[go: up one dir, main page]

WO2008006317A1 - A system and method for the multi-service access - Google Patents

A system and method for the multi-service access Download PDF

Info

Publication number
WO2008006317A1
WO2008006317A1 PCT/CN2007/070244 CN2007070244W WO2008006317A1 WO 2008006317 A1 WO2008006317 A1 WO 2008006317A1 CN 2007070244 W CN2007070244 W CN 2007070244W WO 2008006317 A1 WO2008006317 A1 WO 2008006317A1
Authority
WO
WIPO (PCT)
Prior art keywords
controller
node
control
user
service
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
PCT/CN2007/070244
Other languages
English (en)
French (fr)
Inventor
Min Zha
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Technologies Co Ltd
Original Assignee
Huawei Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co Ltd filed Critical Huawei Technologies Co Ltd
Priority to EP07764172A priority Critical patent/EP2040431B1/en
Priority to ES07764172T priority patent/ES2398591T3/es
Publication of WO2008006317A1 publication Critical patent/WO2008006317A1/zh
Priority to US12/341,529 priority patent/US7934004B2/en
Anticipated expiration legal-status Critical
Ceased legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/2854Wide area networks, e.g. public data networks
    • H04L12/2856Access arrangements, e.g. Internet access
    • H04L12/2869Operational details of access network equipments
    • H04L12/287Remote access server, e.g. BRAS
    • H04L12/2874Processing of data for distribution to the subscribers
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L47/00Traffic control in data switching networks
    • H04L47/10Flow control; Congestion control
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L61/00Network arrangements, protocols or services for addressing or naming
    • H04L61/50Address allocation
    • H04L61/5007Internet protocol [IP] addresses
    • H04L61/5014Internet protocol [IP] addresses using dynamic host configuration protocol [DHCP] or bootstrap protocol [BOOTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0892Network architectures or network communication protocols for network security for authentication of entities by using authentication-authorization-accounting [AAA] servers or protocols

Definitions

  • the present invention relates to the field of communications, and more particularly to a multi-service access system and an implementation method.
  • FIG. 1 shows an architecture diagram of a prior art supporting multiple services in a single edge case.
  • the existing single-edge technology supports scenarios that support multiple services.
  • all service providers ie service provider nodes, are connected to the access server.
  • the user-to-business provisioning node is controlled by the access server 106
  • the selected control is also performed on the access server 102.
  • the disadvantage of the single-edge technology shown in the figure is that the access server needs to support various service features due to the difference in service characteristics provided by different service providers, and the control flow of authentication and accounting of all users also needs to pass through the access server. As a result, the access server needs to support a large number of functions, and the scalability is poor, which becomes a bottleneck of the entire network.
  • FIG. 2 shows an architecture diagram of the prior art supporting multiple services in the case of multiple edges.
  • the service provider that is, the service providing node 206 is selected by the access node 204, and the broadband network gateway 202 needs to support authentication, authorization, charging, policy delivery, and IP (Internet Protocol
  • BNG Broadband Network Gateway
  • broadband network gateway making it very easy to expand business.
  • the function of selecting the network is also bound to increase the difficulty of AN implementation.
  • the network edge node is BRAS
  • the user's authentication, authorization, and control are performed uniformly on the edge nodes of the network, and the AN has a unique connection with the BRAS.
  • the BRAS can perform QoS (Quality of Service) control on the AN according to the policy.
  • QoS Quality of Service
  • the network edge node is the only device in the access network that bears the control and bearer functions; and the network edge node must also support multiple services. Therefore, in the case of a single edge, the function of the network edge node is very complicated, the implementation is difficult, the scalability is poor, and it is easy to generate a single point of failure.
  • the multi-edge architecture different network edge nodes are mapped for different services. For different services, the network edge nodes can be optimized accordingly.
  • This multi-edge architecture is quite advantageous for business expansion and simplifies the implementation of network edge nodes.
  • this architecture brings a new problem, that is, the unified control of users at the edge of the network, and the choice of users for network edge nodes. Because there are multiple network edges, the coordination of user control by these edge nodes is a problem; and the architecture requires AN to select network edge nodes and increase AN.
  • the present invention aims to provide It is used in a multi-service access system and an implementation method for solving the above-mentioned problems of multi-service access.
  • a multi-service access system including:
  • At least one access node configured to receive a message of the user, perform the separation of the control flow and the service flow, send the control flow to the controller, and send the service flow according to the control of the controller. Send to the corresponding edge node;
  • the controller is configured to perform processing of the control flow, to control the access node to send the service flow to a corresponding edge node, and control the corresponding edge node to perform the service flow Processing;
  • At least one edge node configured to transmit the received service flow to the corresponding service providing node according to the control of the controller.
  • Embodiments of the present invention also provide a user access network method using the above system
  • the method includes the steps of:
  • the service providing node receives the authentication request of the user sent by the controller, and authenticates the user; [22] the service providing node receives the controller I
  • the controller controls path establishment between the access node and the edge node.
  • An embodiment of the present invention further provides a control and bearer separation method, where the method includes:
  • the access node receives the packet of the user, performs the separation of the control flow and the service flow, sends the control flow to the controller, and sends the service flow to the corresponding edge according to the control of the controller.
  • the controller performs processing of the control flow to control the access node to send the service flow to a corresponding edge node, and control the corresponding edge node to perform the service flow. deal with;
  • the edge node transmits the received service flow to the corresponding service providing node according to the control of the controller.
  • the system of the present invention proposes a system for separating control and bearer in a multi-edge architecture, and adopts a method of combining multi-edge service bearers and unified control, so that the system has the scalability for multiple services. It is also possible to control the user in a unified manner without having to make AN
  • the network edge device can only be responsible for the processing of the corresponding service.
  • FIG. 1 shows an architecture diagram of a prior art supporting multiple services in a single edge case
  • FIG. 2 shows an architecture diagram of a prior art supporting multiple services in a multi-edge case
  • FIG. 3 shows an architectural diagram of a multi-edge control and bearer separation system in accordance with an embodiment of the present invention
  • FIG. 4 is a schematic diagram showing a process of a user accessing a network according to an embodiment of the present invention
  • FIG. 5 is a schematic diagram showing a process of a user accessing a network according to an embodiment of the present invention (IP edge is used as a relay of address allocation);
  • FIG. 6 shows a flow chart of a multi-edge control and bearer separation method according to an embodiment of the present invention
  • FIG. 7 shows an 802.1x according to an embodiment of the present invention.
  • Figure 8 shows an 802.bc according to another embodiment of the present invention.
  • an embodiment of the present invention proposes a system for controlling separation from bearers under a multi-edge architecture.
  • a control device is created, which is responsible for authentication, authorization, policy delivery, and the like; and multiple edge devices are set at the edge of the network, corresponding to different service providing nodes, and the edge device can only be responsible for the processing related to the bearer.
  • the idea of separation of control and bearer under the multi-edge architecture is conducive to service expansion and unified control of multiple user access, simplifying the complexity of multi-edge architecture.
  • a schematic diagram of a control and bearer separation system for multi-service access according to an embodiment of the present invention is shown;
  • a schematic diagram of a method for implementing control and bearer separation for multi-service access in accordance with an embodiment of the present invention is shown.
  • Embodiments of the present invention provide a system for controlling separation of bearers under a multi-edge architecture 300
  • the combination of multi-edge service bearer and unified control technology enables the system to have both scalability for multiple services and unified user control without complicating the AN.
  • the control and bearer separation system 300 for multi-service access shown in FIG. 3 includes:
  • Access Node also known as Access Point
  • An edge node 307 is configured to submit a service flow to the service providing node 306.
  • controller (
  • Controller 302 responsible for authentication, authorization, policy delivery, etc.
  • IP edge device IP edge
  • edge node 307 It can only be responsible for the processing related to the bearer.
  • control functions authentication, authorization, and accounting
  • network edge selection IP edge
  • policy delivery is separated from the network edge device (IP edge) 307 to form a single device, that is, the controller 302; the access node 304
  • IP edge device 307 specializes in processing related functions such as IPTV, VOIP (Voice Over IP, IP Voice).
  • the service providing node 306 is responsible for user authentication, accounting processing, IP
  • the control and bearer separation method for multi-service access shown in FIG. 6 includes the following steps:
  • Step S604 performing control flow processing by the controller to control routing of the service flow
  • the edge node sends a service flow to the corresponding service providing node.
  • FIG. 4 shows a schematic diagram of a process of a user accessing a network according to an embodiment of the present invention.
  • a process for a user to access a network includes the following steps:
  • [59] 1 user authentication process The user initiates an authentication request, and the access node directs the authentication request to the Controller
  • the service providing node to the edge is selected for authentication, and the address allocation server is obtained during the authentication process (DHCP SERVER)
  • the operations performed by the Controller including but not limited to: [60] A. Select an IP Edge that can reach the corresponding service provider node network. For an IP Edge to correspond to multiple service provider nodes, the IP Edge is also notified to select the appropriate exit.
  • the information that the controller can obtain during the user authentication process may include one or more of the following: address of the address allocation server, QoS parameters, policy of the user accessing the network, IP address of the DNS (domain name server), WINS (Windows Internet Name Service) IP address of the server, P-CSCF
  • [64] 2 user address allocation process After the user authentication is passed, the user initiates a request for address allocation, and the AN directs the request as a control message to the Controller, Controller.
  • the controller forwards the path established between the AN and the IP edge.
  • the packet in the address allocation process can be directly forwarded to the IP edge as the service flow, and the IP edge is used to relay the user address.
  • the user access network step can be adapted to an IP edge device corresponding to a service providing node. Scenes. The access process is shown in Figure 5.
  • FIG. 5 is a diagram showing a process of a user accessing a network according to an embodiment of the present invention ( ⁇ IP edge is used as a relay of address allocation).
  • the user access network process shown in FIG. 5 differs from that of FIG. 4 in the address allocation process of the user.
  • the user's address allocation process includes:
  • the user After the user passes the authentication, the user initiates the address allocation request, and the access node sends the request as a service message to the edge node, and the edge node forwards the request message of the address allocation to the service providing node corresponding to the edge node.
  • the access node 504 needs to include at least: a flow separation function, QoS
  • the flow separation function mainly separates the control flow and the service flow, and the flow separation function directs the control flow to the controller 502 to direct the traffic flow to the IP edge device.
  • the QoS and policy enforcement functions are mainly the QoS and policies delivered by the controller 502.
  • the main function of the path establishment executive is to perform the decision to establish the path of the controller 502.
  • the controller 502 includes at least one or more of the following: AAA
  • the AAA controller is primarily responsible for the functions of the client or agent that implements user authentication, authorization, and accounting;
  • the AAA controller participates in the process of user authentication, authorization, and accounting.
  • the path controller mainly selects edge nodes according to user authentication conditions
  • the policy controller mainly performs QoS and policy delivery.
  • the address assignment controller is primarily used for clients or agents that assign user addresses.
  • the IP edge device 507 includes at least one of: a routing function body and a service related function body.
  • the routing function performs the routing function of the service flow; that is, the routing function routes the service flow received by the IP edge device 507 to the corresponding service providing node according to the control of the controller.
  • the business-related function performs business-related operations.
  • At least the service providing node 507 includes: an AAA server and an address allocation server (eg:
  • DHCP SERVER One or more of DHCP SERVER ).
  • FIG. 7 shows a schematic diagram of a user access procedure of an 802.1X in a multi-edge system according to an embodiment of the present invention.
  • 802. lx and DHCP are used
  • a multi-edge architecture that implements control and bearer separation.
  • the port can be a physical port or a logical port (such as VLAN (Virtual Local Area Networks), VCC (Virtual Channel Connection)
  • VLAN Virtual Local Area Networks
  • VCC Virtual Channel Connection
  • This port allows all packets to pass. If the authentication is unsuccessful, the port is kept 'off', that is, only 802.1X authentication protocol packets are allowed to pass.
  • the 802.1X system can be slightly modified.
  • the AN sends all control messages (such as 802. lx s DHCP messages) to the Controller.
  • the Controller performs the functions of Authenticator and DHCP relay/proxy (Transfer/Proxy).
  • the Service Provider manages the AAA Server and DHCP Server.
  • the AAA protocol can use the Radius or Diameter protocol.
  • the user access process of the entire system is shown in Figure 7 under the condition that EAP-MD5-based 802. lx authentication and DHCP are assigned IP addresses.
  • Phase 1 User initiated authentication request, identified by AN 802.1x
  • the packets are sent to the Controller; the Controller acts as an Authenticator to translate the 802. lx and AAA (eg, Radius or Diameter) protocols, and selects according to the user identifier in the EAP message in the 802. lx message. Authenticate on the AAA Server of the corresponding service provider node. After the authentication succeeds, the Controller obtains the DHCP Server address and user profile.
  • AAA eg, Radius or Diameter
  • the controller sets the corresponding QoS and policy for the AN and IP edge, and establishes the path of the service flow between the AN and the IP edge.
  • the address request, the DHCP message is identified by the AN, and the message is sent to the Controller; the Controller acts as a DHCP relay/proxy, according to the DHCP server obtained after the previous authentication.
  • FIG. 8 shows an 802.1x in accordance with another embodiment of the present invention.
  • a multi-edge architecture that implements control and bearer separation, where DHCP relay/proxy is implemented on the IP edge.
  • the AN only needs to be 802. lx
  • the packet is forwarded to the Controller.
  • the AAA server does not need to send the address of the DHCP server to the Controller.
  • the specific process is shown in Figure 8, which is not mentioned here.
  • This architecture is more suitable for an IP edge corresponding to an operational node, IP edge
  • the DHCP server address can be statically configured on the IP edge for the IP edge as the DHCP relay/proxy.
  • the embodiment of the present invention proposes a system for separating control and bearer under a multi-edge architecture, and adopting a multi-edge service bearer and a unified control method to enable
  • the system not only has the scalability for the multiple services, but also can control the user in a unified manner, and does not need to complicate the AN.
  • the embodiment of the present invention achieves the following technical effects:
  • the method of separating the control and the bearer is adopted, so that the modified architecture can be practically used and the services are accessed by multiple services.
  • the network edge only deals with business-related transactions, which is very advantageous for service expansion;
  • Uniform control of user access prevents the access network from performing unified control and management on the user in the case of multiple edges, reducing interaction between edges;
  • the network edge device is only responsible for the processing of the corresponding service.
  • each module or each step in the above embodiments may be implemented by a general-purpose computing device, which may be concentrated on a single computing device or distributed among multiple computing devices. Alternatively, they may be implemented by program code executable by the computing device, such that they may be stored in the storage device by the computing device, or they may be divided Do not make individual integrated circuit modules, or make multiple modules or steps of them into a single integrated circuit module. Thus, the invention is not limited to any specific combination of hardware and software. It is to be understood that changes in these specific embodiments will be apparent to those skilled in the art without departing from the scope of the invention.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Description

用于多业务接入的系统和实现方法
[1] 技术领域
[2] 本发明涉及通信领域, 更具体而言, 涉及用于多业务接入系统和实现方法。
[3] 发明背景
[4] 目前多业务提供已经是业界发展的方向, 现在支持多业务的有单边缘和多边缘 两种架构。
[5] 下面将分别参照图 1和图 2
来详细描述现有技术中的单边缘技术和多边缘技术对多业务场景的支持。
[6] 图 1示出了现有技术在单边缘情况下, 支持多业务的架构图。 如图 1
所示, 现有单边缘的技术对于支持多业务的场景进行了支持。
[7] 从图 1看到, 接入节点 AN 104
对应唯一的接入服务器, 所有的业务提供商即业务提供节点都接到接入服务器
( BRAS ) 102上, 由接入服务器控制用户对业务提供节点 106
的选择, 以及后续业务流的处理。 每增加一种新的业务, 需要在接入服务器 102 上增加相关的特性支持。 用户 108的认证、 业务提供商 106
选择的控制, 也是在接入服务器 102上进行的。
[8] 图 1
所示的单边缘技术缺点在于, 由于不同业务提供商提供的业务特点的差异, 导 致接入服务器需要支持各种业务特点, 而且所有用户的认证、 计费等控制流也 需要经过接入服务器, 从而造成接入服务器需要支持的功能繁多, 扩展性差, 成为整个网络的瓶颈。
[9] 图 2示出了现有技术在多边缘情况下, 支持多业务的架构图。 如图 2
所示, 现有多边缘的技术对于支持多业务的场景进行了支持。
[10] 从图 2可知, 由宽带网络网关 202
作为接入网络边缘, 业务提供商即业务提供节点 206的选择是靠接入节点 204 进行, 而宽带网络网关 202需要支持认证、 授权、 计费、 策略的下发、 IP ( Internet Protocol
, 互联网协议) 地址的分配等相关功能。 多边缘的好处是可以针对不同类型的 业务提供不同的 BNG ( Broadband Network Gateway
, 宽带网络网关) , 使得扩展业务变得非常容易。
[11] 图 2所示的多边缘技术缺点在于, BNG
不但要进行业务的转发, 也要进行认证、 业务的控制。 在多边缘情况下, 这些 控制功能, 分散在各个 BNG
中, 这使得接入网络进行统一的控制变得非常困难, 而由 AN
负责选择网络的功能也势必增加 AN的实现难度。
[12] 单边缘架构中, 网络边缘节点为 BRAS
, 用户的认证、 授权、 控制在该网络边缘节点上统一进行, AN与 BRAS 有唯一的连接。 BRAS可以根据策略对 AN进行 QoS ( Quality of Service , 服务质量) 控制。 BRAS
又接入了多个业务提供节点, 对业务提供节点的选择、 以及对各种业务的支持 都需要在 BRAS上实现。 BRAS
既为唯一的边缘控制点, 也为唯一的多种边缘业务发起点。 由此可见, 网络边 缘节点是接入网络中唯一的同吋承担控制和承载功能的设备; 而且网络边缘节 点还必须实现对多种业务的支持。 所以在单边缘的情况下, 网络边缘节点的功 能非常复杂, 实现难度大, 扩展性差, 并且很容易产生单点故障。
[13] 而多边缘架构中, 针对不同的业务, 对应了不同的网络边缘节点。 对于不同的 业务, 网络边缘节点可以进行相应的优化。 这种多边缘的架构对业务的扩展是 相当有利的, 而且简化了网络边缘节点的实现。 但这种架构带来了一个新的问 题, 就是网络边缘对用户的统一控制, 以及用户对网络边缘节点的选择。 由于 有多个网络边缘, 这些边缘节点对用户控制的协调是一个难题; 而且该架构需 要 AN选择网络边缘节点, 增大了 AN
实现的复杂性, 而边缘节点的控制功能实现并没有简化。
[14] 发明内容
[15] 本发明旨在提供 用于多业务接入系统和实现方法, 用于解决上述多业务接入吋出现的问题。
[16] 根据本发明的一个方面, 提供了一种用于多业务接入系统, 包括:
[17] 至少一个接入节点, 用于接收用户的报文, 将所述报文进行控制流和业务流的 分离, 将所述控制流发送给控制器, 并根据控制器的控制将业务流发送至相应 的边缘节点;
[18] 所述控制器, 用于进行所述控制流的处理, 以控制所述接入节点将所述业务流 发送给相应的边缘节点, 并控制相应的所述边缘节点进行所述业务流的处理; 以及
[19] 至少一个边缘节点, 用于根据所述控制器的控制将接收到的业务流传输至对应 的业务提供节点。
[20] 本发明实施方式还提供一种利用上述系统的用户接入网络方法
, 该方法包括步骤:
[21] 业务提供节点接收控制器发送来的用户的认证请求, 并对用户进行认证; [22] 业务提供节点接收控制器 I
边缘节点发送来的用户的地址分配请求, 并为成功认证的用户分配地址;
[23] 针对所述用户, 所述控制器控制接入节点和边缘节点之间的路径建立。
[24] 本发明实施方式还提供一种控制与承载分离方法, 所述方法包括:
[25] 接入节点接收用户的报文, 将所述报文进行控制流和业务流的分离, 将所述控 制流发送给控制器, 并根据控制器的控制将业务流发送至相应的边缘节点; [26] 所述控制器进行所述控制流的处理, 以控制所述接入节点将所述业务流发送给 相应的边缘节点, 并控制相应的所述边缘节点进行所述业务流的处理;
[27] 所述边缘节点根据所述控制器的控制将接收到的业务流传输至对应的业务提供 节点。
[28] 通过上述技术方案, 可以看
出, 本发明实施方式提出了一种在多边缘架构下控制与承载分离的系统, 釆用 多边缘的业务承载和统一的控制相结合的方法, 使系统既具有对多种业务的扩 展性, 又能统一地进行用户的控制, 并不必使 AN
复杂化, 具体来说本发明实施方式实现了如下技术效果: [29] 1
、 在接入网络釆用了控制与承载分离的方法, 使该架构能适用于多种业务接入 的情况, 网络边缘可以只处理与业务相关的事务, 对业务的扩展非常有利; [30] 2、 釆用 Controller
(控制器) 对用户接入进行统一的控制, 避免了在多边缘的情况下, 接入网无 法对用户进行统一的控制管理, 减少了边缘之间的交互; 以及
[31] 3、 简化了在多边缘的架构下 AN
设备和网络边缘设备的复杂性, 选择网络和路径建立都统一由 Controller 进行控制, AN
可以只负责简单的控制流和承载流的分离, 网络边缘设备可以只负责相应业务 的处理。
[32] 本发明实施方式的其它特征和优点将在随后的说明书中阐述, 并且, 部分地从 说明书中变得显而易见, 或者通过实施本发明实施方式而了解。 本发明实施方 式的优点可通过在所写的说明书、 权利要求书、 以及附图中所特别指出的结构 来实现和获得。
[33] 附图简要说明
[34] 图 1示出了现有技术在单边缘情况下, 支持多业务的架构图;
[35] 图 2示出了现有技术在多边缘情况下, 支持多业务的架构图;
[36] 图 3示出了根据本发明实施方式的多边缘控制与承载分离系统的架构图;
[37] 图 4示出了根据本发明实施方式的用户接入网络过程的示意图;
[38] 图 5示出了根据本发明实施方式的用户接入网络过程的示意图 (IP edge 作为地址分配的中继) ;
[39] 图 6示出了根据本发明实施方式的多边缘控制与承载分离方法的流程图; [40] 图 7示出了根据本发明实施方式的 802.1x
在多边缘系统中用户接入过程示意图;
[41] 图 8示出了根据本发明的另一实施例的, 802. bc
在多边缘系统中用户接入过程示意图。
[42] 实施本发明的方式 [43] 下面将参考附图来详细说明本发明实施方式。
[44] 为了解决上述的问题, 本发明实施方式提出了一种在多边缘架构下控制与承载 分离的系统。 在该系统中, 创建一种控制设备, 负责认证、 授权、 策略下发等 控制功能; 在网络边缘设置多个边缘设备, 对应不同的业务提供节点, 边缘设 备可以只负责与承载有关的处理。 这种多边缘架构下控制与承载分离的思想, 有利于业务的扩展, 并对多个用户接入实现统一的控制, 简化了多边缘架构下 的复杂性。
[45] 图 3
示出了根据本发明实施方式的用于多业务接入的控制与承载分离系统的示意图 ; 图 6
示出了根据本发明实施方式的用于多业务接入的控制与承载分离实现方法的示 意图。
[46] 本发明实施方式提出一种在多边缘架构下控制与承载分离的系统 300
, 釆用多边缘的业务承载和统一的控制相结合的技术方案, 使系统既具有对多 种业务的扩展性, 又能统一地进行用户的控制, 并且不必使 AN复杂化。 图 3 所示的用于多业务接入的控制与承载分离系统 300包括:
[47] 接入节点 ( AN, 也可称为接入点)304
, 用于接收用户的业务请求, 将业务请求进行控制流和业务流的分离, 将控制 流发送给控制器 302, 并根据控制器 302的路由控制将业务流发送给相应的 边缘节点 307;
[48] 控制器 (Controller ) 302
, 用于进行控制流的处理, 以确定业务流的路由; 以及
[49] 边缘节点 (即, IP边缘设备) 307, 用于向业务提供节点 306提交业务流。
[50] 具体来说, 如图 3
所示, 多边缘控制与承载分离的系统架构单独釆用了一种设备: 控制器 (
Controller ) 302, 负责认证、 授权、 策略下发等控制功能; 在
网络边缘有多个边缘节点: IP边缘设备 (IP edge ) 307
, 对应不同的业务提供节点 (SP, Service Provider ) 306 , 边缘节点 307 可以只负责与承载有关的处理。
[51] 在该架构中, 负责 AAA
(认证、 授权和计费) 、 网络边缘选择、 策略下发等控制功能的功能体从网络 边缘设备 (IP edge ) 307中分离出来, 形成单独的一个设备, 即控制器 302 ; 接入节点 304
具有对控制流和业务流进行分离的功能, 将控制流引向控制器; 而 IP边缘设备 307 , 专门处理与业务有关的功能, 如: IPTV , VOIP ( Voice Over IP , IP 语音) 。
[52] 业务提供节点 306负责用户的认证、 计费处理, IP
地址的分配, 业务提供。 控制器和 IP
边缘设备之间有固定的控制通道, 负责控制流的传送。
[53] 图 6所示的用于多业务接入的控制与承载分离方法包括以下步骤:
[54] 步骤 S602
, 通过接入节点接收用户的业务请求, 将业务请求进行控制流和业务流的分离 , 将控制流发送给控制器, 并根据控制器的控制将业务流发送给相应的边缘节 点;
[55] 步骤 S604 , 通过控制器进行控制流的处理, 以控制业务流的路由; 以及
[56] 步骤 S606
, 根据控制器的控制, 通过边缘节点向相应的业务提供节点提交业务流。
[57] 图 4示出了根据本发明实施方式的用户接入网络过程的示意图。
[58] 如图 4
所示, 在上述的控制和承载分离架构中, 根据本发明实施方式的用户接入网络 的流程包括以下步骤:
[59] ①用户的认证过程: 用户发起认证请求, 接入节点将认证请求引向 Controller
, Controller
根据认证请求的用户标识等信息, 选择到某个边缘的业务提供节点进行认证, 在认证过程中获取地址分配服务器 ( DHCP SERVER
) 地址信息, 认证通过后, 由 Controller进行的操作, 包括但不限于: [60] A.选择一个可到达对应业务提供节点网络的 IP Edge。 对于一个 IP Edge 对应多个业务提供节点情形, 还要通知 IP Edge选择合适出口。
[61] B.建立从用户接入的物理 I逻辑线路经 AN到所选择的 IP edge间路径;
[62] C.接入节点 AN以及 IP edge初始 QoS参数或策略的下发。
[63] 控制器可以在用户认证过程中获取到的信息可以包括下述一个或多个: 地址分 配服务器的地址、 QoS参数、 用户接入网络的策略、 DNS (域名服务器) 的 IP 地址、 WINS ( Windows互联网名字业务) 服务器的 IP地址、 P-CSCF
(代理呼叫会话控制功能) 服务器的 IP地址。
[64] ②用户的地址分配过程: 在用户认证通过后, 用户发起地址分配的请求, AN 将该请求作为控制报文定向到 Controller, Controller
根据在认证过程中得到的信息 (如: DHCP SEVER
的地址) , 将地址分配的请求报文中转 (relay ) 到相应的 SP
去, 完成用户地址分配的过程;
[65] ③用户业务转发: 在用户认证完成以及得到地址后, 后续的业务流根据
Controller在 AN与 IP edge间建立的路径进行转发。
[66] 在上面的步骤中, 对于用户地址分配过程, AN
也可以将地址分配过程中的报文作为业务流直接转发到 IP edge, 由 IP edge 进行用户地址分配的中继, 这种用户接入网络步骤可以适合于一个 IP edge 设备对应一个业务提供节点的场景。 该接入过程如图 5所示。
图 5示出了根据本发明实施方式的用户接入网络过程的示意图 (· IP edge 作为地址分配的中继) 。
[68] 图 5所示的用户接入网络过程与图 4的不同之处在于用户的地址分配过程。
[69] 在图 5所示的实施例中, 用户的地址分配过程包括:
在用户认证通过后, 用户发起地址分配的请求, 接入节点将该请求作为业务报 文发到边缘节点, 由边缘节点将地址分配的请求报文中转到边缘节点所对应的 业务提供节点。
[70] 在图 4所示的控制和承载分离系统 400、 以及图 5所示的控制和承载分离系统
500中, 各设备具体需要实现的功能如下: [71] 接入节点 504至少需要包括: 流分离功能体、 QoS
以及策略执行功能体和路径建立执行体。
[72] 流分离功能体主要进行控制流和业务流的分离, 流分离功能体将控制流定向至 1 控制器 502, 将业务流定向到 IP edge设备。
[73] QoS以及策略执行功能体主要是执行控制器 502下发的 QoS以及策略。
[74] 路径建立执行体主要功能是执行控制器 502的路径建立的决策。
[75] 控制器 502至少包括下述一个或多个: AAA
控制器、 路径控制器、 策略控制器和地址分配控制器。
[76] AAA控制器主要负责实现用户认证、 授权和计费的客户端或代理的功能; 即
AAA控制器参与用户的认证、 授权和计费的处理过程。
[77] 路径控制器主要是根据用户认证情况选择边缘节点;
[78] 策略控制器主要进行 QoS和策略的下发。
[79] 地址分配控制器主要用于用户地址分配的客户端或代理。
[80] IP edge设备 507至少包括: 路由功能体和业务相关功能体中的一个或多个。
[81] 路由功能体进行业务流的路由功能; 即路由功能体根据控制器的控制将 IP edge设备 507接收到的业务流路由至相应的业务提供节点。
[82] 业务相关功能体进行与业务相关的功能 (如: VIOP
、 组播) 。 即业务相关功能体执行与业务相关的操作。
[83] 在业务提供节点 507中至少要包括: AAA服务器和地址分配服务器 (如:
DHCP SERVER ) 中的一个或多个。
[84] 图 7示出了根据本发明实施例的 802.1X在多边缘系统中用户接入过程示意图。
[85] 根据本发明的一个实施例, 用 802. lx和 DHCP
实现控制和承载分离的多边缘架构。
[86] 802. lx
是一种基于端口的认证协议, 是一种对用户进行认证的方法和策略。 端口可以 是一个物理端口, 也可以是一个逻辑端口 (如 VLAN ( Virtual Local Area Networks , 虚拟局域网) , VCC ( Virtual Channel Connection
, 虚通道连接) ) 。 802· lx 认证的最终目的就是确定一个端口是否可用。 对于一个端口, 如果认证成功那 么就'打开'
这个端口, 允许所有的报文通过; 如果认证不成功就使这个端口保持'关闭' , 即只允许 802.1X的认证协议报文通过。
[87] 由此可见, 802. lx
是一种控制与承载分离的协议, 其认证系统包括: 请求者系统 (Supplicant ) 、 认证系统 ( Authenticator ) 和认证服务器系统 ( AAA server
) 组成。 在控制和承载分离的多边缘架构中, 可以将 802.1X系统做稍许变动。 AN将所有的控制报文 (如: 802. lx s DHCP报文) 发送给 Controller, Controller完成 Authenticator和 DHCP relay/proxy (中转 /代理) 的作用, Service Provider管理 AAA Server和 DHCP Server。 AAA协议可以用 Radius或 Diameter协议。 在釆用基于 EAP-MD5的 802. lx认证、 DHCP分配 IP 地址条件下, 整个系统的用户接入过程如图 7所示。
[88] 整个用户接入过程分为三个阶段:
[89] 阶段 1, 用户的 AAA过程: 用户发起鉴权的请求, 由 AN识别 802.1x
的报文, 并将这些报文发送给 Controller; Controller作为 Authenticator进行 802. lx与 AAA (如: Radius或 Diameter ) 协议的翻译, 并根据 802. lx 报文中的 EAP报文中的用户标识选择在相应的业务提供节点的 AAA Server 上进行认证。 在认证成功后, Controller获得 DHCP Server地址、 用户 Profile
(包括: QoS、 策略) 等信息。 根据这些信息, Controller对 AN和 IP edge 进行相应的 QoS、 策略的设置, 并且在 AN和 IP edge间建立业务流的路径;
[90] 阶段 2, 用户 IP地址分配过程: 在 AAA过程结束后, 用户发起 IP
地址请求, 由 AN识别 DHCP报文, 并将该报文发送给 Controller; Controller 作为 DHCP relay/proxy, 根据前面认证后得到的 DHCP Server
的地址信息, 负责用户 DHCP报文的中继或 DHCP Server的 DHCP
报文的代理;
[91] 阶段 3, 在认证和地址分配成功后, 业务流的报文经过 AN - IP edge
建立好的路径, 访问业务提供节点。 [92] 图 8示出了根据本发明的另一实施例的, 802.1x
在多边缘系统中用户接入过程示意图。
[93] 根据本发明的另一个实施例, 用 802.1x和 DHCP
实现控制和承载分离的多边缘架构, 其中, 在 IP edge上作 DHCP relay/proxy。
[94] 如果将 DHCP relay/proxy的功能放在 IP edge上, AN只需要将 802. lx
报文转发到 Controller上, 而认证成功后, AAA server也不需要将 DHCP server 的地址发给 Controller。 具体流程如图 8所示, 这里不再赞述。
[95] 这种架构比较适用于, 一个 IP edge对应一个运营节点, IP edge
上不用考虑选择 DHCP Server, 可将 DHCP Server的地址静态配置在 IP edge 上, 用于 IP edge作 DHCP relay/proxy。
[96] 从以上的描述中, 可以看出, 本发明实施方式提出了一种在多边缘架构下控制 与承载分离的系统, 釆用多边缘的业务承载和统一的控制相结合的方法, 使系 统既具有对多种业务的扩展性, 又能统一地进行用户的控制, 并不必使 AN 复杂化, 具体来说本发明实施方式实现了如下技术效果:
[97] 1
、 在接入网络釆用了控制与承载分离的方法, 使改架构能实用与多种业务接入 的情况, 网络边缘只用处理与业务相关的事务, 对业务的扩展非常有利;
[98] 2、 釆用 Controller
对用户接入进行统一的控制, 避免了在多边缘的情况下, 接入网无法对用户进 行统一的控制管理, 减少了边缘之间的交互; 以及
[99] 3、 简化了在多边缘的架构下 AN
设备和网络边缘设备的复杂性, 选择网络和路径建立都统一由 Controller 进行控制, AN
只负责简单的控制流和承载流的分离, 网络边缘设备只负责相应业务的处理。
[100] 显然, 本领域的技术人员应该明白, 上述实施方式中的各模块或各步骤可以用 通用的计算装置来实现, 它们可以集中在单个的计算装置上, 或者分布在多个 计算装置所组成的网络上, 可选地, 它们可以用计算装置可执行的程序代码来 实现, 从而, 可以将它们存储在存储装置中由计算装置来执行, 或者将它们分 别制作成各个集成电路模块, 或者将它们中的多个模块或步骤制作成单个集成 电路模块来实现。 这样, 本发明不限制于任何特定的硬件和软件结合。 应该明 白, 这些具体实施中的变化对于本领域的技术人员来说是显而易见的, 不脱离 本发明的精神保护范围。
以上所述仅为本发明的实施例而已, 并不用于限制本发明, 对于本领域的技术 人员来说, 本发明可以有各种更改和变化。 凡在本发明的精神和原则之内, 所 作的任何修改、 等同替换、 改进等, 均应包含在本发明的保护范围之内。

Claims

权利要求书
[1] 1、 一种用于多业务接入的系统, 其特征在于, 包括:
至少一个接入节点, 用于接收用户的报文, 将所述报文进行控制流和业务 流的分离, 将所述控制流发送给控制器, 并根据控制器的控制将业务流发 送至相应的边缘节点;
所述控制器, 用于进行所述控制流的处理, 以控制所述接入节点将所述业 务流发送给相应的边缘节点, 并控制相应的所述边缘节点进行所述业务流 的处理; 以及
至少一个边缘节点, 用于根据所述控制器的控制将接收到的业务流传输至 对应的业务提供节点。
[2] 2、 根据权利要求 1所述的系统, 其特征在于, 所述接入节点包括: 流分离功能体, 用于对接入节点接收到的报文进行控制流和业务流的分离
QoS以及策略执行功能体, 用于执行所述控制器下发的 QoS以及策略; 以及
路径建立执行体,
用于执行所述控制器下发的接入节点与边缘节点之间路径建立的决策。
[3] 3、 根据权利要求 1所述的系统, 其特征在于,
所述控制器包括以下至少一种:
AAA控制器, 用于用户认证、 授权和计费的客户端或代理; 路径控制器, 用于根据用户认证情况选择边缘节点;
策略控制器, 用于下发 QoS和策略; 以及
地址分配控制器, 用于用户地址分配的客户端或代理。
[4] 4、 根据权利要求 1所述的系统, 其特征在于,
所述边缘节点包括以下至少一种:
路由功能体
, 用于根据控制器的控制将边缘节点接收到的所述业务流路由至对应的边 缘节点; 以及 业务相关功能体, 用于进行与业务相关的操作。
[5] 5、 根据权利要求 1所述的系统, 其特征在于,
业务提供节点包括以下至少一种: AAA服务器和地址分配服务器。
[6] 6、 一种利用上述权利要求 1至 5中任一项所述的系统的
用户接入网络方法, 其特征在于, 所述方法包括步骤:
业务提供节点接收控制器发送来的用户的认证请求, 并对用户进行认证; 业务提供节点接收控制器 /
边缘节点发送来的用户的地址分配请求, 并为成功认证的用户分配地址; 针对所述用户, 所述控制器控制接入节点和边缘节点之间的路径建立。
[7] 7、 根据权利要求 6所述的方法, 其特征在于,
所述用户的认证过程包括: 所述
接入节点将用户发起的认证请求发送至所述控制器, 所述控制器根据用户 的相关标识或属性选择到相应边缘节点对应的业务提供节点进行认证; 和 / 或
所述用户的地址分配过程包括: 所述
接入节点将用户发起的地址分配请求作为控制报文定向到所述控制器, 所 述控制器将地址分配请求报文中转到相应的业务提供节点; 或者所述接入 节点将所述用户发起的地址分配请求作为业务报文发送到所述边缘节点, 由所述边缘节点将地址分配的请求报文中转到所述边缘节点对应的业务提 供节点。
[8] 8、 根据权利要求 6所述的方法, 其特征在于, 所述控制器在所述
用户的认证过程中至少获得以下信息之一:
地址分配服务器的地址、 QoS
参数、 用户接入网络的策略、 域名服务器地址、 Windows
互联网名字业务服务器的地址、 代理呼叫会话控制功能服务器的地址。
[9] 9、 根据权利要求 6
所述的方法, 其特征在于, 所述控制器在用户认证通过后进行的操作包括 以下至少一种: 选择可到达对应业务提供节点的边缘节点, 对于一个边缘节点对应多个业 务提供节点的情形, 则通知所述边缘节点选择合适的业务提供节点; 控制建立从用户接入的物理 /逻辑线路经接入节点到边缘节点间的路径; 向所述接入节点以及所述边缘节点下发 QoS参数和 I或策略;
对用户的地址分配请求进行中继和代理。
[10] 10、 根据权利要求 6所述的方法, 其特征在于, 所述系统支持 802. 1X 通信协议。
[11] 11、 根据权利要求 10所述的方法, 其特征在于,
所述接入节点进行 802. lx
通信协议中的端口开关控制操作, 所述控制器进行 802. 1X 的通信协议处理的操作;
或者所述接入节点进行 802. 1X的通信协议处理的操作, 所述控制器进行 802. lx通信协议中的端口开关控制操作。
[12] 12、 根据权利要求 11所述的方法, 其特征在于, 所述接入节点进行
802.1X通信协议中的端口开关控制操作包括:
在端口处于关状态吋, 所述接入节点将所述控制流转发给所述控制器, 丢 弃所有的所述业务流; 以及
在端口处于开状态吋, 所述接入节点将所述控制流转发给所述控制器, 将 所述业务流转发给所述边缘节点设备。
[13] 13、 一种控制与承载分离方法, 其特征在于, 所述方法包括:
接入节点接收用户的报文, 将所述报文进行控制流和业务流的分离, 将所 述控制流发送给控制器
, 并根据控制器的控制将业务流发送至相应的边缘节点; 所述控制器进行所述控制流的处理, 以控制所述接入节点将所述业务流发 送给相应的边缘节点, 并控制相应的所述边缘节点进行所述业务流的处理 所述边缘节点根据所述控制器的控制将接收到的业务流传输至对应的业务 提供节点。 [14] 14、 根据权利要求 13
所述的控制与承载分离方法, 其特征在于, 所述控制器将用户认证过程和 / 或用户地址分配过程的控制流通过控制器和边缘节点之间的固定的控制通 道传输至边缘节点, 并由边缘节点将所述控制流传输至业务提供节点。
PCT/CN2007/070244 2006-07-06 2007-07-05 A system and method for the multi-service access Ceased WO2008006317A1 (en)

Priority Applications (3)

Application Number Priority Date Filing Date Title
EP07764172A EP2040431B1 (en) 2006-07-06 2007-07-05 A system and method for the multi-service access
ES07764172T ES2398591T3 (es) 2006-07-06 2007-07-05 Sistema y método para un acceso multiservicio
US12/341,529 US7934004B2 (en) 2006-07-06 2008-12-22 System and method for multi-service access

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN200610101059.5 2006-07-06
CN200610101059A CN101102265B (zh) 2006-07-06 2006-07-06 用于多业务接入的控制和承载分离系统和实现方法

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US12/341,529 Continuation US7934004B2 (en) 2006-07-06 2008-12-22 System and method for multi-service access

Publications (1)

Publication Number Publication Date
WO2008006317A1 true WO2008006317A1 (en) 2008-01-17

Family

ID=38922947

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2007/070244 Ceased WO2008006317A1 (en) 2006-07-06 2007-07-05 A system and method for the multi-service access

Country Status (5)

Country Link
US (1) US7934004B2 (zh)
EP (1) EP2040431B1 (zh)
CN (1) CN101102265B (zh)
ES (1) ES2398591T3 (zh)
WO (1) WO2008006317A1 (zh)

Families Citing this family (26)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101102265B (zh) 2006-07-06 2010-05-12 华为技术有限公司 用于多业务接入的控制和承载分离系统和实现方法
US20090129301A1 (en) * 2007-11-15 2009-05-21 Nokia Corporation And Recordation Configuring a user device to remotely access a private network
CN101360348B (zh) * 2008-08-25 2012-02-22 中兴通讯股份有限公司 一种业务首尾节点之间的虚拟控制通道建立方法
CN101626555B (zh) * 2009-08-03 2012-01-11 中兴通讯股份有限公司 接入号分配方法及装置
CN102263686B (zh) * 2010-05-25 2016-06-15 中兴通讯股份有限公司 一种多边缘架构下的多业务控制方法及系统
CN102065099B (zh) * 2010-12-28 2013-07-24 北京神州泰岳软件股份有限公司 信令与承载分离的通信系统
CN102882699B (zh) * 2011-07-14 2015-07-29 华为技术有限公司 边缘节点的分配方法和装置及边缘节点控制器
US9043453B1 (en) * 2011-08-22 2015-05-26 Star2Star Communications, LLC Systems and methods for optimizing application data delivery over third party networks
US10230679B1 (en) 2011-08-22 2019-03-12 Star2Star Communications, LLC Systems and methods for optimizing application data delivery over third party networks
US10116709B1 (en) 2011-08-22 2018-10-30 Star2Star Communications, LLC Systems and methods for optimizing application data delivery over third party networks
US9344397B2 (en) * 2011-09-27 2016-05-17 Aruba Networks, Inc. Client aware DHCP lease management
CN102347959B (zh) * 2011-11-18 2014-07-23 运软网络科技(上海)有限公司 基于身份和会话的资源访问系统和方法
WO2013090940A1 (en) 2011-12-16 2013-06-20 Huawei Technologies Co., Ltd. System and method for concurrent address allocation and authentication
US9451393B1 (en) * 2012-07-23 2016-09-20 Amazon Technologies, Inc. Automated multi-party cloud connectivity provisioning
EP2713573A1 (en) 2012-09-27 2014-04-02 British Telecommunications public limited company Application layer session routing
US10027586B2 (en) * 2013-03-15 2018-07-17 Star2Star Communications, LLC Network address family translation method and system
CN104469844B (zh) * 2013-09-16 2019-09-20 南京中兴新软件有限责任公司 一种实现控制与承载分离的方法及接入网系统
CN104767677B (zh) * 2014-01-07 2018-05-04 上海诺基亚贝尔股份有限公司 接入节点系统和用于该接入节点系统的计算资源池单元
CN104917849B (zh) 2014-03-11 2018-09-07 华为技术有限公司 一种消息处理方法、接入控制器及网络节点
CN113225238B (zh) 2015-07-17 2022-08-26 华为技术有限公司 消息传输方法、接入节点、接入控制器及接入系统
CN106549798B (zh) * 2016-10-14 2019-04-16 重庆金美通信有限责任公司 一种在ip通信网络中构建网络管控总线的方法
US10263951B2 (en) * 2017-01-09 2019-04-16 Star2Star Communications, LLC Network address family translation method and system
CN107547431B (zh) * 2017-05-24 2020-07-07 新华三技术有限公司 报文处理方法及装置
CN110620706B (zh) * 2018-06-19 2021-11-19 中国移动通信有限公司研究院 一种参数调整方法和设备
CN110213116B (zh) * 2019-08-05 2019-11-26 迈普通信技术股份有限公司 一种网络业务集中处理的网络系统、方法及通信设备
CN112822114B (zh) * 2021-04-19 2021-07-02 军事科学院系统工程研究院网络信息研究所 一种基于行为树的路由控制方法、系统和介质

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2000079742A1 (en) 1999-06-23 2000-12-28 Telefonaktiebolaget Lm Ericsson Multilevel precedence and pre-emption in a call and bearer separated network
CN1377159A (zh) * 2002-04-17 2002-10-30 北京安吉盛科技有限公司 宽带多业务通讯网信令系统
EP1357720A1 (en) 2002-04-22 2003-10-29 Telefonaktiebolaget L M Ericsson (Publ) User selector proxy, method and system for authentication, authorization and accounting
US20050015493A1 (en) * 2003-05-15 2005-01-20 Anschutz Thomas Arnold Session and application level bandwidth and/or QoS modification

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6006264A (en) * 1997-08-01 1999-12-21 Arrowpoint Communications, Inc. Method and system for directing a flow between a client and a server
JP4304362B2 (ja) * 2002-06-25 2009-07-29 日本電気株式会社 Pki対応の証明書確認処理方法及びその装置、並びにpki対応の証明書確認処理プログラム
AU2003246685A1 (en) * 2002-07-24 2004-02-23 International Business Machines Corporation Service class dependant asignment of ip addresses for cotrolling access to an d delivery of e-sevices
TW200509628A (en) * 2003-04-15 2005-03-01 Ericsson Telefon Ab L M Bandwidth on demand for media services at stationary equipment unit
KR100602260B1 (ko) * 2005-01-05 2006-07-19 삼성전자주식회사 고속 핸드오버 방법
CN100488263C (zh) * 2005-07-08 2009-05-13 北京邮电大学 基于控制和应用分离、具有业务生成能力的智能外设系统
CN101102265B (zh) 2006-07-06 2010-05-12 华为技术有限公司 用于多业务接入的控制和承载分离系统和实现方法

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2000079742A1 (en) 1999-06-23 2000-12-28 Telefonaktiebolaget Lm Ericsson Multilevel precedence and pre-emption in a call and bearer separated network
CN1377159A (zh) * 2002-04-17 2002-10-30 北京安吉盛科技有限公司 宽带多业务通讯网信令系统
EP1357720A1 (en) 2002-04-22 2003-10-29 Telefonaktiebolaget L M Ericsson (Publ) User selector proxy, method and system for authentication, authorization and accounting
US20050015493A1 (en) * 2003-05-15 2005-01-20 Anschutz Thomas Arnold Session and application level bandwidth and/or QoS modification

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See also references of EP2040431A4

Also Published As

Publication number Publication date
ES2398591T3 (es) 2013-03-20
US7934004B2 (en) 2011-04-26
EP2040431A1 (en) 2009-03-25
EP2040431A4 (en) 2009-08-05
CN101102265A (zh) 2008-01-09
CN101102265B (zh) 2010-05-12
US20090172174A1 (en) 2009-07-02
EP2040431B1 (en) 2012-12-26

Similar Documents

Publication Publication Date Title
WO2008006317A1 (en) A system and method for the multi-service access
JP6789322B2 (ja) ユーザプレーンパス選択、再選択、及びユーザプレーン変更の通知のためのシステム及び方法
US9112909B2 (en) User and device authentication in broadband networks
US6801528B2 (en) System and method for dynamic simultaneous connection to multiple service providers
US7561586B2 (en) Method and apparatus for providing network VPN services on demand
US6714987B1 (en) Architecture for an IP centric distributed network
Fu et al. NSIS: a new extensible IP signaling protocol suite
JP4078079B2 (ja) モバイルネットワーク内で一定のサービス品質でルート確立する方法
US7389534B1 (en) Method and apparatus for establishing virtual private network tunnels in a wireless network
US7350227B2 (en) Cryptographic peer discovery, authentication, and authorization for on-path signaling
US20020023160A1 (en) Service selection in a shared access network providing access control
WO2004077754A1 (ja) Wlan相互接続におけるサービス及びアドレス管理システム及び方法
WO2013170790A1 (zh) 一种虚拟网络的接入方法和系统
US8122482B2 (en) Cryptographic peer discovery, authentication, and authorization for on-path signaling
CN101006707A (zh) 通过接入网络在客户网络与ip供应商网络之间交换ip分组的方法
WO2008138274A1 (en) A method and corresponding device and system for accessing remote service
US20050041808A1 (en) Method and apparatus for facilitating roaming between wireless domains
WO2014029367A1 (zh) 一种动态配置方法及装置、系统
WO2009074072A1 (en) Method, network system and network equipment of dynamic strategy conversion
WO2008062353A2 (en) Method for authenticating nomadic user domains and nodes therefor
CN101640689B (zh) 一种静态用户的接入方法及其装置
JP2007521693A (ja) 無線ローカルエリアネットワークにおけるサービス品質制御
CN102740290B (zh) 一种预认证和预配置方法及其系统
WO2010091562A1 (zh) 用于固定网络与第三方网络或应用服务器交互的方法及装置
WO2011147334A1 (zh) 提供虚拟私有网业务的方法、设备和系统

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 07764172

Country of ref document: EP

Kind code of ref document: A1

WWE Wipo information: entry into national phase

Ref document number: 2007764172

Country of ref document: EP

NENP Non-entry into the national phase

Ref country code: DE

NENP Non-entry into the national phase

Ref country code: RU