CN106455065A - Method and device to control the use of unauthorized frequency band - Google Patents

Method and device to control the use of unauthorized frequency band Download PDF

Info

Publication number
CN106455065A
CN106455065A CN201510478213.XA CN201510478213A CN106455065A CN 106455065 A CN106455065 A CN 106455065A CN 201510478213 A CN201510478213 A CN 201510478213A CN 106455065 A CN106455065 A CN 106455065A
Authority
CN
China
Prior art keywords
strategy
lte
frequency range
unauthorized frequency
session
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201510478213.XA
Other languages
Chinese (zh)
Inventor
汪治
蔡亦钢
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Alcatel Optical Networks Israel Ltd
Original Assignee
Alcatel Optical Networks Israel Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alcatel Optical Networks Israel Ltd filed Critical Alcatel Optical Networks Israel Ltd
Priority to CN201510478213.XA priority Critical patent/CN106455065A/en
Priority to PCT/IB2016/001160 priority patent/WO2017021773A1/en
Publication of CN106455065A publication Critical patent/CN106455065A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L5/00Arrangements affording multiple use of the transmission path
    • H04L5/003Arrangements for allocating sub-channels of the transmission path
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W72/00Local resource management
    • H04W72/50Allocation or scheduling criteria for wireless resources
    • H04W72/53Allocation or scheduling criteria for wireless resources based on regulatory allocation policies
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L65/00Network arrangements, protocols or services for supporting real-time applications in data packet communication
    • H04L65/1066Session management
    • H04L65/1069Session establishment or de-establishment
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W16/00Network planning, e.g. coverage or traffic planning tools; Network deployment, e.g. resource partitioning or cells structures
    • H04W16/14Spectrum sharing arrangements between different networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W72/00Local resource management
    • H04W72/50Allocation or scheduling criteria for wireless resources
    • H04W72/56Allocation or scheduling criteria for wireless resources based on priority criteria
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup
    • H04W76/12Setup of transport tunnels
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L27/00Modulated-carrier systems
    • H04L27/0006Assessment of spectral gaps suitable for allocating digitally modulated signals, e.g. for carrier allocation in cognitive radio
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L5/00Arrangements affording multiple use of the transmission path
    • H04L5/003Arrangements for allocating sub-channels of the transmission path
    • H04L5/0058Allocation criteria
    • H04L5/0064Rate requirement of the data, e.g. scalable bandwidth, data priority
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L5/00Arrangements affording multiple use of the transmission path
    • H04L5/003Arrangements for allocating sub-channels of the transmission path
    • H04L5/0058Allocation criteria
    • H04L5/0076Allocation utility-based
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L5/00Arrangements affording multiple use of the transmission path
    • H04L5/003Arrangements for allocating sub-channels of the transmission path
    • H04L5/0078Timing of allocation
    • H04L5/0087Timing of allocation when data requirements change
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W28/00Network traffic management; Network resource management
    • H04W28/02Traffic management, e.g. flow control or congestion control
    • H04W28/0226Traffic management, e.g. flow control or congestion control based on location or mobility

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Business, Economics & Management (AREA)
  • General Business, Economics & Management (AREA)
  • Multimedia (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention provides a method and device to control the use of unauthorized frequency band in an LTE-U system. The method comprises the following steps. When a PCRF receives a request to establish a session, an LTE-U strategy is generated for the session. The LTE-U strategy includes relevant information of the unauthorized frequency band the session uses; and then, the LTE-U strategy is notified to an eNB where the LTE-U strategy is executed by the eNB. When the triggering conditions are satisfied, the PCRF modifies the LTE-U strategy; and the modified LTE-U strategy is notified to the eNB where the modified LTE-U strategy is executed by the eNB. According to the invention, progress has been made in the prior art by the introduction of a resource allocation method for unauthorized frequency band. And through the defining of the LTE-U strategy and the modification of the LTE-U strategy according to various triggering conditions, it is possible to realize the dynamic and flexible utilization of unauthorized frequency band resources.

Description

A kind of method and apparatus of the use for controlling unauthorized frequency range
Technical field
The present invention relates to communication technical field, more particularly, to one of LTE-U system resource The technology using.
Background technology
Increasing rapidly with wireless traffic, people are to the capacity of wireless communication system and spectrum requirement Also improve therewith.In this case, the mandate resource of frequency range of LTE system seems that relative deficiency rises Come.Therefore, 3GPP proposes LTE-U (LTE in Unlicensed spectrum, abbreviation LTE-U) Technological frame, by LTE system from mandate band spreading to unauthorized frequency range.
At present, unauthorized frequency range being polymerized mainly has three kinds to mandate frequency range in the way of hoist capacity, Wherein first two is relatively common.
One is to supplement downlink mode (Supplemental DownLink, abbreviation SDL), that is, Unauthorized frequency range is only used to do downlink transmission, and this is very typical in current network application;
Two is carrier aggregation mode (Carrier Aggregation, abbreviation CA), that is, allow not awarding Power frequency range is used for downlink and up-link, such as typical LTE TDD system, its most critical Advantage is exactly the amount that flexible exempts from licensed band resource for uplink and downlink link.
Three is stand-alone mode (Stand Alone, abbreviation SA), independently transports in unauthorized frequency range Row LTE and do not use mandate frequency range.
In SDL and CA pattern, unauthorized frequency range is only used for data Layer, all of key-course All by authorizing frequency range to process, operator is controlled flow to mandate and the unauthorized resource of frequency range simultaneously.
However, the introducing of LTE-U and use also bring a lot of challenges.One of them is:As What fully, maximally utilise the resource of unauthorized frequency range, that is, how dynamically, spirit Distribute the resource of unauthorized frequency range alively.
In the existing standard of 3GPP, the resource how distributing unauthorized frequency range is not made Regulation.Therefore, in order to give full play to the advantage of LTE-U, be highly desirable to propose a kind of dynamic, The use technology of the flexible unauthorized resource of frequency range.
Content of the invention
It is an object of the invention to provide a kind of method and apparatus of the use controlling unauthorized frequency range.
According to the first aspect of the invention, there is provided in a kind of PCRF in LTE-U system Method for controlling the use of unauthorized frequency range, the method comprises the following steps:A. receive IP-CAN session establishment request from PGW;B. it is that described session generates LTE-U strategy, Described LTE-U strategy contains the relevant information that described session uses unauthorized frequency range;C. to Described PGW sends the request of IP-CAN session establishment and replys, and wherein contains described generation LTE-U strategy.
Preferably, described step b further includes:Judge whether described session meets using not Authorize the condition of frequency range;If it is satisfied, generating described LTE-U strategy for described session.
Preferably, methods described also includes:When described session is from being unsatisfactory for using unauthorized frequency range Condition become and generate LTE-U plan for described session during the condition meeting using unauthorized frequency range Slightly;Configure message to described PGW sending strategy, wherein contain the LTE-U of described generation Strategy.
Preferably, methods described also includes:Change described LTE-U when trigger condition meets Strategy;Configure message to described PGW sending strategy, wherein contain described amended LTE-U strategy.
Preferably, described trigger condition at least includes in following various situation:Described PCRF detects the one new carrying of described IP-CAN conversation establishing;Described PCRF inspection Measure user related data or network condition there occurs change;Wherein, described user related data At least include in the following:User type, user account remaining sum, the data using Flow, user equipment electricity, the speed of user's movement or frequency, market demand type, carrying Information, the service parameter of user;Described network condition at least includes network load information.
According to the second aspect of the invention, there is provided use in a kind of eNB in LTE-U system In the method for the use controlling unauthorized frequency range, the method comprises the following steps:Reception is derived from The configured information of PCRF, wherein contains the LTE-U strategy of an IP-CAN session, institute State LTE-U strategy and contain the relevant information that described session uses unauthorized frequency range;According to described The use of unauthorized frequency range described in LTE-U policy control.
According to the third aspect of the present invention, there is provided in a kind of PCRF in LTE-U system For controlling the device of the use of unauthorized frequency range, this device includes:First receiving device, uses Ask in receiving the IP-CAN session establishment from PGW;First strategy generating device, uses In generating LTE-U strategy for described session, described LTE-U strategy contains described session and makes Relevant information with unauthorized frequency range;First dispensing device, for sending to described PGW The request of IP-CAN session establishment is replied, and wherein contains the LTE-U strategy of described generation.
Preferably, described first strategy generating device is further used for:Whether judge described session Meet the condition using unauthorized frequency range;If it is satisfied, generating described LTE-U for described session Strategy.
Preferably, described device also includes:Second strategy generating device, for when described session When being unsatisfactory for becoming the condition meeting using unauthorized frequency range using the condition of unauthorized frequency range, Generate LTE-U strategy for described session;Second dispensing device, for sending to described PGW Policy configuration messages, wherein contain the LTE-U strategy of described generation.
Preferably, described device also includes:Strategy modification device, for meeting when trigger condition LTE-U strategy described in Shi Xiugai;3rd dispensing device, for described PGW sending strategy Configuration message, wherein contains described amended LTE-U strategy.
Preferably, described trigger condition at least includes in following various situation:Described PCRF detects the one new carrying of described IP-CAN conversation establishing;Described PCRF inspection Measure user related data or network condition there occurs change;Wherein, described user related data At least include in the following:User type, user account remaining sum, the data using Flow, user equipment electricity, the speed of user's movement or frequency, market demand type, carrying Information, the service parameter of user;Described network condition at least includes network load information.
According to the fourth aspect of the present invention, there is provided use in a kind of eNB in LTE-U system In the device of the use controlling unauthorized frequency range, this device includes:Second reception device, is used for Receive the configured information from PCRF, wherein contain the LTE-U of an IP-CAN session Strategy, described LTE-U strategy contains the relevant information that described session uses unauthorized frequency range; Performs device, for the use of unauthorized frequency range according to described LTE-U policy control.
Preferably, the relevant information of the use unauthorized frequency range that described LTE-U strategy comprises is at least Including one in following information:Priority using unauthorized frequency range;Using unauthorized frequency range Time interval;Position using unauthorized frequency range;Using the type of unauthorized frequency range and various The priority of usage type;QoS using unauthorized frequency range.
The present invention compensate for the blank of prior art it is proposed that distributing the resource of unauthorized frequency range Method.Execute by the strategy of LTE-U defined in PCRF and in the enb this LTE-U strategy Realize the resource of reasonable distribution unauthorized frequency range.And PCRF can be according to various static datas and reality When situation generate and change this LTE-U strategy, and notify in time to execute corresponding strategy to eNB, Thus realize dynamically, neatly, to greatest extent, reasonably using the resource of unauthorized frequency range.
Brief description
By reading the detailed description that non-limiting example is made made with reference to the following drawings, The other features, objects and advantages of the present invention will become more apparent upon:
Fig. 1 illustrates to control unauthorized frequency in the system in LTE-U according to an embodiment of the invention The process schematic of the use of section;
Fig. 2 illustrates to control unauthorized in LTE-U system according to another embodiment of the present invention The process schematic of the use of frequency range;
Fig. 3 illustrates to control unauthorized in LTE-U system according to another embodiment of the present invention The process schematic of the use of frequency range;
Fig. 4 illustrates according to an embodiment of the invention to control unauthorized frequency range in PCRF The schematic device using;
Fig. 5 illustrates the unauthorized frequency range of control in the enb according to an embodiment of the invention The schematic device using.
In accompanying drawing, same or analogous reference represents same or analogous part.
Specific embodiment
According to application scenarios of the present invention, in a LTE-U system, have at least one Individual 11, MME12 of base station eNB, SGW13, one PGW14 and one PCRF15.
The present invention passes through to produce LTE-U strategy in PCRF and execute this LTE-U in the enb Reaching the purpose of the use controlling unauthorized frequency range, this LTE-U strategy is used for indicating strategy How eNB is using unauthorized frequency range.
In one embodiment, this LTE-U strategy at least include in following information one but not It is limited to following information:
1) use the priority of unauthorized frequency range
(IP-Connectivity Access Network, IP are even for the high IP-CAN of priority Network is asked in receiving) session or carry the session lower than priority or carry and be readily available not Authorize frequency range.ENB can by unauthorized frequency range preferentially distribute to high priority session or Carry and use.When the resource of unauthorized frequency range is nervous, eNB meeting Release priority level is low Session or carry take unauthorized frequency range and assign them to the high meeting of priority Words or carrying.The resource that so can ensure that unauthorized frequency range is (particularly in unauthorized When the resource of frequency range is limited) made full use of to greatest extent and be telecommunications service Business and user produce maximum value.
2) use the time interval of unauthorized frequency range
Specify the duration taking unauthorized frequency range.
3) use the position of unauthorized frequency range
I.e. user can use unauthorized frequency range when where.
4) use the type of unauthorized frequency range
Specify using the type using unauthorized frequency range, such as SDL pattern, CA pattern Or SA pattern, when various modes optional time, could further specify that various patterns The use priority.
5) use the QoS of unauthorized frequency range
Specify the mass parameter using unauthorized frequency range, such as allow the unauthorized frequency taking The width of section, the bit rate being transmitted by unauthorized frequency range etc..Different sessions or Carrying can enjoy different QoS.And, PCRF can repair according to real-time condition Change QoS, such as, PCRF can arrange such strategy:When user is less, User is allowed to obtain larger bin width, when user is more, by suitably reducing The bin width of each CU is it is ensured that the user under equal priority is with the most reasonable Mode share unauthorized frequency range.
It should be noted that LTE-U policy information is not limited to above-mentioned information, it can comprise Any information using correlation with unauthorized frequency range.ENB is according to described LTE-U strategy letter Cease and to distribute the resource of unauthorized frequency range.
Below in conjunction with the accompanying drawings the present invention is described in further detail.
Fig. 1 illustrates to control unauthorized frequency in the system in LTE-U according to an embodiment of the invention The process schematic of the use of section.In this process, PCRF15 can generate LTE-U strategy P.
It should be noted that this process is the 5.3.2 section regulation in 3GPP TS 23.401 Improve on the basis of UE attaching process.Fig. 1 illustrate only and invents disappearing of correlation Breath, more message flows refer to 5.3.2 section and the 3GPP of 3GPP TS 23.401 Section 7.2 of TS23.203.
This process starts from step S101.
In step S101, eNB11 receives the attachment from UE10 (not shown) After request, send attach request to MME12, Attach Request disappears as illustrated in the drawing Breath.
Then, in step S102 and step S103, MME12 pass through SGW13 to PGW14 sends and creates conversation request, and Create Session Request disappears as illustrated in the drawing Breath.
Then, in step S104, PGW14 sends IP-CAN session to PCRF15 and builds Vertical request, Indication of IP-CAN Session Establishment disappears as illustrated in the drawing Breath, sets up a new session S for request.
Then, in step S105, PCRF15 generates LTE-U strategy P, this LTE-U Tactful P contains the relevant information that described session S uses unauthorized frequency range.
PCRF15 is according to from the information of SPR or OCS, local configuration information, default Rule and the information such as network condition generating this LTE-U strategy P.This LTE-U strategy P For indicating that how eNB11 to distribute the resource of unauthorized frequency range for UE10.
In one embodiment, described in PCRF15 can judge before generating LTE-U strategy P Whether session S meets the condition using unauthorized frequency range.These conditions pre-set, than As only having VIP user could use unauthorized frequency range when the network is congested.If described session S Meet the condition using unauthorized frequency range, then PCRF15 generates LTE-U strategy P for it.
In yet another embodiment, when session S from be unsatisfactory for using unauthorized frequency range condition become When becoming the condition meeting using unauthorized frequency range, PCRF15 is that described session S generates LTE-U Tactful P.Such as, PCRF15 detects network when receiving the request of IP-CAN session establishment Congestion, and UE10 is not VIP user, according to default condition, UE10 can not be using not Authorize frequency range, then, PCRF15 will not generate LTE-U strategy for session S immediately.Subsequently, PCRF15 finds network no longer congestion, and UE10 can use unauthorized frequency range, then, PCRF15 generates LTE-U strategy P for session S.Then, PCRF15 sends to PGW14 Policy configuration messages, wherein contain generated LTE-U strategy P.
PCRF15 after execution of step S105, then, in step s 106, PCRF15 Send the request of IP-CAN session establishment to PGW14 to reply, than as illustrated in the drawing Acknowledge of IP-CAN Session Establish message, wherein contains described LTE-U strategy P.PCRF15 can be in existing Acknowledge of IP-CAN Session A newly-increased AVP in Establish message (Attribute Value Pair, property value to) is taking Information with described LTE-U strategy P.
In step S107 and step S108, PGW14 is via SGW13 to MME12 Send and create session reply, Create Session Response message as illustrated in the drawing, its In contain above-mentioned LTE-U strategy P.Can be by existing Create Session Increase an AVP in Response message newly to carry the information of described LTE-U strategy P.
Then, in step S109, MME12 sends attachment completion message to eNB11, Initial Context Setup Request or Attach Accept message as illustrated in the drawing, its In contain newly-built session S LTE-U strategy P information.Can be by existing Initial In Context Setup Request or Attach Accept message, a newly-increased AVP is to carry State the information of LTE-U strategy P.
After eNB11 receives the information of LTE-U strategy P of above-mentioned newly-built session S, can protect Deposit described LTE-U strategy P.
Then, in step s 110, eNB11 execution described LTE-U strategy P, i.e. basis Described LTE-U strategy P controls the use of unauthorized frequency range.Specifically, eNB11 is according to institute State the resource that the information in LTE-U strategy P distributes unauthorized frequency range for UE10.
Fig. 2 illustrates to control unauthorized in LTE-U system according to another embodiment of the present invention The process schematic of the use of frequency range.
This process starts from step S201.
In step s 201, when trigger condition meets, PCRF15 modification has generated The LTE-U strategy P of IP-CAN session S, amended LTE-U strategy is designated as P '.
Here trigger condition at least includes:PCRF15 detects user related data or network Situation there occurs change.
Described user related data at least includes in the following but is not limited to following ?:
1) user type
Such as, user is VIP user or domestic consumer.
2) user account remaining sum
Such as, when Sorry, your ticket has not enough value for user account, accordingly reduce it in LTE-U strategy In priority.
3) data traffic using
Such as, when the data traffic that user uses is continuously increased or reaches certain threshold value, Its priority in LTE-U strategy of corresponding raising.Again such as, when user uses Data traffic setting time interval in be consistently lower than certain threshold value when, accordingly Reduce its priority in LTE-U strategy.
4) user equipment electricity
Such as, when user equipment electricity is less than certain threshold value, corresponding reduce its Priority in LTE-U strategy, or directly stop it for unauthorized frequency range Use.
5) speed of user's movement or frequency
Such as, when user moving speed is higher than certain threshold value, or between setting time Every in frequently change serviced eNB, corresponding reduce it in LTE-U strategy Priority, or directly stop its for unauthorized frequency range use.
6) market demand type
Refer to the data stream type of transmission on carrying, can divide by data type, such as: Voice, picture, video etc. it is also possible to divide by type of server, such as:Facebook Application, Youtube application, microblogging application, wechat application etc..PCRF15 can root Adopt different LTE-U strategies according to different types.
7) carrying information
Refer to and carry related information, such as:Bearer types, the data flow carrying are special Bandwidth levy, carrying etc..Bearer types refer to default bearing (default bearer) Or dedicated bearer (dedicated bearer).The data flow characteristics carrying refer to It is high data volume or low data bulk.The bandwidth carrying refers to high bandwidth still Low bandwidth.
8) service parameter of user
Refer to operator be directed to user set service parameter, such as service rate, QCI (QoS Class Identifier, QoS class letter), GBR (Guaranteed Bit Rate is it is ensured that bit rate) etc..
Described network condition at least includes network load information.When offered load changes, PCRF15 can be using different LTE-U strategies.
Then, in step S202, PCRF15 configures message to PGW14 sending strategy, Policy and Charging Rules Provision message, wherein contains as illustrated in the drawing Amended LTE-U strategy P '.Can be by Policy and Charging Rules Increase an AVP in Provision message newly to carry described LTE-U strategy P '.
In step S203 and step S204, PGW14 sends out to MME12 via SGW13 Send new information, Update Bearer Request message, wherein contains as illustrated in the drawing Above-mentioned amended LTE-U strategy P '.Can be by Update Bearer Request message In a newly-increased AVP carrying described LTE-U strategy P '.
Then, in step S205, MME12 sends new information to eNB11, such as schemes Shown in Bearer Modify Request or Session Management Request message, Wherein contain above-mentioned amended LTE-U strategy P '.Can be by Bearer Modify Increase an AVP in Request or Session Management Request message newly to carry Described LTE-U strategy P '.
After eNB11 receives above-mentioned new information, by the LTE-U plan of the local session S preserving Slightly P is updated to P '.
Then, in step S206, eNB11 will execute new LTE-U strategy P ', that is, Control the use of unauthorized frequency range according to described LTE-U strategy P '.Specifically, eNB11 root Distribute the resource of unauthorized frequency range according to the information in described LTE-U strategy P ' for UE10.
Fig. 3 illustrates to control unauthorized in LTE-U system according to another embodiment of the present invention The process schematic of the use of frequency range.
This process starts from step S301.
In step S301, when trigger condition meets, PCRF15 modification has generated The LTE-U strategy P of IP-CAN session S, amended LTE-U strategy is designated as P ".
Here trigger condition at least includes:PCRF15 detects described IP-CAN session S Create a new carrying.New carrying described here refers to dedicated bearer.
During shown in Fig. 1, what IP-CAN session S created is default bearing, when When PCRF15 detects described IP-CAN session S and needs to create a new dedicated bearer, PCRF15 can produce different strategies as needed for default bearing with dedicated bearer. The policy information of default bearing is only contained, therefore, when needs are acquiescence in LTE-U strategy P Carry and when dedicated bearer produces different tactful, PCRF15 can change the tactful P of LTE-U, Increase the policy information of dedicated bearer wherein newly.
Then, in step s 302, PCRF15 configures message to PGW14 sending strategy, Policy and Charging Rules Provision message, wherein contains as illustrated in the drawing Amended LTE-U strategy P ".Can be by Policy and Charging Rules Increase an AVP in Provision message newly and to carry described LTE-U strategy P ".
In step S303 and step S304, PGW14 sends out to MME12 via SGW13 Send establishment bearer messages, Create Bearer Request message, wherein wraps as illustrated in the drawing Contain above-mentioned amended LTE-U strategy P ".Can be by Create Bearer Request Increase an AVP in message newly and to carry described LTE-U strategy P ".
Then, in step S305, MME12 sends carrying to eNB11 and sets up message, Bearer Setup Request or Session Management Request disappears as illustrated in the drawing Breath, wherein contains above-mentioned amended LTE-U strategy P ".Can be by Bearer Setup Increase an AVP in Request or Session Management Request message newly to carry Described LTE-U strategy P ".
After eNB11 receives above-mentioned message, by the LTE-U strategy P of the local session S preserving It is updated to P ".
Then, in step S306, eNB11 will execute new LTE-U strategy P ", that is, According to described LTE-U strategy P " control unauthorized frequency range use.Specifically, eNB11 root According to described LTE-U strategy P " in information be UE10 distribution unauthorized frequency range resource.
Fig. 4 illustrates control unauthorized frequency range in PCRF15 according to an embodiment of the invention Use schematic device.This device 400 includes first receiving device 401, first strategy Generating means 402 and the first dispensing device 403.
Describe the work process of this device 400 with reference to Fig. 1 to Fig. 3 in detail.
First, as shown in figure 1, first receiving device 401 receives from PGW14's IP-CAN session establishment is asked, Indication of IP-CAN Session as shown in Figure 1 Establishment message, this request is used for request and sets up a new session S.
Then, the first strategy generating device 402 generates LTE-U strategy P, this LTE-U plan Slightly P contains the relevant information that described session S uses unauthorized frequency range.
First strategy generating device 402 is according to from the information of SPR or OCS, local joining Confidence breath, the information such as default rule and network condition are generating this LTE-U strategy P.Should LTE-U strategy P is used for indicating the resource how for UE10 distribution unauthorized frequency range for the eNB11.
In one embodiment, the first strategy generating device 402 is generating LTE-U strategy P Can judge whether described session S meets the condition using unauthorized frequency range before.These conditions are Pre-set, such as only have VIP user could use unauthorized frequency range when the network is congested. If described session S meets the condition using unauthorized frequency range, the first strategy generating device 402 generate LTE-U strategy P for it.
In yet another embodiment, device 400 also includes the second strategy generating device (in figure is not Illustrate) and the second dispensing device (not shown).When session S is from being unsatisfactory for using not awarding When the condition of power frequency range becomes the condition meeting using unauthorized frequency range, the second strategy generating device Generate LTE-U strategy P for described session S.Such as, PCRF15 is receiving IP-CAN meeting Words detect network congestion when setting up request, and UE10 is not VIP user, according to default Condition, UE10 can not use unauthorized frequency range, then, the first strategy generating device 402 is not LTE-U strategy can be generated for session S immediately.Subsequently, PCRF15 finds network no longer congestion, UE10 can use unauthorized frequency range, then, the second strategy generating device is given birth to for session S Become LTE-U strategy P.Then, the second dispensing device configures message to PGW14 sending strategy, Wherein contain generated LTE-U strategy P.
First strategy generating device 402 generate LTE-U strategy P after, then, first Send device 403 to send the request of IP-CAN session establishment to PGW14 to reply, in such as Fig. 1 Shown Acknowledge of IP-CAN Session Establish message, wherein contains institute State LTE-U strategy P.First dispensing device 403 can be in existing Acknowledge of A newly-increased AVP in IP-CAN Session Establish message (Attribute Value Pair, Property value to) carrying the information of described LTE-U strategy P.
In another embodiment, device 400 also includes strategy modification device (not shown) With the 3rd dispensing device (not shown).
When trigger condition meets, the IP-CAN session that the modification of strategy modification device has generated The LTE-U strategy P of S, amended LTE-U strategy is designated as P '.
Here trigger condition at least includes one below:
- PCRF15 detects user related data or network condition there occurs change;
Wherein, user related data at least includes in the following but is not limited to following Every:User type, user account remaining sum, the data traffic using, user equipment Electricity, the speed of user's movement or frequency, market demand type, carrying information, use The service parameter at family.Refer to the description of Fig. 2 part with regard to every explanation. Wherein, described network condition at least includes network load information.When offered load occurs During change, PCRF15 can be using different LTE-U strategies.
- PCRF15 detects IP-CAN session S and creates a new carrying;
New carrying described here refers to dedicated bearer.During shown in Fig. 1, What IP-CAN session S created is default bearing, when PCRF15 detect described When IP-CAN session S needs to create a new dedicated bearer, PCRF15 is permissible Produce different strategies as needed for default bearing with dedicated bearer.LTE-U strategy The policy information of default bearing is only contained, therefore, when needing for default bearing in P When producing different tactful with dedicated bearer, it is tactful that PCRF15 can change LTE-U P, increases the policy information of dedicated bearer wherein newly.
Then, the 3rd dispensing device configures message to PGW14 sending strategy, as institute in Fig. 2 The Policy and Charging Rules Provision message shown, wherein contains amended LTE-U strategy P '.Can be by Policy and Charging Rules Provision message In a newly-increased AVP carrying described LTE-U strategy P '.
Fig. 5 illustrates according to an embodiment of the invention to control unauthorized frequency range in eNB11 The schematic device using.This device 500 includes:Second reception device 501 and performs device 502.
Describe the work process of this device 500 with reference to Fig. 1 to Fig. 3 in detail.
First, the second reception device 501 receives the configured information from PCRF15, wherein Contain the LTE-U strategy of IP-CAN session S, described LTE-U strategy contains described Session S uses the relevant information of unauthorized frequency range.
As shown in figure 1, the second reception device 501 in eNB11 is via MME12, SGW13 Receive the configured information from PCRF15 with PGW14, wherein containing PCRF15 is The new LTE-U strategy P producing of session S.
As shown in Fig. 2 the second reception device 501 in eNB11 is via MME12, SGW13 Receive the configured information from PCRF15 with PGW14, wherein contain PCRF15 pair LTE-U strategy P modify after tactful P '.
As shown in figure 3, the second reception device 501 in eNB11 is via MME12, SGW13 Receive the configured information from PCRF15 with PGW14, wherein contain PCRF15 pair LTE-U strategy P modify after tactful P ".
Then, performs device 502 is according to the LTE-U policy control unauthorized frequency range receiving Use, i.e. the use according to the LTE-U policy control unauthorized frequency range receiving.Specifically, ENB11 distributes unauthorized frequency range according to the information in the LTE-U strategy receiving for UE10 Resource.As it was previously stated, the described LTE-U strategy receiving can be the new LTE-U producing Strategy or the strategy after existing LTE-U strategy is modified.
It should be noted that the present invention can be by reality in the software and/or software assembly with hardware Apply, for example, can using special IC (ASIC), general purpose computer or any its He is similar to hardware device to realize.In one embodiment, the software program of the present invention can lead to Cross computing device to realize steps described above or function.Similarly, the software journey of the present invention Sequence (including related data structure) can be stored in computer readable recording medium storing program for performing, example As, RAM memory, magnetically or optically driver or floppy disc and similar devices.In addition, this Some bright steps or function can employ hardware to realize, for example, as with processor cooperation from And execute the circuit of each step or function.
In addition, the part of the present invention can be applied to computer program, such as computer Programmed instruction, when it is computer-executed, by the operation of this computer, can call or The method according to the invention and/or technical scheme are provided.And call the program of the method for the present invention Instruction, is possibly stored in fixing or moveable recording medium, and/or by broadcast Or the data flow in other signal bearing medias and be transmitted, and/or be stored according to described In the working storage of computer equipment that programmed instruction runs.Here, according to the present invention one Individual embodiment includes a device, and this device includes the storage for storing computer program instructions Device and the processor for execute program instructions, wherein, at this computer program instructions is by this During reason device execution, trigger the side based on aforementioned multiple embodiments according to the present invention for this plant running Method and/or technical scheme.
It is obvious to a person skilled in the art that the invention is not restricted to above-mentioned one exemplary embodiment Details, and without departing from the spirit or essential characteristics of the present invention, can be with it His concrete form realizes the present invention.Therefore, no matter from the point of view of which point, all should be by embodiment Regard exemplary as, and be nonrestrictive, the scope of the present invention is by claims Rather than described above limit, it is intended that by fall claim equivalency implication and In the range of all changes be included in the present invention.Should not be by any accompanying drawing mark in claim Note is considered as limiting involved claim.Furthermore, it is to be understood that " inclusion " one word is not excluded for other lists Unit or step, odd number is not excluded for plural number.Multiple units of statement or device in device claim Can also be realized by software or hardware by a unit or device.The first, the second grade word Pragmatic is representing title, and is not offered as any specific order.

Claims (16)

1. it is used in a kind of PCRF in LTE-U system controlling the use of unauthorized frequency range Method, the method comprises the following steps:
A. receive the IP-CAN session establishment request from PGW;
B. it is that described session generates LTE-U strategy, described LTE-U strategy contains described meeting Words are using the relevant information of unauthorized frequency range;
C. send the request of IP-CAN session establishment to described PGW to reply, wherein contain institute State the LTE-U strategy of generation.
2. method according to claim 1, wherein, described step b further includes:
Judge whether described session meets the condition using unauthorized frequency range;
If it is satisfied, generating described LTE-U strategy for described session.
3. method according to claim 2, wherein, methods described also includes:
When described session is from being unsatisfactory for becoming satisfaction using the condition of unauthorized frequency range using not awarding During the condition of power frequency range, it is that described session generates LTE-U strategy;
Configure message to described PGW sending strategy, wherein contain the LTE-U of described generation Strategy.
4. method according to claim 1, wherein, methods described also includes:
Change described LTE-U strategy when trigger condition meets;
Configure message to described PGW sending strategy, wherein contain described amended LTE-U strategy.
5. method according to claim 4, wherein, described trigger condition at least includes In various situations one below:
Described PCRF detects the one new carrying of described IP-CAN conversation establishing;
Described PCRF detects user related data or network condition there occurs change;
Wherein, described user related data at least includes one in the following:User type, User account remaining sum, use data traffic, user equipment electricity, the speed of user's movement or Frequency, market demand type, carrying information, the service parameter of user;
Described network condition at least includes network load information.
6. method according to claim 1, wherein, described LTE-U strategy comprises At least include in following information using the relevant information of unauthorized frequency range:
Priority using unauthorized frequency range;
Time interval using unauthorized frequency range;
Position using unauthorized frequency range;
Type using unauthorized frequency range;
QoS using unauthorized frequency range.
7. it is used in a kind of eNB in LTE-U system controlling the side of the use of unauthorized frequency range Method, the method comprises the following steps:
Receive the configured information from PCRF, wherein contain an IP-CAN session LTE-U strategy, described LTE-U strategy contains the phase that described session uses unauthorized frequency range Pass information;
The use of unauthorized frequency range according to described LTE-U policy control.
8. method according to claim 7, wherein, described LTE-U strategy comprises At least include in following information using the relevant information of unauthorized frequency range:
Priority using unauthorized frequency range;
Time interval using unauthorized frequency range;
Position using unauthorized frequency range;
Type using unauthorized frequency range;
QoS using unauthorized frequency range.
9. it is used in a kind of PCRF in LTE-U system controlling the use of unauthorized frequency range Device, this device includes:
First receiving device, for receiving the IP-CAN session establishment request from PGW;
First strategy generating device, for generating LTE-U strategy for described session, described LTE-U strategy contains the relevant information that described session uses unauthorized frequency range;
First dispensing device, asks back for sending IP-CAN session establishment to described PGW Multiple, wherein contain the LTE-U strategy of described generation.
10. device according to claim 9, wherein, described first strategy generating device It is further used for:
Judge whether described session meets the condition using unauthorized frequency range;
If it is satisfied, generating described LTE-U strategy for described session.
11. devices according to claim 10, wherein, described device also includes:
Second strategy generating device, for when described session is from being unsatisfactory for using unauthorized frequency range When condition becomes the condition meeting using unauthorized frequency range, it is that described session generates LTE-U strategy;
Second dispensing device, for configuring message to described PGW sending strategy, wherein comprises The LTE-U strategy of described generation.
12. devices according to claim 9, wherein, described device also includes:
Strategy modification device, for changing described LTE-U strategy when trigger condition meets;
3rd dispensing device, for configuring message to described PGW sending strategy, wherein comprises Described amended LTE-U strategy.
13. devices according to claim 12, wherein, described trigger condition is at least wrapped Include in following various situation:
Described PCRF detects the one new carrying of described IP-CAN conversation establishing;
Described PCRF detects user related data or network condition there occurs change;
Wherein, described user related data at least includes one in the following:User type, User account remaining sum, use data traffic, user equipment electricity, the speed of user's movement or Frequency, market demand type, carrying information, the service parameter of user;
Described network condition at least includes network load information.
14. devices according to claim 9, wherein, described LTE-U strategy comprises At least include in following information using the relevant information of unauthorized frequency range:
Priority using unauthorized frequency range;
Time interval using unauthorized frequency range;
Position using unauthorized frequency range;
Type using unauthorized frequency range;
QoS using unauthorized frequency range.
It is used in a kind of 15. eNB in LTE-U system controlling the use of unauthorized frequency range Device, this device includes:
Second reception device, for receiving the configured information from PCRF, wherein contains one The LTE-U strategy of individual IP-CAN session, described LTE-U strategy contains described session and makes Relevant information with unauthorized frequency range;
Performs device, for the use of unauthorized frequency range according to described LTE-U policy control.
16. devices according to claim 15, wherein, described LTE-U strategy comprises The relevant information using unauthorized frequency range at least include one in following information:
Priority using unauthorized frequency range;
Time interval using unauthorized frequency range;
Position using unauthorized frequency range;
Type using unauthorized frequency range;
QoS using unauthorized frequency range.
CN201510478213.XA 2015-08-06 2015-08-06 Method and device to control the use of unauthorized frequency band Pending CN106455065A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201510478213.XA CN106455065A (en) 2015-08-06 2015-08-06 Method and device to control the use of unauthorized frequency band
PCT/IB2016/001160 WO2017021773A1 (en) 2015-08-06 2016-07-22 Method and apparatus for controlling utilization of an unlicensed spectrum

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510478213.XA CN106455065A (en) 2015-08-06 2015-08-06 Method and device to control the use of unauthorized frequency band

Publications (1)

Publication Number Publication Date
CN106455065A true CN106455065A (en) 2017-02-22

Family

ID=56853674

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510478213.XA Pending CN106455065A (en) 2015-08-06 2015-08-06 Method and device to control the use of unauthorized frequency band

Country Status (2)

Country Link
CN (1) CN106455065A (en)
WO (1) WO2017021773A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2019001509A1 (en) * 2017-06-28 2019-01-03 华为技术有限公司 Network authentication method and system

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2019024089A1 (en) * 2017-08-04 2019-02-07 Lenovo (Beijing) Limited Grant-free resource allocation
US11240673B2 (en) 2019-11-20 2022-02-01 Andro Computational Solutions Real time spectrum access policy based governance

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102638355A (en) * 2011-02-14 2012-08-15 阿尔卡特朗讯 Method and device for determining policy charge rule based on network resource utilization information
WO2014012594A1 (en) * 2012-07-19 2014-01-23 Telefonaktiebolaget L M Ericsson (Publ) Methods and apparatus for implementing policy and charging control
WO2015076925A1 (en) * 2013-11-22 2015-05-28 Qualcomm Incorporated Techniques for provisioning configuration information based on cell characteristics

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160249255A1 (en) * 2015-02-25 2016-08-25 Alcatel-Lucent Usa Inc. Network support for differential charging for data usage in licensed and unlicensed frequency bands

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102638355A (en) * 2011-02-14 2012-08-15 阿尔卡特朗讯 Method and device for determining policy charge rule based on network resource utilization information
WO2014012594A1 (en) * 2012-07-19 2014-01-23 Telefonaktiebolaget L M Ericsson (Publ) Methods and apparatus for implementing policy and charging control
WO2015076925A1 (en) * 2013-11-22 2015-05-28 Qualcomm Incorporated Techniques for provisioning configuration information based on cell characteristics

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
3RD GENERATION PARTNERSHIP PROJECT: "Policy and charging control architecture", 《3GPP TS 23.203 V13.4.0 》 *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2019001509A1 (en) * 2017-06-28 2019-01-03 华为技术有限公司 Network authentication method and system

Also Published As

Publication number Publication date
WO2017021773A1 (en) 2017-02-09

Similar Documents

Publication Publication Date Title
CN101370263B (en) Policy control method and system
TWI510043B (en) Controlling packet filter installation in a user equipment
CN104822166B (en) Transmission rate control, mobility management entity and communication system
US9420602B2 (en) Emergency and prioritized access to wireless resources
CN101998531B (en) Strategy and charging control rule authorization method, device and system
JP5531110B2 (en) Energy control in mobile communication networks
CN101562842B (en) Method, system and device for resource allocation
CN105900377B (en) A kind of method and apparatus transmitting data
CN107197490A (en) Aid in method of adjustment and the base station of main plot
CN108616931A (en) a kind of control method and device of user equipment maximum bandwidth
CN108738071A (en) A kind of method and device that resource is established
CN103826263B (en) A kind of network shunt method and apparatus
CN108271219B (en) Method and device for controlling wireless network resources
CN106455065A (en) Method and device to control the use of unauthorized frequency band
CN108702766A (en) Communication means, the network equipment and terminal device
CN105163345A (en) Area reporting method and system
CN105813140A (en) Resource allocation regulation and control method and resource allocation regulation and control device
CN105208602A (en) Load balancing method and device
CN106792923A (en) A kind of method and device for configuring qos policy
CN106998544A (en) Strategy and billing control method and device based on application
KR20190002450A (en) Admission control system for satellite-based Internet access and transmission
CN105122880B (en) The method and device of message transmission rate is controlled in carrier wave polymerization
CN104283693A (en) Policy control method and network element
CN105099736B (en) A kind of network control strategy adjusting method and device
CN104902520B (en) A kind of control method and device of APN-AMBR

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
AD01 Patent right deemed abandoned
AD01 Patent right deemed abandoned

Effective date of abandoning: 20200626