WO2005069546A1 - Procede permettant de supprimer un tunnel dans un reseau local sans fil - Google Patents

Procede permettant de supprimer un tunnel dans un reseau local sans fil Download PDF

Info

Publication number
WO2005069546A1
WO2005069546A1 PCT/CN2005/000020 CN2005000020W WO2005069546A1 WO 2005069546 A1 WO2005069546 A1 WO 2005069546A1 CN 2005000020 W CN2005000020 W CN 2005000020W WO 2005069546 A1 WO2005069546 A1 WO 2005069546A1
Authority
WO
WIPO (PCT)
Prior art keywords
tunnel
service
user terminal
information
response
Prior art date
Application number
PCT/CN2005/000020
Other languages
English (en)
French (fr)
Inventor
Wenlin Zhang
Original Assignee
Huawei Technologies Co., Ltd.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Family has litigation
First worldwide family litigation filed litigation Critical https://patents.darts-ip.com/?family=34763032&utm_source=google_patent&utm_medium=platform_link&utm_campaign=public_patent_search&patent=WO2005069546(A1) "Global patent litigation dataset” by Darts-ip is licensed under a Creative Commons Attribution 4.0 International License.
Application filed by Huawei Technologies Co., Ltd. filed Critical Huawei Technologies Co., Ltd.
Priority to JP2006548074A priority Critical patent/JP2007524290A/ja
Priority to EP05700395A priority patent/EP1703673A4/en
Priority to CA002550636A priority patent/CA2550636A1/en
Publication of WO2005069546A1 publication Critical patent/WO2005069546A1/zh
Priority to US11/481,057 priority patent/US7633918B2/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/46Interconnection of networks
    • H04L12/4633Interconnection of networks using encapsulation techniques, e.g. tunneling
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/03Protecting confidentiality, e.g. by encryption
    • H04W12/033Protecting confidentiality, e.g. by encryption of the user plane, e.g. user's traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/30Connection release
    • H04W76/32Release of transport tunnels
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0272Virtual private networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/30Connection release
    • H04W76/38Connection release triggered by timers
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W84/00Network topologies
    • H04W84/02Hierarchically pre-organised networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
    • H04W84/10Small scale networks; Flat hierarchical networks
    • H04W84/12WLAN [Wireless Local Area Networks]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W88/00Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
    • H04W88/02Terminal devices
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W88/00Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
    • H04W88/16Gateway arrangements

Definitions

  • the present invention relates to a service tunnel technology, and particularly to a method for removing a service tunnel in a wireless local area network (WLAN).
  • WLAN wireless local area network
  • Wireless local area network includes a variety of different technologies.
  • IEEE 802.11b which uses the 2.4GHz frequency band and has a maximum data transmission rate of 11Mbps.
  • IEEE 802.11g and Bluetooth technology are also used in this frequency band. Among them, the highest data transmission rate of 802.11g can reach 54Mbps.
  • Other new technologies such as IEEE 802.11a and ETSI BRAN Hiperlan2 both use the 5GHz frequency band and the highest transmission rate can reach 54Mbps.
  • WLANs are used to transmit Internet Protocol (IP) packet data packets.
  • IP Internet Protocol
  • the specific WLAN access technology it uses is generally transparent to the upper-layer IP. Its basic structure is to use an access point (AP) to complete the wireless access of the user terminal, and to form an IP transmission network through network control and connection equipment connection.
  • AP access point
  • WLAN and various wireless mobile communication networks such as: GSM, Code Division Multiple Access (CDMA) system, Wideband Code Division Multiple Access (WCDMA) system, Time Division Duplex-Synchronous Code Division Multiple Access
  • GSM Global System for Mobile Communications
  • CDMA Code Division Multiple Access
  • WCDMA Wideband Code Division Multiple Access
  • TD-SCDMA2000 Time Division Duplex-Synchronous Code Division Multiple Access
  • 3GPP 3rd Generation Partnership Project
  • user terminals can connect to the Internet (Intemet) and intranet (Intranet) through the WLAN access network, and can also connect to the home network of the 3GPP system via the WLAN access network.
  • a 3GPP system access network connection specifically, a WLAN user terminal accesses locally At this time, it is connected to the 3GPP home network via the WLAN access network, as shown in Figure 2. During roaming, it is connected to the 3GPP access network via the WLAN access network, and some entities in the 3GPP access network are respectively connected to the 3GPP home network.
  • Corresponding entities are interconnected, for example: a 3GPP authentication authorization accounting (AAA) proxy in a 3GPP access network and a 3GPP authentication authorization accounting (AAA) server in a 3GPP home network; a wireless local area network access gateway (WAG) in a 3GPP access network It is related to the packet data gateway (PDG, Packet Data Gateway) and so on in the 3GPP home network, as shown in FIG. 1.
  • AAA 3GPP authentication authorization accounting
  • AAA 3GPP authentication authorization accounting
  • AAA 3GPP authentication authorization accounting
  • AAA 3GPP authentication authorization accounting
  • AAA 3GPP authentication authorization accounting
  • WAG wireless local area network access gateway
  • FIG. 1 and FIG. 2 are schematic diagrams of a networking structure in which a WLAN system and a 3GPP system interwork in a roaming situation and a non-roaming situation, respectively.
  • the 3GPP system in the 3GPP system, it mainly includes a Home Subscriber Subscriber Server (HSS) / Home Location Register (HLR 3GPPAAA server, 3GPPAAA proxy, WAG, packet data gateway, charging gateway (CGw) / Charging Information Collection System (CCF) and Online Charging System (OCS).
  • HSS Home Subscriber Subscriber Server
  • HLR 3GPPAAA server Home Location Register
  • 3GPPAAA proxy 3GPPAAA proxy
  • WAG packet data gateway
  • charging gateway CGw
  • CCF Charging Information Collection System
  • OCS Online Charging System
  • the user terminal, the WLAN access network, and all entities of the 3GPP system form a 3GPP-WLAN interactive network.
  • This 3GPP-WLAN interactive network can be used as a wireless Local area network service system.
  • the 3GPP AAA server is responsible for user authentication, authorization, and accounting, and collects and transmits the accounting information sent by the WLAN access network to the accounting system.
  • the packet data gateway is responsible for receiving user data from the WLAN.
  • a WLAN user terminal wants to directly access the Internet / Intranet
  • the user terminal After the user terminal completes the access authentication and authorization through the WLAN access network and the AAA server (AS), the user terminal can access the network through the WLAN access network.
  • Internet / Intranet If the WLAN user terminal also wants to access the 3GPP packet switching (PS) domain service, it may further apply to the 3GPP home network for an interworking scenario 3 (Scenario3) service, that is, the WLAN user terminal initiates the interworking scenario 3 to the AS of the 3GPP home network.
  • PS packet switching
  • Service authorization request AS pair for 3GPP home network
  • the service authorization request performs service authentication and authorization.
  • the AS sends an access permission message to the user terminal, and the AS assigns the corresponding PDG to the user terminal.
  • the tunnel is established between the user terminal and the assigned PDG, Access 3GPP PS domain services.
  • CGw / CCF and OCS record charging information based on the network usage of the user terminal.
  • the user terminal may apply to the 3GPP home network to access the Internet / Intranet through the 3GPP access network. If the user terminal also wishes to apply for the interworking scenario 3 service and access the 3GPP PS domain service, the user terminal needs to initiate a service authorization process to the 3GPP home network through the 3GPP access network.
  • This process is also between the user terminal and the AS of the 3GPP home network.
  • the AS allocates the corresponding home PDG to the user terminal.
  • the user terminal After the user terminal establishes a tunnel between the WAG in the network and the allocated PDG through the 3GPP, the user terminal can access the 3GPP PS domain service of the home network.
  • the main object of the present invention is to provide a method for removing a service tunnel in a wireless local area network, so that it can achieve the removal of a designated service tunnel in a wireless local area network.
  • a method for removing a service tunnel in a wireless local area network includes the following steps: a. An initiator device to remove a service tunnel in the wireless local area network initiates a tunnel removal request to a peer device corresponding to the service tunnel to be removed;
  • the peer device returns a tunnel teardown response to the initiator device described in step a, and releases its associated tunnel resources.
  • the method further includes:
  • the initiator device judges whether it receives the tunnel teardown response returned by the peer device, and if it receives it, directly releases its own tunnel resources; otherwise, it determines whether it has reached a preset waiting tunnel teardown response. Time, if it has arrived, it will release its associated tunnel resources and end the response wait; if not, it will return to step C to wait for a response.
  • the method further includes:
  • the initiator device judges whether it receives the tunnel teardown response returned by the peer device, and if it receives it, releases its own tunnel resources directly; otherwise, it determines whether it has reached a preset waiting tunnel teardown response. Time, if it has arrived, send a tunnel teardown request to the peer device again, and end the response wait; if it does not arrive, return to step C and wait for a response.
  • the method further includes: judging whether the tunnel teardown request has been resent a predetermined number of times, and if so, release the tunnel resources directly, otherwise, send it to the peer device again. Send a tunnel teardown request.
  • step b further includes: the packet data gateway determines whether the service tunnel to be removed is the last service tunnel connection between itself and the corresponding user terminal. If so, the packet data gateway is releasing the current service tunnel to be removed. At the same time as related information, all stored authorization information corresponding to the user terminal is cleared.
  • the method further includes: the packet data gateway sends a tunnel clearing report to the service authentication and authorization unit, and after receiving the tunnel clearing report, the service authentication and authorization unit refreshes information related to the service connection to be removed.
  • the tunnel clearing report is placed in an existing service end signaling and sent to a service authentication and authorization unit.
  • the packet data gateway first releases its own relevant tunnel resources and then sends a report to the service authentication and authorization unit; or sends a tunnel clearing report to the service authentication and authorization unit first, and then releases its own related information after receiving the response returned by the service authentication and authorization unit.
  • Tunnel resources or first release the tunnel resources other than the information that needs to be sent to the service authentication and authorization unit. After the channel clearing report is successfully sent to the service authentication and authorization unit, the remaining information is released.
  • the initiator device is a user terminal
  • the peer device is a packet data gateway; then the packet data gateway sends a tunnel clearing report to a business authentication and authorization unit while sending a tunnel tearing response to the user terminal.
  • the initiator device is a packet data gateway
  • the peer device is a user terminal. Then, after receiving the tunnel teardown response from the user terminal, the packet data gateway sends a tunnel clearing report to a service authentication and authorization unit.
  • Step b further includes: the packet data gateway determines whether the service tunnel to be removed is the last service tunnel connection between itself and the corresponding user terminal, and if so, the packet data gateway releases information about the service tunnel to be removed at the same time, Clear all stored authorization information corresponding to the user terminal.
  • the initiator device is a user terminal or a packet data gateway; correspondingly, the peer device is a packet data gateway or a user terminal.
  • the related tunnel resources include: the tunnel ID of the removed service tunnel, the encryption key used for communication of the removed service tunnel, user service authorization information related to the removed service tunnel, and control information for maintaining the removed service tunnel.
  • the service authentication and authorization unit is a 3GPPAAA server.
  • a tunnel removal process is initiated by an endpoint device that is currently removing the service tunnel, and the initiator, the receiving requester, and the service authentication and authorization unit receive a response, request, or After the indication is cleared, the tunnel resources and information related to the service tunnel to be removed are dry-released, which not only enables the removal of the designated service tunnel in the wireless local area network, but also clears or refreshes the relevant tunnel resources and Information to avoid the occupation of resources by redundant information in each device.
  • FIG. 1 is a schematic diagram of a network structure for interworking between a WLAN system and a 3GPP system in a roaming situation
  • FIG. 2 is a schematic diagram of a network structure for interworking between a WLAN system and a 3GPP system in a non-roaming situation
  • FIG. 3 is a flowchart of a user terminal initiating a tunnel removal process
  • FIG. 4 is a flowchart of the tunnel teardown process initiated by PDG
  • FIG. 5 is a flowchart of the tunnel dismantling process caused by the end of the business.
  • the basic idea of the present invention is: when a service tunnel needs to be removed, the initiator device to remove the service tunnel sends a tunnel teardown request to the opposite device; the device that receives the tunnel teardown request returns a tunnel teardown response and releases its own related Tunnel resources. Further, the device receiving the tunnel teardown response releases its related tunnel resources; PDG may send a tunnel clearing report to a service authentication and authorization unit such as an AAA server before, during, or after the tunnel resources are released to enable service authentication and authorization The unit also refreshes its related business connection information.
  • the related tunnel resources include at least: the tunnel ID of the removed service tunnel, the encryption key used in the communication of the removed service tunnel, user service authorization information related to the removed service tunnel, and relevant controls for maintaining the removed service tunnel. Information and more.
  • the service connection is generally carried by a service tunnel.
  • service termination or service tunnel connection timeout, or other network equipment such as AAA server, OCS, etc. requiring PDG to remove the service tunnel, or network management intervention, etc.
  • AAA server OCS
  • PDG network management intervention
  • the initiation of each service tunnel removal operation only involves the two endpoint devices of the service tunnel, that is, the user terminal or PDG. Both the terminal and the PDG can initiate a service tunnel teardown process.
  • the process of initiating the removal of a service tunnel includes the following steps:
  • the The starting device initiates a tunnel teardown request to the peer device corresponding to the service tunnel to be removed.
  • the device receiving the tunnel teardown request returns a tunnel teardown response to the initiator device, and releases its own tunnel resources related to the service tunnel to be removed.
  • the device receiving the tunnel teardown request may first send back the tunnel teardown response and then release its related tunnel resources; or it may release its own tunnel resources before sending back the tunnel teardown response to the initiator device.
  • the related tunnel resources still refer to: the tunnel ID of the removed service tunnel, the encryption key used in the communication of the removed service tunnel, the user service authorization information related to the removed service tunnel, and the maintenance related to the removed service tunnel. Control information and more.
  • the initiator device For the initiator device that tears down the service tunnel, if the initiator device receives the tunnel teardown response returned by the peer within a preset waiting response time, it will directly release its own tunnel resources related to the removed service tunnel. If no response is received from the peer within the preset waiting response time, wait for the predetermined waiting response time to arrive before releasing its own tunnel resources related to the service tunnel being dismantled; or wait for the predetermined waiting response time to arrive After that, the tunnel teardown request is re-initiated. If the response returned by the peer end is not received after a limited number of re-senders, the tunnel resources related to the service tunnel to be removed are released again.
  • the former tunnel resource removal scheme is selected, that is, the tunnel resources are released directly if no response is received within a limited time; if the initiator device is a UE, the latter tunnel is selected.
  • the resource dismantling scheme that is, try again if no response is received within a limited time, and the tunnel resources are not released until the response is received or the specified number of attempts fails.
  • a timer can be set. If the initiator device receives a tunnel tearing response at any time before the timer expires, the initiator device releases the corresponding tunnel resources and information, and the timer is cancelled; if the timer expires, If the tunnel teardown response is still not received, the initiator device waits until the time expires, and then processes accordingly to release resources or resend the request.
  • the PDG device sends a tunnel clearing report to a service authentication and authorization unit such as an AAA server to enable service authentication.
  • the authorization unit such as the AAA server, refreshes its own information related to the removed service connection.
  • the tunnel clearing report can be in a separate message or can be added to the existing service termination signaling.
  • the PDG should clear all the stored authorization information of the WLAN user terminal.
  • a service authentication and authorization unit such as an AAA server
  • the service tunnel dismantling can be part of the normal service end processing process; or, due to the timeout of the service connection or other network equipment requiring the PDG to perform the dismantling process.
  • the main reasons for dismantling can be: 1 The request initiated by the user equipment to end the service, the tunnel connection needs to be dismantled, the dismantling is initiated through tunnel control signaling, and the IP bearer information related to a certain service is cleared; 2 the service suspension caused by operator intervention; 3 The disappearance of the wireless signal causes the user's connection to be interrupted.
  • Embodiment 1 The user terminal initiates a tunnel teardown process.
  • the initiator device for removing the service tunnel is a user terminal, and the service authentication and authorization unit is a 3GPPAAA server.
  • the reason for removing the service tunnel is that the service ends.
  • the tunnel tear down process initiated by the user terminal includes:
  • Steps 301 to 302 After a user service ends, the user terminal decides to initiate a tunnel teardown process and tear down a service tunnel used to end the service; then the user terminal sends a tunnel teardown request Release Tunnel req to the PDG.
  • Step 303 After receiving the tunnel teardown request from the user terminal, the PDG sends a tunnel teardown response Release ACK to the user terminal that initiated the tunnel teardown; then, the PDG starts to release the resources and information related to the service tunnel to be removed, and sends it to the 3GPP AAA server.
  • a Tunnel disconnection report is sent to indicate that the user connection tunnel has been deleted. It sends a tunnel clearing report to the 3GPP AAA server, and then releases it after the 3GPP AAA server returns a response. It can also release some tunnel resources first, and retain the information that needs to be sent to the 3GPP AAA server, and wait to confirm that the tunnel clearing report is successfully sent to 3GPP AAA After the server releases the rest of the information.
  • the tunnel resource information includes a tunnel ID, a tunnel-related encryption key, tunnel-related user service authorization information, and tunnel-related control information.
  • the PDG determines that the current service tunnel to be demolished is the last service tunnel connection between itself and the user terminal of the initiator, the PDG also needs to clear the stored correspondence while releasing the information about the service tunnel Full authorization information of the user terminal.
  • Step 304 After receiving the tunnel teardown response Release ACK, the user terminal releases its own control information and resources related to the service tunnel to be removed. If no ACK is received within the time limit, the tunnel tear down process can be initiated again.
  • Step 305 After the 3GPP AAA server receives the tunnel disconnection report, the tunnel disconnection report refreshes information related to the removed service connection, such as: user connection status and related tunnel information: tunnel] D. Tunnel security information.
  • Embodiment 2 The PDG initiates a tunnel teardown process.
  • the initiator device for removing the service tunnel is PDG
  • the service authentication and authorization unit is a 3GPP AAA server.
  • the reason for removing the service tunnel is due to the intervention of the operation and maintenance personnel, or because the service tunnel connection times out, or other network equipment requires PDG to remove it.
  • a service tunnel can be specifically divided into:
  • the PDG initiates the service tunnel removal process.
  • the PDG itself judges that the service tunnel connection timeout needs to be dismantled according to relevant rules and initiates the business. Service tunnel removal process.
  • the 3GPP AAA server receives the OCS user service connection restriction indication, or it receives the service authorization restriction caused by the change of the user subscription information sent by the HSS, then the 3GPP AAA server will determine whether to notify the corresponding PDG to tear down the relevant service tunnel connection. If 3GPP AAA The server notifies the corresponding PDG, and the PDG will initiate a service tunnel teardown process.
  • the PDG-initiated tunnel teardown process includes the following steps: Steps 401 to 402: After the PDG receives an instruction or decides to tear down a service tunnel, the PDG sends a tunnel teardown request to the user terminal.
  • Step 403 After receiving the tunnel teardown request, the user terminal returns a tunnel teardown response Release ACK to the PDG; at the same time, the information and resources related to the service tunnel to be removed are released.
  • the user terminal may respond first and then perform resource release; it may also perform resource release and then respond.
  • Step 404 After the PDG receives the response within a preset waiting response time, it starts to release its own tunnel resources and information related to the service tunnel to be removed, and sends a Tunnel Clearance Report Tunnel disconnection report to the 3GPP AAA server, indicating that the specified The user service tunnel connection has been deleted.
  • the PDG may directly release the tunnel resources related to the removed tunnel; or it may release the tunnel resources related to the removed tunnel after a predetermined time.
  • the PDG may first release the tunnel resources related to the removed tunnel and then send a tunnel clearing report to the 3GPP AAA server; or it may send a tunnel clearing report and wait until the 3GPP AAA server returns a response before releasing the tunnel resources related to the removed tunnel. You can remove some of the tunnel resources related to the removed tunnel, retain the information that needs to be sent to the 3GPP AAA server, and release the part of the reserved information after the confirmation is successfully sent to the 3GPP AAA server.
  • the PDG determines that the service tunnel to be removed is the last service connection tunnel between the user terminal and the PDG, the PDG releases the same information related to the service tunnel. At the same time, all stored authorization information of the user terminal should also be cleared.
  • Step 405 After receiving the Tunnel disconnection report from the 3GPP AAA server, the 3GPP AAA server refreshes the resources and information related to the removed service connection, such as the user's connection status and related tunnel information: user connection activation status, removed service The tunnel ID of the tunnel, tunnel security parameters, corresponding PDG address, etc.
  • Embodiment 3 The tunnel dismantling process caused by the end of business.
  • the initiator device for removing the service tunnel is a user terminal, and the service authentication and authorization unit is a 3GPPAAA server.
  • the reason for removing the service tunnel is that the service ends.
  • the tunnel teardown process caused by the end of the service includes:
  • Steps 501 to 502 The user terminal decides to end the service, and then the user terminal initiates the information interaction of the service layer connection teardown.
  • Steps 503 to 507 It is exactly the same as steps 301 to 304 in the first embodiment.
  • the main difference between this embodiment and the first embodiment lies in step 502.
  • the user-initiated service layer connection removal process may have cleared relevant parameters or states in the 3GPP AAA server, such as the service activation state and the authorized APN corresponding to the service.
  • the difference between step 508 and step 305 is that the 3GPP AAA server only needs to update the tunnel-related ID. For example, the 3GPP AAA server only needs to refresh the recorded tunnel ID, IP address, and the PDG address corresponding to the service.
  • the 3GPP AAA server can also receive the tunnel teardown signaling at the service layer and continue to save the relevant service information after the tunnel teardown at the service layer is completed, waiting to receive the PDG tunnel clearing report within a certain period of time, or waiting for a preset After the sending time of the specified tunnel clearing report expires, it is refreshed together. Thereafter, the processing of step 508 is completely consistent with the processing flow of step 305 in the first embodiment.
  • the two endpoint devices that want to tear down the service tunnel lose connectivity and cannot send each other.
  • Send signaling for normal tunnel removal processing if the initiator device sends a request to the peer device, the subsequent processing of the initiator device is the same as the case where a response cannot be received after timeout. The difference is: If the initiator device itself has determined that it cannot send a message to the peer device, The terminal device, for example, has not been able to receive any signals from the peer device before the service tunnel is dismantled. In this case, the initiator device can directly omit the process of sending requests and waiting.
  • the PDG tunnel tearing process is as follows: a network device that detects that the user terminal has left, such as an AP, AC in a WLAN, or a device such as WAG in a 3GPP network, to notify the PDG user that the connection is lost, Of course, it can also be detected by the PDG itself that the user cannot be connected, and when the lost connection state reaches a certain time limit, the PDG alone initiates the process of tearing down the relevant service tunnel connection. Release the tunnel resources related to the service tunnel and send a report to the 3GPP AAA server.
  • the user terminal if the user terminal detects that the wireless connection or the underlying physical connection cannot reach a PDG, and cannot send information to the PDG after a certain period of time, it can directly release itself related to the service tunnel. Tunnel resources and information.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Small-Scale Networks (AREA)

Description

无线局域网中业务隧道的拆除方法 技术领域
本发明涉及业务隧道技术, 特别是指一种无线局域网 (WLAN ) 中业 务隧道的拆除方法。 发明背景
由于用户对无线接入速率的要求越来越高, 无线局域网 (WLAN, Wireless Local Area Network )应运而生, 它能在较小范围内提供高速的无 线数据接入。 无线局域网包括多种不同技术, 目前应用较为广泛的一个技 术标准是 IEEE 802.11b, 它采用 2.4GHz频段, 最高数据传输速率可达 11Mbps, 使用该频段的还有 IEEE 802.11g和蓝牙(Bluetooth )技术, 其中, 802.11g最高数据传输速率可达 54Mbps。 其它新技术诸如 IEEE 802.11a和 ETSI BRAN Hiperlan2都使用 5GHz频段,最高传输速率也可达到 54Mbps。
尽管有多种不同的无线接入技术,大部分 WLAN都用来传输因特网协 议(IP )分组数据包。 对于一个无线 IP网络, 其采用的具体 WLAN接入 技术对于上层的 IP—般是透明的。 其基本的结构都是利用接入点( AP )完 成用户终端的无线接入, 通过网络控制和连接设备连接组成 IP传输网络。
随着 WLAN技术的兴起和发展, WLAN与各种无线移动通信网, 诸 如: GSM、 码分多址(CDMA ) 系统、 宽带码分多址(WCDMA ) 系统、 时分双工-同步码分多址(TD-SCDMA ) 系统、 CDMA2000 系统的互通正 成为当前研究的重点。 在第三代合作伙伴计划 ( 3GPP )标准化組织中, 用 户终端可以通过 WLAN的接入网络与因特网 (Intemet )、 企业内部互联网 ( Intranet )相连, 还可以经由 WLAN接入网络与 3GPP系统的归属网络或 3GPP 系统的访问网络连接, 具体地说就是, WLAN用户终端在本地接入 时, 经由 WLAN接入网络与 3GPP的归属网络相连, 如图 2所示; 在漫游 时, 经由 WLAN接入网络与 3GPP的访问网络相连, 3GPP访问网絡中的 部分实体分别与 3GPP归属网络中的相应实体互连, 比如: 3GPP访问网络 中的 3GPP认证授权计费( AAA )代理和 3GPP归属网絡中的 3GPP认证授 权计费(AAA )服务器; 3GPP访问网络中的无线局域网接入关口 (WAG ) 与 3GPP归属网絡中的分组数据关口 (PDG, Packet Data Gateway )等等, 如图 1所示。 其中, 图 1、 图 2分别为漫游情况下和非漫游情况下 WLAN 系统与 3GPP系统互通的组网结构示意图。
参见图 1、 图 2所示, 在 3GPP系统中, 主要包括归属签约用户服务器 ( HSS ) /归属位置寄存器 ( HLR 3GPPAAA服务器、 3GPPAAA代理、 WAG、 分組数据关—口、 计费关口 (CGw ) /计费信息收集系统(CCF )及在 线计费系统(OCS )。 用户终端、 WLAN接入网络与 3GPP系统的所有实体 共同构成了 3GPP-WLAN交互网络, 此 3GPP-WLAN交互网絡可作为一种 无线局域网服务系统。 其中, 3GPP AAA服务器负责对用户的鉴权、 授权 和计费, 对 WLAN接入网络送来的计费信息收集并传送给计费系统; 分组 数据关口负责将用户数据从 WLAN接入网络到 3GPP网络或其他分组网络 的数据传输; 计费系统主要接收和记录网络传来的用户计费信息, 还包括 OCS根据在线计费用户的费用情况指示网络周期性的传送在线费用信息, 并进行统计和控制。
在非漫游情况下, 当 WLAN用户终端希望直接接入 Internet/Intranet 时, 用户终端通过 WLAN接入网与 AAA服务器(AS )完成接入认证授权 后, 用户终端可通过 WLAN接入网接入到 Internet/Intranet。 如果 WLAN 用户终端还希望接入 3GPP分组交换 ( PS )域业务, 则可进一步向 3GPP 归属网络申请互通场景 3 ( Scenario3 )的业务,即: WLAN用户终端向 3GPP 归属网络的 AS发起互通场景 3的业务授权请求, 3GPP归属网络的 AS对 该业务授权请求进行业务鉴权和授权, 如果成功, 则 AS给用户终端发送 接入允许消息, 且 AS给用户终端分配相应的 PDG, 用户终端与所分配的 PDG之间建立隧道后,即可接入 3GPP PS域业务。同时, CGw/CCF和 OCS 根据用户终端的网络使用情况记录计费信息。在漫游情况下, 当 WLAN用 户终端希望直接接入 Internet/Intranet时, 用户终端可通过 3GPP访问网络 向 3GPP归属网络申请接入到 Intemet/Intranet。如果用户终端还希望申请互 通场景 3业务, 接入到 3GPP PS域业务, 则用户终端需要通过 3GPP访问 网络向 3GPP归属网络发起业务授权过程,该过程同样在用户终端和 3GPP 归属网络的 AS之间进行, 当授权成功后, AS给用户终端分配相应的归属 PDG, 用户终端通过 3GPP访问网络中的 WAG与分配的 PDG之间建立隧 道后, 用户终端即可接入归属网絡的 3GPP PS域业务。
但是, 目前在无线局域网运营网络中, 业界国际规范中只给出'了需要 建立一个用户到 PDG之间业务隧道时的业务隧道建立过程,而该业务隧道 使用结束后或由于某些 殊原因必须拆除某个业务隧道时, 应该如何拆除 该业务隧道并结束业务, 还没提出相应的具体解决方案。 发明内容
有鉴于此, 本发明的主要目的在于提供一种无线局域网中业务隧道的 拆除方法, 使其能在无线局域网中实现对指定业务隧道的拆除。
为达到上述目的, 本发明的技术方案是这样实现的:
一种无线局域网 WLAN中业务隧道的拆除方法, 包括以下步骤: a. 要拆除无线局域网中业务隧道的发起端设备向要拆除业务隧道对 应的对端设备发起隧道拆除请求;
b. 所述对端设备向步骤 a中所述的发起端设备返回隧道拆除响应, 并 释放自身相关的隧道资源。 该方法进一步包括:
C. 所述发起端设备判断是否收到所述对端设备返回的隧道拆除响应, 如果收到, 则直接译放自身相关的隧道资源; 否则, 再判断是否到达预先 设定的等待隧道拆除响应时间, 如果已到达, 则释放自身相关的隧道资源, 结束响应等待; 如果未到达, 则返回步骤 C等待响应。
或者, 该方法进一步包括:
c,. 所述发起端设备判断是否收到所述对端设备返回的隧道拆除响应, 如果收到, 则直接释放自身相关的隧道资源; 否则, 再判断是否到达预先 设定的等待隧道拆除响应时间, 如果已到达, 则再次向所述对端设备发送 隧道拆除请求, 结束响应等待; 如果未到达, 则返回步骤 C,等待响应。
其中, 在发起端设备再次向对端设备发送隧道拆除请求之前, 该方法 进一步包括: 判断是否已重发预定次数的隧道拆除请求, 如果是, 则直接 释放隧道资源, 否则, 再次向对端设备发送隧道拆除请求。
上迷方案中, 步骤 b进一步包括: 分组数据关口判断当前要拆除的业 务隧道是否为自身与对应用户终端之间的最后一条业务隧道连接,如果是, 则分組数据关口在释放当前要拆除业务隧道相关信息的同时, 清除所存储 的对应该用户终端的全部授权信息。
上述方案中, 该方法进一步包括: 分组数据关口向业务认证授权单元 发送隧道清除报告, 业务认证授权单元收到隧道清除报告后, 刷新自身与 所拆除业务连接相关的信息。
其中, 所述隧道清除报告放置在已有的业务结束信令中发送给业务认 证授权单元。 所述分组数据关口先释放自身相关的隧道资源再发送报告给 业务认证授权单元; 或是先向业务认证授权单元发送隧道清除报告, 收到 业务认证授权单元返回的响应后, 再释放自身相关的隧道资源; 或是先释 放自身除需要发^给业务认证授权单元的信息之外的隧道资源, 在确认隧 道清除报告成功发送给业务认证授权单元后, 再释放剩余的信息。
上述方案中, 所述发起端设备为用户终端, 所述对端设备为分组数据 关口; 则所述分組数据关口在向用户终端发送隧道拆除响应的同时, 向业 务认证授权单元发送隧道清除报告。
所述发起端设备为分组数据关口, 所述对端设备为用户终端; 则所述 分组数据关口收到用户终端发来的隧道拆除响应后, 向业务认证授权单元 发送隧道清除报告。
步骤 b进一步包括: 分组数据关口判断当前要拆除的业务隧道是否为 自身与对应用户终端之间的最后一条业务隧道连接, 如果是, 则分组数据 关口在释放当前要拆除业务隧道相关信息的同时, 清除所存储的对应该用 户终端的全部授权信息。
上述方案中, 所述发起端设备为用户终端、 或为分组数据关口; 相应 的, 所述对端设备为分组数据关口、 或为用户终端。 所述相关隧道资源包 括: 所拆除业务隧道的隧道 ID、 所拆除业务隧道通信时使用的加密密钥、 所拆除业务隧道相关的用户业务授权信息、 维护所拆除业务隧道的相关控 制信息。 所述业务认证授权单元为 3GPPAAA服务器。
本发明所提供的无线局域网中业务隧道的拆除方法, 由当前要拆除业 务隧道的一个端点设备发起隧道拆除流程, 并且发起端、 接收拆除请求端 以及业务认证授权单元分别在收到响应、 请求或清除指示后, 幹放各自与 要拆除业务隧道相关的隧道资源和信息, 不仅使无线局域网中能实现对指 定业务隧道的拆除, 而且能在业务隧道拆除后, 及时清除或刷新相关的隧 道资源和信息, 避免各设备中冗余信息对资源的占用。 附图简要说明
图 1为漫游情况下 WLAN系统与 3GPP系统互通的网络结构示意图; 图 2为非漫游情况下 WLAN系统与 3GPP系统互通的网络结构示意图; 图 3为用户终端发起隧道拆除过程的流程图;
图 4为 PDG发起隧道拆除过程的流程图;
图 5为由业务结束引发的隧道拆除过程的流程图。 实施本发明的方式
为使本发明的目的、 技术方案和优点表达得更加清楚明白, 下面结合 附图及具体实施例对本发明再作进一步详细的说明。
本发明的基本思想是: 当需要拆除某条业务隧道时, 要拆除业务隧道 的发起端设备向对端设备发送一个隧道拆除请求; 收到隧道拆除请求的设 备返回隧道拆除响应并释放自身相关的隧道资源。 进一步的, 收到隧道拆 除响应的设备, 释放自身相关的隧道资源; PDG在隧道资源释放前、 释放 过程中或释放后, 可向业务认证授权单元如 AAA服务器发送隧道清除报 告, 使业务认证授权单元也刷新自身相关的业务连接信息。 这里, 所述的 相关隧道资源至少包括: 所拆除业务隧道的隧道 ID、 所拆除业务隧道通信 时使用的加密密钥、 所拆除业务隧道相关的用户业务授权信息、 维护所拆 除业务隧道的相关控制信息等等。 所述业务连接一般由业务隧道来承载。
本发明中, 发起业务隧道拆除的原因可以有多种: 业务结束、 或业务 隧道连接超时、 或网络其他节点设备如 AAA服务器、 OCS等要求 PDG拆 除业务隧道、 或网络管理干预等等, 但即使是 AAA服务器、 OCS等网络 节点设备或网管要求拆除业务隧道, 也必须通过 PDG发起, 因此每条业务 隧道拆除的发起操作只会涉及到业务隧道的两个端点设备, 即用户终端或 PDG, 用户终端或 PDG都可以发起业务隧道拆除流程。
本发明中, 业务隧道拆除的发起流程包括以下步骤:
1 )当无线局域网中某条业务隧道决定拆除时, 该要拆除业务隧道的发 起端设备向所要拆除业务隧道对应的对端设备发起一个隧道拆除请求。
2 )收到隧道拆除请求的设备向发起端设备回送隧道拆除响应, 并释放 自身与所拆除业务隧道相关的隧道资源。
本步驟中, 收到隧道拆除请求的设备可以先回送隧道拆除响应, 再释 放自身相关的隧道资源; 或是先释放自身相关的隧道资源, 再向发起端设 备回送隧道拆除响应。 这里, 所述的相关隧道资源依然是指: 所拆除业务 隧道的隧道 ID、 所拆除业务隧道通信时使用的加密密钥、 所拆除业务隧道 相关的用户业务授权信息、 维护所拆除业务隧道的相关控制信息等等。
对于拆除业务隧道的发起端设备来说, 如果发起端设备在预先设定的 等待响应时间内收到对端返回的隧道拆除响应, 则直接释放自身与所拆除 业务隧道相关的隧道资源。 如果在预先设定的等待响应时间内没有收到对 端返回的响应, 则等待预定等待响应时间到达后, 再释放自身与所拆除业 务隧道相关的隧道资源; 或者是, 等待预定等待响应时间到达后, 再重新 发起隧道拆除请求, 如果在限定的重新发起次数后仍未收到对端返回的响 应, 再释放自身与所拆除业务隧道相关的隧道资源。 通常, 如果发起端设 备是 PDG, 则选择使用前一种隧道资源拆除方案, 即: 在限定时间内收不 到响应就直接释放隧道资源; 如果发起端设备是 UE, 则选择使用后一种隧 道资源拆除方案, 即: 在限定时间内收不到响应就再尝试, 直到收到响应 或经过指定次数尝试都失败, 才释放隧道资源。
在实际操作中, 可设置一定时器, 如果发起端设备在定时器到时前任 意时刻收到隧道拆除响应, 则发起端设备释放相应隧道资源和信息, 定时 器取消; 如果定时器到时后仍未收到隧道拆除响应, 则发起端设备在到时 前一直等待, 到时后再做相应处理, 释放资源或重发请求。
3 ) PDG设备在执行隧道相关资源释放过程中或隧道相关资源释放后, 会向业务认证授权单元如 AAA服务器发送一个隧道清除报告,使业务认证 授权单元如 AAA服务器刷新自身与所拆除业务连接相关的信息,该隧道清 除报告可以在单独的消息中, 也可以附加在已有的业务结束信令中。
在上述流程中, 当用户终端和 PDG之间拆除最后一个业务隧道连接 时, PDG应清除所存储的该 WLAN用户终端的全部授权信息。
对于业务认证授权单元如 AAA服务器来说,应在收到隧道清除报告后 向 PDG返回一个响应 ACK, 如果 PDG在限定时间内没有收到该 ACK, 应该尝试再向业务认证授权单元发送隧道清除报告, 同样, 总的重发隧道 清除报告的次数可以预先限定。
业务隧道拆除可以是正常业务结束处理流程中的一部分; 或是, 由于 业务连接超时, 或其他网络设备要求 PDG进行的拆除流程。 主要的拆除原 因可以是: ①用户设备发起的要求结束业务, 需要拆除隧道连接, 通过隧 道控制信令发起拆除, 以及清除与某业务相关的 IP承载信息; ②运营商干 预导致的业务中止; ③无线信号消失导致用户连接中断。 实施例一: 用户终端发起隧道拆除过程。
本实施例中, 拆除业务隧道的发起端设备为用户终端, 业务认证授权 单元为 3GPPAAA服务器, 拆除业务隧道的原因是业务结束。
如图 3所示, 用户终端发起的隧道拆除过程包括:
步骤 301〜302: 当某个用户业务结束后, 用户终端决定发起隧道拆除 过程, 拆除结束业务所使用的业务隧道; 则用户终端向 PDG发送隧道拆除 请求 Release tunnel req。
步骤 303: PDG收到用户终端发来的隧道拆除请求后, 发送一个隧道 拆除响应 Release ACK给发起隧道拆除的用户终端; 然后开始释放与所拆 除业务隧道相关的资源和信息, 并给 3GPP AAA服务器发送一个隧道清除 报告 Tunnel disconnection report, 表明用户连接隧道已经删除。 是先给 3GPP AAA服务器发送隧道清除报告, 等到 3GPP AAA服务器返回 响应后,再释放;也可以先幹放部分隧道资源,保留需要发送给 3GPPAAA 服务器的信息, 等确认隧道清除报告成功发送给 3GPP AAA服务器后, 再 释放剩余部分的信息。 其中, 隧道资源信息包括隧道 ID、 隧道相关的加密 密钥、 隧道相关的用户业务授权信息、 维护隧道的相关控制信息。
本步骤中,如果 PDG判断发现当前要拆除的业务隧道为自身与发起端 用户终端之间的最后一条业务隧道连接时,则 PDG在释放业务隧道相关信 息的同时, 还要清除所存储的对应该用户终端的全部授权信息。
步骤 304: 用户终端收到隧道拆除响应 Release ACK后,释放自身与所 拆除业务隧道相关的控制信息和资源。 如果在限定时间内没有收到 ACK, 可再次发起隧道拆除流程。
步骤 305: 3GPP AAA服务器收到隧道清除报告 Tunnel disconnection report后, 刷新自身与所拆除业务连接相关的信息, 比如: 用户的连接状态 和相关的隧道信息: 隧道] D、 隧道安全信息。
对于 3GPP AAA服务器来说,应在收到隧道清除报告后向 PDG返回一 个响应 ACK, 如果 Pf)G在限定时间内没有收到该 ACK, 应该尝试再向业 务认证授权单元发送隧道清除报告。 实施例二: PDG发起隧道拆除过程。
本实施例中, 拆除业务隧道的发起端设备为 PDG, 业务认证授权单元 为 3GPP AAA服务器, 拆除业务隧道的原因是运营维护人员干预、 或由于 业务隧道连接超时、或其他网络设备要求 PDG进行拆除某业务隧道, 具体 可分为:
① 由于运营维护人员通过维护平台干预某用户终端的业务连接隧道 拆除, 则 PDG发起业务隧道拆除流程。
② PDG 自身根据相关规则判断业务隧道连接超时需要拆除而发起业 务隧道拆除流程。
③ 3GPPAAA服务器收到 OCS的用户业务连接限制指示,或收到 HSS 发来的用户签约信息变化导致业务授权限制, 则 3GPPAAA服务器会判断 是否要通知相应的 PDG拆除相关的业务隧道连接,如果 3GPP AAA服务器 通知相应的 PDG, 则该 PDG会发起业务隧道拆除流程。
如图 4所示, 本实施例中 PDG发起的隧道拆除过程包括以下步骤: 步骤 401〜402: PDG收到指示或自身决定拆除某条业务隧道, 则 PDG 向用户终端发送隧道拆除请求。
步骤 403: 用户终端收到隧道拆除请求后, 返回隧道拆除响应 Release ACK给 PDG; 同时释放与所拆除业务隧道相关的信息和资源。 这里, 用户 终端可以先回响应再进行资源释放; 也可以先进行资源释放再回响应。
步骤 404: PDG在预先设定的等待响应时间内收到响应后, 开始释放 自身与所拆除业务隧道相关的隧道资源和信息, 并给 3GPP AAA服务器发 送一个隧道清除报告 Tunnel disconnection report,表明指定的用户业务隧道 连接已被删除。
这里, 如果 PDG在限定的时间内没有收到用户终端发回的响应, 可以 直接释放与所拆除隧道相关的隧道资源; 也可以等预定时间到后, 再释放 与所拆除隧道相关的隧道资源。
PDG可以先幹放与所拆除隧道相关的隧道资源再发送隧道清除报告给 3GPP AAA服务器; 或先发送隧道清除报告, 等到 3GPP AAA服务器返回 响应后, 再释放与所拆除隧道相关的隧道资源; 也可以先拆除部分与所拆 除隧道相关的隧道资源, 保留需要发送给 3GPP AAA服务器的信息, 等确 认成功发送给 3GPP AAA服务器后再释放所保留的部分信息。
如果 PDG判断发现当前要拆除的业务隧道是对应用户终端与本 PDG 之间最后一个业务连接隧道, 则 PDG在释放与该业务隧道相关信息的同 时, 还要清除所存储的 ^应用户终端的全部授权信息。
步橡 405: 3GPP AAA服务器收到隧道清除报告 Tunnel disconnection report后,刷新自身中与所拆除业务连接相关的资源和信息, 比如用户的连 接状态和相关的隧道信息:用户连接激活状态、所拆除业务隧道的隧道 ID、 隧道安全参数、 对应的 PDG地址等。 实施例三: 业务结束引起的隧道拆除过程。
本实施例中, 拆除业务隧道的发起端设备为用户终端, 业务认证授权 单元为 3GPPAAA服务器, 拆除业务隧道的原因是业务结束。
如图 5所示, 由业务结束引发的隧道拆除过程包括:
步骤 501〜502: 用户终端决定结束业务, 则用户终端发起业务层连接 拆除的信息交互。
步骤 503〜507: 与实施例一中的步驟 301〜304完全相同。
本实施例与实施例一的主要区别就在于步驟 502, 用户发起的业务层 连接拆除过程可能已经清除了 3GPP AAA服务器中的相关参数或状态, 比 如: 业务激活状态、 业务对应的授权 APN, 因此步骤 508与步骤 305的区 别在于: 3GPP AAA服务器只需要更新隧道相关的 ID即可, 比如: 3GPP AAA服务器只需将记录的隧道 ID、 IP地址、 隧道和业务对应的 PDG地址 等信息进行刷新。
当然, 3GPP AAA服务器也可以在收到业务层的隧道拆除信令, 并在 业务层完成隧道拆除后, 继续保存相关的业务信息, 等待一定时间内接收 到 PDG 的隧道清除报告, 或等待预先设定的隧道清除报告发送时间超时 后, 再一起刷新。 此后, 步骤 508的处理就和实施例一中步骤 305的处理 流程完全一致了。
除了以上几个实施例所述情况外, 在实际应用中, 还可能存在一种特 殊情况, 即: 要拆除业务隧道的两个端点设备之间失去连接, 无法互相发 送信令进行正常隧道拆除处理。 这种情况下, 如果发起端设备向对端设备 发送请求, 发起端设备的后续处理与超时无法收到响应的情况是一样的, 不同的是: 如果发起端设备本身已确定无法发送消息到达对端设备, 比如: 已在业务隧道拆除之前就无法收到对端设备的任何信号,那么这种情况下, 发起端设备可直接省略发送请求和等待的过程。
所述特殊情况下, PDG的隧道拆除处理过程是这样: 由检测到用户终 端已经离开的网络设备, 比如 WLAN中的 AP、 AC等或 3GPP网络中的 WAG等设备, 来通知 PDG用户失去连接, 当然也可以由 PDG自身检测到 用户无法连接, 失去连接状态达到一定的时限时, PDG独自发起拆除相关 业务隧道连接的处理, PDG不必给用户终端发送拆除请求, 也不必等待响 应, 而是直接进行自身与该业务隧道相关的隧道资源的释放, 并发送报告 给 3GPPAAA服务器。
所述特殊情况对于用户终端来说, 用户终端如果检测到无线连接或底 层物理连接无法到达某 PDG, 且超过一定的时间仍无法发送信息给该 PDG, 则可以直接释放自身与该业务隧道相关的隧道资源和信息。
以上所述, 仅为本发明的较佳实施例而已, 并非用于限制本发明的保 护范围。

Claims

权利要求书
1、 一种无线局域网 WLAN中业务隧道的拆除方法, 其特征在于, 该 方法包括以下步骤:
a. 要拆除无线局域网中业务隧道的发起端设备向要拆除业务隧道对 应的对端设备发起隧道拆除请求;
b. 所述对端设备向步骤 a中所述的发起端设备返回隧道拆除响应, 并 释放自身相关的隧道资源。
2、 根据权利要求 1所述的方法, 其特征在于, 该方法进一步包括: c 所述发起端设备判断是否收到所述对端设备返回的隧道拆除响应, 如果收到, 则直接释放自身相关的隧道资源; 否则, 再判断是否到达预先 设定的等待隧道拆除响应时间, 如果已到达, 则#放自身相关的隧道资源, 结束响应等待; 如果未到达, 则返回步骤 C等待响应。
3、 根据权利要求 1所述的方法, 其特征在于, 该方法进一步包括: c'. 所述发起端设备判断是否收到所述对端设备返回的隧道拆除响应, 如果收到, 则直接释放自身相关的隧道资源; 否则, 再判断是否到达预先 设定的等待隧道拆除响应时间, 如果已到达, 则再次向所述对端设备发送 隧道拆除请求, 结束响应等待; 如果未到达, 则返回步骤 C,等待响应。
4、 根据权利要求 3所述的方法, 其特征在于, 在发起端设备再次向对 端设备发送隧道拆除请求之前, 该方法进一步包括: 判断是否已重发预定 次数的隧道拆除请求, 如果是, 则直接释放隧道资源, 否则, 再次向对端 设备发送隧道拆除请求。
5、 根据权利要求 1至 4任一项所述的方法, 其特征在于, 步骤 b进一 步包括: 分组数据关口判断当前要拆除的业务隧道是否为自身与对应用户 终端之间的最后一条业务隧道连接, 如果是, 则分组数据关口在释放当前 要拆除业务隧道相关信息的同时, 清除所存储的对应该用户终端的全部授 权信息。
6、 根据权利要求 1至 4任一项所述的方法, 其特征在于, 所述发起端 设备为用户终端, 所述对端设备为分组数据关口; 或者, 所述发起端设备 为分組数据关口, 所述对端设备为用户终端。
7、 根据权利要求 1至 4任一项所述的方法, 其特征在于, 所述相关隧 道资源包括: 所拆除业务隧道的隧道 ID、 所拆除业务隧道通信时使用的加 密密钥、 所拆除业务隧道相关的用户业务授权信息、 维护所拆除业务隧道 的相关控制信息。
8、 根据权利要求 1至 4任一项所述的方法, 其特征在于, 该方法进一 步包括:
分組数据关口向业务认证授权单元发送隧道清除报告, 业务认证授权 单元收到隧道清除报告后, 刷新自身与所拆除业务连接相关的信息。
9、 根据权利要求 8所述的方法, 其特征在于, 所述隧道清除报告放置 在已有的业务结束信令中发送给业务认证授权单元。
10、 根据权利要求 8所述的方法, 其特征在于, 所述分组数据关口先 释放自身相关的隧道资源再发送报告给业务认证授权单元; 或是先向业务 认证授权单元发送隧道清除报告, 收到业务认证授权单元返回的响应后, 再释放自身相关的隧道资源; 或是先释放自身除需要发送给业务认证授权 单元的信息之外的隧道资源, 在确认隧道清除报告成功发送给业务认证授 权单元后, 再释放剩余的信息。
11、 根据权利要求 8所述的方法, 其特征在于, 所述发起端设备为用 户终端, 所述对端设备为分组数据关口; 则所述分组数据关口在向用户终 端发送隧道拆除响应的同时, 向业务认证授权单元发送隧道清除报告。
12、 根据权利要求 8所述的方法, 其特征在于, 所述发起端设备为分 组数据关口, 所述对端设备为用户终端; 则所述分组数据关口收到用户终 端发来的隧道拆除响应后, 向业务认证授权单元发送隧道清除报告。
13、 根据权利要求 8所述的方法, 其特征在于, 步骤 b进一步包括: 分组数据关口判断当前要拆除的业务隧道是否为自身与对应用户终端之间 的最后一条业务隧道连接, 如果是, 则分組数据关口在释放当前要拆除业 务隧道相关信息的同时, 清除所存储的对应该用户终端的全部授权信息。
14、 根据权利要求 8所述的方法, 其特征在于, 所述相关隧道资源包 括: 所拆除业务隧道的隧道 ID、 所拆除业务隧道通信时使用的加密密钥、 所拆除业务隧道相关的用户业务授权信息、 维护所拆除业务隧道的相关控 制信息。
15、 根据权利要求 8所述的方法, 其特征在于, 所述业务认证授权单 元为 3GPPAAA服务器。
PCT/CN2005/000020 2004-01-07 2005-01-06 Procede permettant de supprimer un tunnel dans un reseau local sans fil WO2005069546A1 (fr)

Priority Applications (4)

Application Number Priority Date Filing Date Title
JP2006548074A JP2007524290A (ja) 2004-01-07 2005-01-06 ワイヤレス・ローカル・エリア・ネットワーク内のサービストンネルの削除方法
EP05700395A EP1703673A4 (en) 2004-01-07 2005-01-06 METHOD FOR REMOVING TUNNEL IN WIRELESS LOCAL NETWORK
CA002550636A CA2550636A1 (en) 2004-01-07 2005-01-06 Method for releasing a service tunnel in a wireless local area network
US11/481,057 US7633918B2 (en) 2004-01-07 2006-07-06 Method for releasing a service tunnel in a wireless local area network

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CNB2004100003345A CN1271823C (zh) 2004-01-07 2004-01-07 无线局域网中业务隧道的拆除方法
CN200410000334.5 2004-01-07

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US11/481,057 Continuation US7633918B2 (en) 2004-01-07 2006-07-06 Method for releasing a service tunnel in a wireless local area network

Publications (1)

Publication Number Publication Date
WO2005069546A1 true WO2005069546A1 (fr) 2005-07-28

Family

ID=34763032

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2005/000020 WO2005069546A1 (fr) 2004-01-07 2005-01-06 Procede permettant de supprimer un tunnel dans un reseau local sans fil

Country Status (6)

Country Link
US (1) US7633918B2 (zh)
EP (1) EP1703673A4 (zh)
JP (1) JP2007524290A (zh)
CN (1) CN1271823C (zh)
CA (1) CA2550636A1 (zh)
WO (1) WO2005069546A1 (zh)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2044715A2 (en) * 2006-07-14 2009-04-08 Kineto Wireless, Inc. Generic access to the iu interface
JP2009516990A (ja) * 2005-11-22 2009-04-23 モトローラ・インコーポレイテッド 移動体ノードの高速ipハンドオフの方法およびシステム
US7852817B2 (en) 2006-07-14 2010-12-14 Kineto Wireless, Inc. Generic access to the Iu interface
US8005076B2 (en) 2006-07-14 2011-08-23 Kineto Wireless, Inc. Method and apparatus for activating transport channels in a packet switched communication system
US8150397B2 (en) 2006-09-22 2012-04-03 Kineto Wireless, Inc. Method and apparatus for establishing transport channels for a femtocell
US8165086B2 (en) 2006-04-18 2012-04-24 Kineto Wireless, Inc. Method of providing improved integrated communication system data service
US9648644B2 (en) 2004-08-24 2017-05-09 Comcast Cable Communications, Llc Determining a location of a device for calling via an access point

Families Citing this family (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8996698B1 (en) * 2000-11-03 2015-03-31 Truphone Limited Cooperative network for mobile internet access
EP2334129A3 (en) 2002-10-18 2012-07-11 Kineto Wireless, Inc. Method and apparatuses for paging a telecommunication device
US7606190B2 (en) 2002-10-18 2009-10-20 Kineto Wireless, Inc. Apparatus and messages for interworking between unlicensed access network and GPRS network for data services
US7849211B2 (en) * 2006-05-12 2010-12-07 Broadcom Corporation Method and system for reliable multicast datagrams and barriers
US20090061877A1 (en) * 2006-07-14 2009-03-05 Gallagher Michael D Generic Access to the Iu Interface
US8848618B2 (en) * 2006-08-22 2014-09-30 Qualcomm Incorporated Semi-persistent scheduling for traffic spurts in wireless communication
JP5475655B2 (ja) * 2007-06-22 2014-04-16 インターデイジタル テクノロジー コーポレーション ハンドオーバ操作における資源管理のための方法および機器
CN101448294B (zh) 2008-01-21 2011-05-04 华为技术有限公司 网络资源释放处理的方法及设备
KR20130055194A (ko) * 2011-11-18 2013-05-28 삼성전자주식회사 이종 네트워크 간 핸드오버 방법 및 장치
US8934867B2 (en) 2012-07-10 2015-01-13 Symbol Technologies, Inc. On-demand access tunnel between service provider network and wireless communication network

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2002017561A2 (en) * 2000-08-18 2002-02-28 Telefonaktiebolaget L M Ericsson (Publ) System and method of monitoring and reporting accounting data based on volume
CN1353559A (zh) * 2001-11-13 2002-06-12 西安西电捷通无线网络通信有限公司 一种移动终端跨ip网际漫游的方法

Family Cites Families (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
SE500826C2 (sv) 1993-01-27 1994-09-12 Ericsson Telefon Ab L M Metod att nedkoppla en upprättad kommunikationsförbindelse i ett mobilradiosystem
US6665718B1 (en) * 1997-10-14 2003-12-16 Lucent Technologies Inc. Mobility management system
US6931016B1 (en) * 1999-10-13 2005-08-16 Nortel Networks Limited Virtual private network management system
US6522880B1 (en) * 2000-02-28 2003-02-18 3Com Corporation Method and apparatus for handoff of a connection between network devices
JP3855595B2 (ja) * 2000-04-25 2006-12-13 株式会社日立製作所 通信システム、通信方法及び通信装置
KR100520141B1 (ko) * 2000-10-26 2005-10-10 삼성전자주식회사 이동통신 시스템에서 고정 주소를 가지는 이동단말의 핸드오버 방법
US7225259B2 (en) * 2001-02-21 2007-05-29 Nokia Inc. Service tunnel over a connectionless network
US20020138635A1 (en) * 2001-03-26 2002-09-26 Nec Usa, Inc. Multi-ISP controlled access to IP networks, based on third-party operated untrusted access stations
EP1440537B1 (en) * 2001-10-23 2007-08-29 Telefonaktiebolaget LM Ericsson (publ) Multicast support in packet switched wireless networks
US7154868B1 (en) * 2002-01-08 2006-12-26 Utstarcom, Inc. Smooth handoff via state exchange in wireless networks
JP3789098B2 (ja) 2002-03-04 2006-06-21 株式会社東芝 ネットワークシステム、ネットワークアクセス装置、ネットワークサーバ及びネットワークアクセス制御方法
US7321587B2 (en) * 2002-11-15 2008-01-22 Ntt Docomo, Inc. Handover resource optimization
US7466675B2 (en) * 2003-02-14 2008-12-16 Motorola, Inc. Method and apparatus for supporting a reduced resource dormant state for packet data
US20050088963A1 (en) * 2003-10-24 2005-04-28 Nortel Networks Limited Method and apparatus for protection switch messaging on a shared mesh network

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2002017561A2 (en) * 2000-08-18 2002-02-28 Telefonaktiebolaget L M Ericsson (Publ) System and method of monitoring and reporting accounting data based on volume
CN1353559A (zh) * 2001-11-13 2002-06-12 西安西电捷通无线网络通信有限公司 一种移动终端跨ip网际漫游的方法

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See also references of EP1703673A4 *

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9648644B2 (en) 2004-08-24 2017-05-09 Comcast Cable Communications, Llc Determining a location of a device for calling via an access point
US10070466B2 (en) 2004-08-24 2018-09-04 Comcast Cable Communications, Llc Determining a location of a device for calling via an access point
US10517140B2 (en) 2004-08-24 2019-12-24 Comcast Cable Communications, Llc Determining a location of a device for calling via an access point
US11252779B2 (en) 2004-08-24 2022-02-15 Comcast Cable Communications, Llc Physical location management for voice over packet communication
US11956852B2 (en) 2004-08-24 2024-04-09 Comcast Cable Communications, Llc Physical location management for voice over packet communication
JP2009516990A (ja) * 2005-11-22 2009-04-23 モトローラ・インコーポレイテッド 移動体ノードの高速ipハンドオフの方法およびシステム
US8165086B2 (en) 2006-04-18 2012-04-24 Kineto Wireless, Inc. Method of providing improved integrated communication system data service
EP2044715A2 (en) * 2006-07-14 2009-04-08 Kineto Wireless, Inc. Generic access to the iu interface
EP2044715A4 (en) * 2006-07-14 2010-04-28 Kineto Wireless Inc GENERIC ACCESS TO AN IU INTERFACE
US7852817B2 (en) 2006-07-14 2010-12-14 Kineto Wireless, Inc. Generic access to the Iu interface
US8005076B2 (en) 2006-07-14 2011-08-23 Kineto Wireless, Inc. Method and apparatus for activating transport channels in a packet switched communication system
US8150397B2 (en) 2006-09-22 2012-04-03 Kineto Wireless, Inc. Method and apparatus for establishing transport channels for a femtocell

Also Published As

Publication number Publication date
CN1642119A (zh) 2005-07-20
CA2550636A1 (en) 2005-07-28
US7633918B2 (en) 2009-12-15
EP1703673A1 (en) 2006-09-20
CN1271823C (zh) 2006-08-23
EP1703673A4 (en) 2007-03-21
JP2007524290A (ja) 2007-08-23
US20070019600A1 (en) 2007-01-25

Similar Documents

Publication Publication Date Title
WO2005069546A1 (fr) Procede permettant de supprimer un tunnel dans un reseau local sans fil
KR101090088B1 (ko) 이종 네트워크 시스템, 네트워크 노드 및 이동 호스트
US7254119B2 (en) Interworking mechanism between CDMA2000 and WLAN
US7519036B2 (en) Method of user access authorization in wireless local area network
US20060120171A1 (en) Seamless handoff of mobile terminal
WO2004054169A1 (fr) Procede de traitement relatif a la connexion de service entre un reseau local sans fil et un terminal utilisateur
WO2006002601A1 (fr) Procede pour l'etablissement de la connexion de session par les utilisateurs de reseau local sans fil
WO2005076532A1 (fr) Procede interactif permettant a un terminal d'usager de reseau wlan sans fil de reselectionner le reseau d'exploitation
WO2005057858A1 (fr) Procede de selection par un terminal d'abonne de la passerelle de paquets de donnees dans un reseau local sans fil
WO2006000149A1 (fr) Procédé d'application d'une authentification d'accès d'un utilisateur wlan
WO2009100676A1 (zh) 用户设备选择网络的方法及装置
WO2005018140A1 (fr) Procede permettant a un terminal d'utilisateur d'acceder rapidement au reseau de rattachement dans un reseau local sans fil
WO2005004403A1 (fr) Procede de traitement d'informations selectionnees reseau au niveau du terminal d'utilisateur dans un reseau local sans fil
WO2005039110A1 (fr) Analyse du traitement d'acces a un service selectionne dans un reseau local radio
WO2005101729A1 (fr) Procede de liberation d'une ressource reseau occupee par l'utilisateur dans un reseau local sans fil
WO2005074194A1 (en) An interactive method of a wireless local area network user terminal rechoosing a management network
WO2005069533A1 (fr) Procede d'acquisition d'identification utilisateur permanente par passerelle de donnees par paquets (pdg) d'un reseau local (wlan)
JP4309426B2 (ja) ワイアレスローカルエリアネットワークにおけるユーザー端末のネットワーク選択情報を決定する対話型方法
WO2004114588A1 (en) Method for transmitting traffic data to wireless local area network users
WO2005004384A1 (fr) Procede de rejet d'alternative pour information de selection de reseau d'un terminal utilisateur dans un reseau local sans fil
WO2005015822A1 (fr) Procede permettant d'eviter la selection frequente de reseau dans un reseau de zone local sans fil
WO2008095433A1 (fr) Procédé, dispositif et système assurant un service d'urgence
CN108496398B (zh) 支持wlan位置变更报告或获取的方法及装置
WO2010051696A1 (zh) 一种无线资源释放的方法和系统
WO2010108367A1 (zh) 业务切换方法、业务信息控制方法、相关设备及系统

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BW BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE EG ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NA NI NO NZ OM PG PH PL PT RO RU SC SD SE SG SK SL SY TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): BW GH GM KE LS MW MZ NA SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LT LU MC NL PL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
WWE Wipo information: entry into national phase

Ref document number: 2550636

Country of ref document: CA

WWE Wipo information: entry into national phase

Ref document number: 11481057

Country of ref document: US

WWE Wipo information: entry into national phase

Ref document number: 2006548074

Country of ref document: JP

Ref document number: 2005700395

Country of ref document: EP

NENP Non-entry into the national phase

Ref country code: DE

WWW Wipo information: withdrawn in national office

Ref document number: DE

WWE Wipo information: entry into national phase

Ref document number: 2870/CHENP/2006

Country of ref document: IN

WWE Wipo information: entry into national phase

Ref document number: 06085000

Country of ref document: CO

WWP Wipo information: published in national office

Ref document number: 2005700395

Country of ref document: EP

WWP Wipo information: published in national office

Ref document number: 11481057

Country of ref document: US