CN102369698A - Method for offloading data stream and traffic offload function entity - Google Patents

Method for offloading data stream and traffic offload function entity Download PDF

Info

Publication number
CN102369698A
CN102369698A CN2010800015789A CN201080001578A CN102369698A CN 102369698 A CN102369698 A CN 102369698A CN 2010800015789 A CN2010800015789 A CN 2010800015789A CN 201080001578 A CN201080001578 A CN 201080001578A CN 102369698 A CN102369698 A CN 102369698A
Authority
CN
China
Prior art keywords
sipto
business
strategies
user equipment
bypass
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN2010800015789A
Other languages
Chinese (zh)
Other versions
CN102369698B (en
Inventor
王爽
王玮
李岩
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen LIAN intellectual property service center
Original Assignee
Huawei Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co Ltd filed Critical Huawei Technologies Co Ltd
Publication of CN102369698A publication Critical patent/CN102369698A/en
Application granted granted Critical
Publication of CN102369698B publication Critical patent/CN102369698B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/2854Wide area networks, e.g. public data networks
    • H04L12/2856Access arrangements, e.g. Internet access
    • H04L12/2869Operational details of access network equipments
    • H04L12/287Remote access server, e.g. BRAS
    • H04L12/2876Handling of subscriber policies

Abstract

The present invention provides a method for offloading data stream and a traffic offload function entity. The method for offloading data stream includes: detecting a signaling establishment message sent by a user equipment, or detecting the data stream sent on the first-time context by the user equipment; obtaining the service information of the user equipment; obtaining the Selected Internet Protocol Traffic Offload (SIPTO) policy corresponding to the service information of the user equipment; offloading the received data stream according to the SIPTO policy. The embodiments of the present invention realize offload processing under the same Access Point Name (APN) according to different services performed by the user equipment.

Description

Method for offloading data stream and traffic offload function entity
The method and business bypass functionality entity technical field of data flow bypass
The present invention relates to the method and business bypass functionality entity of communication technical field, more particularly to a kind of bypass of data flow.Background technology
GPRS( General Packet Radio Service;Hereinafter referred to as:GPRS) by using global system for mobile communications (Global System for Mobile Communications;Hereinafter referred to as:GSM) untapped time division multiple acess access in network( Time Division Multiple Access;Hereinafter referred to as:TDMA) there is provided the data transfer of middling speed for channel.Also, GPRS realizes packet switch by increasing corresponding functional entity and part transformation being carried out to existing base station system.
Mainly include Serving GPRS Support Node in existing GPRS network framework( Service GPRS Support Node;Hereinafter referred to as:) and Gateway GPRS Support Node SGSN( Gateway GPRS Support Node;Hereinafter referred to as:The equipment such as GGSN).
Wherein, SGSN is mainly responsible for mobile management and session management;Mobile management includes the checking for safeguarding mobile management context, management position information and validated user.Session management includes managing packet data agreement(Packet Data Protocol;Hereinafter referred to as:PDP) context;SGSN realizes mobile station( Mobile Station;Hereinafter referred to as:MS) between GGSN business datum route and forwarding capability.
GGSN is mainly responsible for session management.Session management includes management PDP Context and dynamically distributes Internet Protocol (Internet Protocol;Hereinafter referred to as:IP) address;GGSN realizes the route and forwarding capability of business datum between MS and internet.
Select IP service flow bypass (Selected IP Traffic Offload;Hereinafter referred to as:SIPTO it is) a kind of based on the purpose for saving Operator Core Network transmission cost, internet data stream is bypassed close to base station side, the technology of core net is no longer sent to.
But the existing APN that can only be selected according to user of method for carrying out data flow bypass by SIPTO technologies in the gprs networks(Access Point Name;Hereinafter referred to as:APN) determine whether to be bypassed, it is impossible to which the different business carried out according to user under same APN carries out bypass processing.The content of the invention
The embodiment of the present invention provides the method and business bypass functionality entity of a kind of data flow bypass, to realize that the different business carried out under same APN according to user equipment carries out bypass processing.
The embodiment of the present invention provides a kind of method of data flow bypass, including:
Message is set up to the signaling that user equipment is sent to detect, or the data flow sent to the user equipment on context first is detected, obtains the business information of the user equipment;
Obtain selection Internet Protocol Business Stream bypass (SIPTO) strategy corresponding with the business information of the user equipment;
The data flow received is bypassed according to SIPTO strategies.
The embodiment of the present invention also provides a kind of business bypass functionality entity, including:
Detection module, is detected for setting up message to the signaling that user equipment is sent, or the data flow sent to the user equipment on context first is detected, obtains the user equipment Business information;
Tactful acquisition module, for obtaining selection Internet Protocol Business Stream bypass (SIPTO) strategy corresponding with the business information of the user equipment;
Bypass module, the SIPTO strategies for being obtained according to the tactful acquisition module are bypassed to the data flow received.
By the embodiment of the present invention, business bypass functionality entity is obtained after the business information of user equipment, obtains SIPTO strategies corresponding with the business information of the user equipment, then the data flow received is bypassed according to SIPTO strategies.It is achieved thereby that the different business carried out under same APN according to user equipment carries out bypass processing.The accompanying drawing used required in brief description of the drawings embodiment or description of the prior art is briefly described, apparently, drawings in the following description are some embodiments of the present invention, for those of ordinary skill in the art, on the premise of not paying creative work, other accompanying drawings can also be obtained according to these accompanying drawings.
Fig. 1 is the flow chart for the embodiment of the method one that data flow of the present invention is bypassed;
Fig. 2 is the flow chart for the embodiment of the method two that data flow of the present invention is bypassed;
Fig. 3 is the flow chart for the embodiment of the method three that data flow of the present invention is bypassed;
Fig. 4 is the flow chart for the embodiment of the method four that data flow of the present invention is bypassed;
Fig. 5 is the flow chart for the embodiment of the method five that data flow of the present invention is bypassed;
Fig. 6 is the structural representation of business bypass functionality physical embodiment one of the present invention; Fig. 7 is the structural representation of business bypass functionality physical embodiment two of the present invention;Fig. 8 is the structural representation of business bypass functionality physical embodiment three of the present invention;
Fig. 9 is the structural representation for the system embodiment one that data flow of the present invention is bypassed.Embodiment
To make the purpose, technical scheme and advantage of the embodiment of the present invention clearer, below in conjunction with the accompanying drawing in the embodiment of the present invention, technical scheme in the embodiment of the present invention is clearly and completely described, obviously, described embodiment is a part of embodiment of the invention, rather than whole embodiments.Based on the embodiment in the present invention, the every other embodiment that those of ordinary skill in the art are obtained on the premise of creative work is not made belongs to the scope of protection of the invention.
Fig. 1 is the flow chart for the embodiment of the method one that data flow of the present invention is bypassed, as shown in figure 1, the method for data flow bypass can include:
Step 101, the signaling that business bypass functionality entity is sent to user equipment is set up message and detected, or data flow of the user equipment on context first is detected, obtains the business information of the user equipment.
In the present embodiment, above-mentioned signaling sets up the context Activation message first or secondary context activation that message can send for user equipment;Xiao,.
Wherein, PDP Context is the information related to PDP preserved in MS, GGSN, equivalent to GPRS Tunnel Protocol( GPRS Tunnelling Protocol;Hereinafter referred to as:GTP) tunnel describes table, generally also a PDP Context can be referred to as into a GTP tunnel.
PDP context activation is exactly the process for initiating a Packet data service calling, can be initiated, can also be initiated by network side equipment by user equipment.PDP Context is set up first after being activated for the first time Traffic flow template (the Traffic Flow Template of context, first context;Hereinafter referred to as:TFT) information is generally empty or wildcard;Set up initiating once activation first after context, secondary activating can be initiated and set up secondary context, the main purpose for setting up secondary context is with different load-bearing context different service qualities( Quality of Service;Hereinafter referred to as:QoS business).
In the present embodiment, the business information of above-mentioned user equipment includes international mobile subscriber identity (the International Mobile Subscriber Identity of the user equipment;Hereinafter referred to as:IMSI), one or more of APN and TFT.
Step 102, business bypass functionality entity obtains SIPTO strategies corresponding with the business information of the user equipment.
Specifically, business bypass functionality entity the business information of the user equipment can be sent to strategy and charging rule shellfish ' J functions (Policy and Charging Rules Function;Hereinafter referred to as:PCRF) entity, and receive the SIPTO strategies that the PCRF entities are determined according to the signing information of the business information of the user equipment, the configuration information of the PCRF entities, carrier policy and the user equipment;Or, the business information of the user equipment can be sent to PCRF entities by business bypass functionality entity, the title for the SIPTO strategies that the PCRF entities are determined according to the signing information of the business information of the user equipment, the configuration information of the PCRF entities, carrier policy and user equipment is received, the SIPTO strategies of business bypass functionality physically are predefined according to the title activation of SIPTO strategies;Or,
Business bypass functionality entity can be activated according to the signing information of the business information of user equipment, the configuration information of the business bypass functionality entity, carrier policy and user equipment is predefined in the SIPTO strategies of the business bypass functionality physically.
Step 103, business bypass functionality entity is flowed into according to SIPTO strategies to the data received Row bypass.
Specifically, in a kind of implementation of the present embodiment, if business bypass functionality entity obtains above-mentioned SIPTO strategies during the foundation of context first, then the SIPTO strategies first can be bundled on secondary context by the business bypass functionality entity, and the secondary context is set up between the business bypass functionality entity and the user equipment.At this moment, if not having the secondary context for being adapted to bind SIPTO strategies in the secondary context set up, the business bypass functionality entity can initiate to set up the process for the secondary context for being adapted to bind SIPTO strategies;During the secondary context for being adapted to bind SIPTO strategies is set up, when SIPTO strategies indicate to need a pair data flow corresponding with the business information of the user equipment to bypass, the secondary context of above-mentioned suitable binding SIPTO strategies is set up between the user equipment and the business bypass functionality entity.
In another implementation of the present embodiment, if business bypass functionality entity obtains above-mentioned SIPTO strategies during the foundation of secondary context, when SIPTO strategies indicate to need a pair data flow corresponding with the business information of the user equipment to bypass, above-mentioned secondary context is set up between the user equipment and the business bypass functionality entity.
In the above two implementation of the present embodiment, when user equipment is engaged in the above-mentioned secondary enterprising industry of context, business bypass functionality entity can it is determined that radio network controller transmission the data flow encapsulated by tunnel protocol destination address for the business bypass functionality entity address after, bypass the data flow;Wherein, above-mentioned tunnel protocol can be GTP, and certain embodiment of the present invention is not limited to that, above-mentioned tunnel protocol can also be other tunnel protocols, and the tunnel protocol that the embodiment of the present invention is used to above-mentioned data flow in encapsulation is not construed as limiting.
In another implementation of the present embodiment, if business bypass functionality entity obtains above-mentioned SIPTO strategies during the foundation of context first, the business bypass functionality entity can first record this SIPTO strategies;Then, when the user equipment carries out business in above-mentioned context first, the business bypass functionality entity is matched the SIPTO of record strategy with the data flow received, and the Business Stream detection information data flow that the match is successful pair with the SIPTO in tactful is bypassed.
In the present embodiment, SIPTO strategies can at least include Business Stream detection information, can also include one or more of SIPTO instructions, charge information and Qo S information.
In above-described embodiment, business bypass functionality entity is obtained after the business information of user equipment, obtains SIPTO strategies corresponding with the business information of the user equipment, then the data flow received is bypassed according to SIPTO strategies.It is achieved thereby that the different business carried out under same APN according to user equipment carries out bypass processing.
Fig. 2 is the flow chart for the embodiment of the method two that data flow of the present invention is bypassed, as shown in Fig. 2 the method for data flow bypass can include:
Step 201, UE carries out business, sends upstream, the source address of the upstream is SRC1, and destination address is DST1.
Step 202, business bypass functionality( Traffic Offload Function;Hereinafter referred to as:TOF) entity carries out deep-packet detection to the upstream( Deep Packet Inspection;Hereinafter referred to as:), DPI the business information of the UE is obtained.
Step 203, the business information of the UE is sent to PCRF entities by TOF entities.
Specifically, in the present embodiment, the business information of the UE can be sent to PCRF entities by TOF entities by the Tx interfaces between the TOF entities and the PCRF entities.When implementing, TOF entities can pass through credit control request( Credit Control Request;Hereinafter referred to as:CCR) message carries above-mentioned UE business information.
Step 204, PCRF entities match somebody with somebody confidence according to the business information of the UE, the PCRF entities Breath, carrier policy and user-subscribed database (Subscription Profile Repository;Hereinafter referred to as:SPR the UE of this in) signing information determines SIPTO strategies corresponding with the business information of the UE.
Step 205, above-mentioned SIPTO strategies are sent to TOF entities by PCRF entities.
Specifically, in the present embodiment, above-mentioned SIPTO strategies can be sent to TOF entities by PCRF entities by the Tx interfaces between the TOF entities and the PCRF entities.When implementing, PCRF entities can pass through Credit Control Answer( Credit Control Answer;Hereinafter referred to as:CCA) message carries above-mentioned SIPTO strategies.
Step 206, TOF entities load above-mentioned SIPTO strategies.Specifically, because the TFT of secondary context is different, therefore TOF entities can be according to the Business Stream detection information in SIPTO strategies and the TFT of secondary context, the SIPTO strategies are tied on corresponding secondary context, if there is no the secondary context for being adapted to bind SIPTO strategies in the secondary context set up, then the TOF entities are initiated to set up the process for the secondary context for being adapted to bind SIPTO strategies, and then the SIPTO strategies are tied on newly-built secondary context again.During the secondary context for being adapted to bind SIPTO strategies is set up, when SIPTO strategies indicate to need a pair data flow corresponding with the business information of the UE to bypass, TOF entities set up the secondary context of above-mentioned suitable binding SIPTO strategies between the UE and the TOF entities.
Step 207, when UE is engaged in the enterprising industry of secondary context for binding SIPTO strategies, TOF entities determine whether to carry out bypass processing to data stream according to the SIPTO strategies.Specifically, when UE carries out business in the secondary context for binding SIPTO strategies, TOF entities determine radio network controller( Radio Network Controller;Hereinafter referred to as:RNC after) destination address of the data flow for using GTP encapsulation of transmission is the address of the TOF entities, the TOF entities are determined to the number Bypass processing is carried out according to stream, into step 208 step 211;Conversely, after TOF entities determine that the destination address of the data flow of the use GTP encapsulation of RNC transmission is not the address of the TOF entities, the TOF entities determine not carry out bypass processing to the data flow, into step 212 step 215.
Step 208, TOF entities carry out GTP decapsulations to the upstream received, then carry out network address translation (Network Address Translation;Hereinafter referred to as:NAT after) handling, the upstream is routed to packet data network( Packet Data Network;Hereinafter referred to as: PDN ) .TOF entity records NAT table, for subsequently recovering to use during NAT;The NAT list items include the port numbers and address information of the upstream before and after network address translation, and transmit the GTP tunnel information between the RNC of the upstream and SGSN.
Step 209, TOF entities receive the downstream data flow for the business for needing to bypass.
Step 210, TOF entities are matched the five-tuple information of above-mentioned downstream data flow with the five-tuple information in the NAT list items recorded, address and port numbers before carrying out NAT processing are reverted to the destination address and port numbers of the downstream data flow according to the NAT table that the match is successful, then using the GTP tunnel information recorded in NAT table, GTP encapsulation is carried out to the downstream data flow.
Specifically, the NAT table of record includes five-tuple information, and the five-tuple information is source port number, destination slogan, source IP address, purpose IP address and host-host protocol;TOF entities are received after the downstream data flow for the business for needing to bypass, the five-tuple information of the downstream data flow is matched with the five-tuple information in the NAT table recorded, it is determined that with downstream data flow there is the NAT table of identical five-tuple information to be the NAT table that the match is successful;Then, TOF entities can just revert to the destination address and port numbers of the downstream data flow according to the NAT table that the match is successful address and the port numbers before carrying out NAT processing.
Step 211, TOF entities send the downstream data flow carried out after GTP encapsulation by RNC To UE.
Step 212, for upstream, the upstream that need not carry out bypassing processing is pass-through to SGSN by TOF entities, then the upstream is sent into GGSN by SGSN.
Step 213, the upstream is routed to PDN by GGSN by Gi interfaces.
Step 214, GGSN receives downstream data flow.
Step 215, above-mentioned downstream data flow is sent to UE by GGSN by GTP tunnel by SGSN and RNC.
In addition, in another implementation of the present embodiment, if TOF entities obtain SIPTO strategies during the foundation of context first, then the TOF entities can record above-mentioned SIPTO strategies, when the UE carries out business in above-mentioned context first, the TOF entities are matched the SIPTO strategies of record with the five-tuple information of the data flow received, it is determined that pair with the SIPTO strategy in the Business Stream detection information data flow that the match is successful carry out bypass processing, perform step 208 step 211;Conversely, the TOF entities are matched the SIPTO of record strategy with the data flow received, it is determined that pair with Business Stream detection information the data flows that it fails to match of the SIPTO in tactful without bypassing, execution step 212 step 215.
Specifically, Business Stream detection information in SIPTO strategies includes five-tuple information, that is the source port number of Business Stream, destination slogan, source IP address, purpose IP address and host-host protocol, TOF entities are received after data flow, the five-tuple information that Business Stream detection information includes in SIPTO strategies is matched with the five-tuple information of the data flow received, if the data flow received has identical five-tuple information with Business Stream detection information, the match is successful with the Business Stream detection information in the SIPTO strategies of record for the data flow that then determination of TOF entities is received, need to bypass the data flow that this is received;, whereas if the five-tuple information of the data flow received and Business Stream detection information Difference, then it fails to match with the Business Stream detection information in the SIPTO strategies of record for the data flow that the determination of TOF entities is received, it is not necessary to which the data flow that this is received is bypassed.
In above-described embodiment, TOF entities to the data flow that UE is sent by detecting, after the business information for obtaining the UE, the business information of the UE is sent to PCRF entities, and SIPTO corresponding with the business information of the user equipment strategies of PCRF entities transmission are received, then the data flow received is bypassed according to SIPTO strategies.It is achieved thereby that carrying out bypass processing according to the UE different business carried out under same APN.
Fig. 3 is the flow chart for the embodiment of the method three that data flow of the present invention is bypassed, as shown in figure 3, the method for data flow bypass can include:
Step 301, UE sends Context activation request first.
Step 302, TOF entities intercept this first after Context activation request, and to this, Context activation request is detected first, obtains APN, IMSI, IP connection access network (IP-Connectivity Access Network of the UE;Hereinafter referred to as:IP-CAN) type and wireless access technology( Radio Access Technology;Hereinafter referred to as:RAT) type, and the UE purpose station address( End User Address ) .
Step 303, TOF entities send CCR message to PCRF entities, and the CCR message carries APN, IMSI, IP-CAN type and RAT types of the UE, and the UE End User Address, initiate to create the process of Tx sessions.
Wherein, the Tx is the interface between TOF entities and PCRF entities.
Step 304, the title of one or one group predefined SIPTO strategy is sent to TOF entities by PCRF entities according to the information carried in CCR message by CCA message.
Specifically, PCRF entities can be installed by the charging regulation of CCA message (Charging-Rule-Install) the charging regulation title in field() or charging regulation basic designation Charging-Rule-Name(), Charging-Rule-Base-Name the title of one or one group predefined SIPTO strategy is sent to TOF entities.
Step 305, TOF entities will be sent to SGSN by Context activation request first.
Step 306, SGSN sends PDP Context to GGSN and sets up request, and IP-CAN sessions are set up in triggering.
Step 307, IP-CAN session establishments process.
Step 308, GGSN sends PDP Context to SGSN and sets up response.
Step 309, SGSN sends context activation first to UE and responded.
Step 310, the title activation for the SIPTO strategies that TOF entities are sent according to PCRF entities is predefined in the SIPTO strategies of the TOF physically.
Step 311, TOF entities load above-mentioned SIPTO strategies.Specifically, the TOF entities can perform bearing binding, the SIPTO strategies are tied on secondary context, if not having the secondary context for being adapted to bind SIPTO strategies in the secondary context set up, the TOF entities initiate to set up the process for the secondary context for being adapted to bind SIPTO strategies.During the secondary context for being adapted to bind SIPTO strategies is set up, when SIPTO strategies indicate to need a pair data flow corresponding with the business information of the UE to bypass, the secondary context of above-mentioned suitable binding SIPTO strategies is set up between the UE and the TOF entities;When SIPTO strategies indicate not needing a pair data flow corresponding with the business information of the UE to bypass, the secondary context of above-mentioned suitable binding SIPTO strategies is set up between the UE and GGSN.
Step 312, when UE carries out business in above-mentioned secondary context, TOF entities determine whether to bypass data stream.Specifically, when UE carries out business in above-mentioned secondary context, TOF Entity determine RNC transmission GTP encapsulation data flow destination address for the TOF entities address after, the TOF entities determine to the data flow carry out bypass processing;Conversely, after TOF entities determine that the destination address of the data flow of the GTP encapsulation of RNC transmission is not the address of the TOF entities, the TOF entities determine not carry out bypass processing to the data flow.
In addition, in another implementation of the present embodiment, in step 310, the activation of TOF entities is predefined in after the SIPTO strategies of the TOF physically, the TOF entities can record above-mentioned SIPTO strategies, when the UE carries out business in above-mentioned context first, the TOF entities are matched the SIPTO of record strategy with the five-tuple information of the data flow received, it is determined that the Business Stream detection information data flow that the match is successful the progress bypass processing pair with the SIPTO in tactful;Conversely, the TOF entities are matched the SIPTO of record strategy with the data flow received, it is determined that pair with Business Stream detection information the data flows that it fails to match of the SIPTO in tactful without bypassing.
Specifically, when the Business Stream detection information in SIPTO strategies is matched with the data flow received, the method that can be provided using embodiment illustrated in fig. 2 of the present invention, no longer Redundant is stated herein.
In the present embodiment, the TOF entities determine carry out bypass processing after the step of it is identical with Fig. 2 illustrated embodiment steps 208 step 211 of the present invention, no longer Redundant is stated herein;The step of TOF entities are determined not to after data flow progress bypass processing is identical with embodiment illustrated in fig. 2 step 212 step 215 of the present invention, and no longer Redundant is stated herein.
In above-described embodiment, TOF entities are detected by the Context activation request first sent to UE, after the business information for obtaining the UE, the business information of the UE is sent to PCRF entities, and receive the title of SIPTO corresponding with the business information of the UE strategies of PCRF entities transmission, the SIPTO strategies of the TOF physically are predefined according to the title activation of SIPTO strategies, then the data flow received bypassed according to SIPTO strategies.It is achieved thereby that same Bypass processing is carried out according to the UE different business carried out under one APN.
Fig. 4 is the flow chart for the embodiment of the method four that data flow of the present invention is bypassed, as shown in figure 4, the method for data flow bypass can include:
Step 401, UE sends secondary Context activation request.
Step 402, after TOF intercepts the secondary Context activation request, the secondary Context activation request is detected, the TFT information of the UE is obtained.
Step 403, the TFT information of the UE is sent to PCRF entities by TOF entities by CCR message.
Step 404, PCRF entities determine SIPTO strategies corresponding with the TFT information of the UE according to the signing information of the UE in the TFT information of the UE, the configuration information of the PCRF entities, carrier policy and SPR.
In the present embodiment, TFT information is Business Stream template information, includes packet filter information.Step 405, above-mentioned SIPTO strategies are sent to TOF entities by PCRF entities by CCA message.
If indicating that the corresponding data flow of TFT information of the UE need not be bypassed in SIPTO strategies, into step 406 step 411;If indicating that the corresponding data flow of TFT information of the UE needs to be bypassed in SIPTO strategies, into step 412 step 413.
Step 406, the UE secondary Context activation requests sent are sent to SGSN by TOF entities.Step 407, SGSN sends secondary context to GGSN and sets up request.
Step 408, GGSN initiates IP-CAN session modification flows.
Step 409, GGSN sends secondary context to SGSN and sets up response.
Step 410, RAB(Radio Access Bearer;Hereinafter referred to as:RAB) build It is vertical.
Step 411, SGSN sends secondary context activation to UE and responded.
Step 412, TOF entities initiate to set up RAB process.
Step 413, TOF entities are replied secondary context activation to UE and responded.
So far, secondary context is established between UE the and TOF entities.In this case, subsequently when UE carries out business in the secondary context, after TOF entities determine the destination address of the data flow of the GTP encapsulation of RNC transmission for the address of the TOF entities, the TOF entities determine to carry out bypass processing to the data flow.
In above-described embodiment, TOF entities are detected by the secondary Context activation request sent to UE, after the TFT information for obtaining the UE, the TFT information of the UE is sent to PCRF entities, and SIPTO corresponding with the business information of the user equipment strategies of PCRF entities transmission are received, then the data flow received is bypassed according to SIPTO strategies.It is achieved thereby that carrying out bypass processing according to the UE different business carried out under same APN.
Fig. 5 is the flow chart for the embodiment of the method five that data flow of the present invention is bypassed, as shown in figure 5, the method for data flow bypass can include:
Step 501, UE sends Context activation request first.
Step 502, TOF entities intercept and capture this first after Context activation request, and to this, Context activation request is detected first, obtains the business information of the UE.
Step 503, TOF by this first Context activation request be sent to SGSN.
Step 504, SGSN sends PDP Context to GGSN and sets up request.
Step 505, GGSN is set up after context first, is replied PDP Context to SGSN and is set up response. Step 506, SGSN sends context activation first to UE and responded.
Step 507, after the response of context activation first that TOF entity detections are sent to SGSN to UE, TOF entities are activated according to the business information of the UE, the configuration information of TOF entities, carrier policy and the UE signing information is predefined in the SIPTO strategies of the TOF physically.
Step 508, TOF performs bearing binding, the SIPTO strategies are tied on secondary context, if not having the secondary context for being adapted to bind SIPTO strategies in the secondary context set up, the TOF entities initiate to set up the process for the secondary context for being adapted to bind SIPTO strategies.During the secondary context for being adapted to bind SIPTO strategies is set up, when SIPTO strategies indicate to need a pair data flow corresponding with the business information of the UE to bypass, the secondary context of above-mentioned suitable binding SIPTO strategies is set up between the UE and the TOF entities.
Step 509, when UE is engaged in the enterprising industry of secondary context of above-mentioned binding SIPTO strategies, TOF entities determine whether to carry out bypass processing to data stream according to the SIPTO strategies.Specifically, when UE carries out business in the secondary context of above-mentioned binding SIPTO strategies, TOF entities determine RNC transmission use GTP encapsulate data flow destination address for the address of the TOF entities after, the TOF entities determine to carry out bypass processing to the data flow, subsequent step is identical with Fig. 2 illustrated embodiment steps 208 step 211 of the present invention, and no longer Redundant is stated herein;It is on the contrary, after TOF entities determine that the destination address of the data flow of the use GTP encapsulation of RNC transmission is not the address of the TOF entities, the TOF entities determine not carry out bypass processing to the data flow, subsequent step is identical with embodiment illustrated in fig. 2 step 212 step 215 of the present invention, and no longer Redundant is stated herein.
In addition, in another implementation of the present embodiment, in step 507, the activation of TOF entities is predefined in after the SIPTO strategies of the TOF physically, the TOF entities can record above-mentioned SIPTO strategies, when the UE carries out business in above-mentioned context first, the TOF entities will be recorded SIPTO strategy matched with the five-tuple information of the data flow received, it is determined that pair with the SIPTO strategy in the Business Stream detection information data flow that the match is successful carry out bypass processing, subsequent step is identical with embodiment illustrated in fig. 2 step 208 step 211 of the present invention, and no longer Redundant is stated herein;It is on the contrary, the TOF entities are matched the SIPTO strategies of record with the data flow received, it is determined that pair with the SIPTO strategy in the Business Stream detection information data flow that it fails to match without bypass, subsequent step is identical with embodiment illustrated in fig. 2 step 212 step 215 of the present invention, and no longer Redundant is stated herein.
Specifically, when the Business Stream detection information in SIPTO strategies is matched with the data flow received, the method that can be provided using embodiment illustrated in fig. 2 of the present invention, no longer Redundant is stated herein.
In above-described embodiment, TOF entities are detected by the Context activation request first sent to UE, after the business information for obtaining the UE, activation is predefined in SIPTO strategies corresponding with the business information of the UE in the TOF entities, and then the data flow received is bypassed according to SIPTO strategies.It is achieved thereby that carrying out bypass processing according to the UE different business carried out under same APN.
One of ordinary skill in the art will appreciate that:Realizing all or part of step of above method embodiment can be completed by the related hardware of programmed instruction, foregoing program can be stored in a computer read/write memory medium, the program upon execution, performs the step of including above method embodiment;And foregoing storage medium includes:ROM, RAM, magnetic disc or CD etc. are various can be with the medium of store program codes.
Fig. 6 is that the business bypass functionality entity in the structural representation of business bypass functionality physical embodiment one of the present invention, the present embodiment can realize the flow of embodiment illustrated in fig. 1 of the present invention, as shown in fig. 6, the business bypass functionality entity can include:Detection module 61, tactful acquisition module 62 and bypass module 63. Wherein, detection module 61, the signaling of transmission is set up message and detected during for carrying out business to user equipment, or the data flow sent to user equipment when the enterprising industry of context first is engaged in is detected, obtains the business information of the user equipment;
Tactful acquisition module 62, for obtaining SIPTO strategies corresponding with the business information of the user equipment;Specifically, the business information of the user equipment can be sent to "Policy and Charging Rules Function entity by tactful acquisition module 62, and receive the SIPTO strategies that the "Policy and Charging Rules Function entity is sent according to the signing information of the business information of user equipment, the configuration information of the "Policy and Charging Rules Function entity, carrier policy and the user equipment;Or, the business information of user equipment can be sent to "Policy and Charging Rules Function entity by tactful acquisition module 62, the title for the SIPTO strategies that the "Policy and Charging Rules Function entity is determined according to the signing information of the business information of the user equipment, the configuration information of the "Policy and Charging Rules Function entity, carrier policy and the user equipment is received, the SIPTO strategies of business bypass functionality physically are predefined according to the title activation of SIPTO strategies;Or, tactful acquisition module 62 can be activated according to the signing information of the business information of the user equipment, the configuration information of the business bypass functionality entity, carrier policy and the user equipment is predefined in the SIPTO strategies of the business bypass functionality physically.
Bypass module 63, the SIPTO strategies for being obtained according to tactful acquisition module 62 are bypassed to the data flow received.
Fig. 7 is the structural representation of business bypass functionality physical embodiment two of the present invention, and compared with the business bypass functionality entity shown in Fig. 6, difference is, the business bypass functionality entity shown in Fig. 7 can also include:Binding module 64 and first sets up module 65;Or, the business bypass functionality entity shown in Fig. 7 can also include:Second sets up module 66;Or, the business bypass functionality entity shown in Fig. 7 can also include:Binding module 64, first set up module 65 and second and set up module 66. Wherein, binding module 64, after SIPTO strategies are obtained during the foundation of context first in tactful acquisition module 62, the SIPTO strategies are bundled on secondary context, the secondary context is set up between business bypass functionality entity and user equipment.If not having the secondary context for being adapted to the above-mentioned SIPTO strategies of binding in the secondary context set up, first, which sets up module 65, initiates to set up the process for the secondary context for being adapted to the above-mentioned SIPTO strategies of binding;When SIPTO strategies indicate to need a pair data flow corresponding with the business information of the user equipment to bypass, the secondary context of suitable binding SIPTO strategies is set up between the user equipment and the business bypass functionality entity.
Second sets up module 66, for obtaining SIPTO strategies during the foundation of secondary context in tactful acquisition module 62, and when SIPTO strategies indicate to need a pair data flow corresponding with the business information of the user equipment to bypass, secondary context is set up between the user equipment and the business bypass functionality entity.
In the present embodiment, bypass module 63 can specifically work as the user equipment when secondary context carries out business, it is determined that radio network controller transmission the data flow encapsulated by tunnel protocol destination address for the business bypass functionality entity address after, bypass the data flow.
Fig. 8 is the structural representation of business bypass functionality physical embodiment three of the present invention, and compared with the business bypass functionality entity shown in Fig. 6, difference is, the business bypass functionality entity shown in Fig. 8 can also include:Logging modle 67.
Wherein, logging modle 67 is used for after tactful acquisition module 62 obtains SIPTO strategies during the foundation of context first, records SIPTO strategies;
At this moment, bypass module 63 can work as the user equipment when above-mentioned context first carries out business, and data flow of the SIPTO strategies that logging modle 67 is recorded with receiving is matched, pair and this The Business Stream detection information data flow that the match is successful in SIPTO strategies is bypassed.
In above-mentioned business bypass functionality entity, detection module 61 is obtained after the business information of user equipment, tactful acquisition module 62 obtains SIPTO strategies corresponding with the business information of the user equipment, and then bypass module 63 is bypassed according to SIPTO strategies to the data flow received.It is achieved thereby that the different business carried out under same APN according to user equipment carries out bypass processing.
Fig. 9 is the structural representation for the system embodiment one that data flow of the present invention is bypassed, as shown in figure 9, the system of data flow bypass can include:UE 91, node B (Node B) 92, RNC 93, TOF entities 94, SGSN 95, GGSN 96 and PCRF entities 97.
Wherein, TOF entities 94 can set up message to the signalings sent of UE 91 and detect, or the data flows sent on context first of UE 91 are detected, obtain the business information of the user equipment;And after acquisition SIPTO strategies corresponding with UE 91 business information, the data flow received is bypassed according to SIPTO strategies.Specifically, TOF entities 94 can be realized by the business bypass functionality entity shown in Fig. 6, Fig. 7 or Fig. 8 of the present invention.
In the present embodiment, increase Tx interfaces newly between TOF entities 94 and PCRF entities 97, TOF entities 94 can by the Tx interfaces to PCRF entities 97 ask SIPTO strategy, PCRF entities 97 can by Tx interfaces to TOF entities 94 issue SIPTO strategy.
In the present embodiment, the interaction between UE 91, Node B 92, RNC 93, TOF entities 94, SGSN 95, GGSN 96 and PCRF entities 97 can be using the flow shown in Fig. 2, Fig. 3, Fig. 4 or Fig. 5 of the present invention, and no longer Redundant is stated herein.
In the system of above-mentioned data flow bypass, TOF entities 94 are obtained after the business information of user equipment, obtain SIPTO strategies corresponding with the business information of the user equipment, then the data flow received is bypassed according to SIPTO strategies.It is achieved thereby that being set under same APN according to user The standby different business carried out carries out bypass processing.
It will be appreciated by those skilled in the art that accompanying drawing is the schematic diagram of a preferred embodiment, the module or flow in accompanying drawing are not necessarily implemented necessary to the present invention.
It will be appreciated by those skilled in the art that the module in device in embodiment can carry out being distributed in the device of embodiment according to embodiment description, respective change can also be carried out and be disposed other than in one or more devices of the present embodiment.The module of above-described embodiment can be merged into a module, can also be further split into multiple submodule.
Finally it should be noted that:The above embodiments are merely illustrative of the technical solutions of the present invention, rather than its limitations;Although the present invention is described in detail with reference to the foregoing embodiments, it will be understood by those within the art that:It can still modify to the technical scheme described in foregoing embodiments, or carry out equivalent substitution to which part technical characteristic;And these modifications or replacement, the essence of appropriate technical solution is departed from the spirit and scope of various embodiments of the present invention technical scheme.

Claims (13)

  1. Claim
    1st, a kind of method of data flow bypass, it is characterised in that including:
    Message is set up to the signaling that user equipment is sent to detect, or the data flow sent to the user equipment on context first is detected, obtains the business information of the user equipment;Obtain selection Internet Protocol Business Stream bypass corresponding with the business information of the user equipment
    (SIPTO) it is tactful;
    The data flow received is bypassed according to SIPTO strategies.
    2nd, according to the method described in claim 1, it is characterised in that described to obtain selection Internet Protocol Business Stream bypass corresponding with the business information of the user equipment(SIPTO) strategy includes:The business information of the user equipment is sent to "Policy and Charging Rules Function entity, the SIPTO strategies that the "Policy and Charging Rules Function entity is determined according to the signing information of the business information of the user equipment, the configuration information of the "Policy and Charging Rules Function entity, carrier policy and the user equipment are received;Or,
    The business information of the user equipment is sent to "Policy and Charging Rules Function entity, the title for the SIPTO strategies that the "Policy and Charging Rules Function entity is determined according to the signing information of the business information of the user equipment, the configuration information of the "Policy and Charging Rules Function entity, carrier policy and the user equipment is received, the SIPTO strategies of business bypass functionality physically are predefined according to the title activation of SIPTO strategies;Or,
    Activated according to the signing information of the business information of the user equipment, the configuration information of business bypass functionality entity, carrier policy and the user equipment and be predefined in the SIPTO strategies of the business bypass functionality physically. 3rd, according to the method described in claim 1, it is characterised in that it is described the data flow that receives is bypassed according to SIPTO strategies before, in addition to:
    If obtaining the SIPTO strategies during the foundation of context first, the SIPTO strategies are bundled on secondary context, the secondary context is set up between business bypass functionality entity and the user equipment.
    4th, method according to claim 3, it is characterised in that it is described the SIPTO strategies are bundled on secondary context before, in addition to:
    If there is no the secondary context for being adapted to the binding SIPTO strategies in the secondary context set up, initiate to set up the process for the secondary context for being adapted to the binding SIPTO strategies;
    When SIPTO strategies indicate to need a pair data flow corresponding with the business information of the user equipment to bypass, the secondary context of the suitable binding SIPTO strategies is set up between the user equipment and the business bypass functionality entity.
    5th, according to the method described in claim 1, it is characterised in that it is described the data flow that receives is bypassed according to SIPTO strategies before, in addition to:
    If obtaining the SIPTO strategies during the foundation of secondary context, when SIPTO strategies indicate to need a pair data flow corresponding with the business information of the user equipment to bypass, the secondary context is set up between the user equipment and the business bypass functionality entity.
    6th, the method according to claim 3 or 5, it is characterised in that described to be included according to SIPTO strategies to the data flow progress bypass received:
    When the user equipment is in the enterprising industry business of the secondary context, it is determined that the destination address of the data flow encapsulated by tunnel protocol of radio network controller transmission for the address of the business bypass functionality entity after, bypass the data flow. 7th, according to the method described in claim 1, it is characterised in that it is described the data flow that receives is bypassed according to SIPTO strategies before, in addition to:
    If obtaining the SIPTO strategies during the foundation of context first, the SIPTO strategies are recorded.
    8th, method according to claim 7, it is characterised in that described to be included according to SIPTO strategies to the data flow progress bypass received:
    When the user equipment is in the business of the context first enterprising industry, matched the SIPTO is tactful with the data flow received, the Business Stream detection information data flow that the match is successful pair with the SIPTO in tactful is bypassed.
    9th, a kind of business bypass functionality entity, it is characterised in that including:
    Detection module, is detected for setting up message to the signaling that user equipment is sent, or the data flow sent to the user equipment on context first is detected, obtains the business information of the user equipment;
    Tactful acquisition module, for obtaining selection Internet Protocol Business Stream bypass corresponding with the business information of the user equipment(SIPTO it is) tactful;
    Bypass module, the SIPTO strategies for being obtained according to the tactful acquisition module are bypassed to the data flow received.
    10th, business bypass functionality entity according to claim 9, it is characterized in that, the tactful acquisition module receives the SIPTO strategies that the "Policy and Charging Rules Function entity is determined according to the signing information of the business information of the user equipment, the configuration information of the "Policy and Charging Rules Function entity, carrier policy and the user equipment specifically for the business information of the user equipment is sent into "Policy and Charging Rules Function entity;Or, The tactful acquisition module by the business information of the user equipment specifically for being sent to "Policy and Charging Rules Function entity, the title for the SIPTO strategies that the "Policy and Charging Rules Function entity is determined according to the signing information of the business information of the user equipment, the configuration information of the "Policy and Charging Rules Function entity, carrier policy and the user equipment is received, the SIPTO strategies of business bypass functionality physically are predefined according to the title activation of SIPTO strategies;Or,
    The tactful acquisition module is predefined in the SIPTO strategies of the business bypass functionality physically specifically for the signing information activation of the business information according to the user equipment, the configuration information of business bypass functionality entity, carrier policy and the user equipment.
    11st, business bypass functionality entity according to claim 9, it is characterised in that also include:Binding module, after the SIPTO strategies are obtained during the foundation of context first in the tactful acquisition module, the SIPTO strategies are bundled on secondary context, the secondary context is set up between business bypass functionality entity and the user equipment.
    12nd, business bypass functionality entity according to claim 11, it is characterised in that also include:
    First sets up module, for described without binding is adapted in the secondary context set up
    During the secondary context of SIPTO strategies, initiate to set up the process for the secondary context for being adapted to the binding SIPTO strategies;When SIPTO strategies indicate to need a pair data flow corresponding with the business information of the user equipment to bypass, the secondary context of the suitable binding SIPTO strategies is set up between the user equipment and the business bypass functionality entity.
    13rd, business bypass functionality entity according to claim 9, it is characterised in that also include:Second sets up module, for obtaining the SIPTO strategies during being set up in the tactful acquisition module in secondary context, and when SIPTO strategies indicate needs pair and the user equipment When the corresponding data flow of business information is bypassed, the secondary context is set up between the user equipment and the business bypass functionality entity.
    14th, the business bypass functionality entity according to claim 11 or 13, it is characterized in that, the bypass module is specifically for when the user equipment is engaged in the secondary enterprising industry of context, it is determined that the destination address of the data flow encapsulated by tunnel protocol of radio network controller transmission for the address of the business bypass functionality entity after, bypass the data flow.
    15th, business bypass functionality entity according to claim 9, it is characterised in that also include:Logging modle, after the SIPTO strategies are obtained during the foundation of context first in the tactful acquisition module, records the SIPTO strategies.
    16th, business bypass functionality entity according to claim 15, it is characterized in that, the bypass module is specifically for when the user equipment carries out business in the context first, SIPTO that the logging modle is recorded is tactful to be matched with the data flow received, pair is bypassed with the Business Stream detection information data flow that the match is successful in SIPTO strategies.
CN201080001578.9A 2010-05-31 2010-05-31 Method for offloading data stream and traffic offload function entity Expired - Fee Related CN102369698B (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2010/073388 WO2011150546A1 (en) 2010-05-31 2010-05-31 Method for offloading data stream and traffic offload function entity

Publications (2)

Publication Number Publication Date
CN102369698A true CN102369698A (en) 2012-03-07
CN102369698B CN102369698B (en) 2014-03-12

Family

ID=45066106

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201080001578.9A Expired - Fee Related CN102369698B (en) 2010-05-31 2010-05-31 Method for offloading data stream and traffic offload function entity

Country Status (2)

Country Link
CN (1) CN102369698B (en)
WO (1) WO2011150546A1 (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2813096B1 (en) * 2012-02-07 2019-10-23 Nokia Technologies Oy Method and apparatus for autonomous operation in cellular-based local area networks

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101202702A (en) * 2006-12-12 2008-06-18 华为技术有限公司 Network flow quantity shunting method and network device
CN101212391A (en) * 2006-12-25 2008-07-02 上海贝尔阿尔卡特股份有限公司 Traffic splitting method and device, and service type reporting method and device
JP2009253431A (en) * 2008-04-02 2009-10-29 Alcatel-Lucent Usa Inc METHOD FOR OFF-LOADING PS TRAFFIC IN UMTS FEMTO CELL SOLUTION HAVING Iu INTERFACE

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101202702A (en) * 2006-12-12 2008-06-18 华为技术有限公司 Network flow quantity shunting method and network device
CN101212391A (en) * 2006-12-25 2008-07-02 上海贝尔阿尔卡特股份有限公司 Traffic splitting method and device, and service type reporting method and device
JP2009253431A (en) * 2008-04-02 2009-10-29 Alcatel-Lucent Usa Inc METHOD FOR OFF-LOADING PS TRAFFIC IN UMTS FEMTO CELL SOLUTION HAVING Iu INTERFACE

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
3GPP TSG SSA: "《Local IP Access and Selected IP Traffic Offload(Release 10)》", 《3GPP 23.829 V1.0.1,HTTP://WWW.3GPP.ORG/FTP/SPECS/ARCHIVE/23_SERIES/23.829/23829-101.ZIP》 *

Also Published As

Publication number Publication date
CN102369698B (en) 2014-03-12
WO2011150546A1 (en) 2011-12-08

Similar Documents

Publication Publication Date Title
CN101227391B (en) method for selecting function entity of tactics and charging rules under non-roaming condition
CN105340321B (en) Method for supporting quality of service control in mobile communication system and user equipment
CN102223663B (en) A kind of method and system obtaining network load
JP6212491B2 (en) Multiplexing of multiple mobile services on a single mobile access point name
CN101374260B (en) Method, apparatus and system for implementing PCC rules and bearing association
US8270942B2 (en) Method for the interception of GTP-C messages
EP2642815A1 (en) Method for establishing and using public path and m2m communication method and system
CN101399843B (en) Deepened filtering method for packet
CN102131172B (en) Method for processing business and system
CN102904856B (en) A kind of control method and device of shared session
CN101588326B (en) Method, devcie and system for associating gateway controlled conversation with Gx conversation
US8862869B1 (en) Method and apparatus for providing network initiated session encryption
CN107294737A (en) A kind of strategy and billing control method and device, system based on application
CN101931946A (en) Multi-access method of terminal in evolved packet system and system thereof
CN103782624A (en) Bandwidth control method, device and system
CN103024823A (en) Implementing method of flow migration, terminal and grouped data network gateway
CN103428731A (en) Method and system for routing optimization, and service gateway
CN103428800A (en) Route selection method and functional network element
CN103107901B (en) "Policy and Charging Rules Function system of selection and relevant device
CN103796246A (en) Data distribution method, data distribution device and data distribution system
CN101925038B (en) Data transmission method, communication device and network system
CN103379569A (en) Trigger method and trigger apparatus of flow migration
CN102396201B (en) Method and system for traffic offload, and policy and charging rule function entity
CN104521201A (en) Processing method for forwarding node, forwarding node, and control node
CN101730071B (en) Realization method and system of multi-packet data network connection

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
ASS Succession or assignment of patent right

Owner name: SHENZHEN LIANCHUANG INTELLECTUAL PROPERTY SERVICE

Free format text: FORMER OWNER: HUAWEI TECHNOLOGY CO., LTD.

Effective date: 20150703

C41 Transfer of patent application or patent right or utility model
TR01 Transfer of patent right

Effective date of registration: 20150703

Address after: 518129 Nanshan District Nanshan digital cultural industry base, east block, Guangdong, Shenzhen 407

Patentee after: Shenzhen LIAN intellectual property service center

Address before: Bantian HUAWEI headquarters office building, Longgang District, Shenzhen, Guangdong

Patentee before: Huawei Technologies Co., Ltd.

CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20140312

Termination date: 20180531