WO2005069546A1 - Procede permettant de supprimer un tunnel dans un reseau local sans fil - Google Patents
Procede permettant de supprimer un tunnel dans un reseau local sans fil Download PDFInfo
- Publication number
- WO2005069546A1 WO2005069546A1 PCT/CN2005/000020 CN2005000020W WO2005069546A1 WO 2005069546 A1 WO2005069546 A1 WO 2005069546A1 CN 2005000020 W CN2005000020 W CN 2005000020W WO 2005069546 A1 WO2005069546 A1 WO 2005069546A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- tunnel
- service
- user terminal
- information
- response
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/28—Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
- H04L12/46—Interconnection of networks
- H04L12/4633—Interconnection of networks using encapsulation techniques, e.g. tunneling
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/03—Protecting confidentiality, e.g. by encryption
- H04W12/033—Protecting confidentiality, e.g. by encryption of the user plane, e.g. user's traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W76/00—Connection management
- H04W76/30—Connection release
- H04W76/32—Release of transport tunnels
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0272—Virtual private networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W76/00—Connection management
- H04W76/30—Connection release
- H04W76/38—Connection release triggered by timers
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W84/00—Network topologies
- H04W84/02—Hierarchically pre-organised networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
- H04W84/10—Small scale networks; Flat hierarchical networks
- H04W84/12—WLAN [Wireless Local Area Networks]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W88/00—Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
- H04W88/02—Terminal devices
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W88/00—Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
- H04W88/16—Gateway arrangements
Definitions
- the present invention relates to a service tunnel technology, and particularly to a method for removing a service tunnel in a wireless local area network (WLAN).
- WLAN wireless local area network
- Wireless local area network includes a variety of different technologies.
- IEEE 802.11b which uses the 2.4GHz frequency band and has a maximum data transmission rate of 11Mbps.
- IEEE 802.11g and Bluetooth technology are also used in this frequency band. Among them, the highest data transmission rate of 802.11g can reach 54Mbps.
- Other new technologies such as IEEE 802.11a and ETSI BRAN Hiperlan2 both use the 5GHz frequency band and the highest transmission rate can reach 54Mbps.
- WLANs are used to transmit Internet Protocol (IP) packet data packets.
- IP Internet Protocol
- the specific WLAN access technology it uses is generally transparent to the upper-layer IP. Its basic structure is to use an access point (AP) to complete the wireless access of the user terminal, and to form an IP transmission network through network control and connection equipment connection.
- AP access point
- WLAN and various wireless mobile communication networks such as: GSM, Code Division Multiple Access (CDMA) system, Wideband Code Division Multiple Access (WCDMA) system, Time Division Duplex-Synchronous Code Division Multiple Access
- GSM Global System for Mobile Communications
- CDMA Code Division Multiple Access
- WCDMA Wideband Code Division Multiple Access
- TD-SCDMA2000 Time Division Duplex-Synchronous Code Division Multiple Access
- 3GPP 3rd Generation Partnership Project
- user terminals can connect to the Internet (Intemet) and intranet (Intranet) through the WLAN access network, and can also connect to the home network of the 3GPP system via the WLAN access network.
- a 3GPP system access network connection specifically, a WLAN user terminal accesses locally At this time, it is connected to the 3GPP home network via the WLAN access network, as shown in Figure 2. During roaming, it is connected to the 3GPP access network via the WLAN access network, and some entities in the 3GPP access network are respectively connected to the 3GPP home network.
- Corresponding entities are interconnected, for example: a 3GPP authentication authorization accounting (AAA) proxy in a 3GPP access network and a 3GPP authentication authorization accounting (AAA) server in a 3GPP home network; a wireless local area network access gateway (WAG) in a 3GPP access network It is related to the packet data gateway (PDG, Packet Data Gateway) and so on in the 3GPP home network, as shown in FIG. 1.
- AAA 3GPP authentication authorization accounting
- AAA 3GPP authentication authorization accounting
- AAA 3GPP authentication authorization accounting
- AAA 3GPP authentication authorization accounting
- AAA 3GPP authentication authorization accounting
- WAG wireless local area network access gateway
- FIG. 1 and FIG. 2 are schematic diagrams of a networking structure in which a WLAN system and a 3GPP system interwork in a roaming situation and a non-roaming situation, respectively.
- the 3GPP system in the 3GPP system, it mainly includes a Home Subscriber Subscriber Server (HSS) / Home Location Register (HLR 3GPPAAA server, 3GPPAAA proxy, WAG, packet data gateway, charging gateway (CGw) / Charging Information Collection System (CCF) and Online Charging System (OCS).
- HSS Home Subscriber Subscriber Server
- HLR 3GPPAAA server Home Location Register
- 3GPPAAA proxy 3GPPAAA proxy
- WAG packet data gateway
- charging gateway CGw
- CCF Charging Information Collection System
- OCS Online Charging System
- the user terminal, the WLAN access network, and all entities of the 3GPP system form a 3GPP-WLAN interactive network.
- This 3GPP-WLAN interactive network can be used as a wireless Local area network service system.
- the 3GPP AAA server is responsible for user authentication, authorization, and accounting, and collects and transmits the accounting information sent by the WLAN access network to the accounting system.
- the packet data gateway is responsible for receiving user data from the WLAN.
- a WLAN user terminal wants to directly access the Internet / Intranet
- the user terminal After the user terminal completes the access authentication and authorization through the WLAN access network and the AAA server (AS), the user terminal can access the network through the WLAN access network.
- Internet / Intranet If the WLAN user terminal also wants to access the 3GPP packet switching (PS) domain service, it may further apply to the 3GPP home network for an interworking scenario 3 (Scenario3) service, that is, the WLAN user terminal initiates the interworking scenario 3 to the AS of the 3GPP home network.
- PS packet switching
- Service authorization request AS pair for 3GPP home network
- the service authorization request performs service authentication and authorization.
- the AS sends an access permission message to the user terminal, and the AS assigns the corresponding PDG to the user terminal.
- the tunnel is established between the user terminal and the assigned PDG, Access 3GPP PS domain services.
- CGw / CCF and OCS record charging information based on the network usage of the user terminal.
- the user terminal may apply to the 3GPP home network to access the Internet / Intranet through the 3GPP access network. If the user terminal also wishes to apply for the interworking scenario 3 service and access the 3GPP PS domain service, the user terminal needs to initiate a service authorization process to the 3GPP home network through the 3GPP access network.
- This process is also between the user terminal and the AS of the 3GPP home network.
- the AS allocates the corresponding home PDG to the user terminal.
- the user terminal After the user terminal establishes a tunnel between the WAG in the network and the allocated PDG through the 3GPP, the user terminal can access the 3GPP PS domain service of the home network.
- the main object of the present invention is to provide a method for removing a service tunnel in a wireless local area network, so that it can achieve the removal of a designated service tunnel in a wireless local area network.
- a method for removing a service tunnel in a wireless local area network includes the following steps: a. An initiator device to remove a service tunnel in the wireless local area network initiates a tunnel removal request to a peer device corresponding to the service tunnel to be removed;
- the peer device returns a tunnel teardown response to the initiator device described in step a, and releases its associated tunnel resources.
- the method further includes:
- the initiator device judges whether it receives the tunnel teardown response returned by the peer device, and if it receives it, directly releases its own tunnel resources; otherwise, it determines whether it has reached a preset waiting tunnel teardown response. Time, if it has arrived, it will release its associated tunnel resources and end the response wait; if not, it will return to step C to wait for a response.
- the method further includes:
- the initiator device judges whether it receives the tunnel teardown response returned by the peer device, and if it receives it, releases its own tunnel resources directly; otherwise, it determines whether it has reached a preset waiting tunnel teardown response. Time, if it has arrived, send a tunnel teardown request to the peer device again, and end the response wait; if it does not arrive, return to step C and wait for a response.
- the method further includes: judging whether the tunnel teardown request has been resent a predetermined number of times, and if so, release the tunnel resources directly, otherwise, send it to the peer device again. Send a tunnel teardown request.
- step b further includes: the packet data gateway determines whether the service tunnel to be removed is the last service tunnel connection between itself and the corresponding user terminal. If so, the packet data gateway is releasing the current service tunnel to be removed. At the same time as related information, all stored authorization information corresponding to the user terminal is cleared.
- the method further includes: the packet data gateway sends a tunnel clearing report to the service authentication and authorization unit, and after receiving the tunnel clearing report, the service authentication and authorization unit refreshes information related to the service connection to be removed.
- the tunnel clearing report is placed in an existing service end signaling and sent to a service authentication and authorization unit.
- the packet data gateway first releases its own relevant tunnel resources and then sends a report to the service authentication and authorization unit; or sends a tunnel clearing report to the service authentication and authorization unit first, and then releases its own related information after receiving the response returned by the service authentication and authorization unit.
- Tunnel resources or first release the tunnel resources other than the information that needs to be sent to the service authentication and authorization unit. After the channel clearing report is successfully sent to the service authentication and authorization unit, the remaining information is released.
- the initiator device is a user terminal
- the peer device is a packet data gateway; then the packet data gateway sends a tunnel clearing report to a business authentication and authorization unit while sending a tunnel tearing response to the user terminal.
- the initiator device is a packet data gateway
- the peer device is a user terminal. Then, after receiving the tunnel teardown response from the user terminal, the packet data gateway sends a tunnel clearing report to a service authentication and authorization unit.
- Step b further includes: the packet data gateway determines whether the service tunnel to be removed is the last service tunnel connection between itself and the corresponding user terminal, and if so, the packet data gateway releases information about the service tunnel to be removed at the same time, Clear all stored authorization information corresponding to the user terminal.
- the initiator device is a user terminal or a packet data gateway; correspondingly, the peer device is a packet data gateway or a user terminal.
- the related tunnel resources include: the tunnel ID of the removed service tunnel, the encryption key used for communication of the removed service tunnel, user service authorization information related to the removed service tunnel, and control information for maintaining the removed service tunnel.
- the service authentication and authorization unit is a 3GPPAAA server.
- a tunnel removal process is initiated by an endpoint device that is currently removing the service tunnel, and the initiator, the receiving requester, and the service authentication and authorization unit receive a response, request, or After the indication is cleared, the tunnel resources and information related to the service tunnel to be removed are dry-released, which not only enables the removal of the designated service tunnel in the wireless local area network, but also clears or refreshes the relevant tunnel resources and Information to avoid the occupation of resources by redundant information in each device.
- FIG. 1 is a schematic diagram of a network structure for interworking between a WLAN system and a 3GPP system in a roaming situation
- FIG. 2 is a schematic diagram of a network structure for interworking between a WLAN system and a 3GPP system in a non-roaming situation
- FIG. 3 is a flowchart of a user terminal initiating a tunnel removal process
- FIG. 4 is a flowchart of the tunnel teardown process initiated by PDG
- FIG. 5 is a flowchart of the tunnel dismantling process caused by the end of the business.
- the basic idea of the present invention is: when a service tunnel needs to be removed, the initiator device to remove the service tunnel sends a tunnel teardown request to the opposite device; the device that receives the tunnel teardown request returns a tunnel teardown response and releases its own related Tunnel resources. Further, the device receiving the tunnel teardown response releases its related tunnel resources; PDG may send a tunnel clearing report to a service authentication and authorization unit such as an AAA server before, during, or after the tunnel resources are released to enable service authentication and authorization The unit also refreshes its related business connection information.
- the related tunnel resources include at least: the tunnel ID of the removed service tunnel, the encryption key used in the communication of the removed service tunnel, user service authorization information related to the removed service tunnel, and relevant controls for maintaining the removed service tunnel. Information and more.
- the service connection is generally carried by a service tunnel.
- service termination or service tunnel connection timeout, or other network equipment such as AAA server, OCS, etc. requiring PDG to remove the service tunnel, or network management intervention, etc.
- AAA server OCS
- PDG network management intervention
- the initiation of each service tunnel removal operation only involves the two endpoint devices of the service tunnel, that is, the user terminal or PDG. Both the terminal and the PDG can initiate a service tunnel teardown process.
- the process of initiating the removal of a service tunnel includes the following steps:
- the The starting device initiates a tunnel teardown request to the peer device corresponding to the service tunnel to be removed.
- the device receiving the tunnel teardown request returns a tunnel teardown response to the initiator device, and releases its own tunnel resources related to the service tunnel to be removed.
- the device receiving the tunnel teardown request may first send back the tunnel teardown response and then release its related tunnel resources; or it may release its own tunnel resources before sending back the tunnel teardown response to the initiator device.
- the related tunnel resources still refer to: the tunnel ID of the removed service tunnel, the encryption key used in the communication of the removed service tunnel, the user service authorization information related to the removed service tunnel, and the maintenance related to the removed service tunnel. Control information and more.
- the initiator device For the initiator device that tears down the service tunnel, if the initiator device receives the tunnel teardown response returned by the peer within a preset waiting response time, it will directly release its own tunnel resources related to the removed service tunnel. If no response is received from the peer within the preset waiting response time, wait for the predetermined waiting response time to arrive before releasing its own tunnel resources related to the service tunnel being dismantled; or wait for the predetermined waiting response time to arrive After that, the tunnel teardown request is re-initiated. If the response returned by the peer end is not received after a limited number of re-senders, the tunnel resources related to the service tunnel to be removed are released again.
- the former tunnel resource removal scheme is selected, that is, the tunnel resources are released directly if no response is received within a limited time; if the initiator device is a UE, the latter tunnel is selected.
- the resource dismantling scheme that is, try again if no response is received within a limited time, and the tunnel resources are not released until the response is received or the specified number of attempts fails.
- a timer can be set. If the initiator device receives a tunnel tearing response at any time before the timer expires, the initiator device releases the corresponding tunnel resources and information, and the timer is cancelled; if the timer expires, If the tunnel teardown response is still not received, the initiator device waits until the time expires, and then processes accordingly to release resources or resend the request.
- the PDG device sends a tunnel clearing report to a service authentication and authorization unit such as an AAA server to enable service authentication.
- the authorization unit such as the AAA server, refreshes its own information related to the removed service connection.
- the tunnel clearing report can be in a separate message or can be added to the existing service termination signaling.
- the PDG should clear all the stored authorization information of the WLAN user terminal.
- a service authentication and authorization unit such as an AAA server
- the service tunnel dismantling can be part of the normal service end processing process; or, due to the timeout of the service connection or other network equipment requiring the PDG to perform the dismantling process.
- the main reasons for dismantling can be: 1 The request initiated by the user equipment to end the service, the tunnel connection needs to be dismantled, the dismantling is initiated through tunnel control signaling, and the IP bearer information related to a certain service is cleared; 2 the service suspension caused by operator intervention; 3 The disappearance of the wireless signal causes the user's connection to be interrupted.
- Embodiment 1 The user terminal initiates a tunnel teardown process.
- the initiator device for removing the service tunnel is a user terminal, and the service authentication and authorization unit is a 3GPPAAA server.
- the reason for removing the service tunnel is that the service ends.
- the tunnel tear down process initiated by the user terminal includes:
- Steps 301 to 302 After a user service ends, the user terminal decides to initiate a tunnel teardown process and tear down a service tunnel used to end the service; then the user terminal sends a tunnel teardown request Release Tunnel req to the PDG.
- Step 303 After receiving the tunnel teardown request from the user terminal, the PDG sends a tunnel teardown response Release ACK to the user terminal that initiated the tunnel teardown; then, the PDG starts to release the resources and information related to the service tunnel to be removed, and sends it to the 3GPP AAA server.
- a Tunnel disconnection report is sent to indicate that the user connection tunnel has been deleted. It sends a tunnel clearing report to the 3GPP AAA server, and then releases it after the 3GPP AAA server returns a response. It can also release some tunnel resources first, and retain the information that needs to be sent to the 3GPP AAA server, and wait to confirm that the tunnel clearing report is successfully sent to 3GPP AAA After the server releases the rest of the information.
- the tunnel resource information includes a tunnel ID, a tunnel-related encryption key, tunnel-related user service authorization information, and tunnel-related control information.
- the PDG determines that the current service tunnel to be demolished is the last service tunnel connection between itself and the user terminal of the initiator, the PDG also needs to clear the stored correspondence while releasing the information about the service tunnel Full authorization information of the user terminal.
- Step 304 After receiving the tunnel teardown response Release ACK, the user terminal releases its own control information and resources related to the service tunnel to be removed. If no ACK is received within the time limit, the tunnel tear down process can be initiated again.
- Step 305 After the 3GPP AAA server receives the tunnel disconnection report, the tunnel disconnection report refreshes information related to the removed service connection, such as: user connection status and related tunnel information: tunnel] D. Tunnel security information.
- Embodiment 2 The PDG initiates a tunnel teardown process.
- the initiator device for removing the service tunnel is PDG
- the service authentication and authorization unit is a 3GPP AAA server.
- the reason for removing the service tunnel is due to the intervention of the operation and maintenance personnel, or because the service tunnel connection times out, or other network equipment requires PDG to remove it.
- a service tunnel can be specifically divided into:
- the PDG initiates the service tunnel removal process.
- the PDG itself judges that the service tunnel connection timeout needs to be dismantled according to relevant rules and initiates the business. Service tunnel removal process.
- the 3GPP AAA server receives the OCS user service connection restriction indication, or it receives the service authorization restriction caused by the change of the user subscription information sent by the HSS, then the 3GPP AAA server will determine whether to notify the corresponding PDG to tear down the relevant service tunnel connection. If 3GPP AAA The server notifies the corresponding PDG, and the PDG will initiate a service tunnel teardown process.
- the PDG-initiated tunnel teardown process includes the following steps: Steps 401 to 402: After the PDG receives an instruction or decides to tear down a service tunnel, the PDG sends a tunnel teardown request to the user terminal.
- Step 403 After receiving the tunnel teardown request, the user terminal returns a tunnel teardown response Release ACK to the PDG; at the same time, the information and resources related to the service tunnel to be removed are released.
- the user terminal may respond first and then perform resource release; it may also perform resource release and then respond.
- Step 404 After the PDG receives the response within a preset waiting response time, it starts to release its own tunnel resources and information related to the service tunnel to be removed, and sends a Tunnel Clearance Report Tunnel disconnection report to the 3GPP AAA server, indicating that the specified The user service tunnel connection has been deleted.
- the PDG may directly release the tunnel resources related to the removed tunnel; or it may release the tunnel resources related to the removed tunnel after a predetermined time.
- the PDG may first release the tunnel resources related to the removed tunnel and then send a tunnel clearing report to the 3GPP AAA server; or it may send a tunnel clearing report and wait until the 3GPP AAA server returns a response before releasing the tunnel resources related to the removed tunnel. You can remove some of the tunnel resources related to the removed tunnel, retain the information that needs to be sent to the 3GPP AAA server, and release the part of the reserved information after the confirmation is successfully sent to the 3GPP AAA server.
- the PDG determines that the service tunnel to be removed is the last service connection tunnel between the user terminal and the PDG, the PDG releases the same information related to the service tunnel. At the same time, all stored authorization information of the user terminal should also be cleared.
- Step 405 After receiving the Tunnel disconnection report from the 3GPP AAA server, the 3GPP AAA server refreshes the resources and information related to the removed service connection, such as the user's connection status and related tunnel information: user connection activation status, removed service The tunnel ID of the tunnel, tunnel security parameters, corresponding PDG address, etc.
- Embodiment 3 The tunnel dismantling process caused by the end of business.
- the initiator device for removing the service tunnel is a user terminal, and the service authentication and authorization unit is a 3GPPAAA server.
- the reason for removing the service tunnel is that the service ends.
- the tunnel teardown process caused by the end of the service includes:
- Steps 501 to 502 The user terminal decides to end the service, and then the user terminal initiates the information interaction of the service layer connection teardown.
- Steps 503 to 507 It is exactly the same as steps 301 to 304 in the first embodiment.
- the main difference between this embodiment and the first embodiment lies in step 502.
- the user-initiated service layer connection removal process may have cleared relevant parameters or states in the 3GPP AAA server, such as the service activation state and the authorized APN corresponding to the service.
- the difference between step 508 and step 305 is that the 3GPP AAA server only needs to update the tunnel-related ID. For example, the 3GPP AAA server only needs to refresh the recorded tunnel ID, IP address, and the PDG address corresponding to the service.
- the 3GPP AAA server can also receive the tunnel teardown signaling at the service layer and continue to save the relevant service information after the tunnel teardown at the service layer is completed, waiting to receive the PDG tunnel clearing report within a certain period of time, or waiting for a preset After the sending time of the specified tunnel clearing report expires, it is refreshed together. Thereafter, the processing of step 508 is completely consistent with the processing flow of step 305 in the first embodiment.
- the two endpoint devices that want to tear down the service tunnel lose connectivity and cannot send each other.
- Send signaling for normal tunnel removal processing if the initiator device sends a request to the peer device, the subsequent processing of the initiator device is the same as the case where a response cannot be received after timeout. The difference is: If the initiator device itself has determined that it cannot send a message to the peer device, The terminal device, for example, has not been able to receive any signals from the peer device before the service tunnel is dismantled. In this case, the initiator device can directly omit the process of sending requests and waiting.
- the PDG tunnel tearing process is as follows: a network device that detects that the user terminal has left, such as an AP, AC in a WLAN, or a device such as WAG in a 3GPP network, to notify the PDG user that the connection is lost, Of course, it can also be detected by the PDG itself that the user cannot be connected, and when the lost connection state reaches a certain time limit, the PDG alone initiates the process of tearing down the relevant service tunnel connection. Release the tunnel resources related to the service tunnel and send a report to the 3GPP AAA server.
- the user terminal if the user terminal detects that the wireless connection or the underlying physical connection cannot reach a PDG, and cannot send information to the PDG after a certain period of time, it can directly release itself related to the service tunnel. Tunnel resources and information.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Mobile Radio Communication Systems (AREA)
- Small-Scale Networks (AREA)
Description
Claims
Priority Applications (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2006548074A JP2007524290A (ja) | 2004-01-07 | 2005-01-06 | ワイヤレス・ローカル・エリア・ネットワーク内のサービストンネルの削除方法 |
EP05700395A EP1703673A4 (en) | 2004-01-07 | 2005-01-06 | METHOD FOR REMOVING TUNNEL IN WIRELESS LOCAL NETWORK |
CA002550636A CA2550636A1 (en) | 2004-01-07 | 2005-01-06 | Method for releasing a service tunnel in a wireless local area network |
US11/481,057 US7633918B2 (en) | 2004-01-07 | 2006-07-06 | Method for releasing a service tunnel in a wireless local area network |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNB2004100003345A CN1271823C (zh) | 2004-01-07 | 2004-01-07 | 无线局域网中业务隧道的拆除方法 |
CN200410000334.5 | 2004-01-07 |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US11/481,057 Continuation US7633918B2 (en) | 2004-01-07 | 2006-07-06 | Method for releasing a service tunnel in a wireless local area network |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2005069546A1 true WO2005069546A1 (fr) | 2005-07-28 |
Family
ID=34763032
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2005/000020 WO2005069546A1 (fr) | 2004-01-07 | 2005-01-06 | Procede permettant de supprimer un tunnel dans un reseau local sans fil |
Country Status (6)
Country | Link |
---|---|
US (1) | US7633918B2 (zh) |
EP (1) | EP1703673A4 (zh) |
JP (1) | JP2007524290A (zh) |
CN (1) | CN1271823C (zh) |
CA (1) | CA2550636A1 (zh) |
WO (1) | WO2005069546A1 (zh) |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP2044715A2 (en) * | 2006-07-14 | 2009-04-08 | Kineto Wireless, Inc. | Generic access to the iu interface |
JP2009516990A (ja) * | 2005-11-22 | 2009-04-23 | モトローラ・インコーポレイテッド | 移動体ノードの高速ipハンドオフの方法およびシステム |
US7852817B2 (en) | 2006-07-14 | 2010-12-14 | Kineto Wireless, Inc. | Generic access to the Iu interface |
US8005076B2 (en) | 2006-07-14 | 2011-08-23 | Kineto Wireless, Inc. | Method and apparatus for activating transport channels in a packet switched communication system |
US8150397B2 (en) | 2006-09-22 | 2012-04-03 | Kineto Wireless, Inc. | Method and apparatus for establishing transport channels for a femtocell |
US8165086B2 (en) | 2006-04-18 | 2012-04-24 | Kineto Wireless, Inc. | Method of providing improved integrated communication system data service |
US9648644B2 (en) | 2004-08-24 | 2017-05-09 | Comcast Cable Communications, Llc | Determining a location of a device for calling via an access point |
Families Citing this family (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8996698B1 (en) * | 2000-11-03 | 2015-03-31 | Truphone Limited | Cooperative network for mobile internet access |
EP2334129A3 (en) | 2002-10-18 | 2012-07-11 | Kineto Wireless, Inc. | Method and apparatuses for paging a telecommunication device |
US7606190B2 (en) | 2002-10-18 | 2009-10-20 | Kineto Wireless, Inc. | Apparatus and messages for interworking between unlicensed access network and GPRS network for data services |
US7849211B2 (en) * | 2006-05-12 | 2010-12-07 | Broadcom Corporation | Method and system for reliable multicast datagrams and barriers |
US20090061877A1 (en) * | 2006-07-14 | 2009-03-05 | Gallagher Michael D | Generic Access to the Iu Interface |
US8848618B2 (en) * | 2006-08-22 | 2014-09-30 | Qualcomm Incorporated | Semi-persistent scheduling for traffic spurts in wireless communication |
JP5475655B2 (ja) * | 2007-06-22 | 2014-04-16 | インターデイジタル テクノロジー コーポレーション | ハンドオーバ操作における資源管理のための方法および機器 |
CN101448294B (zh) | 2008-01-21 | 2011-05-04 | 华为技术有限公司 | 网络资源释放处理的方法及设备 |
KR20130055194A (ko) * | 2011-11-18 | 2013-05-28 | 삼성전자주식회사 | 이종 네트워크 간 핸드오버 방법 및 장치 |
US8934867B2 (en) | 2012-07-10 | 2015-01-13 | Symbol Technologies, Inc. | On-demand access tunnel between service provider network and wireless communication network |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2002017561A2 (en) * | 2000-08-18 | 2002-02-28 | Telefonaktiebolaget L M Ericsson (Publ) | System and method of monitoring and reporting accounting data based on volume |
CN1353559A (zh) * | 2001-11-13 | 2002-06-12 | 西安西电捷通无线网络通信有限公司 | 一种移动终端跨ip网际漫游的方法 |
Family Cites Families (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
SE500826C2 (sv) | 1993-01-27 | 1994-09-12 | Ericsson Telefon Ab L M | Metod att nedkoppla en upprättad kommunikationsförbindelse i ett mobilradiosystem |
US6665718B1 (en) * | 1997-10-14 | 2003-12-16 | Lucent Technologies Inc. | Mobility management system |
US6931016B1 (en) * | 1999-10-13 | 2005-08-16 | Nortel Networks Limited | Virtual private network management system |
US6522880B1 (en) * | 2000-02-28 | 2003-02-18 | 3Com Corporation | Method and apparatus for handoff of a connection between network devices |
JP3855595B2 (ja) * | 2000-04-25 | 2006-12-13 | 株式会社日立製作所 | 通信システム、通信方法及び通信装置 |
KR100520141B1 (ko) * | 2000-10-26 | 2005-10-10 | 삼성전자주식회사 | 이동통신 시스템에서 고정 주소를 가지는 이동단말의 핸드오버 방법 |
US7225259B2 (en) * | 2001-02-21 | 2007-05-29 | Nokia Inc. | Service tunnel over a connectionless network |
US20020138635A1 (en) * | 2001-03-26 | 2002-09-26 | Nec Usa, Inc. | Multi-ISP controlled access to IP networks, based on third-party operated untrusted access stations |
EP1440537B1 (en) * | 2001-10-23 | 2007-08-29 | Telefonaktiebolaget LM Ericsson (publ) | Multicast support in packet switched wireless networks |
US7154868B1 (en) * | 2002-01-08 | 2006-12-26 | Utstarcom, Inc. | Smooth handoff via state exchange in wireless networks |
JP3789098B2 (ja) | 2002-03-04 | 2006-06-21 | 株式会社東芝 | ネットワークシステム、ネットワークアクセス装置、ネットワークサーバ及びネットワークアクセス制御方法 |
US7321587B2 (en) * | 2002-11-15 | 2008-01-22 | Ntt Docomo, Inc. | Handover resource optimization |
US7466675B2 (en) * | 2003-02-14 | 2008-12-16 | Motorola, Inc. | Method and apparatus for supporting a reduced resource dormant state for packet data |
US20050088963A1 (en) * | 2003-10-24 | 2005-04-28 | Nortel Networks Limited | Method and apparatus for protection switch messaging on a shared mesh network |
-
2004
- 2004-01-07 CN CNB2004100003345A patent/CN1271823C/zh not_active Expired - Lifetime
-
2005
- 2005-01-06 JP JP2006548074A patent/JP2007524290A/ja active Pending
- 2005-01-06 EP EP05700395A patent/EP1703673A4/en not_active Withdrawn
- 2005-01-06 CA CA002550636A patent/CA2550636A1/en not_active Abandoned
- 2005-01-06 WO PCT/CN2005/000020 patent/WO2005069546A1/zh active Application Filing
-
2006
- 2006-07-06 US US11/481,057 patent/US7633918B2/en active Active
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2002017561A2 (en) * | 2000-08-18 | 2002-02-28 | Telefonaktiebolaget L M Ericsson (Publ) | System and method of monitoring and reporting accounting data based on volume |
CN1353559A (zh) * | 2001-11-13 | 2002-06-12 | 西安西电捷通无线网络通信有限公司 | 一种移动终端跨ip网际漫游的方法 |
Non-Patent Citations (1)
Title |
---|
See also references of EP1703673A4 * |
Cited By (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9648644B2 (en) | 2004-08-24 | 2017-05-09 | Comcast Cable Communications, Llc | Determining a location of a device for calling via an access point |
US10070466B2 (en) | 2004-08-24 | 2018-09-04 | Comcast Cable Communications, Llc | Determining a location of a device for calling via an access point |
US10517140B2 (en) | 2004-08-24 | 2019-12-24 | Comcast Cable Communications, Llc | Determining a location of a device for calling via an access point |
US11252779B2 (en) | 2004-08-24 | 2022-02-15 | Comcast Cable Communications, Llc | Physical location management for voice over packet communication |
US11956852B2 (en) | 2004-08-24 | 2024-04-09 | Comcast Cable Communications, Llc | Physical location management for voice over packet communication |
JP2009516990A (ja) * | 2005-11-22 | 2009-04-23 | モトローラ・インコーポレイテッド | 移動体ノードの高速ipハンドオフの方法およびシステム |
US8165086B2 (en) | 2006-04-18 | 2012-04-24 | Kineto Wireless, Inc. | Method of providing improved integrated communication system data service |
EP2044715A2 (en) * | 2006-07-14 | 2009-04-08 | Kineto Wireless, Inc. | Generic access to the iu interface |
EP2044715A4 (en) * | 2006-07-14 | 2010-04-28 | Kineto Wireless Inc | GENERIC ACCESS TO AN IU INTERFACE |
US7852817B2 (en) | 2006-07-14 | 2010-12-14 | Kineto Wireless, Inc. | Generic access to the Iu interface |
US8005076B2 (en) | 2006-07-14 | 2011-08-23 | Kineto Wireless, Inc. | Method and apparatus for activating transport channels in a packet switched communication system |
US8150397B2 (en) | 2006-09-22 | 2012-04-03 | Kineto Wireless, Inc. | Method and apparatus for establishing transport channels for a femtocell |
Also Published As
Publication number | Publication date |
---|---|
CN1642119A (zh) | 2005-07-20 |
CA2550636A1 (en) | 2005-07-28 |
US7633918B2 (en) | 2009-12-15 |
EP1703673A1 (en) | 2006-09-20 |
CN1271823C (zh) | 2006-08-23 |
EP1703673A4 (en) | 2007-03-21 |
JP2007524290A (ja) | 2007-08-23 |
US20070019600A1 (en) | 2007-01-25 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2005069546A1 (fr) | Procede permettant de supprimer un tunnel dans un reseau local sans fil | |
KR101090088B1 (ko) | 이종 네트워크 시스템, 네트워크 노드 및 이동 호스트 | |
US7254119B2 (en) | Interworking mechanism between CDMA2000 and WLAN | |
US7519036B2 (en) | Method of user access authorization in wireless local area network | |
US20060120171A1 (en) | Seamless handoff of mobile terminal | |
WO2004054169A1 (fr) | Procede de traitement relatif a la connexion de service entre un reseau local sans fil et un terminal utilisateur | |
WO2006002601A1 (fr) | Procede pour l'etablissement de la connexion de session par les utilisateurs de reseau local sans fil | |
WO2005076532A1 (fr) | Procede interactif permettant a un terminal d'usager de reseau wlan sans fil de reselectionner le reseau d'exploitation | |
WO2005057858A1 (fr) | Procede de selection par un terminal d'abonne de la passerelle de paquets de donnees dans un reseau local sans fil | |
WO2006000149A1 (fr) | Procédé d'application d'une authentification d'accès d'un utilisateur wlan | |
WO2009100676A1 (zh) | 用户设备选择网络的方法及装置 | |
WO2005018140A1 (fr) | Procede permettant a un terminal d'utilisateur d'acceder rapidement au reseau de rattachement dans un reseau local sans fil | |
WO2005004403A1 (fr) | Procede de traitement d'informations selectionnees reseau au niveau du terminal d'utilisateur dans un reseau local sans fil | |
WO2005039110A1 (fr) | Analyse du traitement d'acces a un service selectionne dans un reseau local radio | |
WO2005101729A1 (fr) | Procede de liberation d'une ressource reseau occupee par l'utilisateur dans un reseau local sans fil | |
WO2005074194A1 (en) | An interactive method of a wireless local area network user terminal rechoosing a management network | |
WO2005069533A1 (fr) | Procede d'acquisition d'identification utilisateur permanente par passerelle de donnees par paquets (pdg) d'un reseau local (wlan) | |
JP4309426B2 (ja) | ワイアレスローカルエリアネットワークにおけるユーザー端末のネットワーク選択情報を決定する対話型方法 | |
WO2004114588A1 (en) | Method for transmitting traffic data to wireless local area network users | |
WO2005004384A1 (fr) | Procede de rejet d'alternative pour information de selection de reseau d'un terminal utilisateur dans un reseau local sans fil | |
WO2005015822A1 (fr) | Procede permettant d'eviter la selection frequente de reseau dans un reseau de zone local sans fil | |
WO2008095433A1 (fr) | Procédé, dispositif et système assurant un service d'urgence | |
CN108496398B (zh) | 支持wlan位置变更报告或获取的方法及装置 | |
WO2010051696A1 (zh) | 一种无线资源释放的方法和系统 | |
WO2010108367A1 (zh) | 业务切换方法、业务信息控制方法、相关设备及系统 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BW BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE EG ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NA NI NO NZ OM PG PH PL PT RO RU SC SD SE SG SK SL SY TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): BW GH GM KE LS MW MZ NA SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LT LU MC NL PL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
WWE | Wipo information: entry into national phase |
Ref document number: 2550636 Country of ref document: CA |
|
WWE | Wipo information: entry into national phase |
Ref document number: 11481057 Country of ref document: US |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2006548074 Country of ref document: JP Ref document number: 2005700395 Country of ref document: EP |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
WWW | Wipo information: withdrawn in national office |
Ref document number: DE |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2870/CHENP/2006 Country of ref document: IN |
|
WWE | Wipo information: entry into national phase |
Ref document number: 06085000 Country of ref document: CO |
|
WWP | Wipo information: published in national office |
Ref document number: 2005700395 Country of ref document: EP |
|
WWP | Wipo information: published in national office |
Ref document number: 11481057 Country of ref document: US |