CN103685052A - Method and system for diversion control of network data traffic - Google Patents

Method and system for diversion control of network data traffic Download PDF

Info

Publication number
CN103685052A
CN103685052A CN201210355568.6A CN201210355568A CN103685052A CN 103685052 A CN103685052 A CN 103685052A CN 201210355568 A CN201210355568 A CN 201210355568A CN 103685052 A CN103685052 A CN 103685052A
Authority
CN
China
Prior art keywords
data
shunting
data traffic
flow
traffic
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201210355568.6A
Other languages
Chinese (zh)
Other versions
CN103685052B (en
Inventor
龙彪
陈洁
王庆扬
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Telecom Corp Ltd
Original Assignee
China Telecom Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Telecom Corp Ltd filed Critical China Telecom Corp Ltd
Priority to CN201210355568.6A priority Critical patent/CN103685052B/en
Publication of CN103685052A publication Critical patent/CN103685052A/en
Application granted granted Critical
Publication of CN103685052B publication Critical patent/CN103685052B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

The invention discloses a method and system for diversion control of network data traffic, and belongs to the field of network technology. The method comprises detecting data traffic through a core network to obtain detection results of the data traffic of the core network; determining whether to conduct traffic diversion or not based on the detection results of the data traffic of the core network; and if so, conducting traffic local offload for the data. The technical scheme effectively combines traffic detection technology, a dynamic policy control function and traffic offload technology, can achieve an effective grooming of the data traffic, significantly reduces the load on a mobile core network, can achieve dynamic and intelligent diversion decision-making, and is high in user experience.

Description

A kind of method and system that network traffic data is carried out to flow-dividing control
Technical field
The present invention relates to networking technology area, particularly network traffic data is carried out the method and system of flow-dividing control.
Background technology
Day by day abundant mobile Internet business has brought the growth of mobile packet data flow explosion type, has brought new challenge also to mobile network's transmittability and disposal ability simultaneously.
Point-to-point (Peer to Peer, P2P) application is common a kind of network application at present.It refers to that any computer on network serves as dual role simultaneously, as the client and the server end that service is provided of accepting service.High speed unloading software based on P2P adopts location and the shared mechanism of distributed objects, makes to realize between the network user resource-sharing.
Yet high speed unloading software is providing freely for user resources are shared and simultaneously easily, is also bringing negative effect.This negative effect main manifestations is that network bandwidth resources is seriously taken, and then affects normal network service.According to investigation data, show, the total flow of the 50-90% in current internet is all applied from P2P.
In the face of above demand and challenge, telecom operators have correspondingly adopted the technology of mobile network shunting.In 3GPP, that mainly adopt is IP data distribution technology (Selected IP Traffic Offload, SIPTO) at present.This technology is to provide based on Home eNodeB (Home NodeB, HNB) network at first.Its implication is that user's traffic data directly accesses from Home eNodeB, without the core network of operator.With respect to the core network of operator, this part business is directly shunted away from HNB, thereby alleviates load and the transmission cost of core network.
All being routed to relative concentrated core net node with all IP packet compares, employing SIPTO technology can be in the position near user, in the mode distributing, dispose gateway device, thereby allow the data of user terminal to carry out route from the nearer node of geography/logic.Continuing to increase core net pressure after this has been avoided IP flow to increase sharply on the one hand; On the other hand, be IP data selection route nearby, improved the router efficiency of IP packet.
Applicant conducts in-depth analysis to existing IP data distribution technology, find that existing dividing technology carries out based on APN (Access Point Name), cannot to whether shunting, carry out dynamic decision according to the flow pressure of core network, intelligent degree is not high.
Summary of the invention
The present invention is directed to existing method and cannot propose a kind of new technical scheme according to the flow pressure of core network to whether shunting the problem of carrying out dynamic decision, can realize the dynamic and intelligent of shunting decision-making.
According to an aspect of the present invention, a kind of method of network traffic data being carried out to flow-dividing control is disclosed.The method comprises: the data traffic to the core net of flowing through detects, to obtain core network data flow detection result; According to core network data flow detection result, to whether carrying out data distribution, judge; When judgment result is that while being, data are carried out to the local unloading of flow.
Further, the step that the data traffic of the core net of flowing through is detected can comprise: obtain the payload content in the packet of the core net of flowing through, this payload content can comprise point-to-point service data; In payload content from packet, obtain fixation features character string, this fixation features character string is used for identifying point-to-point business datum; According to fixation features character string, detect the data traffic of point-to-point business datum.
Further, according to core network data flow detection result, to the step of whether carrying out data distribution and judging, can comprise: be provided with in advance data traffic shunting threshold value; Core network data flow detection result and data traffic shunting threshold value are compared; When core network data flow detection result is not less than data traffic shunting threshold value, judge the shunting of carrying out data traffic; When core network data flow detection result is less than data traffic shunting threshold value, judges and do not carry out the shunting of data traffic.
Further, to whether carrying out the step that data distribution judges, also comprise: according to the signing attribute of the shunting of terminal, to whether carrying out data distribution, judge.
Further, before the step that signing attribute judges according to the shunting of terminal, the method also comprises: judge whether terminal has the signing attribute of shunting; When judgment result is that while being, the signing attribute of the shunting of terminal is synchronized to for judging whether to carry out the unit of data distribution.
Further, data traffic being carried out to the local step unloading of flow comprises: generate and start flow unloading sign; The signaling that comprises startup flow unloading sign is sent to terminal; Terminal obtains and starts flow unloading sign from this signaling, and shunts and adhere to according to this startup flow unloading sign.The step that this shunting is adhered to can comprise according to the position of terminal selects the local gateway for shunting.When above-mentioned shunting is adhered to successfully, by selected local gateway, carry out the local unloading of flow.
According to a second aspect of the invention, provide a kind of system of network traffic data being carried out to flow-dividing control.This system comprises: data traffic detecting unit, and this unit is for detecting the data traffic of the core net of flowing through, to obtain core network data flow detection result; Shunting decision package, this unit is for according to core network data flow detection result, to whether carrying out data distribution, judges; When judgment result is that while being, by local gateway, data are carried out to the local unloading of flow.
Further, core net comprises packet data gateway; Data traffic detecting unit and packet data gateway can for integral type or be separate type.
Further, data traffic detecting unit can comprise that payload content obtains module, fixation features character string obtains module and data traffic detection module.Payload content obtains module for obtaining the payload content of the packet of the core net of flowing through, and this payload content can comprise point-to-point service data.Fixation features character string obtains module for obtain fixation features character string from the payload content of packet, and this fixation features character string is used for identifying point-to-point business datum.Data traffic detection module, for according to fixation features character string, detects the data traffic of point-to-point business datum.
Further, shunting decision package can comprise data traffic shunting threshold value setting module and the first judge module.Data traffic shunting threshold value setting module is used for setting in advance data traffic shunting threshold value.The first judge module is for comparing core network data flow detection result and data traffic shunting threshold value.When core network data flow detection result is not less than data traffic shunting threshold value, judge the shunting of carrying out data traffic; When core network data flow detection result is less than data traffic shunting threshold value, judges and do not carry out the shunting of data traffic.
Further, shunting decision package also can comprise the second judge module.The second judge module is for judging whether carrying out data distribution according to the signing attribute of the shunting of terminal.
Further, in data being carried out to the process of the local unloading of flow, shunting decision package generates and starts flow unloading sign, and by gateway and base station, the signaling that comprises this startup flow unloading sign is sent to terminal.This terminal is shunted and is adhered to according to this startup flow unloading sign.The step that this shunting is adhered to can comprise according to the position of terminal selects the local gateway for shunting.When shunting is adhered to successfully, by local gateway, carry out the local unloading of flow.
Adopt technical scheme of the present invention, by the data traffic of the core net of flowing through is detected, according to this flow detection result and take the signing attribute of shunting of terminal into consideration, carry out final shunting decision-making.Due to flow detection technology, dynamic strategy are controlled to function and the effective combination of flow Unloading Technology, this scheme can realize effectively dredging of data traffic, obviously alleviate the load of mobile core network, can realize mobilism and the intellectuality of shunting decision-making, user experience is high.
Accompanying drawing explanation
The accompanying drawing that forms a part for specification has been described embodiments of the invention, and together with the description for explaining principle of the present invention.
With reference to accompanying drawing, according to detailed description below, can more be expressly understood the present invention, wherein:
Fig. 1 shows according to a kind of flow chart that network traffic data is carried out to an embodiment of method of flow-dividing control of the present invention.
Fig. 2 shows in Fig. 1 whether carrying out the flow chart of the step that data distribution judges.
Fig. 3 shows the flow chart that carries out the step of triage operator in Fig. 1.
Fig. 4 shows according to the flow chart of another embodiment of a kind of method of network traffic data being carried out to flow-dividing control of the present invention.
Fig. 5 shows according to the structural representation of an embodiment of a kind of system of network traffic data being carried out to flow-dividing control of the present invention.
Embodiment
Now with reference to accompanying drawing, describe various exemplary embodiment of the present invention in detail.It should be noted that: unless illustrate in addition, the parts of setting forth in these embodiments and positioned opposite, numeral expression formula and the numerical value of step do not limit the scope of the invention.
, it should be understood that for convenience of description, the size of the various piece shown in accompanying drawing is not to draw according to actual proportionate relationship meanwhile.
To the description only actually of at least one exemplary embodiment, be illustrative below, never as any restriction to the present invention and application or use.
Fig. 1 shows according to a kind of flow chart that network traffic data is carried out to an embodiment of method of flow-dividing control of the present invention.
In step S11, the data traffic of the core net of flowing through is detected, to obtain core network data flow detection result.
In step S12, according to core network data flow detection result, to whether carrying out data distribution, judge.
Particularly, can be provided with in advance data traffic shunting threshold value.
Above-mentioned core network data flow detection result and this data traffic shunting threshold value are compared.When core network data flow detection result is not less than data traffic shunting threshold value, judge the shunting of carrying out data traffic, perform step S13; When core network data flow detection result is less than data traffic shunting threshold value, judge and do not carry out the shunting of data traffic, perform step S14.
It should be noted that, decision-making foundation is not limited to this index of data traffic, also can comprise subscription data or other many indexs of user terminal.
In step S13, implement triage operator, near Access Network side, implementing shunting.
In step S14, do not carry out triage operator, data are still passed through in core net, but can correspondingly take speed limit process or block and process, or do not carry out any processing.
Detailed content according to core network data flow detection result to the step (being step S12) of whether carrying out data distribution and judging, can be referring to Fig. 2.
As shown in Figure 2, in step S111, obtain the payload content in the packet of the core net of flowing through.
The data of the core net of flowing through can comprise various types of data.Wherein, the user data that P2P data are large as data volume, income is little, can be used as the first-selection of streamed data.Certainly, it will be understood by those of skill in the art that and also can select as required the data of other types to measure, at this, do not limit.Below so that the detection of P2P data is carried out to exemplary illustration.
In step S112, in the payload content from packet, obtain fixation features character string.
Particularly, by deeply reading the content of IP payload package, the application layer in OSI7 layer protocol is recombinated, obtain the fixation features character string that can identify P2P type of service in packet.For example, the identification of bit stream (Bittorrent) agreement is analyzed by peer protocol.Peer protocol is by the beginning of shaking hands, after be the message flow of circulation.Before each message, there is a numeral to represent the length of message.In its handshake procedure, first send 19, then send character string " BitTorrent Protocol ", " 19BitTorrent Protocol " is exactly the fixation features character string of BitTorrent so.
In step S113, according to fixation features character string, detect the data traffic of P2P business datum.
Relevant detailed content of carrying out triage operator (being step S13) can be referring to Fig. 3.
As shown in Figure 3, in step S131, for shunting the unit of decision-making, generate startup flow unloading sign.
In step S132, the signaling that comprises startup flow unloading sign is sent to user terminal.
Particularly, can pass through IP connected reference network (IP-Connectivity Access Network, IP-CAN) the flow process notice packet data network gateway of session modification (Packet Data Network Gateway, PGW) start flow unloading, PGW initiates default bearing deactivation flow process, and the signaling that comprises the most at last this startup flow unloading sign is sent to user terminal.
In step S133, terminal identifies and starts flow unloading sign from received signaling.
In step S134, terminal starts flow unloading sign according to this, shunts and adheres to.
In step S135, when foundation completes streamed data connection, this terminal accesses objective network by local gateway, for example, access Internet net.
Fig. 4 shows according to the flow chart of another embodiment of a kind of method of network traffic data being carried out to flow-dividing control of the present invention.
In step S21, user terminal sends and adheres to request (Attach Req) to base station.
In step S22, base station is adhered to request by this and is sent to mobile management entity (Mobility Management Entity, MME).
In step S23, MME sends authentication information request (Authentication Informaiton Request) to home subscriber server (Home Subscriber Server, HSS).
In step S24, HSS returns to authentication information request response to MME.
The signing attribute of shunting that has comprised user terminal in this request response, can know the whether signing shunting of this user terminal according to this signing attribute, thereby can be used as the foundation of follow-up shunting decision-making.
Particularly, HSS can judge whether this terminal has the signing attribute of shunting.When judgment result is that while being, this attribute is added in this authentication information request response.
In step S25, MME generates default bearing request (Default Bearer Req), and is sent to gateway.
The CAMEL-Subscription-Information that has comprised user terminal in this default bearing request.
In step S26, gateway is sent to packet data gateway by default bearing request.
In step S27, packet data gateway is set up IP connected reference network (IP-Connectivity Access Network, IP-CAN) session with shunting decision package.
By step S24 ~ S27, HSS can be synchronized to shunting decision package by the signing attribute of the shunting of user terminal.
In step S28, grouped data network gateway sends default bearing response (Default Bearer Resp) to gateway.
In step S29, gateway sends default bearing response to MME.
In step S30, MME sends initial context and sets up request (Initial Context Setup Req) to base station, can be also to adhere to receipt message (Attach Accept).
In step S31, base station sends Radio Resource to user terminal and controls (Radio Res ource Control, RRC) connection restructuring message (Connection Reconfiguranti on).
In step S32, user terminal returns to RRC and connects the message (R RC Connection Reconfigurantion Complete) of having recombinated to base station.
In step S33, base station is returned to initial context to MME and is set up response (Initial Context Setup Resp).
In step S34, user terminal sends direct-sending message (Direct Transfe r) to base station.
In step S35, base station sends and has adhered to message (Attac h Complete) to mobile management entity.
In completing above-mentioned attachment flow, terminal is initiated a series of flow processs such as P2P application connection.Now, P2P flow is through core network.
In step S36, data traffic detecting unit detects the data traffic through core net.
In this step, first, obtain the payload content in the packet of the core net of flowing through.
The data of the core net of flowing through can comprise various types of data.Wherein, the user data that P2P data are large as data volume, income is little, can be used as the first-selection of streamed data.Certainly, it will be understood by those of skill in the art that and also can select as required the data of other types to measure, at this, do not limit.Below so that the detection of P2P data is carried out to exemplary illustration.
Then, can in the payload content from packet, obtain fixation features character string.
Finally, can, according to fixation features character string, detect the data traffic of P2P business datum.
In step S37, data traffic detecting unit is sent to shunting decision package by flow detection result.
In step S38, the judgement whether shunting decision package is shunted.
Shunting decision package can be shunted decision-making according to the signing attribute of the shunting of flow detection result and user terminal.
In step S39, when shunting decision package determines to implement shunting, shunting decision package sends IP-CAN session modification message to grouped data network gateway.This message comprises that starting flow unloading identifies.
In step S40, grouped data network gateway sends carrying deactivation request (Delete Bearer Request) to gateway, and this request comprises startup flow unloading sign.
In step S41, gateway sends carrying deactivation request to MME, and this request comprises startup flow unloading sign.
In step S42, MME sends detach request (Detach Req) to user terminal, also comprises and start flow unloading sign in this request.
In step S43, terminal identifies and starts flow unloading sign from Detach Req, and shunts attachment flow.
Shunting attachment flow herein can be similar with the attachment flow of S21~S35, do not repeat them here.Wherein, MME is selecting local gateway to set up in the process of packet data network connection for user, can be according to the positional information assisted Selection local gateway of user terminal.
After shunting has been adhered to, terminal is connected to objective network by local gateway, and the data traffic producing is no longer passed through core network.
Above-mentioned disclosed technical scheme is specially adapted to the policy charging control architecture based on business measuring ability in Long Term Evolution (Long Term Evolution, LTE) network.Adopt technical scheme of the present invention, by the data traffic of the core net of flowing through is detected, according to this flow detection result and take the signing attribute of shunting of terminal into consideration, carry out final shunting decision-making.Adopt this scheme, due to flow detection technology, dynamic strategy are controlled to function and the effective combination of flow Unloading Technology, can realize effectively dredging of data traffic, obviously alleviate the load of mobile core network, can realize mobilism and the intellectuality of shunting decision-making, user experience is high.
Fig. 5 shows according to the structural representation of an embodiment of a kind of system of network traffic data being carried out to flow-dividing control of the present invention.
As shown in Figure 5, this system comprises terminal 11, base station 12, gateway 13, local gateway 14, mobile management entity 15, packet data network service gateway 16, home subscriber server 17, data traffic detecting unit 18 and shunting decision package 19.
Terminal 11 is for being applicable to the terminal equipment of Long Term Evolution (Long Term Evolution, LTE)/evolution bag core (Evolved Packte Core, EPC) network.Base station 12 is evolved base station (Evolved Node B, eNB, also referred to as E-UTRAN), is responsible for Access Network part.Gateway (Serving Gate) 13 is gateways that end at E-UTRAN interface.Local gateway 14 can be local packet data network service gateway (Local Packte Data Network GateWay, L-PGW).Mobile management entity 15(Mobility Management Entity, MME) for the treatment of evolution block core (Evolved Packet Core, EPC) signaling.Packet data network service gateway 16(Packte Data Network GateWay, P-GW) be the gateway towards packet data network.Home subscriber server 17(Home Subscriber Server, HSS) for storing user data, this user data comprises the shunting subscription data of user terminal, for example SIPTO subscription data.Data traffic detecting unit 18 has data traffic measuring ability (Transborder Data Flow, TDF); Shunting decision package 19 can have strategy and billing function (Policy and Charging Rules Function, PCRF).
Wherein, mobile management entity 15, packet data network service gateway 16, home subscriber server 17, data traffic detecting unit 18 and shunting decision package 19 form core net.Alternatively, packet data network service gateway 16 and data traffic detecting unit 18 can be integral types, can be also separate types.
Generally, terminal 11 is by wireless network and gateway 13 core network access.The in the situation that of data distribution, terminal 11 by base station 12, gateway 13 and local gateway 14 access objective networks, for example, enters the Internet 20.
Wherein, data traffic detecting unit 18 can comprise that payload content obtains module 181, fixation features character string obtains module 182 and data traffic detection module 183.
In testing process, payload content obtains module 181 for obtaining the payload content of the packet of the core net of flowing through.
The data of the core net of flowing through can comprise various types of data.Wherein, the user data that P2P data are large as data volume, income is little, can be used as the first-selection of streamed data.Certainly, it will be understood by those of skill in the art that and also can select as required the data of other types to measure, at this, do not limit.Below the detection of P2P data is carried out to exemplary illustration.
Fixation features character string obtains module 182 can obtain fixation features character string in the payload content from packet.
Particularly, by deeply reading the content of IP payload package, the application layer in OSI7 layer protocol is recombinated, obtain the fixation features character string that can identify P2P type of service in packet.For example, the identification of bit stream (Bittorrent) agreement is analyzed by peer protocol.Peer protocol is by the beginning of shaking hands, after be the message flow of circulation.Before each message, there is a numeral to represent the length of message.In its handshake procedure, first send 19, then send character string " BitTorrent Protocol ", " 19BitTorrent Protocol " is exactly the fixation features character string of BitTorrent so.
Data traffic detection module 183 can, according to fixation features character string, detect the data traffic of P2P business datum.
In an example, shunting decision package 19 can comprise data traffic shunting threshold value setting module 191 and the first judge module 192.Data traffic shunting threshold value setting module 191 is for setting in advance data traffic shunting threshold value.The first judge module 192 is for comparing core network data flow detection result and described data traffic shunting threshold value.
When core network data flow detection result is not less than data traffic shunting threshold value, judge the shunting of carrying out data traffic; When core network data flow detection result is less than data traffic shunting threshold value, judges and do not carry out the shunting of data traffic.
In another example, shunting decision package 19 also can comprise the second judge module 193.The second judge module 193 is for judging whether carrying out data distribution according to the signing attribute of the shunting of terminal.SIPTO subscription data is stored in HSS17, can the SIPTO subscription data of this terminal be synchronized to shunting decision package 19 by steps such as Authentication Response, establishment default bearing, IP-CAN session establishments, thereby as the foundation of shunting decision-making.
In data being carried out to the process of the local unloading of flow, 19 generations of shunting decision package start flow unloading sign, and unload by IP-CAN session modification flow process notice PGW16 startup flow.PGW16 sends to MME15 the information with starting flow unloading sign through SGW13 by Delete Bearer Request message.MME15 sends to terminal 11 by Detach Request message corresponding startup flow unloading sign.Terminal 11 receives that the startup flow that network side sends unloads after notice, carries out SIPTO attachment flow.In this attachment flow, MME15 is according to the positional information of user terminal 11, for this terminal is selected suitable local gateway.
In system of the present invention, be provided with data traffic detecting unit and shunting decision package.Data traffic detecting unit can detect the data traffic of the core net of flowing through, and shunting decision package can and be taken the signing attribute of shunting of terminal into consideration according to this flow detection result, carries out final shunting decision-making.Due to flow detection technology, dynamic strategy are controlled to function and the effective combination of flow Unloading Technology, this scheme can realize effectively dredging of data traffic, obviously alleviate the load of mobile core network, can realize mobilism and the intellectuality of shunting decision-making, user experience is high.
For the known technology of person of ordinary skill in the relevant, method and apparatus, may not discuss in detail, but in suitable situation, described technology, method and apparatus should be regarded as authorizing a part for specification.
In all examples with discussing shown here, it is exemplary that any occurrence should be construed as merely, rather than as restriction.Therefore, other example of exemplary embodiment can have different values, or Mathematic calculation method method, to realize identical calculating object.
It should be noted that: in similar label and letter accompanying drawing below, represent similar terms, therefore, once be defined in an a certain Xiang Yi accompanying drawing, in accompanying drawing subsequently, do not need it to be further discussed.
So far, described a kind of method and system that network traffic data is carried out to flow-dividing control in detail.For fear of covering design of the present invention, details more known in the field are not described.Those skilled in the art, according to description above, can understand how to implement technical scheme disclosed herein completely.
Although specific embodiments more of the present invention are had been described in detail by example, it should be appreciated by those skilled in the art, above example is only in order to describe, rather than in order to limit the scope of the invention.It should be appreciated by those skilled in the art, can without departing from the scope and spirit of the present invention, above embodiment be modified.Scope of the present invention is limited by claims.

Claims (12)

1. network traffic data is carried out to a method for flow-dividing control, it is characterized in that, the method comprises:
Data traffic to the core net of flowing through detects, to obtain core network data flow detection result;
According to described core network data flow detection result, to whether carrying out data distribution, judge;
When judgment result is that while being, data are carried out to the local unloading of flow.
2. the method for claim 1, is characterized in that, the described step that the data traffic of the core net of flowing through is detected comprises:
Obtain the payload content in the packet of the described core net of flowing through, described payload content comprises point-to-point service data;
In payload content from described packet, obtain fixation features character string, described fixation features character string is used for identifying described point-to-point service data;
According to described fixation features character string, detect the data traffic of described point-to-point service data.
3. the method for claim 1, is characterized in that, describedly according to core network data flow detection result, the step of whether carrying out data distribution and judging is comprised:
Be provided with in advance data traffic shunting threshold value;
Described core network data flow detection result and described data traffic shunting threshold value are compared;
When described core network data flow detection result is not less than described data traffic shunting threshold value, judge the shunting of carrying out data traffic;
When described core network data flow detection result is less than described data traffic shunting threshold value, judges and do not carry out the shunting of data traffic.
4. the method for claim 1, is characterized in that, describedly to whether carrying out the step that data distribution judges, also comprises:
According to the signing attribute of the shunting of terminal, to whether carrying out data distribution, judge.
5. method as claimed in claim 4, is characterized in that, before the described step that signing attribute judges according to the shunting of terminal, described method also comprises:
Judge whether terminal has the signing attribute of shunting;
When judgment result is that while being, the signing attribute of the shunting of described terminal is synchronized to for judging whether to carry out the unit of data distribution.
6. the method for claim 1, is characterized in that, the described step that data traffic is carried out to the local unloading of flow comprises:
Generate and start flow unloading sign;
The signaling that comprises described startup flow unloading sign is sent to terminal;
Terminal obtains described startup flow unloading sign from described signaling, and shunts and adhere to according to described startup flow unloading sign, and the step that described shunting is adhered to comprises according to the position of terminal selects the local gateway for shunting;
When described shunting is adhered to successfully, by described local gateway, carry out the local unloading of flow.
7. network traffic data is carried out to a system for flow-dividing control, it is characterized in that, this system comprises:
Data traffic detecting unit, this unit is for detecting the data traffic of the core net of flowing through, to obtain core network data flow detection result;
Shunting decision package, this unit is for according to described core network data flow detection result, to whether carrying out data distribution, judges;
When judgment result is that while being, by local gateway, data are carried out to the local unloading of flow.
8. system as claimed in claim 7, is characterized in that,
Described core net comprises packet data gateway;
That described data traffic detecting unit and described packet data gateway are integral type or for separate type.
9. system as claimed in claim 7, is characterized in that, described data traffic detecting unit comprises:
Payload content obtains module, and for obtaining the payload content of the packet of the described core net of flowing through, described payload content comprises point-to-point service data;
Fixation features character string obtains module, and for obtaining fixation features character string the payload content from described packet, described fixation features character string is used for identifying described point-to-point service data;
Data traffic detection module, for according to described fixation features character string, detects the data traffic of described point-to-point service data.
10. system as claimed in claim 7, is characterized in that, described shunting decision package comprises:
Data traffic shunting threshold value setting module, for setting in advance data traffic shunting threshold value;
The first judge module, for described core network data flow detection result and described data traffic shunting threshold value are compared,
When described core network data flow detection result is not less than described data traffic shunting threshold value, judge the shunting of carrying out data traffic,
When described core network data flow detection result is less than described data traffic shunting threshold value, judges and do not carry out the shunting of data traffic.
11. systems as claimed in claim 7, is characterized in that,
Described shunting decision package also comprises the second judge module, and described the second judge module is for judging whether carrying out data distribution according to the signing attribute of the shunting of terminal.
12. systems as claimed in claim 7, is characterized in that, described, data carried out in the local process unloading of flow,
Described shunting decision package generates and starts flow unloading sign, and by gateway and base station, the signaling that comprises described startup flow unloading sign is sent to terminal;
Described terminal is shunted and is adhered to according to described startup flow unloading sign, and the step that described shunting is adhered to comprises according to the position of terminal selects the local gateway for shunting;
When described shunting is adhered to successfully, by described local gateway, carry out the local unloading of flow.
CN201210355568.6A 2012-09-21 2012-09-21 A kind of method and system that flow-dividing control is carried out to network traffic data Active CN103685052B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201210355568.6A CN103685052B (en) 2012-09-21 2012-09-21 A kind of method and system that flow-dividing control is carried out to network traffic data

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201210355568.6A CN103685052B (en) 2012-09-21 2012-09-21 A kind of method and system that flow-dividing control is carried out to network traffic data

Publications (2)

Publication Number Publication Date
CN103685052A true CN103685052A (en) 2014-03-26
CN103685052B CN103685052B (en) 2018-03-02

Family

ID=50321406

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201210355568.6A Active CN103685052B (en) 2012-09-21 2012-09-21 A kind of method and system that flow-dividing control is carried out to network traffic data

Country Status (1)

Country Link
CN (1) CN103685052B (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105634980A (en) * 2016-01-07 2016-06-01 北京佰才邦技术有限公司 Data message processing method and base station
CN105813137A (en) * 2014-12-31 2016-07-27 中国电信股份有限公司 Network shunting method and network shunting device
CN105979550A (en) * 2016-07-15 2016-09-28 柳州健科技有限公司 Local area network data platform
CN106027405A (en) * 2016-05-03 2016-10-12 浙江宇视科技有限公司 Data stream probe method and device
WO2018205756A1 (en) * 2017-05-09 2018-11-15 中国移动通信有限公司研究院 Data packet flow distribution method, device and computer storage medium
CN112073393A (en) * 2020-08-27 2020-12-11 黄天红 Flow detection method based on cloud computing and user behavior analysis and big data center
CN113473538A (en) * 2021-07-13 2021-10-01 蒋溢 Wireless convergence network-based shunt control method and system

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101547356A (en) * 2008-03-24 2009-09-30 展讯通信(上海)有限公司 Video code stream receiving, sending and retransmission method and equipment
CN102209348A (en) * 2011-05-26 2011-10-05 中国电信股份有限公司 Flow downloading method and system as well as packet data network gateway
CN102244899A (en) * 2010-05-13 2011-11-16 中兴通讯股份有限公司 Method and device for offloading internet access data in access network

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101547356A (en) * 2008-03-24 2009-09-30 展讯通信(上海)有限公司 Video code stream receiving, sending and retransmission method and equipment
CN102244899A (en) * 2010-05-13 2011-11-16 中兴通讯股份有限公司 Method and device for offloading internet access data in access network
CN102209348A (en) * 2011-05-26 2011-10-05 中国电信股份有限公司 Flow downloading method and system as well as packet data network gateway

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105813137A (en) * 2014-12-31 2016-07-27 中国电信股份有限公司 Network shunting method and network shunting device
CN105813137B (en) * 2014-12-31 2019-07-02 中国电信股份有限公司 Network shunt method and apparatus
CN105634980A (en) * 2016-01-07 2016-06-01 北京佰才邦技术有限公司 Data message processing method and base station
CN105634980B (en) * 2016-01-07 2018-10-12 北京佰才邦技术有限公司 Data message processing method and base station
CN106027405A (en) * 2016-05-03 2016-10-12 浙江宇视科技有限公司 Data stream probe method and device
CN105979550A (en) * 2016-07-15 2016-09-28 柳州健科技有限公司 Local area network data platform
WO2018205756A1 (en) * 2017-05-09 2018-11-15 中国移动通信有限公司研究院 Data packet flow distribution method, device and computer storage medium
CN112073393A (en) * 2020-08-27 2020-12-11 黄天红 Flow detection method based on cloud computing and user behavior analysis and big data center
CN112073393B (en) * 2020-08-27 2021-03-19 上海品付信息科技股份有限公司 Flow detection method based on cloud computing and user behavior analysis
CN113473538A (en) * 2021-07-13 2021-10-01 蒋溢 Wireless convergence network-based shunt control method and system

Also Published As

Publication number Publication date
CN103685052B (en) 2018-03-02

Similar Documents

Publication Publication Date Title
CN103685052A (en) Method and system for diversion control of network data traffic
EP3364676B1 (en) Method for supporting pdn gw selection
US9326184B2 (en) Policy and charging control for multiple sub-flows
EP3001735B1 (en) Service offloading method and base station
WO2016082553A1 (en) Method, device and system for distributing mobile network content
CN103428731B (en) Routing optimization method and system, gateway
US20150163813A1 (en) Bandwidth control method, device, and system
CN101730172A (en) Switching method and device based on access network selection
US10321385B2 (en) Method and apparatus for providing quality of service for web-based real-time communication
CN102123035B (en) Policy and charging rules function (PCRF) entity selection method, device and system
CN107277882B (en) Data routing method, device and base station
CN109787799B (en) Quality of service (QoS) control method and equipment
CN111756592B (en) Policy processing method and entity
US20220295580A1 (en) Methods of and Devices for Enabling a Core Network of a Mobile Communication Network to Perform Mobility Actions based on a Radio Access Technology, RAT, with which a User Equipment, UE, Connects to Said Core Network
US11432121B2 (en) Service function chain interworking
CN101998515B (en) The implementation method of control PCRF load balancing and realize system
US20160234081A1 (en) ON-DEMAND QOs FOR DATA CONNECTIONS
CN103781048B (en) The addressing method and equipment of strategy and charging control entity
US11588887B2 (en) Peer to peer communications for repairing wireless multicast/broadcast delivered content
CN103078829A (en) Method and device for reporting application information
KR101954397B1 (en) Method for packet barring in LTE mobile communication system and, system therefor
US11050799B2 (en) Methods and devices for registering a user equipment, UE, with low access priority in an internet protocol based multimedia subsystem, IMS
KR20100063833A (en) Apparatus and method for recommending content based on monitoring of content recommend condition
US9692606B2 (en) Management of a policy controlled group
CN103476022A (en) Method of determining user identification and informing the user identification, equipment and system thereof

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant