[go: up one dir, main page]

WO2011147069A1 - Procédé et appareil permettant de mettre en œuvre un délestage du trafic - Google Patents

Procédé et appareil permettant de mettre en œuvre un délestage du trafic Download PDF

Info

Publication number
WO2011147069A1
WO2011147069A1 PCT/CN2010/073113 CN2010073113W WO2011147069A1 WO 2011147069 A1 WO2011147069 A1 WO 2011147069A1 CN 2010073113 W CN2010073113 W CN 2010073113W WO 2011147069 A1 WO2011147069 A1 WO 2011147069A1
Authority
WO
WIPO (PCT)
Prior art keywords
bypass
indication
information
data stream
uplink data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
PCT/CN2010/073113
Other languages
English (en)
Chinese (zh)
Inventor
王爽
王玮
李岩
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Technologies Co Ltd
Original Assignee
Huawei Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co Ltd filed Critical Huawei Technologies Co Ltd
Priority to CN201080001656.5A priority Critical patent/CN102369715B/zh
Priority to PCT/CN2010/073113 priority patent/WO2011147069A1/fr
Publication of WO2011147069A1 publication Critical patent/WO2011147069A1/fr
Anticipated expiration legal-status Critical
Ceased legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W28/00Network traffic management; Network resource management
    • H04W28/02Traffic management, e.g. flow control or congestion control
    • H04W28/10Flow control between communication endpoints

Definitions

  • the present invention relates to the field of wireless communication technologies, and in particular, to a method and apparatus for implementing data flow bypass. Background technique
  • the data stream is bypassed near the base station side and is not transmitted to the core network.
  • the existing implementation method is as follows: a TOF (Traffic Offload Function) is set between the RNC (Radio Network Controller) and the SGSN (Serving GPRS Support Node).
  • a bypass policy is configured on the T0F.
  • the T0F determines the data according to the APN (Access Point Name) selected by the user by detecting the message between the UE (User Equipment) and the SGSN and between the RNC and the SGSN. Whether the flow needs to be bypassed.
  • APN Access Point Name
  • the T0F can only determine whether the data flow needs to be bypassed according to the APN selected by the user, and cannot implement different services according to the user under the same APN. To determine if the data stream needs to be bypassed. Summary of the invention
  • Embodiments of the present invention provide a method and apparatus for implementing data flow bypass, which can determine whether a data flow needs to be bypassed according to different services performed by a user under the same APN.
  • a method for implementing data flow bypass includes:
  • the bypass function entity obtains the bypass flow description information and the bypass indication carried in the signaling message; the bypass function entity determines, according to the bypass indication and the bypass flow description information, whether the uplink data flow sent by the terminal needs to be bypassed;
  • bypass function entity When the upstream data stream needs to be bypassed, the bypass function entity performs a network address translation The upstream data stream is bypassed.
  • a bypass function entity including:
  • An obtaining module configured to obtain a bypass flow description information and a bypass indication carried in the signaling message
  • a determining module configured to determine, according to the bypass indication and the bypass flow description information, whether the uplink data flow sent by the terminal needs to be adjacent Road
  • the bypass module is configured to bypass the uplink data stream that is subjected to network address translation when the uplink data stream needs to be bypassed.
  • the bypass function entity determines whether the uplink data stream sent by the terminal needs to be bypassed according to the bypass flow description information and the bypass indication obtained by the signaling message.
  • the uplink data stream that has undergone network address translation is bypassed.
  • the present invention can judge each data stream transmitted by the user under the same APN, and bypass the data stream that needs to be bypassed, thereby further saving transmission resources.
  • Embodiment 1 is a flowchart of a method according to Embodiment 1 of the present invention.
  • Embodiment 3 is a flowchart of a method according to Embodiment 3 of the present invention.
  • Embodiment 4 is a flowchart of a method according to Embodiment 4 of the present invention.
  • FIG. 5 is a flowchart of a method according to Embodiment 5 of the present invention.
  • FIG. 6 is a flowchart of a method according to Embodiment 6 of the present invention.
  • Embodiment 7 is a flowchart of a method according to Embodiment 7 of the present invention.
  • FIG. 9, FIG. 10, FIG. 11, and FIG. 12 are schematic diagrams of a bypass function entity node according to Embodiment 8 of the present invention. Schematic diagram. detailed description
  • the embodiment provides a method for implementing data flow bypass. As shown in FIG. 1 , the method includes: 101.
  • the bypass function entity acquires the bypass flow description information and the bypass indication carried in the signaling message.
  • bypass function entity acquires the bypass flow description information from the signaling message;
  • bypass function entity detects
  • the signaling information between the RNC and the SGSN acquires the bypass flow description information.
  • the method may further include:
  • the non-bypass gateway acquires a bypass policy
  • the non-bypass gateway passes the bypass indication and the bypass flow description information through the signaling message, and the bypass indication and the bypass flow description information are obtained according to the bypass policy.
  • the non-bypassing gateway may be a GGSN (Gateway GPRS Suppor t Node, Gateway GPRS Support Node), but is not limited thereto.
  • GGSN Gateway GPRS Suppor t Node, Gateway GPRS Support Node
  • non-bypass gateway acquiring the bypass policy may include:
  • non-bypassing gateway may further include:
  • bypass indication and the bypass flow description information are passed through the newly added cells in the signaling message.
  • the method may further include:
  • the bypass function entity removes the bypass indication in the signaling message
  • the bypass function entity sends the signaling message that removes the bypass indication to the terminal.
  • the bypass function entity acquires the bypass flow description information and the bypass indication carried in the signaling message, including: The entity obtains the bypass indication and the bypass flow description information carried in the signaling message; the bypass function entity removes the bypass indication in the signaling message; and the bypass function entity removes the bypass indication Sending a message to the terminal includes:
  • the bypass function entity removes the bypass indication and the bypass flow description information in the signaling message; the bypass function entity transmits the signaling message that removes the bypass indication and the bypass flow description information to the terminal.
  • the bypass function entity determines whether the uplink data stream sent by the terminal needs to be bypassed according to the bypass indication and the bypass flow description information.
  • bypass function entity bypasses the uplink data stream that is subjected to network address translation.
  • the method may further include:
  • the bypass function entity sends the downlink data stream recovered by the network address translation NAT to the terminal.
  • the method for implementing data flow bypassing in the embodiment of the present invention determines whether the uplink data stream sent by the terminal needs to be bypassed according to the bypass flow description information and the bypass indication obtained by the signaling message, when the uplink When the data stream needs to be bypassed, the upstream data stream that has undergone network address translation is bypassed.
  • the present invention can judge each data stream transmitted by the user under the same APN, and bypass the data flow that needs to be bypassed, thereby further saving transmission resources.
  • This embodiment provides a method for implementing data flow bypass.
  • the PCRF instructs the GGSN to activate the predefined one while issuing the PCC (Policy and Charging Control) rule.
  • SIPTO Select IP Traffic Offload
  • the GGSN carries the SIPTO indication and the bypass flow information in the PCO (Protocol Configuration Options) cell of the first context response message.
  • the SIPTO indication is a bypass indication. .
  • the method for implementing data flow bypass includes:
  • the UE sends a first context setup request to the SGSN.
  • the SGSN sends a create context request to the GGSN.
  • the GGSN requests a PCC rule from the PCRF.
  • the PCRF sends a PCC rule to the GGSN, and instructs the GGSN to activate the SIPTO policy defined by the PCRF and predefined on the GGSN.
  • the GGSN is pre-defined with one or more SIPT0 policies.
  • a predefined SIPT0 policy that requires GGSN activation is specified.
  • the GGSN activates the predefined SIPT0 policy according to the indication of the PCRF.
  • the GGSN sends a create context response message to the SGSN, where the PC0 cell that creates the context response message carries the flow information and SIPT0 indication of the activated predefined SIPT0 policy.
  • the SGSN sends a first context response message to the UE. Wherein the first context response In the message, the PC0 cell in the create context response message is transparently transmitted.
  • the TOF detects the first context response message, and parses the PC0 cell of the first context response message, and records the SIPT0 indication and the flow information.
  • the T0F may remove the S I PT0 indication and the flow information in the PC0 cell of the first context response message.
  • the T0F sends the first context response message that has removed the SIPT0 indication and the flow information in the PC0 cell to the UE.
  • the UE sends an uplink data stream to the T0F, where the source address of the uplink data stream is srcl and the destination address is ds t l.
  • the TOF compares the flow information of the uplink data stream with the flow information of the TOF record that needs to perform the data flow of the SIPT0, and determines whether the uplink data flow needs to be bypassed according to the SIPT0 indication recorded by the TOF. If the flow information of the upstream data stream is matched with the flow information of the data stream that needs to be processed by the T0F, the uplink data flow needs to be bypassed according to the SIPT0 indication, and step 212 is performed;
  • the determining that the uplink data stream needs to be bypassed according to the SIPT0 indication may include: the SIPT0 indication is a variable, when the variable is 1, indicating that the uplink data stream needs to be bypassed; when the variable is 0 When it is indicated, the upstream data stream does not need to be bypassed.
  • SIPT0 indication When the SIPT0 indication is carried, it indicates that the uplink data stream needs to be bypassed; when the SIPT0 indication is not carried, it indicates that the uplink data stream does not need to be bypassed.
  • the uplink data stream is determined not to be bypassed, and the TOF is not processed, and the uplink data stream is according to the source address. Transfer with the destination address.
  • the T0F sends the uplink data stream by using a network (NAT), and the source address of the uplink data stream after the NAT is src2, and the destination address is ds tl. 213.
  • the TOF receives the downlink data stream, where the source address of the downlink data stream is dstl, and the destination address is src2.
  • the TOF performs NAT recovery on the downlink data stream, and the source address of the downlink data stream after the NAT recovery is dstl, and the destination address is srcl.
  • the TOF sends the downlink data stream after the NAT recovery to the UE.
  • the PCRF instructs the GGSN to activate the SIPT0 policy predefined on the GGSN, and the GGSN carries the SIPT0 policy in the first context response message.
  • the SIPT0 indication of the transmission level; the T0F determines whether the uplink data stream sent by the UE needs to be bypassed according to the SIPT0 indication and the flow information obtained by the PC0 cell of the first context response message, when the uplink data stream needs to be bypassed, Bypassing the upstream data stream that has undergone network address translation.
  • the present invention can judge each data stream transmitted by the user under the same APN, and bypass the data stream that needs to be bypassed, so that the transmission resource can be further saved.
  • This embodiment provides a method for implementing data flow bypass.
  • the PCRF instructs the GGSN to activate the SIPT0 policy predefined on the GGSN.
  • the GGSN triggers a secondary context activation request, carrying a SIPT0 indication in the PC0 cell of the secondary context activation request message.
  • the method for implementing data flow bypass includes:
  • the GGSN sends a create context response message to the SGSN.
  • the SGSN forwards the create context response message to the UE.
  • the GGSN activates the predefined SIPT0 policy according to the indication of the PCRF.
  • the GGSN performs bearer binding according to the QSI (Quality of Service Class Identifier) of the SIPT0 policy, the ARP (Address Resolution Protocol), and the SIPT0 indication. If the binding is not suitable, the GGSN SGSN sends two The secondary context activation request message, the PC0 cell of the secondary context activation request message carries a SIPT0 indication and a Correlation-ID, and the Correlation-ID is used by the GGSN to associate a subsequent secondary context activation procedure.
  • QSI Quality of Service Class Identifier
  • ARP Address Resolution Protocol
  • the SGSN sends a secondary context activation request message to the UE, where the secondary context activation request message carries a TI (Transaction Identifier) allocated by the SGSN for the secondary context activation request, and a secondary context activation sent by the GGSN.
  • the PC0 cell of the request message The SGSN records the correspondence between the TI and the Correlation-ID in the secondary context activation request message sent by the GGSN.
  • the TOF detects the secondary context activation request message, and parses the PC0 cell of the secondary context activation request message, and records the TI and SIPT0 indications.
  • the T0F may remove the SIPT0 indication in the PC0 cell of the secondary context activation request message.
  • the T0F sends the secondary context activation request message that has been removed from the SIPT0 in the PC0 cell to the UE, where the secondary context activation request message carries T1.
  • the UE sends a secondary context activation request message to the SGSN, where the secondary context activation request message carries a TI and an NSAPI (Network Service Access Point Identifier), where the TI and the NSAPI have Correspondence relationship.
  • a secondary context activation request message carries a TI and an NSAPI (Network Service Access Point Identifier), where the TI and the NSAPI have Correspondence relationship.
  • NSAPI Network Service Access Point Identifier
  • the TOF detects the secondary context activation request message, and associates the TI in the secondary context activation request message with the TI recorded in step 310. If the association is performed, the NSAPI is recorded; if the association is not, the subsequent During the process, the data stream is not bypassed.
  • the SGSN sends a create context request message to the GGSN, where the create context request message carries the NSAPI and the Correlation-ID.
  • the Correlation-ID is obtained by associating the TI in the secondary context activation request message sent by the SGSN with the correspondence between TI and C 0 r r e 1 a t i 0 n - 1 D recorded in step 309.
  • the GGSN replies to the SGSN to create a context response message.
  • the SGSN sends an RAB (Radio Access Bearer) allocation to the RNC. Request message.
  • RAB allocation request message carries the RAB ID and the SGSN tunnel information.
  • the OT probes the RAB allocation request message, and uses the NS AP I recorded in step 313 to associate the RAB ID carried in the RAB allocation request message. If the association is performed, the SGSN tunnel information and the RAB ID in the RAB allocation request message are recorded. ; If the association is not available, the data flow is not bypassed in the subsequent process.
  • the NSAPI and the RAB ID are the same, it indicates that the NSAPI is associated with the RAB ID.
  • the T0F forwards the RAB allocation request message to the RNC.
  • the RNC establishes an RRC (Radio Resource Control) with the UE.
  • RRC Radio Resource Control
  • the RNC allocates tunnel information for the downlink data flow, and sends an RAB allocation response message to the SGSN.
  • the OT probes the RAB allocation response message, and associates the RAB ID carried in the RAB allocation response message with the NSAPI recorded in step 313. If the association is performed, the RNC tunnel information in the RAB allocation response message is recorded; , in the subsequent process, the data stream is not bypassed.
  • the T0F records the correspondence between the TI, NSAPI, RAB ID, SIPTO indication, RNC tunnel information, and SGSN tunnel information that need to be SIPT0.
  • the OTF forwards the RAB allocation response message to the SGSN.
  • the SGSN sends a secondary context request accept message to the UE.
  • the SGSN sends a secondary context activation request acknowledgement message to the GGSN.
  • the UE sends an uplink data stream to the T0F, where the source address of the uplink data stream is s rcl and the destination address is ds t l.
  • the TOF compares the tunnel information of the uplink data stream with the tunnel information (SGSN tunnel information and RNC tunnel information) of the TOF record that needs to perform SIPTO data flow, and determines the tunnel according to the SIPT0 indication recorded by the TOF. Whether the transmitted data stream needs to be bypassed. If the tunnel information of the uplink data stream matches the tunnel information of the data stream that needs to be SI PT0 recorded by the TOF, the data stream transmitted on the tunnel needs to be bypassed according to the SIPT0 indication, and step 327 is performed; Determining, according to the S IPT0 indication, that the data stream transmitted on the tunnel needs to be bypassed may include:
  • the SIPTO is indicated as a variable. When the variable is 1, it indicates that the data stream transmitted on the tunnel needs to be bypassed. When the variable is 0, it indicates that the data stream transmitted on the tunnel does not need to be bypassed.
  • SIPT0 indication When the SIPT0 indication is carried, it indicates that the data stream transmitted on the tunnel needs to be bypassed; when the S IPT0 indication is not carried, it indicates that the data stream transmitted on the tunnel does not need to be bypassed.
  • the tunnel information of the uplink data stream does not match the tunnel information of the data stream that needs to be transmitted by the IPT0, it is determined that the data stream transmitted on the tunnel does not need to be bypassed, and the T0F does not process the uplink data.
  • the stream is transmitted according to the source address and destination address.
  • the data stream is bypassed.
  • the PCRF instructs the GGSN to activate the SIPT0 policy predefined on the GGSN, and the GGSN triggers the secondary context activation request in the secondary context activation.
  • the PC0 cell of the request message carries the SIPT0 indication; the T0F determines whether the uplink data stream sent by the UE needs to be bypassed according to the obtained SIPT0 indication and the tunnel information, and when the uplink data stream needs to be bypassed, the network address translation is performed.
  • the upstream data stream is bypassed.
  • the present invention can judge each data stream transmitted by the user under the same APN, and bypass the data stream that needs to be bypassed, thereby further saving transmission resources.
  • the embodiment provides a method for implementing data flow bypass.
  • the UE initiates a secondary context activation request.
  • the PCRF sends a dynamic SIPT0 policy, or
  • the GGSN matches the statically configured SIPT0 policy on the GGSN.
  • the GGSN carries the SIPT0 indication in the PC0 cell of the secondary activation response message.
  • the method for implementing data flow bypass includes:
  • the UE sends a secondary context activation request message to the SGSN, where the secondary context activation request message carries the TI and the NSAPI.
  • the TOF detects the secondary context activation request message, and records the TI and the NSAPI. 403.
  • the SGSN sends a secondary context setup request message to the GGSN.
  • GGSN request PCC rules to the PCRF, wherein the request carries the user information, for example: APN, IMSI (Interna t iona l Mob i le Subscr iber Ident i ty, international mobile subscriber identification code further 1 J) and the like, and the service information e.g. : TFT (traff ic Flow Templa te, business flow template), etc.
  • APN APN
  • IMSI Interna t iona l Mob i le Subscr iber Ident i ty, international mobile subscriber identification code further 1 J
  • service information e.g. : TFT (traff ic Flow Templa te, business flow template), etc.
  • the PCRF determines, according to the user information and the service information, the SIPT0 policy of the service according to the self-configuration and the operator policy and the SPR (Subscribing Database) subscription information.
  • the PCRF sends a PCC rule to the GGSN, and sends a SIPT0 policy.
  • the GGSN may also be matched to the SIPT0 policy configured on the GGSN, and the steps 404-406 may be replaced by the following steps:
  • the GGSN matches the configured SIPT0 policy according to the user information in the secondary context request message, for example: APN, IMSI, etc., and service information such as: TFT.
  • the GGSN sends a secondary context response message to the SGSN, where the PC0 cell of the secondary context response message carries a SIPT0 indication.
  • the SGSN sends an RAB allocation request message to the RNC.
  • the RAB allocation request message carries the RAB ID and the SGSN tunnel information.
  • the OT probes the RAB allocation request message, and uses the NSAPI associated with the RAB ID recorded in step 402. If the association is performed, the RAB ID and the SGSN tunnel information in the RAB allocation request message are recorded; if the association is not, the subsequent During the process, the data stream is not bypassed.
  • the T0F forwards the RAB allocation request message to the RNC.
  • the RNC establishes an RRC with the UE.
  • the RNC allocates tunnel information for the downlink data flow, and sends an RAB allocation response message to the SGSN.
  • the OT probes the RAB allocation response message, and associates the RAB ID carried in the RAB allocation response message with the RAB ID recorded in step 409. If the association is performed, the RNC tunnel information in the RAB allocation response message is recorded; If not, the data stream is not bypassed in the subsequent process.
  • the SGSN returns a secondary context request acceptance response message to the UE, where the secondary context request is
  • the PC PT0 indication is carried in the PC0 cell that accepts the response message.
  • the TOF detects the secondary context request accept response message, and the TI recorded in step 402 associates the TI in the second context request with the T0F, and if the association, records the secondary context request accept response message.
  • the T0F records the correspondence between the TI, NSAPI, RAB ID, SIPTO indication, RNC tunnel information, and SGSN tunnel information that need to be SIPT0.
  • the T0F may remove the S I PT0 indication in the PC0 cell of the secondary context request acceptance response message.
  • the T0F sends the secondary context request accept response message indicated by the S IPT0 in the PC0 cell to the UE.
  • the method for implementing data flow bypassing the UE initiates a secondary context activation request, and the PCRF sends a dynamic SIPT0 policy at the same time as the PCC rule is sent, or the GGSN matches the SIPT0 policy configured on the GGSN, and the GGSN is in the second
  • the PC0 cell of the secondary activation response message carries the SIPT0 indication; the T0F determines whether the uplink data stream sent by the UE needs to be bypassed according to the obtained SIPT0 indication and the tunnel information, and when the uplink data stream needs to be bypassed, the network address is passed.
  • the converted upstream data stream is bypassed.
  • the present invention can judge each data stream transmitted by the user under the same APN, and bypass the data stream that needs to be bypassed, thereby further saving transmission resources.
  • This embodiment provides a method for implementing data flow bypass.
  • the PCRF instructs the GGSN to activate the S IPT0 policy predefined on the GGSN.
  • the GGSN triggers a secondary context activation, and carries a S IPT0 indication in the secondary context activation request message.
  • the method for implementing data flow bypass includes: 501-507, which are the same as steps 301-307, and are not described herein again.
  • the GGSN performs the bearer binding according to the QCI, the ARP, and the SIPT0 of the SIPT0 policy. If the binding is not suitable, the GGSN sends a secondary context activation request message to the SGSN, where the secondary context activation request message carries the SIPT0 indication. And Corre la t ion-ID, the Co rre 1 ati on- 1 D is used for the subsequent secondary context activation process of the GGSN association.
  • the SGSN sends a secondary context activation request message to the T0F, where the secondary context activation request message carries the TI allocated by the SGSN for the secondary context activation request, and the SIPT0 indication in the secondary context activation request message sent by the GGSN.
  • the SGSN records the correspondence between Co r r e 1 a t i on- 1 D in the secondary context activation request message sent by the TI and the GGSN.
  • the TOF detects the secondary context activation request message, and records the TI and SIPT0 indications. Further, in order to ensure that the UE does not perceive the bypass of the data flow, the T0F may remove the S I PT0 indication in the secondary context activation request message.
  • the PCRF instructs the GGSN to activate the SIPT0 policy predefined on the GGSN, and the GGSN triggers the secondary context activation in the secondary context activation request.
  • the message carries the SIPT0 indication.
  • the T0F determines whether the uplink data stream sent by the UE needs to be bypassed according to the obtained SIPT0 indication and the tunnel information. When the uplink data stream needs to be bypassed, the uplink data stream that is converted by the network address is used. Bypass.
  • the present invention can judge each data stream transmitted by the user under the same APN, and bypass the data stream that needs to be bypassed, thereby further saving transmission resources.
  • the embodiment provides a method for implementing data flow bypass.
  • the UE initiates a secondary context activation request.
  • the PCRF sends a dynamic SIPT0 policy, or
  • the GGSN matches the statically configured SIPT0 policy on the GGSN.
  • the GGSN carries the S IPT0 indication in the secondary activation response message.
  • the method for implementing data flow bypass includes: 601-606, which are the same as steps 401-406, and are not described herein again.
  • the GGSN may also be matched to the SIPT0 policy configured on the GGSN, and the steps 604-606 may be replaced by the following steps:
  • the L1 and the GGSN match the configured SIPT0 policy according to the user information in the secondary context request message, for example: APN, IMSI, etc., and service information such as: TFT.
  • the GGSN sends a secondary context response message to the SGSN, where the secondary context response message carries a SIPT0 indication.
  • steps 508-513 which are the same as steps 508-513, and are not described herein again.
  • the SGSN returns a secondary context request acceptance response message to the T0F, where the secondary context request acceptance response message carries the S I PT0 indication.
  • the T0F detects the secondary context request accept response message, and uses the TI record previously recorded by the TOF to associate the TI in the response request message with the TI context. If the association is performed, the second context request accept response message is recorded. S IPT0 indicates; if the association is not available, the data flow is not bypassed in the subsequent process.
  • the T0F records the correspondence between the TI, NSAPI, RAB ID, SIPTO indication, RNC tunnel information, and SGSN tunnel information that need to be SIPT0.
  • the T0F may remove the S I PT0 indication in the secondary context request acceptance response message.
  • the T0F sends the secondary context request accept response message that has been removed by the SIPT0 to the UE.
  • the method for implementing data flow bypassing the UE initiates a secondary context activation request, and the PCRF sends a dynamic SIPT0 policy at the same time as the PCC rule is sent, or the GGSN matches the SIPT0 policy configured on the GGSN, and the GGSN is in the second
  • the secondary activation response message carries the IPT0 indication; the T0F determines whether the uplink data stream sent by the UE needs to be bypassed according to the obtained SIPT0 indication and the tunnel information, and when the uplink data stream needs to be bypassed, the network address translation is performed.
  • the upstream data stream is bypassed.
  • the present invention can judge each data stream transmitted by the user under the same APN, and bypass the data stream that needs to be bypassed, thereby further saving transmission resources.
  • This embodiment provides a method for implementing data flow bypass.
  • the UE initiates a secondary context modification, and adds filtering information of the existing TFT.
  • the filtering information is specified, and the GGSN is signaling.
  • the message carries the SIPT0 indication with filtering information.
  • the method for implementing data flow bypass includes:
  • the UE sends a secondary context modification request to the SGSN, requesting to add the filtering information of the existing TFT.
  • the SGSN sends an update secondary context request message to the GGSN.
  • the GGSN sends an IP-CAN modification request to the PCRF, and requests a PCC rule, where the request carries the modified TFT information, the TFT operation, and the like.
  • the PCRF determines the SIPT0 policy of the service according to the user information and the service information sent by the GGSN according to the configuration, the operator policy, and the SPR subscription information.
  • the PCRF sends a PCC rule to the GGSN, and sends a SIPT0 policy. If the PCRF determines that the TFT-added part of the corresponding service S IPT0 policy is different from the SIPT0 policy of the previous service flow, the SIPT0 policy can be sent for the service flow. That is, the filtering information is specified when the SIPT0 policy is delivered.
  • the GGSN sends an update secondary context response message to the SGSN, where the updated secondary context response message carries an S I PT0 indication with filtering information.
  • the SGSN sends a secondary context modification accept response message to the UE, where the secondary context modification accept response message carries an S I PT0 indication with filtering information.
  • the T0F detects the secondary context modification accept response message, and uses the TI record previously recorded by the TOF to associate the TI in the second context modification response response message, and if the association is performed, record the secondary context modification accept response message.
  • the SIPT0 indicates and filters the information; if the association is not, the data flow is not bypassed in the subsequent process.
  • the T0F may remove the SI PT0 indication and the filtering information in the secondary context modification acceptance response message. 709. The TOF forwards the secondary context modification acceptance response message that has been removed from the SIPTO indication.
  • the UE sends an uplink data stream to the TOF, where the source address of the uplink data stream is s rcl and the destination address is ds t l.
  • the TOF compares the filtering information of the uplink data stream with the filtering information of the TOF record, and determines whether the uplink data stream needs to be bypassed according to the SIPT0 indication recorded by the TOF. If the filtering information of the uplink data stream matches the filtering information of the T0F record, determining that the uplink data stream needs to be bypassed according to the SIPT0 indication, and performing step 712;
  • the determining that the uplink data stream needs to be bypassed according to the SIPT0 indication may include: the SIPT0 indication is a variable, when the variable is 1, indicating that the uplink data stream needs to be bypassed; when the variable is 0 When it is indicated, the upstream data stream does not need to be bypassed.
  • SIPT0 indication When the SIPT0 indication is carried, it indicates that the uplink data stream needs to be bypassed; when the SIPT0 indication is not carried, it indicates that the uplink data stream does not need to be bypassed.
  • the filtering information of the uplink data stream does not match the filtering information recorded by the TOF, it is determined that the uplink data stream does not need to be bypassed, and the TOF does not perform processing, and the uplink data stream is transmitted according to the source address and the destination address.
  • the method for implementing the data flow bypassing the UE initiates the secondary context modification, and adds the filtering information of the existing TFT.
  • the PCRF sends the SIPT0 policy
  • the filtering information is specified, and the GGSN carries the transparent transmission level of the IPT0 in the signaling message.
  • the T0F determines whether the uplink data stream sent by the UE needs to be bypassed according to the SIPT0 indication and the filtering information obtained by the signaling message, and the uplink data that is converted by the network address when the uplink data stream needs to be bypassed.
  • the flow is bypassed.
  • the present invention can judge each data stream transmitted by the user under the same APN, and bypass the data stream that needs to be bypassed, thereby further saving transmission resources.
  • Example eight The embodiment provides a bypass function entity.
  • the bypass function entity includes: an obtaining module 81, configured to acquire a bypass flow description information and a bypass indication carried in the signaling message;
  • the acquiring module 81 obtains the bypass flow description information from the signaling message;
  • the acquiring module 81 acquires the bypass flow description information by detecting signaling information between the RNC and the SGSN.
  • the determining module 82 is configured to determine, according to the bypass indication and the bypass flow description information, whether the uplink data flow sent by the terminal needs to be bypassed;
  • the bypass module 83 is configured to bypass the uplink data stream that is subjected to network address translation when the uplink data stream needs to be bypassed.
  • bypass indication and the bypass flow description information are obtained by the non-bypass gateway according to the obtained bypass policy, and the non-bypass gateway acquiring the bypass policy may be performed by using the following methods:
  • the non-bypassing gateway transmits the bypass indication and the bypass flow description information by using a signaling message, and the specific delivery method may include:
  • bypass indication and the bypass flow description information are passed through the newly added cells in the signaling message.
  • the non-bypass gateway may be a GGSN, but is not limited thereto.
  • bypass function entity may further include:
  • a removing module 84 configured to remove a bypass indication in the signaling message
  • the first sending module 85 is configured to send the signaling message that removes the bypass indication to the terminal.
  • the acquiring module 81 is specifically configured to acquire the bypass indication and the bypass flow description information carried in the signaling message;
  • the removing module 84 is specifically configured to remove the bypass indication and the bypass flow description information in the signaling message;
  • the first sending module 85 is specifically configured to send the signaling message that removes the bypass indication and the bypass flow description information to the terminal.
  • bypass function entity may further include:
  • the second sending module 86 is configured to send the downlink data stream recovered by the network address translation to the terminal.
  • the obtaining module 81 may include:
  • the first obtaining unit 811 is configured to detect a first context response message sent to the terminal, and obtain a bypass indication and bypass flow information.
  • the determining module 82 can include:
  • the first determining unit 821 is configured to compare the flow information of the uplink data stream with the bypass flow information, and when the flow information of the uplink data flow matches the bypass flow information, according to the The bypass indication determines that the upstream data stream needs to be bypassed.
  • the obtaining module 81 may include:
  • a second obtaining unit 812 configured to acquire a bypass indication and bypass tunnel information
  • the determining module 82 can include:
  • the second determining unit 822 is configured to compare the tunnel information of the uplink data stream with the bypass tunnel information, and when the tunnel information of the uplink data stream matches the bypass tunnel information, according to the The bypass indication determines that the upstream data stream needs to be bypassed.
  • the second obtaining unit 812 may include:
  • a first obtaining sub-unit 8121 configured to send a secondary context activation request message to the terminal Line detection, get bypass indication and session identifier ⁇ ;
  • the second obtaining sub-unit 8122 is configured to detect a secondary context activation request message sent by the terminal, and associate the ⁇ with the ⁇ in the secondary context activation request message to obtain a network service access point identifier NSAPI;
  • the third obtaining sub-unit 8123 is configured to detect a radio access bearer RAB allocation request message sent to the RNC, and associate the NSAPI with the RAB ID in the RAB allocation request message to obtain the SGSN tunnel information.
  • the fourth obtaining sub-unit 8124 is configured to detect an RAB response message of the RNC, and associate the NSAPI with the RAB I D in the RAB response message to obtain RNC tunnel information.
  • the second obtaining unit 812 may include:
  • the fifth obtaining subunit 8125 is configured to detect a secondary context activation request message sent by the terminal, and acquire the TI and the NSAPI;
  • the sixth obtaining sub-unit 8126 is configured to detect the RAB allocation request message sent to the RNC, and associate the NSAPI with the RAB ID in the RAB allocation request message to obtain the SGSN tunnel information.
  • the seventh obtaining subunit 8127 is configured to detect an RAB response message of the RNC, and associate the NSAPI with the RAB I D in the RAB response message to obtain RNC tunnel information.
  • the eighth obtaining subunit 8128 is configured to detect a secondary context activation response message sent to the terminal, and associate the TI with the TI in the secondary context activation response message to obtain a bypass indication.
  • the obtaining module 81 may include:
  • the third obtaining unit 813 is configured to detect a secondary context modification acceptance response message sent to the terminal, associate the recorded TI with the TI in the secondary context modification acceptance response message, and obtain a bypass indication and a bypass. Filtering information, where the secondary context modification accept response message carries an SI PT0 indication with filtering information;
  • the determining module 82 can include: The third determining unit 823 is configured to compare the filtering information of the uplink data stream with the bypass filtering information, and when the filtering information of the uplink data stream matches the bypass filtering information, according to the The bypass indication determines that the upstream data stream needs to be bypassed.
  • bypass function entity may be T0F, but is not limited thereto.
  • the bypass function entity of the embodiment of the present invention determines whether the uplink data stream sent by the terminal needs to be bypassed according to the bypass flow description information and the bypass indication obtained by the signaling message, when the uplink data flow needs When bypassing, the upstream data stream that has undergone network address translation is bypassed.
  • the present invention can judge each data stream transmitted by the user under the same APN, and bypass the data stream that needs to be bypassed, thereby further saving transmission resources.
  • the apparatus for implementing data flow bypass provided by the embodiment of the present invention can implement the method embodiment provided above.
  • the method and apparatus for implementing data flow bypass provided by the embodiments of the present invention can be applied to data flow bypass under the GPRS network, but is not limited thereto.
  • the storage medium may be a magnetic disk, an optical disk, a read-only memory (ROM), or a random access memory (RAM).

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

La présente invention se rapporte, dans des modes de réalisation, à un procédé et à un appareil permettant de mettre en œuvre un délestage du trafic. Ledit procédé comprend les étapes suivantes : une entité de fonction de délestage acquiert des informations de description du délestage du trafic et des indications de délestage transmises dans des messages de signalisation; l'entité de fonction de délestage détermine si un délestage est nécessaire pour le trafic sur la liaison montante provenant de terminaux sur la base desdites indications de délestage et desdites informations de description du délestage du trafic; si c'est le cas, l'entité de fonction de délestage déleste le trafic sur la liaison montante qui a été converti par une adresse de réseau. La présente invention permet de réaliser un délestage du trafic.
PCT/CN2010/073113 2010-05-24 2010-05-24 Procédé et appareil permettant de mettre en œuvre un délestage du trafic Ceased WO2011147069A1 (fr)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201080001656.5A CN102369715B (zh) 2010-05-24 2010-05-24 实现数据流旁路的方法和装置
PCT/CN2010/073113 WO2011147069A1 (fr) 2010-05-24 2010-05-24 Procédé et appareil permettant de mettre en œuvre un délestage du trafic

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2010/073113 WO2011147069A1 (fr) 2010-05-24 2010-05-24 Procédé et appareil permettant de mettre en œuvre un délestage du trafic

Publications (1)

Publication Number Publication Date
WO2011147069A1 true WO2011147069A1 (fr) 2011-12-01

Family

ID=45003192

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2010/073113 Ceased WO2011147069A1 (fr) 2010-05-24 2010-05-24 Procédé et appareil permettant de mettre en œuvre un délestage du trafic

Country Status (2)

Country Link
CN (1) CN102369715B (fr)
WO (1) WO2011147069A1 (fr)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114978440B (zh) * 2022-05-24 2023-09-12 北京立华莱康平台科技有限公司 用于网络导通的数据处理方法和装置

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1791213A (zh) * 2005-12-27 2006-06-21 北京邮电大学 一种性能优化的移动视频点播业务系统及实现方法
CN101350746A (zh) * 2007-07-20 2009-01-21 莱克斯信息技术(北京)有限公司 旁路阻断tcp连接

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101064936B (zh) * 2006-04-28 2011-08-24 华为技术有限公司 一种漫游用户的归属地的接入方法及系统
CN101202702A (zh) * 2006-12-12 2008-06-18 华为技术有限公司 网络流量分流方法和网络设备
CN100558081C (zh) * 2007-01-29 2009-11-04 华为技术有限公司 地址转发表项的保活方法及系统
JP2009253431A (ja) * 2008-04-02 2009-10-29 Alcatel-Lucent Usa Inc Iuインターフェースを有するUMTSフェムトセル解法においてPSトラフィックをオフロードする方法。

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1791213A (zh) * 2005-12-27 2006-06-21 北京邮电大学 一种性能优化的移动视频点播业务系统及实现方法
CN101350746A (zh) * 2007-07-20 2009-01-21 莱克斯信息技术(北京)有限公司 旁路阻断tcp连接

Also Published As

Publication number Publication date
CN102369715B (zh) 2014-11-05
CN102369715A (zh) 2012-03-07

Similar Documents

Publication Publication Date Title
CN101227391B (zh) 非漫游场景下策略和计费规则功能实体的选择方法
US20110099604A1 (en) Access control method and system for packet data network, pcrf entity
WO2017124308A1 (fr) Procédé et dispositif pour attribuer une adresse ip
EP2129074A1 (fr) Procédé de décision de libération de ressources de communication
US20150289304A1 (en) Method,system and device for switching communication paths
KR20170121324A (ko) 모바일 통신 시스템에서 서비스 품질 제어의 지원
WO2011006447A1 (fr) Procédé, dispositif et système pour transmission par paquets de données de service
WO2009138030A1 (fr) Procédé et dispositif d’acquisition de règle de contrôle de politique et de facturation
CN102075909A (zh) 一种imsi与imei绑定关系的校验方法和装置
WO2016082553A1 (fr) Procédé, dispositif et système pour distribuer un contenu de réseau mobile
WO2011047589A1 (fr) Procédé et appareil d'établissement de connexion au réseau, procédé et système d'élaboration de stratégie de commande de politique et de facturation (pcc)
WO2011041978A1 (fr) Procédé et appareil destinés à obtenir l'identification d'un groupe de dispositifs de communication de type machine
CN104335641A (zh) 漫游场景下的数据业务处理方法、装置和系统
CN101577931B (zh) 一种实现多接入的方法及系统
WO2010133181A1 (fr) Procédé de gestion de connexion de données d'accès multiples, système et dispositif correspondants
CN109151901B (zh) 一种业务质量保障方法及装置
CN102045695A (zh) 一种获取mtc服务器地址信息的方法及系统
WO2016000172A1 (fr) Dispositif de réseau et procédé d'attribution de noms de points d'accès
CN101557646B (zh) 创建承载方法、服务网关和移动性管理实体
WO2012130098A1 (fr) Procédé et système conçus pour obtenir l'adresse ip d'un dispositif de communication de type machine (mtc)
CN102612821B (zh) 用于专用承载的计费关联的装置
CN101925038A (zh) 数据传输方法、通信装置及网络系统
CN104883683B (zh) 一种apn访问限制方法及ggsn
CN103002543B (zh) 一种多接入方法及系统
CN104054377A (zh) 一种拥塞控制的方法、设备及系统

Legal Events

Date Code Title Description
WWE Wipo information: entry into national phase

Ref document number: 201080001656.5

Country of ref document: CN

121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 10851941

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 10851941

Country of ref document: EP

Kind code of ref document: A1