Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

70 results about "Layer 2 Tunneling Protocol" patented technology

In computer networking, Layer 2 Tunneling Protocol (L2TP) is a tunneling protocol used to support virtual private networks (VPNs) or as part of the delivery of services by ISPs. It does not provide any encryption or confidentiality by itself. Rather, it relies on an encryption protocol that it passes within the tunnel to provide privacy.

Layer two tunneling protocol (L2TP) merging and management

A system is provided for creating a tunneling service from the use of a traditional tunneling protocol, such as the layer two tunneling protocol (L2TP). In particular, the L2TP tunneling protocol, which is designed to go point-to-point between an L2TP Access Concentrator (LAC) and an L2TP Network Server (LNS), is abstracted so that L2TP becomes an access protocol to a tunneling service. A new L2TP tunnel merger and management (LTM) service is created which severs the tight configuration relationships between LAC and LNSs. Only a tight configuration between an LAC and its LTM edge device and between an LNS and its LTM edge device is required. An internal trunk protocol (INT protocol) carries needed information between LTM edge devices to establish ingress/egress L2TP access calls inside of separate L2TP access tunnels on opposite LTM edge devices. The addition of another LAC is accomplished by re-routing L2TP tunnels within the LTM service without reconfiguration of the LNSs, and the addition of another LNS is accomplished by re-routing L2TP tunnels within the LTM service without reconfiguration of the LACs. The LTM service determines the need for both additional trunk and access resources and establishes both new trunk/access tunnels to provide additional resources. The LTM service also determines excess resources on both trunk and access entities and releases trunk/access tunnels to provide the needed additional resources.
Owner:TDC THE

LTE and WLAN interconnecting system and switching method

InactiveCN101841880AMeet business quality requirementsReduce latencyWireless communicationTime delaysCoupling
The invention provides an LTE and WLAN interconnecting system and a switching method; and the system introduces the entity of a virtual base station under an LTE architecture, and accesses the entity into the interface of the LTE as WLAN. On the LTE side, the virtual base station remains transparent relative to the LTE side, and is provided with the functions of a general LTE base station. On the WLAN side, the virtual base station can control the WLAN access point. The switching between the LTE and the WLAN is realized through the virtual base station through a standard X2 interface. A second layer tunneling protocol or an Ethernet tunneling protocol is adopted between the virtual base station and the WLAN access point to realize the transmission and the receiving of data and signaling during the switching process, and the WLAN serves as the bottom layered transmission channel of the data and the signaling of an LTE system. The method has the advantage that for the LTE, the switching process is kept consistent with the LTE switching process, which has very small impact on the traditional LTE. The WLAN is connected with the LTE in a tight coupling way, thereby greatly meeting the business requirement requirements, reducing the time delay caused by system switching, and ensuring the system performance.
Owner:HUAZHONG UNIV OF SCI & TECH

Methods for passing through and assisting in passing through network isolation equipment in Internet protocol (IP) monitoring system, and node

ActiveCN102546657ALess mappingFew portsTransmissionInternet protocol suiteIp address
The invention discloses a method for passing through network isolation equipment in an Internet protocol (IP) monitoring system. The method comprises the following steps that: a first monitoring node in an inner network of the network isolation equipment serves as a layer 2 tunneling protocol network server (LNS), and receives a tunnel connection request initiated by a layer 2 tunneling protocol (L2TP) relay which serves as an L2TP access concentrator (LAC); after L2TP tunnel connection is established, the first monitoring node allocates an IP address to the L2TP relay, and activates the IP address of own L2TP virtual interface; the first monitoring node receives a tunnel message from the L2TP relay, decapsulates the tunnel message to obtain an inner-layer IP message with the content of monitoring signaling data, acquires the monitoring signaling data from the inner-layer IP message, and performs corresponding signaling processing; and the first monitoring node encapsulates own generated monitoring signaling data into the inner-layer IP message, encapsulates the inner-layer IP message into the tunnel message, and transmits the tunnel message to the L2TP relay. By the method, the monitoring node can simply and effectively pass through the isolation equipment, and the interference of the isolation equipment in a monitoring service is avoided.
Owner:ZHEJIANG UNIVIEW TECH CO LTD

Method and device for backing up lonworks network service (LNS)

ActiveCN102710520ASolve the problem of not being able to back up across three layersImprove networking flexibilityNetworks interconnectionLonWorksGeolocation
The invention provides a method for backing up a lonworks network service (LNS), and the method comprises the steps of receiving and locally storing information of a layer 2 tunneling protocol (L2TP) tunnel transmitted by a second LNS device staying at an active status through an expanded virtual router redundancy protocol (VRRP) message when a first LNS device stays at a standby status, wherein the tunnel information comprises a tunnel identification (ID), a conversation ID and an internet protocol (IP) address of a location area code (LAC); switching the first LNS device to the active status, activating the local stored tunnel information and issuing a host computer route of a virtual IP address to a network when the first LNS device staying the standby status ensures that the second LNS device staying at the active status has failure or receives an L2TP tunnel takeover notice transmitted by the second LNS device staying at the active status; and revoking the issued host route of the virtual IP address when the first LNS device is switched from the active status to the standby status. According to the method and the device, no requirement for the geological location of the devices which are mutually backed up each other exists, so that the networking flexibility is greatly improved.
Owner:ZHEJIANG UNIVIEW TECH CO LTD

LAC-based LFI support for tunneled PPP sessions

An embodiment may provide for link fragmentation and interleaving at an access device located between a point to point link and a tunneled connection. An embodiment may include a method of receiving frames through a tunnel from a network server, fragmenting at least some of the frames from the network server, and sending fragmented and unfragmented frames over a data link to an endpoint device. In some embodiments the frames may be multilink point to point protocol (MLPPP) frames. In yet another embodiment, the frames may be received through a layer two tunneling protocol (L2TP) tunnel. An embodiment may include scanning a frame for PPP options and removing options related to MLPPP negotiation and then forwarding the frame to a network server. An embodiment may comprise means capable of executing the embodiment method or may include instructions that when executed on a machine are capable of the embodiment method. An embodiment may include a device with a first port to send or receive fragmented frames to a data link, a second port to tunnel assembled frames to a network server through a packet network, and circuitry in communication with the first port and the second port, the circuitry to fragment link fragmentation frames to be sent through the first port, reassemble any fragmented frames received from the first port, and send or receive assembled frames through the second port.
Owner:CISCO TECH INC

Method and device for enabling third generation (3G) user to safely access to network

The invention discloses a method and a device for enabling a third generation (3G) user to safely access to network. When a link control protocol (LCP) attribute and a user name of a client, which are acquired by layer 2 tunneling protocol network server (LNS), are acceptable, an temporary internet protocol (IP) address is selected from an established temporary IP address pool and distributed to the client, fixed information which is sent by the client and can verify the client identity is received, when the fixed information is received, the fixed information is correspondingly recorded with the user name and a password, the point-to-point protocol (PPP) connection with the client is disconnected to trigger the client to initiate a second time virtual private dial-up network (VPDN) call, the client is informed of the specified IP address which is distributed by authentication, authorization and accounting (AAA) server to the client according to the recorded fixed information, the user name and the password, or when the fixed information is received, the fixed information, the user name and the password are directly sent to the AAA server to verify the client, and after the client passes the authentication, the client is informed of the specified IP address which is distributed by the AAA server to the client. By means of the method and the device, the client can access to network only when the client is subjected to safety authentication by the LNS, and the safety of network access is improved.
Owner:NEW H3C TECH CO LTD

Method and device for saving WAN (wide area network) bandwidth in IP (internet protocol) monitoring system

ActiveCN102546350ASolve the problem of bandwidth consumptionSolve consumptionNetworks interconnectionInternet protocol suiteMonitoring system
The invention provides a method for saving WAN (wide area network) bandwidth in an IP (internet protocol) monitoring system. The monitoring system further comprises an EC (electronic computer), a VC (visible computer) and an LNS (L2TP (layer 2 tunneling protocol) network server), wherein at least the EC and the VC are in L2TP tunnel connection with the LNS. The method comprises the following steps: receiving registration messages sent by the EC and the VC, storing address information of EC and VC in the registration messages; after establishing a transmission channel for monitoring video streams on the L2TP between the EC and VC, issuing commands of trying to communicate with an intranet of an opposite terminal to the EC and the VC; receiving an intranet communication trying report sent by the VC, judging whether the EC can communicate with the VC through the intranet according to the address information of the report message and the self-stored address information; if so, sending a communication mode switching command to instruct the EC to switch to an intranet communication mode from the L2TP tunnel communication mode. The method can be used for effectively solving the WAN bandwidth consumption problem in a tunnel mode.
Owner:ZHEJIANG UNIVIEW TECH CO LTD

Network equipment remote maintenance system and maintenance method

InactiveCN102647300ARespond promptly to maintenance needsEnsure safetyData switching networksThird generationAuthentication server
The invention relates to the network equipment management and maintenance technology, and discloses a network equipment remote maintenance system and a method, which solve the problems of long period, high cost and poor safety and reliability of the conventional prior in network equipment maintenance. The network equipment remote maintenance system comprises remote maintenance agent equipment, an authentication server and a remote maintenance terminal, wherein the remote maintenance agent equipment constructs an encrypted secure channel with a L2TP (layer 2 tunneling protocol) network server through a 3G network, and is used for receiving data sent by the remote maintenance terminal through a secure connection channel and forwarding the data to the equipment to be maintained, and for receiving the uploaded data of the equipment to be maintained and forwarding the data to the remote maintenance terminal through the encrypted secure channel; the authentication server is used for access authentication of the remote maintenance agent equipment and the access authentication of the remote maintenance equipment; and the remote maintenance terminal is used for receiving maintenance command input of a remote maintenance personnel, and for sending the maintenance command to the remote maintenance agent equipment and receiving the uploaded maintenance result. The network equipment remote maintenance system provided by the invention is suitable for network equipment maintenance.
Owner:MAIPU COMM TECH CO LTD

L2TP-based (layer 2 tunneling protocol based) wireless access system and interaction method thereof

The invention relates to an L2TP-based (layer 2 tunneling protocol based) wireless access system and an interaction method thereof; the interaction method comprises the steps of allowing a wireless access point to join a wireless access controller through internet; allowing the wireless access controller to issue a wireless local area network configuration and L2TP tunnel configuration to the wireless access point; allowing a wireless client which is online to transmit a data message to the wireless access point; allowing the wireless access point to package the data message and transmit to the wireless access controller; allowing the wireless access controller to unpackage the packaged data message, and transmit to a broadband access server of an extranet device by means of layer 2 forwarding; allowing the broadband access server of the extranet device to return a message of Ethernet frame to the wireless access controller; allowing the wireless access controller to find a path of the wireless client through a port mapping table, perform L2TP layer 2 tunnel packaging on the message and transmit to the wireless access point; allowing the wireless access point to unpackage the packaged message and forward to the wireless client. The standard L2TP is used herein to allow data interaction among the STA (station), AP (access point), AC (access controller) and BAS (broadband access server), with good compressing and encrypting properties and low cost.
Owner:SHENZHEN GRENTECH CORP LTD

Virtual private network access method and device for mobile user

The invention discloses a virtual private network access method and a virtual private network access device for a mobile user. The method and the device support the mobile user to access the virtual private network. The method comprises the following steps of: establishing a permanent layer 2 tunneling protocol (L2TP) channel between an L2TP network server (LNS) and a first L2TP access concentrator (LAC), and also establishing the permanent L2TP channel between the LNS and a second LAC in an LAC active initiation way; establishing a public session and synchronizing the second LAC after an L2TP session between a terminal and the first LAC is established; and when the terminal moves from a first LAC network into a second LAC network, rapidly accessing the LNS and establishing the L2TP session without changing an Internet protocol (IP) address of the terminal. The LACs and the LNS are provided with a terminal information table entry and a revocation timer, the LNS is also provided with a message synchronization device for conveniently realizing LAC information synchronization. By the method and the device, the terminal can access the virtual private network by using the same IP address when the terminal moves, so that all service applications based on network IP and network rights are not changed during roaming.
Owner:NEW H3C TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products