Mobile point-to-point protocol

Multiplex communications – Communication over free space – Having a plurality of contiguous regions served by...

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C370S338000, C370S401000

Reexamination Certificate

active

06496491

ABSTRACT:

FIELD OF THE INVENTION
This invention relates generally to communications and, more particularly, to packet communications systems.
BACKGROUND OF THE INVENTION
One use of the Internet as a communications vehicle is as an enhanced data back-bone for coupling together workgroups to provide what is referred to as a “virtual private network” (VPN). One application of a VPN is in a corporate environment such that employees, e.g., at home, can remotely access, via the Internet, corporate data networks. A VPN provides security, and authentication, for a remote user to join a closed user group notwithstanding the use of public facilities. In effect, the use of a VPN provides a WAN-like vehicle to the corporation and its employees. Although the corporate network could also provide direct remote access, e.g., a user dials directly into the corporate network, there are economic advantages to the use of a VPN.
To provide a VPN, tunneling protocols are used such as the “Point-to-Point Tunneling protocol” (PPTP) and the “Layer 2 Forwarding” (L2F) protocol. Generally speaking, a tunnel protocol enables the creation of a private data stream via a public network by placing one packet inside of another. In the context of a VPN, an IP packet is placed inside another IP packet. In an attempt to develop an industry standard, the Internet Engineering Task Force (IETF) is developing the “Layer 2 Tunneling Protocol” (L2TP), which is a hybrid of the PPTP and L2F protocols (e.g., see K. Hamzeh, T. Kolar, M. Littlewood, G. Singh Pall, J. Taarud, A. J. Valencia, W. Verthein;
Layer Two Tunneling Protocol “L
2
TP”;
Internet draft, March, 1998).
For a remote user, a typical form of access to a VPN is via a “plain-old-telephone service” (POTS) connection to an “Internet service provider” (ISP) that provides the VPN service. For example, a user incorporates an analog modem into a personal computer, or equivalent, and has a customer account with a particular ISP, referred to herein as the “home” ISP. It is also assumed that the user's personal computer is properly configured to support one of the above-mentioned tunneling protocols. The user accesses the VPN by simply making a data call to the home ISP, e.g., dialing a telephone number associated with the “home” ISP and then “logging in” to the VPN.
SUMMARY OF THE INVENTION
Typically, access to an ISP is via a network access server (NAS). It has been realized that in a Personal Communications Service (PCS) wireless environment the above-described tunneling protocols do not allow a remote user, on an existing call, to change the NAS that is providing access to a VPN. As such, the user's physical mobility may disconnect, or drop, the user from the existing VPN connection.
Therefore, and in accordance with one aspect of the invention, apparatus and methods for transferring packet data provide a “hand-off” feature that allows an existing point-to-point (PPP) connection to be transferred from one packet server to another packet server.
In one embodiment of the invention, three new hand-off control messages are defined for use with the packet servers, namely: (i) Continued Call Request, (ii) Continued Call Reply, and (iii) Continued Call Connect. These three new control messages comprise a L2TP control message header, message identifier (e.g., continued call request, etc.), and a number of fields. As a result, the user does not have to terminate the current PPP connection and then re-establish a new PPP connection.
Advantageously, such a hand-off control message or call continue transaction can be initiated by any of the servers involved in the hand-off scenario. For instance, assume an initial arrangement where a point-to-point call is set up and in progress between a user and a private network via a first packet server (e.g., a first Serving LAC) and a second packet server (e.g., an Anchor LAC). If, for example, the user moves out of the region served by the first packet server into a region served by a third packet server (e.g., a second Serving LAC), then a hand-off control message transaction, according to the invention, is initiated. In accordance with the invention, the second Serving LAC may initiate the call continue transaction or the Anchor LAC may initiate the call continue transaction. Alternatively, in accordance with another aspect of the invention, radius servers respectively associated with the packet servers may be employed to perform the call continue transaction.
In another aspect of the invention, assuming that a communication path is not yet established between the second packet server (e.g., Anchor LAC) and the third packet server (e.g., the second Serving LAC), a communication path (e.g., tunnel) set-up control message transaction may be performed concurrent with the call continue transaction.
Further, in yet another aspect of the invention, at least one packet server (e.g., the Anchor LAC) monitors state variables associated with the packet servers (e.g., the second Serving LAC and the private network) from which it receives packet data.


REFERENCES:
patent: 5327424 (1994-07-01), Perlman
patent: 5521963 (1996-05-01), Shrader et al.
patent: 5546382 (1996-08-01), Fujino
patent: 5557745 (1996-09-01), Perlman et al.
patent: 5636217 (1997-06-01), Moelard
patent: 5680552 (1997-10-01), Netravali et al.
patent: 5812535 (1998-09-01), Hallock et al.
patent: 5870386 (1999-02-01), Perlman et al.
patent: 5918019 (1999-06-01), Valencia
patent: 5940381 (1999-08-01), Freeburg et al.
patent: 5949773 (1999-09-01), Bhalla et al.
patent: 6006090 (1999-12-01), Coleman et al.
patent: 6026085 (2000-02-01), Chau et al.
patent: 6061650 (2000-05-01), Malkin et al.
patent: 6137791 (2000-10-01), Frid et al.
patent: 0917320 (1999-05-01), None
William Woo and Victor C.M. Leung, Handoff Enhancement in Mobile-IP environment, 1996, pp. 760-764.*
Charles E. Perkins, Mobile IP, 1997, p. 84-99.*
Maurizio Dell' Abate, Martino De Marco and Vittorio Trecordi, Performance Evaluation of Mobile IP protocols in a Wireless Environment, 1998, pp. 1810-1816.*
Chu-Sing Yang, Kun-da Wu, and Chun-Wei Tseng, Support an Efficient Connection for Mobile IP, 1998, pp. 514-519.*
Charles E. Perkins, Mobile Networking Through Mobile IP, 1998, pp. 58-69.*
D. Perkins, The Point to Point Protocol: A Proposal for Multi Protocol Transmission of Datagrams Over Point to Point Links, Group of the Internet Engineering Task Force, 12, 16, 21, 30, Nov. 89.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Mobile point-to-point protocol does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Mobile point-to-point protocol, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Mobile point-to-point protocol will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-2937318

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.