CN103460735B - There is provided with caching relevant information to core network in access network - Google Patents

There is provided with caching relevant information to core network in access network Download PDF

Info

Publication number
CN103460735B
CN103460735B CN201280017864.3A CN201280017864A CN103460735B CN 103460735 B CN103460735 B CN 103460735B CN 201280017864 A CN201280017864 A CN 201280017864A CN 103460735 B CN103460735 B CN 103460735B
Authority
CN
China
Prior art keywords
data
caching
terminal
network
sent
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201280017864.3A
Other languages
Chinese (zh)
Other versions
CN103460735A (en
Inventor
H.埃里克森
L.维斯特伯格
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Telefonaktiebolaget LM Ericsson AB
Original Assignee
Telefonaktiebolaget LM Ericsson AB
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Telefonaktiebolaget LM Ericsson AB filed Critical Telefonaktiebolaget LM Ericsson AB
Priority to CN201810095270.3A priority Critical patent/CN108156042B/en
Priority claimed from PCT/EP2012/056667 external-priority patent/WO2012140135A1/en
Publication of CN103460735A publication Critical patent/CN103460735A/en
Application granted granted Critical
Publication of CN103460735B publication Critical patent/CN103460735B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

This document describes the method and apparatus for providing information to core network, wherein, terminal exchanges data with the caching in access network.Node data storage in the buffer.Data exchange between caching and terminal, and the information relevant with the data of exchange is provided to core network.Even if for data not by core network, this also allows the common core network functions such as core network application LI, charging and policy control.

Description

There is provided with caching relevant information to core network in access network
Technical field
The present invention relates to providing information to core network, wherein, terminal exchanges data with the caching in access network.
Background technology
It is news from nowhere to provide caching in a mobile network.The idea for caching foundation is a big chunk internet Business is repeated, and can be provided from the transmission of its source elimination duplicate contents in terms of desired bandwidth and save chance. The cardinal principle cached in a mobile network is that the copy of duplicate contents in such as internet is moved to closer to mobile subscriber. For example, such content can in radio access network (RAN) different piece, in core network (CN) or only in CN " top " caches.
It is as described below by caching the principal benefits that can be realized in mobile network:
A. the cost transmitted in mobile network and the cost for internet equity interconnection are reduced.This is " on caching Side " realizes, because the information of caching only transmits once in the transmission link above caching in principle.
B. the Quality of experience of mobile end user is improved.Moved because the information of caching can quickly return from caching Employ family(Compared with obtaining the situation of information from home position completely), therefore, this is mainly realized by lower delay.
C. new demand servicing is provided, is such as used for content hosting and the stored/backed-up of operator.Mobile operator can with it is interior Hold provider to reach an agreement, to ensure that the content from particular content provider is transported to mobile operator's in a better way Mobile subscriber in network.
Although caching can be realized in a variety of ways in the mobile communication network, between core network and caching Interworking, without gratifying solution.For example, in the presence of with Lawful Interception (LI), charging and policy control are relevant asks Topic.Accordingly, it is difficult to position the caching in radio access network(Agency)(Radio base station (RBS), radio network controller (RNC) or the similar congruent point under mobile packet core network node in backhaul topology, such as SGSN, S-GW, PDN-GW/GGSN). Term RNCC(Radio net and cache controller)Generic term is used herein as, it is included as current defined in 3GPP RNC, the radio access network polymerization in future for 2G, 3G, 4G (LTE) and possible radio access technologies in future are eased up Deposit control point.
It is the functions such as Lawful Interception, strategy and charging control that one of relevant subject matter is cached under core network Perform within the core network.During the caching solution obtained using user-plane traffic from the caching below core network, when The preceding policy control for how not carrying out caching and how LI and meter are carried out to the subscriber of content that access stores in the buffer The solution taken.
Figure 1 illustrates the terminal 1 such as user equipment (UE) accesses in the caching 2 positioned at RNCC 3 problem in Fig. 1 The data of storage.Caching 2 includes the buffer memory device of SM service monitoring function 4, cache logic 5 and the data for memory buffers 6.Data are sent to terminal 1 from caching storage device 6 and do not travel through S/P-GW 7.Data are between caching 2 and terminal 1 through wireless Electric base station (RBS) 8 sends.
LI is statutory body(LEA, control or management organization)With intelligence agency according to the law of local country to operator The legitimate claim of implementation.Requirement about mobile packet network system can replicate UE 1 and receive and be sent to external system All packets, detect that business is monitored without any possible mode.In addition, it all control events reports such as will switch To LI systems.
LI is carried out by end user, and this is a requirement.Therefore it is controlled and identified by IMSI, MSISDN.So And RAN does not know IMSI, MSISDN generally.
LI also requires that UE will be sent to or from all packet passive replications that UE is sent to LI systems.All user plane numbers According to by core network gateway(For example, SGSN, GGSN)Detect, and the SM service monitoring function of gateway sends out user plane data It is sent to LI systems.However, core network(Gateway is located at core network)It is not detected by the business from RAN cachings.
The report of control plane event and LI requirement, such as switching and RAB foundation.However, caching do not produce it is any Important control event, therefore, it should not be any certain content of LI reports to be.
LI is configured by operation and maintenance system (OAM), and is carried out with such as SGSN, S-GW and P-GW/GGSN constant pitch point Interface.Can not be before core network node to transmission however, activating the LI control signalings such as LI for user.RAN not on The knowledge of user identity.
End user should can not trace LI.The change of network characteristic perceived due to LI reasons is not allowed.Due to LI and be that to disconnect or change operation be infeasible solution to caching because end user can be measured that difference Performance.
With the mutual timing of caching in mobile communications network, there are LI all above mentioned problems.
Billing requirements cause the other problems relevant with caching interworking.Charging is carried out by end user, and is therefore pressed IMSI and MSISDN are controlled.However, the not no knowledge on IMSI and MSISDN of RAN systems.
Traffic statistics are individually carried out in uplink and downlink, and therefore, the service traffics of subscriber are in core network (SGSN、S-GW、P-GW)Middle statistics.Business between caching and UE 1 does not travel through these any nodes, and therefore will not Counted.
To realize roam charge, accounting (accounting) record is exchanged between the residing operator of roaming, and singly Flow is solely counted in uplink and downlink, and uses it for out list.Accounting between operator is different from subscriber Charging.This is the independent billing issues to be solved.Charge on traffic for end user, which is used as, is used for uplink/downlink Sum is carried out.Online charging is generally used for carrying maximum traffic quota(Bucket)Prepaid services.End user has reached maximum When business limits, caching should stop or contain from the business for being cached to subscriber.Offline charging is mainly supported relevant by S-GW/ The charging data record (CDR) of PDN-GW/GGSN generations opens list.The working method of offline charging is to count in subscriber monthly The user-plane traffic flow stored in business bucket.Charging based on service is carried out by URL and/or IP address range.
If operator applies the charging based on service, the other compensation of subscriber's " business quota " may be needed.One In kind situation, end user and content supplier have subscription relationship, and end user pays for visit to end user content.
It can be seen that when RNCC 3 is using caching, problem be present in terms of related data is caught for both LI and charging, Because the data from caching do not travel through any node generally with the interface for such function generally.
The content of the invention
The purpose of the present invention be caching be located at access network network in when, it is allowed to user-plane traffic provide by such as LI, based on Take and the solution of interworking function that policy control etc. is handled by core network.According to first aspect, there is provided one kind provides Information to core network method, wherein, terminal with positioned at access network in node in caching exchange data.Node is slow Deposit middle data storage.Data exchange between caching and terminal, and the information relevant with the data of exchange is provided to core Network.Even if for data not by core network, this also allows the common cores such as core network application LI, charging and policy control Heart network function.
As a kind of option, method, which is included between caching and terminal, establishes the first user-plane tunnel, and is caching Second user Plane tunnel is established between core network.Second user Plane tunnel provides to be had for sending with the data exchanged The information of pass.Include the following of any tunnel through second user Plane tunnel and another user-plane tunnel header length Any one:URL for the charging based on service, about the data traffic that is sent in the first user-plane tunnel to carry out The report of charging based on flow, desired quality of service information and all packets for being sent in the first user-plane tunnel Copy.As another option, method includes passing through following any operation, it is determined that using second user Plane tunnel or the another use The type of the information of family Plane tunnel report:Ping message is sent to main frame and detects what is changed in the response of message DHCP, wherein, no response instruction should not be allowed to caching to be used for terminal;Or ping is sent to multiple destinations of pre-determining, And use the type of the information to be reported of response selection received;Or using the value in subscriber profiles ID, it is determined that to report Information type.
For allow core network distinguish sent between caching and terminal upload and downloading data, wrap method choice Include establish include from terminal be sent to caching data the first data set and the data including being sent to terminal from caching the Two data sets.Using second user Plane tunnel the first and second data sets are sent to core network.Further to help distinguish between Core network upload and downloading service, the first collection selection is sent to the first address, and by the second data Collection is sent to the second address.Core network then sets up fictitious host computer to receive these data sets, and is to send according to them The processing data collection by different way to the first or second address.
The alternate ways for providing information to core network are to be provided in node for being sent and received to Lawful Interception node The Lawful Interception interface of the information relevant with the data sent between terminal and caching and for charging/plan into core network Charging/strategy that summary function sends and receives the charging/policy information relevant with the data sent between terminal and caching connects Either interface in mouthful.So, the interdependent node desired information being sent directly in core network.
As a kind of option, method is included in first request of the node reception to the data in caching.Generate cache miss, So as to which data can not be retrieved from caching.Monitor the reply from core network.Reply based on monitoring, inferential strategy is to apply To the request in future to the data in caching.
As another option, method be included in node receive from terminal-pair the data of caching request.Make terminal The determination of the data volume more than pre-determining from caching whether is had been received by, and if it is, cache miss is generated, so as to not Data can be retrieved from caching.In the case, data can be allowed from the total amount that can allow data and within phase time of pre-determining Permissible dose in optionally select the data volume of pre-determining.
As a kind of option, method be included in node receive from terminal-pair the data of caching request.Make relevant Whether the data of request have the determination of the pre-determining type of data.If it is, generation cache miss, this will prevent terminal from Caching retrieval data.
Optionally, method be included in caching with before the swapping data of terminal, determine terminal whether with terminal phase Roamed in network outside the home network of the subscriber of association.If terminal is not roaming, allow the number between terminal and caching According to exchange, but if terminal is roaming, then exchanged not in data between terminal and caching.In the case, pass through Time-to-live field and identification and terminal phase in the ping message sent using analysis between access network and home network Any one in the in one's duty public land mobile network identifier of International Mobile Subscriber body of the subscriber of association, optionally does Go out terminal whether the determination roamed in the network outside the home network of the subscriber associated with terminal.
According to second aspect, there is provided a kind of access network nodes, the access network nodes, which are provided with, to be arranged to store number According to caching, be arranged to allow between caching and terminal the interface of the exchange of data and for will be relevant with the data of exchange Information provides the another interface to core network.
As a kind of option, access network nodes are provided with for establishing the first user plane tunnel between caching and terminal The processor in road.Processor is arranged to establish second user Plane tunnel between caching and core network, wherein, second user Plane tunnel provides the information relevant for the data that send with exchange.As another option, processor is arranged to use second The following any one of user-plane tunnel report:URL for the charging based on service, relevant sent out in the first user-plane tunnel The data traffic sent is so as to all packets for carrying out the report of the charging based on flow and being sent in the first user-plane tunnel Copy.
As a kind of option, processor be arranged to establish include from terminal be sent to caching data the first data set and Including the second data set of the data that terminal is sent to from caching.Processor is arranged to use second user Plane tunnel to core Network sends the first data set and the second data set.This allow core network distinguish sent between caching and terminal upload and Downloading data.
In an alternative alternative embodiment, access network nodes are provided with for the Lawful Interception section into core network node Point sends the Lawful Interception interface of the information relevant with the data sent between terminal and caching and for into core network Charging/strategy that charging/policing feature sends the charging/policy information relevant with the data sent between terminal and caching connects Either interface in mouthful.
According to the third aspect, there is provided a kind of core network node, the core network node are provided with for being put down through user Face tunnel receives the first receiver of the first data set for being sent to the first host address from access network, and the first data set includes The data cached in access network are sent to from terminal.Second receiver provides is sent to the of the second host address for receiving Two data sets, the second data set include being sent to the data of terminal from caching.Processor is provided for application and the number of processing first According to the Different Rule of collection to second data set.It is upper that this allows core network node differentiation to be sent between caching and terminal Load and downloading data.
According to fourth aspect, there is provided a kind of computer program including computer-readable code, computer-readable code Node is promoted to perform as above described method in the first aspect when being run on node.
According to the 5th aspect, there is provided a kind of including computer-readable media and as above described calculating in a third aspect The computer program product of machine program, wherein, computer program is stored on computer-readable media.
Brief description of the drawings
Fig. 1 schematically shows network architecture and used to cache the problem of relevant in block diagrams;
Fig. 2 is the flow chart for showing embodiment;
Fig. 3 schematically shows the radio access network node according to first embodiment in block diagrams;
Fig. 4 schematically shows the network architecture and signal flow according to second embodiment in block diagrams;
Fig. 5 schematically shows the radio access network node according to second embodiment in block diagrams;
Fig. 6 schematically shows network architecture according to the second embodiment of the present invention and signal in block diagrams Flow and the interior report of band from caching;
Fig. 7 schematically shows the network architecture proposed and signal flow and is separated by uplink in block diagrams The interior report of the band of road and downlink traffic;
Fig. 8 is to show the flow chart according to the step of an embodiment;And
Fig. 9 schematically shows the core network node according to one embodiment of the invention in block diagrams.
Embodiment
To solve the problems, such as the interworking between caching and core network (CN), there is provided allow to cache or access in network The information relevant with the data exchanged between caching and terminal is sent to interdependent node in core network by associated nodes Mechanism.This for example allows to connect even in data of the terminal reception from the caching in access network rather than through core network In the case of receiving data, there is provided LI functions.
Fig. 2 shows basic step.Numbering corresponds to the numbering for Fig. 2 below:
S1. in the buffer memory data in access network network.
S2. in an alternative embodiment, GTP user-plane tunnels are established between caching and terminal;
S3. in an alternative embodiment, GTP user-plane tunnels are established between caching and CN;
S4. in caching and the swapping data of terminal.
S5. pass through in the tunnel that step S3 and S4 are established, or through directly connecing between node and CN within the access network Mouthful, the information relevant with data exchange is sent to CN.
Caching is introduced below CN(Agency)When, how caching within the access network and such as Lawful Interception (LI), meter The primary solutions provided between the function of the CN such as policy control processing mutually equipped with three identification are provided:
A. the offline charging and LI interfaces and core in the access node such as radio net and cache controller (RNCC) Online charging in heart network;
B. without LI and charging/policy interface in RNCC;Implied by adding report to CN;And
C. without LI and charging/policy interface, also without the report to CN(That is, do nothing)
First embodiment(Solution A above)Including providing in RNCC offline charging and LI interfaces and in core net Online charging in network.The S-GW that this embodiment is based on charging data record (S-CDR) is reported, to be described with 3GPP from service GW It is that " offline " charging data record that OCH is sent to from RNCC 3 enters to the report identical mode of off-line accounting system (OCH) Row report.Another LI interfaces are added to RNCC nodes.Online charging is by CN progress and without any change or influence.
This embodiment requires addition offline charging interface to RNCC 3 to generate station message recording S-CDR(It is fixed in 3 gpp Justice).
By updating control protocol and S1AP in radio access network application obscure portions (RANAP), Iu interfaces(3GPP determines The S1 user planes of justice), realize user identity(Mobile subscriber ISDN, MSISDN and International Mobile Subscriber identity IMSI)And meter Take transmission of the characteristic from CN.Charging characteristic is to determine how to carry out charging(Offline, it is online etc.)Parameter.
Renewal can use supplier's particular options of 3GPP standards or modification to carry out.
First embodiment is in addition to the renewal for requiring above-mentioned control plane, on block core system without influence.However, LI interfaces It is added to RNCC nodes.Core RAN interface solutions can be that supplier is specific, or standardized for supplying more Quotient ring border.
LI/ chargings/tactful complexity is transferred to RNC/RNCC by first embodiment.Charging currently utilizes router and gateway GPRS Support Node (GGSN) function provides billing scheme.These most of functions are built into GGSN nodes, and outside connects Mouth can't see them.Multi-provider solution requires standardization.Distributed LI functions are more difficult to match somebody with somebody than centralized LI functions Put and coordinate.
Fig. 3 shows the grade access network nodes of RNCC 3, and it is provided with the caching 2 for data storage 6, for conjunction Method monitor node send the information relevant with the data that send between terminal 1 and caching 2 Lawful Interception interface 9 and for Charging/policy control functions in CN send the charging/policy control relevant with the data sent between terminal 1 and caching 2 Charging/policy control interface 10 of information.Also the computer-readable media of the form of memory 11 can be provided, the media can be used in Computer program 12 is stored, computer program promotes RNCC 3 to show as described above when by computing device.
RNNC 3 can be one of node of many types, and this feature can be realized with together with caching wherein.This A little types include but is not limited to radio base station (RBS), radio network controller (RNC), base station controller (BSC), broadband RAS (BRAS), residential gateway (RGW), border networks gateway (BNG) and packet data serving node (PDSN).
Second embodiment(Above-mentioned solution B)LI or billing interface are not provided in RNCC 3;But the report relied on to CN Accuse.This is reusing based on existing CN functions, but in GPRS tunneling protocols (GTP) user for transmitting user plane data It with the addition of in Plane tunnel with interior report.This allows CN to detect caching action and available feature is used further in CN Charging/strategy and LI.
Fig. 4 is gone to, shows to provide the interior report 13 of band from caching 2 to CN from RNCC 3 in figure.In other words, as Fig. 2 is walked Establishes GTP user-plane tunnels 14 between caching 2 and terminal 1 shown in rapid S3, and as shown in Fig. 2 steps S4, in caching 2 and CN(In this example, shown CN nodes are S/P-GW 7)Establish the another GTP tunnel 15 for sending identical information.Due to CN nodes With for the existing capability with LI and billing function interworking, therefore, it can report that LI and metering data are appointed without requiring What other feature.
This solution on CN without influence, and can dispose without standardization.Its support offline charging/based on service Charging.Caching for online charging can be carried out, but if carrying out the gating control for online charging in RNCC 3, then The time made a response when detecting that subscriber exceeds quota will use the somewhat longer time.May standardization selection caching report Accuse option.
Fig. 5 shows the RNCC 3 according to second embodiment.RNCC be provided with caching 2 for providing data to terminal 1 and The processor 16 of the transmission of control data.Processor 16 is put down for establishing GTP user through interface 17 between caching 2 and terminal 1 Face tunnel 14 and establish GTP user-plane tunnels 15 through interface 18 between 2 and CN is cached.The computer of the form of memory 19 can Read media and can be used for storage computer program 20, computer program promotes RNCC 3 to show as above when by computing device It is described.
As first embodiment, RNNC 3 can be one of node of many types, and this feature can be wherein Realized with together with caching.These types include but is not limited to radio base station (RBS), radio network controller (RNC), base station Controller (BSC), Broadband Remote Access Server (BRAS), residential gateway (RGW), wideband network gateway (BNG) and packet count According to service node (PDSN).
Being reported in GTP tunnel 15 for event is sent to core network in band in caching 2, and this shifts LI/ billing functions To CN.The up-link and downlink that this permission CN is checked between client and caching.For LI, in terminal 1 and caching 2 Between GTP tunnel 14 be mirror image in the GTP tunnel between caching 2 and CN, and detected in the opposite direction by CN.This It may need to be taken into account by LI systems.Caching 2 in report it is associated with GTP tunnel, GTP tunnel in CN with it is specific finally User identity is associated.In knowledge of the RNCC 3 without user identity.
Can router or P-GW (GGSN) terminate " with interior report " business and by using existing packet filtering by its Undisturbedly abandon.Report packet can pass through specific DSCP(And/or IP address)Identification.Alternatively, can be transmitted with interior Report service To single management/test system, to the IP main frames of particular configuration.With interior report, figure 6 illustrates be also shown for road in Fig. 6 By device 21 and/or LI/ billing functions 22.
By analyzing different LI/ billing options, reporting option can recognize that.
Charge on traffic for end user is both up-link and downlink transmission flow sum.It is required that simply give birth to Into uplink report business so that up-link and downlink counter sum are correct.Due to two reasons, can not support Caching for roaming service customer:
1. the charging protocol between operator makes it difficult to perform caching for uplink/downlink accounting.
2. home network can be without any feature for being used to cache report.
For online charging, due to " exceeding quota " reason for reservation, CN activation " gating " functions(Prevent or hold back System stream)When, implicitly detected in caching system.By the failure download for specific stream statistics by CN, carry out in CN Using the detection of " gating ".
Alternatively, supplier's particular options can allow to design the interior report GTP agreements of new band in 3GPP, and the agreement is based on supply Business's particular options adjust the flowmeter counter in GGSN/P-GW, and generate specific control event, as online charging When " exceeding quota " " no caching ".Alternatively, newly it can provide for multi-provider operation with interior consensus standard.
Charging based on service is the report based on the URL in cache hit.If operator uses packet filter, It may require filter being sent to correct destination.Report packet thus should have Differentiated Services Code Point (DSCP).It is no Then, report can be sent to any IP destinations.
For Lawful Interception, for all packets exchanged between end user and caching, all packets are by mirror As reflection is to until in CN GTP tunnel.Due to end user need not know about and cache do not know communication will by LI, because This, caching 2 for specific GTP tunnel identifier (TEID) to being replicated in asking for all business received between UE 1 and caching 2 Ask and make a response.Buffer control is only made a response without knowing LI according to caching reporting option.
Based on above-mentioned analysis, only require that several reports are alternative:
1. without caching.
2. caching and without report.
3. report URL(Charging based on service).The modification of charging based on service, wherein, send in the uplink Report packet be related to specific URL, and for CN, the specific UL be converted to by traffic statistics based on special services based on Take.For example, n MB can be increased by changing into the URL of the flow of user.This solution reduces be used in the uplink under The bandwidth requirement of charge on traffic report described in face option 4.
4. the report about flow(Charging based on flow):Injection packet is so as in core in GTP tunnel up-link Flowmeter counter adjustment is carried out in the heart.Up-link and downlink replicate user plane packets between caching and UE, standby Choosing, the pseudo- packet that the uplink packet of report simply generates is cached, so that up-link and downlink sum are correct(It is based on The charging of flow).Alternatives include the specific RAN/ cores of supplier or multi-provider with signaling same as described above Standard.
5. in downlink and up-link(All customer services of mirror image)In the institute that is sent between caching and UE There is the copy of packet(Support and test for LI).
The type of CN report should be sent to for control caching(The interior mirror images of band of data, URL reports etc.), it is desirable to using new Control signaling.Have as described below several alternative:
1. sending " ping " when carrying and setting arrives specific destination IP address, and detects the DSCP changed in response. Ping can be sent to the main frame in the main frame or RNCC in router.
2. ping is sent to specific destination collection and then selects reporting option using the ping received detection.Match somebody with somebody Putting can be carried out by terminal and by ready-made policy control and charging rule functions (PCRF).
3. alternative use:Subscriber profiles (profile) ID, SPID(5 codes)
4. supplier's particular options in RANAP and S1AP
5. the new standardized interface for multi-provider solution defined for example, by RANAP and S1AP.
For alternative 1, using the practicality router feature in core network, as DSCP re-flags, packet filtering and Address filtering.Re-flag the group for being only applicable to come source/destination IP address.
Destination IP address is used to be restricted to addressing range to report control.The source address combined is re-flagged with DSCP Filter the reporting option for selecting every UE.If without response, the option one of no caching is used.It may be not ready to CN being used for Caching, therefore, it is preferably to select to wait caching to be activated.Filter and re-flag and configured by OAM.
For alternative 2, the control of practicality packet filtering and PCR-based F and the address in router/GGSN are used together Filtering.For each caching reporting option, new demand servicing quality (QoS) profile is defined.For each reservation(May also with terminal class Type combines), using the current mechanism for policy controlling system (PCRF), QoS profiles are configured for default bearing, also refering to following Sample script., will be from attaching position register HLR by using alternative 2(Activated in initial attachment and in default bearing When)The acquiescence service profile received is replaced by for GTP tunnel(EPS is carried)This new QoS profile(It is interpreted as slow in RNCC Deposit reporting option).
In order QoS profiles to be mapped to, report is alternative, and " ping " message is sent to predefined main frame reality by cache control system The special collection of example, each one example of code(Value or code bit).It is all to receive or the combination of unreceived ping message(And/or close And)For calculating " caching reporting option " value.By user-defined filter rules it is to be used to include acquiescence and hold by QoS profiles The common so-called strategy of all carryings and a part for charging control (PCC) rule in being loaded in.Each PCC rules also have In router/GW(GGSN, P-GW and S-GW)The filter rules of middle implementation are set;That is, PCRF output is that GW/ routers need The QoS profiles number to be applied.Type based on user identity and service/business, PCRF determine this profile.Exporting for example will be " QoS profiles #n please be apply to be flowed to this " (please apply QoS profile #n to this flow), and subsequent GW/ Router is by the QoS profiles of application request.
Depending on filtering rule, GW will allow or lose charging to ask the ping of special " Ping main frames ".Buffer control system System will detect " the ping replies " from some main frames and " ping, which is replied, to be lost " from other main frames.Then come from ping It is used to calculate with the conclusion without ping responses and this specific GTP tunnel will be used for by buffer control(EPS is carried)" caching report choosing " value.
It is therefore desirable to multiple " ping main frames ".Each main frame(Example)Such as represent one two of the report of coding alternatively System bit value.End user's profile with " caching reporting option " is mapped to " QoS profiles and filter rules ", and By operation and maintenance (OaM) system configuration in PCRF.Ping is sent to private host by buffer control function, and analyzes reply To calculate " caching reporting option " value.GW nodes will make a response as currently known to PCC filter rules, and allow or Abandon ping requests.The value of " caching reporting option " for example can be binary value, but be not limited to the value, because other volumes Code can also act as supplier/operator's particular solution.
Sample script for PCRF configurations is as follows:
Content type<Number> (content-type <number>)
The charge mode of delay<Title> (deferred-charging pattern <name>)
end
Label<Label> (label <label>)
Subscriber type<Type> (subscriber-type <type>)
Effective time [<Second>] (effective-time [<seconds>])
Tos minimize delay | maximize handling capacity (tos minimize-delay | maximize- throughput \)
| maximize reliability | minimize monetary cost | generic services } (| maximize-reliability | minimize-monetary-cost|normal-service})
Abandon [resetting] (drop [reset])
Without example (no-instances)
At the same level<Content type number>| the control of definition } (sibling<content-type-number> | control-defined})
end
Above-mentioned example script is similar to the parts of RFC 1349 the 4th:
1000-minimize delay
0100-maximize handling capacity
0010-maximize reliability
0001-minimize monetary cost
0000-generic services
Alternative 3 use the SPID defined in 3GPP.SPID, and being capable of root defined in home subscriber servers (HSS) How will to carry out caching the selected strategy of report according to every user, be arranged to different value.Then, from the GTP tunnel by RNCC Detect SPID.
For roaming subscriber, the accounting record exchanged between operators, which is used to detect, to be roamed.Up-link and descending chain Road flow individually counts and for the accounting between operator.Caching is therefore, it is difficult to for roaming subscriber, and a kind of option It is that it is not provided simply.
By analyzing time-to-live (TTL) field in ping message, it is assumed that ping main frames, can close to P-GW/GGSN The detection roamed.A kind of scheme is to set as low as possible by ttl value so that in the case where detecting roaming, ping Message is dropped.
Detection is in radio access network(Cache present position)In user whether be roaming service customer another way It is the PLMN-ID in the IMSI for identify subscriber.PLMN-ID shows the home network of subscriber.IMSI can be by the RNC 3 in 3G systems Access, and find IMSI need not specific other process.In the 4G systems without RNC 3(LTE or system in future)In, can edge GTP tunnel positioning caching, and it is built immediately in GTP tunnel, the option defined in 3GPP can be used to be sent by signal IMSI.By using this solution, it can catch and store IMSI in RNCC 3.In the lte networks, caching can be as follows It is described to be used together with GTP tunnel:
It may want to form exception to allow to cache during roaming, and cache and can carry out, so as in RNCC 3 There is provided allows PLMN list.
GPRS Tunnel Protocol (GTP) or actually its user plane part are used on S1-U interface(That is, GTP-U is assisted View).Generally, GTP tunnel in eNodeB (eNB) between CN.However, caching 2 is as the S1-U interface between eNB and CN A part is included.The GTP tunnel traveled through between eNB and CN is divided into two different pieces, and a part is in eNB with delaying Between depositing 2, and another part is between 2 and CN is cached.Principal benefits using this solution are by only by RAN Change just introduce it.This means CN will cache 2 " being considered as " eNB, and actual eNB is concealed to CN.
For this solution can be realized, new control plane interface S1-RAN is created between eNB 6 and caching 2.
To establish S1-RAN interfaces, it is assumed that it is beneficial that eNB establishes connection to RAN controllers, and therefore needs to exist ENB selections are made to be best suitable for the mechanism of RAN controllers(Such as because the position of RAN controllers is extremely close to the normal of S1-U interface Transmitting path and be adapted to).
Established for S1-RAN interfaces, a solution for avoiding unnecessary configuration in each enB is to apply base In domain name system (DNS) solution.In the case, eNB is established by character string " RAN ", PLMN identifier mobile networks Code (MNC) and Mobile Country Code MCC (MCC) and the part identifier for eNB(For example, eNB-ID or part thereof)Composition(It is or alternative Including but not limited to these parts)Complete fully qualified domain name (FQDN), and then perform DNS query.The IP address of return is The IP address of the RAN controllers configured in DNS.Example for MCC and MNC such FQDN is “RAN.eNB9876.mnc012.mcc345.pub.3gppnetwork.org”。
S1-RAN interfaces are established and other details of protocol architecture do not describe.However, as an example, because this is to use S1-MME in such as eNB, therefore, it is suggested that this interface can be based on SCTP.
In some cases, by terminal traffic mirror image into the GTP tunnel sent to CN to allow CN to know data Business is the up-link or downlink between terminal 1 and caching 2, and this is favourable.In CN, the industry in GTP tunnel Business can handle in normal way and to CN GW(For example, GGSN)Have no effect.In GTP tunnel, the uplink of mirror image Road and downlink are separated, for example, to be allowed for the different charge of up-link and downlink, and to LI systems Accurate report content is from RAN cachings, terminal or internet.
Such arrangement is schematically shown in the figure 7.As shown in fig. 7, it is used for charging and Lawful Interception mesh in caching 2 Event be reported in CN up-link GTP tunnel with interior transmission;It is also shown for router 21,23 and LI/ chargings Function 22.
In-band signaling is sent to CN in GTP tunnel in uplink direction from caching 2.Report is sent to particular configuration IP main frames, one be used for terminal up-link, another be used for terminal downlink.Up-link in GTP tunnel In-band signaling transfer LI/ charging capture functions in CN GW 7.CN GW 7 can use standard signaling and LI/ billing functions 22 Communicated.This allows CN to see up-link between client and caching and descending in a manner of general service identical Link.Report in caching 2 is associated with GTP tunnel, and GTP tunnel is associated with specific end user's identity in CN.
RNCC 3 comes to the mirror image of CN gateways 7(For particular terminal 1)The up-link and downlink of caching 2 IP bags.Access control function in CN(Common IP routing functions)It is whether effective with inspection source IP addresses(That is, it is CN It is known)IP address spoofing (spoof) function.
To keep IP packets consistent, virtual terminal main frame is configured with cache logic 5, cache logic 5 is by original terminal Source IP addresses are copied in the mirror image packet source IP addresses field of generation.
Destination IP address is set as representing the address of " being used for the virtual cache main frame reported ".Mirror image, which is grouped in, to be passed through The duplication packets of GW 7 are to being dropped after LI and the point of charge system.
Separate UL and DL, and configure two destination IP address, one is used for up-link, and one is used for descending chain Road.This solution allows to how differentiation is business and the industry left and carry content of postponing from terminal uploading content to caching Business charging.It is the content that caching is downloaded and the content for uploading to caching that it, which also allows for LI identification of function,.
This is more fully described in fig. 8.Numbering corresponds to the numbering for Fig. 8 below.
S6. the first GTP tunnel is established between caching 2 and terminal 1.
S7. the second GTP tunnel is established between 2 and CN is cached.
S8. 2 data storages are being cached.
S9, S10. establish the first and second main frames in CN.These main frames allow mirrored host computer be reflected in terminal 1 with The up-link and down link data sent between caching 2.
S11. the uplink data of self terminal 1 is carried out in the reception of caching 2.
First data of 512. mirror image uplink datas are sent to CN from caching 2, are addressed to the first main frame.
S13. the first data that CN determines to receive in the first main frame are uplink datas.
S14. the uplink data that CN allows to receive in the first main frame carries out LI/ chargings/policy control.
S15. due to the first data for no longer needing to receive in the first main frame, therefore, it can be abandoned.
S16. down link data is sent to terminal 1 by caching 2.
S17. the second data of mirror image down link data are sent to CN from caching 2, the second addressing data to the Two main frames.
S18. CN determines that the second data are down link datas.
S19. the down link data that CN allows to receive in the second main frame carries out LI/ chargings/policy control.
S20. due to the second data for no longer needing to receive in the second main frame, therefore, it can be abandoned.
It should be noted that the arrangement of step shown in Fig. 8 has no intention to imply any particular sorted of those steps.For example, step Rapid S6 and S7 is carried out before being scheduled on step S8 without one;Data can cache regardless of whether when establishing first and at any time Two tunnels.
First and second data are in the form of allowing CN to distinguish the first data and the second data or mode provides, so as to CN energy It is enough to treat or handle the first data in a manner of different from the second data.For example, the first and second data may be sent to that in CN Such as the first and second different respective hosts with different corresponding Internet Protocol (IP) addresses, these main frames can be Fictitious host computer.CN therefore destination-address the first data of differentiation that can be based on the packet received and the second data.
First data may include the copy or duplicate of the packet sent in a first direction between caching 2 and terminal 1.The Two data may include the copy or duplicate of the packet sent in a second direction between caching 2 and terminal 1.In those packets After such as charging and/or Lawful Interception, such as replicating or be forwarded to LI and/or charge system in core network Afterwards, can be abandoned within the core network.
Refer again to Fig. 5, in this embodiment, processor 16 be also arranged in distinguish caching 2 and terminal 1 between send it is upper Line link and down link data, and use different IP addresses(Addressed router 21,23)By these data forwardings to CN, with Allow to distinguish up-link and down link data.
First and second data once receive in CN can be replicated and be sent to single function(Such as LI/ charging work( Energy), wherein, such as by the way that the first and second data are individually forwarded into the first and second main frames respectively, can be up to distinguish Link and downlink(For example, it is based on destination-address)Mode application LI and/or charging.It can be lost in the first and second main frames Abandon the first and second data.Also can be abandoned after the first and second data of processed duplication at function.This replicate and Gateway node that can be within the core network is forwarded to perform.Due to without performing such processing, therefore, nothing in the first and second main frames The forwarding of those main frames need to be gone to, and therefore need not actually establish those main frames at all.
Alternatively, the first and second data first can be forwarded to the first and second main frames respectively, wherein, such as in main frame or such as It is upper described by using independent function, LI and/or charging can be applied in a manner of distinguishing up-link and downlink.Once By the first and second data for its intended purpose, for example, after LI and/or charging is had been used for, can be abandoned.
Therefore, within the core network, the first and second data are received, the first and second data are distinguished, with different from second The step of mode of data is treated or handles the first data can be within the core network gateway node perform, such as in service/packet Gateway node.These steps also can or transfer to perform in the above-mentioned function of receiving the first and second data, such as in LI/ billing functions Perform, or even performed in the first or second main frame.First and second main frames can be built as the fictitious host computer in gateway node It is vertical, or can be the physical node for being located away from gateway node.Similarly, the above-mentioned function of receiving the first and second data can The node of gateway node is located remotely from, or gateway node can be located in itself.Step is abandoned to look into distance host and/or long-range work( Can rather than it be carried out in gateway node, gateway node only continues data to be forwarded to appropriate main frame or function.
With reference to Fig. 9 herein, show to receive the CN nodes 24 of the first and second data in figure.Show and be respectively used to connect Receive the first receiver 25 and the second receiver 26 of the first and second data.It will be appreciated that the first receiver 25 and second connects Device 26 is received to can be included in single receiver.Processor 27 is according to it(Corresponding to the uplink between terminal 1 and caching 2 Road or downlink)First or second data set and apply Different Rule to data.These rules can be from including rule 29 Database 28 obtains.One or more conveyers 30 can provide for data or information about data being sent to such as LI/ Another function such as billing function 22.Pay attention to, in this example, the reception of node processing two datasets, but two datasets exist The fictitious host computer of the different nodes in CN is addressed in other embodiments.
It will be appreciated that the operation of one or more said modules can be with one or more processors or processing unit Form provides, the programme-control or offer that processing unit can at least partly by operating on the device or apparatus.Group shown in several The function of part can actually be performed by single component.Single processor or processing unit may be disposed to perform the work(of multiple components Energy.
The method and step that accompanying drawing can be considered as a series of message for not only showing to exchange and various nodes perform, and show Equipment for exchanging those message or performing those method and steps.In addition, for the sake of integrality, it is illustrated or described as from node A is sent to the step of node B any message implicitly includes the step of node A sends message and Node-B receiver message and saved Point A and B is used for the part for performing those steps.
A kind of computer program including computer-readable code is also been proposed, computer-readable code is used for control device Perform such as method proposed herein, or promote when being loaded into equipment equipment to become such as equipment proposed herein, or Person promotes equipment to perform the method as above proposed when being run in equipment.Program can carry in carrier media.Carrier media can To be storage media.Carrier media can be transmission media.The equipment for being also contemplated within thus class method programming is comprising this class method Storage media.It also been proposed a kind of including the production of the computer program of computer-readable media and computer program as described above Product, wherein, computer program is stored on computer-readable media.Such computer program is storable in computer-readable media On, such as can implement what is provided from internet website in the signal such as downloading data signal.Disclosure will Being interpreted as itself includes computer program, the record being either interpreted as on carrier or is interpreted as signal, or with any other Form understands.
Be preferably due in roaming interface the reason for mirror image business increases, by above-mentioned solution avoid caching come From the data service of roaming service customer, or allow to be cached for roaming service customer.Exchanged between operators during roaming In accounting record, up-link and downlink traffic are individually counted.
Turning now to policy control solution, policy control functions are relating to how at for heterogeneous networks and user behavior Manage the predefined decision of service request and service conveying.
Policy control in mobile network is to be based on the rule defined in policy control and billing function (PCRF), and By subscriber identity(For example, IMSI)Carry out.When caching system to be introduced to the network of operator, it is also desirable to the strategy control of new type System such as handles " blacklist " of website, the parent of access content controls and stops or containment given stream to control the behavior of caching Business gating control.
Parent is controlled for preventing end user from receiving some contents, and currently by CN function treatments.User identity is not The RNCC caching solutions known be check parent control for specific URL whether active state a solution, it is right In the solution, cache control system can generate " cache miss "(Even if the content storage of request is in the buffer), and The HTTP for being then checked for returning from CN is replied.Can be that same request generation second is slow to confirm that parent's control has been applied really Deposit missing(It is optional), and compare two results.Http response message from CN can have in the URL utilizers newly to ask Operator's particular configuration of HTTP message/character string is detected during long control by caching.GTP is being carried out subsequently, for identical The trial next time that tunnel identity (TEID) is carried out, caching can directly apply parent's control response.
Trustship for content, strategy can be using to limit accessibility of the end user to specific trustship content.For The strategy of " maximum rate " of trustship content can use.Relevant asked with end user's policy control in RNCC 3 and caching 2 The problem of topic includes requiring end user's strategy of the knowledge about IP address/IMSI, and this is by causing trustship relevant, and it is complicated Produced also with distributed caching solution.
Cache node strategy is, for example, URL blacklist and Fair Usage Policy.Such list can be configured by OaM.
Fair Usage Policy is used to provide protection, prevents the excessive use of Internet resources.It is excessive that subscriber can experience limitation Use(Other counters on charging)Different actions(For example, containment).Fair Usage Policy generally performs in CN.
A solution of fair the problem of using is that definition " cache node strategy " is used for limiting in RNCC cachings 2 The being serviced caching " flow/chronomere " of RAB/ end users.Statistics comes from the caching 2 for specific end user/RAB The byte quantity of request, and if flow is higher than threshold value(By policy definition), then request will not be served by caching 2.Algorithm Change is:
● Fair Usage Policy is calculated in RNCC 3;That is, thus user caches example(Node)During service, by for RAB(Implicit end user)" flow/chronomere " fair use.In RNCC 3, RAB is identified by carrying ID, is such as existed As defined in 3GPP.
● the Fair Usage Policy in RBS:Algorithm using the RBS identity that is for example defined by RBS IP address so as to in phase Compare use with other users in RBS.
● about when the option of activation strategy.Strategy by OaM or can be calculated per RBS IP identity per time unit The auto-mechanism activation of flow disables, and when reaching predefined threshold value, opens Fair Usage Policy, or loading When switching to be less than another threshold value, Fair Usage Policy is closed.As long as major advantage is available free capacity, operator just allows having The height of some users uses in limited time(For example, the download for the content when idle capacity can use, issued transaction will faster Terminate).Based on RBS identity(And/or RNCC examples)GTP identifiers (RBS TEID) with the RBS of every operation algorithm are per the time The flow of unit, 2 control systems of caching have information, and can internally determine when reach high threshold.
Therefore, with other users(In caching or RBS regions)Compare, it is unjust that end user can not use caching 2 to realize Flat excessive use.Strategy is by the OaM settings for caching system.
Gating or access control are the functions for the specific transactions for whether allowing some type defined in CN.Strategy can be used Whether used up in the general strategy of business, or subscriber business quota.Gating is typically or by tier group according to node(PCRF, pass through OCS or directly in GGSN)In filter set work.
Buffer control function can imply by analyzing the ratio between the failure download of cache miss and understand that stream will enter Row gating.If detecting the download of the failure of specific destination, the specific destination is added into blacklist.
Have " cache miss " in caching 2(The content of request is not found in the buffer)When, forwarded and asked by CN.Caching 2 It can detect and be responded by the failure download of CN request.Caching 2 is then able to be used as the finger that terminal 1 will be gated Show.Caching 2 is then able to determine that it will not serve any new request for carrying out self terminal 1.Cache control system can specially give birth to Into " cache miss " with based on carrier policy(Based on load, day when, time interval)Detect CN.
Caching 2 can also forward another(It is or several)Request(To improve the confidence level of gating), and if those are asked Failure, then cache 2 and be able to verify that the connectedness of former server has disappeared.
If performing bandwidth containment, caching 2 can detect whether CN is holding back by generating continuous " cache miss " The data flow for working out family carrys out detection bandwidth containment.If detect containment(For this terminal 1, the handling capacity lower than expection), Then caching 2 will continue as the forwarding of this GTP tunnel(Generate cache miss)Business is to CN.Alternatively, caching 2 can determine that directly containment comes From the business of caching 2.In the case, to stop containment caching 2, caching 2 generates the another " caching for being continuously grouped in stream Whether missing " has been stopped with detection containment(Detect higher throughput).It is preferable, however, that solution is all containments in CN Carry out, if because being contained in CN, terminal 1 will not generate many business.
If gating/filtering is performed by destination, caching 2 can be by introducing other cache miss come " test " mesh Ground(Even if caching 2 is cached with content).If to specific destination(That is, URL)Identical or different GTP tunnel detect it is several Secondary failed download, then destination can be added in its blacklist by caching 2, or is deleted from its caching and be used for particular bearer tunnel (=active user)Or for all bearing tunnels(All users)Content.Cache policy is configured by OaM.
Pay attention to, caching 2 is network optimization function, and it provides improved end user's performance body to access and downloading content Test.Therefore, operator may provide distinguishing reservation, and for example, some subscribers provide " caching as service " (cache-as-a-service)。
The client of the selection such as can be such as smart phone and laptop computer as the part subscribed is cached, Or only provided for non-roaming subscriber.Roam charge is to be based on up-link and downlink traffic.Caching 2 can change statistics Uplink versus downlink flow.Only the possibility operator motivation for subscriber's application cache of their own is to give it certainly Oneself subscriber preferably services.
In the case, based on the in-band signaling between RNCC 3 and GGSNA/PDN-GW, carried between caching and CN New interface is supplied.
Operator for caching specifies QoS class identifier (QCI) value, i.e. " type of doing one's best with caching " configuration For a part for PCC rules, and 2 detected by caching from GTP tunnel.RNCC 3 is also pre-configured with identical value.Solution Supplier's ad hoc type can be formed or be formed as standardized solution.
For roaming service customer, the cache node option of " no caching " can be used(It is described above).Alternatively, by using QoS The new value of profile criteria, it is determined that allowing and can use buffer service when available, definable is connect by using 3GPP S8 The roaming interface of mouth(Alternatively by the gn interface with GTP control planes, sent by signal)New caching report signaling.For Charging, can be user's statistics up-link and downlink industry in visited network if allowed in roaming using caching Business sum.Pay attention to, solution requires single roaming agreement to define how the business of statistics roaming terminal.
Certainly, it is alternatively not provide LI and billing interface to provide information to the another of CN from caching 2, and is not provided to CN Report.This solution provides the RNCC 3 with caching 2, and it is without any operation about LI and charging/policy control. This solution is acceptable when to LI without demand, and is subscribed suitable for " constant expense ", wherein, reaching monthly bucket Direct gating when measuring (monthly bucket) in the absence of customer service controls(For example, containment), for example, for progress Caching, when receiving next request from user, expenditure will continue.
Above description provided under the CN in radio access network(RBS, RNC or the aggregation in RAN backhauls In)Place the solution of transparent content caching.Advantage is the solution proposed by the CN and radio defined in 3GPP Network system has slight influence.Some solutions may also alternatively develop into the specific solution of supplier or open Send out into 3GPP standards future version a part.
Propose to realize a solution by the caching under CN in the ran above, it is allowed to sending content to terminal 1 Or from the transmission content of terminal 1(That is, up-link or downlink traffic)When allow distinguishing charging.If business is being gone to Or sent in up-link from operator's RAN caching systems or downlink, then propose also to allow to detect in LI systems System.
It will be apparent to one skilled in the art that in the feelings for not departing from the scope of the present invention defined in following claims Under condition, various modifications can be carried out to above-described embodiment.For example, although above description uses the example of GTP user-plane tunnels The description present invention, but it is applied to any tunneling technique, such as makes in PMIP, L2TP, CMIP and radio bearer L2 tunnels (RLC) Those technologies.In addition, present embodiments can apply to any kind of access network for accessing the network for also providing caching Node, wherein, information must to CN report so as to from caching provide data interworking.It not only needs to be applied to access network It is the situation of radio access network, and can be used in access network is the network of fixed access network network.
In the above description of various embodiments of the present invention, it is to be understood that term herein is to be served only for describing Specific embodiment, and have no intention the limitation present invention.Unless otherwise defined, all terms used herein(Including technology And scientific terminology)With the synonymous being generally understood that with those skilled in the art in the invention.It will be further understood that unless Explicitly define herein, otherwise, the term such as those terms defined in common dictionary is interpreted as having and this theory The bright book connotation consistent with connotation in the context of correlation technique, and not with substantially idealization as defined herein or undue Formal mode understands.
It will be appreciated that although the grade of term first, second can be used to describe different elements herein, these elements should not It is limited by these terms.These terms are served only for distinguishing an element and another element.For example, the scope of the invention is not being departed from In the case of, the first element can represent second element, and similarly, second element can represent the first element.Herein In use, term "and/or" includes any and all combination of one or more associated listed items.
Be described as " connecting " in an element, " coupling ", " response " or its modification to another element when, it can directly connect Another element is connect, coupled or responded, or neutral element may be present.In contrast, an element is described as " directly connecting Connect ", " direct-coupling " arrive or during " directly in response to " another element, in the absence of neutral element.Similar label refers in all figures Similar element.In addition, " coupling ", " connection ", " response " or its modification may include wirelessly to connect as used herein Connect, couple or respond.Herein in use, unless context clearly dictates otherwise, otherwise, singulative will also include plural shape Formula.For the sake of concise and/or be clear, well known function or construction can not be described.Term "and/or" includes one or more related Join any and all combination of Listed Items.
As used herein, term " comprising ", " having " or its modification are open types, and including one or more The feature, entirety, element, step, component or function, and do not preclude the presence or addition of one or more of the other feature, entirety, Element, step, component or its group.In addition, as used herein, " such as " can be used for introducing or specifying item mentioned above Purpose generic instance, and have no intention to limit this intermediate item." " can be used for specifying specific project from more common statement.
Example embodiment is herein with reference to computer implemented method, equipment(System and/or device)And/or computer The block diagram and/or flow chart illustration of program product are described.It will be appreciated that block diagram and/or the square frame and frame of flow chart illustration The combination of figure and/or flow chart illustration square frame can be real by the computer program instructions performed by one or more computer circuits It is existing.These computer program instructions can provide all-purpose computer circuit, special-purpose computer circuit and/or other programmable datas The processor circuit of process circuit is to produce machine so that the processing through computer and/or other programmable data processing devices Other nextport hardware component NextPorts in the value stored in the instruction map of device execution and controlling transistor, memory location and such circuit, Function/the action specified with realizing in block diagram and/or flowchart block, and be consequently formed for realizing block diagram and/or flow chart The part for the function/action specified in square frame(Feature)And/or structure.
These computer program instructions may be alternatively stored in bootable computer or other programmable data processing devices with spy In the tangible computer readable media of different directions or tendencies formula operation so that the instruction stored in the computer-readable media produces system Product, product include realizing the instruction for the function/action specified in block diagram and/or flowchart block.
Tangible, non-transitory computer-readable media may include electronics, magnetic, optics, electromagnetism or Semiconductors data storage System, device.The more specific example of computer-readable media will include as described below:Portable computer diskette, with Machine access memory (RAM) circuit, read-only storage (ROM) circuit, EPROM (EPROM or flash memory) electricity Road, portable compact disc read-only storage (CD-ROM) and portable digital video compact disc read-only memory (DVD/ BluRay)。
Computer program instructions can be also loaded into computer and/or other programmable data processing devices, to promote one Series of operative steps performs on computer and/or other programmable devices, so as to produce computer-implemented process so that The instruction performed on computer or other programmable devices provide for implement in block diagram and/or flowchart block specify function/ The step of action.Correspondingly, embodiments of the invention can be within hardware and/or in software(Including firmware, resident software, micro- generation Code etc.)Middle realization, software are run on the processors such as digital signal processor, can be collectively referred to as " circuit ", " module " or its Modification.
It should also be noted that in some alternative implementations, function/action shown in square frame can not be with shown in flow Order is carried out.For example, depending on the function/action being related to, two square frames continuously displayed actually substantially can be performed concurrently, or Person's square frame can perform in reverse order sometimes.In addition, the feature of the given square frame of flow chart and/or block diagram can be separated into it is more In individual square frame, and/or the feature of two or more of flow chart and/or block diagram square frame can be at least partially integrated.Finally, may be used The other square frames of addition/insertion between shown square frame.In addition, though some figures include arrow to show to lead on communication path The Main way of letter, it is to be understood that, communication can be carried out in the opposite direction of shown arrow.
Many different embodiments have combined above description and figure is disclosed herein.It will be appreciated that word for word describe It will cause improperly to repeat with each combination and sub-portfolio for showing these embodiments and chaotic.Correspondingly, the sheet of accompanying drawing is included Specification should be regarded as form embodiment various example combinations and sub-portfolio and formation and using they mode and process it is complete Whole written description, and will support to it is any it is such combination or sub-portfolio claim.
Following initialism has been used in this specification:
CDR charging data record
DSCP Differentiated Services Code Point
eNB eNodeB
EPS evolved packet systems
The complete fully qualified domain names of FQDN
GGSN Gateway GPRS Support Nodes
GTP GPRS Tunnel Protocol
HLR attaching position registers
HSS home subscriber servers
IMSI International Mobile Subscriber identity
LEA law enforcement agencies
LI Lawful Interceptions
LTE Long Term Evolutions
MSISDN mobile subscribers ISDN
MME mobility management entity
MCC Mobile Country Code MCCs
MNC Mobile Network Codes
OaM operation and maintenance systems
OCH off-line accounting systems
PCC strategies and charging control
PCRF policy controls and charging rule functions
PGW PDN Gateway
PLMN public land mobile networks
QCI QoS class identifiers
QoS service quality
RAB radio bearers
RAN radio access networks
RANAP radio access network application obscure portions(Control protocol in Iu interfaces)
RBS radio base stations
RLC radio bearer L2 tunnels
RNC radio network controllers
RNCC radio nets and cache controller
The S-GW reports of S-CDR charging data record
S-GW gateways
The S1 user planes that S1AP 3GPP are defined
SGSN service gateway support nodes
Subscriber profiles ID defined in SPID 3GPP
The TTL time-to-live
UE user equipmenies.

Claims (18)

1. a kind of method for providing information to core network, wherein, terminal (1) is accessed in the node (3) in network with being located at Cache (2) and exchange data, methods described is included in the node:
Storage (S1) data in the caching (2);
Determine whether the terminal (1) is roamed in the network outside the home network of the subscriber associated with the terminal;
If the terminal (1) is not roamed in the network outside the home network of the subscriber associated with the terminal, Allow to exchange (S4) data between the caching (2) and the terminal (1);And
There is provided the information relevant with the data of the exchange to (S5) and arrive the core network,
When wherein, by using the survival in the ping message for accessing between network and the home network and sending is analyzed Between the in one's duty public land mobile network mark of International Mobile Subscriber body of field and the identification subscriber associated with the terminal (1) Know any one in symbol, make the terminal (1) whether outside the home network of the subscriber associated with the terminal Network in the determination that roams.
2. the method as described in claim 1, wherein the information of the offer can be used for any legal prison by the core network Listen, policy control and charging.
3. method as claimed in claim 1 or 2, also comprise the following steps in the node:
(S2) first user-plane tunnel (14) is established between the caching (2) and the terminal (1);And
(S3) second user Plane tunnel (15) is established between the caching (2) and the core network, wherein described second User-plane tunnel (15) is provided for sending the described information relevant with the data of the exchange.
4. method as claimed in claim 3, in addition to through the second user Plane tunnel and another user-plane tunnel The information that any tunnel report selects from following any one:URL for the charging based on service, relevant used described first The data traffic sent in the Plane tunnel of family so as to carry out the report of the charging based on flow, require quality of service information and The copy of all packets sent in first user-plane tunnel.
5. method as claimed in claim 4, in addition to pass through following any operation, it is determined that using the second user plane tunnel The type in road and the information of the another user-plane tunnel report:
Ping message is sent to main frame and detects the Differentiated Services Code Point DSCP changed in the response of the message, its In, no response instruction should not be allowed to caching to be used for the terminal;
Ping is sent to multiple destinations of pre-determining, and uses the type of the information to be reported of response selection received; And
Using the value in subscriber profiles ID, it is determined that the type of the information to be reported.
6. method as claimed in claim 3, in addition to:
Establish the first data set of the data for including being sent to the caching (2) from the terminal (1);
Establish the second data set of the data for including being sent to the terminal (1) from the caching (2);
Using the second user Plane tunnel (15) first data set and second number are sent to the core network According to collection.
7. method as claimed in claim 6, in addition to:
First data set is sent to the first address, and second data set is sent to the second address.
8. method as claimed in claim 1 or 2, in addition to:
The node provide for Lawful Interception node send and receive with the terminal (1) with it is described caching (2) it Between the relevant information of the data that send Lawful Interception interface (9) and for charging/policing feature hair into the core network Send and receive the charging of the charging/policy information relevant with the data that send between the terminal (1) and the caching (2)/ At least one policy interface (10).
9. method as claimed in claim 1 or 2, in addition to:
In the node, the first request to the data in the caching is received;
Cache miss is generated, so as to which the data can not be retrieved from the caching;
Monitor the reply from the core network;
Based on the reply of the monitoring, inferential strategy is asked so as to the future being applied to the data in the caching.
10. method as claimed in claim 1 or 2, in addition to:
In the node, the request in the data of the caching from the terminal-pair is received;
Determine whether the terminal has been received by the data volume more than pre-determining from the caching, and if it is, generation Cache miss, so as to which the data can not be retrieved from the caching.
11. method as claimed in claim 10, wherein the data volume of the pre-determining is from the total amount that can allow data and pre- It can allow to select in the permissible dose of data in phase time of determination.
12. method as claimed in claim 1 or 2, in addition to:
In the node, the request in the data of the caching from terminal-pair is received;
Determine the request data whether have data pre-determining type, and if it is, generation cache miss, from And the data can not be retrieved from the caching.
13. a kind of access network nodes (3), the access network nodes include:
Cache (2), be arranged to data storage;
Interface (17), it is arranged to allow the data between the caching (2) and terminal (1) to exchange;
Another interface (18), for providing the information relevant with the data of the exchange to core network;And
Processor, it is arranged to:
Determine whether the terminal (1) is roamed in the network outside the home network of the subscriber associated with the terminal;
If the terminal (1) is not roamed in the network outside the home network of the subscriber associated with the terminal, Allow to exchange the data that (S4) is stored in the caching between the caching (2) and the terminal (1);
When wherein, by using the survival in the ping message for accessing between network and the home network and sending is analyzed Between the in one's duty public land mobile network mark of International Mobile Subscriber body of field and the identification subscriber associated with the terminal (1) Know any one in symbol, make the terminal (1) whether outside the home network of the subscriber associated with the terminal Network in the determination that roams.
14. access network nodes as claimed in claim 13, wherein the processor (16) is also arranged in:
The first user-plane tunnel (14) is established between the caching (2) and the terminal (1);And
Second user Plane tunnel (15) is established between the caching (2) and the core network, wherein the second user Plane tunnel (15) is provided for sending the described information relevant with the data of the exchange.
15. access network nodes as claimed in claim 14, wherein the processor (16) is arranged to use using described second The following any one of family Plane tunnel (15) report:It is URL for the charging based on service, relevant in the first user plane tunnel The data traffic sent in road is to carry out the report of the charging based on flow and to be sent in first user-plane tunnel All packets copy.
16. access network nodes as claimed in claim 14, include wherein the processor (16) is arranged to establish from described Terminal (1) is sent to the first data set of the data of the caching (2) and including being sent to the terminal from the caching (2) (1) the second data set of data;And
Wherein described processor is arranged to send described the to the core network using the second user Plane tunnel (15) One data set and second data set.
17. access network nodes as claimed in claim 13, in addition to:
Lawful Interception interface (9), sent for the Lawful Interception node into the core network and in the terminal (1) and institute State the relevant information of the data sent between caching (2);And
Charging/policy interface (10), sent for the charging into the core network/policing feature and in the terminal (1) Charging/policy information that the data that send are relevant between the caching (2).
18. a kind of core network node, core network node include:
First receiver (25), the first number of the first host address is sent to for being received through user-plane tunnel from access network According to collection, first data set includes being sent to the data for caching (2) in the access network from terminal (1);
Second receiver (26), the second data set of the second host address is sent to for receiving, and second data set includes The data of the terminal (1) are sent to from the caching (2);
Processor (27), for application with handling the Different Rule of first data set to second data set,
Wherein, if the terminal (1) is not roamed in the network outside the home network of the subscriber associated with the terminal, Allow to exchange (S4) data between the caching (2) and the terminal (1);And
When wherein, by using the survival in the ping message for accessing between network and the home network and sending is analyzed Between the in one's duty public land mobile network mark of International Mobile Subscriber body of field and the identification subscriber associated with the terminal (1) Know any one in symbol, make the terminal (1) whether outside the home network of the subscriber associated with the terminal Network in the determination that roams.
CN201280017864.3A 2011-04-12 2012-04-12 There is provided with caching relevant information to core network in access network Active CN103460735B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810095270.3A CN108156042B (en) 2011-04-12 2012-04-12 Method and apparatus for providing information to a core network related to caching in an access network

Applications Claiming Priority (7)

Application Number Priority Date Filing Date Title
US201161474447P 2011-04-12 2011-04-12
US61/474447 2011-04-12
US61/474,447 2011-04-12
US201161562030P 2011-11-21 2011-11-21
US61/562030 2011-11-21
US61/562,030 2011-11-21
PCT/EP2012/056667 WO2012140135A1 (en) 2011-04-12 2012-04-12 Providing information to a core network relating to a cache in an access network

Related Child Applications (1)

Application Number Title Priority Date Filing Date
CN201810095270.3A Division CN108156042B (en) 2011-04-12 2012-04-12 Method and apparatus for providing information to a core network related to caching in an access network

Publications (2)

Publication Number Publication Date
CN103460735A CN103460735A (en) 2013-12-18
CN103460735B true CN103460735B (en) 2018-02-09

Family

ID=

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1754369A (en) * 2003-02-26 2006-03-29 日本电气株式会社 Protocol conversion device and method
WO2011011458A2 (en) * 2009-07-20 2011-01-27 Qualcomm Incorporated TURNING ON FLOWS IN NETWORK INITIATED QoS

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1754369A (en) * 2003-02-26 2006-03-29 日本电气株式会社 Protocol conversion device and method
WO2011011458A2 (en) * 2009-07-20 2011-01-27 Qualcomm Incorporated TURNING ON FLOWS IN NETWORK INITIATED QoS

Similar Documents

Publication Publication Date Title
US10097662B2 (en) Providing information to a core network relating to a cache in an access network
JP5269980B2 (en) Billing in LTE / EPC communication networks
US11677881B2 (en) Process-efficient generation of data records for data communications involving groups or aggregates of IoT devices
US9479917B1 (en) Rating group-specific actions for mobile networks
US8180333B1 (en) Differential routing of communication-usage records
EP1983776B1 (en) Inbound Roamer Multimedia Messaging Systems
US9197714B2 (en) User interest and identity control on internet
JP2011523824A (en) Online charging architecture in LTE / EPC communication networks
WO2006015548A1 (en) A processing method based on charging trigger event and re-authorisation event of packet data flow
JP2016526357A (en) Method and apparatus for determining PCRF
CN105532012B (en) Method of video distribution, equipment and system
US20130080468A1 (en) Web Browsing Data Retention
WO2014195809A1 (en) Method and system of handling mobile data roaming
CN103460735B (en) There is provided with caching relevant information to core network in access network
CN106358232A (en) Method, device and system for monitoring business speeds of cellular networks

Legal Events

Date Code Title Description
PB01 Publication
SE01 Entry into force of request for substantive examination
GR01 Patent grant