METHOD OF OPERATING TUNNEL POINT SUPPORTING ROUTING SCALABILITY AND MOBILITY
First Claim
1. A method of operating a tunnel point which provides a tunnel between a router group including at least one router and a mobile node, the method comprising:
- providing a tunnel between the mobile node and the router group by authenticating the mobile node;
receiving a packet including an identifier (ID) of a target node from the mobile node;
converting the ID of the target node in the packet into a locator corresponding to the ID of the target node;
transmitting a packet including the converted locator to the router group; and
maintaining the ID of the mobile node by authenticating the mobile node through the router group when the mobile node is connected to another external terminal node.
1 Assignment
0 Petitions
Accused Products
Abstract
Provided is a method of operating a tunnel point that provides a tunnel between a router group including at least one router and a mobile node. The method includes: providing a tunnel between the mobile node and the router group by authenticating the mobile node; receiving a packet including an identifier (ID) of a target node from the mobile node; converting the ID of the target node in the packet into a locator corresponding to the ID of the target node; transmitting a packet including the converted locator to the router group; and maintaining the ID of the mobile node by authenticating the mobile node through the router group when the mobile node is connected to another external terminal node.
-
Citations
11 Claims
-
1. A method of operating a tunnel point which provides a tunnel between a router group including at least one router and a mobile node, the method comprising:
-
providing a tunnel between the mobile node and the router group by authenticating the mobile node; receiving a packet including an identifier (ID) of a target node from the mobile node; converting the ID of the target node in the packet into a locator corresponding to the ID of the target node; transmitting a packet including the converted locator to the router group; and maintaining the ID of the mobile node by authenticating the mobile node through the router group when the mobile node is connected to another external terminal node. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
Specification