CN103460735B - There is provided with caching relevant information to core network in access network - Google Patents
There is provided with caching relevant information to core network in access network Download PDFInfo
- Publication number
- CN103460735B CN103460735B CN201280017864.3A CN201280017864A CN103460735B CN 103460735 B CN103460735 B CN 103460735B CN 201280017864 A CN201280017864 A CN 201280017864A CN 103460735 B CN103460735 B CN 103460735B
- Authority
- CN
- China
- Prior art keywords
- data
- caching
- terminal
- network
- sent
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000003860 storage Methods 0.000 claims abstract description 14
- 230000004044 response Effects 0.000 claims description 18
- 230000004083 survival Effects 0.000 claims 3
- UIIMBOGNXHQVGW-UHFFFAOYSA-M buffer Substances [Na+].OC([O-])=O UIIMBOGNXHQVGW-UHFFFAOYSA-M 0.000 abstract description 13
- 239000000243 solution Substances 0.000 description 38
- 238000004590 computer program Methods 0.000 description 17
- 238000010586 diagram Methods 0.000 description 15
- 230000005540 biological transmission Effects 0.000 description 9
- 239000000203 mixture Substances 0.000 description 8
- 230000011664 signaling Effects 0.000 description 8
- 238000001914 filtration Methods 0.000 description 7
- 230000004048 modification Effects 0.000 description 7
- 238000006011 modification reaction Methods 0.000 description 7
- 238000001514 detection method Methods 0.000 description 6
- 238000000034 method Methods 0.000 description 6
- 239000000969 carrier Substances 0.000 description 5
- 241001269238 Data Species 0.000 description 4
- 229920000168 Microcrystalline cellulose Polymers 0.000 description 4
- 235000019813 microcrystalline cellulose Nutrition 0.000 description 4
- 230000004913 activation Effects 0.000 description 3
- 238000004891 communication Methods 0.000 description 3
- 238000010168 coupling process Methods 0.000 description 3
- 238000005859 coupling reaction Methods 0.000 description 3
- 230000004069 differentiation Effects 0.000 description 3
- 238000011068 load Methods 0.000 description 3
- 238000004458 analytical method Methods 0.000 description 2
- 230000006399 behavior Effects 0.000 description 2
- 230000001276 controlling effect Effects 0.000 description 2
- 230000000875 corresponding Effects 0.000 description 2
- 230000001808 coupling Effects 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 2
- 230000001264 neutralization Effects 0.000 description 2
- 230000005641 tunneling Effects 0.000 description 2
- 102100018316 CMIP Human genes 0.000 description 1
- 101700075796 CMIP Proteins 0.000 description 1
- 230000003213 activating Effects 0.000 description 1
- 238000004220 aggregation Methods 0.000 description 1
- 230000002776 aggregation Effects 0.000 description 1
- 230000015572 biosynthetic process Effects 0.000 description 1
- 230000000739 chaotic Effects 0.000 description 1
- 238000010276 construction Methods 0.000 description 1
- 238000000151 deposition Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 230000005611 electricity Effects 0.000 description 1
- 238000003379 elimination reaction Methods 0.000 description 1
- 230000002349 favourable Effects 0.000 description 1
- 238000005755 formation reaction Methods 0.000 description 1
- 238000002347 injection Methods 0.000 description 1
- 239000007924 injection Substances 0.000 description 1
- 238000003780 insertion Methods 0.000 description 1
- 238000007689 inspection Methods 0.000 description 1
- 230000014759 maintenance of location Effects 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 238000010295 mobile communication Methods 0.000 description 1
- 238000005457 optimization Methods 0.000 description 1
- 238000006116 polymerization reaction Methods 0.000 description 1
- 230000003362 replicative Effects 0.000 description 1
- 239000004065 semiconductor Substances 0.000 description 1
Abstract
This document describes the method and apparatus for providing information to core network, wherein, terminal exchanges data with the caching in access network.Node data storage in the buffer.Data exchange between caching and terminal, and the information relevant with the data of exchange is provided to core network.Even if for data not by core network, this also allows the common core network functions such as core network application LI, charging and policy control.
Description
Technical field
The present invention relates to providing information to core network, wherein, terminal exchanges data with the caching in access network.
Background technology
It is news from nowhere to provide caching in a mobile network.The idea for caching foundation is a big chunk internet
Business is repeated, and can be provided from the transmission of its source elimination duplicate contents in terms of desired bandwidth and save chance.
The cardinal principle cached in a mobile network is that the copy of duplicate contents in such as internet is moved to closer to mobile subscriber.
For example, such content can in radio access network (RAN) different piece, in core network (CN) or only in CN
" top " caches.
It is as described below by caching the principal benefits that can be realized in mobile network:
A. the cost transmitted in mobile network and the cost for internet equity interconnection are reduced.This is " on caching
Side " realizes, because the information of caching only transmits once in the transmission link above caching in principle.
B. the Quality of experience of mobile end user is improved.Moved because the information of caching can quickly return from caching
Employ family(Compared with obtaining the situation of information from home position completely), therefore, this is mainly realized by lower delay.
C. new demand servicing is provided, is such as used for content hosting and the stored/backed-up of operator.Mobile operator can with it is interior
Hold provider to reach an agreement, to ensure that the content from particular content provider is transported to mobile operator's in a better way
Mobile subscriber in network.
Although caching can be realized in a variety of ways in the mobile communication network, between core network and caching
Interworking, without gratifying solution.For example, in the presence of with Lawful Interception (LI), charging and policy control are relevant asks
Topic.Accordingly, it is difficult to position the caching in radio access network(Agency)(Radio base station (RBS), radio network controller
(RNC) or the similar congruent point under mobile packet core network node in backhaul topology, such as SGSN, S-GW, PDN-GW/GGSN).
Term RNCC(Radio net and cache controller)Generic term is used herein as, it is included as current defined in 3GPP
RNC, the radio access network polymerization in future for 2G, 3G, 4G (LTE) and possible radio access technologies in future are eased up
Deposit control point.
It is the functions such as Lawful Interception, strategy and charging control that one of relevant subject matter is cached under core network
Perform within the core network.During the caching solution obtained using user-plane traffic from the caching below core network, when
The preceding policy control for how not carrying out caching and how LI and meter are carried out to the subscriber of content that access stores in the buffer
The solution taken.
Figure 1 illustrates the terminal 1 such as user equipment (UE) accesses in the caching 2 positioned at RNCC 3 problem in Fig. 1
The data of storage.Caching 2 includes the buffer memory device of SM service monitoring function 4, cache logic 5 and the data for memory buffers
6.Data are sent to terminal 1 from caching storage device 6 and do not travel through S/P-GW 7.Data are between caching 2 and terminal 1 through wireless
Electric base station (RBS) 8 sends.
LI is statutory body(LEA, control or management organization)With intelligence agency according to the law of local country to operator
The legitimate claim of implementation.Requirement about mobile packet network system can replicate UE 1 and receive and be sent to external system
All packets, detect that business is monitored without any possible mode.In addition, it all control events reports such as will switch
To LI systems.
LI is carried out by end user, and this is a requirement.Therefore it is controlled and identified by IMSI, MSISDN.So
And RAN does not know IMSI, MSISDN generally.
LI also requires that UE will be sent to or from all packet passive replications that UE is sent to LI systems.All user plane numbers
According to by core network gateway(For example, SGSN, GGSN)Detect, and the SM service monitoring function of gateway sends out user plane data
It is sent to LI systems.However, core network(Gateway is located at core network)It is not detected by the business from RAN cachings.
The report of control plane event and LI requirement, such as switching and RAB foundation.However, caching do not produce it is any
Important control event, therefore, it should not be any certain content of LI reports to be.
LI is configured by operation and maintenance system (OAM), and is carried out with such as SGSN, S-GW and P-GW/GGSN constant pitch point
Interface.Can not be before core network node to transmission however, activating the LI control signalings such as LI for user.RAN not on
The knowledge of user identity.
End user should can not trace LI.The change of network characteristic perceived due to LI reasons is not allowed.Due to
LI and be that to disconnect or change operation be infeasible solution to caching because end user can be measured that difference
Performance.
With the mutual timing of caching in mobile communications network, there are LI all above mentioned problems.
Billing requirements cause the other problems relevant with caching interworking.Charging is carried out by end user, and is therefore pressed
IMSI and MSISDN are controlled.However, the not no knowledge on IMSI and MSISDN of RAN systems.
Traffic statistics are individually carried out in uplink and downlink, and therefore, the service traffics of subscriber are in core network
(SGSN、S-GW、P-GW)Middle statistics.Business between caching and UE 1 does not travel through these any nodes, and therefore will not
Counted.
To realize roam charge, accounting (accounting) record is exchanged between the residing operator of roaming, and singly
Flow is solely counted in uplink and downlink, and uses it for out list.Accounting between operator is different from subscriber
Charging.This is the independent billing issues to be solved.Charge on traffic for end user, which is used as, is used for uplink/downlink
Sum is carried out.Online charging is generally used for carrying maximum traffic quota(Bucket)Prepaid services.End user has reached maximum
When business limits, caching should stop or contain from the business for being cached to subscriber.Offline charging is mainly supported relevant by S-GW/
The charging data record (CDR) of PDN-GW/GGSN generations opens list.The working method of offline charging is to count in subscriber monthly
The user-plane traffic flow stored in business bucket.Charging based on service is carried out by URL and/or IP address range.
If operator applies the charging based on service, the other compensation of subscriber's " business quota " may be needed.One
In kind situation, end user and content supplier have subscription relationship, and end user pays for visit to end user content.
It can be seen that when RNCC 3 is using caching, problem be present in terms of related data is caught for both LI and charging,
Because the data from caching do not travel through any node generally with the interface for such function generally.
The content of the invention
The purpose of the present invention be caching be located at access network network in when, it is allowed to user-plane traffic provide by such as LI, based on
Take and the solution of interworking function that policy control etc. is handled by core network.According to first aspect, there is provided one kind provides
Information to core network method, wherein, terminal with positioned at access network in node in caching exchange data.Node is slow
Deposit middle data storage.Data exchange between caching and terminal, and the information relevant with the data of exchange is provided to core
Network.Even if for data not by core network, this also allows the common cores such as core network application LI, charging and policy control
Heart network function.
As a kind of option, method, which is included between caching and terminal, establishes the first user-plane tunnel, and is caching
Second user Plane tunnel is established between core network.Second user Plane tunnel provides to be had for sending with the data exchanged
The information of pass.Include the following of any tunnel through second user Plane tunnel and another user-plane tunnel header length
Any one:URL for the charging based on service, about the data traffic that is sent in the first user-plane tunnel to carry out
The report of charging based on flow, desired quality of service information and all packets for being sent in the first user-plane tunnel
Copy.As another option, method includes passing through following any operation, it is determined that using second user Plane tunnel or the another use
The type of the information of family Plane tunnel report:Ping message is sent to main frame and detects what is changed in the response of message
DHCP, wherein, no response instruction should not be allowed to caching to be used for terminal;Or ping is sent to multiple destinations of pre-determining,
And use the type of the information to be reported of response selection received;Or using the value in subscriber profiles ID, it is determined that to report
Information type.
For allow core network distinguish sent between caching and terminal upload and downloading data, wrap method choice
Include establish include from terminal be sent to caching data the first data set and the data including being sent to terminal from caching the
Two data sets.Using second user Plane tunnel the first and second data sets are sent to core network.Further to help distinguish between
Core network upload and downloading service, the first collection selection is sent to the first address, and by the second data
Collection is sent to the second address.Core network then sets up fictitious host computer to receive these data sets, and is to send according to them
The processing data collection by different way to the first or second address.
The alternate ways for providing information to core network are to be provided in node for being sent and received to Lawful Interception node
The Lawful Interception interface of the information relevant with the data sent between terminal and caching and for charging/plan into core network
Charging/strategy that summary function sends and receives the charging/policy information relevant with the data sent between terminal and caching connects
Either interface in mouthful.So, the interdependent node desired information being sent directly in core network.
As a kind of option, method is included in first request of the node reception to the data in caching.Generate cache miss,
So as to which data can not be retrieved from caching.Monitor the reply from core network.Reply based on monitoring, inferential strategy is to apply
To the request in future to the data in caching.
As another option, method be included in node receive from terminal-pair the data of caching request.Make terminal
The determination of the data volume more than pre-determining from caching whether is had been received by, and if it is, cache miss is generated, so as to not
Data can be retrieved from caching.In the case, data can be allowed from the total amount that can allow data and within phase time of pre-determining
Permissible dose in optionally select the data volume of pre-determining.
As a kind of option, method be included in node receive from terminal-pair the data of caching request.Make relevant
Whether the data of request have the determination of the pre-determining type of data.If it is, generation cache miss, this will prevent terminal from
Caching retrieval data.
Optionally, method be included in caching with before the swapping data of terminal, determine terminal whether with terminal phase
Roamed in network outside the home network of the subscriber of association.If terminal is not roaming, allow the number between terminal and caching
According to exchange, but if terminal is roaming, then exchanged not in data between terminal and caching.In the case, pass through
Time-to-live field and identification and terminal phase in the ping message sent using analysis between access network and home network
Any one in the in one's duty public land mobile network identifier of International Mobile Subscriber body of the subscriber of association, optionally does
Go out terminal whether the determination roamed in the network outside the home network of the subscriber associated with terminal.
According to second aspect, there is provided a kind of access network nodes, the access network nodes, which are provided with, to be arranged to store number
According to caching, be arranged to allow between caching and terminal the interface of the exchange of data and for will be relevant with the data of exchange
Information provides the another interface to core network.
As a kind of option, access network nodes are provided with for establishing the first user plane tunnel between caching and terminal
The processor in road.Processor is arranged to establish second user Plane tunnel between caching and core network, wherein, second user
Plane tunnel provides the information relevant for the data that send with exchange.As another option, processor is arranged to use second
The following any one of user-plane tunnel report:URL for the charging based on service, relevant sent out in the first user-plane tunnel
The data traffic sent is so as to all packets for carrying out the report of the charging based on flow and being sent in the first user-plane tunnel
Copy.
As a kind of option, processor be arranged to establish include from terminal be sent to caching data the first data set and
Including the second data set of the data that terminal is sent to from caching.Processor is arranged to use second user Plane tunnel to core
Network sends the first data set and the second data set.This allow core network distinguish sent between caching and terminal upload and
Downloading data.
In an alternative alternative embodiment, access network nodes are provided with for the Lawful Interception section into core network node
Point sends the Lawful Interception interface of the information relevant with the data sent between terminal and caching and for into core network
Charging/strategy that charging/policing feature sends the charging/policy information relevant with the data sent between terminal and caching connects
Either interface in mouthful.
According to the third aspect, there is provided a kind of core network node, the core network node are provided with for being put down through user
Face tunnel receives the first receiver of the first data set for being sent to the first host address from access network, and the first data set includes
The data cached in access network are sent to from terminal.Second receiver provides is sent to the of the second host address for receiving
Two data sets, the second data set include being sent to the data of terminal from caching.Processor is provided for application and the number of processing first
According to the Different Rule of collection to second data set.It is upper that this allows core network node differentiation to be sent between caching and terminal
Load and downloading data.
According to fourth aspect, there is provided a kind of computer program including computer-readable code, computer-readable code
Node is promoted to perform as above described method in the first aspect when being run on node.
According to the 5th aspect, there is provided a kind of including computer-readable media and as above described calculating in a third aspect
The computer program product of machine program, wherein, computer program is stored on computer-readable media.
Brief description of the drawings
Fig. 1 schematically shows network architecture and used to cache the problem of relevant in block diagrams;
Fig. 2 is the flow chart for showing embodiment;
Fig. 3 schematically shows the radio access network node according to first embodiment in block diagrams;
Fig. 4 schematically shows the network architecture and signal flow according to second embodiment in block diagrams;
Fig. 5 schematically shows the radio access network node according to second embodiment in block diagrams;
Fig. 6 schematically shows network architecture according to the second embodiment of the present invention and signal in block diagrams
Flow and the interior report of band from caching;
Fig. 7 schematically shows the network architecture proposed and signal flow and is separated by uplink in block diagrams
The interior report of the band of road and downlink traffic;
Fig. 8 is to show the flow chart according to the step of an embodiment;And
Fig. 9 schematically shows the core network node according to one embodiment of the invention in block diagrams.
Embodiment
To solve the problems, such as the interworking between caching and core network (CN), there is provided allow to cache or access in network
The information relevant with the data exchanged between caching and terminal is sent to interdependent node in core network by associated nodes
Mechanism.This for example allows to connect even in data of the terminal reception from the caching in access network rather than through core network
In the case of receiving data, there is provided LI functions.
Fig. 2 shows basic step.Numbering corresponds to the numbering for Fig. 2 below:
S1. in the buffer memory data in access network network.
S2. in an alternative embodiment, GTP user-plane tunnels are established between caching and terminal;
S3. in an alternative embodiment, GTP user-plane tunnels are established between caching and CN;
S4. in caching and the swapping data of terminal.
S5. pass through in the tunnel that step S3 and S4 are established, or through directly connecing between node and CN within the access network
Mouthful, the information relevant with data exchange is sent to CN.
Caching is introduced below CN(Agency)When, how caching within the access network and such as Lawful Interception (LI), meter
The primary solutions provided between the function of the CN such as policy control processing mutually equipped with three identification are provided:
A. the offline charging and LI interfaces and core in the access node such as radio net and cache controller (RNCC)
Online charging in heart network;
B. without LI and charging/policy interface in RNCC;Implied by adding report to CN;And
C. without LI and charging/policy interface, also without the report to CN(That is, do nothing)
First embodiment(Solution A above)Including providing in RNCC offline charging and LI interfaces and in core net
Online charging in network.The S-GW that this embodiment is based on charging data record (S-CDR) is reported, to be described with 3GPP from service GW
It is that " offline " charging data record that OCH is sent to from RNCC 3 enters to the report identical mode of off-line accounting system (OCH)
Row report.Another LI interfaces are added to RNCC nodes.Online charging is by CN progress and without any change or influence.
This embodiment requires addition offline charging interface to RNCC 3 to generate station message recording S-CDR(It is fixed in 3 gpp
Justice).
By updating control protocol and S1AP in radio access network application obscure portions (RANAP), Iu interfaces(3GPP determines
The S1 user planes of justice), realize user identity(Mobile subscriber ISDN, MSISDN and International Mobile Subscriber identity IMSI)And meter
Take transmission of the characteristic from CN.Charging characteristic is to determine how to carry out charging(Offline, it is online etc.)Parameter.
Renewal can use supplier's particular options of 3GPP standards or modification to carry out.
First embodiment is in addition to the renewal for requiring above-mentioned control plane, on block core system without influence.However, LI interfaces
It is added to RNCC nodes.Core RAN interface solutions can be that supplier is specific, or standardized for supplying more
Quotient ring border.
LI/ chargings/tactful complexity is transferred to RNC/RNCC by first embodiment.Charging currently utilizes router and gateway
GPRS Support Node (GGSN) function provides billing scheme.These most of functions are built into GGSN nodes, and outside connects
Mouth can't see them.Multi-provider solution requires standardization.Distributed LI functions are more difficult to match somebody with somebody than centralized LI functions
Put and coordinate.
Fig. 3 shows the grade access network nodes of RNCC 3, and it is provided with the caching 2 for data storage 6, for conjunction
Method monitor node send the information relevant with the data that send between terminal 1 and caching 2 Lawful Interception interface 9 and for
Charging/policy control functions in CN send the charging/policy control relevant with the data sent between terminal 1 and caching 2
Charging/policy control interface 10 of information.Also the computer-readable media of the form of memory 11 can be provided, the media can be used in
Computer program 12 is stored, computer program promotes RNCC 3 to show as described above when by computing device.
RNNC 3 can be one of node of many types, and this feature can be realized with together with caching wherein.This
A little types include but is not limited to radio base station (RBS), radio network controller (RNC), base station controller (BSC), broadband
RAS (BRAS), residential gateway (RGW), border networks gateway (BNG) and packet data serving node (PDSN).
Second embodiment(Above-mentioned solution B)LI or billing interface are not provided in RNCC 3;But the report relied on to CN
Accuse.This is reusing based on existing CN functions, but in GPRS tunneling protocols (GTP) user for transmitting user plane data
It with the addition of in Plane tunnel with interior report.This allows CN to detect caching action and available feature is used further in CN
Charging/strategy and LI.
Fig. 4 is gone to, shows to provide the interior report 13 of band from caching 2 to CN from RNCC 3 in figure.In other words, as Fig. 2 is walked
Establishes GTP user-plane tunnels 14 between caching 2 and terminal 1 shown in rapid S3, and as shown in Fig. 2 steps S4, in caching 2 and
CN(In this example, shown CN nodes are S/P-GW 7)Establish the another GTP tunnel 15 for sending identical information.Due to CN nodes
With for the existing capability with LI and billing function interworking, therefore, it can report that LI and metering data are appointed without requiring
What other feature.
This solution on CN without influence, and can dispose without standardization.Its support offline charging/based on service
Charging.Caching for online charging can be carried out, but if carrying out the gating control for online charging in RNCC 3, then
The time made a response when detecting that subscriber exceeds quota will use the somewhat longer time.May standardization selection caching report
Accuse option.
Fig. 5 shows the RNCC 3 according to second embodiment.RNCC be provided with caching 2 for providing data to terminal 1 and
The processor 16 of the transmission of control data.Processor 16 is put down for establishing GTP user through interface 17 between caching 2 and terminal 1
Face tunnel 14 and establish GTP user-plane tunnels 15 through interface 18 between 2 and CN is cached.The computer of the form of memory 19 can
Read media and can be used for storage computer program 20, computer program promotes RNCC 3 to show as above when by computing device
It is described.
As first embodiment, RNNC 3 can be one of node of many types, and this feature can be wherein
Realized with together with caching.These types include but is not limited to radio base station (RBS), radio network controller (RNC), base station
Controller (BSC), Broadband Remote Access Server (BRAS), residential gateway (RGW), wideband network gateway (BNG) and packet count
According to service node (PDSN).
Being reported in GTP tunnel 15 for event is sent to core network in band in caching 2, and this shifts LI/ billing functions
To CN.The up-link and downlink that this permission CN is checked between client and caching.For LI, in terminal 1 and caching 2
Between GTP tunnel 14 be mirror image in the GTP tunnel between caching 2 and CN, and detected in the opposite direction by CN.This
It may need to be taken into account by LI systems.Caching 2 in report it is associated with GTP tunnel, GTP tunnel in CN with it is specific finally
User identity is associated.In knowledge of the RNCC 3 without user identity.
Can router or P-GW (GGSN) terminate " with interior report " business and by using existing packet filtering by its
Undisturbedly abandon.Report packet can pass through specific DSCP(And/or IP address)Identification.Alternatively, can be transmitted with interior Report service
To single management/test system, to the IP main frames of particular configuration.With interior report, figure 6 illustrates be also shown for road in Fig. 6
By device 21 and/or LI/ billing functions 22.
By analyzing different LI/ billing options, reporting option can recognize that.
Charge on traffic for end user is both up-link and downlink transmission flow sum.It is required that simply give birth to
Into uplink report business so that up-link and downlink counter sum are correct.Due to two reasons, can not support
Caching for roaming service customer:
1. the charging protocol between operator makes it difficult to perform caching for uplink/downlink accounting.
2. home network can be without any feature for being used to cache report.
For online charging, due to " exceeding quota " reason for reservation, CN activation " gating " functions(Prevent or hold back
System stream)When, implicitly detected in caching system.By the failure download for specific stream statistics by CN, carry out in CN
Using the detection of " gating ".
Alternatively, supplier's particular options can allow to design the interior report GTP agreements of new band in 3GPP, and the agreement is based on supply
Business's particular options adjust the flowmeter counter in GGSN/P-GW, and generate specific control event, as online charging
When " exceeding quota " " no caching ".Alternatively, newly it can provide for multi-provider operation with interior consensus standard.
Charging based on service is the report based on the URL in cache hit.If operator uses packet filter,
It may require filter being sent to correct destination.Report packet thus should have Differentiated Services Code Point (DSCP).It is no
Then, report can be sent to any IP destinations.
For Lawful Interception, for all packets exchanged between end user and caching, all packets are by mirror
As reflection is to until in CN GTP tunnel.Due to end user need not know about and cache do not know communication will by LI, because
This, caching 2 for specific GTP tunnel identifier (TEID) to being replicated in asking for all business received between UE 1 and caching 2
Ask and make a response.Buffer control is only made a response without knowing LI according to caching reporting option.
Based on above-mentioned analysis, only require that several reports are alternative:
1. without caching.
2. caching and without report.
3. report URL(Charging based on service).The modification of charging based on service, wherein, send in the uplink
Report packet be related to specific URL, and for CN, the specific UL be converted to by traffic statistics based on special services based on
Take.For example, n MB can be increased by changing into the URL of the flow of user.This solution reduces be used in the uplink under
The bandwidth requirement of charge on traffic report described in face option 4.
4. the report about flow(Charging based on flow):Injection packet is so as in core in GTP tunnel up-link
Flowmeter counter adjustment is carried out in the heart.Up-link and downlink replicate user plane packets between caching and UE, standby
Choosing, the pseudo- packet that the uplink packet of report simply generates is cached, so that up-link and downlink sum are correct(It is based on
The charging of flow).Alternatives include the specific RAN/ cores of supplier or multi-provider with signaling same as described above
Standard.
5. in downlink and up-link(All customer services of mirror image)In the institute that is sent between caching and UE
There is the copy of packet(Support and test for LI).
The type of CN report should be sent to for control caching(The interior mirror images of band of data, URL reports etc.), it is desirable to using new
Control signaling.Have as described below several alternative:
1. sending " ping " when carrying and setting arrives specific destination IP address, and detects the DSCP changed in response.
Ping can be sent to the main frame in the main frame or RNCC in router.
2. ping is sent to specific destination collection and then selects reporting option using the ping received detection.Match somebody with somebody
Putting can be carried out by terminal and by ready-made policy control and charging rule functions (PCRF).
3. alternative use:Subscriber profiles (profile) ID, SPID(5 codes)
4. supplier's particular options in RANAP and S1AP
5. the new standardized interface for multi-provider solution defined for example, by RANAP and S1AP.
For alternative 1, using the practicality router feature in core network, as DSCP re-flags, packet filtering and
Address filtering.Re-flag the group for being only applicable to come source/destination IP address.
Destination IP address is used to be restricted to addressing range to report control.The source address combined is re-flagged with DSCP
Filter the reporting option for selecting every UE.If without response, the option one of no caching is used.It may be not ready to CN being used for
Caching, therefore, it is preferably to select to wait caching to be activated.Filter and re-flag and configured by OAM.
For alternative 2, the control of practicality packet filtering and PCR-based F and the address in router/GGSN are used together
Filtering.For each caching reporting option, new demand servicing quality (QoS) profile is defined.For each reservation(May also with terminal class
Type combines), using the current mechanism for policy controlling system (PCRF), QoS profiles are configured for default bearing, also refering to following
Sample script., will be from attaching position register HLR by using alternative 2(Activated in initial attachment and in default bearing
When)The acquiescence service profile received is replaced by for GTP tunnel(EPS is carried)This new QoS profile(It is interpreted as slow in RNCC
Deposit reporting option).
In order QoS profiles to be mapped to, report is alternative, and " ping " message is sent to predefined main frame reality by cache control system
The special collection of example, each one example of code(Value or code bit).It is all to receive or the combination of unreceived ping message(And/or close
And)For calculating " caching reporting option " value.By user-defined filter rules it is to be used to include acquiescence and hold by QoS profiles
The common so-called strategy of all carryings and a part for charging control (PCC) rule in being loaded in.Each PCC rules also have
In router/GW(GGSN, P-GW and S-GW)The filter rules of middle implementation are set;That is, PCRF output is that GW/ routers need
The QoS profiles number to be applied.Type based on user identity and service/business, PCRF determine this profile.Exporting for example will be
" QoS profiles #n please be apply to be flowed to this " (please apply QoS profile #n to this flow), and subsequent GW/
Router is by the QoS profiles of application request.
Depending on filtering rule, GW will allow or lose charging to ask the ping of special " Ping main frames ".Buffer control system
System will detect " the ping replies " from some main frames and " ping, which is replied, to be lost " from other main frames.Then come from ping
It is used to calculate with the conclusion without ping responses and this specific GTP tunnel will be used for by buffer control(EPS is carried)" caching report choosing
" value.
It is therefore desirable to multiple " ping main frames ".Each main frame(Example)Such as represent one two of the report of coding alternatively
System bit value.End user's profile with " caching reporting option " is mapped to " QoS profiles and filter rules ", and
By operation and maintenance (OaM) system configuration in PCRF.Ping is sent to private host by buffer control function, and analyzes reply
To calculate " caching reporting option " value.GW nodes will make a response as currently known to PCC filter rules, and allow or
Abandon ping requests.The value of " caching reporting option " for example can be binary value, but be not limited to the value, because other volumes
Code can also act as supplier/operator's particular solution.
Sample script for PCRF configurations is as follows:
Content type<Number> (content-type <number>)
The charge mode of delay<Title> (deferred-charging pattern <name>)
…
end
Label<Label> (label <label>)
Subscriber type<Type> (subscriber-type <type>)
Effective time [<Second>] (effective-time [<seconds>])
Tos minimize delay | maximize handling capacity (tos minimize-delay | maximize-
throughput \)
| maximize reliability | minimize monetary cost | generic services } (| maximize-reliability |
minimize-monetary-cost|normal-service})
Abandon [resetting] (drop [reset])
Without example (no-instances)
At the same level<Content type number>| the control of definition } (sibling<content-type-number> |
control-defined})
end
Above-mentioned example script is similar to the parts of RFC 1349 the 4th:
1000-minimize delay
0100-maximize handling capacity
0010-maximize reliability
0001-minimize monetary cost
0000-generic services
Alternative 3 use the SPID defined in 3GPP.SPID, and being capable of root defined in home subscriber servers (HSS)
How will to carry out caching the selected strategy of report according to every user, be arranged to different value.Then, from the GTP tunnel by RNCC
Detect SPID.
For roaming subscriber, the accounting record exchanged between operators, which is used to detect, to be roamed.Up-link and descending chain
Road flow individually counts and for the accounting between operator.Caching is therefore, it is difficult to for roaming subscriber, and a kind of option
It is that it is not provided simply.
By analyzing time-to-live (TTL) field in ping message, it is assumed that ping main frames, can close to P-GW/GGSN
The detection roamed.A kind of scheme is to set as low as possible by ttl value so that in the case where detecting roaming, ping
Message is dropped.
Detection is in radio access network(Cache present position)In user whether be roaming service customer another way
It is the PLMN-ID in the IMSI for identify subscriber.PLMN-ID shows the home network of subscriber.IMSI can be by the RNC 3 in 3G systems
Access, and find IMSI need not specific other process.In the 4G systems without RNC 3(LTE or system in future)In, can edge
GTP tunnel positioning caching, and it is built immediately in GTP tunnel, the option defined in 3GPP can be used to be sent by signal
IMSI.By using this solution, it can catch and store IMSI in RNCC 3.In the lte networks, caching can be as follows
It is described to be used together with GTP tunnel:
It may want to form exception to allow to cache during roaming, and cache and can carry out, so as in RNCC 3
There is provided allows PLMN list.
GPRS Tunnel Protocol (GTP) or actually its user plane part are used on S1-U interface(That is, GTP-U is assisted
View).Generally, GTP tunnel in eNodeB (eNB) between CN.However, caching 2 is as the S1-U interface between eNB and CN
A part is included.The GTP tunnel traveled through between eNB and CN is divided into two different pieces, and a part is in eNB with delaying
Between depositing 2, and another part is between 2 and CN is cached.Principal benefits using this solution are by only by RAN
Change just introduce it.This means CN will cache 2 " being considered as " eNB, and actual eNB is concealed to CN.
For this solution can be realized, new control plane interface S1-RAN is created between eNB 6 and caching 2.
To establish S1-RAN interfaces, it is assumed that it is beneficial that eNB establishes connection to RAN controllers, and therefore needs to exist
ENB selections are made to be best suitable for the mechanism of RAN controllers(Such as because the position of RAN controllers is extremely close to the normal of S1-U interface
Transmitting path and be adapted to).
Established for S1-RAN interfaces, a solution for avoiding unnecessary configuration in each enB is to apply base
In domain name system (DNS) solution.In the case, eNB is established by character string " RAN ", PLMN identifier mobile networks
Code (MNC) and Mobile Country Code MCC (MCC) and the part identifier for eNB(For example, eNB-ID or part thereof)Composition(It is or alternative
Including but not limited to these parts)Complete fully qualified domain name (FQDN), and then perform DNS query.The IP address of return is
The IP address of the RAN controllers configured in DNS.Example for MCC and MNC such FQDN is
“RAN.eNB9876.mnc012.mcc345.pub.3gppnetwork.org”。
S1-RAN interfaces are established and other details of protocol architecture do not describe.However, as an example, because this is to use
S1-MME in such as eNB, therefore, it is suggested that this interface can be based on SCTP.
In some cases, by terminal traffic mirror image into the GTP tunnel sent to CN to allow CN to know data
Business is the up-link or downlink between terminal 1 and caching 2, and this is favourable.In CN, the industry in GTP tunnel
Business can handle in normal way and to CN GW(For example, GGSN)Have no effect.In GTP tunnel, the uplink of mirror image
Road and downlink are separated, for example, to be allowed for the different charge of up-link and downlink, and to LI systems
Accurate report content is from RAN cachings, terminal or internet.
Such arrangement is schematically shown in the figure 7.As shown in fig. 7, it is used for charging and Lawful Interception mesh in caching 2
Event be reported in CN up-link GTP tunnel with interior transmission;It is also shown for router 21,23 and LI/ chargings
Function 22.
In-band signaling is sent to CN in GTP tunnel in uplink direction from caching 2.Report is sent to particular configuration
IP main frames, one be used for terminal up-link, another be used for terminal downlink.Up-link in GTP tunnel
In-band signaling transfer LI/ charging capture functions in CN GW 7.CN GW 7 can use standard signaling and LI/ billing functions 22
Communicated.This allows CN to see up-link between client and caching and descending in a manner of general service identical
Link.Report in caching 2 is associated with GTP tunnel, and GTP tunnel is associated with specific end user's identity in CN.
RNCC 3 comes to the mirror image of CN gateways 7(For particular terminal 1)The up-link and downlink of caching 2
IP bags.Access control function in CN(Common IP routing functions)It is whether effective with inspection source IP addresses(That is, it is CN
It is known)IP address spoofing (spoof) function.
To keep IP packets consistent, virtual terminal main frame is configured with cache logic 5, cache logic 5 is by original terminal
Source IP addresses are copied in the mirror image packet source IP addresses field of generation.
Destination IP address is set as representing the address of " being used for the virtual cache main frame reported ".Mirror image, which is grouped in, to be passed through
The duplication packets of GW 7 are to being dropped after LI and the point of charge system.
Separate UL and DL, and configure two destination IP address, one is used for up-link, and one is used for descending chain
Road.This solution allows to how differentiation is business and the industry left and carry content of postponing from terminal uploading content to caching
Business charging.It is the content that caching is downloaded and the content for uploading to caching that it, which also allows for LI identification of function,.
This is more fully described in fig. 8.Numbering corresponds to the numbering for Fig. 8 below.
S6. the first GTP tunnel is established between caching 2 and terminal 1.
S7. the second GTP tunnel is established between 2 and CN is cached.
S8. 2 data storages are being cached.
S9, S10. establish the first and second main frames in CN.These main frames allow mirrored host computer be reflected in terminal 1 with
The up-link and down link data sent between caching 2.
S11. the uplink data of self terminal 1 is carried out in the reception of caching 2.
First data of 512. mirror image uplink datas are sent to CN from caching 2, are addressed to the first main frame.
S13. the first data that CN determines to receive in the first main frame are uplink datas.
S14. the uplink data that CN allows to receive in the first main frame carries out LI/ chargings/policy control.
S15. due to the first data for no longer needing to receive in the first main frame, therefore, it can be abandoned.
S16. down link data is sent to terminal 1 by caching 2.
S17. the second data of mirror image down link data are sent to CN from caching 2, the second addressing data to the
Two main frames.
S18. CN determines that the second data are down link datas.
S19. the down link data that CN allows to receive in the second main frame carries out LI/ chargings/policy control.
S20. due to the second data for no longer needing to receive in the second main frame, therefore, it can be abandoned.
It should be noted that the arrangement of step shown in Fig. 8 has no intention to imply any particular sorted of those steps.For example, step
Rapid S6 and S7 is carried out before being scheduled on step S8 without one;Data can cache regardless of whether when establishing first and at any time
Two tunnels.
First and second data are in the form of allowing CN to distinguish the first data and the second data or mode provides, so as to CN energy
It is enough to treat or handle the first data in a manner of different from the second data.For example, the first and second data may be sent to that in CN
Such as the first and second different respective hosts with different corresponding Internet Protocol (IP) addresses, these main frames can be
Fictitious host computer.CN therefore destination-address the first data of differentiation that can be based on the packet received and the second data.
First data may include the copy or duplicate of the packet sent in a first direction between caching 2 and terminal 1.The
Two data may include the copy or duplicate of the packet sent in a second direction between caching 2 and terminal 1.In those packets
After such as charging and/or Lawful Interception, such as replicating or be forwarded to LI and/or charge system in core network
Afterwards, can be abandoned within the core network.
Refer again to Fig. 5, in this embodiment, processor 16 be also arranged in distinguish caching 2 and terminal 1 between send it is upper
Line link and down link data, and use different IP addresses(Addressed router 21,23)By these data forwardings to CN, with
Allow to distinguish up-link and down link data.
First and second data once receive in CN can be replicated and be sent to single function(Such as LI/ charging work(
Energy), wherein, such as by the way that the first and second data are individually forwarded into the first and second main frames respectively, can be up to distinguish
Link and downlink(For example, it is based on destination-address)Mode application LI and/or charging.It can be lost in the first and second main frames
Abandon the first and second data.Also can be abandoned after the first and second data of processed duplication at function.This replicate and
Gateway node that can be within the core network is forwarded to perform.Due to without performing such processing, therefore, nothing in the first and second main frames
The forwarding of those main frames need to be gone to, and therefore need not actually establish those main frames at all.
Alternatively, the first and second data first can be forwarded to the first and second main frames respectively, wherein, such as in main frame or such as
It is upper described by using independent function, LI and/or charging can be applied in a manner of distinguishing up-link and downlink.Once
By the first and second data for its intended purpose, for example, after LI and/or charging is had been used for, can be abandoned.
Therefore, within the core network, the first and second data are received, the first and second data are distinguished, with different from second
The step of mode of data is treated or handles the first data can be within the core network gateway node perform, such as in service/packet
Gateway node.These steps also can or transfer to perform in the above-mentioned function of receiving the first and second data, such as in LI/ billing functions
Perform, or even performed in the first or second main frame.First and second main frames can be built as the fictitious host computer in gateway node
It is vertical, or can be the physical node for being located away from gateway node.Similarly, the above-mentioned function of receiving the first and second data can
The node of gateway node is located remotely from, or gateway node can be located in itself.Step is abandoned to look into distance host and/or long-range work(
Can rather than it be carried out in gateway node, gateway node only continues data to be forwarded to appropriate main frame or function.
With reference to Fig. 9 herein, show to receive the CN nodes 24 of the first and second data in figure.Show and be respectively used to connect
Receive the first receiver 25 and the second receiver 26 of the first and second data.It will be appreciated that the first receiver 25 and second connects
Device 26 is received to can be included in single receiver.Processor 27 is according to it(Corresponding to the uplink between terminal 1 and caching 2
Road or downlink)First or second data set and apply Different Rule to data.These rules can be from including rule 29
Database 28 obtains.One or more conveyers 30 can provide for data or information about data being sent to such as LI/
Another function such as billing function 22.Pay attention to, in this example, the reception of node processing two datasets, but two datasets exist
The fictitious host computer of the different nodes in CN is addressed in other embodiments.
It will be appreciated that the operation of one or more said modules can be with one or more processors or processing unit
Form provides, the programme-control or offer that processing unit can at least partly by operating on the device or apparatus.Group shown in several
The function of part can actually be performed by single component.Single processor or processing unit may be disposed to perform the work(of multiple components
Energy.
The method and step that accompanying drawing can be considered as a series of message for not only showing to exchange and various nodes perform, and show
Equipment for exchanging those message or performing those method and steps.In addition, for the sake of integrality, it is illustrated or described as from node
A is sent to the step of node B any message implicitly includes the step of node A sends message and Node-B receiver message and saved
Point A and B is used for the part for performing those steps.
A kind of computer program including computer-readable code is also been proposed, computer-readable code is used for control device
Perform such as method proposed herein, or promote when being loaded into equipment equipment to become such as equipment proposed herein, or
Person promotes equipment to perform the method as above proposed when being run in equipment.Program can carry in carrier media.Carrier media can
To be storage media.Carrier media can be transmission media.The equipment for being also contemplated within thus class method programming is comprising this class method
Storage media.It also been proposed a kind of including the production of the computer program of computer-readable media and computer program as described above
Product, wherein, computer program is stored on computer-readable media.Such computer program is storable in computer-readable media
On, such as can implement what is provided from internet website in the signal such as downloading data signal.Disclosure will
Being interpreted as itself includes computer program, the record being either interpreted as on carrier or is interpreted as signal, or with any other
Form understands.
Be preferably due in roaming interface the reason for mirror image business increases, by above-mentioned solution avoid caching come
From the data service of roaming service customer, or allow to be cached for roaming service customer.Exchanged between operators during roaming
In accounting record, up-link and downlink traffic are individually counted.
Turning now to policy control solution, policy control functions are relating to how at for heterogeneous networks and user behavior
Manage the predefined decision of service request and service conveying.
Policy control in mobile network is to be based on the rule defined in policy control and billing function (PCRF), and
By subscriber identity(For example, IMSI)Carry out.When caching system to be introduced to the network of operator, it is also desirable to the strategy control of new type
System such as handles " blacklist " of website, the parent of access content controls and stops or containment given stream to control the behavior of caching
Business gating control.
Parent is controlled for preventing end user from receiving some contents, and currently by CN function treatments.User identity is not
The RNCC caching solutions known be check parent control for specific URL whether active state a solution, it is right
In the solution, cache control system can generate " cache miss "(Even if the content storage of request is in the buffer), and
The HTTP for being then checked for returning from CN is replied.Can be that same request generation second is slow to confirm that parent's control has been applied really
Deposit missing(It is optional), and compare two results.Http response message from CN can have in the URL utilizers newly to ask
Operator's particular configuration of HTTP message/character string is detected during long control by caching.GTP is being carried out subsequently, for identical
The trial next time that tunnel identity (TEID) is carried out, caching can directly apply parent's control response.
Trustship for content, strategy can be using to limit accessibility of the end user to specific trustship content.For
The strategy of " maximum rate " of trustship content can use.Relevant asked with end user's policy control in RNCC 3 and caching 2
The problem of topic includes requiring end user's strategy of the knowledge about IP address/IMSI, and this is by causing trustship relevant, and it is complicated
Produced also with distributed caching solution.
Cache node strategy is, for example, URL blacklist and Fair Usage Policy.Such list can be configured by OaM.
Fair Usage Policy is used to provide protection, prevents the excessive use of Internet resources.It is excessive that subscriber can experience limitation
Use(Other counters on charging)Different actions(For example, containment).Fair Usage Policy generally performs in CN.
A solution of fair the problem of using is that definition " cache node strategy " is used for limiting in RNCC cachings 2
The being serviced caching " flow/chronomere " of RAB/ end users.Statistics comes from the caching 2 for specific end user/RAB
The byte quantity of request, and if flow is higher than threshold value(By policy definition), then request will not be served by caching 2.Algorithm
Change is:
● Fair Usage Policy is calculated in RNCC 3;That is, thus user caches example(Node)During service, by for
RAB(Implicit end user)" flow/chronomere " fair use.In RNCC 3, RAB is identified by carrying ID, is such as existed
As defined in 3GPP.
● the Fair Usage Policy in RBS:Algorithm using the RBS identity that is for example defined by RBS IP address so as to in phase
Compare use with other users in RBS.
● about when the option of activation strategy.Strategy by OaM or can be calculated per RBS IP identity per time unit
The auto-mechanism activation of flow disables, and when reaching predefined threshold value, opens Fair Usage Policy, or loading
When switching to be less than another threshold value, Fair Usage Policy is closed.As long as major advantage is available free capacity, operator just allows having
The height of some users uses in limited time(For example, the download for the content when idle capacity can use, issued transaction will faster
Terminate).Based on RBS identity(And/or RNCC examples)GTP identifiers (RBS TEID) with the RBS of every operation algorithm are per the time
The flow of unit, 2 control systems of caching have information, and can internally determine when reach high threshold.
Therefore, with other users(In caching or RBS regions)Compare, it is unjust that end user can not use caching 2 to realize
Flat excessive use.Strategy is by the OaM settings for caching system.
Gating or access control are the functions for the specific transactions for whether allowing some type defined in CN.Strategy can be used
Whether used up in the general strategy of business, or subscriber business quota.Gating is typically or by tier group according to node(PCRF, pass through
OCS or directly in GGSN)In filter set work.
Buffer control function can imply by analyzing the ratio between the failure download of cache miss and understand that stream will enter
Row gating.If detecting the download of the failure of specific destination, the specific destination is added into blacklist.
Have " cache miss " in caching 2(The content of request is not found in the buffer)When, forwarded and asked by CN.Caching 2
It can detect and be responded by the failure download of CN request.Caching 2 is then able to be used as the finger that terminal 1 will be gated
Show.Caching 2 is then able to determine that it will not serve any new request for carrying out self terminal 1.Cache control system can specially give birth to
Into " cache miss " with based on carrier policy(Based on load, day when, time interval)Detect CN.
Caching 2 can also forward another(It is or several)Request(To improve the confidence level of gating), and if those are asked
Failure, then cache 2 and be able to verify that the connectedness of former server has disappeared.
If performing bandwidth containment, caching 2 can detect whether CN is holding back by generating continuous " cache miss "
The data flow for working out family carrys out detection bandwidth containment.If detect containment(For this terminal 1, the handling capacity lower than expection),
Then caching 2 will continue as the forwarding of this GTP tunnel(Generate cache miss)Business is to CN.Alternatively, caching 2 can determine that directly containment comes
From the business of caching 2.In the case, to stop containment caching 2, caching 2 generates the another " caching for being continuously grouped in stream
Whether missing " has been stopped with detection containment(Detect higher throughput).It is preferable, however, that solution is all containments in CN
Carry out, if because being contained in CN, terminal 1 will not generate many business.
If gating/filtering is performed by destination, caching 2 can be by introducing other cache miss come " test " mesh
Ground(Even if caching 2 is cached with content).If to specific destination(That is, URL)Identical or different GTP tunnel detect it is several
Secondary failed download, then destination can be added in its blacklist by caching 2, or is deleted from its caching and be used for particular bearer tunnel
(=active user)Or for all bearing tunnels(All users)Content.Cache policy is configured by OaM.
Pay attention to, caching 2 is network optimization function, and it provides improved end user's performance body to access and downloading content
Test.Therefore, operator may provide distinguishing reservation, and for example, some subscribers provide " caching as service "
(cache-as-a-service)。
The client of the selection such as can be such as smart phone and laptop computer as the part subscribed is cached,
Or only provided for non-roaming subscriber.Roam charge is to be based on up-link and downlink traffic.Caching 2 can change statistics
Uplink versus downlink flow.Only the possibility operator motivation for subscriber's application cache of their own is to give it certainly
Oneself subscriber preferably services.
In the case, based on the in-band signaling between RNCC 3 and GGSNA/PDN-GW, carried between caching and CN
New interface is supplied.
Operator for caching specifies QoS class identifier (QCI) value, i.e. " type of doing one's best with caching " configuration
For a part for PCC rules, and 2 detected by caching from GTP tunnel.RNCC 3 is also pre-configured with identical value.Solution
Supplier's ad hoc type can be formed or be formed as standardized solution.
For roaming service customer, the cache node option of " no caching " can be used(It is described above).Alternatively, by using QoS
The new value of profile criteria, it is determined that allowing and can use buffer service when available, definable is connect by using 3GPP S8
The roaming interface of mouth(Alternatively by the gn interface with GTP control planes, sent by signal)New caching report signaling.For
Charging, can be user's statistics up-link and downlink industry in visited network if allowed in roaming using caching
Business sum.Pay attention to, solution requires single roaming agreement to define how the business of statistics roaming terminal.
Certainly, it is alternatively not provide LI and billing interface to provide information to the another of CN from caching 2, and is not provided to CN
Report.This solution provides the RNCC 3 with caching 2, and it is without any operation about LI and charging/policy control.
This solution is acceptable when to LI without demand, and is subscribed suitable for " constant expense ", wherein, reaching monthly bucket
Direct gating when measuring (monthly bucket) in the absence of customer service controls(For example, containment), for example, for progress
Caching, when receiving next request from user, expenditure will continue.
Above description provided under the CN in radio access network(RBS, RNC or the aggregation in RAN backhauls
In)Place the solution of transparent content caching.Advantage is the solution proposed by the CN and radio defined in 3GPP
Network system has slight influence.Some solutions may also alternatively develop into the specific solution of supplier or open
Send out into 3GPP standards future version a part.
Propose to realize a solution by the caching under CN in the ran above, it is allowed to sending content to terminal 1
Or from the transmission content of terminal 1(That is, up-link or downlink traffic)When allow distinguishing charging.If business is being gone to
Or sent in up-link from operator's RAN caching systems or downlink, then propose also to allow to detect in LI systems
System.
It will be apparent to one skilled in the art that in the feelings for not departing from the scope of the present invention defined in following claims
Under condition, various modifications can be carried out to above-described embodiment.For example, although above description uses the example of GTP user-plane tunnels
The description present invention, but it is applied to any tunneling technique, such as makes in PMIP, L2TP, CMIP and radio bearer L2 tunnels (RLC)
Those technologies.In addition, present embodiments can apply to any kind of access network for accessing the network for also providing caching
Node, wherein, information must to CN report so as to from caching provide data interworking.It not only needs to be applied to access network
It is the situation of radio access network, and can be used in access network is the network of fixed access network network.
In the above description of various embodiments of the present invention, it is to be understood that term herein is to be served only for describing
Specific embodiment, and have no intention the limitation present invention.Unless otherwise defined, all terms used herein(Including technology
And scientific terminology)With the synonymous being generally understood that with those skilled in the art in the invention.It will be further understood that unless
Explicitly define herein, otherwise, the term such as those terms defined in common dictionary is interpreted as having and this theory
The bright book connotation consistent with connotation in the context of correlation technique, and not with substantially idealization as defined herein or undue
Formal mode understands.
It will be appreciated that although the grade of term first, second can be used to describe different elements herein, these elements should not
It is limited by these terms.These terms are served only for distinguishing an element and another element.For example, the scope of the invention is not being departed from
In the case of, the first element can represent second element, and similarly, second element can represent the first element.Herein
In use, term "and/or" includes any and all combination of one or more associated listed items.
Be described as " connecting " in an element, " coupling ", " response " or its modification to another element when, it can directly connect
Another element is connect, coupled or responded, or neutral element may be present.In contrast, an element is described as " directly connecting
Connect ", " direct-coupling " arrive or during " directly in response to " another element, in the absence of neutral element.Similar label refers in all figures
Similar element.In addition, " coupling ", " connection ", " response " or its modification may include wirelessly to connect as used herein
Connect, couple or respond.Herein in use, unless context clearly dictates otherwise, otherwise, singulative will also include plural shape
Formula.For the sake of concise and/or be clear, well known function or construction can not be described.Term "and/or" includes one or more related
Join any and all combination of Listed Items.
As used herein, term " comprising ", " having " or its modification are open types, and including one or more
The feature, entirety, element, step, component or function, and do not preclude the presence or addition of one or more of the other feature, entirety,
Element, step, component or its group.In addition, as used herein, " such as " can be used for introducing or specifying item mentioned above
Purpose generic instance, and have no intention to limit this intermediate item." " can be used for specifying specific project from more common statement.
Example embodiment is herein with reference to computer implemented method, equipment(System and/or device)And/or computer
The block diagram and/or flow chart illustration of program product are described.It will be appreciated that block diagram and/or the square frame and frame of flow chart illustration
The combination of figure and/or flow chart illustration square frame can be real by the computer program instructions performed by one or more computer circuits
It is existing.These computer program instructions can provide all-purpose computer circuit, special-purpose computer circuit and/or other programmable datas
The processor circuit of process circuit is to produce machine so that the processing through computer and/or other programmable data processing devices
Other nextport hardware component NextPorts in the value stored in the instruction map of device execution and controlling transistor, memory location and such circuit,
Function/the action specified with realizing in block diagram and/or flowchart block, and be consequently formed for realizing block diagram and/or flow chart
The part for the function/action specified in square frame(Feature)And/or structure.
These computer program instructions may be alternatively stored in bootable computer or other programmable data processing devices with spy
In the tangible computer readable media of different directions or tendencies formula operation so that the instruction stored in the computer-readable media produces system
Product, product include realizing the instruction for the function/action specified in block diagram and/or flowchart block.
Tangible, non-transitory computer-readable media may include electronics, magnetic, optics, electromagnetism or Semiconductors data storage
System, device.The more specific example of computer-readable media will include as described below:Portable computer diskette, with
Machine access memory (RAM) circuit, read-only storage (ROM) circuit, EPROM (EPROM or flash memory) electricity
Road, portable compact disc read-only storage (CD-ROM) and portable digital video compact disc read-only memory (DVD/
BluRay)。
Computer program instructions can be also loaded into computer and/or other programmable data processing devices, to promote one
Series of operative steps performs on computer and/or other programmable devices, so as to produce computer-implemented process so that
The instruction performed on computer or other programmable devices provide for implement in block diagram and/or flowchart block specify function/
The step of action.Correspondingly, embodiments of the invention can be within hardware and/or in software(Including firmware, resident software, micro- generation
Code etc.)Middle realization, software are run on the processors such as digital signal processor, can be collectively referred to as " circuit ", " module " or its
Modification.
It should also be noted that in some alternative implementations, function/action shown in square frame can not be with shown in flow
Order is carried out.For example, depending on the function/action being related to, two square frames continuously displayed actually substantially can be performed concurrently, or
Person's square frame can perform in reverse order sometimes.In addition, the feature of the given square frame of flow chart and/or block diagram can be separated into it is more
In individual square frame, and/or the feature of two or more of flow chart and/or block diagram square frame can be at least partially integrated.Finally, may be used
The other square frames of addition/insertion between shown square frame.In addition, though some figures include arrow to show to lead on communication path
The Main way of letter, it is to be understood that, communication can be carried out in the opposite direction of shown arrow.
Many different embodiments have combined above description and figure is disclosed herein.It will be appreciated that word for word describe
It will cause improperly to repeat with each combination and sub-portfolio for showing these embodiments and chaotic.Correspondingly, the sheet of accompanying drawing is included
Specification should be regarded as form embodiment various example combinations and sub-portfolio and formation and using they mode and process it is complete
Whole written description, and will support to it is any it is such combination or sub-portfolio claim.
Following initialism has been used in this specification:
CDR charging data record
DSCP Differentiated Services Code Point
eNB eNodeB
EPS evolved packet systems
The complete fully qualified domain names of FQDN
GGSN Gateway GPRS Support Nodes
GTP GPRS Tunnel Protocol
HLR attaching position registers
HSS home subscriber servers
IMSI International Mobile Subscriber identity
LEA law enforcement agencies
LI Lawful Interceptions
LTE Long Term Evolutions
MSISDN mobile subscribers ISDN
MME mobility management entity
MCC Mobile Country Code MCCs
MNC Mobile Network Codes
OaM operation and maintenance systems
OCH off-line accounting systems
PCC strategies and charging control
PCRF policy controls and charging rule functions
PGW PDN Gateway
PLMN public land mobile networks
QCI QoS class identifiers
QoS service quality
RAB radio bearers
RAN radio access networks
RANAP radio access network application obscure portions(Control protocol in Iu interfaces)
RBS radio base stations
RLC radio bearer L2 tunnels
RNC radio network controllers
RNCC radio nets and cache controller
The S-GW reports of S-CDR charging data record
S-GW gateways
The S1 user planes that S1AP 3GPP are defined
SGSN service gateway support nodes
Subscriber profiles ID defined in SPID 3GPP
The TTL time-to-live
UE user equipmenies.
Claims (18)
1. a kind of method for providing information to core network, wherein, terminal (1) is accessed in the node (3) in network with being located at
Cache (2) and exchange data, methods described is included in the node:
Storage (S1) data in the caching (2);
Determine whether the terminal (1) is roamed in the network outside the home network of the subscriber associated with the terminal;
If the terminal (1) is not roamed in the network outside the home network of the subscriber associated with the terminal,
Allow to exchange (S4) data between the caching (2) and the terminal (1);And
There is provided the information relevant with the data of the exchange to (S5) and arrive the core network,
When wherein, by using the survival in the ping message for accessing between network and the home network and sending is analyzed
Between the in one's duty public land mobile network mark of International Mobile Subscriber body of field and the identification subscriber associated with the terminal (1)
Know any one in symbol, make the terminal (1) whether outside the home network of the subscriber associated with the terminal
Network in the determination that roams.
2. the method as described in claim 1, wherein the information of the offer can be used for any legal prison by the core network
Listen, policy control and charging.
3. method as claimed in claim 1 or 2, also comprise the following steps in the node:
(S2) first user-plane tunnel (14) is established between the caching (2) and the terminal (1);And
(S3) second user Plane tunnel (15) is established between the caching (2) and the core network, wherein described second
User-plane tunnel (15) is provided for sending the described information relevant with the data of the exchange.
4. method as claimed in claim 3, in addition to through the second user Plane tunnel and another user-plane tunnel
The information that any tunnel report selects from following any one:URL for the charging based on service, relevant used described first
The data traffic sent in the Plane tunnel of family so as to carry out the report of the charging based on flow, require quality of service information and
The copy of all packets sent in first user-plane tunnel.
5. method as claimed in claim 4, in addition to pass through following any operation, it is determined that using the second user plane tunnel
The type in road and the information of the another user-plane tunnel report:
Ping message is sent to main frame and detects the Differentiated Services Code Point DSCP changed in the response of the message, its
In, no response instruction should not be allowed to caching to be used for the terminal;
Ping is sent to multiple destinations of pre-determining, and uses the type of the information to be reported of response selection received;
And
Using the value in subscriber profiles ID, it is determined that the type of the information to be reported.
6. method as claimed in claim 3, in addition to:
Establish the first data set of the data for including being sent to the caching (2) from the terminal (1);
Establish the second data set of the data for including being sent to the terminal (1) from the caching (2);
Using the second user Plane tunnel (15) first data set and second number are sent to the core network
According to collection.
7. method as claimed in claim 6, in addition to:
First data set is sent to the first address, and second data set is sent to the second address.
8. method as claimed in claim 1 or 2, in addition to:
The node provide for Lawful Interception node send and receive with the terminal (1) with it is described caching (2) it
Between the relevant information of the data that send Lawful Interception interface (9) and for charging/policing feature hair into the core network
Send and receive the charging of the charging/policy information relevant with the data that send between the terminal (1) and the caching (2)/
At least one policy interface (10).
9. method as claimed in claim 1 or 2, in addition to:
In the node, the first request to the data in the caching is received;
Cache miss is generated, so as to which the data can not be retrieved from the caching;
Monitor the reply from the core network;
Based on the reply of the monitoring, inferential strategy is asked so as to the future being applied to the data in the caching.
10. method as claimed in claim 1 or 2, in addition to:
In the node, the request in the data of the caching from the terminal-pair is received;
Determine whether the terminal has been received by the data volume more than pre-determining from the caching, and if it is, generation
Cache miss, so as to which the data can not be retrieved from the caching.
11. method as claimed in claim 10, wherein the data volume of the pre-determining is from the total amount that can allow data and pre-
It can allow to select in the permissible dose of data in phase time of determination.
12. method as claimed in claim 1 or 2, in addition to:
In the node, the request in the data of the caching from terminal-pair is received;
Determine the request data whether have data pre-determining type, and if it is, generation cache miss, from
And the data can not be retrieved from the caching.
13. a kind of access network nodes (3), the access network nodes include:
Cache (2), be arranged to data storage;
Interface (17), it is arranged to allow the data between the caching (2) and terminal (1) to exchange;
Another interface (18), for providing the information relevant with the data of the exchange to core network;And
Processor, it is arranged to:
Determine whether the terminal (1) is roamed in the network outside the home network of the subscriber associated with the terminal;
If the terminal (1) is not roamed in the network outside the home network of the subscriber associated with the terminal,
Allow to exchange the data that (S4) is stored in the caching between the caching (2) and the terminal (1);
When wherein, by using the survival in the ping message for accessing between network and the home network and sending is analyzed
Between the in one's duty public land mobile network mark of International Mobile Subscriber body of field and the identification subscriber associated with the terminal (1)
Know any one in symbol, make the terminal (1) whether outside the home network of the subscriber associated with the terminal
Network in the determination that roams.
14. access network nodes as claimed in claim 13, wherein the processor (16) is also arranged in:
The first user-plane tunnel (14) is established between the caching (2) and the terminal (1);And
Second user Plane tunnel (15) is established between the caching (2) and the core network, wherein the second user
Plane tunnel (15) is provided for sending the described information relevant with the data of the exchange.
15. access network nodes as claimed in claim 14, wherein the processor (16) is arranged to use using described second
The following any one of family Plane tunnel (15) report:It is URL for the charging based on service, relevant in the first user plane tunnel
The data traffic sent in road is to carry out the report of the charging based on flow and to be sent in first user-plane tunnel
All packets copy.
16. access network nodes as claimed in claim 14, include wherein the processor (16) is arranged to establish from described
Terminal (1) is sent to the first data set of the data of the caching (2) and including being sent to the terminal from the caching (2)
(1) the second data set of data;And
Wherein described processor is arranged to send described the to the core network using the second user Plane tunnel (15)
One data set and second data set.
17. access network nodes as claimed in claim 13, in addition to:
Lawful Interception interface (9), sent for the Lawful Interception node into the core network and in the terminal (1) and institute
State the relevant information of the data sent between caching (2);And
Charging/policy interface (10), sent for the charging into the core network/policing feature and in the terminal (1)
Charging/policy information that the data that send are relevant between the caching (2).
18. a kind of core network node, core network node include:
First receiver (25), the first number of the first host address is sent to for being received through user-plane tunnel from access network
According to collection, first data set includes being sent to the data for caching (2) in the access network from terminal (1);
Second receiver (26), the second data set of the second host address is sent to for receiving, and second data set includes
The data of the terminal (1) are sent to from the caching (2);
Processor (27), for application with handling the Different Rule of first data set to second data set,
Wherein, if the terminal (1) is not roamed in the network outside the home network of the subscriber associated with the terminal,
Allow to exchange (S4) data between the caching (2) and the terminal (1);And
When wherein, by using the survival in the ping message for accessing between network and the home network and sending is analyzed
Between the in one's duty public land mobile network mark of International Mobile Subscriber body of field and the identification subscriber associated with the terminal (1)
Know any one in symbol, make the terminal (1) whether outside the home network of the subscriber associated with the terminal
Network in the determination that roams.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810095270.3A CN108156042B (en) | 2011-04-12 | 2012-04-12 | Method and apparatus for providing information to a core network related to caching in an access network |
Applications Claiming Priority (7)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US201161474447P | 2011-04-12 | 2011-04-12 | |
US61/474447 | 2011-04-12 | ||
US61/474,447 | 2011-04-12 | ||
US201161562030P | 2011-11-21 | 2011-11-21 | |
US61/562030 | 2011-11-21 | ||
US61/562,030 | 2011-11-21 | ||
PCT/EP2012/056667 WO2012140135A1 (en) | 2011-04-12 | 2012-04-12 | Providing information to a core network relating to a cache in an access network |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810095270.3A Division CN108156042B (en) | 2011-04-12 | 2012-04-12 | Method and apparatus for providing information to a core network related to caching in an access network |
Publications (2)
Publication Number | Publication Date |
---|---|
CN103460735A CN103460735A (en) | 2013-12-18 |
CN103460735B true CN103460735B (en) | 2018-02-09 |
Family
ID=
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1754369A (en) * | 2003-02-26 | 2006-03-29 | 日本电气株式会社 | Protocol conversion device and method |
WO2011011458A2 (en) * | 2009-07-20 | 2011-01-27 | Qualcomm Incorporated | TURNING ON FLOWS IN NETWORK INITIATED QoS |
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1754369A (en) * | 2003-02-26 | 2006-03-29 | 日本电气株式会社 | Protocol conversion device and method |
WO2011011458A2 (en) * | 2009-07-20 | 2011-01-27 | Qualcomm Incorporated | TURNING ON FLOWS IN NETWORK INITIATED QoS |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10097662B2 (en) | Providing information to a core network relating to a cache in an access network | |
JP5269980B2 (en) | Billing in LTE / EPC communication networks | |
US11677881B2 (en) | Process-efficient generation of data records for data communications involving groups or aggregates of IoT devices | |
US9479917B1 (en) | Rating group-specific actions for mobile networks | |
US8180333B1 (en) | Differential routing of communication-usage records | |
EP1983776B1 (en) | Inbound Roamer Multimedia Messaging Systems | |
US9197714B2 (en) | User interest and identity control on internet | |
JP2011523824A (en) | Online charging architecture in LTE / EPC communication networks | |
WO2006015548A1 (en) | A processing method based on charging trigger event and re-authorisation event of packet data flow | |
JP2016526357A (en) | Method and apparatus for determining PCRF | |
CN105532012B (en) | Method of video distribution, equipment and system | |
US20130080468A1 (en) | Web Browsing Data Retention | |
WO2014195809A1 (en) | Method and system of handling mobile data roaming | |
CN103460735B (en) | There is provided with caching relevant information to core network in access network | |
CN106358232A (en) | Method, device and system for monitoring business speeds of cellular networks |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant |