WO2013075580A1 - Procédé et système de commande de ressource de données de déchargement local - Google Patents
Procédé et système de commande de ressource de données de déchargement local Download PDFInfo
- Publication number
- WO2013075580A1 WO2013075580A1 PCT/CN2012/084012 CN2012084012W WO2013075580A1 WO 2013075580 A1 WO2013075580 A1 WO 2013075580A1 CN 2012084012 W CN2012084012 W CN 2012084012W WO 2013075580 A1 WO2013075580 A1 WO 2013075580A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- control
- address
- policy
- bpcf
- cpe
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W28/00—Network traffic management; Network resource management
- H04W28/16—Central resource management; Negotiation of resources or communication parameters, e.g. negotiating bandwidth or QoS [Quality of Service]
- H04W28/24—Negotiating SLA [Service Level Agreement]; Negotiating QoS [Quality of Service]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W76/00—Connection management
- H04W76/10—Connection setup
- H04W76/12—Setup of transport tunnels
Definitions
- the present invention relates to the field of wireless communication technologies, and in particular, to a method and system for resource control of local offload data. Background technique
- the Evolved Packet Core network developed by the 3rd Generation Partnership Project (3GPP) is composed of Mobility Management Entity (MME) and Serving Gateway (S-GW).
- MME Mobility Management Entity
- S-GW Serving Gateway
- P-GW Packet Data Network Gateway
- HSS Home Subscriber Server
- the MME is responsible for the control planes such as mobility management, non-access stratum signaling processing, and user mobility management context management; the S-GW forwards data between the user access and the P-GW, and is responsible for paging waiting. The data is buffered; the P-GW is a border gateway of an Evolved Packet System (EPS) and a Packet Data Network (PDN), which is responsible for PDN access and forwarding data between the EPS and the PDN.
- EPS Evolved Packet System
- PDN Packet Data Network
- the Policy and Charging Rules Function (PCRF, Policy and Charging Rules Function) is used to formulate policies and charging rules through the interface Rx and the carrier network protocol.
- IP Internet Protocol
- the application function (AF, Application Function) in the service network is connected to obtain service information, which is used to generate service information of the PCC policy.
- GTP General Packet Radio Service Tunneling Protocol
- PCEF Policy and Charging Enforcement Function
- the PCRF and the P-GW exchange information through the Gx interface, which is responsible for sending
- the bearer is established, modified, and released, guarantees the quality of service (QoS) of the service data transmission, and performs charging control.
- PMIP Proxy Mobile IP
- the S-GW hosts the bearer binding and event reporting function (BBERF, Bearer Binding and Event Report Function), and S -
- BBERF Bearer Binding and Event Report Function
- E-UTRAN Evolved Universal Terrestrial Radio Access Network
- the user can access the EPC network through a Home NodeB subsystem (referred to as a ⁇ subsystem) or an evolved Home Node System (HeNB subsystem), as shown in FIG. 1 .
- the HeNB/HNB is a small, low-power base station deployed in indoor locations such as homes and offices.
- the HeNB/HNB usually enters the EPC by renting a fixed line ⁇ 3 ⁇ 4.
- a security gateway (SeGW, Security Gateway) needs to be deployed on the EPC network.
- IPSec IP Security
- the data exchanged between the device (UE) and the EPC network is encapsulated by IPSec, so that the devices on the line cannot perceive the data and ensure the security of data transmission.
- the HeNB GW is an optional network element. If not deployed, the HeNB directly connects to the MME. If the HNB system is used, the HNB GW must be deployed with the NE and the HNB connected to the HNB GW.
- the HNB system also supports circuit switched (CS) services, that is, the connection between the HNB GW and the Mobile Switching Center (MSC).
- CS circuit switched
- MSC Mobile Switching Center
- an S15 interface is established between the HNB GW and the PCRF.
- the HeNB/HNB system shown in Figure 1 accesses the EPC through the fixed network, and the data packets of the UE access service/application accessing the HeNB/HNB are routed through the EPC network.
- the 3GPP R-11 standard specification defines the offload (local offload) function of the HeNB system, that is, the service/application data accessed by the user accessing the HeNB system is not routed through the EPC network, but is directly used by the HeNB system and the HeNB system.
- the fixed line is routed, and this part of the data is called offload data.
- 3GPP R-11 introduces a separate local gateway (L-GW, Local Gate Way) network element for the HeNB system to support the offload function.
- the L-GW is deployed on the local network and functions like a P-GW.
- the local IP address is obtained from the local network, which is called the L-GW local IP address and the HeNB local IP address.
- the L-GW and the HeNB respectively perform IKEv2 negotiation with the SeGW by using the local IP address to establish an IPSec tunnel for transmitting data that passes through the HeNB system and is routed back to the EPC network.
- the HeNB and the L-GW need to exchange local IP addresses with each other to establish an Sxx tunnel for transmitting data that is unloaded through the HeNB system and from the local network.
- the SeGW After the HeNB and the L-GW establish an IPSec tunnel with the SeGW, the SeGW also allocates a core network IP address, which is called the core network IP address of the HeNB and the core network IP address of the L-GW.
- FIG. 3 is a schematic diagram of offlaod data routing when the HeNB system accessing the EPC core network through the BBF network supports the offload function.
- the HeNB and the L-GW are deployed under the Residental Gateway (RG), that is, the RG allocates the local private network IP address to the HeNB and the L-GW respectively.
- RG Residental Gateway
- the offload data is routed through the HeNB system (ie, the HeNB and the L-GW in the figure) and the fixed network access line used by the HeNB system (ie, RG, BNG/ in the figure).
- BRAS 0, where BNG is a Broadband Network Gateway and BRAS is a Broadband Remote Access Server.
- a PDN connection for example, a SIPTO connection
- the UE can perform the offload service through the HeNB system.
- a PDN connection for example, a SIPTO connection
- the UE can perform the offload service through the HeNB system.
- the local IP address of the HeNB and the L-GW can be allocated by the BNG/BRAS. If the RG is deployed in the network, that is, when the HeNB system accesses the fixed network through the RG, the RG can allocate the local IP address for the HeNB and the L-GW.
- the process shown in Figure 4 mainly includes:
- Step 401 After the HeNB is powered on to complete the access authentication of the fixed network, the fixed network device (BNG/BRAS/RG) allocates the HeNB local IP address (HeNB@LN address;), and the HeNB uses the HeNB@LN address to complete.
- the IKEv2 negotiation with the SeGW establishes an IPSec tunnel, and the SeGW allocates a HeNB core network IP address (HeNB@CN address) to the HeNB.
- HeNB@CN address HeNB core network IP address
- Step 402 The process of powering up the L-GW is similar to that of the HeNB. After the power-on process is complete, an IPSec tunnel is established between the L-GW and the SeGW, and the L-GW obtains the local IP address of the L-GW (L-GW@LN address). And the L-GW core network IP address (L-GW@CN address).
- Step 403 The L-GW initiates an update to the domain name server (ie, the DNS server), and the L-GW@LN address, the L-GW@CN address, the full-name domain name (FQDN, Fully Qualified Domain Name), and the access point name (APN, The Access Point Name and Local HeNB Network Identity (LHN-ID, Local HeNB Network Identity) information is sent to the DNS server for storage.
- domain name server ie, the DNS server
- L-GW@LN address the L-GW@CN address
- FQDN Fully Qualified Domain Name
- APN Access Point Name and Local HeNB Network Identity
- LHN-ID Local HeNB Network Identity
- Step 404 The DNS server returns a response that the update is successful.
- Step 405 The access UE initiates a SIPTO (Selected IP Traffic Offload) connection request, and the request message includes APN information.
- SIPTO Select IP Traffic Offload
- the HeNB carries the LHN-ID to the MME.
- Step 406 When the MME receives the request, first determine, according to the APN information, whether the UE can perform SIPTO. If yes, initiate a DNS query according to the LHN-ID, and select a corresponding L-GW.
- Step 407 After the DNS server selects the L-GW for the access of the UE, the information of the selected L-GW (including the L-GW@LN address, the L-GW@CN address, the FQDN, and the like) Return to the MME to save.
- Step 408 The MME sends a session establishment request to the S-GW.
- Step 409 The S-GW sends a session establishment request to the selected L-GW.
- Step 410 After receiving the session establishment request, the L-GW returns a session establishment response to the S-GW, where the response message includes the tunnel end identifier (TEID, Tunnel Endpoint) generated by the L-GW.
- TEID tunnel end identifier
- Step 411 The corresponding S-GW returns a session establishment response to the MME.
- Step 412 After receiving the session establishment response, the MME sends a bearer setup request to the HeNB, where the request message includes the L-GW@LN address, the FQDN, the TEID, and the IP address information of the UE.
- Step 413 An RRC connection is established between the HeNB and the UE, and the HeNB sends the IP address of the UE to the UE.
- Step 414 The HeNB returns a bearer setup response to the MME, where the response message includes the TEID generated by the HeNB, and the HeNB@LN address information.
- Step 415 The HeNB returns PDN connection establishment completion information to the MME.
- Step 416 After receiving the message that the PDN connection is established, the MME sends the message to the S-GW.
- the L-GW initiates a bearer modification request, and brings the TEID and HeNB@LN address information of the HeNB to the L-GWo.
- the MME After receiving the PDN connection establishment, the MME sends the TEID of the HeNB and the HeNB@LN address information to the L-GW through the S-GW.
- an Sxx tunnel for carrying offload data is established between the HeNB and the L-GW.
- the UE After the UE completes the above PDN connection (referred to as SIPTO connection in the figure) establishment process, the UE can perform the offload service by using the L-GW for its assigned IP address.
- 3 and 4 illustrate the PDN connection establishment process and data routing in the case where the HeNB system supports offload.
- the data of the offload service carried out by the UE accessing the HeNB system needs to be routed through the fixed network line (backhaul) used by the HeNB to access, and Fixed-line resources can be resource-intensive because they are used by a large number of users, including mobile users and fixed-line users.
- the offload service is a service that needs to provide QoS guarantee, then QoS guarantee for offload will not be provided in this case. Therefore, how to provide resource control for the offload data in the above scenario is an urgent problem to be solved.
- the following describes the routing process of the offload data in the prior art in the HeNB system and the fixed network backhaul (ie, between the UE and the BNG/BRAS) used by the HeNB/L-GW access.
- the RG allocates a local private network IP address (local private network IP address-1 and local private network IP). Address-2) 0
- the HeNB/L-GW establishes an IPSec tunnel with the SeGW for IKEv2 negotiation with the local private network IP address
- the local private IP address-1 of the HeNB performs network address translation on the RG (NAT, Network). Address Translation ), converted to public network IP address (called CPE IP address) and port (set) -1
- L-GW local private network IP address-2 performs NAT translation on the RG to CPE IP address and port (set ) -2.
- the CPE is Customer Premise Equipment.
- the PDN connection needs to be established before the UE accessing the HeNB system performs the offload service.
- the RG allocates a local private network IP address -3 to the UE.
- the UE can use the IP address to carry out the offload service.
- the above-mentioned offload data is used as an example (downstream offload data, only need to change the source and destination IP addresses of the uplink data packet, and the port number can be changed), and the IP layer data encapsulation format of the data routing is shown in FIG. 5.
- the offload data sent by the UE to the HeNB the source address of the data encapsulation is the UE local private network IP address-3, and the destination address is the CN IP address (that is, the communication peer IP address;).
- the Sxx tunnel encapsulation is performed, the source address is the HeNB local private network IP address -1, and the destination address is the L-GW local private network IP address -2, and is sent to the L-GW.
- the L-GW After receiving the packet, the L-GW performs decapsulation of the Sxx tunnel and sends the decapsulated data packet to the RG.
- the RG performs NAT translation on the source IP address of the data, that is, the local private IP address of the UE-3. It is converted to CPE IP address and port number -3 before being sent to BNG/BRAS.
- Figure 6 shows the NAT conversion performed by the local private network IP address assigned by the RG to the device it accesses. That is, the RG allocates a local private network IP address -1, a local private network IP address -2, and a local private network IP address -3 to the HeNB, the L-GW, and the UE, respectively.
- the device sends the information through the RG by using the local private network IP address assigned by the RG (for example, the HeNB and the L-GW initiate IKEv2 negotiation to the SeGW through the RG, or the UE initiates the offload service through the RG), the RG needs to perform N: 1 for it.
- NAT conversion that is, the RG converts the HeNB's local private network IP address -1 to NAT to CPE IP address + port (set) 1; converts the L-GW's local private network IP address -2 to NAT to convert to CPE IP address + Port (set) 2; Convert the UE's local private IP address-3 to NAT to CPE IP address + port (set) 3.
- the CPE IP address is a public network IP address after the RG performs NAT conversion on the private network IP address of the device connected to it. Summary of the invention
- the main purpose of the embodiments of the present invention is to provide a method and a system for performing resource control on a local offloading data, so as to solve the problem of resource control of an offload service performed by a UE accessed by a HeNB, so that the offload service performed by the UE can be Get QoS guarantee.
- a method for performing resource control on local offload data includes: after receiving a trigger message, the local gateway L-GW sends an admission control request to the broadband policy control function BPCF; the BPCF performs admission control, and returns to the L-GW. Accepting the control result, and when the admission control result is accepted, transmitting a control policy to the broadband network gateway/broadband remote access server BNG/BRAS, where the control policy includes at least a customer premises equipment network protocol CPE IP address and authorization Quality of Service QoS information.
- the method further includes: the L-GW performing a bearer operation according to the admission control result.
- the method further includes: the BNG/BRAS And filtering the data packet according to the CPE IP address, and performing resource control on the data packet encapsulated by the CPE IP address according to the authorized QoS information.
- the trigger message is a resource allocation request, a service request, or a bearer operation request from the network from the UE side of the user equipment.
- the carrying operation performed by the L-GW according to the admission control result is specifically:
- the L-GW rejects the bearer setup or modification operation
- the L-GW initiates a bearer setup or modification operation.
- the method further includes: the BPCF and the L-GW establish a first policy control session, and the BPCF acquires the CPE IP address; the BPCF discovers the location according to the CPE IP address.
- the BNG/BRAS establishes a second policy control session with the BNG/BRAS.
- the first policy control session is a policy control session directly established between the BPCF and the L-GW; correspondingly, the L-GW discovers the BPCF according to the CPE IP address, and establishes the first policy. Control the session.
- the first policy control session is composed of a policy control session established between the L-GW and the policy and charging rule function PCRF, and a policy control session established between the PCRF and the BPCF; correspondingly, the L-GW is based on the LHN - the ID or CPE IP address discovers the PCRF and establishes a policy control session with the PCRF; the PCRF discovers the BPCF according to the CPE IP address and establishes a policy control session with the BPCF .
- a system for resource control of local offload data comprising: a local gateway L-GW, a broadband policy control function BPCF, a broadband network gateway/broadband remote access server BNG/BRAS, wherein
- the L-GW is configured to send an admission control request to the BPCF after receiving the trigger message;
- the BPCF is configured to perform admission control, and return an admission control result to the L-GW, and send a control policy to the BNG/BRAS when the admission control result is accepted, where the control policy includes at least Customer premises equipment network protocol CPE IP address and authorized quality of service QoS information;
- the BNG/BRAS is configured to receive a control policy delivered by the BPCF.
- the L-GW is further configured to perform a bearer operation according to the admission control result.
- the BNG/BRAS is further configured to: filter the data packet according to the CPE IP address, and perform resource control on the data packet encapsulated by the CPE IP address according to the authorized QoS information.
- the trigger message is a resource allocation request, a service request, or a bearer operation request from the network from the UE side of the user equipment.
- the L-GW is further configured to reject the bearer setup or modify operation when the admission control result is rejected; and initiate a bearer setup or modify operation when the admission control result is accepted.
- the BPCF is further configured to: before the L-GW receives the trigger message, the BPCF establishes a first policy control session with the L-GW, and the BPCF acquires the CPE IP address; the BPCF according to the CPE IP address The BNG/BRAS is found to establish a second policy control session with the BNG/BRAS.
- the first policy control session is a policy control session directly established between the BPCF and the L-GW; correspondingly, the L-GW discovers the BPCF according to the CPE IP address, and establishes the first policy. Control the session.
- the first policy control session is composed of a policy control session established between the L-GW and the policy and charging rule function PCRF, and a policy control session established between the PCRF and the BPCF; correspondingly, the L-GW is based on the LHN - the ID or CPE IP address discovers the PCRF and establishes a policy control session with the PCRF; the PCRF discovers the BPCF according to the CPE IP address and establishes a policy control session with the BPCF .
- a method and system for performing resource control on local offload data provided by an embodiment of the present invention, after receiving the trigger message, the L-GW sends an admission control request to the BPCF; the BPCF performs admission control, and returns an admission control result to the L-GW.
- the control policy is sent to the BNG/BRAS, where the control policy includes at least the CPE IP address and the authorized QoS information; the L-GW performs the bearer operation according to the admission control result; the BNG/BRAS is based on the CPE IP address.
- the data packet is filtered, and the data packet encapsulated by the CPE IP address is used for resource control according to the authorized QoS information.
- the present invention solves the problem of resource control of the local offloading service performed by the UE accessed by the HeNB, so that the local offloading service carried out by the UE can also obtain QoS guarantee.
- the solution of the invention is equally applicable to HNB systems.
- FIG. 1 is a schematic structural diagram of a HeNB accessing an EPC in the prior art
- FIG. 2 is a schematic diagram of a HeNB system deployed with an independent L-GW in the prior art
- FIG. 3 is a schematic diagram of a route for accessing offload data through a HeNB in the prior art
- FIG. 4 is a schematic diagram of establishing a SIPTO connection in the prior art.
- FIG. 5 is a schematic diagram of encapsulation of offload data routing in a HeNB access scenario in the prior art
- FIG. 6 is a schematic diagram of NAT conversion performed by the RG in the N:1 mode on the private network IP address of the device accessed by the RG in the prior art;
- FIG. 7 is a flow chart of a method for resource control of local offload data according to an embodiment of the present invention.
- Embodiment 8 is a flowchart of establishing a policy control session according to Embodiment 1 of the present invention.
- FIG. 9 is a flowchart of establishing a policy control session according to Embodiment 2 of the present invention.
- FIG. 10 is a flowchart of establishing a policy control session according to Embodiment 3 of the present invention. detailed description
- the data packet of the offload service carried out by the UE accessed by the HeNB system needs to perform the conversion of the private network IP address and the CPE IP address of the UE after passing through the RG, that is, the offload datagram routed between the RG and the BNG/BRAS.
- the text is encapsulated using the CPE IP address. Therefore, the present invention establishes a policy control session on the BNG/BRAS before the offload service is launched, and sends the CPE IP address to the BNG/BRAS and the policy control device.
- the BNG/BRAS can determine whether it is an offload data packet according to whether the data packet contains the CPE IP address. If so, the BNG/BRAS can request resource control for the offload data message to the policy control device.
- a method for performing resource control on local unloading data mainly includes:
- Step 701 After receiving the trigger message, the L-GW sends an admission control request to a Broadband Policy Control Function (BPCF).
- BPCF Broadband Policy Control Function
- the trigger message may be a resource allocation request from the UE side, a service request, or a bearer operation request from the network.
- Step 702 The BPCF performs the admission control, returns the admission control result to the L-GW, and sends a control policy to the BNG/BRAS when the admission control result is accepted.
- the control policy includes at least the CPE IP address and the authorized QoS information.
- Step 703 The L-GW performs a bearer operation according to the admission control result.
- the BNG/BRAS filters the data packet according to the CPE IP address, and performs resource control on the data packet encapsulated by the CPE IP address according to the authorized QoS information.
- the L-GW performs the bearer operation according to the admission control result, specifically: if the admission control result is a rejection, the L-GW rejects the bearer setup or modification operation; if the admission control result is accepted, the L-GW initiates the bearer setup or modification operation. .
- the method further includes: the BPCF and the L-GW establish a first policy control session, and the BPCF obtains the CPE IP address; the BPCF discovers the BNG/BRAS according to the CPE IP address, and establishes and A second policy control session between BNG/BRAS.
- the first policy control session may be a policy control session directly established between the BPCF and the L-GW; correspondingly, the L-GW discovers the BPCF according to the CPE IP address, and establishes a first policy control session.
- the first policy control session may also be composed of a policy control session established between the L-GW and the PCRF, and a policy control session established between the PCRF and the BPCF;
- the L-GW discovers the PCRF according to the LHN-ID or CPE IP address, and establishes a policy control session with the PCRF; the PCRF discovers the BPCF according to the CPE IP address, and establishes a policy control session with the BPCF.
- an embodiment of the present invention further provides a system for performing resource control on local unloading data, which mainly includes: L-GW, BPCF, BNG/BRAS, wherein L-GW is used.
- L-GW Low-GW
- BPCF Packet Control Function
- BNG/BRAS Packet Control System
- the BPCF is used for admission control, and returns the admission control result to the L-GW.
- the control policy is sent to the BNG/BRAS, and the control policy includes at least the CPE IP address and the authorized QoS information.
- the BNG/BRAS is used to filter data packets according to the CPE IP address and perform resource control on the data packets encapsulated by the CPE IP address according to the authorized QoS information.
- the L-GW is further configured to: when the admission control result is rejected, reject the bearer establishment or modification operation; when the admission control result is accepted, initiate a bearer setup or modification operation.
- the BPCF may be further configured to: before the L-GW receives the trigger message, the BPCF establishes a first policy control session with the L-GW, and the BPCF obtains the CPE IP address; the BPCF discovers the BNG/BRAS according to the CPE IP address, and establishes A second policy control session with BNG/BRAS.
- the first policy control session may be directly established between the BPCF and the L-GW.
- the policy controls the session; correspondingly, the L-GW discovers the BPCF according to the CPE IP address and establishes a first policy control session.
- the first policy control session may also be composed of a policy control session established between the L-GW and the PCRF, and a policy control session established between the PCRF and the BPCF;
- the L-GW discovers the PCRF according to the LHN-ID or CPE IP address, and establishes a policy control session with the PCRF; the PCRF discovers the BPCF according to the CPE IP address, and establishes a policy control session with the BPCF.
- the scenario described in Embodiment 1 of the present invention is that the HeNB system accesses the EPC through the RG and BBF networks.
- the RG allocates a private network IP address for the device accessed through it.
- the process of implementing resource control for the offload service carried out by the UE accessed by the HeNB system as shown in FIG. 8, the process mainly includes:
- Step 801 The L-GW is powered on, and performs access authentication to the fixed network.
- the RG and the fixed network AAA server participate in the access authentication process when the L-GW is powered on.
- Step 802 When the L-GW performs the access authentication to the fixed network, the RG allocates the local private network IP address -1 to the L-GW.
- Step 803 The L-GW completes the IKEv2 negotiation with the SeGW by using the private network IP address allocated by the RG to establish an IPSec tunnel.
- the RG converts the local private IP address -1 of the L-GW into a CPE IP address and a port (set) -1.
- Step 804 The SeGW allocates the core network IP address of the L-GW to the L-GW, and sends the IP address to the L-GW. At the same time, by extending the IKEv2 message, the SeGW sends the NAT-converted CPE IP address to the L-GW.
- Step 805 The L-GW uses the CPE IP address information and/or the FQDN to discover the BPCF that controls the L-GW to access the fixed line resource used, and initiates a first policy control session establishment request.
- the request message includes the CPE IP address information and/or FQDN.
- Step 806 After receiving the first policy control session establishment request, the BPCF discovers the BNG/BRAS on the fixed network line used by the L-GW access according to the CPE IP address information and/or the FQDN, and establishes a second policy control session. . At the same time, the BPCF obtains the subscription QoS information of the fixed line used by the L-GW access, and this information serves as a basis for subsequent admission control of the resource request of the offload service.
- Step 807 The BPCF returns a response that the first policy control is successfully established to the L-GW.
- Step 808 In a similar manner, the HeNB obtains the local private network IP address -2, and negotiates with the SeGW to establish an IPSec tunnel.
- Step 809 is a process in which the UE accesses the HeNB network to establish a PDN connection for offloading services. For the process, refer to the process shown in FIG. 4.
- Step 810 After establishing the PDN connection, the UE may perform the offload service by using the local private network IP address -3 allocated by the RG.
- the UE sends a service request to the L-GW, and the request message is sent to the L-GW through the HeNB, or sent to the L-GW through the HeNB, the MME, and the S-GW.
- Step 811 After receiving the service request, the L-GW initiates an admission control request to the BPCF, where the admission control request message includes QoS information related to the service.
- Step 812 The BPCF performs admission control on the service, and if the L-GW accesses the resources on the fixed line used to meet the QoS requirement of the service, the request is accepted.
- Step 813 The BPCF returns a successful response to the L-GW.
- Step 814 the L-GW initiates an operation of bearer establishment/modification according to this.
- Step 815 The BPCF sends a control policy to the BNG/BRAS, including the CPE IP address and the authorized QoS information.
- the data packet passes the BNG/BRAS, if the BNG/BRAS filters the corresponding data packet according to the CPE IP address, it indicates that the data packet is the offload service, and the offload data is controlled according to the authorized QoS information.
- the scenario described in the second embodiment of the present invention is the same as that in the first embodiment, and the difference lies in the first policy control.
- the establishment of the session is established by the L-GW through the PCRF and BPCF.
- the process is shown in Figure 9, which mainly includes:
- Step 901 The L-GW performs the access authentication to the fixed network, and obtains the local private network IP address.
- the process of establishing the IPSec tunnel and obtaining the CPE IP address is the same as that in the first embodiment. See steps 801-804.
- Step 902 The L-GW discovers the PCRF according to the LHN-ID or the CPE IP address, and initiates a policy control session A establishment request to the PCRF, where the request message includes the LHN-ID, the CPE IP address, and/or the FQDNo.
- Step 903 After receiving the policy control session A establishment request, the PCRF discovers the BPCF that controls the L-GW access to the fixed line resource according to the CPE IP address information and/or the FQDN information, and initiates the policy control session B. A request is established, and the request message contains a CPE IP address and/or FQDN.
- Step 904 After receiving the establishment request of the policy control session B, the BPCF discovers the BNG/BRAS on the fixed network line used by the L-GW access according to the CPE IP address and/or the FQDN information, and establishes a second policy control session. . At the same time, the BPCF obtains the subscription QoS information of the fixed line used by the L-GW access, and this information serves as a basis for subsequent admission control of the offload service.
- Step 905 The BPCF returns a policy control session B to the PCRF to establish a successful response.
- Step 906 The PCRF returns a policy control session A to the L-GW to establish a successful response.
- Step 907 In the same manner, an IPSec tunnel is established between the HeNB and the SeGW.
- Step 908 is a process in which the UE accesses the HeNB network to establish a PDN connection in order to perform an offload service. For the process, refer to the process shown in FIG. 4.
- Step 909 After establishing the PDN connection, the UE can perform the offload service by using the local private network IP address -3 allocated by the RG.
- the UE sends a service request to the L-GW, and the request message is sent to the L-GW through the HeNB, or sent to the L-GW through the HeNB, the MME, and the S-GW.
- Step 910 After receiving the service request, the L-GW initiates an admission control request to the PCRF.
- the request message contains QoS information related to the service.
- Step 911 the PCRF initiates an admission control request to the BPCF.
- Step 912 The BPCF performs admission control on the service, and if the resource on the fixed line used by the L-GW access can meet the requirement of the service to perform QoS, the request is accepted.
- step 913 the BPCF returns a successful response to the PCRF.
- Step 914 the PCRF returns a successful response to the L-GW.
- Step 915 The L-GW initiates an operation of establishing/modifying the bearer according to this.
- Step 916 The BPCF sends a control policy to the BNG/BRAS, including the CPE IP address and the authorized QoS information.
- the data packet passes the BNG/BRAS, if the BNG/BRAS filters the corresponding data packet according to the CPE IP address, it indicates that the data packet is the offload service, and the offload data is controlled according to the authorized QoS information.
- the L-GW and the PCRF establish a policy control session A.
- the PCRF does not make policy decision and admission control, but forwards the admission control request from the L-GW.
- BPCF forwards the admission control result of the BPCF to the L-GW.
- the PCRF is a network element deployed in the HeNB system, that is, the network resource inside the HeNB system is specifically managed
- the PCRF may perform resource authorization on the request, and
- the authorization QoS information is sent to the BPCF for admission control.
- the PCRF can decide to send the authorization QoS information to the L-GW.
- the scenario described in the third embodiment of the present invention is the same as that in the first embodiment, except that the process of establishing a policy control session occurs when the UE accessing the HeNB establishes a PDN connection.
- the process is shown in Figure 10, which mainly includes:
- the L-GW sends a DNS update to the DNS server located in the core network, and sends information such as the L-GW core network IP address, the LHN-ID, and the APN to the DNS server. 1003.
- the HeNB is powered on and the IPSec tunnel of the SeGW is established.
- the UE initiates a PDN connection establishment request, where the request message includes information such as a UE-ID and an APN.
- the APN information indicates that the UE requests to establish a PDN connection for offload.
- the HeNB When the request message arrives at the HeNB, the HeNB includes the LHN-ID of the HeNB network to which it belongs, in the request message, and sends it to the MME.
- the MME After receiving the connection establishment request message, the MME first determines, according to the APN information, whether the UE is allowed to establish a PDN connection, and if allowed, queries the DNS server for the L-GW serving the UE according to the LHN-ID.
- the DNS queries the corresponding L-GW according to the LHN-ID, and returns information of the L-GW (including information such as the L-GW core network IP address) to the MME.
- the MME then sends a session establishment request to the S-GW, where the request message includes an L-GW core network IP address.
- the S-GW initiates a session establishment request to the L-GW according to the IP address of the L-GW core network.
- the L-GW After receiving the session establishment request, the L-GW discovers the BPCF according to the CPE IP address and/or the FQDN, and initiates a first policy control session establishment request, where the request message includes the CPE IP address.
- the BPCF After receiving the first policy control session establishment request, the BPCF discovers the BNG/BRAS on the fixed network line used by the L-GW access according to the CPE IP address and/or the FQDN, and establishes a second policy control session. At the same time, the BPCF obtains the subscription QoS information of the fixed line used by the L-GW access, and this information serves as a basis for subsequent admission control of the resource request of the offload service.
- the BPCF returns a response to the L-GW that the first policy control is successfully established.
- the L-GW returns a session establishment response to the S-GW.
- the response message includes information such as the TEID generated by the L-GW, the UE IP address, and the L-GW local private network IP address -1.
- the subsequent steps of establishing the PDN connection including the Sxx connection establishment process request, refer to the description of steps 411-416 in FIG. 1014.
- the offload service can be performed. Refer to steps 810-815 in Figure 8 for the process of performing admission control by the BPCF during the business process and other processes.
- the CPE IP address is sent to the BNG/BRAS, and the BNG/BRAS filters the data packet according to the CPE IP address, and the data packet is encapsulated by using the CPE IP address. It is considered to be an offload data message.
- the RG is connected to the HeNB system, it can also be accessed by other users (such as fixed network users). When the data sent by the other users passes through the RG, the local private network IP address is also converted into a CPE IP address.
- the resource control provided by the BNG/BRAS according to the CPE IP address is RG-level resource control, that is, includes resource control for other user access under the RG. To avoid this situation, the RG may be configured to be dedicated.
- the HeNB system is used for access.
- the RG acts as the authenticator, and assigns the private network IP address to the L-GW, and the RG will correspond to the CPE IP address after the NAT is transferred.
- the port number set is sent to BNG/BRAS.
- the port number set is used by the UE accessed by the HeNB system to perform the offload service
- the data packet is used after NAT conversion by the RG.
- the BNG/BRAS filters the packet according to the CPE IP address and the port number set. If the data packet is encapsulated by the CPE IP address, and the used port number also belongs to the range of the port number set, the The packet is an offload data packet, so that resource control is performed.
- the data packet is not offload data.
- BNG/BRAS will not perform resource control on the data message. This enables resource control at the L-GW level.
- the resource control problem of the offload service performed by the UE accessed by the HeNB is solved by the foregoing embodiment of the present invention, so that the offload service carried out by the UE can also be obtained.
- QoS guarantee is the resource control problem of the offload service performed by the UE accessed by the HeNB.
- modules or steps of the present invention can be implemented by a general-purpose computing device, which can be concentrated on a single computing device or distributed over a network composed of multiple computing devices. Alternatively, they may be implemented by program code executable by the computing device, such that they may be stored in the storage device by the computing device and, in some cases, may be different from the order herein.
- the steps shown or described are performed, or they are separately fabricated into individual integrated circuit modules, or a plurality of modules or steps are fabricated as a single integrated circuit module.
- the invention is not limited to any specific combination of hardware and software.
Landscapes
- Engineering & Computer Science (AREA)
- Quality & Reliability (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
L'invention concerne un procédé et un système de commande de ressource de données de déchargement local. Le procédé comprend les opérations suivantes : une passerelle locale (L-GW) envoie une requête de contrôle d'admission à une fonction de commande de politique à large bande (BPCF) après avoir reçu un message de déclenchement ; la BPCF effectue le contrôle d'admission, renvoie à la L-GW un résultat de contrôle d'admission, et dans le cas où le résultat de contrôle d'admission indique une acceptation, délivre à une passerelle de réseau à large bande/serveur d'accès à distance à large bande (BNG/BRAS) une politique de commande dans laquelle une adresse IP de CPE et des informations de qualité de service (QoS) d'autorisation sont au moins incluses ; la L-GW effectue une opération de support conformément au résultat de contrôle d'admission ; et la BNG/BRAS effectue une commande de ressource sur un message de données encapsulé à l'aide de l'adresse IP de CPE conformément aux informations de qualité de service (QoS) d'autorisation. La présente invention résout un problème de commande de ressource dans le développement d'un service de déchargement local par l'intermédiaire d'un UE accédant par un HeNB, de sorte que le service de déchargement local développé par l'UE peut également être garanti en termes de QoS.
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN2011103756958A CN103139915A (zh) | 2011-11-23 | 2011-11-23 | 一种对本地卸载数据进行资源控制的方法和系统 |
| CN201110375695.8 | 2011-11-23 |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| WO2013075580A1 true WO2013075580A1 (fr) | 2013-05-30 |
Family
ID=48469099
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/CN2012/084012 Ceased WO2013075580A1 (fr) | 2011-11-23 | 2012-11-02 | Procédé et système de commande de ressource de données de déchargement local |
Country Status (2)
| Country | Link |
|---|---|
| CN (1) | CN103139915A (fr) |
| WO (1) | WO2013075580A1 (fr) |
Families Citing this family (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN105634980B (zh) * | 2016-01-07 | 2018-10-12 | 北京佰才邦技术有限公司 | 数据报文处理方法及基站 |
| WO2017177381A1 (fr) * | 2016-04-12 | 2017-10-19 | Intel Corporation | Solution de branchement local dans un réseau cellulaire |
Citations (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| WO2011020624A2 (fr) * | 2009-08-20 | 2011-02-24 | Nec Europe Ltd. | Procédé pour contrôler le trafic dans une structure de réseau et structure de réseau |
-
2011
- 2011-11-23 CN CN2011103756958A patent/CN103139915A/zh active Pending
-
2012
- 2012-11-02 WO PCT/CN2012/084012 patent/WO2013075580A1/fr not_active Ceased
Patent Citations (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| WO2011020624A2 (fr) * | 2009-08-20 | 2011-02-24 | Nec Europe Ltd. | Procédé pour contrôler le trafic dans une structure de réseau et structure de réseau |
Non-Patent Citations (2)
| Title |
|---|
| "Local IP Access and Selected IP Traffic Offload (LIPA-SIPTO), (Release 10)", 3RD GENERATION PARTNERSHIP PROJECT (3GPP), TECHNICAL REPORT (TR), 23.829, V10.0.1, 18 October 2011 (2011-10-18) * |
| "Study on Support of BBF Access Interworking (Release 11)", 3RD GENERATION PARTNERSHIP PROJECT (3GPP), TECHNICAL REPORT (TR), 23.839, V0.3.0, 26 October 2010 (2010-10-26) * |
Also Published As
| Publication number | Publication date |
|---|---|
| CN103139915A (zh) | 2013-06-05 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| CN103444148B (zh) | 控制部署的业务检测功能节点的路由选择或绕过的网络节点和方法 | |
| CN102340866B (zh) | 一种上报固网接入信息的方法及系统 | |
| US9544832B2 (en) | Method, apparatus and system for policy control | |
| WO2012065499A1 (fr) | Procédé et système d'établissement d'un contrôle de qualité de service | |
| WO2011079782A1 (fr) | Procédé de commande de politique et de facturation, passerelle et terminal mobile associés | |
| WO2012094957A1 (fr) | Procédé et système pour effecteur une gestion de mobilité sur un terminal mtc | |
| WO2011026392A1 (fr) | Procédé et système d'acquisition de stratégies ditinéraire | |
| WO2012051897A1 (fr) | Système et procédé pour intégrer un réseau fixe avec un réseau mobile | |
| CN102316548A (zh) | 信息传递方法和系统 | |
| WO2012041073A1 (fr) | Procédé et système adaptés pour exécuter un transfert de flux | |
| CN102131240B (zh) | 一种实现服务质量控制的方法及系统 | |
| WO2013082987A1 (fr) | Procédé et système permettant d'effectuer une commande de ressources sur des données allégées locales | |
| CN102098653A (zh) | 一种实现服务质量控制的方法及系统 | |
| WO2012171430A1 (fr) | Procédé d'obtention d'informations de tunnel, passerelle de sécurité (segw) et station de base domestique évoluée/station de base domestique | |
| US20130115914A1 (en) | Control Method for Home Base Station Access and Home Base Station Gateway | |
| WO2012003781A1 (fr) | Procédé et système de contrôle d'admission à un service | |
| WO2014071790A1 (fr) | Procédé, dispositif et système destinés à un contrôle de politique d'une convergence fixe-mobile | |
| WO2013075580A1 (fr) | Procédé et système de commande de ressource de données de déchargement local | |
| WO2012146093A1 (fr) | Procédé et système destinés à réaliser un traitement de service | |
| WO2013159605A1 (fr) | Système, dispositif et procédé de communication | |
| WO2012024997A1 (fr) | Procédé et système adaptés pour contrôler l'admission à un service | |
| WO2011032522A1 (fr) | Système et procédé de mise en œuvre d'accès local | |
| WO2012059043A1 (fr) | Procédé et système de contrôle d'admission à un service | |
| CN102448080B (zh) | 一种通信网络系统以及寻找家庭基站策略网元的方法 | |
| WO2011131064A1 (fr) | Procédé et système de contrôle d'accès à un nœud b domestique (hnb) |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| 121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 12851276 Country of ref document: EP Kind code of ref document: A1 |
|
| NENP | Non-entry into the national phase |
Ref country code: DE |
|
| 122 | Ep: pct application non-entry in european phase |
Ref document number: 12851276 Country of ref document: EP Kind code of ref document: A1 |