+

WO2012003781A1 - Procédé et système de contrôle d'admission à un service - Google Patents

Procédé et système de contrôle d'admission à un service Download PDF

Info

Publication number
WO2012003781A1
WO2012003781A1 PCT/CN2011/076703 CN2011076703W WO2012003781A1 WO 2012003781 A1 WO2012003781 A1 WO 2012003781A1 CN 2011076703 W CN2011076703 W CN 2011076703W WO 2012003781 A1 WO2012003781 A1 WO 2012003781A1
Authority
WO
WIPO (PCT)
Prior art keywords
base station
home base
address
information
policy
Prior art date
Application number
PCT/CN2011/076703
Other languages
English (en)
Chinese (zh)
Inventor
毕以峰
周晓云
宗在峰
霍玉臻
蒋陶
Original Assignee
中兴通讯股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中兴通讯股份有限公司 filed Critical 中兴通讯股份有限公司
Publication of WO2012003781A1 publication Critical patent/WO2012003781A1/fr

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0272Virtual private networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup
    • H04W76/12Setup of transport tunnels

Definitions

  • the present invention relates to the field of wireless communications, and in particular to a method and system for service admission control.
  • FIG. 1 is a schematic diagram of an architecture of a Home evolved NodeB (HeNB) accessing an EPS in a non-roaming scenario according to the related art, and a roaming scenario (home route or local grooming)
  • HeNB Home evolved NodeB
  • the architecture of the HeNB to access the EPS is mainly embodied in the EPS network, and has little relationship with the invention, and will not be described here.
  • the MME is connected to the EUTRAN, the S-GW, and the home base station gateway (HeNB GW), and is responsible for control planes such as mobility management, non-access stratum signaling processing, and user mobility management context management;
  • S-GW is The E-UTRAN-connected access gateway device forwards data between the E-UTRAN and the P-GW and is responsible for buffering the paging waiting data.
  • the P-GW is an EPS and packet data network (Packet Data Network, referred to as PDN) The border gateway of the network, responsible for PDN access and forwarding data between EPS and PDN.
  • PDN Packet Data Network
  • the Policy and Charging Rules Function performs the policy and charging rules. It is connected to an application function (Application Function, abbreviated as AF) in the service network protocol (Internet Protocol, IP for short) to obtain service information, which is used to generate service information of the PCC policy.
  • Application Function abbreviated as AF
  • AF Application Function
  • IP Internet Protocol
  • S-GW When the S5 interface with the P-GW uses the GTP protocol, the P-GW resides in the Policy and Charging Enforcement Function (PCEF), and the PCRF and the P-GW exchange through the Gx interface.
  • PCEF Policy and Charging Enforcement Function
  • the information is responsible for initiating the establishment, modification, and release of the bearer, ensuring the quality of service (QoS) of the service data, and performing charging control.
  • the S5 interface of the S-GW and the P-GW uses Proxy Mobile IP (PMIP), the Bearer Binding and Event Report Function (abbreviated as Bearer Binding and Event Report Function) BBERF), and the S-GW and the PCRF exchange information through the Gxc interface, and the BBERF is responsible for initiating the establishment, modification and release of the bearer to ensure the service quality of the service data, and the PCEF performs the charging control.
  • PMIP Proxy Mobile IP
  • BBERF Bearer Binding and Event Report Function
  • the S-GW and the PCRF exchange information through the Gxc interface
  • the BBERF is responsible for initiating the establishment, modification and release of the bearer to ensure the service quality of the service data
  • the PCEF performs the charging control.
  • the EPS supports the access of the HeNB, which is a small, low-power base station deployed in indoor places such as homes and offices.
  • the Closed Subscriber Group is a new concept introduced after the introduction of the home base station. Usually a family or an internal user of a company forms a closed user group, which is identified by a CSG ID. The home base station serving the users in this closed subscriber group has the same CSG ID. When a closed subscriber group is served by only one home base station, the closed subscriber group can also directly identify the home base station identity (e.g., BS ID).
  • BS ID home base station identity
  • CSG users and/or non-CSG users can distinguish different levels, and the priority of the service is different, and the service quality and service category can be different.
  • the user can access the home base station corresponding to multiple closed user groups, for example, the user's office, home, and the like.
  • the concept of allowing a closed user group list to be introduced is therefore introduced. This list is stored in the user's terminal and the user data server on the network side.
  • home base stations There are three usage modes for home base stations: closed mode, mixed mode, and open mode.
  • closed mode only the CSG subscription user to which the home base station belongs can access the base station and enjoy the services provided by the base station.
  • the home base station is in the open mode, any carrier subscription user can access the base station, and the home base station at this time is equivalent to the macro base station.
  • the home base station is in the hybrid mode, any operator subscription or roaming user is also allowed to access, but different levels are classified according to whether the user subscribes to the CSG, that is, the user who signs the CSG is using the hybrid home. Base stations have higher service priorities and enjoy better quality of service and service categories.
  • the user data server on the network side will sign the user.
  • the closed subscriber group that allows access is sent to the mobility management entity of the core network.
  • the core network mobility management entity will use this information to perform access control on the UE. If the UE accesses the core network from an unlicensed closed mode home base station, the core network will deny access to such users.
  • the HeNB usually accesses the core network of the EPS through the leased fixed line, as shown in Figure 1.
  • the security gateway (Security Gateway, referred to as SeGW) is shielded in the core network, and the data between the HeNB and the SeGW is encapsulated by IPSec.
  • the HeNB can directly connect to the MME and the S-GW of the core network through the IPSec tunnel established by the HeNB and the SeGW, and can also connect to the MME and the S-GW through the SeGW, that is, the HeNB GW is an optional network element, but whether the network element is The use does not affect the invention.
  • a Home eNodeB Management System HMS is introduced, which has little relationship with the present invention, and is not shown in the figure.
  • FIG. 2 is a schematic diagram of the architecture of the HNB accessing the UMTS in the non-roaming scenario according to the related technology.
  • the architecture of the HNB accessing the UMTS in the roaming scenario is similar to that of the UMTS, and is not described here.
  • the architecture in Figure 2 is similar to the architecture of Figure 1, except that the Serving General Packet Radio Service Support Node (SGSN) is used instead of the S-GW to use the gateway general packet radio service support.
  • SGSN Serving General Packet Radio Service Support Node
  • GGSN Gateway General Packet Radio Service Supporting Node
  • the QoS of the fixed line that is accessed by the HeNB/HNB is usually restricted by the contract of the owner of the HeNB/HNB and the fixed network operator. Therefore, when the 3GPP UE normally accesses the 3GPP core network access service by the HeNB/HNB, the required QoS cannot exceed the contracted QoS of the fixed network line that the fixed network operator can provide. Otherwise, the QoS of the UE access service will not be guaranteed, especially for the service of Guaranteed Bit Rate (GBR). Therefore, for 3GPP networks and fixed networks, there must be a unified control mechanism to control the admission of fixed network resources and services. For example: When a new service is initiated, the fixed network needs to ensure that there is enough resources/bandwidth to support the service.
  • GRR Guaranteed Bit Rate
  • the service cannot be initiated, even if 3GPP can provide enough Resources/bandwidth, as long as the fixed network cannot guarantee resources/bandwidth, the service (especially GBR) is not guaranteed.
  • the QoS of service access of all UEs accessed through the HeNB/HNB The total demand does not exceed the QoS guarantee for the fixed line subscription of the HeNB/HNB access, or it can reasonably manage the fixed network resources, and can properly control the users and services, ensuring that the authorized GBR service can be sufficient. Bandwidth.
  • HeNB case Interworking network element HeNB PF (Policy Function Entity), set in 3GPP HeNB subsystem (consisting of SeGW, HeNB GW and other network elements, such as HeMS) and BBF BPCF (Broadband Forum Policy Control Function) Between functional entities), business acceptance management and resource management are implemented.
  • HeNB PF Policy Function Entity
  • 3GPP HeNB subsystem consisting of SeGW, HeNB GW and other network elements, such as HeMS
  • BBF BPCF Broadband Forum Policy Control Function
  • the present invention provides a method and system for controlling service admission, which improves the performance of the system control service acceptance.
  • the present invention provides a method for service admission control, including: a security gateway, a security tunnel information between a home base station and a security gateway, and a policy information sent by the home base station to a wireless network side.
  • the post-initiated resource reconfiguration request is sent to the home base station policy function entity; the home base station policy function entity notifies the information about the security tunnel and the resource reconfiguration request to the fixed network policy control function entity, the fixed network policy
  • the control function entity determines whether the fixed network link corresponding to the information of the security tunnel can satisfy the content of the resource reconfiguration request, and feeds back a determination result to the home base station, and the home base station makes admission control according to the determination result. decision making.
  • the above method may also have the following features:
  • the step of the security gateway transmitting the information about the security tunnel between the home base station and the security gateway and the resource reconfiguration request initiated by the home base station after receiving the policy information sent by the wireless network side to the home base station policy function entity Includes:
  • the security gateway After the security gateway establishes a secure tunnel with the home base station, establishing a policy with the home base station a session of the functional entity, and sending the secure tunnel information to the home base station policy function entity in the process of establishing the session; after receiving the resource reconfiguration request, the security gateway passes the resource reconfiguration request The session is sent to the home base station policy function entity.
  • the session is a dedicated session established by the home base station through a dedicated interface with the security gateway when performing system initialization.
  • the session is a dedicated session established by the home base station through a dedicated interface when the system is initialized by the home base station.
  • the above method may also have the following features:
  • the security gateway After receiving the resource reconfiguration request sent by the home base station, the security gateway sends the information of the security tunnel together with the resource reconfiguration request to the home base station policy function entity.
  • the above method may also have the following features:
  • the sending, by the wireless network, the policy information and the home base station to initiate the resource reconfiguration request includes: the wireless network side transmitting a bearer setup request message to the home base station, and carrying the policy information in the message, where the home base station sends the resource reconfiguration The request is used to request to allocate resources; the wireless network side sends a bearer modification request message to the home base station and carries policy information in the message, where the home base station sends a resource reconfiguration request for requesting reallocation or release of resources; Transmitting a session management request message to the home base station and carrying policy information in the message, where the home base station sends a resource reconfiguration request for requesting allocation or reallocation of resources; or, the wireless network side is under the home base station
  • the bearer deactivation request message is sent and the policy information is carried in the message, and the home base station sends a resource release request for requesting release of the resource.
  • the above method may also have the following features:
  • the step of determining, by the fixed network policy control function entity, whether the fixed network link corresponding to the information of the security tunnel can satisfy the content of the resource reconfiguration request includes: determining, by the fixed network policy control entity, whether the fixed network link is The bandwidth resource required to be allocated or reallocated by the home base station can be provided, or whether the fixed network link accepts release of the bandwidth resource required to be released by the home base station.
  • the step of the home base station making an admission control decision according to the determination result includes: if the determination result indicates that the fixed network link corresponding to the information of the security tunnel can satisfy the content of the resource reconfiguration request, the home base station accepts a new task; if the judgment result indicates that the fixed network link corresponding to the information of the secure tunnel cannot satisfy the content of the resource reconfiguration request; the home base station rejects the new service.
  • the above method may also have the following features:
  • the home base station determines to preempt the existing service resource, and notifies the policy control function entity.
  • the security tunnel information includes:
  • Inner IP address and outer IP address are inner IP address and outer IP address.
  • the information about the secure tunnel includes the outer IP address
  • the home base station accesses a fixed network through a home gateway functioning as a router
  • the outer IP address is the home.
  • the private IP address of the base station is translated by the network address, and the information of the secure tunnel further includes a user data packet protocol UDP port number.
  • the present invention provides a service admission control system, which includes a wireless network side device, a security gateway, a home base station, a home base station policy function entity, and a fixed network policy control function entity; the wireless network The side device is configured to send the policy information to the home base station, where the home base station is configured to initiate a resource reconfiguration request after receiving the policy information sent by the wireless network side device, and is further configured to perform the function according to the fixed network policy.
  • the security gateway is configured to be between the home base station and the security gateway
  • the information of the security tunnel and the resource reconfiguration request are sent to the home base station policy function entity;
  • the home base station policy function entity is set to the information of the security tunnel and the resource reconfiguration request notification to the fixed network policy control function Entity;
  • the fixed network policy control function entity set to And determining, according to the information of the security tunnel, whether the fixed network link corresponding to the information of the security tunnel can satisfy the content of the resource reconfiguration request, and feeding back the determination result to the home base station.
  • the above system may also have the following characteristics:
  • the security gateway is further configured to establish a session with the home base station policy function entity after establishing a secure tunnel with the home base station, and send the secure tunnel information to the home base station policy during the establishment of the session.
  • the functional entity is further configured to send the resource reconfiguration request to the home base station policy function entity through the session after receiving the resource reconfiguration request.
  • the session is a dedicated session established by the home base station through a dedicated interface with the security gateway when performing system initialization.
  • the above system may also have the following characteristics:
  • security gateway is further configured to: after receiving the resource reconfiguration request sent by the home base station, send the information of the security tunnel to the home base station policy function entity together with the resource reconfiguration request.
  • the above system may also have the following characteristics:
  • the home base station is further configured to: when it is known that the fixed network link cannot provide the required bandwidth of the home base station, determine to preempt the fixed network existing service resource, and notify the policy control function entity after the preemption is successful.
  • the above system may also have the following characteristics:
  • the wireless network side device includes a core network device of an evolved packet system and an evolved home base station gateway; or the wireless network side device includes a universal mobile communication system core network device and a home base gateway.
  • the present invention also provides a home base station, including a resource reconfiguration request initiating module and an admission control decision module, where
  • the resource reconfiguration requesting module is configured to: initiate a resource reconfiguration request after receiving the policy information sent by the wireless network side device;
  • the admission control decision module is configured to: control security of functional entity feedback according to a fixed network policy Making an admission control decision as a result of whether the fixed network link corresponding to the information of the tunnel can satisfy the content of the resource reconfiguration request;
  • the information of the security tunnel is information about a secure tunnel between the home base station and the security gateway.
  • the present invention also provides a security gateway, including an information sending module, where
  • the information sending module is configured to: send the information about the security tunnel between the home base station and the security gateway, and the resource reconfiguration request initiated by the home base station after receiving the policy information sent by the wireless network side device to the home Base station policy function entity.
  • the security gateway further includes a session establishment module, where
  • the session establishing module is configured to: after the security gateway establishes a secure tunnel with the home base station, establish a session with the home base station policy function entity;
  • the information sending module is configured to: send the security tunnel information to the home base station policy function entity in the process of establishing the session; and reconfigure the resource after receiving the resource reconfiguration request The request is sent to the home base station policy function entity through the session.
  • the present invention also provides a home base station policy function entity, including an information receiving module and a notification module, where
  • the information receiving module is configured to: receive information about a secure tunnel between the home base station and the security gateway sent by the security gateway, and perform resource reconfiguration initiated by the home base station after receiving the policy information sent by the wireless network side device Request
  • the notification module is configured to: notify the information of the secure tunnel and the resource reconfiguration request to a fixed network policy control function entity.
  • the present invention also provides another method of service admission control, including:
  • the security gateway sends the secure tunnel information between the home base station and the security gateway to the home base station policy function entity, and the home base station policy function entity notifies the information of the secure tunnel to the fixed network policy control function entity;
  • the home base station After receiving the policy information sent by the wireless network side, the home base station initiates a resource reconfiguration request to the home base station policy function entity, where the home base station policy function entity notifies the content of the resource reconfiguration request to the fixed network policy Control function entity;
  • the fixed network policy control function entity determines whether the fixed network link corresponding to the information of the security tunnel can satisfy the content of the resource reconfiguration request, and feeds back a determination result to the home base station, where the home base station according to the The judgment result makes an admission control decision.
  • the present invention also provides a home base station policy function entity, including an information receiving module and a notification module, where
  • the information receiving module is configured to: receive information about a secure tunnel between the home base station and the security gateway sent by the security gateway, and perform resource reconfiguration initiated by the home base station after receiving the policy information sent by the wireless network side device Request
  • the notification module is configured to: notify the information of the secure tunnel and the resource reconfiguration request to a fixed network policy control function entity.
  • the present invention also provides another method of service admission control, including:
  • the security gateway sends the secure tunnel information between the home base station and the security gateway to the home base station policy function entity, and the home base station policy function entity notifies the information of the secure tunnel to the fixed network policy control function entity;
  • the home base station After receiving the policy information sent by the wireless network side, the home base station initiates a resource reconfiguration request to the home base station policy function entity, where the home base station policy function entity notifies the content of the resource reconfiguration request to the fixed network policy Control function entity;
  • the fixed network policy control function entity determines whether the fixed network link corresponding to the information of the security tunnel can satisfy the content of the resource reconfiguration request, and feeds back a determination result to the home base station, where the home base station according to the The judgment result makes an admission control decision.
  • the present invention further provides another system for service admission control, including a wireless network side device, a security gateway, a home base station, a home base station policy function entity, and a fixed network policy control function entity; wherein, the wireless network side device is configured as: Sending policy information to the home base station;
  • the home base station is configured to: after receiving the policy information sent by the wireless network side, initiate a resource reconfiguration request to the home base station policy function entity; and the home base station and the feedback fed back by the functional entity according to the fixed network policy Making an admission control decision as to whether the fixed network link corresponding to the information of the security tunnel between the security gateways can satisfy the content of the resource reconfiguration request;
  • the security gateway is configured to: secure a tunnel between the home base station and the security gateway The information is sent to the home base station policy function entity;
  • the home base station policy function entity is configured to: notify the fixed network policy control function entity of the information of the security tunnel sent by the security gateway and the content of the resource reconfiguration request sent by the home base station;
  • the fixed network policy control function entity is configured to: determine, according to the information of the security tunnel, whether the fixed network link corresponding to the information of the security tunnel can satisfy the content of the resource reconfiguration request, and feed back the judgment result to the The home base station.
  • the present invention also provides another home base station, including a resource reconfiguration request initiating module and an admission control decision module, where
  • the resource reconfiguration requesting module is configured to: after receiving the policy information sent by the wireless network side, initiate a resource reconfiguration request to the home base station policy function entity;
  • the admission control decision module is configured to: determine, according to the fixed network policy, the fixed network link corresponding to the information about the security tunnel between the home base station and the security gateway fed back by the function entity, that is capable of satisfying the content of the resource reconfiguration request As a result, an admission control decision is made.
  • the present invention also provides another home base station policy function entity, including an information receiving module and a notification module, where the information receiving module is configured to: receive a secure tunnel between the home base station and the security gateway sent by the security gateway. Information, and a resource reconfiguration request initiated by the home base station after receiving the policy information sent by the wireless network side device;
  • the notification module is configured to: notify the fixed network policy control function entity of the information of the security tunnel sent by the security gateway and the content of the resource reconfiguration request sent by the home base station.
  • the security tunnel information includes:
  • Inner IP address and outer IP address are inner IP address and outer IP address.
  • system home base station, security gateway or home base station policy function
  • the information about the security tunnel includes the outer IP address
  • the home base station accesses the fixed network through a home gateway functioning as a router
  • the outer IP address is the home
  • the private IP address of the base station is translated by the network address, and the information of the secure tunnel further includes a user data packet protocol UDP port number.
  • the invention can improve the performance of the system control service acceptance and improve the resource management capability of the system.
  • FIG. 1 is a schematic diagram of an architecture of a HeNB accessing an EPS in a non-roaming scenario according to the related art
  • FIG. 2 is a schematic diagram of an architecture of an HNB accessing a UMTS through a fixed network in a non-roaming scenario according to the related art
  • Embodiment 1 of the present invention is a schematic structural diagram of Embodiment 1 of the present invention.
  • Embodiment 2 of the present invention is a schematic structural diagram of Embodiment 2 of the present invention.
  • FIG. 5 is a flowchart of establishing a T1 session when the home base station is powered on according to the embodiment of the present invention
  • FIG. 6 is a schematic diagram of a method for controlling service admission according to Embodiment 1 of the present invention
  • FIG. 7 is a schematic diagram of a method for controlling service admission in Embodiment 2 of the present invention.
  • FIG. 8 is a schematic diagram of a method for controlling service admission in Embodiment 3 of the present invention.
  • FIG. 9 is a schematic diagram of a method for controlling service admission in Embodiment 4 of the present invention.
  • FIG. 10 is a schematic diagram of a method for controlling service admission according to Embodiment 5 of the present invention. Preferred embodiment of the invention
  • the system for service admission control in the embodiment includes: a wireless network side device, a security gateway, a home base station, a home base station policy function entity, and a fixed network policy control function entity.
  • the wireless network side device includes a core network device of the evolved packet system and an evolved home base station gateway; or the wireless network side device includes a universal mobile communication system core network device and a home base station gateway.
  • the wireless network side device is configured to send policy information to the home base station.
  • the home base station is configured to initiate a resource reconfiguration request after receiving the policy information sent by the wireless network side device, and is further configured to: according to the fixed network link, the fixed network link corresponding to the information of the security tunnel fed back by the function entity An admission control decision is made as a result of being able to satisfy the content of the resource reconfiguration request.
  • the security gateway is configured to send the information of the secure tunnel between the home base station and the security gateway and the resource reconfiguration request to the home base station policy function entity.
  • the home base station policy function entity sets the information of the secure tunnel and the resource reconfiguration request notification to the fixed network policy control function entity.
  • the fixed network policy control function entity is configured to determine, according to the information of the security tunnel, whether the fixed network link corresponding to the information of the security tunnel can satisfy the content of the resource reconfiguration request, and feed back the determination result to the home base station .
  • the security gateway sends the information of the security tunnel in the following manner:
  • the security gateway is further configured to establish a security tunnel with the home base station, establish a session with the home base station policy function entity, and establish the dedicated Sending the security tunnel information to the home base station policy function entity during the session; and further, after receiving the resource reconfiguration request, mapping the resource reconfiguration request to the security tunnel where the security gateway is located
  • the corresponding private session is sent to the home base station policy function entity.
  • the session may be a dedicated session established by the home base station through a dedicated interface when the system is initialized (e.g., when the system is initialized after power-on). This dedicated interface can be referred to as the T1 interface.
  • the security gateway sends the information about the security tunnel in the following manner:
  • the security gateway is configured to send the information of the security tunnel together with the resource reconfiguration request after receiving the resource reconfiguration request sent by the home base station. Sended to the home base station policy function entity.
  • the process of sending the policy information by the wireless network side device and initiating the resource reconfiguration request by the home base station is one of the following message interaction processes:
  • the wireless network side device is configured to send a bearer setup request message to the home base station and carry policy information in the message; the home base station is configured to send a resource reconfiguration request for requesting allocation of resources.
  • the wireless network side device is configured to send a bearer modification request message to the home base station and carry policy information in the message; the home base station is configured to send a resource reconfiguration request for requesting reallocation or release of resources.
  • the wireless network side device is configured to send a session management request message to the home base station and carry policy information in the message; the home base station is configured to send a resource reconfiguration request for requesting allocation or re-allocation of resources.
  • the wireless network side device is configured to send a bearer deactivation request message to the home base station and carry policy information in the message; the home base station is configured to send a resource release request for requesting release of the resource.
  • the determining, by the fixed network policy control function entity, whether the fixed network link corresponding to the information of the security tunnel can satisfy the content of the resource reconfiguration request is: the fixed network policy control entity determining whether the fixed network link can provide the Determining, by the home base station, bandwidth resources allocated or reallocated, or determining whether the fixed network link accepts release of bandwidth resources required by the home base station.
  • the determining, by the home base station, the admission control decision according to the feedback result is: if the feedback result indicates that the fixed network link corresponding to the information of the security tunnel can satisfy the content of the resource reconfiguration request, the home base station accepts a new Task; otherwise, the home base station rejects the new service.
  • the home base station is further configured to decide to preempt the existing service resource and notify the policy control function entity when the fixed network link corresponding to the information of the security tunnel is unable to satisfy the content of the resource reconfiguration request.
  • the above system is applicable to a system in which a home base station (HNB) is applied and a system in which an evolved home base station (HeNB) is applied.
  • the corresponding corresponding device in the system is that the HeNB corresponds to the HNB, the HeNB GW/MME corresponds to the HNB GW, and the HeNB PF corresponds to the HNB PF.
  • the method for the service admission control includes: the information about the security tunnel between the home base station and the security gateway, and the resource reconfiguration request initiated by the home base station after receiving the policy information sent by the wireless network side.
  • the base station, the home base station makes an admission control decision according to the feedback result.
  • a dedicated interface T2 can be set between the HeNB and the HeNB PF for the information exchange between the HeNB and the HeNB PF in this embodiment.
  • the session on the T2 interface is called a T2 session.
  • the T2 session between the HeNB and the HeNB PF is encapsulated by the IP sec between the SeGW and the HeNB.
  • the SeGW strips the encapsulation header of the IPSec tunnel and sends it to the HeNB PF.
  • the message sent by the HeNB is reversely transmitted through the same mechanism, and is not described here.
  • the security gateway When the security gateway sends the information of the security tunnel, the security gateway establishes a secure tunnel with the home base station, establishes a session with the home base station policy function entity, and establishes the dedicated session in the process of establishing the private session.
  • the security tunnel information is sent to the home base station policy function entity; after receiving the resource reconfiguration request, the security gateway maps the resource reconfiguration request to a session corresponding to the security tunnel where the security gateway is located.
  • the session may be a dedicated session established by the home base station through a dedicated interface with the secure gateway when the system is initialized. As shown in FIG.
  • the T1 interface between the SeGW and the HeNB PF is a dedicated interface, and the SeGW and the HeNB PF can exchange information according to the dedicated interface.
  • the security gateway establishes a secure tunnel with the home base station, and the security gateway establishes a dedicated session with the home base station policy function entity (ie, The T1 session), the security gateway maps the information of the secure tunnel to the private base station policy function entity on the T1 session corresponding to the information of the secure tunnel through the T1 interface.
  • the security gateway maps the information of the security tunnel to the dedicated session corresponding to the information of the security tunnel, that is, the T1 session, and sends the information to the home base station policy function entity.
  • the security gateway may send the information about the security tunnel to the home together with the resource reconfiguration request after receiving the resource reconfiguration request sent by the home base station.
  • Base station policy function entity In this manner, the security gateway is implemented through the available channels between the SeGW and the HeNB PF in the prior art.
  • the process of sending the policy information and the security initiated resource reconfiguration request by the wireless network side is one of the following message interaction processes:
  • the wireless network side sends a bearer setup request message to the home base station and carries the policy in the message.
  • the home base station sends a resource reconfiguration request for requesting allocation of resources;
  • the wireless network side sends a bearer modification request message to the home base station and carries policy information in the message, where the home base station sends a resource reconfiguration request for requesting reallocation or release of resources; the wireless network side is under the home base station Sending a session management request message and carrying policy information in the message, the home base station sends a resource reconfiguration request for requesting allocation or reallocation of resources; the wireless network side sends a bearer deactivation request message to the home base station and is here The message carries policy information, and the home base station sends a resource release request for requesting release of resources.
  • the determining, by the home base station, the admission control decision according to the feedback result is: if the feedback result indicates that the fixed network link corresponding to the information of the security tunnel can satisfy the content of the resource reconfiguration request, the home base station accepts a new Task; otherwise, the home base station rejects the new service.
  • the feedback result of the fixed network policy control function entity to the home base station may be information about whether the fixed network can provide the requested resource, or the usage information of the fixed network current resource or the success or failure of the fixed network reconfiguration resource. If the feedback result is "fixed network release resource success", it can be optional. When the feedback result is not sent, the home base station defaults to the fixed network release resource successfully.
  • the home base station may also decide to preempt the existing service resources of the fixed network, and notify the policy control function entity after the preemption succeeds.
  • the fixed network link described in this method may refer to a backhaul link.
  • the tunnel information in the embodiment of the present invention that is, the information of the security tunnel, or the information of the IP security (IPsec) tunnel is introduced.
  • IPsec IP security
  • the tunnel information in the embodiment of the present invention includes an outer IP address of the HeNB, which is one of the endpoints of the IPsec tunnel, or a local IP address of the HeNB, and may include one or more of the following information: BPCF full domain name (FQDN, Fully Qualified Domain Name);
  • the outer port number of the HeNB (or the local port number of the HeNB);
  • the identity of the HeNB such as the International Mobile Station Identity (IMSI);
  • VLAN ID virtual local area network identifier
  • the outer/local IP address of the HeNB is allocated by the fixed network. If the private network address is allocated for the HeNB, the network address translation (NAT) exists in the fixed network, and the NAT converter is configured by the home gateway (RG).
  • the Residential Gateway acts as the public network IP address of the private network address of the HeNB.
  • the tunnel information also includes the port number of the User Datagram Protocol (UDP).
  • UDP User Datagram Protocol
  • the tunnel information contains fixed network information such as the local/outer IP address (and port number) of the HeNB. Because the tunnel information is provided by the fixed network, the PCRF can select the BPCF serving the line where the address is located. In addition, the WLAN access network/fixed network can locate the fixed network line where the HeNB is located according to the tunnel information, and can guarantee the QoS on the line according to the policy rules.
  • the IP address obtained by the HeNB during the access is uniquely identified and located by the fixed network, and the HeNB can be located according to the address.
  • Fixed network line this address is allocated by the relevant network element when the HeNB accesses the fixed network/WLAN access network (such as broadband network gateway/broadband remote access server (BNG/BRAS, Broadband Network Gateway/Broadband) Remote Access Server ) ) , this address is the local / outer IP address.
  • BNG/BRAS broadband network gateway/broadband remote access server
  • BNG/BRAS Broadband Network Gateway/Broadband Remote Access Server
  • the address obtained by the HeNB during the access is the private IP address assigned by the RG, and the address cannot participate in the tunnel information.
  • the SeGW feeds back the outer/local IP address and UDP port number of the RG to the HeNB.
  • the HeNB uses the address to construct the tunnel information, and the fixed network line where the HeNB is located can be located according to the address.
  • the tunnel information may also include information such as the FQDN of the BPCF.
  • the fixed network may be an access network of a wireless local area network (WLAN, Wireless LAN).
  • WLAN wireless local area network
  • Embodiment 1 is a diagrammatic representation of Embodiment 1:
  • FIG. 3 is a schematic structural diagram of Embodiment 1 of the present invention.
  • An interface T2 is set between the HeNB and the HeNB PF.
  • the HeNB GW or MME sends the QoS policy to the HeNB, and the HeNB sends the resource configuration to the HeNB PF through the T2 interface.
  • the request message is used to request a resource.
  • the resource configuration request message passes through the SeGW, the information of the secure tunnel (IPsec) between the SeGW and the HeNB is sent by the SeGW together with the resource configuration request message to the HeNB PF, and then the HeNB PF passes the S9.
  • IPsec secure tunnel
  • the BPCF finds the backhaul link where the HeNB is located according to the tunnel information, and checks whether the backhaul link where the HeNB is located can provide the resources requested by the HeNB. If the backhaul link can provide the resource requested by the HeNB, the BPCF feeds back the resource request success message to the HeNB PF, and the HeNB PF feeds back the resource request success message to the HeNB, and the HeNB accepts the service; if the Backhaul cannot provide the resource requested by the HeNB, Then, the BPCF feeds back the resource request failure message to the HeNB PF, and the HeNB PF feeds back the resource request failure message to the HeNB, and the HeNB rejects the service.
  • the parameter information in the resource configuration request/response message is mapped or reversed by the 3GPP to BBF in the HeNB PF, or the BPCF. Mapping to.
  • the security tunnel information includes but is not limited to:
  • Inner IP address and outer IP address are inner IP address and outer IP address.
  • the information of the security tunnel includes the outer IP address or the inner layer IP address
  • the home base station accesses a fixed network through a home gateway functioning as a router
  • the outer layer The IP address and the inner layer IP address are public network IP addresses translated by the network address of the private IP address of the home base station
  • the information of the secure tunnel further includes a user data packet protocol UDP.
  • the port number is the number of the home base station.
  • security tunnel information may also be displayed or implicitly included: the correspondence between the identity of the home base station and the outer IP address or IP address plus the port number, the inner and outer IP addresses, or the IP address plus the port number.
  • the BPCF may feed back the fixed network resource status to the HeNB via the HeNB P, and the HeNB may decide to preempt the existing service according to the user type, the service nature, the fixed network status, and the like. Resources, after resource seizure success, and notified to the fixed network.
  • Embodiment 2 is a diagrammatic representation of Embodiment 1:
  • Embodiment 2 of the present invention is a schematic structural diagram of Embodiment 2 of the present invention.
  • a T1 interface is set between the SeGW and the HeNB PF, and a T2 interface is set between the HeNB and the HeNB PF.
  • the HeNB is powered on, and the IPsec tunnel is established between the HeNB and the SeGW (herein the prior art); the SeGW advertises the IPsec tunnel information between the HeNB and the SeGW to the HeNB PF through the T1 interface, and then the HeNB PF advertises the information through the S9* interface. Based on the tunnel information, the BPCF learns the location and/or identity of the fixed network Backhaul (backhaul network) currently accessed by the HeNB. The HeNB PF and/or BPCF store the information after receiving the security (IPsec) tunnel information.
  • IPsec security
  • the HeNB PF and the BPCF may be simple interactions, and transmit security (IPsec) tunnel information, or may simultaneously establish an S9* session through interaction information.
  • IPsec security
  • IPsec security tunnel information
  • the HeNB GW/MME When the QoS policy is sent to the HeNB GW/MME on the EPS network side (or the network side is active, or the UE requests), the HeNB GW/MME sends the QoS policy to the HeNB through the S1 interface, and the HeNB sends the resource to the HeNB PF through the T2 interface.
  • the reconfiguration request is used to request the resource.
  • the SeGW sends the resource reconfiguration request to the HeNB PF through the T1 session corresponding to the IPsec tunnel, and the HeNB PF advertises to the BPCF through the S9* interface.
  • a specific processing method of the message and the information in each network element is: when the HeNB is powered on, the fixed network allocates an IP address or an IP address plus a port number to the HeNB; the IP address or the IP address. After the port number is passed through the fixed network (NAT) network address, the IP address or IP address plus the port number may be converted into another IP address or IP address plus port number, which is the external Layer IP address or IP address plus port number (when there is no NAT device, the original IP address or IP address plus port number is the outer IP address or IP address plus port number); During the IPsec tunnel establishment, the SeGW allocates the HeNB. An IP address or IP address plus a port number. The IP address or IP address plus port number is called an inner IP address or an IP address plus a port number.
  • the SeGW and the HeNB PF pass the security (IPsec) tunnel information through the T2 interface, where the information includes the inner and outer IP addresses or the IP address plus the port number and their correspondence, the HeNB identifier, and The HeNB PF stores the relationship between the outer IP address or the IP address plus the port number.
  • IPsec security
  • the "resource reconfiguration request" message sent by the HeNB carries the inner layer IP address or the IP address plus the port number, and the message is encapsulated by the IPsec tunnel to reach the SeGW.
  • the IPsec encapsulation carries the outer IP address or IP address plus the port number.
  • the SeGW removes the IPsec encapsulation, and the outer IP address or IP address plus the port number is removed.
  • the "Resource Reconfiguration Request” message is further routed by the SeGW to the HeNB PF, which is not parsed by the SeGW (prior art).
  • the HeNB PF maps the inner IP address or IP address plus the port number and/or the HeNB identifier of the "resource reconfiguration request" message to the outer layer according to the inner and outer IP addresses or IP addresses plus the port number, and/or the HeNB identity.
  • the IP address or IP address plus the port number, and the content and the outer IP address or IP address plus the port number in the "Resource Reconfiguration Request" message are sent to the BPCF.
  • the BPCF verifies whether the outer IP address or IP address plus the port number in the fixed network link can provide "resources” Reconfigure the requested resource in the request message. Or, after receiving the "resource reconfiguration request” message, the HeNB PF adds the port number and/or the identity of the HeNB according to the inner IP address or IP address of the "resource reconfiguration request". And the stored tunnel information finds the outer IP address or IP address plus the port number, and then adds the port number according to the external IP address or IP address, or directly according to the inner IP address or IP address plus the port number, "reconfigure the resource" The content of the request "matches to the appropriate S9* session and is sent to the BPCF. The BPCF verifies whether the requested resource in the "Resource Reconfiguration Request" message can be provided in the fixed network link. In addition, the message and information are in each The processing in the network element can have other different solutions:
  • the SeGW On the T1 interface, when the SeGW and the HeNB PF exchange information, a T1 session is established; on the S9* interface, when the HeNB PF and the BPCF interact, an S9* session is established; when the "resource reconfiguration request" message sent by the HeNB passes through the SeGW, The SeGW sends the resource reconfiguration request to the HeNB PF through a T1 session corresponding to the IPsec tunnel. The HeNB PF sends the "resource reconfiguration request" to the appropriate S9* session and sends it to the BPCF according to the stored IPsec tunnel information and the correspondence between the T1 session and the S9* session establishment. The BPCF verifies the fixed network link. Is it possible to provide the resource requested in the "Resource Reconfiguration Request" message.
  • the BPCF may feed back the fixed network resource status to the HeNB via the HeNB P, and the HeNB may decide to preempt the existing service according to the user type, the service nature, the fixed network status, and the like. Resources, after resource seizure success, and notified to the fixed network.
  • FIG. 5 is a flow chart of the process of establishing a T1 session when the HeNB is powered on in the embodiment of the present invention.
  • the BBF BPCF can determine the fixed network backhaal (the fixed network backhaul network) where the HeNB is located according to the tunnel information reported by the SeGW.
  • the establishment of the T1 callback is an optional step. The detailed steps are described as follows:
  • the HeNB is powered on and accesses the fixed network, and the fixed network allocates a local IP address to the HeNB through a related mechanism, and the address is used as an external IP address of the encapsulated data packet;
  • HeNB and SeGW establish an IPsec tunnel to ensure data security during transmission. Sex and integrity.
  • the SeGW reports the IPsec tunnel information between the HeNB and the SeGW to the HeNB PF through the T1 interface, and establishes a T1 session.
  • the HeNB PF reports the tunnel information to the BPCF through the S9* interface, and establishes an S9* interface session.
  • the BPCF determines the Backhaul of the fixed network where the HeNB is located through the tunnel information.
  • the SeGW and the HeNB PF establish a T1 session and transmit tunnel information.
  • the present invention also provides another implementation method.
  • the SeGW and the HeNB PF only transmit tunnel information, and do not establish a T1 session.
  • the HeNB is powered on and accesses the fixed network, and the fixed network allocates a local IP address to the HeNB through a related mechanism, and the address is used as an external IP address of the encapsulated data packet;
  • the HeNB and the SeGW establish an IPsec tunnel to ensure the security and integrity of the data during transmission.
  • the SeGW allocates an inner layer IP address or an IP address plus a port number to the HeNB, and carries the message to the HeNB in response to the message addressed to the HeNB.
  • the SeGW reports only the IPsec tunnel information between the HeNB and the SeGW to the HeNB PF through the T1 interface, and does not need to establish a T1 session;
  • IPsec security tunnel information
  • the HeNB PF reports the tunnel information to the BPCF through the S9* interface, and establishes an S9* interface session.
  • the BPCF determines the Backhaul of the fixed network where the HeNB is located through the tunnel information.
  • This embodiment is a specific example in which a service is initiated and successfully accepted in a HeNB system.
  • the service admission control point is at the HeNB.
  • the HeNB In addition to the existing technologies, such as CSG, ARP, and access mode, the HeNB also integrates the resources of the fixed network. For details, see the process. Description. As shown in Figure 6:
  • the HeNB is powered on, and an IPsec tunnel between the HeNB and the SeGW is established.
  • a T1 session is established between the SeGW and the HeNB PF through the operation of Embodiment 3.
  • the establishment of this T1 session is an optional step.
  • This step is performed when the HeNB is powered on, not every time the service is initiated.
  • the new service is initiated.
  • the initiation of the service may be initiated by the network side, or may be the service requested by the UE to the network side.
  • the related network element (HeNB GW or MME) of the EPS core network sends a "bearer setup request/session management request" message to the HeNB through the S1 interface, and carries information such as QoS policy.
  • the HeNB sends resource request signaling to the HeNB PF through the T2 interface, and requests the resource from the fixed network.
  • the signaling is first arrived at the SeGW through an IPsec channel between the HeNB and the SeGW. If a T1 session is established between the SeGW and the PF in step 601, the SeGW matches the signaling to the appropriate T1 session and sends it to the PF.
  • the SeGW sends the IPsec tunnel information of the signaling to the HeNB PF.
  • the HeNB PF advertises the resource request information sent by the HeNB and the tunnel information sent by the SeGW to the BPCF and its fixed network policy execution device through the S9* interface.
  • the BPCF can find the fixed network backhaul where the HeNB is located through the corresponding session information; if the T1 session and the S9* session are not established in step 601, the BPCF passes the tunnel. Information, find the Backhaul of the fixed network where the HeNB is located
  • the BPCF and the fixed network policy enforcement device check whether the fixed network Backhaul where the HeNB is located can provide the resources requested by the HeNB. If available, allocate resources and return the S9* interface to the PF: The resource allocation was successfully responded.
  • BPCF returns S9* interface to PF: Resource allocation successfully responded.
  • the PF returns a T2* interface to the HeNB: The resource allocation is successfully responded.
  • the HeNB responds according to the successful response returned by the fixed network, and other existing attributes of the service. Such as ARP, CSG and other information, the implementation of the acceptance control of the business.
  • radio resources are allocated between the HeNB and the UE, and a bearer is established.
  • the HeNB returns a "bearer setup response/session management response" to the EPS core network to notify the core network to successfully allocate resources for the service.
  • the present invention also provides another implementation method, and the detailed steps are as follows:
  • the HeNB is powered on, and an IPsec tunnel between the HeNB and the SeGW is established.
  • the new service is initiated, and the initiation of the service may be initiated by the network side, or may be the service requested by the UE to the network side.
  • the related network element (HeNB GW or MME) of the EPS core network sends a "bearer setup request/session management request" message to the HeNB through the S1 interface, and carries information such as QoS policy.
  • the HeNB sends resource request signaling to the HeNB PF through the T2 interface, and requests the resource from the fixed network.
  • the HeNB PF finds a corresponding S9* session according to the security (IPsec) tunnel information; and sends the resource request information to the BPCF and its fixed network policy execution device;
  • IPsec security
  • the resource request information sent by the HeNB and the tunnel information sent by the SeGW are advertised to the BPCF and its fixed network policy execution device through the S9* interface.
  • the BPCF and the fixed network policy enforcement device verify whether the fixed network Backhaul where the HeNB is located can provide the resources requested by the HeNB. If available, allocate resources and return the S9* interface to the PF: The resource allocation was successfully responded.
  • BPCF returns the S9* interface to the PF: The resource allocation is successfully responded.
  • the PF returns a T2* interface to the HeNB: The resource allocation is successfully responded.
  • the HeNB responds according to the successful response returned by the fixed network, and other existing attributes of the service. Such as ARP, CSG and other information, the implementation of the acceptance control of the business.
  • radio resources are allocated between the HeNB and the UE, and a bearer is established.
  • the HeNB returns a "bearer setup response/session management response" to the EPS core network to notify the core network to successfully allocate resources for the service.
  • This embodiment is a specific example in which a service is initiated and rejected in a HeNB system.
  • the service access control point is at the HeNB.
  • the HeNB also integrates the resources of the fixed network. For details, see the process description. As shown in Figure 7:
  • the HeNB is powered on, and an IPsec tunnel between the HeNB and the SeGW is established.
  • a T1 session is established between the SeGW and the HeNB PF through the operation of Embodiment 3.
  • the establishment of this T1 session is an optional step.
  • This step is performed when the HeNB is powered on, not every time the service is initiated.
  • the new service is initiated.
  • the initiation of the service may be initiated by the network side, or may be the service requested by the UE to the network side.
  • the related network element (HeNB GW or MME) of the EPS core network sends a "bearer setup request/session management request" message to the HeNB through the S1 interface, and carries information such as QoS policy.
  • the HeNB sends resource request signaling to the HeNB PF through the T2 interface, and requests the resource from the fixed network.
  • the signaling is first arrived at the SeGW through an IPsec channel between the HeNB and the SeGW. If a T1 session is established between the SeGW and the PF in step 701, the SeGW matches the signaling to the appropriate T1 session and sends it to the PF.
  • the SeGW sends the IPsec tunnel information of the signaling to the HeNB PF.
  • the HeNB PF sends the resource request information sent by the HeNB and the SeGW through the S9* interface.
  • the tunnel information is sent to the BPCF and its fixed network policy enforcement device.
  • the BPCF can find the fixed network backhaul where the HeNB is located through the corresponding session information; if the T1 session and the S9* session are not established in step 701, the BPCF passes the tunnel. Information, determining the Backhaul of the fixed network where the HeNB is located
  • the BPCF and the fixed network policy enforcement device check whether the fixed network Backhaul where the HeNB is located can provide the resources requested by the HeNB. If the resource cannot be allocated, return the S9* interface to the PF: Resource allocation failure response.
  • BPCF returns S9* interface to PF: Resource allocation failure response.
  • the PF returns a T2* interface to the HeNB: Resource allocation failure response.
  • the HeNB refuses to accept the service according to the failure response returned by the fixed network.
  • the HeNB returns a "bearer setup response/session management response" failure notification to the EPS core network.
  • the present invention also provides another implementation method, and the detailed steps are as follows:
  • the HeNB is powered on, and an IPsec tunnel between the HeNB and the SeGW is established.
  • the new service is initiated, and the initiation of the service may be initiated by the network side, or may be the service requested by the UE to the network side.
  • the related network element (HeNB GW or MME) of the EPS core network sends a "bearer setup request/session management request" message to the HeNB through the S1 interface, and carries information such as QoS policy.
  • the HeNB sends resource request signaling to the HeNB PF through the T2 interface, and requests the resource from the fixed network.
  • the HeNB PF finds a corresponding S9* session according to the security (IPsec) tunnel information, and sends the resource request information to the BPCF and its fixed network policy execution device;
  • IPsec security
  • the channel information is advertised to BPCF and its fixed network policy enforcement equipment.
  • the BPCF and the fixed network policy enforcement device verify whether the fixed network Backhaul where the HeNB is located can provide the resources requested by the HeNB. If the resource cannot be allocated, return the S9* interface to the PF: Resource allocation failure response.
  • BPCF returns S9* interface to PF: Resource allocation failure response.
  • the PF returns a T2* interface to the HeNB: Resource allocation failure response.
  • the HeNB refuses to accept the service according to the failure response returned by the fixed network.
  • the HeNB returns a "bearer setup response/session management response" failure notification to the EPS core network.
  • This embodiment is a specific example of resource deactivation in the HeNB system. See the process description for specific operations. As shown in Figure 8:
  • the HeNB is powered on, and an IPsec tunnel between the HeNB and the SeGW is established.
  • a T1 session is established between the SeGW and the HeNB PF through the operation of Embodiment 3.
  • the establishment of this T1 session is an optional step.
  • This step is performed when the HeNB is powered on, not every time the related business operation is performed.
  • Bearer deactivation the initiation of the operation may be initiated by the network side, or may be requested by the UE to the network side.
  • the relevant network element (HeNB GW or MME) of the EPS core network sends a "bearer deactivation request" message to the HeNB through the SI interface, and carries information such as QoS policy.
  • HeNB related mechanism deleting bearers and releasing radio resources.
  • the HeNB sends the resource release request signaling to the HeNB PF through the T2 interface.
  • the signaling is first arrived at the SeGW through an IPsec channel between the HeNB and the SeGW. If a T1 session is established between the SeGW and the PF in step 801, the SeGW matches the signaling to the appropriate T1 session and sends it to the PF. If the T1 session is not established between the SeGW and the PF in step 801, after the signaling arrives at the SeGW, the SeGW sends the IPsec tunnel information of the signaling to the HeNB PF.
  • the HeNB PF advertises the resource release request information sent by the HeNB and the tunnel information sent by the SeGW to the BPCF and its fixed network policy execution device through the S9* interface.
  • the BPCF can find the fixed network backhaul where the HeNB is located through the corresponding session information; if the T1 session and the S9* session are not established in step 801, the BPCF passes the tunnel. Information, find the Backhaul of the fixed network where the HeNB is located
  • the BPCF and the fixed network policy enforcement device reconfigure the fixed network resources according to the signaling, and return the S9* interface to the PF: the resource release response.
  • BPCF returns the S9* interface to the PF: Resource Release Response.
  • the PF returns a T2* interface to the HeNB: a resource release response.
  • the HeNB returns a "bearer setup response/session management response" to the EPS core network to notify the core network that the bearer deactivation is successful.
  • the present invention also provides another implementation method, and the detailed steps are as follows:
  • the HeNB is powered on, and an IPsec tunnel between the HeNB and the SeGW is established.
  • the bearer is deactivated.
  • the initiation of the operation may be initiated by the network side, or may be requested by the UE to the network side.
  • the relevant network element (HeNB GW or MME) of the EPS core network sends a "bearer deactivation request" message to the HeNB through the SI interface, and carries information such as QoS policy.
  • HeNB related mechanism deleting bearers and releasing radio resources.
  • the HeNB sends a resource release request signaling to the HeNB PF through the T2 interface.
  • the HeNB PF finds a corresponding S9* session according to the security (IPsec) tunnel information, and sends the resource release request information to the BPCF and its fixed network policy execution device. Or, the resource release request information sent by the HeNB and the tunnel information sent by the SeGW are advertised to the BPCF and the fixed network policy execution device by using the S9* interface.
  • IPsec security
  • the BPCF and the fixed network policy enforcement device reconfigure the fixed network resources according to the signaling, and return the S9* interface to the PF: the resource release response.
  • BPCF returns the S9* interface to the PF: Resource Release Response.
  • the PF returns a T2* interface to the HeNB: a resource release response.
  • the HeNB returns a "bearer setup response/session management response" to the EPS core network to notify the core network that the activation is successful.
  • This embodiment is a specific example of bearer modification in the HeNB system.
  • the service admission control point is at the HeNB.
  • the HeNB performs bearer modification control, in addition to the factors in the prior art, such as CSG, ARP, and access mode, the resource status of the fixed network is also integrated. For details, see the process description. As shown in Figure 9:
  • the HeNB is powered on, and an IPsec tunnel between the HeNB and the SeGW is established.
  • a T1 session is established between the SeGW and the HeNB PF through the operation of Embodiment 3.
  • the establishment of this T1 session is an optional step.
  • This step is performed when the HeNB is powered on, not when each operation is initiated.
  • the bearer modification is initiated, and the initiation of the service may be initiated by the network side, or may be requested by the UE to the network side.
  • the related network element (HeNB GW or MME) of the EPS core network sends a "bearer modification request/session management request" message to the HeNB through the SI interface, and carries information such as QoS policy.
  • the HeNB sends resource reconfiguration signaling to the HeNB PF through the T2 interface.
  • the signaling is first arrived at the SeGW through an IPsec channel between the HeNB and the SeGW. If a T1 session is established between the SeGW and the PF in step 901, the SeGW matches the signaling to the appropriate T1 session and sends it to the PF. If, in step 901, a T1 session is not established between the SeGW and the PF, after the signaling arrives at the SeGW, the SeGW sends the IPsec tunnel information in which the signaling is located to the HeNB PF.
  • the HeNB PF advertises the resource reconfiguration request information sent by the HeNB and the tunnel information sent by the SeGW to the BPCF and its fixed network policy execution device through the S9* interface.
  • the BPCF can find the fixed network backhaul where the HeNB is located through the corresponding session information; if the T1 session and the S9* session are not established in step 901, the BPCF passes the tunnel. Information, determining the Backhaul of the fixed network where the HeNB is located
  • the BPCF and the fixed network policy enforcement device verify whether the fixed network Backhaul where the HeNB is located can accept the resource reconfiguration operation in the request.
  • BPCF returns S9* interface to PF: Resource reconfiguration success/failure response.
  • the PF returns a T2* interface to the HeNB: Resource Reconfiguration Success/Failure Response.
  • the HeNB accepts/rejects the bearer modification according to the response returned by the fixed network.
  • the HeNB returns a "bearer setup response/session management response" to the EPS core network.
  • the present invention also provides another implementation method, and the detailed steps are as follows:
  • the HeNB is powered on, and an IPsec tunnel between the HeNB and the SeGW is established.
  • the bearer modification is initiated, and the initiation of the service may be initiated by the network side, or may be requested by the UE to the network side.
  • the related network element (HeNB GW or MME) of the EPS core network sends a "bearer modification request/session management request" message to the HeNB through the SI interface, and carries information such as QoS policy.
  • the HeNB sends resource reconfiguration signaling to the HeNB PF through the T2 interface.
  • the HeNB PF finds a corresponding S9* session according to the security (IPsec) tunnel information; and sends the resource reconfiguration request information to the BPCF and its fixed network policy execution device; Or, the resource reconfiguration request information sent by the HeNB and the tunnel information sent by the SeGW are advertised to the BPCF and the fixed network policy execution device by using the S9* interface.
  • IPsec security
  • the BPCF and the fixed network policy enforcement device verify whether the fixed network Backhaul where the HeNB is located can accept the resource reconfiguration operation in the request.
  • BPCF returns S9* interface to PF: Resource reconfiguration success/failure response.
  • the PF returns a T2* interface to the HeNB: Resource Reconfiguration Success/Failure Response.
  • the HeNB accepts/rejects bearer modification according to the response returned by the fixed network.
  • the HeNB returns a "bearer setup response/session management response" to the EPS core network.
  • Embodiment 5 is a diagrammatic representation of Embodiment 5:
  • This embodiment is a specific example of bearer establishment/modification in the HeNB system.
  • the service admission control point is at the HeNB.
  • the HeNB When the HeNB performs bearer setup/modification control, it integrates existing technology factors, such as CSG and ARP, according to the resource status returned by the fixed network, and decides to preempt the resources of the existing service to establish/modify the bearer for the new service. See the process description for specific operations. As shown in Figure 10:
  • the HeNB is powered on, and an IPsec tunnel between the HeNB and the SeGW is established.
  • a T1 session is established between the SeGW and the HeNB PF through the operation of Embodiment 3.
  • the establishment of this T1 session is an optional step.
  • This step is performed when the HeNB is powered on, not when each operation is initiated.
  • the bearer setup/modification initiation may be initiated by the network side or may be requested by the UE to the network side.
  • the relevant network element (HeNB GW or MME) of the EPS core network sends a "bearer setup/modification request/session management request" message to the HeNB through the SI interface, and carries information such as QoS policy.
  • the HeNB sends resource reconfiguration signaling to the HeNB PF through the T2 interface.
  • the signaling is first arrived at the SeGW through an IPsec channel between the HeNB and the SeGW. If a T1 session is established between the SeGW and the PF in step 1001, the SeGW matches the signaling to the appropriate T1 session and sends it to the PF. If, in step 1001, the T1 session is not established between the SeGW and the PF, after the signaling arrives at the SeGW, the SeGW sends the IPsec tunnel information of the signaling to the HeNB PF.
  • the HeNB PF advertises the resource allocation/reconfiguration request information sent by the HeNB and the tunnel information sent by the SeGW to the BPCF and its fixed network policy execution device through the S9* interface.
  • step 1005 If, in step 1001, a T1 session and an S9* session are established, the BPCF can find the fixed network backhaul where the HeNB is located through the corresponding session information; if the T1 session and the S9* session are not established in step 1001, the BPCF passes the tunnel. Information, determine the Backhaul of the fixed network where the HeNB is located
  • the BPCF and the fixed network policy enforcement device check whether the fixed network Backhaul where the HeNB is located can accept the resource establishment/reconfiguration operation in the request.
  • One scenario is that the fixed network cannot provide the resources required for the service request.
  • BPCF returns the S9* interface to the PF: The resource reconfiguration response, and may return the fixed network resource status to the PF.
  • the PF returns a T2* interface to the HeNB: a resource reconfiguration response, and may return the resource status of the fixed network to the HeNB.
  • the HeNB combines the factors in the prior art, such as CSG, ARP, etc., according to the response returned by the fixed network, and decides to preempt the resources of the existing service to establish/modify the bearer for the new service.
  • the HeNB informs the PF resource that the PF resource is preempted through the T2 interface.
  • the PF informs the BPCF resource that it is preempted through the S9* interface.
  • the HeNB returns a "bearer setup response/session management response" to the EPS core network.
  • the present invention also provides another implementation method, and the detailed steps are as follows:
  • the HeNB is powered on, and an IPsec tunnel between the HeNB and the SeGW is established. Only the IPsec tunnel information is transmitted between the SeGW and the HeNB PF through the operation of FIG. This step is performed when the HeNB is powered on, not when each operation is initiated.
  • Bearer setup/modification initiation the initiation of the service may be initiated by the network side, or may be requested by the UE to the network side.
  • the relevant network element (HeNB GW or MME) of the EPS core network sends a "bearer setup/modification request/session management request" message to the HeNB through the SI interface, and carries information such as QoS policy.
  • the HeNB sends resource reconfiguration signaling to the HeNB PF through the T2 interface.
  • the HeNB PF finds a corresponding S9* session according to the security (IPsec) tunnel information; and sends the resource allocation/reconfiguration reconfiguration request information to the BPCF and its fixed network policy execution device;
  • IPsec security
  • the resource allocation/reconfiguration request information sent by the HeNB and the tunnel information sent by the SeGW are advertised to the BPCF and its fixed network policy execution device through the S9* interface.
  • the BPCF and the fixed network policy enforcement device verify whether the fixed network Backhaul where the HeNB is located can accept the resource establishment/reconfiguration operation in the request.
  • One scenario is that the fixed network cannot provide the resources required for the service request.
  • BPCF returns the S9* interface to the PF: The resource reconfiguration response, and may return the resource status of the fixed network to the PF.
  • the PF returns a T2* interface to the HeNB: a resource reconfiguration response, and may return the resource status of the fixed network to the HeNB.
  • the HeNB combines the factors in the prior art, such as CSG, ARP, etc., according to the response returned by the fixed network, and decides to preempt the resources of the existing service to establish/modify the bearer for the new service.
  • the HeNB informs the PF resource that it is preempted through the T2 interface.
  • the PF informs the BPCF resource that it is preempted through the S9* interface.
  • the HeNB returns a "bearer setup response/session management response" to the EPS core network.
  • the S9* session is an interworking policy between the HeNB PF in the 3GPP access system and the BPCF in the BBF access network.
  • the S9* session is only a specific name. Of course, other names can be used.
  • it is referred to as an "interworking policy session" in the present invention, and the corresponding S9* interface is called an interworking policy interface.
  • the session between BNG/BRAS and BPCF can be implemented using different protocols, and the name of the interworking is referred to as a "fixed network policy session" in the present invention.
  • HeNB evolved home base station
  • HNB home base station
  • the "home base station” in the present invention covers the HeNB and the HNB.
  • the foregoing embodiments of the present invention solve the problem that the total requirement of the user equipment that cannot share the same subscription fixed network line but selects different PCRFs in the related art does not exceed the subscription QoS guarantee of the contracted fixed network line.
  • QoS control can be performed on all UEs accessed through the home base station, so that the total QoS requirement does not exceed the QoS that the fixed base line accessed by the home base station can provide.
  • modules or steps of the present invention can be implemented by a general-purpose computing device, which can be concentrated on a single computing device or distributed over a network composed of multiple computing devices. Alternatively, they may be implemented by program code executable by the computing device, such that they may be stored in the storage device by the computing device and, in some cases, may be different from the order herein.
  • the steps shown or described are performed, or they are separately fabricated into individual integrated circuit modules, or a plurality of modules or steps are fabricated as a single integrated circuit module.
  • the invention is not limited to any particular combination of hardware and software.
  • the present invention provides a method and system for controlling service admission, improving system control service acceptance performance, and improving system resource management capabilities.
  • the problem that the total requirement of the user equipment in the related art that cannot share the same fixed-line fixed line but selects different PCRFs does not exceed the contracted QoS guarantee of the contracted fixed line is solved.
  • the service admission management and resource management in the HeNB scenario and the resource management when the HNB accesses the scenario are implemented by the method and the system of the present invention.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

L'invention porte sur un procédé et un système de contrôle d'admission à un service, qui améliorent l'accomplissement du contrôle d'admission à un service du système. Le procédé comprend les opérations suivantes : une passerelle de sécurité transmet des informations d'un tunnel de sécurité entre une station de base domestique (HB) et la passerelle de sécurité et une requête de reconfiguration de ressources déclenchée par la HB après que la HB a reçu des informations de politique envoyées par un côté réseau sans fil, à l'entité à fonction de commande de politique de la HB; l'entité à fonction de politique de la HB notifie les informations du tunnel de sécurité et la requête de reconfiguration de ressources à une entité à fonction de commande de politique d'un réseau fixe, l'entité à fonction de commande de politique du réseau fixe détermine si la liaison de réseau fixe correspondant aux informations du tunnel de sécurité satisfait ou non un contenu de la requête de reconfiguration de ressources, et renvoie le résultat de détermination à la HB, et la HB prend une décision de contrôle d'admission conformément au résultat de détermination.
PCT/CN2011/076703 2010-07-09 2011-06-30 Procédé et système de contrôle d'admission à un service WO2012003781A1 (fr)

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
CN201010225420 2010-07-09
CN201010225420.1 2010-07-09
CN201010265934.XA CN102316529B (zh) 2010-07-09 2010-08-19 一种控制业务接纳的方法及系统
CN201010265934.X 2010-08-19

Publications (1)

Publication Number Publication Date
WO2012003781A1 true WO2012003781A1 (fr) 2012-01-12

Family

ID=45429264

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2011/076703 WO2012003781A1 (fr) 2010-07-09 2011-06-30 Procédé et système de contrôle d'admission à un service

Country Status (2)

Country Link
CN (1) CN102316529B (fr)
WO (1) WO2012003781A1 (fr)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104113889A (zh) * 2014-07-10 2014-10-22 京信通信系统(中国)有限公司 一种基于回传通道的连接建立的方法及装置
WO2022027478A1 (fr) * 2020-08-06 2022-02-10 Lenovo (Beijing) Limited Procédé et appareil de transfert

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103491028A (zh) * 2013-09-05 2014-01-01 北京创毅讯联科技股份有限公司 一种在企业网内进行语音业务的方法和企业网系统
CN108366380A (zh) * 2017-01-26 2018-08-03 中兴通讯股份有限公司 一种支持多归属协议数据单元会话的策略控制方法及装置
CN110048951B (zh) * 2018-01-16 2020-11-27 中国移动通信有限公司研究院 一种pcf寻址方法及装置、设备、存储介质

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101437223A (zh) * 2007-11-16 2009-05-20 华为技术有限公司 一种家庭基站接入的方法、系统和装置
WO2010050612A1 (fr) * 2008-10-30 2010-05-06 Nec Corporation Procédé de communication avec équipement utilisateur et nœud b (évolué) domestique pour minimiser un impact d'extension de réseau d'accès

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101437223A (zh) * 2007-11-16 2009-05-20 华为技术有限公司 一种家庭基站接入的方法、系统和装置
WO2010050612A1 (fr) * 2008-10-30 2010-05-06 Nec Corporation Procédé de communication avec équipement utilisateur et nœud b (évolué) domestique pour minimiser un impact d'extension de réseau d'accès

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104113889A (zh) * 2014-07-10 2014-10-22 京信通信系统(中国)有限公司 一种基于回传通道的连接建立的方法及装置
CN104113889B (zh) * 2014-07-10 2017-09-26 京信通信系统(中国)有限公司 一种基于回传通道的连接建立的方法及装置
WO2022027478A1 (fr) * 2020-08-06 2022-02-10 Lenovo (Beijing) Limited Procédé et appareil de transfert

Also Published As

Publication number Publication date
CN102316529A (zh) 2012-01-11
CN102316529B (zh) 2015-06-03

Similar Documents

Publication Publication Date Title
US11991761B2 (en) Request to establish protocol data unit session with time sensitive network parameters
CN114008980A (zh) 用于非公共网络的收费控制
WO2011060673A1 (fr) Procédé d'établissement de support public, procédé de transmission de données et appareil du côté du cœur de réseau
WO2011134329A1 (fr) Procédé et système pour transmettre des paquets de données de petite taille
CN102511145B (zh) 策略与计费控制的实现方法、系统及相应设备
WO2012065499A1 (fr) Procédé et système d'établissement d'un contrôle de qualité de service
WO2012003781A1 (fr) Procédé et système de contrôle d'admission à un service
CN102131240B (zh) 一种实现服务质量控制的方法及系统
US8874079B2 (en) Control method for home base station access and home base station gateway
WO2013082987A1 (fr) Procédé et système permettant d'effectuer une commande de ressources sur des données allégées locales
WO2014071790A1 (fr) Procédé, dispositif et système destinés à un contrôle de politique d'une convergence fixe-mobile
WO2007033612A1 (fr) Systeme et procede de commande de ressource du reseau d'acces
WO2012024997A1 (fr) Procédé et système adaptés pour contrôler l'admission à un service
CN101296172B (zh) 一种分布式会话边缘控制装置、系统及方法
WO2012152198A1 (fr) Procédé et système de suppression de session de politique
CN102457974B (zh) 一种业务接纳控制方法和系统
CN102238648B (zh) 家用基站接入的控制方法及系统
WO2013075580A1 (fr) Procédé et système de commande de ressource de données de déchargement local
CN102547884B (zh) 一种基站间切换资源控制的方法
WO2024179311A1 (fr) Procédé de communication inter-domaine et dispositif de communication

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 11803135

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 11803135

Country of ref document: EP

Kind code of ref document: A1

点击 这是indexloc提供的php浏览器服务,不要输入任何密码和下载