CN101795478B - Method for data bypass, network side equipment and access gateway - Google Patents
Method for data bypass, network side equipment and access gateway Download PDFInfo
- Publication number
- CN101795478B CN101795478B CN2010101387808A CN201010138780A CN101795478B CN 101795478 B CN101795478 B CN 101795478B CN 2010101387808 A CN2010101387808 A CN 2010101387808A CN 201010138780 A CN201010138780 A CN 201010138780A CN 101795478 B CN101795478 B CN 101795478B
- Authority
- CN
- China
- Prior art keywords
- ggsn
- request message
- apn
- service
- iad
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Landscapes
- Mobile Radio Communication Systems (AREA)
Abstract
The embodiment of the invention provides a method for a data bypass, network side equipment and an access gateway. The method for the data bypass comprises the following steps that: the network side equipment receives a first request message sent by user equipment; after determining that an access point name in the first request message is the access point name of an identification bypass service, the network side equipment changes the access point name of the identification bypass service into the access point name pointing to a GGSN; and the network side equipment sends a second request message which carries the access point name pointing to the GGSN to the GGSN so as to establish a channel between the access gateway and the GGSN, wherein the GGSN is the GGSN deployed together with the access gateway or the GGSN integrated with the access gateway. The embodiment of the invention realizes the data bypass supporting function of the access gateway.
Description
Technical field
The embodiment of the invention relates to communication technical field, relates in particular to a kind of method, network equipment and IAD of data bypass.
Background technology
Access point (Access Point; Hereinafter to be referred as: AP) be based on fixed Internet Protocol (InternetProtocol; Hereinafter to be referred as IP) transmission network, the network equipment of wireless access service is provided for family or enterprise.
Subscriber equipment (User Equipment; Hereinafter to be referred as: UE) can insert AP through eating dishes without rice or wine, AP is through home gateway (Home Gateway; Hereinafter to be referred as: HGW) insert the IP transmission network, be connected to security gateway (the Security Gateway in the mobile core network through the IP transmission network then; Hereinafter to be referred as: SeGW), be connected to IAD (Access Gateway; Hereinafter to be referred as: AG), AG is connected to circuit switching (Circuit Switched then; Hereinafter to be referred as: CS) domain core net and packet switching (Packet Switched; Hereinafter to be referred as: PS) domain core net.
If UE then will be through ggsn (the Gateway General Packet Radio Service Support Node of PS domain core net through the AP access internet; Hereinafter to be referred as: GGSN) the Gi interface of network element connects the internet.
Existing data bypass scheme generally all is to realize through the Gi interface that AP provides, and promptly by AP Gi is provided interface, and UE visits home network through the Gi interface of AP then, perhaps direct access internet; At this moment; The data flow of UE visit home network or internet need not passed through mobile core network, and promptly the data flow of UE visit home network or internet is no longer passed through GGSN and service universal grouping wireless business supporting node (Service General Packet Radio Service SupportNode; Hereinafter to be referred as: SGSN), reached the purpose of data bypass.
But existing data bypass scheme generally all is to realize through the Gi interface that AP provides, and prior art does not provide a kind of method that realizes data bypass through AG; In addition, existing scheme through AP realization data bypass is not supported bypass flow is carried out Lawful intercept, does not support bypass flow is chargeed yet.
Summary of the invention
The embodiment of the invention provides a kind of method, network equipment and IAD of data bypass, supports the function of data bypass to realize IAD.
The embodiment of the invention provides a kind of method of data bypass, comprising:
Network equipment receives first request message that subscriber equipment sends, and said first request message carries the APN of sign pass-through service;
Said network equipment confirms that the Access Point Name in said first request message is called after the APN that identifies pass-through service, the APN of said sign pass-through service is revised as the APN of sensing ggsn GGSN;
Said network equipment sends second request message to said GGSN, and said second request message carries the APN of said sensing GGSN, so that set up the tunnel between IAD and the said GGSN; Said GGSN for IAD unite deployment GGSN or with the integrated GGSN of said IAD.
The embodiment of the invention also provides a kind of network equipment, comprising:
Receiver module is used to receive first request message that subscriber equipment sends, and said first request message carries the APN of sign pass-through service;
Determination module, the Access Point Name that is used for first request message of definite said receiver module reception is called the APN that identifies pass-through service;
Modified module; Be used for after said determination module confirms that the Access Point Name of first request message that said receiver module receives is called the APN that identifies pass-through service, the APN of said sign pass-through service being revised as the APN of sensing ggsn GGSN;
Sending module is used for sending second request message to said GGSN, and said second request message carries the APN of said sensing GGSN, so that set up the tunnel between IAD and the said GGSN; Said GGSN for IAD unite deployment GGSN or with the integrated GGSN of said IAD.
The embodiment of the invention also provides a kind of method of data bypass, comprising:
Receive first request message that service universal grouping wireless business supporting node SGSN sends, said first request message carries the APN of sign pass-through service; Said first request message is that said SGSN receives said first request message that subscriber equipment sends, and confirms that Access Point Name in said first request message is called transmission after the APN that identify pass-through service;
Send second request message to ggsn GGSN, said second request message carries the APN of said sign pass-through service;
Receive said GGSN that send with the said second request message corresponding response message, said response message is sent to said SGSN, so that set up the tunnel between IAD and the said GGSN; Said GGSN for IAD unite deployment GGSN or with the integrated GGSN of said IAD.
The embodiment of the invention also provides a kind of IAD, comprising:
The message sink module is used to receive first request message that service universal grouping wireless business supporting node SGSN sends, and said first request message carries the APN of sign pass-through service; Said first request message is that said SGSN receives said first request message that subscriber equipment sends, and confirms that Access Point Name in said first request message is called transmission after the APN that identify pass-through service;
Message transmission module is used for sending second request message to ggsn GGSN, and said second request message carries the APN of said sign pass-through service;
Said message sink module, also be used to receive said GGSN that send with the said second request message corresponding response message;
Said message transmission module also is used for said response message is sent to said SGSN, so that set up the tunnel between IAD and the said GGSN; Said GGSN for IAD unite deployment GGSN or with the integrated GGSN of said IAD.
Pass through the embodiment of the invention; IAD or service universal grouping wireless business supporting node confirm that the Access Point Name in first request message is called after the APN that identifies pass-through service; Send second request message to GGSN, so that set up the tunnel between IAD and the GGSN; Wherein, this GGSN for IAD unite deployment GGSN or with the integrated GGSN of IAD.Thereby IAD can with bypass flow directly send to IAD unite deployment GGSN or with the integrated GGSN of IAD; By above-mentioned GGSN bypass flow is sent to home network or internet again; Realized that IAD supports the function of data bypass, and realized pass-through service is chargeed and/or the function of Lawful intercept.
Description of drawings
In order to be illustrated more clearly in the embodiment of the invention or technical scheme of the prior art; To do one to the accompanying drawing of required use in embodiment or the description of the Prior Art below introduces simply; Obviously, the accompanying drawing in describing below is some embodiments of the present invention, for those of ordinary skills; Under the prerequisite of not paying creative work, can also obtain other accompanying drawing according to these accompanying drawings.
Fig. 1 is the flow chart of the method embodiment one of data bypass of the present invention;
Fig. 2 is the flow chart of the method embodiment two of data bypass of the present invention;
Fig. 3 is the flow chart of the method embodiment three of data bypass of the present invention;
Fig. 4 is the flow chart of the method embodiment four of data bypass of the present invention;
Fig. 5 is the flow chart of the method embodiment five of data bypass of the present invention;
Fig. 6 is the structural representation of network equipment embodiment one of the present invention;
Fig. 7 is the structural representation of IAD embodiment one of the present invention;
Fig. 8 is the sketch map of the system embodiment one of data bypass of the present invention.
Embodiment
For the purpose, technical scheme and the advantage that make the embodiment of the invention clearer; To combine the accompanying drawing in the embodiment of the invention below; Technical scheme in the embodiment of the invention is carried out clear, intactly description; Obviously, described embodiment is the present invention's part embodiment, rather than whole embodiment.Based on the embodiment among the present invention, the every other embodiment that those of ordinary skills are obtained under the prerequisite of not making creative work belongs to the scope that the present invention protects.
Fig. 1 is the flow chart of the method embodiment one of data bypass of the present invention, and as shown in Figure 1, the method for this data bypass can comprise:
In the present embodiment, this first request message can be for activating packet data protocol (Packet DataProtocol; Hereinafter to be referred as: PDP) context request message.
Particularly, network equipment can compare the APN of APN in first request message and pre-configured sign pass-through service; If the APN in this first request message is identical with the APN of pre-configured sign pass-through service, can confirm that then the Access Point Name in first request message is called the APN that identifies pass-through service.
In the present embodiment, network equipment this locality disposes the IP address corresponding with the APN that points to GGSN, the IP address that this IP address is this GGSN; According to the APN of above-mentioned sensing GGSN, network equipment can obtain the IP address of this GGSN.
In the present embodiment, like no specified otherwise, GGSN for IAD unite deployment GGSN or with the integrated GGSN of IAD, as shown in Figure 8, the GGSN 85 among Fig. 8 be with IAD unite deployment GGSN or with the integrated GGSN of IAD.Wherein, the GGSN that unites deployment with IAD comprises and the direct-connected GGSN of IAD, perhaps, and the GGSN that is connected through router or switch with IAD.
In the present embodiment, network equipment can be SGSN or IAD.When this network equipment is IAD; To GGSN send second request message can for: IAD sends to service universal grouping wireless business supporting node SGSN through the APN that first request message will point to GGSN; So that this SGSN sends second request message according to the APN that points to GGSN to GGSN.Wherein, according to the APN that points to GGSN, SGSN can obtain the IP address of this GGSN, and then SGSN can send second request message to this GGSN according to the IP address of this GGSN.
In the present embodiment, the tunnel between IAD and the GGSN can be a direct tunnel (Directtunnel), and promptly through this tunnel, IAD can directly send to GGSN with bypass flow, and bypass flow does not need to pass through SGSN again like this.
GGSN in the present embodiment can charge and/or Lawful intercept to pass-through service.Particularly, GGSN can add up the charge information of pass-through service, generates call detail record according to this charge information, and through charging gateway function body this call detail record is sent to charge system; And/or,
GGSN can receive the control information of intercepting of Lawful interception gateway transmission, and according to the communication information of intercepting control information listen for user equipment, and the communication information of this subscriber equipment that will listen to sends to above-mentioned Lawful interception gateway; Above-mentionedly intercept control information and comprise and monitor to activate, monitor and close or status poll.
In the present embodiment, above-mentioned second request message can be for creating the PDP Context request message.
In the foregoing description; IAD or SGSN confirm that the Access Point Name in first request message is called after the APN that identifies pass-through service; The APN of sign pass-through service is revised as the APN that points to GGSN; And send second request message to GGSN, to set up the tunnel between IAD and the GGSN; Wherein, this GGSN for IAD unite deployment GGSN or with the integrated GGSN of IAD.Thereby IAD can with bypass flow directly send to IAD unite deployment GGSN or with the integrated GGSN of IAD; By above-mentioned GGSN bypass flow is sent to home network or internet again, realized the function of IAD support data bypass; And the foregoing description has been realized pass-through service is chargeed and/or the function of Lawful intercept.
Fig. 2 is the flow chart of the method embodiment two of data bypass of the present invention, and present embodiment is a PDP context activating request message with first request message, and second request message is that example describes for creating the PDP Context request message.
As shown in Figure 2, the method for this data bypass can comprise:
Step 201 when UE has business to initiate, is sent PDP context activating request message to AG, and this PDP context activating request message is carried APN (the AccessPoint Name of sign pass-through service; Hereinafter to be referred as: APN) visit pass-through service.
Step 202, AG confirms after the APN of APN for the sign pass-through service in the PDP context activating request message APN that identifies pass-through service to be revised as the APN that points to GGSN, execution in step 203.
Particularly, AG can compare the APN of APN in the PDP context activating request message and pre-configured sign pass-through service; If the APN in this PDP context activating request message is identical with the APN of pre-configured sign pass-through service, can confirm that then the APN in the PDP context activating request message is the APN of sign pass-through service.
In the present embodiment, AG this locality disposes the IP address corresponding with the APN that points to GGSN, the IP address that this IP address is this GGSN.
In the present embodiment, like no specified otherwise, GGSN for AG unite deployment GGSN or with the integrated GGSN of AG, as shown in Figure 8, the GGSN 85 among Fig. 8 be with IAD unite deployment GGSN or with the integrated GGSN of IAD.Wherein, the GGSN that unites deployment with AG comprises the direct-connected GGSN with AG, perhaps, and the GGSN that is connected through router or switch with AG.
In addition; If it is not the APN of sign pass-through service that AG confirms the APN in the PDP context activating request message; Then AG can handle this PDP context activating request message according to normal flow; This PDP context activating request message is passed through SGSN, and carry out flow according to normal PDP context activation flow process.
Step 203, AG sends to SGSN with PDP context activating request message, and this PDP context activating request message is carried the APN that points to GGSN.
Step 204, SGSN carries out the user signing contract information inspection according to the APN in the PDP context activating request message; After the user signing contract information inspection of APN in this PDP context activating request message through SGSN, SGSN selects GGSN according to the APN in the PDP context activating request message, sends to the GGSN that selects then and creates the PDP Context request message.
In the present embodiment, user signing contract information comprises wildcard APN (wild card APN), can be through the user signing contract information inspection of SGSN so point to the APN of GGSN in the PDP context activating request message.In PDP context activating request message, point to after the user signing contract information inspection of APN of GGSN through SGSN; SGSN can be according to the APN that points to GGSN in the PDP context activating request message; Select with AG unite deployment GGSN or with the integrated GGSN of AG; And, send to the GGSN that selects according to the IP address that obtains then and create the PDP Context request message according to the IP address that the APN that points to GGSN obtains this GGSN.
Step 205, GGSN sends to SGSN and creates the PDP Context response message.
Step 206, optional, SGSN triggers and sets up RAB (Radio Access Bearer; Hereinafter to be referred as: process RAB).
Step 207, SGSN confirms to have opened direct tunnel (Direct tunnel) function, and SGSN sends to GGSN and upgrades the PDP Context request message, so that set up the tunnel between AG and the GGSN.In the present embodiment, the tunnel between AG and the GGSN is a direct tunnel (Direct tunnel), and promptly through this tunnel, AG can directly send to GGSN with bypass flow, and bypass flow does not need to pass through SGSN again like this.
Step 208, GGSN sends to SGSN and upgrades the PDP Context response message.
Step 209, SGSN sends PDP context activating to UE and accepts message.
At this moment, AP can send to AG with bypass flow, by AG this bypass flow is sent to GGSN again, by GGSN bypass flow is sent to home network or internet then.
In the foregoing description; AG confirms after the APN of APN for the sign pass-through service in the PDP context activating request message; The APN of sign pass-through service is revised as the APN that points to GGSN; And transmit PDP context activating request message to SGSN, setting up the tunnel between AG and the GGSN, this GGSN for IAD unite deployment GGSN or with the integrated GGSN of IAD.Thereby IAD can with bypass flow directly send to IAD unite deployment GGSN or with IAD integrated GGSN, by above-mentioned GGSN bypass flow is sent to home network or internet again, realized that AG supports the function of data bypass; And uniting the GGSN of deployment with IAD or can also realize pass-through service is chargeed and/or the function of Lawful intercept in the foregoing description further, with the integrated GGSN of IAD.
Fig. 3 is the flow chart of the method embodiment three of data bypass of the present invention, and present embodiment is a PDP context activating request message with first request message, and second request message is that example describes for creating the PDP Context request message.
As shown in Figure 3, the method for this data bypass can comprise:
Step 301 when UE has business to initiate, is sent PDP context activating request message to SGSN, and the APN that this PDP context activating request message is carried the sign pass-through service visits pass-through service.
Step 302, SGSN confirms the APN of sign pass-through service to be revised as the APN of sensing GGSN after the APN of APN for the sign pass-through service in the PDP context activating request message.
Particularly, SGSN can compare the APN of APN in the PDP context activating request message and pre-configured sign pass-through service; If the APN in this PDP context activating request message is identical with the APN of pre-configured sign pass-through service, can confirm that then the APN in the PDP context activating request message is the APN of sign pass-through service.
In the present embodiment, SGSN this locality disposes the IP address corresponding with the APN that points to GGSN, the IP address that this IP address is this GGSN.
In the present embodiment, like no specified otherwise, GGSN for AG unite deployment GGSN or with the integrated GGSN of AG, as shown in Figure 8, the GGSN 85 among Fig. 8 be with IAD unite deployment GGSN or with the integrated GGSN of IAD.Wherein, the GGSN that unites deployment with AG comprises the direct-connected GGSN with AG, perhaps, and the GGSN that is connected through router or switch with AG.
In addition; If it is not the APN of sign pass-through service that SGSN confirms the APN in the PDP context activating request message; Then SGSN can handle this PDP context activating request message according to normal flow; GGSN in core net sends and creates the PDP Context request message, and carries out flow according to normal PDP context activation flow process.
Step 303, SGSN carries out the user signing contract information inspection according to the APN in the PDP context activating request message; After the user signing contract information inspection of APN in this PDP context activating request message through SGSN, SGSN selects GGSN according to the APN in the PDP context activating request message, sends to the GGSN that selects then and creates the PDP Context request message.
In the present embodiment, user signing contract information comprises wild card APN, can be through the user signing contract information inspection of SGSN so point to the APN of GGSN in the PDP context activating request message.After the user signing contract information inspection of APN in PDP context activating request message through SGSN; SGSN can be according to the APN that points to GGSN in the PDP context activating request message; Select with AG unite deployment GGSN or with the integrated GGSN of AG; And, send to the GGSN that selects according to the IP address that obtains then and create the PDP Context request message according to the IP address that the APN that points to GGSN obtains this GGSN.
Step 304, GGSN sends to SGSN and creates the PDP Context response message.
Step 305, optional, SGSN triggers the process of setting up RAB.
Step 306, SGSN confirms to have opened the direct tunnel function, and SGSN sends to GGSN and upgrades the PDP Context request message, to set up the tunnel between AG and the GGSN.In the present embodiment, the tunnel between AG and the GGSN is a direct tunnel, and promptly through this tunnel, AG can directly send to GGSN with bypass flow, and bypass flow does not need to pass through SGSN again like this.
Step 307, GGSN sends to SGSN and upgrades the PDP Context response message.
Step 308, SGSN sends PDP context activating to UE and accepts message.
At this moment, AP can send to AG with bypass flow, by AG this bypass flow is sent to GGSN again, by GGSN bypass flow is sent to home network or internet then.
In the foregoing description; SGSN confirms after the APN of APN for the sign pass-through service in the PDP context activating request message; The APN of sign pass-through service is revised as the APN that points to GGSN; And send to create the PDP Context request message to GGSN, setting up the tunnel between AG and the GGSN, this GGSN for IAD unite deployment GGSN or with the integrated GGSN of IAD.Thereby IAD can with bypass flow directly send to IAD unite deployment GGSN or with IAD integrated GGSN, by above-mentioned GGSN bypass flow is sent to home network or internet again, realized that AG supports the function of data bypass; And uniting the GGSN of deployment with IAD or can also realize pass-through service is chargeed and/or the function of Lawful intercept in the foregoing description further, with the integrated GGSN of IAD.
Fig. 2 of the present invention and the AG that not only realized embodiment illustrated in fig. 3 support the function of data bypass; Further; Fig. 2 of the present invention and embodiment illustrated in fig. 3 in; Unite the GGSN of deployment with IAD or can also realize pass-through service is carried out Lawful intercept and pass-through service is chargeed, and can realize real time billing with the integrated GGSN of IAD.Particularly, GGSN can add up the charge information of pass-through service, generates call detail record (Calling Detail Records according to this charge information; Hereinafter to be referred as: CDR), GGSN sends to Charging Gateway Functionality (Charging Gateway Function with CDR then; Hereinafter to be referred as: CGF) entity sends to charge system by the CGF entity with this CDR again, thereby realizes pass-through service is chargeed.
In addition, GGSN can receive Lawful interception gateway (Lawful Interception Gateway; Hereinafter to be referred as: that LIG) sends intercepts control information, and intercepts the communication information that UE is intercepted in control information according to this, and the communication information of this UE that will listen to sends to LIG; Above-mentionedly intercept control information and comprise and monitor to activate, monitor and close or status poll; Thereby realized pass-through service is carried out Lawful intercept.
Fig. 4 is the flow chart of the method embodiment four of data bypass of the present invention, and as shown in Figure 4, the method for this data bypass can comprise:
Step 401 receives first request message that SGSN sends, and this first request message carries the APN of sign pass-through service; This first request message is that SGSN receives first request message that subscriber equipment sends, and confirms that Access Point Name in this first request message is called transmission after the APN that identify pass-through service.
Particularly, SGSN can compare the APN of APN in first request message and pre-configured sign pass-through service; If the APN in first request message is identical with the APN of pre-configured sign pass-through service, then SGSN can confirm that the Access Point Name in this first request message is called the APN that identifies pass-through service.Then, SGSN sends to IAD with this first request message.
In the present embodiment, first request message can be PDP context activating request message.
Step 402 is sent second request message to GGSN, and this second request message carries the APN of sign pass-through service.
In the present embodiment, like no specified otherwise, GGSN for IAD unite deployment GGSN or with the integrated GGSN of IAD, as shown in Figure 8.Wherein, the GGSN that unites deployment with IAD comprises and the direct-connected GGSN of IAD, perhaps, and the GGSN that is connected through router or switch with IAD.
In the present embodiment; GGSN receives after second request message of IAD transmission; To send to this IAD with this second request message corresponding response message; This IAD can send to SGSN with the response message that receives then, so that set up the tunnel between IAD and the GGSN; Further, also being convenient to this GGSN charges and/or Lawful intercept to pass-through service.
In the present embodiment, the tunnel between IAD and the GGSN is a direct tunnel (Directtunnel), and promptly through this tunnel, IAD can directly send to GGSN with bypass flow, and bypass flow does not need to pass through SGSN again like this.
GGSN in the present embodiment can charge and/or Lawful intercept to pass-through service.Particularly, GGSN can add up the charge information of pass-through service, generates call detail record according to this charge information, and through charging gateway function body this call detail record is sent to charge system; And/or,
GGSN can receive the control information of intercepting of Lawful interception gateway transmission, and intercepts the communication information of control information listen for user equipment according to this, and the communication information of this subscriber equipment that will listen to sends to above-mentioned Lawful interception gateway; Above-mentionedly intercept control information and comprise and monitor to activate, monitor and close or status poll.
In the present embodiment, second request message can be for creating the PDP Context request message.
In the foregoing description, IAD receives after first request message of SGSN transmission, sends second request message to GGSN, to set up the tunnel between IAD and the GGSN; Wherein, first request message is that SGSN confirms that Access Point Name in first request message sends after being called the APN that identifies pass-through service, GGSN for IAD unite deployment GGSN or with the integrated GGSN of IAD.Thereby IAD can with bypass flow directly send to IAD unite deployment GGSN or with the integrated GGSN of IAD; By above-mentioned GGSN bypass flow is sent to home network or internet again, realized the function of IAD support data bypass; And the foregoing description has been realized pass-through service is chargeed and/or the function of Lawful intercept.
Fig. 5 is the flow chart of the method embodiment five of data bypass of the present invention, and present embodiment is a PDP context activating request message with first request message, and second request message is that example describes for creating the PDP Context request message.
As shown in Figure 5, the method for this data bypass can comprise:
Step 501 when UE has business to initiate, is sent PDP context activating request message to SGSN, and the APN that this PDP context activating request message is carried the sign pass-through service visits pass-through service.
Step 502, SGSN carries out the user signing contract information inspection according to the APN in the PDP context activating request message.
In the present embodiment, user signing contract information comprises wild card APN, so the APN in the PDP context activating request message can be through the user signing contract information inspection of SGSN.
Step 503, SGSN confirms after the APN of APN for the sign pass-through service in the PDP context activating request message, sends to AG and creates the PDP Context request message.
Particularly, SGSN can compare the APN of APN in the PDP context activating request message and pre-configured sign pass-through service; If the APN in this PDP context activating request message is identical with the APN of pre-configured sign pass-through service, can confirm that then the APN in the PDP context activating request message is the APN of sign pass-through service.After the APN of APN in confirming PDP context activating request message for the sign pass-through service, SGSN sends to AG and creates the PDP Context request message.
In the present embodiment, like no specified otherwise, GGSN for AG unite deployment GGSN or with the integrated GGSN of AG, as shown in Figure 8, the GGSN 85 among Fig. 8 be with IAD unite deployment GGSN or with the integrated GGSN of IAD.Wherein, the GGSN that unites deployment with AG comprises the direct-connected GGSN with AG, perhaps, and the GGSN that is connected through router or switch with AG.
In addition; If it is not the APN of sign pass-through service that SGSN confirms the APN in the PDP context activating request message; Then SGSN can handle this PDP context activating request message according to normal flow; GGSN in core net sends and creates the PDP Context request message, and carries out flow according to normal PDP context activation flow process.
Step 504, AG sends to GGSN and creates the PDP Context request message.
Step 505, GGSN sends to AG and creates the PDP Context response message.
Step 506, AG sends to SGSN and creates the PDP Context response message.
Step 507, optional, SGSN triggers the process of setting up RAB.
Step 508, the direct tunnel function has been opened in the SGSN judgement, and SGSN sends to AG and upgrades the PDP Context request message, so that set up the tunnel between AG and the GGSN.In the present embodiment, the tunnel between AG and the GGSN is a direct tunnel, and promptly through this tunnel, AG can directly send to GGSN with bypass flow, and bypass flow does not need to pass through SGSN again like this.
Step 509, AG sends to GGSN and upgrades the PDP Context request message.
Step 510, GGSN sends to AG and upgrades the PDP Context response message.
Step 511, AG sends to SGSN and upgrades the PDP Context response message.
Step 512, SGSN sends PDP context activating to UE and accepts message.
At this moment, AP can send to AG with bypass flow, by AG this bypass flow is sent to GGSN again, by GGSN bypass flow is sent to home network or internet then.
In the foregoing description; After the APN of APN in the PDP context activating request message that SGSN confirms to receive for the sign pass-through service, send establishment PDP Context request message to AG, AG sends to GGSN and creates the PDP Context request message then; So that set up the tunnel between AG and the GGSN; Wherein, GGSN for AG unite deployment GGSN or with the integrated GGSN of AG, thereby IAD can with bypass flow directly send to IAD unite deployment GGSN or with the integrated GGSN of IAD; By above-mentioned GGSN bypass flow is sent to home network or internet again, realized the function of IAD support data bypass; And further; Uniting the GGSN of deployment with IAD or can also realize pass-through service is chargeed and/or the function of Lawful intercept in the foregoing description with the integrated GGSN of IAD; Wherein, This GGSN charges to pass-through service and/or the operation of Lawful intercept, with Fig. 2 of the present invention and embodiment illustrated in fig. 3 in GGSN pass-through service is chargeed and/or the operation of Lawful intercept identical, repeat no more at this.
One of ordinary skill in the art will appreciate that: all or part of step that realizes said method embodiment can be accomplished through the relevant hardware of program command; Aforesaid program can be stored in the computer read/write memory medium; This program the step that comprises said method embodiment when carrying out; And aforesaid storage medium comprises: various media that can be program code stored such as ROM, RAM, magnetic disc or CD.
Fig. 6 is the structural representation of network equipment embodiment one of the present invention; Network equipment in the present embodiment can be realized the flow process that the present invention is embodiment illustrated in fig. 1; As shown in Figure 6, this network equipment can comprise: receiver module 61, determination module 62, modified module 63 and sending module 64.
Wherein, receiver module 61 is used to receive first request message that subscriber equipment sends, and this first request message carries the APN of sign pass-through service.
Determination module 62, the Access Point Name that is used for first request message of definite receiver module 61 receptions is called the APN that identifies pass-through service; Particularly, determination module 62 can compare the APN of APN in first request message and pre-configured sign pass-through service; If the APN in this first request message is identical with the APN of pre-configured sign pass-through service, can confirm that then the Access Point Name in first request message is called the APN that identifies pass-through service.
Modified module 63 is used for after determination module 62 confirms that the Access Point Name of first request message that receiver module 61 receives is called the APN that identifies pass-through service, the APN of sign pass-through service being revised as the APN of sensing GGSN; In the present embodiment, network equipment this locality disposes the IP address corresponding with the APN that points to GGSN, the IP address that this IP address is this GGSN; According to the APN of above-mentioned sensing GGSN, network equipment can obtain the IP address of this GGSN.
In the present embodiment; As there is not a specified otherwise; GGSN can for IAD unite deployment GGSN or with the integrated GGSN of IAD, as shown in Figure 8, the GGSN 85 among Fig. 8 be with IAD unite deployment GGSN or with the integrated GGSN of IAD.Wherein, the GGSN that unites deployment with IAD comprises and the direct-connected GGSN of IAD, perhaps, and the GGSN that is connected through router or switch with IAD.
Sending module 64 is used for sending second request message to above-mentioned GGSN, and this second request message carries the APN that points to GGSN, so that set up the tunnel between IAD and the above-mentioned GGSN; Further, also being convenient to this GGSN charges and/or Lawful intercept to pass-through service.
Network equipment in the present embodiment can be SGSN or IAD; When the network equipment is IAD; Sending module 64 can send to SGSN through the APN that first request message will point to GGSN; So that this SGSN sends second request message according to the APN that points to GGSN to above-mentioned GGSN.Wherein, according to the APN that points to GGSN, sending module 64 can obtain the IP address of this GGSN, and then sending module 64 can send second request message to this GGSN according to the IP address of this GGSN.
In the present embodiment, the tunnel between IAD and the GGSN is a direct tunnel (Directtunnel), and promptly through this tunnel, IAD can directly send to GGSN with bypass flow, and bypass flow does not need to pass through SGSN again like this.
In the foregoing description; Determination module 62 confirms that the Access Point Name in first request message is called after the APN that identifies pass-through service; The APN that modified module 63 will identify pass-through service is revised as the APN that points to GGSN, and sends second request message by sending module 64 to GGSN, to set up the tunnel between IAD and the GGSN; Wherein, this GGSN for IAD unite deployment GGSN or with the integrated GGSN of IAD.Thereby IAD can with bypass flow directly send to IAD unite deployment GGSN or with the integrated GGSN of IAD; By above-mentioned GGSN bypass flow is sent to home network or internet again, realized the function of IAD support data bypass; And the foregoing description has been realized pass-through service is chargeed and/or the function of Lawful intercept.
Fig. 7 is the structural representation of IAD embodiment one of the present invention, and the IAD in the present embodiment can be realized the flow process that the present invention is embodiment illustrated in fig. 4, and is as shown in Figure 7, and this IAD can comprise: message sink module 71 and message transmission module 72.
Wherein, message sink module 71 is used to receive first request message that SGSN sends, and this first request message carries the APN of sign pass-through service; This first request message is that SGSN receives first request message that subscriber equipment sends, and confirms that Access Point Name in this first request message is called transmission after the APN that identify pass-through service;
In the present embodiment, message sink module 71 is used to also to receive that GGSN sends and the second request message corresponding response message;
In the present embodiment, the tunnel between IAD and the GGSN is a direct tunnel (Directtunnel), and promptly through this tunnel, IAD can directly send to GGSN with bypass flow, and bypass flow does not need to pass through SGSN again like this.
In the foregoing description, message sink module 71 receives after first request message of SGSN transmission, and message transmission module 72 is sent second request message to GGSN, to set up the tunnel between IAD and the GGSN; Wherein, first request message is that SGSN confirms that Access Point Name in first request message sends after being called the APN that identifies pass-through service, GGSN for IAD unite deployment GGSN or with the integrated GGSN of IAD.Thereby IAD can with bypass flow directly send to IAD unite deployment GGSN or with the integrated GGSN of IAD; By above-mentioned GGSN bypass flow is sent to home network or internet again, realized the function of IAD support data bypass; And the foregoing description has been realized pass-through service is chargeed and/or the function of Lawful intercept.
Fig. 8 is the sketch map of the system embodiment one of data bypass of the present invention, and as shown in Figure 8, the system of this data bypass can comprise: UE 81, AP 82, AG 83, SGSN 84, a GGSN 85 and the 2nd GGSN 86.
Wherein, a GGSN 85 for AG 83 unite deployment GGSN or with the integrated GGSN of AG 83; Wherein, the GGSN that unites deployment with IAD comprises and the direct-connected GGSN of IAD, perhaps, and the GGSN that is connected through router or switch with IAD; The 2nd GGSN 86 is the GGSN in the core net.
In the present embodiment, UE 81, AP 82, AG 83, SGSN 84, a GGSN 85 and the 2nd GGSN 86 can adopt Fig. 2 of the present invention, Fig. 3 or flow process embodiment illustrated in fig. 5 to carry out alternately.Wherein, AG 83 can realize through the present invention network equipment or the present invention's IAD shown in Figure 7 shown in Figure 6; SGSN 84 can realize through the present invention's network equipment shown in Figure 6.
Need to prove that Fig. 1 of the present invention~content embodiment illustrated in fig. 5 also can be used as replenishing of Fig. 6 of the present invention, Fig. 7 and content embodiment illustrated in fig. 8.
It will be appreciated by those skilled in the art that accompanying drawing is the sketch map of a preferred embodiment, module in the accompanying drawing or flow process might not be that embodiment of the present invention is necessary.
It will be appreciated by those skilled in the art that the module in the device among the embodiment can be distributed in the device of embodiment according to the embodiment description, also can carry out respective change and be arranged in the one or more devices that are different from present embodiment.The module of the foregoing description can be merged into a module, also can further split into a plurality of submodules.
What should explain at last is: above embodiment is only in order to explaining technical scheme of the present invention, but not to its restriction; Although with reference to previous embodiment the present invention has been carried out detailed explanation, those of ordinary skill in the art is to be understood that: it still can be made amendment to the technical scheme that aforementioned each embodiment put down in writing, and perhaps part technical characterictic wherein is equal to replacement; And these are revised or replacement, do not make the spirit and the scope of the essence disengaging various embodiments of the present invention technical scheme of relevant art scheme.
Claims (10)
1. the method for a data bypass is characterized in that, comprising:
Network equipment receives first request message that subscriber equipment sends, and said first request message carries the APN of sign pass-through service;
Said network equipment confirms that the Access Point Name in said first request message is called after the APN that identifies pass-through service, the APN of said sign pass-through service is revised as the APN of sensing ggsn GGSN;
Said network equipment sends second request message to said GGSN, and said second request message carries the APN of said sensing GGSN, so that set up the tunnel between IAD and the said GGSN; Said GGSN for IAD unite deployment GGSN or with the integrated GGSN of said IAD;
Wherein, said network equipment confirms that Access Point Name in said first request message is called the APN that identifies pass-through service and comprises:
Said network equipment compares the APN of APN in said first request message and pre-configured sign pass-through service;
If the APN in said first request message is identical with the APN of said pre-configured sign pass-through service, then said network equipment confirms that the Access Point Name in said first request message is called the APN that identifies pass-through service.
2. method according to claim 1 is characterized in that, said network equipment is an IAD;
Said network equipment sends second request message to said GGSN and comprises:
Said IAD sends to service universal grouping wireless business supporting node SGSN through said first request message with the said APN that points to GGSN; So that said SGSN sends said second request message according to the APN of said sensing GGSN to said GGSN.
3. method according to claim 1 is characterized in that, said network equipment is SGSN.
4. method according to claim 1 is characterized in that, also comprises:
Said GGSN adds up the charge information of said pass-through service, generates call detail record according to said charge information, and through charging gateway function body said call detail record is sent to charge system;
And/or,
Said GGSN receives the control information of intercepting of Lawful interception gateway transmission, and intercepts the communication information that said subscriber equipment is intercepted in control information according to said, and the communication information of the said subscriber equipment that will listen to sends to said Lawful interception gateway; Saidly intercept control information and comprise and monitor to activate, monitor and close or status poll.
5. a network equipment is characterized in that, comprising:
Receiver module is used to receive first request message that subscriber equipment sends, and said first request message carries the APN of sign pass-through service;
Determination module, the Access Point Name that is used for first request message of definite said receiver module reception is called the APN that identifies pass-through service;
Modified module; Be used for after said determination module confirms that the Access Point Name of first request message that said receiver module receives is called the APN that identifies pass-through service, the APN of said sign pass-through service being revised as the APN of sensing ggsn GGSN;
Sending module is used for sending second request message to said GGSN, and said second request message carries the APN of said sensing GGSN, so that set up the tunnel between IAD and the said GGSN; Said GGSN for IAD unite deployment GGSN or with the integrated GGSN of said IAD;
Wherein, said determination module specifically is used for the APN of the APN of said first request message and pre-configured sign pass-through service is compared; If the APN in said first request message is identical with the APN of pre-configured sign pass-through service, confirm that then the Access Point Name in said first request message is called the APN that identifies pass-through service.
6. network equipment according to claim 5; It is characterized in that; Said sending module specifically is used for when said network equipment is IAD; Through said first request message said APN that points to GGSN is sent to service universal grouping wireless business supporting node SGSN, so that said SGSN sends said second request message according to the APN of said sensing GGSN to said GGSN.
7. the method for a data bypass is characterized in that, comprising:
Receive first request message that service universal grouping wireless business supporting node SGSN sends, said first request message carries the APN of sign pass-through service; Said first request message is that said SGSN receives said first request message that subscriber equipment sends, and confirms that Access Point Name in said first request message is called transmission after the APN that identify pass-through service;
Send second request message to ggsn GGSN, said second request message carries the APN of said sign pass-through service;
Receive said GGSN that send with the said second request message corresponding response message, said response message is sent to said SGSN, so that set up the tunnel between IAD and the said GGSN; Said GGSN for IAD unite deployment GGSN or with the integrated GGSN of said IAD.
8. method according to claim 7 is characterized in that, said SGSN confirms that the Access Point Name in said first request message is called the APN that identifies pass-through service and comprises:
Said SGSN compares the APN of APN in said first request message and pre-configured sign pass-through service;
If the APN in said first request message is identical with the APN of pre-configured sign pass-through service, then said SGSN confirms that the Access Point Name in said first request message is called the APN that identifies pass-through service.
9. method according to claim 7 is characterized in that, also comprises:
Said GGSN adds up the charge information of said pass-through service, generates call detail record according to said charge information, and through charging gateway function body said call detail record is sent to charge system;
And/or,
Said GGSN receives the control information of intercepting of Lawful interception gateway transmission, and intercepts the communication information that said subscriber equipment is intercepted in control information according to said, and the communication information of the said subscriber equipment that will listen to sends to said Lawful interception gateway; Saidly intercept control information and comprise and monitor to activate, monitor and close or status poll.
10. an IAD is characterized in that, comprising:
The message sink module is used to receive first request message that service universal grouping wireless business supporting node SGSN sends, and said first request message carries the APN of sign pass-through service; Said first request message is that said SGSN receives said first request message that subscriber equipment sends, and confirms that Access Point Name in said first request message is called transmission after the APN that identify pass-through service;
Message transmission module is used for sending second request message to ggsn GGSN, and said second request message carries the APN of said sign pass-through service;
Said message sink module, also be used to receive said GGSN that send with the said second request message corresponding response message;
Said message transmission module also is used for said response message is sent to said SGSN, so that set up the tunnel between IAD and the said GGSN; Said GGSN for IAD unite deployment GGSN or with the integrated GGSN of said IAD.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2010101387808A CN101795478B (en) | 2010-03-31 | 2010-03-31 | Method for data bypass, network side equipment and access gateway |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2010101387808A CN101795478B (en) | 2010-03-31 | 2010-03-31 | Method for data bypass, network side equipment and access gateway |
Publications (2)
Publication Number | Publication Date |
---|---|
CN101795478A CN101795478A (en) | 2010-08-04 |
CN101795478B true CN101795478B (en) | 2012-08-08 |
Family
ID=42587846
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN2010101387808A Active CN101795478B (en) | 2010-03-31 | 2010-03-31 | Method for data bypass, network side equipment and access gateway |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN101795478B (en) |
Families Citing this family (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102308603B (en) * | 2011-07-12 | 2014-01-22 | 华为技术有限公司 | Charge mode and network access device |
WO2012119399A1 (en) * | 2011-08-19 | 2012-09-13 | 华为技术有限公司 | Service bypass method, access network device and security gateway |
CN102523313B (en) * | 2011-12-09 | 2015-03-18 | 华为技术有限公司 | Identification method of data bypass and apparatus thereof |
WO2014205792A1 (en) | 2013-06-28 | 2014-12-31 | 华为技术有限公司 | Method, apparatus and system for establishing optical bypass |
CN108377532B (en) * | 2016-11-16 | 2019-08-06 | 华为技术有限公司 | A kind of data connecting method, control plane node and user equipment |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101646205A (en) * | 2008-08-05 | 2010-02-10 | 华为技术有限公司 | Node, method and system for accessing mobile network to public network at high speed |
CN101925038A (en) * | 2009-06-12 | 2010-12-22 | 华为技术有限公司 | Data transmission method, communication device and network system |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP3291636B1 (en) * | 2007-10-25 | 2020-04-29 | Cisco Technology, Inc. | Interworking gateway for mobile nodes |
-
2010
- 2010-03-31 CN CN2010101387808A patent/CN101795478B/en active Active
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101646205A (en) * | 2008-08-05 | 2010-02-10 | 华为技术有限公司 | Node, method and system for accessing mobile network to public network at high speed |
CN101925038A (en) * | 2009-06-12 | 2010-12-22 | 华为技术有限公司 | Data transmission method, communication device and network system |
Also Published As
Publication number | Publication date |
---|---|
CN101795478A (en) | 2010-08-04 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN102918919B (en) | The system and method for the PDP Context in management wireless data communication network | |
US10021561B2 (en) | Method and apparatus for setting up communication connection | |
KR101683107B1 (en) | Multi-channel communication terminal | |
CN101480103B (en) | Method of operating a dual SIM wireless communications device | |
KR101641146B1 (en) | Service sharing system and apparatus | |
CN101668325B (en) | Admission control method, admission control device and admission control system | |
CN100401275C (en) | Terminal device emulator | |
KR101494068B1 (en) | Apparatus and methods for provisioning subscriber identity data in a wireless network | |
US9351236B2 (en) | UICC carrier switching via over-the-air technology | |
CN102006210B (en) | User equipment dial-up networking method, device and system | |
CN103430613B (en) | For utilizing the system and method for relieving capacity within a wireless communication network | |
US11716612B1 (en) | Bootstrap electronic subscriber identity module configuration | |
WO2018133271A1 (en) | Esim card activation method, wireless router and user terminal | |
WO2014020237A1 (en) | Method and system for communication in different networks | |
US9439240B1 (en) | Mobile communication system identity pairing | |
KR20120039984A (en) | Method and apparatus for sharing internet connection based on automatic configuration of network interface | |
US20040008653A1 (en) | Device, system, method and computer readable medium for fast recovery of IP address change | |
US10902307B1 (en) | Universal integrated circuit card (UICC) toolkit | |
CN101795478B (en) | Method for data bypass, network side equipment and access gateway | |
CN105357143A (en) | Forwarding method and service routing relay node | |
CN103339976B (en) | The method and apparatus of the local gateway assignment in wireless network | |
CN102388639A (en) | Method and device for accessing mobile network and user device | |
CN101068439B (en) | Communicating method, mobile terminal, insertion point equipment and communication system | |
CN105979505A (en) | Air download method and device | |
CN102726075A (en) | Business by-pass method, access network device and secure gateway |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant |