WO2015004922A1 - 通信システム、サービングゲートウェイ、その通信方法および基地局 - Google Patents
通信システム、サービングゲートウェイ、その通信方法および基地局 Download PDFInfo
- Publication number
- WO2015004922A1 WO2015004922A1 PCT/JP2014/003675 JP2014003675W WO2015004922A1 WO 2015004922 A1 WO2015004922 A1 WO 2015004922A1 JP 2014003675 W JP2014003675 W JP 2014003675W WO 2015004922 A1 WO2015004922 A1 WO 2015004922A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- packet
- logical path
- plane
- communication
- gateway
- Prior art date
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W76/00—Connection management
- H04W76/10—Connection setup
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/28—Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
- H04L12/46—Interconnection of networks
- H04L12/4633—Interconnection of networks using encapsulation techniques, e.g. tunneling
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W76/00—Connection management
- H04W76/10—Connection setup
- H04W76/12—Setup of transport tunnels
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W88/00—Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
- H04W88/16—Gateway arrangements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W92/00—Interfaces specially adapted for wireless communication networks
- H04W92/16—Interfaces between hierarchically similar devices
- H04W92/24—Interfaces between hierarchically similar devices between backbone network devices
Definitions
- the present invention relates to a communication system that performs data communication between communication apparatuses through a logical path, and more particularly to a serving gateway, a communication method, and a base station.
- a wireless terminal can connect to a wireless base station and access the Internet via a core network. At that time, the wireless terminal performs packet communication via a communication path (bearer) established between the connected wireless base station and the gateway device provided in the core network.
- a radio base station and a gateway apparatus construct a tunnel by encapsulating packets. A tunnel for transferring a data packet is identified by tunnel identification information set in the outer header of the packet.
- EPS Evolved Packet System
- E-UTRAN Evolved Universal Terrestrial Radio Access Network
- P-GW Packet Data Data Network Gateway
- Packet communication can be performed through the EPS bearer generated during In this EPS bearer, a logical path for terminating a data packet terminated between the radio base station (eNodeB) and the S-GW (ServingServGW) and between the S-GW and the P-GW is GTP-U (GRPS It is called a Tunneling Protocol User plane) tunnel, and is identified by a TEID (Tunnel Endpoint Identifier) in the outer header of the packet.
- eNodeB radio base station
- S-GW ServingGW
- GTP-U GTP-U
- TEID Tunneling Protocol User plane
- GPRS General Packet Radio Service
- the LTE Long Term Evolution
- the connection with the P-GW is automatically established. That is, when the radio terminal UE accesses the mobile network, a bearer is established with the P-GW and is maintained. For this reason, while the U-plane processing for traffic transfer increases as the user traffic increases, the ratio of C-plane processing for bearer management becomes relatively small. .
- the increase in mobile traffic is handled by adding a GW (gateway device). Therefore, in the case of a GW (gateway device) in which C plane processing and U plane processing are integrated, if a GW is added to cope with an increase in U plane processing load, the C plane processing capacity becomes excessive, and the processing efficiency of the GW This causes a problem of deterioration as a whole.
- an object of the present invention is to provide a communication system, a serving gateway, a communication method therefor, and a base station that can flexibly increase or decrease the U-plane processing function of a communication device.
- a communication system is a communication system that performs communication by setting a logical path in a network, and includes a second gateway arranged for each of a plurality of first gateways, a base station, and the second gateway.
- the transport network is controlled so that the packet is forwarded to the second gateway corresponding to a logical path.
- a serving gateway is a serving gateway of a communication system having a plurality of PDN (Packet Data Network) gateways, A first means capable of executing a termination process of a first logical path between the PDN gateway associated with the serving gateway and a second process capable of executing a termination process of a second logical path between the base station and the first means; In accordance with an operation rule notified from the control device in response to a request from the control means of the second means and the first and second logical paths, information related to the termination processing is sent to the first means and the second logic path.
- a third means exchangeable with at least one of the means.
- a communication method is a communication method by a serving gateway of a communication system having a plurality of PDN (Packet Data Network) gateways, and includes a first logical path to a PDN gateway associated with the serving gateway. Termination processing is executed by the first logical path termination module, and termination processing of the second logical path between the base station and the base station is executed by the second logical path termination module, and the first and second logical paths are controlled. According to an operation rule notified from the control device in response to a request from the plane, information related to the termination processing is exchanged with at least one of the first and second logical path termination modules.
- PDN Packet Data Network
- a base station is a base station of a communication system having a plurality of PDN (Packet Data Network) gateways, and includes a base station unit and a serving gateway unit, and the serving gateway unit communicates with a predetermined communication network. And a means for converting a destination address of a packet belonging to a logical path related to the PDN gateway address corresponding to the predetermined communication network.
- PDN Packet Data Network
- FIG. 1 is a schematic configuration diagram of a communication system according to a first embodiment of the present invention.
- FIG. 2 is a block diagram showing a functional configuration of the communication apparatus according to the first embodiment of the present invention.
- FIG. 3 is a block diagram showing a schematic configuration of the control device according to the first embodiment of the present invention.
- FIG. 4 is a sequence diagram showing the operation of the communication system according to the first embodiment of the present invention.
- FIG. 5 is a schematic configuration diagram of a communication system according to the second embodiment of the present invention.
- FIG. 6 is a block diagram showing a functional configuration of a communication apparatus according to the second embodiment of the present invention.
- FIG. 7 is a block diagram showing a schematic configuration of a control device according to the second embodiment of the present invention.
- FIG. 1 is a schematic configuration diagram of a communication system according to a first embodiment of the present invention.
- FIG. 2 is a block diagram showing a functional configuration of the communication apparatus according to the first embodiment of the present invention.
- FIG. 8 is a sequence diagram showing the operation of the communication system according to the second exemplary embodiment of the present invention.
- FIG. 9 is a block diagram showing a functional configuration of a first example of a communication apparatus according to the second embodiment of the present invention.
- FIG. 10 is a block diagram showing a functional configuration of a second example of the communication apparatus according to the second embodiment of the present invention.
- FIG. 11 is a block diagram showing a configuration for realizing the communication apparatus according to the second embodiment of the present invention by software.
- FIG. 12 is a system configuration diagram showing the functional configuration of the communication system according to the first embodiment of the present invention.
- FIG. 13 is a schematic network diagram for explaining the open flow technique employed in the first embodiment.
- FIG. 14 is a format diagram schematically showing the configuration of entries stored in the flow table in FIG.
- FIG. 15 is a system configuration showing a functional configuration of an example of a communication system according to the first embodiment.
- FIG. 16 is a sequence diagram showing an example of a default bearer construction procedure by the P-GW in the communication system shown in FIG.
- FIG. 17 is a sequence diagram showing an example of a default bearer release procedure by the P-GW in the communication system shown in FIG.
- FIG. 18 is a sequence diagram showing an example of a dedicated bearer construction procedure by the P-GW in the communication system shown in FIG.
- FIG. 19 is a sequence diagram showing an example of a dedicated bearer release procedure by the P-GW in the communication system shown in FIG.
- FIG. 20 is a system configuration diagram showing a functional configuration of a communication system according to the second embodiment of the present invention.
- FIG. 20 is a system configuration diagram showing a functional configuration of a communication system according to the second embodiment of the present invention.
- FIG. 21 is a system configuration showing a functional configuration of an example of a communication system according to the second embodiment.
- FIG. 22 is a sequence diagram showing an example of a default bearer construction procedure by the S-GW in the communication system shown in FIG.
- FIG. 23 is a sequence diagram showing an example of a default bearer release procedure by the S-GW in the communication system shown in FIG.
- FIG. 24 is a sequence diagram showing an example of a dedicated bearer construction procedure by the S-GW in the communication system shown in FIG.
- FIG. 25 is a sequence diagram showing an example of a dedicated bearer release procedure by the S-GW in the communication system shown in FIG.
- FIG. 26 is a sequence diagram showing an example of an S1 connection release procedure by the S-GW in the communication system shown in FIG. FIG.
- FIG. 27 is a sequence diagram showing an example of a UE trigger service request procedure by the S-GW in the communication system shown in FIG.
- FIG. 28 is a sequence diagram showing an example of an NW trigger service request procedure by the S-GW in the communication system shown in FIG.
- FIG. 29 is a schematic configuration diagram of a communication system according to the third embodiment of the present invention.
- FIG. 30 is a schematic configuration diagram showing an example of a communication system according to the fourth embodiment of the present invention.
- FIG. 31 is a block diagram showing an example of a transport network of the communication system shown in FIG.
- FIG. 32 is a block diagram showing a configuration example of the U-plane S-GW in the communication system shown in FIG.
- FIG. 33 is a sequence diagram showing an example of a default bearer construction procedure by the S-GW in the communication system shown in FIG.
- FIG. 34 is a schematic configuration diagram showing another example of the communication system according to the fourth embodiment of the present invention.
- the system according to the embodiment of the present invention has a configuration in which a communication device having a C plane processing function and a communication device having a U plane processing function are separated.
- the control device dynamically controls the U plane processing function in response to a request from a communication device having a C plane processing function. Therefore, the present invention can flexibly increase or decrease the U-plane processing function.
- FIG. 1 shows an example of a system configuration of the first embodiment.
- the communication system according to the first embodiment of the present invention includes a U-plane communication device 10 that executes data traffic processing, a control device 20, a C-plane communication device 30, and a communication device 40 that communicates with the communication device 10. ,including. Assume that a logical path 50 is generated between the U-plane communication device 10 and the communication device 40.
- the communication system can have a plurality of U-plane communication devices 10.
- the communication system for example, pools a plurality of communication devices 10 having a U-plane processing function.
- the control device 20 may select the communication device 10 to operate as the U plane from the pool of communication devices 10 (communication device resources including a plurality of communication devices 10) in response to a request from the C plane communication device 30. Good.
- the control device 20 may select the communication device 10 that operates as a U-plane, for example, according to the communication status of the communication system. As an example, when the load of the communication system becomes higher than a predetermined threshold, the control device 20 selects a new communication device 10 instead of the communication device 10 already operating as the U-plane function, Operate as a plane. For example, when the load of the communication system becomes lower than a predetermined threshold, the control device 20 selects the communication device 10 that is already operating as the U-plane function.
- the control device 20 can also select the communication device 10 that operates as a U plane according to the type of the logical path 50, for example.
- the control device 20 refers to the port number included in the header of the packet, identifies the service related to the packet, and identifies the type of the logical path 50 according to the type of the service.
- the control device 20 selects a different communication device 10 for each type of the logical path 50.
- the control device 20 may select the communication device 10 that operates as a U-plane, for example, according to the type of the data network accessed by the terminal (Internet, IMS (IP Multimedia Subsystem), etc.). For example, the control device 20 selects a different communication device 10 for each data network. In addition, the control apparatus 20 may select the communication apparatus 10 operated as a U plane according to a PDN (Packet Data Network) gateway, for example.
- PDN Packet Data Network
- the control device 20 can also select the communication device 10 that operates as a U-plane, for example, according to the position of the base station to which the terminal attaches.
- the communication system may pool communication devices 10 having a U-plane processing function.
- the communication system may pool a plurality of general-purpose communication devices 10 and construct a U-plane processing function in each communication device 10 by software such as VM (Virtual Machine).
- VM Virtual Machine
- an operator of the communication system constructs software having a U-plane processing function in the communication device 10.
- the control device 20 may construct software having a U-plane processing function in the communication device 10 in accordance with an instruction from the operator.
- the control device 20 controls the U plane processing function of the communication device 10 in response to a request from the C plane communication device 30.
- the C plane communication device 30 has a bearer management function such as setting / changing / release of the logical path 50 (for example, bearer) of the U plane communication device 10, and the U plane logical path 50 with respect to the control device 20. Request setting of.
- FIG. 2 shows a configuration example of the U-plane communication device 10.
- the control interface 111 receives an instruction (operation rule) from the control device 20 according to a predetermined control protocol.
- a control protocol for example, OpenFlow, I2RS (Interface to RoutingFSystem), ForCES (Forwarding and Control Element Separation) or the like can be used.
- I2RS Interface to RoutingFSystem
- ForCES Forwarding and Control Element Separation
- the above-described protocol is an example, and other control protocols can be used.
- the control unit 110 operates as a U-plane processing function in accordance with an instruction from the control device 20.
- the control unit 110 has a function of encapsulating / decapsulating packets transmitted / received to / from the communication device 40, for example. That is, the control unit 110 has a function of terminating the logical path 50 established with the communication device 40.
- the control unit 110 receives an instruction including identification information for identifying the logical path 50 from the control device 20 via the control interface 111.
- Control unit 110 encapsulates the packet based on the received identification information in accordance with the instruction. Further, the control unit 110 decapsulates the packet corresponding to the identification information in accordance with the instruction. In FIG. 2, the case where the control unit 110 terminates the logical path 50 has been described.
- the decapsulation process and the encapsulation process are combined.
- the information included in the outer header may be converted. Examples of information to be converted include information for identifying a logical path such as a transmission source and destination IP address and Tunneling Endpoint Identifier (TEID) included in the outer header, but are not limited thereto.
- TEID Tunneling Endpoint Identifier
- the control unit 110 performs transmission / reception processing of an echo message for confirming the survival of the communication device 40, sequence number management of a packet (ie, logical path 50), and the like.
- FIG. 3 shows a configuration example of the control device 20.
- the control device 20 includes communication units 201 and 202 and a control unit 206.
- the communication unit 202 receives a setting request for the logical path 50 of the U plane from the C plane communication device 30.
- the control unit 206 selects the communication device 10 that executes the U-plane processing function in response to the setting request received from the C-plane communication device 30.
- the control unit 206 transmits, via the communication unit 201, an instruction including identification information of the logical path 50 to be constructed in response to a request from the C plane communication device 30 to the selected communication device 10.
- the control unit 206 instructs the selected communication device 10 to encapsulate the packet based on the received identification information and decapsulate the packet corresponding to the identification information.
- a conversion process of information included in the outer header may be instructed.
- FIG. 4 shows an operation example of the first embodiment.
- the C-plane communication device 30 receives a session generation request from another device (operation S1). When the session generation request is received, the C plane communication device 30 transmits a U plane logical path 50 setting request to the control device 20 (operation S2).
- the control device 20 Upon receiving the logical path 50 setting request, the control device 20 selects the U-plane communication device 10 and the identification information (for example, TEID (Tunnel ⁇ Endpoint ID)) of the logical path 50 set by the selected communication device 10. Allocation is executed (operation S3). The control device 20 returns a U-plane resource (session) allocation response message to the C-plane communication device 30 (operation S4). The C-plane communication device 30 that has received the U-plane resource (session) assignment response message transmits a U-plane resource (session) setting request message to the control device 20 (operation S5).
- the identification information for example, TEID (Tunnel ⁇ Endpoint ID)
- the control device 20 When receiving the U-plane resource (session) setting request message, the control device 20 instructs the encapsulation / decapsulation of the packet based on the identification information (operation S6).
- the control device 20 returns a U-plane resource (session) setting response message to the C-plane communication device 30 (operation S7).
- the C-plane communication device 30 that has received the U-plane resource (session) setting response message transmits a session generation response message to another device that has transmitted the session generation request (operation S8).
- the first embodiment of the present invention has a configuration in which a communication device having a C-plane processing function and a communication device having a U-plane processing function are separated.
- the control device dynamically controls the U plane processing function in response to a request from a communication device having a C plane processing function. Therefore, according to the present embodiment, the U plane processing function can be flexibly increased or decreased.
- control device 20 controls the communication device 10 using a control protocol such as OpenFlow, I2RS, and ForCES, and causes the communication device 10 to execute the U-plane processing function.
- a control protocol such as OpenFlow, I2RS, and ForCES
- the U plane processing function is separated into a function executed by the control of the control device 20 and a function executed by the communication device 10 itself.
- the control device 20 can cause the communication device 10 to execute the U-plane processing function more easily.
- the communication device 10 includes a function capable of executing a termination process for a logical path (for example, a bearer) and a packet transfer function for transmitting and receiving a packet through a logical port.
- the control device 20 controls the packet transfer function of the communication device 10 so that the packet is transmitted and received through an appropriate logical path.
- management such as setting and deletion of logical paths is executed by the logical path management function, so that the control apparatus 20 can easily increase or decrease the U plane processing function.
- the communication system includes a U-plane communication device 10, a control device 20, and a C-plane communication device that execute data traffic processing. 30 and a communication device 40 that communicates with the communication device 10, and a logical path 50 is generated between the U-plane communication device 10 and the communication device 40.
- the U-plane communication device 10 includes a logical path module 11 that manages the generation and deletion of the logical path 50 and a packet transfer unit 12 that transfers packets. It is possible to construct a single logical path module 11 into one logical port P L.
- the logical path module 11 can execute termination processing of the logical path 50.
- the number of logical ports P L of the packet transfer unit 12, for example, is determined in accordance with the increase or decrease of traffic. Further, for example, the number of logical ports P L is determined in accordance with the processing capability of the U-plane communication device 10.
- the packet transfer unit 12 has a function of executing processing on a data packet in accordance with control information from the control device 20.
- the packet transfer unit 12 exchanges information (for example, bearer identification information) regarding the logical path termination processing executed by the logical path module 11 with the logical path module 11 in accordance with the operation rule notified from the control device 20. Is possible.
- the logical path module 11 generates a logical path 50 between the opposing communication device 40, changes or releases the logical path 50, and exchanges an echo message Echo to detect the state of the opposing communication device 40.
- the control device 20 manages port information and packet transfer rules of the U-plane communication device 10, and in accordance with the data traffic transfer instruction received from the C-plane communication device 30, the packet transfer unit 12 of the U-plane communication device 10.
- the packet transfer control information is transmitted.
- the C-plane communication device 30 has a bearer management function such as bearer setting / change / release of the U-plane communication device 10 and instructs the control device 20 to transfer traffic in the packet transfer unit 12.
- the management functions of creation / deletion of logical paths module 11 may be a function of the linkage or the like of the logical port P L logical path module 11 and the packet transfer unit 12 is realized by a separate control device.
- the logical path module 11 includes a logical path management unit 101 that manages the communication device 40 at the other end of the logical path 50, a logical path encapsulation function unit 102, and a decapsulation function unit 103. Have.
- the logical path management unit 101 performs transmission / reception processing of an echo message for confirming the existence of the communication device 40, packet sequence number management, and the like.
- the encapsulation function unit 102 performs encapsulation based on the data packet input from the packet transfer unit 12 and metadata including identification information for identifying the logical path 50, and transmits the packet as a packet belonging to the logical path 50. Note that, at the time of encapsulation, QoS (Quality of Service) information may be marked on the header of the packet.
- QoS Quality of Service
- the decapsulation function unit 103 decapsulates the received packet, outputs the decapsulated data packet to the packet transfer unit 12, and displays the identification information of the logical path 50 included in the outer header. It outputs to the packet transfer part 12 as metadata.
- the packet transfer unit 12 executes packet transfer according to the packet transfer rule from the control device 20.
- the packet transfer unit 12 can exchange information regarding the logical path termination processing with the logical path module 11 together with the packet transfer according to the packet transfer rule.
- the packet transfer unit 12 is similarly manages the physical ports to logical path module 11 as a logical port P L. That is, when receiving a packet from the logical port P L, with decapsulated data packet, receives the identification information of the logical path 50 to which the packet belongs as metadata. As described later, if possible communicate with a plurality of opposite communication devices in one logical path module receives together also IP address of the opposite communication device through a logic port P L.
- the packet transfer unit 12 transfers the logical path identification information along with the data packets to the logical path module 11 together as metadata. If possible communicate with a plurality of opposite communication devices in one logical path modules, passed along with the IP address of the opposite communication device through a logic port P L.
- control device 20 is interposed between the C-plane communication device 30 and the U-plane communication device 10, and sends an instruction for data traffic transfer from the C-plane communication device 30 to the U-plane communication. It transmits as a packet transfer rule with respect to the packet transfer part 12 of the apparatus 10.
- the control device 20 includes a communication unit 201 for communicating with the U-plane communication device 10 and a communication unit 202 for communicating with the C-plane communication device 30, and further includes a route / action calculation unit 203, a packet A transfer management unit 204, a packet transfer rule management unit 205, and a control unit 206 are included.
- the route / action calculation unit 203 generates a packet transfer rule based on the information from the C plane communication device 30 and transmits the packet transfer rule to the U plane communication device 10 through the communication unit 201. Packet transfer rules for controlling the packet transfer unit 12 of the U-plane communication device 10 will be described later.
- the packet transfer management unit 204 manages the capabilities and port information of the packet transfer unit 12 of the U-plane communication device 10.
- the information of the logical port P L marked with cord in the logical path 50 which includes the IP address assigned to the logical path module 11.
- the IP address of the corresponding communication device 40 is also included.
- the packet transfer rule management unit 205 manages packet transfer rules set in the packet transfer unit 12 of the U-plane communication device 10 and also manages information that can identify subscribers and bearer identification information.
- control device 20 may be provided with a function of managing the U-plane communication device. For example, selection of a U-plane communication device, management of allocation / release of logical path identification information in units of opposing communication devices of a logical path module in the U-plane communication device, management of bearer identification information, etc., or communication device 10 In the case of the P-GW, management of assignment / release of the IP address of the UE can be performed together.
- the function of managing the U-plane communication device may be provided in another device such as the C-plane communication device 30.
- the logical path module 11 transmits an echo request message to the opposite communication device 40 and confirms the existence of the opposite communication device 40 depending on whether or not an echo response message is received.
- an echo response message is transmitted in response thereto.
- the packet transfer unit 12 When the packet transfer unit 12 receives a certain data packet, the packet transfer unit 12 compares the header information with the packet transfer rule, and determines that the packet flow is to be transferred to the communication device 40, the logical path 50 is set for the packet. transferred to the logical path module 11 through logical port P L that are. At this time, metadata including identification information for identifying the logical path 50 is passed to the logical path module 11 together with the data packet. If there are a plurality of opposite communication devices, the IP address of the opposite communication device to be transmitted to the metadata is also included.
- the logical path module 11 performs encapsulation of the data packet based on the sequence number and metadata of the data packet input from the packet transfer unit 12, and transmits the packet as a packet belonging to the logical path 50. Similarly, every time a data packet of the same flow is received, it is encapsulated and transmitted. In addition, when a sequence number is used in a logical path, a sequence number is also assigned.
- the logical path module 11 When the logical path module 11 identifies the logical path 50 from the input header information of the data packet, the logical path module 11 decapsulates the data packet, outputs the decapsulated data packet to the packet transfer unit 12, and also identifies the logical path 50 identification information. Is output to the packet transfer unit 12. If there are a plurality of opposing communication devices associated with the logical path module 11, the IP address of the opposing communication device that received the data packet is also included in the metadata. The packet transfer unit 12 identifies and transfers a port to which the data packet is to be transferred by comparing the logical path identification information of metadata (and the IP address of the opposite communication device) with the packet transfer rule.
- the control device 20 changes the packet transfer rule according to the traffic transfer instruction from the C-plane communication device 30 to the packet of the U-plane communication device 10.
- Registration to the transfer unit 12 causes the packet transfer unit 12 to transfer the packet through a logical path corresponding to the opposite communication device.
- the logical path module 11 performs functions such as echo processing for confirming the state of the opposite communication device, sequence number management, etc., thereby facilitating management of logical paths that are frequently cut and pasted.
- the processing load on the control system of the C plane communication device 30 and the control device 20 can also be reduced.
- the packet transfer unit 12 sets or releases the logical port P L in accordance with the increase or decrease in traffic, to build a logical path module 11 to each logical port P L.
- Each logical path module 11 sets one logical path 50.
- the logical path module 11 and the packet transfer unit 12 can pass metadata including identification information for identifying the logical path 50. That's fine.
- the packet transfer unit 12 is to build a logical path module 11 sets or releases the logical port P L to each logical port P L in accordance with the increase or decrease in traffic, the logical path module 11
- the difference is that a plurality of logical paths 50 are set.
- the logical path module 11 and the packet transfer unit 12 are meta-data including the identification information of the logical path 50 and the IP address of each opposing communication device. Just pass the data.
- functions corresponding to the logical path module 11 and the packet transfer unit 12 are executed by software (the data processing unit 13 in FIG. 11).
- the software includes a logical path module function 11a and a packet transfer function 12a.
- the logical path module function 11a corresponds to the logical path module 11, and the packet transfer function 12a corresponds to the packet transfer unit 12.
- the software can add a necessary logical path module function 11a according to user traffic, for example. Even when one logical path module function 11a communicates with a plurality of opposing communication devices, the functional configuration shown in FIG. 10 can be implemented by a program executed on the data processing unit 13.
- the U-plane and C-plane communication apparatuses of the first embodiment or the second embodiment are U This is applied to the P-GW for the plane and C plane.
- the GTP-U tunnel 350 is exemplified as the logical path 50 described above, and further, as the U plane communication device 10, the control device 20, the C plane communication device 30, and the counter communication device 40, respectively.
- the P-GW 300, the controller 320, the C-plane P-GW 330, and the S-GW 340 are illustrated.
- the radio base station eNB 360 is connected to the U plane P-GW 300 through the S-GW 340 selected by the mobility management entity (MME) 370 through the GTP-U tunnel.
- MME mobility management entity
- the U-plane P-GW 300 is provided with a GTP-U tunnel module 311 and a switch 312 respectively corresponding to the logical path module 11 and the packet transfer unit 12 described above.
- the controller 320 has a packet flow identification function. As described above, by registering the packet transfer rule in the switch 312, the metadata is added to the packet that matches the packet transfer rule, and the GTP-U tunnel module 311 is installed. The switch 312 is controlled to execute the transferred transfer.
- the GTP-U tunnel module 311 in the U-plane P-GW 300 forms the GTP-U tunnel 350 with the S-GW 340 which is the opposite communication device, and, as described above, encapsulates / decapsulates and uses echo messages. Performs life / death monitoring, sequence number management, etc. for the opposite communication device.
- the switch 312 executes the action according to the packet transfer rule from the controller 320, thereby giving the above-described metadata and executing packet transfer.
- a centralized control type network architecture system in which the controller 320 centrally controls the switch 312 is realized by, for example, OpenFlow, I2RS (Interface-to-the-Routing-System), ForCES (Forwarding-and-Control-Element-Separation), etc. Is possible.
- OpenFlow I2RS (Interface-to-the-Routing-System)
- ForCES Forwarding-and-Control-Element-Separation
- Open flow recognizes communication as an end-to-end flow, and executes path control, failure recovery, load balancing, etc. in units of flow.
- the flow is a series of communication packet groups having predetermined attributes, for example.
- OpenFlow will be briefly described by taking the network shown in FIG. 13 as an example.
- an OpenFlow switch 391 is a network switch that employs an OpenFlow technology
- an OpenFlow controller 390 is an information processing apparatus that controls the OpenFlow switch 391.
- Each OpenFlow switch 391 has a secure channel (Secure Channel) 393 set between the OpenFlow controller 390 and communicates with the OpenFlow controller 390 through the secure channel 393.
- the OpenFlow controller 390 sets a flow table (Flow Table) 392 of the OpenFlow switch 391 via the secure channel 393.
- the secure channel 393 is a communication path between each switch 391 and the controller 390, and measures are taken to prevent wiretapping or tampering of communication.
- FIG. 14 shows a configuration example of each entry (flow entry) in the flow table 392.
- the flow entry includes match fields (Match Fields) that define a matching rule for matching with information (for example, destination IP address, VLAN ID, etc.) included in the header of the packet received by the switch, and statistical information for each packet flow.
- Match Fields Field (Counters), and an action field (Action) that defines how to process a packet that matches the matching rule.
- the OpenFlow switch 391 When the OpenFlow switch 391 receives the packet, the OpenFlow switch 391 refers to the flow table 392. The open flow switch 391 searches for a flow entry that matches the header information of the received packet. When an entry that matches the header information of the received packet is found, the OpenFlow switch 391 processes the received packet according to the processing method defined in the action field of the found entry.
- the processing method is, for example, “transfer the received packet from a predetermined logical port”, “discard the received packet”, “rewrite a part of the header of the received packet to metadata, and transfer to a predetermined logical port Is the process.
- the OpenFlow switch 391 transfers the received packet to the OpenFlow controller 390 through the secure channel 392, for example, and the controller 390 has a method for processing the received packet. It is also possible to request the setting of a specified flow entry.
- Open flow controller 390 determines the processing method of the received packet, and registers a flow entry including the determined processing method in flow table 392. Thereafter, the open flow switch 391 processes a subsequent packet belonging to the same flow as the received packet based on the registered flow entry.
- the switch 312 and the controller 320 in the communication system according to the first embodiment of the present invention include functions corresponding to the above-described OpenFlow switch 391 and OpenFlow controller 390. That is, the function of the OpenFlow switch 391 is implemented in the switch 312 in FIG. 12, and the function of the OpenFlow controller 390 is implemented in the controller 320 in FIG.
- the flow table 392 in the open flow switch 391 corresponds to a storage unit (not shown) provided in the switch 312 in FIG.
- the configuration and operation of a mobile system will be described as an application example of this embodiment in which OpenFlow is implemented.
- the mobile system 400 includes a core system 401 and an access system 402.
- the core system 401 includes a U-plane P-GW 300, a controller (OFC), as shown in FIG. ) 320, C-plane P-GW 330, S-GW 340 and MME 370.
- processing such as creation, modification, or release of a GTP-U tunnel in the U-plane P-GW 300 is normally executed by an OpenFlow Configuration Function (OFCP), but in this embodiment, by the OFC 320 It is possible to execute.
- OFCP OpenFlow Configuration Function
- the access system 402 includes radio base stations eNBs 360a and 360b. Here, it is assumed that communication terminals 403a and 403b are connected to the respective radio base stations.
- Access system 402 is a radio access network that provides communication terminal 403 with connectivity to mobile system 400 using, for example, an LTE radio access scheme.
- the communication terminal 403 is a mobile station such as a user terminal UE, a mobile phone, or a mobile communication terminal.
- the communication terminal 403 can be connected to the Internet 404 which is an external network through the mobile system 400.
- the OFC 320 Upon receiving the U-plane resource (session) allocation request message, the OFC 320 selects a U-plane P-GW, allocates GTP-U tunnel identification information (TEID) to the selected P-GW, and communicates if necessary.
- the terminal performs IP address assignment (operation S303), and returns a U-plane resource (session) assignment response message to the C-plane P-GW 330 (operation S304).
- the C-plane P-GW 330 that has received the U-plane resource (session) assignment response message transmits a U-plane resource (session) setting request message to the OFC 320 (operation S305).
- the OFC 320 When the OFC 320 receives the U-plane resource (session) setting request message, the OFC 320 generates a flow rewrite (FlowMod) message described below, transmits it to the U-plane P-GW 300 (operation S306), and further sets the U-plane resource (session). A response message is returned to the C plane P-GW 330 (operation S307).
- the C-plane P-GW 330 that has received the U-plane resource (session) setting response message transmits a session generation response message to the S-GW 340 (operation S308), and the attach procedure is continuously executed.
- the U-plane P-GW 300 registers the flow rewrite information of the received FlowMod message in the switch 312 as a packet transfer rule, and the specified process is executed for the packet of the target flow.
- the FlowMod message has the format shown in FIG. 14 and has the following configuration here.
- Matching field The input port of the packet is a logical port P L linked to the corresponding GTP-U tunnel module 11; ⁇ The S-GW TEID and P-GW TEID (with S-GW Address) must be completely matched as metadata; ⁇ The rest must be wild cards.
- Matching field -The UE IP address must exactly match the destination IP address; ⁇ The rest must be wild cards.
- the OFC 320 Upon receiving the U plane resource (session) setting release request message, the OFC 320 generates a FlowMod message and transmits it to the U plane P-GW 300 (operation S404), and further sends a U plane resource (session) setting release response message to the C plane. Return to the P-GW 330 (operation S405).
- the C-plane P-GW 330 that has received the U-plane resource (session) setting release response message transmits a U-plane resource (session) deallocation request message to the OFC 320 (operation S406).
- the OFC 320 When the OFC 320 receives the U plane resource (session) deallocation request message, it releases the TE ID of the U plane P-GW and, if necessary, the IP address of the communication terminal (operation S407). Subsequently, the OFC 320 transmits a U-plane resource (session) deallocation response message to the C-plane P-GW 330 (Operation S408), and the C-plane P-GW 330 transmits a session deletion response message to the S-GW 340 (Operation S409). ), The detaching procedure is continued.
- the U-plane P-GW 300 releases the packet transfer rule according to the flow rewrite information of the received FlowMod message.
- the FlowMod instructs deletion using the same matching rule as the bearer construction.
- the OFC 320 Upon receiving the U-plane resource (bearer) allocation request message, the OFC 320 allocates the U-plane P-GW TEID (operation S503), and returns a U-plane resource (bearer) allocation response message to the C-plane P-GW 330 (operation). S504).
- the C-plane P-GW 330 that has received the U-plane resource (bearer) allocation request message transmits a bearer generation response message to the S-GW 340 (operation S505), and a dedicated bearer activation procedure is executed by the eNB 360, the MME 370, and the S-GW 340. (Operation S506).
- the S-GW 340 transmits a bearer generation response message to the C plane P-GW 330 (operation S507), and in response to this, the C plane P-GW 330 transmits a U plane resource (bearer) setting request message to the OFC 320. (Operation S508).
- the OFC 320 When the OFC 320 receives the U-plane resource (bearer) setting request message, the OFC 320 generates a flow rewrite (FlowMod) message described below, transmits it to the U-plane P-GW 300 (operation S509), and further sets the U-plane resource (bearer). A response message is returned to the C-plane P-GW 330 (operation S510).
- FlowMod flow rewrite
- the U-plane P-GW 300 registers the flow rewrite information of the FlowMod message in the switch 312 as a packet transfer rule, and the switch 312 executes a process specified for the packet of the target flow according to this rule.
- the FlowMod message has the format shown in FIG. 14 and has the following configuration here.
- Matching field - that the input port of the packet is a logical port P L marked with cord of the corresponding GTP tunnel module 11; ⁇ The S-GW TEID and P-GW TEID (with S-GW Address) must be completely matched as metadata; ⁇ The rest must be wild cards. Action: ⁇ Transfer to the Internet port. For downstream packets,
- Matching field -Completely match in the field specified by TFT (Traffic Flow Template); ⁇ The rest must be wild cards.
- the OFC 320 Upon receiving the U plane resource (bearer) setting release request message, the OFC 320 generates a FlowMod message and transmits it to the U plane P-GW 300 (operation S606), and further sends a U plane resource (bearer) setting release response message to the C plane. Return to the P-GW 330 (operation S607).
- the C-plane P-GW 330 that has received the U-plane resource (bearer) setting release response message transmits a U-plane resource (bearer) deallocation request message to the OFC 320 (operation S608).
- the OFC 320 When the OFC 320 receives the U plane resource (bearer) deallocation request message, the OFC 320 releases the TE ID of the U plane P-GW (operation S609). Subsequently, the OFC 320 transmits a U plane resource (bearer) deallocation response message to the C plane P-GW 330 (Operation S610).
- the U-plane P-GW 300 releases the packet transfer rule according to the flow rewrite information of the received FlowMod message.
- the FlowMod instructs deletion using the same matching rule as the bearer construction.
- Second Example 4.1 System Configuration As shown in FIG. 20, in the communication system according to the second example of the present invention, the C plane communication device 30 and the U plane communication according to the first embodiment or the second embodiment.
- the apparatus 10 is applied to the S-GW for the U plane and the C plane.
- the GTP-U tunnel 550 is exemplified as the logical path 50 described above, and further, as the U plane communication device 10, the control device 20, the C plane communication device 30, and the counter communication device 40, respectively.
- An S-GW 500, a controller 520, a C-plane S-GW 530, and a radio base station eNB 560 are illustrated.
- the U-plane S-GW 500 is selected by the mobility management entity (MME) 570, and the eNB 560 and the U-plane S-GW 500 are connected by the GTP-U tunnel 550.
- MME mobility management entity
- the U-plane S-GW 500 is provided with a plurality of GTP-U tunnel modules 511 (GTP-U tunnel modules # 1, # 2) and switches 512 respectively corresponding to the eNB and the P-GW, and the logical path module described above 11 and the packet transfer unit 12 respectively.
- the controller 520 has a packet flow identification function. As described above, by registering the packet transfer rule in the switch 512, the metadata is added to the packet that matches the packet transfer rule and the GTP-U tunnel module 511 is set. The switch 512 is controlled to execute the passed transfer.
- the GTP-U tunnel module 511 (GTP-U tunnel module # 1) in the U-plane S-GW 500 forms a GTP-U tunnel 550 with the eNB 560 that is the opposite communication device, and encapsulates as described above. / Decapsulation, alive monitoring of opposite communication device by echo message, etc.
- the GTP-U tunnel module 511 (GTP-U tunnel module # 2) forms a GTP-U tunnel 550 with the P-GW 540 that is the opposite communication device, and as described above, encapsulation / decapsulation is performed. Then, the life and death monitoring of the opposite communication device by the echo message is performed.
- a sequence number included in the GTP-U header is added to the metadata used in the first embodiment.
- the GTP-U tunnel module 511 also includes a sequence number in the metadata. Then, the controller 520 instructs the switch 512 to pass the sequence number as metadata to the output destination GTP-U tunnel module 511.
- the switch 512 executes the above-described assignment of metadata and packet transfer by executing an action that matches the packet transfer rule from the controller 520.
- a centralized network architecture system in which the controller 520 centrally controls the switch 512 is realized by, for example, OpenFlow, I2RS (Interface-to-the-Routing System), ForCES (Forwarding-and-Control-Element-Separation), etc. Is possible.
- OpenFlow Interface-to-the-Routing System
- ForCES Forwarding-and-Control-Element-Separation
- the mobile system 600 includes a core system 601 and an access system 602.
- the core system 601 includes an S-GW 500 for U-plane, a controller (OFC) as shown in FIG. 520, C-plane S-GW 530, P-GW 540, and MME 570.
- processing such as creation, modification, or release of a GTP-U tunnel in the U-plane S-GW 500 is normally executed by an open flow configuration function (OFCP), but in this embodiment, the OFC 520 It is possible to execute.
- OFCP open flow configuration function
- the access system 502 includes radio base stations eNBs 560a and 560b. Here, it is assumed that communication terminals 603a and 603b are connected to the respective radio base stations.
- the access system 602 is a radio access network that provides the communication terminal 603 with connectivity to the mobile system 540 using, for example, an LTE radio access scheme.
- the communication terminal 603 is a mobile station such as a user terminal UE, a mobile phone, or a mobile communication terminal.
- the communication terminal 603 can be connected to the Internet 604 that is an external network through the mobile system 600.
- the OFC 520 executes selection of the U-plane S-GW and assignment of identification information (TEID) of the GTP-U tunnel to the S-GW (operation S703).
- a plane resource (session) allocation response message is returned to the C plane S-GW 530 (operation S704).
- the C-plane S-GW 530 that has received the U-plane resource (session) allocation response message transmits a session generation request message to the P-GW 540 (operation S705), and receives a session generation response message from the P-GW 540 (operation S706). Then, the session generation response message is transmitted to the MME 570 (operation S707).
- the MME 570 that has received the session generation response message continues to execute the above attach procedure, and transmits a bearer change request message to the C plane S-GW 530 (operation S708), and the C plane S-GW 530 receives the U plane resource ( (Bearer) A setting request message is transmitted to the OFC 520 (operation S709).
- the OFC 520 When the OFC 520 receives the U-plane resource (bearer) setting request message, the OFC 520 generates a flow rewrite (FlowMod) message described below, transmits it to the U-plane S-GW 500 (operation S710), and further sets the U-plane resource (bearer). A response message is transmitted to the C-plane S-GW 530 (operation S711). The C-plane S-GW 530 that has received the U-plane resource (bearer) setting response message transmits a bearer change response message to the MME 370 (operation S712).
- FlowMod flow rewrite
- the U-plane S-GW 500 registers the flow rewrite information of the received FlowMod message in the switch 512 as a packet transfer rule, and the processing specified for the packet of the target flow is executed.
- the FlowMod message has the format shown in FIG. 14 and has the following configuration here.
- the input port is a logical port P L linked to the GTP tunnel module 511 (GTP-U tunnel module # 1) on the eNB side; -The eNB TEID and S-GW TEID (with eNB Address) must be completely matched as metadata. ⁇ The rest must be wild cards. Action: -P-GW TEID, S-GW TEID, and bearer sequence number are assigned as metadata (with P-GW Address). ⁇ Transferring P-GW-side GTP tunnel module 511 (GTP-U tunnel module # 2) to the logical port P L marked with string to.
- Matching field The input port is a logical port P L linked to the P-GW side GTP tunnel module 511 (GTP-U tunnel module # 2); ⁇ P-GW TEID and S-GW TEID (with P-GW Address) should be completely matched as metadata; ⁇ The rest must be wild cards. Action: -(ENB Address) and eNB TEID, S-GW TEID, bearer sequence number are assigned as metadata. Transfer to the logical port P L linked to the GTP tunnel module 511 (GTP-U tunnel module # 1) on the eNB side.
- a detach procedure is executed by eNB 560 and MME 570 (operation S801), and MME 570 transmits a session deletion request message to C-plane S-GW 530 (operation S802).
- the C plane S-GW 530 transmits a U plane resource (session) setting release request message to the OFC 520 (operation S803).
- the OFC 520 When the OFC 520 receives the U plane resource (session) setting release request message, the OFC 520 generates a FlowMod message and transmits it to the U plane S-GW 500 (operation S804), and further sends a U plane resource (session) setting release response message to the C plane. Transmission to the S-GW 530 (operation S805). The C plane S-GW 530 that has received the U plane resource (session) setting release response message transmits a U plane resource (session) deallocation request message to the OFC 520 (operation S806).
- the OFC 520 When the OFC 520 receives the U plane resource (session) deallocation request message, the OFC 520 releases the U-plane S-GW TEID (operation S807) and transmits the U plane resource (session) deallocation response message to the C plane S-GW 530. (Operation S808). In response to this, the C-plane S-GW 530 transmits a session deletion request message to the P-GW 540 (operation S809), and when receiving the session deletion response message as a response (operation S810), transmits a session deletion response message to the MME 570. (Operation S811).
- the U-plane S-GW 500 cancels the packet transfer rule according to the flow rewrite information of the received FlowMod message.
- the FlowMod instructs deletion using the same matching rule as the bearer construction.
- the OFC 320 Upon receiving the U-plane resource (session) allocation request message, the OFC 320 allocates a U-plane S-GW TEID (operation S904), and returns a U-plane resource (session) allocation response message to the C-plane S-GW 530 (operation). S905).
- the C-plane S-GW 530 that has received the U-plane resource (session) assignment response message transmits a bearer generation request message to the MME 570 (operation S906), and the dedicated bearer activation procedure is executed by the eNB 560 and the MME 570 (operation S907). .
- the MME 570 transmits a bearer generation response message to the C-plane S-GW 530 (operation S908), and in response, the C-plane S-GW 530 transmits a U-plane resource (bearer) setting request message to the OFC 520 (operation). S909).
- the OFC 520 When the OFC 520 receives the U-plane resource (bearer) setting request message, the OFC 520 generates a flow rewrite (FlowMod) message described below, transmits it to the U-plane S-GW 500 (operation S910), and further sets the U-plane resource (bearer). A response message is transmitted to the C-plane S-GW 530 (operation S911). When receiving the U-plane resource (bearer) setting response message, the C-plane S-GW 530 transmits the U-plane resource (bearer) setting response message to the P-GW 540 (operation S912).
- FlowMod flow rewrite
- the U-plane S-GW 500 registers the flow rewrite information of the FlowMod message in the switch 512 as a packet transfer rule, and the switch 512 executes the processing specified for the packet of the target flow according to this rule.
- the FlowMod message has the format shown in FIG. 14, and the configuration thereof is the same as that in the case of the construction of the default bearer in the above-described S-GW, and thus description thereof is omitted.
- the MME 570 transmits a bearer deletion response message to the C plane S-GW 530 (operation S1005), and in response to this, the C plane S-GW 530 transmits a U plane resource (bearer) setting release request message to the OFC 520 ( Operation S1006).
- the OFC 520 When the OFC 520 receives the U-plane resource (bearer) setting release request message, the OFC 520 generates a flow rewrite (FlowMod) message described below, transmits it to the U-plane S-GW 500 (operation S1007), and further U-plane resource (bearer) A setting release response message is transmitted to the C-plane S-GW 530 (operation S1008).
- the C plane S-GW 530 transmits a U plane resource (bearer) deallocation request message to the OFC 520 (operation S1009).
- the OFC 520 When the OFC 520 receives the U plane resource (bearer) deallocation request message, the OFC 520 releases the U-plane S-GW TEID (operation S1010) and transmits the U plane resource (bearer) deallocation response message to the C plane S-GW 530. (Operation S1011). In response to this, the C-plane S-GW 530 transmits a bearer deletion response message to the P-GW 540 (operation S1012).
- the U-plane S-GW 500 registers the flow rewrite information of the FlowMod message in the switch 512 as a packet transfer rule, and the switch 512 executes the processing specified for the packet of the target flow according to this rule.
- the FlowMod message has the format shown in FIG. 14, and the configuration thereof is the same as that in the case of releasing the default bearer in the S-GW described above, and thus description thereof is omitted.
- the S1-U connection between the access system 602 and the U-plane S-GW 500 becomes an idle state depending on the situation of the communication terminal, or from the communication terminal. May return from the idle state due to the generation of transmission data or the arrival of data destined for the communication terminal.
- the S1 connection release / resurrection operation in the second embodiment of the present invention will be described below.
- the OFC 520 When the OFC 520 receives the U-plane resource (S1-U) setting release request message, the OFC 520 generates a FlowMod message and transmits it to the U-plane S-GW 500 (operation S1104), and further, a U-plane resource (S1-U) setting release response The message is transmitted to the C plane S-GW 530 (operation S1105).
- the C plane S-GW 530 that has received the U plane resource (S1-U) setting release response message transmits a U plane resource (S1-U) deallocation request message to the OFC 520 (operation S1106).
- the OFC 520 When the OFC 520 receives the U plane resource (S1-U) deallocation request message, the OFC 520 transmits a U plane resource (S1-U) deallocation response message to the C plane P-GW 530 (operation S1107), and the C plane P-GW 530. Transmits an access bearer release response message to the MME 570 (operation S1108), and the S1 connection release procedure continues.
- the U-plane S-GW 500 deletes the existing flow entry for the uplink according to the flow rewrite information of the received FlowMod message, and for the downlink, the matching field is the same as the existing flow entry, and the Action is Transfer to the port addressed to OFC 520.
- the OFC 520 When the OFC 520 receives the U plane resource (S1-U) allocation request message, the OFC 520 returns a U plane resource (S1-U) allocation response message to the C plane S-GW 530 (operation S1204).
- the C-plane S-GW 530 that has received the U-plane resource (S1-U) allocation response message transmits a U-plane resource (S1-U) setting request message to the OFC 520 (operation S1205).
- the OFC 520 When the OFC 520 receives the U-plane resource (S1-U) setting request message, the OFC 520 generates a flow rewrite (FlowMod) message described below, transmits the message to the U-plane S-GW 500 (operation S1206), and further transmits the U-plane resource (S1 -U) A setting response message is transmitted to the C-plane S-GW 530 (operation S1207). Receiving the U-plane resource (S1-U) setting response message, the C-plane S-GW 530 transmits a bearer change response message to the MME 370 (operation S1208).
- FlowMod flow rewrite
- the U-plane S-GW 500 registers the flow rewrite information of the received FlowMod message in the switch 512 as a packet transfer rule, and the processing specified for the packet of the target flow is executed.
- the FlowMod message has the format shown in FIG. 14 and has the same configuration as the above-described default bearer construction in the S-GW, but the flow entries are generated as many times as required or as many as requested.
- the input port is a logical port P L marked with cord of the corresponding GTP tunnel module 511, except containing (P-GW Address and) P-GW TEID, the S-GW TEID as metadata, usually This is the same as the Packet-In message.
- the OFC 520 suspends processing (operation S1304), transmits a downstream packet reception notification message to the C-plane S-GW 530 (operation S1305), and receives the received S-GW 530 for C-plane. Transmits a downlink data notification message to the MME 570 (operation S1306).
- the MME 570 returns a downlink data notification response message to the C-plane S-GW 530 (operation S1307) and transmits a paging message to the eNB 560 (operation S1308).
- the OSC 520 releases the suspension of the processing (operation S1310) and sends the Packet-Out message to the U-plane.
- the data is transmitted to the S-GW 500 (operation S1311).
- Packet-Out message (eNB Address and) eNB TEID, the S-GW TEID assigned as metadata, to transfer to the logical port P L marked with cord of the corresponding GTP tunnel module 511, sets the Action of flow entries Otherwise, it is the same as a normal Packet-Out message.
- the U-plane S-GW 500 transfers the data packet to the eNB 560 according to the packet transfer rule set by the Packet-Out message (operation S1312).
- the GTP tunnel is exemplified as the logical path.
- an LTE tunnel corresponding to PMIP (Proxy Mobile IP) / GRE (Generic Routing Encapsulation) or the like may be employed.
- a method corresponding to BBERF (Bearer Biding and Event Reporting Function) for transferring after releasing the association can be used instead of the packet transfer associated with the TEID as described above.
- the logical path module (GTP-U tunnel module) is used as the logical port of the packet transfer unit (switch) in the U plane communication device.
- this invention is not limited to this.
- a plurality of U-plane communication devices as shown in FIG. 5 are provided, connected using a controllable switch, and one or a plurality of U-plane communication devices are selected according to the network load or the like.
- a C-plane P-GW 1401 and a plurality of U-plane P-GWs 1402 are connected to switches SW1 to SW3, and a controller 1403 is used for the U-plane. It is assumed that not only the P-GW 1402 but also the switches SW1 to SW3 are controlled by the open flow technique.
- the S-GW 1404 and the Internet 1405 are connected to the switch SW1.
- the controller 1403 generates a GTP-U tunnel (logical path) between which U-plane P-GW and S-GW 1404 while considering each load of the U-plane P-GW 1402 or which GTP. -Can control whether to delete U tunnel.
- a controller is provided between the C-plane P-GW 1401 and the plurality of U-plane P-GWs 1402.
- the path of the logical path between the S-GW 1404 and the U-plane P-GW 1402 can be flexibly selected, thereby further simplifying the U-plane processing function. It can be increased or decreased.
- a virtual S-GW is constructed in the communication system by software such as a virtual machine.
- the virtual S-GW is constructed including a plurality of U-plane S-GWs (S-GW (U-plane)), and the U-plane S-GW to be routed is selected according to the bearer.
- the current communication system includes a plurality of P-GWs (P-GWs 720-1, 720- FIG. 30) corresponding to the communication networks (data networks 720-1, 720-2 of FIG. 30). 2) may be arranged.
- P-GWs 720-1, 720- FIG. 30 corresponding to the communication networks (data networks 720-1, 720-2 of FIG. 30). 2
- the S-GW becomes a communication bottleneck.
- a U-plane S-GW is arranged for each of a plurality of P-GWs corresponding to each communication network. Therefore, communication corresponding to each communication network can be distributed by a plurality of U-plane S-GWs, and a communication bottleneck can be eliminated.
- FIG. 30 shows a configuration example of a communication system according to the fourth embodiment.
- the mobile system 700 includes an access system 702 configured by a base station (eNB) 770 that performs radio communication with the communication terminal 703.
- eNB base station
- the mobile system 700 has a core system 701.
- the core system 701 includes P-GWs 720-1 and 720-2 corresponding to the plurality of data networks 704-1 and 704-2, respectively.
- a plurality of P-GWs may be arranged for each data network.
- a plurality of P-GWs 720-1 may be arranged for the data network 704-1.
- the core system 701 has a virtual S-GW 740 constructed by software such as a virtual machine.
- the virtual S-GW 740 includes a plurality of U planes S-GWs 740-1 and 740-2 corresponding to the C plane S-GW and the plurality of P-GWs 720-1 and 720-2, respectively.
- the virtual S-GW 740 is constructed by, for example, operating software such as a virtual machine on a server or general-purpose communication device.
- the C-plane S-GW 730 may be a device different from the device in which the virtual S-GW 740 is constructed.
- the C-plane S-GW 730 can be constructed by software such as a virtual machine in the apparatus in which the virtual S-GW 740 is constructed.
- the configuration of the U-plane S-GWs 740-1 and 740-2 may be the same as that of the U-plane S-GW 500 illustrated in FIG. 20, for example.
- the U-plane S-GWs 740-1 and 740-2 can execute the functions corresponding to the GTP-U tunnel module 511 and the switch 512 illustrated in FIG. 20 by a software application operating on the virtual machine. Is possible. Since the functions corresponding to the GTP-U tunnel module 511 and the switch 512 have been described in the second embodiment, description in the fourth embodiment is omitted.
- the configuration of the U-plane S-GWs 740-1 and 740-2 may convert the information included in the outer header instead of combining the decapsulation process and the encapsulation process. Examples of the information to be converted include information for identifying a logical path such as a transmission source and destination IP address, Tunneling Endpoint Identifier (TEID) included in the outer header, but are not limited thereto.
- TEID Tunneling Endpoint Identifier
- the control device 710 controls the U-plane S-GWs 740-1 and 740-2 and the transport network 760 using a control protocol such as OpenFlow, I2RS, and ForCES. Since the control device 710 of the fourth embodiment has the same function as the OFC 520 described in the second embodiment, detailed description thereof is omitted in the fourth embodiment. However, the function of the control device 710 is not limited to the function of the OFC 520.
- the control device 710 selects the U-plane S-GW 740 through which communication passes according to the data network 704 with which the communication terminal 703 communicates. Further, the control device 710 assigns bearer identification information via the selected U-plane S-GW 740.
- the transport network 760 includes a plurality of switches 7601.
- Each switch 7601 has the same function as, for example, the OpenFlow Switch 391 shown in FIG.
- the control device 710 controls the transport network 760 and sets a bearer (GTP-U tunnel) communication path for communicating with the data networks 704-1 and 704-2 between the eNB 770 and the virtual S-GW 740.
- a bearer GTP-U tunnel
- An IP address is assigned to the virtual S-GW 740, and the eNB 770 transmits communication traffic corresponding to each of the data networks 704-1 and 704-2 to the IP address of the virtual S-GW 740.
- the eNB 770 encapsulates communication traffic corresponding to each of the data networks 704-1 and 704-2 including bearer identification information (TEID).
- TEID bearer identification information
- the identification information (hereinafter referred to as TEID (A)) assigned to the bearer transferred from the eNB 770 to the U-plane S-GW 740-1 and the bearer transferred from the eNB 770 to the U-plane S-GW 740-2.
- the identification information to be assigned (hereinafter referred to as TEID (B)) is different from each other. Therefore, each bearer can be distinguished by identification information.
- the identification information assigned to the bearer transferred from the U-plane S-GW 740-1 to the eNB 770 is TEID (C), and the identification information assigned to the bearer transferred from the U-plane S-GW 740-2 to the eNB 770 Let TEID (D).
- the control device 710 determines the switch 7601 through which the bearer transmitted from the eNB 770 to the S-GW 740-1 for U-plane passes is the switch (A) and the switch (B).
- the control device 710 transfers to the switch (B) a packet whose destination address is the IP address of the virtual S-GW 740 and whose bearer identification information is TEID (A). Instruct.
- the control device 710 sends, to the switch (B), a packet whose destination address is the IP address of the virtual S-GW 740 and whose bearer identification information is TEID (A), for the U-plane S-GW 740. Instruct to transfer to -1.
- the control device 710 determines the switch 7601 through which the bearer transmitted from the eNB 770 to the U-plane S-GW 740-2 passes is the switch (A) and the switch (C).
- the control device 710 transfers, to the switch (A), a packet whose destination address is the IP address of the virtual S-GW 740 and whose bearer identification information is TEID (B). Instruct.
- the control device 710 sends, to the switch (C), a packet whose destination address is the IP address of the virtual S-GW 740 and whose bearer identification information is TEID (B). -2 is instructed to be transferred.
- the control device 710 determines, for example, the switch (B) and the switch (A) as the switch 7601 through which the bearer transmitted from the U-plane S-GW 740-1 to the eNB 770 passes.
- the control device 710 instructs the switch (B) to transfer to the switch (A) a packet whose destination address is the IP address of the eNB 770 and whose bearer identification information is TEID (C).
- the control device 710 instructs the switch (A) to transfer to the eNB 770 a packet whose destination address is the IP address of the eNB 770 and whose bearer identification information is TEID (C).
- the control device 710 determines, for example, the switch (C) and the switch (A) as the switch 7601 through which the bearer transmitted from the U-plane S-GW 740-2 to the eNB 770 passes.
- the control device 710 instructs the switch (C) to transfer to the switch (A) a packet whose destination address is the IP address of the eNB 770 and whose bearer identification information is TEID (D).
- the control device 710 instructs the switch (A) to transfer to the eNB 770 a packet whose destination address is the IP address of the eNB 770 and whose bearer identification information is TEID (D).
- the control device 710 controls the U-plane S-GWs 740-1 and 740-2, respectively.
- FIG. 32 shows a configuration example of the U-plane S-GW.
- the U-plane S-GW 740 includes a GTP-U tunnel module 741 and a switch 742.
- GTP-U tunnel module 741 is connected to the logical port P L of the switch.
- the control device 710 controls the switch 742.
- the GTP-U tunnel module 741 is disposed on the eNB 770 side and the P-GW 720 side, respectively.
- a common GTP-U tunnel module 741 may be arranged on the eNB 770 side and the P-GW 720 side. In this case, the common GTP-U tunnel module 741 is connected to each of the logical ports P L corresponding to the logical port P L and P-GW720 side corresponding to eNB770 side.
- control device 710 controls the S-GW for U-plane according to the OpenFlow protocol.
- the present invention is not limited to the OpenFlow protocol.
- the control device 710 sets a flow entry in the switch 742 according to the OpenFlow protocol.
- the control device 710 sets a flow entry having the following content for an uplink packet (a packet transmitted from the eNB in the U-plane S-GW direction).
- Matching field - that the input port is a logical port P L corresponding to the GTP tunnel module 741 of eNB770 side;
- the metadata (TEID for communication with the eNB) included in the packet completely matches the bearer identification information set between the eNB 770 and the U-plane S-GW.
- the rest must be wild cards.
- ⁇ Metadata (TEID for communication with P-GW and sequence number included in the metadata when the packet was received) is added to the packet.
- - corresponding to the P-GW720 side of a GTP tunnel module 742 is transferred to the logical port P L.
- the control device 710 sets a flow entry having the following content for a downlink packet (a packet transmitted from the U-plane S-GW in the eNB direction).
- Matching field The input port is a logical port P L corresponding to the G-TP tunnel module 741 on the P-GW side;
- the metadata (TEID for communication with the P-GW) included in the packet completely matches the bearer identification information set between the P-GW 720 and the U-plane S-GW; ⁇ The rest must be wild cards.
- ⁇ ENB770 side GTP tunnel module 741 is transferred to the logical port P L.
- FIG. 33 shows an operation example of the fourth embodiment. The description of the same operation as the operation example described with reference to FIG. 22 is omitted, and different operations will be described in detail below.
- control device 710 selects the U-plane S-GW 740 through which communication passes according to the data network 704 with which the communication terminal 703 communicates. Further, the control device 710 assigns bearer identification information via the selected U-plane S-GW 740.
- control device 710 controls the transport network 760 and the U-plane S-GW 740 by the above-described operation described with reference to FIGS.
- FIG. 34 shows an example of another system configuration of the fourth embodiment.
- the U-plane S-GWs 740-1 and 740-2 that are virtually constructed are arranged in the core system 701.
- a part of the U-plane S-GW (for example, the U-plane S-GW 740-2 in FIG. 34) constructed virtually is arranged in the base station.
- the C-plane S-GW 730, the U-plane S-GW 740-1, and the U-plane S-GW 740-2 constitute a virtual S-GW 740, and the U-plane S-GW 740-1
- an IP address is not assigned to each of the U-plane S-GW 740-2, but one IP address (hereinafter referred to as IP address (A)) is assigned to the virtual S-GW 740.
- the extended eNB 771 includes an eNB 7710 having the same function as the eNB 770 in FIG. 30, an S-GW 740-2 for U-plane, and an IPsec function 7712.
- the U-plane S-GW 740-2 has the same configuration as that illustrated in FIG.
- the control device 710 controls the U-plane S-GWs 740-1 and 740-2 and constructs a bearer (GTP-U tunnel).
- the control device 710 instructs the U-plane S-GW 740-2 to switch processing according to the bearer.
- the bearer whose identification information is TEID (X) accesses the data network 704-2 via the P-GW 720-2 of the core system 701-2.
- the control device 710 rewrites the source IP address with the IP address (A) for the packet with the destination IP address of the IP address (A) and the TEID (X), and sets the destination IP address of the P-GW 720-2.
- the U-plane S-GW 740-2 is instructed to rewrite the IP address. That is, the control device 710 sets the destination address of the packet belonging to the logical path related to the communication with the predetermined data network (the data network 704-2 in FIG. 34) to the P-GW (see FIG. 34, the U-plane S-GW 740-2 is instructed to convert the address to the address of P-GW 720-2).
- the U-plane S-GW 740-2 sets the destination address of the packet belonging to the logical path related to the communication with the predetermined data network to the P-GW address corresponding to the predetermined data network according to the instruction of the control device 710. Has a function to convert.
- control device 710 instructs the U-plane S-GW 740-2 to rewrite the TEID with a TEID for communication with the P-GW 720-2.
- the U-plane S-GW 740-2 transfers the packet to the IPsec function 7712, and the packet is encrypted by the IPsec function 7712.
- the IPsec function 7712 determines whether to transfer the packet to the IPsec GW 780-1 or 780-2 according to the destination IP address of the packet.
- the IPsec function 7712 transfers the encrypted packet to the IPsec GW 780-2 because the destination IP address of the encrypted packet has been rewritten to the address of the P-GW 720-2.
- the IPsec GW 780-2 decrypts the received packet and transfers the packet to the P-GW 720-2.
- the control device 710 does not rewrite the address of the packet as a default operation (for example, an operation for a packet whose destination IP address is an IP address (A) and TEID (X)), and transfers the packet as it is.
- the U-plane S-GW 740-2 is instructed.
- the U-plane S-GW 740-2 transfers the packet to the IPsec function 7712.
- the IPsec function 7712 encrypts the packet.
- the IPsec function 7712 determines whether to transfer the packet to the IPsec GW 780-1 or 780-2 according to the destination IP address of the packet.
- the IPsec function 7712 transfers the packet to the IPsec GW 780-1 when the destination IP address is the IP address (A) that is the address of the virtual S-GW 740.
- the IPsec GW 780-1 decrypts the received packet and transfers the packet to the P-GW 720-1.
- the core system in which only the P-GW for accessing the data network without the S-GW is arranged can be arranged at a location close to the access system 702. It becomes possible. Therefore, an effect of facilitating offloading of traffic from the access system can be obtained.
- the present invention can be applied to a communication system that transmits and receives packets by forming a logical path such as an EPS bearer.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
Description
本発明によるサービングゲートウェイは、複数のPDN(Packet Data Network)ゲートウェイを有する通信システムのサービングゲートウェイであって、
前記サービングゲートウェイに対応付けられたPDNゲートウェイとの間の第一の論理パスの終端処理を実行可能な第一の手段と、基地局と間の第二の論理パスの終端処理を実行可能な第二の手段と、前記第一および第二の論理パスのコントロールプレーンからの要求に応じて制御装置から通知される動作ルールに従って、前記終端処理に関連する情報を前記第一の手段および第二の手段の少なくとも1つと交換可能な第三の手段とを備える。
本発明による通信方法は、複数のPDN(Packet Data Network)ゲートウェイを有する通信システムのサービングゲートウェイによる通信方法であって、前記サービングゲートウェイに対応付けられたPDNゲートウェイとの間の第一の論理パスの終端処理を第一の論理パス終端モジュールにより実行し、基地局と間の第二の論理パスの終端処理を第二の論理パス終端モジュールにより実行し、前記第一および第二の論理パスのコントロールプレーンからの要求に応じて制御装置から通知される動作ルールに従って、前記終端処理に関連する情報を前記第一および第二の論理パス終端モジュールの少なくとも1つと交換することを特徴とする。
本発明による基地局は、複数のPDN(Packet Data Network)ゲートウェイを有する通信システムの基地局であって、基地局ユニットとサービングゲートウェイユニットを備え、前記サービングゲートウェイユニットは、所定の通信網との通信に関連する論理パスに属するパケットの宛先アドレスを、前記所定の通信網に対応するPDNゲートウェイのアドレスに変換可能な手段を備えることを特徴とする。
1.1) システム構成
図1は、第1実施形態のシステム構成の例を示す。本発明の第1実施形態による通信システムは、データトラフィックの処理を実行するUプレーン用通信装置10と、制御装置20と、Cプレーン用通信装置30と、通信装置10と通信する通信装置40と、を含む。Uプレーン用通信装置10と通信装置40との間に論理パス50が生成されるものとする。
図4は、第1実施形態の動作例を示す。
本発明の第1実施形態は、Cプレーン処理機能を有する通信装置とUプレーン処理機能を有する通信装置とが分離した構成を有する。制御装置が、Cプレーン処理機能を有する通信装置からの要求に応じて、Uプレーン処理機能を動的に制御する。よって、本実施形態によれば、Uプレーン処理機能を柔軟に増減することが可能となる。
本発明の第2実施形態は、上述の第1実施形態で言及された技術を適用することが可能である。第1実施形態では、制御装置20がOpenFlow,I2RS,ForCES等の制御プロトコルを用いて通信装置10を制御し、通信装置10にUプレーン処理機能を実行させる。
2.1)システム構成
図5に示すように、本発明の第2実施形態による通信システムは、データトラフィックの処理を実行するUプレーン用通信装置10と、制御装置20と、Cプレーン用通信装置30と、通信装置10と通信する通信装置40と、を含み、Uプレーン用通信装置10と通信装置40との間に論理パス50が生成されるものとする。
図6に示すように、論理パスモジュール11は、論理パス50の他端にある通信装置40を管理する論理パス管理部101と論理パスのカプセル化機能部102およびデカプセル化機能部103と、を有する。
図7に示すように、制御装置20はCプレーン用通信装置30とUプレーン用通信装置10との間に介在し、Cプレーン用通信装置30からのデータトラフィック転送用の指示をUプレーン用通信装置10のパケット転送部12に対するパケット転送ルールとして送信する。
以下、図8を参照しながら、あるパケットフローに属する各パケットの転送処理について説明する。
上述したように、本発明の第2実施形態によれば、制御装置20が、Cプレーン用通信装置30からのトラフィック転送指示に従ってパケット転送ルールをUプレーン用通信装置10のパケット転送部12へ登録し、それによりパケット転送部12がパケットを対向通信装置に対応した論理パスを通して転送する。さらに、Uプレーン用通信装置10では、対向通信装置の状態を確認するエコー処理、シーケンス番号管理等の機能を論理パスモジュール11が実行することにより、切り貼りが頻繁に生じる論理パスの管理が容易となり、Cプレーン用通信装置30や制御装置20の制御系の処理負荷を軽減することもできる。
以下、上述したUプレーン用通信装置10の具体的な構成例を説明する。
3.1)システム構成
図12に示すように、本発明の第1実施例による通信システムでは、第1実施形態あるいは第2実施形態のUプレーン用およびCプレーン用通信装置がUプレーン用およびCプレーン用のP-GWに適用される。本実施例では、上述した論理パス50としてGTP-Uトンネル350を例示し、さらに、Uプレーン用通信装置10、制御装置20、Cプレーン用通信装置30および対向通信装置40として、それぞれUプレーン用P-GW300、コントローラ320、Cプレーン用P-GW330およびS-GW340を例示する。また、無線基地局eNB360は移動管理エンティティ(MME)370により選択されたS-GW340を通してGTP-UトンネルによりUプレーンP-GW300に接続される。
オープンフローは、通信をエンドツーエンドのフローとして認識し、フロー単位で経路制御、障害回復、負荷分散等を実行する。ここで、フローとは、例えば所定の属性を有する一連の通信パケット群のことである。以下、図13に示すネットワークを一例としてオープンフローについて簡単に説明する。
図15に示すように、モバイルシステム400はコアシステム401とアクセスシステム402とからなり、コアシステム401は、図12に示すように、Uプレーン用P-GW300、コントローラ(OFC)320、Cプレーン用P-GW330、S-GW340およびMME370からなる。なお、Uプレーン用P-GW300でのGTP-Uトンネルの生成、変更あるいは解放等の処理は、通常、オープンフロー構成機能(OFCP: OpenFlow Configuration Point)により実行されるが、本実施例ではOFC320により実行することが可能である。
図16において、eNB360、MME370およびS-GW340によりアタッチ手順が開始されると(動作S300)、S-GW340はセッション生成要求メッセージをCプレーンP-GW330へ送信する(動作S301)。セッション生成要求メッセージを受信すると、CプレーンP-GW330はOFC320へUプレーンリソース(セッション)割当要求メッセージを送信する(動作S302)。
上りパケットに対しては、
Matching field:
・パケットの入力ポートが該当のGTP-Uトンネルモジュール11に紐付いた論理ポートPLであること;
・(S-GW Addressと)S-GW TEID、P-GW TEIDをメタデータとして完全一致すること;
・残りは全てワイルドカードであること。
Action:
・宛先MACアドレスを対応するノード(例えば、上位に存在するルータ等)のものに変換する;
・送信元MACアドレスをP-GW300のものに変換する;
・インターネット向きのポートへ転送する。
Matching field:
・UE IPアドレスが宛先IPアドレスで完全一致すること;
・残りは全てワイルドカードであること。
Action:
・(S-GW Addressと)S-GW TEID、P-GW TEIDをメタデータとして付与する;
・該当のGTP-Uトンネルモジュール11に紐付いた論理ポートPLへ転送する。
図17において、eNB360、MME370およびS-GW340によりデタッチ手順が開始されると(動作S401)、S-GW340はセッション削除要求メッセージをCプレーンP-GW330へ送信する(動作S402)。セッション削除要求メッセージを受信すると、CプレーンP-GW330はOFC320へUプレーンリソース(セッション)設定解除要求メッセージを送信する(動作S403)。
図18において、CプレーンP-GW330が専用ベアラ構築トリガを検知すると(動作S501)、Uプレーンリソース(ベアラ)割当要求メッセージをOFC320へ送信する(動作S502)。
上りパケットに対しては、
Matching field:
・パケットの入力ポートが該当のGTPトンネルモジュール11の紐付いた論理ポートPLであること;
・(S-GW Addressと)S-GW TEID、P-GW TEIDをメタデータとして完全一致すること;
・残りは全てワイルドカードであること。
Action:
・インターネット向きのポートへ転送する。
下りパケットに対しては、
・TFT(Traffic Flow Template)で指定されたフィールドで完全一致すること;
・残りは全てワイルドカードであること。
Action:
・(S-GW Addressと)S-GW TEID、P-GW TEIDをメタデータとして付与する;
・該当のGTPトンネルモジュール11に紐付いた論理ポートPLへ転送する。
図19において、CプレーンP-GW330は、専用ベアラ解放トリガを検知すると(動作S601)、S-GW340へベアラ削除要求メッセージを送信し(動作S602)、これによりeNB360、MME370およびS-GW340が専用ベアラ非活性化手順を実行する(動作S603)。続いて、S-GW340はベアラ削除応答メッセージをCプレーンP-GW330へ送信し(動作S604)、これを受けて、CプレーンP-GW330はUプレーンリソース(ベアラ)設定解除要求メッセージをOFC320へ送信する(動作S605)。
4.1)システム構成
図20に示すように、本発明の第2実施例による通信システムでは、第1実施形態または第2実施形態によるCプレーン用通信装置30、Uプレーン用通信装置10がUプレーン用およびCプレーン用のS-GWに適用される。本実施例では、上述した論理パス50としてGTP-Uトンネル550を例示し、さらに、Uプレーン用通信装置10、制御装置20、Cプレーン用通信装置30および対向通信装置40として、それぞれUプレーン用S-GW500、コントローラ520、Cプレーン用S-GW530および無線基地局eNB560を例示する。また、Uプレーン用S-GW500は移動管理エンティティ(MME)570により選択され、eNB560とUプレーン用S-GW500との間がGTP-Uトンネル550により接続される。
図21に示すように、モバイルシステム600はコアシステム601とアクセスシステム602とからなり、コアシステム601は、図20に示すように、Uプレーン用S-GW500、コントローラ(OFC)520、Cプレーン用S-GW530、P-GW540およびMME570からなる。なお、Uプレーン用S-GW500でのGTP-Uトンネルの生成、変更あるいは解放等の処理は、通常、オープンフロー構成機能(OFCP: OpenFlow Configuration Point)により実行されるが、本実施例ではOFC520により実行することが可能である。
図22において、eNB560およびMME570によりアタッチ手順が開始されると(動作S700)、MME570はセッション生成要求メッセージをCプレーンS-GW530へ送信する(動作S701)。セッション生成要求メッセージを受信すると、CプレーンS-GW530はOFC520へUプレーンリソース(セッション)割当要求メッセージを送信する(動作S702)。
上りパケットに対しては、
Matching field:
・入力ポートがeNB側のGTPトンネルモジュール511(GTP-Uトンネルモジュール#1)に紐付いた論理ポートPLであること;
・(eNB Addressと)eNB TEID、S-GW TEIDをメタデータとして完全一致すること。
・残りは全てワイルドカードであること。
Action:
・(P-GW Addressと)P-GW TEID、S-GW TEID、ベアラのシーケンス番号をメタデータとして付与する。
・P-GW側のGTPトンネルモジュール511(GTP-Uトンネルモジュール#2)に紐付いた論理ポートPLへ転送する。
Matching field:
・入力ポートがP-GW側のGTPトンネルモジュール511(GTP-Uトンネルモジュール#2)に紐付いた論理ポートPLであること;
・(P-GW Addressと)P-GW TEID、S-GW TEIDをメタデータとして完全一致すること;
・残りは全てワイルドカードであること。
Action:
・(eNB Addressと)eNB TEID、S-GW TEID、ベアラのシーケンス番号をメタデータとして付与する。
・eNB側のGTPトンネルモジュール511(GTP-Uトンネルモジュール#1)に紐付いた論理ポートPLへ転送する。
図23において、eNB560およびMME570によりデタッチ手順が実行され(動作S801)、MME570はセッション削除要求メッセージをCプレーンS-GW530へ送信する(動作S802)。セッション削除要求メッセージを受信すると、CプレーンS-GW530はOFC520へUプレーンリソース(セッション)設定解除要求メッセージを送信する(動作S803)。
図24において、P-GW540が専用ベアラ構築トリガを検知すると(動作S901)、Uプレーンリソース(ベアラ)設定要求メッセージをCプレーンS-GW530へ送信する(動作S902)。それを受信したCプレーンS-GW530は、Uプレーンリソース(セッション)割当要求メッセージをOFC520へ送信する(動作S903)。
図25において、P-GW540が専用ベアラ解放トリガを検知すると(動作S1001)、ベアラ削除要求メッセージをCプレーンS-GW530へ送信する(動作S1002)。それを受信したCプレーンS-GW530は、ベアラ削除要求メッセージをMME570へ送信し(動作S1003)、eNB560およびMME570により専用ベアラ非活性化手順が実行される(動作S1004)。続いて、MME570はベアラ削除応答メッセージをCプレーンS-GW530へ送信し(動作S1005)、これを受けて、CプレーンS-GW530はUプレーンリソース(ベアラ)設定解除要求メッセージをOFC520へ送信する(動作S1006)。
図21において、アクセスシステム602とUプレーン用S-GW500との間のS1-Uコネクションは、通信端末の状況に応じてアイドル状態になったり、通信端末からの送信データの発生あるいは通信端末宛てのデータの到来によりアイドル状態から復帰したりする場合がある。以下、本発明の第2実施例におけるS1コネクションの解放/復活動作について説明する。
図26において、eNB560およびMME570によりS1コネクション解放手順が開始されると(動作S1101)、MME570はアクセスベアラ解放要求メッセージをCプレーンS-GW530へ送信する(動作S1102)。アクセスベアラ解放要求メッセージを受信すると、CプレーンP-GW530はOFC520へUプレーンリソース(S1-U)設定解除要求メッセージを送信する(動作S1103)。
図27において、通信端末UEによりサービス要求があると(動作S1201)、MME570はベアラ変更要求メッセージをCプレーンS-GW530へ送信する(動作S1202)。ベアラ変更要求メッセージを受信すると、CプレーンS-GW530はOFC520へUプレーンリソース(S1-U)割当要求メッセージを送信する(動作S1203)。
図28において、P-GW540がデータパケットをネットワークから受信すると(動作S1301)、当該受信データパケットをUプレーンS-GW500へ送信する(動作S1302)。新たなデータパケットを受信したUプレーンS-GW500は、スイッチ512に当該パケットのヘッダ情報と合致したフローエントリが登録されていないと、当該パケットをPacket-Inメッセージを用いてOFC520へ通知する(動作S1303)。Packet-Inメッセージは、入力ポートが該当のGTPトンネルモジュール511の紐付いた論理ポートPLであり、(P-GW Addressと)P-GW TEID、S-GW TEIDをメタデータとして含む以外は、通常のPacket-Inメッセージと同じである。
上述した実施例では、論理パスとしてGTPトンネルを例示したが、PMIP(Proxy Mobile IP)/GRE(Generic Routing Encapsulation)等に対応したLTEトンネルを採用することもできる。また、S-GWでは、上述したようにTEIDに紐付けたパケット転送ではなく、紐付けを解いてから転送するBBERF(Bearer Biding and Event Reporting Function)に対応した方法を利用することもできる。
上述した第2実施形態および実施例では、図5に示されるように、Uプレーン用通信装置において論理パスモジュール(GTP-Uトンネルモジュール)がパケット転送部(スイッチ)の論理ポートに設けられた構成を有するが、本発明はこれに限定されるものではない。たとえば、図5のようなUプレーン通信装置を複数設け、それらを制御可能なスイッチを用いて接続し、ネットワーク負荷等に応じて1つあるいは複数のUプレーン用通信装置を選択するように構成することもできる。以下、本発明の第2実施形態としてP-GWに適用した場合を説明する。なお、第3実施形態には、上述した第1および第2実施形態で言及された技術を適用することが可能である。
本発明の第4実施形態には、上述した第1-第3実施形態で言及された技術を適用することが可能である。
モバイルシステム700は、通信端末703と無線通信を行う基地局(eNB)770で構成されるアクセスシステム702を有する。
Matching field:
・入力ポートが、eNB770側のGTPトンネルモジュール741に対応する論理ポートPLであること;
・パケットに含まれるメタデータ(eNBとの通信用TEID)が、eNB770とUプレーン用S-GWとの間に設定されたベアラの識別情報と完全一致すること。
・残りは全てワイルドカードであること。
Action:
・メタデータ(P-GWとの通信用TEIDおよびパケット受信時にメタデータに含まれていたシーケンス番号)をパケットに付与する。
・P-GW720側のGTPトンネルモジュール742に対応する論理ポートPLへ転送する。
Matching field:
・入力ポートが、P-GW側のGTPトンネルモジュール741に対応する論理ポートPLであること;
・パケットに含まれるメタデータ(P-GWとの通信用TEID)が、P-GW720とUプレーン用S-GWとの間に設定されたベアラの識別情報と完全一致すること;
・残りは全てワイルドカードであること。
Action:
・メタデータ(eNBとの通信用TEIDおよびパケット受信時にメタデータに含まれていたシーケンス番号)をメタデータとして付与する。
・eNB770側のGTPトンネルモジュール741に対応する論理ポートPLへ転送する。
11 論理パスモジュール
12 パケット転送部
13 データ処理部
20 制御装置
30 Cプレーン用通信装置
40 対向通信装置
50 論理パス
101 論理パス管理部
102 カプセル化機能部
103 デカプセル化機能部
201、202 通信部
203 経路・アクション計算部
204 パケット転送管理部
205 パケット転送ルール管理部
206 制御部
300 Uプレーン用P-GW(PDN Gateway for User plane)
311 GTP-Uトンネルモジュール
312 スイッチ(OFS:OpenFlow Switch)
320 コントローラ(OFC:Openflow Controller)
330 Cプレーン用P-GW(PDN Gateway for Control plane)
340 S-GW(Serving Gateway)
350 GTP-Uトンネル
360 無線基地局eNB
370 MME
500 Uプレーン用S-GW
511 GTP-Uトンネルモジュール
512 スイッチ(OFS:OpenFlow Switch)
520 コントローラ(OFC:Openflow Controller)
530 Cプレーン用S-GW
540 P-GW
550 GTP-Uトンネル
560 無線基地局eNB
570 MME
Claims (34)
- ネットワークに論理パスを設定して通信を行う通信システムであって、
少なくとも1つの第一のゲートウェイ毎に配置された第二のゲートウェイと、
基地局と前記第二のゲートウェイとの間の設定された前記論理パスが経由するトランスポートネットワークと、
前記トランスポートネットワークにおけるパケット転送を制御する制御装置とを備え、
前記制御装置は、パケットが属する論理パスを識別し、識別された論理パスに対応する前記第二のゲートウェイに前記パケットが転送されるように前記トランスポートネットワークを制御する
ことを特徴とする通信システム。 - 前記制御装置は、前記論理パスの識別情報に基づいて受信パケットが属する論理パスを識別し、識別された論理パスに対応する前記第二のゲートウェイに向けて前記受信パケットを転送することを、前記トランスポートネットワークのパケット転送装置に指示する
ことを特徴とする請求項1の通信システム。 - 前記第二のゲートウェイは、複数のデータ網の各々に対して設けられた前記第一のゲートウェイ毎に配置され、
前記制御装置は、端末が通信する前記データ網の種別に応じて決定された前記論理パスの識別情報に基づいて受信パケットが属する論理パスを識別し、識別された論理パスに対応する前記第二のゲートウェイに向けて前記受信パケットを転送することを、前記トランスポートネットワークのパケット転送装置に指示する
ことを特徴とする請求項1の通信システム。 - 前記第二のゲートウェイは、
前記論理パスの終端処理を実行可能な第一の手段と、
前記論理パスのコントロールプレーンからの要求に応じて制御装置から通知される動作ルールに従って、前記終端処理に関連する情報を前記第一の手段と交換可能な第二の手段とを備えることを特徴とする請求項1乃至3のいずれか1項に記載の通信システム。 - 前記第二の手段は、パケットを転送するための通信インターフェースを介して、前記第一の手段と前記終端処理に関連する情報を交換する
ことを特徴とする請求項4の通信システム。 - 前記第二の手段は、パケットを転送するための通信インターフェースを介したパケット転送に伴って前記終端処理に関連する情報を交換する
ことを特徴とする請求項4または5に記載の通信システム。 - 前記第二の手段は、前記終端処理に関連する情報を、パケットのメタデータとして前記第一の手段と交換する
ことを特徴とする請求項4乃至6のいずれか1項に記載の通信システム。 - 前記第二の手段は、前記論理パスのシーケンス番号を、パケットのメタデータとして前記第一の手段と交換する
ことを特徴とする請求項4乃至7のいずれか1項に記載の通信システム。 - 前記第二の手段は、前記終端処理に関する前記論理パスを識別するための情報に基づいてパケットを識別し、識別されたパケットが属する論理パスに関する情報を前記第一の手段と交換する
ことを特徴とする請求項4乃至8のいずれか1項に記載の通信システム。 - 前記第一の手段は、前記第二の手段から受信した前記終端処理に関連する情報を用いて、前記第二の手段から転送されたパケットをカプセル化する
ことを特徴とする請求項4乃至9のいずれか1項に記載の通信システム。 - 前記第一の手段は、デカプセル化したパケットと、当該パケットが属する前記論理パスに関する情報とを、前記第二の手段に送信する
ことを特徴とする請求項4乃至10のいずれか1項に記載の通信システム。 - 複数のPDN(Packet Data Network)ゲートウェイを有する通信システムのサービングゲートウェイであって、
前記サービングゲートウェイに対応付けられたPDNゲートウェイとの間の第一の論理パスの終端処理を実行可能な第一の手段と、
基地局と間の第二の論理パスの終端処理を実行可能な第二の手段と、
前記第一および第二の論理パスのコントロールプレーンからの要求に応じて制御装置から通知される動作ルールに従って、前記終端処理に関連する情報を前記第一の手段および第二の手段の少なくとも1つと交換可能な第三の手段と
を備えるサービングゲートウェイ。 - 前記第三の手段は、パケットを転送するための通信インターフェースを介して、前記終端処理に関連する情報を交換する
ことを特徴とする請求項12のサービングゲートウェイ。 - 前記第三の手段は、パケットを転送するための通信インターフェースを介したパケット転送に伴って前記終端処理に関連する情報を交換する
ことを特徴とする請求項12または13に記載のサービングゲートウェイ。 - 前記第三の手段は、前記終端処理に関連する情報を、パケットのメタデータとして前記第一の手段および第二の手段の少なくとも1つと交換する
ことを特徴とする請求項12乃至14のいずれか1項に記載のサービングゲートウェイ。 - 前記第三の手段は、前記第一および第二の論理パスのすくなくとも一方のシーケンス番号を、パケットのメタデータとして前記第一の手段および第二の手段の少なくとも1つと交換する
ことを特徴とする請求項12乃至15のいずれか1項に記載のサービングゲートウェイ。 - 前記第三の手段は、前記終端処理に関する前記論理パスを識別するための情報に基づいてパケットを識別し、識別されたパケットが属する論理パスに関する情報を前記第一の手段および第二の手段の少なくとも1つと交換する
ことを特徴とする請求項12乃至16のいずれか1項に記載のサービングゲートウェイ。 - 前記第一の手段および第二の手段は、前記第三の手段から受信した前記終端処理に関連する情報を用いてパケットをカプセル化することが可能である
ことを特徴とする請求項12乃至17のいずれか1項に記載のサービングゲートウェイ。 - 前記第一の手段および第二の手段は、デカプセル化したパケットと、当該パケットが属する前記論理パスに関する情報とを、前記第三の手段に送信することが可能である
ことを特徴とする請求項12乃至17のいずれか1項に記載のサービングゲートウェイ。 - 前記サービングゲートウェイは、前記第一、第二および第三の手段を、仮想マシン上で稼動するソフトウェアにより実行する
ことを特徴とする請求項12乃至19のいずれか1項に記載のサービングゲートウェイ。 - 複数のPDN(Packet Data Network)ゲートウェイを有する通信システムのサービングゲートウェイによる通信方法であって、
前記サービングゲートウェイに対応付けられたPDNゲートウェイとの間の第一の論理パスの終端処理を第一の論理パス終端モジュールにより実行し、
基地局と間の第二の論理パスの終端処理を第二の論理パス終端モジュールにより実行し、
前記第一および第二の論理パスのコントロールプレーンからの要求に応じて制御装置から通知される動作ルールに従って、前記終端処理に関連する情報を前記第一および第二の論理パス終端モジュールの少なくとも1つと交換する
ことを特徴とする通信方法。 - パケットを転送するための通信インターフェースを介して、前記終端処理に関連する情報を交換する
ことを特徴とする請求項21の通信方法。 - パケットを転送するための通信インターフェースを介したパケット転送に伴って前記終端処理に関連する情報を交換する
ことを特徴とする請求項21または22に記載の通信方法。 - 前記終端処理に関連する情報を、パケットのメタデータとして前記第一および第二の論理パス終端モジュールの少なくとも1つと交換する
ことを特徴とする請求項21乃至23のいずれか1項に記載の通信方法。 - 前記第一および第二の論理パスのすくなくとも一方のシーケンス番号を、パケットのメタデータとして前記第一および第二の論理パス終端モジュールの少なくとも1つと交換する
ことを特徴とする請求項21乃至24のいずれか1項に記載の通信方法。 - 前記終端処理に関する前記論理パスを識別するための情報に基づいてパケットを識別し、識別されたパケットが属する論理パスに関する情報を前記第一および第二の論理パス終端モジュールの少なくとも1つと交換する
ことを特徴とする請求項21乃至25のいずれか1項に記載の通信方法。 - 前記第一および第二の論理パス終端モジュールは、受信した前記終端処理に関連する情報を用いてパケットをカプセル化する
ことを特徴とする請求項21乃至26のいずれか1項に記載の通信方法。 - 複数のPDN(Packet Data Network)ゲートウェイを有する通信システムのサービングゲートウェイに、
前記サービングゲートウェイに対応付けられたPDNゲートウェイとの間の第一の論理パスの終端処理を第一の論理パス終端モジュールにより実行する処理と、
基地局と間の第二の論理パスの終端処理を第二の論理パス終端モジュールにより実行する処理と、
前記第一および第二の論理パスのコントロールプレーンからの要求に応じて制御装置から通知される動作ルールに従って、前記終端処理に関連する情報を前記第一および第二の論理パス終端モジュールの少なくとも1つと交換する処理と
を実行させることを特徴とするプログラム。 - 複数のPDN(Packet Data Network)ゲートウェイを有する通信システムの基地局であって、
基地局ユニットと
サービングゲートウェイユニットを備え、
前記サービングゲートウェイユニットは、
所定の通信網との通信に関連する論理パスに属するパケットの宛先アドレスを、前記所定の通信網に対応するPDNゲートウェイのアドレスに変換可能な手段を備える
ことを特徴とする基地局。 - 前記サービングゲートウェイユニットは、
前記論理パスのコントロールプレーンからの要求に応じて制御装置から通知される動作ルールに従って、所定の通信網との通信に関連する論理パスに属するパケットの宛先アドレスを、前記所定の通信網に対応するPDNゲートウェイのアドレスに変換可能である
ことを特徴とする請求項29の基地局。 - 前記所定の通信網に対応するPDNゲートウェイが宛先のパケットを、当該PDNゲートウェイに対応するセキュリティゲートウェイに送信するセキュリティユニットを備えることを特徴とする請求項29または30の基地局。
- 複数のPDN(Packet Data Network)ゲートウェイを有する通信システムであって、
基地局ユニットと、サービングゲートウェイユニットとを備える基地局を有し、
前記サービングゲートウェイユニットは、
所定の通信網との通信に関連する論理パスに属するパケットの宛先アドレスを、前記所定の通信網に対応するPDNゲートウェイのアドレスに変換可能な手段を備える
ことを特徴とする通信システム。 - 前記サービングゲートウェイユニットは、
前記論理パスのコントロールプレーンからの要求に応じて制御装置から通知される動作ルールに従って、所定の通信網との通信に関連する論理パスに属するパケットの宛先アドレスを、前記所定の通信網に対応するPDNゲートウェイのアドレスに変換可能である
ことを特徴とする請求項32の通信システム。 - 前記所定の通信網に対応するPDNゲートウェイが宛先のパケットを、当該PDNゲートウェイに対応するセキュリティゲートウェイに送信するセキュリティユニットを備えることを特徴とする請求項32または33の通信システム。
Priority Applications (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP14823353.9A EP3021633B1 (en) | 2013-07-11 | 2014-07-10 | Communication system and communication method with multiple gtp-u tunnels |
JP2015526175A JP6409772B2 (ja) | 2013-07-11 | 2014-07-10 | 通信システム、サービングゲートウェイ、その通信方法および基地局 |
US14/903,852 US10149331B2 (en) | 2013-07-11 | 2014-07-10 | Communication system, serving gateway, communication method therefor, and base station |
US16/009,368 US10743355B2 (en) | 2013-07-11 | 2018-06-15 | Communication system and base station |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2013145925 | 2013-07-11 | ||
JP2013-145925 | 2013-07-11 |
Related Child Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US14/903,852 A-371-Of-International US10149331B2 (en) | 2013-07-11 | 2014-07-10 | Communication system, serving gateway, communication method therefor, and base station |
US16/009,368 Division US10743355B2 (en) | 2013-07-11 | 2018-06-15 | Communication system and base station |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2015004922A1 true WO2015004922A1 (ja) | 2015-01-15 |
Family
ID=52279625
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/JP2014/003675 WO2015004922A1 (ja) | 2013-07-11 | 2014-07-10 | 通信システム、サービングゲートウェイ、その通信方法および基地局 |
Country Status (4)
Country | Link |
---|---|
US (2) | US10149331B2 (ja) |
EP (1) | EP3021633B1 (ja) |
JP (1) | JP6409772B2 (ja) |
WO (1) | WO2015004922A1 (ja) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2015115774A (ja) * | 2013-12-11 | 2015-06-22 | 富士通株式会社 | 通信システム及びネットワーク装置 |
JP2018527836A (ja) * | 2015-09-16 | 2018-09-20 | ノキア ソリューションズ アンド ネットワークス オサケ ユキチュアNokia Solutions and Networks Oy | 無線アクセスネットワークにおける制御プレーンとユーザプレーンの分離 |
CN112771919A (zh) * | 2018-09-27 | 2021-05-07 | 上海诺基亚贝尔股份有限公司 | 用于分组隧道传输的隧道端点标识符的生成 |
WO2021149233A1 (ja) * | 2020-01-23 | 2021-07-29 | 日本電信電話株式会社 | 分離システム、分離方法および分離プログラム |
Families Citing this family (16)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2014199646A1 (ja) * | 2013-06-13 | 2014-12-18 | 日本電気株式会社 | 通信システムにおけるサービス品質の制御方法および制御装置、ならびに通信装置 |
CN108712338B (zh) * | 2013-12-11 | 2021-06-22 | 华为技术有限公司 | 报文处理方法及装置 |
EP3091705B1 (en) * | 2014-01-23 | 2018-09-05 | Huawei Technologies Co., Ltd. | Tunnel processing method for packet, switching device and control device |
JP6347177B2 (ja) * | 2014-08-22 | 2018-06-27 | 富士通株式会社 | 転送装置、制御装置、および、通信方法 |
AU2015401354B2 (en) | 2015-07-06 | 2018-12-20 | Huawei Technologies Co., Ltd. | Evolved multimedia broadcast/multicast service embms system and management method |
US10687380B2 (en) * | 2015-07-24 | 2020-06-16 | Lg Electronics Inc. | PDN connection management method and network entity |
JP6838564B2 (ja) * | 2016-01-15 | 2021-03-03 | 日本電気株式会社 | 通信方法、移動通信システム、sgw−c、mme装置及びpgw−c |
WO2017169513A1 (ja) * | 2016-03-31 | 2017-10-05 | 株式会社Nttドコモ | 通信制御方法及び通信システム |
EP3469576B1 (en) * | 2016-07-14 | 2024-07-03 | Samsung Electronics Co., Ltd. | Multi-layer display with color and contrast enhancement |
US10594513B2 (en) * | 2018-03-19 | 2020-03-17 | Cisco Technology, Inc. | Packet communications providing packet forwarding efficiencies in a network including using a segment routing and tunnel exchange |
US20210092103A1 (en) * | 2018-10-02 | 2021-03-25 | Arista Networks, Inc. | In-line encryption of network data |
US11627080B2 (en) * | 2019-01-18 | 2023-04-11 | Vmware, Inc. | Service insertion in public cloud environments |
US10798638B2 (en) * | 2019-02-15 | 2020-10-06 | Netsia, Inc. | Apparatus and method for controller and slice-based security gateway for 5G |
US10992385B2 (en) | 2019-04-08 | 2021-04-27 | Netsia, Inc. | Apparatus and method for joint profile-based slicing of mobile access and optical backhaul |
US11470009B2 (en) * | 2019-10-18 | 2022-10-11 | Arista Networks, Inc. | Implementing multi-table OpenFlow using a parallel hardware table lookup architecture |
US11057820B2 (en) | 2019-11-26 | 2021-07-06 | Gigamon Inc. | Dynamic mapping of nodes responsible for monitoring traffic of an evolved packet core |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20120300615A1 (en) * | 2011-05-23 | 2012-11-29 | Telefonaktiebolaget L M Ericsson (Publ) | Implementing EPC in a Cloud Computer with OpenFlow Data Plane |
US20130054761A1 (en) * | 2011-08-29 | 2013-02-28 | Telefonaktiebolaget L M Ericsson (Publ) | Implementing a 3G Packet Core in a Cloud Computer with Openflow Data and Control Planes |
Family Cites Families (19)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP3074573B2 (ja) * | 1991-06-18 | 2000-08-07 | 富士通株式会社 | Vpi変換機能検査のための方法および装置、並びに、該装置を具備するatmクロスコネクト装置 |
JP3688408B2 (ja) * | 1996-10-29 | 2005-08-31 | 株式会社東芝 | パケット転送制御方法及びノード装置 |
JP3619411B2 (ja) * | 1999-12-03 | 2005-02-09 | 富士通株式会社 | パケット中継装置 |
US8824430B2 (en) * | 2004-01-31 | 2014-09-02 | Athonet Srl | Wireless mobility gateway |
US7590128B2 (en) * | 2005-12-28 | 2009-09-15 | Motorola, Inc. | Method and system for setting up a media session in a telecommunications network |
US8179903B2 (en) * | 2008-03-12 | 2012-05-15 | Qualcomm Incorporated | Providing multiple levels of service for wireless communication devices communicating with a small coverage access point |
WO2010102127A1 (en) * | 2009-03-04 | 2010-09-10 | Cisco Technology, Inc. | Detecting overloads in network devices |
WO2011025421A1 (en) * | 2009-08-25 | 2011-03-03 | Telefonaktiebolaget L M Ericsson (Publ) | Mobility anchor relocation |
US8767584B2 (en) * | 2010-01-29 | 2014-07-01 | Alcatel Lucent | Method and apparatus for analyzing mobile services delivery |
WO2011155484A1 (ja) * | 2010-06-09 | 2011-12-15 | 日本電気株式会社 | 通信システム、論理チャネル制御装置、制御装置、通信方法およびプログラム |
EP2619953B1 (en) * | 2010-09-22 | 2017-12-27 | Nec Corporation | A control apparatus, a communication system, a communication method and a recording medium having recorded thereon a communication program |
EP2693705B1 (en) * | 2011-03-31 | 2018-11-21 | Fujitsu Limited | Gateway device and gateway selection method |
SG11201400925SA (en) * | 2011-09-30 | 2014-04-28 | Interdigital Patent Holdings | Methods, apparatus and systems for enabling managed remote access |
TW201316815A (zh) * | 2011-10-01 | 2013-04-16 | Inst Information Industry | 基地台及其傳輸路徑建立方法 |
US9332479B2 (en) * | 2012-01-04 | 2016-05-03 | Ofinno Technologies, Llc | Network site for wireless communications |
US8914664B2 (en) * | 2012-05-08 | 2014-12-16 | Verizon Patent And Licensing Inc. | Recovering information based on device functionality |
JP5770139B2 (ja) * | 2012-06-06 | 2015-08-26 | 株式会社Nttドコモ | 無線通信システム、サービングゲートウェイ、ネットワークおよび論理経路確立方法 |
US20140003322A1 (en) * | 2012-06-29 | 2014-01-02 | Alcatel-Lucent Usa Inc. | Seamless make-before-break transfer of multicast/broadcast sessions |
US20140050208A1 (en) * | 2012-08-14 | 2014-02-20 | Stoke, Inc. | Apn ip management |
-
2014
- 2014-07-10 WO PCT/JP2014/003675 patent/WO2015004922A1/ja active Application Filing
- 2014-07-10 EP EP14823353.9A patent/EP3021633B1/en active Active
- 2014-07-10 JP JP2015526175A patent/JP6409772B2/ja active Active
- 2014-07-10 US US14/903,852 patent/US10149331B2/en active Active
-
2018
- 2018-06-15 US US16/009,368 patent/US10743355B2/en active Active
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20120300615A1 (en) * | 2011-05-23 | 2012-11-29 | Telefonaktiebolaget L M Ericsson (Publ) | Implementing EPC in a Cloud Computer with OpenFlow Data Plane |
US20130054761A1 (en) * | 2011-08-29 | 2013-02-28 | Telefonaktiebolaget L M Ericsson (Publ) | Implementing a 3G Packet Core in a Cloud Computer with Openflow Data and Control Planes |
Non-Patent Citations (3)
Title |
---|
"General Packet Radio Service (GPRS) enhancements for Evolved Universal Terrestrial Radio Access Network (E-UTRAN) access", 3GPP TR 23.401 V12.0.0, 20 May 2013 (2013-05-20), Retrieved from the Internet <URL:http://www.3gpp.org/ftp/Specs/html-info/23401.htm>> |
JAMES KEMPF ET AL.: "MOVING THE MOBILE EVOLVED PACKET CORE TO THE CLOUD", WIRELESS AND MOBILE COMPUTING, NETWORKING AND COMMUNICATIONS (WIMOB), 2012 IEEE 5TH INTERNATIONAL CONFERENCE ON MOBILE COMPUTING,, 10 October 2012 (2012-10-10), XP002717394 * |
S.MATSUSHIMA ET AL.: "Stateless user-plane architecture for virtualized EPC (vEPC), draft- matsushima-stateless-uplane-vepc-00", IETF, 16 July 2013 (2013-07-16), pages 1 - 20, XP015093880 * |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2015115774A (ja) * | 2013-12-11 | 2015-06-22 | 富士通株式会社 | 通信システム及びネットワーク装置 |
JP2018527836A (ja) * | 2015-09-16 | 2018-09-20 | ノキア ソリューションズ アンド ネットワークス オサケ ユキチュアNokia Solutions and Networks Oy | 無線アクセスネットワークにおける制御プレーンとユーザプレーンの分離 |
US10405243B2 (en) | 2015-09-16 | 2019-09-03 | Nokia Solutions And Networks Oy | Control and user plane decoupling in radio access network |
CN112771919A (zh) * | 2018-09-27 | 2021-05-07 | 上海诺基亚贝尔股份有限公司 | 用于分组隧道传输的隧道端点标识符的生成 |
US20210377076A1 (en) * | 2018-09-27 | 2021-12-02 | Nokia Technologies Oy | Generation of tunnel endpoint identifier for packet tunneling |
WO2021149233A1 (ja) * | 2020-01-23 | 2021-07-29 | 日本電信電話株式会社 | 分離システム、分離方法および分離プログラム |
Also Published As
Publication number | Publication date |
---|---|
US20160157274A1 (en) | 2016-06-02 |
JPWO2015004922A1 (ja) | 2017-03-02 |
EP3021633A4 (en) | 2017-05-10 |
EP3021633B1 (en) | 2023-08-30 |
JP6409772B2 (ja) | 2018-10-24 |
US10149331B2 (en) | 2018-12-04 |
EP3021633A1 (en) | 2016-05-18 |
US10743355B2 (en) | 2020-08-11 |
US20180332635A1 (en) | 2018-11-15 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP6409772B2 (ja) | 通信システム、サービングゲートウェイ、その通信方法および基地局 | |
JP6468189B2 (ja) | 通信システム、通信装置、その制御方法および制御装置 | |
JP6852096B2 (ja) | パケット処理方法、及びデバイス | |
KR101694082B1 (ko) | 소프트웨어-정의된 네트워크 오버레이 | |
EP3091705B1 (en) | Tunnel processing method for packet, switching device and control device | |
US10547505B2 (en) | Software defined networking for edge nodes | |
JP6301358B2 (ja) | 通信ネットワークにおけるマルチパス伝送制御プロトコル信号伝達の処理 | |
JP5991424B2 (ja) | パケット書換装置、制御装置、通信システム、パケット送信方法及びプログラム | |
EP2993836B1 (en) | Method and device for routing data message | |
CN109417489B (zh) | 移动网络中对于用户面的业务拆分器 | |
US10356830B2 (en) | System and method to facilitate stateless serving gateway operations in a network environment | |
JP6206508B2 (ja) | パケット転送装置、制御装置、通信システム、通信方法及びプログラム | |
WO2014101062A1 (zh) | 用户面数据传输方法、移动管理网元、演进型基站及系统 | |
US10447603B2 (en) | Control signaling transmission method and device | |
CN103391296A (zh) | 一种控制器、转发器及通道建立方法和系统 | |
EP3043598A1 (en) | Routing method between base stations, serving gateway and base station | |
JP6050720B2 (ja) | コアネットワークにおけるゲートウェイのセッション情報を移行させるシステム及び方法 | |
WO2015113281A1 (zh) | 用户数据处理方法、装置及网络系统 | |
CN105722145B (zh) | 基于s1接口的数据通信方法和基站 | |
JP7293728B2 (ja) | パケットカプセル化方法およびパケットカプセル化装置 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
WWE | Wipo information: entry into national phase |
Ref document number: 2014823353 Country of ref document: EP |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 14823353 Country of ref document: EP Kind code of ref document: A1 |
|
ENP | Entry into the national phase |
Ref document number: 2015526175 Country of ref document: JP Kind code of ref document: A |
|
WWE | Wipo information: entry into national phase |
Ref document number: 14903852 Country of ref document: US |
|
NENP | Non-entry into the national phase |
Ref country code: DE |