operator. 8. A method as claimed in claim 7 wherein after updating the user, AR1 starts buffering packets for the MN and AR1 forwards packets to the MN when MN/AR2 send the notify message. 9. A method as claimed in claim 8 wherein handling the request of user and diverting call to another operator involves a user MN trying to connect/make a call through the AR1 and AR1 determining that the call cannot be handled. 10. A method as claimed in claim 9 wherein AR1 sends a Router Advertisement for Redirect RAR with the Configuration information required at AR2 to MN and the MN on reception of RAR determines that it has to MOVE to another access router AR2 where it configures a new IPv6 address and Security association and Sends Fast Neighbor Advertisement to connect to AR2. 11. A method as claimed in claim 10 wherein MN sends FNA to AR2 and on reception of FNA, AR2 challenges MN request either at L2 association or L3 connectivity using PANA. 12. A method as claimed in claim 11 wherein after authentication AR2 grants the connectivity by sending Fast NA Acknowledgement and MN starts communication after receiving the ACK where MN uses MIPv6 to inform the HA and CNs about it new location. 13. A method as claimed in claim 1 wherein transferring of the call to another operator with the user's detail involves a user MN trying to connect/make a call through the AR1 and determining that the call cannot be handled. 14. A method as claimed in claim 13 wherein AR1 creates new address for the user MN at AR2 and sends Redirect Initiate message with the probable address that is used at AR2 where AR2 sends Rl Ack after confirming the uniqueness of the new address. 15. A method as claimed in claim 14 wherein if the address proposed by AR1 is not unique in new link it sends another new address that can be used. 16. A method as claimed in claim 15 wherein AR1 sends a Router Advertisement for Redirect (RAR) with the Configuration information required at AR2 to MN and the address which is used in another operators network and AR1 buffers the packets for the User MN. 17. A method as claimed in claim 16 wherein the MN on reception of RAR determines that it has to MOVE to another access router AR2 and it configures a new IPv6 address and Security association and Sends Fast Neighbor Advertisement to connect to AR2. 18. A method as claimed in claim 17 wherein after an authentication AR2 grants the connectivity by sending Fast NA Acknowledgement and MN starts communication after receiving the ACK. 19. A method as claimed in claim 18 wherein MN/AR2 sends Notify to AR1 to forward the packets to MN through AR2 and AR1 transfers all the buffered packets to Mobile Node. 20. A method of sharing of the network resource between the operators operating in same area using the mobility management techniques substantially as herein described particularly with reference to the drawings. |
---|
1310-CHE-2005 FORM-13 19-06-2006.pdf
1310-CHE-2005 AMENDED CLAIMS 12-07-2012.pdf
1310-CHE-2005 AMENDED PAGES OF SPECIFICATION 12-07-2012.pdf
1310-CHE-2005 EXAMINATION REPORT REPLY RECEIVED. 12-07-2012.pdf
1310-CHE-2005 FORM-3 12-07-2012.pdf
1310-CHE-2005 FORM-6 12-07-2012.pdf
1310-CHE-2005 OTHER PATENT DOCUMENT 12-07-2012.pdf
1310-CHE-2005 POWER OF ATTORNEY 12-07-2012.pdf
1310-che-2005-correspondnece-others.pdf
1310-che-2005-description(complete).pdf
Patent Number | 254844 | |||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Indian Patent Application Number | 1310/CHE/2005 | |||||||||||||||
PG Journal Number | 52/2012 | |||||||||||||||
Publication Date | 28-Dec-2012 | |||||||||||||||
Grant Date | 26-Dec-2012 | |||||||||||||||
Date of Filing | 15-Sep-2005 | |||||||||||||||
Name of Patentee | SAMSUNG INDIA SOFTWARE OPERATIONS PVT.LTD | |||||||||||||||
Applicant Address | BAGMANE LAKEVIEW,BLOCK B NO.66/1 BAGMANE TECH PARK,C.V.RAMAN NAGAR,BYRASANDRA BANGALORE 560 093 | |||||||||||||||
Inventors:
|
||||||||||||||||
PCT International Classification Number | H04B1/00 | |||||||||||||||
PCT International Application Number | N/A | |||||||||||||||
PCT International Filing date | ||||||||||||||||
PCT Conventions:
|