[go: up one dir, main page]

CN101795478B - Method for data bypass, network side equipment and access gateway - Google Patents

Method for data bypass, network side equipment and access gateway Download PDF

Info

Publication number
CN101795478B
CN101795478B CN2010101387808A CN201010138780A CN101795478B CN 101795478 B CN101795478 B CN 101795478B CN 2010101387808 A CN2010101387808 A CN 2010101387808A CN 201010138780 A CN201010138780 A CN 201010138780A CN 101795478 B CN101795478 B CN 101795478B
Authority
CN
China
Prior art keywords
ggsn
request message
access point
service
name
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN2010101387808A
Other languages
Chinese (zh)
Other versions
CN101795478A (en
Inventor
李大伟
曹文利
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Technologies Co Ltd
Original Assignee
Huawei Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co Ltd filed Critical Huawei Technologies Co Ltd
Priority to CN2010101387808A priority Critical patent/CN101795478B/en
Publication of CN101795478A publication Critical patent/CN101795478A/en
Application granted granted Critical
Publication of CN101795478B publication Critical patent/CN101795478B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Mobile Radio Communication Systems (AREA)

Abstract

本发明实施例提供一种数据旁路的方法、网络侧设备和接入网关,所述数据旁路的方法包括:网络侧设备接收用户设备发送的第一请求消息;所述网络侧设备确定所述第一请求消息中的接入点名称为标识旁路业务的接入点名称之后,将所述标识旁路业务的接入点名称修改为指向GGSN的接入点名称;所述网络侧设备向所述GGSN发送第二请求消息,所述第二请求消息携带所述指向GGSN的接入点名称,以建立接入网关与所述GGSN之间的隧道;所述GGSN为与接入网关联合部署的GGSN或与所述接入网关集成的GGSN。本发明实施例实现了接入网关支持数据旁路的功能。

Figure 201010138780

An embodiment of the present invention provides a data bypass method, a network side device, and an access gateway. The data bypass method includes: the network side device receives a first request message sent by the user equipment; the network side device determines the After the access point name in the first request message is the access point name identifying the bypass service, modify the access point name identifying the bypass service to the access point name pointing to the GGSN; the network side device Sending a second request message to the GGSN, the second request message carrying the name of the access point pointing to the GGSN, so as to establish a tunnel between the access gateway and the GGSN; the GGSN is associated with the access gateway The deployed GGSN or the GGSN integrated with the access gateway. The embodiment of the present invention realizes the function of the access gateway supporting data bypass.

Figure 201010138780

Description

The method of data bypass, network equipment and IAD
Technical field
The embodiment of the invention relates to communication technical field, relates in particular to a kind of method, network equipment and IAD of data bypass.
Background technology
Access point (Access Point; Hereinafter to be referred as: AP) be based on fixed Internet Protocol (InternetProtocol; Hereinafter to be referred as IP) transmission network, the network equipment of wireless access service is provided for family or enterprise.
Subscriber equipment (User Equipment; Hereinafter to be referred as: UE) can insert AP through eating dishes without rice or wine, AP is through home gateway (Home Gateway; Hereinafter to be referred as: HGW) insert the IP transmission network, be connected to security gateway (the Security Gateway in the mobile core network through the IP transmission network then; Hereinafter to be referred as: SeGW), be connected to IAD (Access Gateway; Hereinafter to be referred as: AG), AG is connected to circuit switching (Circuit Switched then; Hereinafter to be referred as: CS) domain core net and packet switching (Packet Switched; Hereinafter to be referred as: PS) domain core net.
If UE then will be through ggsn (the Gateway General Packet Radio Service Support Node of PS domain core net through the AP access internet; Hereinafter to be referred as: GGSN) the Gi interface of network element connects the internet.
Existing data bypass scheme generally all is to realize through the Gi interface that AP provides, and promptly by AP Gi is provided interface, and UE visits home network through the Gi interface of AP then, perhaps direct access internet; At this moment; The data flow of UE visit home network or internet need not passed through mobile core network, and promptly the data flow of UE visit home network or internet is no longer passed through GGSN and service universal grouping wireless business supporting node (Service General Packet Radio Service SupportNode; Hereinafter to be referred as: SGSN), reached the purpose of data bypass.
But existing data bypass scheme generally all is to realize through the Gi interface that AP provides, and prior art does not provide a kind of method that realizes data bypass through AG; In addition, existing scheme through AP realization data bypass is not supported bypass flow is carried out Lawful intercept, does not support bypass flow is chargeed yet.
Summary of the invention
The embodiment of the invention provides a kind of method, network equipment and IAD of data bypass, supports the function of data bypass to realize IAD.
The embodiment of the invention provides a kind of method of data bypass, comprising:
Network equipment receives first request message that subscriber equipment sends, and said first request message carries the APN of sign pass-through service;
Said network equipment confirms that the Access Point Name in said first request message is called after the APN that identifies pass-through service, the APN of said sign pass-through service is revised as the APN of sensing ggsn GGSN;
Said network equipment sends second request message to said GGSN, and said second request message carries the APN of said sensing GGSN, so that set up the tunnel between IAD and the said GGSN; Said GGSN for IAD unite deployment GGSN or with the integrated GGSN of said IAD.
The embodiment of the invention also provides a kind of network equipment, comprising:
Receiver module is used to receive first request message that subscriber equipment sends, and said first request message carries the APN of sign pass-through service;
Determination module, the Access Point Name that is used for first request message of definite said receiver module reception is called the APN that identifies pass-through service;
Modified module; Be used for after said determination module confirms that the Access Point Name of first request message that said receiver module receives is called the APN that identifies pass-through service, the APN of said sign pass-through service being revised as the APN of sensing ggsn GGSN;
Sending module is used for sending second request message to said GGSN, and said second request message carries the APN of said sensing GGSN, so that set up the tunnel between IAD and the said GGSN; Said GGSN for IAD unite deployment GGSN or with the integrated GGSN of said IAD.
The embodiment of the invention also provides a kind of method of data bypass, comprising:
Receive first request message that service universal grouping wireless business supporting node SGSN sends, said first request message carries the APN of sign pass-through service; Said first request message is that said SGSN receives said first request message that subscriber equipment sends, and confirms that Access Point Name in said first request message is called transmission after the APN that identify pass-through service;
Send second request message to ggsn GGSN, said second request message carries the APN of said sign pass-through service;
Receive said GGSN that send with the said second request message corresponding response message, said response message is sent to said SGSN, so that set up the tunnel between IAD and the said GGSN; Said GGSN for IAD unite deployment GGSN or with the integrated GGSN of said IAD.
The embodiment of the invention also provides a kind of IAD, comprising:
The message sink module is used to receive first request message that service universal grouping wireless business supporting node SGSN sends, and said first request message carries the APN of sign pass-through service; Said first request message is that said SGSN receives said first request message that subscriber equipment sends, and confirms that Access Point Name in said first request message is called transmission after the APN that identify pass-through service;
Message transmission module is used for sending second request message to ggsn GGSN, and said second request message carries the APN of said sign pass-through service;
Said message sink module, also be used to receive said GGSN that send with the said second request message corresponding response message;
Said message transmission module also is used for said response message is sent to said SGSN, so that set up the tunnel between IAD and the said GGSN; Said GGSN for IAD unite deployment GGSN or with the integrated GGSN of said IAD.
Pass through the embodiment of the invention; IAD or service universal grouping wireless business supporting node confirm that the Access Point Name in first request message is called after the APN that identifies pass-through service; Send second request message to GGSN, so that set up the tunnel between IAD and the GGSN; Wherein, this GGSN for IAD unite deployment GGSN or with the integrated GGSN of IAD.Thereby IAD can with bypass flow directly send to IAD unite deployment GGSN or with the integrated GGSN of IAD; By above-mentioned GGSN bypass flow is sent to home network or internet again; Realized that IAD supports the function of data bypass, and realized pass-through service is chargeed and/or the function of Lawful intercept.
Description of drawings
In order to be illustrated more clearly in the embodiment of the invention or technical scheme of the prior art; To do one to the accompanying drawing of required use in embodiment or the description of the Prior Art below introduces simply; Obviously, the accompanying drawing in describing below is some embodiments of the present invention, for those of ordinary skills; Under the prerequisite of not paying creative work, can also obtain other accompanying drawing according to these accompanying drawings.
Fig. 1 is the flow chart of the method embodiment one of data bypass of the present invention;
Fig. 2 is the flow chart of the method embodiment two of data bypass of the present invention;
Fig. 3 is the flow chart of the method embodiment three of data bypass of the present invention;
Fig. 4 is the flow chart of the method embodiment four of data bypass of the present invention;
Fig. 5 is the flow chart of the method embodiment five of data bypass of the present invention;
Fig. 6 is the structural representation of network equipment embodiment one of the present invention;
Fig. 7 is the structural representation of IAD embodiment one of the present invention;
Fig. 8 is the sketch map of the system embodiment one of data bypass of the present invention.
Embodiment
For the purpose, technical scheme and the advantage that make the embodiment of the invention clearer; To combine the accompanying drawing in the embodiment of the invention below; Technical scheme in the embodiment of the invention is carried out clear, intactly description; Obviously, described embodiment is the present invention's part embodiment, rather than whole embodiment.Based on the embodiment among the present invention, the every other embodiment that those of ordinary skills are obtained under the prerequisite of not making creative work belongs to the scope that the present invention protects.
Fig. 1 is the flow chart of the method embodiment one of data bypass of the present invention, and as shown in Figure 1, the method for this data bypass can comprise:
Step 101, network equipment receives first request message that subscriber equipment sends, and this first request message carries the APN of sign pass-through service.
In the present embodiment, this first request message can be for activating packet data protocol (Packet DataProtocol; Hereinafter to be referred as: PDP) context request message.
Step 102, network equipment confirm that the Access Point Name in this first request message is called after the APN that identifies pass-through service, the APN of sign pass-through service are revised as the APN of sensing GGSN.
Particularly, network equipment can compare the APN of APN in first request message and pre-configured sign pass-through service; If the APN in this first request message is identical with the APN of pre-configured sign pass-through service, can confirm that then the Access Point Name in first request message is called the APN that identifies pass-through service.
In the present embodiment, network equipment this locality disposes the IP address corresponding with the APN that points to GGSN, the IP address that this IP address is this GGSN; According to the APN of above-mentioned sensing GGSN, network equipment can obtain the IP address of this GGSN.
In the present embodiment, like no specified otherwise, GGSN for IAD unite deployment GGSN or with the integrated GGSN of IAD, as shown in Figure 8, the GGSN 85 among Fig. 8 be with IAD unite deployment GGSN or with the integrated GGSN of IAD.Wherein, the GGSN that unites deployment with IAD comprises and the direct-connected GGSN of IAD, perhaps, and the GGSN that is connected through router or switch with IAD.
Step 103, network equipment sends second request message to GGSN, and this second request message carries the APN that points to GGSN, so that set up the tunnel between IAD and this GGSN; Further, also being convenient to this GGSN charges and/or Lawful intercept to pass-through service.
In the present embodiment, network equipment can be SGSN or IAD.When this network equipment is IAD; To GGSN send second request message can for: IAD sends to service universal grouping wireless business supporting node SGSN through the APN that first request message will point to GGSN; So that this SGSN sends second request message according to the APN that points to GGSN to GGSN.Wherein, according to the APN that points to GGSN, SGSN can obtain the IP address of this GGSN, and then SGSN can send second request message to this GGSN according to the IP address of this GGSN.
In the present embodiment, the tunnel between IAD and the GGSN can be a direct tunnel (Directtunnel), and promptly through this tunnel, IAD can directly send to GGSN with bypass flow, and bypass flow does not need to pass through SGSN again like this.
GGSN in the present embodiment can charge and/or Lawful intercept to pass-through service.Particularly, GGSN can add up the charge information of pass-through service, generates call detail record according to this charge information, and through charging gateway function body this call detail record is sent to charge system; And/or,
GGSN can receive the control information of intercepting of Lawful interception gateway transmission, and according to the communication information of intercepting control information listen for user equipment, and the communication information of this subscriber equipment that will listen to sends to above-mentioned Lawful interception gateway; Above-mentionedly intercept control information and comprise and monitor to activate, monitor and close or status poll.
In the present embodiment, above-mentioned second request message can be for creating the PDP Context request message.
In the foregoing description; IAD or SGSN confirm that the Access Point Name in first request message is called after the APN that identifies pass-through service; The APN of sign pass-through service is revised as the APN that points to GGSN; And send second request message to GGSN, to set up the tunnel between IAD and the GGSN; Wherein, this GGSN for IAD unite deployment GGSN or with the integrated GGSN of IAD.Thereby IAD can with bypass flow directly send to IAD unite deployment GGSN or with the integrated GGSN of IAD; By above-mentioned GGSN bypass flow is sent to home network or internet again, realized the function of IAD support data bypass; And the foregoing description has been realized pass-through service is chargeed and/or the function of Lawful intercept.
Fig. 2 is the flow chart of the method embodiment two of data bypass of the present invention, and present embodiment is a PDP context activating request message with first request message, and second request message is that example describes for creating the PDP Context request message.
As shown in Figure 2, the method for this data bypass can comprise:
Step 201 when UE has business to initiate, is sent PDP context activating request message to AG, and this PDP context activating request message is carried APN (the AccessPoint Name of sign pass-through service; Hereinafter to be referred as: APN) visit pass-through service.
Step 202, AG confirms after the APN of APN for the sign pass-through service in the PDP context activating request message APN that identifies pass-through service to be revised as the APN that points to GGSN, execution in step 203.
Particularly, AG can compare the APN of APN in the PDP context activating request message and pre-configured sign pass-through service; If the APN in this PDP context activating request message is identical with the APN of pre-configured sign pass-through service, can confirm that then the APN in the PDP context activating request message is the APN of sign pass-through service.
In the present embodiment, AG this locality disposes the IP address corresponding with the APN that points to GGSN, the IP address that this IP address is this GGSN.
In the present embodiment, like no specified otherwise, GGSN for AG unite deployment GGSN or with the integrated GGSN of AG, as shown in Figure 8, the GGSN 85 among Fig. 8 be with IAD unite deployment GGSN or with the integrated GGSN of IAD.Wherein, the GGSN that unites deployment with AG comprises the direct-connected GGSN with AG, perhaps, and the GGSN that is connected through router or switch with AG.
In addition; If it is not the APN of sign pass-through service that AG confirms the APN in the PDP context activating request message; Then AG can handle this PDP context activating request message according to normal flow; This PDP context activating request message is passed through SGSN, and carry out flow according to normal PDP context activation flow process.
Step 203, AG sends to SGSN with PDP context activating request message, and this PDP context activating request message is carried the APN that points to GGSN.
Step 204, SGSN carries out the user signing contract information inspection according to the APN in the PDP context activating request message; After the user signing contract information inspection of APN in this PDP context activating request message through SGSN, SGSN selects GGSN according to the APN in the PDP context activating request message, sends to the GGSN that selects then and creates the PDP Context request message.
In the present embodiment, user signing contract information comprises wildcard APN (wild card APN), can be through the user signing contract information inspection of SGSN so point to the APN of GGSN in the PDP context activating request message.In PDP context activating request message, point to after the user signing contract information inspection of APN of GGSN through SGSN; SGSN can be according to the APN that points to GGSN in the PDP context activating request message; Select with AG unite deployment GGSN or with the integrated GGSN of AG; And, send to the GGSN that selects according to the IP address that obtains then and create the PDP Context request message according to the IP address that the APN that points to GGSN obtains this GGSN.
Step 205, GGSN sends to SGSN and creates the PDP Context response message.
Step 206, optional, SGSN triggers and sets up RAB (Radio Access Bearer; Hereinafter to be referred as: process RAB).
Step 207, SGSN confirms to have opened direct tunnel (Direct tunnel) function, and SGSN sends to GGSN and upgrades the PDP Context request message, so that set up the tunnel between AG and the GGSN.In the present embodiment, the tunnel between AG and the GGSN is a direct tunnel (Direct tunnel), and promptly through this tunnel, AG can directly send to GGSN with bypass flow, and bypass flow does not need to pass through SGSN again like this.
Step 208, GGSN sends to SGSN and upgrades the PDP Context response message.
Step 209, SGSN sends PDP context activating to UE and accepts message.
At this moment, AP can send to AG with bypass flow, by AG this bypass flow is sent to GGSN again, by GGSN bypass flow is sent to home network or internet then.
In the foregoing description; AG confirms after the APN of APN for the sign pass-through service in the PDP context activating request message; The APN of sign pass-through service is revised as the APN that points to GGSN; And transmit PDP context activating request message to SGSN, setting up the tunnel between AG and the GGSN, this GGSN for IAD unite deployment GGSN or with the integrated GGSN of IAD.Thereby IAD can with bypass flow directly send to IAD unite deployment GGSN or with IAD integrated GGSN, by above-mentioned GGSN bypass flow is sent to home network or internet again, realized that AG supports the function of data bypass; And uniting the GGSN of deployment with IAD or can also realize pass-through service is chargeed and/or the function of Lawful intercept in the foregoing description further, with the integrated GGSN of IAD.
Fig. 3 is the flow chart of the method embodiment three of data bypass of the present invention, and present embodiment is a PDP context activating request message with first request message, and second request message is that example describes for creating the PDP Context request message.
As shown in Figure 3, the method for this data bypass can comprise:
Step 301 when UE has business to initiate, is sent PDP context activating request message to SGSN, and the APN that this PDP context activating request message is carried the sign pass-through service visits pass-through service.
Step 302, SGSN confirms the APN of sign pass-through service to be revised as the APN of sensing GGSN after the APN of APN for the sign pass-through service in the PDP context activating request message.
Particularly, SGSN can compare the APN of APN in the PDP context activating request message and pre-configured sign pass-through service; If the APN in this PDP context activating request message is identical with the APN of pre-configured sign pass-through service, can confirm that then the APN in the PDP context activating request message is the APN of sign pass-through service.
In the present embodiment, SGSN this locality disposes the IP address corresponding with the APN that points to GGSN, the IP address that this IP address is this GGSN.
In the present embodiment, like no specified otherwise, GGSN for AG unite deployment GGSN or with the integrated GGSN of AG, as shown in Figure 8, the GGSN 85 among Fig. 8 be with IAD unite deployment GGSN or with the integrated GGSN of IAD.Wherein, the GGSN that unites deployment with AG comprises the direct-connected GGSN with AG, perhaps, and the GGSN that is connected through router or switch with AG.
In addition; If it is not the APN of sign pass-through service that SGSN confirms the APN in the PDP context activating request message; Then SGSN can handle this PDP context activating request message according to normal flow; GGSN in core net sends and creates the PDP Context request message, and carries out flow according to normal PDP context activation flow process.
Step 303, SGSN carries out the user signing contract information inspection according to the APN in the PDP context activating request message; After the user signing contract information inspection of APN in this PDP context activating request message through SGSN, SGSN selects GGSN according to the APN in the PDP context activating request message, sends to the GGSN that selects then and creates the PDP Context request message.
In the present embodiment, user signing contract information comprises wild card APN, can be through the user signing contract information inspection of SGSN so point to the APN of GGSN in the PDP context activating request message.After the user signing contract information inspection of APN in PDP context activating request message through SGSN; SGSN can be according to the APN that points to GGSN in the PDP context activating request message; Select with AG unite deployment GGSN or with the integrated GGSN of AG; And, send to the GGSN that selects according to the IP address that obtains then and create the PDP Context request message according to the IP address that the APN that points to GGSN obtains this GGSN.
Step 304, GGSN sends to SGSN and creates the PDP Context response message.
Step 305, optional, SGSN triggers the process of setting up RAB.
Step 306, SGSN confirms to have opened the direct tunnel function, and SGSN sends to GGSN and upgrades the PDP Context request message, to set up the tunnel between AG and the GGSN.In the present embodiment, the tunnel between AG and the GGSN is a direct tunnel, and promptly through this tunnel, AG can directly send to GGSN with bypass flow, and bypass flow does not need to pass through SGSN again like this.
Step 307, GGSN sends to SGSN and upgrades the PDP Context response message.
Step 308, SGSN sends PDP context activating to UE and accepts message.
At this moment, AP can send to AG with bypass flow, by AG this bypass flow is sent to GGSN again, by GGSN bypass flow is sent to home network or internet then.
In the foregoing description; SGSN confirms after the APN of APN for the sign pass-through service in the PDP context activating request message; The APN of sign pass-through service is revised as the APN that points to GGSN; And send to create the PDP Context request message to GGSN, setting up the tunnel between AG and the GGSN, this GGSN for IAD unite deployment GGSN or with the integrated GGSN of IAD.Thereby IAD can with bypass flow directly send to IAD unite deployment GGSN or with IAD integrated GGSN, by above-mentioned GGSN bypass flow is sent to home network or internet again, realized that AG supports the function of data bypass; And uniting the GGSN of deployment with IAD or can also realize pass-through service is chargeed and/or the function of Lawful intercept in the foregoing description further, with the integrated GGSN of IAD.
Fig. 2 of the present invention and the AG that not only realized embodiment illustrated in fig. 3 support the function of data bypass; Further; Fig. 2 of the present invention and embodiment illustrated in fig. 3 in; Unite the GGSN of deployment with IAD or can also realize pass-through service is carried out Lawful intercept and pass-through service is chargeed, and can realize real time billing with the integrated GGSN of IAD.Particularly, GGSN can add up the charge information of pass-through service, generates call detail record (Calling Detail Records according to this charge information; Hereinafter to be referred as: CDR), GGSN sends to Charging Gateway Functionality (Charging Gateway Function with CDR then; Hereinafter to be referred as: CGF) entity sends to charge system by the CGF entity with this CDR again, thereby realizes pass-through service is chargeed.
In addition, GGSN can receive Lawful interception gateway (Lawful Interception Gateway; Hereinafter to be referred as: that LIG) sends intercepts control information, and intercepts the communication information that UE is intercepted in control information according to this, and the communication information of this UE that will listen to sends to LIG; Above-mentionedly intercept control information and comprise and monitor to activate, monitor and close or status poll; Thereby realized pass-through service is carried out Lawful intercept.
Fig. 4 is the flow chart of the method embodiment four of data bypass of the present invention, and as shown in Figure 4, the method for this data bypass can comprise:
Step 401 receives first request message that SGSN sends, and this first request message carries the APN of sign pass-through service; This first request message is that SGSN receives first request message that subscriber equipment sends, and confirms that Access Point Name in this first request message is called transmission after the APN that identify pass-through service.
Particularly, SGSN can compare the APN of APN in first request message and pre-configured sign pass-through service; If the APN in first request message is identical with the APN of pre-configured sign pass-through service, then SGSN can confirm that the Access Point Name in this first request message is called the APN that identifies pass-through service.Then, SGSN sends to IAD with this first request message.
In the present embodiment, first request message can be PDP context activating request message.
Step 402 is sent second request message to GGSN, and this second request message carries the APN of sign pass-through service.
In the present embodiment, like no specified otherwise, GGSN for IAD unite deployment GGSN or with the integrated GGSN of IAD, as shown in Figure 8.Wherein, the GGSN that unites deployment with IAD comprises and the direct-connected GGSN of IAD, perhaps, and the GGSN that is connected through router or switch with IAD.
Step 403, receive that GGSN sends with the second request message corresponding response message, this response message is sent to SGSN, so that set up the tunnel between IAD and the GGSN.
In the present embodiment; GGSN receives after second request message of IAD transmission; To send to this IAD with this second request message corresponding response message; This IAD can send to SGSN with the response message that receives then, so that set up the tunnel between IAD and the GGSN; Further, also being convenient to this GGSN charges and/or Lawful intercept to pass-through service.
In the present embodiment, the tunnel between IAD and the GGSN is a direct tunnel (Directtunnel), and promptly through this tunnel, IAD can directly send to GGSN with bypass flow, and bypass flow does not need to pass through SGSN again like this.
GGSN in the present embodiment can charge and/or Lawful intercept to pass-through service.Particularly, GGSN can add up the charge information of pass-through service, generates call detail record according to this charge information, and through charging gateway function body this call detail record is sent to charge system; And/or,
GGSN can receive the control information of intercepting of Lawful interception gateway transmission, and intercepts the communication information of control information listen for user equipment according to this, and the communication information of this subscriber equipment that will listen to sends to above-mentioned Lawful interception gateway; Above-mentionedly intercept control information and comprise and monitor to activate, monitor and close or status poll.
In the present embodiment, second request message can be for creating the PDP Context request message.
In the foregoing description, IAD receives after first request message of SGSN transmission, sends second request message to GGSN, to set up the tunnel between IAD and the GGSN; Wherein, first request message is that SGSN confirms that Access Point Name in first request message sends after being called the APN that identifies pass-through service, GGSN for IAD unite deployment GGSN or with the integrated GGSN of IAD.Thereby IAD can with bypass flow directly send to IAD unite deployment GGSN or with the integrated GGSN of IAD; By above-mentioned GGSN bypass flow is sent to home network or internet again, realized the function of IAD support data bypass; And the foregoing description has been realized pass-through service is chargeed and/or the function of Lawful intercept.
Fig. 5 is the flow chart of the method embodiment five of data bypass of the present invention, and present embodiment is a PDP context activating request message with first request message, and second request message is that example describes for creating the PDP Context request message.
As shown in Figure 5, the method for this data bypass can comprise:
Step 501 when UE has business to initiate, is sent PDP context activating request message to SGSN, and the APN that this PDP context activating request message is carried the sign pass-through service visits pass-through service.
Step 502, SGSN carries out the user signing contract information inspection according to the APN in the PDP context activating request message.
In the present embodiment, user signing contract information comprises wild card APN, so the APN in the PDP context activating request message can be through the user signing contract information inspection of SGSN.
Step 503, SGSN confirms after the APN of APN for the sign pass-through service in the PDP context activating request message, sends to AG and creates the PDP Context request message.
Particularly, SGSN can compare the APN of APN in the PDP context activating request message and pre-configured sign pass-through service; If the APN in this PDP context activating request message is identical with the APN of pre-configured sign pass-through service, can confirm that then the APN in the PDP context activating request message is the APN of sign pass-through service.After the APN of APN in confirming PDP context activating request message for the sign pass-through service, SGSN sends to AG and creates the PDP Context request message.
In the present embodiment, like no specified otherwise, GGSN for AG unite deployment GGSN or with the integrated GGSN of AG, as shown in Figure 8, the GGSN 85 among Fig. 8 be with IAD unite deployment GGSN or with the integrated GGSN of IAD.Wherein, the GGSN that unites deployment with AG comprises the direct-connected GGSN with AG, perhaps, and the GGSN that is connected through router or switch with AG.
In addition; If it is not the APN of sign pass-through service that SGSN confirms the APN in the PDP context activating request message; Then SGSN can handle this PDP context activating request message according to normal flow; GGSN in core net sends and creates the PDP Context request message, and carries out flow according to normal PDP context activation flow process.
Step 504, AG sends to GGSN and creates the PDP Context request message.
Step 505, GGSN sends to AG and creates the PDP Context response message.
Step 506, AG sends to SGSN and creates the PDP Context response message.
Step 507, optional, SGSN triggers the process of setting up RAB.
Step 508, the direct tunnel function has been opened in the SGSN judgement, and SGSN sends to AG and upgrades the PDP Context request message, so that set up the tunnel between AG and the GGSN.In the present embodiment, the tunnel between AG and the GGSN is a direct tunnel, and promptly through this tunnel, AG can directly send to GGSN with bypass flow, and bypass flow does not need to pass through SGSN again like this.
Step 509, AG sends to GGSN and upgrades the PDP Context request message.
Step 510, GGSN sends to AG and upgrades the PDP Context response message.
Step 511, AG sends to SGSN and upgrades the PDP Context response message.
Step 512, SGSN sends PDP context activating to UE and accepts message.
At this moment, AP can send to AG with bypass flow, by AG this bypass flow is sent to GGSN again, by GGSN bypass flow is sent to home network or internet then.
In the foregoing description; After the APN of APN in the PDP context activating request message that SGSN confirms to receive for the sign pass-through service, send establishment PDP Context request message to AG, AG sends to GGSN and creates the PDP Context request message then; So that set up the tunnel between AG and the GGSN; Wherein, GGSN for AG unite deployment GGSN or with the integrated GGSN of AG, thereby IAD can with bypass flow directly send to IAD unite deployment GGSN or with the integrated GGSN of IAD; By above-mentioned GGSN bypass flow is sent to home network or internet again, realized the function of IAD support data bypass; And further; Uniting the GGSN of deployment with IAD or can also realize pass-through service is chargeed and/or the function of Lawful intercept in the foregoing description with the integrated GGSN of IAD; Wherein, This GGSN charges to pass-through service and/or the operation of Lawful intercept, with Fig. 2 of the present invention and embodiment illustrated in fig. 3 in GGSN pass-through service is chargeed and/or the operation of Lawful intercept identical, repeat no more at this.
One of ordinary skill in the art will appreciate that: all or part of step that realizes said method embodiment can be accomplished through the relevant hardware of program command; Aforesaid program can be stored in the computer read/write memory medium; This program the step that comprises said method embodiment when carrying out; And aforesaid storage medium comprises: various media that can be program code stored such as ROM, RAM, magnetic disc or CD.
Fig. 6 is the structural representation of network equipment embodiment one of the present invention; Network equipment in the present embodiment can be realized the flow process that the present invention is embodiment illustrated in fig. 1; As shown in Figure 6, this network equipment can comprise: receiver module 61, determination module 62, modified module 63 and sending module 64.
Wherein, receiver module 61 is used to receive first request message that subscriber equipment sends, and this first request message carries the APN of sign pass-through service.
Determination module 62, the Access Point Name that is used for first request message of definite receiver module 61 receptions is called the APN that identifies pass-through service; Particularly, determination module 62 can compare the APN of APN in first request message and pre-configured sign pass-through service; If the APN in this first request message is identical with the APN of pre-configured sign pass-through service, can confirm that then the Access Point Name in first request message is called the APN that identifies pass-through service.
Modified module 63 is used for after determination module 62 confirms that the Access Point Name of first request message that receiver module 61 receives is called the APN that identifies pass-through service, the APN of sign pass-through service being revised as the APN of sensing GGSN; In the present embodiment, network equipment this locality disposes the IP address corresponding with the APN that points to GGSN, the IP address that this IP address is this GGSN; According to the APN of above-mentioned sensing GGSN, network equipment can obtain the IP address of this GGSN.
In the present embodiment; As there is not a specified otherwise; GGSN can for IAD unite deployment GGSN or with the integrated GGSN of IAD, as shown in Figure 8, the GGSN 85 among Fig. 8 be with IAD unite deployment GGSN or with the integrated GGSN of IAD.Wherein, the GGSN that unites deployment with IAD comprises and the direct-connected GGSN of IAD, perhaps, and the GGSN that is connected through router or switch with IAD.
Sending module 64 is used for sending second request message to above-mentioned GGSN, and this second request message carries the APN that points to GGSN, so that set up the tunnel between IAD and the above-mentioned GGSN; Further, also being convenient to this GGSN charges and/or Lawful intercept to pass-through service.
Network equipment in the present embodiment can be SGSN or IAD; When the network equipment is IAD; Sending module 64 can send to SGSN through the APN that first request message will point to GGSN; So that this SGSN sends second request message according to the APN that points to GGSN to above-mentioned GGSN.Wherein, according to the APN that points to GGSN, sending module 64 can obtain the IP address of this GGSN, and then sending module 64 can send second request message to this GGSN according to the IP address of this GGSN.
In the present embodiment, the tunnel between IAD and the GGSN is a direct tunnel (Directtunnel), and promptly through this tunnel, IAD can directly send to GGSN with bypass flow, and bypass flow does not need to pass through SGSN again like this.
In the foregoing description; Determination module 62 confirms that the Access Point Name in first request message is called after the APN that identifies pass-through service; The APN that modified module 63 will identify pass-through service is revised as the APN that points to GGSN, and sends second request message by sending module 64 to GGSN, to set up the tunnel between IAD and the GGSN; Wherein, this GGSN for IAD unite deployment GGSN or with the integrated GGSN of IAD.Thereby IAD can with bypass flow directly send to IAD unite deployment GGSN or with the integrated GGSN of IAD; By above-mentioned GGSN bypass flow is sent to home network or internet again, realized the function of IAD support data bypass; And the foregoing description has been realized pass-through service is chargeed and/or the function of Lawful intercept.
Fig. 7 is the structural representation of IAD embodiment one of the present invention, and the IAD in the present embodiment can be realized the flow process that the present invention is embodiment illustrated in fig. 4, and is as shown in Figure 7, and this IAD can comprise: message sink module 71 and message transmission module 72.
Wherein, message sink module 71 is used to receive first request message that SGSN sends, and this first request message carries the APN of sign pass-through service; This first request message is that SGSN receives first request message that subscriber equipment sends, and confirms that Access Point Name in this first request message is called transmission after the APN that identify pass-through service;
Message transmission module 72 is used for sending second request message to GGSN, and this second request message carries the APN of sign pass-through service.In the present embodiment, like no specified otherwise, GGSN for IAD unite deployment GGSN or with the integrated GGSN of IAD, as shown in Figure 8, the GGSN 85 among Fig. 8 be with IAD unite deployment GGSN or with the integrated GGSN of IAD.Wherein, the GGSN that unites deployment with IAD comprises and the direct-connected GGSN of IAD, perhaps, and the GGSN that is connected through router or switch with IAD.
In the present embodiment, message sink module 71 is used to also to receive that GGSN sends and the second request message corresponding response message;
Message transmission module 72 also is used for above-mentioned response message is sent to SGSN, so that set up the tunnel between IAD and the above-mentioned GGSN; Further, also being convenient to this GGSN charges and/or Lawful intercept to pass-through service.
In the present embodiment, the tunnel between IAD and the GGSN is a direct tunnel (Directtunnel), and promptly through this tunnel, IAD can directly send to GGSN with bypass flow, and bypass flow does not need to pass through SGSN again like this.
In the foregoing description, message sink module 71 receives after first request message of SGSN transmission, and message transmission module 72 is sent second request message to GGSN, to set up the tunnel between IAD and the GGSN; Wherein, first request message is that SGSN confirms that Access Point Name in first request message sends after being called the APN that identifies pass-through service, GGSN for IAD unite deployment GGSN or with the integrated GGSN of IAD.Thereby IAD can with bypass flow directly send to IAD unite deployment GGSN or with the integrated GGSN of IAD; By above-mentioned GGSN bypass flow is sent to home network or internet again, realized the function of IAD support data bypass; And the foregoing description has been realized pass-through service is chargeed and/or the function of Lawful intercept.
Fig. 8 is the sketch map of the system embodiment one of data bypass of the present invention, and as shown in Figure 8, the system of this data bypass can comprise: UE 81, AP 82, AG 83, SGSN 84, a GGSN 85 and the 2nd GGSN 86.
Wherein, a GGSN 85 for AG 83 unite deployment GGSN or with the integrated GGSN of AG 83; Wherein, the GGSN that unites deployment with IAD comprises and the direct-connected GGSN of IAD, perhaps, and the GGSN that is connected through router or switch with IAD; The 2nd GGSN 86 is the GGSN in the core net.
In the present embodiment, UE 81, AP 82, AG 83, SGSN 84, a GGSN 85 and the 2nd GGSN 86 can adopt Fig. 2 of the present invention, Fig. 3 or flow process embodiment illustrated in fig. 5 to carry out alternately.Wherein, AG 83 can realize through the present invention network equipment or the present invention's IAD shown in Figure 7 shown in Figure 6; SGSN 84 can realize through the present invention's network equipment shown in Figure 6.
Need to prove that Fig. 1 of the present invention~content embodiment illustrated in fig. 5 also can be used as replenishing of Fig. 6 of the present invention, Fig. 7 and content embodiment illustrated in fig. 8.
It will be appreciated by those skilled in the art that accompanying drawing is the sketch map of a preferred embodiment, module in the accompanying drawing or flow process might not be that embodiment of the present invention is necessary.
It will be appreciated by those skilled in the art that the module in the device among the embodiment can be distributed in the device of embodiment according to the embodiment description, also can carry out respective change and be arranged in the one or more devices that are different from present embodiment.The module of the foregoing description can be merged into a module, also can further split into a plurality of submodules.
What should explain at last is: above embodiment is only in order to explaining technical scheme of the present invention, but not to its restriction; Although with reference to previous embodiment the present invention has been carried out detailed explanation, those of ordinary skill in the art is to be understood that: it still can be made amendment to the technical scheme that aforementioned each embodiment put down in writing, and perhaps part technical characterictic wherein is equal to replacement; And these are revised or replacement, do not make the spirit and the scope of the essence disengaging various embodiments of the present invention technical scheme of relevant art scheme.

Claims (10)

1.一种数据旁路的方法,其特征在于,包括:1. A method for data bypass, comprising: 网络侧设备接收用户设备发送的第一请求消息,所述第一请求消息携带标识旁路业务的接入点名称;The network side device receives a first request message sent by the user equipment, where the first request message carries an access point name identifying the bypass service; 所述网络侧设备确定所述第一请求消息中的接入点名称为标识旁路业务的接入点名称之后,将所述标识旁路业务的接入点名称修改为指向网关通用分组无线业务支持节点GGSN的接入点名称;After the network side device determines that the access point name in the first request message is the access point name identifying the bypass service, it modifies the access point name identifying the bypass service to point to the gateway general packet radio service The access point name of the support node GGSN; 所述网络侧设备向所述GGSN发送第二请求消息,所述第二请求消息携带所述指向GGSN的接入点名称,以便于建立接入网关与所述GGSN之间的隧道;所述GGSN为与接入网关联合部署的GGSN或与所述接入网关集成的GGSN;The network side device sends a second request message to the GGSN, and the second request message carries the name of the access point pointing to the GGSN, so as to establish a tunnel between the access gateway and the GGSN; the GGSN It is a GGSN jointly deployed with the access gateway or a GGSN integrated with the access gateway; 其中,所述网络侧设备确定所述第一请求消息中的接入点名称为标识旁路业务的接入点名称包括:Wherein, the network side device determining that the access point name in the first request message is the access point name identifying the bypass service includes: 所述网络侧设备将所述第一请求消息中的接入点名称与预先配置的标识旁路业务的接入点名称进行对比;The network side device compares the access point name in the first request message with the pre-configured access point name identifying the bypass service; 如果所述第一请求消息中的接入点名称与所述预先配置的标识旁路业务的接入点名称相同,则所述网络侧设备确定所述第一请求消息中的接入点名称为标识旁路业务的接入点名称。If the access point name in the first request message is the same as the pre-configured access point name identifying the bypass service, the network side device determines that the access point name in the first request message is Identifies the name of the access point of the bypass service. 2.根据权利要求1所述的方法,其特征在于,所述网络侧设备为接入网关;2. The method according to claim 1, wherein the network side device is an access gateway; 所述网络侧设备向所述GGSN发送第二请求消息包括:The second request message sent by the network side device to the GGSN includes: 所述接入网关通过所述第一请求消息将所述指向GGSN的接入点名称发送给服务通用分组无线业务支持节点SGSN,以便所述SGSN根据所述指向GGSN的接入点名称,向所述GGSN发送所述第二请求消息。The access gateway sends the name of the access point pointing to the GGSN to the serving general packet radio service support node SGSN through the first request message, so that the SGSN sends the name of the access point pointing to the GGSN to the The GGSN sends the second request message. 3.根据权利要求1所述的方法,其特征在于,所述网络侧设备为SGSN。3. The method according to claim 1, wherein the network side device is an SGSN. 4.根据权利要求1所述的方法,其特征在于,还包括:4. The method according to claim 1, further comprising: 所述GGSN统计所述旁路业务的计费信息,根据所述计费信息生成呼叫详细记录,并通过计费网关功能实体将所述呼叫详细记录发送给计费系统;The GGSN counts the charging information of the bypass service, generates a call detail record according to the charging information, and sends the call detail record to a charging system through a charging gateway functional entity; 和/或,and / or, 所述GGSN接收合法监听网关发送的侦听控制信息,并根据所述侦听控制信息侦听所述用户设备的通信信息,并将侦听到的所述用户设备的通信信息发送给所述合法监听网关;所述侦听控制信息包括监听激活、监听关闭或状态查询。The GGSN receives the interception control information sent by the legal interception gateway, intercepts the communication information of the user equipment according to the interception control information, and sends the intercepted communication information of the user equipment to the legal Monitoring gateway; the monitoring control information includes monitoring activation, monitoring deactivation or status query. 5.一种网络侧设备,其特征在于,包括:5. A network side device, characterized in that, comprising: 接收模块,用于接收用户设备发送的第一请求消息,所述第一请求消息携带标识旁路业务的接入点名称;A receiving module, configured to receive a first request message sent by a user equipment, where the first request message carries an access point name identifying a bypass service; 确定模块,用于确定所述接收模块接收的第一请求消息中的接入点名称为标识旁路业务的接入点名称;A determining module, configured to determine that the access point name in the first request message received by the receiving module is the access point name identifying the bypass service; 修改模块,用于在所述确定模块确定所述接收模块接收的第一请求消息中的接入点名称为标识旁路业务的接入点名称之后,将所述标识旁路业务的接入点名称修改为指向网关通用分组无线业务支持节点GGSN的接入点名称;A modifying module, configured to, after the determining module determines that the access point name in the first request message received by the receiving module is the name of the access point identifying the bypass service, change the access point identifying the bypass service to The name is changed to point to the access point name of the Gateway General Packet Radio Service Support Node GGSN; 发送模块,用于向所述GGSN发送第二请求消息,所述第二请求消息携带所述指向GGSN的接入点名称,以便于建立接入网关与所述GGSN之间的隧道;所述GGSN为与接入网关联合部署的GGSN或与所述接入网关集成的GGSN;A sending module, configured to send a second request message to the GGSN, the second request message carrying the name of the access point pointing to the GGSN, so as to establish a tunnel between the access gateway and the GGSN; the GGSN It is a GGSN jointly deployed with the access gateway or a GGSN integrated with the access gateway; 其中,所述确定模块具体用于将所述第一请求消息中的接入点名称与预先配置的标识旁路业务的接入点名称进行对比;如果所述第一请求消息中的接入点名称与预先配置的标识旁路业务的接入点名称相同,则确定所述第一请求消息中的接入点名称为标识旁路业务的接入点名称。Wherein, the determining module is specifically configured to compare the access point name in the first request message with the pre-configured access point name identifying the bypass service; if the access point in the first request message If the name is the same as the pre-configured name of the access point identifying the bypass service, then it is determined that the name of the access point in the first request message is the name of the access point identifying the bypass service. 6.根据权利要求5所述的网络侧设备,其特征在于,所述发送模块具体用于在所述网络侧设备为接入网关时,通过所述第一请求消息将所述指向GGSN的接入点名称发送给服务通用分组无线业务支持节点SGSN,以便所述SGSN根据所述指向GGSN的接入点名称,向所述GGSN发送所述第二请求消息。6. The network-side device according to claim 5, wherein the sending module is specifically configured to, when the network-side device is an access gateway, pass the first request message to the GGSN-directed access The access point name is sent to the serving general packet radio service support node SGSN, so that the SGSN sends the second request message to the GGSN according to the access point name pointing to the GGSN. 7.一种数据旁路的方法,其特征在于,包括:7. A method for data bypass, comprising: 接收服务通用分组无线业务支持节点SGSN发送的第一请求消息,所述第一请求消息携带标识旁路业务的接入点名称;所述第一请求消息是所述SGSN接收到用户设备发送的所述第一请求消息,并确定所述第一请求消息中的接入点名称为标识旁路业务的接入点名称之后发送的;Receiving a first request message sent by a serving general packet radio service support node SGSN, where the first request message carries an access point name identifying a bypass service; the first request message is that the SGSN receives the The first request message is sent after determining that the access point name in the first request message is the access point name identifying the bypass service; 向网关通用分组无线业务支持节点GGSN发送第二请求消息,所述第二请求消息携带所述标识旁路业务的接入点名称;Sending a second request message to the gateway general packet radio service support node GGSN, where the second request message carries the name of the access point identifying the bypass service; 接收所述GGSN发送的与所述第二请求消息对应的响应消息,将所述响应消息发送给所述SGSN,以便于建立接入网关与所述GGSN之间的隧道;所述GGSN为与接入网关联合部署的GGSN或与所述接入网关集成的GGSN。receiving a response message corresponding to the second request message sent by the GGSN, and sending the response message to the SGSN, so as to establish a tunnel between the access gateway and the GGSN; The GGSN jointly deployed by the ingress gateway or the GGSN integrated with the access gateway. 8.根据权利要求7所述的方法,其特征在于,所述SGSN确定所述第一请求消息中的接入点名称为标识旁路业务的接入点名称包括:8. The method according to claim 7, wherein the SGSN determining that the access point name in the first request message is an access point name identifying a bypass service comprises: 所述SGSN将所述第一请求消息中的接入点名称与预先配置的标识旁路业务的接入点名称进行对比;The SGSN compares the access point name in the first request message with the pre-configured access point name identifying the bypass service; 如果所述第一请求消息中的接入点名称与预先配置的标识旁路业务的接入点名称相同,则所述SGSN确定所述第一请求消息中的接入点名称为标识旁路业务的接入点名称。If the access point name in the first request message is the same as the pre-configured access point name for identifying the bypass service, the SGSN determines that the access point name in the first request message is for identifying the bypass service access point name. 9.根据权利要求7所述的方法,其特征在于,还包括:9. The method according to claim 7, further comprising: 所述GGSN统计所述旁路业务的计费信息,根据所述计费信息生成呼叫详细记录,并通过计费网关功能实体将所述呼叫详细记录发送给计费系统;The GGSN counts the charging information of the bypass service, generates a call detail record according to the charging information, and sends the call detail record to a charging system through a charging gateway functional entity; 和/或,and / or, 所述GGSN接收合法监听网关发送的侦听控制信息,并根据所述侦听控制信息侦听所述用户设备的通信信息,并将侦听到的所述用户设备的通信信息发送给所述合法监听网关;所述侦听控制信息包括监听激活、监听关闭或状态查询。The GGSN receives the interception control information sent by the legal interception gateway, intercepts the communication information of the user equipment according to the interception control information, and sends the intercepted communication information of the user equipment to the legal Monitoring gateway; the monitoring control information includes monitoring activation, monitoring deactivation or status query. 10.一种接入网关,其特征在于,包括:10. An access gateway, characterized in that, comprising: 消息接收模块,用于接收服务通用分组无线业务支持节点SGSN发送的第一请求消息,所述第一请求消息携带标识旁路业务的接入点名称;所述第一请求消息是所述SGSN接收到用户设备发送的所述第一请求消息,并确定所述第一请求消息中的接入点名称为标识旁路业务的接入点名称之后发送的;The message receiving module is configured to receive the first request message sent by the serving general packet radio service support node SGSN, the first request message carries the name of the access point identifying the bypass service; the first request message is received by the SGSN receiving the first request message sent by the user equipment, and sending it after determining that the access point name in the first request message is the access point name identifying the bypass service; 消息发送模块,用于向网关通用分组无线业务支持节点GGSN发送第二请求消息,所述第二请求消息携带所述标识旁路业务的接入点名称;A message sending module, configured to send a second request message to a gateway general packet radio service support node GGSN, where the second request message carries the name of the access point identifying the bypass service; 所述消息接收模块,还用于接收所述GGSN发送的与所述第二请求消息对应的响应消息;The message receiving module is further configured to receive a response message sent by the GGSN and corresponding to the second request message; 所述消息发送模块,还用于将所述响应消息发送给所述SGSN,以便于建立接入网关与所述GGSN之间的隧道;所述GGSN为与接入网关联合部署的GGSN或与所述接入网关集成的GGSN。The message sending module is further configured to send the response message to the SGSN, so as to establish a tunnel between the access gateway and the GGSN; the GGSN is a GGSN jointly deployed with the access gateway or a The GGSN integrated with the above-mentioned access gateway.
CN2010101387808A 2010-03-31 2010-03-31 Method for data bypass, network side equipment and access gateway Expired - Fee Related CN101795478B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2010101387808A CN101795478B (en) 2010-03-31 2010-03-31 Method for data bypass, network side equipment and access gateway

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2010101387808A CN101795478B (en) 2010-03-31 2010-03-31 Method for data bypass, network side equipment and access gateway

Publications (2)

Publication Number Publication Date
CN101795478A CN101795478A (en) 2010-08-04
CN101795478B true CN101795478B (en) 2012-08-08

Family

ID=42587846

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2010101387808A Expired - Fee Related CN101795478B (en) 2010-03-31 2010-03-31 Method for data bypass, network side equipment and access gateway

Country Status (1)

Country Link
CN (1) CN101795478B (en)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102308603B (en) * 2011-07-12 2014-01-22 华为技术有限公司 Charge mode and network access device
CN102726075B (en) * 2011-08-19 2014-12-03 华为技术有限公司 Business by-pass method, access network device and secure gateway
CN102523313B (en) * 2011-12-09 2015-03-18 华为技术有限公司 Identification method of data bypass and apparatus thereof
EP2999171B1 (en) * 2013-06-28 2020-02-12 Huawei Technologies Co., Ltd. Method, apparatus and system for establishing optical bypass
CN108377532B (en) * 2016-11-16 2019-08-06 华为技术有限公司 A data connection method, control plane node and user equipment

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101646205A (en) * 2008-08-05 2010-02-10 华为技术有限公司 Node, method and system for accessing mobile network to public network at high speed
CN101925038A (en) * 2009-06-12 2010-12-22 华为技术有限公司 Data transmission method, communication device and network system

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2009055827A1 (en) * 2007-10-25 2009-04-30 Starent Networks, Corp. Interworking gateway for mobile nodes

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101646205A (en) * 2008-08-05 2010-02-10 华为技术有限公司 Node, method and system for accessing mobile network to public network at high speed
CN101925038A (en) * 2009-06-12 2010-12-22 华为技术有限公司 Data transmission method, communication device and network system

Also Published As

Publication number Publication date
CN101795478A (en) 2010-08-04

Similar Documents

Publication Publication Date Title
CN101668325B (en) Access control method, device and system
CN104144402B (en) Realize the method and relevant apparatus of mobile terminal localized roaming
JP5963828B2 (en) Multi-channel communication terminal
US7016334B2 (en) Device, system, method and computer readable medium for fast recovery of IP address change
CN102006210B (en) User equipment dial-up networking method, device and system
US8750140B2 (en) Support of home network base station local internet protocol access
US8331861B2 (en) Content distribution and synchronization techniques and devices
WO2018133271A1 (en) Esim card activation method, wireless router and user terminal
JP2009260986A (en) Decision of method for controlling communications
EP2315489A1 (en) Communication control system, communication system and communication control method
KR20120039984A (en) Method and apparatus for sharing internet connection based on automatic configuration of network interface
JP2007514384A5 (en)
US9439240B1 (en) Mobile communication system identity pairing
CN101795478B (en) Method for data bypass, network side equipment and access gateway
US20040125762A1 (en) Device, system, method and computer readable medium for attaching to a device identifited by an access point name in a wide area network providing particular services
CN103339976B (en) The method and apparatus of the local gateway assignment in wireless network
CN103281797A (en) Mobile terminal and method of transmitting business data by same
CN103763754A (en) Method, device and system for processing data
CN101068439B (en) Communicating method, mobile terminal, insertion point equipment and communication system
US20050030917A1 (en) Device, system, method and computer readable medium obtaining a network attribute, such as a DNS address, for a short distance wireless network
CN102480714A (en) Method for inquiring gateway and system thereof
CN109068306A (en) A kind of data transmission method and terminal, storage medium
CN108093387B (en) Enterprise-level Bluetooth network system, central controller, Bluetooth gateway and deployment method
US20040081129A1 (en) Device, system, method and computer readable medium for selectively attaching to a cellular data service
CN109309766B (en) Addressing method and device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20120808

CF01 Termination of patent right due to non-payment of annual fee