"FIG. 4 is a flow chart showing a method for determining tunnel encryption keys between non-neighbouring nodes in a network architecture according to an embodiment of the invention;" . . . .