WO2013131487A1 - 融合的核心网及其接入方法 - Google Patents
融合的核心网及其接入方法 Download PDFInfo
- Publication number
- WO2013131487A1 WO2013131487A1 PCT/CN2013/072321 CN2013072321W WO2013131487A1 WO 2013131487 A1 WO2013131487 A1 WO 2013131487A1 CN 2013072321 W CN2013072321 W CN 2013072321W WO 2013131487 A1 WO2013131487 A1 WO 2013131487A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- network
- management entity
- 3gpp
- iwf
- 3gpp access
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W88/00—Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
- H04W88/16—Gateway arrangements
Definitions
- the present invention relates to a converged network technology, and in particular, to a converged core network and an access method thereof.
- Evolved Universal Terrestrial Radio Access Network E-UTRAN
- Mobile Administration Evolved Universal Terrestrial Radio Access Network
- E-UTRAN 3rd Generation Partnership Project
- MME Mobility Management Entity
- S-GW Serving Gateway
- P-GW Packet Data Network Gateway
- HSS Home Subscriber Server
- 1 is a network structure diagram of interworking between a 3GPP network and a non-3GPP network in the prior art.
- EPS supports interworking with a non-3GPP system, wherein interworking with a non-3GPP system is implemented through an S2a/b/c interface.
- the P-GW acts as an anchor between the 3GPP and the non-3GPP system.
- non-3GPP system access is divided into untrusted non-3GPP access and trusted non-3GPP access; wherein untrusted non-3GPP access requires evolved packet data gateway (ePDG, Evolved Packet) Data Gateway is connected to the P-GW.
- ePDG evolved packet data gateway
- the interface between the ePDG and the P-GW is S2b.
- the trusted non-3GPP access can be directly connected to the P-GW through the S2a interface.
- the S2a interface uses the proxy mobile Internet protocol (PMIP, Proxy Mobile Internet). Protocol) performs information exchange; in addition, the S2c interface provides user plane related control and mobility support between the user equipment (UE, User Equipment) and the P-GW, and the supported mobility management protocol supports dual stack mobility.
- IPv6 DSMIPv6, Moblie IPv6 Support for Dual Stack Hosts and Router
- WLAN Wireless Local Area Network
- TNAN Trusted Non-3GPP IP Access Network
- 2 is a schematic structural diagram of a UE accessing an EPS through a trusted WLAN in the prior art. As shown in FIG. 2, the method includes the following steps:
- Step 201 The UE selects an access point (AP, Access Point) to access.
- AP Access Point
- Step 202 After receiving the UE access request, the AP accesses the service set identifier (SSID,
- Step 203 The AC initiates an Extensible Authentication Protocol (EAP) authentication to the HSS. After the authentication is passed, the port UE is successfully authenticated.
- EAP Extensible Authentication Protocol
- Step 204 The AC sends a create session request to a Packet Data Network Gateway (P-GW).
- P-GW Packet Data Network Gateway
- Step 205 Perform P-GW address update between the P-GW and the HSS/AAA.
- Step 206 The P-GW returns a create session response to the AC.
- GTP GPRS Tunneling Protocol
- the UE accesses the home P-GW from the WLAN, where the visited 3GPP network forwards the packet between the WLAN and the home P-GW; however, since the data is passed In the visited 3GPP network bearer network, there is no special standard network element to collect key information such as user data traffic. In this way, the operator of the visited place must charge the roaming fee of the home operator to rely solely on the data statistics of the home operator.
- a management tunnel and a data tunnel are respectively established between the access point (AP, Access Point) and the access controller (AC, Access Controller).
- the AC is the only exit of the management and service data of the entire system. With the rapid increase in network capacity, if the AC is still used as the only exit for control messages and data, it will affect the performance of the AC, making the AC a forwarding bottleneck. Summary of the invention
- the main purpose of the present invention is to provide a fused core network and an access method thereof, which implements access control for a UE by setting an access management entity, thereby avoiding services caused by only one AC in the network. Management bottlenecks.
- a fused core network for accessing a trusted non-3GPP access network and a 3GPP access network an access management entity is disposed in the 3GPP access network; and the IWF is connected to the access management entity; And/or, the IWF is connected to an S-GW in the 3GPP access network; and/or, the S-GW is connected to the access management entity; and/or, the trusted non-3GPP An AP in the access network is connected to the access management entity; when the UE accesses the fused core network through the trusted non-3GPP access network,
- the IWF is configured to forward an IP address request message to the access management entity or the S-GW when receiving an IP address request message; or, after receiving the authentication success message in the 3GPP access network, A create session request message is sent to the S-GW.
- the access management entity is configured to: after receiving the IP address request message sent by the IWF, or after receiving the authentication success message in the 3GPP access network, by creating a session request message, triggering the A general wireless packet service tunneling protocol GTP session is established between the S-GW in the 3GPP access network and the packet data network gateway P-GW.
- the S-GW is configured to: after receiving the create session request message or the IP address request message sent by the IWF, send a create session request message to the P-GW; or receive the access management After the session creation request message is sent by the entity, a create session request message is sent to the P-GW.
- the IWF is further configured to be responsible for user plane data forwarding and processing of the trusted non-3GPP access network, and control plane data forwarding of the trusted non-3GPP access network;
- the access management entity is further configured to be responsible for extended authentication protocol EAP authentication, 3GPP mobility management function, and/or authentication, authorization, accounting AAA function, and the trusted non-3GPP access network. Control plane forwarding and processing functions.
- the core network further includes a 3GPP AAA server; the access management entity is connected to the 3GPP AAA server;
- the IWF supports user plane data forwarding and processing of the non-3GPP access network, and control plane data forwarding of the trusted non-3GPP access network;
- the access management entity is responsible for EAP authentication, 3GPP mobility management, and control plane forwarding and processing of the trusted non-3GPP access network.
- the access management entity, or the access management entity and the AP are responsible for forwarding information required for the IWF and the S-GW to establish a GTP user plane tunnel, the S-GW and the IWF. Establish a GTP user plane tunnel between them.
- the IWF supports control plane forwarding, processing, user plane data forwarding, processing, and EAP authentication of the non-3GPP access network;
- the access management entity is responsible for mobility management, AAA functionality, and/or EAP authentication of the 3GPP network.
- the core network is further provided with a home subscriber server HSS, which is configured to store subscription information between the UE and the trusted non-3GPP access network and/or the 3GPP access network;
- HSS home subscriber server
- the access management entity is connected to the HSS.
- the IWF is located in the trusted non-3GPP access network or the 3GPP access network;
- the trusted non-3GPP access network is a wireless local area network WLAN.
- a fused core network for accessing a trusted non-3GPP access network and a 3GPP access network an access management entity is disposed in the 3GPP access network; and the IWF is connected to the access management entity; And/or, the IWF is connected to an S-GW in the 3GPP access network; and Or, the S-GW in the 3GPP access network is connected to the access management entity; and/or the AP in the trusted non-3GPP access network is connected to the access management entity;
- the access management entity is configured to: after receiving the IP address request message sent by the IWF, or after receiving the authentication success message in the 3GPP access network, triggering the 3GPP access by creating a session request message A GTP session is established between the S-GW and the P-GW in the network.
- the S-GW is configured to: after receiving the create session request message or the IP address request message sent by the IWF, send a create session request message to the P-GW; or receive the access management After the session creation request message is sent by the entity, a create session request message is sent to the P-GW.
- the access management entity, or the access management entity and the AP are responsible for forwarding information required for the IWF and the S-GW to establish a GTP user plane tunnel, the S-GW and the IWF. Establish a GTP user plane tunnel between them.
- a fused core network access method the core network is used for accessing a trusted non-3GPP access network and a 3GPP access network; an access management entity is set in the 3GPP access network; an IWF and a The access management entity is connected; and/or the IWF is connected to an S-GW in the 3GPP access network; and/or the S-GW in the 3GPP access network and the access management entity
- the method includes: when the UE accesses the fused core network by using the trusted non-3GPP access network, the method includes:
- the S-GW sends a create session request message.
- the method further includes:
- the access management entity After receiving the IP address request message sent by the IWF, or after receiving the authentication success message in the 3GPP access network, the access management entity triggers by creating a session request message.
- a GTP session is established between the P-GW in the 3GPP access network and the S-GW.
- the method further includes:
- the S-GW After receiving the create session request message or the IP address request message sent by the IWF, the S-GW sends a create session request message to the P-GW; or receives a create session request sent by the access management entity. After the message, a create session request message is sent to the P-GW.
- the IWF is further responsible for user plane data forwarding and processing of the trusted non-3GPP access network, and control plane data forwarding of the trusted non-3GPP access network; correspondingly, the access
- the management entity is also responsible for extending the authentication protocol EAP authentication, the 3GPP mobility management function, and/or the authentication, authorization, and accounting AAA functions, and the control plane forwarding and processing functions of the trusted non-3GPP access network.
- the core network further includes a 3GPP AAA server; the access management entity is connected to the 3GPP AAA server;
- the IWF supports user plane data forwarding and processing of the non-3GPP access network, and control plane data forwarding of the trusted non-3GPP access network;
- the access management entity is responsible for EAP authentication, 3GPP mobility management, and control plane forwarding and processing of the trusted non-3GPP access network.
- the access management entity, or the access management entity and the AP are responsible for forwarding information required for the IWF and the S-GW to establish a GTP user plane tunnel, the S-GW and the IWF. Establish a GTP user plane tunnel between them.
- the IWF supports control plane forwarding, processing, user plane data forwarding, processing, and EAP authentication of the non-3GPP access network;
- the access management entity is responsible for mobility management, AAA functionality, and/or EAP authentication of the 3GPP network.
- the core network is further provided with an HSS; the HSS stores subscription information between the UE and the trusted non-3GPP access network and/or the 3GPP access network;
- the body is connected to the HSS.
- the IWF is located in the trusted non-3GPP access network or the 3GPP access network;
- the trusted non-3GPP access network is a WLAN.
- a fused core network access method where the core network is used for accessing a trusted non-3GPP access network and a 3GPP access network; wherein the 3GPP access network is provided with an access management entity; Connecting with the access management entity; and/or, the IWF is connected to an S-GW in the 3GPP access network; and/or, the S-GW in the 3GPP access network and the access Managing an entity connection; and/or an AP in the trusted non-3GPP access network is connected to the access management entity; accessing the fused core by the UE through the trusted non-3GPP access network
- the method includes:
- the access management entity After receiving the IP address request message sent by the IWF, or after receiving the authentication success message in the 3GPP access network, the access management entity triggers the establishment of the session request message to trigger the 3GPP access network.
- a GTP session is established between the S-GW and the P-GW.
- the S-GW After receiving the create session request message or the IP address request message sent by the IWF, the S-GW sends a create session request message to the P-GW; or, receives the send by the access management entity. After the session request message is created, a create session request message is sent to the P-GW.
- the method further includes:
- the access management entity or the access management entity and the AP, are responsible for forwarding information required for the IWF and the S-GW to establish a GTP user plane tunnel, and the S-GW and the IWF are established. GTP user plane tunnel.
- an access management entity is set in the 3GPP access network; the IWF in the trusted non-3GPP access network is respectively connected to the access management entity and the S-GW, and the S-GW is connected to the access management entity; In the process of the UE attaching to the core network, the access management entity and/or the IWF are responsible for The S-GW establishes a GTP session with the P-GW in the 3GPP access network.
- the invention avoids the service and management bottleneck caused by only one AC in the network, and ensures the access control and service quality of the converged network.
- FIG. 1 is a network structure diagram of interworking between a 3GPP network and a non-3GPP network in the prior art
- FIG. 2 is a flowchart of a UE accessing an EPS through a trusted WLAN in the prior art
- FIG. 3a is a trusted UE in the present invention.
- FIG. 3b is a schematic diagram of a roaming home access scenario of the architecture 1 of the UE accessing the EPS through the trusted WLAN;
- FIG. 3c is a schematic diagram of a roaming access scenario of the architecture 1 of the UE accessing the EPS through the trusted WLAN according to the present invention
- FIG. 4 is a flow chart of attaching a UE to a EPS through a trusted WLAN in a roaming home access scenario of the architecture 1-1 according to the present invention
- 5 is a roaming home access scenario of the architecture 1-2 in the present invention, where the UE passes the trusted
- 6a is a schematic diagram of a non-roaming scenario of the architecture 2 of the UE accessing the EPS through the trusted WLAN in the present invention
- 6b is a schematic diagram of a roaming home access scenario of the architecture 2 of the UE accessing the EPS through the trusted WLAN according to the present invention
- 6c is a schematic diagram of a roaming access scenario of the architecture 2 of the UE accessing the EPS through the trusted WLAN according to the present invention
- FIG. 7 is a flow chart of attachment of a UE to a EPS through a trusted WLAN when the access management entity does not support the AAA function in the scenario of roaming home access in the architecture 2 of the present invention
- FIG. 8a is a schematic diagram of the architecture 3 of the UE accessing the EPS through the trusted WLAN in the present invention. Schematic diagram of the tour scene;
- FIG. 8b is a schematic diagram of a roaming home access scenario of the architecture 3 of the UE accessing the EPS through the trusted WLAN;
- 8c is a schematic diagram of a roaming access scenario of the architecture 3 of the UE accessing the EPS through the trusted WLAN according to the present invention
- FIG. 9 is a flow chart of attachment of a UE to a EPS through a trusted WLAN in a scenario of roaming home access in the architecture 3 of the present invention. detailed description
- the basic idea of the present invention is: an access management entity is set in a 3GPP access network; an IWF is connected to an access management entity; and/or an S-GW in a 3GPP access network is connected to an access management entity; When accessing the fused core network by the trusted non-3GPP access network, the IWF is configured to forward an IP to the access management entity or the S-GW when receiving an IP address request message. Or the address request message; or, after receiving the authentication success message in the 3GPP access network, sending a create session request message to the S-GW.
- the fused core network of the present invention is used for accessing a trusted non-3GPP access network and a 3GPP access network; wherein the 3GPP access network is provided with an access management entity; the interworking function entity IWF and the Accessing an entity connection; and/or, the IWF is connected to an S-GW in the 3GPP access network; and/or the S-GW is connected to the access management entity; and/or An access point AP in the trusted non-3GPP access network is connected to the access management entity; when the user equipment UE accesses the fused core network through the trusted non-3GPP access network,
- the IWF is configured to forward an IP address request message to the access management entity or the S-GW when receiving an IP address request message; or, receive the 3GPP access network After the authentication success message, the create session request message is sent to the S-GW.
- the access management entity is configured to: after receiving the IP address request message sent by the IWF, or after receiving the authentication success message in the 3GPP access network, triggering the 3 by creating a session request message
- a general wireless packet service tunneling protocol GTP session is established between the serving gateway S-GW in the GPP access network and the packet data network gateway P-GW.
- the S-GW is configured to: after receiving the create session request message or the IP address request message sent by the IWF, send a create session request message to the P-GW; or receive the access management entity. After the created session request message is sent, a create session request message is sent to the P-GW.
- the IWF is further configured to be responsible for user plane data forwarding and processing of the trusted non-3GPP access network, and control plane data forwarding of the trusted non-3GPP access network;
- the access management entity is further configured to be responsible for extended authentication protocol EAP authentication, 3GPP mobility management function, and/or authentication, authorization, accounting AAA function, and the trusted non-3GPP access network. Control plane forwarding and processing functions.
- the foregoing core network further includes a 3GPP AAA server; the access management entity is connected to the 3GPP AAA server;
- the IWF supports user plane data forwarding and processing of the non-3GPP access network, and control plane data forwarding of the trusted non-3GPP access network;
- the access management entity is responsible for EAP authentication, 3GPP mobility management, and control plane forwarding and processing of the trusted non-3GPP access network.
- the access management entity or the access management entity and the AP, are responsible for forwarding information required for the IWF and the S-GW to establish a GTP user plane tunnel, and the GTP user is established between the S-GW and the IWF. Face tunnel.
- the IWF supports control plane forwarding and processing of the non-3GPP access network.
- the access management entity is responsible for mobility management, AAA functionality, and/or EAP authentication of the 3GPP network.
- the HSS is further configured with an HSS, and the subscription information of the UE and the trusted non-3GPP access network and/or the 3GPP access network is stored;
- the access management entity is connected to the HSS.
- the IWF is located in the trusted non-3GPP access network or the 3GPP access network; the trusted non-3GPP access network is a WLAN.
- the fused core network of the present invention is used for accessing a trusted non-3GPP access network and a 3GPP access network;
- the 3GPP access network is provided with an access management entity;
- the AP in the trusted non-3GPP access network is connected to the access management entity; when the UE accesses the fused core network through the trusted non-3GPP access network,
- the access management entity is configured to: after receiving the IP address request message sent by the IWF, or after receiving the authentication success message in the 3GPP access network, triggering the 3GPP access by creating a session request message A GTP session is established between the S-GW and the P-GW in the network.
- the S-GW is configured to: after receiving the create session request message or the IP address request message sent by the IWF, send a create session request message to the P-GW; or receive the creation of the access management entity After the session request message, a create session request message is sent to the P-GW.
- the access management entity or the access management entity and the AP, are responsible for forwarding information required for the IWF and the S-GW to establish a GTP user plane tunnel, and the GTP user is established between the S-GW and the IWF. Face tunnel.
- FIG. 3a is a schematic diagram of a non-roaming scenario of the architecture 1 in which the UE accesses the EPS through the trusted WLAN
- FIG. 3b is a schematic diagram of the roaming attribution access scenario of the architecture 1 in which the UE accesses the EPS through the trusted WLAN
- Figure 3c is a schematic diagram of a roaming access scenario of the architecture 1 in which the UE accesses the EPS through the trusted WLAN.
- the core network architecture diagram of the UE supporting the WLAN access and the LTE access is respectively described by the trusted WLAN and the LTE access, and the network element connection interface and the connection structure are as shown in FIG. 3a-3c. Show.
- the control plane and user plane functions of the WLAN network are separated.
- the access management entity in the 3GPP network implements the management function of the WLAN network and needs to support the EAP authentication function.
- the Interworking Function (IWF) implements the user plane data forwarding function of the WLAN network.
- IWF Interworking Function
- Access management entity This example is mainly to study the scenario where the access management entity and the MME are physically integrated, regardless of the scenario where the access management entity and the MME are physically separated. Therefore, the access management entity not only supports the control plane function and AAA function of the WLAN network, but also supports the MME function. Of course, the access management entity can also be physically integrated with other network elements.
- the access management entity since the access management entity integrates the AAA function, when the WLAN performs the EAP authentication function on the UE, the key key is calculated according to the EAP authentication algorithm transmitted by the HSS.
- the access management entity In the roaming scenario (as shown in Figures 3b and 3c), the access management entity is located in the Visit Public Land Mobile Network (VPLMN) and can request the UE to authenticate as an EAP authenticator identity.
- VPN Visit Public Land Mobile Network
- Interworking Function It can be located in a WLAN access network or a 3GPP network.
- the main functions include: processing WLAN network user plane data packets, and forwarding the messages between the AP and the access management entity.
- DHCP Dynamic Host Configuration Protocol
- Converged HSS It is necessary to simultaneously save the subscription information of the user as LTE and WLAN access, and the personal data can be saved based on the access type.
- Interface i Interface between the access management entity and the AP.
- the access management entity can configure the AP through the interface; the CAPWAP (Control And Provisioning of Wireless Access Points Protocol) protocol of the WLAN network may be used, or the interface protocol of the 3GPP may be directly used, such as the protocol of the S1-MME interface.
- the interface is an optional interface. If the AP needs to select an access management entity and establish a channel for control plane message interaction with the access management entity, the interface is required.
- Interface j is the interface between the access management entity and the IWF.
- the access management entity can configure the IWF through the interface. If the interface i is not set, the access management entity can also configure the AP through the interface j.
- the specific interface definition principle refers to the description of interface i.
- Si* interface Interface between the IWF and the S-GW of the EPC.
- the main functions of the interface include: Supporting the forwarding and processing of user plane data of the 3GPP core network accessed by the UE from the WLAN. It may support the GPRS Tunneling Protocol (GTP).
- GTP GPRS Tunneling Protocol
- S11* interface Interface between the access management entity and the S-GW. If the interface between the MME and the S-GW is the interface between the MME and the S-GW, the interface can be an S11 interface. Similarly, the access management entity can also adopt a new interface. Interface For the Sll* interface.
- the main functions of the interface include: The access management entity sends a GTP session creation message to trigger a session between the S-GW and the P-GW. The interface supports the GTP protocol.
- S6e interface Interface between the access management entity and the HSS.
- the main functions of the interface include: If the subscription information needs to be transmitted, the UE is simultaneously transmitted as the subscription information of the LTE and WLAN users.
- the interface needs to support the SWx interface function between 3GPP's AAA and HSS.
- the HSS needs to transmit information such as an algorithm of the key Key required for EAP authentication to the access management entity.
- the definition of this interface is to enhance the existing S6a interface, or to add a new interface, set as needed.
- SWi* interface An interface between the access management entity and the 3GPP AAA.
- the main functions of the interface include: If the subscription information needs to be transmitted, the UE is simultaneously transmitted as the subscription information of the LTE and WLAN users. Transmit AAA messages supported by the SWd interface.
- SWj* interface An interface between the access management entity and the 3GPP AAA.
- the main functions of the interface include: If the subscription information needs to be transmitted, the UE is simultaneously transmitted as the subscription information of the LTE and WLAN users. Transfer additional information supported by the SWx interface.
- the IWF or eNB should select this special functional entity instead of simply selecting the MME network element; the IWF or MME should choose to support the S-GW under this architecture, and the S-GW should choose P-GW under this architecture.
- architecture 1-1 does not include interface i
- architecture 1-2 includes interface i.
- This example is based on the attaching flowchart of the UE accessing the EPC through the WLAN in the roaming home access scenario.
- the AP only needs to discover and select the address of the IWF.
- the AC discovery mechanism in the existing WLAN network can be used.
- the IWF needs to discover and select the access management. Entity, DNS/DHCP query mechanism or other discovery mechanism can be used.
- 4 is a flow chart of attachment of a UE to an EPS through a trusted WLAN in a scenario of roaming home access in the architecture 1-1 of the present invention. As shown in FIG. 4, the attach procedure of the UE accessing the EPS in this example includes The following steps:
- Step 401 The UE selects a Service Set Identifier (SSID) according to the wireless mechanism of the WLAN, and accesses the corresponding ⁇ .
- SSID Service Set Identifier
- the MME may determine the SSID of the access according to the Medium Access Control Layer (MAC) address of the UE and the local MAC mapping relationship information, and notify the IWF of the SSID, and the IWF
- the SSID is obtained from the notification message sent by the AP.
- an access management entity is selected, and the SSID accessed by the AP is sent to the access management entity.
- the message between the AP and the IWF, the IWF, and the access management entity can be implemented by extending the control and provisioning of the existing wireless access point (CAPWAP) or adding a new message. .
- This example uses the extended CAPWAP message as an example.
- the CAPWAP tunnel is also established while sending the SSID information.
- the access management entity After receiving the notification message sent by the IWF, the access management entity sends a response message to the IWF.
- the response message may include configuration data of the AP and the IWF.
- the IWF configures the AP.
- the information is sent to the AP via a response message.
- Step 405 The access management entity, as an Extensible Authentication Protocol (EAP) Authenticator, triggers the EAP authentication process of the UE.
- EAP Extensible Authentication Protocol
- the access management entity requests the user to subscribe to the HSS.
- the HSS determines that the UE has subscribed to the WLAN and LTE access information, the information is sent to the access management entity.
- the UE obtains an IP address mainly through the following methods:
- Manner 1 The EAP authentication message triggers the access management entity to create a session.
- Step 407 - Step 410 After receiving the EAP-SUCCESS message, the access management entity initiates a process of creating a GTP session to the S-GW, and the S-GW also initiates a process of creating a GTP session to the P-GW.
- the P-GW carries the IP address assigned to the UE to the S-GW, and is forwarded by the S-GW to the access management entity.
- Step 411 The access management entity receives the create session response message sent by the S-GW, and sends a configuration update request message to the IWF.
- the configuration update request message carries the TEID, S-GW address, and UE MAC of the S-GW user plane. address.
- Step 412 After receiving the configuration update request message sent by the access management entity, the IWF obtains the TEID, the S-GW address, and the UE MAC address of the S-GW user plane carried in the message. The UE context information is searched according to the UE MAC address. If there is no UE context information, the UE context is created, and the TEID and S-GW address of the S-GW user plane are stored. Then, the IWF sends a configuration response message to the access management entity, where the configuration response message includes the TEID of the IWF user plane, the IWF address, and the UE MAC address.
- Step 413 - Step 416 The access management entity receives the configuration response message sent by the IWF, and searches for the bound GTP tunnel identifier according to the UE MAC address. Then, the modify bearer request message is sent, and the modified bearer request message carries the TEID and IWF address of the IWF user plane. After receiving the modify bearer request message, the S-GW also initiates a request flow for modifying the bearer to the P-GW. After receiving the modified bearer response of the P-GW, the S-GW also sends a modify bearer response message to the access management entity.
- Step 417 After receiving the modify bearer response message, the access management entity sends a message that the EAP authentication succeeds to the UE.
- Step 420 After receiving the message that the EAP authentication succeeds, the UE initiates a process of assigning an IP address.
- Manner 2 The route request message or the DHCP message access management entity creates a session step 406. If the IWF receives the DHCPv6 request message or the DHCPv4 discovery message, It will act as a relay, forwarding the message to the access management entity.
- Step 407 The access management entity receives the DHCPv6 request message or the DHCPv4 discovery message sent by the IWF, initiates a process of creating a session to the S-GW, and performs steps 407-410. Then, steps 411-416 are performed to complete the IWF.
- the transmission process of the GTP user plane information with the S-GW is the same as that of the method 1 and will not be described here.
- Step 418- Step 419 The access management entity forwards the DHCPv4 provisioning or advertising message through the IWF, and sends the IP address assigned by the P-GW to the UE to the UE.
- the UE sends a DHCPv4 request message or a request message to the access management entity through the IWF to confirm the IP address allocated by the P-GW to the UE.
- the access management entity sends a DHCPv4 acknowledgment message or a response message to the UE through the IWF, and confirms that the P-GW is an IP address allocated by the UE.
- the above-mentioned DHCP request message may also be replaced by a route request message.
- the main difference is that the access management entity receives the broadcast route request message periodically sent by the UE, and after receiving the message, creates a new route request message and sends it to the S-GW. . Similarly, after receiving the route response message returned by the S-GW, the access management entity creates a new route response message to the UE.
- the access management entity, the S-GW, the P-GW, and the HSS are all located in the same 3GPP mobile network. There is no 3GPP AAA, and the signaling message interaction does not change, as above.
- the access management entity, the S-GW, and the P-GW are all located in the VPLMN, and the 3GPP AAA and HSS are located in the HPLMN.
- the signaling message interaction has not changed, as above.
- This embodiment is the attaching process of the user accessing the EPC through the WLAN in the scenario of roaming home access in the architecture 1-2.
- the main difference between this embodiment and the second embodiment is that a CAPWAP tunnel needs to be established between the access management entity and the AP.
- the AP needs to discover the addresses of the two network elements of the IWF and the access management entity, which is equivalent to the AP and two AC connections.
- the current AP is only connected to one AC, so the AP needs to be enhanced.
- Figure 5 is a roaming of architecture 1-2 in the present invention
- the attaching process of the UE accessing the EPS through the trusted WLAN is as shown in FIG. 5.
- the process of attaching the UE to the EPS includes the following steps:
- Step 501 the same step 401.
- Step 502 Step 504: The AP may determine the SSID of the UE according to the Medium Access Control Layer (MAC) address and the local MAC mapping relationship information, and notify the access management entity by using the SSID. And, the IWF is also notified by the message of the SSID it accesses.
- MAC Medium Access Control Layer
- the IWF After receiving the notification message sent by the AP, if the IWF and the access management entity do not establish a control channel, the IWF initiates a process of establishing a control channel to the access management entity.
- the message between the AP and the IWF, between the IWF and the access management entity, and between the AP and the access management entity may be implemented by extending an existing CAPWAP message or adding a new message. If you implement it with a new message, you need to establish a CAPWAP tunnel at the same time.
- the present invention is described by taking an extended CAPWAP message as an example. Thus, a CAPWAP tunnel is also established while transmitting SSID information.
- the access management entity sends a response message to the AP and the IWF, which may contain configuration data of the AP and the IWF.
- Step 505 The access management entity, as an Extensible Authentication Protocol (EAP) Authenticator, triggers an EAP authentication process to the UE.
- EAP Extensible Authentication Protocol
- the access management entity requests the user to subscribe to the HSS.
- the HSS determines that the UE has subscribed to the WLAN and LTE access information, the information is sent to the access management entity.
- the UE obtains an IP address mainly through the following methods:
- Manner 1 The EAP authentication message triggers the access management entity to create a session.
- Step 508 - Step 511 the same step 407 - Step 410.
- Step 512 The access management entity receives the create session response message sent by the S-GW, and sends a parameter update request message to the AP, where the message carries the TEID of the S-GW user plane, and the P-GW ground Address, UE MAC address.
- Step 513 The AP receives the parameter update request message sent by the access management entity, where the message carries the TEID, the S-GW address, and the UE MAC address of the S-GW user plane. The AP sends this information to the IWF via the event request message.
- Step 514 The IWF receives the event request message sent by the AP, and obtains the TEID, the S-GW address, and the UE MAC address of the S-GW user plane.
- the UE context information is searched according to the UE MAC address. If not, the UE context is newly created, and the TEID and S-GW address of the S-GW user plane are stored. Then, the IWF sends an event response message to the AP, where the message includes the TEID of the IWF user plane, the IWF address, and the UE MAC address.
- Step 515 After receiving the event response message, the AP obtains the TEID, the IWF address, and the UE MAC address of the IWF user plane, and sends the information to the access management entity by using the parameter update response message.
- Step 516 The access management entity receives the parameter update response message sent by the AP, and searches for the bound GTP tunnel identifier according to the UE MAC address. Then, the modify bearer request message is sent, and the modified bearer request message carries the TEID and the IWF address of the IWF user plane. After receiving the modify bearer request message, the S-GW also initiates a request flow for modifying the bearer to the P-GW. After receiving the modified bearer response from the P-GW, the S-GW also sends a modify bearer response message to the access management entity.
- Step 517-Step 523 the same step 414-Step 420.
- Manner 2 The route request message or the DHCP message triggers the access management entity to create a session. Steps 506 to 507, the access management entity receives the DHCPv6 request message or the DHCPv4 discovery message sent by the IWF, and initiates a process of creating a session to the S-GW. Step 508 - Step 511; Then, Step 512 - Step 519 is performed to complete the transmission of the GTP user plane information of the IWF and the S-GW. The specific process is the same as that of the first method, and details are not described herein again.
- Step 521 - Step 522 the same as Step 418 - Step 419.
- the above messages used between the AP, the IWF, and the access management entity are defined by the two networks. What protocol is used between the elements, for example: When using CAPWAP, it is configured to update the request message.
- the access management entity, the S-GW, the P-GW, and the HSS are all located in the same 3GPP mobile network, and do not involve the processing of the 3GPP AAA.
- the signaling message interaction is exactly the same as the foregoing, and details are not described herein again.
- the access management entity, the S-GW, and the P-GW are all located in the VPLMN, and the 3GPP AAA and the HSS are located in the HPLMN.
- the signaling message interaction is exactly the same as the foregoing, and details are not described herein again.
- FIG. 6a is a schematic diagram of a non-roaming scenario of the architecture 2 of the UE accessing the EPS through the trusted WLAN in the present invention
- FIG. 6b is a schematic diagram of the roaming attribution access scenario of the architecture 2 in which the UE accesses the EPS through the trusted WLAN
- Figure 6c is a schematic diagram of a roaming access scenario of the architecture 2 of the UE accessing the EPS through the trusted WLAN in the present invention.
- the architecture shown in this embodiment differs from the architecture shown in the first embodiment in that the access management entity The AAA function is not supported, and other functions are the same.
- Embodiment 1 The difference from Embodiment 1 is that the AAA function is not supported. For the deployment principle and other functions of the entity, refer to the related description of Embodiment 1.
- ICF Interworking Function
- the architecture adds a SWw* interface, and the function of the SWi* interface is different from the previous interface.
- the functions of the other interfaces are exactly the same as those in the foregoing embodiment 1.
- SWw* interface In the non-roaming scenario, it is the interface between the access management entity and the 3GPP AAA. In the roaming scenario, it is the interface between the access management entity and the 3GPP AAA proxy.
- the interface The main functions include: If the subscription information needs to be transmitted, the UE is simultaneously transmitted as the subscription information of the LTE and WLAN users. Transfer AAA messages.
- SWi* interface Interface between 3GPP AAA proxy and 3GPP AAA.
- the main functions of the interface include: If the subscription information needs to be transmitted, the UE is simultaneously transmitted as the subscription information of the LTE and WLAN users respectively. Transfer AAA messages.
- the network element selection of the core network is described in reference to the first embodiment, and details are not described herein.
- FIG. 7 is a flowchart of attaching a UE to a EPS through a trusted WLAN when the access management entity does not support the AAA function in the scenario of roaming home access in the architecture 2 of the present invention, as shown in FIG. 7 , in this example,
- the process of attaching the UE to the EPS includes the following steps:
- Step 701 refer to the foregoing steps 401 to 404, or refer to the foregoing steps 501 to
- Step 702 Trigger the UE to perform EAP authentication.
- the main difference between this embodiment and the second embodiment and the third embodiment is that the access management entity does not support the AAA function, so that the access management entity needs to support the SWw* interface with the AAA.
- the access management entity The SWw* interface needs to be supported between the 3GPP AAA proxy and the 3GPP AAA proxy.
- step 703 the process is the same as step 406 to step 420 in the second embodiment or step 506 to step 523 in the third embodiment, and details are not described herein.
- the access management entity, the S-GW, the P-GW, the 3GPP AAA, and the HSS are all located in the same 3GPP mobile network, and the signaling message interaction is exactly the same as the foregoing, and is not described here.
- the access management entity, the S-GW, the 3GPP AAA proxy, and the P-GW are all located in the VPLMN.
- the 3GPP AAA and the HSS are located in the HPLMN.
- the signaling message interaction is exactly the same as the foregoing, and details are not described herein.
- FIG. 8a is a schematic diagram of a non-roaming scenario of the architecture 3 of the UE accessing the EPS through the trusted WLAN in the present invention
- FIG. 8b is a schematic diagram of the roaming attribution access scenario of the architecture 3 of the UE accessing the EPS through the trusted WLAN according to the present invention
- Figure 8c is a schematic diagram of a roaming access scenario of the architecture 3 of the UE accessing the EPS through the trusted WLAN in the present invention.
- the UE that supports the WLAN access and the LTE access is mainly described as being trusted. Converged network architecture diagram for WLAN and LTE access to EPC.
- control plane and user plane functions of the WLAN network are physically integrated.
- the access management entity in the 3GPP network supports the AAA function and the MME function, and needs to support the EAP authentication function;
- the IWF in the WLAN network implements the management function of the WLAN network and the user plane data forwarding function.
- Access Management Entity Supports MME and AAA functions.
- the main functions include: In the non-roaming scenario (as shown in Figure 8a), because it integrates the AAA function, when the WLAN UE performs the EAP authentication function, the calculation of the key Key is calculated according to the EAP authentication algorithm transmitted by the HSS. . In the roaming scenario (as shown in Figures 8b and 8c), it is located in the VPLMN and is responsible for forwarding AAA messages.
- the MME or the fused network element can initiate a create session request message, and trigger a GTP session between the S-GW and the P-GW.
- the entity deployment principle is described in relation to Embodiment 1.
- IWF Supports the control plane and user plane functions of the WLAN network.
- the main functions include: responsible for the control and management of the WLAN network; Support EAP authentication as the EAP Authenticator identity; Responsible for forwarding user plane data and other application layer messages between the AP and the S-GW, such as DHCP messages.
- the fused HSS is identical to the first embodiment.
- the key interface functions in the above architecture are as follows:
- Interface j is the interface between the access management entity and the IWF.
- the main functions of this interface include: Support for forwarding of AAA messages.
- Si* interface Interface between the IWF and the S-GW of the EPC.
- the main functions of the interface include: Supporting UEs to access and process user plane data from the WLAN to the 3GPP core network. Support session management message transmission between IWF and S-GW. Support for GTP protocol.
- S11* interface Interface between the access management entity and the S-GW. If the interface between the MME and the S-GW is the interface between the MME and the S-GW, the interface can be the S11 interface. Similarly, the access management entity can also adopt a new interface. Define this interface as an S11* interface.
- the main functions of the interface include: The access management entity sends a GTP session creation message to trigger a session between the S-GW and the P-GW. The interface supports the GTP protocol.
- the functions of the S6e interface, the SWi* interface, and the SWj* interface refer to the related description of Embodiment 1.
- the network element selection of the core network is described in reference to the first embodiment, and details are not described herein again.
- FIG. 9 is a flowchart of attaching a UE to a EPS through a trusted WLAN in a scenario of roaming home access in the architecture of the present invention. As shown in FIG. 9 , the process of attaching the UE to the EPS in the present example includes the following steps. :
- Step 901 Same as step 401.
- Step 902 The AP may determine the SSID of the access according to the MAC address of the UE and the local MAC mapping relationship information, and notify the IWF of the SSID accessed by the notification message.
- Step 903 The IWF acts as an EAP authenticator, and triggers an EAP authentication process to the UE. During the authentication process, the IWF requests the user to subscribe to the HSS. In this case, if the HSS determines that the UE has subscribed to the WLAN and LTE access information, the IWF will send the WLAN and LTE access information to the access management entity. .
- the access management entity acts as an AAA (non-roaming scenario) or an AAA proxy (roaming scenario), and is responsible for forwarding AAA messages.
- the UE obtains an IP address mainly through the following methods:
- Manner 1 The EAP authentication message triggers the access management entity to create a session.
- Step 904a In the non-roaming scenario, the access management entity acts as the AAA, and after sending the EAP authentication success message, sends a message to create a session request to the S-GW; or, in the roaming scenario, the access management entity acts as the AAA proxy and receives the message. After the EAP authentication success message is sent, a message for creating a session request is sent to the S-GW;
- Step 904b After receiving the EAP authentication success message, the IWF sends a create session request message to the S-GW to trigger the S-GW to send a message for creating a session request to the P-GW.
- Step 907 Step 908: The S-GW receives the Create Session Request message sent by the IWF or the access management entity, and sends a Create Session Request message to the P-GW. After processing the message, the P-GW sends a Create Session Response message to the S-GW.
- Step 909a After receiving the create session response message, the S-GW sends a create session response message to the access management entity if step 904a has been performed;
- Step 909b After receiving the create session response message, the S-GW sends a create session response message to the IWF if step 904b has been performed;
- Step 910 If step 909a has been performed, the access management entity sends an EAP authentication success message to the UE; if the step 90% has been performed, the IWF sends an EAP authentication success message to the UE.
- Step 914 After the UE receives the EAP authentication success message, the UE obtains the IP address assigned by the P-GW through the IP address request message flow.
- steps 904a and 904b are two trigger modes, step 909a corresponds to 904a, and step 90% corresponds to 904b.
- the two trigger modes exist independently as an alternative.
- Manner 2 The route request message or the DHCP message triggers the access management entity to create a session.
- Step 905 - Step 906 The S-GW receives the DHCPv6 request message or the DHCPv4 discovery message forwarded by the IWF, initiates a process of creating a session to the P-GW, and performs steps 907-908; and then performs steps 911-912.
- Step 905 If the IWF receives the DHCPv6 request message or the DHCPv4 discovery message, it will forward the message to the S-GW as a relay.
- Step 906 The S-GW receives the DHCPv6 request message or the DHCPv4 discovery message sent by the IWF, initiates a process of creating a session to the P-GW, and performs steps 907-908;
- Step 911-Step 913 The S-GW forwards the DHCPv4 providing or advertising message through the IWF, and sends the IP address assigned by the P-GW to the UE to the UE.
- the UE sends a DHCPv4 request message or a request message to the S-GW through the IWF to confirm the IP address allocated by the P-GW to the UE.
- the S-GW sends a DHCPv4 acknowledgment message or a response message to the UE through the IWF, and confirms that the P-GW is an IP address allocated by the UE.
- the access management entity, the S-GW, and the P-GW are all located in the VPLMN, and the 3GPP AAA and HSS are located in the HPLMN.
- the signaling message interaction between them has not changed, as above.
- the message adopted between the AP, the IWF, and the access management entity depends on the protocol used between the two network elements. For example, when the CAPWAP is used, the message is a configuration update request message.
- interface i interface j
- the specific interface name can be defined by other names.
- RG supports AP's work.
- the function of the BNG to support the AC is also applicable to the BBF network. Therefore, the AP of the above embodiment can be replaced by the RG, the IWF can be replaced by the BNG, and the AP and the IWF, the IWF and the access management entity, the AP, and the access management entity.
- the CAPWAP protocol is replaced by a BBF-specific protocol.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
本发明公开了一种融合的核心网及其接入方法,其中,融合的核心网用于可信任的非3GPP接入网络与3GPP接入网络的接入;所述3GPP接入网络中设置有接入管理实体;IWF与所述接入管理实体连接;和/或,所述 IWF与所述3GPP接入网络中的S-GW连接;和/或,所述3GPP接入网络中的S-GW与所述接入管理实体连接;在UE通过所述可信任的非3GPP接入网络接入所述融合的核心网时,所述IWF用于,接收到IP地址请求消息时,向所述接入管理实体或所述S-GW转发IP地址请求消息;或者,接收到所述3GPP接入网络中的认证成功消息后,向所述S-GW发送创建会话请求消息。本发明避免了网络中仅有一个AC而导致的业务及管理瓶颈,很好地保证了融合网络的接入控制及业务质量。
Description
融合的核心网及其接入方法 技术领域
本发明涉及融合网络技术, 尤其涉及一种融合的核心网及其接入方法。 背景技术
第三代合作伙伴计划 (3GPP, 3rd Generation Partnership Project ) 的演 进的分组系统(EPS, Evolved Packet System ) 由演进的通用地面无线接入 网 ( E-UTRAN, Evolved Universal Terrestrial Radio Access Network )、 移动 管理单元(MME, Mobility Management Entity ),服务网关(S-GW, Serving Gateway ), 分组数据网络网关 (P-GW, Packet Data Network Gateway )和 归属用户服务器(HSS, Home Subscriber Server )组成。 图 1为现有技术中 3GPP网络与非 3GPP网络互通的网络结构图, 如图 1所示, EPS支持与非 3GPP系统的互通, 其中, 与非 3GPP系统的互通通过 S2a/b/c接口实现, P-GW作为 3GPP与非 3GPP系统间的锚点。 在 EPS的系统架构图中, 非 3GPP系统接入被分为不可信任非 3GPP接入和可信任非 3GPP接入;其中, 不可信任非 3GPP接入需经过演进的分组数据网关( ePDG , Evolved Packet Data Gateway ) 与 P-GW相连, ePDG与 P-GW间的接口为 S2b; 可信任非 3GPP接入可直接通过 S2a接口与 P-GW连接, S2a接口采用代理移动因特 网协议 ( PMIP , Proxy Mobile Internet Protocol )进行信息交互; 另外, S2c 接口提供了用户设备 ( UE , User Equipment ) 与 P-GW之间的用户面相关 的控制和移动性支持, 其支持的移动性管理协议为支持双栈的移动 IPv6 ( DSMIPv6, Moblie IPv6 Support for Dual Stack Hosts and Router ), 其可用 于不可信任非 3GPP和可信任非 3GPP接入。
无线局域网络( WLAN, Wireless Local Area Network )作为可信任的非
3GPP接入网络( TNAN, Trusted Non-3GPP IP Access Network )逐渐被很多 运营商关注。 图 2为现有技术中 UE通过可信任的 WLAN接入 EPS的结构 示意图, 如图 2所示, 包括以下步驟:
步驟 201 , UE选择一个接入点 (AP, Access Point )接入。
步驟 202, AP接收到 UE接入请求后,将 UE接入的服务集标识符( SSID,
Service Set Identifier )通知接入控制器( AC, Access Controller )。
步驟 203 , AC向 HSS发起对 UE的可扩展的认证协议( EAP, Extensible Authentication Protocol )认证, 认证通过后, 通 口 UE认证成功。
步驟 204, AC向分组数据网网关( P-GW, Packet Data Network Gateway ) 发送创建会话请求。
步驟 205 , P-GW与 HSS/AAA之间进行 P-GW地址更新。
步驟 206 , P-GW向 AC返回创建会话响应。
在 AC与 AAA代理之间建立 GPRS隧道协议 ( GTP, GPRS Tunnelling Protocol ), UE接入 EPS, 开展数据业务。
WLAN接入 EPS时存在以下问题:
1 )在漫游归属地接入场景下 , UE从 WLAN接入归属地 P-GW, 其中 , 拜访地的 3GPP网络在 WLAN和归属地 P-GW之间进行报文转发; 但是, 由于数据是经过拜访地的 3GPP网络承载网络,没有专门的标准网元统计用 户数据流量等关键信息。 这样, 拜访地运营商要收取归属地运营商的漫游 费用要完全依靠归属地运营商的数据信息统计。
2 )接入点( AP, Access Point )和接入控制器( AC, Access Controller ) 之间要分别建立管理隧道和数据隧道, AC为整个系统的管理和业务数据的 唯一出口。随着网络容量的急剧增长,如果 AC还是被作为控制消息和数据 的唯一出口, 会影响 AC的性能, 使 AC成为转发瓶颈。
发明内容
有鉴于此, 本发明的主要目的在于提供一种融合的核心网及其接入方 法,通过设置接入管理实体实现对 UE进行接入控制,避免了网络中仅有一 个 AC而导致的业务及管理瓶颈。
为达到上述目的, 本发明的技术方案是这样实现的:
一种融合的核心网,用于可信任的非 3GPP接入网络与 3GPP接入网络 的接入; 所述 3GPP接入网络中设置有接入管理实体; IWF与所述接入管 理实体连接; 和 /或, 所述 IWF与所述 3GPP接入网络中的 S-GW连接; 和 /或, 所述 S-GW与所述接入管理实体连接; 和 /或, 所述可信任的非 3GPP 接入网络中的 AP与所述接入管理实体连接; 在 UE通过所述可信任的非 3GPP接入网络接入所述融合的核心网时 ,
所述 IWF设置为,接收到 IP地址请求消息时, 向所述接入管理实体或 所述 S-GW转发 IP地址请求消息; 或者, 接收到所述 3GPP接入网络中的 认证成功消息后, 向所述 S-GW发送创建会话请求消息。
优选地, 所述接入管理实体设置为,接收到所述 IWF发送的 IP地址请 求消息后,或接收到所述 3GPP接入网络中的认证成功消息后,通过创建会 话请求消息, 触发所述 3GPP接入网络中的 S-GW 与分组数据网络网关 P-GW之间建立通用无线分组业务隧道协议 GTP会话。
优选地, 所述 S-GW设置为, 接收到所述 IWF发送的创建会话请求消 息或 IP地址请求消息后, 向所述 P-GW发送创建会话请求消息; 或者, 接 收到所述接入管理实体发送的创建会话请求消息后, 向所述 P-GW发送创 建会话请求消息。
优选地, 所述 IWF还设置为, 负责所述可信任的非 3GPP接入网络的 用户面数据转发和处理,以及所述可信任的非 3GPP接入网络的控制面数据 转发;
对应地, 所述接入管理实体还设置为, 负责扩展认证协议 EAP认证、 3GPP移动性管理功能, 和 /或, 认证、 授权、 计费 AAA功能, 以及所述可 信任的非 3GPP接入网络的控制面转发、 处理功能。
优选地, 所述核心网中还包括 3GPP AAA服务器; 所述接入管理实体 与所述 3GPP AAA服务器连接;
所述 IWF支持所述非 3GPP接入网络的用户面数据转发、 处理, 以及 所述可信任的非 3GPP接入网络的控制面数据转发;
所述接入管理实体负责 EAP认证、 3GPP移动性管理和所述可信任的 非 3GPP接入网络的控制面转发、 处理。
优选地, 所述接入管理实体, 或所述接入管理实体及所述 AP负责转发 所述 IWF和所述 S-GW建立 GTP用户面隧道所需要信息,所述 S-GW与所 述 IWF之间建立 GTP用户面隧道。
优选地, 所述 IWF支持所述非 3GPP接入网络的控制面转发、 处理, 用户面数据转发、 处理, 以及 EAP认证;
所述接入管理实体负责 3GPP网络的移动性管理、 AAA功能,和 /或 EAP 认证。
优选地, 所述核心网中还设置有归属用户服务器 HSS, 设置为存储 UE 与所述可信任的非 3GPP接入网络和 /或 3GPP接入网络的签约信息;
所述接入管理实体与所述 HSS连接。
优选地, 所述 IWF位于所述可信任的非 3GPP接入网络或所述 3GPP 接人网络中;
所述可信任的非 3GPP接入网络为无线局域网 WLAN。
一种融合的核心网,用于可信任的非 3GPP接入网络与 3GPP接入网络 的接入; 所述 3GPP接入网络中设置有接入管理实体; IWF与所述接入管 理实体连接; 和 /或, 所述 IWF与所述 3GPP接入网络中的 S-GW连接; 和
/或, 所述 3GPP接入网络中的 S-GW与所述接入管理实体连接; 和 /或, 所 述可信任的非 3GPP接入网络中的 AP与所述接入管理实体连接; 在 UE通 过所述可信任的非 3GPP接入网络接入所述融合的核心网时,
所述接入管理实体设置为,接收到所述 IWF发送的 IP地址请求消息后, 或接收到所述 3GPP接入网络中的认证成功消息后, 通过创建会话请求消 息, 触发所述 3GPP接入网络中的 S-GW与 P-GW之间建立 GTP会话。
优选地, 所述 S-GW设置为, 接收到所述 IWF发送的创建会话请求消 息或 IP地址请求消息后, 向所述 P-GW发送创建会话请求消息; 或者, 接 收到所述接入管理实体发送的创建会话请求消息后, 向所述 P-GW发送创 建会话请求消息。
优选地, 所述接入管理实体, 或所述接入管理实体及所述 AP负责转发 所述 IWF和所述 S-GW建立 GTP用户面隧道所需要信息,所述 S-GW与所 述 IWF之间建立 GTP用户面隧道。
一种融合的核心网接入方法,所述核心网用于可信任的非 3GPP接入网 络与 3GPP接入网络的接入; 所述 3GPP接入网络中设置有接入管理实体; IWF与所述接入管理实体连接; 和 /或, 所述 IWF与所述 3GPP接入网络中 的 S-GW连接; 和 /或, 所述 3GPP接入网络中的 S-GW与所述接入管理实 体连接;在 UE通过所述可信任的非 3GPP接入网络接入所述融合的核心网 时, 所述方法包括:
所述 IWF接收到 IP 地址请求消息时, 向所述接入管理实体或所述 S-GW转发 IP地址请求消息; 或者, 接收到所述 3GPP接入网络中的认证 成功消息后, 向所述 S-GW发送创建会话请求消息。
优选地, 所述方法还包括:
所述接入管理实体接收到所述 IWF发送的 IP地址请求消息后,或接收 到所述 3GPP接入网络中的认证成功消息后,通过创建会话请求消息,触发
所述 3GPP接入网络中的 P-GW与所述 S-GW之间建立 GTP会话。
优选地, 所述方法还包括:
所述 S-GW接收到所述 IWF发送的创建会话请求消息或 IP地址请求消 息后, 向所述 P-GW发送创建会话请求消息; 或者, 接收到所述接入管理 实体发送的创建会话请求消息后, 向所述 P-GW发送创建会话请求消息。
优选地, 所述 IWF还负责所述可信任的非 3GPP接入网络的用户面数 据转发和处理, 以及所述可信任的非 3GPP接入网络的控制面数据转发; 对应地, 所述接入管理实体还负责扩展认证协议 EAP认证、 3GPP移动性 管理功能,和 /或,认证、授权、计费 AAA功能, 以及所述可信任的非 3GPP 接入网络的控制面转发、 处理功能。
优选地, 所述核心网中还包括 3GPP AAA服务器; 所述接入管理实体 与所述 3GPP AAA服务器连接;
所述 IWF支持所述非 3GPP接入网络的用户面数据转发、 处理, 以及 所述可信任的非 3GPP接入网络的控制面数据转发;
所述接入管理实体负责 EAP认证、 3GPP移动性管理和所述可信任的 非 3GPP接入网络的控制面转发、 处理。
优选地, 所述接入管理实体, 或所述接入管理实体及所述 AP负责转发 所述 IWF和所述 S-GW建立 GTP用户面隧道所需要信息,所述 S-GW与所 述 IWF之间建立 GTP用户面隧道。
优选地, 所述 IWF支持所述非 3GPP接入网络的控制面转发、 处理, 用户面数据转发、 处理, 以及 EAP认证;
所述接入管理实体负责 3GPP网络的移动性管理、 AAA功能,和 /或 EAP 认证。
优选地, 所述核心网中还设置有 HSS; 所述 HSS存储 UE与所述可信 任的非 3GPP接入网络和 /或 3GPP接入网络的签约信息; 所述接入管理实
体与所述 HSS连接。
优选地, 所述 IWF位于所述可信任的非 3GPP接入网络或所述 3GPP 接人网络中;
所述可信任的非 3GPP接入网络为 WLAN。
一种融合的核心网接入方法,所述核心网用于可信任的非 3GPP接入网 络与 3GPP接入网络的接入; 其中, 所述 3GPP接入网络中设置有接入管理 实体; IWF与所述接入管理实体连接; 和 /或, 所述 IWF与所述 3GPP接入 网络中的 S-GW连接; 和 /或, 所述 3GPP接入网络中的 S-GW与所述接入 管理实体连接;和 /或,所述可信任的非 3GPP接入网络中的 AP与所述接入 管理实体连接;在 UE通过所述可信任的非 3GPP接入网络接入所述融合的 核心网时, 所述方法包括:
所述接入管理实体接收到所述 IWF发送的 IP地址请求消息后,或接收 到所述 3GPP接入网络中的认证成功消息后,通过创建会话请求消息,触发 所述 3GPP接入网络中的 S-GW与 P-GW之间建立 GTP会话。
优选地,所述 S-GW接收到所述 IWF发送的创建会话请求消息或 IP地 址请求消息后, 向所述 P-GW发送创建会话请求消息; 或者, 接收到所述 接入管理实体发送的创建会话请求消息后, 向所述 P-GW发送创建会话请 求消息。
优选地, 所述方法还包括:
所述接入管理实体,或所述接入管理实体及所述 AP负责转发所述 IWF 和所述 S-GW建立 GTP用户面隧道所需要信息, 所述 S-GW与所述 IWF 之间建立 GTP用户面隧道。
本发明中,在 3GPP接入网络中设置有接入管理实体;可信任的非 3GPP 接入网络中的 IWF分别与接入管理实体、 S-GW连接, S-GW与接入管理 实体连接; 在 UE附着到核心网的过程中, 接入管理实体和 /或 IWF负责在
S-GW与 3GPP接入网络中的 P-GW之间建立 GTP会话。 本发明避免了网 络中仅有一个 AC而导致的业务及管理瓶颈,很好地保证了融合网络的接入 控制及业务质量。 附图说明
图 1为现有技术中 3GPP网络与非 3GPP网络互通的网络结构图; 图 2为现有技术中 UE通过可信任的 WLAN接入 EPS的流程图; 图 3a为本发明中 UE通过可信任的 WLAN接入 EPS的架构 1的非漫 游场景示意图;
图 3b为本发明中 UE通过可信任的 WLAN接入 EPS的架构 1的漫游 归属地接入场景示意图;
图 3c为本发明中 UE通过可信任的 WLAN接入 EPS的架构 1的漫游 地接入场景示意图;
图 4为本发明中架构 1-1的漫游归属地接入场景下, UE通过可信任的 WLAN接入 EPS的附着流程图;
图 5为本发明中架构 1-2的漫游归属地接入场景下, UE通过可信任的
WLAN接入 EPS的附着流程图;
图 6a为本发明中 UE通过可信任的 WLAN接入 EPS的架构 2的非漫 游场景示意图;
图 6b为本发明中 UE通过可信任的 WLAN接入 EPS的架构 2的漫游 归属地接入场景示意图;
图 6c为本发明中 UE通过可信任的 WLAN接入 EPS的架构 2的漫游 地接入场景示意图;
图 7为本发明中架构 2的漫游归属地接入场景下, 接入管理实体不支 持 AAA功能时, UE通过可信任的 WLAN接入 EPS的附着流程图;
图 8a为本发明中 UE通过可信任的 WLAN接入 EPS的架构 3的非漫
游场景示意图;
图 8b为本发明中 UE通过可信任的 WLAN接入 EPS的架构 3的漫游 归属地接入场景示意图;
图 8c为本发明中 UE通过可信任的 WLAN接入 EPS的架构 3的漫游 地接入场景示意图;
图 9为本发明中架构 3 的漫游归属地接入场景下, UE通过可信任的 WLAN接入 EPS的附着流程图。 具体实施方式
本发明的基本思想为: 在 3GPP接入网络中设置有接入管理实体; IWF 与接入管理实体连接; 和 /或, 3GPP接入网络中的 S-GW与接入管理实体 连接;在 UE通过所述可信任的非 3GPP接入网络接入所述融合的核心网时, 所述 IWF设置为,接收到 IP地址请求消息时, 向所述接入管理实体或所述 S-GW转发 IP地址请求消息; 或者, 接收到所述 3GPP接入网络中的认证 成功消息后, 向所述 S-GW发送创建会话请求消息。
为使本发明的目的, 技术方案和优点更加清楚明白, 以下举实施例并 参照附图, 对本发明进一步详细说明。
本发明的融合的核心网,用于可信任的非 3GPP接入网络与 3GPP接入 网络的接入; 其中, 所述 3GPP接入网络中设置有接入管理实体; 互通功能 实体 IWF与所述接入管理实体连接; 和 /或, 所述 IWF与所述 3GPP接入网 络中的 S-GW连接; 和 /或, 所述 S-GW与所述接入管理实体连接; 和 /或, 所述可信任的非 3GPP接入网络中的接入点 AP与所述接入管理实体连接; 在用户设备 UE通过所述可信任的非 3GPP接入网络接入所述融合的核心网 时,
所述 IWF设置为,接收到 IP地址请求消息时, 向所述接入管理实体或 所述 S-GW转发 IP地址请求消息; 或者, 接收到所述 3GPP接入网络中的
认证成功消息后, 向所述 S-GW发送创建会话请求消息。
其中: 所述接入管理实体设置为,接收到所述 IWF发送的 IP地址请求 消息后,或接收到所述 3GPP接入网络中的认证成功消息后,通过创建会话 请求消息,触发所述 3 GPP接入网络中的服务网关 S-GW与分组数据网络网 关 P-GW之间建立通用无线分组业务隧道协议 GTP会话。
其中, 所述 S-GW设置为, 接收到所述 IWF发送的创建会话请求消息 或 IP地址请求消息后, 向所述 P-GW发送创建会话请求消息; 或者, 接收 到所述接入管理实体发送的创建会话请求消息后, 向所述 P-GW发送创建 会话请求消息。
其中, 所述 IWF还设置为, 负责所述可信任的非 3GPP接入网络的用 户面数据转发和处理,以及所述可信任的非 3GPP接入网络的控制面数据转 发;
对应地, 所述接入管理实体还设置为, 负责扩展认证协议 EAP认证、 3GPP移动性管理功能, 和 /或, 认证、 授权、 计费 AAA功能, 以及所述可 信任的非 3GPP接入网络的控制面转发、 处理功能。
或者, 上述核心网中还包括 3GPP AAA服务器; 所述接入管理实体与 所述 3GPP AAA服务器连接;
所述 IWF支持所述非 3GPP接入网络的用户面数据转发、 处理, 以及 所述可信任的非 3GPP接入网络的控制面数据转发;
所述接入管理实体负责 EAP认证、 3GPP移动性管理和所述可信任的 非 3GPP接入网络的控制面转发、 处理。
上述接入管理实体,或上述接入管理实体及所述 AP负责转发所述 IWF 和所述 S-GW建立 GTP用户面隧道所需要信息, 所述 S-GW与所述 IWF 之间建立 GTP用户面隧道。
或者, 所述 IWF支持所述非 3GPP接入网络的控制面转发、 处理, 用
户面数据转发、 处理, 以及 EAP认证;
所述接入管理实体负责 3GPP网络的移动性管理、 AAA功能,和 /或 EAP 认证。
其中, 所述核心网中还设置有 HSS, 存储 UE与所述可信任的非 3GPP 接入网络和 /或 3GPP接入网络的签约信息;
所述接入管理实体与所述 HSS连接。
上述 IWF位于所述可信任的非 3GPP接入网络或所述 3GPP接入网络 中; 所述可信任的非 3GPP接入网络为 WLAN。
或者,本发明的融合的核心网,用于可信任的非 3GPP接入网络与 3GPP 接入网络的接入; 所述 3GPP接入网络中设置有接入管理实体; IWF与所 述接入管理实体连接; 和 /或, 所述 IWF与所述 3GPP接入网络中的 S-GW 连接; 和 /或, 所述 3GPP接入网络中的 S-GW与所述接入管理实体连接; 和 /或, 所述可信任的非 3GPP接入网络中的 AP与所述接入管理实体连接; 在 UE通过所述可信任的非 3GPP接入网络接入所述融合的核心网时,
所述接入管理实体设置为,接收到所述 IWF发送的 IP地址请求消息后, 或接收到所述 3GPP接入网络中的认证成功消息后, 通过创建会话请求消 息, 触发所述 3GPP接入网络中的 S-GW与 P-GW之间建立 GTP会话。
上述 S-GW设置为,接收到所述 IWF发送的创建会话请求消息或 IP地 址请求消息后, 向所述 P-GW发送创建会话请求消息; 或者, 接收到所述 接入管理实体发送的创建会话请求消息后, 向所述 P-GW发送创建会话请 求消息。
上述接入管理实体,或上述接入管理实体及所述 AP负责转发所述 IWF 和所述 S-GW建立 GTP用户面隧道所需要信息, 所述 S-GW与所述 IWF 之间建立 GTP用户面隧道。
本发明的融合的核心网, 其具体架构及应用, 结合下述的实施例作进
一步详细描述。
实施例一
图 3a为本发明中 UE通过可信任的 WLAN接入 EPS的架构 1的非漫 游场景示意图, 图 3b为本发明中 UE通过可信任的 WLAN接入 EPS的架 构 1 的漫游归属地接入场景示意图, 图 3c为本发明中 UE通过可信任的 WLAN接入 EPS的架构 1的漫游地接入场景示意图。 该实施例中, 主要是 描述支持 WLAN接入和 LTE接入的 UE,分别通过可信任的 WLAN和 LTE 接入融合的核心网架构图, 其网元连接接口及连接结构如图 3a-3c所示。 本 示例的架构中, WLAN网络的控制面和用户面功能分离。 其中, 3GPP网络 内的接入管理实体实现 WLAN网络的管理功能,且需要支持 EAP认证功能; 互通功能实体(IWF, Interworking Function ) 实现了 WLAN网络的用户面 数据转发功能。
上述架构中的关键网元的功能描述如下:
接入管理实体:本示例主要是研究接入管理实体和 MME物理合一设置 的场景, 不考虑接入管理实体和 MME物理分离的场景。 因此,接入管理实 体不仅支持 WLAN网络的控制面功能和 AAA功能 , 而且也支持 MME功 能。 当然, 接入管理实体也可以和其他网元物理合一设置。
在非漫游场景下(如图 3a所示),由于接入管理实体集成了 AAA功能, 因此, 在 WLAN对 UE执行 EAP认证的功能时, 根据 HSS传输的 EAP 认证算法, 来进行关键 Key的计算; 在漫游场景下 (如图 3b、 3c所示), 接入管理实体位于拜访公共陆地移动网络(VPLMN, Visitor Public Land Mobile Network ) 内, 可以作为 EAP认证者身份要求 UE进行认证。
互通功能实体( IWF, Interworking Function ): 其可以位于 WLAN接入 网络或者 3GPP网络内,主要功能包括: 处理 WLAN网络用户面数据报文, 负责转发 AP和接入管理实体之间的消息。 负责转发 AP和 S-GW之间的用
户面数据和其他应用层消息, 比如 DHCP消息。 这要求 IWF支持动态主机 设置协议 ( DHCP, Dynamic Host Configuration Protocol ) 中继 (relay )功
•6匕
SI匕。
融合的 HSS:需要同时保存该用户分别作为 LTE和 WLAN接入的签约 信息, 可以基于接入类型进行个性数据的保存。
对其中的关键接口功能进行介绍:
接口 i: 为接入管理实体与 AP之间的接口。 接入管理实体可以通过该 接口, 配置 AP; 可能会采用 WLAN 网络的 CAPWAP ( Control And Provisioning of Wireless Access Points Protocol )协议, 或者直接使用 3 GPP 的接口协议, 如 S 1 -MME接口的协议。 该接口是可选接口, 如果 AP需要 选择接入管理实体, 且和接入管理实体之间建立控制面消息交互的通道, 则需要该接口。
本领域技术人员应当理解, 本发明中的接口定义和接口间的协议不限 定于所描述的, 可能根据实际的场景采用其他协议, 本发明以 CAPWAP ( Control And Provisioning of Wireless Access Points Protocol ) 为例进行说 明。 本领域技术人员应当理解, 此不应视为对本发明技术方案的限定。
接口 j: 为接入管理实体和 IWF之间的接口。接入管理实体可以通过该 接口配置 IWF; 如果未设置接口 i, 则接入管理实体也可以通过该接口 j来 配置 AP。 具体的接口定义原则参考接口 i的描述。
Si*接口: 为 IWF与 EPC的 S-GW之间的接口。 该接口的主要功能包 括: 支持 UE从 WLAN接入 3GPP核心网的用户面数据的转发和处理。 可 能支持 GPRS隧道协议 ( GTP )。
S11*接口: 为接入管理实体和 S-GW之间的接口。 如果接入管理实体 与 S-GW之间的接口采用 MME和 S-GW之间的接口,则该接口可以为 S11 接口; 同样, 接入管理实体也可以采用一个新的接口, 因此暂定义该接口
为 Sll*接口。 该接口的主要功能包括: 接入管理实体发送 GTP会话创建消 息触发 S-GW与 P-GW之间建立会话。 接口支持 GTP协议。
S6e接口: 为接入管理实体和 HSS之间的接口。 该接口的主要功能包 括: 如果需要传输签约信息, 则同时传输该 UE分别作为 LTE和 WLAN用 户的签约信息。 在非漫游场景下, 该接口需要支持 3GPP的 AAA和 HSS 之间的 SWx接口功能。 并且, HSS需要向接入管理实体传输 EAP认证需 要的关键 Key的算法等信息。 关于该接口的定义, 是在现有的 S6a接口进 行增强, 还是新增加一个接口, 根据需要设置。
SWi*接口: 为接入管理实体和 3GPP AAA之间的接口。 该接口的主要 功能包括: 如果需要传输签约信息, 则同时传输该 UE 分别作为 LTE 和 WLAN用户的签约信息。 传输 SWd接口支持的 AAA消息。
SWj*接口: 为接入管理实体和 3GPP AAA之间的接口。 该接口的主要 功能包括: 如果需要传输签约信息, 则同时传输该 UE 分别作为 LTE 和 WLAN用户的签约信息。 传输 SWx接口支持的其他信息。 对于支持 LTE 和 WLAN接入的终端, IWF或者 eNB要选择这种特殊的功能实体, 而不 是简单地选择 MME网元; IWF或者 MME要选择支持本架构下的 S-GW, S-GW要选择本架构下的 P-GW。
为了方便后续流程描述方便, 将上述架构分为两种子架构, 分别为架 构 1-1和架构 1-2, 其主要区别在于: 架构 1-1不包含接口 i; 架构 1-2包含 接口 i。
以下结合上述架构, 详细描述 UE是如何接入上述架构的。
实施例二
本示例是基于架构 1-1的, 在漫游归属地接入场景下, UE通过 WLAN 接入 EPC的附着流程图。 在该流程中, AP只需要发现和选择 IWF的地址, 可以采用现有 WLAN网络中 AC发现机制, IWF需要发现和选择接入管理
实体, 可以采用 DNS/DHCP查询机制或者其他发现机制。 图 4为本发明中 架构 1-1的漫游归属地接入场景下, UE通过可信任的 WLAN接入 EPS的 附着流程图, 如图 4所示, 本示例中 UE接入 EPS的附着流程包括以下步 驟:
步驟 401 , UE根据 WLAN的无线机制,选择一个服务集标识符( SSID, Service Set Identifier ) , 并接入相应的 ΑΡ。
步驟 402-步驟 404, ΑΡ可以根据 UE的介质访问控制层( MAC, Medium Access Control Layer )地址, 以及本地的 MAC映射关系信息, 确定出其接 入的 SSID,并将该 SSID通知 IWF, IWF从 AP发送的通知消息中获取 SSID, 结合 3GPP MME发现机制和 MME的能力, 选择一个接入管理实体, 将其 接入的 SSID发送给接入管理实体。 其中, AP和 IWF之间、 IWF和接入管 理实体之间的消息可以通过扩展现有的无线接入点的控制和提供 ( CAPWAP, Control And Provisioning of Wireless Access Point )消息或者新 增消息来实现。 本示例以扩展 CAPWAP消息为例进行说明; 这样, 在发送 SSID信息的同时, 也建立了 CAPWAP隧道。 接入管理实体接收到 IWF发 送的通知消息后, 会发送响应消息给 IWF, 响应消息中可能会包含 AP和 IWF的配置数据, IWF接收到接入管理实体的响应消息之后, 会将 AP的 配置信息通过响应消息发送给 AP。
步驟 405 , 接入管理实体作为可扩展的认证协议 ( EAP , Extensible Authentication Protocol )认证者, 会触发 UE的 EAP认证流程。 在 EAP认 证流程过程中,接入管理实体会向 HSS请求用户签约信息,这时,如果 HSS 判断 UE同时签约了 WLAN和 LTE接入的信息, 则会同时下发给接入管理 实体。
本示例中, UE获取 IP地址主要通过以下几种方式:
方式一: EAP认证消息触发接入管理实体创建会话
步驟 407-步驟 410,接入管理实体接收到 EAP-SUCCESS消息之后,会 向 S-GW发起创建 GTP会话的流程, S-GW也会向 P-GW发起创建 GTP会 话的流程。 其中, P-GW会携带为 UE分配的 IP地址给 S-GW, 并由 S-GW 转发给接入管理实体。
步驟 411 ,接入管理实体接收到 S-GW发来的创建会话响应消息,会向 IWF 发送配置更新请求消息, 配置更新请求消息中携带 S-GW 用户面的 TEID, S-GW地址, UE MAC地址。
步驟 412, IWF接收到接入管理实体发来的配置更新请求消息后,获取 该消息中携带的 S-GW用户面的 TEID, S-GW地址, UE MAC地址。 根据 UE MAC地址查找 UE上下文信息, 如果没有 UE上下文信息, 则新建 UE 上下文, 并存储 S-GW用户面的 TEID, S-GW地址。 然后, IWF发送配置 响应消息给接入管理实体,该配置响应消息包含 IWF用户面的 TEID, IWF 地址, UE MAC地址。
步驟 413-步驟 416, 接入管理实体接收到 IWF发来的配置响应消息, 根据 UE MAC地址查找绑定的 GTP隧道标识。 然后,发送修改承载请求消 息, 该修改承载请求消息中携带 IWF 用户面的 TEID, IWF地址。 S-GW 接收到修改承载请求消息后, 也向 P-GW发起修改承载的请求流程。 S-GW 接收到 P-GW的修改承载响应之后, 也向接入管理实体发送修改承载响应 消息。
步驟 417, 接入管理实体接收到修改承载响应消息后, 会向 UE发送 EAP认证成功的消息。
步驟 420 , 在 UE接收到 EAP认证成功的消息之后, 会发起 IP地址分 配的流程。
方式二: 路由请求消息或者 DHCP消息接入管理实体创建会话 步驟 406,如果 IWF接收到 DHCPv6请求消息或者 DHCPv4发现消息,
其会作为 relay, 转发该消息到接入管理实体。
步驟 407, 接入管理实体接收到 IWF发来的 DHCPv6请求消息或者 DHCPv4发现消息,向 S-GW发起创建会话的流程,执行步驟 407-步驟 410; 然后, 执行步驟 411-步驟 416, 来完成 IWF和 S-GW的 GTP用户面信息的 传输, 具体过程与方式一相同, 这里不再赘述。
步驟 418-步驟 419, 接入管理实体通过 IWF转发 DHCPv4提供或者通 告消息, 将 P-GW为 UE分配的 IP地址发送给 UE。
UE通过 IWF向接入管理实体发送 DHCPv4请求消息或者请求消息, 以确认 P-GW为 UE分配的 IP地址。
接入管理实体通过 IWF , 向 UE发送 DHCPv4确认消息或者应答消息, 确认 P-GW为 UE分配的 IP地址。
上述的 DHCP请求消息也可以用路由请求消息代替, 主要区别在于, 接入管理实体接收到 UE定时发送的广播路由请求消息, 接收到该消息后, 并新建一个路由请求消息,发送给 S-GW。同样,接入管理实体接收到 S-GW 返回的路由响应消息之后 , 新建一个路由响应消息给 UE。
对于非漫游场景, 接入管理实体、 S-GW、 P-GW和 HSS均位于同一个 3GPP移动网络内, 不存在 3GPPAAA, 信令消息交互没有改变, 同上。
对于漫游地接入场景, 接入管理实体、 S-GW和 P-GW均位于 VPLMN 内, 3GPPAAA和 HSS位于 HPLMN内。 信令消息交互没有改变, 同上。
实施例三
本实施例为架构 1-2的, 漫游归属地接入场景下, 用户通过 WLAN接 入 EPC的附着流程。 本实施例与实施例二的主要区别在于, 接入管理实体 和 AP之间需要建立 CAPWAP隧道, AP需要发现 IWF和接入管理实体两 个网元的地址, 相当于 AP 同时和两个 AC连接, 而现在的 AP只和一个 AC连接, 因此, 需要对 AP进行增强。 图 5为本发明中架构 1-2的漫游归
属地接入场景下, UE通过可信任的 WLAN接入 EPS的附着流程图, 如图 5所示, 本示例中 UE接入 EPS的附着流程包括以下步驟:
步驟 501 , 同步驟 401。
步驟 502-步驟 504, AP可以根据 UE的介质访问控制层( MAC, Medium Access Control Layer )地址以及本地的 MAC映射关系信息, 确定其接入的 SSID, 并将该 SSID通过消息通知接入管理实体, 并且, 也通过消息通知 IWF其接入的 SSID。
IWF接收到 AP发来的通知消息后 , 如果 IWF和接入管理实体之间未 建立控制通道, 则其会向接入管理实体发起建立控制通道的流程。
其中, 在 AP和 IWF之间、 IWF和接入管理实体之间、 AP和接入管理 实体之间的消息可以通过扩展现有的 CAPWAP消息或者新增消息来实现。 如果通过新增消息实现, 则同时需要建立 CAPWAP 隧道。 本发明以扩展 CAPWAP消息为例进行说明, 这样, 在发送 SSID信息的同时, 也建立了 CAPWAP隧道。
接入管理实体会发送响应消息分别给 AP和 IWF, 可能会包含 AP和 IWF的配置数据。
步驟 505 , 接入管理实体作为可扩展的认证协议 ( EAP , Extensible Authentication Protocol )认证者, 会向 UE触发 EAP认证流程。 在认证流程 过程中, 接入管理实体会向 HSS请求用户签约信息, 此时, 如果 HSS判断 UE同时签约了 WLAN和 LTE接入的信息,则会同时下发给接入管理实体。
本示例中, UE获取 IP地址主要通过以下几种方式:
方式一: EAP认证消息触发接入管理实体创建会话
步驟 508-步驟 511 , 同步驟 407-步驟 410。
步驟 512,接入管理实体接收到 S-GW发来的创建会话响应消息,会向 AP发送参数更新请求消息, 消息中携带 S-GW用户面的 TEID, P-GW地
址, UE MAC地址。
步驟 513 , AP接收到接入管理实体发来的参数更新请求消息, 消息中 携带 S-GW用户面的 TEID, S-GW地址, UE MAC地址。 AP会将这些信 息通过事件请求消息, 发送给 IWF。
步驟 514, IWF接收到 AP发来的事件请求消息,获取消息中携带 S-GW 用户面的 TEID, S-GW地址, UE MAC地址。 根据 UE MAC地址查找 UE 上下文信息, 如果没有, 新建 UE上下文, 并存储 S-GW用户面的 TEID, S-GW地址。 然后, IWF发送事件响应消息给 AP, 该消息包含 IWF用户面 的 TEID, IWF地址, UE MAC地址。
步驟 515 , AP接收到事件响应消息后,获取 IWF用户面的 TEID , IWF 地址, UE MAC地址, 并通过参数更新响应消息, 将这些信息发送给接入 管理实体。
步驟 516, 接入管理实体接收到 AP发来的参数更新响应消息, 根据 UE MAC地址查找绑定的 GTP隧道标识。 然后, 发送修改承载请求消息, 该修改承载请求消息中携带 IWF用户面的 TEID, IWF地址。 S-GW接收 到修改承载请求消息后,也向 P-GW发起修改承载的请求流程。 S-GW接收 到 P-GW的修改承载响应之后, 也向接入管理实体发送修改承载响应消息。
步驟 517-步驟 523 , 同步驟 414-步驟 420。
方式二: 路由请求消息或者 DHCP消息触发接入管理实体创建会话 步驟 506-步驟 507, 接入管理实体接收到 IWF发来的 DHCPv6请求消 息或者 DHCPv4发现消息, 向 S-GW发起创建会话的流程, 执行步驟 508- 步驟 511 ; 然后, 执行步驟 512-步驟 519, 来完成 IWF和 S-GW的 GTP用 户面信息的传输, 具体过程与方式一相同, 这里不再赘述。
步驟 521-步驟 522, 同步驟 418-步驟 419。
以上在 AP、 IWF和接入管理实体之间采用的消息, 其定义取决于两网
元之间采用什么协议, 比如: 采用 CAPWAP时为配置更新请求消息。
对于非漫游场景, 接入管理实体、 S-GW、 P-GW和 HSS均位于同一个 3GPP移动网络内, 不涉及 3GPPAAA的处理,信令消息交互与前述完全相 同, 这里不再赘述。
对于漫游地接入场景, 接入管理实体、 S-GW和 P-GW均位于 VPLMN 内, 3GPP AAA和 HSS位于 HPLMN内, 信令消息交互与前述完全相同, 这里不再赘述。
实施例四
图 6a为本发明中 UE通过可信任的 WLAN接入 EPS的架构 2的非漫 游场景示意图, 图 6b为本发明中 UE通过可信任的 WLAN接入 EPS的架 构 2 的漫游归属地接入场景示意图, 图 6c为本发明中 UE通过可信任的 WLAN接入 EPS的架构 2的漫游地接入场景示意图, 本实施例所示的架构 与实施例一所示的架构主要区别在于, 接入管理实体不支持 AAA功能, 其 他功能均相同。
对图 6中关键网元的功能描述如下:
接入管理实体: 其与实施例一的区别在于, 不支持 AAA功能。 该实体 的部署原则和其他功能可参考实施例一的相关描述。
互通功能实体(IWF, Interworking Function ): 参考实施例一的功能介 融合的 HSS: 同实施例一的功能介绍。
关键接口功能的介绍:
与实施例一相比, 该架构新增了一个 SWw*接口, SWi*接口的功能也 与之前的接口有差别, 其他接口的功能与前述实施例一完全相同。
SWw*接口:非漫游场景下,为接入管理实体和 3GPP AAA之间的接口。 漫游场景下, 则为接入管理实体和 3GPP AAA代理之间的接口。 该接口的
主要功能包括: 如果需要传输签约信息, 则同时传输该 UE分别作为 LTE 和 WLAN用户的签约信息。 传输 AAA消息。
SWi*接口: 为 3GPP AAA代理和 3GPP AAA之间的接口。 该接口的主 要功能包括: 如果需要传输签约信息, 则同时传输该 UE分别作为 LTE和 WLAN用户的签约信息。 传输 AAA消息。
核心网络的网元选择参考实施例一相关描述, 在此不赘述。
实施例五
本实施例是以实施例四所示的网络架构为基础, 漫游归属地接入场景 下, 用户通过 WLAN接入 EPS的附着流程。 图 7为本发明中架构 2的漫游 归属地接入场景下, 接入管理实体不支持 AAA功能时, UE通过可信任的 WLAN接入 EPS的附着流程图, 如图 7所示, 本示例中 UE接入 EPS的附 着流程包括以下步驟:
步驟 701 , 参见前述步驟 401至步驟 404, 或参见前述步驟 501至步驟
504.
步驟 702, 触发 UE进行 EAP认证。
本实施例与实施例二和实施例三的主要区别在于, 接入管理实体不支 持 AAA功能, 这样, 接入管理实体需要与 AAA之间支持 SWw*接口; 对 于漫游场景下,接入管理实体需要和 3GPPAAA代理之间支持 SWw*接口。
步驟 703 ,处理流程与实施例二中的步驟 406至步驟 420或实施例三中 的步驟 506至步驟 523完全相同, 在此不赘述。
对于非漫游场景, 接入管理实体、 S-GW、 P-GW、 3GPP AAA和 HSS 均位于同一个 3GPP移动网络内,信令消息交互与前述完全相同,这里不再 赘述。
对于漫游地接入场景,接入管理实体、 S-GW、 3GPPAAA代理和 P-GW 均位于 VPLMN内, 3GPP AAA和 HSS位于 HPLMN内, 信令消息交互与 前述完全相同, 这里不再赘述。
实施例六
图 8a为本发明中 UE通过可信任的 WLAN接入 EPS的架构 3的非漫 游场景示意图, 图 8b为本发明中 UE通过可信任的 WLAN接入 EPS的架 构 3 的漫游归属地接入场景示意图, 图 8c为本发明中 UE通过可信任的 WLAN接入 EPS的架构 3的漫游地接入场景示意图, 本实施例中, 主要是 描述支持 WLAN接入和 LTE接入的 UE,分别通过可信任的 WLAN和 LTE 接入 EPC时的融合网络架构图。
该架构中, WLAN网络的控制面和用户面功能物理合一。 其中, 3GPP 网络内的接入管理实体支持 AAA功能和 MME功能, 且需要支持 EAP认 证功能; WLAN网络内的 IWF实现 WLAN网络的管理功能和用户面数据 转发功能。
关键网元的功能描述如下:
接入管理实体: 支持 MME和 AAA功能。 主要功能包括: 在非漫游场 景下 (如图 8a所示), 由于其集成了 AAA功能, 因此, 在 WLAN UE执 行 EAP认证的功能时, 根据 HSS传输的 EAP认证算法, 来计算关键 Key 的计算。 在漫游场景下 (如图 8b、 8c所示), 其位于 VPLMN内, 负责转 发 AAA消息。
作为 MME或者融合的网元,其能够发起创建会话请求消息,触发 S-GW 和 P-GW之间建立 GTP会话。 该实体部署原则同实施例一相关描述。
IWF: 支持 WLAN网络的控制面和用户面功能。 主要功能包括: 负责 WLAN网络的控制管理; 支持 EAP认证, 作为 EAP认证者身份; 负责转 发 AP和 S-GW之间的用户面数据和其他应用层消息, 比如 DHCP消息。 这要求 IWF支持 DHCP relay功能;能够发起创建会话请求消息,触发 S-GW 和 P-GW之间建立 GTP会话。
融合的 HSS: 同实施例一完全相同。
上述架构中的关键接口功能如下:
接口 j: 为接入管理实体和 IWF之间的接口。 该接口的主要功能包括: 支持 AAA消息的转发。
Si*接口: 为 IWF与 EPC的 S-GW之间的接口。 该接口的主要功能包 括: 支持 UE从 WLAN接入 3GPP核心网的用户面数据转发和处理。 支持 IWF和 S-GW之间的会话管理消息传输。 支持 GTP协议。
S11*接口: 为接入管理实体和 S-GW之间的接口。 如果接入管理实体 与 S-GW之间的接口采用 MME和 S-GW之间的接口,则该接口可以为 S11 接口; 同样, 接入管理实体也可以采用一个新的接口, 因此该处暂定义该 接口为 S11*接口。 该接口的主要功能包括: 接入管理实体发送 GTP会话创 建消息触发 S-GW与 P-GW之间建立会话。 接口支持 GTP协议。
S6e接口、 SWi*接口和 SWj*接口的功能参考实施例一的相关描述。 核心网络的网元选择参考实施例一相关描述, 在此不再赘述。
实施例七
本实施例为实施例六所示的架构的, 漫游归属地接入场景下, 用户通 过 WLAN接入 EPS的附着流程。图 9为本发明中架构 3的漫游归属地接入 场景下, UE通过可信任的 WLAN接入 EPS的附着流程图, 如图 9所示, 本示例中 UE接入 EPS的附着流程包括以下步驟:
步驟 901 : 同步驟 401。
步驟 902: AP可以根据 UE的 MAC地址, 以及本地的 MAC映射关系 信息, 可以确定其接入的 SSID, 并通过通知消息通知 IWF其接入的 SSID。
步驟 903: IWF作为 EAP认证者 , 会向 UE触发 EAP认证流程。 在认 证流程过程中, IWF会向 HSS请求用户签约信息, 此时, 如果 HSS判断 UE同时签约了 WLAN和 LTE接入的信息 , 则会将 WLAN和 LTE接入的 信息下发给接入管理实体。
其中, 接入管理实体作为 AAA (非漫游场景)或者 AAA代理(漫游 场景), 负责 AAA消息的转发。
本示例中, UE获取 IP地址主要通过以下几种方式:
方式一: EAP认证消息触发接入管理实体创建会话
步驟 904a: 非漫游场景下, 接入管理实体作为 AAA, 发送 EAP认证 成功消息后, 会向 S-GW发送创建会话请求的消息; 或者, 漫游场景下, 接入管理实体作为 AAA代理, 接收到 EAP认证成功消息后, 会向 S-GW 发送创建会话请求的消息;
步驟 904b: IWF接收到 EAP认证成功消息后,会向 S-GW发送创建会 话请求消息, 以触发 S-GW向 P-GW发送创建会话请求的消息。
步驟 907-步驟 908: S-GW接收到 IWF或者接入管理实体发来的创建 会话请求消息,会向 P-GW发送创建会话请求消息。 P-GW处理该消息之后, 向 S-GW发送创建会话响应消息。
步驟 909a: S-GW接收到创建会话响应消息后,如果已经执行步驟 904a, 则其向接入管理实体发送创建会话响应消息;
步驟 909b: S-GW接收到创建会话响应消息后, 如果已经执行步驟 904b, 则其向 IWF发送创建会话响应消息;
步驟 910: 如果已经执行步驟 909a, 则接入管理实体向 UE发送 EAP 认证成功消息; 如果已经执行步驟 90%, 则 IWF向 UE发送 EAP认证成功 消息。
步驟 914: 在 UE接收到 EAP认证成功消息之后, UE通过 IP地址请 求消息流程, 获取 P-GW为其分配的 IP地址。
以上步驟 904a和步驟 904b为两种触发方式, 步驟 909a对应 904a, 步 驟 90%对应 904b。 两种触发方式作为可选方式分别独立存在。
方式二: 路由请求消息或者 DHCP消息触发接入管理实体创建会话
步驟 905-步驟 906: S-GW接收到 IWF转发的 DHCPv6请求消息或者 DHCPv4发现消息, 向 P-GW发起创建会话的流程, 执行步驟 907-908; 然 后, 执行步驟 911-步驟 912。
步驟 905:如果 IWF接收到 DHCPv6请求消息或者 DHCPv4发现消息, 其会作为 relay, 转发该消息到 S-GW。
步驟 906: S-GW接收到 IWF发来的 DHCPv6请求消息或者 DHCPv4 发现消息, 向 P-GW发起创建会话的流程, 执行步驟 907-步驟 908;
步驟 911-步驟 913: S-GW通过 IWF转发 DHCPv4提供或者通告消息, 将 P-GW为 UE分配的 IP地址发送给 UE。
UE通过 IWF,向 S-GW发送 DHCPv4请求消息或者请求消息, 以确认 P-GW为 UE分配的 IP地址。
S-GW通过 IWF, 向 UE发送 DHCPv4确认消息或者应答消息, 确认 P-GW为 UE分配的 IP地址。
对于非漫游场景, 不存在 3GPP AAA, 接入管理实体、 S-GW、 P-GW 和 HSS均位于同一个 3GPP移动网络内,其之间的信令消息交互没有改变, 同上。
对于漫游地接入场景, 接入管理实体、 S-GW和 P-GW均位于 VPLMN 内, 3GPPAAA和 HSS位于 HPLMN内。 其之间的信令消息交互没有改变, 同上。
本发明中, 在 AP、 IWF和接入管理实体之间采用的消息, 其定义取决 于接两网元之间采用什么协议, 比如采用 CAPWAP时, 消息为配置更新请 求消息。
对于接口 i、 接口 j、 Si*、 SWi*、 SWj*、 SWw*、 Sl l*、 S6e等接口, 具体接口名称定义可以采用其他名称。
如果在宽带论坛( BBF, Broadband Forum ) 网络中, RG支持 AP的功
能, BNG支持 AC的功能, 同样适用于 BBF 网络, 因此, 上述实施例的 AP可以被 RG替换, IWF可以被 BNG替换, 而 AP和 IWF、 IWF和接入 管理实体、 AP和接入管理实体之间的 CAPWAP协议被 BBF特有的协议代 替。
以上所述, 仅为本发明的较佳实施例而已, 并非用于限定本发明的保 护范围。
Claims
1、 一种融合的核心网, 用于可信任的非第三代合作伙伴计划 3GPP接 入网络与 3GPP接入网络的接入;所述 3GPP接入网络中设置有接入管理实 体; 互通功能实体 IWF与所述接入管理实体连接; 和 /或, 所述 IWF与所 述 3GPP接入网络中的服务网关 S-GW连接; 和 /或, 所述 S-GW与所述接 入管理实体连接; 和 /或, 所述可信任的非 3GPP接入网络中的接入点 AP 与所述接入管理实体连接;在用户设备 UE通过所述可信任的非 3GPP接入 网络接入所述融合的核心网时 ,
所述 IWF设置为,接收到 IP地址请求消息时, 向所述接入管理实体或 所述 S-GW转发 IP地址请求消息; 或者, 接收到所述 3GPP接入网络中的 认证成功消息后, 向所述 S-GW发送创建会话请求消息。
2、 根据权利要求 1所述的核心网, 其中:
所述接入管理实体设置为,接收到所述 IWF发送的 IP地址请求消息后, 或接收到所述 3GPP接入网络中的认证成功消息后, 通过创建会话请求消 息, 触发所述 3GPP接入网络中的服务网关 S-GW 与分组数据网络网关 P-GW之间建立通用无线分组业务隧道协议 GTP会话。
3、 根据权利要求 1所述的核心网, 其中:
所述 S-GW设置为,接收到所述 IWF发送的创建会话请求消息或 IP地 址请求消息后, 向所述 P-GW发送创建会话请求消息; 或者, 接收到所述 接入管理实体发送的创建会话请求消息后, 向所述 P-GW发送创建会话请 求消息。
4、根据权利要求 1至 3任一项所述的核心网, 其中, 所述 IWF还设置 为, 负责所述可信任的非 3GPP接入网络的用户面数据转发和处理, 以及所 述可信任的非 3GPP接入网络的控制面数据转发;
对应地, 所述接入管理实体还设置为, 负责扩展认证协议 EAP认证、 3GPP移动性管理功能, 和 /或, 认证、 授权、 计费 AAA功能, 以及所述可 信任的非 3GPP接入网络的控制面转发、 处理功能。
5、 根据权利要求 1至 3任一项所述的核心网, 其中, 所述核心网中还 包括 3GPPAAA服务器;所述接入管理实体与所述 3GPP AAA服务器连接; 所述 IWF支持所述非 3GPP接入网络的用户面数据转发、 处理, 以及 所述可信任的非 3GPP接入网络的控制面数据转发;
所述接入管理实体负责 EAP认证、 3GPP移动性管理和所述可信任的 非 3GPP接入网络的控制面转发、 处理。
6、 根据权利要求 4或 5所述的核心网, 其中, 所述接入管理实体, 或 所述接入管理实体及所述 AP负责转发所述 IWF和所述 S-GW建立 GTP用 户面隧道所需要信息, 所述 S-GW与所述 IWF之间建立 GTP用户面隧道。
7、 根据权利要求 1至 3任一项所述的核心网, 其中:
所述 IWF支持所述非 3GPP接入网络的控制面转发、 处理, 用户面数 据转发、 处理, 以及 EAP认证;
所述接入管理实体负责 3GPP网络的移动性管理、 AAA功能,和 /或 EAP 认证。
8、 根据权利要求 1至 7任一项所述的核心网, 其中, 所述核心网中还 设置有归属用户服务器 HSS,设置为存储 UE与所述可信任的非 3GPP接入 网络和 /或 3GPP接入网络的签约信息;
所述接入管理实体与所述 HSS连接。
9、 根据权利要求 1至 8任一项所述的核心网, 其中:
所述 IWF位于所述可信任的非 3GPP接入网络或所述 3GPP接入网络 中;
所述可信任的非 3GPP接入网络为无线局域网 WLAN。
10、 一种融合的核心网, 用于可信任的非 3GPP接入网络与 3GPP接入 网络的接入; 所述 3GPP接入网络中设置有接入管理实体; IWF与所述接 入管理实体连接;和 /或,所述 IWF与所述 3GPP接入网络中的 S-GW连接; 和 /或, 所述 3GPP接入网络中的 S-GW与所述接入管理实体连接; 和 /或, 所述可信任的非 3GPP接入网络中的 AP与所述接入管理实体连接; 在 UE 通过所述可信任的非 3GPP接入网络接入所述融合的核心网时,
所述接入管理实体设置为,接收到所述 IWF发送的 IP地址请求消息后, 或接收到所述 3GPP接入网络中的认证成功消息后, 通过创建会话请求消 息, 触发所述 3GPP接入网络中的 S-GW与 P-GW之间建立 GTP会话。
11、 根据权利要求 10所述的核心网, 其中:
所述 S-GW设置为,接收到所述 IWF发送的创建会话请求消息或 IP地 址请求消息后, 向所述 P-GW发送创建会话请求消息; 或者, 接收到所述 接入管理实体发送的创建会话请求消息后, 向所述 P-GW发送创建会话请 求消息。
12、 根据权利要求 10或 11所述的核心网, 其中, 所述接入管理实体, 或所述接入管理实体及所述 AP负责转发所述 IWF和所述 S-GW建立 GTP 用户面隧道所需要信息,所述 S-GW与所述 IWF之间建立 GTP用户面隧道。
13、 一种融合的核心网接入方法, 所述核心网用于可信任的非 3GPP 接入网络与 3GPP接入网络的接入;所述 3GPP接入网络中设置有接入管理 实体; IWF与所述接入管理实体连接; 和 /或, 所述 IWF与所述 3GPP接入 网络中的 S-GW连接; 和 /或, 所述 3GPP接入网络中的 S-GW与所述接入 管理实体连接;在 UE通过所述可信任的非 3GPP接入网络接入所述融合的 核心网时, 所述方法包括:
所述 IWF接收到 IP 地址请求消息时, 向所述接入管理实体或所述 S-GW转发 IP地址请求消息; 或者, 接收到所述 3GPP接入网络中的认证 成功消息后, 向所述 S-GW发送创建会话请求消息。
14、 根据权利要求 13所述的方法, 其中, 所述方法还包括: 所述接入管理实体接收到所述 IWF发送的 IP地址请求消息后,或接收 到所述 3GPP接入网络中的认证成功消息后,通过创建会话请求消息,触发 所述 3GPP接入网络中的 P-GW与所述 S-GW之间建立 GTP会话。
15、 根据权利要求 13所述的方法, 其中, 所述方法还包括:
所述 S-GW接收到所述 IWF发送的创建会话请求消息或 IP地址请求消 息后, 向所述 P-GW发送创建会话请求消息; 或者, 接收到所述接入管理 实体发送的创建会话请求消息后, 向所述 P-GW发送创建会话请求消息。
16、 根据权利要求 13至 15任一项所述的方法, 其中, 所述 IWF还负 责所述可信任的非 3GPP接入网络的用户面数据转发和处理,以及所述可信 任的非 3GPP接入网络的控制面数据转发;
对应地, 所述接入管理实体还负责扩展认证协议 EAP认证、 3GPP移动性 管理功能,和 /或,认证、授权、计费 AAA功能, 以及所述可信任的非 3GPP 接入网络的控制面转发、 处理功能。
17、 根据权利要求 13至 15任一项所述的方法, 其中, 所述核心网中 还包括 3GPP AAA服务器; 所述接入管理实体与所述 3GPP AAA服务器连 接;
所述 IWF支持所述非 3GPP接入网络的用户面数据转发、 处理, 以及 所述可信任的非 3GPP接入网络的控制面数据转发;
所述接入管理实体负责 EAP认证、 3GPP移动性管理和所述可信任的 非 3GPP接入网络的控制面转发、 处理。
18、 根据权利要求 16或 17所述的方法, 其中, 所述接入管理实体, 或所述接入管理实体及所述 AP负责转发所述 IWF和所述 S-GW建立 GTP 用户面隧道所需要信息,所述 S-GW与所述 IWF之间建立 GTP用户面隧道。
19、 根据权利要求 13至 15任一项所述的方法, 其中: 所述 IWF支持所述非 3GPP接入网络的控制面转发、 处理, 用户面数 据转发、 处理, 以及 EAP认证;
所述接入管理实体负责 3GPP网络的移动性管理、 AAA功能,和 /或 EAP 认证。
20、 根据权利要求 13至 19任一项所述的方法, 其中, 所述核心网中 还设置有 HSS; 所述 HSS存储 UE与所述可信任的非 3GPP接入网络和 /或 3GPP接入网络的签约信息; 所述接入管理实体与所述 HSS连接。
21、 根据权利要求 13至 20任一项所述的方法, 其中:
所述 IWF位于所述可信任的非 3GPP接入网络或所述 3GPP接入网络 中;
所述可信任的非 3GPP接入网络为 WLAN。
22、 一种融合的核心网接入方法, 所述核心网用于可信任的非 3GPP 接入网络与 3GPP接入网络的接入;所述 3GPP接入网络中设置有接入管理 实体; IWF与所述接入管理实体连接; 和 /或, 所述 IWF与所述 3GPP接入 网络中的 S-GW连接; 和 /或, 所述 3GPP接入网络中的 S-GW与所述接入 管理实体连接;和 /或,所述可信任的非 3GPP接入网络中的 AP与所述接入 管理实体连接;在 UE通过所述可信任的非 3GPP接入网络接入所述融合的 核心网时, 所述方法包括:
所述接入管理实体接收到所述 IWF发送的 IP地址请求消息后,或接收 到所述 3GPP接入网络中的认证成功消息后,通过创建会话请求消息,触发 所述 3GPP接入网络中的 S-GW与 P-GW之间建立 GTP会话。
23、 根据权利要求 22所述的方法, 其中:
所述 S-GW接收到所述 IWF发送的创建会话请求消息或 IP地址请求消 息后, 向所述 P-GW发送创建会话请求消息; 或者, 接收到所述接入管理 实体发送的创建会话请求消息后, 向所述 P-GW发送创建会话请求消息。
24、 根据权利要求 22或 23所述的方法, 其中, 所述方法还包括: 所述接入管理实体,或所述接入管理实体及所述 AP负责转发所述 IWF 和所述 S-GW建立 GTP用户面隧道所需要信息, 所述 S-GW与所述 IWF 之间建立 GTP用户面隧道。
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201210058495.4A CN103313344B (zh) | 2012-03-07 | 2012-03-07 | 融合的核心网及其接入方法 |
CN201210058495.4 | 2012-03-07 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2013131487A1 true WO2013131487A1 (zh) | 2013-09-12 |
Family
ID=49115951
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2013/072321 WO2013131487A1 (zh) | 2012-03-07 | 2013-03-07 | 融合的核心网及其接入方法 |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN103313344B (zh) |
WO (1) | WO2013131487A1 (zh) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2016155089A1 (zh) * | 2015-03-27 | 2016-10-06 | 华为技术有限公司 | 一种数据传输方法、装置及系统 |
CN110463336A (zh) * | 2017-03-24 | 2019-11-15 | 高通股份有限公司 | 用于为非3gpp接入建立用户面连通性的机制 |
Families Citing this family (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP3170360B1 (en) * | 2014-07-14 | 2021-04-07 | Convida Wireless, LLC | Inter-system handover and multi-connectivity via an integrated small cell and wifi gateway |
WO2016183745A1 (zh) * | 2015-05-15 | 2016-11-24 | 华为技术有限公司 | 用于建立连接的方法和设备 |
CN106376095A (zh) * | 2015-07-22 | 2017-02-01 | 中兴通讯股份有限公司 | 一种融合组网系统中建立传输通道的方法和装置 |
CN106488527A (zh) * | 2015-09-02 | 2017-03-08 | 中兴通讯股份有限公司 | 核心网的接入控制方法及装置 |
EP4398676A3 (en) * | 2016-10-05 | 2024-10-16 | Motorola Mobility LLC | Core network attachment through standalone non-3gpp access networks |
WO2018085994A1 (zh) | 2016-11-08 | 2018-05-17 | 华为技术有限公司 | 融合控制器选择方法、设备及系统 |
WO2020034378A1 (en) * | 2018-10-12 | 2020-02-20 | Zte Corporation | Location reporting for mobile devices |
CN111726319B (zh) * | 2019-03-18 | 2022-06-28 | 华为技术有限公司 | 一种通信方法、装置及系统 |
CN114040514B (zh) * | 2021-12-08 | 2024-01-12 | 中国联合网络通信集团有限公司 | 一种通信方法及设备 |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1288322A (zh) * | 1999-09-15 | 2001-03-21 | 深圳市华为技术有限公司 | 在智能网上实现信息台接入管理业务的方法 |
CN101309512A (zh) * | 2008-07-03 | 2008-11-19 | 深圳市沃其丰科技股份有限公司 | 一种接入控制装置、下一代网络系统及其接入控制方法 |
CN101388901A (zh) * | 2007-09-14 | 2009-03-18 | 大唐移动通信设备有限公司 | 长期演进系统中支持用户静态ip地址寻址的方法及系统 |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
ES2276020T3 (es) * | 2003-01-10 | 2007-06-16 | Evolium S.A.S. | Optimizacion de las calidad de servicio en un sistema de comunicaciones movil de paquetes conmutados. |
EP2009866A1 (en) * | 2007-06-26 | 2008-12-31 | France Télécom | Apparatuses and method for communicating a request for an internet protocol address to the visited serving gateway |
CN101848516B (zh) * | 2009-03-26 | 2014-02-05 | 中兴通讯股份有限公司南京分公司 | 在eps网络接入方式下实现cs业务切换的方法及系统 |
CN102111847B (zh) * | 2011-01-10 | 2013-07-24 | 大唐移动通信设备有限公司 | 一种接入控制的方法及装置 |
-
2012
- 2012-03-07 CN CN201210058495.4A patent/CN103313344B/zh active Active
-
2013
- 2013-03-07 WO PCT/CN2013/072321 patent/WO2013131487A1/zh active Application Filing
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1288322A (zh) * | 1999-09-15 | 2001-03-21 | 深圳市华为技术有限公司 | 在智能网上实现信息台接入管理业务的方法 |
CN101388901A (zh) * | 2007-09-14 | 2009-03-18 | 大唐移动通信设备有限公司 | 长期演进系统中支持用户静态ip地址寻址的方法及系统 |
CN101309512A (zh) * | 2008-07-03 | 2008-11-19 | 深圳市沃其丰科技股份有限公司 | 一种接入控制装置、下一代网络系统及其接入控制方法 |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2016155089A1 (zh) * | 2015-03-27 | 2016-10-06 | 华为技术有限公司 | 一种数据传输方法、装置及系统 |
CN110463336A (zh) * | 2017-03-24 | 2019-11-15 | 高通股份有限公司 | 用于为非3gpp接入建立用户面连通性的机制 |
CN110463336B (zh) * | 2017-03-24 | 2023-04-07 | 高通股份有限公司 | 用于为非3gpp接入建立用户面连通性的机制 |
Also Published As
Publication number | Publication date |
---|---|
CN103313344A (zh) | 2013-09-18 |
CN103313344B (zh) | 2017-04-05 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2013131487A1 (zh) | 融合的核心网及其接入方法 | |
US9167430B2 (en) | Access method and system, and mobile intelligent access point | |
US8315227B2 (en) | GTP for integration of multiple access | |
EP3154306B1 (en) | Establishment of network connection | |
US9113436B2 (en) | Method and system for information transmission | |
WO2010121511A1 (zh) | 多网接入控制方法、通讯系统以及相关设备 | |
US20140146806A1 (en) | Method, device, and system for user equipment to access evolved packet core network | |
WO2012130085A1 (zh) | 与网管系统建立连接的方法、设备及通信系统 | |
WO2010081329A1 (zh) | 业务流迁移过程中对网络资源进行控制的方法和系统 | |
WO2012006909A1 (zh) | 一种上报固网接入信息的方法及系统 | |
WO2009006848A1 (fr) | Procédé de commutation de réseau d'accès, dispositif de gestion d'ancrage, et dispositif d'accès mobile | |
WO2011015140A1 (zh) | 一种移动通信寻呼方法、系统及装置 | |
WO2008154874A1 (fr) | Procédé et système permettant d'établir un tunnel dans le réseau en évolution | |
WO2012152185A1 (zh) | 一种选择网关的方法及装置 | |
WO2014067420A1 (zh) | 分组数据网络类型的管理方法、装置及系统 | |
WO2012051897A1 (zh) | 一种融合固定网络与移动网络的系统及方法 | |
CN102457847A (zh) | 一种固定网络感知用户接入的方法和系统 | |
WO2014000520A1 (zh) | 一种策略控制的方法、装置和系统 | |
WO2012126291A1 (zh) | 一种数据路由方法及系统 | |
WO2012130133A1 (zh) | 一种接入点及终端接入方法 | |
WO2014040552A1 (zh) | 一种通知接入网位置信息的方法和系统 | |
WO2013174190A1 (zh) | 路由选择方法及功能网元 | |
US20140177530A1 (en) | Access method and system and mobile intelligent access point | |
WO2012142889A1 (zh) | 一种网关的选择方法、实现设备及系统 | |
WO2012142880A1 (zh) | 一种选择网关的方法及系统 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 13757807 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 13757807 Country of ref document: EP Kind code of ref document: A1 |