CN109831783B - Method and system for opening micro base station - Google Patents

Method and system for opening micro base station Download PDF

Info

Publication number
CN109831783B
CN109831783B CN201711177458.4A CN201711177458A CN109831783B CN 109831783 B CN109831783 B CN 109831783B CN 201711177458 A CN201711177458 A CN 201711177458A CN 109831783 B CN109831783 B CN 109831783B
Authority
CN
China
Prior art keywords
base station
micro base
information
micro
security
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201711177458.4A
Other languages
Chinese (zh)
Other versions
CN109831783A (en
Inventor
段建祥
陈建刚
潘寅
王福荣
郑凯华
陈�峰
林明辉
黄晓明
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Telecom Corp Ltd
Original Assignee
China Telecom Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Telecom Corp Ltd filed Critical China Telecom Corp Ltd
Priority to CN201711177458.4A priority Critical patent/CN109831783B/en
Publication of CN109831783A publication Critical patent/CN109831783A/en
Application granted granted Critical
Publication of CN109831783B publication Critical patent/CN109831783B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Mobile Radio Communication Systems (AREA)

Abstract

The disclosure provides a method and a system for opening a micro base station, and relates to the field of wireless communication. The method comprises the following steps: the micro base station sends a base station opening request message to the network management server, wherein the base station opening request message carries base station identification information of the micro base station and information of the intercepted macro base station; the network management server authenticates according to the base station identification information in the base station opening request message, sets the state parameter of the micro base station to be an opening state, sets a starting parameter according to the base station identification information and the information of the macro base station, and returns a base station opening response message to the micro base station, wherein the base station opening response message carries the information allowing the micro base station to be opened; after obtaining the information allowing the micro base station to be opened, the micro base station interacts with a security gateway to establish a security tunnel; the micro base station interacts with a network management server based on the safety tunnel to obtain starting parameters; and accessing the core network of the operator according to the starting parameter, thereby realizing the purpose of automatically opening the micro base station.

Description

Method and system for opening micro base station
Technical Field
The present disclosure relates to the field of wireless communications, and in particular, to a method and system for turning on a micro base station.
Background
The traditional base station is large in size, generally needs to be installed in a special machine room and is provided with corresponding facilities for power supply, data transmission and the like. After installation, the base station is fixed in position and generally does not move. Conventional base stations are generally purchased by an operator, and the operator is responsible for installation and activation of the base stations. Because the number of the traditional base stations is small, the management cost of the base stations for operators is not high. In addition, for wireless coverage, the biggest bottleneck problem for operators is insufficient deep coverage, which is just due to insufficient site resources and high construction and deployment costs.
In response to the above problems, a very small base station, i.e. a micro base station, such as the one named elfCell, is currently emerging. The elfCell base station is only half a4 paper in size, and is very convenient for use as indoor coverage for individuals, homes and offices due to its small size. This makes the number of elfCell base stations very large. If the opening of a micro base station like an elfCell base station is still managed by the operator like a conventional base station, the management cost of the base station for the operator will be very large. For example, if a worker is sent to the site to open the micro base station, it will cause problems of time and labor consumption and increase of management cost for the micro base station for the operator.
Disclosure of Invention
One technical problem that this disclosed embodiment solved is: the method or the system for opening the micro base station is provided, so that the micro base station can be opened by a user.
According to an aspect of the embodiments of the present disclosure, there is provided a method for turning on a micro base station, including: the method comprises the steps that a micro base station monitors information of macro base stations of a surrounding network and sends a base station opening request message to a network management server, wherein the base station opening request message carries base station identification information of the micro base station and the monitored information of the macro base stations; the network management server authenticates according to the base station identification information in the base station opening request message, sets the state parameter of the micro base station to be in an opening state, sets a starting parameter according to the base station identification information and the information of the macro base station, and returns a base station opening response message to the micro base station, wherein the base station opening response message carries the information allowing the micro base station to be opened; after obtaining the information allowing the micro base station to be opened, the micro base station interacts with a security gateway to establish a security tunnel; the micro base station interacts with the network management server based on the safety tunnel to obtain the starting parameter; and the micro base station accesses the core network of the operator according to the starting parameter.
Optionally, the micro base station stores an IP address of the network management server, and an IP address and/or a domain name of the security gateway; the micro base station sends a base station opening request message to a network management server based on the IP address of the network management server; and the micro base station interacts with the security gateway based on the IP address and/or the domain name of the security gateway.
Optionally, the information of the macro base station includes: a tracking area code and a pseudo noise PN code of the macro base station; the startup parameters include: core network mobility management entity information, public land mobile network identity, tracking area code of the micro base station and cell configuration information of the micro base station.
Optionally, the micro base station interacts with a security gateway, and the step of establishing a security tunnel includes: the micro base station sends a security request message to a security gateway, wherein the security request message carries base station identification information of the micro base station; the security gateway authenticates the micro base station according to the base station identification information in the security request message, and returns a security response message to the micro base station under the condition that the micro base station is determined to be a legal base station; and after receiving the safety response message, the micro base station establishes a safety tunnel with the safety gateway.
Optionally, the method further comprises: after the micro base station is accessed to a core network, an application program server corresponding to the micro base station obtains user information currently accessed to the micro base station and flow data information passing through the micro base station from the micro base station.
Optionally, the method further comprises: the user terminal downloads an application program module corresponding to the micro base station; and the user terminal interacts with the application program server through the application program module, so that the user information currently accessed to the micro base station and the flow data information passing through the micro base station are obtained.
According to another aspect of the embodiments of the present disclosure, there is provided a system for provisioning a micro base station, including: the micro base station is used for intercepting information of a macro base station of a surrounding network and sending a base station opening request message to the network management server, wherein the base station opening request message carries base station identification information of the micro base station and the intercepted information of the macro base station; after obtaining the information allowing the micro base station to be opened, interacting with a security gateway to establish a security tunnel; interacting with the network management server based on the safety tunnel to obtain the starting parameter; accessing to a core network of an operator according to the starting parameters; and the network management server is used for authenticating according to the base station identification information in the base station opening request message, setting the state parameter of the micro base station to be in an opening state, setting a starting parameter according to the base station identification information and the information of the macro base station, and returning a base station opening response message to the micro base station, wherein the base station opening response message carries the information allowing the micro base station to be opened.
Optionally, the micro base station stores an IP address of the network management server, and an IP address and/or a domain name of the security gateway; the micro base station sends a base station opening request message to a network management server based on the IP address of the network management server; and the micro base station interacts with the security gateway based on the IP address and/or the domain name of the security gateway.
Optionally, the information of the macro base station includes: a tracking area code and a pseudo noise PN code of the macro base station; the startup parameters include: core network mobility management entity information, public land mobile network identity, tracking area code of the micro base station and cell configuration information of the micro base station.
Optionally, the micro base station is configured to send a security request message to a security gateway, where the security request message carries base station identification information of the micro base station; after receiving a security response message returned from a security gateway, establishing a security tunnel with the security gateway; the system further comprises: and the security gateway is used for authenticating the micro base station according to the base station identification information in the security request message and returning a security response message to the micro base station under the condition of determining that the micro base station is a legal base station.
Optionally, the system further comprises: and the application program server corresponding to the micro base station is used for acquiring the user information currently accessed to the micro base station and the flow data information passing through the micro base station from the micro base station after the micro base station is accessed to a core network.
Optionally, the system further comprises: and the user terminal is used for downloading an application program module corresponding to the micro base station, and interacting with the application program server through the application program module so as to obtain the user information currently accessed to the micro base station and the flow data information passing through the micro base station.
According to another aspect of the embodiments of the present disclosure, there is provided a system for provisioning a micro base station, including: a memory; and a processor coupled to the memory, the processor configured to perform the method as previously described based on instructions stored in the memory.
According to another aspect of embodiments of the present disclosure, there is provided a computer readable storage medium having stored thereon computer program instructions which, when executed by a processor, implement the steps of the method as previously described.
In the embodiment of the disclosure, the micro base station sends a base station opening request message carrying base station identification information of the micro base station and the sensed information of the macro base station to the network management server; the network management server authenticates according to the base station identification information, sets the state parameter of the micro base station to be in an opening state, sets a starting parameter and returns a base station opening response message to the micro base station; after obtaining the information allowing the micro base station to be opened, the micro base station interacts with the security gateway to establish a security tunnel, and obtains the starting parameter from the network management server based on the security tunnel, and accesses the core network of the operator according to the starting parameter, thereby realizing the purpose that the user opens the micro base station by himself, and saving the cost of manpower, time, management and the like.
Other features of the present disclosure and advantages thereof will become apparent from the following detailed description of exemplary embodiments thereof, which proceeds with reference to the accompanying drawings.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments of the disclosure and together with the description, serve to explain the principles of the disclosure.
The present disclosure may be more clearly understood from the following detailed description, taken with reference to the accompanying drawings, in which:
fig. 1 is a flow chart illustrating a method of turning on a micro base station according to some embodiments of the present disclosure.
Fig. 2 is a flow chart illustrating a method of turning on a micro base station according to further embodiments of the present disclosure.
Fig. 3 is a block diagram that schematically illustrates a system for provisioning a micro base station, in accordance with some embodiments of the present disclosure.
Fig. 4 is a block diagram that schematically illustrates a system for provisioning a micro base station, in accordance with further embodiments of the present disclosure.
Fig. 5 is a block diagram that schematically illustrates a system for provisioning a micro base station, in accordance with further embodiments of the present disclosure.
Fig. 6 is a block diagram that schematically illustrates a system for provisioning a micro base station, in accordance with further embodiments of the present disclosure.
Detailed Description
Various exemplary embodiments of the present disclosure will now be described in detail with reference to the accompanying drawings. It should be noted that: the relative arrangement of the components and steps, the numerical expressions, and numerical values set forth in these embodiments do not limit the scope of the present disclosure unless specifically stated otherwise.
Meanwhile, it should be understood that the sizes of the respective portions shown in the drawings are not drawn in an actual proportional relationship for the convenience of description.
The following description of at least one exemplary embodiment is merely illustrative in nature and is in no way intended to limit the disclosure, its application, or uses.
Techniques, methods, and apparatus known to those of ordinary skill in the relevant art may not be discussed in detail but are intended to be part of the specification where appropriate.
In all examples shown and discussed herein, any particular value should be construed as merely illustrative, and not limiting. Thus, other examples of the exemplary embodiments may have different values.
It should be noted that: like reference numbers and letters refer to like items in the following figures, and thus, once an item is defined in one figure, further discussion thereof is not required in subsequent figures.
Fig. 1 is a flow chart illustrating a method of turning on a micro base station according to some embodiments of the present disclosure.
In step S102, the micro base station listens to information of macro base stations of a surrounding network, and sends a base station activation request message to the network management server, where the base station activation request message carries base station identification information (e.g., a Serial Number (SN) of the base station) of the micro base station and the information of the macro base station that is listened to.
In some embodiments, the micro base station may listen to information of macro base stations within a predetermined range of the surrounding network. For example, the information of the macro base station may include: the macro base station's tracking area Code and PN Code (Pseudo-Noise Code).
In some embodiments, the micro base station may store an IP (Internet Protocol) address of the network management server. The micro base station sends a base station opening request message to the network management server based on the IP address of the network management server.
In step S104, the network management server performs authentication according to the base station identification information in the base station activation request message, sets the state parameter of the micro base station to the activation state, sets the start parameter according to the base station identification information and the information of the macro base station, and returns a base station activation response message to the micro base station, where the base station activation response message carries information that allows the micro base station to be activated.
In some embodiments, the startup parameters may include: core Network MME (Mobility Management Entity) information, PLMN ID (Public Land Mobile Network ID), TAC (Tracking Area Code) of the micro base station, and cell configuration information of the micro base station.
In other embodiments, the startup parameters may further include: an IP address of the security gateway, an SCTP (Stream Control Transmission Protocol) service IP address of the external gateway, an SCTP service port number of the external gateway, a physical cell ID (identity) list, and a cell ID (for example, a 28-bit cell ID), and the like.
In step S106, after obtaining the information allowing the micro base station to be turned on, the micro base station interacts with the security gateway to establish a security tunnel. In step S106, the micro base station receives a base station activation response message from the network management server, so that the base station activation response message obtains information allowing the micro base station to be activated.
In some embodiments, the micro base station may maintain an IP address and/or domain name for the security gateway. The micro base station may interact with the security gateway based on the IP address and/or domain name of the security gateway.
In some embodiments, the micro base station interacts with a security gateway, and the step of establishing the secure tunnel may include: the micro base station sends a security request message to a security gateway, wherein the security request message carries base station identification information of the micro base station; the security gateway authenticates the micro base station according to the base station identification information in the security request message, and returns a security response message to the micro base station under the condition that the micro base station is determined to be a legal base station; and after receiving the safety response message, the micro base station establishes a safety tunnel with the safety gateway. By establishing the secure tunnel, it is beneficial to ensure the security of the interactive data or information in the interaction between the micro base station and other devices (such as a network management server).
In step S108, the micro base station interacts with the network management server based on the secure tunnel to obtain the start parameter.
In step S110, the micro base station accesses the core network of the operator according to the start parameter.
In the method for opening a micro base station in the above embodiment, the micro base station sends a base station opening request message carrying base station identification information of the micro base station and sensed information of the macro base station to a network management server; the network management server authenticates according to the base station identification information, sets the state parameter of the micro base station to be in an opening state, sets a starting parameter and returns a base station opening response message to the micro base station; after the micro base station obtains the information allowing the micro base station to be opened, the micro base station interacts with a security gateway to establish a security tunnel, and obtains a starting parameter from a network management server based on the security tunnel, and accesses a core network of an operator according to the starting parameter, so that the purpose that a user opens the micro base station by himself is achieved, the operator does not need to send engineering personnel to the site to open the micro base station, and the cost of manpower, time, management and the like is saved.
In some embodiments, the method of turning on a micro base station may further include: after the micro base station accesses the core network, an application server (e.g., APP server) corresponding to the micro base station obtains user information of the current access micro base station and traffic data information passing through the micro base station from the micro base station. This facilitates monitoring of user information accessing the micro base station and traffic data information passing through the micro base station.
In some embodiments, the method of turning on a micro base station may further include: the user terminal downloads an application program module (such as APP) corresponding to the micro base station; the user terminal interacts with the application program server through the application program module, so that the user information of the current access micro base station and the flow data information passing through the micro base station are obtained. In this embodiment, the user can obtain the user information of the access micro base station and the traffic data information passing through the micro base station from the APP server by downloading the APP.
Fig. 2 is a flow chart illustrating a method of turning on a micro base station according to further embodiments of the present disclosure.
In step S202, the micro base station sends a base station activation request message to the network management server. For example, the micro base station listens to information of macro base stations of a surrounding network, and sends a base station activation request message to a network management server. The base station opening request message carries the base station identification information of the micro base station and the information of the macro base station which is sensed. The network management server may be a designated network management server of an operator to which the micro base station belongs.
For example, before the micro base station leaves the factory, the manufacturer may store the IP address of the network management server corresponding to the micro base station in the form of configuration information in the micro base station. Therefore, after the micro base station is powered on, the micro base station can locally acquire the IP address of the corresponding network management server, and then sends a base station opening request message to the network management server.
In step S204, the network management server performs authentication according to the base station identifier information in the base station activation request message, sets the state parameter of the micro base station to the activation state, and sets the start parameter according to the base station identifier information and the information of the macro base station.
In step S206, the network management server returns a base station activation response message to the micro base station. The base station activation response message carries information allowing the micro base station to be activated.
In step S208, after receiving the base station activation response message, the micro base station obtains information allowing the micro base station to be activated, and then sends a security request message to the security gateway. The security request message carries base station identification information of the micro base station.
For example, before the micro base station leaves the factory, the manufacturer may store the IP address and/or domain name of the security gateway corresponding to the micro base station in the form of configuration information in the micro base station. In this way, the micro base station can locally acquire the IP address and/or domain name of the corresponding security gateway, thereby sending the security request message to the security gateway.
In step S210, the security gateway authenticates the micro base station according to the base station identification information in the security request message, and returns a security response message to the micro base station when determining that the micro base station is a legal base station.
In step S212, the micro base station establishes a secure tunnel with the secure gateway after receiving the secure response message.
In some embodiments, the authentication process of the femto access security gateway may use an electronic certificate. The electronic certificate can be a software carrier which is installed in the micro base station in advance and interacts with the security gateway to identify whether the legal micro base station accesses the core network. The complexity of the micro base station can be reduced by using an electronic certificate.
In step S214, the micro base station interacts with the network management server based on the security tunnel to obtain the start parameter. That is, the micro base station obtains the start parameter from the network management server through the security gateway of the operator to which the micro base station belongs.
In step S216, the micro base station accesses the core network of the operator according to the start parameter. Namely, the micro base station accesses the core network of the operator through the security gateway according to the starting parameters.
So far, steps S202 to S216 implement the process of the micro base station automatically accessing the core network.
In some embodiments, the method may further comprise the steps of:
in step S218, the application server (e.g., APP server) obtains the user information currently accessed to the micro base station and the traffic data information passing through the micro base station from the micro base station.
In step S220, the user terminal downloads an application module (e.g., APP) corresponding to the micro base station.
In step S222, the user terminal interacts with the application server through the application module, so as to obtain the user information currently accessed to the micro base station and the traffic data information passing through the micro base station.
For example, serial number information of a micro base station (e.g., an elfCell base station) is marked on an outer surface of the micro base station, and a user may manually input the serial number information of the micro base station into an APP of a terminal (e.g., a smart phone), or scan a two-dimensional code of the base station with a mobile phone to obtain base station identification information. The terminal APP interacts with the application server, and the user can obtain user information (for example, the number of users who access and which users are accessed) of the current access micro base station and traffic data information passing through the micro base station from the terminal APP. Through interaction of the user terminal APP (or the WeChat public number) and the application program server, operation and maintenance efficiency is improved, and the user can know the state of the micro base station in real time.
In the method of the embodiment, the micro base station sends a base station opening request message carrying base station identification information of the micro base station and the sensed information of the macro base station to the network management server; the network management server automatically verifies the network access validity according to the base station identification information, and automatically plans configuration parameters for legal equipment; the micro base station interacts with a security gateway, establishes a security tunnel, acquires a starting parameter from a network management server based on the security tunnel, and accesses a core network of an operator according to the starting parameter; and the user terminal interacts with the application program server through the application program module so as to obtain the user information of the current access micro base station and the flow data information passing through the micro base station. The method of the embodiment not only realizes the purpose that the user opens the micro base station by himself, but also realizes the monitoring of the user information of the current access micro base station and the flow data information passing through the micro base station by the user.
According to the method and the device, the micro base station is used for collecting and evaluating the information of the surrounding macro base stations, the appropriate configuration parameters of the micro base station are calculated through the background, the micro base station is automatically opened, the micro base station is connected to the core network through the home broadband, and the LTE network coverage extension and the deep coverage are rapidly completed. The method can automatically open the micro base station in a plug-and-play mode, so that the operation of a network management server of an operator for managing the micro base station is reduced, and the cost of the operator for managing the micro base station is reduced, and the problem that the management cost of the operator for the micro base station is higher because the operator actively opens the micro base station in the prior art is solved. And the method realizes the effects of purposefully and accurately covering, deeply covering and supplementing the blind in an emergency hot spot in a flexible and quick way.
Existing 4G networks and future 5G networks will use more high frequency spectrum, resulting in reduced base station coverage distance and reduced penetration. And The Fiber To The Home (FTTH) resource where The operator is everywhere can conveniently provide The backhaul of The micro base station. More and more indoor micro base stations are used as indoor coverage means for indoor applications such as home users, small and medium-sized commercial customers, commercial hot spot areas or commercial buildings. The method for opening the micro base station can be used in a plug-and-play mode, and customers can reflect well. Compared with the situation before and after the small station is opened, the KQI (Key Quality Indicators) indexes of peripheral macro base station users are not obviously deteriorated, and on the contrary, the user experience of the whole network is improved.
In addition, the feasibility of various broadband internet return schemes is verified through broadband access (such as Fujian Unicom, Beijing telecom, Beijing Mobile, Jiangsu telecom, Jiangsu Unicom, Jiangsu broadcasting and TV, and the like) of different operators in different cities. Based on a wireless network construction and service development mode of social co-construction and revenue sharing, plug and play and random management of the micro base station at the user side are achieved by means of ubiquitous FTTH resources of operators and smart phones of users.
Fig. 3 is a block diagram that schematically illustrates a system for provisioning a micro base station, in accordance with some embodiments of the present disclosure. As shown in fig. 3, the system may include: a micro base station 302 and a network management server 304.
The micro base station 302 may be configured to listen to information of macro base stations of a surrounding network, and send a base station activation request message to the network management server 304. The base station opening request message carries the base station identification information of the micro base station and the information of the macro base station which is sensed. The micro base station is further configured to interact with the security gateway 306 to establish a secure tunnel after obtaining the information allowing the micro base station to be opened. The micro base station 302 interacts with the network management server 304 based on the secure tunnel, obtains the start parameter, and accesses the core network 308 of the operator according to the start parameter.
For example, the information of the macro base station may include: a tracking area code and a PN code of the macro base station.
For example, the startup parameters may include: the method comprises the following steps of core network mobility management entity information, public land mobile network identity identification, tracking area coding of a micro base station and cell configuration information of the micro base station.
The network management server 304 may be configured to perform authentication according to the base station identifier information in the base station activation request message, set the state parameter of the micro base station 302 to the activation state, set the start parameter according to the base station identifier information and the information of the macro base station, and return a base station activation response message to the micro base station 302. The base station activation response message carries information allowing the micro base station to be activated.
In the system for opening a micro base station in the above embodiment, the micro base station sends a base station opening request message carrying base station identification information of the micro base station and sensed information of the macro base station to the network management server; the network management server authenticates according to the base station identification information, sets the state parameter of the micro base station to be in an opening state, sets a starting parameter and returns a base station opening response message to the micro base station; after the micro base station obtains the information allowing the micro base station to be opened, the micro base station interacts with a security gateway to establish a security tunnel, and obtains a starting parameter from a network management server based on the security tunnel, and accesses a core network of an operator according to the starting parameter, so that the purpose that a user opens the micro base station by himself is achieved, the operator does not need to send engineering personnel to the site to open the micro base station, and the cost of manpower, time, management and the like is saved.
In some embodiments, micro base station 302 may be configured to send a security request message to security gateway 306, the security request message carrying base station identification information for micro base station 302. The micro base station 302 may be configured to establish a secure tunnel with the security gateway 306 upon receiving a security reply message returned from the security gateway 306. In some embodiments, as shown in fig. 3, the system may further include: and the security gateway 306 is configured to authenticate the micro base station 302 according to the base station identification information in the security request message, and return a security response message to the micro base station 302 when determining that the micro base station 302 is a legal base station.
In some embodiments, micro base station 302 may maintain an IP address of network management server 304, and an IP address and/or domain name of security gateway 306. The micro base station 302 sends a base station activation request message to the network management server 304 based on the IP address of the network management server. The micro base station 302 interacts with the security gateway 306 based on the IP address and/or domain name of the security gateway.
In some embodiments, as shown in fig. 3, the system may also include a core network 308. The core network 308 is the core network of the operator to which the micro base station 302 belongs.
In some embodiments, as shown in fig. 3, the system may further include an application server 310 corresponding to the micro base station 302, configured to obtain, from the micro base station 302, user information currently accessing the micro base station 302 and traffic data information passing through the micro base station 302 after the micro base station 302 accesses the core network 308.
In some embodiments, as shown in fig. 3, the system may further include a user terminal 312 for downloading an application module corresponding to the micro base station 302, and interacting with the application server 310 through the application module, so as to obtain user information currently accessed to the micro base station 302 and traffic data information passing through the micro base station 302.
In some embodiments, devices such as a network management server and a security gateway on the network side are established on a cloud platform (e.g., a telecommunications cloud platform), so that the investment on the network side of an operator can be reduced.
Fig. 4 is a block diagram that schematically illustrates a system for provisioning a micro base station, in accordance with further embodiments of the present disclosure.
As shown in fig. 4, the system includes: a micro base station 402, a network management server 404, a security gateway 406, a core network 408, an application server 410 and a user terminal 412. These devices are respectively the same as or similar to the micro base station 302, the network management server 304, the security gateway 306, the core network 308, the application server 310 and the user terminal 312 in fig. 3, and are not described in detail here.
In some embodiments, as shown in fig. 4, the system may further include: switch 414, metropolitan area network 415, DNS (Domain Name System) server 416, traffic statistics server 417, and video server 418. As shown in fig. 4, micro base station 402 establishes a first secure tunnel 431 with security gateway 406 (which may be referred to as a first security gateway) through metropolitan area network 415 and switch 414. This first secure tunnel is similar to the secure tunnel described previously. DNS server 416 is used to provide domain name management services. The traffic statistics server 417 is used for statistics of traffic information. The video server 418 is used to provide video data.
In some embodiments, as shown in fig. 4, the system may further include: a Gateway 420, a security Gateway 422 (which may be referred to as a second security Gateway), an MME 424, and an SAE-GW (System Architecture Evolution Gateway) 426. Here a second secure tunnel 432 is established between gateway 420 and secure gateway 422. The micro base station is connected to a radio access network (IP-RAN) through the established first and second secure tunnels 431 and 432 and then connected to the MME 424 and the SAE-GW 426, thereby accessing the core network 408.
In addition, as shown in FIG. 4, a third secure tunnel 433 is established between application server 410 and secure gateway 406 to allow interaction.
Fig. 5 is a block diagram that schematically illustrates a system for provisioning a micro base station, in accordance with further embodiments of the present disclosure. The system includes a memory 510 and a processor 520. Wherein:
the memory 510 may be a magnetic disk, flash memory, or any other non-volatile storage medium. The memory is used for storing instructions in the embodiments corresponding to fig. 1 and/or fig. 2.
Processor 520 is coupled to memory 510 and may be implemented as one or more integrated circuits, such as a microprocessor or microcontroller. The processor 520 is configured to execute the instructions stored in the memory, thereby implementing the purpose of self-powering on the micro base station.
It is noted that the system in the embodiments of the present disclosure may include a plurality of memories 510 and a plurality of processors 520. The memory 510 and the processor 520 of each group may be disposed in different locations or devices to implement the methods of the corresponding embodiments of fig. 1 and/or fig. 2.
In one embodiment, as also shown in FIG. 6, the system 600 includes a memory 610 and a processor 620. Processor 620 is coupled to memory 610 through a BUS 630. The system 600 may also be coupled to an external storage device 650 via a storage interface 640 for facilitating retrieval of external data, and may also be coupled to a network or another computer system (not shown) via a network interface 660, which will not be described in detail herein.
In this embodiment, the memory stores the data instruction, and the processor processes the instruction, thereby achieving the purpose of self-opening the micro base station.
In another embodiment, the present disclosure also provides a computer-readable storage medium having stored thereon computer program instructions, which when executed by a processor, implement the steps of the method in the corresponding embodiment of fig. 1 and/or fig. 2. As will be appreciated by one skilled in the art, embodiments of the present disclosure may be provided as a method, apparatus, or computer program product. Accordingly, the present disclosure may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present disclosure may take the form of a computer program product embodied on one or more computer-usable non-transitory storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present disclosure is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems) and computer program products according to embodiments of the disclosure. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
Thus far, the present disclosure has been described in detail. Some details that are well known in the art have not been described in order to avoid obscuring the concepts of the present disclosure. It will be fully apparent to those skilled in the art from the foregoing description how to practice the presently disclosed embodiments.
The method and system of the present disclosure may be implemented in a number of ways. For example, the methods and systems of the present disclosure may be implemented by software, hardware, firmware, or any combination of software, hardware, and firmware. The above-described order for the steps of the method is for illustration only, and the steps of the method of the present disclosure are not limited to the order specifically described above unless specifically stated otherwise.
Although some specific embodiments of the present disclosure have been described in detail by way of example, it should be understood by those skilled in the art that the foregoing examples are for purposes of illustration only and are not intended to limit the scope of the present disclosure. It will be appreciated by those skilled in the art that modifications may be made to the above embodiments without departing from the scope and spirit of the present disclosure. The scope of the present disclosure is defined by the appended claims.

Claims (12)

1. A method of provisioning a micro base station, comprising:
the method comprises the steps that a micro base station monitors information of macro base stations of a surrounding network and sends a base station opening request message to a network management server, wherein the base station opening request message carries base station identification information of the micro base station and the monitored information of the macro base stations;
the network management server authenticates according to the base station identification information in the base station opening request message, sets the state parameter of the micro base station to be in an opening state, sets a starting parameter according to the base station identification information and the information of the macro base station, and returns a base station opening response message to the micro base station, wherein the base station opening response message carries the information allowing the micro base station to be opened;
after obtaining the information allowing the micro base station to be opened, the micro base station interacts with a security gateway to establish a security tunnel, wherein the micro base station interacts with the security gateway, and the step of establishing the security tunnel comprises the following steps: the micro base station sends a security request message to a security gateway, wherein the security request message carries base station identification information of the micro base station; the security gateway authenticates the micro base station according to the base station identification information in the security request message, and returns a security response message to the micro base station under the condition that the micro base station is determined to be a legal base station; after receiving the safety response message, the micro base station establishes a safety tunnel with the safety gateway;
the micro base station interacts with the network management server based on the safety tunnel to obtain the starting parameter; and
and the micro base station accesses to a core network of an operator according to the starting parameters.
2. The method of claim 1, wherein,
the micro base station stores the IP address of the network management server and the IP address and/or the domain name of the security gateway;
the micro base station sends a base station opening request message to a network management server based on the IP address of the network management server;
and the micro base station interacts with the security gateway based on the IP address and/or the domain name of the security gateway.
3. The method of claim 1, wherein,
the information of the macro base station comprises: a tracking area code and a pseudo noise PN code of the macro base station;
the startup parameters include: core network mobility management entity information, public land mobile network identity, tracking area code of the micro base station and cell configuration information of the micro base station.
4. The method of claim 1, further comprising:
after the micro base station is accessed to a core network, an application program server corresponding to the micro base station obtains user information currently accessed to the micro base station and flow data information passing through the micro base station from the micro base station.
5. The method of claim 4, further comprising:
the user terminal downloads an application program module corresponding to the micro base station; and
and the user terminal interacts with the application program server through the application program module so as to obtain the user information currently accessed to the micro base station and the flow data information passing through the micro base station.
6. A system for provisioning a micro base station, comprising:
the micro base station is used for intercepting information of a macro base station of a surrounding network and sending a base station opening request message to the network management server, wherein the base station opening request message carries base station identification information of the micro base station and the intercepted information of the macro base station; after obtaining the information allowing the micro base station to be opened, interacting with a security gateway to establish a security tunnel; interacting with the network management server based on the safety tunnel to obtain starting parameters; accessing to a core network of an operator according to the starting parameters; and
the network management server is used for authenticating according to the base station identification information in the base station opening request message, setting the state parameter of the micro base station to be an opening state, setting a starting parameter according to the base station identification information and the information of the macro base station, and returning a base station opening response message to the micro base station, wherein the base station opening response message carries information allowing the micro base station to be opened;
the micro base station is used for sending a security request message to a security gateway, wherein the security request message carries base station identification information of the micro base station; after receiving a security response message returned from a security gateway, establishing a security tunnel with the security gateway;
the system further comprises:
and the security gateway is used for authenticating the micro base station according to the base station identification information in the security request message and returning a security response message to the micro base station under the condition of determining that the micro base station is a legal base station.
7. The system of claim 6, wherein,
the micro base station stores the IP address of the network management server and the IP address and/or the domain name of the security gateway;
the micro base station sends a base station opening request message to a network management server based on the IP address of the network management server;
and the micro base station interacts with the security gateway based on the IP address and/or the domain name of the security gateway.
8. The system of claim 6, wherein,
the information of the macro base station comprises: a tracking area code and a pseudo noise PN code of the macro base station;
the startup parameters include: core network mobility management entity information, public land mobile network identity, tracking area code of the micro base station and cell configuration information of the micro base station.
9. The system of claim 6, further comprising:
and the application program server corresponding to the micro base station is used for acquiring the user information currently accessed to the micro base station and the flow data information passing through the micro base station from the micro base station after the micro base station is accessed to a core network.
10. The system of claim 9, further comprising:
and the user terminal is used for downloading an application program module corresponding to the micro base station, and interacting with the application program server through the application program module so as to obtain the user information currently accessed to the micro base station and the flow data information passing through the micro base station.
11. A system for provisioning a micro base station, comprising:
a memory; and
a processor coupled to the memory, the processor configured to perform the method of any of claims 1-5 based on instructions stored in the memory.
12. A computer-readable storage medium having stored thereon computer program instructions which, when executed by a processor, implement the steps of the method of any one of claims 1 to 5.
CN201711177458.4A 2017-11-23 2017-11-23 Method and system for opening micro base station Active CN109831783B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711177458.4A CN109831783B (en) 2017-11-23 2017-11-23 Method and system for opening micro base station

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711177458.4A CN109831783B (en) 2017-11-23 2017-11-23 Method and system for opening micro base station

Publications (2)

Publication Number Publication Date
CN109831783A CN109831783A (en) 2019-05-31
CN109831783B true CN109831783B (en) 2022-03-04

Family

ID=66858183

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711177458.4A Active CN109831783B (en) 2017-11-23 2017-11-23 Method and system for opening micro base station

Country Status (1)

Country Link
CN (1) CN109831783B (en)

Families Citing this family (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113556740B (en) * 2020-04-07 2024-03-19 中移(成都)信息通信科技有限公司 Identity authentication system and method
CN112188612B (en) * 2020-10-22 2022-07-22 中国联合网络通信集团有限公司 Micro base station registration method, server and micro base station
CN112188529B (en) * 2020-10-22 2023-05-16 中国联合网络通信集团有限公司 Micro base station operation method and micro base station
CN112188527B (en) * 2020-10-22 2023-05-05 中国联合网络通信集团有限公司 Micro base station rewarding method, macro base station and micro base station management server
CN112105024B (en) * 2020-11-12 2021-03-23 新华三技术有限公司 Base station identity authentication method, device and equipment
CN112399449B (en) * 2020-12-09 2023-07-18 中国联合网络通信集团有限公司 Base station opening method and device
CN116321206A (en) * 2021-12-06 2023-06-23 中兴通讯股份有限公司 Base station opening method, base station opening device, electronic equipment and computer readable storage medium
CN114567548B (en) * 2022-01-26 2023-11-07 三维通信股份有限公司 Security gateway configuration management method, system and electronic device of base station

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101335984A (en) * 2007-06-25 2008-12-31 华为技术有限公司 Household miniature base station access control method and system
CN102474731A (en) * 2009-08-19 2012-05-23 松下电器产业株式会社 Mobile communication system, network management apparatus, macrocell base station apparatus, and interference control method
CN102739570A (en) * 2012-06-15 2012-10-17 烽火通信科技股份有限公司 Method for opening home gateway through wireless fidelity (WiFi) of smart phone
CN104581875A (en) * 2015-01-14 2015-04-29 广州杰赛科技股份有限公司 Miniature base station accessing method and system

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2010019970A1 (en) * 2008-08-15 2010-02-18 Kineto Wireless, Inc. Method and apparatus for inter home node b cell update handling

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101335984A (en) * 2007-06-25 2008-12-31 华为技术有限公司 Household miniature base station access control method and system
CN102474731A (en) * 2009-08-19 2012-05-23 松下电器产业株式会社 Mobile communication system, network management apparatus, macrocell base station apparatus, and interference control method
CN102739570A (en) * 2012-06-15 2012-10-17 烽火通信科技股份有限公司 Method for opening home gateway through wireless fidelity (WiFi) of smart phone
CN104581875A (en) * 2015-01-14 2015-04-29 广州杰赛科技股份有限公司 Miniature base station accessing method and system

Also Published As

Publication number Publication date
CN109831783A (en) 2019-05-31

Similar Documents

Publication Publication Date Title
CN109831783B (en) Method and system for opening micro base station
CN106332224B (en) Equipment network distribution method, device and system
CA2760863C (en) A system and method for use in a cellular communication network
US20150181627A1 (en) Verification method for the verification of a connection request from a roaming mobile entity
US11233817B2 (en) Methods and apparatus for end device discovering another end device
CN106656547B (en) Method and device for updating network configuration of household electrical appliance
CN104302015A (en) Adaptive WI-FI network connection method and system with hidden SSID
CN108811043B (en) Access device, authentication server, terminal device access control method and system
US11871223B2 (en) Authentication method and apparatus and device
CN105828413A (en) Safety method of D2D mode B discovery, terminal and system
CN101730187A (en) Method and system for realizing local access control of home base station
JP2017528074A5 (en)
CN107889194A (en) Obtain, provide method, equipment and the medium of WAP access information
CN104980910A (en) D2D (Device to Device) discovery processing method and apparatus
CN108207018A (en) Wireless connection method and device
CN104244373B (en) A kind of method that wireless terminal adds wireless network
CN113965334A (en) Online signing method, device and system
CN104518874A (en) Network access control method and system
JP5732682B2 (en) Base station apparatus, communication system, and communication method
CN111770094B (en) Access control method of wireless network and related device
KR20160050587A (en) METHOD FOR CONTROLLING NETWORK CONNECTION OF IoT DEVICE
US20170070867A1 (en) Method and system for triggering terminal group
KR20120137706A (en) Communication system, femto cell thereof, and method for clustering and handovering the same
JP5449092B2 (en) Femto base station movement detection method and femto base station movement detection system
CN115396873B (en) Communication method, device, server and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant