CN106455065A - Method and device to control the use of unauthorized frequency band - Google Patents
Method and device to control the use of unauthorized frequency band Download PDFInfo
- Publication number
- CN106455065A CN106455065A CN201510478213.XA CN201510478213A CN106455065A CN 106455065 A CN106455065 A CN 106455065A CN 201510478213 A CN201510478213 A CN 201510478213A CN 106455065 A CN106455065 A CN 106455065A
- Authority
- CN
- China
- Prior art keywords
- strategy
- lte
- frequency range
- unauthorized frequency
- session
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L5/00—Arrangements affording multiple use of the transmission path
- H04L5/003—Arrangements for allocating sub-channels of the transmission path
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W72/00—Local resource management
- H04W72/50—Allocation or scheduling criteria for wireless resources
- H04W72/53—Allocation or scheduling criteria for wireless resources based on regulatory allocation policies
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L65/00—Network arrangements, protocols or services for supporting real-time applications in data packet communication
- H04L65/1066—Session management
- H04L65/1069—Session establishment or de-establishment
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W16/00—Network planning, e.g. coverage or traffic planning tools; Network deployment, e.g. resource partitioning or cells structures
- H04W16/14—Spectrum sharing arrangements between different networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W72/00—Local resource management
- H04W72/50—Allocation or scheduling criteria for wireless resources
- H04W72/56—Allocation or scheduling criteria for wireless resources based on priority criteria
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W76/00—Connection management
- H04W76/10—Connection setup
- H04W76/12—Setup of transport tunnels
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L27/00—Modulated-carrier systems
- H04L27/0006—Assessment of spectral gaps suitable for allocating digitally modulated signals, e.g. for carrier allocation in cognitive radio
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L5/00—Arrangements affording multiple use of the transmission path
- H04L5/003—Arrangements for allocating sub-channels of the transmission path
- H04L5/0058—Allocation criteria
- H04L5/0064—Rate requirement of the data, e.g. scalable bandwidth, data priority
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L5/00—Arrangements affording multiple use of the transmission path
- H04L5/003—Arrangements for allocating sub-channels of the transmission path
- H04L5/0058—Allocation criteria
- H04L5/0076—Allocation utility-based
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L5/00—Arrangements affording multiple use of the transmission path
- H04L5/003—Arrangements for allocating sub-channels of the transmission path
- H04L5/0078—Timing of allocation
- H04L5/0087—Timing of allocation when data requirements change
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W28/00—Network traffic management; Network resource management
- H04W28/02—Traffic management, e.g. flow control or congestion control
- H04W28/0226—Traffic management, e.g. flow control or congestion control based on location or mobility
Landscapes
- Engineering & Computer Science (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Business, Economics & Management (AREA)
- General Business, Economics & Management (AREA)
- Multimedia (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The invention provides a method and device to control the use of unauthorized frequency band in an LTE-U system. The method comprises the following steps. When a PCRF receives a request to establish a session, an LTE-U strategy is generated for the session. The LTE-U strategy includes relevant information of the unauthorized frequency band the session uses; and then, the LTE-U strategy is notified to an eNB where the LTE-U strategy is executed by the eNB. When the triggering conditions are satisfied, the PCRF modifies the LTE-U strategy; and the modified LTE-U strategy is notified to the eNB where the modified LTE-U strategy is executed by the eNB. According to the invention, progress has been made in the prior art by the introduction of a resource allocation method for unauthorized frequency band. And through the defining of the LTE-U strategy and the modification of the LTE-U strategy according to various triggering conditions, it is possible to realize the dynamic and flexible utilization of unauthorized frequency band resources.
Description
Technical field
The present invention relates to communication technical field, more particularly, to one of LTE-U system resource
The technology using.
Background technology
Increasing rapidly with wireless traffic, people are to the capacity of wireless communication system and spectrum requirement
Also improve therewith.In this case, the mandate resource of frequency range of LTE system seems that relative deficiency rises
Come.Therefore, 3GPP proposes LTE-U (LTE in Unlicensed spectrum, abbreviation LTE-U)
Technological frame, by LTE system from mandate band spreading to unauthorized frequency range.
At present, unauthorized frequency range being polymerized mainly has three kinds to mandate frequency range in the way of hoist capacity,
Wherein first two is relatively common.
One is to supplement downlink mode (Supplemental DownLink, abbreviation SDL), that is,
Unauthorized frequency range is only used to do downlink transmission, and this is very typical in current network application;
Two is carrier aggregation mode (Carrier Aggregation, abbreviation CA), that is, allow not awarding
Power frequency range is used for downlink and up-link, such as typical LTE TDD system, its most critical
Advantage is exactly the amount that flexible exempts from licensed band resource for uplink and downlink link.
Three is stand-alone mode (Stand Alone, abbreviation SA), independently transports in unauthorized frequency range
Row LTE and do not use mandate frequency range.
In SDL and CA pattern, unauthorized frequency range is only used for data Layer, all of key-course
All by authorizing frequency range to process, operator is controlled flow to mandate and the unauthorized resource of frequency range simultaneously.
However, the introducing of LTE-U and use also bring a lot of challenges.One of them is:As
What fully, maximally utilise the resource of unauthorized frequency range, that is, how dynamically, spirit
Distribute the resource of unauthorized frequency range alively.
In the existing standard of 3GPP, the resource how distributing unauthorized frequency range is not made
Regulation.Therefore, in order to give full play to the advantage of LTE-U, be highly desirable to propose a kind of dynamic,
The use technology of the flexible unauthorized resource of frequency range.
Content of the invention
It is an object of the invention to provide a kind of method and apparatus of the use controlling unauthorized frequency range.
According to the first aspect of the invention, there is provided in a kind of PCRF in LTE-U system
Method for controlling the use of unauthorized frequency range, the method comprises the following steps:A. receive
IP-CAN session establishment request from PGW;B. it is that described session generates LTE-U strategy,
Described LTE-U strategy contains the relevant information that described session uses unauthorized frequency range;C. to
Described PGW sends the request of IP-CAN session establishment and replys, and wherein contains described generation
LTE-U strategy.
Preferably, described step b further includes:Judge whether described session meets using not
Authorize the condition of frequency range;If it is satisfied, generating described LTE-U strategy for described session.
Preferably, methods described also includes:When described session is from being unsatisfactory for using unauthorized frequency range
Condition become and generate LTE-U plan for described session during the condition meeting using unauthorized frequency range
Slightly;Configure message to described PGW sending strategy, wherein contain the LTE-U of described generation
Strategy.
Preferably, methods described also includes:Change described LTE-U when trigger condition meets
Strategy;Configure message to described PGW sending strategy, wherein contain described amended
LTE-U strategy.
Preferably, described trigger condition at least includes in following various situation:Described
PCRF detects the one new carrying of described IP-CAN conversation establishing;Described PCRF inspection
Measure user related data or network condition there occurs change;Wherein, described user related data
At least include in the following:User type, user account remaining sum, the data using
Flow, user equipment electricity, the speed of user's movement or frequency, market demand type, carrying
Information, the service parameter of user;Described network condition at least includes network load information.
According to the second aspect of the invention, there is provided use in a kind of eNB in LTE-U system
In the method for the use controlling unauthorized frequency range, the method comprises the following steps:Reception is derived from
The configured information of PCRF, wherein contains the LTE-U strategy of an IP-CAN session, institute
State LTE-U strategy and contain the relevant information that described session uses unauthorized frequency range;According to described
The use of unauthorized frequency range described in LTE-U policy control.
According to the third aspect of the present invention, there is provided in a kind of PCRF in LTE-U system
For controlling the device of the use of unauthorized frequency range, this device includes:First receiving device, uses
Ask in receiving the IP-CAN session establishment from PGW;First strategy generating device, uses
In generating LTE-U strategy for described session, described LTE-U strategy contains described session and makes
Relevant information with unauthorized frequency range;First dispensing device, for sending to described PGW
The request of IP-CAN session establishment is replied, and wherein contains the LTE-U strategy of described generation.
Preferably, described first strategy generating device is further used for:Whether judge described session
Meet the condition using unauthorized frequency range;If it is satisfied, generating described LTE-U for described session
Strategy.
Preferably, described device also includes:Second strategy generating device, for when described session
When being unsatisfactory for becoming the condition meeting using unauthorized frequency range using the condition of unauthorized frequency range,
Generate LTE-U strategy for described session;Second dispensing device, for sending to described PGW
Policy configuration messages, wherein contain the LTE-U strategy of described generation.
Preferably, described device also includes:Strategy modification device, for meeting when trigger condition
LTE-U strategy described in Shi Xiugai;3rd dispensing device, for described PGW sending strategy
Configuration message, wherein contains described amended LTE-U strategy.
Preferably, described trigger condition at least includes in following various situation:Described
PCRF detects the one new carrying of described IP-CAN conversation establishing;Described PCRF inspection
Measure user related data or network condition there occurs change;Wherein, described user related data
At least include in the following:User type, user account remaining sum, the data using
Flow, user equipment electricity, the speed of user's movement or frequency, market demand type, carrying
Information, the service parameter of user;Described network condition at least includes network load information.
According to the fourth aspect of the present invention, there is provided use in a kind of eNB in LTE-U system
In the device of the use controlling unauthorized frequency range, this device includes:Second reception device, is used for
Receive the configured information from PCRF, wherein contain the LTE-U of an IP-CAN session
Strategy, described LTE-U strategy contains the relevant information that described session uses unauthorized frequency range;
Performs device, for the use of unauthorized frequency range according to described LTE-U policy control.
Preferably, the relevant information of the use unauthorized frequency range that described LTE-U strategy comprises is at least
Including one in following information:Priority using unauthorized frequency range;Using unauthorized frequency range
Time interval;Position using unauthorized frequency range;Using the type of unauthorized frequency range and various
The priority of usage type;QoS using unauthorized frequency range.
The present invention compensate for the blank of prior art it is proposed that distributing the resource of unauthorized frequency range
Method.Execute by the strategy of LTE-U defined in PCRF and in the enb this LTE-U strategy
Realize the resource of reasonable distribution unauthorized frequency range.And PCRF can be according to various static datas and reality
When situation generate and change this LTE-U strategy, and notify in time to execute corresponding strategy to eNB,
Thus realize dynamically, neatly, to greatest extent, reasonably using the resource of unauthorized frequency range.
Brief description
By reading the detailed description that non-limiting example is made made with reference to the following drawings,
The other features, objects and advantages of the present invention will become more apparent upon:
Fig. 1 illustrates to control unauthorized frequency in the system in LTE-U according to an embodiment of the invention
The process schematic of the use of section;
Fig. 2 illustrates to control unauthorized in LTE-U system according to another embodiment of the present invention
The process schematic of the use of frequency range;
Fig. 3 illustrates to control unauthorized in LTE-U system according to another embodiment of the present invention
The process schematic of the use of frequency range;
Fig. 4 illustrates according to an embodiment of the invention to control unauthorized frequency range in PCRF
The schematic device using;
Fig. 5 illustrates the unauthorized frequency range of control in the enb according to an embodiment of the invention
The schematic device using.
In accompanying drawing, same or analogous reference represents same or analogous part.
Specific embodiment
According to application scenarios of the present invention, in a LTE-U system, have at least one
Individual 11, MME12 of base station eNB, SGW13, one PGW14 and one
PCRF15.
The present invention passes through to produce LTE-U strategy in PCRF and execute this LTE-U in the enb
Reaching the purpose of the use controlling unauthorized frequency range, this LTE-U strategy is used for indicating strategy
How eNB is using unauthorized frequency range.
In one embodiment, this LTE-U strategy at least include in following information one but not
It is limited to following information:
1) use the priority of unauthorized frequency range
(IP-Connectivity Access Network, IP are even for the high IP-CAN of priority
Network is asked in receiving) session or carry the session lower than priority or carry and be readily available not
Authorize frequency range.ENB can by unauthorized frequency range preferentially distribute to high priority session or
Carry and use.When the resource of unauthorized frequency range is nervous, eNB meeting Release priority level is low
Session or carry take unauthorized frequency range and assign them to the high meeting of priority
Words or carrying.The resource that so can ensure that unauthorized frequency range is (particularly in unauthorized
When the resource of frequency range is limited) made full use of to greatest extent and be telecommunications service
Business and user produce maximum value.
2) use the time interval of unauthorized frequency range
Specify the duration taking unauthorized frequency range.
3) use the position of unauthorized frequency range
I.e. user can use unauthorized frequency range when where.
4) use the type of unauthorized frequency range
Specify using the type using unauthorized frequency range, such as SDL pattern, CA pattern
Or SA pattern, when various modes optional time, could further specify that various patterns
The use priority.
5) use the QoS of unauthorized frequency range
Specify the mass parameter using unauthorized frequency range, such as allow the unauthorized frequency taking
The width of section, the bit rate being transmitted by unauthorized frequency range etc..Different sessions or
Carrying can enjoy different QoS.And, PCRF can repair according to real-time condition
Change QoS, such as, PCRF can arrange such strategy:When user is less,
User is allowed to obtain larger bin width, when user is more, by suitably reducing
The bin width of each CU is it is ensured that the user under equal priority is with the most reasonable
Mode share unauthorized frequency range.
It should be noted that LTE-U policy information is not limited to above-mentioned information, it can comprise
Any information using correlation with unauthorized frequency range.ENB is according to described LTE-U strategy letter
Cease and to distribute the resource of unauthorized frequency range.
Below in conjunction with the accompanying drawings the present invention is described in further detail.
Fig. 1 illustrates to control unauthorized frequency in the system in LTE-U according to an embodiment of the invention
The process schematic of the use of section.In this process, PCRF15 can generate LTE-U strategy P.
It should be noted that this process is the 5.3.2 section regulation in 3GPP TS 23.401
Improve on the basis of UE attaching process.Fig. 1 illustrate only and invents disappearing of correlation
Breath, more message flows refer to 5.3.2 section and the 3GPP of 3GPP TS 23.401
Section 7.2 of TS23.203.
This process starts from step S101.
In step S101, eNB11 receives the attachment from UE10 (not shown)
After request, send attach request to MME12, Attach Request disappears as illustrated in the drawing
Breath.
Then, in step S102 and step S103, MME12 pass through SGW13 to
PGW14 sends and creates conversation request, and Create Session Request disappears as illustrated in the drawing
Breath.
Then, in step S104, PGW14 sends IP-CAN session to PCRF15 and builds
Vertical request, Indication of IP-CAN Session Establishment disappears as illustrated in the drawing
Breath, sets up a new session S for request.
Then, in step S105, PCRF15 generates LTE-U strategy P, this LTE-U
Tactful P contains the relevant information that described session S uses unauthorized frequency range.
PCRF15 is according to from the information of SPR or OCS, local configuration information, default
Rule and the information such as network condition generating this LTE-U strategy P.This LTE-U strategy P
For indicating that how eNB11 to distribute the resource of unauthorized frequency range for UE10.
In one embodiment, described in PCRF15 can judge before generating LTE-U strategy P
Whether session S meets the condition using unauthorized frequency range.These conditions pre-set, than
As only having VIP user could use unauthorized frequency range when the network is congested.If described session S
Meet the condition using unauthorized frequency range, then PCRF15 generates LTE-U strategy P for it.
In yet another embodiment, when session S from be unsatisfactory for using unauthorized frequency range condition become
When becoming the condition meeting using unauthorized frequency range, PCRF15 is that described session S generates LTE-U
Tactful P.Such as, PCRF15 detects network when receiving the request of IP-CAN session establishment
Congestion, and UE10 is not VIP user, according to default condition, UE10 can not be using not
Authorize frequency range, then, PCRF15 will not generate LTE-U strategy for session S immediately.Subsequently,
PCRF15 finds network no longer congestion, and UE10 can use unauthorized frequency range, then,
PCRF15 generates LTE-U strategy P for session S.Then, PCRF15 sends to PGW14
Policy configuration messages, wherein contain generated LTE-U strategy P.
PCRF15 after execution of step S105, then, in step s 106, PCRF15
Send the request of IP-CAN session establishment to PGW14 to reply, than as illustrated in the drawing
Acknowledge of IP-CAN Session Establish message, wherein contains described
LTE-U strategy P.PCRF15 can be in existing Acknowledge of IP-CAN Session
A newly-increased AVP in Establish message (Attribute Value Pair, property value to) is taking
Information with described LTE-U strategy P.
In step S107 and step S108, PGW14 is via SGW13 to MME12
Send and create session reply, Create Session Response message as illustrated in the drawing, its
In contain above-mentioned LTE-U strategy P.Can be by existing Create Session
Increase an AVP in Response message newly to carry the information of described LTE-U strategy P.
Then, in step S109, MME12 sends attachment completion message to eNB11,
Initial Context Setup Request or Attach Accept message as illustrated in the drawing, its
In contain newly-built session S LTE-U strategy P information.Can be by existing Initial
In Context Setup Request or Attach Accept message, a newly-increased AVP is to carry
State the information of LTE-U strategy P.
After eNB11 receives the information of LTE-U strategy P of above-mentioned newly-built session S, can protect
Deposit described LTE-U strategy P.
Then, in step s 110, eNB11 execution described LTE-U strategy P, i.e. basis
Described LTE-U strategy P controls the use of unauthorized frequency range.Specifically, eNB11 is according to institute
State the resource that the information in LTE-U strategy P distributes unauthorized frequency range for UE10.
Fig. 2 illustrates to control unauthorized in LTE-U system according to another embodiment of the present invention
The process schematic of the use of frequency range.
This process starts from step S201.
In step s 201, when trigger condition meets, PCRF15 modification has generated
The LTE-U strategy P of IP-CAN session S, amended LTE-U strategy is designated as P '.
Here trigger condition at least includes:PCRF15 detects user related data or network
Situation there occurs change.
Described user related data at least includes in the following but is not limited to following
?:
1) user type
Such as, user is VIP user or domestic consumer.
2) user account remaining sum
Such as, when Sorry, your ticket has not enough value for user account, accordingly reduce it in LTE-U strategy
In priority.
3) data traffic using
Such as, when the data traffic that user uses is continuously increased or reaches certain threshold value,
Its priority in LTE-U strategy of corresponding raising.Again such as, when user uses
Data traffic setting time interval in be consistently lower than certain threshold value when, accordingly
Reduce its priority in LTE-U strategy.
4) user equipment electricity
Such as, when user equipment electricity is less than certain threshold value, corresponding reduce its
Priority in LTE-U strategy, or directly stop it for unauthorized frequency range
Use.
5) speed of user's movement or frequency
Such as, when user moving speed is higher than certain threshold value, or between setting time
Every in frequently change serviced eNB, corresponding reduce it in LTE-U strategy
Priority, or directly stop its for unauthorized frequency range use.
6) market demand type
Refer to the data stream type of transmission on carrying, can divide by data type, such as:
Voice, picture, video etc. it is also possible to divide by type of server, such as:Facebook
Application, Youtube application, microblogging application, wechat application etc..PCRF15 can root
Adopt different LTE-U strategies according to different types.
7) carrying information
Refer to and carry related information, such as:Bearer types, the data flow carrying are special
Bandwidth levy, carrying etc..Bearer types refer to default bearing (default bearer)
Or dedicated bearer (dedicated bearer).The data flow characteristics carrying refer to
It is high data volume or low data bulk.The bandwidth carrying refers to high bandwidth still
Low bandwidth.
8) service parameter of user
Refer to operator be directed to user set service parameter, such as service rate,
QCI (QoS Class Identifier, QoS class letter), GBR (Guaranteed
Bit Rate is it is ensured that bit rate) etc..
Described network condition at least includes network load information.When offered load changes,
PCRF15 can be using different LTE-U strategies.
Then, in step S202, PCRF15 configures message to PGW14 sending strategy,
Policy and Charging Rules Provision message, wherein contains as illustrated in the drawing
Amended LTE-U strategy P '.Can be by Policy and Charging Rules
Increase an AVP in Provision message newly to carry described LTE-U strategy P '.
In step S203 and step S204, PGW14 sends out to MME12 via SGW13
Send new information, Update Bearer Request message, wherein contains as illustrated in the drawing
Above-mentioned amended LTE-U strategy P '.Can be by Update Bearer Request message
In a newly-increased AVP carrying described LTE-U strategy P '.
Then, in step S205, MME12 sends new information to eNB11, such as schemes
Shown in Bearer Modify Request or Session Management Request message,
Wherein contain above-mentioned amended LTE-U strategy P '.Can be by Bearer Modify
Increase an AVP in Request or Session Management Request message newly to carry
Described LTE-U strategy P '.
After eNB11 receives above-mentioned new information, by the LTE-U plan of the local session S preserving
Slightly P is updated to P '.
Then, in step S206, eNB11 will execute new LTE-U strategy P ', that is,
Control the use of unauthorized frequency range according to described LTE-U strategy P '.Specifically, eNB11 root
Distribute the resource of unauthorized frequency range according to the information in described LTE-U strategy P ' for UE10.
Fig. 3 illustrates to control unauthorized in LTE-U system according to another embodiment of the present invention
The process schematic of the use of frequency range.
This process starts from step S301.
In step S301, when trigger condition meets, PCRF15 modification has generated
The LTE-U strategy P of IP-CAN session S, amended LTE-U strategy is designated as P ".
Here trigger condition at least includes:PCRF15 detects described IP-CAN session S
Create a new carrying.New carrying described here refers to dedicated bearer.
During shown in Fig. 1, what IP-CAN session S created is default bearing, when
When PCRF15 detects described IP-CAN session S and needs to create a new dedicated bearer,
PCRF15 can produce different strategies as needed for default bearing with dedicated bearer.
The policy information of default bearing is only contained, therefore, when needs are acquiescence in LTE-U strategy P
Carry and when dedicated bearer produces different tactful, PCRF15 can change the tactful P of LTE-U,
Increase the policy information of dedicated bearer wherein newly.
Then, in step s 302, PCRF15 configures message to PGW14 sending strategy,
Policy and Charging Rules Provision message, wherein contains as illustrated in the drawing
Amended LTE-U strategy P ".Can be by Policy and Charging Rules
Increase an AVP in Provision message newly and to carry described LTE-U strategy P ".
In step S303 and step S304, PGW14 sends out to MME12 via SGW13
Send establishment bearer messages, Create Bearer Request message, wherein wraps as illustrated in the drawing
Contain above-mentioned amended LTE-U strategy P ".Can be by Create Bearer Request
Increase an AVP in message newly and to carry described LTE-U strategy P ".
Then, in step S305, MME12 sends carrying to eNB11 and sets up message,
Bearer Setup Request or Session Management Request disappears as illustrated in the drawing
Breath, wherein contains above-mentioned amended LTE-U strategy P ".Can be by Bearer Setup
Increase an AVP in Request or Session Management Request message newly to carry
Described LTE-U strategy P ".
After eNB11 receives above-mentioned message, by the LTE-U strategy P of the local session S preserving
It is updated to P ".
Then, in step S306, eNB11 will execute new LTE-U strategy P ", that is,
According to described LTE-U strategy P " control unauthorized frequency range use.Specifically, eNB11 root
According to described LTE-U strategy P " in information be UE10 distribution unauthorized frequency range resource.
Fig. 4 illustrates control unauthorized frequency range in PCRF15 according to an embodiment of the invention
Use schematic device.This device 400 includes first receiving device 401, first strategy
Generating means 402 and the first dispensing device 403.
Describe the work process of this device 400 with reference to Fig. 1 to Fig. 3 in detail.
First, as shown in figure 1, first receiving device 401 receives from PGW14's
IP-CAN session establishment is asked, Indication of IP-CAN Session as shown in Figure 1
Establishment message, this request is used for request and sets up a new session S.
Then, the first strategy generating device 402 generates LTE-U strategy P, this LTE-U plan
Slightly P contains the relevant information that described session S uses unauthorized frequency range.
First strategy generating device 402 is according to from the information of SPR or OCS, local joining
Confidence breath, the information such as default rule and network condition are generating this LTE-U strategy P.Should
LTE-U strategy P is used for indicating the resource how for UE10 distribution unauthorized frequency range for the eNB11.
In one embodiment, the first strategy generating device 402 is generating LTE-U strategy P
Can judge whether described session S meets the condition using unauthorized frequency range before.These conditions are
Pre-set, such as only have VIP user could use unauthorized frequency range when the network is congested.
If described session S meets the condition using unauthorized frequency range, the first strategy generating device
402 generate LTE-U strategy P for it.
In yet another embodiment, device 400 also includes the second strategy generating device (in figure is not
Illustrate) and the second dispensing device (not shown).When session S is from being unsatisfactory for using not awarding
When the condition of power frequency range becomes the condition meeting using unauthorized frequency range, the second strategy generating device
Generate LTE-U strategy P for described session S.Such as, PCRF15 is receiving IP-CAN meeting
Words detect network congestion when setting up request, and UE10 is not VIP user, according to default
Condition, UE10 can not use unauthorized frequency range, then, the first strategy generating device 402 is not
LTE-U strategy can be generated for session S immediately.Subsequently, PCRF15 finds network no longer congestion,
UE10 can use unauthorized frequency range, then, the second strategy generating device is given birth to for session S
Become LTE-U strategy P.Then, the second dispensing device configures message to PGW14 sending strategy,
Wherein contain generated LTE-U strategy P.
First strategy generating device 402 generate LTE-U strategy P after, then, first
Send device 403 to send the request of IP-CAN session establishment to PGW14 to reply, in such as Fig. 1
Shown Acknowledge of IP-CAN Session Establish message, wherein contains institute
State LTE-U strategy P.First dispensing device 403 can be in existing Acknowledge of
A newly-increased AVP in IP-CAN Session Establish message (Attribute Value Pair,
Property value to) carrying the information of described LTE-U strategy P.
In another embodiment, device 400 also includes strategy modification device (not shown)
With the 3rd dispensing device (not shown).
When trigger condition meets, the IP-CAN session that the modification of strategy modification device has generated
The LTE-U strategy P of S, amended LTE-U strategy is designated as P '.
Here trigger condition at least includes one below:
- PCRF15 detects user related data or network condition there occurs change;
Wherein, user related data at least includes in the following but is not limited to following
Every:User type, user account remaining sum, the data traffic using, user equipment
Electricity, the speed of user's movement or frequency, market demand type, carrying information, use
The service parameter at family.Refer to the description of Fig. 2 part with regard to every explanation.
Wherein, described network condition at least includes network load information.When offered load occurs
During change, PCRF15 can be using different LTE-U strategies.
- PCRF15 detects IP-CAN session S and creates a new carrying;
New carrying described here refers to dedicated bearer.During shown in Fig. 1,
What IP-CAN session S created is default bearing, when PCRF15 detect described
When IP-CAN session S needs to create a new dedicated bearer, PCRF15 is permissible
Produce different strategies as needed for default bearing with dedicated bearer.LTE-U strategy
The policy information of default bearing is only contained, therefore, when needing for default bearing in P
When producing different tactful with dedicated bearer, it is tactful that PCRF15 can change LTE-U
P, increases the policy information of dedicated bearer wherein newly.
Then, the 3rd dispensing device configures message to PGW14 sending strategy, as institute in Fig. 2
The Policy and Charging Rules Provision message shown, wherein contains amended
LTE-U strategy P '.Can be by Policy and Charging Rules Provision message
In a newly-increased AVP carrying described LTE-U strategy P '.
Fig. 5 illustrates according to an embodiment of the invention to control unauthorized frequency range in eNB11
The schematic device using.This device 500 includes:Second reception device 501 and performs device
502.
Describe the work process of this device 500 with reference to Fig. 1 to Fig. 3 in detail.
First, the second reception device 501 receives the configured information from PCRF15, wherein
Contain the LTE-U strategy of IP-CAN session S, described LTE-U strategy contains described
Session S uses the relevant information of unauthorized frequency range.
As shown in figure 1, the second reception device 501 in eNB11 is via MME12, SGW13
Receive the configured information from PCRF15 with PGW14, wherein containing PCRF15 is
The new LTE-U strategy P producing of session S.
As shown in Fig. 2 the second reception device 501 in eNB11 is via MME12, SGW13
Receive the configured information from PCRF15 with PGW14, wherein contain PCRF15 pair
LTE-U strategy P modify after tactful P '.
As shown in figure 3, the second reception device 501 in eNB11 is via MME12, SGW13
Receive the configured information from PCRF15 with PGW14, wherein contain PCRF15 pair
LTE-U strategy P modify after tactful P ".
Then, performs device 502 is according to the LTE-U policy control unauthorized frequency range receiving
Use, i.e. the use according to the LTE-U policy control unauthorized frequency range receiving.Specifically,
ENB11 distributes unauthorized frequency range according to the information in the LTE-U strategy receiving for UE10
Resource.As it was previously stated, the described LTE-U strategy receiving can be the new LTE-U producing
Strategy or the strategy after existing LTE-U strategy is modified.
It should be noted that the present invention can be by reality in the software and/or software assembly with hardware
Apply, for example, can using special IC (ASIC), general purpose computer or any its
He is similar to hardware device to realize.In one embodiment, the software program of the present invention can lead to
Cross computing device to realize steps described above or function.Similarly, the software journey of the present invention
Sequence (including related data structure) can be stored in computer readable recording medium storing program for performing, example
As, RAM memory, magnetically or optically driver or floppy disc and similar devices.In addition, this
Some bright steps or function can employ hardware to realize, for example, as with processor cooperation from
And execute the circuit of each step or function.
In addition, the part of the present invention can be applied to computer program, such as computer
Programmed instruction, when it is computer-executed, by the operation of this computer, can call or
The method according to the invention and/or technical scheme are provided.And call the program of the method for the present invention
Instruction, is possibly stored in fixing or moveable recording medium, and/or by broadcast
Or the data flow in other signal bearing medias and be transmitted, and/or be stored according to described
In the working storage of computer equipment that programmed instruction runs.Here, according to the present invention one
Individual embodiment includes a device, and this device includes the storage for storing computer program instructions
Device and the processor for execute program instructions, wherein, at this computer program instructions is by this
During reason device execution, trigger the side based on aforementioned multiple embodiments according to the present invention for this plant running
Method and/or technical scheme.
It is obvious to a person skilled in the art that the invention is not restricted to above-mentioned one exemplary embodiment
Details, and without departing from the spirit or essential characteristics of the present invention, can be with it
His concrete form realizes the present invention.Therefore, no matter from the point of view of which point, all should be by embodiment
Regard exemplary as, and be nonrestrictive, the scope of the present invention is by claims
Rather than described above limit, it is intended that by fall claim equivalency implication and
In the range of all changes be included in the present invention.Should not be by any accompanying drawing mark in claim
Note is considered as limiting involved claim.Furthermore, it is to be understood that " inclusion " one word is not excluded for other lists
Unit or step, odd number is not excluded for plural number.Multiple units of statement or device in device claim
Can also be realized by software or hardware by a unit or device.The first, the second grade word
Pragmatic is representing title, and is not offered as any specific order.
Claims (16)
1. it is used in a kind of PCRF in LTE-U system controlling the use of unauthorized frequency range
Method, the method comprises the following steps:
A. receive the IP-CAN session establishment request from PGW;
B. it is that described session generates LTE-U strategy, described LTE-U strategy contains described meeting
Words are using the relevant information of unauthorized frequency range;
C. send the request of IP-CAN session establishment to described PGW to reply, wherein contain institute
State the LTE-U strategy of generation.
2. method according to claim 1, wherein, described step b further includes:
Judge whether described session meets the condition using unauthorized frequency range;
If it is satisfied, generating described LTE-U strategy for described session.
3. method according to claim 2, wherein, methods described also includes:
When described session is from being unsatisfactory for becoming satisfaction using the condition of unauthorized frequency range using not awarding
During the condition of power frequency range, it is that described session generates LTE-U strategy;
Configure message to described PGW sending strategy, wherein contain the LTE-U of described generation
Strategy.
4. method according to claim 1, wherein, methods described also includes:
Change described LTE-U strategy when trigger condition meets;
Configure message to described PGW sending strategy, wherein contain described amended
LTE-U strategy.
5. method according to claim 4, wherein, described trigger condition at least includes
In various situations one below:
Described PCRF detects the one new carrying of described IP-CAN conversation establishing;
Described PCRF detects user related data or network condition there occurs change;
Wherein, described user related data at least includes one in the following:User type,
User account remaining sum, use data traffic, user equipment electricity, the speed of user's movement or
Frequency, market demand type, carrying information, the service parameter of user;
Described network condition at least includes network load information.
6. method according to claim 1, wherein, described LTE-U strategy comprises
At least include in following information using the relevant information of unauthorized frequency range:
Priority using unauthorized frequency range;
Time interval using unauthorized frequency range;
Position using unauthorized frequency range;
Type using unauthorized frequency range;
QoS using unauthorized frequency range.
7. it is used in a kind of eNB in LTE-U system controlling the side of the use of unauthorized frequency range
Method, the method comprises the following steps:
Receive the configured information from PCRF, wherein contain an IP-CAN session
LTE-U strategy, described LTE-U strategy contains the phase that described session uses unauthorized frequency range
Pass information;
The use of unauthorized frequency range according to described LTE-U policy control.
8. method according to claim 7, wherein, described LTE-U strategy comprises
At least include in following information using the relevant information of unauthorized frequency range:
Priority using unauthorized frequency range;
Time interval using unauthorized frequency range;
Position using unauthorized frequency range;
Type using unauthorized frequency range;
QoS using unauthorized frequency range.
9. it is used in a kind of PCRF in LTE-U system controlling the use of unauthorized frequency range
Device, this device includes:
First receiving device, for receiving the IP-CAN session establishment request from PGW;
First strategy generating device, for generating LTE-U strategy for described session, described
LTE-U strategy contains the relevant information that described session uses unauthorized frequency range;
First dispensing device, asks back for sending IP-CAN session establishment to described PGW
Multiple, wherein contain the LTE-U strategy of described generation.
10. device according to claim 9, wherein, described first strategy generating device
It is further used for:
Judge whether described session meets the condition using unauthorized frequency range;
If it is satisfied, generating described LTE-U strategy for described session.
11. devices according to claim 10, wherein, described device also includes:
Second strategy generating device, for when described session is from being unsatisfactory for using unauthorized frequency range
When condition becomes the condition meeting using unauthorized frequency range, it is that described session generates LTE-U strategy;
Second dispensing device, for configuring message to described PGW sending strategy, wherein comprises
The LTE-U strategy of described generation.
12. devices according to claim 9, wherein, described device also includes:
Strategy modification device, for changing described LTE-U strategy when trigger condition meets;
3rd dispensing device, for configuring message to described PGW sending strategy, wherein comprises
Described amended LTE-U strategy.
13. devices according to claim 12, wherein, described trigger condition is at least wrapped
Include in following various situation:
Described PCRF detects the one new carrying of described IP-CAN conversation establishing;
Described PCRF detects user related data or network condition there occurs change;
Wherein, described user related data at least includes one in the following:User type,
User account remaining sum, use data traffic, user equipment electricity, the speed of user's movement or
Frequency, market demand type, carrying information, the service parameter of user;
Described network condition at least includes network load information.
14. devices according to claim 9, wherein, described LTE-U strategy comprises
At least include in following information using the relevant information of unauthorized frequency range:
Priority using unauthorized frequency range;
Time interval using unauthorized frequency range;
Position using unauthorized frequency range;
Type using unauthorized frequency range;
QoS using unauthorized frequency range.
It is used in a kind of 15. eNB in LTE-U system controlling the use of unauthorized frequency range
Device, this device includes:
Second reception device, for receiving the configured information from PCRF, wherein contains one
The LTE-U strategy of individual IP-CAN session, described LTE-U strategy contains described session and makes
Relevant information with unauthorized frequency range;
Performs device, for the use of unauthorized frequency range according to described LTE-U policy control.
16. devices according to claim 15, wherein, described LTE-U strategy comprises
The relevant information using unauthorized frequency range at least include one in following information:
Priority using unauthorized frequency range;
Time interval using unauthorized frequency range;
Position using unauthorized frequency range;
Type using unauthorized frequency range;
QoS using unauthorized frequency range.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510478213.XA CN106455065A (en) | 2015-08-06 | 2015-08-06 | Method and device to control the use of unauthorized frequency band |
PCT/IB2016/001160 WO2017021773A1 (en) | 2015-08-06 | 2016-07-22 | Method and apparatus for controlling utilization of an unlicensed spectrum |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510478213.XA CN106455065A (en) | 2015-08-06 | 2015-08-06 | Method and device to control the use of unauthorized frequency band |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106455065A true CN106455065A (en) | 2017-02-22 |
Family
ID=56853674
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510478213.XA Pending CN106455065A (en) | 2015-08-06 | 2015-08-06 | Method and device to control the use of unauthorized frequency band |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN106455065A (en) |
WO (1) | WO2017021773A1 (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2019001509A1 (en) * | 2017-06-28 | 2019-01-03 | 华为技术有限公司 | Network authentication method and system |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2019024089A1 (en) * | 2017-08-04 | 2019-02-07 | Lenovo (Beijing) Limited | Grant-free resource allocation |
US11240673B2 (en) | 2019-11-20 | 2022-02-01 | Andro Computational Solutions | Real time spectrum access policy based governance |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102638355A (en) * | 2011-02-14 | 2012-08-15 | 阿尔卡特朗讯 | Method and device for determining policy charge rule based on network resource utilization information |
WO2014012594A1 (en) * | 2012-07-19 | 2014-01-23 | Telefonaktiebolaget L M Ericsson (Publ) | Methods and apparatus for implementing policy and charging control |
WO2015076925A1 (en) * | 2013-11-22 | 2015-05-28 | Qualcomm Incorporated | Techniques for provisioning configuration information based on cell characteristics |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20160249255A1 (en) * | 2015-02-25 | 2016-08-25 | Alcatel-Lucent Usa Inc. | Network support for differential charging for data usage in licensed and unlicensed frequency bands |
-
2015
- 2015-08-06 CN CN201510478213.XA patent/CN106455065A/en active Pending
-
2016
- 2016-07-22 WO PCT/IB2016/001160 patent/WO2017021773A1/en active Application Filing
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102638355A (en) * | 2011-02-14 | 2012-08-15 | 阿尔卡特朗讯 | Method and device for determining policy charge rule based on network resource utilization information |
WO2014012594A1 (en) * | 2012-07-19 | 2014-01-23 | Telefonaktiebolaget L M Ericsson (Publ) | Methods and apparatus for implementing policy and charging control |
WO2015076925A1 (en) * | 2013-11-22 | 2015-05-28 | Qualcomm Incorporated | Techniques for provisioning configuration information based on cell characteristics |
Non-Patent Citations (1)
Title |
---|
3RD GENERATION PARTNERSHIP PROJECT: "Policy and charging control architecture", 《3GPP TS 23.203 V13.4.0 》 * |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2019001509A1 (en) * | 2017-06-28 | 2019-01-03 | 华为技术有限公司 | Network authentication method and system |
Also Published As
Publication number | Publication date |
---|---|
WO2017021773A1 (en) | 2017-02-09 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN101370263B (en) | Policy control method and system | |
TWI510043B (en) | Controlling packet filter installation in a user equipment | |
CN104822166B (en) | Transmission rate control, mobility management entity and communication system | |
US9420602B2 (en) | Emergency and prioritized access to wireless resources | |
CN101998531B (en) | Strategy and charging control rule authorization method, device and system | |
JP5531110B2 (en) | Energy control in mobile communication networks | |
CN101562842B (en) | Method, system and device for resource allocation | |
CN105900377B (en) | A kind of method and apparatus transmitting data | |
CN107197490A (en) | Aid in method of adjustment and the base station of main plot | |
CN108616931A (en) | a kind of control method and device of user equipment maximum bandwidth | |
CN108738071A (en) | A kind of method and device that resource is established | |
CN103826263B (en) | A kind of network shunt method and apparatus | |
CN108271219B (en) | Method and device for controlling wireless network resources | |
CN106455065A (en) | Method and device to control the use of unauthorized frequency band | |
CN108702766A (en) | Communication means, the network equipment and terminal device | |
CN105163345A (en) | Area reporting method and system | |
CN105813140A (en) | Resource allocation regulation and control method and resource allocation regulation and control device | |
CN105208602A (en) | Load balancing method and device | |
CN106792923A (en) | A kind of method and device for configuring qos policy | |
CN106998544A (en) | Strategy and billing control method and device based on application | |
KR20190002450A (en) | Admission control system for satellite-based Internet access and transmission | |
CN105122880B (en) | The method and device of message transmission rate is controlled in carrier wave polymerization | |
CN104283693A (en) | Policy control method and network element | |
CN105099736B (en) | A kind of network control strategy adjusting method and device | |
CN104902520B (en) | A kind of control method and device of APN-AMBR |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
AD01 | Patent right deemed abandoned | ||
AD01 | Patent right deemed abandoned |
Effective date of abandoning: 20200626 |