Methods and systems for using names in virtual networks
First Claim
1. A method for enabling a network between a first processor and a second processor using at least one additional processor separate from the first processor and the second processor, wherein the first processor and the second processor are each identifiable by a name, the method comprising the steps of:
- receiving, at the at least one additional processor, on behalf of the first processor, information that includes the name of the second processor;
receiving, at the at least one additional processor, on behalf of the second processor, information that includes the name of the first processor;
determining a first virtual address for the first processor based on the information received on behalf of the second processor and a second virtual address for the second processor based on the information received on behalf of the first processor, such that the first and second virtual addresses uniquely identify the first and second processors, respectively, and are routable through the network; and
providing, by the at least one additional processor, to the first processor the second virtual address and to the second processor the first virtual address to enable one or more tunnels between the first and the second processors.
3 Assignments
0 Petitions
Accused Products
Abstract
Methods and systems are provided for enabling a network between a first and a second processor using at least one additional processor separate from the first and the second processors. In one embodiment, the additional processor may receive on behalf of the first processor information that includes the name of the second processor and receives on behalf of the second processor in that includes the name of the first processor. The additional processor may determine a first virtual address for the first processor based on the received name of the first processor and a second virtual address for the second processor based on the received name of the second processor such that the first and second virtual addresses uniquely identify the first and second processors, respectively, and are routable through the network. The additional processor may provide to each of the first and second processors the first and second virtual addresses to enable one or more tunnels between the first and the second processors.
164 Citations
15 Claims
-
1. A method for enabling a network between a first processor and a second processor using at least one additional processor separate from the first processor and the second processor, wherein the first processor and the second processor are each identifiable by a name, the method comprising the steps of:
-
receiving, at the at least one additional processor, on behalf of the first processor, information that includes the name of the second processor;
receiving, at the at least one additional processor, on behalf of the second processor, information that includes the name of the first processor;
determining a first virtual address for the first processor based on the information received on behalf of the second processor and a second virtual address for the second processor based on the information received on behalf of the first processor, such that the first and second virtual addresses uniquely identify the first and second processors, respectively, and are routable through the network; and
providing, by the at least one additional processor, to the first processor the second virtual address and to the second processor the first virtual address to enable one or more tunnels between the first and the second processors. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 13, 14)
-
-
12. A system for enabling a network between a first processor and a second processor each identifiable by a name, the system comprising:
-
means for receiving on behalf of the first processor, information that includes the name of the second processor;
means for receiving on behalf of the second processor, information that includes the name of the first processor;
means for determining a first virtual address for the first processor based on the information received on behalf of the second processor and a second virtual address for the second processor based on the information received on behalf of the first processor, such that the first and second virtual addresses uniquely identify the first and second processors, respectively, and are routable through the network; and
means for providing to the first processor the second virtual address and to the second processor the first virtual address to enable one or more tunnels between the first and the second processors.
-
-
15. A system for enabling a network between a first processor and a second processor, wherein the first and second processors are separate from said system and are each identifiable by a name, said system comprising:
-
a tunneling interface that receives, on behalf of the first processor, information that includes a name of the second processor, and receives, on behalf of the second processor, information that includes the name of the first processor; and
a controller that determines a first virtual address for the first processor based on the information received on behalf of the second processor and a second virtual address for the second processor based on the information received on behalf of the first processor such that the first and second virtual addresses uniquely identify the first and second processors, respectively, and are routable through the network, and provides to each of the first and second processors the first and second virtual addresses to enable one or more tunnels between the first and the second processors.
-
Specification