[go: up one dir, main page]

WO2012126291A1 - 一种数据路由方法及系统 - Google Patents

一种数据路由方法及系统 Download PDF

Info

Publication number
WO2012126291A1
WO2012126291A1 PCT/CN2012/070975 CN2012070975W WO2012126291A1 WO 2012126291 A1 WO2012126291 A1 WO 2012126291A1 CN 2012070975 W CN2012070975 W CN 2012070975W WO 2012126291 A1 WO2012126291 A1 WO 2012126291A1
Authority
WO
WIPO (PCT)
Prior art keywords
tunnel
data packet
address
mobile
access gateway
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
PCT/CN2012/070975
Other languages
English (en)
French (fr)
Inventor
刘国燕
毕以峰
宗在峰
周晓云
霍玉臻
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZTE Corp
Original Assignee
ZTE Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZTE Corp filed Critical ZTE Corp
Publication of WO2012126291A1 publication Critical patent/WO2012126291A1/zh
Anticipated expiration legal-status Critical
Ceased legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L65/00Network arrangements, protocols or services for supporting real-time applications in data packet communication
    • H04L65/10Architectures or entities
    • H04L65/102Gateways
    • H04L65/1043Gateway controllers, e.g. media gateway control protocol [MGCP] controllers
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup
    • H04W76/12Setup of transport tunnels

Definitions

  • the present invention relates to the field of mobile communications technologies, and in particular, to a data routing method and system. Background technique
  • the Evolved Packet System (EPS) of the 3rd Generation Partnership Project (3GPP) is mainly composed of the Evolved Universal Terrestrial Radio Access Network (referred to as the Evolved Universal Terrestrial Radio Access Network).
  • E-UTRAN Evolved Universal Terrestrial Radio Access Network
  • MME Mobility Management Entity
  • S-GW Serving Gateway
  • P-GW Packet Data Network Gateway
  • HSS Home Subscriber Server
  • EPS supports interworking with non-3GPP systems. Interworking with non-3GPP systems is implemented through the S2a/b/c interface, and the P-GW acts as an anchor between 3GPP and non-3GPP systems.
  • non-3GPP system access is divided into untrusted non-3GPP access and trusted non-3GPP access.
  • the untrusted non-3GPP access needs to be connected to the P-GW by an Evolved Packet Data Gateway (ePDG), and the interface between the ePDG and the P-GW is S2b; the trusted non-3GPP access can be directly
  • ePDG Evolved Packet Data Gateway
  • S2b Evolved Packet Data Gateway
  • the S2a interface is connected to the P-GW, and the S2a interface uses the Proxy Mobile IP (PMIP) protocol to exchange information.
  • PMIP Proxy Mobile IP
  • the S2c interface provides user equipment (User Equipment, UE for short) and P-GW.
  • User-side related control and mobility support supported by Moblie IPv6 Support for Dual Stack Hosts and Routers (DSMIPv6), which can be used for untrusted non-3GPP And trusted non-3GPP access.
  • DSMIPv6 Dual Stack Hosts and Routers
  • a wireless LAN (Wireless LAN, WLAN for short) can be used as a trusted non-3GPP access EPS.
  • the WLAN itself has two networking modes, including the Routing Gateway or Residential Gateway (RG) for the bridge mode and the RG for the routing mode. Therefore, when the WLAN and the EPS are interworking, different networking modes and EPS interworking are required. skills requirement.
  • the technical problem to be solved by the present invention is to provide a data routing method and system, which uses a tunnel to encapsulate data packets to prevent packets from being discarded by the BNG/BRAS.
  • the present invention provides a data routing method, in which a mobile terminal (UE) accesses a mobile core network through a trusted fixed network, and the method includes:
  • the RG After the UE accesses the home gateway (RG), the RG sends a tunnel establishment request to the mobile access gateway, where the tunnel establishment request carries the downlink information negotiated by the tunnel;
  • the mobile access gateway After receiving the tunnel establishment request, the mobile access gateway returns a tunnel establishment response, where the tunnel establishment response carries uplink information of the tunnel negotiation;
  • the RG After receiving the tunnel establishment response, the RG completes tunnel establishment by dynamically negotiating with the mobile access gateway.
  • the UE When the UE accesses the service through the mobile core network, the UE encapsulates and forwards the data packet of the UE by using a tunnel established between the RG and the mobile access gateway.
  • the tunnel encapsulates and forwards the data packet, including:
  • the source address is the address of the mobile access gateway
  • the tunnel destination address is the address of the mobile access gateway
  • the RG receives the encapsulated downlink data packet, decapsulates and forwards the packet to the UE;
  • the RG When receiving the uplink data packet of the UE, the RG performs tunnel encapsulation on the uplink data packet, and the tunnel source address of the encapsulated uplink data packet is the address of the RG.
  • the tunnel destination address is the address of the mobile access gateway, and the mobile access gateway, after receiving the encapsulated uplink data packet, decapsulates and forwards the packet to the destination address in the uplink data packet; or The RG directly forwards according to the destination address in the uplink data packet.
  • the tunnel establishment request and the tunnel establishment response are extended authentication protocols.
  • EAP authentication message
  • DHCP Dynamic Host Configuration Protocol
  • PMIP Proxy Mobile IP Protocol
  • the mobile access gateway is physically connected to a broadband gateway or a broadband remote access server.
  • Independent network elements including X-MAG.
  • the established tunnel type includes a universal routing protocol (GRE);
  • GRE universal routing protocol
  • the downlink information negotiated by the tunnel includes downlink GRE key (Key) information, and the uplink information of the tunnel negotiation includes uplink GRE key information.
  • Key downlink GRE key
  • the mobile access gateway triggers a PMIP or GPRS Tunneling Protocol (GTP) message interaction with the mobile core network, and requests the mobile core network to allocate an IP for the UE. address.
  • GTP GPRS Tunneling Protocol
  • the present invention also provides a data routing system, the system includes a tunnel establishment initiation module in the home gateway, and a tunnel establishment response module and a downlink data packet encapsulation module in the mobile access gateway, where:
  • the tunnel establishment initiation module is configured to: after the UE accesses the home gateway, send a tunnel establishment request to the mobile access gateway, where the tunnel establishment request carries the downlink information negotiated by the tunnel; and after receiving the tunnel establishment response, The mobile access gateway completes tunnel establishment through dynamic negotiation;
  • the tunnel establishment response module is configured to: after receiving the tunnel establishment request, replying to the tunnel establishment response, where the tunnel establishment response carries the uplink information of the tunnel negotiation;
  • the downlink data packet encapsulating module is configured to: when the UE accesses the service through the mobile core network, encapsulate and forward the downlink data packet of the UE by using a tunnel established between the RG and the mobile access gateway.
  • the system further includes a downlink data packet decapsulation module in the home gateway, where the downlink data packet encapsulation module is further configured to: when receiving the downlink data packet sent by the mobile core network to the UE, And performing the tunneling of the downlink data packet, where the tunnel source address of the encapsulated downlink data packet is the mobile access gateway address, and the tunnel destination address is the address of the RG;
  • the downlink data packet decapsulation module is configured to: after receiving the encapsulated downlink data packet, decapsulating and forwarding the packet to the UE.
  • the system further includes an uplink data packet forwarding module in the home gateway and an uplink data packet decapsulation module in the mobile access gateway,
  • the uplink data packet forwarding module is configured to: when receiving the uplink data packet of the UE, And performing the tunneling and the forwarding of the uplink data packet, where the tunnel source address of the encapsulated uplink data packet is an address of the RG, and the tunnel destination address is an address of the mobile access gateway; or Directly forwarding according to the destination address in the uplink data packet;
  • the uplink data packet decapsulation module is configured to: after receiving the encapsulated uplink data packet, decapsulating and forwarding to the destination address in the uplink data packet.
  • the tunnel establishment response module is further configured to: after receiving the tunnel establishment request, trigger a PMIP/GTP message interaction with the mobile core network, and request the mobile core network to allocate an IP address for the UE.
  • the BNG/BRAS does not need to identify the real destination IP to forward the packet, but the packet is encapsulated by the tunnel between the RG and the mobile access gateway (such as the X-MAG).
  • a tunnel destination IP address such as an RG address or an X-MAG address, can be used to solve the problem that data packets are discarded in the prior art.
  • FIG. 1 shows a flow of a scheme for a UE of the prior art to access a mobile core network through a trusted non-3GPP network
  • FIG. 2 shows a second scheme of a prior art UE accessing a mobile core network through a trusted non-3GPP network
  • FIG. 3 illustrates a third process of a prior art UE accessing a mobile core network through a trusted non-3GPP network
  • FIG. 4 illustrates a problem in which a prior art UE accesses a mobile core network through a trusted non-3GPP network, and a new X-MAG network element scenario exists;
  • FIG. 5 is a schematic flowchart of a UE accessing a mobile core network through a trusted non-3GPP network according to Embodiment 1 of the present invention
  • FIG. 6 is a UE accessing a mobile core through a trusted non-3GPP network according to Embodiment 2 of the present invention; Schematic diagram of the heart network. Preferred embodiment of the invention
  • the UE and the RG use a Point to Point Protocol (referred to as the ⁇ ) protocol message to trigger the RG.
  • Point to Point Protocol
  • EAP Extensible Authentication Protocol
  • DHCP Dynamic Host Configuration Protocol
  • PMIP PMIP message.
  • the BNG/BRAS receives the message sent by the RG, further triggers the mobile network to allocate an IP address to the UE, and ensures that the UE can access the mobile core network through the trusted WLAN network and access the service provided by the mobile network.
  • the specific steps are as follows:
  • Step 101 The PPP negotiation and authentication process is performed between the RG and the BNG/BRAS.
  • the BNG/BRAS allocates a local IP address, that is, a CPE IP, to the RG.
  • Step 102 The DHCP negotiation process is performed between the UE and the RG.
  • the RG allocates an IP address to the UE, which is generally a private network IP, which is called IP2.
  • Step 103 Perform PPP LCP negotiation between the UE and the RG, and select an authentication mode. Because the 3GPP specifies that the non-3GPP access network accessing the EPC needs to use EAP authentication, the authentication mode selected in this LCP negotiation is EAP authentication.
  • Step 104 RG is used as the authenticator, BNG/BRAS is used as the proxy for EAP authentication, BBF AAA is also used as the proxy, the terminal UE accesses through the fixed network as the mobile network identity, and the authentication to the 3GPP HSS/AAA is authorized.
  • the authentication method is EAP.
  • Step 105 This step is a response message that the EAP authentication succeeds, and is part of the authentication.
  • the authentication success message is sent by HSS/AAA to BNG/BRAS.
  • Step 106 The BNG/BRAS is triggered by the authentication success message, and the policy session is initiated.
  • the policy session includes a fixed network policy session between BNG/BRAS and BPCF, and an S9* session between BPCF and PCRF. This step can be performed or omitted in different scenarios.
  • the PMIP protocol or the GTP protocol is used between the P-GW and the P-GW. If it is the PMIP protocol, this step is mandatory. If it is the GTP protocol, this step is optional.
  • Step 107 The BNG/BRAS is triggered by the authentication success message, and requests the tunnel binding from the P-GW.
  • the BNG/BRAS sends a PBU message to the P-GW; if the S2a interface between the BNG/BRAS and the P-GW uses the GTP protocol, the BNG/BRAS sends a "Create Session Request" message to the P-GW.
  • the tunnel binding request message includes: APN, IMSI, and the like to request IP address allocation from the P-GW.
  • Step 108 After receiving the PBU message, the P-GW establishes an IP-CAN session with the PCRF.
  • Step 109 The P-GW updates the P-GW identity to the HSS.
  • Step 110 The P-GW replies to the BNG/BRAS to create a session response message of the PBA or the GTP protocol, where the message carries an IP address assigned to the terminal, which is called IP1.
  • Step 111 After receiving the PBA/Create Session Response message, the BNG/BRAS sends an EAP authentication success message to the RG after obtaining the IP1 from the message.
  • the RG sends an authentication success message to the terminal, where the message may carry the address IP 1 or may not carry the address IP1;
  • Step 112 The RG obtains an IP1 address.
  • the IP1 address or its corresponding IP3 address is carried to the UE through PPP IPCP negotiation.
  • the RG may first store the address. After the terminal requests IPCP negotiation, the RRC sends the IP1 to the terminal. The RG stores the address, and after the terminal requests the IPCP negotiation, the terminal allocates a private network.
  • the IP address (herein referred to as IP3) maintains the mapping between IP1 and IP3 on the RG, and sends the IP3 address to the terminal UE through the IPCP message.
  • the RG performs service offloading or accesses services through the EPC network according to specific policies.
  • Figure 2 triggers BNG to initiate PMIP/GTP to the mobile core network element by using DHCP message.
  • FIG. 3 triggers the BNG to initiate a PMIP/GTP message to the mobile core network element by using the PMIP message, and requests the mobile core network to allocate IP for the UE.
  • BNG/BRAS needs to be enhanced, including:
  • the network element can be deployed in a fixed network or a mobile network. In this case, the message interaction between the above RG and BNG/BRAS needs to extend between RG and X-MAG.
  • the main idea of the present invention is: to enable the BNG/BRAS to identify the true destination IP of the packet by using a tunnel encapsulation message between the RG and the X-MAG. If the packet is forwarded, the packet is forwarded based on the destination IP address of the tunnel, such as the RG address or the X-MAG address.
  • the present invention provides a data routing method, in which a UE accesses a mobile core network through a trusted fixed network, including:
  • the RG After the UE accesses the RG, the RG sends a tunnel establishment request to the mobile access gateway, where the tunnel establishment request carries the downlink information negotiated by the tunnel;
  • the mobile access gateway After receiving the tunnel establishment request, the mobile access gateway returns a tunnel establishment response, where The tunnel establishment response carries the uplink information negotiated by the tunnel;
  • the RG After receiving the tunnel establishment response, the RG completes tunnel establishment by dynamically negotiating with the mobile access gateway.
  • the UE When the UE accesses the service through the mobile core network, the UE encapsulates and forwards the data packet of the UE by using a tunnel established between the RG and the mobile access gateway.
  • the tunnel encapsulating and forwarding the data packet includes: when the mobile access gateway receives the downlink data packet sent by the mobile core network to the UE, tunneling and forwarding the downlink data packet
  • the tunnel source address of the encapsulated downlink data packet is the address of the mobile access gateway, and the tunnel destination address is the address of the RG.
  • the RG decapsulates and forwards the packet to the UE;
  • the RG receives the uplink data packet of the UE, and performs tunnel encapsulation on the uplink data packet, and the tunnel source address of the encapsulated uplink data packet is the address of the RG, the tunnel.
  • the destination address is the address of the mobile access gateway, and after receiving the encapsulated packet, the mobile access gateway decapsulates and forwards the packet to the destination address in the uplink data packet; or the RG directly according to the uplink data. The destination address in the packet is forwarded.
  • the mobile access gateway is a network element that is physically independent from the BNG/BRAS, and may be an X-MAG.
  • the tunnel establishment request and the tunnel establishment response may be: an EAP authentication message, or a DHCP message, or a PMIP message (such as a PBU message).
  • the X-MAG triggers a PMIP/GTP message interaction between the fixed network and the mobile core network, and requests the mobile core network to allocate an IP address to the UE.
  • the tunnel type may be GRE.
  • the Generic Routing Encapsulation (GRE) tunnel encapsulation needs to dynamically negotiate the GRE key. Therefore, the control signaling message between the RG and the X-MAG needs to be extended to support the GRE key to the peer end. Used for GRE tunnel negotiation.
  • the process is that the RG is in the routing mode, and the GRE tunnel is used as an example.
  • the RG and the X-MAG exchange information through the EAP authentication message to transmit the GRE tunnel dynamic negotiation information, including: GRE Key, and triggers the X-MAG to the mobile core.
  • the network element initiates the PMIP/GTP tunnel establishment process.
  • a GRE tunnel is only one type of tunnel. It can also be applied to other types of Layer 3 tunnel dynamic negotiation that require control signaling.
  • the process specifically includes:
  • Step 501 Perform a PPP negotiation and authentication process between the RG and the BNG/BRAS; and optionally, perform a DHCP negotiation process between the UE and the RG.
  • the RG allocates an IP address to the UE, which is generally a private network. IP.
  • the BNG/BRAS may initiate the establishment of a fixed-line policy session with the Broadband Policy Control Function (BPCF).
  • BPCF Broadband Policy Control Function
  • Step 502 If the UE is a mobile terminal, perform PPP Link Control Protocol (PPP Link Control Protocol, PPP LCP) negotiation with the RG.
  • PPP Link Control Protocol PPP Link Control Protocol, PPP LCP
  • Step 503 After receiving the PPP LCP request message of the UE, the RG, as the authenticator, initiates a PPP EAP authentication request message to the UE, thereby triggering the UE to the 3GPP authentication server (for example, authorization, rights, and billing services).
  • the 3GPP authentication server for example, authorization, rights, and billing services.
  • Authorization Authentication and Accounting Server, AAA Server AAA Server
  • the RG can identify the UE as a mobile terminal user.
  • the RG After receiving the EAP message carried by the UE through the PPP message, the RG parses the message and carries the EAP message through the Diameter and forwards the message to the X-MAG.
  • the message needs to be extended to carry the downlink GRE key information.
  • Step 504 After receiving the EAP message sent by the RG, the X-MAG obtains the downlink GRE Key information, and forwards the EAP message to the HSS/AAA. If the X-MAG is located in the fixed network, the message is forwarded to the HSS/AAA through the BBF AAA. . In this message, the downlink GRE Key information does not need to be carried.
  • Step 505 The HSS/AAA replies with an EAP authentication success message to the X-MAG.
  • Step 506 After receiving the EAP authentication success message, the X-MAG initiates an agent to the P-GW.
  • a Proxy Binding Update (PBU) message includes: APN, IMSI, and the like to request IP address allocation from the P-GW.
  • Step 507 After receiving the PBU message, the P-GW establishes an IP-Connectivity Access Network (IP-CAN) session between the PCRF and the PCRF.
  • IP-CAN IP-Connectivity Access Network
  • Step 508 If the P-GW changes, the P-GW identifier is updated to the HSS.
  • Step 509 After receiving the PBU message, the P-GW will reply to the BNG/BRAS with a Proxy Binding Acknowledgement (referred to as ⁇ A) message, where the IP address assigned to the terminal is called IP1.
  • ⁇ A Proxy Binding Acknowledgement
  • Step 510 After receiving the PBA message, the X-MAG sends the IP address assigned by the mobile network to the UE to the RG through the EAP authentication success message, where the EAP message includes not only the IP address, but the EAP message. It is called IP1 and includes the uplink GRE Key information.
  • Step 511 Upon triggering in step 507, the PCRF triggers an S9* policy session with BPCF.
  • Step 512 After receiving the EAP authentication success message, the RG performs local policy processing on the IP address. Then, the PPP IPCP negotiation process is completed between the RG and the UE. Through the process, the RG transmits the IP address of the policy decision to the UE.
  • Step 513 If there is a policy that needs to be updated, the PCRF will trigger a policy update operation with BPCF, BNG/BRAS and BPCF.
  • the processing of the downlink data packet is as follows:
  • the X-MAG When the X-MAG receives the downlink data, it encapsulates the GRE tunnel.
  • the tunnel source IP address is the X-MAG address
  • the tunnel destination IP address is the RG address.
  • the RG After receiving the encapsulated packet, the RG tunnels the packet and forwards it to the corresponding UE according to the destination IP address in the IP data packet header.
  • the RG When receiving the uplink data packet, the RG can directly forward the packet according to the destination address in the packet. Alternatively, the RG can also encapsulate the tunnel.
  • the source IP address of the tunnel is the RG address.
  • the destination address is the X-MAG address. After receiving the X-MAG, the X-MAG tunnels it to the destination IP address.
  • the GPRS Tunneling Protocol can be used between the X-MAG and the P-GW. If the GTP protocol is used, the corresponding PBU message is created instead.
  • the session request message, corresponding to the PBA message, is changed to create a session response message.
  • Step 511 can occur at any time after step 507, before 513.
  • a DHCP message or a PMIP message is used to transmit the tunnel negotiation information, and the X-MAG is triggered to initiate a PMIP tunnel establishment process to the mobile core network element.
  • the process of this embodiment mainly includes:
  • Step 601 The process of assigning an IP address to the fixed network between the UE, the RG, and the BNG/BRAS is performed. If the UE is a mobile terminal, the PPP LCP negotiation and the EAP authentication process are completed between the UE and the RG.
  • Step 602 After completing the EAP authentication, the UE initiates a PPP IPCP request message to the RG.
  • the PMIP (PBU) message carries the GRE Key information as the prior art.
  • the GRE Key in the prior art is not used for data encapsulation and forwarding in the present invention.
  • Step 604 After receiving the DHCP discovery or PBU message, the X-MAG obtains the downlink GRE.
  • the message includes: APN, IMSI and the like to request IP address allocation to the P-GW.
  • the X-MAG After receiving the PBA message, the X-MAG provides the IP address assigned to the terminal by the mobile network through the DHCP-provided/PBA message, which is called IP1 and is delivered to the RG.
  • Step 609 Upon triggering in step 607, the PCRF triggers an S9* policy session with BPCF.
  • Step 610 If a DHCP message is used between the RG and the X-MAG, the RG and the X-MAG further confirm the IP1 assigned by the mobile network through a DHCP request/DHCP response message.
  • step 610 The specific operation after the step 610 is the same as that of the first embodiment. Please refer to the related description in the first embodiment, and details are not described herein again.
  • the GTP protocol can be used between the BNG/BRAS and the P-GW in addition to the PMIP protocol. If the GTP protocol is used, the PBU message is changed to create a session request message, and the PBA message is changed to create a session response message. .
  • Step 609 may occur after step 605, at any time prior to step 612.
  • the embodiment of the present invention further provides a data routing system, where the system mainly includes a tunnel establishment initiation module in the home gateway, and a tunnel establishment response module and a downlink data packet encapsulation module in the mobile access gateway, where:
  • the tunnel establishment initiation module is configured to: after the UE accesses the home gateway, send a tunnel establishment request to the mobile access gateway, where the tunnel establishment request carries the downlink information negotiated by the tunnel; and after receiving the tunnel establishment response, the tunnel establishment The mobile access gateway completes tunnel establishment through dynamic negotiation;
  • the tunnel establishment response module is configured to: after receiving the tunnel establishment request, reply to the tunnel establishment response, where the tunnel establishment response carries the uplink information of the tunnel negotiation;
  • the downlink data packet encapsulating module is configured to: when the UE accesses the service through the mobile core network, encapsulate and forward the UE by using a tunnel established between the RG and the mobile access gateway Downstream data message.
  • system further includes a downlink data packet decapsulation module in the home gateway, where the downlink data packet encapsulation module is further configured to: when receiving the downlink data packet sent by the mobile core network to the UE, The downlink data packet is forwarded by the tunnel, and the tunnel source address of the encapsulated downlink data packet is the mobile access gateway address, and the tunnel destination address is the address of the RG.
  • the downlink data packet decapsulation module is configured to: after receiving the encapsulated downlink data packet, decapsulating and forwarding the packet to the UE.
  • system further includes an uplink data packet forwarding module in the home gateway and an uplink data packet decapsulation module in the mobile access gateway,
  • the uplink data packet forwarding module is configured to: after receiving the uplink data packet of the UE, perform tunnel encapsulation on the uplink data packet, where the encapsulated uplink data packet tunnel
  • the source address is the address of the RG
  • the tunnel destination address is the address of the mobile access gateway; or directly, according to the destination address in the uplink data packet;
  • the uplink data packet decapsulation module is configured to: after receiving the encapsulated uplink data packet, decapsulate and forward the packet to the destination address in the uplink data packet.
  • the tunnel establishment response module is further configured to: after receiving the tunnel establishment request, trigger a PMIP/GTP message interaction with the mobile core network, and request the mobile core network to allocate an IP address for the UE.
  • modules or steps of the present invention can be implemented by a general-purpose computing device, which can be concentrated on a single computing device or distributed over a network composed of multiple computing devices. Alternatively, they may be implemented by program code executable by the computing device, such that they may be stored in the storage device for execution by the computing device, and And in some cases, the steps shown or described may be performed in a different order than that herein, or they may be separately fabricated into individual integrated circuit modules, or a plurality of modules or steps thereof may be fabricated into a single integrated circuit. Module to achieve. Thus, the invention is not limited to any specific combination of hardware and software.
  • the BNG/BRAS does not need to identify the real destination IP to perform packet forwarding by using a tunnel encapsulation packet between the RG and the mobile access gateway (such as the X-MAG).
  • the problem is that the data packet in the prior art is discarded according to the tunnel destination IP address, such as the RG address or the X-MAG address.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Multimedia (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

本发明公开了一种数据路由方法,移动终端(UE)通过可信任的固网接入移动核心网络,所述方法包括:UE接入家庭网关(RG)后,所述RG向移动接入网关发送隧道建立请求,携带隧道协商的下行信息;所述移动接入网关回复隧道建立响应,携带隧道协商的上行信息;所述RG与所述移动接入网关通过动态协商,完成隧道建立;所述UE通过所述移动核心网络访问业务时,通过所述RG与移动接入网关之间建立的隧道封装并转发所述UE的数据报文。本发明还公开了相应系统。本发明解决了数据报文被丢弃的问题。

Description

一种数据路由方法及系统
技术领域
本发明涉及移动通信技术领域, 尤其涉及一种数据路由方法及系统。 背景技术
第三代合作伙伴计划 ( 3rd Generation Partnership Project, 简称为 3GPP ) 的演进的分组系统( Evolved Packet System, 简称为 EPS )主要由演进的通用 地面无线接入网 ( Evolved Universal Terrestrial Radio Access Network , 简称为 E-UTRAN )、 移动管理单元(Mobility Management Entity, 简称为 MME ) 、 服务网关( Serving Gateway , 简称为 S-GW )、 分组数据网络网关( Packet Data Network Gateway , 简称为 P-GW ) 和归属用户服务器 (Home Subscriber Server, 简称为 HSS )组成。
EPS 支持与非 3GPP 系统的互通, 其中, 与非 3GPP 系统的互通通过 S2a/b/c接口实现, P-GW作为 3GPP与非 3GPP系统间的锚点。 在 EPS的系 统架构图中, 非 3GPP 系统接入被分为不可信任非 3GPP接入和可信任非 3GPP 接入。 其中, 不可信任非 3GPP 接入需经过演进的分组数据网关 ( Evolved Packet Data Gateway, 简称为 ePDG )与 P-GW相连, ePDG与 P-GW间的接口为 S2b; 可信任非 3GPP接入可直接通过 S2a接口与 P-GW连 接, S2a接口釆用代理移动 IP ( Proxy Mobile IP, 简称为 PMIP )协议进行信 息交互; 另外, S2c接口提供了用户设备(User Equipment, 简称为 UE )与 P-GW之间的用户面相关的控制和移动性支持, 其支持的移动性管理协议为 支持双栈的移动 IPv6 ( Moblie IPv6 Support for Dual Stack Hosts and Routers, 简称为 DSMIPv6), 其可用于不可信任非 3GPP和可信任非 3GPP接入。
无线局域网络(Wireless LAN, 简称为 WLAN )可以作为可信任非 3GPP 接入 EPS。 WLAN本身有两种组网模式, 包括家庭网关( Routing Gateway or Residential Gateway, RG )为桥接模式和 RG为路由模式, 因此, 在 WLAN 与 EPS互通时, 需要分别考虑不同组网模式与 EPS互通的技术要求。
发明内容 本发明解决的技术问题是提供一种数据路由方法及系统, 釆用隧道封装 数据报文的方式, 避免报文被 BNG/BRAS丟弃。
为解决上述技术问题, 本发明提供了一种数据路由方法, 移动终端 ( UE )通过可信任的固网接入移动核心网络, 所述方法包括:
UE接入家庭网关 (RG )后, 所述 RG向移动接入网关发送隧道建立请 求, 所述隧道建立请求中携带隧道协商的下行信息;
所述移动接入网关收到所述隧道建立请求后, 回复隧道建立响应, 所述 隧道建立响应中携带隧道协商的上行信息;
所述 RG 收到所述隧道建立响应后, 与所述移动接入网关通过动态协 商, 完成隧道建立;
所述 UE通过所述移动核心网络访问业务时, 通过所述 RG与移动接入 网关之间建立的隧道封装并转发所述 UE的数据报文。
优选地, 所述隧道封装并转发数据报文, 包括:
所述移动接入网关接收到移动核心网络发送给所述 UE的下行数据报文 时, 对所述下行数据报文进行隧道封装后进行转发, 其中, 封装后的所述下 行数据报文的隧道源地址为所述移动接入网关的地址, 隧道目的地址为所述
RG的地址; 所述 RG收到所述封装后的下行数据报文时, 解封装后转发给所 述 UE;
所述 RG接收到所述 UE的上行数据报文时, 对所述上行数据报文进行 隧道封装后进行转发, 其中, 封装后的所述上行数据报文的隧道源地址为所 述 RG的地址, 隧道目的地址为所述移动接入网关的地址, 所述移动接入网 关收到所述封装后的上行数据报文时, 解封装后转发至所述上行数据报文中 的目的地址; 或者, 所述 RG直接根据所述上行数据报文中的目的地址进行 转发。
优选地, 所述隧道建立请求及隧道建立响应是釆用扩展的身份验证协议
( EAP )认证消息, 或者动态主机配置协议( DHCP )消息, 或者代理移动 IP 协议 ( PMIP ) 消息。
优选地, 所述移动接入网关为与宽带网关或者宽带远端接入服务器物理 上独立的网元, 包括 X-MAG。
优选地, 所述建立的隧道类型包括通用路由协议(GRE ) ;
所述隧道协商的下行信息包括下行 GRE密钥 (Key )信息, 所述隧道协 商的上行信息包括上行 GRE Key信息。
优选地, 所述移动接入网关收到所述隧道建立请求后, 会触发其与所述 移动核心网络之间的 PMIP或者 GPRS隧道协议( GTP )消息交互, 请求移动 核心网络为该 UE分配 IP地址。
本发明还提供了一种数据路由系统, 所述系统包括家庭网关中的隧道建 立发起模块, 和移动接入网关中的隧道建立响应模块及下行数据报文封装模 块, 其中:
所述隧道建立发起模块设置为: UE接入家庭网关后, 向移动接入网关发 送隧道建立请求, 所述隧道建立请求中携带隧道协商的下行信息; 并在收到 隧道建立响应后, 与所述移动接入网关通过动态协商, 完成隧道建立;
所述隧道建立响应模块设置为: 收到所述隧道建立请求后, 回复隧道建 立响应, 所述隧道建立响应中携带隧道协商的上行信息;
所述下行数据报文封装模块设置为: 所述 UE通过所述移动核心网络访 问业务时, 通过所述 RG与移动接入网关之间建立的隧道封装并转发所述 UE 的下行数据报文。
优选地, 所述系统还包括家庭网关中的下行数据报文解封装模块, 所述下行数据报文封装模块还设置为: 接收到所述移动核心网络发送给 所述 UE下行数据报文时, 对所述下行数据报文进行隧道封装后进行转发, 其中, 封装后的所述下行数据报文的隧道源地址为所述移动接入网关地址, 隧道目的地址为所述 RG的地址;
所述下行数据报文解封装模块设置为: 收到所述封装后的下行数据报文 时, 解封装后转发给所述 UE。
优选地, 所述系统还包括家庭网关中的上行数据报文转发模块和所述移 动接入网关中的上行数据报文解封装模块,
所述上行数据报文转发模块设置为:接收到所述 UE的上行数据报文时, 对所述上行数据报文进行隧道封装后进行转发, 其中, 封装后的所述上行数 据报文的隧道源地址为所述 RG的地址, 隧道目的地址为所述移动接入网关 的地址; 或者, 直接根据所述上行数据报文中的目的地址进行转发;
所述上行数据报文解封装模块设置为: 收到所述封装后的上行数据报文 时, 解封装后转发至所述上行数据报文中的目的地址。
优选地, 所述隧道建立响应模块还设置为: 收到所述隧道建立请求后, 触发与所述移动核心网络之间的 PMIP/GTP消息交互, 请求移动核心网络为 该 UE分配 IP地址。
本发明实施例通过在 RG和移动接入网关(如 X-MAG )之间釆用隧道封 装报文的方式, 使 BNG/BRAS不需要识别真正的目的 IP来进行报文转发, 而是根据其能够识别的隧道目的 IP, 如 RG地址或 X-MAG地址, 从而解决 了现有技术中数据报文被丟弃的问题。 附图概述
此处所说明的附图用来提供对本发明的进一步理解, 构成本申请的一部 分, 本发明的示意性实施例及其说明用于解释本发明, 并不构成对本发明的 不当限定。 在附图中:
图 1示出了现有技术 UE通过可信任非 3GPP网络接入移动核心网络的方 案一流程;
图 2示出了现有技术 UE通过可信任非 3GPP网络接入移动核心网络的方 案二流程;
图 3示出了现有技术 UE通过可信任非 3GPP网络接入移动核心网络的方 案三流程;
图 4示出了现有技术 UE通过可信任非 3GPP网络接入移动核心网络, 新 增 X-MAG网元场景存在的问题;
图 5为依据本发明实施例一的 UE通过可信任的非 3GPP网络接入移动核 心网络的流程示意图;
图 6为依据本发明实施例二的 UE通过可信任的非 3GPP网络接入移动核 心网络的流程示意图。 本发明的较佳实施方式
如图 1 ~ 3 所示, 现有技术中, RG为路由模式时, UE访问固网业务 时, UE和 RG之间通过点到点( Point to Point Protocol , 简称为 ΡΡΡ )协议消 息, 触发 RG 和宽带网关 /宽带远端接入服务器 (Broadband Network Gateway/Broadband Remote Access Server , 简称为 BNG/BRAS )之间的消息交 互, 其中, RG 和 BNG/BRAS 之间的消息釆用扩展的身份验证协议 ( Extensible Authentication Protocol, 简称为 EAP ) 消息, 或者动态主机配置 协议( Dynamic Host Configuration Protocol , 简称为 DHCP )消息, 或者 PMIP 消息。 BNG/BRAS收到 RG发来的消息, 进一步触发移动网络为 UE分配 IP 地址, 以及保证 UE能够通过可信任的 WLAN网络接入移动核心网络, 并访 问移动网络提供的业务。 以图 1为例, 具体步骤说明如下:
步骤 101: RG和 BNG/BRAS之间进行 PPP协商和认证过程, 在 PPP协 商过程中 , BNG/BRAS为 RG分配本地 IP地址, 即 CPE IP。
步骤 102: UE和 RG之间进行 DHCP协商过程, 在 DHCP协商过程中, RG为 UE分配一个 IP地址, 一般为私网 IP, 称为 IP2。
步骤 103: 终端 UE与 RG之间进行 PPP LCP协商, 并选定认证方式。 因 为 3GPP规定接入 EPC的非 3GPP接入网需要釆用 EAP认证, 在此 LCP协商 中选定的认证方式为 EAP认证。
步骤 104: RG作为认证方, BNG/BRAS作为 EAP认证的 proxy(代理), BBF AAA也作为 proxy, 终端 UE以移动网身份通过固网接入, 并完成到 3GPP HSS/AAA的认证 4受权, 认证方式为 EAP。
步骤 105: 该步骤为 EAP认证成功的响应消息, 属于认证的一部分。 认 证成功消息由 HSS/AAA到达 BNG/BRAS。
步骤 106: BNG/BRAS受到认证成功消息的触发, 发起策略会话建立。 其中策略会话包括 BNG/BRAS和 BPCF之间的固网策略会话, BPCF和 PCRF 之间的 S9*会话。 该步骤在不同的场景可以执行或者省略。 鉴于 BNG/BRAS 和 P-GW之间釆用 PMIP协议还是 GTP协议, 如果是 PMIP协议, 则该步骤 为必选; 如果是 GTP协议, 该步骤为可选。
步骤 107: BNG/BRAS受到认证成功消息的触发, 向 P-GW请求隧道绑 定。
如果 BNG/BRAS和 P-GW之间的 S2a接口釆用的是 PMIP协议, 则
BNG/BRAS向 P-GW发送 PBU消息; 如果 BNG/BRAS和 P-GW之间的 S2a 接口釆用的是 GTP协议, 则 BNG/BRAS向 P-GW发送的是 "创建会话请求" 消息。
其中上述的隧道绑定请求消息中包括: APN, IMSI等信息, 以向 P-GW 请求 IP地址分配。
步骤 108: P-GW收到 PBU消息之后, 会与 PCRF之间进行 IP-CAN会 话的建立。
步骤 109: P-GW向 HSS进行 P-GW标识的更新。
步骤 110: P-GW向 BNG/BRAS回复 PBA或者 GTP协议的创建会话响 应消息, 该消息中携带为终端分配的 IP地址, 称为 IP1。
步骤 111 : BNG/BRAS收到 PBA/创建会话响应消息之后, 从消息中获 取 IP1之后, 通过 EAP认证成功消息发送给 RG。
RG向终端发送认证成功消息, 其中该消息中可以携带地址 IP 1 , 也可 以不携带地址 IP1 ;
步骤 112: RG获取 IP1地址。 并通过 PPP IPCP协商把 IP1地址或者与 其对应的 IP3地址携带给 UE。
其中, RG获取地址 IP1后, 可以先存储该地址, 等终端请求 IPCP协商 后再把该地址 IP1发送给终端; 或者 RG存储该地址, 并在终端请求 IPCP协 商后, 为终端分配一个私网的 IP地址(在此称作 IP3 ) , 在 RG上维护 IP1 和 IP3的对应关系( Mapping ) , 并通过 IPCP消息把 IP3地址发送给终端 UE。
RG根据具体策略, 进行业务分流或者通过 EPC网络接入业务。
图 2、 图 3与图 1的区别在于 RG和 BNG/BRAS之间釆用的消息不同, 图 2通过釆用 DHCP消息, 来触发 BNG向移动核心网络网元发起 PMIP/GTP 消息, 请求移动核心网络为 UE分配 IP; 图 3通过釆用 PMIP消息, 来触发 BNG向移动核心网络网元发起 PMIP/GTP消息, 请求移动核心网络为 UE分 配 IP。
从以上技术看, BNG/BRAS需要进行功能增强, 包括:
1 )如果釆用图 2/图 3的方式, 则需要支持与 RG之间交互的 DHCP/PMIP 协议;
2 )如果釆用图 1的方式, 则需要作为 EAP proxy, 也支持与移动核心网 络网元之间交互的 PMIP/GTP协议。
由于固网运营商可能不希望对现有设备 BNG/BRAS 进行功能增强, 这 时, 则需要新增一个与 BNG/BRAS物理上分离的网元(称为 X-MAG ) , 来 屏蔽 S2a接口对 BNG的技术要求, 该网元可以部署在固网或者移动网络中。 这样的话, 则上述 RG和 BNG/BRAS之间的消息交互需要延伸到 RG和 X-MAG之间。
但是, 如图 4 所示, 在 RG路由模式下, 现有技术中主要存在以下问 题: 以 RG和 X-MAG之间釆用 EAP消息为例, 在各网元通过控制消息获取 必要的信息之后, 当有下行数据通过 X-MAG转发到 BNG/BRAS时, 由于该 数据报文的目的 IP为移动网络分配的 IP, 而 BNG/BRAS无法识别固网之外 的私有 IP地址, 会将该报文进行丟弃。
为解决现有技术中存在的问题, 本发明的主要思想是: 通过在 RG和 X-MAG之间釆用隧道封装报文的方式, 使 BNG/BRAS不需要识别报文真正 的目的 IP来进行 ^艮文转发, 而是根据其能够识别的隧道目的 IP, 比如: RG 地址或者 X-MAG地址, 来进行转发, 从而可以解决报文转发时被丟弃的问 题。
基于上述思想, 本发明提供一种数据路由方法, UE通过可信任的固网 接入移动核心网络, 包括:
UE接入 RG后, 所述 RG向所述移动接入网关发送隧道建立请求, 所述 隧道建立请求中携带隧道协商的下行信息;
所述移动接入网关收到所述隧道建立请求后, 回复隧道建立响应, 所述 隧道建立响应中携带隧道协商的上行信息;
所述 RG 收到所述隧道建立响应后, 与所述移动接入网关通过动态协 商, 完成隧道建立;
所述 UE通过所述移动核心网络访问业务时, 通过所述 RG与移动接入 网关之间建立的隧道封装并转发所述 UE的数据报文。
优选地, 所述隧道封装并转发数据报文, 包括: 所述移动接入网关接收 到移动核心网络发送给所述 UE的下行数据报文时, 对所述下行数据报文进 行隧道封装后转发, 其中, 封装后的所述下行数据报文的隧道源地址为所述 移动接入网关的地址, 隧道目的地址为所述 RG的地址; RG收到报文后, 解 封装后转发给所述 UE;
所述 RG接收到所述 UE的上行数据报文时, 对所述上行数据报文进行 隧道封装后转发其中, 封装后的所述上行数据报文的隧道源地址为所述 RG 的地址, 隧道目的地址为所述移动接入网关的地址, 移动接入网关收到封装 后的报文后, 解封装后转发到上行数据报文中的目的地址; 或者, 所述 RG 直接根据所述上行数据报文中的目的地址进行转发。
优选地, 所述移动接入网关为与 BNG/BRAS 物理上独立的网元, 可以 为 X-MAG。
优选地, 所述隧道建立请求及隧道建立响应, 可以釆用: EAP认证消 息 , 或者 DHCP消息 , 或者 PMIP消息 (如 PBU消息 ) 。
优选地, X-MAG收到隧道建立请求消息后, 会触发固网与移动核心网 络之间的 PMIP/GTP消息交互, 请求移动核心网络为该 UE分配 IP地址。
优选地, 隧道类型可以为 GRE。
其中, 通用路由封装( Generic Routing Encapsulation , 简称为 GRE )隧道 封装需要动态的协商 GRE Key, 因此需要 RG和 X-MAG之间的控制信令消 息进行扩展字段, 以支持携带 GRE Key给对端, 用于 GRE隧道协商。
为了便于阐述本发明, 以下将结合附图及具体实施例对本发明技术方案 的实施作进一步详细描述。 需要说明的是, 在不冲突的情况下, 本申请中的 实施例及实施例中的特征可以相互任意组合。
实施例一
本流程是 RG为路由模式下, 以 GRE隧道为例, RG和 X-MAG之间通 过 EAP 认证消息交互, 来传递 GRE 隧道动态协商的信息, 包括: GRE Key, 并触发 X-MAG向移动核心网网元发起 PMIP/GTP隧道建立过程。 GRE 隧道只是其中一种隧道类型, 也可以适用于需要控制信令配合完成的其他类 型三层隧道动态协商。
如图 5所示, 本流程具体包括:
步骤 501 : RG和 BNG/BRAS之间进行 PPP协商和认证过程; 以及可选 地, UE和 RG之间进行 DHCP协商过程, 在 DHCP协商过程中, RG为 UE 分配一个 IP地址, 一般为私网 IP。 BNG/BRAS可能会发起与宽带策略控制 功能(Broadband Policy Control Function, BPCF )之间的固网策略会话的建 立。
步骤 502: 如果该 UE为移动终端, 则与 RG之间进行 PPP链路控制协议 ( PPP Link Control Protocol, PPP LCP )协商。
步骤 503: RG收到 UE的 PPP LCP请求消息后, 作为认证者, 会向 UE 发起 PPP EAP认证请求消息, 从而触发 UE向 3GPP认证服务器(比如: 授 权, 婆权和计费月良务器, Authorization Authentication and Accounting Server, AAA Server ) 的 EAP认证流程。 在 EAP认证流程中, RG可以识别该 UE为 移动终端用户。
在 RG收到 UE通过 PPP消息承载的 EAP消息之后, 会解析该报文并通 过 Diameter承载 EAP消息, 并转发给 X-MAG; 该消息中需要扩展携带下行 GRE Key信息。
步骤 504: X-MAG收到 RG发送的 EAP消息之后, 获取下行 GRE Key 信息, 并转发 EAP消息到 HSS/AAA, 如果 X-MAG位于固网的话, 则经 BBF AAA转发该消息到 HSS/AAA。 该消息中, 不需要携带下行 GRE Key信息。
步骤 505: HSS/AAA回复 EAP认证成功消息, 给 X-MAG。
步骤 506: X-MAG收到 EAP认证成功消息之后, 会向 P-GW发起代理 绑定更新(Proxy Binding Update, 简称为 PBU )消息, 该消息中包括: APN, IMSI等信息 , 以向 P-GW请求 IP地址分配。
步骤 507: P-GW收到 PBU消息之后, 会与 PCRF之间进行 IP连接访问 网络( IP-Connectivity Access Network , 简称为 IP-CAN )会话的建立。
步骤 508: 如果 P-GW发生改变的话, 则向 HSS进行 P-GW标识的更 新。
步骤 509: P-GW收到 PBU消息之后, 会向 BNG/BRAS回复代理绑定确 认 ( Proxy Binding Acknowledgement , 简称为 ΡΒ A )消息, 该消息中携带为终 端分配的 IP地址 , 称为 IP1。
步骤 510: X-MAG收到 PBA消息之后, 从消息中获取 IP地址之后, 会 将移动网络为 UE分配的 IP地址通过 EAP认证成功消息传递给 RG, 其中, EAP消息中不仅包括 IP地址, 这里称为 IP1 , 而且包括上行 GRE Key信息。
至此, RG和 X-MAG之间的 GRE隧道动态协商完成建立。
步骤 511 : 受到步骤 507的触发, PCRF会触发其和 BPCF之间建立 S9* 策略会话。
步骤 512: RG收到 EAP认证成功消息之后, 本地会进行 IP地址的相应 策略处理。 然后, RG与 UE之间完成 PPP IPCP协商流程, 通过该流程, RG 为 UE传递策略决策的 IP地址。
步骤 513 : 如果有需要更新的策略, 则 PCRF 会触发其和 BPCF、 BNG/BRAS和 BPCF之间会进行策略更新操作。
其中, 对于下行数据报文的处理如下:
当 X-MAG收到下行数据^艮文时, 则对其进行 GRE隧道封装, 隧道源 IP 地址为 X-MAG地址, 隧道目的 IP地址为 RG地址。 而当 RG收到封装后的 报文之后, 则对其进行隧道解封装, 并根据 IP数据报文头中的目的 IP进行 转发到相应的 UE。
对于上行数据报文的处理如下:
当 RG收到上行数据报文时, 可以直接根据报文中的目的地址对报文进 行转发; 或者, 也可以对^艮文进行隧道封装, 隧道源 IP地址为 RG地址, 隧 道目的地址为 X-MAG地址, X-MAG收到后, 对其进行隧道解封装后转发至 目 IP地址。
另外, 在 X-MAG和 P-GW之间除了釆用 PMIP协议, 还可以釆用 GPRS 隧道协议(GPRS Tunneling Protocol, 简称为 GTP ) ; 如果釆用 GTP协议的 话, 则 PBU消息对应的改为创建会话请求消息, PBA消息对应的改为创建 会话响应消息。
需要说明的是, 上述流程中:
1)步骤 507-509之间没有先后顺序。
2)步骤 511可以在步骤 507之后, 513之前的任意时刻发生。
实施例二
本流程与前述实施例一的区别在于: RG和 X-MAG之间釆用 DHCP消息 或者 PMIP消息, 来传递隧道协商信息, 同时触发 X-MAG向移动核心网网元 发起 PMIP隧道建立过程。
如图 6所示, 本实施例流程主要包括:
步骤 601 : UE、 RG和 BNG/BRAS之间进行固网分配 IP地址的流程交 互; 如果该 UE为移动终端的话, 则 UE与 RG之间完成 PPP LCP协商、 EAP 认证流程。
步骤 602: 在完成 EAP认证之后, UE向 RG发起 PPP IPCP请求消息。 步骤 603: RG收到 PPP IPCP请求消息之后, 如果该 UE为移动终端用 户的话, 则本地构造 DHCP发现或者 PBU消息, 并发送给 X-MAG, 该消息 中需要扩展携带下行 GRE Key信息。
其中, PMIP ( PBU )消息携带 GRE Key信息为现有技术, 但需要说明的 是, 现有技术中携带 GRE Key中并不是用于本发明中的数据封装和转发。
步骤 604: X-MAG收到 DHCP发现或者 PBU消息之后, 获取下行 GRE
Key信息, 并会向 P-GW发送 PBU消息, 该消息中包括: APN, IMSI等信 息, 以向 P-GW请求 IP地址分配。 步骤 605-608: P-GW会与 PCRF之间完成 IP-CAN会话的建立; 如果 P-GW发生改变的话 , 则向 HSS进行 P-GW标识的更新。 X-MAG收到 PBA 消息之后, 通过 DHCP提供/ PBA消息, 携带移动网络为终端分配的 IP地 址, 称为 IP1 , 传递给 RG。
步骤 609: 受到步骤 607的触发, PCRF会触发其和 BPCF之间建立 S9* 策略会话。
步骤 610: 如果 RG和 X-MAG之间釆用 DHCP消息的话, 则 RG会和 X-MAG之间通过 DHCP请求/ DHCP响应消息, 进一步确认移动网络为其分 配的 IP1。
步骤 610后的具体操作, 与前述实施例一相同, 请参见实施例一中的相 关描述, 在此不再赘述。
另外, 在 BNG/BRAS和 P-GW之间除了釆用 PMIP协议, 还可以釆用 GTP协议; 如果釆用 GTP协议的话, 则 PBU消息改为创建会话请求消息, PBA消息改为创建会话响应消息。
上述流程中:
1)步骤 605-607之间没有先后顺序。
2)步骤 609可以在步骤 605之后, 步骤 612之前的任意时刻发生。
此外, 本发明实施例中还提供了一种数据路由系统, 该系统主要包括家 庭网关中的隧道建立发起模块, 和移动接入网关中的隧道建立响应模块及下 行数据报文封装模块, 其中:
所述隧道建立发起模块用于, UE接入家庭网关后, 向移动接入网关发 送隧道建立请求, 所述隧道建立请求中携带隧道协商的下行信息; 并在收到 隧道建立响应后, 与所述移动接入网关通过动态协商, 完成隧道建立;
所述隧道建立响应模块用于, 收到所述隧道建立请求后, 回复隧道建立 响应, 所述隧道建立响应中携带隧道协商的上行信息;
所述下行数据报文封装模块用于, 所述 UE通过所述移动核心网络访问 业务时, 通过所述 RG与移动接入网关之间建立的隧道封装并转发所述 UE 的下行数据报文。
此外, 所述系统还包括家庭网关中的下行数据报文解封装模块, 所述下行数据报文封装模块进一步用于, 接收到所述移动核心网络发送 给所述 UE 下行数据报文时, 对所述下行数据报文进行隧道封装后进行转 发, 其中, 封装后的所述下行数据报文的隧道源地址为所述移动接入网关地 址, 隧道目的地址为所述 RG的地址;
所述下行数据报文解封装模块用于, 收到所述封装后的下行数据报文 时, 解封装后转发给所述 UE。
此外, 所述系统还包括家庭网关中的上行数据报文转发模块和所述移动 接入网关中的上行数据报文解封装模块,
所述上行数据报文转发模块用于, 接收到所述 UE的上行数据报文时, 对所述上行数据报文进行隧道封装后进行转发, 其中, 封装后的所述上行数 据报文的隧道源地址为所述 RG的地址, 隧道目的地址为所述移动接入网关 的地址; 或者, 直接根据所述上行数据报文中的目的地址进行转发;
所述上行数据报文解封装模块用于, 收到所述封装后的上行数据报文 时, 解封装后转发至所述上行数据报文中的目的地址。
此外, 所述隧道建立响应模块还用于, 收到所述隧道建立请求后, 触发 与所述移动核心网络之间的 PMIP/GTP消息交互, 请求移动核心网络为该 UE 分配 IP地址。
以上仅为本发明的优选实施案例而已, 并不用于限制本发明, 本发明还 可有其他多种实施例, 在不背离本发明精神及其实质的情况下, 熟悉本领域 的技术人员可根据本发明做出各种相应的改变和变形, 但这些相应的改变和 变形都应属于本发明所附的权利要求的保护范围。
显然, 本领域的技术人员应该明白, 上述的本发明的各模块或各步骤可 以用通用的计算装置来实现, 它们可以集中在单个的计算装置上, 或者分布 在多个计算装置所组成的网络上, 可选地, 它们可以用计算装置可执行的程 序代码来实现, 从而, 可以将它们存储在存储装置中由计算装置来执行, 并 且在某些情况下, 可以以不同于此处的顺序执行所示出或描述的步骤, 或者 将它们分别制作成各个集成电路模块, 或者将它们中的多个模块或步骤制作 成单个集成电路模块来实现。 这样, 本发明不限制于任何特定的硬件和软件 结合。
工业实用性 本发明实施例通过在 RG和移动接入网关(如 X-MAG )之间釆用隧道封 装报文的方式, 使 BNG/BRAS不需要识别真正的目的 IP来进行报文转发, 而是根据其能够识别的隧道目的 IP, 如 RG地址或 X-MAG地址, 从而解决 了现有技术中数据报文被丟弃的问题。

Claims

权 利 要 求 书
1、 一种数据路由方法, 移动终端 (UE )通过可信任的固网接入移动核 心网络, 所述方法包括:
UE接入家庭网关 (RG )后, 所述 RG向移动接入网关发送隧道建立请 求, 所述隧道建立请求中携带隧道协商的下行信息;
所述移动接入网关收到所述隧道建立请求后, 回复隧道建立响应, 所述 隧道建立响应中携带隧道协商的上行信息;
所述 RG 收到所述隧道建立响应后, 与所述移动接入网关通过动态协 商, 完成隧道建立;
所述 UE通过所述移动核心网络访问业务时, 通过所述 RG与移动接入 网关之间建立的隧道封装并转发所述 UE的数据报文。
2、 如权利要求 1 所述的方法, 其中, 所述隧道封装并转发数据报文, 包括:
所述移动接入网关接收到移动核心网络发送给所述 UE的下行数据报文 时, 对所述下行数据报文进行隧道封装后进行转发, 其中, 封装后的所述下 行数据报文的隧道源地址为所述移动接入网关的地址, 隧道目的地址为所述
RG的地址; 所述 RG收到所述封装后的下行数据报文时, 解封装后转发给所 述 UE;
所述 RG接收到所述 UE的上行数据报文时, 对所述上行数据报文进行 隧道封装后进行转发, 其中, 封装后的所述上行数据报文的隧道源地址为所 述 RG的地址, 隧道目的地址为所述移动接入网关的地址, 所述移动接入网 关收到所述封装后的上行数据报文时, 解封装后转发至所述上行数据报文中 的目的地址; 或者, 所述 RG直接根据所述上行数据报文中的目的地址进行 转发。
3、 如权利要求 1所述的方法, 其中,
所述隧道建立请求及隧道建立响应是釆用扩展的身份验证协议(EAP ) 认证消息, 或者动态主机配置协议(DHCP ) 消息, 或者代理移动 IP协议 ( PMIP ) 消息。
4、 如权利要求 1、 2或 3所述的方法, 其中,
所述移动接入网关为与宽带网关或者宽带远端接入服务器物理上独立的 网元, 包括 X-MAG。
5、 如权利要求 1、 2或 3所述的方法, 其中,
所述建立的隧道类型包括通用路由协议(GRE ) ;
所述隧道协商的下行信息包括下行 GRE密钥 (Key )信息, 所述隧道协 商的上行信息包括上行 GRE Key信息。
6、 如权利要求 1、 2或 3所述的方法, 其中,
所述移动接入网关收到所述隧道建立请求后, 会触发其与所述移动核心 网络之间的 PMIP或者 GPRS隧道协议( GTP )消息交互, 请求移动核心网络 为该 UE分配 IP地址。
7、 一种数据路由系统, 所述系统包括家庭网关中的隧道建立发起模 块, 和移动接入网关中的隧道建立响应模块及下行数据报文封装模块, 其 中:
所述隧道建立发起模块设置为: UE接入家庭网关后, 向移动接入网关发 送隧道建立请求, 所述隧道建立请求中携带隧道协商的下行信息; 并在收到 隧道建立响应后, 与所述移动接入网关通过动态协商, 完成隧道建立;
所述隧道建立响应模块设置为: 收到所述隧道建立请求后, 回复隧道建 立响应, 所述隧道建立响应中携带隧道协商的上行信息;
所述下行数据报文封装模块设置为: 所述 UE通过所述移动核心网络访 问业务时, 通过所述 RG与移动接入网关之间建立的隧道封装并转发所述 UE 的下行数据报文。
8、 如权利要求 7 所述的系统, 其中, 所述系统还包括家庭网关中的下 行数据报文解封装模块,
所述下行数据报文封装模块还设置为: 接收到所述移动核心网络发送给 所述 UE下行数据报文时, 对所述下行数据报文进行隧道封装后进行转发, 其中, 封装后的所述下行数据报文的隧道源地址为所述移动接入网关地址, 隧道目的地址为所述 RG的地址; 所述下行数据报文解封装模块设置为: 收到所述封装后的下行数据报文 时, 解封装后转发给所述 UE。
9、 如权利要求 7或 8所述的系统, 其中, 所述系统还包括家庭网关中的 上行数据报文转发模块和所述移动接入网关中的上行数据报文解封装模块, 所述上行数据报文转发模块设置为: 接收到所述 UE的上行数据报文时, 对所述上行数据报文进行隧道封装后进行转发, 其中, 封装后的所述上行数 据报文的隧道源地址为所述 RG的地址, 隧道目的地址为所述移动接入网关 的地址; 或者, 直接根据所述上行数据报文中的目的地址进行转发;
所述上行数据报文解封装模块设置为: 收到所述封装后的上行数据报文 时, 解封装后转发至所述上行数据报文中的目的地址。
10、 如权利要求 7或 8所述的系统, 其中,
所述隧道建立响应模块还设置为: 收到所述隧道建立请求后, 触发与所 述移动核心网络之间的 PMIP/GTP消息交互, 请求移动核心网络为该 UE分 配 IP地址。
PCT/CN2012/070975 2011-03-22 2012-02-09 一种数据路由方法及系统 Ceased WO2012126291A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201110069291.6 2011-03-22
CN201110069291.6A CN102695236B (zh) 2011-03-22 2011-03-22 一种数据路由方法及系统

Publications (1)

Publication Number Publication Date
WO2012126291A1 true WO2012126291A1 (zh) 2012-09-27

Family

ID=46860483

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2012/070975 Ceased WO2012126291A1 (zh) 2011-03-22 2012-02-09 一种数据路由方法及系统

Country Status (2)

Country Link
CN (1) CN102695236B (zh)
WO (1) WO2012126291A1 (zh)

Families Citing this family (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104185303A (zh) * 2013-05-24 2014-12-03 中兴通讯股份有限公司 一种固定移动网络融合场景下的隧道建立方法及系统
KR101538762B1 (ko) 2013-06-12 2015-07-24 서정환 캡슐화 프로토콜을 이용하여 클라이언트의 ip 주소를 서버로 전송하는 중계 시스템 및 방법
CN104521220B (zh) 2013-07-12 2017-06-20 华为技术有限公司 报文处理方法及设备
CN103338482B (zh) * 2013-07-24 2016-08-24 成都西加云杉科技有限公司 分流数据传输方法、传输设备以及用户终端
CN103763145B (zh) * 2014-01-27 2019-12-13 上海斐讯数据通信技术有限公司 一种隧道代理方法
US10666458B2 (en) * 2016-09-30 2020-05-26 Huawei Technologies Co., Ltd Method and apparatus for data transmission involving tunneling in wireless communication networks
CN109842918B (zh) * 2017-11-24 2020-09-08 华为技术有限公司 一种无线通信的方法和装置
CN109152096B (zh) * 2018-09-27 2020-09-25 安科讯(福建)科技有限公司 Eps架构的报文传输方法及计算机可读存储介质
CN110768889B (zh) * 2019-10-21 2021-11-02 烽火通信科技股份有限公司 一种vxlan隧道的构建方法及系统

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101310549A (zh) * 2005-11-15 2008-11-19 阿尔卡特朗讯公司 用于蜂窝无线通信系统的接入网络、网关和管理服务器
US20090150665A1 (en) * 2007-12-07 2009-06-11 Futurewei Technologies, Inc. Interworking 802.1 AF Devices with 802.1X Authenticator
CN101753414A (zh) * 2008-12-08 2010-06-23 华为技术有限公司 数据发送方法、系统和装置
CN101945429A (zh) * 2009-07-08 2011-01-12 华为技术有限公司 移动网络用户面数据路由的方法、装置和系统

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100589502C (zh) * 2006-04-30 2010-02-10 华为技术有限公司 演进网络中终端在非3gpp接入系统注册方法及系统
US8335490B2 (en) * 2007-08-24 2012-12-18 Futurewei Technologies, Inc. Roaming Wi-Fi access in fixed network architectures
JP2013502121A (ja) * 2009-08-13 2013-01-17 エヌイーシー ヨーロッパ リミテッド (e)NodeBに対するローカルIP接続性をサポートするシステムおよび方法

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101310549A (zh) * 2005-11-15 2008-11-19 阿尔卡特朗讯公司 用于蜂窝无线通信系统的接入网络、网关和管理服务器
US20090150665A1 (en) * 2007-12-07 2009-06-11 Futurewei Technologies, Inc. Interworking 802.1 AF Devices with 802.1X Authenticator
CN101753414A (zh) * 2008-12-08 2010-06-23 华为技术有限公司 数据发送方法、系统和装置
CN101945429A (zh) * 2009-07-08 2011-01-12 华为技术有限公司 移动网络用户面数据路由的方法、装置和系统

Also Published As

Publication number Publication date
CN102695236B (zh) 2016-06-29
CN102695236A (zh) 2012-09-26

Similar Documents

Publication Publication Date Title
US9392636B2 (en) Methods and apparatuses for setting up a packet data network (PDN) connection
US9544832B2 (en) Method, apparatus and system for policy control
CN102695236B (zh) 一种数据路由方法及系统
CN101227494B (zh) 接入多分组数据网时因特网安全协议安全联盟的建立方法
US20130343304A1 (en) System and Method for Configuring Multiple IP Connections
CN101931946B (zh) 演进的分组系统中的终端的多接入方法及系统
CN102457847B (zh) 一种固定网络感知用户接入的方法和系统
EP2916592A1 (en) Packet data network type management method, device, and system
WO2012051897A1 (zh) 一种融合固定网络与移动网络的系统及方法
CN103781073B (zh) 移动用户固网的接入方法及系统
CN101577931B (zh) 一种实现多接入的方法及系统
WO2013174190A1 (zh) 路由选择方法及功能网元
WO2008154874A1 (fr) Procédé et système permettant d'établir un tunnel dans le réseau en évolution
CN102625305B (zh) 接入演进分组系统的方法及系统
WO2013107243A1 (zh) 会话建立方法及装置
WO2012106984A1 (zh) 一种通过可信任的固网接入移动核心网络的方法和系统
CN103687049B (zh) 多连接建立的方法及系统
CN103582159A (zh) 一种固定移动网络融合场景下的多连接建立方法及系统
WO2014059823A1 (zh) 分组数据网络(pdn)业务的实现方法、系统及网元
WO2011050662A1 (zh) 多接入的处理方法、家乡代理及用户设备
CN103905570B (zh) 多栈承载的ip地址删除处理、删除方法及装置
CN102740401B (zh) 一种通过可信任的固网接入移动核心网络的方法和系统
WO2011127779A1 (zh) 终端接入方法及系统
CN103379177A (zh) 地址分配方法及装置

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 12761342

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 12761342

Country of ref document: EP

Kind code of ref document: A1