KR20130038087A - Method for offloading traffic with local gateway and gateway thereof - Google Patents

Method for offloading traffic with local gateway and gateway thereof Download PDF

Info

Publication number
KR20130038087A
KR20130038087A KR1020110102741A KR20110102741A KR20130038087A KR 20130038087 A KR20130038087 A KR 20130038087A KR 1020110102741 A KR1020110102741 A KR 1020110102741A KR 20110102741 A KR20110102741 A KR 20110102741A KR 20130038087 A KR20130038087 A KR 20130038087A
Authority
KR
South Korea
Prior art keywords
network
gateway
traffic
local
base station
Prior art date
Application number
KR1020110102741A
Other languages
Korean (ko)
Inventor
서성훈
차용주
김현숙
김현표
정진수
Original Assignee
주식회사 케이티
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 주식회사 케이티 filed Critical 주식회사 케이티
Priority to KR1020110102741A priority Critical patent/KR20130038087A/en
Publication of KR20130038087A publication Critical patent/KR20130038087A/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/46Interconnection of networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/66Arrangements for connecting between networks having differing types of switching systems, e.g. gateways
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The present invention relates to an apparatus and method for offloading traffic without going through a core network since the introduction of a local gateway in connection with components of a local network and a BBF access network.

Figure P1020110102741

Description

METHOOD FOR OFFLOADING TRAFFIC WITH LOCAL GATEWAY AND GATEWAY THEREOF}

The present invention relates to an apparatus and method for offloading traffic without going through a core network since the introduction of a local gateway in connection with components of a local network and a broadband access network.

The terminal connected to the local network may deliver traffic to the internet network through the core network, or may offload traffic by passing the traffic to the internet network through the local network and the broadband access network without passing through the core network.

In this context, it is an object of the present invention to provide an apparatus and method for applying an application service provided by a third network, which is not included in the core network, to a corresponding application.

In order to achieve the above object, in one aspect, the present invention provides a method for offloading traffic of a local gateway associated with a first gateway connecting to another network included in a broadband access network. Receiving the traffic from a local base station to which the terminal is connected; And routing the traffic to a second gateway connecting to an external IP network included in the broadband access network.

In another aspect, another embodiment is a method for offloading traffic of an independent local gateway located within a first gateway connecting to another network included in a broadband access network, and connected to a local terminal connected by an authenticated terminal from the core network. Receiving the traffic from a base station; And routing the traffic through the first gateway to a second gateway connecting to an external IP network included in the broadband access network.

In another aspect, another embodiment is a method for offloading traffic of an independent local gateway located in one gateway connecting to an external IP network included in a broadband access network. Receiving the traffic from a local base station through another gateway connecting to another network and one gateway connecting to the external IP network; And transmitting the traffic to an external IP network.

In another aspect, another embodiment provides a function for receiving the traffic from a local base station to which an authenticated terminal from a core network accesses and routing the traffic to one gateway that connects the traffic to an external IP network included in a broadband access network. It performs a function to offload the traffic, and provides a local gateway associated with other gateways that are included in the broadband access network, connecting to other networks.

In another aspect, another embodiment provides a function of receiving traffic from a local base station to which an authenticated terminal from a core network connects, and the broadband through a first gateway connecting the traffic with another network included in a broadband access network. Offloading the traffic by performing a function of routing to a second gateway connected to an external IP network included in an access network, and providing a local gateway independent of the first gateway.

In another aspect, another embodiment of the present invention provides a second gateway for connecting a first gateway to another network included in a broadband access network and a second gateway to the external IP network from a local base station to which an authenticated terminal from a core network is connected. Offloading the traffic by performing the function of receiving the traffic and transmitting the traffic to an external IP network, and provides an independent local gateway to the second gateway.

In another aspect, another embodiment provides a function for receiving the traffic from a local base station to which an authenticated terminal from a core network accesses and routing the traffic to one gateway that connects the traffic to an external IP network included in a broadband access network. A gateway included in a broadband access network, which is integrated with a local gateway that offloads the traffic by performing a function of performing a function of the same.

In another aspect, another embodiment provides a local, local network that receives traffic from a local base station to which an authenticated terminal from a core network connects and offloads the traffic to a specific gateway that connects to an external IP network included in a broadband access network. A gateway is provided independently and provides a gateway included in a broadband access network that receives the traffic and routes the traffic to the specific gateway.

In another aspect, another embodiment is a traffic writing method of a gateway included in a broadband access network, which receives the traffic from a local base station to which an authenticated terminal is connected from a core network and includes the traffic in the broadband access network. Receiving the traffic from a local gateway, offloading to a specific gateway connecting to an IP network; And it provides a traffic routing method of the gateway comprising the step of routing the traffic to the specific gateway.

In another aspect, another embodiment of the present invention provides a function of receiving the traffic from a local base station connected by a terminal authenticated from a core network by a local gateway associated with another gateway included in a broadband access network. ; And a computer readable recording medium recording a program for offloading the traffic by performing a function of routing the traffic to one gateway connected to an external IP network included in the broadband access network.

In another aspect, another embodiment is a local base station located in a first gateway connecting to another network included in a broadband access network and connected by a terminal authenticated from a core network by a local gateway independent of the first gateway. Receiving traffic from the network; And a computer-readable recording medium recording a program for offloading the traffic by performing a function of routing the traffic through a first gateway to a second gateway connected to an external IP network included in the broadband access network. to provide.

In another aspect, another embodiment of the present invention provides a second gateway for connecting a first gateway to another network included in a broadband access network and a second gateway to the external IP network from a local base station to which an authenticated terminal from a core network is connected. Receiving the traffic through; And a computer-readable recording medium having recorded thereon a program for offloading the traffic by a local gateway independent of the second gateway to a function of transmitting the traffic to an external IP network. The present invention is not included in a core network. The application service provided by the third network does not have the effect of applying the QoS suitable for the corresponding application.

1 is a diagram schematically illustrating a system architecture applied to an embodiment of the present invention.
FIG. 2 is a diagram illustrating a system architecture in the first environment of FIG. 1 in detail.
FIG. 3 specifically illustrates a system architecture when the local network is a femto system in the first environment of FIG. 1.
FIG. 4 is a flowchart of a QoS policy setting procedure of offloaded traffic in the WLAN of FIG. 2 assuming that network address translation (NAT) is not used.
5 specifically illustrates a system architecture according to one embodiment.
FIG. 6 is a flowchart of a signaling procedure for APN-based local base station offload according to another embodiment when the L-GW and RG of FIG. 5 are collocated.
FIG. 7 illustrates a path of EPS traffic based on APN-based local base station offload traffic according to another embodiment when L-GW and RG of FIG. 5 are collocated.
8 specifically illustrates a system architecture according to another embodiment.
FIG. 9 is a flowchart of a signaling procedure for APN based local base station offload according to another embodiment when the L-GW and RG of FIG. 8 are standalone.
FIG. 10 illustrates a path of EPS traffic based on APN-based local base station offload traffic according to another embodiment when the L-GW and the RG of FIG. 8 are standalone.
11 specifically illustrates a system architecture according to another embodiment.
FIG. 12 is a flowchart of a signaling procedure for APN-based local base station offload according to another embodiment when the L-GW of FIG. 11 is disposed in the BNG stage separately from the BNG.
FIG. 13 illustrates a path of EPS traffic based on APN-based local base station offload traffic according to another embodiment when the L-GW of FIG. 11 is separated from the BNG and disposed in the BNG stage.
14 specifically illustrates a system architecture according to another embodiment.
FIG. 15 illustrates a path of EPS traffic and local base station offload traffic that is not APN based, according to another embodiment.
FIG. 16 is a flowchart of a signaling procedure for local non-APN offloading according to another embodiment when the L-GW and RG of FIG. 14 are combined.

Hereinafter, some embodiments of the present invention will be described in detail with reference to exemplary drawings. In adding reference numerals to the components of each drawing, it should be noted that the same reference numerals are assigned to the same components as much as possible even though they are shown in different drawings. In the following description of the present invention, a detailed description of known functions and configurations incorporated herein will be omitted when it may make the subject matter of the present invention rather unclear.

In addition, in describing the component of this invention, terms, such as 1st, 2nd, A, B, (a), (b), can be used. These terms are intended to distinguish the constituent elements from other constituent elements, and the terms do not limit the nature, order or order of the constituent elements. When a component is described as being "connected", "coupled", or "connected" to another component, the component may be directly connected to or connected to the other component, It should be understood that an element may be "connected," "coupled," or "connected."

1 is a diagram schematically illustrating a system architecture applied to an embodiment of the present invention.

Referring to FIG. 1, a system architecture 100 applied to an embodiment of the present invention includes a core network or an EPC network (Evolved Packet Core Network) 110, a broadband network or a BBF access network (BBFB 120), a local network. A local network 130, a third network 140, and a terminal 150.

The EPC network 110 is a local mobility anchor point for handover between base stations or an EPC agent that is a connection point of an EPC first gateway 112 and an external IP network that blocks harmful data by analyzing a large amount of data packets and provides security functions. 2 includes all or part of the gateway 114, part of QoS management and policy or rule determination, EPC QoS and policy management device 116 for applying them to the terminal, and EPC authentication device 118 for managing authentication procedures such as a terminal can do.

The base station included in the EPC network 110 refers to a fixed station that communicates with the terminal 150 with a cell having a constant radius as a service area, and is a Node-B according to a system type. It may also be called other terms such as an evolved Node-B (eNB), a Base Transceiver System (BTS), an Access Point, a Relay Node, and the like.

The BBF access network 120 is a local mobility anchor point for inter-base station handover or BBF second, which is a connection point of an external IP network and the BBF first gateway 122 used to connect devices to the Internet or other broadband network in the home. The gateway 124, the BBF QoS management and policy or rule determination, and the QoS and policy management device 126 for applying them to the terminal, and the BBF authentication device 128 for managing authentication procedures such as the terminal may be included in whole or in part. .

The local network 130 may be a local network including a femto system 132, a WIFI access point 134, or a BBF device 136 as a local base station or an access device. In this case, the local network 130 may separately include a local gateway (not shown).

The third network 140 may be a separate network that cannot receive the IP service of the operator of the EPC network 110. For example, the third network 140 may be an internet network in which an operating entity does not exist separately. The third network 140 may include an application management device 142 that manages information of applications of the third network. The application management device 142 is described as being included in the third network 140 in FIG. 1, but may be included in the EPC network 110.

The application management device 142 may be an application function (AF) or a traffic detection function (TDF).

The terminal 150 is a comprehensive concept of a user terminal in wireless communication, and includes a mobile station (MS), a user terminal (UT), an SS (MS) in GSM as well as a UE in WCDMA and LTE, LTE-A, and HSPA. It should be interpreted as a concept that includes both a subscriber station and a wireless device.

The terminal 150 may receive an IP service via the local network 130, the BBF access network 120, and the EPC network 110. In the system architecture shown in FIG. 1, all traffic generated from the terminal 150 may be delivered to the EPC network 110. In this case, all traffic generated from the terminal 150 is transferred to the BBF first gateway 122 and the BBF second gateway 124 of the BBF access network 120, the EPC first gateway 112 and the first of the EPC network 110. It may be delivered to the EPC network 110 through the two gateways 114. This environment is hereinafter referred to as a first environment.

At this time, the terminal 150 receives its own local IP address and authenticates the EPC network 110 by an EPC network-based access authentication means. After this procedure, the UE local IP address is known to the QoS and policy management unit 116. The UE local IP address may be the public IP address assigned to the UE by the BBF domain.

Traffic offloaded from terminal 150 is routed to a peer of the terminal in the offloaded network. An application management apparatus (not shown) in the EPC that detects the IP service of the terminal 150 may generate specific interface signaling to the EPC QoS and policy management apparatus 116 to transmit application related information.

At this time, the policy or rule generated by the EPC QoS and policy management unit 116 is transferred to the BBF QoS and policy management unit 126 through a specific interface and finally applied to the BBF second gateway 124. do. This rule includes the UE local IP address so that packets in the BBF domain can be associated with this terminal 150.

In this case, in the case of the terminal 150 receiving the service via the EPC network 110, since the EPC application management apparatus 142 knows the EPC QoS and policy management apparatus 116 of the home network, the Rx interface is immediately used. QoS and charging policy corresponding to a specific application may be applied.

Meanwhile, in the system architecture 100 shown in FIG. 1, all traffic generated from the terminal 150 is directly connected to the IP service of the Internet in the local network 130 and the BBF access network 120 without passing through the EPC network 110. You can also offload to receive it. This environment is hereinafter referred to as a second environment.

In the present specification, the terminal 150, the base station of the EPC network 110, the local base station of the local network 130, or an access device are used in a generic sense as a transmitting / receiving subject used to implement the technology or technical idea described herein. And is not limited to the terms or words specifically referred to.

There is no limitation on the multiple access scheme applied to the wireless communication system. Various multiple access techniques such as Code Division Multiple Access (CDMA), Time Division Multiple Access (TDMA), Frequency Division Multiple Access (FDMA), Orthogonal Frequency Division Multiple Access (OFDMA), OFDM-FDMA, OFDM-TDMA, OFDM-CDMA Can be used.

Uplink (downlink) transmission and downlink (downlink, or downlink) transmission may use a time division duplex (TDD) scheme, which is transmitted using different times, or transmit using different frequencies. A frequency division duplex (FDD) scheme may be used.

One embodiment of the present invention is resource allocation in the field of asynchronous wireless communication evolving into Long Term Evolution (LTE) and LTE-advancedA through GSM, WCDMA, HSPA, and synchronous wireless communication evolving into CDMA, CDMA-2000 and UMB. Can be applied to The present invention should not be construed as being limited or limited to a specific wireless communication field, but should be construed as including all technical fields to which the spirit of the present invention can be applied.

A system to which an embodiment of the present invention is applied may support uplink and / or downlink hybrid automatic repeat request (HARQ), and may use channel quality indicator (CQI) for link adaptation. In addition, multiple access schemes for downlink and uplink transmission may be different. For example, the downlink uses Orthogonal Frequency Division Multiple Access (OFDMA), and the uplink uses Single Carrier-Frequency Division Multiple Access (SC-FDMA). ) Is the same as that available.

The layers of the radio interface protocol between the terminal 150 and the networks 110, 120, and 130 are the lower three layers of the Open System Interconnection (OSI) model, which is well known in communication systems. Based on the first layer (L1), the second layer (L2), can be divided into the third layer (L3), the physical layer belonging to the first layer information transfer service (information transfer) using a physical channel (physical channel) service).

FIG. 2 is a diagram illustrating a system architecture in the first environment of FIG. 1 in detail.

In the first environment illustrated in FIG. 2, the system architecture 200 is one of the system architecture 100 of FIG. 1 when the device of the local network is a WIFI AP and is non-roaming.

Referring to FIG. 2, the system architecture 200 in the first environment includes an EPC network 210, a BBF access network 220, a local network 230, and a terminal 250. In the system architecture 200 illustrated in FIG. 2, the terminal 250 may receive an IP service through the local network 230, the BBF access network 220, and the EPC network 210 in the first environment. It may not include the third network 140.

The EPC network 210 analyzes a large amount of data packets to block harmful data and provides an enhanced packet data gateway (ePDG) 212, which provides a security function, and a P-GW 214, which is a connection point of an external IP network, the EPC of FIG. 1. An embodiment of the QoS and policy management device 116 may include all or part of the QoS management and policy or rule determination, the PCRF 216 for applying them to the terminal, and the 3GPP AAA server 218 for managing authentication procedures such as the terminal. Can be. The ePDG 212 is a type of the EPC first gateway 112 of FIG. 1, and the P-GW 214 is a type of the EPC second gateway 114 of FIG. 1.

In this case, the PCRF 216 may be divided into a visited PCRF (visited PCRF or vPCRF) and a home PCRF (home PCRF or hPCRF) when roaming.

The BBF access network 220 is a RG (Residential Gateway) 222 that connects terminal devices to the Internet or another broadband network, and a Broadband Remote Access Server (BRAS) / BNG (Broadband Network Gateway) 224, which is a connection point of an external IP network. The BBF QoS and policy management device 126 of FIG. 1 may partially or partially manage BQF AAA proxy 228 that manages QoS management, policy or rule determination, and BPCF 226 for applying them to the terminal, and authentication procedures of the terminal. It may include. RG 222 is a type of BBF first gateway 122 of FIG. 1, and BRAS / BNG 224 is a type of BBF second gateway 124 of FIG. 1.

RG 222 is a home networking device or gateway used to connect devices in the home to the Internet or other broadband network.

A Broadband Remote Access Server (BRAS) is a broadband network gateway or aggregation point for user traffic. BRAS provides aggregation capability (eg IP, PPP, Ethernet) between the access network and the NSP or ASP. Along with aggregation, Broadband Remote Access Server (BRAS) can provide policy management and IP QoS in access networks.

A BNG (Broadband Network Gateway) is an IP Edge Router to which band and QoS policies can be applied. Broadband Network Gateway (BNG) may be used in place of BRAS. Hereinafter, BRAS or BNG will be referred to as BNG / BRAS 224.

The local network 230 may be a local network including one of the WIFI AP 234 or the BBF device 236 as a local base station or access device. In this case, the local network 230 may separately include a local gateway not shown.

The local network 230 is a network hierarchically interworking with the above-described EPC network 210. For example, the local network 230 refers to a network having a relatively small size compared to the macro network 210 such as a home network or an office network. The local network 230 includes at least one of the WIFI AP 234 communicating with the terminal 250 or the BBF device 236 communicating with the BBF according to the IEEE 802.11x series or WLAN standard.

The control plane and the user plane between the access network 220, 230 between the terminal 250 and the base station 220 and the EPC network 210 in FIG. (User Plane) is exchanged with different interfaces.

That is, the control plane between the base station indicated by the eNB and the MME may use the S1-MME interface, and the user plane between the base station indicated by the eNB and the S-GW may use the S1-U interface. Meanwhile, a base station indicated by an eNB may use an X2 interface, an S-GW and a P-GW 214 may use an S5 interface, and the P-GW 214 and an internet network may use an SGi interface.

The ePDG 212 and the P-GW 214 can use the S2b interface, the P-GW 214 and the PCRF 216 can use the Gx interface, and the ePDG 212 and the PCRF 216 can use the Gxb * interface. P-GW 214 and the Internet network can use the SGi interface, ePDG 212 and 3GPP AAA server 218 can use the SWm interface, P-GW 214 and 3GPP AAA server 218 Can use the SWm interface.

In addition, the S-GW and P-GW 214 may use an S5 interface, and the HLR / HSS and 3GPP AAA servers 218 may use a SWx interface.

Meanwhile, the PCRF 216 of the EPC network 210 and the BPCF 226 of the BBF access network 220 may use the S9a interface and the 3GPP AAA server 218 and the BBF access network 220 of the EPC network 210. The BBF AAA Proxy 228 may use the SWa interface.

In addition, the terminal 250 and the ePDG 212 may use a SWu interface.

All traffic generated from the UE in the first environment in which the 3GPP subscriber is provided with the IP service through the Evolved Packet Core (EPC) network 210 in cooperation with the BBF access network 220 is delivered to the EPC network 210. When the operators of the BBF access network 220 and the EPC network 210 are untrusted, traffic is transmitted to the EPC network 210 through the ePDG 212. The forwarded traffic is forwarded to the P-GW 214. The policy or rule generated through the PCRF 216 is delivered to the BPCF through the s9a interface and finally applied to the BRAS / BNG 224.

Traffic sent from the WIFI AP 234 may be sent to the EPS via the SWu / S2c interface via the BRAS / BNG 224 and may also be offloaded by being sent directly to the Internet.

The policy for offloaded traffic of the UE is transmitted from the EPC network to the BBF access network through S9a. The establishment of S9a for the UE is determined as a result of 3GPP-based access authentication of the UE or as a result of S2b / S2c tunnel establishment. If 3GPP-based access authentication or tunnel establishment is not performed, the policy from the EPC network 210 may not be transmitted to the BBF access network 220.

The BBF access network 220 may be pre-configured with a policy for the terminal 250. It is assumed that QoS for offloaded traffic of the terminal 250 is enforced by the BBF access network 220, based on a rule received through S9a from the EPC network.

There is a clear difference between the static policy and the dynamic policy, where the static policy for the terminal is the policies known by the EPC network 210 at the UE attachment time and for the terminal. Dynamic policies are policies that cannot be known by the EPC network 210 at the time of UE attachment.

FIG. 3 specifically illustrates a system architecture when the local network is a femto system in the first environment of FIG. 1.

The system architecture 300 shown in FIG. 3 includes all or part of an EPC network 310, a BBF access network 320, a local network 330, and a terminal 350.

The EPC network 310 includes an S-GW 312 as the EPC first gateway of FIG. 1 and a P-GW 314 and a PCRF 316 as the EPC second gateway of FIG. 1. P-GW 314 and PCRF 316 are substantially the same as P-GW 214 and PCRF 216 shown in FIG.

The primary role / function of the S-GW 312 with the EPC first gateway of FIG. 1 is the local mobility anchor point for inter-base station handover. Detailed functions of the S-GW 312 may be, but are not limited to, user terminal channel management, user terminal IP allocation, policy enhancement through linkage with PCRF, packet routing, and forwarding.

The EPC network 310 may include a base station of an evolved UTRAN and a mobility management entity 315 responsible for processing control signals. The MME 315 may be in charge of processing the operator policy, quality of service (QoS), subscriber information, etc. in addition to the control signals received from the terminal 250 and the S-GW 312.

Meanwhile, as illustrated in FIG. 3, the EPC network 310 may include a separate gateway, for example, a security gateway 317 (SeGW). The EPC network 310 may include a separate gateway for the local base station 332, for example H (e) NB GW 319, between the S-GW 312 and the local base station 332.

According to the configuration of the EPC network 310, there are a plurality of MMEs at the bottom of the P-GW 314 and the S-GW 312 in the same network area, and a plurality of base stations (eNBs) managed by the MME are located at the bottom of the MME. May exist. In the present specification, one P-GW 314 and S-GW 312 and a plurality of MMEs and eNBs constituting the bottom thereof are defined as the same network.

The BBF access network 320 is a residential gateway (322) for connecting terminal devices to the Internet or another broadband network, and a broadband remote access server (BRAS) / broadband network gateway (BNG) 324, which is a connection point of an external IP network. It may include all or part of the BBF AAA proxy for managing the QoS management and policy or rule determination, and the authentication process of the BPCF 326, the terminal for applying them to the terminal.

The local network 330 is a not-shown local gateway (Local Gateway or L-GW) connected with the S-GW 312 of the EPC network 310, and the local base station 332 connected with the local gateway (L-GW). ) Structure.

For example, the local base station 332 mentioned above is installed indoors as a base station of a universal mobile telecommunication system (UMTS) network and has a cell coverage scale of a home node B (HNB) or an evolved packet system (EPS) network corresponding to a femtocell. It is installed indoors as a base station of the cell coverage scale includes, but is not limited to, Home eNodeB (HeNB) corresponding to the femtocell. The local base station 332 may be identical to the base station of the macro network in functional terms except that the local base station 332 is included in the local network 310.

The local gateway (L-GW) is located between the local base station 332 and the Internet network, which is a packet data network, and creates a bearer between the local base station 332 and the internet network, or generates a bearer between the local base station 332 and the local network. Create a bearer between the gateway (L-GW), and enable the data transmission through the created bearer.

As shown in FIG. 3, in the first environment, all traffic generated from the local network 330 is transmitted to the EPC network 310 such as the S-GW 312 and the P-GW 314 through the BBF access network 320. do. The policy or rule created via PCRF 316 of EPC network 310 is delivered to BPCF 326 via s9a interface and finally applied to BRAS / BNG 324.

FIG. 4 is a flowchart of a QoS policy setting procedure of offloaded traffic in the WLAN of FIG. 2 assuming that network address translation (NAT) is not used.

Referring to FIG. 4, assuming that NAT is not used, a QoS policy setting procedure of offloaded traffic in the WLAN of FIG. 2 is as follows. The PCRF 216 may be divided into a visited PCRF (visited PCRF or vPCRF, 216 (v)) and a home PCRF (home PCRF or hPCRF, 216 (h)) when roaming.

1. Proceed with the initial attach (attach) and handover call flow (handover call flows) defined in the first environment (S410). At this time, the terminal 250 receives its local IP address and authenticates the EPC network or the 3GPP network 210 by 3GPP-based access authentication means or as part of the S2b / S2c tunnel setup. After this procedure, the UE local IP address is known to the PCRF 216. The S9a interface may be generated by triggering by the BPCF 226 or the PCRF 216.

2-3. A policy for the terminal 250 is transmitted to the BBF access network 220 (S420, S430). These rules include the terminal's local IP address and thus enable the association of packets with this terminal 250 in the BBF domain.

4. Traffic offloaded from the UE is routed to a peer of the UE 250 in the offloaded network (S440). With an application management device that is its peer (peer or content server), the TDF in the AF or BBF domain can detect offloaded traffic.

5. AF or TDF that detects the IP service of the UE 250 generates Xx signaling to the PCRF 216 (S450).

6-7. As a result of the previous step, the dynamic policy is transmitted to the BBF access network 220 (S460 and S470). This rule includes the UE local IP address so that packets in the BBF domain can be associated with this UE.

As described above, in the case of a UE receiving a service through the EPC network in the first environment, since the AF knows the PCRF of the home network, it is possible to immediately apply the QoS and charging policy corresponding to the specific application using the Rx interface. have.

However, in the second environment, since the UE offloads the traffic to the third internet network without passing through the home or visited EPC network, the AF checks the home PCRF information of the UE. In two environments, the UE may receive a QoS and charging policy that can be provided for each application.

5 specifically illustrates a system architecture according to one embodiment.

Referring to FIG. 5, the system architecture 500 in the second environment may include all or some of the EPC network 510, the BBF access network 520, the local network 530, the third network 540, and the terminal 550. Include.

The EPC network 510 is the S-GW 512 as the EPC first gateway of FIG. 1 and the P-GW 514, PCRF 516 as the EPC second gateway of FIG. 1, and the 3GPP AAA as the EPC authentication device of FIG. Server 518. The P-GW 514, PCRF 516, and 3GPP AAA server 518 are connected to the P-GWs 214 and 314, PCRF 216 and 316, and 3GPP AAA server 218 shown in Figs. Substantially the same. S-GW 512, MME 515, SeGW (Security Gateway, 517), H (e) NB GW 519 is S-GW (512), MME 515, SeGW (Security Gateway, 517, which is substantially the same as the H (e) NB GW 519.

The BBF access network 520 is a RG 522 that connects terminal devices to the Internet or another broadband network, and BRAS / BNG 524, which is a connection point of an external IP network, QoS management and policy or rule determination and applying them to the terminal. The BPCF 526 and the terminal may include all or part of the BBF AAA proxy managing the authentication procedure.

The local network 530 may be a local gateway (Local Gateway or L-GW, 534) connected to the S-GW 512 of the EPC network 510, and a local base station connected to the local gateway (L-GW, 534). 532).

For example, the local base station 532 mentioned above is installed indoors as a base station of a universal mobile telecommunication system (UMTS) network and has a cell coverage scale of a home node B (HNB) or an evolved packet system (EPS) network corresponding to a femtocell. It is installed indoors as a base station of the cell coverage scale includes, but is not limited to, Home eNodeB (HeNB) corresponding to the femtocell. The local base station 532 may be identical to the base station of the EPC network 510 except for being included in the local network 510.

The local gateway (L-GW) 534 is located between the local base station 532 and the internet network, which is a packet data network, and generates a bearer between the local base station 532 and the internet network, or the local base station 532. Create a bearer between the local gateway and the local gateway (L-GW) 534, and enable data transmission through the created bearer.

In other words, the local gateway 534 may include some or all of the functionality of the P-GW 514 for the EPC network 510 or include some or all of the functionality of the Gateway GPRS Support Node (GGSN) for UMTS. can do.

At this time, the local gateway 534 is collocated with the RG 522. In this case, a function of the local gateway 534 may be performed by changing a software module of the RG 522 or a hardware of the RG itself. In other words, it may be implemented to include L-GW modules in RG 522.

In this case, the L-GW 534 determines the traffic generated by the UE 550, thereby minimizing the change of the entire network.

As shown in FIG. 3, in the first environment, all traffic generated from the local network 530 is transmitted to the EPC network 510 such as the S-GW 512 and the P-GW 514 via the BBF access network 520. do. Policies or rules generated through PCRF 516 of EPC network 510 are passed to BPCF 526 via the s9a interface and finally applied to BRAS / BNG 524.

As shown in FIG. 3 or FIG. 4, the UE 550 may be provided with an IP service through the EPC network 510 in the first environment.

Meanwhile, as shown in FIG. 5, as the second environment becomes available, the UE 550 immediately offloads data to a third network, for example, a third internet network 540, without going through the EPC network 510. You will receive an IP service. The UE 550 may utilize the local base station 532 and the local gateway 534 of the local network 530 when offloading to the third internet network 540.

FIG. 6 is a flowchart of a signaling procedure for APN-based local base station offload according to another embodiment when the L-GW and RG of FIG. 5 are collocated.

The signaling procedure for APN-based local base station offload according to the embodiment shown in FIG. 6 is an embodiment or modification of the signaling procedure described with reference to FIG. 4 in accordance with the system architecture 500 of FIG. 5.

(0) UE 550 connects to HeNB 532 (S612)

(1) The UE 550 is assigned an IP address from the P-GW 514 (S614).

(2) The P-GW 514 shares the IP address assigned to the UE 550 with the PCRF 516 (hPCRF / vPCRF).

(2-1) The HeNB 532 to which the UE 550 is connected determines that the HeNB 532 is connected through the BBF access network, and the PCRF 516 selects a new policy for the UE 550 (S616).

(2-2) The selected policy is shared with the BPCF 526 of the BBF access network (S618).

(3) Information necessary for offloading is transmitted to the L-GW 534 through the BRAS / BNG 524-AN-RG 522 according to the selected policy result (S620).

(3-1) In this case, the BBF may know mapping information about the IP address of the corresponding UE 550 and the multiple APNs assigned to the UE 550.

(3-2) In the multiple APN, each APN is designated for each type of service (ToS).

(3-3) A service type for performing offloading is determined, and APN-ToS mapping information about the offloading is shared with the L-GW (BNG).

(4a-1) The L-GW 534 module in the RG 522 determines that the offloading is applied among the traffic generated by the UE 550 based on the corresponding APN, and transmits the UE to the BNG 524 by using the UE (BNG 524). 550 and delivers the generated traffic (S622, S624).

(4a-2) The BNG 524 receiving this bypasses it so that it can be directly routed to an external IP network instead of the EPC domain (S626).

(5) When the destination address of the traffic generated by the UE 550 belongs to a domain consisting of AF, the AF 542 notifies the EPC domain 510 of information about the detour traffic through a specific interface, for example, an Xx interface. (S626).

(5 ') If the destination address of the traffic generated by the UE is not the AF domain, the L-GW 534 determines this and informs the PCRF 516 of the EPC network 510 of the detour directly through the BPCF 526.

(6) Thereafter, communication is performed on the offloaded path for the corresponding traffic (S628).

FIG. 7 illustrates a path of EPS traffic based on APN-based local base station offload traffic according to another embodiment when L-GW and RG of FIG. 5 are collocated.

Referring to FIG. 7, the user terminal 550 is assigned an IP address corresponding to an IP address area managed by the P-GW 514 selected by the APN and authenticated from the EPC or the core network 510 upon initial access. Take it and use it.

At this time, when the user terminal 550 accesses the H (e) NB 532 and operates as a Local IP Access (LIPA), the user terminal 550 receives a local IP address from the L-GW 534 in the RG 522. The IP traffic is not transmitted to the core network 510, but is directly transmitted to the Internet network 540 through the L-GW 534 in the RG 522, thereby obtaining a traffic offloading effect.

In addition, when the user terminal 550 communicating in the macro cell enters the H (e) NB area and accesses the H (e) NB 532, the user terminal 550 may continue to be connected to the PDN according to the APN of the existing IP traffic or may be connected to the L-GW ( It may be offloaded to the Internet network 540 via 534.

8 specifically illustrates a system architecture according to another embodiment.

The system architecture 800 shown in FIG. 8 includes all or part of the EPC network 510, the BBF access network 520, the local network 530, the third network 540, and the terminal 550. The same or substantially the same as the system architecture 500 shown in FIG. The components of the EPC network 510, the BBF access network 520, the local network 530, the third network 540, and the terminal 550 of the system architecture 800 are also illustrated in FIG. 5. Is the same or substantially the same as

However, the local gateway (L-GW, 534a) and the RG 522a of the local network 530 are standalone, so that in the system architecture 800 shown in FIG. 5, the local gateway 534 is connected to the RG 522. There is a difference in being collocated.

In other words, the local gateway 534a of the local network 530 is disposed in the RG 522a and the local gateways L-GW 534a and the RG 522a are standalone.

In this case, additional L-GW 534a equipment can be easily added without changing the RG 522a, so that it can be deployed independently of the BBF access network 520 management.

FIG. 9 is a flowchart of a signaling procedure for APN based local base station offload according to another embodiment when the L-GW and RG of FIG. 8 are standalone.

The signaling procedure for APN-based local base station offload according to the embodiment shown in FIG. 9 is an embodiment or modification of the signaling procedure described with reference to FIG. 4 in accordance with the system architecture 800 of FIG. 8.

(0) UE 550 connects to HeNB 532 (S912)

(1) UE 550 is assigned an IP address from P-GW 514 (S914).

(2) The P-GW 514 shares the IP address assigned to the UE 550 with the PCRF 516 (hPCRF / vPCRF).

(2-1) The HeNB 532 to which the UE 550 is connected determines that the HeNB 532 is connected through the BBF access network, and the PCRF 516 selects a new policy for the UE 550 (S916).

(2-2) The selected policy is shared with the BPCF 526 of the BBF access network (S918).

(3) Information necessary for offloading is transmitted to the L-GW 534a through the BRAS / BNG 524-AN-RG 522a according to the selected policy (S920).

(3-1) In this case, the BBF may know mapping information about the IP address of the corresponding UE 550 and the multiple APNs assigned to the UE 550.

(3-2) In the multiple APN, each APN is designated for each type of service (ToS).

(3-3) A service type for performing offloading is determined, and APN-ToS mapping information about the offloading is shared with the L-GW (BNG).

(4b-1) In the case of the standalone L-GW 534a disposed in the RG 522a stage, the L-GW 534a determines that the offloading is to be applied among the traffic generated by the UE 550 based on the corresponding APN. This is determined and transmitted along with the traffic generated by the UE 550 to the BNG 524 (S922 and S924).

(4b-2) The BNG 524 receiving this bypasses it so that it can be directly routed to an external IP network instead of the EPC domain (S926).

(5) When the destination address of the traffic generated by the UE 550 belongs to a domain consisting of AF, the AF 542 notifies the EPC domain 510 of information about the detour traffic through a specific interface, for example, an Xx interface. (S928).

(5 ') If the destination address of the traffic generated by the UE 550 is not the AF domain, the L-GW 534a notifies this to the PCRF 516 of the EPC network directly through the BPCF 526.

(6) Thereafter, communication is performed on the offloaded path for the corresponding traffic (S930).

FIG. 10 illustrates a path of EPS traffic based on APN-based local base station offload traffic according to another embodiment when L-GW and RG of FIG. 8 are collocated.

Referring to FIG. 10, if the traffic generated in the UE 550 is traffic offloaded by the terminal local IP address, it is transmitted to a peer on the Internet 540 via the L-GW 534a in the RG 522a. do.

In this case, the user terminal 550 accesses the H (e) NB 532 and receives a terminal local IP address from the L-GW 534a in the RG 522a, and transmits the corresponding IP traffic to the core network 510. Instead of being directly transmitted to the Internet 540 through the L-GW 534a in the RG 522a and the RG 522a, the traffic offloading effect can be obtained.

Meanwhile, when the user terminal 550 transmits traffic through the EPC network 510, the user terminal 550 is assigned an IP address from the P-GW 514, and the corresponding IP traffic is transmitted to the RG 522a and the P-GW 514. Is sent directly to the Internet.

The system architecture 500 shown in FIG. 5 and the system architecture 800 shown in FIG. 8 are cases where the L-GWs 534, 534a are located in the local network 530, such as the RGs 522, 522a. On the other hand, if multiple local base stations are scattered, such as in an enterprise, these local base stations may be logically configured in the same local network.

11 specifically illustrates a system architecture according to another embodiment.

The system architecture 1100 illustrated in FIG. 11 includes all or part of an EPC network 510, a BBF access network 520, a local network 530, a third network 540, and a terminal 550. And the same or substantially the same as the system architecture 500, 800 shown in FIG. 8. The components of the EPC network 510, the BBF access network 520, the local network 530, the third network 540, and the terminal 550 of the system architecture 1100 are also illustrated in FIGS. 5 and 8. Same or substantially the same as architecture 500, 800.

Local network 530 includes two or more local base stations 532b. Meanwhile, the BBF access network 520 may also include two or more RGs 522b corresponding to two or more local base stations 533b.

The local gateways L-GW 534b of the local network 530 are separated from the BNG 524 and disposed at the BNG 524 end.

In this case, offloading traffic for one entire BBF access network domain can be managed by one local gateway (L-GW) 534b.

FIG. 12 is a flowchart of a signaling procedure for APN-based local base station offload according to another embodiment when the L-GW of FIG. 11 is disposed in the BNG stage separately from the BNG.

The signaling procedure for APN-based local base station offload according to another embodiment shown in FIG. 12 is an embodiment or modification of the signaling procedure described with reference to FIG. 4 in accordance with the system architecture 1100 of FIG. 11.

(0) The UE 550 connects to the HeNB 532b (S1212)

(1) The UE 550 is assigned an IP address from the P-GW 514 (S1214).

(2) The P-GW 514 shares the IP address assigned to the UE 550 with the PCRF 516 (hPCRF / vPCRF).

(2-1) The HeNB 532b to which the UE 550 is connected determines that the HeNB 532b is connected through the BBF access network, and the PCRF 516 selects a new policy for the UE 550 (S1216).

(2-2) The selected policy is shared with the BPCF 526 of the BBF access network (S1218).

(3) Information necessary for offloading is transmitted to the L-GW 534b through the BRAS / BNG 524-AN-RG 522b according to the result of the selected policy (S1220).

(3-1) In this case, the BBF may know mapping information about the IP address of the corresponding UE 550 and the multiple APNs assigned to the UE 550.

(3-2) In the multiple APN, each APN is designated for each type of service (ToS).

(3-3) A service type for performing offloading is determined, and APN-ToS mapping information about the offloading is shared with the L-GW (BNG).

(4c-1) In the case of the independent L-GW 534b disposed at the BNG 524 end, the L-GW 534b attached to the BNG 524 with respect to traffic to which offloading is applied among the traffic generated by the UE 550. ) Determines this based on the corresponding APN (S1222, S1224).

(4c-2) The L-GW 534b changes the routing setting so that the traffic determined to be offloaded can be directly bypassed to the external IP network instead of the EPC domain (S1226).

(5) When the destination address of the traffic generated by the UE 550 belongs to a domain consisting of AF, the AF 542 notifies the EPC domain 510 of information about the detour traffic through a specific interface, for example, an Xx interface. (S1228).

(5 ') If the destination address of the traffic generated by the UE 550 is not the AF domain, the L-GW 534b notifies this to the PCRF 516 of the EPC network through the BPCF 526 directly.

(6) Thereafter, communication is performed on the offloaded path for the corresponding traffic (S1230).

FIG. 13 illustrates a path of EPS traffic based on APN-based local base station offload traffic according to another embodiment when the L-GW of FIG. 11 is separated from the BNG and disposed in the BNG stage.

Referring to FIG. 13, in APN-based local base station offloading, the user terminal 550 is connected to one of two or more local base stations 532b and is separated from the BNG 524 and disposed at the BNG stage. Terminal is assigned a local IP address. At this time, the IP traffic is not transmitted to the core network 510, but is directly transmitted to the Internet network 540 through the L-GW 534b disposed at the RG 522b and the BNG stage, thereby obtaining a traffic offloading effect.

Meanwhile, when the user terminal 550 transmits traffic through the EPC network 510, the user terminal 550 is assigned an IP address from the P-GW 514, and the corresponding IP traffic is RG 522b and the P-GW 514. Is sent directly to the Internet.

Although the system architectures 500, 800, and 1100 have been described with the embodiments described with reference to FIGS. 5, 8, and 11, the present invention is described with reference to FIGS. 5, 8, and 11. , Various combinations of 1100 are possible.

For example, although the system architectures 500 and 800 described with reference to FIGS. 5 and 8 are described as one local base station 532, there may be more than one local base station 532. At this time, there are also two or more RGs 522 and 522a corresponding to the local base stations 532 and the local base stations 532 may be merged with or separated from the RGs 522 and 522a in the RGs 522 and 522a.

For another example, in the system architecture 1100 described with reference to FIG. 11, a terminal having two or more local base stations 532b and an RG 522b and an L-GW 534b connected to two or more local base stations 532b. Although it has been described as managing the local IP address of the local base station 532b and RG 522b may be one. Only L-GW 534b may be disposed at the end of BNG 524 separately from BNG 524.

14 specifically illustrates a system architecture according to another embodiment. FIG. 15 illustrates a path of EPS traffic and local base station offload traffic that is not based on APN according to another embodiment.

The system architecture 1400 illustrated in FIG. 14 includes all or part of the EPC network 510, the BBF access network 520, the local network 530, the third network 540, and the terminal 550. The same or substantially the same as the system architecture 500 shown in FIG.

In this case, the system architecture 1400 illustrated in FIG. 14 may perform a local base station offload procedure that is not based on APN, rather than the femtocell offload scheme based on APN.

14 and 15, the user terminal 550 may be installed with an offload application (OL-APP). The terminal 550 on which an offload application (OL-APP) is installed requests the content requested by the user to the L-GW 534 through the offload application (OL-APP). The L-GW 534 performs content collection for the request on behalf of the terminal 550.

In this case, the L-GW 534 may use a changed routing path that is directly bypassed to the Internet network 540 rather than the content transmission through the EPC network 510. When the collection of the requested content is completed in the L-GW 534, the fact is notified to the offload dedicated application (OL-APP) and finally the terminal 550 can receive the requested content from the L-GW 534. have.

Offload schemes based on APN and PDN mapping may require protocol or hardware changes or replacements, such as BNG and BPCF. Local base station offloading method, which is not APN-based, can minimize the modification to the BBF access network and perform offloading only by deploying L-GW, thereby reducing the overall network load.

FIG. 16 is a flowchart of a signaling procedure for local non-APN offloading according to another embodiment when the L-GW and RG of FIG. 14 are combined.

(0) The UE 550 connects to the HeNB 532 (S1612)

(1) The UE 550 is assigned an IP address from the P-GW 514 (S1614).

(2) The L-GW 534 periodically broadcasts its information to the UE 550 belonging thereto through the HeNB 532 (L-GW advertisement) (S1616).

(3) The UE 550 notifies the offloading application (hereinafter, OL-APP: Offloading Application) of the information of the L-GW 534 (S1618).

(4) Delegation to OL-APP without requesting content directly from a specific type of service requested (generated) from any application located in UE 550 (Ori-APP: Origin Application). (S1620).

(5) The OL-APP transmits the corresponding content request to the L-GW 534 rather than generating traffic of the existing APN-PDN mapping. At this time, the APN may be replaced by the APN and the L-GW 534 mapping instead of the PDN (S1622).

(6) The L-GW 534 that receives the content request makes a request on behalf of the UE 550, and the request follows a routing path to the IP network through the BNG 524 instead of the EPC network. At this time, the position of the L-GW 534 may be changed and distributed to the RG stage, the BNG stage, etc. according to the purpose of use and the network situation (S1624).

(7) Any content server located in the IP network transmits the content to the L-GW 534 according to the received request (S1626).

(8) The L-GW 534 having received the content stores it in a cache and notifies the UE 550 of this fact (S1628, S1630).

(9) The UE 550 recognizes that the previously requested content from the L-GW 534 is prepared in the L-GW 534 and receives the content to the L-GW 534 through the OL-APP. Request (S1632).

(10) The OL-APP completes the reception of the content and informs the Ori-APP requesting the content, or informs the user directly of the fact, and the subsequent processing of the content (e.g., video content). Watch, image content viewing, etc.) (S1634).

The system architecture 1400 illustrated in FIG. 14 performing a local base station offload method that is not APN-based is described as being the same as or substantially the same as the system architecture 500 illustrated in FIG. 5, but the present invention is not limited thereto. The system architecture for performing a local base station offload method that is not APN-based may be one or a combination of the foregoing system architectures or a separate system architecture. For example, a system architecture that performs a local base station offload method that is not APN-based may be the system architecture 800 shown in FIG. 8 or the system architecture 1000 shown in FIG. 10, a combination thereof, or a modified combination thereof. Can be.

In the above embodiments, the local gateway is introduced in relation to the components of the local network and the BBF access network, so that traffic can be offloaded without going through the core network.

The method according to the above-described embodiment of the present invention may be executed by an application (which may include a program included in a platform or an operating system, etc., which is basically installed in a terminal) basically installed in a specific entity of a network, It may also be executed by an application (ie, a program) that a user directly installs to a specific entity in the network through an application providing server such as an application store server, an application, or a web server associated with the service.

In this sense, the method according to the embodiment of the present invention described above is implemented as an application (i.e., a program) which is basically installed in a specific entity of a network or directly installed by a user, and is a computer readable recording such as a specific entity of a network. Can be recorded on the medium.

A program implementing the method for providing a game according to an embodiment of the present invention executes functions for implementing the above-described methods.

Such a program may be recorded on a recording medium that can be read by a computer and executed by a computer so that the above-described functions can be executed.

As described above, in order to execute a method in which a computer reads a program recorded on a recording medium and provides a game implemented as a program, the above-described program includes C, C ++, JAVA, machine language, etc., which can be read by a computer processor (CPU). Code may be coded in the computer language of.

The code may include a function code related to a function or the like that defines the functions described above and may include an execution procedure related control code necessary for the processor of the computer to execute the functions described above according to a predetermined procedure.

In addition, such code may further include memory reference related code as to what additional information or media needed to cause the processor of the computer to execute the aforementioned functions should be referenced at any location (address) of the internal or external memory of the computer .

In addition, when a processor of a computer needs to communicate with any other computer or server, etc., to perform the above-described functions, the code may be stored in a computer's communication module (e.g., a wired and / ) May be used to further include communication related codes such as how to communicate with any other computer or server in the remote, and what information or media should be transmitted or received during communication.

The functional program for implementing the present invention and the related code and code segment may be implemented by programmers of the technical field of the present invention in consideration of the system environment of the computer that reads the recording medium and executes the program, Or may be easily modified or modified by the user.

Examples of recording media that can be read by a computer recording a program as described above include, for example, a ROM, a RAM, a CD-ROM, a magnetic tape, a floppy disk, an optical media storage device, and the like.

Also, the computer-readable recording medium on which the above-described program is recorded may be distributed to a computer system connected via a network so that computer-readable codes can be stored and executed in a distributed manner. In this case, one or more of the plurality of distributed computers may execute some of the functions presented above and send the results of the execution to one or more of the other distributed computers, The computer may also perform some of the functions described above and provide the results to other distributed computers as well.

In particular, a computer-readable recording medium recording an application which is a program for executing a method for providing a game according to an embodiment of the present invention may be an application store server, an application or a web server associated with a corresponding service. It may be a storage medium (for example, a hard disk) included in the application provider server of the application server or the application providing server itself.

A computer capable of reading a recording medium recording an application, which is a program for executing a method according to an embodiment of the present invention, is not only a general PC such as a general desktop or a notebook computer, but also a smart phone, a tablet PC, a personal digital assistant (PDA). And it may include a mobile terminal such as a mobile communication terminal, as well as, it should be interpreted as any device capable of computing (Comuputing).

When a computer capable of reading a recording medium recording an application, which is a program for executing a method according to an embodiment of the present invention, is a mobile terminal such as a smart phone, a tablet PC, a personal digital assistant (PDA) and a mobile communication terminal, It may be downloaded from the application providing server to a general PC and installed on the mobile terminal through a synchronization program.

While the present invention has been described in connection with what is presently considered to be the most practical and preferred embodiments, it is to be understood that the invention is not limited to the disclosed embodiments. In other words, within the scope of the present invention, all of the components may be selectively operated in combination with one or more. In addition, although all of the components may be implemented as one independent hardware, some or all of the components may be selectively combined to perform a part or all of the functions in one or a plurality of hardware. As shown in FIG. Codes and code segments constituting the computer program may be easily inferred by those skilled in the art. Such a computer program may be stored in a computer readable storage medium and read and executed by a computer, thereby implementing embodiments of the present invention. As the storage medium of the computer program, a magnetic recording medium, an optical recording medium, a carrier wave medium, or the like may be included.

It is also to be understood that the terms such as " comprises, "" comprising," or "having ", as used herein, mean that a component can be implanted unless specifically stated to the contrary. But should be construed as including other elements. All terms, including technical and scientific terms, have the same meaning as commonly understood by one of ordinary skill in the art to which this invention belongs, unless otherwise defined. Commonly used terms, such as predefined terms, should be interpreted to be consistent with the contextual meanings of the related art, and are not to be construed as ideal or overly formal, unless expressly defined to the contrary.

The foregoing description is merely illustrative of the technical idea of the present invention, and various changes and modifications may be made by those skilled in the art without departing from the essential characteristics of the present invention. Therefore, the embodiments disclosed in the present invention are intended to illustrate rather than limit the scope of the present invention, and the scope of the technical idea of the present invention is not limited by these embodiments. The protection scope of the present invention should be interpreted by the following claims, and all technical ideas within the equivalent scope should be interpreted as being included in the scope of the present invention.

Claims (18)

A method of offloading traffic of a local gateway associated with a first gateway connecting to another network included in a broadband access network,
Receiving the traffic from a local base station accessed by a terminal authenticated from a core network; And
Routing the traffic to a second gateway connecting to an external IP network included in the broadband access network.
The method of claim 1,
The first gateway is RG and the second gateway is BRAS / BNG.
A method of offloading traffic of an independent local gateway located in a first gateway connecting to another network included in a broadband access network,
Receiving the traffic from a local base station accessed by a terminal authenticated from a core network; And
Routing the traffic through the first gateway to a second gateway connecting to an external IP network included in the broadband access network.
The method of claim 3,
The first gateway is RG and the second gateway is BRAS / BNG.
A method of offloading traffic from an independent local gateway located within a gateway to an external IP network included in a broadband access network.
Receiving the traffic from a local base station connected to a terminal authenticated by a core network through another gateway connecting with another network and one gateway connecting with the external IP network; And
Transmitting the traffic to an external IP network.
The method of claim 5,
Wherein said one gateway is a BRAS / BNG and the other gateway is an RG.
The method according to claim 6,
And at least two other local gateways and at least two other gateways corresponding to the local base stations, and at least two local base stations and the local gateways constitute one local network.
Offloading the traffic by performing a function of receiving the traffic from a local base station accessed by a terminal authenticated from a core network and routing the traffic to one gateway connected to an external IP network included in a broadband access network. ,
A local gateway incorporated in another broadband connection network included in the broadband access network.
A function for receiving traffic from a local base station to which an authenticated terminal is connected from a core network and an external IP network included in the broadband access network through a first gateway connecting the traffic with another network included in the broadband access network. Offloading the traffic by performing a function of routing to a connecting second gateway;
A local gateway located within the first gateway and independent of the first gateway.
A function for receiving the traffic from a local base station connected to a terminal authenticated by a core network through a first gateway connecting to another network included in a broadband access network and a second gateway connecting to the external IP network. To offload the traffic by sending a message to an external IP network,
Local gateway independent of the second gateway.
The method of claim 10,
The first gateway is RG and the second gateway is BRAS / BNG.
The method of claim 10,
Wherein the local base station and the first gateway corresponding to the local base station are each two or more, and the two or more local base stations and the local gateway constitute one local network.
Offloading the traffic by performing a function of receiving the traffic from a local base station accessed by a terminal authenticated from a core network and routing the traffic to one gateway connected to an external IP network included in a broadband access network. A gateway included in a broadband access network, combined with a local gateway. The local gateway is independently located, receiving the traffic from the local base station to which the terminal authenticated from the core network is connected and offloading the traffic to a specific gateway connected to the external IP network included in the broadband access network,
A gateway included in a broadband access network for receiving the traffic and routing the traffic to the specific gateway.
A method of writing traffic from a gateway included in a broadband access network.
Receiving the traffic from a local gateway, receiving traffic from a local base station to which an authenticated terminal from a core network accesses, and offloading the traffic to a specific gateway connected to an external IP network included in a broadband access network; And
Routing the traffic to the specific gateway.
By a local gateway, which is part of a broadband access network, merged with another gateway that connects to another network,
Receiving the traffic from a local base station to which a terminal authenticated from a core network is connected; And
A computer-readable recording medium having recorded thereon a program for offloading the traffic by performing a function of routing the traffic to a gateway connected to an external IP network included in a broadband access network.
By a local gateway located in a first gateway that connects to another network included in the broadband access network and independent of the first gateway,
Receiving traffic from a local base station to which a terminal authenticated from a core network is connected; And routing the traffic through a first gateway to a second gateway connected to an external IP network included in the broadband access network, thereby recording the program offloading the traffic.
Receiving the traffic from a local base station accessed by a terminal authenticated from a core network through a first gateway connecting to another network included in a broadband access network and a second gateway connecting to the external IP network; And
And a computer-readable recording medium having recorded thereon a program for offloading the traffic by a local gateway independent of the second gateway.
KR1020110102741A 2011-10-07 2011-10-07 Method for offloading traffic with local gateway and gateway thereof KR20130038087A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
KR1020110102741A KR20130038087A (en) 2011-10-07 2011-10-07 Method for offloading traffic with local gateway and gateway thereof

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
KR1020110102741A KR20130038087A (en) 2011-10-07 2011-10-07 Method for offloading traffic with local gateway and gateway thereof

Publications (1)

Publication Number Publication Date
KR20130038087A true KR20130038087A (en) 2013-04-17

Family

ID=48438878

Family Applications (1)

Application Number Title Priority Date Filing Date
KR1020110102741A KR20130038087A (en) 2011-10-07 2011-10-07 Method for offloading traffic with local gateway and gateway thereof

Country Status (1)

Country Link
KR (1) KR20130038087A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2015030537A1 (en) * 2013-08-30 2015-03-05 삼성전자 주식회사 Method and apparatus for supporting multiple connections in wireless lan
KR102295738B1 (en) * 2020-03-26 2021-08-30 에스케이텔레콤 주식회사 Base station and control method thereof

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2015030537A1 (en) * 2013-08-30 2015-03-05 삼성전자 주식회사 Method and apparatus for supporting multiple connections in wireless lan
US10863572B2 (en) 2013-08-30 2020-12-08 Samsung Electronics Co., Ltd. Method and apparatus for supporting multiple connections in wireless LAN system
US11917708B2 (en) 2013-08-30 2024-02-27 Samsung Electronics Co., Ltd. Method and apparatus for supporting multiple connections in wireless lan system
KR102295738B1 (en) * 2020-03-26 2021-08-30 에스케이텔레콤 주식회사 Base station and control method thereof
KR20210120929A (en) * 2020-03-26 2021-10-07 에스케이텔레콤 주식회사 Base station and control method thereof

Similar Documents

Publication Publication Date Title
KR102446093B1 (en) Mapping service for local content redirection
EP3132622B1 (en) Interworking with bearer-based system
TWI463893B (en) Method of handling access network discovery and selection function and related communication device
EP2193632B1 (en) Methods for establishing connection of a home node b, hnb
US9179288B2 (en) Server in charge of control plane within mobile communication network and method for controlling service in server
JP6222491B2 (en) Communication system and communication control method
KR102203324B1 (en) Method and Apparatus for Controlling Service-Based Mobile Edge Computing in Network Environment
CN105432135A (en) Node apparatus and method for establishing auxiliary bearers
JP6743824B2 (en) Communication method and base station
BR112013030072B1 (en) CONVERGENT TRANSMISSION SYSTEM, DATA DOWNLOAD AND CONVERGENCE NODE AND USER EQUIPMENT
US20120278416A1 (en) Methods, apparatuses and computer program product for using bearer management information to reduce traffic within a communications network
US20150117310A1 (en) Method and apparatus to route packet flows over two transport radios
KR102109704B1 (en) Method and apparatus for forwarding of data traffic
KR20180050655A (en) Mobile hotspot
US20130252578A1 (en) Single operator managed policy and charging function for fixed mobile convergence networks
WO2017084042A1 (en) Service flow transmission method and apparatus
WO2011109999A1 (en) Method for indicating information and mobility management network element
KR20130038087A (en) Method for offloading traffic with local gateway and gateway thereof
KR20140075826A (en) Apparatus for controlling data traffic packet based mobile communication system and method thereof
KR20180003318A (en) Apparatus for multinet aggregation transmission, and operating method thereof
JP6315894B2 (en) Method and apparatus for accessing multiple radio bearers
CN103139914A (en) Resource control method and system on local unloaded data
KR20120131045A (en) Method and local gateway for providing mobility between local networks
US20170257753A1 (en) Service function chain interworking
KR20130046957A (en) Method, gateway and base station for providing dynamic qos in local networks

Legal Events

Date Code Title Description
WITN Withdrawal due to no request for examination