CO-EXISTENCE SUPPORT FOR 3GPP DEVICE AND FIXED DEVICE BEARER TRANSPORT OVER FIXED BROADBAND ACCESS NETWORK
First Claim
1. A method for facilitating connectivity over a fixed network of a user equipment operable in a wireless network, comprising:
- receiving an access request at a server;
providing Internet Protocol (IP) connectivity to the user equipment based on a type of the access request;
wherein the type of the access request is one of a first type in which there is no outer IP based tunnel to encapsulate an inner packet from the user equipment and a second type in which the inner packet is encapsulated using an outer IP tunneling.
0 Assignments
0 Petitions
Accused Products
Abstract
A communications system includes a trusted wireless access gateway, a broadband network gateway and a user equipment. The user equipment is configured to transmit an attachment request. The broadband network gateway is configured to receive the attachment request from the user equipment and determine whether the attachment request is an extensible authentication protocol (EAP) authentication request and forward to the trusted wireless gateway the attachment request when is determined that the attachment request is an EAP authentication request. The trusted wireless access gateway is configured to fulfill the attachment request based on a type of the attachment request.
65 Citations
14 Claims
-
1. A method for facilitating connectivity over a fixed network of a user equipment operable in a wireless network, comprising:
-
receiving an access request at a server; providing Internet Protocol (IP) connectivity to the user equipment based on a type of the access request; wherein the type of the access request is one of a first type in which there is no outer IP based tunnel to encapsulate an inner packet from the user equipment and a second type in which the inner packet is encapsulated using an outer IP tunneling. - View Dependent Claims (2, 3)
-
-
4. An apparatus for facilitating connectivity over a fixed network of a wireless device operable in a wireless network, comprising:
-
a receiver that receives an access request; an Internet Protocol (IP) connectivity provider that provides IP connectivity to a user equipment based on a type of the access request; wherein the type of the access request is one of a first type in which there is no outer IP based tunnel to encapsulate an inner packet from the user equipment and a second type in which the inner packet is encapsulated using an outer IP tunneling. - View Dependent Claims (5, 6)
-
-
7. A computer program product comprising a non-transitory, computer-readable medium having code stored thereon, the code, when executed by a processor, causing the processor to implement a method, comprising:
-
receiving an access request at a server; providing Internet Protocol (IP) connectivity to the user equipment based on a type of the access request; wherein the type of the access request is one of a first type in which there is no outer IP based tunnel to encapsulate an inner packet from the user equipment and a second type in which the inner packet is encapsulated using an outer IP tunneling. - View Dependent Claims (8, 9)
-
-
10. A method implementable at a broadband network gateway (BNG) operable in a access network, the method comprising:
-
receiving an attachment request from a user equipment; determining, based on the attachment request, whether the attachment request is for a wireless network routed transport; forwarding the attachment request, when it is determined that the attachment request is for the wireless network routed transport, to a trusted wireless access gateway (TWAG). - View Dependent Claims (11, 12, 13)
-
-
14. A communications system comprising a trusted wireless access gateway, a broadband network gateway and a user equipment, wherein:
-
the user equipment is configured to transmit an attachment request; the broadband network gateway is configured to receive the attachment request from the user equipment and determine whether the attachment request is an extensible authentication protocol (EAP) authentication request and forward to the trusted wireless gateway the attachment request when is determined that the attachment request is an EAP authentication request; and the trusted wireless access gateway is configured to fulfill the attachment request based on a type of the attachment request.
-
Specification