WO2011150546A1 - Method for offloading data stream and traffic offload function entity - Google Patents

Method for offloading data stream and traffic offload function entity Download PDF

Info

Publication number
WO2011150546A1
WO2011150546A1 PCT/CN2010/073388 CN2010073388W WO2011150546A1 WO 2011150546 A1 WO2011150546 A1 WO 2011150546A1 CN 2010073388 W CN2010073388 W CN 2010073388W WO 2011150546 A1 WO2011150546 A1 WO 2011150546A1
Authority
WO
WIPO (PCT)
Prior art keywords
policy
service
sipto
user equipment
function entity
Prior art date
Application number
PCT/CN2010/073388
Other languages
French (fr)
Chinese (zh)
Inventor
王爽
王玮
李岩
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Priority to CN201080001578.9A priority Critical patent/CN102369698B/en
Priority to PCT/CN2010/073388 priority patent/WO2011150546A1/en
Publication of WO2011150546A1 publication Critical patent/WO2011150546A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/2854Wide area networks, e.g. public data networks
    • H04L12/2856Access arrangements, e.g. Internet access
    • H04L12/2869Operational details of access network equipments
    • H04L12/287Remote access server, e.g. BRAS
    • H04L12/2876Handling of subscriber policies

Definitions

  • the present invention relates to the field of communications technologies, and in particular, to a data flow bypass method and a service bypass function entity. Background technique
  • GPRS General Packet Radio Service
  • GSM Global System for Mobile Communications
  • TDMA Time Division Multiple Access
  • GSM Global System for Mobile Communications
  • GPRS implements packet switching by adding corresponding functional entities and partially modifying existing base station systems.
  • the existing GPRS network architecture mainly includes services such as a service GPRS support node (hereinafter referred to as SGSN) and a gateway GPRS support node (hereinafter referred to as GGSN).
  • SGSN service GPRS support node
  • GGSN gateway GPRS support node
  • the SGSN is mainly responsible for mobility management and session management; mobility management includes maintaining mobility management context, managing location information, and authentication of legitimate users.
  • the session management includes the management of the Packet Data Protocol (PDP) context; the SGSN implements the routing and forwarding functions of the mobile station (Mobile Station; hereinafter referred to as MS) and the GGSN.
  • PDP Packet Data Protocol
  • the GGSN is primarily responsible for session management. Session management includes managing PDP context and dynamic allocation Internet Protocol (Internet Protocol; IP address); GGSN implements routing and forwarding of service data between the MS and the Internet.
  • Session management includes managing PDP context and dynamic allocation Internet Protocol (Internet Protocol; IP address); GGSN implements routing and forwarding of service data between the MS and the Internet.
  • IP Internet Protocol
  • SIPTO Select IP Traffic Offload
  • the method of bypassing the data stream through the SIPTO technology can only determine whether to bypass or not in the same APN according to the access point name (Access Point Name; APN) selected by the user.
  • APN Access Point Name
  • the bypass processing is performed according to different services performed by the user. Summary of the invention
  • the embodiment of the present invention provides a data flow bypass method and a service bypass function entity, so as to implement bypass processing according to different services performed by user equipments in the same APN.
  • An embodiment of the present invention provides a data flow bypass method, including:
  • the received data stream is bypassed according to the SIPTO policy.
  • the embodiment of the invention further provides a service bypass function entity, including:
  • a detecting module configured to detect a signaling setup message sent by the user equipment, or detect a data flow sent by the user equipment on the first context, to obtain the user equipment Business information
  • a policy obtaining module configured to obtain a selected Internet Protocol Traffic Flow Bypass (SIPTO) policy corresponding to the service information of the user equipment;
  • IPTO Internet Protocol Traffic Flow Bypass
  • the bypass module is configured to bypass the received data stream according to the SIPTO policy obtained by the policy acquisition module.
  • Embodiment 1 is a flowchart of Embodiment 1 of a method for bypassing a data stream according to the present invention
  • Embodiment 2 is a flowchart of Embodiment 2 of a method for bypassing a data stream according to the present invention
  • Embodiment 3 is a flowchart of Embodiment 3 of a method for bypassing a data stream according to the present invention
  • Embodiment 4 is a flowchart of Embodiment 4 of a method for bypassing a data stream according to the present invention
  • Embodiment 5 is a flowchart of Embodiment 5 of a method for bypassing a data stream according to the present invention
  • FIG. 6 is a schematic structural diagram of Embodiment 1 of a service bypass function entity according to the present invention
  • FIG. 7 is a schematic structural diagram of Embodiment 2 of a service bypass function entity according to the present invention
  • FIG. 8 is a schematic structural diagram of Embodiment 3 of a service bypass function entity according to the present invention
  • FIG. 9 is a schematic structural diagram of Embodiment 1 of a system for bypassing data streams according to the present invention. detailed description
  • Embodiment 1 is a flowchart of Embodiment 1 of a method for bypassing a data stream according to the present invention. As shown in FIG. 1, the method for bypassing the data stream may include:
  • Step 101 The service bypass function entity detects the signaling establishment message sent by the user equipment, or detects the data flow of the user equipment on the first context, and obtains the service information of the user equipment.
  • the signaling establishment message may be a first context activation message or a secondary context activation sent by the user equipment;
  • the PDP context is a PDP-related information stored in the MS and the GGSN. It is similar to the GPRS Tunneling Protocol (GTP) tunnel description table. Generally, a PDP context can also be called a GTP tunnel.
  • GTP GPRS Tunneling Protocol
  • the PDP context activation is a process of initiating a packet data service call, which may be initiated by the user equipment or by the network side device.
  • the PDP context is established for the first time after being activated for the first time.
  • Context, traffic flow template (hereinafter referred to as: TFT) information of the first context is generally empty or wildcarded; after initiating an activation to establish the first context, a secondary activation may be initiated to establish a secondary context, and a secondary context is established.
  • TFT traffic flow template
  • the main purpose is to carry different services with different quality of service (QoS).
  • the service information of the user equipment includes one or more of an International Mobile Subscriber Identity (IMSI), an APN, and a TFT of the user equipment.
  • IMSI International Mobile Subscriber Identity
  • APN APN
  • TFT TFT of the user equipment.
  • Step 102 The service bypass function entity obtains a SIPTO policy corresponding to the service information of the user equipment.
  • the service bypass function entity may send the service information of the user equipment to a Policy and Charging Rules Function (hereinafter referred to as: PCRF) entity, and receive the PCRF entity according to the user equipment.
  • PCRF Policy and Charging Rules Function
  • the SIPTO policy defined on the service bypass function entity is activated according to the name of the SIPTO policy according to the service information of the user equipment, the configuration information of the PCRF entity, the operator policy, and the subscription information of the user equipment. Or,
  • the service bypass function entity may activate the SIPTO policy predefined on the service bypass function entity according to the service information of the user equipment, the configuration information of the service bypass function entity, the operator policy, and the subscription information of the user equipment.
  • Step 103 The service bypass function entity feeds the received data stream according to the SIPTO policy. Line bypass.
  • the service bypass function entity may first bind the SIPTO policy to the secondary context.
  • the secondary context is established between the service bypass function entity and the user equipment.
  • the service bypass function entity may initiate a process of establishing a secondary context suitable for binding the SIPTO policy;
  • the secondary context suitable for binding the SIPTO policy is established in the Between the user equipment and the service bypass function entity.
  • the SIPTO policy indicates that the data flow corresponding to the service information of the user equipment needs to be performed next to In the case of a road, the above secondary context is established between the user equipment and the service bypass function entity.
  • the service bypass function entity may determine that the destination address of the data flow encapsulated by the tunneling protocol transmitted by the radio network controller is After the service bypasses the address of the functional entity, the data flow is bypassed.
  • the tunneling protocol may be a GTP.
  • the embodiment of the present invention is not limited thereto.
  • the tunneling protocol may also be another tunneling protocol.
  • the tunneling protocol used when the above data stream is encapsulated is not limited.
  • the service bypass function entity may record the The SIPTO policy; then, when the user equipment performs the service in the first context, the service bypass function entity matches the recorded SIPTO policy with the received data stream, and successfully matches the service flow detection information in the SIPTO policy. The data stream is bypassed.
  • the SIPTO policy may include at least one service flow detection information, and may further include one or more of a SIPTO indication, charging information, and Qo S information.
  • the service bypass function entity after obtaining the service information of the user equipment, the service bypass function entity obtains a SIPTO policy corresponding to the service information of the user equipment, and then bypasses the received data stream according to the SIPTO policy. Therefore, bypass processing is performed according to different services performed by the user equipment under the same APN.
  • Embodiment 2 is a flowchart of Embodiment 2 of a method for bypassing a data stream according to the present invention. As shown in FIG. 2, the method for bypassing the data stream may include:
  • Step 201 The UE performs a service, and sends an uplink data stream.
  • the source address of the uplink data stream is SRC1, and the destination address is DST1.
  • Step 202 A traffic offload function (hereinafter referred to as a TOF) entity performs Deep Packet Inspection (DPI) on the uplink data stream to obtain service information of the UE.
  • DPI Deep Packet Inspection
  • Step 203 The TOF entity sends the service information of the UE to the PCRF entity.
  • the TOF entity may send the service information of the UE to the PCRF entity by using a Tx interface between the TOF entity and the PCRF entity.
  • the TOF entity may carry the service information of the UE by using a Credit Control Request (CCR) message.
  • CCR Credit Control Request
  • Step 204 The PCRF entity according to the service information of the UE, and the configuration information of the PCRF entity
  • the subscription information of the UE in the information, the operator policy, and the subscriber subscription database (SPR) determines the SIPTO policy corresponding to the service information of the UE.
  • Step 205 The PCRF entity sends the SIPTO policy to the TOF entity.
  • the PCRF entity may send the SIPTO policy to the TOF entity by using a Tx interface between the TOF entity and the PCRF entity.
  • the PCRF entity may carry the SIPTO policy by using a Credit Control Answer (CCA) message.
  • CCA Credit Control Answer
  • Step 206 The TOF entity loads the SIPTO policy described above. Specifically, since the TFTs of the secondary context are different, the TOF entity may bind the SIPTO policy to the corresponding secondary context according to the service flow detection information in the SIPTO policy and the TFT of the secondary context, if There is no secondary context suitable for binding the SIPTO policy in the secondary context, then the TOF entity initiates the process of establishing a secondary context suitable for binding the SIPTO policy, and then binds the SIPTO policy to the newly created secondary context. on.
  • the TOF entity applies the foregoing two that are suitable for binding the SIPTO policy.
  • the secondary context is established between the UE and the TOF entity.
  • Step 207 When the UE performs a service on the secondary context bound to the SIPTO policy, the TOF entity determines whether to bypass the data flow according to the SIPTO policy. Specifically, when the UE performs the service in the secondary context of the SIPTO policy, the TOF entity determines that the destination address of the GTP-encapsulated data stream transmitted by the radio network controller (Radio Network Controller; RNC) is the TOF entity. After the address, the TOF entity determines the number The bypass processing is performed according to the flow, and the process proceeds to steps 208 to 211. Otherwise, after the TOF entity determines that the destination address of the GTP-encapsulated data stream transmitted by the RNC is not the address of the TOF entity, the TOF entity determines not to bypass the data flow. Processing proceeds to step 212 to step 215.
  • RNC Radio Network Controller
  • Step 208 The TOF entity performs GTP decapsulation on the received uplink data stream, and performs network address translation (NAT) processing, and then routes the uplink data stream to the packet data network (Packet Data Network; Hereinafter referred to as: PDN).
  • the TOF entity records a NAT entry, which is used for subsequent recovery of the NAT; the NAT entry includes the port number and address information of the upstream data flow before and after the network address translation, and the GTP tunnel between the RNC and the SGSN that transmits the upstream data flow. information.
  • Step 209 The TOF entity receives the downlink data flow of the service that needs to be bypassed.
  • Step 210 The TOF entity matches the quintuple information of the downlink data stream with the quintuple information in the recorded NAT entry, and restores the destination address and port number of the downlink data flow to the destination address and port number of the downlink data stream according to the successfully matched NAT entry.
  • the address and port number before the NAT processing is performed, and then the GTP encapsulation of the downlink data stream is performed by using the GTP tunnel information recorded in the NAT entry.
  • the recorded NAT entry includes five-tuple information, that is, a source port number, a destination port number, a source IP address, a destination IP address, and a transmission protocol; and the TOF entity receives the service that needs to be bypassed.
  • the quintuple information of the downlink data stream is matched with the quintuple information in the recorded NAT entry, and the NAT entry with the same quintuple information as the downlink data flow is determined to be a successfully matched NAT.
  • the entry can then restore the destination address and port number of the downstream data stream to the address and port number before NAT processing according to the successfully matched NAT entry.
  • Step 211 The TOF entity sends the downlink data stream after the GTP encapsulation is sent through the RNC. Give the UE.
  • Step 212 For the uplink data stream, the TOF entity transparently transmits the uplink data stream that does not need to be bypassed to the SGSN, and then sends the uplink data stream to the GGSN by the SGSN.
  • Step 213 The GGSN routes the uplink data stream to the PDN through the Gi interface.
  • Step 214 the GGSN receives the downlink data stream.
  • Step 215 The GGSN sends the downlink data stream to the UE through the SGSN and the RNC through the GTP tunnel.
  • the TOF entity may record the SIPTO policy, and when the UE performs the service in the first context, the TOF The entity matches the recorded SIPTO policy with the quintuple information of the received data stream, and determines to bypass the data stream that successfully matches the service flow detection information in the SIPTO policy, and performs steps 208 to 211;
  • the TOF entity matches the recorded SIPTO policy with the received data stream, and determines that the data stream that fails to match the service flow detection information in the SIPTO policy is not bypassed, and steps 212 to 215 are performed.
  • the service flow detection information in the SIPTO policy includes quintuple information, that is, a source port number, a destination port number, a source IP address, a destination IP address, and a transmission protocol of the service flow, and after the TOF entity receives the data stream, the SIPTO is
  • the quintuple information included in the service flow detection information in the policy matches the quintuple information of the received data stream.
  • the TOF entity determines The received data stream is successfully matched with the service flow detection information in the recorded SIPTO policy, and the received data stream needs to be bypassed; otherwise, if the received data stream and the service flow detection information are quintuple information Differently, the TOF entity determines that the received data stream fails to match the service flow detection information in the recorded SIPTO policy, and does not need to bypass the received data stream.
  • the TOF entity sends the service information sent by the UE to the PCRF entity, and receives the service information sent by the PCRF entity, and the service information sent by the PCRF entity, after the service data sent by the UE is obtained, and the service information of the UE is obtained.
  • the corresponding SIPTO policy then bypasses the received data stream according to the SIPTO policy. Therefore, bypass processing is performed according to different services performed by the UE under the same APN.
  • Embodiment 3 is a flowchart of Embodiment 3 of a method for bypassing a data stream according to the present invention. As shown in FIG. 3, the method for bypassing the data stream may include:
  • Step 301 The UE sends a first context activation request.
  • Step 302 After intercepting the first context activation request, the TOF entity detects the first context activation request, and obtains an APN, an IMSI, and an IP connection access network (IP-Connectivity Access Network; IP-CAN) of the UE.
  • IP-Connectivity Access Network IP-CAN
  • Type and radio access technology Radio Access Technology; hereinafter referred to as: RAT
  • RAT Radio Access Technology
  • Step 303 The TOF entity sends a CCR message to the PCRF entity, where the CCR message carries the APN, IMSI, IP-CAN type, and RAT type of the UE, and the End User Address of the UE, and initiates a process of creating a Tx session.
  • the Tx is an interface between the TOF entity and the PCRF entity.
  • Step 304 The PCRF entity sends the name of one or a group of predefined SIPTO policies to the TOF entity by using a CCA message according to the information carried in the CCR message.
  • the PCRF entity can be installed through the charging rule of the CCA message.
  • the Charging-Rule-Name in the Charging-Rule-Install field or the Charging-Rule-Base-Name which sends the name of one or a set of predefined SIPTO policies. Give the TOF entity.
  • Step 305 The TOF entity sends a first context activation request to the SGSN.
  • Step 306 The SGSN sends a PDP context establishment request to the GGSN to trigger establishment of an IP-CAN session.
  • Step 307 an IP-CAN session establishment process.
  • Step 308 The GGSN sends a PDP context establishment response to the SGSN.
  • Step 309 The SGSN sends a first context activation response to the UE.
  • Step 310 The TOF entity activates a SIPTO policy predefined on the TOF entity according to the name of the SIPTO policy sent by the PCRF entity.
  • Step 311 The TOF entity loads the foregoing SIPTO policy. Specifically, the TOF entity may perform bearer binding, and bind the SIPTO policy to the secondary context. If the secondary context in the established secondary context does not have a secondary context suitable for binding the SIPTO policy, the TOF entity initiates establishment. A process suitable for binding a secondary context of the SIPTO policy. In the process of establishing a secondary context suitable for binding the SIPTO policy, when the SIPTO policy indicates that a data flow corresponding to the service information of the UE needs to be bypassed, the above secondary context suitable for binding the SIPTO policy is used.
  • Step 312 When the UE performs a service in the foregoing secondary context, the TOF entity determines whether to bypass the data flow. Specifically, when the UE performs the service in the above secondary context, the TOF After the entity determines that the destination address of the GTP encapsulated data stream transmitted by the RNC is the address of the TOF entity, the TOF entity determines to bypass the data stream; otherwise, the TOF entity determines the destination address of the GTP encapsulated data stream transmitted by the RNC. After the address of the TOF entity, the TOF entity determines not to bypass the data stream.
  • the TOF entity may record the SIPTO policy, where the UE performs the first context in the foregoing context.
  • the TOF entity matches the recorded SIPTO policy with the quintuple information of the received data stream, and determines to bypass the data stream that successfully matches the service flow detection information in the SIPTO policy;
  • the TOF entity matches the recorded SIPTO policy with the received data stream, and determines that the data stream that fails to match the service flow detection information in the SIPTO policy is not bypassed.
  • the step after the TOF entity determines that the bypass processing is performed is the same as the steps 208 to 211 of the embodiment shown in FIG. 2 of the present invention, and details are not described herein again; the TOF entity determines that the data stream is not bypassed.
  • the subsequent steps are the same as steps 212 to 215 of the embodiment shown in FIG. 2 of the present invention, and details are not described herein again.
  • the TOF entity detects the first context activation request sent by the UE, obtains the service information of the UE, and then sends the service information of the UE to the PCRF entity, and receives the service sent by the PCRF entity and the UE.
  • the name of the SIPTO policy corresponding to the information activates the SIPTO policy predefined on the TOF entity according to the name of the SIPTO policy, and then bypasses the received data stream according to the SIPTO policy.
  • the bypass processing is performed according to different services performed by the UE.
  • Embodiment 4 is a flowchart of Embodiment 4 of a method for bypassing a data stream according to the present invention. As shown in FIG. 4, the method for bypassing the data stream may include:
  • Step 401 The UE sends a secondary context activation request.
  • Step 402 After the TOF intercepts the secondary context activation request, the TOC detects the secondary context activation request to obtain TFT information of the UE.
  • Step 403 The TOF entity sends the TFT information of the UE to the PCRF entity by using a CCR message.
  • Step 404 The PCRF entity determines a SIPTO policy corresponding to the TFT information of the UE according to the TFT information of the UE, the configuration information of the PCRF entity, the operator policy, and the subscription information of the UE in the SPR.
  • the TFT information is service flow template information, and includes packet filter information.
  • Step 405 The PCRF entity sends the SIPTO policy to the TOF entity by using a CCA message.
  • step 406 If the data flow corresponding to the TFT information of the UE in the SIPTO policy does not need to be bypassed, the process proceeds to step 406 to step 411; if the data flow corresponding to the TFT information of the UE needs to be bypassed in the SIPTO policy, Proceed to steps 412 to 413.
  • Step 406 The TOF entity sends a secondary context activation request sent by the UE to the SGSN.
  • Step 408 The GGSN initiates an IP-CAN session modification process.
  • Step 409 The GGSN sends a secondary context establishment response to the SGSN.
  • Step 410 A radio access bearer (Radio Access Bearer; hereinafter referred to as RAB) is built. Standing.
  • RAB Radio Access Bearer
  • Step 411 The SGSN sends a secondary context activation response to the UE.
  • Step 412 The TOF entity initiates a process of establishing an RAB.
  • Step 413 The TOF entity replies to the UE with a secondary context activation response.
  • a secondary context is established between the UE and the TOF entity.
  • the TOF entity determines that the destination address of the GTP encapsulated data stream transmitted by the RNC is the address of the TOF entity, and the TOF entity determines to perform the data flow. Road processing.
  • the TOF entity detects the secondary context activation request sent by the UE, obtains the TFT information of the UE, and then sends the TFT information of the UE to the PCRF entity, and receives the user equipment sent by the PCRF entity.
  • the service information corresponds to the SIPTO policy, and then the received data stream is bypassed according to the SIPTO policy. Therefore, bypass processing is performed according to different services performed by the UE under the same APN.
  • Embodiment 5 is a flowchart of Embodiment 5 of a method for bypassing a data stream according to the present invention. As shown in FIG. 5, the method for bypassing the data stream may include:
  • Step 501 The UE sends a first context activation request.
  • Step 502 After the TOC entity intercepts the first context activation request, the TOC entity detects the first context activation request, and obtains service information of the UE.
  • Step 503 The TOF sends the first context activation request to the SGSN.
  • Step 504 The SGSN sends a PDP context establishment request to the GGSN.
  • Step 505 After establishing the first context, the GGSN returns a PDP context establishment response to the SGSN.
  • Step 507 After the TOF entity detects the first context activation response sent by the SGSN to the UE, the TOF entity activates the predefined TOF entity according to the service information of the UE, the configuration information of the TOF entity, the operator policy, and the subscription information of the UE. SIPTO strategy.
  • Step 508 The TOF performs a bearer binding, and binds the SIPTO policy to the secondary context. If the secondary context in the established secondary context does not have a secondary context suitable for binding the SIPTO policy, the TOF entity initiates establishment of a binding. The secondary context of the SIPTO strategy. In the process of establishing a secondary context suitable for binding the SIPTO policy, when the SIPTO policy indicates that the data flow corresponding to the service information of the UE needs to be bypassed, the above secondary context suitable for binding the SIPTO policy is performed. Established between the UE and the TOF entity.
  • Step 509 When the UE performs the service on the secondary context of the SIPTO policy, the TOF entity determines whether to bypass the data flow according to the SIPTO policy. Specifically, when the UE performs the service in the secondary context of the SIPTO policy, the TOF entity determines that the destination address of the GTP-encapsulated data stream transmitted by the RNC is the address of the TOF entity, and the TOF entity determines the data flow.
  • the following steps are the same as the steps 208 to 211 of the embodiment shown in FIG. 2 of the present invention, and are not described here; otherwise, the TOF entity determines that the destination address of the GTP-encapsulated data stream transmitted by the RNC is not the TOF entity. After the address, the TOF entity determines that the data stream is not bypassed.
  • the subsequent steps are the same as the steps 212 to 215 of the embodiment shown in FIG. 2 of the present invention, and details are not described herein again.
  • the TOF entity may record the SIPTO policy, where the UE performs the first context in the foregoing context.
  • the TOF entity will record The SIPTO policy matches the quintuple information of the received data stream, and determines to bypass the data stream that successfully matches the service flow detection information in the SIPTO policy, and the subsequent steps are the embodiment shown in FIG. 2 of the present invention. Steps 208 to 211 are the same, and are not described here.
  • the TOF entity matches the recorded SIPTO policy with the received data stream, and determines that the data flow that fails to match the service flow detection information in the SIPTO policy is not determined.
  • the bypass is performed, and the subsequent steps are the same as steps 212 to 215 of the embodiment shown in FIG. 2 of the present invention, and details are not described herein again.
  • the TOF entity detects the first context activation request sent by the UE, obtains the service information of the UE, and activates a SIPTO policy corresponding to the service information of the UE in the TOF entity, and then according to the SIPTO.
  • the policy bypasses the received data stream. Therefore, bypass processing is performed according to different services performed by the UE under the same APN.
  • FIG. 6 is a schematic structural diagram of Embodiment 1 of the service bypass function entity of the present invention.
  • the service bypass function entity in this embodiment can implement the process of the embodiment shown in Figure 1 of the present invention.
  • the service bypass The functional entities may include: a detection module 61, a policy acquisition module 62, and a bypass module 63.
  • the detecting module 61 is configured to detect a signaling setup message sent by the user equipment when performing service, or detect a data flow sent by the user equipment when performing service on the first context, to obtain service information of the user equipment;
  • the policy obtaining module 62 is configured to obtain a SIPTO policy corresponding to the service information of the user equipment. Specifically, the policy obtaining module 62 may send the service information of the user equipment to the policy and charging rule function entity, and receive the policy and The charging rule function entity may send the SIPTO policy according to the service information of the user equipment, the configuration information of the policy and the charging rule function entity, the operator policy, and the subscription information of the user equipment; or the policy obtaining module 62 may The service information is sent to the policy and charging rule function entity, and receives the policy and the charging rule function entity according to the service information of the user equipment, the configuration information of the policy and the charging rule function entity, the operator policy, and the subscription of the user equipment.
  • the information is determined by the name of the SIPTO policy, and the SIPTO policy defined on the service bypass function entity is activated according to the name of the SIPTO policy.
  • the policy obtaining module 62 may configure the service bypass function entity according to the service information of the user equipment. Information, operator strategy and usage The subscription information of the subscriber device activates a SIPTO policy predefined on the service bypass function entity.
  • the bypass module 63 is configured to bypass the received data stream according to the SIPTO policy obtained by the policy acquisition module 62.
  • FIG. 7 is a schematic structural diagram of Embodiment 2 of the service bypass function entity according to the present invention.
  • the service bypass function entity shown in FIG. 7 may further include: The binding module 64 and the first establishing module 65; or the service bypass function entity shown in FIG. 7 may further include: a second establishing module 66; or the service bypass function entity shown in FIG. 7 may further include: The module 64, the first establishing module 65 and the second establishing module 66.
  • the binding module 64 is configured to bind the SIPTO policy to the secondary context after the policy obtaining module 62 obtains the SIPTO policy in the first context establishing process, where the secondary context is established in the service bypass function entity and the user. Between devices.
  • the first establishing module 65 initiates a process of establishing a secondary context suitable for binding the SIPTO policy; when the SIPTO policy indicates that the When the data flow corresponding to the service information of the user equipment is bypassed, a secondary context suitable for binding the SIPTO policy is established between the user equipment and the service bypass function entity.
  • the second establishing module 66 is configured to obtain the SIPTO policy in the secondary context establishment process by the policy obtaining module 62, and when the SIPTO policy indicates that the data flow corresponding to the service information of the user equipment needs to be bypassed, A secondary context is established between the user equipment and the service bypass functional entity.
  • the bypass module 63 may specifically determine, when the user equipment performs the service in the secondary context, the destination address of the data flow encapsulated by the tunneling protocol transmitted by the radio network controller as the address of the service bypass function entity. After that, bypass the data stream.
  • FIG. 8 is a schematic structural diagram of Embodiment 3 of the service bypass function entity according to the present invention. The difference is that the service bypass function entity shown in FIG. 8 may further include: Recording module 67.
  • the recording module 67 is configured to record the SIPTO policy after the policy acquisition module 62 obtains the SIPTO policy in the first context establishment process;
  • the bypass module 63 can match the SIPTO policy recorded by the recording module 67 with the received data stream when the user equipment performs the service in the first context.
  • the traffic flow detection information in the SIPTO policy matches the successful data flow to bypass.
  • the policy acquisition module 62 obtains the SIPTO policy corresponding to the service information of the user equipment, and then the bypass module 63 pairs the received data according to the SIPTO policy.
  • the flow is bypassed. Therefore, bypass processing is performed on different services performed by the user equipment under the same APN.
  • FIG. 9 is a schematic structural diagram of Embodiment 1 of a data flow bypass according to the present invention.
  • the data bypass system may include: UE 91, Node B 92, RNC 93, TOF entity. 94. SGSN 95, GGSN 96 and PCRF entity 97.
  • the TOF entity 94 may detect the signaling setup message sent by the UE 91, or detect the data flow sent by the UE 91 on the first context, obtain the service information of the user equipment, and obtain the service information with the UE 91. After the corresponding SIPTO policy, the received data stream is bypassed according to the SIPTO policy.
  • the TOF entity 94 can be implemented by the service bypass function entity shown in Fig. 6, Fig. 7, or Fig. 8 of the present invention.
  • a Tx interface is added between the TOF entity 94 and the PCRF entity 97.
  • the TOF entity 94 can request the SIPTO policy from the PCRF entity 97 through the Tx interface.
  • the PCRF entity 97 can send the SIPTO to the TOF entity 94 through the Tx interface.
  • the interaction between the UE 91, the Node B 92, the RNC 93, the TOF entity 94, the SGSN 95, the GGSN 96, and the PCRF entity 97 may be as shown in FIG. 2, FIG. 3, FIG. 4 or FIG. The process will not be described here.
  • the TOF entity 94 obtains a SIPTO policy corresponding to the service information of the user equipment, and then bypasses the received data stream according to the SIPTO policy. Thereby realizing the setting according to the user under the same APN The different services that are being prepared are bypassed.
  • modules in the apparatus in the embodiments may be distributed in the apparatus of the embodiment according to the embodiment description, or the corresponding changes may be located in one or more apparatuses different from the embodiment.
  • the modules of the above embodiments may be combined into one module, or may be further split into a plurality of sub-modules.

Abstract

The present invention provides a method for offloading data stream and a traffic offload function entity. The method for offloading data stream includes: detecting a signaling establishment message sent by a user equipment, or detecting the data stream sent on the first-time context by the user equipment; obtaining the service information of the user equipment; obtaining the Selected Internet Protocol Traffic Offload (SIPTO) policy corresponding to the service information of the user equipment; offloading the received data stream according to the SIPTO policy. The embodiments of the present invention realize offload processing under the same Access Point Name (APN) according to different services performed by the user equipment.

Description

数据流旁路的方法和业务旁路功能实体 技术领域  Data flow bypass method and service bypass function entity
本发明涉及通信技术领域, 尤其涉及一种数据流旁路的方法和业务旁 路功能实体。 背景技术  The present invention relates to the field of communications technologies, and in particular, to a data flow bypass method and a service bypass function entity. Background technique
通用分组无线业务( General Packet Radio Service; 以下简称: GPRS ) 通过利用全球移动通讯*** ( Global System for Mobile Communications; 以下简称: GSM ) 网络中未使用的时分多址接入( Time Division Multiple Access; 以下简称: TDMA ) 信道, 提供中速的数据传递。 并且, GPRS 通过增加相应的功能实体和对现有的基站***进行部分改造实现了分组 交换。  General Packet Radio Service (hereinafter referred to as GPRS) uses Time Division Multiple Access (Time Division Multiple Access; unused) in the Global System for Mobile Communications (GSM) network. Abbreviation: TDMA) Channel, providing medium speed data transfer. Moreover, GPRS implements packet switching by adding corresponding functional entities and partially modifying existing base station systems.
现有的 GPRS网络架构中主要包括服务 GPRS支持节点( Service GPRS Support Node; 以下简称: SGSN )和网关 GPRS支持节点( Gateway GPRS Support Node; 以下简称: GGSN ) 等设备。  The existing GPRS network architecture mainly includes services such as a service GPRS support node (hereinafter referred to as SGSN) and a gateway GPRS support node (hereinafter referred to as GGSN).
其中, SGSN主要负责移动性管理和会话管理; 移动性管理包括维护 移动管理上下文、 管理位置信息和合法用户的验证。 会话管理包括管理分 组数据协议(Packet Data Protocol; 以下简称: PDP )上下文; SGSN实现 移动台 ( Mobile Station; 以下简称: MS ) 和 GGSN间业务数据的路由和 转发功能。  The SGSN is mainly responsible for mobility management and session management; mobility management includes maintaining mobility management context, managing location information, and authentication of legitimate users. The session management includes the management of the Packet Data Protocol (PDP) context; the SGSN implements the routing and forwarding functions of the mobile station (Mobile Station; hereinafter referred to as MS) and the GGSN.
GGSN主要负责会话管理。会话管理包括管理 PDP上下文和动态分配 因特网协议 ( Internet Protocol; 以下简称: IP ) 地址; GGSN实现 MS和 因特网之间业务数据的路由和转发功能。 The GGSN is primarily responsible for session management. Session management includes managing PDP context and dynamic allocation Internet Protocol (Internet Protocol; IP address); GGSN implements routing and forwarding of service data between the MS and the Internet.
选择 IP业务流旁路 ( Selected IP Traffic Offload; 以下简称: SIPTO ) 是一种基于节省运营商核心网传输成本的目的, 将因特网数据流在靠近基 站侧旁路, 不再传送到核心网的技术。  Select IP Traffic Offload (hereinafter referred to as SIPTO) is a technology that bypasses the base station side bypass and does not transmit to the core network based on the purpose of saving the carrier core network transmission cost. .
但是现有的在 GPRS网络中 ,通过 SIPTO技术进行数据流旁路的方法 只能按照用户选择的接入点名称 (Access Point Name; 以下简称: APN ) 确定是否要进行旁路, 无法在同一 APN 下根据用户进行的不同业务进行 旁路处理。 发明内容  However, in the existing GPRS network, the method of bypassing the data stream through the SIPTO technology can only determine whether to bypass or not in the same APN according to the access point name (Access Point Name; APN) selected by the user. The bypass processing is performed according to different services performed by the user. Summary of the invention
本发明实施例提供一种数据流旁路的方法和业务旁路功能实体, 以实 现在同一 APN下根据用户设备进行的不同业务进行旁路处理。  The embodiment of the present invention provides a data flow bypass method and a service bypass function entity, so as to implement bypass processing according to different services performed by user equipments in the same APN.
本发明实施例提供一种数据流旁路的方法, 包括:  An embodiment of the present invention provides a data flow bypass method, including:
对用户设备发送的信令建立消息进行检测, 或者对所述用户设备在首 次上下文上发送的数据流进行检测, 获得所述用户设备的业务信息;  Detecting a signaling setup message sent by the user equipment, or detecting a data flow sent by the user equipment on the first context, and obtaining service information of the user equipment;
获得与所述用户设备的业务信息对应的选择因特网协议业务流旁路 ( SIPTO ) 策略;  Obtaining a Select Internet Protocol Service Flow Bypass (SIPTO) policy corresponding to the service information of the user equipment;
根据所述 SIPTO策略对接收到的数据流进行旁路。  The received data stream is bypassed according to the SIPTO policy.
本发明实施例还提供一种业务旁路功能实体, 包括:  The embodiment of the invention further provides a service bypass function entity, including:
检测模块, 用于对用户设备发送的信令建立消息进行检测, 或者对所 述用户设备在首次上下文上发送的数据流进行检测, 获得所述用户设备的 业务信息; a detecting module, configured to detect a signaling setup message sent by the user equipment, or detect a data flow sent by the user equipment on the first context, to obtain the user equipment Business information;
策略获取模块, 用于获得与所述用户设备的业务信息对应的选择因特 网协议业务流旁路 ( SIPTO ) 策略;  a policy obtaining module, configured to obtain a selected Internet Protocol Traffic Flow Bypass (SIPTO) policy corresponding to the service information of the user equipment;
旁路模块,用于根据所述策略获取模块获得的 SIPTO策略对接收到的 数据流进行旁路。  The bypass module is configured to bypass the received data stream according to the SIPTO policy obtained by the policy acquisition module.
通过本发明实施例, 业务旁路功能实体获得用户设备的业务信息之 后, 获得与该用户设备的业务信息对应的 SIPTO策略, 然后根据该 SIPTO 策略对接收到的数据流进行旁路。 从而实现了在同一 APN下根据用户设 备进行的不同业务进行旁路处理。 附图说明 实施例或现有技术描述中所需要使用的附图作一简单地介绍, 显而易见 地, 下面描述中的附图是本发明的一些实施例, 对于本领域普通技术人员 来讲, 在不付出创造性劳动的前提下, 还可以根据这些附图获得其他的附 图。  After the service bypass function entity obtains the service information of the user equipment, the SIPTO policy corresponding to the service information of the user equipment is obtained, and then the received data stream is bypassed according to the SIPTO policy. Therefore, bypass processing is performed on different services performed by the user equipment under the same APN. BRIEF DESCRIPTION OF THE DRAWINGS The accompanying drawings, which are used in the description of the claims Other drawings may also be obtained from these drawings without the use of creative labor.
图 1为本发明数据流旁路的方法实施例一的流程图;  1 is a flowchart of Embodiment 1 of a method for bypassing a data stream according to the present invention;
图 2为本发明数据流旁路的方法实施例二的流程图;  2 is a flowchart of Embodiment 2 of a method for bypassing a data stream according to the present invention;
图 3为本发明数据流旁路的方法实施例三的流程图;  3 is a flowchart of Embodiment 3 of a method for bypassing a data stream according to the present invention;
图 4为本发明数据流旁路的方法实施例四的流程图;  4 is a flowchart of Embodiment 4 of a method for bypassing a data stream according to the present invention;
图 5为本发明数据流旁路的方法实施例五的流程图;  5 is a flowchart of Embodiment 5 of a method for bypassing a data stream according to the present invention;
图 6为本发明业务旁路功能实体实施例一的结构示意图; 图 7为本发明业务旁路功能实体实施例二的结构示意图; 图 8为本发明业务旁路功能实体实施例三的结构示意图; 6 is a schematic structural diagram of Embodiment 1 of a service bypass function entity according to the present invention; FIG. 7 is a schematic structural diagram of Embodiment 2 of a service bypass function entity according to the present invention; FIG. 8 is a schematic structural diagram of Embodiment 3 of a service bypass function entity according to the present invention;
图 9为本发明数据流旁路的***实施例一的结构示意图。 具体实施方式  FIG. 9 is a schematic structural diagram of Embodiment 1 of a system for bypassing data streams according to the present invention. detailed description
为使本发明实施例的目的、 技术方案和优点更加清楚, 下面将结合本 发明实施例中的附图, 对本发明实施例中的技术方案进行清楚、 完整地描 述,显然, 所描述的实施例是本发明一部分实施例, 而不是全部的实施例。 基于本发明中的实施例, 本领域普通技术人员在没有做出创造性劳动的前 提下所获得的所有其他实施例, 都属于本发明保护的范围。  The technical solutions in the embodiments of the present invention are clearly and completely described in the following with reference to the accompanying drawings in the embodiments of the present invention. It is a partial embodiment of the invention, and not all of the embodiments. All other embodiments obtained by a person of ordinary skill in the art based on the embodiments of the present invention without departing from the inventive work are all within the scope of the present invention.
图 1为本发明数据流旁路的方法实施例一的流程图, 如图 1所示, 该 数据流旁路的方法可以包括:  1 is a flowchart of Embodiment 1 of a method for bypassing a data stream according to the present invention. As shown in FIG. 1, the method for bypassing the data stream may include:
步骤 101 , 业务旁路功能实体对用户设备发送的信令建立消息进行检 测, 或者对用户设备在首次上下文上的数据流进行检测, 获得该用户设备 的业务信息。  Step 101: The service bypass function entity detects the signaling establishment message sent by the user equipment, or detects the data flow of the user equipment on the first context, and obtains the service information of the user equipment.
本实施例中, 上述信令建立消息可以为用户设备发出的首次上下文激 活消息或二次上下文激活;肖 , ¾。  In this embodiment, the signaling establishment message may be a first context activation message or a secondary context activation sent by the user equipment;
其中, PDP上下文是在 MS、 GGSN中保存的与 PDP相关的信息, 相 当于 GPRS隧道协议 ( GPRS Tunnelling Protocol; 以下简称: GTP ) 隧道 描述表, 通常也可以将一个 PDP上下文称作一个 GTP隧道。  The PDP context is a PDP-related information stored in the MS and the GGSN. It is similar to the GPRS Tunneling Protocol (GTP) tunnel description table. Generally, a PDP context can also be called a GTP tunnel.
PDP上下文激活就是发起一次分组数据业务呼叫的过程, 可由用户设 备发起, 也可由网络侧设备发起。 PDP上下文被第一次激活后即建立首次 上下文,首次上下文的业务流模板 ( Traffic Flow Template; 以下简称: TFT ) 信息一般为空或者通配; 在发起一次激活建立首次上下文之后, 可以发起 二次激活建立二次上下文, 建立二次上下文的主要目的是用不同上下文承 载不同服务质量 ( Quality of Service; 以下简称: QoS ) 的业务。 The PDP context activation is a process of initiating a packet data service call, which may be initiated by the user equipment or by the network side device. The PDP context is established for the first time after being activated for the first time. Context, traffic flow template (hereinafter referred to as: TFT) information of the first context is generally empty or wildcarded; after initiating an activation to establish the first context, a secondary activation may be initiated to establish a secondary context, and a secondary context is established. The main purpose is to carry different services with different quality of service (QoS).
本实施例中, 上述用户设备的业务信息包括该用户设备的国际移动用 户识别码 ( International Mobile Subscriber Identity; 以下简称: IMSI ) 、 APN和 TFT中的一个或多个。  In this embodiment, the service information of the user equipment includes one or more of an International Mobile Subscriber Identity (IMSI), an APN, and a TFT of the user equipment.
步骤 102, 业务旁路功能实体获得与该用户设备的业务信息对应的 SIPTO策略。  Step 102: The service bypass function entity obtains a SIPTO policy corresponding to the service information of the user equipment.
具体地, 业务旁路功能实体可以将该用户设备的业务信息发送给策略 和计费规贝 'J功能 ( Policy and Charging Rules Function; 以下简称: PCRF ) 实体, 并接收该 PCRF实体根据该用户设备的业务信息、 该 PCRF实体的 配置信息、运营商策略和该用户设备的签约信息确定的 SIPTO策略;或者, 业务旁路功能实体可以将该用户设备的业务信息发送给 PCRF实体, 接收该 PCRF实体根据该用户设备的业务信息、该 PCRF实体的配置信息、 运营商策略和用户设备的签约信息确定的 SIPTO策略的名称, 根据该 SIPTO策略的名称激活预定义在业务旁路功能实体上的 SIPTO策略; 或 者,  Specifically, the service bypass function entity may send the service information of the user equipment to a Policy and Charging Rules Function (hereinafter referred to as: PCRF) entity, and receive the PCRF entity according to the user equipment. The service information, the configuration information of the PCRF entity, the operator policy, and the SIPTO policy determined by the subscription information of the user equipment; or the service bypass function entity may send the service information of the user equipment to the PCRF entity, and receive the PCRF entity. The SIPTO policy defined on the service bypass function entity is activated according to the name of the SIPTO policy according to the service information of the user equipment, the configuration information of the PCRF entity, the operator policy, and the subscription information of the user equipment. Or,
业务旁路功能实体可以根据用户设备的业务信息、 该业务旁路功能实 体的配置信息、运营商策略和用户设备的签约信息激活预定义在该业务旁 路功能实体上的 SIPTO策略。  The service bypass function entity may activate the SIPTO policy predefined on the service bypass function entity according to the service information of the user equipment, the configuration information of the service bypass function entity, the operator policy, and the subscription information of the user equipment.
步骤 103 , 业务旁路功能实体根据该 SIPTO策略对接收到的数据流进 行旁路。 Step 103: The service bypass function entity feeds the received data stream according to the SIPTO policy. Line bypass.
具体地, 在本实施例的一种实现方式中, 如果业务旁路功能实体在首 次上下文建立过程中获得上述 SIPTO策略,则该业务旁路功能实体可以先 将该 SIPTO策略绑定在二次上下文上,该二次上下文建立在该业务旁路功 能实体与该用户设备之间。 这时, 如果已建立的二次上下文中没有适合绑 定该 SIPTO策略的二次上下文,则该业务旁路功能实体可以发起建立适合 绑定该 SIPTO策略的二次上下文的过程; 在建立适合绑定该 SIPTO策略 的二次上下文的过程中,当该 SIPTO策略指示需要对与该用户设备的业务 信息对应的数据流进行旁路时,将上述适合绑定该 SIPTO策略的二次上下 文建立在该用户设备与该业务旁路功能实体之间。  Specifically, in an implementation manner of this embodiment, if the service bypass function entity obtains the SIPTO policy in the first context establishment process, the service bypass function entity may first bind the SIPTO policy to the secondary context. The secondary context is established between the service bypass function entity and the user equipment. At this time, if there is no secondary context suitable for binding the SIPTO policy in the established secondary context, the service bypass function entity may initiate a process of establishing a secondary context suitable for binding the SIPTO policy; In the process of determining the secondary context of the SIPTO policy, when the SIPTO policy indicates that the data flow corresponding to the service information of the user equipment needs to be bypassed, the secondary context suitable for binding the SIPTO policy is established in the Between the user equipment and the service bypass function entity.
在本实施例的另一种实现方式中, 如果业务旁路功能实体在二次上下 文建立过程中获得上述 SIPTO策略, 当该 SIPTO策略指示需要对与该用 户设备的业务信息对应的数据流进行旁路时, 将上述二次上下文建立在该 用户设备与该业务旁路功能实体之间。  In another implementation manner of this embodiment, if the service bypass function entity obtains the SIPTO policy in the secondary context establishment process, the SIPTO policy indicates that the data flow corresponding to the service information of the user equipment needs to be performed next to In the case of a road, the above secondary context is established between the user equipment and the service bypass function entity.
在本实施例的上述两种实现方式中, 当用户设备在上述二次上下文上 进行业务时, 业务旁路功能实体可以在确定无线网络控制器传输的通过隧 道协议封装的数据流的目的地址为该业务旁路功能实体的地址之后, 旁路 该数据流; 其中, 上述隧道协议可以为 GTP, 当然本发明实施例并不仅限 于此, 上述隧道协议也可以为其他的隧道协议, 本发明实施例对上述数据 流在封装时所采用的隧道协议不作限定。  In the above two implementation manners of the embodiment, when the user equipment performs the service on the secondary context, the service bypass function entity may determine that the destination address of the data flow encapsulated by the tunneling protocol transmitted by the radio network controller is After the service bypasses the address of the functional entity, the data flow is bypassed. The tunneling protocol may be a GTP. The embodiment of the present invention is not limited thereto. The tunneling protocol may also be another tunneling protocol. The tunneling protocol used when the above data stream is encapsulated is not limited.
在本实施例的再一种实现方式中, 如果业务旁路功能实体在首次上下 文建立过程中获得上述 SIPTO策略,则该业务旁路功能实体可以先记录该 SIPTO策略; 然后, 当该用户设备在上述首次上下文进行业务时, 该业务 旁路功能实体将记录的 SIPTO策略与接收到的数据流进行匹配, 对与该 SIPTO策略中的业务流检测信息匹配成功的数据流进行旁路。 In a further implementation of this embodiment, if the service bypass function entity obtains the SIPTO policy in the first context establishment process, the service bypass function entity may record the The SIPTO policy; then, when the user equipment performs the service in the first context, the service bypass function entity matches the recorded SIPTO policy with the received data stream, and successfully matches the service flow detection information in the SIPTO policy. The data stream is bypassed.
本实施例中, SIPTO策略至少可以包括业务流检测信息, 还可以包括 SIPTO指示、 计费信息和 Qo S信息中的一个或多个。  In this embodiment, the SIPTO policy may include at least one service flow detection information, and may further include one or more of a SIPTO indication, charging information, and Qo S information.
上述实施例中, 业务旁路功能实体获得用户设备的业务信息之后, 获 得与该用户设备的业务信息对应的 SIPTO策略, 然后根据该 SIPTO策略 对接收到的数据流进行旁路。 从而实现了在同一 APN下根据用户设备进 行的不同业务进行旁路处理。  In the foregoing embodiment, after obtaining the service information of the user equipment, the service bypass function entity obtains a SIPTO policy corresponding to the service information of the user equipment, and then bypasses the received data stream according to the SIPTO policy. Therefore, bypass processing is performed according to different services performed by the user equipment under the same APN.
图 2为本发明数据流旁路的方法实施例二的流程图, 如图 2所示, 该 数据流旁路的方法可以包括:  2 is a flowchart of Embodiment 2 of a method for bypassing a data stream according to the present invention. As shown in FIG. 2, the method for bypassing the data stream may include:
步骤 201 , UE进行业务, 发送上行数据流, 该上行数据流的源地址为 SRC1 , 目的地址为 DST1。  Step 201: The UE performs a service, and sends an uplink data stream. The source address of the uplink data stream is SRC1, and the destination address is DST1.
步骤 202 , 业务旁路功能( Traffic Offload Function; 以下简称: TOF ) 实体对该上行数据流进行深度包检测( Deep Packet Inspection; 以下简称: DPI ) , 获得该 UE的业务信息。  Step 202: A traffic offload function (hereinafter referred to as a TOF) entity performs Deep Packet Inspection (DPI) on the uplink data stream to obtain service information of the UE.
步骤 203 , TOF实体将该 UE的业务信息发送给 PCRF实体。  Step 203: The TOF entity sends the service information of the UE to the PCRF entity.
具体地, 本实施例中 , TOF实体可以通过该 TOF实体与该 PCRF实 体之间的 Tx接口将该 UE的业务信息发送给 PCRF实体。 在具体实现时, TOF实体可以通过信用控制请求( Credit Control Request;以下简称: CCR ) 消息携带上述 UE的业务信息。  Specifically, in this embodiment, the TOF entity may send the service information of the UE to the PCRF entity by using a Tx interface between the TOF entity and the PCRF entity. In a specific implementation, the TOF entity may carry the service information of the UE by using a Credit Control Request (CCR) message.
步骤 204, PCRF实体根据该 UE的业务信息、 该 PCRF实体的配置信 息、 运营商策略和用户签约数据库 ( Subscription Profile Repository; 以下 简称: SPR ) 中该 UE的签约信息确定与该 UE的业务信息对应的 SIPTO 策略。 Step 204: The PCRF entity according to the service information of the UE, and the configuration information of the PCRF entity The subscription information of the UE in the information, the operator policy, and the subscriber subscription database (SPR) determines the SIPTO policy corresponding to the service information of the UE.
步骤 205 , PCRF实体将上述 SIPTO策略发送给 TOF实体。  Step 205: The PCRF entity sends the SIPTO policy to the TOF entity.
具体地, 本实施例中 , PCRF实体可以通过该 TOF实体与该 PCRF实 体之间的 Tx接口将上述 SIPTO策略发送给 TOF实体。 在具体实现时, PCRF实体可以通过信用控制应答( Credit Control Answer;以下简称: CCA ) 消息携带上述 SIPTO策略。  Specifically, in this embodiment, the PCRF entity may send the SIPTO policy to the TOF entity by using a Tx interface between the TOF entity and the PCRF entity. In a specific implementation, the PCRF entity may carry the SIPTO policy by using a Credit Control Answer (CCA) message.
步骤 206, TOF实体装载上述 SIPTO策略。 具体地, 由于二次上下文 的 TFT各不相同,因此 TOF实体可以根据 SIPTO策略中的业务流检测信 息与二次上下文的 TFT,将该 SIPTO策略绑定到对应的二次上下文上,如 果已建立的二次上下文中没有适合绑定该 SIPTO策略的二次上下文,则该 TOF实体发起建立适合绑定该 SIPTO策略的二次上下文的过程, 然后再 将该 SIPTO策略绑定到新建的二次上下文上。 在建立适合绑定该 SIPTO 策略的二次上下文的过程中, 当该 SIPTO策略指示需要对与该 UE的业务 信息对应的数据流进行旁路时, TOF实体将上述适合绑定该 SIPTO策略 的二次上下文建立在该 UE与该 TOF实体之间。  Step 206: The TOF entity loads the SIPTO policy described above. Specifically, since the TFTs of the secondary context are different, the TOF entity may bind the SIPTO policy to the corresponding secondary context according to the service flow detection information in the SIPTO policy and the TFT of the secondary context, if There is no secondary context suitable for binding the SIPTO policy in the secondary context, then the TOF entity initiates the process of establishing a secondary context suitable for binding the SIPTO policy, and then binds the SIPTO policy to the newly created secondary context. on. In the process of establishing a secondary context suitable for binding the SIPTO policy, when the SIPTO policy indicates that the data flow corresponding to the service information of the UE needs to be bypassed, the TOF entity applies the foregoing two that are suitable for binding the SIPTO policy. The secondary context is established between the UE and the TOF entity.
步骤 207,当 UE在绑定 SIPTO策略的二次上下文上进行业务时, TOF 实体根据该 SIPTO策略确定是否对数据流进行旁路处理。 具体地, 当 UE 在绑定 SIPTO策略的二次上下文进行业务时, TOF实体确定无线网络控 制器( Radio Network Controller; 以下简称: RNC )传输的采用 GTP封装 的数据流的目的地址为该 TOF实体的地址之后, 该 TOF实体确定对该数 据流进行旁路处理, 进入步骤 208〜步骤 211 ; 反之, TOF实体确定 RNC 传输的采用 GTP封装的数据流的目的地址不是该 TOF实体的地址之后, 该 TOF实体确定不对该数据流进行旁路处理, 进入步骤 212〜步骤 215。 Step 207: When the UE performs a service on the secondary context bound to the SIPTO policy, the TOF entity determines whether to bypass the data flow according to the SIPTO policy. Specifically, when the UE performs the service in the secondary context of the SIPTO policy, the TOF entity determines that the destination address of the GTP-encapsulated data stream transmitted by the radio network controller (Radio Network Controller; RNC) is the TOF entity. After the address, the TOF entity determines the number The bypass processing is performed according to the flow, and the process proceeds to steps 208 to 211. Otherwise, after the TOF entity determines that the destination address of the GTP-encapsulated data stream transmitted by the RNC is not the address of the TOF entity, the TOF entity determines not to bypass the data flow. Processing proceeds to step 212 to step 215.
步骤 208, TOF实体对接收到的上行数据流进行 GTP解封装, 再进行 网络地址转换 ( Network Address Translation; 以下简称: NAT ) 处理后, 将该上行数据流路由到分组数据网络( Packet Data Network; 以下简称: PDN ) 。 TOF实体记录 NAT表项, 用于后续恢复 NAT时使用; 该 NAT 表项包括网络地址转换前后该上行数据流的端口号和地址信息, 以及传送 该上行数据流的 RNC与 SGSN之间的 GTP隧道信息。  Step 208: The TOF entity performs GTP decapsulation on the received uplink data stream, and performs network address translation (NAT) processing, and then routes the uplink data stream to the packet data network (Packet Data Network; Hereinafter referred to as: PDN). The TOF entity records a NAT entry, which is used for subsequent recovery of the NAT; the NAT entry includes the port number and address information of the upstream data flow before and after the network address translation, and the GTP tunnel between the RNC and the SGSN that transmits the upstream data flow. information.
步骤 209, TOF实体接收到需要旁路的业务的下行数据流。  Step 209: The TOF entity receives the downlink data flow of the service that needs to be bypassed.
步骤 210, TOF实体将上述下行数据流的五元组信息与记录的 NAT 表项中的五元组信息进行匹配, 根据匹配成功的 NAT表项将该下行数据 流的目的地址和端口号恢复为进行 NAT处理之前的地址和端口号, 然后 利用 NAT表项里记录的 GTP隧道信息, 对该下行数据流进行 GTP封装。  Step 210: The TOF entity matches the quintuple information of the downlink data stream with the quintuple information in the recorded NAT entry, and restores the destination address and port number of the downlink data flow to the destination address and port number of the downlink data stream according to the successfully matched NAT entry. The address and port number before the NAT processing is performed, and then the GTP encapsulation of the downlink data stream is performed by using the GTP tunnel information recorded in the NAT entry.
具体地, 记录的 NAT表项包括五元组信息, 该五元组信息即为源端 口号、 目的端口号、 源 IP地址、 目的 IP地址和传输协议; TOF实体接收 到需要旁路的业务的下行数据流之后, 将该下行数据流的五元组信息与记 录的 NAT表项中的五元组信息进行匹配, 确定与下行数据流具有相同五 元组信息的 NAT表项为匹配成功的 NAT表项; 然后 , TOF实体就可以根 据该匹配成功的 NAT表项将该下行数据流的目的地址和端口号恢复为进 行 NAT处理之前的地址和端口号。  Specifically, the recorded NAT entry includes five-tuple information, that is, a source port number, a destination port number, a source IP address, a destination IP address, and a transmission protocol; and the TOF entity receives the service that needs to be bypassed. After the downlink data stream, the quintuple information of the downlink data stream is matched with the quintuple information in the recorded NAT entry, and the NAT entry with the same quintuple information as the downlink data flow is determined to be a successfully matched NAT. The entry can then restore the destination address and port number of the downstream data stream to the address and port number before NAT processing according to the successfully matched NAT entry.
步骤 211 , TOF实体将进行 GTP封装后的下行数据流通过 RNC发送 给 UE。 Step 211: The TOF entity sends the downlink data stream after the GTP encapsulation is sent through the RNC. Give the UE.
步骤 212, 对于上行数据流, TOF实体将不需要进行旁路处理的上行 数据流透传至 SGSN, 再由 SGSN将该上行数据流发送给 GGSN。  Step 212: For the uplink data stream, the TOF entity transparently transmits the uplink data stream that does not need to be bypassed to the SGSN, and then sends the uplink data stream to the GGSN by the SGSN.
步骤 213 , GGSN通过 Gi接口将该上行数据流路由至 PDN。  Step 213: The GGSN routes the uplink data stream to the PDN through the Gi interface.
步骤 214, GGSN接收到下行数据流。  Step 214, the GGSN receives the downlink data stream.
步骤 215 , GGSN通过 GTP隧道将上述下行数据流通过 SGSN和 RNC 发送给 UE。  Step 215: The GGSN sends the downlink data stream to the UE through the SGSN and the RNC through the GTP tunnel.
另外, 在本实施例的另一种实现方式中, 如果 TOF实体在首次上下 文建立过程中获得 SIPTO策略,则该 TOF实体可以记录上述 SIPTO策略, 当该 UE在上述首次上下文进行业务时, 该 TOF实体将记录的 SIPTO策 略与接收到的数据流的五元组信息进行匹配,确定对与该 SIPTO策略中的 业务流检测信息匹配成功的数据流进行旁路处理,执行步骤 208〜步骤 211; 反之, 该 TOF实体将记录的 SIPTO策略与接收到的数据流进行匹配, 确 定对与该 SIPTO策略中的业务流检测信息匹配失败的数据流不进行旁路, 执行步骤 212〜步骤 215。  In addition, in another implementation manner of this embodiment, if the TOF entity obtains the SIPTO policy in the first context establishment process, the TOF entity may record the SIPTO policy, and when the UE performs the service in the first context, the TOF The entity matches the recorded SIPTO policy with the quintuple information of the received data stream, and determines to bypass the data stream that successfully matches the service flow detection information in the SIPTO policy, and performs steps 208 to 211; The TOF entity matches the recorded SIPTO policy with the received data stream, and determines that the data stream that fails to match the service flow detection information in the SIPTO policy is not bypassed, and steps 212 to 215 are performed.
具体地, SIPTO策略中的业务流检测信息包括五元组信息, 即业务流 的源端口号、 目的端口号、 源 IP地址、 目的 IP地址和传输协议, TOF实 体接收到数据流之后,将 SIPTO策略中业务流检测信息包括的五元组信息 与接收到的数据流的五元组信息进行匹配, 如果接收到的数据流与业务流 检测信息具有相同的五元组信息时, 则 TOF实体确定接收到的数据流与 记录的 SIPTO策略中的业务流检测信息匹配成功,需要对该接收到的数据 流进行旁路; 反之, 如果接收到的数据流与业务流检测信息的五元组信息 不同, 则 TOF实体确定接收到的数据流与记录的 SIPTO策略中的业务流 检测信息匹配失败, 不需要对该接收到的数据流进行旁路。 Specifically, the service flow detection information in the SIPTO policy includes quintuple information, that is, a source port number, a destination port number, a source IP address, a destination IP address, and a transmission protocol of the service flow, and after the TOF entity receives the data stream, the SIPTO is The quintuple information included in the service flow detection information in the policy matches the quintuple information of the received data stream. If the received data stream and the service flow detection information have the same quintuple information, the TOF entity determines The received data stream is successfully matched with the service flow detection information in the recorded SIPTO policy, and the received data stream needs to be bypassed; otherwise, if the received data stream and the service flow detection information are quintuple information Differently, the TOF entity determines that the received data stream fails to match the service flow detection information in the recorded SIPTO policy, and does not need to bypass the received data stream.
上述实施例中, TOF实体通过对 UE发送的数据流进行检测, 获得该 UE的业务信息之后, 将该 UE的业务信息发送给 PCRF实体, 并接收该 PCRF实体发送的与该用户设备的业务信息对应的 SIPTO策略, 然后根据 该 SIPTO策略对接收到的数据流进行旁路。 从而实现了在同一 APN下根 据 UE进行的不同业务进行旁路处理。  In the foregoing embodiment, the TOF entity sends the service information sent by the UE to the PCRF entity, and receives the service information sent by the PCRF entity, and the service information sent by the PCRF entity, after the service data sent by the UE is obtained, and the service information of the UE is obtained. The corresponding SIPTO policy then bypasses the received data stream according to the SIPTO policy. Therefore, bypass processing is performed according to different services performed by the UE under the same APN.
图 3为本发明数据流旁路的方法实施例三的流程图, 如图 3所示, 该 数据流旁路的方法可以包括:  3 is a flowchart of Embodiment 3 of a method for bypassing a data stream according to the present invention. As shown in FIG. 3, the method for bypassing the data stream may include:
步骤 301 , UE发送首次上下文激活请求。  Step 301: The UE sends a first context activation request.
步骤 302, TOF实体截获到该首次上下文激活请求之后, 对该首次上 下文激活请求进行检测, 获得该 UE的 APN、 IMSI、 IP连接接入网络 ( IP-Connectivity Access Network; 以下简称: IP-CAN ) 类型和无线接入 技术( Radio Access Technology; 以下简称: RAT )类型, 以及该 UE的目 的用户地址 ( End User Address ) 。  Step 302: After intercepting the first context activation request, the TOF entity detects the first context activation request, and obtains an APN, an IMSI, and an IP connection access network (IP-Connectivity Access Network; IP-CAN) of the UE. Type and radio access technology (Radio Access Technology; hereinafter referred to as: RAT) type, and the UE's End User Address.
步骤 303 , TOF实体向 PCRF实体发送 CCR消息, 该 CCR消息携带 该 UE的 APN、 IMSI、 IP-CAN类型和 RAT类型 , 以及该 UE的 End User Address , 发起创建 Tx会话的过程。  Step 303: The TOF entity sends a CCR message to the PCRF entity, where the CCR message carries the APN, IMSI, IP-CAN type, and RAT type of the UE, and the End User Address of the UE, and initiates a process of creating a Tx session.
其中, 该 Tx为 TOF实体与 PCRF实体之间的接口。  The Tx is an interface between the TOF entity and the PCRF entity.
步骤 304, PCRF实体根据 CCR消息中携带的信息, 将一个或一组预 定义的 SIPTO策略的名称通过 CCA消息发送给 TOF实体。  Step 304: The PCRF entity sends the name of one or a group of predefined SIPTO policies to the TOF entity by using a CCA message according to the information carried in the CCR message.
具体地, PCRF实体可以通过 CCA消息的计费规则安装 ( Charging-Rule-Install ) 字段中的计费规则名称 ( Charging-Rule-Name ) 或者计费规则基本名称( Charging-Rule-Base-Name ) , 将一个或一组预定 义的 SIPTO策略的名称发送给 TOF实体。 Specifically, the PCRF entity can be installed through the charging rule of the CCA message. The Charging-Rule-Name in the Charging-Rule-Install field or the Charging-Rule-Base-Name, which sends the name of one or a set of predefined SIPTO policies. Give the TOF entity.
步骤 305 , TOF实体将首次上下文激活请求发送给 SGSN。  Step 305: The TOF entity sends a first context activation request to the SGSN.
步骤 306 , SGSN向 GGSN发送 PDP上下文建立请求,触发建立 IP-CAN 会话。  Step 306: The SGSN sends a PDP context establishment request to the GGSN to trigger establishment of an IP-CAN session.
步骤 307, IP-CAN会话建立过程。  Step 307, an IP-CAN session establishment process.
步骤 308, GGSN向 SGSN发送 PDP上下文建立响应。  Step 308: The GGSN sends a PDP context establishment response to the SGSN.
步骤 309, SGSN向 UE发送首次上下文激活响应。  Step 309: The SGSN sends a first context activation response to the UE.
步骤 310, TOF实体根据 PCRF实体发送的 SIPTO策略的名称激活预 定义在该 TOF实体上的 SIPTO策略。  Step 310: The TOF entity activates a SIPTO policy predefined on the TOF entity according to the name of the SIPTO policy sent by the PCRF entity.
步骤 311 , TOF实体装载上述 SIPTO策略。 具体地, 该 TOF实体可 以执行承载绑定, 将该 SIPTO策略绑定到二次上下文上,如果已建立的二 次上下文中没有适合绑定该 SIPTO策略的二次上下文, 则该 TOF实体发 起建立适合绑定该 SIPTO策略的二次上下文的过程。 在建立适合绑定该 SIPTO策略的二次上下文的过程中, 当该 SIPTO策略指示需要对与该 UE 的业务信息对应的数据流进行旁路时,将上述适合绑定该 SIPTO策略的二 次上下文建立在该 UE与该 TOF实体之间; 当该 SIPTO策略指示不需要 对与该 UE的业务信息对应的数据流进行旁路时, 将上述适合绑定该 SIPTO策略的二次上下文建立在该 UE与 GGSN之间。  Step 311: The TOF entity loads the foregoing SIPTO policy. Specifically, the TOF entity may perform bearer binding, and bind the SIPTO policy to the secondary context. If the secondary context in the established secondary context does not have a secondary context suitable for binding the SIPTO policy, the TOF entity initiates establishment. A process suitable for binding a secondary context of the SIPTO policy. In the process of establishing a secondary context suitable for binding the SIPTO policy, when the SIPTO policy indicates that a data flow corresponding to the service information of the UE needs to be bypassed, the above secondary context suitable for binding the SIPTO policy is used. Established between the UE and the TOF entity; when the SIPTO policy indicates that the data flow corresponding to the service information of the UE does not need to be bypassed, establishing the secondary context suitable for binding the SIPTO policy on the UE Between the GGSN.
步骤 312, 当 UE在上述二次上下文进行业务时, TOF实体确定是否 对数据流进行旁路。 具体地, 当 UE在上述二次上下文进行业务时, TOF 实体确定 RNC传输的 GTP封装的数据流的目的地址为该 TOF实体的地址 之后, 该 TOF实体确定对该数据流进行旁路处理; 反之, TOF实体确定 RNC传输的 GTP封装的数据流的目的地址不是该 TOF实体的地址之后, 该 TOF实体确定不对该数据流进行旁路处理。 Step 312: When the UE performs a service in the foregoing secondary context, the TOF entity determines whether to bypass the data flow. Specifically, when the UE performs the service in the above secondary context, the TOF After the entity determines that the destination address of the GTP encapsulated data stream transmitted by the RNC is the address of the TOF entity, the TOF entity determines to bypass the data stream; otherwise, the TOF entity determines the destination address of the GTP encapsulated data stream transmitted by the RNC. After the address of the TOF entity, the TOF entity determines not to bypass the data stream.
另外, 在本实施例的另一种实现方式中, 在步骤 310, TOF实体激活 预定义在该 TOF实体上的 SIPTO策略之后, 该 TOF实体可以记录上述 SIPTO策略, 当该 UE在上述首次上下文进行业务时, 该 TOF实体将记录 的 SIPTO策略与接收到的数据流的五元组信息进行匹配, 确定对与该 SIPTO策略中的业务流检测信息匹配成功的数据流进行旁路处理; 反之, 该 TOF实体将记录的 SIPTO策略与接收到的数据流进行匹配, 确定对与 该 SIPTO策略中的业务流检测信息匹配失败的数据流不进行旁路。  In addition, in another implementation manner of this embodiment, after the TOF entity activates the SIPTO policy predefined on the TOF entity, the TOF entity may record the SIPTO policy, where the UE performs the first context in the foregoing context. In the service, the TOF entity matches the recorded SIPTO policy with the quintuple information of the received data stream, and determines to bypass the data stream that successfully matches the service flow detection information in the SIPTO policy; The TOF entity matches the recorded SIPTO policy with the received data stream, and determines that the data stream that fails to match the service flow detection information in the SIPTO policy is not bypassed.
具体地,在将 SIPTO策略中的业务流检测信息与接收到的数据流进行 匹配时, 可以采用本发明图 2所示实施例提供的方法, 在此不再贅述。  Specifically, when the service flow detection information in the SIPTO policy is matched with the received data flow, the method provided in the embodiment shown in FIG. 2 of the present invention may be used, and details are not described herein again.
本实施例中,该 TOF实体确定进行旁路处理之后的步骤与本发明图 2 所示实施例步骤 208〜步骤 211相同, 在此不再贅述; 该 TOF实体确定不 对该数据流进行旁路处理之后的步骤与本发明图 2所示实施例步骤 212〜 步骤 215相同, 在此不再贅述。  In this embodiment, the step after the TOF entity determines that the bypass processing is performed is the same as the steps 208 to 211 of the embodiment shown in FIG. 2 of the present invention, and details are not described herein again; the TOF entity determines that the data stream is not bypassed. The subsequent steps are the same as steps 212 to 215 of the embodiment shown in FIG. 2 of the present invention, and details are not described herein again.
上述实施例中, TOF实体通过对 UE发送的首次上下文激活请求进行 检测, 获得该 UE的业务信息之后, 将该 UE的业务信息发送给 PCRF实 体, 并接收该 PCRF实体发送的与该 UE的业务信息对应的 SIPTO策略的 名称, 根据该 SIPTO策略的名称激活预定义在该 TOF实体上的 SIPTO策 略, 然后根据该 SIPTO策略对接收到的数据流进行旁路。从而实现了在同 一 APN下根据 UE进行的不同业务进行旁路处理。 In the above embodiment, the TOF entity detects the first context activation request sent by the UE, obtains the service information of the UE, and then sends the service information of the UE to the PCRF entity, and receives the service sent by the PCRF entity and the UE. The name of the SIPTO policy corresponding to the information, activates the SIPTO policy predefined on the TOF entity according to the name of the SIPTO policy, and then bypasses the received data stream according to the SIPTO policy. Thus achieving the same Under one APN, the bypass processing is performed according to different services performed by the UE.
图 4为本发明数据流旁路的方法实施例四的流程图, 如图 4所示, 该 数据流旁路的方法可以包括:  4 is a flowchart of Embodiment 4 of a method for bypassing a data stream according to the present invention. As shown in FIG. 4, the method for bypassing the data stream may include:
步骤 401 , UE发送二次上下文激活请求。  Step 401: The UE sends a secondary context activation request.
步骤 402, TOF截获到该二次上下文激活请求之后, 对该二次上下文 激活请求进行检测, 获得该 UE的 TFT信息。  Step 402: After the TOF intercepts the secondary context activation request, the TOC detects the secondary context activation request to obtain TFT information of the UE.
步骤 403 , TOF实体通过 CCR消息将该 UE的 TFT信息发送给 PCRF 实体。  Step 403: The TOF entity sends the TFT information of the UE to the PCRF entity by using a CCR message.
步骤 404, PCRF实体根据该 UE的 TFT信息、 该 PCRF实体的配置 信息、运营商策略和 SPR中该 UE的签约信息确定与该 UE的 TFT信息对 应的 SIPTO策略。  Step 404: The PCRF entity determines a SIPTO policy corresponding to the TFT information of the UE according to the TFT information of the UE, the configuration information of the PCRF entity, the operator policy, and the subscription information of the UE in the SPR.
本实施例中, TFT信息即为业务流模版信息, 包含分组过滤器信息。 步骤 405 , PCRF实体将上述 SIPTO策略通过 CCA消息发送给 TOF 实体。  In this embodiment, the TFT information is service flow template information, and includes packet filter information. Step 405: The PCRF entity sends the SIPTO policy to the TOF entity by using a CCA message.
如果该 SIPTO策略里指示该 UE的 TFT信息对应的数据流不需要进 行旁路, 则进入步骤 406〜步骤 411 ; 如果该 SIPTO策略里指示该 UE的 TFT信息对应的数据流需要进行旁路, 则进入步骤 412〜步骤 413。  If the data flow corresponding to the TFT information of the UE in the SIPTO policy does not need to be bypassed, the process proceeds to step 406 to step 411; if the data flow corresponding to the TFT information of the UE needs to be bypassed in the SIPTO policy, Proceed to steps 412 to 413.
步骤 406, TOF实体将 UE发送的二次上下文激活请求发送给 SGSN。 步骤 407, SGSN向 GGSN发送二次上下文建立请求。  Step 406: The TOF entity sends a secondary context activation request sent by the UE to the SGSN. Step 407: The SGSN sends a secondary context establishment request to the GGSN.
步骤 408 , GGSN发起 IP-CAN会话修改流程。  Step 408: The GGSN initiates an IP-CAN session modification process.
步骤 409, GGSN向 SGSN发送二次上下文建立响应。  Step 409: The GGSN sends a secondary context establishment response to the SGSN.
步骤 410, 无线接入承载(Radio Access Bearer; 以下简称: RAB )建 立。 Step 410: A radio access bearer (Radio Access Bearer; hereinafter referred to as RAB) is built. Standing.
步骤 411 , SGSN向 UE发送二次上下文激活响应。  Step 411: The SGSN sends a secondary context activation response to the UE.
步骤 412, TOF实体发起建立 RAB的过程。  Step 412: The TOF entity initiates a process of establishing an RAB.
步骤 413 , TOF实体向 UE回复二次上下文激活响应。  Step 413: The TOF entity replies to the UE with a secondary context activation response.
至此, 在该 UE与 TOF实体之间建立了二次上下文。 在这种情况下, 后续当 UE在该二次上下文进行业务时, TOF实体确定 RNC传输的 GTP 封装的数据流的目的地址为该 TOF实体的地址之后, 该 TOF实体确定对 该数据流进行旁路处理。  So far, a secondary context is established between the UE and the TOF entity. In this case, after the UE performs the service in the secondary context, the TOF entity determines that the destination address of the GTP encapsulated data stream transmitted by the RNC is the address of the TOF entity, and the TOF entity determines to perform the data flow. Road processing.
上述实施例中, TOF实体通过对 UE发送的二次上下文激活请求进行 检测, 获得该 UE的 TFT信息之后, 将该 UE的 TFT信息发送给 PCRF实 体,并接收该 PCRF实体发送的与该用户设备的业务信息对应的 SIPTO策 略, 然后根据该 SIPTO策略对接收到的数据流进行旁路。从而实现了在同 一 APN下根据 UE进行的不同业务进行旁路处理。  In the above embodiment, the TOF entity detects the secondary context activation request sent by the UE, obtains the TFT information of the UE, and then sends the TFT information of the UE to the PCRF entity, and receives the user equipment sent by the PCRF entity. The service information corresponds to the SIPTO policy, and then the received data stream is bypassed according to the SIPTO policy. Therefore, bypass processing is performed according to different services performed by the UE under the same APN.
图 5为本发明数据流旁路的方法实施例五的流程图, 如图 5所示, 该 数据流旁路的方法可以包括:  5 is a flowchart of Embodiment 5 of a method for bypassing a data stream according to the present invention. As shown in FIG. 5, the method for bypassing the data stream may include:
步骤 501 , UE发送首次上下文激活请求。  Step 501: The UE sends a first context activation request.
步骤 502, TOF实体截获该首次上下文激活请求之后, 对该首次上下 文激活请求进行检测, 获得该 UE的业务信息。  Step 502: After the TOC entity intercepts the first context activation request, the TOC entity detects the first context activation request, and obtains service information of the UE.
步骤 503 , TOF将该首次上下文激活请求发送给 SGSN。  Step 503: The TOF sends the first context activation request to the SGSN.
步骤 504, SGSN向 GGSN发送 PDP上下文建立请求。  Step 504: The SGSN sends a PDP context establishment request to the GGSN.
步骤 505 , GGSN建立首次上下文之后, 向 SGSN回复 PDP上下文建 立响应。 步骤 506, SGSN向 UE发送首次上下文激活响应。 Step 505: After establishing the first context, the GGSN returns a PDP context establishment response to the SGSN. Step 506: The SGSN sends a first context activation response to the UE.
步骤 507, TOF实体探测到 SGSN向 UE发送的首次上下文激活响应 之后, TOF实体根据该 UE的业务信息、 TOF实体的配置信息、 运营商策 略和该 UE的签约信息激活预定义在该 TOF实体上的 SIPTO策略。  Step 507: After the TOF entity detects the first context activation response sent by the SGSN to the UE, the TOF entity activates the predefined TOF entity according to the service information of the UE, the configuration information of the TOF entity, the operator policy, and the subscription information of the UE. SIPTO strategy.
步骤 508, TOF执行承载绑定,将该 SIPTO策略绑定到二次上下文上, 如果已建立的二次上下文中没有适合绑定该 SIPTO策略的二次上下文,则 该 TOF实体发起建立适合绑定该 SIPTO策略的二次上下文的过程。 在建 立适合绑定该 SIPTO策略的二次上下文的过程中, 当该 SIPTO策略指示 需要对与该 UE的业务信息对应的数据流进行旁路时, 将上述适合绑定该 SIPTO策略的二次上下文建立在该 UE与该 TOF实体之间。  Step 508: The TOF performs a bearer binding, and binds the SIPTO policy to the secondary context. If the secondary context in the established secondary context does not have a secondary context suitable for binding the SIPTO policy, the TOF entity initiates establishment of a binding. The secondary context of the SIPTO strategy. In the process of establishing a secondary context suitable for binding the SIPTO policy, when the SIPTO policy indicates that the data flow corresponding to the service information of the UE needs to be bypassed, the above secondary context suitable for binding the SIPTO policy is performed. Established between the UE and the TOF entity.
步骤 509,当 UE在上述绑定 SIPTO策略的二次上下文上进行业务时, TOF实体根据该 SIPTO策略确定是否对数据流进行旁路处理。 具体地, 当 UE在上述绑定 SIPTO策略的二次上下文进行业务时, TOF实体确定 RNC传输的采用 GTP封装的数据流的目的地址为该 TOF实体的地址之 后, 该 TOF实体确定对该数据流进行旁路处理, 后续步骤与本发明图 2 所示实施例步骤 208〜步骤 211相同, 在此不再贅述; 反之, TOF实体确 定 RNC传输的采用 GTP封装的数据流的目的地址不是该 TOF实体的地址 之后, 该 TOF实体确定不对该数据流进行旁路处理, 后续步骤与本发明 图 2所示实施例步骤 212〜步骤 215相同, 在此不再贅述。  Step 509: When the UE performs the service on the secondary context of the SIPTO policy, the TOF entity determines whether to bypass the data flow according to the SIPTO policy. Specifically, when the UE performs the service in the secondary context of the SIPTO policy, the TOF entity determines that the destination address of the GTP-encapsulated data stream transmitted by the RNC is the address of the TOF entity, and the TOF entity determines the data flow. The following steps are the same as the steps 208 to 211 of the embodiment shown in FIG. 2 of the present invention, and are not described here; otherwise, the TOF entity determines that the destination address of the GTP-encapsulated data stream transmitted by the RNC is not the TOF entity. After the address, the TOF entity determines that the data stream is not bypassed. The subsequent steps are the same as the steps 212 to 215 of the embodiment shown in FIG. 2 of the present invention, and details are not described herein again.
另外, 在本实施例的另一种实现方式中, 在步骤 507, TOF实体激活 预定义在该 TOF实体上的 SIPTO策略之后, 该 TOF实体可以记录上述 SIPTO策略, 当该 UE在上述首次上下文进行业务时, 该 TOF实体将记录 的 SIPTO策略与接收到的数据流的五元组信息进行匹配, 确定对与该 SIPTO策略中的业务流检测信息匹配成功的数据流进行旁路处理, 后续步 骤与本发明图 2所示实施例步骤 208〜步骤 211相同,在此不再贅述;反之, 该 TOF实体将记录的 SIPTO策略与接收到的数据流进行匹配, 确定对与 该 SIPTO策略中的业务流检测信息匹配失败的数据流不进行旁路,后续步 骤与本发明图 2所示实施例步骤 212〜步骤 215相同, 在此不再贅述。 In addition, in another implementation manner of this embodiment, after the TOF entity activates the SIPTO policy predefined on the TOF entity, the TOF entity may record the SIPTO policy, where the UE performs the first context in the foregoing context. When the business is in progress, the TOF entity will record The SIPTO policy matches the quintuple information of the received data stream, and determines to bypass the data stream that successfully matches the service flow detection information in the SIPTO policy, and the subsequent steps are the embodiment shown in FIG. 2 of the present invention. Steps 208 to 211 are the same, and are not described here. Otherwise, the TOF entity matches the recorded SIPTO policy with the received data stream, and determines that the data flow that fails to match the service flow detection information in the SIPTO policy is not determined. The bypass is performed, and the subsequent steps are the same as steps 212 to 215 of the embodiment shown in FIG. 2 of the present invention, and details are not described herein again.
具体地,在将 SIPTO策略中的业务流检测信息与接收到的数据流进行 匹配时, 可以采用本发明图 2所示实施例提供的方法, 在此不再贅述。  Specifically, when the service flow detection information in the SIPTO policy is matched with the received data flow, the method provided in the embodiment shown in FIG. 2 of the present invention may be used, and details are not described herein again.
上述实施例中, TOF实体通过对 UE发送的首次上下文激活请求进行 检测, 获得该 UE的业务信息之后, 激活预定义在该 TOF实体中与该 UE 的业务信息对应的 SIPTO策略, 然后根据该 SIPTO策略对接收到的数据 流进行旁路。从而实现了在同一 APN下根据 UE进行的不同业务进行旁路 处理。  In the above embodiment, the TOF entity detects the first context activation request sent by the UE, obtains the service information of the UE, and activates a SIPTO policy corresponding to the service information of the UE in the TOF entity, and then according to the SIPTO. The policy bypasses the received data stream. Therefore, bypass processing is performed according to different services performed by the UE under the same APN.
本领域普通技术人员可以理解: 实现上述方法实施例的全部或部分步 骤可以通过程序指令相关的硬件来完成, 前述的程序可以存储于一计算机 可读取存储介质中, 该程序在执行时, 执行包括上述方法实施例的步骤; 而前述的存储介质包括: ROM、 RAM, 磁碟或者光盘等各种可以存储程 序代码的介质。  A person skilled in the art can understand that all or part of the steps of implementing the above method embodiments may be completed by using hardware related to program instructions, and the foregoing program may be stored in a computer readable storage medium, and the program is executed when executed. The foregoing steps include the steps of the foregoing method embodiments; and the foregoing storage medium includes: a medium that can store program codes, such as a ROM, a RAM, a magnetic disk, or an optical disk.
图 6为本发明业务旁路功能实体实施例一的结构示意图, 本实施例中 的业务旁路功能实体可以实现本发明图 1所示实施例的流程,如图 6所示, 该业务旁路功能实体可以包括: 检测模块 61、 策略获取模块 62和旁路模 块 63。 其中,检测模块 61 , 用于对用户设备进行业务时发送的信令建立消息 进行检测, 或者对用户设备在首次上下文上进行业务时发送的数据流进行 检测, 获得该用户设备的业务信息; Figure 6 is a schematic structural diagram of Embodiment 1 of the service bypass function entity of the present invention. The service bypass function entity in this embodiment can implement the process of the embodiment shown in Figure 1 of the present invention. As shown in Figure 6, the service bypass The functional entities may include: a detection module 61, a policy acquisition module 62, and a bypass module 63. The detecting module 61 is configured to detect a signaling setup message sent by the user equipment when performing service, or detect a data flow sent by the user equipment when performing service on the first context, to obtain service information of the user equipment;
策略获取模块 62, 用于获得与该用户设备的业务信息对应的 SIPTO 策略; 具体地, 策略获取模块 62 可以将该用户设备的业务信息发送给策 略和计费规则功能实体, 并接收该策略和计费规则功能实体根据用户设备 的业务信息、 该策略和计费规则功能实体的配置信息、 运营商策略和该用 户设备的签约信息发送的 SIPTO策略; 或者, 策略获取模块 62可以将用 户设备的业务信息发送给策略和计费规则功能实体, 接收该策略和计费规 则功能实体根据该用户设备的业务信息、 该策略和计费规则功能实体的配 置信息、 运营商策略和该用户设备的签约信息确定的 SIPTO策略的名称, 根据 SIPTO策略的名称激活预定义在业务旁路功能实体上的 SIPTO策略; 或者, 策略获取模块 62可以根据该用户设备的业务信息、 该业务旁路功 能实体的配置信息、运营商策略和该用户设备的签约信息激活预定义在该 业务旁路功能实体上的 SIPTO策略。  The policy obtaining module 62 is configured to obtain a SIPTO policy corresponding to the service information of the user equipment. Specifically, the policy obtaining module 62 may send the service information of the user equipment to the policy and charging rule function entity, and receive the policy and The charging rule function entity may send the SIPTO policy according to the service information of the user equipment, the configuration information of the policy and the charging rule function entity, the operator policy, and the subscription information of the user equipment; or the policy obtaining module 62 may The service information is sent to the policy and charging rule function entity, and receives the policy and the charging rule function entity according to the service information of the user equipment, the configuration information of the policy and the charging rule function entity, the operator policy, and the subscription of the user equipment. The information is determined by the name of the SIPTO policy, and the SIPTO policy defined on the service bypass function entity is activated according to the name of the SIPTO policy. Alternatively, the policy obtaining module 62 may configure the service bypass function entity according to the service information of the user equipment. Information, operator strategy and usage The subscription information of the subscriber device activates a SIPTO policy predefined on the service bypass function entity.
旁路模块 63 , 用于根据策略获取模块 62获得的 SIPTO策略对接收到 的数据流进行旁路。  The bypass module 63 is configured to bypass the received data stream according to the SIPTO policy obtained by the policy acquisition module 62.
图 7为本发明业务旁路功能实体实施例二的结构示意图, 与图 6所示 的业务旁路功能实体相比, 不同之处在于, 图 7所示的业务旁路功能实体 还可以包括: 绑定模块 64和第一建立模块 65; 或者, 图 7所示的业务旁 路功能实体还可以包括: 第二建立模块 66; 或者, 图 7所示的业务旁路功 能实体还可以包括: 绑定模块 64、 第一建立模块 65和第二建立模块 66。 其中, 绑定模块 64, 用于在策略获取模块 62在首次上下文建立过程 中获得 SIPTO策略之后, 将该 SIPTO策略绑定在二次上下文上, 该二次 上下文建立在业务旁路功能实体与用户设备之间。 如果在已建立的二次上 下文中没有适合绑定上述 SIPTO策略的二次上下文, 则第一建立模块 65 发起建立适合绑定上述 SIPTO策略的二次上下文的过程; 当该 SIPTO策 略指示需要对与该用户设备的业务信息对应的数据流进行旁路时, 将适合 绑定该 SIPTO 策略的二次上下文建立在该用户设备与该业务旁路功能实 体之间。 FIG. 7 is a schematic structural diagram of Embodiment 2 of the service bypass function entity according to the present invention. The difference is that the service bypass function entity shown in FIG. 7 may further include: The binding module 64 and the first establishing module 65; or the service bypass function entity shown in FIG. 7 may further include: a second establishing module 66; or the service bypass function entity shown in FIG. 7 may further include: The module 64, the first establishing module 65 and the second establishing module 66. The binding module 64 is configured to bind the SIPTO policy to the secondary context after the policy obtaining module 62 obtains the SIPTO policy in the first context establishing process, where the secondary context is established in the service bypass function entity and the user. Between devices. If there is no secondary context suitable for binding the SIPTO policy in the established secondary context, the first establishing module 65 initiates a process of establishing a secondary context suitable for binding the SIPTO policy; when the SIPTO policy indicates that the When the data flow corresponding to the service information of the user equipment is bypassed, a secondary context suitable for binding the SIPTO policy is established between the user equipment and the service bypass function entity.
第二建立模块 66, 用于在策略获取模块 62在二次上下文建立过程中 获得该 SIPTO策略, 且当该 SIPTO策略指示需要对与该用户设备的业务 信息对应的数据流进行旁路时, 将二次上下文建立在该用户设备与该业务 旁路功能实体之间。  The second establishing module 66 is configured to obtain the SIPTO policy in the secondary context establishment process by the policy obtaining module 62, and when the SIPTO policy indicates that the data flow corresponding to the service information of the user equipment needs to be bypassed, A secondary context is established between the user equipment and the service bypass functional entity.
本实施例中, 旁路模块 63 具体可以当该用户设备在二次上下文进行 业务时, 在确定无线网络控制器传输的通过隧道协议封装的数据流的目的 地址为该业务旁路功能实体的地址之后, 旁路该数据流。  In this embodiment, the bypass module 63 may specifically determine, when the user equipment performs the service in the secondary context, the destination address of the data flow encapsulated by the tunneling protocol transmitted by the radio network controller as the address of the service bypass function entity. After that, bypass the data stream.
图 8为本发明业务旁路功能实体实施例三的结构示意图, 与图 6所示 的业务旁路功能实体相比, 不同之处在于, 图 8所示的业务旁路功能实体 还可以包括: 记录模块 67。  FIG. 8 is a schematic structural diagram of Embodiment 3 of the service bypass function entity according to the present invention. The difference is that the service bypass function entity shown in FIG. 8 may further include: Recording module 67.
其中, 记录模块 67用于在策略获取模块 62在首次上下文建立过程中 获得 SIPTO策略之后, 记录该 SIPTO策略;  The recording module 67 is configured to record the SIPTO policy after the policy acquisition module 62 obtains the SIPTO policy in the first context establishment process;
这时, 旁路模块 63可以当该用户设备在上述首次上下文进行业务时, 将记录模块 67 记录的 SIPTO 策略与接收到的数据流进行匹配, 对与该 SIPTO策略中的业务流检测信息匹配成功的数据流进行旁路。 At this time, the bypass module 63 can match the SIPTO policy recorded by the recording module 67 with the received data stream when the user equipment performs the service in the first context. The traffic flow detection information in the SIPTO policy matches the successful data flow to bypass.
上述业务旁路功能实体中, 检测模块 61获得用户设备的业务信息之 后, 策略获取模块 62获得与该用户设备的业务信息对应的 SIPTO策略, 然后旁路模块 63根据该 SIPTO策略对接收到的数据流进行旁路。 从而实 现了在同一 APN下根据用户设备进行的不同业务进行旁路处理。  In the service bypass function entity, after the detection module 61 obtains the service information of the user equipment, the policy acquisition module 62 obtains the SIPTO policy corresponding to the service information of the user equipment, and then the bypass module 63 pairs the received data according to the SIPTO policy. The flow is bypassed. Therefore, bypass processing is performed on different services performed by the user equipment under the same APN.
图 9为本发明数据流旁路的***实施例一的结构示意图,如图 9所示, 该数据流旁路的***可以包括: UE 91、 节点 B ( Node B ) 92、 RNC 93、 TOF实体 94、 SGSN 95 , GGSN 96和 PCRF实体 97。  FIG. 9 is a schematic structural diagram of Embodiment 1 of a data flow bypass according to the present invention. As shown in FIG. 9, the data bypass system may include: UE 91, Node B 92, RNC 93, TOF entity. 94. SGSN 95, GGSN 96 and PCRF entity 97.
其中, TOF实体 94可以对 UE 91发送的信令建立消息进行检测, 或 者对 UE 91在首次上下文上发送的数据流进行检测, 获得该用户设备的业 务信息; 并在获得与 UE 91的业务信息对应的 SIPTO策略之后, 根据该 SIPTO策略对接收到的数据流进行旁路。 具体地, TOF实体 94可以通过 本发明图 6、 图 7或图 8所示的业务旁路功能实体实现。  The TOF entity 94 may detect the signaling setup message sent by the UE 91, or detect the data flow sent by the UE 91 on the first context, obtain the service information of the user equipment, and obtain the service information with the UE 91. After the corresponding SIPTO policy, the received data stream is bypassed according to the SIPTO policy. Specifically, the TOF entity 94 can be implemented by the service bypass function entity shown in Fig. 6, Fig. 7, or Fig. 8 of the present invention.
本实施例中 ,在 TOF实体 94和 PCRF实体 97之间新增 Tx接口, TOF 实体 94可以通过该 Tx接口向 PCRF实体 97请求 SIPTO策略, PCRF实 体 97可以通过 Tx接口向 TOF实体 94下发 SIPTO策略。  In this embodiment, a Tx interface is added between the TOF entity 94 and the PCRF entity 97. The TOF entity 94 can request the SIPTO policy from the PCRF entity 97 through the Tx interface. The PCRF entity 97 can send the SIPTO to the TOF entity 94 through the Tx interface. Strategy.
本实施例中, UE 91、 Node B 92、 RNC 93、 TOF实体 94、 SGSN 95、 GGSN 96和 PCRF实体 97之间的交互可以采用本发明图 2、 图 3、 图 4或 图 5所示的流程, 在此不再贅述。  In this embodiment, the interaction between the UE 91, the Node B 92, the RNC 93, the TOF entity 94, the SGSN 95, the GGSN 96, and the PCRF entity 97 may be as shown in FIG. 2, FIG. 3, FIG. 4 or FIG. The process will not be described here.
上述数据流旁路的***中, TOF实体 94获得用户设备的业务信息之 后, 获得与该用户设备的业务信息对应的 SIPTO策略, 然后根据该 SIPTO 策略对接收到的数据流进行旁路。 从而实现了在同一 APN下根据用户设 备进行的不同业务进行旁路处理。 In the system bypassed by the data stream, after obtaining the service information of the user equipment, the TOF entity 94 obtains a SIPTO policy corresponding to the service information of the user equipment, and then bypasses the received data stream according to the SIPTO policy. Thereby realizing the setting according to the user under the same APN The different services that are being prepared are bypassed.
本领域技术人员可以理解附图只是一个优选实施例的示意图, 附图中 的模块或流程并不一定是实施本发明所必须的。  A person skilled in the art can understand that the drawings are only a schematic diagram of a preferred embodiment, and the modules or processes in the drawings are not necessarily required to implement the invention.
本领域技术人员可以理解实施例中的装置中的模块可以按照实施例 描述进行分布于实施例的装置中, 也可以进行相应变化位于不同于本实施 例的一个或多个装置中。 上述实施例的模块可以合并为一个模块, 也可以 进一步拆分成多个子模块。  Those skilled in the art can understand that the modules in the apparatus in the embodiments may be distributed in the apparatus of the embodiment according to the embodiment description, or the corresponding changes may be located in one or more apparatuses different from the embodiment. The modules of the above embodiments may be combined into one module, or may be further split into a plurality of sub-modules.
最后应说明的是: 以上实施例仅用以说明本发明的技术方案, 而非对 其限制; 尽管参照前述实施例对本发明进行了详细的说明, 本领域的普通 技术人员应当理解: 其依然可以对前述各实施例所记载的技术方案进行修 改, 或者对其中部分技术特征进行等同替换; 而这些修改或者替换, 并不 使相应技术方案的本质脱离本发明各实施例技术方案的精神和范围。  It should be noted that the above embodiments are only for explaining the technical solutions of the present invention, and are not intended to be limiting; although the present invention has been described in detail with reference to the foregoing embodiments, it will be understood by those skilled in the art that: The technical solutions described in the foregoing embodiments are modified, or some of the technical features are equivalently replaced. The modifications and substitutions do not depart from the spirit and scope of the technical solutions of the embodiments of the present invention.

Claims

权利要求 Rights request
1、 一种数据流旁路的方法, 其特征在于, 包括: A method for bypassing a data stream, comprising:
对用户设备发送的信令建立消息进行检测, 或者对所述用户设备在首 次上下文上发送的数据流进行检测, 获得所述用户设备的业务信息; 获得与所述用户设备的业务信息对应的选择因特网协议业务流旁路 Detecting a signaling setup message sent by the user equipment, or detecting a data flow sent by the user equipment on the first context, obtaining service information of the user equipment; and obtaining a selection corresponding to the service information of the user equipment Internet Protocol Service Flow Bypass
( SIPTO ) 策略; (SIPTO) strategy;
根据所述 SIPTO策略对接收到的数据流进行旁路。  The received data stream is bypassed according to the SIPTO policy.
2、 根据权利要求 1所述的方法, 其特征在于, 所述获得与所述用户 设备的业务信息对应的选择因特网协议业务流旁路(SIPTO ) 策略包括: 将所述用户设备的业务信息发送给策略和计费规则功能实体, 接收所 述策略和计费规则功能实体根据所述用户设备的业务信息、 所述策略和计 费规则功能实体的配置信息、运营商策略和所述用户设备的签约信息确定 的 SIPTO策略; 或者,  2. The method according to claim 1, wherein the obtaining a selected Internet Protocol Service Flow Bypass (SIPTO) policy corresponding to the service information of the user equipment comprises: sending service information of the user equipment The policy and charging rule function entity receives the policy and charging rule function entity according to the service information of the user equipment, the configuration information of the policy and charging rule function entity, the operator policy, and the user equipment SIPTO policy determined by the contract information; or,
将所述用户设备的业务信息发送给策略和计费规则功能实体, 接收所 述策略和计费规则功能实体根据所述用户设备的业务信息、 所述策略和计 费规则功能实体的配置信息、运营商策略和所述用户设备的签约信息确定 的 SIPTO策略的名称, 根据所述 SIPTO策略的名称激活预定义在业务旁 路功能实体上的 SIPTO策略; 或者,  Sending the service information of the user equipment to the policy and charging rule function entity, and receiving the configuration information of the policy and charging rule function entity according to the service information of the user equipment, the policy and the charging rule function entity, The name of the SIPTO policy determined by the operator policy and the subscription information of the user equipment, and the SIPTO policy predefined on the service bypass function entity is activated according to the name of the SIPTO policy; or
根据所述用户设备的业务信息、 业务旁路功能实体的配置信息、 运营 商策略和所述用户设备的签约信息激活预定义在所述业务旁路功能实体 上的 SIPTO策略。 The SIPTO policy predefined on the service bypass function entity is activated according to the service information of the user equipment, the configuration information of the service bypass function entity, the operator policy, and the subscription information of the user equipment.
3、 根据权利要求 1所述的方法, 其特征在于, 所述根据所述 SIPTO 策略对接收到的数据流进行旁路之前, 还包括: The method according to claim 1, wherein before the bypassing the received data stream according to the SIPTO policy, the method further includes:
如果在首次上下文建立过程中获得所述 SIPTO策略,则将所述 SIPTO 策略绑定在二次上下文上, 所述二次上下文建立在业务旁路功能实体与所 述用户设备之间。  If the SIPTO policy is obtained during the first context establishment process, the SIPTO policy is bound to a secondary context, and the secondary context is established between the service bypass function entity and the user equipment.
4、 根据权利要求 3所述的方法, 其特征在于, 所述将所述 SIPTO策 略绑定在二次上下文上之前, 还包括:  The method according to claim 3, wherein before the binding the SIPTO policy to the secondary context, the method further includes:
如果已建立的二次上下文中没有适合绑定所述 SIPTO策略的二次上 下文, 则发起建立适合绑定所述 SIPTO策略的二次上下文的过程;  If there is no secondary context suitable for binding the SIPTO policy in the established secondary context, initiate a process of establishing a secondary context suitable for binding the SIPTO policy;
当所述 SIPTO策略指示需要对与所述用户设备的业务信息对应的数 据流进行旁路时,将所述适合绑定所述 SIPTO策略的二次上下文建立在所 述用户设备与所述业务旁路功能实体之间。  When the SIPTO policy indicates that the data flow corresponding to the service information of the user equipment needs to be bypassed, the secondary context suitable for binding the SIPTO policy is established next to the user equipment and the service Between road function entities.
5、 根据权利要求 1所述的方法, 其特征在于, 所述根据所述 SIPTO 策略对接收到的数据流进行旁路之前, 还包括:  The method according to claim 1, wherein before the bypassing the received data stream according to the SIPTO policy, the method further includes:
如果在二次上下文建立过程中获得所述 SIPTO策略, 当所述 SIPTO 策略指示需要对与所述用户设备的业务信息对应的数据流进行旁路时, 将 所述二次上下文建立在所述用户设备与所述业务旁路功能实体之间。  If the SIPTO policy is obtained during the secondary context establishment process, when the SIPTO policy indicates that the data flow corresponding to the service information of the user equipment needs to be bypassed, the secondary context is established at the user. Between the device and the service bypass function entity.
6、根据权利要求 3或 5所述的方法,其特征在于,所述根据所述 SIPTO 策略对接收到的数据流进行旁路包括:  The method according to claim 3 or 5, wherein the bypassing the received data stream according to the SIPTO policy comprises:
当所述用户设备在所述二次上下文上进行业务时, 在确定无线网络控 制器传输的通过隧道协议封装的数据流的目的地址为所述业务旁路功能 实体的地址之后, 旁路所述数据流。 When the user equipment performs the service on the secondary context, after determining that the destination address of the data flow encapsulated by the tunneling protocol transmitted by the radio network controller is the address of the service bypass function entity, bypassing the data flow.
7、 根据权利要求 1所述的方法, 其特征在于, 所述根据所述 SIPTO 策略对接收到的数据流进行旁路之前, 还包括: The method according to claim 1, wherein before the bypassing the received data stream according to the SIPTO policy, the method further includes:
如果在首次上下文建立过程中获得所述 SIPTO策略, 则记录所述 SIPTO策略。  If the SIPTO policy is obtained during the first context establishment process, the SIPTO policy is recorded.
8、 根据权利要求 7所述的方法, 其特征在于, 所述根据所述 SIPTO 策略对接收到的数据流进行旁路包括:  8. The method according to claim 7, wherein the bypassing the received data stream according to the SIPTO policy comprises:
当所述用户设备在所述首次上下文上进行业务时,将所述 SIPTO策略 与所述接收到的数据流进行匹配,对与所述 SIPTO策略中的业务流检测信 息匹配成功的数据流进行旁路。  When the user equipment performs the service on the first context, matching the SIPTO policy with the received data stream, and performing a data flow that successfully matches the service flow detection information in the SIPTO policy. road.
9、 一种业务旁路功能实体, 其特征在于, 包括:  9. A service bypass function entity, comprising:
检测模块, 用于对用户设备发送的信令建立消息进行检测, 或者对所 述用户设备在首次上下文上发送的数据流进行检测, 获得所述用户设备的 业务信息;  a detecting module, configured to detect a signaling setup message sent by the user equipment, or detect a data flow sent by the user equipment on the first context, to obtain service information of the user equipment;
策略获取模块, 用于获得与所述用户设备的业务信息对应的选择因特 网协议业务流旁路(SIPTO ) 策略;  a policy obtaining module, configured to obtain a selected Internet Protocol Traffic Flow Bypass (SIPTO) policy corresponding to the service information of the user equipment;
旁路模块,用于根据所述策略获取模块获得的 SIPTO策略对接收到的 数据流进行旁路。  The bypass module is configured to bypass the received data stream according to the SIPTO policy obtained by the policy acquisition module.
10、 根据权利要求 9所述的业务旁路功能实体, 其特征在于, 所述策 略获取模块具体用于将所述用户设备的业务信息发送给策略和计费规则 功能实体, 接收所述策略和计费规则功能实体根据所述用户设备的业务信 息、 所述策略和计费规则功能实体的配置信息、 运营商策略和所述用户设 备的签约信息确定的 SIPTO策略; 或者, 所述策略获取模块具体用于将所述用户设备的业务信息发送给策略 和计费规则功能实体, 接收所述策略和计费规则功能实体根据所述用户设 备的业务信息、 所述策略和计费规则功能实体的配置信息、 运营商策略和 所述用户设备的签约信息确定的 SIPTO策略的名称, 根据所述 SIPTO策 略的名称激活预定义在业务旁路功能实体上的 SIPTO策略; 或者, The service bypass function entity according to claim 9, wherein the policy acquisition module is configured to send the service information of the user equipment to a policy and charging rule function entity, and receive the policy and The SIPTO policy determined by the charging rule function entity according to the service information of the user equipment, the configuration information of the policy and charging rule function entity, the operator policy, and the subscription information of the user equipment; or The policy obtaining module is specifically configured to send the service information of the user equipment to the policy and charging rule function entity, and receive the service information of the user equipment according to the service information, the policy, and the a SIPTO policy defined by the configuration information of the fee-based functional entity, the operator policy, and the subscription information of the user equipment, and the SIPTO policy predefined on the service bypass function entity is activated according to the name of the SIPTO policy; or
所述策略获取模块具体用于根据所述用户设备的业务信息、 业务旁路 功能实体的配置信息、运营商策略和所述用户设备的签约信息激活预定义 在所述业务旁路功能实体上的 SIPTO策略。  The policy obtaining module is specifically configured to activate, according to the service information of the user equipment, the configuration information of the service bypass function entity, the operator policy, and the subscription information of the user equipment, the predefined on the service bypass function entity. SIPTO strategy.
11、根据权利要求 9所述的业务旁路功能实体, 其特征在于,还包括: 绑定模块, 用于在所述策略获取模块在首次上下文建立过程中获得所 述 SIPTO策略之后, 将所述 SIPTO策略绑定在二次上下文上, 所述二次 上下文建立在业务旁路功能实体与所述用户设备之间。  The service bypass function entity according to claim 9, further comprising: a binding module, configured to: after the policy acquisition module obtains the SIPTO policy in a first context establishment process, The SIPTO policy is bound to the secondary context, and the secondary context is established between the service bypass function entity and the user equipment.
12、 根据权利要求 11所述的业务旁路功能实体, 其特征在于, 还包 括:  12. The service bypass function entity according to claim 11, further comprising:
第一建立模块, 用于在已建立的二次上下文中没有适合绑定所述 a first establishing module, configured to not be suitable for binding in the established secondary context
SIPTO策略的二次上下文时,发起建立适合绑定所述 SIPTO策略的二次上 下文的过程;当所述 SIPTO策略指示需要对与所述用户设备的业务信息对 应的数据流进行旁路时,将所述适合绑定所述 SIPTO策略的二次上下文建 立在所述用户设备与所述业务旁路功能实体之间。 When a secondary context of the SIPTO policy is initiated, a process of establishing a secondary context suitable for binding the SIPTO policy is initiated; when the SIPTO policy indicates that a data flow corresponding to the service information of the user equipment needs to be bypassed, The secondary context suitable for binding the SIPTO policy is established between the user equipment and the service bypass function entity.
13、根据权利要求 9所述的业务旁路功能实体, 其特征在于,还包括: 第二建立模块, 用于在所述策略获取模块在二次上下文建立过程中获 得所述 SIPTO策略, 且当所述 SIPTO策略指示需要对与所述用户设备的 业务信息对应的数据流进行旁路时, 将所述二次上下文建立在所述用户设 备与所述业务旁路功能实体之间。 The service bypass function entity according to claim 9, further comprising: a second establishing module, configured to obtain the SIPTO policy in the secondary context establishment process by the policy obtaining module, and when The SIPTO policy indication needs to be associated with the user equipment When the data flow corresponding to the service information is bypassed, the secondary context is established between the user equipment and the service bypass function entity.
14、 根据权利要求 11或 13所述的业务旁路功能实体, 其特征在于, 所述旁路模块具体用于当所述用户设备在所述二次上下文上进行业务时, 在确定无线网络控制器传输的通过隧道协议封装的数据流的目的地址为 所述业务旁路功能实体的地址之后, 旁路所述数据流。  The service bypass function entity according to claim 11 or 13, wherein the bypass module is specifically configured to determine wireless network control when the user equipment performs a service on the secondary context. After the destination address of the data stream encapsulated by the tunneling protocol transmitted by the tunnel is the address of the service bypass function entity, the data stream is bypassed.
15、根据权利要求 9所述的业务旁路功能实体, 其特征在于,还包括: 记录模块, 用于在所述策略获取模块在首次上下文建立过程中获得所 述 SIPTO策略之后 , 记录所述 SIPTO策略。  The service bypass function entity according to claim 9, further comprising: a recording module, configured to record the SIPTO after the policy acquisition module obtains the SIPTO policy in a first context establishment process Strategy.
16、 根据权利要求 15所述的业务旁路功能实体, 其特征在于, 所述旁路模块具体用于当所述用户设备在所述首次上下文进行业务 时, 将所述记录模块记录的 SIPTO策略与所述接收到的数据流进行匹配, 对与所述 SIPTO策略中的业务流检测信息匹配成功的数据流进行旁路。  The service bypass function entity according to claim 15, wherein the bypass module is specifically configured to: when the user equipment performs a service in the first context, the SIPTO policy recorded by the recording module Matching with the received data stream, bypassing the data stream that successfully matches the service flow detection information in the SIPTO policy.
PCT/CN2010/073388 2010-05-31 2010-05-31 Method for offloading data stream and traffic offload function entity WO2011150546A1 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201080001578.9A CN102369698B (en) 2010-05-31 2010-05-31 Method for offloading data stream and traffic offload function entity
PCT/CN2010/073388 WO2011150546A1 (en) 2010-05-31 2010-05-31 Method for offloading data stream and traffic offload function entity

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2010/073388 WO2011150546A1 (en) 2010-05-31 2010-05-31 Method for offloading data stream and traffic offload function entity

Publications (1)

Publication Number Publication Date
WO2011150546A1 true WO2011150546A1 (en) 2011-12-08

Family

ID=45066106

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2010/073388 WO2011150546A1 (en) 2010-05-31 2010-05-31 Method for offloading data stream and traffic offload function entity

Country Status (2)

Country Link
CN (1) CN102369698B (en)
WO (1) WO2011150546A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2813096A4 (en) * 2012-02-07 2015-10-28 Nokia Technologies Oy Method and apparatus for autonomous operation in cellular-based local area networks

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101202702A (en) * 2006-12-12 2008-06-18 华为技术有限公司 Network flow quantity shunting method and network device
CN101212391A (en) * 2006-12-25 2008-07-02 上海贝尔阿尔卡特股份有限公司 Traffic splitting method and device, and service type reporting method and device
JP2009253431A (en) * 2008-04-02 2009-10-29 Alcatel-Lucent Usa Inc METHOD FOR OFF-LOADING PS TRAFFIC IN UMTS FEMTO CELL SOLUTION HAVING Iu INTERFACE

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101202702A (en) * 2006-12-12 2008-06-18 华为技术有限公司 Network flow quantity shunting method and network device
CN101212391A (en) * 2006-12-25 2008-07-02 上海贝尔阿尔卡特股份有限公司 Traffic splitting method and device, and service type reporting method and device
JP2009253431A (en) * 2008-04-02 2009-10-29 Alcatel-Lucent Usa Inc METHOD FOR OFF-LOADING PS TRAFFIC IN UMTS FEMTO CELL SOLUTION HAVING Iu INTERFACE

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
"Local IP Access and Selected IP Traffic Offload (Release 10)", 3GPP 23.829 V1.0.1, 24 March 2010 (2010-03-24) *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2813096A4 (en) * 2012-02-07 2015-10-28 Nokia Technologies Oy Method and apparatus for autonomous operation in cellular-based local area networks
US9648535B2 (en) 2012-02-07 2017-05-09 Nokia Technologies Oy Method and apparatus for autonomous operation in cellular-based local area networks

Also Published As

Publication number Publication date
CN102369698A (en) 2012-03-07
CN102369698B (en) 2014-03-12

Similar Documents

Publication Publication Date Title
CN106465227B (en) Method and apparatus for supporting network IP flow mobility via multiple wireless accesses
US8621555B2 (en) Access control method and system for packet data network, PCRF entity
EP2800417B1 (en) End-to-End QoS when integrating trusted non-3GPP Access Networks and 3GPP Core Networks
CN103988544B (en) System and method for minimizing the loss of IP context during IRAT switches
US9167430B2 (en) Access method and system, and mobile intelligent access point
US9113436B2 (en) Method and system for information transmission
CN103002511A (en) Data distribution triggering method, network side equipment, user equipment and network system
CN102904856B (en) A kind of control method and device of shared session
EP2854448B1 (en) Method, apparatus and system for policy control
WO2009046598A1 (en) A method for establishing a dedicated bearer for a user terminal
CN103428731A (en) Method and system for routing optimization, and service gateway
US20140177530A1 (en) Access method and system and mobile intelligent access point
KR102109704B1 (en) Method and apparatus for forwarding of data traffic
CN103428800A (en) Route selection method and functional network element
WO2010111944A1 (en) Method, apparatus, policy control function and system for releasing access connections
CN103796246A (en) Data distribution method, data distribution device and data distribution system
WO2011017979A1 (en) Resource management method and device in a communication system supporting the ip shunting
CN107404715B (en) Position information providing method and device
WO2011140707A1 (en) Method and system for traffic offload, and policy and charging rule function entity
CN101730071B (en) Realization method and system of multi-packet data network connection
WO2013037271A1 (en) Multi-access method and system
WO2011150546A1 (en) Method for offloading data stream and traffic offload function entity
WO2011157177A2 (en) Method and device for controlling service stream
WO2011006408A1 (en) System, method, and policy and charging rules function (pcrf) entity for policy and charging control
US20120176973A1 (en) Method for processing multiple access, home agent and user equipment

Legal Events

Date Code Title Description
WWE Wipo information: entry into national phase

Ref document number: 201080001578.9

Country of ref document: CN

121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 10852345

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 10852345

Country of ref document: EP

Kind code of ref document: A1