If the hotfix is available for download, there is a "Hotfix download available" section at the top of this Knowledge Base article. If this section does not appear, contact Microsoft Customer Service and Support to obtain the hotfix. Note If additional issues occur or if any troubleshooting is required, you might have to create a separate service request. The usual support costs will apply to additional support questions and issues that do not qualify for this specific hotfix.
For a complete list of Microsoft Customer Service and Support telephone numbers or to create a separate service request, visit the following Microsoft Web site:. If you do not see your language, it is because a hotfix is not available for that language. Important Windows Vista and Windows Server hotfixes are included in the same packages. To request the hotfix package that applies to both Windows Vista and Windows Server , just select the product that is listed on the page.
The English version of this hotfix has the file attributes or later file attributes that are listed in the following table. When you view the file information, it is converted to local time. The security catalog files attributes not listed are signed with a Microsoft digital signature. Microsoft has confirmed that this is a problem in the Microsoft products that are listed in the "Applies to" section.
In a fixed or mobile wireless Internet Protocol IP network, a client-side device establishes a session with a network-side access device to communicate with other entities in that network. The session represents the client-side device to the network, and includes information about the client-side device such as its IP address, location within a mobility area, permitted services and other such attributes required to communicate with the client-side device.
The session is typically present as long as the client-side device is present in the network, though other resources required for direct communication between the client-side device and the network device may only be in use when active communication is in process.
The state of direct communication between the client-side device and the network-side device is known as a connection.
In cellular wireless systems, as the client device must initiate connection, a special procedure known as paging is used to allow the network to request the client device to communicate. For example, if a network device needs to send data to a client device, the network uses the information stored in a session associated with the client device to page the client device. This page causes the target client device to initiate a connection with the network, thus enabling an exchange of data.
However, if a hardware or software failure of a network-side device causes the network to lose the session information, the network cannot establish a direct communication with the target client device, as it has lost all knowledge of the device's identity, communication parameters and location required to page that particular device.
Thus, network-initiated connection-oriented applications such as online video teleconferencing and Internet telephony are particularly vulnerable to network-side failures.
Furthermore, the client device is not immediately aware that the session breach has occurred and its recovery mechanisms operate on a sufficiently long timescale that client-initiated creation of a new session cannot be counted upon to restore network reachability for that client before it is required. In general, in one aspect, the invention features methods and computer programs for network-initiated session recovery in which first and second identifiers are assigned to a session between an access terminal and a first device e.
The first identifier, e. The communication path is configured to transport data corresponding to the session. A relationship is established between the first identifier and the second identifier.
In general, in another aspect, the invention features methods and computer programs for preserving communications in a network after a session breach. In general, in a further aspect, the invention features a radio network controller having a radio node server module and a controller. The radio node server module is configured to establish a session with an access terminal. The controller is configured to assign first and second identifiers to the session, the first identifier being associated with the radio node server module, and the second identifier corresponding to a communication path between the radio node server module and a packet data serving node, the first and second identifiers having a relationship with respect to one another.
The controller is also configured to detect a breach of the session established between the radio node service module and the access terminal; and to preserve communications associated with the session after the breach using the relationship between the first and second identifiers.
Implementations may include one or more of the following. At least a portion of the first identifier may be included in the second identifier. In the first identifier, a unique identifier corresponding to the first device may be included. The second identifier may be received in a data packet that is transported from the second device to the access terminal over the communication path.
Information corresponding to a number of times the first device was rebooted may be incorporated into the first identifier. The reboot value may be extracted from the second identifier, which may be included in a data packet received from the second device, and compared to a reboot count stored in the first device. Based on the comparison, it may be determined that the first identifier was assigned before the first device was last rebooted if the reboot count is greater than the reboot value.
After a session breach, the first identifier may be constructed using the relationship. For example, a portion of information from the second identifier may be extracted and concatenated with an identifier associated with the first device. The reconstructed first identifier may be included in a message that is used to page the access terminal.
For example, the message may be configured to cause the access terminal to close the breached session and initiate a new session with the first device. The breached session may then be closed and a new session between the first device and the access terminal may be established.
Information associated with the breached session may be transferred to a new session established between the access terminal and the first device. Furthermore, the radio network controller or components thereof may also comply with a 1x Evolution-Data Optimized protocol. Advantages may include one or more of the following. The preservation and recovery of communication sessions with client devices in a wireless network communication system can be achieved despite a failure of one or more components of the communications system.
Network reachability can be restored transparently in the event of a network-side system failure without the use of highly redundant hardware and software solutions. When there has been a failure in a network-side device resulting in loss of session information, the affected client devices lose contact with the network only for the duration of the session configuration and yet remains reachable from the network side.
A network-side device e. As session preservation does not require the network to maintain a complete backup of each session established on the network at a particular time, memory and computational resources of the network are conserved and made available for additional users.
The details of one or more embodiments of the invention are set forth in the accompanying drawings and the description below. Other features, objects, and advantages of the invention will be apparent from the description and drawings, and from the claims. In some conventional systems, to reduce the likelihood of losing session information caused by a network-side failure, a copy of all session information is saved at an alternate location in the network that is not likely to fail at the same time as the device that is hosting the session.
In these systems, when a session breach occurs, a mechanism is implemented to restore the breached session with the client-side device at the appropriate state.
Restoring a breached session using the saved copy of session information can be complex and often requires external hardware and additional memory and computational resources. Referring to FIG. Over the new session, communications between the client-side device and the network are resumed as if there had been no session breach in the first place.
But it may be years from adoption because of technical barriers still to be surmounted, including problems with device interoperability and concerns that SIP will make networks more vulnerable, experts say. The idea behind SIP is to provide a simple, lightweight means for creating and ending connections for real-time interactive communications over IP networks—mainly for voice, but also for videoconferencing, chat, gaming or even application sharing.
Computerworld QuickStudies. In one significant move, Microsoft Corp. Caller X needs to speak to Caller Y. Each of their companies has a SIP proxy server. These cover all of the many interactions required for browsing the Internet, as well as sending and receiving email through various email clients. It is interesting to note that many of these sessions are actively hidden from the end users; in other words, the common user does not recognize that these sessions are occurring, and does not know much about what happens during these sessions.
Analysis of technology-initiated sessions is largely the province of network administrators, security experts and others with a close knowledge of an interactive network. By: Justin Stoltzfus Contributor, Reviewer. By: Satish Balakrishnan. Dictionary Dictionary Term of the Day. Natural Language Processing.
Techopedia Terms.
0コメント