WO2012045351A1 - Capability negotiation and control - Google Patents

Capability negotiation and control Download PDF

Info

Publication number
WO2012045351A1
WO2012045351A1 PCT/EP2010/064954 EP2010064954W WO2012045351A1 WO 2012045351 A1 WO2012045351 A1 WO 2012045351A1 EP 2010064954 W EP2010064954 W EP 2010064954W WO 2012045351 A1 WO2012045351 A1 WO 2012045351A1
Authority
WO
WIPO (PCT)
Prior art keywords
capability
control information
service
drain
source
Prior art date
Application number
PCT/EP2010/064954
Other languages
French (fr)
Inventor
Juha Antero Rasanen
Original Assignee
Nokia Siemens Networks Oy
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nokia Siemens Networks Oy filed Critical Nokia Siemens Networks Oy
Priority to EP10763684.7A priority Critical patent/EP2625897A1/en
Priority to PCT/EP2010/064954 priority patent/WO2012045351A1/en
Priority to KR1020117030908A priority patent/KR101492507B1/en
Priority to KR1020147010177A priority patent/KR20140054453A/en
Priority to US13/319,525 priority patent/US9716629B2/en
Publication of WO2012045351A1 publication Critical patent/WO2012045351A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L65/00Network arrangements, protocols or services for supporting real-time applications in data packet communication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0893Assignment of logical groups to network elements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0866Checking the configuration
    • H04L41/0873Checking configuration conflicts between network elements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L47/00Traffic control in data switching networks
    • H04L47/10Flow control; Congestion control
    • H04L47/20Traffic policing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L61/00Network arrangements, protocols or services for addressing or naming
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W28/00Network traffic management; Network resource management
    • H04W28/02Traffic management, e.g. flow control or congestion control
    • H04W28/0247Traffic management, e.g. flow control or congestion control based on conditions of the access network or the infrastructure network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0894Policy-based network configuration management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/02Processing of mobility data, e.g. registration information at HLR [Home Location Register] or VLR [Visitor Location Register]; Transfer of mobility data, e.g. between HLR, VLR or external networks
    • H04W8/04Registration at HLR or HSS [Home Subscriber Server]

Definitions

  • the present invention relates to an apparatus, a method, a system, and a computer program product related to capability negotiation and control. More particularly, the present invention relates to an apparatus, a method, a system, and a computer program product for capability negotiation and control with respect to policy charging and control.
  • the Evolved Packet System is known by the brand name long term evolution (LTE) network. It comprises the E-UTRAN Radio Access network and the Evolved Packet Core (EPC) .
  • the 3 rd generation partnership program (3GPP) is in the process of defining enhancements to the evolved packet system.
  • Policy and Charging Control has a key role in the way users' services are handled. It provides a way to manage the service related connections in a consistent and controlled way. It determines e.g. how bearer resources are allocated for a given service, and quality of service (QoS)
  • Fig. 1 shows the PCC functions and interfaces in one
  • a user equipment signals a request for a service in the Service Layer, and the application function (AF) residing in that layer contacts the Policy and Charging Rules Function (PCRF) for appropriate bearer resources via the Rx interface.
  • the PCRF is in charge of meeting decisions on what PCC to use for the service. If subscriber specific policies are used, the PCRF may enquire the subscriber related policies from the subscription profile repository (SPR) via the Sp interface.
  • the packet data network gateway (P-GW) comprises e.g. the Policy and Charging Enforcement Function (PCEF) .
  • PCEF Policy and Charging Enforcement Function
  • 3GPP SA2 has a Rel-10 study item on "Policy solutions and enhancements” . Studied items are documented in technical report TR 23.813. Key issue 4 "Service Awareness and Privacy Policies" of the study deals with the traffic detection for policy and charging control purposes.
  • the traffic detection functionality may be implemented either as collocated with PCEF or as a standalone entity.
  • the standalone solution aims at avoiding performance and scalability problems that may occur in a solution where the traffic detection is integrated in the same entity/gateway with the PCEF.
  • TDF Traffic Detection Function
  • Such conditions may occur for example when the AF does not have an interface to the PCRF (refer to the Rx interface between AF/P-CSCF and PCRF; P-CSCF: Proxy call session control function) or when there is no explicit service level signaling and hence no interaction between the Application Function (AF) and PCRF or when filters related to a service have not been installed in the PCEF .
  • the TDF indicates the start and stop of the detected services to the PCRF.
  • the PCRF provisions/modifies/deletes PCC rules for the detected service.
  • the use of the service traffic detection mechanism may be combined with privacy policies (as suggested in the draft TR 23.813 by 3GPP SA2 ) , i.e. the PCRF shall check upon an IP-CAN session establishment whether the use of the traffic
  • the PCRF then instructs the TDF on which services it should detect and report .
  • the PCC architecture has to be extended to include user privacy policies (e.g. the PCRF should check the subscription data in the SPR upon an internet protocol - connectivity access network (IP-CAN) session establishment, if the PCEF indicates the support of the traffic detection function) .
  • IP-CAN internet protocol - connectivity access network
  • Gx and Rx based interfaces are proposed in the TR 23.813 as candidates for the interface between the PCRF and TDF.
  • TDF and PCEF are collocated, the Gx based solution would be an extension to the current Gx interface/protocol and an Rx based solution would mean an extra Rx based protocol (in addition to Gx) between the TDF/PCEF and PCRF.
  • a standalone TDF would mean a new (possibly Gx or Rx based) protocol between the standalone TDF and PCRF.
  • the following enforcement actions may be applied to the traffic by the PCEF: a. Permit Unrestricted - the detected service/flow is allowed to continue without further policy action b. Block - the detected service / application flows are blocked (or the "gate is closed")
  • Shape - apply some regime of traffic shaping to the detected service / application flows (e.g. to bandwidth limit for P2P file sharing flows)
  • controlled address e.g. redirect to a top-up / service provisioning page. This may not be possible for all types of detected flows (e.g. this may only be performed on specific HTTP based flows) .
  • Such policy enforcement actions may be activated immediately at the TDF after the detection of a given service. Normally these enforcement actions are performed by the PCEF.
  • Some policy enforcement actions may be supported by two different network elements, such as PCEF/GW and TDF server, in particular when a standalone TDF is supported in a network.
  • Even the traffic and/or service detection may be supported by two different network elements (e.g. PCEF, TDF), the extent of the support possibly being different, i.e. one network element being capable of
  • service set 1 detecting certain services
  • service set 2 the other network element being capable of detecting another set of services
  • service set 2 possibly at least partly different and partly the same as the services of service set 1.
  • any capability may be supported by one or more than one network element in a communication system.
  • overlapping capabilities should not be activated in two entities of a communication system.
  • an apparatus comprising enforcement means having an own capability to enforce a policy for a service, and/or to detect a traffic, and/or to detect the service in a
  • the determining means may be configured not to activate the own capability if it corresponds to the capability to be controlled.
  • the determining means may be configured to determine to activate the own capability for the service if the own capability corresponds to the capability to be controlled .
  • the apparatus may further comprise providing means configured to provide an information about the own capability to the steering apparatus.
  • an apparatus comprising control means configured to control a policy for a service in a communication system; first control information preparing means configured to prepare a first control information about a drain capability to be controlled for enforcing the policy and/or for
  • the apparatus may further comprise detecting means configured to detect that a request for a source call control of the service is received from the source apparatus and a request for a drain call control of the service is received from the drain apparatus; and the first control information preparing means may be configured to prepare the first control
  • the first control information preparing means may be configured to prepare the first control
  • the source capability information such that it depends on whether or not the source capability information corresponds to a drain capability information received from the drain apparatus.
  • the apparatus may further comprise second control information preparing means configured to prepare, a second control information about a source capability to be controlled for enforcing the policy, wherein the second control information is based on the drain capability information; and second providing means configured to provide, to the source
  • the second control information preparing means may be configured to prepare the second control information such that it depends on whether or not the drain capability information corresponds to the source capability information .
  • the first control information preparing means may be configured to prepare the first control information additionally based on at least one of a relative priority between the source apparatus and the drain
  • the first control information may comprise an instruction to activate the drain capability to be
  • a method comprising enforcing, by an own
  • the method may be an enforcing method. In the method, it may be determined not to activate the own capability if it corresponds to the capability to be
  • the method may further comprise providing an information about the own capability to the steering apparatus.
  • a method comprising controlling a policy for a service in a communication system and/or detecting a traffic and/or detecting the service; preparing a first control information about a drain capability to be controlled for enforcing the policy, wherein the first control information is based on a source capability information received from a source apparatus; and providing, to a drain apparatus, the first control information, wherein the source apparatus is different from the drain apparatus.
  • the method may be a controlling method.
  • the method may further comprise detecting that a request for a source call control of the service is received from the source apparatus and a request for a drain call control of the service is received from the drain apparatus; and the first control information may be prepared only, if it is detected that both the request for the drain call control and the request for the source call control are received.
  • the first control information may be prepared such that it depends on whether or not the source capability information corresponds to a drain capability information received from the drain apparatus.
  • the method may further comprise preparing a second control information about a source capability to be controlled for enforcing the policy, wherein the second control information is based on the drain capability information; and providing, to the source apparatus, the second control information.
  • the second control information may be prepared such that it depends on whether or not the drain capability information corresponds to the source capability information.
  • the first control information may be prepared additionally based on at least one of a relative priority between the source apparatus and the drain apparatus, and/or a user profile of a user accessing the service.
  • the first control information may comprise an instruction to activate the drain capability to be
  • a computer program product comprising computer- executable components which perform, when the program is run on a computer, the execution of which result in operations of the method according to any of the seventh and eighth aspect.
  • the computer program product may be embodied as a computer- readable storage medium.
  • an apparatus comprising enforcement processor having an own capability to enforce a policy for a service, and/or to detect a traffic, and/or to detect the service in a communication system; determining processor configured to determine, based on the own capability and a control
  • the determining processor may be configured not to activate the own capability if it corresponds to the capability to be controlled. In the apparatus, the determining processor may be configured to determine to activate the own capability for the service if the own capability corresponds to the capability to be controlled.
  • the apparatus may further comprise providing processor configured to provide an information about the own capability to the steering apparatus.
  • an apparatus comprising control processor
  • first control information preparing processor configured to prepare a first control information about a drain capability to be controlled for enforcing the policy and/or for detecting a traffic and/or for detecting the service, wherein the first control information is based on a source capability information received from a source apparatus; and first providing processor configured to provide, to a drain apparatus, the first control information, wherein the source apparatus is different from the drain apparatus .
  • the apparatus may further comprise detecting processor configured to detect that a request for a source call control of the service is received from the source apparatus and a request for a drain call control of the service is received from the drain apparatus; and the first control information preparing processor may be configured to prepare the first control information only, if it is detected that both the request for the drain call control and the request for the source call control are received.
  • the first control information preparing processor may be configured to prepare the first control 1
  • the apparatus may further comprise second control information preparing processor configured to prepare, a second control information about a source capability to be controlled for enforcing the policy, wherein the second control information is based on the drain capability information; and second providing processor configured to provide, to the source apparatus, the second control information.
  • the second control information preparing processor may be configured to prepare the second control information such that it depends on whether or not the drain capability information corresponds to the source capability information .
  • the first control information preparing processor may be configured to prepare the first control information additionally based on at least one of a relative priority between the source apparatus and the drain
  • the first control information may comprise an instruction to activate the drain capability to be
  • a policy enforcement point comprising an apparatus according to the first or sixth aspect.
  • a policy control point comprising an apparatus according to the second or seventh aspect. 1
  • a system comprising a drain apparatus according to the first aspect or the sixth aspect; and the steering apparatus of the drain apparatus, wherein the steering apparatus has a source capability to enforce the policy for the service and/or to detect a traffic and/or to detect the service and is configured to provide, to the drain apparatus, the control information, and wherein the control information is related to the source capability.
  • a system comprising a control apparatus according to the second or seventh aspect; the drain apparatus of the control apparatus, and the source apparatus of the control apparatus, wherein the drain apparatus has a drain capability to enforce the policy for the service and/or to detect the traffic and/or to detect the service and is configured to activate the drain capability on response to the first control information, the source apparatus has a source capability to enforce the policy for the service and/or to detect a traffic and/or to detect the service and is
  • the control apparatus configured to provide, to the control apparatus, the source capability information, and the source capability information is related to the source capability.
  • Fig. 1 shows a PCC architecture according to 3GPP release 8 ;
  • Fig. 2 shows a first method according to an embodiment of the invention
  • Fig. 3 shows a second method according to an embodiment of the invention
  • Fig. 4 shows a third method according to an embodiment of the invention
  • Fig. 5 shows an enforcement apparatus according to an
  • Fig. 6 shows a control apparatus according to an embodiment of the invention
  • Fig. 7 shows a system according to an embodiment of the invention.
  • Fig. 8 shows another system according to an embodiment of the invention.
  • the apparatus is configured to perform the corresponding method, although in some cases only the apparatus or only the method are
  • PCEF and TDF indicate their capabilities, and based on these indications, it is decided which of PCEF and TDF activates a specific
  • PCEF and TDF may indicate their capabilities, such as policy enforcement, traffic and/or service detection etc., to the PCRF upon contacting the PCRF after the
  • Fig. 8 shows a first system according to an embodiment of the invention.
  • the system comprises a first enforcement apparatus 300, also called “source apparatus”, and a second enforcement apparatus 100 according to an embodiment of the invention, which is also called “drain apparatus”.
  • the methods are also called “source apparatus”.
  • PCEF enforcement apparatus 100
  • TDF enforcement apparatus 300
  • Fig. 2 shows a method according to an embodiment of the invention.
  • each TDF capability has priority over the corresponding one of the PCEF .
  • a UE establishes a default/primary context with the network for a given service as known in the prior art .
  • PCEF sends a request message (CC Request) to the PCRF to get informed about the policy to be applied to the service (and for the user, if the user specific policies are supported) .
  • the PCRF sends back CC answer (step 3) .
  • the CC request of the PCEF may or may not comprise information about PCEF ' s capabilities.
  • Steps 4 and 5 for the TDF correspond to steps 2 and 3 of the PCEF. However, different to step 2, in step 4 the TDF
  • steps 4 and 5 An alternative way for steps 4 and 5 is that the PCRF sends a request message to the TDF and the TDF indicates its capabilities in the answer message to the PCRF.
  • the PCRF informs the PCEF about the activated TDF ' s capabilities in a request message (RA request), which is answered in step 7.
  • the PCEF activates its own capabilities for the service.
  • the PCEF may deactivate all capabilities which are activated by the TDF, or may adapt the application of some of its capabilities such that they fit better to the activated TDF ' s capabilities. result of this embodiment, it is avoided that the same ility is applied twice to a service. Thus, the overall performance of the network is enhanced. In addition, it may be ensured that the applied capabilities of TDF and PCEF fit to each other.
  • Fig. 3 shows another method according to an embodiment of the invention. This method is quite similar to that of Fig. 2, however, some TDF capabilities may not have priority over corresponding PCEF capablities. In this embodiment, both PCEF and TDF indicate their
  • the PCRF may send the capabilities of the PCEF further to the TDF and the capabilities of the TDF further to the PCEF, either in a separate request /command or in an acknowledgement /reply to a request.
  • An alternative way for steps 4 and 5 is that the PCRF sends a request message indicating the PCEF capabilities to the TDF and the TDF indicates its capabilities in the answer message to the PCRF.
  • both the PCEF and the TDF support a same capability, either the PCEF or the TDF may determine which one
  • the priority/priorities may be indicated with the capability/capabilities in the negotiation message.
  • the PCRF may provide the priorities e.g. based on a predefined table or based on some other detection result such as the current traffic load or processor load on some entities, or a combination of such criteria.
  • the priorities may be defined in the PCEF and TDF.
  • the priorities may be defined in the PCEF and TDF.
  • the priorities may be defined in the PCEF and TDF.
  • the priorities may be defined in the PCEF and TDF.
  • the priorities may be defined in the PCEF and TDF.
  • the conditions can be locally determined by the PCEF and TDF, respectively.
  • one of the entities may inform the other one whether or not it will activate a capability with equal priorities. Such decision may be met based on predefined rules or based on some other - preferably local - conditions (e.g. traffic load or processor load), or a combination thereof.
  • the other entity then has to activate or deactivate the capability in response to this information.
  • the information may be send via the PCRF in further request message .
  • deactivation means undo the activation if the capability is activated, or not
  • the PCRF forwards the information about the capability of the TDF only if the PCRF detects that control requests for the same service are detected from both the PCEF and TDF.
  • the PCRF will reduce the load on PCEF and TDF and their links to PCRF, when no such forwarding takes place if 1 only one of the entities may be involved in the policy enforcement or traffic and/or service detection.
  • the PCRF is involved in negotiating which entity activates which capability.
  • the PCRF may not be involved in the negotiation.
  • the TDF may not be involved in the negotiation.
  • the TDF may not be involved in the negotiation.
  • PCEF capability information directly to the PCEF, and the PCEF decides which own capabilities to activate, based on the information received from the TDF.
  • the roles of PCEF and TDF in this scenario may be interchanged.
  • an interface between PCEF and TDF is required. Such an interface may be based e.g. on present Rx or Gx interfaces.
  • Fig. 7 shows a second system according to an embodiment of the invention.
  • the system comprises a control apparatus 200 such as a PCRF of an embodiment of the invention, and two enforcement apparatuses 300, 400, such as a PCEF and a TDF.
  • Enforcement apparatus 300 is also called “source apparatus”
  • enforcement apparatus 100 is also called “drain
  • a method as according to Fig. 4 may be performed.
  • PCEF enforcement apparatus 400
  • TDF enforcement apparatus 300
  • the roles of PCEF and TDF may be interchanged.
  • Fig. 4 shows a method according to another embodiment of the invention. Steps 1 to 5 correspond to the corresponding ones of Fig. 3, the PCEF and TDF indicating their capabilities to the PCRF.
  • an alternative way for steps 4 and 5 is that the PCRF sends a request message to the TDF and the TDF indicates its capabilities in the answer message to the PCRF.
  • step 6 which is preferably only performed if the PCRF receives CC requests from both the PCEF and the TDF, the PCRF decides which of PCEF and TDF shall apply which capability. That is, the PCRF decides on a set A of
  • the decision may be based on predefined tables or on actual conditions such as traffic load or processor load, or a combination thereof.
  • the PCRF determines which one applies/activates the capability that is supported by both the PCEF and TDF.
  • the PCRF sends the capability activation instructions to the PCEF and TDF, either in a separate request /command (as in Fig. 4) or in an acknowledgement /reply to a request.
  • the capability negotiation/indication may also indicate that a certain capability is not supported by an entity and should be supported by the other entity, or that a certain
  • capability is supported to a certain extent (e.g. certain shaping measures, or traffic detection or detection of certain services) and the entity having a better support should apply/activate the capability or should apply/activate 1 the parts of the capability not supported by the other entity .
  • a certain extent e.g. certain shaping measures, or traffic detection or detection of certain services
  • Fig. 5 shows an enforcement apparatus 100 according to an embodiment of the invention.
  • the enforcement apparatus may be a drain apparatus.
  • the enforcement apparatus may comprise a PCEF or TDF
  • enforcement means 10 which has an own capability to enforce a policy for a service in the
  • the determining means 20 is configured to determine whether or not the own capability has to be activated for a service and, where applicable, for a given user. A default/primary context with the enforcement apparatus may have been
  • the determining is met based on received information on a capability to be controlled for enforcing the policy.
  • the received information may only comprise an indication, and based on the indication and - in addition - on the own capabilities of the enforcement apparatus, the determining means may decide which own capabilities to activate and which not. More precisely, in an embodiment, the indication may comprise information on a capability supported for that service by another apparatus different from the enforcement apparatus. In this case, if the capability supported by the other apparatus corresponds to the own capability, the determining means may determine to deactivate its corresponding own capability. On the other hand, if the two capabilities do not correspond to each other, the
  • determining means may determine to activate the own capability or the parts of the capability not supported by the other entity.
  • the received information may comprise instructions, which own capabilities are to be activated and/or deactivated by the apparatus.
  • the apparatus may comprise instructions, which own capabilities are to be activated and/or deactivated by the apparatus.
  • the activating means 30 is configured to activate the own capability if activating is determined by the determining means and/or to deactivate the own capability if deactivating is determined by the determining means.
  • Fig. 6 shows a control apparatus 200 according to an
  • the control means 50 is configured to control a policy for a service and, where applicable, for a user.
  • the control means 50 may comprise a policy and charging rules function.
  • the first control information preparing means 60 is
  • control information is based on a capability information received from the source apparatus .
  • the control information may comprise the
  • control apparatus may leave the decision to the drain
  • preparing means 60 may determine which capabilities are supported by the source apparatus, and prepare a control information indicating a capability which the drain apparatus should activate or deactivate. Also, the control information may comprise instructions to activate a capability with certain restrictions or modifications. By the first providing means 70, the control information is provided to the drain apparatus.
  • the control apparatus may comprise a detecting means
  • TDF and PCEF in general: from a source apparatus and a drain apparatus different from each other
  • activation of some capabilities is decided by an enforcement point such as PCEF, TDF, according to a system shown in Fig. 8, and activation of other capabilities is decided by a control point such as a PCRF, as according to a system shown in Fig. 7.
  • an enforcement point such as PCEF, TDF, according to a system shown in Fig. 8
  • activation of other capabilities is decided by a control point such as a PCRF, as according to a system shown in Fig. 7.
  • exemplary embodiments of the present invention provide, for example an enforcement means such as a PCEF or a TDF, or a component thereof, an apparatus embodying the same, a method for controlling and/or operating the same, and computer program(s) controlling and/or operating the same as well as mediums carrying such computer program(s) and forming computer program product (s).
  • an enforcement means such as a PCEF or a TDF, or a component thereof
  • computer program(s) controlling and/or operating the same as well as mediums carrying such computer program(s) and forming computer program product (s).
  • exemplary embodiments of the present invention provide, for example a policy control function such as a PCRF, or a component thereof, an apparatus embodying the same, a method for controlling and/or operating the same, and computer program(s) controlling and/or
  • apparatuses, systems, techniques or methods include, as non 5 limiting examples, implementations as hardware, software, firmware, special purpose circuits or logic, general purpose hardware or controller or other computing devices, or some combination thereof.

Abstract

It is provided an apparatus, comprising enforcement means having an own capability to enforce a policy for a service, and/or to detect a traffic, and/or to detect the service in a communication system; determining means configured to determine, based on the own capability and a control information on a capability to be controlled for enforcing the policy and/or for detecting the traffic and/or for detecting the service, whether the own capability is to be activated, wherein the control information is received from a steering apparatus; and activating means configured to activate the own capability for the service depending on the determination by the determining means.

Description

Capability negotiation and control
Field of the invention The present invention relates to an apparatus, a method, a system, and a computer program product related to capability negotiation and control. More particularly, the present invention relates to an apparatus, a method, a system, and a computer program product for capability negotiation and control with respect to policy charging and control.
Background of the invention
The Evolved Packet System (EPS) is known by the brand name long term evolution (LTE) network. It comprises the E-UTRAN Radio Access network and the Evolved Packet Core (EPC) . The 3rd generation partnership program (3GPP) is in the process of defining enhancements to the evolved packet system. Policy and Charging Control (PCC) has a key role in the way users' services are handled. It provides a way to manage the service related connections in a consistent and controlled way. It determines e.g. how bearer resources are allocated for a given service, and quality of service (QoS)
characteristics of the bearers. The parameters may be set dynamically for each service and even each user separately. For details of the PCC for 3GPP release 8, see 3GPP technical specification (TS) 23.203. Fig. 1 shows the PCC functions and interfaces in one
operator's network of 3GPP release 8 (taken from H. Holma and A. Toskalla, "LTE for UMTS", John Wiley & Sons, (2009)). A user equipment (UE) signals a request for a service in the Service Layer, and the application function (AF) residing in that layer contacts the Policy and Charging Rules Function (PCRF) for appropriate bearer resources via the Rx interface. The PCRF is in charge of meeting decisions on what PCC to use for the service. If subscriber specific policies are used, the PCRF may enquire the subscriber related policies from the subscription profile repository (SPR) via the Sp interface. The packet data network gateway (P-GW) comprises e.g. the Policy and Charging Enforcement Function (PCEF) . The PCRF pushes the PCC rules to the PCEF via the Gx interface. The PCEF is responsible for enforcing the PCC rules, e.g. setting up the corresponding dedicated bearers, modifying the
existing bearers, ensuring that only authorized service flows are allowed, and QoS limits are not exceeded.
3GPP SA2 has a Rel-10 study item on "Policy solutions and enhancements" . Studied items are documented in technical report TR 23.813. Key issue 4 "Service Awareness and Privacy Policies" of the study deals with the traffic detection for policy and charging control purposes. The traffic detection functionality may be implemented either as collocated with PCEF or as a standalone entity. The standalone solution aims at avoiding performance and scalability problems that may occur in a solution where the traffic detection is integrated in the same entity/gateway with the PCEF.
When there is no interaction between the application function AF and PCRF, the network may not be aware of the usage of such services by the UE even though the network may have defined policies related to the services. User experience can be enhanced, if the network becomes aware of such services and the network is able to apply service specific policies. Traffic Detection Function (TDF) , based on deep packet inspection, can be applied in a network to support policy and charging control (by PCRF) for services for which the PCRF does not get related service information from an AF/P-CSCF. Such conditions may occur for example when the AF does not have an interface to the PCRF (refer to the Rx interface between AF/P-CSCF and PCRF; P-CSCF: Proxy call session control function) or when there is no explicit service level signaling and hence no interaction between the Application Function (AF) and PCRF or when filters related to a service have not been installed in the PCEF .
The TDF indicates the start and stop of the detected services to the PCRF. The PCRF provisions/modifies/deletes PCC rules for the detected service.
The use of the service traffic detection mechanism may be combined with privacy policies (as suggested in the draft TR 23.813 by 3GPP SA2 ) , i.e. the PCRF shall check upon an IP-CAN session establishment whether the use of the traffic
detection mechanism is allowed for a given user, and if yes, which services shall be monitored and detected. The PCRF then instructs the TDF on which services it should detect and report .
Furthermore, the use of the service traffic detection
mechanism, in particular if combined with privacy policies, may require user/subscriber consent, and for this purpose the PCC architecture has to be extended to include user privacy policies (e.g. the PCRF should check the subscription data in the SPR upon an internet protocol - connectivity access network (IP-CAN) session establishment, if the PCEF indicates the support of the traffic detection function) . Gx and Rx based interfaces are proposed in the TR 23.813 as candidates for the interface between the PCRF and TDF. When TDF and PCEF are collocated, the Gx based solution would be an extension to the current Gx interface/protocol and an Rx based solution would mean an extra Rx based protocol (in addition to Gx) between the TDF/PCEF and PCRF. A standalone TDF would mean a new (possibly Gx or Rx based) protocol between the standalone TDF and PCRF.
For example, according to 3GPP technical report (TR) 23.813 vO.3.0, the following enforcement actions may be applied to the traffic by the PCEF: a. Permit Unrestricted - the detected service/flow is allowed to continue without further policy action b. Block - the detected service / application flows are blocked (or the "gate is closed")
c. Shape - apply some regime of traffic shaping to the detected service / application flows (e.g. to bandwidth limit for P2P file sharing flows)
d. Redirection - Redirect detected flows to another
controlled address (e.g. redirect to a top-up / service provisioning page) . This may not be possible for all types of detected flows (e.g. this may only be performed on specific HTTP based flows) .
Such policy enforcement actions (e.g. gating, shaping, redirection) may be activated immediately at the TDF after the detection of a given service. Normally these enforcement actions are performed by the PCEF.
In the context of this application, the ability to perform such and other related enforcement actions are named
capabilities . Summary of the invention
It is an object of the present invention to improve the prior art .
In particular, by the present invention, a solution to some problems related to distributed policy enforcement is provided .
More in detail, some policy enforcement actions may be supported by two different network elements, such as PCEF/GW and TDF server, in particular when a standalone TDF is supported in a network. Even the traffic and/or service detection may be supported by two different network elements (e.g. PCEF, TDF), the extent of the support possibly being different, i.e. one network element being capable of
detecting certain services (= service set 1) and the other network element being capable of detecting another set of services (= service set 2) possibly at least partly different and partly the same as the services of service set 1. In future practically any capability may be supported by one or more than one network element in a communication system. In order to optimize performance and scalability, overlapping capabilities should not be activated in two entities of a communication system.
However, there is no mechanism between e.g. the PCEF and TDF on how to agree on which actions are performed, i.e. which capabilities are applied/activated, by the one and the other entity . According to a first aspect of the invention, there is provided an apparatus, comprising enforcement means having an own capability to enforce a policy for a service, and/or to detect a traffic, and/or to detect the service in a
communication system; determining means configured to
determine, based on the own capability and a control
information on a capability to be controlled for enforcing the policy and/or for detecting the traffic and/or for detecting the service, whether the own capability is to be activated, wherein the control information is received from a steering apparatus; and activating means configured to activate the own capability for the service depending on the determination by the determining means. In the apparatus, the determining means may be configured not to activate the own capability if it corresponds to the capability to be controlled.
In the apparatus, the determining means may be configured to determine to activate the own capability for the service if the own capability corresponds to the capability to be controlled .
The apparatus may further comprise providing means configured to provide an information about the own capability to the steering apparatus.
According to a second aspect of the invention, there is provided an apparatus, comprising control means configured to control a policy for a service in a communication system; first control information preparing means configured to prepare a first control information about a drain capability to be controlled for enforcing the policy and/or for
detecting a traffic and/or for detecting the service, wherein the first control information is based on a source capability information received from a source apparatus; and first providing means configured to provide, to a drain apparatus, the first control information, wherein the source apparatus is different from the drain apparatus. The apparatus may further comprise detecting means configured to detect that a request for a source call control of the service is received from the source apparatus and a request for a drain call control of the service is received from the drain apparatus; and the first control information preparing means may be configured to prepare the first control
information only, if it is detected that both the request for the drain call control and the request for the source call control are received. In the apparatus, the first control information preparing means may be configured to prepare the first control
information such that it depends on whether or not the source capability information corresponds to a drain capability information received from the drain apparatus.
The apparatus may further comprise second control information preparing means configured to prepare, a second control information about a source capability to be controlled for enforcing the policy, wherein the second control information is based on the drain capability information; and second providing means configured to provide, to the source
apparatus, the second control information.
In the apparatus, the second control information preparing means may be configured to prepare the second control information such that it depends on whether or not the drain capability information corresponds to the source capability information . In the apparatus, the first control information preparing means may be configured to prepare the first control information additionally based on at least one of a relative priority between the source apparatus and the drain
apparatus, and/or a user profile of a user accessing the service .
In the apparatus, the first control information may comprise an instruction to activate the drain capability to be
controlled . According to a third aspect of the invention, there is provided a method, comprising enforcing, by an own
capability, a policy for a service in a communication system and/or detecting a traffic and/or detecting the service;
determining, based on the own capability and a control information on a capability to be controlled for enforcing the policy and/or for detecting a traffic and/or for
detecting the service, whether the own capability is to be activated, wherein the control information is received from a steering apparatus; and activating the own capability for the service depending on the determination by the determining means .
The method may be an enforcing method. In the method, it may be determined not to activate the own capability if it corresponds to the capability to be
controlled .
In the method, it may be determined to activate the own capability for the service if the own capability corresponds to the capability to be controlled.
The method may further comprise providing an information about the own capability to the steering apparatus. According to an fourth aspect of the invention, there is provided a method, comprising controlling a policy for a service in a communication system and/or detecting a traffic and/or detecting the service; preparing a first control information about a drain capability to be controlled for enforcing the policy, wherein the first control information is based on a source capability information received from a source apparatus; and providing, to a drain apparatus, the first control information, wherein the source apparatus is different from the drain apparatus.
The method may be a controlling method.
The method may further comprise detecting that a request for a source call control of the service is received from the source apparatus and a request for a drain call control of the service is received from the drain apparatus; and the first control information may be prepared only, if it is detected that both the request for the drain call control and the request for the source call control are received.
In the method, the first control information may be prepared such that it depends on whether or not the source capability information corresponds to a drain capability information received from the drain apparatus.
The method may further comprise preparing a second control information about a source capability to be controlled for enforcing the policy, wherein the second control information is based on the drain capability information; and providing, to the source apparatus, the second control information.
In the method, the second control information may be prepared such that it depends on whether or not the drain capability information corresponds to the source capability information. 1
In the method, the first control information may be prepared additionally based on at least one of a relative priority between the source apparatus and the drain apparatus, and/or a user profile of a user accessing the service.
In the method, the first control information may comprise an instruction to activate the drain capability to be
controlled . According to a fifth aspect of the invention, there is provided a computer program product comprising computer- executable components which perform, when the program is run on a computer, the execution of which result in operations of the method according to any of the seventh and eighth aspect.
The computer program product may be embodied as a computer- readable storage medium.
According to a sixth aspect of the invention, there is provided an apparatus, comprising enforcement processor having an own capability to enforce a policy for a service, and/or to detect a traffic, and/or to detect the service in a communication system; determining processor configured to determine, based on the own capability and a control
information on a capability to be controlled for enforcing the policy and/or for detecting the traffic and/or for detecting the service, whether the own capability is to be activated, wherein the control information is received from a steering apparatus; and activating processor configured to activate the own capability for the service depending on the determination by the determining means.
In the apparatus, the determining processor may be configured not to activate the own capability if it corresponds to the capability to be controlled. In the apparatus, the determining processor may be configured to determine to activate the own capability for the service if the own capability corresponds to the capability to be controlled.
The apparatus may further comprise providing processor configured to provide an information about the own capability to the steering apparatus.
According to a seventh aspect of the invention, there is provided an apparatus, comprising control processor
configured to control a policy for a service in a
communication system; first control information preparing processor configured to prepare a first control information about a drain capability to be controlled for enforcing the policy and/or for detecting a traffic and/or for detecting the service, wherein the first control information is based on a source capability information received from a source apparatus; and first providing processor configured to provide, to a drain apparatus, the first control information, wherein the source apparatus is different from the drain apparatus . The apparatus may further comprise detecting processor configured to detect that a request for a source call control of the service is received from the source apparatus and a request for a drain call control of the service is received from the drain apparatus; and the first control information preparing processor may be configured to prepare the first control information only, if it is detected that both the request for the drain call control and the request for the source call control are received. In the apparatus, the first control information preparing processor may be configured to prepare the first control 1
information such that it depends on whether or not the source capability information corresponds to a drain capability information received from the drain apparatus. The apparatus may further comprise second control information preparing processor configured to prepare, a second control information about a source capability to be controlled for enforcing the policy, wherein the second control information is based on the drain capability information; and second providing processor configured to provide, to the source apparatus, the second control information.
In the apparatus, the second control information preparing processor may be configured to prepare the second control information such that it depends on whether or not the drain capability information corresponds to the source capability information .
In the apparatus, the first control information preparing processor may be configured to prepare the first control information additionally based on at least one of a relative priority between the source apparatus and the drain
apparatus, and/or a user profile of a user accessing the service .
In the apparatus, the first control information may comprise an instruction to activate the drain capability to be
controlled . According to an eighth aspect of the invention, there is provided a policy enforcement point, comprising an apparatus according to the first or sixth aspect.
According to a ninth aspect of the invention, there is provided a policy control point, comprising an apparatus according to the second or seventh aspect. 1
According to a tenth aspect of the invention, there is provided a system, comprising a drain apparatus according to the first aspect or the sixth aspect; and the steering apparatus of the drain apparatus, wherein the steering apparatus has a source capability to enforce the policy for the service and/or to detect a traffic and/or to detect the service and is configured to provide, to the drain apparatus, the control information, and wherein the control information is related to the source capability.
According to an eleventh aspect of the invention, there is provided a system, comprising a control apparatus according to the second or seventh aspect; the drain apparatus of the control apparatus, and the source apparatus of the control apparatus, wherein the drain apparatus has a drain capability to enforce the policy for the service and/or to detect the traffic and/or to detect the service and is configured to activate the drain capability on response to the first control information, the source apparatus has a source capability to enforce the policy for the service and/or to detect a traffic and/or to detect the service and is
configured to provide, to the control apparatus, the source capability information, and the source capability information is related to the source capability.
It is to be understood that any of the above modifications can be applied singly or in combination to the respective aspects to which they refer, unless they are explicitly stated as excluding alternatives.
Brief description of the drawings
Further details, features, objects, and advantages are apparent from the following detailed description of the preferred embodiments of the present invention which is to be taken in conjunction with the appended drawings, wherein
Fig. 1 shows a PCC architecture according to 3GPP release 8 ;
Fig. 2 shows a first method according to an embodiment of the invention;
Fig. 3 shows a second method according to an embodiment of the invention;
Fig. 4 shows a third method according to an embodiment of the invention; Fig. 5 shows an enforcement apparatus according to an
embodiment of the invention;
Fig. 6 shows a control apparatus according to an embodiment of the invention;
Fig. 7 shows a system according to an embodiment of the invention; and
Fig. 8 shows another system according to an embodiment of the invention.
Detailed description of certain embodiments
Herein below, certain embodiments of the present invention are described in detail with reference to the accompanying drawings, wherein the features of the embodiments can be freely combined with each other unless otherwise described. However, it is to be expressly understood that the
description of certain embodiments is given for by way of example only, and that it is by no way intended to be
understood as limiting the invention to the disclosed
details . Moreover, it is to be understood that the apparatus is configured to perform the corresponding method, although in some cases only the apparatus or only the method are
described . In some embodiments of the invention, PCEF and TDF indicate their capabilities, and based on these indications, it is decided which of PCEF and TDF activates a specific
capability . For example, PCEF and TDF may indicate their capabilities, such as policy enforcement, traffic and/or service detection etc., to the PCRF upon contacting the PCRF after the
default/primary context establishment between the UE and the network .
Fig. 8 shows a first system according to an embodiment of the invention. The system comprises a first enforcement apparatus 300, also called "source apparatus", and a second enforcement apparatus 100 according to an embodiment of the invention, which is also called "drain apparatus". The methods
corresponding to those of Figs. 2 and 3 without involvement of the PCRF as explained below may be performed in this system. In the following, it is assumed that PCEF is enforcement apparatus 100, and TDF is enforcement apparatus 300, but the roles of PCEF and TDF may be interchanged. 1
Fig. 2 shows a method according to an embodiment of the invention. In this embodiment, each TDF capability has priority over the corresponding one of the PCEF . According to step 1, a UE establishes a default/primary context with the network for a given service as known in the prior art .
In step 2, PCEF sends a request message (CC Request) to the PCRF to get informed about the policy to be applied to the service (and for the user, if the user specific policies are supported) . The PCRF sends back CC answer (step 3) . The CC request of the PCEF may or may not comprise information about PCEF ' s capabilities.
Steps 4 and 5 for the TDF correspond to steps 2 and 3 of the PCEF. However, different to step 2, in step 4 the TDF
indicates its capabilities which the TDF intends to apply to the service. Thus, the PCRF is aware of them. An alternative way for steps 4 and 5 is that the PCRF sends a request message to the TDF and the TDF indicates its capabilities in the answer message to the PCRF.
In step 6, the PCRF informs the PCEF about the activated TDF ' s capabilities in a request message (RA request), which is answered in step 7. Based on the information about the activated TDF ' s capabilities, the PCEF activates its own capabilities for the service. For example, the PCEF may deactivate all capabilities which are activated by the TDF, or may adapt the application of some of its capabilities such that they fit better to the activated TDF ' s capabilities. result of this embodiment, it is avoided that the same ility is applied twice to a service. Thus, the overall performance of the network is enhanced. In addition, it may be ensured that the applied capabilities of TDF and PCEF fit to each other. Fig. 3 shows another method according to an embodiment of the invention. This method is quite similar to that of Fig. 2, however, some TDF capabilities may not have priority over corresponding PCEF capablities. In this embodiment, both PCEF and TDF indicate their
capabilities to the PCRF (steps 2 and 4), which may forward them to the respective other entity (steps 5 and 6 or steps 5 and 8) . In detail, the PCRF may send the capabilities of the PCEF further to the TDF and the capabilities of the TDF further to the PCEF, either in a separate request /command or in an acknowledgement /reply to a request. An alternative way for steps 4 and 5 is that the PCRF sends a request message indicating the PCEF capabilities to the TDF and the TDF indicates its capabilities in the answer message to the PCRF.
If both the PCEF and the TDF support a same capability, either the PCEF or the TDF may determine which one
applies/activates the capability that is supported by both the PCEF and TDF. That is, either the PCEF or the TDF may have a higher priority for a given capability.
In some embodiments, the priority/priorities may be indicated with the capability/capabilities in the negotiation message. For example, the PCRF may provide the priorities e.g. based on a predefined table or based on some other detection result such as the current traffic load or processor load on some entities, or a combination of such criteria. 1
In some other embodiments, the priorities may be defined in the PCEF and TDF. For example, the priorities may be
predefined in respective tables in the PCEF and TDF, or be determined based on some actual conditions (e.g. traffic load or processor load), or a combination thereof, respectively. Preferably, the conditions can be locally determined by the PCEF and TDF, respectively.
In this case, if the priorities are the same for a given capability in the PCEF and TDF, there may be a predefined rule that one of PCEF and TDF has prevalence over the other for equal priorities. That is, for a capability with same priority in PCEF and TDF, it is determined in advance, which of the entities will activate the capability and which not.
Alternatively or in addition, one of the entities may inform the other one whether or not it will activate a capability with equal priorities. Such decision may be met based on predefined rules or based on some other - preferably local - conditions (e.g. traffic load or processor load), or a combination thereof. The other entity then has to activate or deactivate the capability in response to this information. The information may be send via the PCRF in further request message .
In the context of this application, deactivation means undo the activation if the capability is activated, or not
activating the capability if it is not activated yet. Preferably, the PCRF forwards the information about the capability of the TDF only if the PCRF detects that control requests for the same service are detected from both the PCEF and TDF. Thus, it will reduce the load on PCEF and TDF and their links to PCRF, when no such forwarding takes place if 1 only one of the entities may be involved in the policy enforcement or traffic and/or service detection.
In the scenarios outlined hereinabove, the PCRF is involved in negotiating which entity activates which capability.
However, according to some embodiments, similar to those described with respect to Figs. 2 and 3, the PCRF may not be involved in the negotiation. For example, the TDF may
activate all its relevant capabilities and send its
capability information directly to the PCEF, and the PCEF decides which own capabilities to activate, based on the information received from the TDF. In another embodiment, the roles of PCEF and TDF in this scenario may be interchanged. In these scenarios, an interface between PCEF and TDF is required. Such an interface may be based e.g. on present Rx or Gx interfaces.
While such scenarios may reduce the load of the PCRF, on the other side, involving the PCRF might reduce the load on PCEF and TDF because the PCRF may filter out those request
messages where only one of PCEF and TDF is involved and, therefore, no decision on the entity to activate a capability is to be met. Fig. 7 shows a second system according to an embodiment of the invention. The system comprises a control apparatus 200 such as a PCRF of an embodiment of the invention, and two enforcement apparatuses 300, 400, such as a PCEF and a TDF. Enforcement apparatus 300 is also called "source apparatus", and enforcement apparatus 100 is also called "drain
apparatus". In the second system, a method as according to Fig. 4 may be performed. In the following, it is assumed that PCEF is enforcement apparatus 400, and TDF is enforcement apparatus 300, but the roles of PCEF and TDF may be interchanged. Fig. 4 shows a method according to another embodiment of the invention. Steps 1 to 5 correspond to the corresponding ones of Fig. 3, the PCEF and TDF indicating their capabilities to the PCRF. Here again, an alternative way for steps 4 and 5 is that the PCRF sends a request message to the TDF and the TDF indicates its capabilities in the answer message to the PCRF.
According to step 6, which is preferably only performed if the PCRF receives CC requests from both the PCEF and the TDF, the PCRF decides which of PCEF and TDF shall apply which capability. That is, the PCRF decides on a set A of
capabilities to be performed by the PCEF, and a set B of capabilities to be performed by the TDF. The decision may be based on predefined tables or on actual conditions such as traffic load or processor load, or a combination thereof.
If both the PCEF and the TDF support a same capability, the PCRF determines which one applies/activates the capability that is supported by both the PCEF and TDF.
The PCRF sends the capability activation instructions to the PCEF and TDF, either in a separate request /command (as in Fig. 4) or in an acknowledgement /reply to a request.
The capability negotiation/indication may also indicate that a certain capability is not supported by an entity and should be supported by the other entity, or that a certain
capability is supported to a certain extent (e.g. certain shaping measures, or traffic detection or detection of certain services) and the entity having a better support should apply/activate the capability or should apply/activate 1 the parts of the capability not supported by the other entity .
Fig. 5 shows an enforcement apparatus 100 according to an embodiment of the invention. In a system according to Fig. 7, the enforcement apparatus may be a drain apparatus.
The enforcement apparatus may comprise a PCEF or TDF
function, such as enforcement means 10, which has an own capability to enforce a policy for a service in the
communication network.
The determining means 20 is configured to determine whether or not the own capability has to be activated for a service and, where applicable, for a given user. A default/primary context with the enforcement apparatus may have been
established for this service. The determining is met based on received information on a capability to be controlled for enforcing the policy.
For example, the received information may only comprise an indication, and based on the indication and - in addition - on the own capabilities of the enforcement apparatus, the determining means may decide which own capabilities to activate and which not. More precisely, in an embodiment, the indication may comprise information on a capability supported for that service by another apparatus different from the enforcement apparatus. In this case, if the capability supported by the other apparatus corresponds to the own capability, the determining means may determine to deactivate its corresponding own capability. On the other hand, if the two capabilities do not correspond to each other, the
determining means may determine to activate the own capability or the parts of the capability not supported by the other entity.
In other embodiments, the received information may comprise instructions, which own capabilities are to be activated and/or deactivated by the apparatus. In this case,
determining means reading and processing the instructions, such that the activating means 30 is correspondingly
instructed to activate or deactivate the capability.
The activating means 30 is configured to activate the own capability if activating is determined by the determining means and/or to deactivate the own capability if deactivating is determined by the determining means.
Fig. 6 shows a control apparatus 200 according to an
embodiment of the invention.
The control means 50 is configured to control a policy for a service and, where applicable, for a user. The control means 50 may comprise a policy and charging rules function.
The first control information preparing means 60 is
configured to prepare a control information. With the control information, the drain apparatus will get an indication what capabilities to activate or not. The control information is based on a capability information received from the source apparatus . For example, the control information may comprise the
capability information of the source apparatus. Thus, the control apparatus may leave the decision to the drain
apparatus whether or not to activate a capability in the drain apparatus . In another embodiment, the first control information
preparing means 60 may determine which capabilities are supported by the source apparatus, and prepare a control information indicating a capability which the drain apparatus should activate or deactivate. Also, the control information may comprise instructions to activate a capability with certain restrictions or modifications. By the first providing means 70, the control information is provided to the drain apparatus.
The control apparatus may comprise a detecting means
configured to detect whether a request for a control for a service and, where applicable, for a user is received from two different enforcement apparatuses, such as TDF and PCEF (in general: from a source apparatus and a drain apparatus different from each other) . Thus, the load on the enforcement apparatuses may be reduced.
In some embodiments of the invention, activation of some capabilities is decided by an enforcement point such as PCEF, TDF, according to a system shown in Fig. 8, and activation of other capabilities is decided by a control point such as a PCRF, as according to a system shown in Fig. 7.
Note that the operable connections shown in the Figures are functional connections. Physical connections on which the functional connections rely may differ from the latter.
Furthermore, if not otherwise stated or otherwise made clear from the context, the statement that two entities are
different means that they are differently addressed in the communication network. It does not necessarily mean that they are based on different hardware. That is, each of PCEF, TDF and PCRF may be based on a different hardware, or some or all of the entities may be based on the same hardware. Some embodiments are described with respect to an LTE network hereinabove. However, embodiments of the invention are not limited to LTE networks, and may be implemented in other communication systems including fixed and mobile
communication systems of different standards, too.
Furthermore, in some embodiments, instead of PCEF and/or TDF, other enforcement points may be implemented. Instead of PCRF, other control points may be used. According to the above description, it should thus be
apparent that exemplary embodiments of the present invention provide, for example an enforcement means such as a PCEF or a TDF, or a component thereof, an apparatus embodying the same, a method for controlling and/or operating the same, and computer program(s) controlling and/or operating the same as well as mediums carrying such computer program(s) and forming computer program product (s). Further exemplary embodiments of the present invention provide, for example a policy control function such as a PCRF, or a component thereof, an apparatus embodying the same, a method for controlling and/or operating the same, and computer program(s) controlling and/or
operating the same as well as mediums carrying such computer program(s) and forming computer program product (s)
controlling and/or operating the same as well as mediums carrying such computer program(s) and forming computer program product (s) .
Implementations of any of the above described blocks,
apparatuses, systems, techniques or methods include, as non 5 limiting examples, implementations as hardware, software, firmware, special purpose circuits or logic, general purpose hardware or controller or other computing devices, or some combination thereof.
It is to be understood that what is described above is what is presently considered the preferred embodiments of the present invention. However, it should be noted that the description of the preferred embodiments is given by way of example only and that various modifications may be made without departing from the scope of the invention as defined by the appended claims.

Claims

Claims
1. Apparatus, comprising
enforcement means having an own capability to enforce a policy for a service, and/or to detect a traffic, and/or to detect the service in a communication system;
determining means configured to determine, based on the own capability and a control information on a capability to be controlled for enforcing the policy and/or for detecting the traffic and/or for detecting the service, whether the own capability is to be activated, wherein the control
information is received from a steering apparatus; and
activating means configured to activate the own
capability for the service depending on the determination by the determining means .
2. The apparatus according to claim 1, wherein
the determining means is configured not to activate the own capability if it corresponds to the capability to be controlled .
3. The apparatus according to claim 1, wherein
the determining means is configured to determine to activate the own capability for the service if the own capability corresponds to the capability to be controlled.
4. The apparatus according to any of claims 1 to 3, further comprising
providing means configured to provide an information about the own capability to the steering apparatus.
5. Policy enforcement point, comprising an apparatus
according to any of claims 1 to 4.
6. Apparatus, comprising control means configured to control a policy for a service in a communication system;
first control information preparing means configured to prepare a first control information about a drain capability to be controlled for enforcing the policy and/or for
detecting a traffic and/or for detecting the service, wherein the first control information is based on a source capability information received from a source apparatus; and
first providing means configured to provide, to a drain apparatus, the first control information, wherein the source apparatus is different from the drain apparatus.
7. The apparatus according to claim 6, further comprising
detecting means configured to detect that a request for a source call control of the service is received from the source apparatus and a request for a drain call control of the service is received from the drain apparatus; and wherein the first control information preparing means is
configured to prepare the first control information only, if it is detected that both the request for the drain call control and the request for the source call control are received .
8. The apparatus according to any of claims 6 and 7, wherein the first control information preparing means is configured to prepare the first control information such that it depends on whether or not the source capability information
corresponds to a drain capability information received from the drain apparatus .
9. The apparatus according to claim 8, further comprising
second control information preparing means configured to prepare, a second control information about a source
capability to be controlled for enforcing the policy, wherein the second control information is based on the drain
capability information; and second providing means configured to provide, to the source apparatus, the second control information.
10. The apparatus according to claim 9, wherein the second control information preparing means is configured to prepare the second control information such that it depends on whether or not the drain capability information corresponds to the source capability information.
11. The apparatus according to any of claims 6 to 10, wherein the first control information preparing means is configured to prepare the first control information additionally based on at least one of a relative priority between the source apparatus and the drain apparatus, and/or a user profile of a user accessing the service.
12. The apparatus according to any of claims 6 to 11, wherein the first control information comprises an instruction to activate the drain capability to be controlled.
13. Policy control point, comprising an apparatus according to any of claims 6 to 12.
14. System, comprising
a drain apparatus according to any of claims 1 to 4; and the steering apparatus of the drain apparatus, wherein the steering apparatus has a source capability to enforce the policy for the service and/or to detect a traffic and/or to detect the service and is configured to provide, to the drain apparatus, the control information, and wherein
the control information is related to the source
capability .
15. System, comprising
a control apparatus according to any of claims 6 to 12; the drain apparatus of the control apparatus, and the source apparatus of the control apparatus, wherein the drain apparatus has a drain capability to enforce the policy for the service and/or to detect the traffic and/or to detect the service and is configured to activate the drain capability on response to the first control information,
the source apparatus has a source capability to enforce the policy for the service and/or to detect a traffic and/or to detect the service and is configured to provide, to the control apparatus, the source capability information, and
the source capability information is related to the source capability.
16. Method, comprising
enforcing, by an own capability, a policy for a service in a communication system and/or detecting a traffic and/or detecting the service;
determining, based on the own capability and a control information on a capability to be controlled for enforcing the policy and/or for detecting a traffic and/or for
detecting the service, whether the own capability is to be activated, wherein the control information is received from a steering apparatus; and
activating the own capability for the service depending on the determination by the determining means.
17. The method according to claim 16, wherein
it is determined not to activate the own capability if it corresponds to the capability to be controlled.
18. The method according to claim 16, wherein it is
determined to activate the own capability for the service if the own capability corresponds to the capability to be controlled .
19. The method according to any of claims 16 to 18, further comprising
providing an information about the own capability to the steering apparatus.
20. Method, comprising
controlling a policy for a service in a communication system and/or detecting a traffic and/or detecting the service ;
preparing a first control information about a drain capability to be controlled for enforcing the policy, wherein the first control information is based on a source capability information received from a source apparatus; and
providing, to a drain apparatus, the first control information, wherein the source apparatus is different from the drain apparatus .
21. The method according to claim 20, further comprising
detecting that a request for a source call control of the service is received from the source apparatus and a request for a drain call control of the service is received from the drain apparatus; and wherein
the first control information is prepared only, if it is detected that both the request for the drain call control and the request for the source call control are received.
22. The method according to any of claims 20 and 21, wherein the first control information is prepared such that it depends on whether or not the source capability information corresponds to a drain capability information received from the drain apparatus .
23. The method according to claim 22, further comprising
preparing a second control information about a source capability to be controlled for enforcing the policy, wherein the second control information is based on the drain
capability information; and
providing, to the source apparatus, the second control information .
24. The method according to claim 23, wherein the second control information is prepared such that it depends on whether or not the drain capability information corresponds to the source capability information.
25. The method according to any of claims 20 to 24, wherein the first control information is prepared additionally based on at least one of a relative priority between the source apparatus and the drain apparatus, and/or a user profile of a user accessing the service.
26. The method according to any of claims 20 to 25, wherein the first control information comprises an instruction to activate the drain capability to be controlled.
27. Computer program product comprising computer-executable components which perform, when the program is run on a computer, the execution of which result in operations of the method according to any of claims 16 to 26.
28. The computer program product according to claim 27, embodied as a computer-readable storage medium.
PCT/EP2010/064954 2010-10-06 2010-10-06 Capability negotiation and control WO2012045351A1 (en)

Priority Applications (5)

Application Number Priority Date Filing Date Title
EP10763684.7A EP2625897A1 (en) 2010-10-06 2010-10-06 Capability negotiation and control
PCT/EP2010/064954 WO2012045351A1 (en) 2010-10-06 2010-10-06 Capability negotiation and control
KR1020117030908A KR101492507B1 (en) 2010-10-06 2010-10-06 Capability negotiation and control
KR1020147010177A KR20140054453A (en) 2010-10-06 2010-10-06 Capability negotiation and control
US13/319,525 US9716629B2 (en) 2010-10-06 2010-10-06 Capability negotiation and control

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/EP2010/064954 WO2012045351A1 (en) 2010-10-06 2010-10-06 Capability negotiation and control

Publications (1)

Publication Number Publication Date
WO2012045351A1 true WO2012045351A1 (en) 2012-04-12

Family

ID=43126972

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/EP2010/064954 WO2012045351A1 (en) 2010-10-06 2010-10-06 Capability negotiation and control

Country Status (4)

Country Link
US (1) US9716629B2 (en)
EP (1) EP2625897A1 (en)
KR (2) KR101492507B1 (en)
WO (1) WO2012045351A1 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2014173252A1 (en) * 2013-07-26 2014-10-30 中兴通讯股份有限公司 Session management method, application function entity, policy server and protocol converter
US10574833B2 (en) 2015-02-26 2020-02-25 Nokia Solutions And Networks Oy Charging and control of edge services

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9301207B2 (en) * 2010-11-05 2016-03-29 Telefonaktiebolaget L M Ericsson (Publ) Quality of service control
WO2013037421A1 (en) * 2011-09-16 2013-03-21 Telefonaktiebolaget L M Ericsson (Publ) Method and apparatuses for tdf session establishment
WO2013139806A1 (en) * 2012-03-19 2013-09-26 Nec Europe Ltd. A method for operating a network and a network
US10154151B2 (en) * 2012-07-19 2018-12-11 Telefonaktiebolaget Lm Ericsson (Publ) Methods and apparatus for implementing policy and charging control
EP2991400A4 (en) * 2013-05-30 2016-05-18 Huawei Tech Co Ltd Data transmission control method and device based on wireless communication network
WO2016034192A1 (en) * 2014-09-01 2016-03-10 Nokia Solutions And Networks Oy Application control interworking in network

Family Cites Families (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7653401B2 (en) 2002-07-25 2010-01-26 Hai Qu Filtering of broadcast SMS messages
US20090207790A1 (en) 2005-10-27 2009-08-20 Qualcomm Incorporated Method and apparatus for settingtuneawaystatus in an open state in wireless communication system
WO2007142565A1 (en) * 2006-06-02 2007-12-13 Telefonaktiebolaget Lm Ericsson (Publ) Devices and method for guaranteeing quality of service per service data flow through the bearer layer
CN101291233B (en) * 2007-04-20 2011-04-20 华为技术有限公司 Method and system realizing event detection
KR101441895B1 (en) 2007-08-22 2014-11-03 삼성전자주식회사 Method and apparatus for controlling Quality of Service in Universal Plug and Play network
CN100586071C (en) * 2007-09-30 2010-01-27 华为技术有限公司 The method and apparatus of acquisition strategy and charging execution function entity ability
CN101567793A (en) * 2008-04-25 2009-10-28 华为技术有限公司 Method, device and system for updating policy and charge control (PCC) rule
CN102160452B (en) * 2008-06-05 2015-02-04 凯敏公司 Method and system for providing mobility management in network
KR101206874B1 (en) * 2008-08-11 2012-11-30 노키아 지멘스 네트웍스 오와이 Communication system
US8429268B2 (en) * 2009-07-24 2013-04-23 Camiant, Inc. Mechanism for detecting and reporting traffic/service to a PCRF
US8718075B2 (en) * 2009-08-17 2014-05-06 Telefonaktiebolaget L M Ericsson (Publ) Method and apparatus for adapting policy control
US9166803B2 (en) * 2010-02-12 2015-10-20 Tekelec, Inc. Methods, systems, and computer readable media for service detection over an RX interface
EP2577940B1 (en) * 2010-05-28 2014-03-12 Telefonaktiebolaget LM Ericsson (publ) Efficient data delivery method and apparatus
US8620263B2 (en) * 2010-10-20 2013-12-31 Tekelec, Inc. Methods, systems, and computer readable media for diameter routing agent (DRA) based credit status triggered policy control

Non-Patent Citations (4)

* Cited by examiner, † Cited by third party
Title
"3rd Generation Partnership Project;Technical Specification Group Services and System Aspects;Study on Policy solutions and enhancements(Release 10)", 3GPP DRAFT; 23813-030-CM, 3RD GENERATION PARTNERSHIP PROJECT (3GPP), MOBILE COMPETENCE CENTRE ; 650, ROUTE DES LUCIOLES ; F-06921 SOPHIA-ANTIPOLIS CEDEX ; FRANCE, vol. SA WG2, no. Prague; 20101011, 3 October 2010 (2010-10-03), XP050459358 *
ALLOT COMMUNICATIONS ET AL: "General Definition of the TDF functionality; key issue 4", 3GPP DRAFT; S2-102557, 3RD GENERATION PARTNERSHIP PROJECT (3GPP), MOBILE COMPETENCE CENTRE ; 650, ROUTE DES LUCIOLES ; F-06921 SOPHIA-ANTIPOLIS CEDEX ; FRANCE, vol. SA WG2, no. Kyoto; 20100510, 4 May 2010 (2010-05-04), XP050434692 *
ERICSSON ET AL: "Details on Alternative 1a of Key issue Service Awareness and Privacy Policies", 3GPP DRAFT; S2-101167_PCR_23813_SERVICEAWAREANDUSERPRIVACY1, 3RD GENERATION PARTNERSHIP PROJECT (3GPP), MOBILE COMPETENCE CENTRE ; 650, ROUTE DES LUCIOLES ; F-06921 SOPHIA-ANTIPOLIS CEDEX ; FRANCE, vol. SA WG2, no. San Francisco, USA; 20100222, 16 February 2010 (2010-02-16), XP050433734 *
H. HOLMA; A. TOSKALLA: "LTE for UMTS", 2009, JOHN WILEY & SONS

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2014173252A1 (en) * 2013-07-26 2014-10-30 中兴通讯股份有限公司 Session management method, application function entity, policy server and protocol converter
US10574833B2 (en) 2015-02-26 2020-02-25 Nokia Solutions And Networks Oy Charging and control of edge services
EP3262787B1 (en) * 2015-02-26 2021-04-14 Nokia Solutions and Networks Oy Charging and control of edge services

Also Published As

Publication number Publication date
EP2625897A1 (en) 2013-08-14
KR20140054453A (en) 2014-05-08
US20120284394A1 (en) 2012-11-08
KR101492507B1 (en) 2015-02-11
US9716629B2 (en) 2017-07-25
KR20120065275A (en) 2012-06-20

Similar Documents

Publication Publication Date Title
US9716629B2 (en) Capability negotiation and control
US9026100B2 (en) Policy and charging control method, network entities, communication system and computer program therefor
EP2384587B1 (en) Group session management for policy control
US9867076B2 (en) PCRF apparatus and traffic handling method for use in PCRF
US8923121B2 (en) Control method, system and function entity for reporting bearer event of signaling IP flow
EP2186353B1 (en) Method for simple retrieval of network access selection information.
EP2543163B1 (en) Methods, systems, and computer readable media for enhanced service detection and policy rule determination
US9949191B2 (en) Methods, devices and computer programs for providing a service or service component requiring a specific packet-forwarding treatment
US11223570B2 (en) Methods and network nodes for controlling resources of a service session as well as corresponding system and computer program
US20100186064A1 (en) Method and device for obtaining capabilities of policy and charging enforcement function
US20120275300A1 (en) Service event trigger
EP2888835B1 (en) Advanced service-aware policy and charging control methods, network nodes, and computer programs
JP2013546243A (en) Access network control / access technology selection and routing support for routing IP traffic by user equipment in a multi-access communication system
US10326604B2 (en) Policy and charging rules function (PCRF) selection
WO2017219754A1 (en) Position information obtaining method, device and system
WO2016124225A1 (en) Reallocation of control of online managed services
KR101007369B1 (en) Mobile Communication System without interworking of PCRF and Method Thereof
EP2868127B1 (en) Apparatuses, methods and computer program product for application based charging

Legal Events

Date Code Title Description
WWE Wipo information: entry into national phase

Ref document number: 2010763684

Country of ref document: EP

WWE Wipo information: entry into national phase

Ref document number: 8492/DELNP/2011

Country of ref document: IN

WWE Wipo information: entry into national phase

Ref document number: 13319525

Country of ref document: US

ENP Entry into the national phase

Ref document number: 20117030908

Country of ref document: KR

Kind code of ref document: A

121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 10763684

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE