WO2012094919A1 - 一种策略控制方法及系统 - Google Patents

一种策略控制方法及系统 Download PDF

Info

Publication number
WO2012094919A1
WO2012094919A1 PCT/CN2011/081824 CN2011081824W WO2012094919A1 WO 2012094919 A1 WO2012094919 A1 WO 2012094919A1 CN 2011081824 W CN2011081824 W CN 2011081824W WO 2012094919 A1 WO2012094919 A1 WO 2012094919A1
Authority
WO
WIPO (PCT)
Prior art keywords
external
header information
bpcf
pcrf
access network
Prior art date
Application number
PCT/CN2011/081824
Other languages
English (en)
French (fr)
Inventor
周晓云
宗在峰
毕以峰
Original Assignee
中兴通讯股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中兴通讯股份有限公司 filed Critical 中兴通讯股份有限公司
Priority to EP11855857.6A priority Critical patent/EP2651080B1/en
Priority to ES11855857.6T priority patent/ES2617478T3/es
Priority to US13/978,732 priority patent/US9271220B2/en
Publication of WO2012094919A1 publication Critical patent/WO2012094919A1/zh

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L47/00Traffic control in data switching networks
    • H04L47/70Admission control; Resource allocation
    • H04L47/78Architectures of resource allocation
    • H04L47/783Distributed allocation of resources, e.g. bandwidth brokers
    • H04L47/785Distributed allocation of resources, e.g. bandwidth brokers among multiple network domains, e.g. multilateral agreements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L47/00Traffic control in data switching networks
    • H04L47/70Admission control; Resource allocation
    • H04L47/80Actions related to the user profile or the type of traffic
    • H04L47/805QOS or priority aware
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • H04W12/088Access security using filters or firewalls
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W28/00Network traffic management; Network resource management
    • H04W28/16Central resource management; Negotiation of resources or communication parameters, e.g. negotiating bandwidth or QoS [Quality of Service]
    • H04W28/24Negotiating SLA [Service Level Agreement]; Negotiating QoS [Quality of Service]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/02Access restriction performed under specific conditions
    • H04W48/06Access restriction performed under specific conditions based on traffic conditions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup
    • H04W76/11Allocation or use of connection identifiers
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup
    • H04W76/12Setup of transport tunnels

Definitions

  • the present invention relates to a policy control technology in 3GPP and Broadband Forum (BBF) interconnection interworking, and more particularly to a policy control method and system.
  • BBF Broadband Forum
  • FIG. 1 is a schematic diagram of the composition of an Evolved Packet System (EPS) of the 3rd Generation Partnership Project (3GPP).
  • EPS Evolved Packet System
  • 3GPP 3rd Generation Partnership Project
  • E-UTRAN Evolved Universal Terrestrial Radio Access Network
  • MME Mobility Management Entity
  • S-GW Serving Gateway
  • P -GW Packet Data Network Gateway
  • PDN GW Packet Data Network Gateway
  • HSS Home Subscriber Server
  • PCRF Policy and Charging Rules Function
  • PCRF policy and charging control
  • the PCRF provides network control rules based on service data flows, including traffic data flow detection, Gating Control, Quality of Service (QoS) control, and data flow based charging rules.
  • the PCRF sends its established PCC rules to the Policy and Billing Execution Function (PCEF) for execution.
  • PCEF Policy and Billing Execution Function
  • the basis for the PCF rule to be developed by the PCRF includes: obtaining information related to the service from the application function (AF, Application Function); obtaining the PCC subscription information from the user subscription database (SPR, Subscription Profile Repository); and acquiring the information about the relevant network from the PCEF. .
  • EPS supports interworking with non-3GPP systems. Interworking between EPS and non-3GPP systems is implemented through the S2a/b/c interface, and the P-GW acts as an anchor between 3GPP and non-3GPP systems. As shown in FIG. 1, the non-3GPP system is divided into trusted non-3GPP IP access and untrusted non-3GPP IP access.
  • Trusted non-3GPP IP access can be directly connected to the P-GW through the S2a interface; untrusted non-3GPP IP access requires an evolved packet data gateway (ePDG, Evolved Packet Data Gateway) and P-GW
  • ePDG evolved packet data gateway
  • P-GW Packet Data Gateway
  • the interface between the ePDG and the P-GW is an S2b interface, and the signaling and data are encrypted and protected by the Internet Protocol Security (IPSec) between the UE and the ePDG.
  • the S2c interface provides user plane-related control and mobility support between the user equipment (UE, User Equipment) and the P-GW.
  • the supported mobility management protocol is dual-stack mobile IPv6 (DSMIPv6, Mobile IPv6 support for Dual stack Hosts and Routers ).
  • BPCF Broadband Policy Control Framework
  • the BPCF For the resource request message of the PCRF, the BPCF performs resource admission control according to the network policy and the subscription information of the BBF access, or forwards the resource request message to other network elements of the BBF access network (for example, a broadband network gateway (BNG, Broadband Network Gateway), and other network elements perform resource admission control (that is, entrust other network elements to perform resource admission control).
  • BNG broadband network gateway
  • other network elements perform resource admission control (that is, entrust other network elements to perform resource admission control).
  • the UE accesses the 3GPP core network through a wireless local area network (WLAN).
  • WLAN wireless local area network
  • the PCRF needs to interact with the BPCF when performing QoS authorization.
  • the BBF access network In order for the BBF access network to perform admission control of resources.
  • 3GPP UE passes
  • H(e)NB home base station
  • FIG. 2 is a schematic diagram of a 3GPP UE accessing a 3GPP core network through a WLAN.
  • the BBF access network serves as an untrusted non-3GPP access.
  • there are currently three methods for initiating a policy interworking session ie, S9*).
  • Method 1 After the UE accesses the BBF access network, the Broadband Access Server (BRAS, Broadband Network Access Gateway)/BNG (BNG, Broadband Network Gateway) will perform 3GPP-based access authentication, and the BPCF of the BBF. Proactively launch S9* sessions with 3GPP The PCRF interacts.
  • the PCRF can interact with the BPCF when performing QoS authorization, and the BPCF performs admission control of resources or entrusts other network elements to perform resource admission control.
  • Method 2 When the UE accesses the BBF access network, 3GPP-based access authentication is not performed.
  • the ePDG After the UE establishes an IPSec tunnel with the ePDG, the ePDG sends the local address of the UE (the address allocated by the BBF access network to the UE) to the P-GW, and the P-GW sends the packet to the PCRF.
  • the PCRF determines the BPCF according to the local address of the UE, Reversely initiate an S9* session establishment to interact with the BPCF.
  • the PCRF can interact with the BPCF when performing QoS authorization, and the BPCF performs admission control of resources or entrusts other network elements to perform resource admission control.
  • Method 3 When the UE accesses the BBF access network, 3GPP-based access authentication is not performed.
  • the ePDG After the UE establishes an IPSec tunnel with the ePDG, the ePDG directly sends the local address of the UE (the address allocated by the BBF access network to the UE) to the PCRF. After the PCRF determines the BPCF according to the local address of the UE, the S9* session establishment and BPCF are initiated in reverse. Interact. Thus, the PCRF can interact with the BPCF when performing QoS authorization, and the BPCF performs resource admission control or entrusts other network elements to perform resource admission control.
  • the PCRF When the UE needs to allocate resources for the service access, the PCRF first sends the QoS information of the established PCC rule to the BPCF, so that the BBF access network performs admission control. The PCRF then sends the PCC rules accepted by the BBF access network to the PCEF.
  • the PCEF marks the header of the IP packet of the corresponding data stream (referred to as the internal packet header) according to the PCC rule.
  • the service data stream IP packet arrives at the ePDG, the ePDG will The IP packet is encapsulated by IPSec, and the header of the IP packet of the IPSec (referred to as an external header) is marked according to the DSCP of the header of the IP packet (ie, the internal header) at the time of encapsulation. In this way, the BBF access network can forward data packets according to the DSCP of the IP packet header of the IPSec.
  • the 3GPP network supports interworking with the BBF. If the PCRF does not support interworking with the BBF (including the scenario where the PCC is not deployed on the 3GPP network), the PCRF does not interact with the BPCF to request admission control. This will cause the PCC rules issued by the PCRF to the PCEF to be based on the decision of the PCRF itself.
  • the PCEF performs DSCP marking on the IP packet header of the service data flow according to the PCC rule delivered by the PCRF or the PCEF local configuration policy (the scenario in which the PCC is not deployed on the 3GPP network).
  • the ePDG copies the DSCP of the IPSec external header based on the DSCP flag of the internal header. If the data reaches the BBF access network, The BBF access network does not distinguish whether these service data flows are controlled by the BBF access network, but only according to the DSCP. Therefore, these unaccepted control service data streams will preempt other resources of the admitted control service data stream, resulting in the failure of the entire FMC policy control mechanism.
  • the UE uses the DSMIPv6 protocol to access 3GPP through an untrusted non-BBF access network.
  • DSMIPv6 protocol to access 3GPP through an untrusted non-BBF access network.
  • S9* policy interworking session
  • Method 1 After the UE accesses the BBF access network, the BRAS/BNG will perform 3GPP-based access authentication, and the BPCF of the BBF actively initiates the S9* session to interact with the 3GPP PCRF.
  • the PCRF can interact with the BPCF when performing QoS authorization, and the BPCF performs admission control of resources or entrusts other network elements to perform resource admission control.
  • Method 2 When the UE accesses the BBF access network, 3GPP-based access authentication is not performed. After the UE establishes an IPSec tunnel with the ePDG, the ePDG directly sends the local address of the UE (the address allocated by the BBF access network to the UE) to the PCRF. After the PCRF determines the BPCF according to the local address of the UE, the S9* session establishment and BPCF are initiated in reverse. Interact. Thus, the PCRF can interact with the BPCF when performing QoS authorization, and the BPCF performs resource admission control or entrusts other network elements to perform resource admission control.
  • the PCRF When the UE needs to allocate resources for the service access, the PCRF first sends the QoS information of the established PCC rule to the BPCF, so that the BBF access network performs admission control. The PCRF then sends the PCC rules accepted by the BBF access network to the PCEF.
  • the PCEF performs DSCP marking on the header of the IP packet of the corresponding data stream (referred to as an internal packet header) according to the PCC rule.
  • the IP packet of the service data stream arrives at the ePDG, the ePDG encapsulates the IP packet by IPSec, and at the time of encapsulation.
  • the header of the IPSec IP packet (called the outer header) is marked according to the DSCP of the header of the IP packet (ie, the internal header). In this way, the BBF access network can forward the data packet according to the DSCP of the IPSec IP packet header.
  • the 3GPP network supports interworking with the BBF. If the PCRF does not support interworking with the BBF (including the scenario where the PCC is not deployed on the 3GPP network), the PCRF does not interact with the BPCF to request admission control. The unaccepted control traffic data stream preempts the resources of other admitted control traffic data streams, resulting in the failure of the current FMC policy control mechanism.
  • UE uses DSMIPv6 protocol to access 3GPP through trusted non-BBF access network, prior art There are also two methods for initiating a policy interworking session (ie, S9*).
  • Method 1 After the UE accesses the BBF access network, the BRAS/BNG will perform 3GPP-based access authentication, and the BPCF of the BBF actively initiates the S9* session to interact with the 3GPP PCRF.
  • the PCRF can interact with the BPCF when performing QoS authorization, and the BPCF performs admission control of resources or entrusts other network elements to perform resource admission control.
  • Method 2 When the UE accesses the BBF access network, 3GPP-based access authentication is not performed. After the UE establishes an IPSec security association with the P-GW, the P-GW sends the local address of the UE (the address allocated by the BBF access network to the UE) to the PCRF. The PCRF determines the BPCF according to the local address of the UE, and then initiates the S9 in reverse. * Session establishment interacts with BPCF. Thus, the PCRF can interact with the BPCF when performing QoS authorization, and the BPCF performs resource admission control or entrusts other network elements to perform resource admission control.
  • the PCRF When the UE needs to allocate resources for the service access, the PCRF first sends the QoS information of the established PCC rule to the BPCF, so that the BBF access network performs admission control. The PCRF then sends the PCC rules accepted by the BBF access network to the PCEF. The PCEF performs DSCP marking on the header of the IP packet of the corresponding data stream according to the PCC rule. The service data flow IP packet arrives at the BBF access network, and the BBF access network can forward the data packet according to the DSCP of the IP packet header.
  • the 3GPP network supports interworking with the BBF. If the PCRF does not support interworking with the BBF (including the scenario where the PCC is not deployed on the 3GPP network), the PCRF does not interact with the BPCF to request admission control. The unaccepted control traffic data stream preempts the resources of other admitted control traffic data streams, resulting in the failure of the current FMC policy control mechanism.
  • FIG. 4, and FIG. 5 are schematic diagrams of a 3GPP UE accessing a 3GPP core network through an H(e)NB, where the H(e)NB connects the BBF access network as a Backhaul to the 3GPP core network.
  • the PCRF directly interfaces with the BPCF.
  • the PCRF performs QoS authorization, the PCRF first interacts with the BPCF.
  • the PCRF sends the PCC rules and QoS rules (if needed) separately.
  • PCEF and BBERF if any
  • PCEF and BBERF perform DSCP marking on the downlink data of the service data flow according to the PCC rules and QoS rules.
  • the SeGW When the service data flow arrives at the security gateway (SeGW, Security Gateway), the SeGW will perform the IP packet. IPSec encapsulation, and marking the header of the IPSec IP packet (called the outer header) according to the DSCP of the IP packet (that is, the internal header) at the time of encapsulation. In this way, the BBF access network can be based on IPSec.
  • the DSCP of the IP packet header is forwarded by the packet.
  • the H(e)NB encapsulates the IP packet by IPSec, and marks the header of the IPSec IP packet (called the outer header) according to the DSCP of the IP packet (that is, the internal header) at the time of encapsulation.
  • H(e)NB PF H(e)NB Policy Function
  • H(e)NB GW Figure 4
  • H(e)NB Policy Function Receives a bearer setup or modification request from the 3GPP core network (the establishment or modification of these bearers is initiated after the PCEF or BBERF performs bearer binding according to the PCC rules or QoS rules of the PCRF, or P-GW or
  • the H(e)NB GW or the H(e)NB requests admission control from the BBF access network through the H(e)NB PF.
  • the H(e)NB GW may continue to complete the establishment or modification process of the bearer.
  • PCEF and BBERF perform DSCP marking according to PCC rules and QoS.
  • SeGW will perform IPSec encapsulation on the IP packet, and according to the DSCP of the IP packet (that is, the internal packet header) to the IPSec at the time of encapsulation.
  • the header of the IP packet (called the outer header) is marked.
  • the H(e)NB encapsulates the IP packet by IPSec, and marks the header of the IPSec IP packet (called the outer header) according to the DSCP of the IP packet (that is, the internal header) at the time of encapsulation.
  • the BBF access network can forward data packets according to the DSCP of the IP packet header of the IPSec.
  • the 3GPP network supports interworking with the BBF ( Figure 3 is the interworking between the PCRF and the BPCF, and Figures 4 and 5 are the interworking between the H(e)NB PF and the BPCF).
  • Figure 3 if the PCRF does not support When interworking with BBF, the PCRF does not interact with the BPCF to request admission control. This will cause the PCC rules issued by the PCRF to the PCEF to be based on the decision of the PCRF itself.
  • the PCEF performs DSCP marking on the IP packet header of the downlink of the service data flow according to the PCC rule delivered by the PCRF.
  • the SeGW copies the DSCP of the IP Sec external header based on the DSCP label of the internal header. If the data arrives at the BBF access network, the BBF access network does not distinguish whether these service data flows are controlled by the BBF access network, but only according to the DSCP.
  • the H(e)NB also performs IPSec encapsulation on the uplink data IP packet, and only encapsulates the DSCP of the IP packet (ie, internal header) to the head of the IP packet of the IPSec (referred to as an external header). Mark it.
  • the technical problem to be solved by the present invention is to provide a policy control method and system, which can enable a service data flow that has not been controlled by a BBF access network to not preempt the resources of a service data flow that has passed the BBF access network admission control.
  • a method of policy control including:
  • the 3GPP network device sends the external IP header information to the broadband access forum (BBF) access network device;
  • BBF broadband access forum
  • the BBF access network device forwards the data packet matching the external IP header information according to the differential service code point (DSCP) of the data packet.
  • DSCP differential service code point
  • the method further includes the BBF access network device forwarding the data packet that does not match the external IP header information according to a local policy.
  • the step of the 3GPP network sending the external IP header information to the BBF access network device includes:
  • the evolved packet data gateway (ePDG) of the 3GPP network sends the external IP header information to a policy and charging rule function (PCRF) through a packet data network gateway (P-GW), and the PCRF sends the external IP header information a broadband policy control architecture (BPCF) sent to the BBF access network, where the BPCF sends the external IP header information to the BBF access network device; or
  • PCRF policy and charging rule function
  • P-GW packet data network gateway
  • BPCF broadband policy control architecture
  • the ePDG directly sends the external IP header information to the PCRF, where the PCRF sends the external IP header information to the BPCF, and the BPCF sends the external IP header information to the BBF.
  • Network equipment or,
  • the P-GW sends the external IP header information to the PCRF, the PCRF sends the external IP header information to the BPCF, and the BPCF sends the external IP header information to the BBF.
  • Network access equipment
  • the step of the PCRF sending the external IP header information to the BPCF includes: Sending, by the PCRF, the external IP header information to the BPCF when performing quality of service authorization; or
  • the PCRF sends the external IP header information to the BPCF when initiating a policy interworking session establishment to the BPCF.
  • the step of the 3GPP network sending the external IP header information to the BBF access network device includes:
  • the security gateway (SeGW) of the 3GPP network sends the external IP header information to the home base station policy function (H(e)NB PF) of the BBF access network, and the H(e)NB PF will use the external IP
  • the header information is sent to the BPCF, and the BPCF sends the external IP header information to the BBF access network device; or
  • the SeGW sends the external IP header information to the PCRF, and the PCRF sends the external IP header information to the BPCF, and the BPCF sends the external IP header information to the BBF access network device.
  • the step of the H(e)NB PF transmitting the external IP header information to the BPCF includes: the H(e)NB PF, when initiating a policy interworking session establishment to the BPCF, the external IP header Information is sent to the BPCF;
  • the step of the PCRF transmitting the external IP header information to the BPCF includes: sending, by the PCRF, the external IP header information to the BPCF when initiating a policy interworking session establishment to the BPCF.
  • the external IP header information includes at least a local IP address of the user terminal (UE). Wherein, if the UE and the ePDG are detected, or between the UE and the P-GW
  • the external IP header information includes the local IP address of the UE and the UDP source port number.
  • the UDP source port number is an IPSec UDP source port number; or, the DSMIP binding update signaling UDP source port number.
  • the external IP header information is a packet filter that includes corresponding information.
  • the IP header information includes at least a local IP address of the home base station (H(e)NB). Wherein, if ⁇ ( ⁇ ) ⁇ is detected between the H(e)NB and the security gateway SeGW, the IP header information includes a local IP address and a UDP source port of the home base station (H(e)NB). number.
  • the UDP source port number is an IPSec UDP source port number.
  • the external IP header information is a packet filter that includes corresponding information.
  • a policy control system comprising: a 3GPP network device and a broadband access forum (BBF) access network device, wherein:
  • the 3GPP network is configured to: send external IP header information to the BBF access network device; the BBF access network device is configured to: according to the data packet that matches the external IP header information
  • DSCP Differentiated Services Code Point
  • the BBF access network device is further configured to: forward the data packet that does not match the external IP header information according to a local policy.
  • the system further includes: a Broadband Policy Control Architecture (BPCF) of the BBF access network, wherein: the 3GPP network includes a Packet Data Network Gateway (P-GW), an Evolved Packet Data Gateway (EDDG), and a Policy and Charging Rules function. (PCRF), where:
  • BPCF Broadband Policy Control Architecture
  • the ePDG is configured to: send the external IP header information to the PCRF by using the P-GW; or directly send the external IP header information to the PCRF;
  • the P-GW is configured to: assist the ePDG to send the external IP header information to the
  • PCRF PCRF; or, itself, sending the external IP header information to the PCRF;
  • the PCRF is configured to: send the external IP header information to the BPCF;
  • the BPCF is configured to: send the external IP header information to the BBF access network device.
  • the PCRF is configured to send the external IP header information to the BPCF in the following manner:
  • the external IP header information is sent to the BPCF.
  • the system also includes BPCF, where:
  • the 3GPP network device includes a security gateway (SeGW) and a home base station policy function (H(e)NB PF), or includes (SeGW) and a PCRF, where:
  • the SeGW is configured to: send the external IP header information to the H(e)NB PF;
  • the H(e)NB PF is configured to: send the external IP header information to the BPCF;
  • the BPCF is configured to: send the external IP header information to the BBF access network device; or
  • the 3GPP network device includes the SeGW and the PCRF, where:
  • the SeGW is configured to: send the external IP header information to the PCRF;
  • the PCRF is configured to: send the external IP header information to the BPCF;
  • the BPCF is configured to: send the external IP header information to the BBF access network device.
  • the H(e)NB PF or the PCRF is configured to send the external IP header information to the BPCF in the following manner:
  • the external IP header information is sent to the BPCF.
  • the external IP header information includes at least a local IP address of the user terminal (UE). If the NA(P)T is detected between the UE and the ePDG, or between the UE and the P-GW, the external IP header information includes a local IP address of the UE and a UDP source port number.
  • the UDP source port number is an IPSec UDP source port number; or, the DSMIP binding update signaling UDP source port number.
  • the external IP header information is a packet filter that includes corresponding information.
  • the IP header information includes at least a local IP address of the home base station (H(e)NB). Wherein, if NA(P)T is detected between the H(e)NB and the security gateway SeGW, the IP header information includes a local IP address and a UDP source port of the home base station (H(e)NB). number.
  • the UDP source port number is an IPSec UDP source port number.
  • the external IP header information is a packet filter that includes corresponding information.
  • a broadband access forum (BBF) access network system including a BBF access network device, wherein: the BBF access network device is configured to: receive external IP header information sent by the 3GPP network, and the external IP header Information matching packet according to the differential service code point of the packet (DSCP) for forwarding.
  • BBF broadband access forum
  • the BBF access network device is further configured to: forward the data packet that does not match the external IP header information according to a local policy.
  • the system also includes: Broadband Policy Control Architecture (BPCF), where:
  • BPCF Broadband Policy Control Architecture
  • the BPCF is configured to: send an evolved packet data gateway (ePDG) of the 3GPP network to the policy and charging rule function (PCRF) through a packet data network gateway (P-GW), and then send the same by the PCRF Or external IP header information; or receiving the external IP header information sent by the ePCR to the PCRF, and then sent by the PCRF; or receiving the P-GW to send to the PCRF, and further Transmitting the external IP header information sent by the PCRF, and sending the external IP header information to the BBF access network device; or receiving a home base station policy function of a security gateway (SeGW) of a 3GPP network through a BBF access network
  • ePDG evolved packet data gateway
  • PCRF policy and charging rule function
  • P-GW packet data network gateway
  • the BPCF is further configured to: receive the external IP header information sent by the PCRF when performing a quality of service authorization; or
  • the BBF access network saves the external IP header.
  • the BBF access network device first filters according to the saved external IP header, only when the service data stream of the external IP header is matched.
  • the data is forwarded according to the DSCP; for the unmatched service data stream, the BBF access network device processes according to the local policy (such as re-marking the lower priority DSCP).
  • the local policy such as re-marking the lower priority DSCP
  • Figure 1 is a schematic diagram of an EPS composition structure
  • FIG. 2 is a schematic diagram of a UE accessing a 3GPP core network through a WLAN access network
  • FIG. 3 is a schematic diagram 1 of a UE accessing a 3GPP core network through an H(e)NB;
  • FIG. 4 is a schematic diagram 2 of a UE accessing a 3GPP core network through an H(e)NB;
  • FIG. 5 is a schematic structural diagram 3 of a UE accessing a 3GPP core network through an H(e)NB;
  • FIG. 9 is a fourth embodiment of the present invention.
  • a UE when a UE is attached to an EPS,
  • the BBF access network device obtains an external IP packet header according to the embodiment of the present invention
  • FIG. 11 is a flowchart of Embodiment 6 of the present invention.
  • the BBF access network device obtains an external IP packet header.
  • the present invention provides a policy control method, including:
  • the 3GPP network sends the external IP packet header to the BBF access network device;
  • the BBF access network device forwards the data packet matching the external IP packet header according to the differential service code point (DSCP) of the data packet, and performs the data packet that does not match the external IP packet header according to a local policy. Forward.
  • DSCP differential service code point
  • the external IP header is an external IP header of the IPSec tunnel.
  • the IPSec tunnel is an IPSec tunnel between the user equipment and the ePDG, between the user equipment and the P-GW, or between the home base station and the security gateway.
  • the steps of the 3GPP network sending the external IP packet to the BBF access network device include: (1) The evolved packet data gateway (ePDG) sends the external IP packet header to the P-GW, and the P-GW sends the external IP packet header to the PCRF; or the ePDG directly directly refers to the external IP header. Sending to the PCRF; or, the P-GW sends the external IP packet to the PCRF;
  • ePDG evolved packet data gateway
  • the PCRF Sending, by the PCRF, the external IP packet to the BPCF; the PCRF sends the external IP packet to the BPCF when performing the quality of service authorization; or the PCRF is initiating a policy to the BPCF When the interworking session is established, the external IP packet is sent to the BPCF. Or,
  • the security gateway sends the external IP packet to the home base station policy function (HeNB PF) or PCRF;
  • FIG. 6 is a flowchart of a UE initiating an S9* session by a BPCF in an untrusted BBF access network accessing a 3GPP core network in a non-roaming scenario according to an embodiment of the present invention.
  • the ⁇ protocol is used between ePDG and P-GW.
  • Step 601 After the UE accesses the BBF access system, perform 3GPP-based access authentication, and the UE provides IMSI (for access authentication);
  • Step 602 The UE obtains a local IP address from the BBF access network. This address may be assigned by a Residential Gateway (RG) or BNG;
  • RG Residential Gateway
  • BNG Base Gateway
  • Step 603 Upon being triggered by step 601 or step 602, the BPCF is notified that the UE accesses the BBF access network.
  • Step 604 The BPCF sends a gateway control session establishment message to the PCRF to carry the user identifier.
  • the PCRF returns a gateway control session establishment confirmation message to the BPCF.
  • the PCRF may need to interact with the SPR to obtain the user's subscription user policy decision.
  • Step 606 After selecting the ePDG, the UE initiates an IKEv2 tunnel establishment process, and uses an Extensible Authentication Protocol (EAP) for authentication. If the UE and the ePDG have NA(P)T (if there is NA(P)T on the RG), the IKEv2 signaling will perform NAT traversal;
  • Step 607 After the ePDG selects the P-GW, the proxy binding update is sent to the P-GW.
  • EAP Extensible Authentication Protocol
  • the message, the proxy binding update message carries the user identifier, the PDN identifier, and the external IP header information.
  • the external IP header information at this time may be an IPSec tunnel external IP header information established between the UE and the ePDG.
  • the external IP header information of the IPSec tunnel includes at least the source address of the IKEv2 signaling sent by the UE received by the ePDG (that is, the source address of the IPSec, for the uplink direction of the UE).
  • the IPSec tunnel external IP header information may also include the UDP source port number of the IKEv2 signaling sent by the ePDG (that is, the source port number of the IPSec.
  • the UDP source port number For the uplink direction of the UE, also referred to as the UDP source port number, the same below
  • ePDG address For the uplink direction of the UE, also referred to as the UDP source port number, the same below
  • ePDG address ie destination UDP port number, for UE uplink direction
  • protocol type ie destination UDP port number, for UE uplink direction
  • the source address and source port number received by the ePDG may be different from the source address and source port number when the UE sends the packet. If the NA(P)T traversal is not passed, the source address is the local address obtained by the UE when accessing the BBF access network.
  • the source address of the IKEv2 signaling sent by the ePDG is the local IP address allocated by the BBF access network, and the address can uniquely identify that the UE is The service data stream encapsulated by the IPSec tunnel, so the external IP header information contains at least the local IP address.
  • the source address of the IKEv2 signaling sent by the ePDG is the public IP address after the NAT, but since it is 1:1 NAT, the address is still The source IP address of the IKEv2 signaling sent by the UE received by the ePDG (that is, the public IP address after the NAT of the BBF access network, If the NAT is at RG, the address is the address of the RG).
  • the service data flow needs to be UDP encapsulated when traversing the NAT.
  • the NAPT allocates a UDP source port number for the IPSec tunnel (for the uplink direction of the UE).
  • the external IP header information includes at least the source address of the IKEv2 signaling sent by the UE received by the ePDG (that is, the public IP address after the NAT of the BBF access network, if the NAT is located in the RG, the address is the address of the RG) and Source port number of the IKEv2 signaling sent by the ePDG (that is, the IPSecUDP source port number).
  • the IP address of the UE by the NAT is also referred to as a local IP address. Therefore, the external IP header information includes at least the local IP address of the UE. If ⁇ ( ⁇ ) ⁇ is detected between the UE and the ePDG, the external IP header information may also include the IPSecUDP source port number. The external IP header information may also include information such as the address of the ePDG, the UDP port of the IPSec destination (for the uplink direction of the UE), and the type of the protocol.
  • the external IP header information may be a packet filter, and the filter includes at least the local IP address of the UE. If ⁇ ( ⁇ ) ⁇ is detected between the UE and the ePDG, the filter may also contain the IPSecUDP source port number. The filter can also contain information such as the address of the ePDG, the UDP port of the IPSec destination (for the uplink direction of the UE), and the type of protocol.
  • Step 608 The P-GW allocates an IP address to the UE, and the PCEF located in the P-GW sends the PCRF to the PCRF.
  • the IP-CAN session establishment indication message carries the user identifier, the PDN identifier, the IP address allocated for the UE, and the external IP header information in the IP-CAN session establishment indication message.
  • Step 609 The PCRF judges according to the user identifier and the PDN identifier. If there is no relevant user subscription data, the H-PCRF will interact with the SPR to obtain the subscription data. The PCRF formulates a PCC rule according to the subscription data, the network policy, and the attributes of the access network, and returns an acknowledgement message to the PCEF, carrying the PCC rule;
  • Step 610 The P-GW sends an update P-GW IP address message to the AAA Server, and sends the P-GW address to the AAA server.
  • the AAA Server further interacts with the HSS and saves the P-GW address to the HSS.
  • Step 611 The P-GW returns a proxy binding acknowledgement message to the ePDG, where the proxy binding acknowledgement message carries an IP address allocated for the UE.
  • Step 612 The proxy binding update is successful, and an IPSec tunnel is established between the UE and the ePDG.
  • Step 613 The ePDG sends the last IKEv2 signaling to the UE, where the IP of the UE is carried. address;
  • Step 614 The PCRF provides external IP header information to the BPCF.
  • Step 615 The BPCF provides external IP header information to the BBF access network device (for example, BNG/BRAS);
  • BNG/BRAS BNG/BRAS
  • Step 616 After the BBF access network device (BNG/BRAS) saves the external IP header, it returns an acknowledge message.
  • BNG/BRAS BBF access network device
  • Step 617 The BPCF returns an acknowledgement message to the PCRF.
  • Step 614 is executed after 609.
  • the PCRF When the UE needs to allocate resources for the service access, the PCRF first sends the QoS information of the established PCC rule to the BPCF, so that the BBF access network performs admission control. The PCRF then sends the PCC rules accepted by the BBF access network to the PCEF. The PCEF performs DSCP marking on the header of the IP packet of the corresponding data stream downlink data (referred to as an internal packet header) according to the PCC rule.
  • the service data stream IP packet arrives at the ePDG, the ePDG encapsulates the IP packet by IPSec and performs DSCP copy.
  • the BBF access network device When the data arrives at the BBF access network, the BBF access network device first performs filtering according to the saved external IP header. Only when the service data stream matching the external IP header information is forwarded according to the DSCP; Data flow, BBF access network devices are processed according to local policies (such as re-marking lower priority DSCP). For the uplink data of the service data stream, the UE performs IPSec encapsulation and performs DSCP copy. When the data arrives at the BBF access network, the BBF access network device first filters according to the saved external IP header information, and only matches the external IP header.
  • the service data stream of the information is forwarded according to the DSCP; for the unmatched service data stream, the BBF access network device processes according to the local policy (such as re-marking the lower priority DSCP).
  • the local policy such as re-marking the lower priority DSCP.
  • FIG. 7 is a schematic diagram of a UE accessing a 3GPP core network through an untrusted BBF access network according to the present invention.
  • a flowchart of the S9* session initiated by the PCRF by the P-GW is triggered.
  • the ⁇ protocol is used between the ePDG and the P-GW.
  • Step 701 After the UE accesses the BBF access system, the BBF access system allocates a local IP address to the UE.
  • the UE initiates an IKEv2 tunnel establishment process and uses EAP for authentication.
  • the ePDG interacts with the AAA Server (the AAA Server further interacts with the HSS) to complete EAP authentication.
  • Step 702 After selecting the P-GW, the ePDG sends a proxy binding update message to the P-GW, where the proxy binding update message carries the user identifier, the PDN identifier, and the external IP header information.
  • the proxy binding update message carries the user identifier, the PDN identifier, and the external IP header information.
  • the external IP header information at this time may be an external IP header information of the IPSec tunnel established between the UE and the ePDG.
  • the external IP header information of the IPSec tunnel includes at least the source address of the IKEv2 signaling sent by the UE received by the ePDG (that is, the source address of the IPSec, for the uplink direction of the UE).
  • the external IP header information of the IPSec tunnel may also include the source port number of the IKEv2 signaling sent by the ePDG (ie, the source port number of the IPSec, for the uplink direction of the UE), and the address of the ePDG and the UDP port received by the ePDG. Number (ie destination UDP port number, for UE uplink direction) and protocol type.
  • the source address and source port number received by the ePDG may be different from the source address and source port number when the UE sends the packet. If the NAT traversal is not used, the source address is the local address obtained by the UE when accessing the BBF access network.
  • the source address of the IKEv2 signaling sent by the ePDG is the local IP address allocated by the BBF access network, and the address can uniquely identify that the UE is encapsulated by the IPSec tunnel.
  • Service traffic, so the external IP header information contains at least the local IP address.
  • the source address of the IKEv2 signaling sent by the ePDG is the public IP address after the NAT, but since it is 1:1 NAT, the address is still The source IP address of the IKEv2 signaling sent by the UE received by the ePDG (that is, the public IP address after the NAT of the BBF access network, If the NAT is at RG, the address is the address of the RG).
  • NAPT For the (N:l) NAT between the UE and the ePDG (ie NAPT), the traffic is traversing the NAPT UDP encapsulation is required, and NAPT assigns a UDP source port number to the IPSec tunnel (for the uplink direction of the UE).
  • the external IP header information includes at least the source address of the IKEv2 signaling sent by the UE received by the ePDG (that is, the public IP address after the BBF access network NAPT, If the NAPT is located in the RG, the address is the address of the RG) and the source port number (ie, the IPSecUDP source port number) of the IKEv2 signaling sent by the UE received by the ePDG.
  • the IP address of the UE by the NAT is also referred to as a local IP address. Therefore, the external IP header information includes at least the local IP address of the UE. If ⁇ ( ⁇ ) ⁇ is detected between the UE and the ePDG, the external IP header information may also include the IPSecUDP source port number. The external IP header information may also include information such as the address of the ePDG, the UDP port of the IPSec destination (for the uplink direction of the UE), and the type of the protocol.
  • the external IP header information may be a packet filter, where the filter includes at least a local IP address of the UE. If ⁇ ( ⁇ ) ⁇ is detected between the UE and the ePDG, the filter may also contain the IPSecUDP source port number. The filter can also contain information such as the ePDG address, the IPSec destination UDP port number (for the UE's upstream direction), and the protocol type.
  • Step 703 The P-GW allocates an IP address to the UE, and the PCEF located in the P-GW sends an IP-CAN session establishment indication message to the PCRF, where the IP-CAN session establishment indication message carries the user identifier, the PDN identifier, and is allocated for the UE. IP address and external IP header information.
  • Step 704 The PCRF determines, according to the user identifier and the PDN identifier, that if there is no relevant user subscription data, the PCRF will interact with the SPR to obtain the subscription data.
  • the PCRF formulates PCC rules based on subscription data, network policies, and access network attributes.
  • the PCRF returns an acknowledgement message to the PCEF, carrying the PCC rule;
  • Step 705 The P-GW sends an update P-GW IP address message to the AAA Server, and sends the P-GW address to the AAA server.
  • the AAA Server further interacts with the HSS and saves the P-GW address to the HSS.
  • Step 706 The P-GW returns a proxy binding acknowledgement message to the ePDG, where the proxy binding acknowledgement message carries an IP address allocated for the UE.
  • Step 707 The proxy binding update is successful, and an IPSec tunnel is established between the UE and the ePDG.
  • Step 708 The ePDG sends the last IKEv2 signaling to the UE, where the IP address of the UE is carried.
  • Step 709 The PCRF determines the BPCF of the BBF access network that the UE currently accesses according to the external IP header information, and sends a PCRF to initiate a gateway control session establishment message to the BPCF, where the gateway control session establishment message carries the external IP header information.
  • Step 709 can be executed after step 703;
  • Step 710 The BPCF provides an external IP header to the BBF access network device (for example, BNG/BRAS);
  • BNG/BRAS BNG/BRAS
  • Step 711 After the BBF access network device saves the external IP header, it returns an acknowledgement message.
  • the session established between the PCRF and the BPCF, and the BBF access network device obtains the external IP header information.
  • the PCRF first sends the QoS information of the established PCC rule to the BPCF, so that the BBF access network performs admission control.
  • the PCRF then sends the PCC rules accepted by the BBF access network to the PCEF.
  • the PCEF performs DSCP marking on the header of the downlink IP packet (referred to as the internal packet header) of the corresponding data stream according to the PCC rule.
  • the service data stream IP packet arrives at the ePDG, the ePDG encapsulates the IP packet into IPSec and performs DSCP. copy.
  • the BBF access network device When the data arrives at the BBF access network, the BBF access network device first performs filtering according to the saved external IP header information, and only performs data forwarding according to the DSCP when the service data stream matching the external IP header information is matched; The service data stream is processed by the BBF access network device according to the local policy (such as re-marking the lower priority DSCP). For the uplink data of the service data stream, the UE performs IPSec encapsulation and performs DSCP copy. When the data arrives at the BBF access network, the BBF access network device first filters according to the saved external IP header information, and only matches the external IP header.
  • the service data stream of the information is forwarded according to the DSCP; for the unmatched service data stream, the BBF access network device processes according to the local policy (such as re-marking the lower priority DSCP).
  • the local policy such as re-marking the lower priority DSCP.
  • This embodiment is also applicable to roaming scenarios (including home routing and local grooming).
  • the scenario is similar for the scenario where the GTP protocol is used between the ePDG and the P-GW.
  • the ePDG will carry the external IP header information in the Create Session Request message.
  • FIG. 8 is a flowchart of a P9GW triggering a PCRF to initiate an S9* session in a non-roaming scenario in which a UE accesses a 3GPP core network through an untrusted BBF access network.
  • the ⁇ protocol is used between ePDG and P-GW.
  • Step 801 After the UE accesses the BBF access system, the BBF access system allocates a local IP address to the UE.
  • the UE initiates an IKEv2 tunnel establishment process and uses EAP for authentication.
  • the ePDG interacts with the AAA Server (the AAA Server further interacts with the HSS) to complete EAP authentication.
  • Step 802 The ePDG sends a gateway control session setup message to the PCRF, carrying the external IP header information.
  • the external IP header information at this time may be an IPSec tunnel external IP header information established between the UE and the ePDG.
  • the external IP header information of the IPSec tunnel includes at least the source address of the IKEv2 signaling sent by the UE received by the ePDG (that is, the source address of the IPSec, for the uplink direction of the UE).
  • the IP header information of the IPSec tunnel may also include the source port number of the IKEv2 signaling sent by the ePDG (that is, the source port number of the IPSec, for the uplink direction of the UE), and the address of the ePDG and the UDP port number of the ePDG. That is, the destination UDP port number, for the UE uplink direction, and the protocol type.
  • the source address and source port number received by the ePDG may be different from the source address and source port number when the UE sends the packet. If the NAT traversal is not used, the source address is the local address obtained by the UE when accessing the BBF access network.
  • the source address of the IKEv2 signaling sent by the ePDG is the local IP address allocated by the BBF access network, and the address can uniquely identify that the UE is encapsulated by the IPSec tunnel.
  • Service traffic, so the external IP header information contains at least the local IP address.
  • the UE received by the ePDG sends the UE
  • the source address of the sent IKEv2 signaling is the public IP address of the NAT.
  • the address can still uniquely identify the service data flow encapsulated by the IPSec tunnel. Therefore, the external IP header information is at least The source address of the IKEv2 signaling sent by the UE received by the ePDG (that is, the public IP address after the NAT of the BBF access network, if the NAT is located in the RG, the address is the address of the RG).
  • the service data flow needs to be UDP encapsulated when traversing the NAPT.
  • the NAPT allocates the UDP source port number for the IPSec tunnel (for the uplink direction of the UE).
  • the external IP header information includes at least the source address of the IKEv2 signaling sent by the UE received by the ePDG (that is, the public IP address after the BBF access network NAPT, If the NAPT is located in the RG, the address is the address of the RG) and the source port number (ie, the IPSecUDP source port number) of the IKEv2 signaling sent by the UE received by the ePDG.
  • the IP address of the UE by the NAT is also referred to as a local IP address. Therefore, the external IP header information includes at least the local IP address of the UE. If ⁇ ( ⁇ ) ⁇ is detected between the UE and the ePDG, the external IP header information may also include the IPSecUDP source port number. The external IP header information may also include information such as the address of the ePDG, the UDP port of the IPSec destination (for the uplink direction of the UE), and the type of the protocol.
  • the external IP header information may be a packet filter, where the filter includes at least a local IP address of the UE. If ⁇ ( ⁇ ) ⁇ is detected between the UE and the ePDG, the filter may also contain the IPSecUDP source port number. The filter can also contain information such as the ePDG address, the IPSec destination UDP port number (for the UE's upstream direction), and the protocol type.
  • Step 803 The PCRF returns an acknowledgement message to the ePDG.
  • Step 804 After selecting the P-GW, the ePDG sends a proxy binding update message to the P-GW, where the proxy binding update message carries the user identifier, the PDN identifier, and the external IP header information.
  • Step 805 The P-GW allocates an IP address to the UE, and the PCEF located in the P-GW sends an IP-CAN session establishment indication message to the PCRF, where the IP-CAN session establishment indication message carries the user identifier, PDN identifier, an IP address assigned to the UE;
  • Step 806 The PCRF judges according to the user identifier and the PDN identifier. If there is no relevant user subscription data, the H-PCRF will interact with the SPR to obtain the subscription information. The PCRF formulates PCC rules based on subscription data, network policies, and access network attributes. The PCRF returns an acknowledgement message to the PCEF, carrying the PCC rule;
  • Step 807 The P-GW sends an update P-GW IP address message to the AAA Server, and sends the P-GW address to the AAA server.
  • the AAA Server further interacts with the HSS and saves the P-GW address to the HSS.
  • Step 808 The P-GW returns a proxy binding acknowledgement message to the ePDG, where the proxy binding acknowledgement message carries an IP address allocated for the UE.
  • Step 809 The proxy binding update is successful, and an IPSec tunnel is established between the UE and the ePDG.
  • Step 810 The ePDG sends the last IKEv2 signaling to the UE, where the IP address of the UE is carried.
  • Step 811 The PCRF determines the BPCF of the BBF access network that the UE currently accesses according to the external IP header information, and sends a gateway control session establishment message initiated by the PCRF to the BPCF, where the gateway control session establishment message initiated by the PCRF carries an external IP header. information.
  • Step 811 can be performed after step 802;
  • Step 812 The BPCF provides an external IP header to the BBF access network device (for example, BNG/BRAS);
  • BNG/BRAS BNG/BRAS
  • Step 813 After the BBF access network device saves the external IP header, it returns an acknowledgement message.
  • the session established between the PCRF and the BPCF, and the BBF access network obtains the external IP header information.
  • the PCRF first sends the QoS information of the established PCC rule to the BPCF, so that the BBF access network performs admission control.
  • the PCRF then sends the PCC rules accepted by the BBF access network to the PCEF.
  • the PCEF performs DSCP marking on the IP packet header (referred to as an internal packet header) of the downlink data of the corresponding data stream according to the PCC rule.
  • the ePDG When the service data stream IP packet arrives at the ePDG, the ePDG encapsulates the IP packet by IPSec, and Make a DSCP copy. When these data arrive at BBF
  • the BBF access network device When accessing the network, the BBF access network device first filters according to the saved external IP header information. Only when the service data stream that matches the external IP header information is forwarded according to DSCP; for the unmatched service data flow, BBF The access network device processes according to the local policy (such as re-marking the lower priority DSCP). For the uplink data of the service data stream, the UE performs IPSec encapsulation and performs DSCP copy.
  • the BBF access network device When the data arrives at the BBF access network, the BBF access network device first filters according to the saved external IP header information, and only matches the external IP header. The service data stream of the information is forwarded according to the DSCP; for the unmatched service data stream, the BBF access network device processes according to the local policy (such as re-marking the lower priority DSCP). Thus, those unaccepted control traffic data streams will not preempt other resources of the admission-controlled traffic data stream.
  • This embodiment is also applicable to roaming scenarios (including home routing and local grooming).
  • the ePDG will carry the external IP header information in the Create Session Request message.
  • the UE For the UE to access the 3GPP core network through the trusted BBF access network, and the UE uses
  • the P-GW sends the external IP header information (that is, the external IP header information of the IPSec tunnel) to the PCRF, and the PCRF sends it to the BPCF, BPCF.
  • the BBF access network device matches the data packets according to the external IP header information, and further performs packet forwarding according to DSCP.
  • the related processes and ideas are similar to the above embodiments, and will not be described again.
  • the foregoing external IP header information includes at least a local IP address of the UE.
  • the IPSecUDP source port number may also be included (for the uplink direction of the UE). Of course, it may also include the address of the P-GW, the IPSec destination UDP port number (for the uplink direction of the UE), and the type of the protocol.
  • the P-GW sends the external IP header information (that is, the external IP header information of the DSMIPv6 tunnel) to the PCRF, and the PCRF sends the data to the BPCF.
  • the BPCF is then sent to the BBF access network device.
  • the BBF access network device matches the data packets according to the external IP header information, and further performs packet forwarding according to DSCP.
  • the foregoing external IP header information includes at least a local IP address of the UE.
  • the UDP source port number of the DSMIPv6 binding update signaling may also be included (for the uplink direction of the UE, the port number is when the UE performs the binding update)
  • the address of the P-GW, the destination UDP port number of the DSMIPv6 binding update signaling (for the uplink direction of the UE), and the protocol type may also be included.
  • the UE accesses the 3GPP core network through the untrusted BBF access network, and the UE uses DSMIPv6 access.
  • An IPSec tunnel is established between the UE and the ePDG, and all service data flows between the UE and the P-GW are encapsulated by the IPSec tunnel.
  • the ePDG sends the external IP header information (the external IP header information of the IPSec tunnel) to the PCRF, the PCRF sends it to the BPCF, and the BPCF sends it to the BBF access network device.
  • the BBF access network device matches the data packets according to the external IP header information, and further performs packet forwarding according to DSCP.
  • the foregoing external IP header information includes at least a local IP address of the UE.
  • the IPSecUDP source port number (for the uplink direction of the UE) may also be included. It can also include the address of the ePDG, the IPSec destination UDP port number (for the UE's upstream direction), and the protocol type.
  • the above information about the external IP packet header in the DSMIPv6 scenario can also be implemented in the form of a packet filter.
  • FIG. 9 is a flowchart of the external IP packet header obtained by the BBF access network device in the process of attaching the UE to the EPS in the architecture shown in FIG.
  • Step 901 After the HeNB is powered on, obtain the IP address of the Customer Premises Equipment (CPE) allocated by the BBF access network, that is, the local IP address, and the HeNB performs IKEv2 signaling interaction with the SeGW by using the CPE IP address to establish an IPSec tunnel. .
  • the SeGW allocates a HeNB IP address for the HeNB, and the HeNB exchanges with other 3GPP network elements; the SeGW obtains external IP header information.
  • the external IP header information at this time may be an IPSec tunnel external IP header information established between the HeNB and the SeGW.
  • the external IP header information of the IPSec tunnel includes at least the source address of the IKEv2 signaling sent by the HeNB (that is, the source address of the IPSec, for the uplink direction of the HeNB).
  • the external IP header information of the IPSec tunnel may also include the source port number of the IKEv2 signaling sent by the HeNB (ie, the source port number of the IPSec, for the uplink direction of the HeNB), and the address of the SeGW and the receiving UDP port number of the SeGW. (that is, the destination UDP port number, for the HeNB uplink direction) and the protocol type;
  • the source address and source port number received by the SeGW may be different from the source address and source port number when the HeNB sends the IKEv2 signaling. If the NA(P)T traversal is not passed, the source address is the local IP address obtained by the HeNB when accessing the BBF access network.
  • the source address of the IKEv2 signaling sent by the HeNB is the local IP address allocated by the BBF access network, and the address can uniquely identify that the HeNB is encapsulated by the IPSec tunnel.
  • Service traffic, so the external IP header information contains at least the local IP address.
  • the source address of the IKEv2 signaling sent by the HeNB by the SeGW is the public IP address after the NAT, but since it is 1:1 NAT, the address is still
  • the service data stream that is encapsulated by the HeNB by the IPSec tunnel may be uniquely identified.
  • the external IP header information includes at least the source address of the IKEv2 signaling sent by the HeNB (that is, the public IP address after the BBF access network NAT). If the NAT is at RG, the address is the address of the RG).
  • the service data flow needs to be UDP encapsulated when traversing the NAPT.
  • the NAPT allocates the UDP source port number to the IPSec tunnel (for the uplink direction of the HeNB). Therefore, in order to uniquely identify the service data flow encapsulated by the IPSec tunnel, the external IP header information includes at least the source address of the IKEv2 signaling sent by the HeNB received by the SeGW (that is, the public IP address after the BBF access network NAT). If the NAPT is located in the RG, the address is the address of the RG) and the source port number (ie, the IPSecUDP source port number) of the IKEv2 signaling sent by the HeNB received by the SeGW.
  • the IP address of the HeNB being NAT is also referred to as a local IP address.
  • the header information includes at least the local IP address of the HeNB. If NA(P)T is detected between the HeNB and the SeGW, the external IP header information may also include the IPSecUDP source port number. The external IP header information may also include information such as an address of the SeGW, an IPSec destination UDP port number (for the uplink direction of the HeNB), and a protocol type.
  • the external IP header information may be a packet filter, where the packet filter includes at least a local IP address of the HeNB. If NA(P)T is detected between the HeNB and the SeGW, the packet filter may also include an IPSecUDP source port number. The filter may also contain information such as the address of the SeGW, the IPSec destination UDP port number (for the uplink direction of the HeNB), and the protocol type.
  • Step 902 The UE sends an attach request message to the HeNB, carrying the user identifier.
  • Step 903 The HeNB sends an attach request message to the MME, carrying the user identifier.
  • the SeGW adds the external IP header information obtained in step 901 to the message and carries it to the MME;
  • Step 904 The MME sends a location update request to the HSS, carrying the user identifier.
  • Step 905 The HSS returns a location update response to the MME, and returns the user subscription information.
  • Step 907 The S-GW sends a create session request to the P-GW, carrying the user identifier, the PDN identifier, and the external IP header information.
  • Step 908 The P-GW sends an IP-CAN session establishment indication to the PCRF, carrying the user identifier.
  • Step 909 The PCRF determines, according to the external IP packet header, the BPCF of the BBF access network that the UE currently accesses, and sends a PCRF to initiate a gateway control session establishment message to the BPCF, where the gateway control session setup message carries the external IP header information.
  • Step 910 The BPCF provides external IP header information to the BBF access network device (for example, BNG/BRAS);
  • BNG/BRAS BNG/BRAS
  • Step 911 After the BBF access network device saves the external IP header information, returns a confirmation message to the BPCF.
  • Step 913 The PCRF returns an IP-CAN session establishment confirmation to the PCEF.
  • Step 914 The gateway P-GW where the PCEF is located returns a create session response to the S-GW.
  • Step 916 The MME, the HeNB, and the UE interact to establish a radio bearer.
  • Step 917 The MME interacts with the S-GW to update the bearer.
  • a session is established between the PCRF and the BPCF, and the BBF access network (BNG/BRAS) obtains the external IP header information.
  • the PCRF first sends the QoS information of the established PCC rule to the BPCF, so that the BBF access network performs admission control.
  • the PCRF then sends the PCC rules accepted by the BBF access network to the PCEF.
  • the PCEF performs DSCP marking on the header of the IP packet of the downlink data of the corresponding data stream (referred to as an internal packet header) according to the PCC rule.
  • the SeGW When the service data stream IP packet arrives at the SeGW, the SeGW performs IPSec encapsulation on the IP packet, and Make a DSCP copy.
  • the BBF access network device When the data arrives at the BBF access network, the BBF access network device first performs filtering according to the saved external IP header information, and only performs data forwarding according to the DSCP when the service data stream matching the external IP header information is matched; The service data stream is processed by the BBF access network device according to the local policy (such as re-marking the lower priority DSCP). For the uplink data of the service data stream, the HeNB performs IPSec encapsulation and performs DSCP copy.
  • the BBF access network device When the data arrives at the BBF access network, the BBF access network device first filters according to the saved external IP header information, and only matches the external IP header.
  • the service data stream of the information is forwarded according to the DSCP; for the unmatched service data stream, the BBF access network device processes according to the local policy (such as re-marking the lower priority DSCP).
  • the local policy such as re-marking the lower priority DSCP.
  • the process for the BBF access network device to obtain the external IP header information is similar to the process in which the HNB attaches to the UMTS system.
  • the external IP header information at this time may be an external IP header information of the IPSec tunnel established between the HNB and the SeGW.
  • the external IP header information of the IPSec tunnel includes at least the source of the IKEv2 signaling sent by the HNB received by the SeGW. Address (ie, the source address of IPSec, for the upstream direction of HNB).
  • the external IP header information of the IPSec tunnel may also include the source port number of the IKEv2 signaling sent by the HNB (ie, the source port number of the IPSec, for the HNB uplink direction). If the NANB is detected between the HNB and the SeGW, )T. Of course, the address of the SeGW, the receiving UDP port number of the SeGW (ie, the destination UDP port number, for the HNB uplink direction), the protocol type, and the like may also be included. Similarly, the external IP header information may be implemented in the form of a packet filter.
  • step 901 the SeGW sends the external IP packet header information to the HeNB.
  • step 902 the HeNB sends the external IP packet header information to the MME, and the other steps are unchanged.
  • FIG. 10 is a flowchart of the external IP packet header obtained by the BBF access network device after the H(e)NB is powered on.
  • Step 1001 After the H(e)NB is powered on, obtain the CPE IP address (ie, the local IP address) allocated by the BBF access network, and the H(e)NB exchanges the IKEv2 signaling with the SeGW by using the CPE IP address to establish an IPSec tunnel.
  • the SeGW allocates an H(e)NB IP address to the H(e)NB for the H(e)NB to interact with other 3GPP network elements;
  • Step 1002 The SeGW notifies the H(e)NB PF of the association relationship between the CEP IP address and the H(e)NB IP address, and carries the external IP header information.
  • the external IP header information at this time may be an external IP header information of the IPSec tunnel established between the H(e)NB and the SeGW.
  • the external IP header information of the IPSec tunnel includes at least the source address of the IKEv2 signaling sent by the H(e)NB received by the SeGW (that is, the source address of the IPSec, for the uplink direction of the H(e)NB. Say) .
  • the external IP header information of the IPSec tunnel may also include the source port number of the IKEv2 signaling sent by the HeNB (ie, the source port number of the IPSec, for the uplink direction of the H(e)NB), and the address of the SeGW, and the SeGW.
  • Receive the UDP port number that is, the destination UDP port number, for the H(e)NB uplink direction
  • the protocol type that is, the destination UDP port number, for the H(e)NB uplink direction
  • the source of the SeGW is received.
  • the address and source port number may be different from the source address and source port number when the H(e)NB is sent. If the NAT traversal is not performed, the source address is the CPE IP address obtained by the H(e)NB when accessing the BBF access network.
  • the source address of the IKEv2 signaling sent by the H(e)NB received by the SeGW is the local IP address allocated by the BBF access network, and the address can be unique. Identifying the service data flow encapsulated by the H(e)NB by the IPSec tunnel, so the external IP header information includes at least the local IP address.
  • the source address of the IKEv2 signaling sent by the H(e)NB received by the SeGW is the public IP address after the NAT, but 1:1 NAT, the address can still uniquely identify the service data flow encapsulated by the H(e)NB by the IPSec tunnel, and therefore the external IP header information includes at least the source of the IKEv2 signaling sent by the H(e)NB received by the SeGW.
  • Address that is, the public IP address after the NAT of the BBF access network, if the NAT is located in the RG, the address is the address of the RG).
  • the service data flow needs to be UDP encapsulated when traversing the NAPT, and the NAPT allocates a UDP source port number for the IPSec tunnel (for H(e) NB's upward direction).
  • the external IP header information includes at least the source address of the IKEv2 signaling sent by the H(e)NB received by the SeGW (ie, the public after the BBF access network NAT)
  • the IP address of the network if the NAPT is located in the RG, the address is the address of the RG) and the source port number of the IKEv2 signaling sent by the H(e)NB received by the SeGW (ie, the IPSecUDP source port number).
  • IP address of the H(e)NB being NAT is also referred to as a local IP address. So external
  • the IP header information includes at least the local IP address of the H(e)NB. If NA(P)T is detected between H(e)NB and SeGW, the external IP header information may also include the IPSecUDP source port number. The external IP header information may also include information such as the address of the SeGW, the UDP port of the IPSec destination (for the uplink direction of the H(e)NB), and the type of the protocol.
  • the external IP header information may be a packet filter, where the packet filter includes at least a local IP address of the H(e)NB. If NA(P)T is detected between the H(e)NB and the SeGW, the packet filter may also include an IPSecUDP source port number. The filter may also include information such as the address of the SeGW, the UDPec destination UDP port number (for the uplink direction of the H(e)NB), and the protocol type. Step 1003: After the H(e)NB PF saves the association relationship, returns an accept message.
  • Step 1004 The H(e)NB establishes an S1 or Iuh connection with the H(e)NB GW or the MME;
  • Step 1005 The H(e)NB GW or the MME establishes a T2 session with the H(e)NB PF, where the CSG ID is carried and H(e)NB IP address;
  • Step 1006 The H(e)NB PF associates the T2 session with the step 1002 according to the H(e)NB IP address, so as to obtain the CPE IP address of the H(e)NB, and the H(e)NB PF determines according to the CPE IP address.
  • H (e)NB access to the BPCF of the BBF access network.
  • the H(e)NB PF establishes an S9* session with the BPCF, carrying the CPE IP address and the external IP header information;
  • Step 1007 The BPCF provides external IP header information to the BBF access network device (for example, BNG/BRAS);
  • BNG/BRAS BNG/BRAS
  • Step 1008 After saving the external IP header information, the BBF access network device returns an acknowledgement message to the BPCF.
  • Step 1009 The BPCF returns a response message to the H(e)NB PF.
  • Step 1010 The H(e)NB PF returns a response message to the H(e)NB GW or the MME.
  • the PCRF When the UE needs to allocate resources for the service access, the PCRF first sends the QoS information of the established PCC rule to the BPCF, so that the BBF access network performs admission control. The PCRF then sends the PCC rules accepted by the BBF access network to the PCEF. The PCEF performs DSCP marking on the header of the IP packet of the downlink data of the corresponding data stream (referred to as an internal packet header) according to the PCC rule.
  • the SeGW When the service data stream IP packet arrives at the SeGW, the SeGW performs IPSec encapsulation on the IP packet, and Make a DSCP copy.
  • the BBF access network device When the data arrives at the BBF access network, the BBF access network device first performs filtering according to the saved external IP header information, and only performs data forwarding according to the DSCP when the service data stream matching the external IP header information is matched; The service data stream is processed by the BBF access network device according to the local policy (such as re-marking the lower priority DSCP). For the uplink data of the service data stream, the H(e)NB performs IPSec encapsulation and performs DSCP copy. When the data arrives at the BBF access network, the BBF access network device first filters according to the saved external IP header, only when it matches.
  • the service data stream of the external IP header information is forwarded according to the DSCP; for the unmatched service data stream, the BBF access network device Processed according to local policies (such as re-marking lower priority DSCP). Thus, those unaccepted control traffic data streams will not preempt other resources of the admission-controlled traffic data stream.
  • step 1001 the SeGW sends the external IP packet header information to the H(e)NB, and the steps 1002 and 1003 are not performed.
  • step 1004 the H(e)NB sends the external IP packet header information to the H(e)NB PF, and the other steps are unchanged.
  • FIG. 11 is a flowchart of the external IP packet header obtained by the BBF access network device after the H(e)NB is powered on.
  • Step 1101 After the H(e)NB is powered on, obtain the CPE IP address (ie, the local IP address) of the user terminal equipment allocated by the BBF access network, and the H(e)NB performs the IKEv2 signaling interaction with the SeGW by using the CPE IP address. IPSec tunnel. In this process, the SeGW allocates an H(e)NB IP address to the H(e)NB for the H(e)NB to interact with other 3GPP network elements;
  • the CPE IP address ie, the local IP address
  • the SeGW allocates an H(e)NB IP address to the H(e)NB for the H(e)NB to interact with other 3GPP network elements
  • Step 1102 The SeGW notifies the H(e)NB PF of the association between the CEP IP address and the H(e)NB IP address, and carries the external IP header information.
  • the external IP header information at this time may be an external IP header information of the IPSec tunnel established between the H(e)NB and the SeGW.
  • the external IP header information of the IPSec tunnel includes at least the source address of the IKEv2 signaling sent by the H(e)NB received by the SeGW (that is, the source address of the IPSec, for the uplink direction of the H(e)NB. Say) .
  • the external IP header information of the IPSec tunnel may also include the source port number of the IKEv2 signaling sent by the HeNB (ie, the source port number of the IPSec, for the uplink direction of the H(e)NB), and the address of the SeGW, and the SeGW.
  • Receive the UDP port number that is, the destination UDP port number, for the H(e)NB uplink direction
  • the protocol type that is, the destination UDP port number, for the H(e)NB uplink direction
  • the source address and source port number received by the SeGW may be different from the source address and source port number when the UE sends the IKEv2 signaling. If the NAT traversal is not performed, the source address is the CPE IP address obtained by the UE when accessing the BBF access network.
  • the H(e)NB received by the SeGW
  • the source IP address of the sent IKEv2 signaling is the local IP address allocated by the BBF access network, and the address can uniquely identify the service data stream encapsulated by the H(e)NB by the IPSec tunnel, so the external IP header information includes at least local IP address
  • the source address of the IKEv2 signaling sent by the H(e)NB received by the SeGW is the public IP address after the NAT, but 1:1 NAT, the address can still uniquely identify the service data flow encapsulated by the H(e)NB by the IPSec tunnel, and therefore the external IP header information includes at least the source of the IKEv2 signaling sent by the H(e)NB received by the SeGW.
  • Address that is, the public IP address after the NAT of the BBF access network, if the NAT is located in the RG, the address is the address of the RG).
  • the service data flow needs to be UDP encapsulated when traversing the NAPT, and the NAPT allocates a UDP source port number for the IPSec tunnel (for H(e) NB's upward direction).
  • the external IP header information includes at least the source address of the IKEv2 signaling sent by the H(e)NB received by the SeGW (ie, the public after the BBF access network NAT)
  • the IP address of the network if the NAPT is located in the RG, the address is the address of the RG) and the source port number of the IKEv2 signaling sent by the H(e)NB received by the SeGW (ie, the IPSecUDP source port number).
  • the IP address of the H(e)NB being NAT is also referred to as a local IP address. Therefore, the external IP header information includes at least the local IP address of the H(e)NB. If NA(P)T is detected between H(e)NB and SeGW, the external IP header information may also include the IPSecUDP source port number. The external IP header information may also include information such as the address of the SeGW, the UDP port of the IPSec destination (for the uplink direction of the H(e)NB), and the type of the protocol.
  • the external IP header information may be a packet filter, where the packet filter includes at least a local IP address of the H(e)NB. If NA(P)T is detected between H(e)NB and SeGW, the packet filter may also contain the IPSecUDP source port number. The filter may also include information such as the address of the SeGW, the UDPec destination UDP port number (for the uplink direction of the H(e)NB), and the protocol type.
  • Step 1103 After the H(e)NB PF saves the association relationship, returns an accept message.
  • Step 1104 H(e)NB establishes an S1 or Iuh connection with the H(e)NB GW or the MME;
  • Step 1105 The H(e)NB establishes a T2 session with the H(e)NB PF, where the CSG ID and the H(e)NB IP address are carried.
  • Step 1106 The H(e)NB PF associates the T2 session with the step 1102 according to the H(e)NB IP address, so as to obtain the CPE IP address of the H(e)NB, and the H(e)NB PF determines according to the CPE IP address.
  • H (e)NB access to the BPCF of the BBF access network.
  • the H(e)NB PF establishes an S9* session with the BPCF, carrying the CPE IP address and the external IP header information;
  • Step 1107 The BPCF provides external IP header information to the BBF access network device (for example, BNG/BRAS);
  • BNG/BRAS BNG/BRAS
  • Step 1108 After the BBF access network device saves the external IP header information, it returns a confirmation message to the BPCF.
  • Step 1109 The BPCF returns a response message to the H(e)NB PF;
  • Step 1110 The H(e)NB PF returns a response message to the H(e)NB.
  • a session is established between the H(e)NB PF and the BPCF, and the BBF access network (BNG/BRAS) obtains the external IP header information.
  • the PCRF first sends the QoS information of the established PCC rule to the BPCF, so that the BBF access network performs admission control.
  • the PCRF then sends the PCC rules accepted by the BBF access network to the PCEF.
  • the PCEF performs DSCP marking on the header of the IP packet of the downlink data of the corresponding data stream (referred to as an internal packet header) according to the PCC rule.
  • the SeGW When the service data flow IP packet arrives at the SeGW, the SeGW performs IPSec encapsulation on the IP packet, and Make a DSCP copy.
  • the BBF access network device When the data arrives at the BBF access network, the BBF access network device first filters according to the saved external IP header information, and only performs data forwarding according to the DSCP when the service data stream matching the external IP header information is matched; The service data stream is processed by the BBF access network device according to the local policy (such as re-marking the lower priority DSCP). For the uplink data of the service data stream, the UE performs IPSec encapsulation and performs DSCP copy.
  • the BBF access network device When the data arrives at the BBF access network, the BBF access network device first filters according to the saved external IP header information, and only matches the external IP header.
  • the service data stream of the information is forwarded according to the DSCP; for the unmatched service data stream, the BBF access network device processes according to the local policy (such as re-marking the lower priority DSCP).
  • the local policy such as re-marking the lower priority DSCP.
  • the SeGW sends the external IP packet header information to the H(e)NB, and the step 1102 and the step 1103 are not performed.
  • the H(e)NB sends the external IP packet header information to the H(e)NB PF, and the other steps are unchanged.
  • the BBF access network device when the BBF access network device performs IP packet matching according to the external IP header information, if the matching fails, only when the network is congested, the data is forwarded according to the local policy. If the current resource is sufficient, the data is still followed. DSCP is scheduled.
  • the invention also provides a policy control system, including: 3GPP network equipment and broadband access forum
  • the 3GPP network device is configured to: send external IP header information to the BBF access network device;
  • the BBF access network device is configured to: forward a data packet that matches the external IP header information to a differential service code point (DSCP) of the data packet.
  • DSCP differential service code point
  • the BBF access network device is further configured to: forward the data packet that does not match the external IP header information according to a local policy.
  • the system further includes a Broadband Policy Control Architecture (BPCF), and the 3GPP network device includes an evolved packet data gateway (ePDG) and a policy and charging rule function (PCRF), where:
  • BPCF Broadband Policy Control Architecture
  • ePDG evolved packet data gateway
  • PCRF policy and charging rule function
  • the ePDG is configured to: send the external IP header information to a packet data network gateway (P-GW), and send, by the P-GW, the external IP header information to a policy and charging rule function (PCRF); Or the ePDG directly sends the external IP header information to the PCRF; the PCRF is configured to: send the external IP header information to the BPCF;
  • P-GW packet data network gateway
  • PCRF policy and charging rule function
  • the BPCF is configured to: send the external IP header information to the BBF access network device.
  • the 3GPP network device includes a P-GW and a PCRF:
  • the P-GW is configured to: send the external IP header information to the PCRF;
  • the PCRF is configured to: send the external IP header information to the BPCF;
  • the BPCF is configured to: send the external IP header information to the BBF access network device.
  • the PCRF is configured to send the external IP header information to the BPCF in the following manner: sending the external IP header information to the BPCF when performing quality of service authorization; or, initiating a policy to the BPCF When the interworking session is established, the external IP header information is sent to the BPCF.
  • the system further includes a broadband policy control architecture (BPCF), the 3GPP network device includes a security gateway and a home base station policy function, or includes a security gateway and a PCRF, where: the security gateway is configured to: the external IP The packet header information is sent to the home base station policy function; the home base station policy function is configured to: send the external IP header information to the BPCF; the BPCF is configured to: send the external IP header information to the BBF access network Equipment; or,
  • BPCF broadband policy control architecture
  • the security gateway is configured to: send the external IP header information to the PCRF;
  • the PCRF is configured to: send the external IP header information to the BPCF;
  • the BPCF is configured to: send the external IP header information to the BBF access network device.
  • the home base station policy function or PCRF is configured to send the external IP header information to the BPCF according to the following manner: when the policy interworking session establishment is initiated to the BPCF, the external IP header information is sent to the Said BPCF.
  • the external IP header information is an external IP header information of the IPSec tunnel.
  • the IPSec tunnel is an IPSec tunnel between the user equipment and the ePDG, the user equipment, and the P-GW or the home base station and the security gateway.
  • the BBF access network saves the external IP header.
  • the BBF access network device first filters according to the saved external IP header, only when the service data stream of the external IP header is matched.
  • the data is forwarded according to the DSCP; for the unmatched service data stream, the BBF access network device processes according to the local policy (such as re-marking the lower priority DSCP).
  • the local policy such as re-marking the lower priority DSCP

Abstract

一种策略控制方法和系统,该方法包括:3GPP网络设备将外部IP包头信息发送给宽带接入论坛(BBF)接入网设备;所述BBF接入网设备将与所述外部IP包头信息匹配的数据包按照所述数据包的差分服务代码点(DSCP)进行转发。上述技术方案使得未经接纳控制业务数据流不会抢占其他经过接纳控制的业务数据流的资源。

Description

一种策略控制方法及系统
技术领域
本发明涉及 3GPP和宽带论坛(BBF, Broadband Forum )互连互通中的 策略控制技术, 尤指一种策略控制方法及系统。 背景技术
图 1为第三代合作伙伴计划 (3GPP, 3rd Generation Partnership Project ) 演进的分组系统(EPS, Evolved Packet System )组成架构示意图, 在图 1所 示的非漫游场景的 EPS网络架构中, 包括演进的通用移动通信系统陆地无线 接入网 ( E-UTRAN, Evolved Universal Terrestrial Radio Access Network )、 移 动管理单元( MME, Mobility Management Entity )、服务网关( S-GW, Serving Gateway )、 分组数据网络网关 ( P-GW, Packet Data Network Gateway, 也称 为 PDN GW)、 归属用户服务器(HSS, Home Subscriber Server ) 、 策略和计 费规则功能(PCRF, Policy and Charging Rules Function ) 实体及其他支撑节 点。
其中, PCRF是策略和计费控制(PCC )的核心, 负责 PCC规则的制定。 PCRF提供了基于业务数据流的网络控制规则,这些网络控制包括业务数据流 的检测、 门控( Gating Control ) 、 服务质量(QoS, Quality of Service )控制 以及基于数据流的计费规则等。 PCRF将其制定的 PCC规则发送给策略与计 费执行功能(PCEF )执行, 同时, PCRF还需要保证这些规则和用户的签约 信息一致。 PCRF制定 PCC规则的依据包括: 从应用功能(AF, Application Function )获取与业务相关的信息;从用户签约数据库( SPR, Subscription Profile Repository )获取用户 PCC签约信息; 从 PCEF获取与承载相关网络的信息。
EPS支持与非 3GPP系统的互通, EPS与非 3GPP系统的互通通过 S2a/b/c 接口实现, P-GW作为 3GPP与非 3GPP系统间的锚点。 如图 1所示, 其中非 3GPP系统被分为可信任非 3GPP IP接入和不可信任非 3GPP IP接入。可信任 非 3GPP IP接入可直接通过 S2a接口与 P-GW连接; 不可信任非 3GPP IP接 入需经过演进的分组数据网关( ePDG, Evolved Packet Data Gateway )与 P-GW 相连, ePDG与 P-GW间的接口为 S2b接口,并且 UE和 ePDG之间釆用 Internet 协议安全性(IPSec )对信令和数据进行加密保护。 S2c接口提供了用户设备 ( UE, User Equipment )与 P-GW之间的用户面相关的控制和移动性支持, 其支持的移动性管理协议为支持双栈的移动 IPv6 ( DSMIPv6 , Mobile IPv6 support for dual stack Hosts and Routers ) 。
目前, 艮多运营商关注固网移动融合( FMC , Fixed Mobile Convergence ) , 并针对 3GPP和宽带论坛(BBF, Broadband Forum )互连互通进行研究。 对 于用户通过 BBF接入移动核心网的场景, 需要对数据的整个传输路径(数据 会经过固网和移动网传输)上的 QoS进行保证。 目前通过 PCRF与 BBF接入 中的宽带策略控制架构( BPCF , Broadband Policy Control Framework )进行交 互, 实现 QoS保障。 BPCF为 BBF接入中的策略控制架构, 对 PCRF的资源 请求消息, BPCF根据 BBF接入的网络策略、 签约信息等进行资源接纳控制 或者将资源请求消息转发给 BBF接入网的其他网元(如宽带网络网关( BNG, Broadband Network Gateway ) , 再由其他网元执行资源接纳控制 (即委托其 他网元执行资源接纳控制) 。 比如: 当 UE通过无线局域网 (WLAN )接入 3GPP核心网时, 为了保证通过一个 WLAN接入线路接入的所有 UE访问业 务的总带宽需求不超过该线路的带宽 (如签约带宽或该线路支持的最大物理 代理 ) , PCRF在进行 QoS授权时需要与 BPCF交互, 以便 BBF接入网执行 资源的接纳控制。
目前 3GPP和 BBF互联互通的研究主要包括两个方面: 3GPP UE通过
BBF的 WLAN接入 EPC的场景和 3GPP UE通过家用基站( H(e)NB )接入 3GPP 核心网的场景, 其中 H(e)NB将 BBF接入网作为路由路径 ( Backhaul )连接 到 3GPP核心网。
图 2为 3GPP UE通过 WLAN接入 3GPP核心网的架构示意图, 如图 2 所示, BBF接入网作为不可信任的非 3GPP接入。 基于图 2所示的架构, 目 前有三种发起策略互通会话 (即 S9* )建立的方法。
方法 1: 当 UE接入 BBF接入网后, 宽带接入服务器 ( BRAS , Broadband Remote Access Server ) /宽带网络网关 ( BNG, Broadband Network Gateway ) 将执行基于 3GPP的接入认证,同时由 BBF的 BPCF主动发起 S9*会话与 3GPP 的 PCRF进行交互。从而, PCRF在进行 QoS授权时能够与 BPCF交互, BPCF 执行资源的接纳控制或委托其他网元执行资源接纳控制。
方法 2: 当 UE接入 BBF接入网时, 并不执行基于 3GPP的接入认证。
UE与 ePDG交互建立 IPSec隧道后 , ePDG将 UE的本地地址 ( BBF接入网 为 UE分配的地址 )发送给 P-GW, P-GW再发送给 PCRF, PCRF根据 UE的 本地地址确定 BPCF后,反向发起 S9*会话建立与 BPCF进行交互。从而, PCRF 在进行 QoS授权时能够与 BPCF交互, BPCF执行资源的接纳控制或委托其 他网元执行资源接纳控制。
方法 3: 当 UE接入 BBF接入网时, 并不执行基于 3GPP的接入认证。
UE与 ePDG交互建立 IPSec隧道后 , ePDG将 UE的本地地址 ( BBF接入网 为 UE分配的地址 )直接发送给 PCRF, PCRF根据 UE的本地地址确定 BPCF 后, 反向发起 S9*会话建立与 BPCF进行交互。 从而, PCRF在进行 QoS授权 时能够与 BPCF交互, BPCF执行资源的接纳控制或委托其他网元执行资源接 纳控制。
当 UE进行业务访问需要网络为其分配资源时, PCRF首先将制定的 PCC 规则的 QoS信息发送给 BPCF,以便 BBF接入网执行接纳控制。然后, PCRF 将 BBF接入网接受的 PCC规则发送给 PCEF。 PCEF根据 PCC规则对相应的 数据流的 IP 包的头部 (称为内部包头) 进行差分服务代码点 (DSCP, Differentiated Services Code Point ) 的标记, 当该业务数据流 IP包到达 ePDG 时, ePDG将对 IP包进行 IPSec封装, 并在封装时根据 IP包的头部 (即内部 包头 ) 的 DSCP对 IPSec的 IP包的头部 (称为外部包头 )进行标记。 这样, BBF接入网就可以根据 IPSec的 IP包头部的 DSCP进行数据包转发了。
然而上述方案的前提是 3GPP网络支持与 BBF的互通, 若当 PCRF不支 持与 BBF的互通时 (包括 3GPP网络没有部署 PCC的场景), PCRF不会与 BPCF进行交互请求接纳控制。 这样会导致 PCRF向 PCEF下发的 PCC规则 是根据 PCRF 自身决策的结果。 PCEF根据 PCRF下发的 PCC规则或 PCEF 本地配置的策略(对 3GPP网络没有部署 PCC的场景 )对业务数据流的 IP包 头部进行 DSCP标记。 当这些业务数据流到达 ePDG时, ePDG根据内部包头 的 DSCP标记拷贝 IPSec外部包头的 DSCP。 若这些数据到达 BBF接入网, BBF接入网并不会区分这些业务数据流是否是经过 BBF接入网接纳控制的, 而只是根据 DSCP进行调度。 从而, 这些未经接纳控制业务数据流会抢占其 他经过接纳控制的业务数据流的资源,导致目前整个 FMC策略控制机制的失 败。
UE釆用 DSMIPv6协议通过不可信任非 BBF接入网接入 3GPP, 目前有 两种发起策略互通会话 (即 S9* )建立的方法。
方法 1: 当 UE接入 BBF接入网后, BRAS/BNG将执行基于 3GPP的接 入认证, 同时由 BBF的 BPCF主动发起 S9*会话与 3GPP的 PCRF进行交互。 从而, PCRF在进行 QoS授权时能够与 BPCF交互, BPCF执行资源的接纳控 制或委托其他网元执行资源接纳控制。
方法 2: 当 UE接入 BBF接入网时, 并不执行基于 3GPP的接入认证。 UE与 ePDG交互建立 IPSec隧道后 , ePDG将 UE的本地地址 ( BBF接入网 为 UE分配的地址 )直接发送给 PCRF, PCRF根据 UE的本地地址确定 BPCF 后, 反向发起 S9*会话建立与 BPCF进行交互。 从而, PCRF在进行 QoS授权 时能够与 BPCF交互, BPCF执行资源的接纳控制或委托其他网元执行资源接 纳控制。
当 UE进行业务访问需要网络为其分配资源时, PCRF首先将制定的 PCC 规则的 QoS信息发送给 BPCF,以便 BBF接入网执行接纳控制。然后, PCRF 将 BBF接入网接受的 PCC规则发送给 PCEF。 PCEF根据 PCC规则对相应的 数据流的 IP包的头部(称为内部包头 )进行 DSCP的标记, 当该业务数据流 IP包到达 ePDG时, ePDG将对 IP包进行 IPSec封装, 并在封装时根据 IP包 的头部 (即内部包头) 的 DSCP对 IPSec的 IP包的头部 (称为外部包头)进 行标记。 这样, BBF接入网就可以根据 IPSec的 IP包的头部的 DSCP进行数 据包转发了。
同样, 上述方案的前提是 3GPP网络支持与 BBF的互通, 若当 PCRF不 支持与 BBF的互通时(包括 3GPP网络没有部署 PCC的场景 ) , PCRF不会 与 BPCF进行交互请求接纳控制。 未经接纳控制业务数据流会抢占其他经过 接纳控制的业务数据流的资源, 导致目前整个 FMC策略控制机制的失败。
UE釆用 DSMIPv6协议通过可信任非 BBF接入网接入 3GPP, 现有技术 中也有两种发起策略互通会话 (即 S9* )建立的方法。
方法 1: 当 UE接入 BBF接入网后, BRAS/BNG将执行基于 3GPP的接 入认证, 同时由 BBF的 BPCF主动发起 S9*会话与 3GPP的 PCRF进行交互。 从而, PCRF在进行 QoS授权时能够与 BPCF交互, BPCF执行资源的接纳控 制或委托其他网元执行资源接纳控制。
方法 2: 当 UE接入 BBF接入网时, 并不执行基于 3GPP的接入认证。 UE与 P-GW交互建立 IPSec安全联盟后, P-GW将 UE的本地地址( BBF接 入网为 UE分配的地址 )直接发送给 PCRF, PCRF根据 UE的本地地址确定 BPCF后,反向发起 S9*会话建立与 BPCF进行交互。从而, PCRF在进行 QoS 授权时能够与 BPCF交互, BPCF执行资源的接纳控制或委托其他网元执行资 源接纳控制。
当 UE进行业务访问需要网络为其分配资源时, PCRF首先将制定的 PCC 规则的 QoS信息发送给 BPCF,以便 BBF接入网执行接纳控制。然后, PCRF 将 BBF接入网接受的 PCC规则发送给 PCEF。 PCEF根据 PCC规则对相应的 数据流的 IP包的头部进行 DSCP的标记。 该业务数据流 IP包到达 BBF接入 网, BBF接入网就可以根据 IP包头部的 DSCP进行数据包转发了。
同样, 上述方案的前提是 3GPP网络支持与 BBF的互通, 若当 PCRF不 支持与 BBF的互通时(包括 3GPP网络没有部署 PCC的场景 ) , PCRF不会 与 BPCF进行交互请求接纳控制。 未经接纳控制业务数据流会抢占其他经过 接纳控制的业务数据流的资源, 导致目前整个 FMC策略控制机制的失败。
图 3、 图 4、 图 5均是 3GPP UE通过 H(e)NB接入 3GPP核心网的架构示 意图, 其中 H(e)NB将 BBF接入网作为 Backhaul连接到 3GPP核心网。 在图 3的架构中, PCRF直接与 BPCF接口, 当 PCRF进行 QoS授权时, PCRF首 先与 BPCF交互, BBF接入网的进行接纳控制成功后, PCRF将 PCC规则和 QoS规则 (如果需要 )分别发送给 PCEF和 BBERF (如果存在 ) , PCEF和 BBERF根据 PCC规则和 QoS规则对业务数据流的下行数据进行 DSCP标记 , 当业务数据流到达安全网关( SeGW, Security Gateway )时, SeGW将对 IP包 进行 IPSec封装, 并在封装时根据 IP包(即内部包头) 的 DSCP对 IPSec的 IP包的头部(称为外部包头)进行标记。 这样, BBF接入网就可以根据 IPSec 的 IP包头部的 DSCP进行数据包转发了。 对于上行数据, 则由 H(e)NB对 IP 包进行 IPSec封装, 并在封装时根据 IP包(即内部包头) 的 DSCP对 IPSec 的 IP包的头部(称为外部包头)进行标记。 在图 4和图 5的架构中, 引入了 家庭基站策略功能(H(e)NB PF, H(e)NB Policy Function ) 的功能实体, 当 H(e)NB GW (图 4 )或 H(e)NB (图 5 ) 从 3GPP核心网接收到承载建立或修 改请求(这些承载的建立或修改是 PCEF或 BBERF根据 PCRF的 PCC规则 或 QoS规则进行承载绑定后发起的, 或 P-GW或 S-GW根据本地策略进行承 载绑定后发起的 )时, H(e)NB GW或 H(e)NB通过 H(e)NB PF向 BBF接入网 请求接纳控制。 当接收到 BBF接入网接纳控制成功响应后, H(e)NB GW可以 继续完成承载的建立或修改流程。此后 PCEF和 BBERF根据 PCC规则和 QoS 进行 DSCP标记, 当业务数据流的下行数据到达 SeGW时, SeGW将对 IP包 进行 IPSec封装, 并在封装时根据 IP包(即内部包头) 的 DSCP对 IPSec的 IP包的头部 (称为外部包头 )进行标记。 对于上行数据, 则由 H(e)NB对 IP 包进行 IPSec封装, 并在封装时根据 IP包(即内部包头) 的 DSCP对 IPSec 的 IP包的头部(称为外部包头)进行标记。这样, BBF接入网就可以根据 IPSec 的 IP包头部的 DSCP进行数据包转发了。
然而三个架构方案的前提也是 3GPP 网络支持与 BBF的互通(图 3 为 PCRF与 BPCF互通, 图 4和图 5为 H(e)NB PF与 BPCF互通) , 对于图 3 , 若当 PCRF不支持与 BBF的互通时, PCRF不会与 BPCF进行交互请求接纳 控制。 这样会导致 PCRF向 PCEF下发的 PCC规则是根据 PCRF自身决策的 结果。 PCEF根据 PCRF下发的 PCC规则对业务数据流下行的 IP包头部进行 DSCP标记。 当这些业务数据流到达 SeGW时, SeGW根据内部包头的 DSCP 标记拷贝 IP Sec外部包头的 DSCP。 若这些数据到达 BBF接入网, BBF接入 网并不会区分这些业务数据流是否是经过 BBF接入网接纳控制的, 而只是根 据 DSCP进行调度。对于上行数据流,同样 H(e)NB对上行数据 IP包进行 IPSec 封装, 并在封装时才艮据 IP包(即内部包头)的 DSCP对 IPSec的 IP包的头部 (称为外部包头)进行标记。 从而, 这些未经接纳控制业务数据流会抢占其 他经过接纳控制的业务数据流的资源,导致目前整个 FMC策略控制机制的失 败。 如果我们考虑 3GPP UE和 BBF的固网设备永存的场景, 那么那些未经 接纳控制的固网设备的业务数据流也可能抢占经过接纳控制的 3GPP UE的业 务数据流的资源。 发明内容
本发明要解决的技术问题是提供一种策略控制方法及系统 , 能够使得未 经 BBF接入网接纳控制的业务数据流不抢占已经过 BBF接入网接纳控制的业 务数据流的资源。
一种策略控制方法, 包括:
3GPP网络设备将外部 IP包头信息发送给宽带接入论坛(BBF )接入网 设备;
所述 BBF接入网设备将与所述外部 IP包头信息匹配的数据包按照所述 数据包的差分服务代码点 (DSCP )进行转发。
该方法还包括, 所述 BBF接入网设备将与所述外部 IP包头信息不匹配 的数据包按照本地策略进行转发。
其中, 3GPP网络将外部 IP包头信息发送给 BBF接入网设备的步骤包括:
3GPP 网络的演进的分组数据网关 ( ePDG ) 通过分组数据网络网关 ( P-GW )将所述外部 IP包头信息发送给策略和计费规则功能(PCRF ) , 所 述 PCRF将所述外部 IP包头信息发送给所述 BBF接入网的宽带策略控制架构 ( BPCF ) , 所述 BPCF将所述外部 IP包头信息发送给所述 BBF接入网设备; 或者,
所述 ePDG直接将所述外部 IP包头信息发送给所述 PCRF, 所述 PCRF 将所述外部 IP包头信息发送给所述 BPCF, 所述 BPCF将所述外部 IP包头信 息发送给所述 BBF接入网设备; 或者,
所述 P-GW将所述外部 IP包头信息发送给所述 PCRF, 所述 PCRF将所 述外部 IP包头信息发送给所述 BPCF, 所述 BPCF将所述外部 IP包头信息 发送给所述 BBF接入网设备。
其中,所述 PCRF将所述外部 IP包头信息发送给所述 BPCF的步骤包括: 所述 PCRF在进行服务质量授权时, 将所述外部 IP包头信息发送给所述 BPCF; 或者,
所述 PCRF在向所述 BPCF发起策略互通会话建立时, 将所述外部 IP包 头信息发送给所述 BPCF。
其中, 3GPP网络将外部 IP包头信息发送给 BBF接入网设备的步骤包括:
3GPP网络的安全网关( SeGW )将所述外部 IP包头信息发送给所述 BBF 接入网的家庭基站策略功能(H(e)NB PF ), 所述 H(e)NB PF将所述外部 IP包 头信息发送给 BPCF, 所述 BPCF将所述外部 IP包头信息发送给所述 BBF接 入网设备; 或者,
所述 SeGW将所述外部 IP包头信息发送给 PCRF, 所述 PCRF将所述外 部 IP包头信息发送给所述 BPCF, 所述 BPCF将所述外部 IP包头信息发送给 所述 BBF接入网设备。
其中,所述 H(e)NB PF将所述外部 IP包头信息发送给 BPCF的步骤包括: 所述 H(e)NB PF在向所述 BPCF发起策略互通会话建立时, 将所述外部 IP包头信息发送给所述 BPCF;
所述 PCRF将所述外部 IP包头信息发送给所述 BPCF的步骤包括: 所述 PCRF在向所述 BPCF发起策略互通会话建立时, 将所述外部 IP包 头信息发送给所述 BPCF。
其中, 所述外部 IP包头信息至少包括用户终端 (UE ) 的本地 IP地址。 其中, 若所述 UE和 ePDG之间, 或所述 UE和所述 P-GW之间检测到
NA(P)T, 则所述外部 IP包头信息包括 UE的本地 IP地址和 UDP源端口号。
其中, 所述 UDP源端口号为 IPSec UDP源端口号; 或, DSMIP绑定更 新信令 UDP源端口号。
其中, 所述外部 IP包头信息为包含相应信息的包过滤器。
其中, 所述 IP包头信息至少包括家用基站(H(e)NB ) 的本地 IP地址。 其中, 若 H(e)NB和所述安全网关 SeGW之间检测到 ΝΑ(Ρ)Τ , 则所述 IP 包头信息包括所述家用基站( H(e)NB ) 的本地 IP地址和 UDP源端口号。 其中, 所述 UDP源端口号为 IPSec UDP源端口号。
其中, 所述外部 IP包头信息为包含相应信息的包过滤器。
一种策略控制系统, 包括: 3GPP网络设备和宽带接入论坛(BBF )接入 网设备, 其中:
所述 3GPP网络设置成:将外部 IP包头信息发送给所述 BBF接入网设备; 所述 BBF接入网设备设置成: 将与所述外部 IP包头信息匹配的数据包 按照所述数据包的差分服务代码点 (DSCP )进行转发。
其中, 所述 BBF接入网设备还设置成: 将与所述外部 IP包头信息不匹 配的数据包按照本地策略进行转发。
该系统还包括: BBF接入网的宽带策略控制架构 (BPCF ) , 其中: 所述 3GPP网络包括分组数据网络网关(P-GW )、 演进的分组数据网关 ( ePDG )和策略和计费规则功能(PCRF ) , 其中:
所述 ePDG设置成: 通过所述 P-GW将所述外部 IP包头信息发送给所述 PCRF; 或者, 直接将所述外部 IP包头信息发送给所述 PCRF;
所述 P-GW设置成: 协助所述 ePDG将所述外部 IP包头信息发送给所述
PCRF; 或者, 自身将所述外部 IP包头信息发送给所述 PCRF;
所述 PCRF设置成: 将所述外部 IP包头信息发送给所述 BPCF;
所述 BPCF设置成:将所述外部 IP包头信息发送给所述 BBF接入网设备。 其中, 所述 PCRF设置成按照以下方式将所述外部 IP包头信息发送给所 述 BPCF:
在进行服务质量授权时, 将所述外部 IP包头信息发送给所述 BPCF; 或 者,
在向所述 BPCF发起策略互通会话建立时, 将所述外部 IP包头信息发送 给所述 BPCF。
该系统还包括 BPCF, 其中:
所述 3GPP网络设备包括安全网关( SeGW )和家庭基站策略功能( H(e)NB PF ), 或者包括(SeGW )和 PCRF, 其中: 所述 SeGW设置成: 将所述外部 IP包头信息发送给所述 H(e)NB PF; 所述 H(e)NB PF设置成: 将所述外部 IP包头信息发送给所述 BPCF; 所述 BPCF设置成:将所述外部 IP包头信息发送给所述 BBF接入网设备; 或者,
所述 3GPP网络设备包括所述 SeGW和所述 PCRF , 其中:
所述 SeGW设置成: 将所述外部 IP包头信息发送给所述 PCRF;
所述 PCRF设置成: 将所述外部 IP包头信息发送给所述 BPCF;
所述 BPCF设置成:将所述外部 IP包头信息发送给所述 BBF接入网设备。 其中, 所述 H(e)NB PF或者所述 PCRF设置成按照以下方式将所述外部 IP包头信息发送给所述 BPCF:
在向所述 BPCF发起策略互通会话建立时, 将所述外部 IP包头信息发送 给所述 BPCF。
其中, 所述外部 IP包头信息至少包括用户终端 (UE ) 的本地 IP地址。 其中, 若所述 UE和 ePDG之间, 或所述 UE和所述 P-GW之间检测到 NA(P)T, 则所述外部 IP包头信息包括 UE的本地 IP地址和 UDP源端口号。
其中, 所述 UDP源端口号为 IPSec UDP源端口号; 或, DSMIP绑定更 新信令 UDP源端口号。
其中, 所述外部 IP包头信息为包含相应信息的包过滤器。
其中, 所述 IP包头信息至少包括家用基站(H(e)NB ) 的本地 IP地址。 其中, 若 H(e)NB和所述安全网关 SeGW之间检测到 NA(P)T, 则所述 IP 包头信息包括所述家用基站( H(e)NB ) 的本地 IP地址和 UDP源端口号。
其中, 所述 UDP源端口号为 IPSec UDP源端口号。
其中, 所述外部 IP包头信息为包含相应信息的包过滤器。
一种宽带接入论坛 ( BBF )接入网系统 , 包括 BBF接入网设备 , 其中: 所述 BBF接入网设备设置成: 接收 3GPP网络发送的外部 IP包头信息, 将与所述外部 IP 包头信息匹配的数据包按照所述数据包的差分服务代码点 ( DSCP )进行转发。
其中, 所述 BBF接入网设备还设置成: 将与所述外部 IP包头信息不匹 配的数据包按照本地策略进行转发。
该系统还包括: 宽带策略控制架构 (BPCF ) , 其中:
所述 BPCF设置成: 接收 3GPP网络的演进的分组数据网关 (ePDG )通 过分组数据网络网关 (P-GW )发送给策略和计费规则功能(PCRF ) , 进而 由所述 PCRF发送来的所述外部 IP包头信息; 或者, 接收所述 ePDG直接发 送给所述 PCRF, 进而由所述 PCRF发送来的所述外部 IP包头信息; 或者, 接收所述 P-GW发送给所述 PCRF, 进而由所述 PCRF发送来的所述外部 IP 包头信息, 将所述外部 IP包头信息发送给所述 BBF接入网设备; 或者, 接收 3GPP网络的安全网关 (SeGW )经过 BBF接入网的家庭基站策略 功能( H(e)NB PF )发送来的所述外部 IP包头信息; 或者, 接收所述 SeGW通 过所述 PCRF发送来的所述外部 IP包头信息,将所述外部 IP包头信息发送给 所述 BBF接入网设备。
其中, 所述 BPCF还设置成: 接收所述 PCRF在进行服务质量授权时发 送来的所述外部 IP包头信息; 或者,
接收所述 PCRF在向所述 BPCF发起策略互通会话建立时发送来的所述 外部 IP包头信息; 或者,
接收所述 H(e)NB PF或者所述 PCRF在向所述 BPCF发起策略互通会话 建立时发送来的所述外部 IP包头信息。
上述技术方案中, BBF接入网保存外部 IP包头, 当数据到达 BBF接入 网时, BBF接入网设备首先根据保存的外部 IP包头进行过滤, 只有当匹配到 了外部 IP包头的业务数据流才根据 DSCP进行数据转发; 对于匹配不到的业 务数据流, BBF接入网设备根据本地策略进行处理(如重新标记较低优先级 的 DSCP ) 。 从而, 那些未经接纳控制业务数据流不会抢占其他经过接纳控 制的业务数据流的资源。 附图概述
图 1为 EPS组成架构示意图;
图 2为 UE通过 WLAN接入网接入 3GPP核心网的架构示意图; 图 3为 UE通过 H(e)NB接入 3GPP核心网的架构示意图一;
图 4为 UE通过 H(e)NB接入 3GPP核心网的架构示意图二;
图 5为 UE通过 H(e)NB接入 3GPP核心网的架构示意图三;
图 6为本发明实施例一的 S9*会话流程图之一;
图 7为本发明实施例二的 S9*会话流程图之二;
图 8为本发明实施例三的 S9*会话流程图之三;
图 9为本发明的实施例四, 图 3所示架构下, UE附着到 EPS过程中,
BBF接入网设备获得外部 IP包头的流程图;
图 10为本发明的实施例五, 图 4的架构下, H(e)NB上电后, BBF接入 网设备获得外部 IP包头的流程图;
图 11为本发明的实施例六, 图 5的架构下, H(e)NB上电后, BBF接入 网设备获得外部 IP包头的流程图。 本发明的较佳实施方式
本发明提供了一种策略控制方法, 包括:
3GPP网络将外部 IP包头发送给 BBF接入网设备;
所述 BBF接入网设备将与所述外部 IP包头匹配的数据包按照所述数据 包的差分服务代码点 (DSCP )进行转发, 将与所述外部 IP 包头不匹配的数 据包按照本地策略进行转发。
其中, 所述外部 IP包头为 IPSec隧道外部 IP包头。 所述 IPSec隧道为用 户设备与 ePDG之间、 用户设备与 P-GW之间或家庭基站与安全网关之间的 IPSec隧道。
其中, 3GPP网络将外部 IP包头发送给 BBF接入网设备的步骤包括: ( 1 )演进的分组数据网关 (ePDG )将所述外部 IP包头发送给 P-GW, 所述 P-GW将所述外部 IP包头发送给 PCRF; 或者, 所述 ePDG直接将所述 外部 IP包头发送给所述 PCRF; 或者, 所述 P-GW将所述外部 IP包头发送给 PCRF;
所述 PCRF将所述外部 IP包头发送给 BPCF; 所述 PCRF是在进行服务 质量授权时, 将所述外部 IP包头发送给所述 BPCF的; 或者, 所述 PCRF是 在向所述 BPCF发起策略互通会话建立时, 将所述外部 IP 包头发送给所述 BPCF的。 或者,
( 2 )安全网关 (SeGW )将所述外部 IP 包头发送给家庭基站策略功能 ( HeNB PF )或 PCRF;
所述 HeNB PF或 PCRF将所述外部 IP包头发送给 BPCF; 所述 HeNB PF 或 PCRF是在向所述 BPCF发起策略互通会话建立时, 将所述外部 IP包头发 送给所述 BPCF。
所述 BPCF将所述外部 IP包头发送给所述 BBF接入网设备;
实施例一
图 6为本发明实施例的 UE通过不可信任 BBF接入网接入 3GPP核心网、 非漫游场景下, 由 BPCF发起 S9*会话的流程图。 图 6中 ePDG与 P-GW之间 釆用 ΡΜΙΡνό协议。
步骤 601 : UE接入 BBF接入系统后, 执行基于 3 GPP的接入认证, UE 提供 IMSI (用于接入认证 ) ;
步骤 602: UE从 BBF接入网获得本地 IP地址。 该地址可能由家庭网关 ( Residential Gateway, RG )或 BNG分配;
步骤 603: 受到步骤 601或步骤 602的触发, BPCF被通知 UE接入 BBF 接入网;
步骤 604: BPCF向 PCRF发送网关控制会话建立消息, 携带用户标识; 步骤 605: PCRF向 BPCF返回网关控制会话建立确认消息。 PCRF可能 需要和 SPR交互获取用户的签约用户策略决策; 步骤 606: UE选择 ePDG后, 发起 IKEv2隧道建立过程, 并釆用扩展认 证协议 ( Extensible Authentication Protocl, EAP )进行认证。 若 UE和 ePDG存 在 NA(P)T (如 RG上存在 NA(P)T ) , 那么 IKEv2信令将执行 NAT穿越; 步骤 607: ePDG选择 P-GW后, 向 P-GW发送代理绑定更新消息, 在代 理绑定更新消息中携带有用户标识、 PDN标识以及外部 IP 包头信息。 对于 S2b场景, 所有的业务数据流都将被 UE和 ePDG之间的 IPSec隧道封装。 因 此, 此时的外部 IP包头信息可以是 UE和 ePDG之间建立的 IPSec隧道外部 IP包头信息。 为了唯一标识这个 IPSec隧道, IPSec隧道外部 IP包头信息中 至少包括 ePDG接收到的 UE发送的 IKEv2信令的源地址(即 IPSec的源地址, 针对 UE的上行方向来说 )。 IPSec隧道外部 IP包头信息还可能包括 ePDG接 收到的 UE发送的 IKEv2信令的 UDP源端口号(即 IPSec的源端口号, 针对 UE的上行方向来说, 也称 UDP源端口号, 下同) , ePDG的地址、 ePDG接 收端口号 (即目的 UDP端口号, 针对 UE上行方向来说)和协议类型等。
由于 IKEv2信令可能经过了 NA(P)T穿越, 因此, ePDG接收到的源地址 和源端口号可能与 UE发送时的源地址和源端口号不同。 若没有经过 NA(P)T 穿越, 则源地址即为 UE在接入 BBF接入网时获得的本地地址。
对于 UE和 ePDG之间不存在 NA(P)T的场景, ePDG接收到的 UE发送 的 IKEv2信令的源地址即为 BBF接入网分配的本地 IP地址, 且该地址可以 唯一标识该 UE被该 IPSec隧道封装的业务数据流, 因此外部 IP包头信息至 少包含本地 IP地址。
对于 UE和 ePDG之间存在( 1:1 ) NAT的场景, ePDG接收到的 UE发 送的 IKEv2信令的源地址为经过 NAT后的公网 IP地址,不过由于是 1:1 NAT, 该地址仍然可以唯一标识该 UE被该 IPSec隧道封装的业务数据流,因此外部 IP包头信息至少包含 ePDG接收到的 UE发送的 IKEv2信令的源地址(即经 BBF接入网 NAT后的公网 IP地址, 若 NAT位于 RG, 该地址就是 RG的地 址) 。
对于 UE和 ePDG之间( N:l ) NAT (即 NAPT ) ,业务数据流在穿越 NAT 时需要进行 UDP封装, NAPT会为该 IPSec隧道分配 UDP源端口号 (针对 UE的上行方向来说) 。 因此为了唯一标识该 UE被该 IPSec隧道封装的业务 数据流, 外部 IP包头信息至少包含 ePDG接收到的 UE发送的 IKEv2信令的 源地址(即经 BBF接入网 NAT后的公网 IP地址, 若 NAT位于 RG, 该地址 就是 RG的地址 )和 ePDG接收到的 UE发送的 IKEv2信令的源端口号 (即 IPSecUDP源端口号) 。
为方便描述, UE被 NAT的 IP地址也称为本地 IP地址。 所以外部 IP包 头信息至少包括 UE的本地 IP地址。 若 UE和 ePDG之间检测到 ΝΑ(Ρ)Τ , 则 外部 IP包头信息还可能包括 IPSecUDP源端口号。外部 IP包头信息还可以包 括 ePDG的地址、 IPSec目的 UDP端口号 (针对 UE的上行方向来说 ) 以及 协议类型等信息。
当然, 外部 IP包头信息可以是包过滤器( packet filter ) , 该过滤器中至 少包含 UE的本地 IP地址。 若 UE和 ePDG之间检测到 ΝΑ(Ρ)Τ , 则该过滤器 还可能包含 IPSecUDP源端口号。 该过滤器还可以包含 ePDG的地址、 IPSec 目的 UDP端口号 (针对 UE的上行方向来说) 以及协议类型等信息。
步骤 608: P-GW为 UE分配 IP地址, 位于 P-GW的 PCEF向 PCRF发送
IP-CAN会话建立指示消息,在 IP-CAN会话建立指示消息中携带有用户标识、 PDN标识、 为 UE分配的 IP地址以及外部 IP包头信息。
步骤 609: PCRF根据用户标识和 PDN标识判断, 若没有相关的用户签 约数据, 则 H-PCRF将与 SPR进行交互获取签约数据。 PCRF根据签约数据、 网络策略和接入网属性等制定 PCC规则, 向 PCEF返回确认消息, 携带 PCC 规则;
步骤 610: P-GW向 AAA Server发送更新 P-GW IP地址消息 , 将 P-GW 的地址发送给 AAA Server, AAA Server进一步与 HSS交互并将 P-GW的地 址保存到 HSS中。
步骤 611 : P-GW向 ePDG返回代理绑定确认消息, 在代理绑定确认消息 中携带有为 UE分配的 IP地址;
步骤 612: 代理绑定更新成功, UE和 ePDG之间建立 IPSec隧道; 步骤 613: ePDG向 UE发送最后一条 IKEv2信令, 其中携带有 UE的 IP 地址;
步骤 614: PCRF向 BPCF提供外部 IP包头信息;
步骤 615: BPCF向 BBF接入网设备 (例如 BNG/BRAS )提供外部 IP包 头信息;
步骤 616: BBF接入网设备 ( BNG/BRAS )保存外部 IP包头后, 返回确 认消息;
步骤 617: BPCF向 PCRF返回确认消息。
步骤 614在 609后即可执行。
通过上述流程, PCRF 与 BPCF 之间建立会话, 并且 BBF 接入网
( BNG/BRAS )获得外部 IP包头信息。 当 UE进行业务访问需要网络为其分 配资源时, PCRF首先将制定的 PCC规则的 QoS信息发送给 BPCF,以便 BBF 接入网执行接纳控制。 然后, PCRF将 BBF接入网接受的 PCC规则发送给 PCEF。 PCEF根据 PCC规则对相应的数据流下行数据的 IP包的头部 (称为 内部包头)进行 DSCP的标记, 当该业务数据流 IP包到达 ePDG时, ePDG 将对 IP包进行 IPSec封装, 并进行 DSCP拷贝。 当这些数据到达 BBF接入网 时, BBF接入网设备首先根据保存的外部 IP包头进行过滤, 只有当匹配到了 外部 IP包头信息的业务数据流才根据 DSCP进行数据转发; 对于匹配不到的 业务数据流, BBF接入网设备根据本地策略进行处理(如重新标记较低优先 级的 DSCP ) 。 对于业务数据流的上行数据, 由 UE进行 IPSec封装并进行 DSCP拷贝, 当数据到达 BBF接入网时, BBF接入网设备首先根据保存的外 部 IP包头信息进行过滤, 只有当匹配到了外部 IP包头信息的业务数据流才 根据 DSCP进行数据转发; 对于匹配不到的业务数据流, BBF接入网设备根 据本地策略进行处理(如重新标记较低优先级的 DSCP ) 。 从而, 那些未经 接纳控制业务数据流不会抢占其他经过接纳控制的业务数据流的资源。
实施例二
图 7为本发明 UE通过不可信任 BBF接入网接入 3GPP核心网的、 非漫 游场景下,由 P-GW触发 PCRF发起 S9*会话的流程图。图 7中 ePDG与 P-GW 之间釆用 ΡΜΙΡνό协议。
步骤 701: UE接入 BBF接入系统后 , BBF接入系统为 UE分配本地 IP 地址。 UE发起 IKEv2隧道建立过程, 并釆用 EAP进行认证。 ePDG与 AAA Server交互 ( AAA Server进一步与 HSS交互 ) 以完成 EAP认证。
步骤 702: ePDG选择 P-GW后, 向 P-GW发送代理绑定更新消息, 在代 理绑定更新消息中携带有用户标识、 PDN标识以及外部 IP 包头信息。 对于 S2b场景, 所有的业务数据流都将被 UE和 ePDG之间的 IPSec隧道封装。 因 此, 此时的外部 IP包头信息可以是 UE和 ePDG之间建立的 IPSec隧道外部 IP包头信息。 为了唯一标识这个 IPSec隧道, IPSec隧道外部 IP包头信息中 至少包括 ePDG接收到的 UE发送的 IKEv2信令的源地址(即 IPSec的源地址, 针对 UE的上行方向来说 )。 IPSec隧道外部 IP包头信息还可能包括 ePDG接 收到的 UE发送的 IKEv2信令的源端口号(即 IPSec的源端口号,针对 UE的 上行方向来说), 以及 ePDG的地址、 ePDG接收的 UDP端口号(即目的 UDP 端口号, 针对 UE上行方向来说)和协议类型等。
由于 IKEv2信令可能经过了 NAT穿越, 因此, ePDG接收到的源地址和 源端口号可能与 UE发送时的源地址和源端口号不同。若没有经过 NAT穿越, 则源地址即为 UE在接入 BBF接入网时获得的本地地址。
对于 UE和 ePDG之间不存在 NAT的场景, ePDG接收到的 UE发送的 IKEv2信令的源地址即为 BBF接入网分配的本地 IP地址 ,且该地址可以唯一 标识该 UE被该 IPSec隧道封装的业务数据流, 因此外部 IP包头信息至少包 含本地 IP地址
对于 UE和 ePDG之间存在( 1:1 ) NAT的场景, ePDG接收到的 UE发 送的 IKEv2信令的源地址为经过 NAT后的公网 IP地址,不过由于是 1:1 NAT, 该地址仍然可以唯一标识该 UE被该 IPSec隧道封装的业务数据流,因此外部 IP包头信息至少包含 ePDG接收到的 UE发送的 IKEv2信令的源地址(即经 BBF接入网 NAT后的公网 IP地址, 若 NAT位于 RG, 该地址就是 RG的地 址) 。
对于 UE和 ePDG之间( N:l )NAT(即 NAPT ) ,业务数据流在穿越 NAPT 时需要进行 UDP封装, NAPT会为该 IPSec隧道分配 UDP源端口号 (针对 UE的上行方向来说 ) 。 因此为了唯一标识该 UE被该 IPSec隧道封装的业务 数据流, 外部 IP包头信息至少包含 ePDG接收到的 UE发送的 IKEv2信令的 源地址(即经 BBF接入网 NAPT后的公网 IP地址, 若 NAPT位于 RG, 该地 址就是 RG的地址 )和 ePDG接收到的 UE发送的 IKEv2信令的源端口号(即 IPSecUDP源端口号) 。
为方便描述, UE被 NAT的 IP地址也称为本地 IP地址。 所以外部 IP包 头信息至少包括 UE的本地 IP地址。 若 UE和 ePDG之间检测到 ΝΑ(Ρ)Τ , 则 外部 IP包头信息还可能包括 IPSecUDP源端口号。外部 IP包头信息还可以包 括 ePDG的地址、 IPSec目的 UDP端口号 (针对 UE的上行方向来说 ) 以及 协议类型等信息。
当然, 在具体实现时, 外部 IP包头信息可以是包过滤器(packet filter ) , 该过滤器中至少包含 UE的本地 IP地址。若 UE和 ePDG之间检测到 ΝΑ(Ρ)Τ , 则该过滤器还可能包含 IPSecUDP源端口号。 该过滤器还可以包含 ePDG的 地址、 IPSec目的 UDP端口号 (针对 UE的上行方向来说 ) 以及协议类型等 信息。
步骤 703: P-GW为 UE分配 IP地址, 位于 P-GW的 PCEF向 PCRF发送 IP-CAN会话建立指示消息,在 IP-CAN会话建立指示消息中携带有用户标识、 PDN标识、 为 UE分配的 IP地址以及外部 IP包头信息。
步骤 704: PCRF根据用户标识和 PDN标识判断, 若没有相关的用户签 约数据, 则 PCRF将与 SPR进行交互获取签约数据。 PCRF根据签约数据, 网络策略, 接入网属性等制定 PCC规则。 PCRF向 PCEF返回确认消息, 携 带 PCC规则;
步骤 705: P-GW向 AAA Server发送更新 P-GW IP地址消息, 将 P-GW 的地址发送给 AAA Server, AAA Server进一步与 HSS交互并将 P-GW的地 址保存到 HSS中。
步骤 706: P-GW向 ePDG返回代理绑定确认消息, 在代理绑定确认消息 中携带有为 UE分配的 IP地址; 步骤 707: 代理绑定更新成功 , UE和 ePDG之间建立 IPSec隧道。
步骤 708、 ePDG向 UE发送最后一条 IKEv2信令, 其中携带有 UE的 IP 地址。
步骤 709: PCRF根据外部 IP包头信息确定 UE当前接入的 BBF接入网 的 BPCF, 并向 BPCF发送 PCRF发起网关控制会话建立消息, 在该网关控制 会话建立消息中携带有外部 IP包头信息。
步骤 709在步骤 703后即可执行;
步骤 710: BPCF向 BBF接入网设备 (例如 BNG/BRAS )提供外部 IP包 头;
步骤 711 : BBF接入网设备保存外部 IP包头后, 返回确认消息; 步骤 712: BPCF向 PCRF返回确认消息。
通过上述流程, PCRF与 BPCF之间建立的会话, 并且 BBF接入网设备 ( BNG/BRAS )获得外部 IP包头信息。 当 UE进行业务访问需要网络为其分 配资源时, PCRF首先将制定的 PCC规则的 QoS信息发送给 BPCF, 以便 BBF接入网执行接纳控制。 然后, PCRF将 BBF接入网接受的 PCC规则发送 给 PCEF。 PCEF根据 PCC规则对相应的数据流的下行 IP包的头部 (称为内 部包头)进行 DSCP的标记, 当该业务数据流 IP包到达 ePDG时, ePDG将 对 IP包进行 IPSec封装,并进行 DSCP拷贝。当这些数据到达 BBF接入网时, BBF接入网设备首先根据保存的外部 IP包头信息进行过滤,只有当匹配到了 外部 IP包头信息的业务数据流才根据 DSCP进行数据转发; 对于匹配不到的 业务数据流, BBF接入网设备根据本地策略进行处理(如重新标记较低优先 级的 DSCP ) 。 对于业务数据流的上行数据, 由 UE进行 IPSec封装并进行 DSCP拷贝, 当数据到达 BBF接入网时, BBF接入网设备首先根据保存的外 部 IP包头信息进行过滤, 只有当匹配到了外部 IP包头信息的业务数据流才 根据 DSCP进行数据转发; 对于匹配不到的业务数据流, BBF接入网设备根 据本地策略进行处理(如重新标记较低优先级的 DSCP ) 。 从而, 那些未经 接纳控制业务数据流不会抢占其他经过接纳控制的业务数据流的资源。 本实施例同样适用于漫游场景 (包括家乡路由和本地疏导) 。 对于 ePDG与 P-GW之间釆用 GTP协议的场景, 流程类似。 ePDG将在 创建会话请求消息中携带外部 IP包头信息。
实施例三
图 8为本发明 UE通过不可信任 BBF接入网接入 3GPP核心网的、 非漫 游场景下,由 P-GW触发 PCRF发起 S9*会话的流程图。图 8中 ePDG与 P-GW 之间釆用 ΡΜΙΡνό协议。
步骤 801: UE接入 BBF接入系统后, BBF接入系统为 UE分配本地 IP 地址。 UE发起 IKEv2隧道建立过程, 并釆用 EAP进行认证。 ePDG与 AAA Server交互 ( AAA Server进一步与 HSS交互 ) 以完成 EAP认证。
步骤 802: ePDG向 PCRF发送网关控制会话建立消息, 携带外部 IP包 头信息。 对于 S2b场景, 所有的业务数据流都将被 UE和 ePDG之间的 IPSec 隧道封装。因此,此时的外部 IP包头信息可以是 UE和 ePDG之间建立的 IPSec 隧道外部 IP包头信息。 为了唯一标识这个 IPSec隧道, IPSec隧道外部 IP包 头信息中至少包括 ePDG接收到的 UE发送的 IKEv2信令的源地址(即 IPSec 的源地址, 针对 UE的上行方向来说) 。 IPSec隧道外部 IP包头信息还可能 包括 ePDG接收到的 UE发送的 IKEv2信令的源端口号(即 IPSec的源端口号, 针对 UE上行方向来说) , 以及 ePDG的地址、 ePDG接收 UDP端口号 (即 目的 UDP端口号, 针对 UE上行方向来说)和协议类型等。
由于 IKEv2信令可能经过了 NAT穿越, 因此, ePDG接收到的源地址和 源端口号可能与 UE发送时的源地址和源端口号不同。若没有经过 NAT穿越, 则源地址即为 UE在接入 BBF接入网时获得的本地地址。
对于 UE和 ePDG之间不存在 NAT的场景, ePDG接收到的 UE发送的 IKEv2信令的源地址即为 BBF接入网分配的本地 IP地址 ,且该地址可以唯一 标识该 UE被该 IPSec隧道封装的业务数据流, 因此外部 IP包头信息至少包 含本地 IP地址
对于 UE和 ePDG之间存在( 1:1 ) NAT的场景, ePDG接收到的 UE发 送的 IKEv2信令的源地址为经过 NAT后的公网 IP地址,不过由于是 1 :1 NAT, 该地址仍然可以唯一标识该 UE被该 IPSec隧道封装的业务数据流,因此外部 IP包头信息至少包含 ePDG接收到的 UE发送的 IKEv2信令的源地址(即经 BBF接入网 NAT后的公网 IP地址, 若 NAT位于 RG, 该地址就是 RG的地 址) 。
对于 UE和 ePDG之间( N:l )NAT(即 NAPT ) ,业务数据流在穿越 NAPT 时需要进行 UDP封装, NAPT会为该 IPSec隧道分配 UDP源端口号 (针对 UE的上行方向来说 ) 。 因此为了唯一标识该 UE被该 IPSec隧道封装的业务 数据流, 外部 IP包头信息至少包含 ePDG接收到的 UE发送的 IKEv2信令的 源地址(即经 BBF接入网 NAPT后的公网 IP地址, 若 NAPT位于 RG, 该地 址就是 RG的地址 )和 ePDG接收到的 UE发送的 IKEv2信令的源端口号(即 IPSecUDP源端口号) 。
为方便描述, UE被 NAT的 IP地址也称为本地 IP地址。 所以外部 IP包 头信息至少包括 UE的本地 IP地址。 若 UE和 ePDG之间检测到 ΝΑ(Ρ)Τ , 则 外部 IP包头信息还可能包括 IPSecUDP源端口号。外部 IP包头信息还可以包 括 ePDG的地址、 IPSec目的 UDP端口号 (针对 UE的上行方向来说 ) 以及 协议类型等信息。
当然, 在具体实现时, 外部 IP包头信息可以是包过滤器(packet filter ) , 该过滤器中至少包含 UE的本地 IP地址。若 UE和 ePDG之间检测到 ΝΑ(Ρ)Τ , 则该过滤器还可能包含 IPSecUDP源端口号。 该过滤器还可以包含 ePDG的 地址、 IPSec目的 UDP端口号 (针对 UE的上行方向来说) 以及协议类型等 信息。
步骤 803: PCRF向 ePDG返回确认消息;
步骤 804: ePDG选择 P-GW后, 向 P-GW发送代理绑定更新消息, 在代 理绑定更新消息中携带有用户标识和 PDN标识以及外部 IP包头信息;
步骤 805: P-GW为 UE分配 IP地址, 位于 P-GW的 PCEF向 PCRF发送 IP-CAN会话建立指示消息,在 IP-CAN会话建立指示消息中携带有用户标识、 PDN标识、 为 UE分配的 IP地址;
步骤 806: PCRF根据用户标识和 PDN标识判断, 若没有相关的用户签 约数据, 则 H-PCRF将与 SPR进行交互获取签约信息。 PCRF根据签约数据, 网络策略, 接入网属性等制定 PCC规则。 PCRF向 PCEF返回确认消息, 携 带 PCC规则;
步骤 807: P-GW向 AAA Server发送更新 P-GW IP地址消息, 将 P-GW 的地址发送给 AAA Server, AAA Server进一步与 HSS交互并将 P-GW的地 址保存到 HSS中。
步骤 808: P-GW向 ePDG返回代理绑定确认消息, 在代理绑定确认消息 中携带有为 UE分配的 IP地址;
步骤 809: 代理绑定更新成功, UE和 ePDG之间建立 IPSec隧道。
步骤 810、 ePDG向 UE发送最后一条 IKEv2信令, 其中携带有 UE的 IP 地址。
步骤 811 : PCRF根据外部 IP包头信息确定 UE当前接入的 BBF接入网 的 BPCF, 并向 BPCF发送 PCRF发起的网关控制会话建立消息, 在 PCRF发 起的网关控制会话建立消息中携带有外部 IP包头信息。
步骤 811只要在步骤 802后即可执行;
步骤 812: BPCF向 BBF接入网设备 (例如 BNG/BRAS )提供外部 IP包 头;
步骤 813: BBF接入网设备保存外部 IP包头后, 返回确认消息; 步骤 814: BPCF向 PCRF返回确认消息。
通过上述流程, PCRF 与 BPCF 之间建立的会话, 并且 BBF接入网 ( BNG/BRAS )获得外部 IP包头信息。 当 UE进行业务访问是需要网络为其 分配资源时, PCRF首先将制定的 PCC规则的 QoS信息发送给 BPCF, 以便 BBF接入网执行接纳控制。 然后, PCRF将 BBF接入网接受的 PCC规则发 送给 PCEF。 PCEF根据 PCC规则对相应的数据流的下行数据的 IP包的头部 (称为内部包头)进行 DSCP的标记, 当该业务数据流 IP包到达 ePDG时, ePDG将对 IP包进行 IPSec封装, 并进行 DSCP拷贝。 当这些数据到达 BBF 接入网时, BBF接入网设备首先根据保存的外部 IP包头信息进行过滤, 只有 当匹配到了外部 IP包头信息的业务数据流才根据 DSCP进行数据转发; 对于 匹配不到的业务数据流, BBF接入网设备根据本地策略进行处理(如重新标 记较低优先级的 DSCP )。 对于业务数据流的上行数据, 由 UE进行 IPSec封 装并进行 DSCP拷贝, 当数据到达 BBF接入网时, BBF接入网设备首先根据 保存的外部 IP包头信息进行过滤, 只有当匹配到了外部 IP包头信息的业务 数据流才根据 DSCP进行数据转发; 对于匹配不到的业务数据流, BBF接入 网设备根据本地策略进行处理(如重新标记较低优先级的 DSCP ) 。 从而, 那些未经接纳控制业务数据流不会抢占其他经过接纳控制的业务数据流的资 源。
本实施例同样适用于漫游场景 (包括家乡路由和本地疏导) 。
对于 ePDG与 P-GW之间釆用 GTP协议的场景, 流程类似。 ePDG将在 创建会话请求消息中携带外部 IP包头信息。
对于 UE通过可信任 BBF接入网接入 3GPP核心网, 并且 UE釆用
DSMIPv6接入的场景,
( 1 ) 当 UE与 P-GW之间建立 IPSec隧道对用户面数据封装时, P-GW 将外部 IP包头信息(即 IPSec隧道的外部 IP包头信息 )发送给 PCRF, PCRF 发送给 BPCF, BPCF再发送给 BBF接入网设备。 BBF接入网设备根据外部 IP包头信息对数据包进行匹配, 并进一步执行根据 DSCP数据包转发。 相关 流程和思想与以上实施例类似, 不再赘述。 其中上述外部 IP包头信息至少包 含 UE的本地 IP地址。 若 UE和 ePDG之间检测到 NA(P)T, 则还可能包含 IPSecUDP源端口号(针对 UE的上行方向来说 )。 当然还可以包括 P-GW的 地址、 IPSec目的 UDP端口号 (针对 UE的上行方向来说) 以及协议类型等 信息。
( 2 )当 UE与 P-GW之间不釆用 IPSec隧道对用户面数据封装时, P-GW 将外部 IP包头信息 (即 DSMIPv6隧道的外部 IP包头信息)发送给 PCRF, PCRF发送给 BPCF , BPCF再发送给 BBF接入网设备。 BBF接入网设备根据 外部 IP包头信息对数据包进行匹配, 并进一步执行根据 DSCP数据包转发。 相关流程和思想与以上实施例类似, 不再赘述。 其中上述外部 IP包头信息至 少包含 UE的本地 IP地址。 若 UE和 ePDG之间检测到 ΝΑ(Ρ)Τ , 则还可能包 含 DSMIPv6绑定更新信令的 UDP源端口号 (针对 UE的上行方向来说, 该 端口号是 UE执行绑定更新时, 信绑定更新信令穿越 NAPT时, NAPT分配 的 UDP端口号) 。 当然还可以包括 P-GW的地址、 DSMIPv6绑定更新信令 的目的 UDP端口号 (针对 UE的上行方向来说) 以及协议类型等信息。
同样, 对于 UE通过不可信任 BBF接入网接入 3GPP核心网, 并且 UE 釆用 DSMIPv6接入的场景。
( 1 ) UE与 ePDG之间建立 IPSec隧道, UE和 P-GW之间的所有的业务 数据流都将被该 IPSec隧道封装。 ePDG将外部 IP包头信息( IPSec隧道的外 部 IP包头信息)发送给 PCRF, PCRF发送给 BPCF, BPCF再发送给 BBF接 入网设备。 BBF接入网设备根据外部 IP包头信息对数据包进行匹配, 并进一 步执行根据 DSCP数据包转发。 相关流程和思想与以上实施例类似, 不再赘 述。 其中上述外部 IP包头信息至少包含 UE的本地 IP地址。 若 UE和 ePDG 之间检测到 ΝΑ(Ρ)Τ , 则还可以包含 IPSecUDP源端口号 (针对 UE的上行方 向来说) 。 还可以包括 ePDG的地址、 IPSec目的 UDP端口号 (针对 UE的 上行方向来说) 以及协议类型等信息。
上述针对 DSMIPv6场景中的外部 IP包头部信息, 也可以通过包过滤器 形式实现。
实施例四
图 9为图 3所示架构下, UE附着到 EPS过程中, BBF接入网设备获得 外部 IP包头的流程。
步骤 901: HeNB上电后, 获得 BBF接入网分配的用户终端设备 ( CPE, Customer Premises Equipment ) IP地址(即本地 IP地址) , HeNB用 CPE IP 地址与 SeGW进行 IKEv2信令交互, 建立 IPSec隧道。在这个过程中, SeGW 为 HeNB分配 HeNB IP地址 , 用于 HeNB与其他 3GPP网元交互; SeGW获 得外部 IP包头信息。 对于 HeNB场景, 该 HeNB的所有业务数据流都将被 HeNB和 SeGW之间的 IPSec隧道封装。 因此, 此时的外部 IP包头信息可以 是 HeNB和 SeGW之间建立的 IPSec隧道外部 IP包头信息。 为了唯一标识这 个 IPSec隧道, IPSec隧道外部 IP包头信息中至少包括 SeGW接收到的 HeNB 发送的 IKEv2信令的源地址(即 IPSec的源地址, 针对 HeNB的上行方向来 说) 。 IPSec隧道外部 IP包头信息还可能包括 SeGW接收到的 HeNB发送的 IKEv2信令的源端口号 (即 IPSec的源端口号, 针对 HeNB上行方向来说) , 以及 SeGW的地址、 SeGW的接收 UDP端口号 (即目的 UDP端口号, 针对 HeNB上行方向来说)和协议类型等;
由于 IKEv2信令可能经过了 NAT穿越, 因此, SeGW接收到的源地址和 源端口号可能与 HeNB发送时的源地址和源端口号不同。若没有经过 NA(P)T 穿越, 则源地址即为 HeNB在接入 BBF接入网时获得的本地 IP地址。
对于 HeNB和 SeGW之间不存在 NAT的场景, SeGW接收到的 HeNB发 送的 IKEv2信令的源地址即为 BBF接入网分配的本地 IP地址, 且该地址可 以唯一标识该 HeNB被该 IPSec隧道封装的业务数据流, 因此外部 IP包头信 息至少包含本地 IP地址
对于 HeNB和 SeGW之间存在( 1:1 )NAT的场景, SeGW接收到的 HeNB 发送的 IKEv2信令的源地址为经过 NAT后的公网 IP地址, 不过由于是 1:1 NAT, 该地址仍然可以唯一标识该 HeNB被该 IPSec隧道封装的业务数据流, 因此外部 IP包头信息至少包含 SeGW接收到的 HeNB发送的 IKEv2信令的源 地址(即经 BBF接入网 NAT后的公网 IP地址, 若 NAT位于 RG, 该地址就 是 RG的地址) 。
对于 HeNB和 SeGW之间 ( N: l ) NAT (即 NAPT ) , 业务数据流在穿越 NAPT时需要进行 UDP封装, NAPT会为该 IPSec隧道分配 UDP源端口号(针 对 HeNB的上行方向来说 )。 因此为了唯一标识该 UE被该 IPSec隧道封装的 业务数据流,外部 IP包头信息至少包含 SeGW接收到的 HeNB发送的 IKEv2 信令的源地址(即经 BBF接入网 NAT后的公网 IP地址, 若 NAPT位于 RG, 该地址就是 RG的地址 )和 SeGW接收到的 HeNB发送的 IKEv2信令的源端 口号 (即 IPSecUDP源端口号) 。
为方便描述, HeNB被 NAT的 IP地址也称为本地 IP地址。 所以外部 IP 包头信息至少包括 HeNB 的本地 IP地址。 若 HeNB和 SeGW之间检测到 NA(P)T, 则外部 IP包头信息还可能包括 IPSecUDP源端口号。 外部 IP包头 信息还可以包括 SeGW的地址、 IPSec目的 UDP端口号(针对 HeNB的上行 方向来说) 以及协议类型等信息。
当然, 在具体实现时, 外部 IP包头信息可以是包过滤器( packet filter ) , 该包过滤器中至少包含 HeNB的本地 IP地址。若 HeNB和 SeGW之间检测到 NA(P)T, 则该包过滤器还可能包含 IPSecUDP源端口号。 该过滤器还可以包 含 SeGW的地址、 IPSec目的 UDP端口号(针对 HeNB的上行方向来说 ) 以 及协议类型等信息。
步骤 902: UE向 HeNB发送附着请求消息, 携带用户标识;
步骤 903: HeNB向 MME发送附着请求消息, 携带用户标识。 在该消息 经过 SeGW时, SeGW将步骤 901中获得的外部 IP包头信息加入该消息中携 带给 MME;
步骤 904: MME向 HSS发送位置更新请求, 携带用户标识;
步骤 905: HSS向 MME返回位置更新应答, 返回用户签约信息; 步骤 906: MME向 S-GW发送创建会话请求, 携带用户标识, PDN标识 和外部 IP包头信息;
步骤 907: S-GW向 P-GW发送创建会话请求, 携带用户标识, PDN标 识和外部 IP包头信息;
步骤 908: P-GW向 PCRF发送 IP-CAN会话建立指示, 携带用户标识,
PDN标识和外部 IP包头信息;
步骤 909: PCRF根据外部 IP包头确定 UE 当前接入的 BBF接入网的 BPCF, 并向 BPCF发送 PCRF发起网关控制会话建立消息, 在该网关控制会 话建立消息中携带有外部 IP包头信息;
步骤 910: BPCF向 BBF接入网设备 (例如 BNG/BRAS )提供外部 IP包 头信息;
步骤 911 : BBF接入网设备保存外部 IP包头信息后, 向 BPCF返回确认 消息; 步骤 912: BPCF向 PCRF返回应答消息;
步骤 913: PCRF向 PCEF返回 IP-CAN会话建立确认;
步骤 914: PCEF位于的网关 P-GW向 S-GW返回创建会话应答; 步骤 915: S-GW向 MME返回创建会话应答;
步骤 916: MME、 HeNB和 UE进行交互, 建立无线承载;
步骤 917: MME与 S-GW交互, 更新承载。
通过上述流程, PCRF 与 BPCF 之间建立会话, 并且 BBF 接入网 ( BNG/BRAS )获得外部 IP包头信息。 当 UE进行业务访问需要网络为其分 配资源时, PCRF首先将制定的 PCC规则的 QoS信息发送给 BPCF,以便 BBF 接入网执行接纳控制。 然后, PCRF将 BBF接入网接受的 PCC规则发送给 PCEF。 PCEF根据 PCC规则对相应的数据流的下行数据的 IP包的头部 (称 为内部包头)进行 DSCP的标记,当该业务数据流 IP包到达 SeGW时, SeGW 将对 IP包进行 IPSec封装, 并进行 DSCP拷贝。 当这些数据到达 BBF接入网 时, BBF接入网设备首先根据保存的外部 IP包头信息进行过滤, 只有当匹配 到了外部 IP包头信息的业务数据流才根据 DSCP进行数据转发; 对于匹配不 到的业务数据流, BBF接入网设备根据本地策略进行处理(如重新标记较低 优先级的 DSCP ) 。 对于业务数据流的上行数据, 由 HeNB进行 IPSec封装 并进行 DSCP拷贝, 当数据到达 BBF接入网时, BBF接入网设备首先根据保 存的外部 IP包头信息进行过滤, 只有当匹配到了外部 IP包头信息的业务数 据流才根据 DSCP进行数据转发; 对于匹配不到的业务数据流, BBF接入网 设备根据本地策略进行处理(如重新标记较低优先级的 DSCP ) 。 从而, 那 些未经接纳控制业务数据流不会抢占其他经过接纳控制的业务数据流的资 源。
对于 HNB附着接入 UMTS系统过程, BBF接入网设备获得外部 IP包头 信息的流程与此类似。 此时的外部 IP包头信息可以是 HNB和 SeGW之间建 立的 IPSec隧道外部 IP包头信息。 为了唯一标识这个 IPSec隧道, IPSec隧道 外部 IP包头信息中至少包括 SeGW接收到的 HNB发送的 IKEv2信令的源地 址(即 IPSec的源地址, 针对 HNB的上行方向来说 ) 。 IPSec隧道外部 IP包 头信息还可能包括 SeGW接收到的 HNB发送的 IKEv2信令的源端口号 (即 IPSec的源端口号, 针对 HNB上行方向来说 ) , 如果 HNB和 SeGW之间检 测到 NA(P)T。 当然, 还可能包含 SeGW的地址、 SeGW的接收 UDP端口号 (即目的 UDP端口号, 针对 HNB上行方向来说)和协议类型等; 同样, 该 外部 IP包头信息可以釆用包过滤器形式实现。
在其他是实施例中, 在步骤 901中, SeGW将外部 IP包头部信息发送给 HeNB, 在步骤 902中, HeNB将外部 IP包头部信息发送给 MME, 其他步骤 不变。
实施例五
图 10为图 4的架构下, H(e)NB上电后, BBF接入网设备获得外部 IP包 头的流程。
步骤 1001: H(e)NB上电后, 获得 BBF接入网分配的 CPE IP地址(即本 地 IP地址), H(e)NB用 CPE IP地址与 SeGW进行 IKEv2信令交互,建立 IPSec 隧道。 在这个过程中, SeGW为 H(e)NB分配 H(e)NB IP地址, 用于 H(e)NB 与其他 3GPP网元交互;
步骤 1002: SeGW向 H(e)NB PF通知 CEP IP地址和 H(e)NB IP地址的关 联关系, 携带外部 IP包头信息。 对于 H(e)NB场景, 该 H(e)NB的所有业务 数据流都将被 H(e)NB和 SeGW之间的 IPSec隧道封装。 因此, 此时的外部 IP包头信息可以是 H(e)NB和 SeGW之间建立的 IPSec隧道外部 IP包头信息。 为了唯一标识这个 IPSec隧道, IPSec隧道外部 IP包头信息中至少包括 SeGW 接收到的 H(e)NB发送的 IKEv2信令的源地址(即 IPSec的源地址,针对 H(e)NB 的上行方向来说) 。 IPSec隧道外部 IP包头信息还可能包括 SeGW接收到的 HeNB发送的 IKEv2信令的源端口号(即 IPSec的源端口号, 针对 H(e)NB上 行方向来说), 以及 SeGW的地址、 SeGW的接收 UDP端口号(即目的 UDP 端口号, 针对 H(e)NB上行方向来说)和协议类型等; ;
由于 IKEv2信令可能经过了 NA(P)T穿越, 因此, SeGW接收到的源地 址和源端口号可能与 H(e)NB发送时的源地址和源端口号不同。 若没有经过 NAT穿越, 则源地址即为 H(e)NB在接入 BBF接入网时获得的 CPE IP地址。
对于 H(e)NB和 SeGW之间不存在 NAT的场景, SeGW接收到的 H(e)NB 发送的 IKEv2信令的源地址即为 BBF接入网分配的本地 IP地址, 且该地址 可以唯一标识该 H(e)NB被该 IPSec隧道封装的业务数据流, 因此外部 IP包 头信息至少包含本地 IP地址
对于 H(e)NB和 SeGW之间存在( 1:1 ) NAT的场景, SeGW接收到的 H(e)NB发送的 IKEv2信令的源地址为经过 NAT后的公网 IP地址, 不过由于 是 1:1 NAT, 该地址仍然可以唯一标识该 H(e)NB被该 IPSec隧道封装的业务 数据流,因此外部 IP包头信息至少包含 SeGW接收到的 H(e)NB发送的 IKEv2 信令的源地址(即经 BBF接入网 NAT后的公网 IP地址, 若 NAT位于 RG, 该地址就是 RG的地址) 。
对于 H(e)NB和 SeGW之间 ( N:l ) NAT (即 NAPT ) , 业务数据流在穿 越 NAPT时需要进行 UDP封装, NAPT会为该 IPSec隧道分配 UDP源端口号 (针对 H(e)NB的上行方向来说 )。 因此为了唯一标识该 UE被该 IPSec隧道 封装的业务数据流, 外部 IP包头信息至少包含 SeGW接收到的 H(e)NB发送 的 IKEv2信令的源地址(即经 BBF接入网 NAT后的公网 IP地址, 若 NAPT 位于 RG, 该地址就是 RG的地址 )和 SeGW接收到的 H(e)NB发送的 IKEv2 信令的源端口号 (即 IPSecUDP源端口号) 。
为方便描述, H(e)NB被 NAT的 IP地址也称为本地 IP地址。 所以外部
IP包头信息至少包括 H(e)NB的本地 IP地址。 若 H(e)NB和 SeGW之间检测 到 NA(P)T, 则外部 IP包头信息还可能包括 IPSecUDP源端口号。 外部 IP包 头信息还可以包括 SeGW的地址、 IPSec目的 UDP端口号 (针对 H(e)NB的 上行方向来说) 以及协议类型等信息。
当然, 在具体实现时, 外部 IP包头信息可以是包过滤器( packet filter ) , 该包过滤器中至少包含 H(e)NB的本地 IP地址。 若 H(e)NB和 SeGW之间检 测到 NA(P)T, 则该包过滤器还可能包含 IPSecUDP源端口号。 该过滤器还可 以包含 SeGW的地址、 IPSec目的 UDP端口号 (针对 H(e)NB的上行方向来 说) 以及协议类型等信息。 步骤 1003: H(e)NB PF保存关联关系后, 返回接受消息;
步骤 1004: H(e)NB与 H(e)NB GW或 MME建立 S1或 Iuh连接; 步骤 1005: H(e)NB GW或 MME与 H(e)NB PF建立 T2会话, 其中携带 CSG ID以及 H(e)NB IP地址;
步骤 1006: H(e)NB PF根据 H(e)NB IP地址将 T2会话与步骤 1002进行 关联, 从而获得该 H(e)NB的 CPE IP地址, H(e)NB PF根据 CPE IP地址确定 H(e)NB接入的 BBF接入网的 BPCF。 H(e)NB PF向 BPCF建立 S9*会话, 携 带 CPE IP地址和外部 IP包头信息;
步骤 1007: BPCF向 BBF接入网设备 (例如 BNG/BRAS )提供外部 IP 包头信息;
步骤 1008: BBF接入网设备保存外部 IP包头信息后, 向 BPCF返回确认 消息;
步骤 1009: BPCF向 H(e)NB PF返回应答消息;
步骤 1010: H(e)NB PF向 H(e)NB GW或 MME返回应答消息。
通过上述流程, H(e)NB PF与 BPCF之间建立会话, 并且 BBF接入网
( BNG/BRAS )获得外部 IP包头信息。 当 UE进行业务访问需要网络为其分 配资源时, PCRF首先将制定的 PCC规则的 QoS信息发送给 BPCF,以便 BBF 接入网执行接纳控制。 然后, PCRF将 BBF接入网接受的 PCC规则发送给 PCEF。 PCEF根据 PCC规则对相应的数据流的下行数据的 IP包的头部 (称 为内部包头)进行 DSCP的标记,当该业务数据流 IP包到达 SeGW时, SeGW 将对 IP包进行 IPSec封装, 并进行 DSCP拷贝。 当这些数据到达 BBF接入网 时, BBF接入网设备首先根据保存的外部 IP包头信息进行过滤, 只有当匹配 到了外部 IP包头信息的业务数据流才根据 DSCP进行数据转发; 对于匹配不 到的业务数据流, BBF接入网设备根据本地策略进行处理(如重新标记较低 优先级的 DSCP )。 对于业务数据流的上行数据, 由 H(e)NB进行 IPSec封装 并进行 DSCP拷贝, 当数据到达 BBF接入网时, BBF接入网设备首先根据保 存的外部 IP包头进行过滤, 只有当匹配到了外部 IP包头信息的业务数据流 才根据 DSCP进行数据转发; 对于匹配不到的业务数据流, BBF接入网设备 根据本地策略进行处理(如重新标记较低优先级的 DSCP ) 。 从而, 那些未 经接纳控制业务数据流不会抢占其他经过接纳控制的业务数据流的资源。
在其他实施例中, 若 SeGW与 H(e)NB PF的接口不存在, 则在步骤 1001 中, SeGW将外部 IP包头部信息发送给 H(e)NB, 步骤 1002、 步骤 1003不执 行, 在步骤 1004中, H(e)NB将外部 IP包头部信息发送给 H(e)NB PF, 其他 步骤不变。
实施例六
图 11为图 5的架构下, H(e)NB上电后, BBF接入网设备获得外部 IP包 头的流程。
步骤 1101 : H(e)NB上电后,获得 BBF接入网分配的用户终端设备 CPE IP 地址(即本地 IP地址 ) , H(e)NB用 CPE IP地址与 SeGW进行 IKEv2信令交 互, 建立 IPSec隧道。在这个过程中, SeGW为 H(e)NB分配 H(e)NB IP地址, 用于 H(e)NB与其他 3GPP网元交互;
步骤 1102: SeGW向 H(e)NB PF通知 CEP IP地址和 H(e)NB IP地址的关 联关系, 携带外部 IP包头信息。 对于 H(e)NB场景, 该 H(e)NB的所有业务 数据流都将被 H(e)NB和 SeGW之间的 IPSec隧道封装。 因此, 此时的外部 IP包头信息可以是 H(e)NB和 SeGW之间建立的 IPSec隧道外部 IP包头信息。 为了唯一标识这个 IPSec隧道, IPSec隧道外部 IP包头信息中至少包括 SeGW 接收到的 H(e)NB发送的 IKEv2信令的源地址(即 IPSec的源地址,针对 H(e)NB 的上行方向来说) 。 IPSec隧道外部 IP包头信息还可能包括 SeGW接收到的 HeNB发送的 IKEv2信令的源端口号(即 IPSec的源端口号, 针对 H ( e)NB上 行方向来说), 以及 SeGW的地址、 SeGW的接收 UDP端口号(即目的 UDP 端口号, 针对 H(e)NB上行方向来说)和协议类型等;
由于 IKEv2信令可能经过了 NAT穿越, 因此, SeGW接收到的源地址和 源端口号可能与 UE发送时的源地址和源端口号不同。若没有经过 NAT穿越, 则源地址即为 UE在接入 BBF接入网时获得的 CPE IP地址;
对于 H(e)NB和 SeGW之间不存在 NAT的场景, SeGW接收到的 H(e)NB 发送的 IKEv2信令的源地址即为 BBF接入网分配的本地 IP地址, 且该地址 可以唯一标识该 H(e)NB被该 IPSec隧道封装的业务数据流, 因此外部 IP包 头信息至少包含本地 IP地址
对于 H(e)NB和 SeGW之间存在( 1:1 ) NAT的场景, SeGW接收到的 H(e)NB发送的 IKEv2信令的源地址为经过 NAT后的公网 IP地址, 不过由于 是 1:1 NAT, 该地址仍然可以唯一标识该 H(e)NB被该 IPSec隧道封装的业务 数据流,因此外部 IP包头信息至少包含 SeGW接收到的 H(e)NB发送的 IKEv2 信令的源地址(即经 BBF接入网 NAT后的公网 IP地址, 若 NAT位于 RG, 该地址就是 RG的地址) 。
对于 H(e)NB和 SeGW之间 ( N:l ) NAT (即 NAPT ) , 业务数据流在穿 越 NAPT时需要进行 UDP封装, NAPT会为该 IPSec隧道分配 UDP源端口号 (针对 H(e)NB的上行方向来说 )。 因此为了唯一标识该 UE被该 IPSec隧道 封装的业务数据流, 外部 IP包头信息至少包含 SeGW接收到的 H(e)NB发送 的 IKEv2信令的源地址(即经 BBF接入网 NAT后的公网 IP地址, 若 NAPT 位于 RG, 该地址就是 RG的地址 )和 SeGW接收到的 H(e)NB发送的 IKEv2 信令的源端口号 (即 IPSecUDP源端口号) 。
为方便描述, H(e)NB被 NAT的 IP地址也称为本地 IP地址。 所以外部 IP包头信息至少包括 H(e)NB的本地 IP地址。 若 H(e)NB和 SeGW之间检测 到 NA(P)T, 则外部 IP包头信息还可能包括 IPSecUDP源端口号。 外部 IP包 头信息还可以包括 SeGW的地址、 IPSec目的 UDP端口号 (针对 H(e)NB的 上行方向来说) 以及协议类型等信息。
当然, 在具体实现时, 外部 IP包头信息可以是包过滤器(packet filter ) , 该包过滤器中至少包含 H(e)NB的本地 IP地址。 若 H(e)NB和 SeGW之间检 测到 NA(P)T, 则该包过滤器还可能包含 IPSecUDP源端口号。 该过滤器还可 以包含 SeGW的地址、 IPSec目的 UDP端口号 (针对 H(e)NB的上行方向来 说) 以及协议类型等信息。
步骤 1103: H(e)NB PF保存关联关系后, 返回接受消息;
步骤 1104: H(e)NB与 H(e)NB GW或 MME建立 S1或 Iuh连接; 步骤 1105: H(e)NB与 H(e)NB PF建立 T2会话, 其中携带 CSG ID以及 H(e)NB IP地址;
步骤 1106: H(e)NB PF根据 H(e)NB IP地址将 T2会话与步骤 1102进行 关联, 从而获得该 H(e)NB的 CPE IP地址, H(e)NB PF根据 CPE IP地址确定 H(e)NB接入的 BBF接入网的 BPCF。 H(e)NB PF向 BPCF建立 S9*会话, 携 带 CPE IP地址和外部 IP包头信息;
步骤 1107: BPCF向 BBF接入网设备 (例如 BNG/BRAS )提供外部 IP 包头信息;
步骤 1108: BBF接入网设备保存外部 IP包头信息后, 返回确认消息给 BPCF;
步骤 1109: BPCF返回应答消息给 H(e)NB PF;
步骤 1110: H(e)NB PF向 H(e)NB返回应答消息。
通过上述流程 , H(e)NB PF与 BPCF之间建立了会话 , 并且 BBF接入网 ( BNG/BRAS )获得外部 IP包头信息。 当 UE进行业务访问需要网络为其分 配资源时, PCRF首先将制定的 PCC规则的 QoS信息发送给 BPCF, 以便 BBF接入网执行接纳控制。 然后, PCRF将 BBF接入网接受的 PCC规则发 送给 PCEF。 PCEF根据 PCC规则对相应的数据流的下行数据的 IP包的头部 (称为内部包头 )进行 DSCP的标记, 当该业务数据流 IP包到达 SeGW时, SeGW将对 IP包进行 IPSec封装, 并进行 DSCP拷贝。 当这些数据到达 BBF 接入网时, BBF接入网设备首先根据保存的外部 IP包头信息进行过滤, 只有 当匹配到了外部 IP包头信息的业务数据流才根据 DSCP进行数据转发; 对于 匹配不到的业务数据流, BBF接入网设备根据本地策略进行处理(如重新标 记较低优先级的 DSCP )。 对于业务数据流的上行数据, 由 UE进行 IPSec封 装并进行 DSCP拷贝, 当数据到达 BBF接入网时, BBF接入网设备首先根据 保存的外部 IP包头信息进行过滤, 只有当匹配到了外部 IP包头信息的业务 数据流才根据 DSCP进行数据转发; 对于匹配不到的业务数据流, BBF接入 网设备根据本地策略进行处理(如重新标记较低优先级的 DSCP ) 。 从而, 那些未经接纳控制业务数据流不会抢占其他经过接纳控制的业务数据流的资 源。 在其他实施例中, 若 SeGW与 H(e)NB PF的接口不存在, 则在步骤 1101 中, SeGW将外部 IP包头部信息发送给 H(e)NB, 步骤 1102、 步骤 1103不执 行, 在步骤 1104中, H(e)NB将外部 IP包头部信息发送给 H(e)NB PF, 其他 步骤不变。
对于以上所有实施例, 当 BBF接入网设备按照外部 IP包头信息进行 IP 包匹配时, 若匹配不到, 只有当网络出现拥塞时, 才按照本地策略进行数据 转发, 如果当前资源充足, 仍然按照 DSCP进行调度。
本发明还提供一种策略控制系统, 包括: 3GPP网络设备和宽带接入论坛
( BBF )接入网设备, 其中:
所述 3GPP网络设备设置成:将外部 IP包头信息发送给所述 BBF接入网 设备;
所述 BBF接入网设备设置成: 将与所述外部 IP包头信息匹配的数据包 按照所述数据包的差分服务代码点 (DSCP )进行转发。
其中, 所述 BBF接入网设备还设置成: 将与所述外部 IP包头信息不匹 配的数据包按照本地策略进行转发。
其中, 所述系统还包括宽带策略控制架构 (BPCF ) , 所述 3GPP网络设 备包括演进的分组数据网关 (ePDG )和策略和计费规则功能(PCRF ) , 其 中:
所述 ePDG设置成: 将所述外部 IP 包头信息发送给分组数据网络网关 ( P-GW ) , 由所述 P-GW将所述外部 IP包头信息发送给策略和计费规则功 能( PCRF );或者,所述 ePDG直接将所述外部 IP包头信息发送给所述 PCRF; 所述 PCRF设置成: 将所述外部 IP包头信息发送给所述 BPCF;
所述 BPCF设置成:将所述外部 IP包头信息发送给所述 BBF接入网设备。 或者, 所述 3GPP网络设备包括 P-GW和 PCRF:
所述 P-GW设置成: 将所述外部 IP包头信息发送给所述 PCRF; 所述 PCRF设置成: 将所述外部 IP包头信息发送给所述 BPCF;
所述 BPCF设置成:将所述外部 IP包头信息发送给所述 BBF接入网设备。 所述 PCRF设置成按照以下方式将所述外部 IP 包头信息发送给所述 BPCF: 在进行服务质量授权时, 将所述外部 IP包头信息发送给所述 BPCF; 或者, 在向所述 BPCF发起策略互通会话建立时, 将所述外部 IP包头信息发 送给所述 BPCF。
其中, 所述系统还包括宽带策略控制架构 (BPCF ) , 所述 3GPP网络设 备包括安全网关和家庭基站策略功能, 或者包括安全网关和 PCRF, 其中: 所述安全网关设置成:将所述外部 IP包头信息发送给家庭基站策略功能; 所述家庭基站策略功能设置成: 将所述外部 IP包头信息发送给 BPCF; 所述 BPCF设置成:将所述外部 IP包头信息发送给所述 BBF接入网设备; 或者,
所述安全网关设置成: 将所述外部 IP包头信息发送给 PCRF;
所述 PCRF设置成: 将所述外部 IP包头信息发送给 BPCF;
所述 BPCF设置成:将所述外部 IP包头信息发送给所述 BBF接入网设备。 其中, 所述家庭基站策略功能或 PCRF设置成按照以下方式将所述外部 IP包头信息发送给所述 BPCF:在向所述 BPCF发起策略互通会话建立时,将 所述外部 IP包头信息发送给所述 BPCF。
其中, 所述外部 IP包头信息为 IPSec隧道外部 IP包头信息。 所述 IPSec 隧道为用户设备和 ePDG、 用户设备和 P-GW或家庭基站与安全网关之间的 IPSec隧道。
以上所述, 仅为本发明的较佳实施例而已, 并非用于限定本发明的保护 范围, 凡在本发明的精神和原则之内所作的任何修改、 等同替换和改进等, 均应包含在本发明的保护范围之内。
工业实用性 上述技术方案中, BBF接入网保存外部 IP包头, 当数据到达 BBF接入 网时, BBF接入网设备首先根据保存的外部 IP包头进行过滤, 只有当匹配到 了外部 IP包头的业务数据流才根据 DSCP进行数据转发; 对于匹配不到的业 务数据流, BBF接入网设备根据本地策略进行处理(如重新标记较低优先级 的 DSCP ) 。 从而, 那些未经接纳控制业务数据流不会抢占其他经过接纳控 制的业务数据流的资源。 因此, 本发明具有很强的工业实用性。

Claims

权 利 要 求 书
1、 一种策略控制方法, 包括:
3GPP网络设备将外部 IP包头信息发送给宽带接入论坛(BBF )接入网 设备;
所述 BBF接入网设备将与所述外部 IP包头信息匹配的数据包按照所述 数据包的差分服务代码点 (DSCP )进行转发。
2、 如权利要求 1所述的策略控制方法, 该方法还包括, 所述 BBF接入 网设备将与所述外部 IP包头信息不匹配的数据包按照本地策略进行转发。
3、 如权利要求 1所述的策略控制方法, 其中, 3GPP网络将外部 IP包头 信息发送给 BBF接入网设备的步骤包括:
3GPP 网络的演进的分组数据网关 ( ePDG ) 通过分组数据网络网关 ( P-GW )将所述外部 IP包头信息发送给策略和计费规则功能(PCRF ) , 所 述 PCRF将所述外部 IP包头信息发送给所述 BBF接入网的宽带策略控制架构 ( BPCF ) , 所述 BPCF将所述外部 IP包头信息发送给所述 BBF接入网设备; 或者,
所述 ePDG直接将所述外部 IP包头信息发送给所述 PCRF, 所述 PCRF 将所述外部 IP包头信息发送给所述 BPCF, 所述 BPCF将所述外部 IP包头信 息发送给所述 BBF接入网设备; 或者,
所述 P-GW将所述外部 IP包头信息发送给所述 PCRF, 所述 PCRF将所 述外部 IP包头信息发送给所述 BPCF, 所述 BPCF将所述外部 IP包头信息 发送给所述 BBF接入网设备。
4、 如权利要求 3所述的策略控制方法, 其中, 所述 PCRF将所述外部 IP 包头信息发送给所述 BPCF的步骤包括:
所述 PCRF在进行服务质量授权时, 将所述外部 IP包头信息发送给所述 BPCF; 或者,
所述 PCRF在向所述 BPCF发起策略互通会话建立时, 将所述外部 IP包 头信息发送给所述 BPCF。
5、 如权利要求 1所述的策略控制方法, 其中, 3GPP网络将外部 IP包头 信息发送给 BBF接入网设备的步骤包括:
3GPP网络的安全网关( SeGW )将所述外部 IP包头信息发送给所述 BBF 接入网的家庭基站策略功能(H(e)NB PF ), 所述 H(e)NB PF将所述外部 IP包 头信息发送给 BPCF, 所述 BPCF将所述外部 IP包头信息发送给所述 BBF接 入网设备; 或者,
所述 SeGW将所述外部 IP包头信息发送给 PCRF, 所述 PCRF将所述外 部 IP包头信息发送给所述 BPCF, 所述 BPCF将所述外部 IP包头信息发送给 所述 BBF接入网设备。
6、 如权利要求 5所述的策略控制方法, 其中, 所述 H(e)NB PF将所述外 部 IP包头信息发送给 BPCF的步骤包括:
所述 H(e)NB PF在向所述 BPCF发起策略互通会话建立时, 将所述外部 IP包头信息发送给所述 BPCF;
所述 PCRF将所述外部 IP包头信息发送给所述 BPCF的步骤包括: 所述 PCRF在向所述 BPCF发起策略互通会话建立时, 将所述外部 IP包 头信息发送给所述 BPCF。
7、 如权利要求 1-4 中任一项所述的策略控制方法, 其中, 所述外部 IP 包头信息至少包括用户终端 (UE ) 的本地 IP地址。
8、 如权利要求 3或 4所述的策略控制方法, 其中, 若所述 UE和 ePDG 之间,或所述 UE和所述 P-GW之间检测到 NA(P)T,则所述外部 IP包头信息 包括 UE的本地 IP地址和 UDP源端口号。
9、如权利要求 8所述的策略控制方法,其中,所述 UDP源端口号为 IPSec UDP源端口号; 或, DSMIP绑定更新信令 UDP源端口号。
10、 如权利要求 7或 8所述的策略控制方法, 其中, 所述外部 IP包头信 息为包含相应信息的包过滤器。
11、 如权利要求 1、 2、 5或 6所述的策略控制方法, 其中, 所述 IP包头 信息至少包括家用基站(H(e)NB ) 的本地 IP地址。
12、如权利要求 5或 6所述的策略控制方法, 其中, 若 H(e)NB和所述安 全网关 SeGW之间检测到 NA(P)T, 则所述 IP 包头信息包括所述家用基站 ( H(e)NB ) 的本地 IP地址和 UDP源端口号。
13、 如权利要求 12所述的策略控制方法, 其中, 所述 UDP源端口号为 IPSec UDP源端口号。
14、 如权利要求 11或 12所述的策略控制方法, 其中, 所述外部 IP包头 信息为包含相应信息的包过滤器。
15、 一种策略控制系统, 包括: 3GPP网络设备和宽带接入论坛(BBF ) 接入网设备, 其中:
所述 3GPP网络设置成:将外部 IP包头信息发送给所述 BBF接入网设备; 所述 BBF接入网设备设置成: 将与所述外部 IP包头信息匹配的数据包 按照所述数据包的差分服务代码点 (DSCP )进行转发。
16、 如权利要求 15所述的策略控制系统, 其中, 所述 BBF接入网设备 还设置成:将与所述外部 IP包头信息不匹配的数据包按照本地策略进行转发。
17、 如权利要求 15所述的策略控制系统, 该系统还包括: BBF接入网的 宽带策略控制架构 (BPCF ) , 其中:
所述 3GPP网络包括分组数据网络网关(P-GW )、 演进的分组数据网关 ( ePDG )和策略和计费规则功能(PCRF ) , 其中:
所述 ePDG设置成: 通过所述 P-GW将所述外部 IP包头信息发送给所述 PCRF; 或者, 直接将所述外部 IP包头信息发送给所述 PCRF;
所述 P-GW设置成: 协助所述 ePDG将所述外部 IP包头信息发送给所述
PCRF; 或者, 自身将所述外部 IP包头信息发送给所述 PCRF;
所述 PCRF设置成: 将所述外部 IP包头信息发送给所述 BPCF;
所述 BPCF设置成:将所述外部 IP包头信息发送给所述 BBF接入网设备。
18、 如权利要求 17所述的策略控制系统, 其中, 所述 PCRF设置成按照 以下方式将所述外部 IP包头信息发送给所述 BPCF:
在进行服务质量授权时, 将所述外部 IP包头信息发送给所述 BPCF; 或 者, 在向所述 BPCF发起策略互通会话建立时, 将所述外部 IP包头信息发送 给所述 BPCF。
19、 如权利要求 15所述的策略控制系统, 该系统还包括 BPCF , 其中: 所述 3GPP网络设备包括安全网关( SeGW )和家庭基站策略功能( H(e)NB PF ), 或者包括(SeGW )和 PCRF, 其中:
所述 SeGW设置成: 将所述外部 IP包头信息发送给所述 H(e)NB PF; 所述 H(e)NB PF设置成: 将所述外部 IP包头信息发送给所述 BPCF; 所述 BPCF设置成:将所述外部 IP包头信息发送给所述 BBF接入网设备; 或者,
所述 3GPP网络设备包括所述 SeGW和所述 PCRF , 其中:
所述 SeGW设置成: 将所述外部 IP包头信息发送给所述 PCRF;
所述 PCRF设置成: 将所述外部 IP包头信息发送给所述 BPCF;
所述 BPCF设置成:将所述外部 IP包头信息发送给所述 BBF接入网设备。
20、 如权利要求 19所述的策略控制系统, 其中, 所述 H(e)NB PF或者所 述 PCRF设置成按照以下方式将所述外部 IP包头信息发送给所述 BPCF: 在向所述 BPCF发起策略互通会话建立时, 将所述外部 IP包头信息发送 给所述 BPCF。
21、 如权利要求 15-18 中任一项所述的策略控制系统, 其中, 所述外部 IP包头信息至少包括用户终端 ( UE ) 的本地 IP地址。
22、如权利要求 17或 18所述的策略控制系统,其中,若所述 UE和 ePDG 之间,或所述 UE和所述 P-GW之间检测到 NA(P)T,则所述外部 IP包头信息 包括 UE的本地 IP地址和 UDP源端口号。
23、 如权利要求 22所述的策略控制系统, 其中, 所述 UDP源端口号为 IPSec UDP源端口号; 或, DSMIP绑定更新信令 UDP源端口号。
24、 如权利要求 21或 22所述的策略控制系统, 其中, 所述外部 IP包头 信息为包含相应信息的包过滤器。
25、 如权利要求 15、 16、 19或 20所述的策略控制系统, 其中, 所述 IP 包头信息至少包括家用基站(H(e)NB ) 的本地 IP地址。
26、如权利要求 19或 20所述的策略控制系统, 其中, 若 H(e)NB和所述 安全网关 SeGW之间检测到 NA(P)T, 则所述 IP包头信息包括所述家用基站 ( H(e)NB ) 的本地 IP地址和 UDP源端口号。
27、 如权利要求 26所述的策略控制系统, 其中, 所述 UDP源端口号为
IPSec UDP源端口号。
28、 如权利要求 25或 26所述的策略控制系统, 其中, 所述外部 IP包头 信息为包含相应信息的包过滤器。
29、 一种宽带接入论坛 ( BBF )接入网系统 , 包括 BBF接入网设备 , 其 中:
所述 BBF接入网设备设置成: 接收 3GPP网络发送的外部 IP包头信息, 将与所述外部 IP 包头信息匹配的数据包按照所述数据包的差分服务代码点 ( DSCP )进行转发。
30、 如权利要求 29所述的 BBF接入网系统, 其中, 所述 BBF接入网设 备还设置成: 将与所述外部 IP包头信息不匹配的数据包按照本地策略进行转 发。
31、 如权利要求 29所述的 BBF接入网系统, 该系统还包括: 宽带策略 控制架构 (BPCF ) , 其中:
所述 BPCF设置成: 接收 3GPP网络的演进的分组数据网关 (ePDG )通 过分组数据网络网关 (P-GW )发送给策略和计费规则功能(PCRF ) , 进而 由所述 PCRF发送来的所述外部 IP包头信息; 或者, 接收所述 ePDG直接发 送给所述 PCRF, 进而由所述 PCRF发送来的所述外部 IP包头信息; 或者, 接收所述 P-GW发送给所述 PCRF, 进而由所述 PCRF发送来的所述外部 IP 包头信息, 将所述外部 IP包头信息发送给所述 BBF接入网设备; 或者, 接收 3GPP网络的安全网关 ( SeGW )经过 BBF接入网的家庭基站策略 功能( H(e)NB PF )发送来的所述外部 IP包头信息; 或者, 接收所述 SeGW通 过所述 PCRF发送来的所述外部 IP包头信息,将所述外部 IP包头信息发送给 所述 BBF接入网设备。
32、 如权利要求 31所述的 BBF接入网系统, 其中, 所述 BPCF还设置 成: 接收所述 PCRF在进行服务质量授权时发送来的所述外部 IP包头信息; 或者,
接收所述 PCRF在向所述 BPCF发起策略互通会话建立时发送来的所述 外部 IP包头信息; 或者,
接收所述 H(e)NB PF或者所述 PCRF在向所述 BPCF发起策略互通会话 建立时发送来的所述外部 IP包头信息。
PCT/CN2011/081824 2011-01-14 2011-11-04 一种策略控制方法及系统 WO2012094919A1 (zh)

Priority Applications (3)

Application Number Priority Date Filing Date Title
EP11855857.6A EP2651080B1 (en) 2011-01-14 2011-11-04 Policy control method and system
ES11855857.6T ES2617478T3 (es) 2011-01-14 2011-11-04 Procedimiento y sistema de control de políticas
US13/978,732 US9271220B2 (en) 2011-01-14 2011-11-04 Policy control method and system

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201110008179.1 2011-01-14
CN201110008179.1A CN102595508B (zh) 2011-01-14 2011-01-14 一种策略控制方法及系统

Publications (1)

Publication Number Publication Date
WO2012094919A1 true WO2012094919A1 (zh) 2012-07-19

Family

ID=46483607

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2011/081824 WO2012094919A1 (zh) 2011-01-14 2011-11-04 一种策略控制方法及系统

Country Status (5)

Country Link
US (1) US9271220B2 (zh)
EP (1) EP2651080B1 (zh)
CN (1) CN102595508B (zh)
ES (1) ES2617478T3 (zh)
WO (1) WO2012094919A1 (zh)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108377570A (zh) * 2016-10-31 2018-08-07 中国电信股份有限公司 业务数据路由方法和系统以及相关设备

Families Citing this family (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101127766B (zh) * 2007-09-24 2010-06-09 中兴通讯股份有限公司 基于sip协议的消息处理方法、装置及ip通信系统
US8942088B2 (en) * 2011-10-07 2015-01-27 Telefonaktiebolaget L M Ericsson (Publ) BNG to PCRF mediation entity for BBF and 3GPP access interworking
US20140364079A1 (en) * 2011-12-08 2014-12-11 Interdigital Patent Holdings, Inc. METHOD AND APPARATUS FOR ADVANCED TOPOLOGY (AT) POLICY MANAGEMENT FOR DIRECT COMMUNICATION BETWEEN WIRELESS TRANSMIT/RECEIVE UNITS (WTRUs)
CN103369498B (zh) * 2012-03-31 2016-08-31 上海贝尔股份有限公司 在无线接入设备和用户设备中管理数据承载的方法
WO2013178273A1 (en) * 2012-05-31 2013-12-05 Telefonaktiebolaget L M Ericsson (Publ) Method, user terminal, and policy and charging network entity for classifying packets
CN103918229B (zh) * 2012-08-15 2017-10-17 华为技术有限公司 一种dscp的标记处理方法、系统及策略实体
CN103906146B (zh) * 2012-12-27 2018-08-03 南京中兴新软件有限责任公司 一种WLAN和分组核心网之间的QoS对齐的方法
CN105874842A (zh) * 2013-10-30 2016-08-17 交互数字专利控股公司 用于处理优先级服务拥塞的系统和方法
PL2887594T3 (pl) 2013-12-19 2020-07-13 Alcatel Lucent Sterowanie przeciążeniem dla dostępu zaufanej WLAN do EPC
US20150289162A1 (en) * 2014-04-06 2015-10-08 Saguna Networks Ltd. Methods circuits devices systems and associated computer executable code for implementing cell congestion detection in a mobile network
CN106921588B (zh) * 2015-12-28 2020-06-09 华为技术有限公司 一种流量控制方法、装置及设备
CN109818917B (zh) * 2017-11-21 2021-10-26 华为技术有限公司 一种通信方法及其装置
CN108521397B (zh) * 2018-02-09 2021-02-12 华为技术有限公司 一种访问资源服务的方法及系统
US20220014903A1 (en) * 2020-07-08 2022-01-13 Nokia Technologies Oy Retrieving a core network or access network assigned user equipment identifier

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1466340A (zh) * 2002-06-24 2004-01-07 �人��������������ι�˾ 以策略流方式转发数据的方法和数据转发设备
CN1536900A (zh) * 2003-04-11 2004-10-13 华为技术有限公司 无线接入网中的业务优先级的传输方法
CN101026625A (zh) * 2007-01-24 2007-08-29 华为技术有限公司 一种保证服务质量的方法、系统、宽带接入终端和网络设备

Family Cites Families (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100377545C (zh) * 2004-03-13 2008-03-26 鸿富锦精密工业(深圳)有限公司 网络品质服务系统及方法
EP2661121A3 (en) * 2004-09-21 2014-06-04 Hitachi Ltd. Node device, packet control device, radio communication device, and transmission control method
CN100448227C (zh) * 2005-08-30 2008-12-31 杭州华三通信技术有限公司 业务流的识别方法
US20080165679A1 (en) * 2007-01-10 2008-07-10 Ipwireless, Inc. Method to mitigate fraudulent usage of QoS from mobile terminals using uplink packet marking
US9681336B2 (en) * 2007-06-13 2017-06-13 Qualcomm Incorporated Quality of service information configuration
WO2010068154A1 (en) * 2008-12-10 2010-06-17 Telefonaktiebolaget L M Ericsson (Publ) Interface setup for communications network with femtocells
CN101931898B (zh) * 2009-06-26 2014-03-05 华为技术有限公司 用户面数据的传输方法、装置及系统
WO2011020514A1 (en) * 2009-08-20 2011-02-24 Telefonaktiebolaget L M Ericsson (Publ) Fair usage enforcement in roaming packet based access
IN2012DN05044A (zh) * 2010-01-05 2015-10-09 Ericsson Telefon Ab L M
US8775352B2 (en) * 2010-03-01 2014-07-08 At&T Intellectual Property I, L.P. Methods and apparatus to model end-to-end class of service policies in networks
EP2609721A4 (en) * 2010-08-25 2014-04-30 Ericsson Telefon Ab L M METHOD AND ARRANGEMENTS FOR SECURE COMMUNICATION VIA AN IP NETWORK
US9065936B2 (en) * 2010-12-09 2015-06-23 Allot Communications Ltd. Cellular traffic monitoring and charging using application detection rules
US8880023B2 (en) * 2010-12-09 2014-11-04 Allot Communications Ltd. Device, system, and method of cellular traffic monitoring
US9391798B2 (en) * 2011-09-14 2016-07-12 Verizon Patent And Licensing Inc. Inter-policy server communication via a policy broker
US20150124616A1 (en) * 2013-11-05 2015-05-07 Hughes Network Systems, Llc Method and system for satellite backhaul offload for terrestrial mobile communications systems

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1466340A (zh) * 2002-06-24 2004-01-07 �人��������������ι�˾ 以策略流方式转发数据的方法和数据转发设备
CN1536900A (zh) * 2003-04-11 2004-10-13 华为技术有限公司 无线接入网中的业务优先级的传输方法
CN101026625A (zh) * 2007-01-24 2007-08-29 华为技术有限公司 一种保证服务质量的方法、系统、宽带接入终端和网络设备

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See also references of EP2651080A4 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108377570A (zh) * 2016-10-31 2018-08-07 中国电信股份有限公司 业务数据路由方法和系统以及相关设备
CN108377570B (zh) * 2016-10-31 2020-07-24 中国电信股份有限公司 业务数据路由方法和系统以及相关设备

Also Published As

Publication number Publication date
EP2651080A1 (en) 2013-10-16
CN102595508B (zh) 2016-09-28
US9271220B2 (en) 2016-02-23
ES2617478T3 (es) 2017-06-19
US20130308450A1 (en) 2013-11-21
CN102595508A (zh) 2012-07-18
EP2651080A4 (en) 2015-03-25
EP2651080B1 (en) 2016-12-21

Similar Documents

Publication Publication Date Title
WO2012094919A1 (zh) 一种策略控制方法及系统
US8849273B2 (en) Method and system for reporting fixed network access information
WO2013064070A1 (zh) 一种实现反射QoS机制的方法、系统和PCRF
WO2013104234A1 (zh) 一种融合网络中策略控制方法及系统
WO2012003764A1 (zh) 一种pcrf通知bpcf用户设备接入信息的方法
WO2012065499A1 (zh) 一种实现服务质量控制的方法和系统
WO2012051897A1 (zh) 一种融合固定网络与移动网络的系统及方法
WO2010081329A1 (zh) 业务流迁移过程中对网络资源进行控制的方法和系统
WO2012003760A1 (zh) 信息传递方法和系统
US9544832B2 (en) Method, apparatus and system for policy control
WO2012019507A1 (zh) 一种实现固定宽带接入网接入的策略控制方法及系统
WO2012003770A1 (zh) 一种用户设备接入移动网络的系统、设备及方法
WO2013020448A1 (zh) 一种信息传输方法、分组数据网关及策略和计费规则功能
WO2014040552A1 (zh) 一种通知接入网位置信息的方法和系统
WO2010078761A1 (zh) 基于多接入技术的策略计费控制方法、装置和系统
WO2014048197A1 (zh) 用户设备选择拜访公共陆地移动网络的方法、系统和设备
WO2011088702A1 (zh) 在全业务融合网络中控制资源的方法和系统
WO2012171430A1 (zh) 隧道信息获取方法、安全网关及演进家庭基站/家庭基站
WO2012010036A1 (zh) 一种策略控制方法及系统
WO2014048191A1 (zh) 一种选择vplmn的方法、系统及分组数据网络网关
WO2014071790A1 (zh) 固网移动融合的策略控制方法、装置及系统
WO2012174977A1 (zh) 业务数据流处理方法及装置
WO2012100606A1 (zh) 一种资源管理方法和系统
WO2012146092A1 (zh) 一种ip流迁移的策略控制方法及系统
WO2012022221A1 (zh) 一种触发固网移动融合策略协商的方法及系统

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 11855857

Country of ref document: EP

Kind code of ref document: A1

REEP Request for entry into the european phase

Ref document number: 2011855857

Country of ref document: EP

WWE Wipo information: entry into national phase

Ref document number: 2011855857

Country of ref document: EP

WWE Wipo information: entry into national phase

Ref document number: 13978732

Country of ref document: US

NENP Non-entry into the national phase

Ref country code: DE