CN101795478A - Method for data bypass, network side equipment and access gateway - Google Patents

Method for data bypass, network side equipment and access gateway Download PDF

Info

Publication number
CN101795478A
CN101795478A CN 201010138780 CN201010138780A CN101795478A CN 101795478 A CN101795478 A CN 101795478A CN 201010138780 CN201010138780 CN 201010138780 CN 201010138780 A CN201010138780 A CN 201010138780A CN 101795478 A CN101795478 A CN 101795478A
Authority
CN
China
Prior art keywords
ggsn
request message
apn
service
iad
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN 201010138780
Other languages
Chinese (zh)
Other versions
CN101795478B (en
Inventor
李大伟
曹文利
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Technologies Co Ltd
Original Assignee
Huawei Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co Ltd filed Critical Huawei Technologies Co Ltd
Priority to CN2010101387808A priority Critical patent/CN101795478B/en
Publication of CN101795478A publication Critical patent/CN101795478A/en
Application granted granted Critical
Publication of CN101795478B publication Critical patent/CN101795478B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Mobile Radio Communication Systems (AREA)

Abstract

The embodiment of the invention provides a method for a data bypass, network side equipment and an access gateway. The method for the data bypass comprises the following steps that: the network side equipment receives a first request message sent by user equipment; after determining that an access point name in the first request message is the access point name of an identification bypass service, the network side equipment changes the access point name of the identification bypass service into the access point name pointing to a GGSN; and the network side equipment sends a second request message which carries the access point name pointing to the GGSN to the GGSN so as to establish a channel between the access gateway and the GGSN, wherein the GGSN is the GGSN deployed together with the access gateway or the GGSN integrated with the access gateway. The embodiment of the invention realizes the data bypass supporting function of the access gateway.

Description

The method of data bypass, network equipment and IAD
Technical field
The embodiment of the invention relates to communication technical field, relates in particular to a kind of method, network equipment and IAD of data bypass.
Background technology
Access point (Access Point; Hereinafter to be referred as: AP) be based on fixed the Internet Protocol (InternetProtocol; Hereinafter to be referred as IP) transmission network, provide the network equipment of wireless access service for family or enterprise.
Subscriber equipment (User Equipment; Hereinafter to be referred as: UE) can insert AP by eating dishes without rice or wine, AP is by home gateway (Home Gateway; Hereinafter to be referred as: HGW) insert the IP transmission network, be connected to security gateway (Security Gateway in the mobile core network by the IP transmission network then; Hereinafter to be referred as: SeGW), be connected to IAD (Access Gateway; Hereinafter to be referred as: AG), AG is connected to circuit switching (Circuit Switched then; Hereinafter to be referred as: CS) domain core net and packet switching (Packet Switched; Hereinafter to be referred as: PS) domain core net.
If UE then will be by ggsn (the Gateway General Packet Radio Service Support Node of PS domain core net by the AP access the Internet; Hereinafter to be referred as: GGSN) the Gi interface of network element connects the internet.
Existing data bypass scheme generally all is to realize by the Gi interface that AP provides, and promptly provides Gi interface by AP, and UE visits home network by the Gi interface of AP then, perhaps direct access the Internet; At this moment, the data flow of UE visit home network or internet need not passed through mobile core network, and promptly the data flow of UE visit home network or internet is no longer passed through GGSN and service universal grouping wireless business supporting node (Service General Packet Radio Service SupportNode; Hereinafter to be referred as: SGSN), reached the purpose of data bypass.
But existing data bypass scheme generally all is to realize by the Gi interface that AP provides, and prior art does not provide a kind of method that realizes data bypass by AG; In addition, existing scheme by AP realization data bypass is not supported bypass flow is carried out Lawful intercept, does not support bypass flow is chargeed yet.
Summary of the invention
The embodiment of the invention provides a kind of method, network equipment and IAD of data bypass, supports the function of data bypass to realize IAD.
The embodiment of the invention provides a kind of method of data bypass, comprising:
Network equipment receives first request message that subscriber equipment sends, and described first request message carries the APN of sign pass-through service;
Described network equipment determines that the Access Point Name in described first request message is called after the APN that identifies pass-through service, the APN of described sign pass-through service is revised as the APN of sensing ggsn GGSN;
Described network equipment sends second request message to described GGSN, and described second request message carries the APN of described sensing GGSN, so that set up the tunnel between IAD and the described GGSN; Described GGSN for IAD unite deployment GGSN or with the integrated GGSN of described IAD.
The embodiment of the invention also provides a kind of network equipment, comprising:
Receiver module is used to receive first request message that subscriber equipment sends, and described first request message carries the APN of sign pass-through service;
Determination module, the Access Point Name that is used for first request message of definite described receiver module reception is called the APN that identifies pass-through service;
Modified module, be used for after described determination module determines that the Access Point Name of first request message that described receiver module receives is called the APN that identifies pass-through service, the APN of described sign pass-through service being revised as the APN of sensing ggsn GGSN;
Sending module is used for sending second request message to described GGSN, and described second request message carries the APN of described sensing GGSN, so that set up the tunnel between IAD and the described GGSN; Described GGSN for IAD unite deployment GGSN or with the integrated GGSN of described IAD.
The embodiment of the invention also provides a kind of method of data bypass, comprising:
Receive first request message that service universal grouping wireless business supporting node SGSN sends, described first request message carries the APN of sign pass-through service; Described first request message is that described SGSN receives described first request message that subscriber equipment sends, and determines that Access Point Name in described first request message is called transmission after the APN that identify pass-through service;
Send second request message to ggsn GGSN, described second request message carries the APN of described sign pass-through service;
Receive described GGSN that send with the described second request message corresponding response message, described response message is sent to described SGSN, so that set up the tunnel between IAD and the described GGSN; Described GGSN for IAD unite deployment GGSN or with the integrated GGSN of described IAD.
The embodiment of the invention also provides a kind of IAD, comprising:
The message sink module is used to receive first request message that service universal grouping wireless business supporting node SGSN sends, and described first request message carries the APN of sign pass-through service; Described first request message is that described SGSN receives described first request message that subscriber equipment sends, and determines that Access Point Name in described first request message is called transmission after the APN that identify pass-through service;
Message transmission module is used for sending second request message to ggsn GGSN, and described second request message carries the APN of described sign pass-through service;
Described message sink module, also be used to receive described GGSN that send with the described second request message corresponding response message;
Described message transmission module also is used for described response message is sent to described SGSN, so that set up the tunnel between IAD and the described GGSN; Described GGSN for IAD unite deployment GGSN or with the integrated GGSN of described IAD.
Pass through the embodiment of the invention, IAD or service universal grouping wireless business supporting node determine that the Access Point Name in first request message is called after the APN that identifies pass-through service, send second request message to GGSN, so that set up the tunnel between IAD and the GGSN; Wherein, this GGSN for IAD unite deployment GGSN or with the integrated GGSN of IAD.Thereby IAD bypass flow directly can be sent to IAD unite deployment GGSN or with the integrated GGSN of IAD, by above-mentioned GGSN bypass flow is sent to home network or internet again, realized that IAD supports the function of data bypass, and realized pass-through service is chargeed and/or the function of Lawful intercept.
Description of drawings
In order to be illustrated more clearly in the embodiment of the invention or technical scheme of the prior art, to do one to the accompanying drawing of required use in embodiment or the description of the Prior Art below introduces simply, apparently, accompanying drawing in describing below is some embodiments of the present invention, for those of ordinary skills, under the prerequisite of not paying creative work, can also obtain other accompanying drawing according to these accompanying drawings.
Fig. 1 is the flow chart of the method embodiment one of data bypass of the present invention;
Fig. 2 is the flow chart of the method embodiment two of data bypass of the present invention;
Fig. 3 is the flow chart of the method embodiment three of data bypass of the present invention;
Fig. 4 is the flow chart of the method embodiment four of data bypass of the present invention;
Fig. 5 is the flow chart of the method embodiment five of data bypass of the present invention;
Fig. 6 is the structural representation of network equipment embodiment one of the present invention;
Fig. 7 is the structural representation of IAD embodiment one of the present invention;
Fig. 8 is the schematic diagram of the system embodiment one of data bypass of the present invention.
Embodiment
For the purpose, technical scheme and the advantage that make the embodiment of the invention clearer, below in conjunction with the accompanying drawing in the embodiment of the invention, technical scheme in the embodiment of the invention is clearly and completely described, obviously, described embodiment is the present invention's part embodiment, rather than whole embodiment.Based on the embodiment among the present invention, the every other embodiment that those of ordinary skills are obtained under the prerequisite of not making creative work belongs to the scope of protection of the invention.
Fig. 1 is the flow chart of the method embodiment one of data bypass of the present invention, and as shown in Figure 1, the method for this data bypass can comprise:
Step 101, network equipment receives first request message that subscriber equipment sends, and this first request message carries the APN of sign pass-through service.
In the present embodiment, this first request message can be for activating packet data protocol (Packet DataProtocol; Hereinafter to be referred as: PDP) context request message.
Step 102, network equipment determine that the Access Point Name in this first request message is called after the APN that identifies pass-through service, the APN of sign pass-through service are revised as the APN of sensing GGSN.
Particularly, network equipment can compare the APN of APN in first request message and pre-configured sign pass-through service; If the APN in this first request message is identical with the APN of pre-configured sign pass-through service, can determine that then the Access Point Name in first request message is called the APN that identifies pass-through service.
In the present embodiment, network equipment this locality disposes the IP address corresponding with the APN that points to GGSN, the IP address that this IP address is this GGSN; According to the APN of above-mentioned sensing GGSN, network equipment can obtain the IP address of this GGSN.
In the present embodiment, if no special instructions, GGSN for IAD unite deployment GGSN or with the integrated GGSN of IAD, as shown in Figure 8, the GGSN 85 among Fig. 8 be with IAD unite deployment GGSN or with the integrated GGSN of IAD.Wherein, the GGSN that unites deployment with IAD comprises and the direct-connected GGSN of IAD, perhaps, and the GGSN that is connected by router or switch with IAD.
Step 103, network equipment sends second request message to GGSN, and this second request message carries the APN that points to GGSN, so that set up the tunnel between IAD and this GGSN; Further, also being convenient to this GGSN charges and/or Lawful intercept to pass-through service.
In the present embodiment, network equipment can be SGSN or IAD.When this network equipment is IAD, to GGSN send second request message can for: IAD sends to service universal grouping wireless business supporting node SGSN by the APN that first request message will point to GGSN, so that this SGSN sends second request message according to the APN that points to GGSN to GGSN.Wherein, according to the APN that points to GGSN, SGSN can obtain the IP address of this GGSN, and then SGSN can send second request message to this GGSN according to the IP address of this GGSN.
In the present embodiment, the tunnel between IAD and the GGSN can be a direct tunnel (Directtunnel), and promptly by this tunnel, IAD can directly send to GGSN with bypass flow, and bypass flow does not need to pass through SGSN again like this.
GGSN in the present embodiment can charge and/or Lawful intercept to pass-through service.Particularly, GGSN can add up the charge information of pass-through service, generates call detail record according to this charge information, and by charging gateway function body this call detail record is sent to charge system; And/or,
GGSN can receive the control information of intercepting of Lawful interception gateway transmission, and according to the communication information of intercepting control information listen for user equipment, and the communication information of this subscriber equipment that will listen to sends to above-mentioned Lawful interception gateway; Above-mentionedly intercept control information and comprise and monitor to activate, monitor and close or status poll.
In the present embodiment, above-mentioned second request message can be for creating the PDP Context request message.
In the foregoing description, IAD or SGSN determine that the Access Point Name in first request message is called after the APN that identifies pass-through service, the APN of sign pass-through service is revised as the APN that points to GGSN, and send second request message to GGSN, to set up the tunnel between IAD and the GGSN; Wherein, this GGSN for IAD unite deployment GGSN or with the integrated GGSN of IAD.Thereby IAD bypass flow directly can be sent to IAD unite deployment GGSN or with the integrated GGSN of IAD, by above-mentioned GGSN bypass flow is sent to home network or internet again, realized the function of IAD support data bypass; And the foregoing description has been realized pass-through service is chargeed and/or the function of Lawful intercept.
Fig. 2 is the flow chart of the method embodiment two of data bypass of the present invention, and present embodiment serves as to activate the PDP Context request message with first request message, and second request message is that example describes for creating the PDP Context request message.
As shown in Figure 2, the method for this data bypass can comprise:
Step 201 when UE has business to initiate, sends activation PDP Context request message to AG, and this activation PDP Context request message carries APN (the AccessPoint Name of sign pass-through service; Hereinafter to be referred as: APN) visit pass-through service.
Step 202, the APN that AG determines to activate in the PDP Context request message identifies after the APN of pass-through service, and the APN that identifies pass-through service is revised as the APN that points to GGSN, execution in step 203.
Particularly, AG can compare activating the APN in the PDP Context request message and the APN of pre-configured sign pass-through service; If the APN in this activation PDP Context request message is identical with the APN of pre-configured sign pass-through service, the APN that then can determine to activate in the PDP Context request message is the APN of sign pass-through service.
In the present embodiment, AG this locality disposes the IP address corresponding with the APN that points to GGSN, the IP address that this IP address is this GGSN.
In the present embodiment, if no special instructions, GGSN for AG unite deployment GGSN or with the integrated GGSN of AG, as shown in Figure 8, the GGSN 85 among Fig. 8 be with IAD unite deployment GGSN or with the integrated GGSN of IAD.Wherein, the GGSN that unites deployment with AG comprises the direct-connected GGSN with AG, perhaps, and the GGSN that is connected by router or switch with AG.
In addition, if the APN that AG determines to activate in the PDP Context request message is not the APN of sign pass-through service, then AG can handle this activation PDP Context request message according to normal flow, should activate the PDP Context request message and pass through SGSN, and carry out follow-up flow process according to normal PDP context activation flow process.
Step 203, AG will activate the PDP Context request message and send to SGSN, and this activation PDP Context request message carries the APN that points to GGSN.
Step 204, SGSN carries out the user signing contract information inspection according to the APN that activates in the PDP Context request message; This APN that activates in the PDP Context request message passes through after the user signing contract information inspection of SGSN, and SGSN selects GGSN according to the APN that activates in the PDP Context request message, sends establishment PDP Context request message to the GGSN that selects then.
In the present embodiment, user signing contract information comprises wildcard APN (wild card APN), can be by the user signing contract information inspection of SGSN so activate the APN that points to GGSN in the PDP Context request message.The APN that points to GGSN in activating the PDP Context request message is by after the user signing contract information inspection of SGSN, SGSN can be according to activating the APN that points to GGSN in the PDP Context request message, select with AG unite deployment GGSN or with the integrated GGSN of AG, and, send to the GGSN that selects according to the IP address that obtains then and create the PDP Context request message according to the IP address that the APN that points to GGSN obtains this GGSN.
Step 205, GGSN sends to SGSN and creates the PDP Context response message.
Step 206, optionally, SGSN triggers and sets up RAB (Radio Access Bearer; Hereinafter to be referred as: process RAB).
Step 207, SGSN determines to have opened direct tunnel (Direct tunnel) function, and SGSN sends to GGSN and upgrades the PDP Context request message, so that set up the tunnel between AG and the GGSN.In the present embodiment, the tunnel between AG and the GGSN is a direct tunnel (Direct tunnel), and promptly by this tunnel, AG can directly send to GGSN with bypass flow, and bypass flow does not need to pass through SGSN again like this.
Step 208, GGSN sends to SGSN and upgrades the PDP Context response message.
Step 209, SGSN sends the activation PDP Context to UE and accepts message.
At this moment, AP can send to AG with bypass flow, by AG this bypass flow is sent to GGSN again, by GGSN bypass flow is sent to home network or internet then.
In the foregoing description, the APN that AG determines to activate in the PDP Context request message identifies after the APN of pass-through service, the APN of sign pass-through service is revised as the APN that points to GGSN, and to SGSN forwarding activation PDP Context request message, setting up the tunnel between AG and the GGSN, this GGSN for IAD unite deployment GGSN or with the integrated GGSN of IAD.Thereby IAD bypass flow directly can be sent to IAD unite deployment GGSN or with the integrated GGSN of IAD, by above-mentioned GGSN bypass flow is sent to home network or internet again, realized that AG supports the function of data bypass; And uniting the GGSN of deployment with IAD or can also realize pass-through service is chargeed and/or the function of Lawful intercept in the foregoing description further, with the integrated GGSN of IAD.
Fig. 3 is the flow chart of the method embodiment three of data bypass of the present invention, and present embodiment serves as to activate the PDP Context request message with first request message, and second request message is that example describes for creating the PDP Context request message.
As shown in Figure 3, the method for this data bypass can comprise:
Step 301 when UE has business to initiate, sends activation PDP Context request message to SGSN, and the APN that this activation PDP Context request message carries the sign pass-through service visits pass-through service.
Step 302, the APN that SGSN determines to activate in the PDP Context request message identifies after the APN of pass-through service, the APN that identifies pass-through service is revised as the APN that points to GGSN.
Particularly, SGSN can compare activating the APN in the PDP Context request message and the APN of pre-configured sign pass-through service; If the APN in this activation PDP Context request message is identical with the APN of pre-configured sign pass-through service, the APN that then can determine to activate in the PDP Context request message is the APN of sign pass-through service.
In the present embodiment, SGSN this locality disposes the IP address corresponding with the APN that points to GGSN, the IP address that this IP address is this GGSN.
In the present embodiment, if no special instructions, GGSN for AG unite deployment GGSN or with the integrated GGSN of AG, as shown in Figure 8, the GGSN 85 among Fig. 8 be with IAD unite deployment GGSN or with the integrated GGSN of IAD.Wherein, the GGSN that unites deployment with AG comprises the direct-connected GGSN with AG, perhaps, and the GGSN that is connected by router or switch with AG.
In addition, if the APN that SGSN determines to activate in the PDP Context request message is not the APN of sign pass-through service, then SGSN can handle this activation PDP Context request message according to normal flow, GGSN in core net sends and creates the PDP Context request message, and carries out follow-up flow process according to normal PDP context activation flow process.
Step 303, SGSN carries out the user signing contract information inspection according to the APN that activates in the PDP Context request message; This APN that activates in the PDP Context request message passes through after the user signing contract information inspection of SGSN, and SGSN selects GGSN according to the APN that activates in the PDP Context request message, sends establishment PDP Context request message to the GGSN that selects then.
In the present embodiment, user signing contract information comprises wild card APN, can be by the user signing contract information inspection of SGSN so activate the APN that points to GGSN in the PDP Context request message.APN in activating the PDP Context request message is by after the user signing contract information inspection of SGSN, SGSN can be according to activating the APN that points to GGSN in the PDP Context request message, select with AG unite deployment GGSN or with the integrated GGSN of AG, and, send to the GGSN that selects according to the IP address that obtains then and create the PDP Context request message according to the IP address that the APN that points to GGSN obtains this GGSN.
Step 304, GGSN sends to SGSN and creates the PDP Context response message.
Step 305, optionally, SGSN triggers the process of setting up RAB.
Step 306, SGSN determines to have opened direct tunnelling function, and SGSN sends to GGSN and upgrades the PDP Context request message, to set up the tunnel between AG and the GGSN.In the present embodiment, the tunnel between AG and the GGSN is a direct tunnel, and promptly by this tunnel, AG can directly send to GGSN with bypass flow, and bypass flow does not need to pass through SGSN again like this.
Step 307, GGSN sends to SGSN and upgrades the PDP Context response message.
Step 308, SGSN sends the activation PDP Context to UE and accepts message.
At this moment, AP can send to AG with bypass flow, by AG this bypass flow is sent to GGSN again, by GGSN bypass flow is sent to home network or internet then.
In the foregoing description, the APN that SGSN determines to activate in the PDP Context request message identifies after the APN of pass-through service, the APN of sign pass-through service is revised as the APN that points to GGSN, and to GGSN transmission establishment PDP Context request message, setting up the tunnel between AG and the GGSN, this GGSN for IAD unite deployment GGSN or with the integrated GGSN of IAD.Thereby IAD bypass flow directly can be sent to IAD unite deployment GGSN or with the integrated GGSN of IAD, by above-mentioned GGSN bypass flow is sent to home network or internet again, realized that AG supports the function of data bypass; And uniting the GGSN of deployment with IAD or can also realize pass-through service is chargeed and/or the function of Lawful intercept in the foregoing description further, with the integrated GGSN of IAD.
Fig. 2 of the present invention and the AG that not only realized embodiment illustrated in fig. 3 support the function of data bypass, further, Fig. 2 of the present invention and embodiment illustrated in fig. 3 in, unite the GGSN of deployment with IAD or can also realize pass-through service is carried out Lawful intercept and pass-through service is chargeed, and can realize real time billing with the integrated GGSN of IAD.Particularly, GGSN can add up the charge information of pass-through service, generates call detail record (Calling Detail Records according to this charge information; Hereinafter to be referred as: CDR), GGSN sends to Charging Gateway Functionality (Charging Gateway Function with CDR then; Hereinafter to be referred as: CGF) entity sends to charge system by the CGF entity with this CDR again, thereby realizes pass-through service is chargeed.
In addition, GGSN can receive Lawful interception gateway (Lawful Interception Gateway; Hereinafter to be referred as: what LIG) send intercepts control information, and intercepts the communication information that UE is intercepted in control information according to this, and the communication information of this UE that will listen to sends to LIG; Above-mentionedly intercept control information and comprise and monitor to activate, monitor and close or status poll; Thereby realized pass-through service is carried out Lawful intercept.
Fig. 4 is the flow chart of the method embodiment four of data bypass of the present invention, and as shown in Figure 4, the method for this data bypass can comprise:
Step 401 receives first request message that SGSN sends, and this first request message carries the APN of sign pass-through service; This first request message is that SGSN receives first request message that subscriber equipment sends, and determines that Access Point Name in this first request message is called transmission after the APN that identify pass-through service.
Particularly, SGSN can compare the APN of APN in first request message and pre-configured sign pass-through service; If the APN in first request message is identical with the APN of pre-configured sign pass-through service, then SGSN can determine that the Access Point Name in this first request message is called the APN that identifies pass-through service.Then, SGSN sends to IAD with this first request message.
In the present embodiment, first request message can be for activating the PDP Context request message.
Step 402 sends second request message to GGSN, and this second request message carries the APN of sign pass-through service.
In the present embodiment, if no special instructions, GGSN for IAD unite deployment GGSN or with the integrated GGSN of IAD, as shown in Figure 8.Wherein, the GGSN that unites deployment with IAD comprises and the direct-connected GGSN of IAD, perhaps, and the GGSN that is connected by router or switch with IAD.
Step 403, receive that GGSN sends with the second request message corresponding response message, this response message is sent to SGSN, so that set up the tunnel between IAD and the GGSN.
In the present embodiment, GGSN receives after second request message of IAD transmission, to send to this IAD with this second request message corresponding response message, this IAD can send to SGSN with the response message that receives then, so that set up the tunnel between IAD and the GGSN; Further, also being convenient to this GGSN charges and/or Lawful intercept to pass-through service.
In the present embodiment, the tunnel between IAD and the GGSN is a direct tunnel (Directtunnel), and promptly by this tunnel, IAD can directly send to GGSN with bypass flow, and bypass flow does not need to pass through SGSN again like this.
GGSN in the present embodiment can charge and/or Lawful intercept to pass-through service.Particularly, GGSN can add up the charge information of pass-through service, generates call detail record according to this charge information, and by charging gateway function body this call detail record is sent to charge system; And/or,
GGSN can receive the control information of intercepting of Lawful interception gateway transmission, and intercepts the communication information of control information listen for user equipment according to this, and the communication information of this subscriber equipment that will listen to sends to above-mentioned Lawful interception gateway; Above-mentionedly intercept control information and comprise and monitor to activate, monitor and close or status poll.
In the present embodiment, second request message can be for creating the PDP Context request message.
In the foregoing description, IAD receives after first request message of SGSN transmission, sends second request message to GGSN, to set up the tunnel between IAD and the GGSN; Wherein, first request message is that SGSN determines that Access Point Name in first request message sends after being called the APN that identifies pass-through service, GGSN for IAD unite deployment GGSN or with the integrated GGSN of IAD.Thereby IAD bypass flow directly can be sent to IAD unite deployment GGSN or with the integrated GGSN of IAD, by above-mentioned GGSN bypass flow is sent to home network or internet again, realized the function of IAD support data bypass; And the foregoing description has been realized pass-through service is chargeed and/or the function of Lawful intercept.
Fig. 5 is the flow chart of the method embodiment five of data bypass of the present invention, and present embodiment serves as to activate the PDP Context request message with first request message, and second request message is that example describes for creating the PDP Context request message.
As shown in Figure 5, the method for this data bypass can comprise:
Step 501 when UE has business to initiate, sends activation PDP Context request message to SGSN, and the APN that this activation PDP Context request message carries the sign pass-through service visits pass-through service.
Step 502, SGSN carries out the user signing contract information inspection according to the APN that activates in the PDP Context request message.
In the present embodiment, user signing contract information comprises wild card APN, and the APN that therefore activates in the PDP Context request message can be by the user signing contract information inspection of SGSN.
Step 503, the APN that SGSN determines to activate in the PDP Context request message identifies after the APN of pass-through service, sends to AG and creates the PDP Context request message.
Particularly, SGSN can compare activating the APN in the PDP Context request message and the APN of pre-configured sign pass-through service; If the APN in this activation PDP Context request message is identical with the APN of pre-configured sign pass-through service, the APN that then can determine to activate in the PDP Context request message is the APN of sign pass-through service.After the APN of APN for the sign pass-through service that determines to activate in the PDP Context request message, SGSN sends to AG and creates the PDP Context request message.
In the present embodiment, if no special instructions, GGSN for AG unite deployment GGSN or with the integrated GGSN of AG, as shown in Figure 8, the GGSN 85 among Fig. 8 be with IAD unite deployment GGSN or with the integrated GGSN of IAD.Wherein, the GGSN that unites deployment with AG comprises the direct-connected GGSN with AG, perhaps, and the GGSN that is connected by router or switch with AG.
In addition, if the APN that SGSN determines to activate in the PDP Context request message is not the APN of sign pass-through service, then SGSN can handle this activation PDP Context request message according to normal flow, GGSN in core net sends and creates the PDP Context request message, and carries out follow-up flow process according to normal PDP context activation flow process.
Step 504, AG sends to GGSN and creates the PDP Context request message.
Step 505, GGSN sends to AG and creates the PDP Context response message.
Step 506, AG sends to SGSN and creates the PDP Context response message.
Step 507, optionally, SGSN triggers the process of setting up RAB.
Step 508, direct tunnelling function has been opened in the SGSN judgement, and SGSN sends to AG and upgrades the PDP Context request message, so that set up the tunnel between AG and the GGSN.In the present embodiment, the tunnel between AG and the GGSN is a direct tunnel, and promptly by this tunnel, AG can directly send to GGSN with bypass flow, and bypass flow does not need to pass through SGSN again like this.
Step 509, AG sends to GGSN and upgrades the PDP Context request message.
Step 510, GGSN sends to AG and upgrades the PDP Context response message.
Step 511, AG sends to SGSN and upgrades the PDP Context response message.
Step 512, SGSN sends the activation PDP Context to UE and accepts message.
At this moment, AP can send to AG with bypass flow, by AG this bypass flow is sent to GGSN again, by GGSN bypass flow is sent to home network or internet then.
In the foregoing description, after the APN of APN in the activation PDP Context request message that SGSN determines to receive for the sign pass-through service, send establishment PDP Context request message to AG, AG sends to GGSN and creates the PDP Context request message then, so that set up tunnel between AG and the GGSN, wherein, GGSN for AG unite deployment GGSN or with the integrated GGSN of AG, thereby IAD bypass flow directly can be sent to IAD unite deployment GGSN or with the integrated GGSN of IAD, by above-mentioned GGSN bypass flow is sent to home network or internet again, realized the function of IAD support data bypass; And further, uniting the GGSN of deployment with IAD or can also realize pass-through service is chargeed and/or the function of Lawful intercept in the foregoing description with the integrated GGSN of IAD, wherein, this GGSN charges to pass-through service and/or the operation of Lawful intercept, with Fig. 2 of the present invention and embodiment illustrated in fig. 3 in GGSN pass-through service is chargeed and/or the operation of Lawful intercept identical, do not repeat them here.
One of ordinary skill in the art will appreciate that: all or part of step that realizes said method embodiment can be finished by the relevant hardware of program command, aforesaid program can be stored in the computer read/write memory medium, this program is carried out the step that comprises said method embodiment when carrying out; And aforesaid storage medium comprises: various media that can be program code stored such as ROM, RAM, magnetic disc or CD.
Fig. 6 is the structural representation of network equipment embodiment one of the present invention, network equipment in the present embodiment can be realized the flow process that the present invention is embodiment illustrated in fig. 1, as shown in Figure 6, this network equipment can comprise: receiver module 61, determination module 62, modified module 63 and sending module 64.
Wherein, receiver module 61 is used to receive first request message that subscriber equipment sends, and this first request message carries the APN of sign pass-through service.
Determination module 62, the Access Point Name that is used for first request message of definite receiver module 61 receptions is called the APN that identifies pass-through service; Particularly, determination module 62 can compare the APN of APN in first request message and pre-configured sign pass-through service; If the APN in this first request message is identical with the APN of pre-configured sign pass-through service, can determine that then the Access Point Name in first request message is called the APN that identifies pass-through service.
Modified module 63 is used for the APN of sign pass-through service being revised as the APN of sensing GGSN after determination module 62 determines that the Access Point Name of first request message that receiver module 61 receives is called the APN that identifies pass-through service; In the present embodiment, network equipment this locality disposes the IP address corresponding with the APN that points to GGSN, the IP address that this IP address is this GGSN; According to the APN of above-mentioned sensing GGSN, network equipment can obtain the IP address of this GGSN.
In the present embodiment, if no special instructions, GGSN can for IAD unite deployment GGSN or with the integrated GGSN of IAD, as shown in Figure 8, the GGSN 85 among Fig. 8 be with IAD unite deployment GGSN or with the integrated GGSN of IAD.Wherein, the GGSN that unites deployment with IAD comprises and the direct-connected GGSN of IAD, perhaps, and the GGSN that is connected by router or switch with IAD.
Sending module 64 is used for sending second request message to above-mentioned GGSN, and this second request message carries the APN that points to GGSN, so that set up the tunnel between IAD and the above-mentioned GGSN; Further, also being convenient to this GGSN charges and/or Lawful intercept to pass-through service.
Network equipment in the present embodiment can be SGSN or IAD, when the network equipment is IAD, sending module 64 can send to SGSN by the APN that first request message will point to GGSN, so that this SGSN sends second request message according to the APN that points to GGSN to above-mentioned GGSN.Wherein, according to the APN that points to GGSN, sending module 64 can obtain the IP address of this GGSN, and then sending module 64 can send second request message to this GGSN according to the IP address of this GGSN.
In the present embodiment, the tunnel between IAD and the GGSN is a direct tunnel (Directtunnel), and promptly by this tunnel, IAD can directly send to GGSN with bypass flow, and bypass flow does not need to pass through SGSN again like this.
In the foregoing description, determination module 62 determines that the Access Point Name in first request message is called after the APN that identifies pass-through service, the APN that modified module 63 will identify pass-through service is revised as the APN that points to GGSN, and send second request message to GGSN by sending module 64, to set up the tunnel between IAD and the GGSN, wherein, this GGSN for IAD unite deployment GGSN or with the integrated GGSN of IAD.Thereby IAD bypass flow directly can be sent to IAD unite deployment GGSN or with the integrated GGSN of IAD, by above-mentioned GGSN bypass flow is sent to home network or internet again, realized the function of IAD support data bypass; And the foregoing description has been realized pass-through service is chargeed and/or the function of Lawful intercept.
Fig. 7 is the structural representation of IAD embodiment one of the present invention, and the IAD in the present embodiment can be realized the flow process that the present invention is embodiment illustrated in fig. 4, and as shown in Figure 7, this IAD can comprise: message sink module 71 and message transmission module 72.
Wherein, message sink module 71 is used to receive first request message that SGSN sends, and this first request message carries the APN of sign pass-through service; This first request message is that SGSN receives first request message that subscriber equipment sends, and determines that Access Point Name in this first request message is called transmission after the APN that identify pass-through service;
Message transmission module 72 is used for sending second request message to GGSN, and this second request message carries the APN of sign pass-through service.In the present embodiment, if no special instructions, GGSN for IAD unite deployment GGSN or with the integrated GGSN of IAD, as shown in Figure 8, the GGSN 85 among Fig. 8 be with IAD unite deployment GGSN or with the integrated GGSN of IAD.Wherein, the GGSN that unites deployment with IAD comprises and the direct-connected GGSN of IAD, perhaps, and the GGSN that is connected by router or switch with IAD.
In the present embodiment, message sink module 71 is used to also to receive that GGSN sends and the second request message corresponding response message;
Message transmission module 72 also is used for above-mentioned response message is sent to SGSN, so that set up the tunnel between IAD and the above-mentioned GGSN; Further, also being convenient to this GGSN charges and/or Lawful intercept to pass-through service.
In the present embodiment, the tunnel between IAD and the GGSN is a direct tunnel (Directtunnel), and promptly by this tunnel, IAD can directly send to GGSN with bypass flow, and bypass flow does not need to pass through SGSN again like this.
In the foregoing description, message sink module 71 receives after first request message of SGSN transmission, and message transmission module 72 sends second request message to GGSN, to set up the tunnel between IAD and the GGSN; Wherein, first request message is that SGSN determines that Access Point Name in first request message sends after being called the APN that identifies pass-through service, GGSN for IAD unite deployment GGSN or with the integrated GGSN of IAD.Thereby IAD bypass flow directly can be sent to IAD unite deployment GGSN or with the integrated GGSN of IAD, by above-mentioned GGSN bypass flow is sent to home network or internet again, realized the function of IAD support data bypass; And the foregoing description has been realized pass-through service is chargeed and/or the function of Lawful intercept.
Fig. 8 is the schematic diagram of the system embodiment one of data bypass of the present invention, and as shown in Figure 8, the system of this data bypass can comprise: UE 81, AP 82, AG 83, SGSN 84, a GGSN 85 and the 2nd GGSN 86.
Wherein, a GGSN 85 for AG 83 unite deployment GGSN or with the integrated GGSN of AG 83; Wherein, the GGSN that unites deployment with IAD comprises and the direct-connected GGSN of IAD, perhaps, and the GGSN that is connected by router or switch with IAD; The 2nd GGSN 86 is the GGSN in the core net.
In the present embodiment, UE 81, AP 82, AG 83, SGSN 84, a GGSN 85 and the 2nd GGSN 86 can adopt Fig. 2 of the present invention, Fig. 3 or flow process embodiment illustrated in fig. 5 to carry out alternately.Wherein, AG 83 can realize by the present invention network equipment or the present invention's IAD shown in Figure 7 shown in Figure 6; SGSN 84 can realize by the present invention's network equipment shown in Figure 6.
Need to prove that Fig. 1 of the present invention~content embodiment illustrated in fig. 5 also can be used as replenishing of Fig. 6 of the present invention, Fig. 7 and content embodiment illustrated in fig. 8.
It will be appreciated by those skilled in the art that accompanying drawing is the schematic diagram of a preferred embodiment, module in the accompanying drawing or flow process might not be that enforcement the present invention is necessary.
It will be appreciated by those skilled in the art that the module in the device among the embodiment can be distributed in the device of embodiment according to the embodiment description, also can carry out respective change and be arranged in the one or more devices that are different from present embodiment.The module of the foregoing description can be merged into a module, also can further split into a plurality of submodules.
It should be noted that at last: above embodiment only in order to technical scheme of the present invention to be described, is not intended to limit; Although with reference to previous embodiment the present invention is had been described in detail, those of ordinary skill in the art is to be understood that: it still can be made amendment to the technical scheme that aforementioned each embodiment put down in writing, and perhaps part technical characterictic wherein is equal to replacement; And these modifications or replacement do not make the essence of appropriate technical solution break away from the spirit and scope of various embodiments of the present invention technical scheme.

Claims (12)

1. the method for a data bypass is characterized in that, comprising:
Network equipment receives first request message that subscriber equipment sends, and described first request message carries the APN of sign pass-through service;
Described network equipment determines that the Access Point Name in described first request message is called after the APN that identifies pass-through service, the APN of described sign pass-through service is revised as the APN of sensing ggsn GGSN;
Described network equipment sends second request message to described GGSN, and described second request message carries the APN of described sensing GGSN, so that set up the tunnel between IAD and the described GGSN; Described GGSN for IAD unite deployment GGSN or with the integrated GGSN of described IAD.
2. method according to claim 1 is characterized in that, described network equipment determines that the Access Point Name in described first request message is called the APN that identifies pass-through service and comprises:
Described network equipment compares the APN of APN in described first request message and pre-configured sign pass-through service;
If the APN in described first request message is identical with the APN of described pre-configured sign pass-through service, then described network equipment determines that the Access Point Name in described first request message is called the APN that identifies pass-through service.
3. method according to claim 2 is characterized in that, described network equipment is an IAD;
Described network equipment sends second request message to described GGSN and comprises:
Described IAD sends to service universal grouping wireless business supporting node SGSN by described first request message with the described APN that points to GGSN, so that described SGSN sends described second request message according to the APN of described sensing GGSN to described GGSN.
4. method according to claim 2 is characterized in that, described network equipment is SGSN.
5. method according to claim 1 is characterized in that, also comprises:
Described GGSN adds up the charge information of described pass-through service, generates call detail record according to described charge information, and by charging gateway function body described call detail record is sent to charge system;
And/or,
Described GGSN receives the control information of intercepting of Lawful interception gateway transmission, and intercepts the communication information that described subscriber equipment is intercepted in control information according to described, and the communication information of the described subscriber equipment that will listen to sends to described Lawful interception gateway; Describedly intercept control information and comprise and monitor to activate, monitor and close or status poll.
6. a network equipment is characterized in that, comprising:
Receiver module is used to receive first request message that subscriber equipment sends, and described first request message carries the APN of sign pass-through service;
Determination module, the Access Point Name that is used for first request message of definite described receiver module reception is called the APN that identifies pass-through service;
Modified module, be used for after described determination module determines that the Access Point Name of first request message that described receiver module receives is called the APN that identifies pass-through service, the APN of described sign pass-through service being revised as the APN of sensing ggsn GGSN;
Sending module is used for sending second request message to described GGSN, and described second request message carries the APN of described sensing GGSN, so that set up the tunnel between IAD and the described GGSN; Described GGSN for IAD unite deployment GGSN or with the integrated GGSN of described IAD.
7. network equipment according to claim 6 is characterized in that, described determination module specifically is used for the APN of the APN of described first request message and pre-configured sign pass-through service is compared; If the APN in described first request message is identical with the APN of pre-configured sign pass-through service, determine that then the Access Point Name in described first request message is called the APN that identifies pass-through service.
8. network equipment according to claim 7, it is characterized in that, described sending module specifically is used for when described network equipment is IAD, by described first request message described APN that points to GGSN is sent to service universal grouping wireless business supporting node SGSN, so that described SGSN sends described second request message according to the APN of described sensing GGSN to described GGSN.
9. the method for a data bypass is characterized in that, comprising:
Receive first request message that service universal grouping wireless business supporting node SGSN sends, described first request message carries the APN of sign pass-through service; Described first request message is that described SGSN receives described first request message that subscriber equipment sends, and determines that Access Point Name in described first request message is called transmission after the APN that identify pass-through service;
Send second request message to ggsn GGSN, described second request message carries the APN of described sign pass-through service;
Receive described GGSN that send with the described second request message corresponding response message, described response message is sent to described SGSN, so that set up the tunnel between IAD and the described GGSN; Described GGSN for IAD unite deployment GGSN or with the integrated GGSN of described IAD.
10. method according to claim 9 is characterized in that, described SGSN determines that the Access Point Name in described first request message is called the APN that identifies pass-through service and comprises:
Described SGSN compares the APN of APN in described first request message and pre-configured sign pass-through service;
If the APN in described first request message is identical with the APN of pre-configured sign pass-through service, then described SGSN determines that the Access Point Name in described first request message is called the APN that identifies pass-through service.
11. method according to claim 9 is characterized in that, also comprises:
Described GGSN adds up the charge information of described pass-through service, generates call detail record according to described charge information, and by charging gateway function body described call detail record is sent to charge system;
And/or,
Described GGSN receives the control information of intercepting of Lawful interception gateway transmission, and intercepts the communication information that described subscriber equipment is intercepted in control information according to described, and the communication information of the described subscriber equipment that will listen to sends to described Lawful interception gateway; Describedly intercept control information and comprise and monitor to activate, monitor and close or status poll.
12. an IAD is characterized in that, comprising:
The message sink module is used to receive first request message that service universal grouping wireless business supporting node SGSN sends, and described first request message carries the APN of sign pass-through service; Described first request message is that described SGSN receives described first request message that subscriber equipment sends, and determines that Access Point Name in described first request message is called transmission after the APN that identify pass-through service;
Message transmission module is used for sending second request message to ggsn GGSN, and described second request message carries the APN of described sign pass-through service;
Described message sink module, also be used to receive described GGSN that send with the described second request message corresponding response message;
Described message transmission module also is used for described response message is sent to described SGSN, so that set up the tunnel between IAD and the described GGSN; Described GGSN for IAD unite deployment GGSN or with the integrated GGSN of described IAD.
CN2010101387808A 2010-03-31 2010-03-31 Method for data bypass, network side equipment and access gateway Active CN101795478B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2010101387808A CN101795478B (en) 2010-03-31 2010-03-31 Method for data bypass, network side equipment and access gateway

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2010101387808A CN101795478B (en) 2010-03-31 2010-03-31 Method for data bypass, network side equipment and access gateway

Publications (2)

Publication Number Publication Date
CN101795478A true CN101795478A (en) 2010-08-04
CN101795478B CN101795478B (en) 2012-08-08

Family

ID=42587846

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2010101387808A Active CN101795478B (en) 2010-03-31 2010-03-31 Method for data bypass, network side equipment and access gateway

Country Status (1)

Country Link
CN (1) CN101795478B (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102308603A (en) * 2011-07-12 2012-01-04 华为技术有限公司 Charge mode, network access device and core network device
CN102523313A (en) * 2011-12-09 2012-06-27 华为技术有限公司 Identification method of data bypass and apparatus thereof
WO2012119399A1 (en) * 2011-08-19 2012-09-13 华为技术有限公司 Service bypass method, access network device and security gateway
CN104521188A (en) * 2013-06-28 2015-04-15 华为技术有限公司 Method, apparatus and system for establishing optical bypass
WO2018090658A1 (en) * 2016-11-16 2018-05-24 华为技术有限公司 Data connection method, control plane node and user equipment

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2009055827A1 (en) * 2007-10-25 2009-04-30 Starent Networks, Corp. Interworking gateway for mobile nodes
CN101646205A (en) * 2008-08-05 2010-02-10 华为技术有限公司 Node, method and system for accessing mobile network to public network at high speed
CN101925038A (en) * 2009-06-12 2010-12-22 华为技术有限公司 Data transmission method, communication device and network system

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2009055827A1 (en) * 2007-10-25 2009-04-30 Starent Networks, Corp. Interworking gateway for mobile nodes
CN101646205A (en) * 2008-08-05 2010-02-10 华为技术有限公司 Node, method and system for accessing mobile network to public network at high speed
CN101925038A (en) * 2009-06-12 2010-12-22 华为技术有限公司 Data transmission method, communication device and network system

Cited By (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102308603B (en) * 2011-07-12 2014-01-22 华为技术有限公司 Charge mode and network access device
CN102308603A (en) * 2011-07-12 2012-01-04 华为技术有限公司 Charge mode, network access device and core network device
WO2012106881A1 (en) * 2011-07-12 2012-08-16 华为技术有限公司 Charging method, network access device and core network device
WO2012119399A1 (en) * 2011-08-19 2012-09-13 华为技术有限公司 Service bypass method, access network device and security gateway
CN102726075A (en) * 2011-08-19 2012-10-10 华为技术有限公司 Business by-pass method, access network device and secure gateway
CN102726075B (en) * 2011-08-19 2014-12-03 华为技术有限公司 Business by-pass method, access network device and secure gateway
CN102523313B (en) * 2011-12-09 2015-03-18 华为技术有限公司 Identification method of data bypass and apparatus thereof
WO2013082975A1 (en) * 2011-12-09 2013-06-13 华为技术有限公司 Identification method and device for data bypass
CN102523313A (en) * 2011-12-09 2012-06-27 华为技术有限公司 Identification method of data bypass and apparatus thereof
CN104521188A (en) * 2013-06-28 2015-04-15 华为技术有限公司 Method, apparatus and system for establishing optical bypass
US9736066B2 (en) 2013-06-28 2017-08-15 Huawei Technologies Co., Ltd. Method, apparatus and system for establishing optical bypass
CN104521188B (en) * 2013-06-28 2017-09-05 华为技术有限公司 A kind of methods, devices and systems for setting up light bypass
WO2018090658A1 (en) * 2016-11-16 2018-05-24 华为技术有限公司 Data connection method, control plane node and user equipment
CN108377532A (en) * 2016-11-16 2018-08-07 华为技术有限公司 A kind of data connecting method, control plane node and user equipment
CN108377532B (en) * 2016-11-16 2019-08-06 华为技术有限公司 A kind of data connecting method, control plane node and user equipment
US11290944B2 (en) 2016-11-16 2022-03-29 Huawei Technologies Co., Ltd. Data connection method, control-plane node, and user equipment

Also Published As

Publication number Publication date
CN101795478B (en) 2012-08-08

Similar Documents

Publication Publication Date Title
CN102918919B (en) The system and method for the PDP Context in management wireless data communication network
US9351236B2 (en) UICC carrier switching via over-the-air technology
EP2769558B1 (en) Method and system for enabling shared mobile data usage
JP5963828B2 (en) Multi-channel communication terminal
CN101480103B (en) Method of operating a dual SIM wireless communications device
KR101494068B1 (en) Apparatus and methods for provisioning subscriber identity data in a wireless network
US20160050556A1 (en) Method and relevant apparatus for achieving localized roaming of mobile terminal
US11039299B2 (en) ESIM card activation method, wireless router, and user terminal
CN103430613B (en) For utilizing the system and method for relieving capacity within a wireless communication network
CN102006210B (en) User equipment dial-up networking method, device and system
Keshav Why cell phones will dominate the future internet
CN100486382C (en) Aging processing apparatus and method in communications system
WO2014020237A1 (en) Method and system for communication in different networks
WO2015157933A1 (en) System and methods for dynamic sim provisioning on a dual-sim wireless communication device
CN104412628A (en) Method; apparatuses and computer program product for providing application service platform with access to core network information comprising context data
CN103298161A (en) Communication device and human-computer interface display method thereof
US9439240B1 (en) Mobile communication system identity pairing
CN101540806B (en) Information processing apparatus, data sharing method
CN103392353A (en) Wireless network capacity open system, gateway, agent and method
CN105357143A (en) Forwarding method and service routing relay node
EP3635983B1 (en) Esim profile metadata provisioning
CN101795478B (en) Method for data bypass, network side equipment and access gateway
CN103339976B (en) The method and apparatus of the local gateway assignment in wireless network
CN101925038B (en) Data transmission method, communication device and network system
CN108093387B (en) Enterprise-level Bluetooth network system, central controller, Bluetooth gateway and deployment method

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant