Embodiment
For the purpose, technical scheme and the advantage that make the embodiment of the invention clearer; To combine the accompanying drawing in the embodiment of the invention below; Technical scheme in the embodiment of the invention is carried out clear, intactly description; Obviously, described embodiment is the present invention's part embodiment, rather than whole embodiment.Based on the embodiment among the present invention, the every other embodiment that those of ordinary skills are obtained under the prerequisite of not making creative work belongs to the scope that the present invention protects.
Fig. 1 is the flow chart of the method embodiment one of data bypass of the present invention, and as shown in Figure 1, the method for this data bypass can comprise:
Step 101, network equipment receives first request message that subscriber equipment sends, and this first request message carries the APN of sign pass-through service.
In the present embodiment, this first request message can be for activating packet data protocol (Packet DataProtocol; Hereinafter to be referred as: PDP) context request message.
Step 102, network equipment confirm that the Access Point Name in this first request message is called after the APN that identifies pass-through service, the APN of sign pass-through service are revised as the APN of sensing GGSN.
Particularly, network equipment can compare the APN of APN in first request message and pre-configured sign pass-through service; If the APN in this first request message is identical with the APN of pre-configured sign pass-through service, can confirm that then the Access Point Name in first request message is called the APN that identifies pass-through service.
In the present embodiment, network equipment this locality disposes the IP address corresponding with the APN that points to GGSN, the IP address that this IP address is this GGSN; According to the APN of above-mentioned sensing GGSN, network equipment can obtain the IP address of this GGSN.
In the present embodiment, like no specified otherwise, GGSN for IAD unite deployment GGSN or with the integrated GGSN of IAD, as shown in Figure 8, the GGSN 85 among Fig. 8 be with IAD unite deployment GGSN or with the integrated GGSN of IAD.Wherein, the GGSN that unites deployment with IAD comprises and the direct-connected GGSN of IAD, perhaps, and the GGSN that is connected through router or switch with IAD.
Step 103, network equipment sends second request message to GGSN, and this second request message carries the APN that points to GGSN, so that set up the tunnel between IAD and this GGSN; Further, also being convenient to this GGSN charges and/or Lawful intercept to pass-through service.
In the present embodiment, network equipment can be SGSN or IAD.When this network equipment is IAD; To GGSN send second request message can for: IAD sends to service universal grouping wireless business supporting node SGSN through the APN that first request message will point to GGSN; So that this SGSN sends second request message according to the APN that points to GGSN to GGSN.Wherein, according to the APN that points to GGSN, SGSN can obtain the IP address of this GGSN, and then SGSN can send second request message to this GGSN according to the IP address of this GGSN.
In the present embodiment, the tunnel between IAD and the GGSN can be a direct tunnel (Directtunnel), and promptly through this tunnel, IAD can directly send to GGSN with bypass flow, and bypass flow does not need to pass through SGSN again like this.
GGSN in the present embodiment can charge and/or Lawful intercept to pass-through service.Particularly, GGSN can add up the charge information of pass-through service, generates call detail record according to this charge information, and through charging gateway function body this call detail record is sent to charge system; And/or,
GGSN can receive the control information of intercepting of Lawful interception gateway transmission, and according to the communication information of intercepting control information listen for user equipment, and the communication information of this subscriber equipment that will listen to sends to above-mentioned Lawful interception gateway; Above-mentionedly intercept control information and comprise and monitor to activate, monitor and close or status poll.
In the present embodiment, above-mentioned second request message can be for creating the PDP Context request message.
In the foregoing description; IAD or SGSN confirm that the Access Point Name in first request message is called after the APN that identifies pass-through service; The APN of sign pass-through service is revised as the APN that points to GGSN; And send second request message to GGSN, to set up the tunnel between IAD and the GGSN; Wherein, this GGSN for IAD unite deployment GGSN or with the integrated GGSN of IAD.Thereby IAD can with bypass flow directly send to IAD unite deployment GGSN or with the integrated GGSN of IAD; By above-mentioned GGSN bypass flow is sent to home network or internet again, realized the function of IAD support data bypass; And the foregoing description has been realized pass-through service is chargeed and/or the function of Lawful intercept.
Fig. 2 is the flow chart of the method embodiment two of data bypass of the present invention, and present embodiment is a PDP context activating request message with first request message, and second request message is that example describes for creating the PDP Context request message.
As shown in Figure 2, the method for this data bypass can comprise:
Step 201 when UE has business to initiate, is sent PDP context activating request message to AG, and this PDP context activating request message is carried APN (the AccessPoint Name of sign pass-through service; Hereinafter to be referred as: APN) visit pass-through service.
Step 202, AG confirms after the APN of APN for the sign pass-through service in the PDP context activating request message APN that identifies pass-through service to be revised as the APN that points to GGSN, execution in step 203.
Particularly, AG can compare the APN of APN in the PDP context activating request message and pre-configured sign pass-through service; If the APN in this PDP context activating request message is identical with the APN of pre-configured sign pass-through service, can confirm that then the APN in the PDP context activating request message is the APN of sign pass-through service.
In the present embodiment, AG this locality disposes the IP address corresponding with the APN that points to GGSN, the IP address that this IP address is this GGSN.
In the present embodiment, like no specified otherwise, GGSN for AG unite deployment GGSN or with the integrated GGSN of AG, as shown in Figure 8, the GGSN 85 among Fig. 8 be with IAD unite deployment GGSN or with the integrated GGSN of IAD.Wherein, the GGSN that unites deployment with AG comprises the direct-connected GGSN with AG, perhaps, and the GGSN that is connected through router or switch with AG.
In addition; If it is not the APN of sign pass-through service that AG confirms the APN in the PDP context activating request message; Then AG can handle this PDP context activating request message according to normal flow; This PDP context activating request message is passed through SGSN, and carry out flow according to normal PDP context activation flow process.
Step 203, AG sends to SGSN with PDP context activating request message, and this PDP context activating request message is carried the APN that points to GGSN.
Step 204, SGSN carries out the user signing contract information inspection according to the APN in the PDP context activating request message; After the user signing contract information inspection of APN in this PDP context activating request message through SGSN, SGSN selects GGSN according to the APN in the PDP context activating request message, sends to the GGSN that selects then and creates the PDP Context request message.
In the present embodiment, user signing contract information comprises wildcard APN (wild card APN), can be through the user signing contract information inspection of SGSN so point to the APN of GGSN in the PDP context activating request message.In PDP context activating request message, point to after the user signing contract information inspection of APN of GGSN through SGSN; SGSN can be according to the APN that points to GGSN in the PDP context activating request message; Select with AG unite deployment GGSN or with the integrated GGSN of AG; And, send to the GGSN that selects according to the IP address that obtains then and create the PDP Context request message according to the IP address that the APN that points to GGSN obtains this GGSN.
Step 205, GGSN sends to SGSN and creates the PDP Context response message.
Step 206, optional, SGSN triggers and sets up RAB (Radio Access Bearer; Hereinafter to be referred as: process RAB).
Step 207, SGSN confirms to have opened direct tunnel (Direct tunnel) function, and SGSN sends to GGSN and upgrades the PDP Context request message, so that set up the tunnel between AG and the GGSN.In the present embodiment, the tunnel between AG and the GGSN is a direct tunnel (Direct tunnel), and promptly through this tunnel, AG can directly send to GGSN with bypass flow, and bypass flow does not need to pass through SGSN again like this.
Step 208, GGSN sends to SGSN and upgrades the PDP Context response message.
Step 209, SGSN sends PDP context activating to UE and accepts message.
At this moment, AP can send to AG with bypass flow, by AG this bypass flow is sent to GGSN again, by GGSN bypass flow is sent to home network or internet then.
In the foregoing description; AG confirms after the APN of APN for the sign pass-through service in the PDP context activating request message; The APN of sign pass-through service is revised as the APN that points to GGSN; And transmit PDP context activating request message to SGSN, setting up the tunnel between AG and the GGSN, this GGSN for IAD unite deployment GGSN or with the integrated GGSN of IAD.Thereby IAD can with bypass flow directly send to IAD unite deployment GGSN or with IAD integrated GGSN, by above-mentioned GGSN bypass flow is sent to home network or internet again, realized that AG supports the function of data bypass; And uniting the GGSN of deployment with IAD or can also realize pass-through service is chargeed and/or the function of Lawful intercept in the foregoing description further, with the integrated GGSN of IAD.
Fig. 3 is the flow chart of the method embodiment three of data bypass of the present invention, and present embodiment is a PDP context activating request message with first request message, and second request message is that example describes for creating the PDP Context request message.
As shown in Figure 3, the method for this data bypass can comprise:
Step 301 when UE has business to initiate, is sent PDP context activating request message to SGSN, and the APN that this PDP context activating request message is carried the sign pass-through service visits pass-through service.
Step 302, SGSN confirms the APN of sign pass-through service to be revised as the APN of sensing GGSN after the APN of APN for the sign pass-through service in the PDP context activating request message.
Particularly, SGSN can compare the APN of APN in the PDP context activating request message and pre-configured sign pass-through service; If the APN in this PDP context activating request message is identical with the APN of pre-configured sign pass-through service, can confirm that then the APN in the PDP context activating request message is the APN of sign pass-through service.
In the present embodiment, SGSN this locality disposes the IP address corresponding with the APN that points to GGSN, the IP address that this IP address is this GGSN.
In the present embodiment, like no specified otherwise, GGSN for AG unite deployment GGSN or with the integrated GGSN of AG, as shown in Figure 8, the GGSN 85 among Fig. 8 be with IAD unite deployment GGSN or with the integrated GGSN of IAD.Wherein, the GGSN that unites deployment with AG comprises the direct-connected GGSN with AG, perhaps, and the GGSN that is connected through router or switch with AG.
In addition; If it is not the APN of sign pass-through service that SGSN confirms the APN in the PDP context activating request message; Then SGSN can handle this PDP context activating request message according to normal flow; GGSN in core net sends and creates the PDP Context request message, and carries out flow according to normal PDP context activation flow process.
Step 303, SGSN carries out the user signing contract information inspection according to the APN in the PDP context activating request message; After the user signing contract information inspection of APN in this PDP context activating request message through SGSN, SGSN selects GGSN according to the APN in the PDP context activating request message, sends to the GGSN that selects then and creates the PDP Context request message.
In the present embodiment, user signing contract information comprises wild card APN, can be through the user signing contract information inspection of SGSN so point to the APN of GGSN in the PDP context activating request message.After the user signing contract information inspection of APN in PDP context activating request message through SGSN; SGSN can be according to the APN that points to GGSN in the PDP context activating request message; Select with AG unite deployment GGSN or with the integrated GGSN of AG; And, send to the GGSN that selects according to the IP address that obtains then and create the PDP Context request message according to the IP address that the APN that points to GGSN obtains this GGSN.
Step 304, GGSN sends to SGSN and creates the PDP Context response message.
Step 305, optional, SGSN triggers the process of setting up RAB.
Step 306, SGSN confirms to have opened the direct tunnel function, and SGSN sends to GGSN and upgrades the PDP Context request message, to set up the tunnel between AG and the GGSN.In the present embodiment, the tunnel between AG and the GGSN is a direct tunnel, and promptly through this tunnel, AG can directly send to GGSN with bypass flow, and bypass flow does not need to pass through SGSN again like this.
Step 307, GGSN sends to SGSN and upgrades the PDP Context response message.
Step 308, SGSN sends PDP context activating to UE and accepts message.
At this moment, AP can send to AG with bypass flow, by AG this bypass flow is sent to GGSN again, by GGSN bypass flow is sent to home network or internet then.
In the foregoing description; SGSN confirms after the APN of APN for the sign pass-through service in the PDP context activating request message; The APN of sign pass-through service is revised as the APN that points to GGSN; And send to create the PDP Context request message to GGSN, setting up the tunnel between AG and the GGSN, this GGSN for IAD unite deployment GGSN or with the integrated GGSN of IAD.Thereby IAD can with bypass flow directly send to IAD unite deployment GGSN or with IAD integrated GGSN, by above-mentioned GGSN bypass flow is sent to home network or internet again, realized that AG supports the function of data bypass; And uniting the GGSN of deployment with IAD or can also realize pass-through service is chargeed and/or the function of Lawful intercept in the foregoing description further, with the integrated GGSN of IAD.
Fig. 2 of the present invention and the AG that not only realized embodiment illustrated in fig. 3 support the function of data bypass; Further; Fig. 2 of the present invention and embodiment illustrated in fig. 3 in; Unite the GGSN of deployment with IAD or can also realize pass-through service is carried out Lawful intercept and pass-through service is chargeed, and can realize real time billing with the integrated GGSN of IAD.Particularly, GGSN can add up the charge information of pass-through service, generates call detail record (Calling Detail Records according to this charge information; Hereinafter to be referred as: CDR), GGSN sends to Charging Gateway Functionality (Charging Gateway Function with CDR then; Hereinafter to be referred as: CGF) entity sends to charge system by the CGF entity with this CDR again, thereby realizes pass-through service is chargeed.
In addition, GGSN can receive Lawful interception gateway (Lawful Interception Gateway; Hereinafter to be referred as: that LIG) sends intercepts control information, and intercepts the communication information that UE is intercepted in control information according to this, and the communication information of this UE that will listen to sends to LIG; Above-mentionedly intercept control information and comprise and monitor to activate, monitor and close or status poll; Thereby realized pass-through service is carried out Lawful intercept.
Fig. 4 is the flow chart of the method embodiment four of data bypass of the present invention, and as shown in Figure 4, the method for this data bypass can comprise:
Step 401 receives first request message that SGSN sends, and this first request message carries the APN of sign pass-through service; This first request message is that SGSN receives first request message that subscriber equipment sends, and confirms that Access Point Name in this first request message is called transmission after the APN that identify pass-through service.
Particularly, SGSN can compare the APN of APN in first request message and pre-configured sign pass-through service; If the APN in first request message is identical with the APN of pre-configured sign pass-through service, then SGSN can confirm that the Access Point Name in this first request message is called the APN that identifies pass-through service.Then, SGSN sends to IAD with this first request message.
In the present embodiment, first request message can be PDP context activating request message.
Step 402 is sent second request message to GGSN, and this second request message carries the APN of sign pass-through service.
In the present embodiment, like no specified otherwise, GGSN for IAD unite deployment GGSN or with the integrated GGSN of IAD, as shown in Figure 8.Wherein, the GGSN that unites deployment with IAD comprises and the direct-connected GGSN of IAD, perhaps, and the GGSN that is connected through router or switch with IAD.
Step 403, receive that GGSN sends with the second request message corresponding response message, this response message is sent to SGSN, so that set up the tunnel between IAD and the GGSN.
In the present embodiment; GGSN receives after second request message of IAD transmission; To send to this IAD with this second request message corresponding response message; This IAD can send to SGSN with the response message that receives then, so that set up the tunnel between IAD and the GGSN; Further, also being convenient to this GGSN charges and/or Lawful intercept to pass-through service.
In the present embodiment, the tunnel between IAD and the GGSN is a direct tunnel (Directtunnel), and promptly through this tunnel, IAD can directly send to GGSN with bypass flow, and bypass flow does not need to pass through SGSN again like this.
GGSN in the present embodiment can charge and/or Lawful intercept to pass-through service.Particularly, GGSN can add up the charge information of pass-through service, generates call detail record according to this charge information, and through charging gateway function body this call detail record is sent to charge system; And/or,
GGSN can receive the control information of intercepting of Lawful interception gateway transmission, and intercepts the communication information of control information listen for user equipment according to this, and the communication information of this subscriber equipment that will listen to sends to above-mentioned Lawful interception gateway; Above-mentionedly intercept control information and comprise and monitor to activate, monitor and close or status poll.
In the present embodiment, second request message can be for creating the PDP Context request message.
In the foregoing description, IAD receives after first request message of SGSN transmission, sends second request message to GGSN, to set up the tunnel between IAD and the GGSN; Wherein, first request message is that SGSN confirms that Access Point Name in first request message sends after being called the APN that identifies pass-through service, GGSN for IAD unite deployment GGSN or with the integrated GGSN of IAD.Thereby IAD can with bypass flow directly send to IAD unite deployment GGSN or with the integrated GGSN of IAD; By above-mentioned GGSN bypass flow is sent to home network or internet again, realized the function of IAD support data bypass; And the foregoing description has been realized pass-through service is chargeed and/or the function of Lawful intercept.
Fig. 5 is the flow chart of the method embodiment five of data bypass of the present invention, and present embodiment is a PDP context activating request message with first request message, and second request message is that example describes for creating the PDP Context request message.
As shown in Figure 5, the method for this data bypass can comprise:
Step 501 when UE has business to initiate, is sent PDP context activating request message to SGSN, and the APN that this PDP context activating request message is carried the sign pass-through service visits pass-through service.
Step 502, SGSN carries out the user signing contract information inspection according to the APN in the PDP context activating request message.
In the present embodiment, user signing contract information comprises wild card APN, so the APN in the PDP context activating request message can be through the user signing contract information inspection of SGSN.
Step 503, SGSN confirms after the APN of APN for the sign pass-through service in the PDP context activating request message, sends to AG and creates the PDP Context request message.
Particularly, SGSN can compare the APN of APN in the PDP context activating request message and pre-configured sign pass-through service; If the APN in this PDP context activating request message is identical with the APN of pre-configured sign pass-through service, can confirm that then the APN in the PDP context activating request message is the APN of sign pass-through service.After the APN of APN in confirming PDP context activating request message for the sign pass-through service, SGSN sends to AG and creates the PDP Context request message.
In the present embodiment, like no specified otherwise, GGSN for AG unite deployment GGSN or with the integrated GGSN of AG, as shown in Figure 8, the GGSN 85 among Fig. 8 be with IAD unite deployment GGSN or with the integrated GGSN of IAD.Wherein, the GGSN that unites deployment with AG comprises the direct-connected GGSN with AG, perhaps, and the GGSN that is connected through router or switch with AG.
In addition; If it is not the APN of sign pass-through service that SGSN confirms the APN in the PDP context activating request message; Then SGSN can handle this PDP context activating request message according to normal flow; GGSN in core net sends and creates the PDP Context request message, and carries out flow according to normal PDP context activation flow process.
Step 504, AG sends to GGSN and creates the PDP Context request message.
Step 505, GGSN sends to AG and creates the PDP Context response message.
Step 506, AG sends to SGSN and creates the PDP Context response message.
Step 507, optional, SGSN triggers the process of setting up RAB.
Step 508, the direct tunnel function has been opened in the SGSN judgement, and SGSN sends to AG and upgrades the PDP Context request message, so that set up the tunnel between AG and the GGSN.In the present embodiment, the tunnel between AG and the GGSN is a direct tunnel, and promptly through this tunnel, AG can directly send to GGSN with bypass flow, and bypass flow does not need to pass through SGSN again like this.
Step 509, AG sends to GGSN and upgrades the PDP Context request message.
Step 510, GGSN sends to AG and upgrades the PDP Context response message.
Step 511, AG sends to SGSN and upgrades the PDP Context response message.
Step 512, SGSN sends PDP context activating to UE and accepts message.
At this moment, AP can send to AG with bypass flow, by AG this bypass flow is sent to GGSN again, by GGSN bypass flow is sent to home network or internet then.
In the foregoing description; After the APN of APN in the PDP context activating request message that SGSN confirms to receive for the sign pass-through service, send establishment PDP Context request message to AG, AG sends to GGSN and creates the PDP Context request message then; So that set up the tunnel between AG and the GGSN; Wherein, GGSN for AG unite deployment GGSN or with the integrated GGSN of AG, thereby IAD can with bypass flow directly send to IAD unite deployment GGSN or with the integrated GGSN of IAD; By above-mentioned GGSN bypass flow is sent to home network or internet again, realized the function of IAD support data bypass; And further; Uniting the GGSN of deployment with IAD or can also realize pass-through service is chargeed and/or the function of Lawful intercept in the foregoing description with the integrated GGSN of IAD; Wherein, This GGSN charges to pass-through service and/or the operation of Lawful intercept, with Fig. 2 of the present invention and embodiment illustrated in fig. 3 in GGSN pass-through service is chargeed and/or the operation of Lawful intercept identical, repeat no more at this.
One of ordinary skill in the art will appreciate that: all or part of step that realizes said method embodiment can be accomplished through the relevant hardware of program command; Aforesaid program can be stored in the computer read/write memory medium; This program the step that comprises said method embodiment when carrying out; And aforesaid storage medium comprises: various media that can be program code stored such as ROM, RAM, magnetic disc or CD.
Fig. 6 is the structural representation of network equipment embodiment one of the present invention; Network equipment in the present embodiment can be realized the flow process that the present invention is embodiment illustrated in fig. 1; As shown in Figure 6, this network equipment can comprise: receiver module 61, determination module 62, modified module 63 and sending module 64.
Wherein, receiver module 61 is used to receive first request message that subscriber equipment sends, and this first request message carries the APN of sign pass-through service.
Determination module 62, the Access Point Name that is used for first request message of definite receiver module 61 receptions is called the APN that identifies pass-through service; Particularly, determination module 62 can compare the APN of APN in first request message and pre-configured sign pass-through service; If the APN in this first request message is identical with the APN of pre-configured sign pass-through service, can confirm that then the Access Point Name in first request message is called the APN that identifies pass-through service.
Modified module 63 is used for after determination module 62 confirms that the Access Point Name of first request message that receiver module 61 receives is called the APN that identifies pass-through service, the APN of sign pass-through service being revised as the APN of sensing GGSN; In the present embodiment, network equipment this locality disposes the IP address corresponding with the APN that points to GGSN, the IP address that this IP address is this GGSN; According to the APN of above-mentioned sensing GGSN, network equipment can obtain the IP address of this GGSN.
In the present embodiment; As there is not a specified otherwise; GGSN can for IAD unite deployment GGSN or with the integrated GGSN of IAD, as shown in Figure 8, the GGSN 85 among Fig. 8 be with IAD unite deployment GGSN or with the integrated GGSN of IAD.Wherein, the GGSN that unites deployment with IAD comprises and the direct-connected GGSN of IAD, perhaps, and the GGSN that is connected through router or switch with IAD.
Sending module 64 is used for sending second request message to above-mentioned GGSN, and this second request message carries the APN that points to GGSN, so that set up the tunnel between IAD and the above-mentioned GGSN; Further, also being convenient to this GGSN charges and/or Lawful intercept to pass-through service.
Network equipment in the present embodiment can be SGSN or IAD; When the network equipment is IAD; Sending module 64 can send to SGSN through the APN that first request message will point to GGSN; So that this SGSN sends second request message according to the APN that points to GGSN to above-mentioned GGSN.Wherein, according to the APN that points to GGSN, sending module 64 can obtain the IP address of this GGSN, and then sending module 64 can send second request message to this GGSN according to the IP address of this GGSN.
In the present embodiment, the tunnel between IAD and the GGSN is a direct tunnel (Directtunnel), and promptly through this tunnel, IAD can directly send to GGSN with bypass flow, and bypass flow does not need to pass through SGSN again like this.
In the foregoing description; Determination module 62 confirms that the Access Point Name in first request message is called after the APN that identifies pass-through service; The APN that modified module 63 will identify pass-through service is revised as the APN that points to GGSN, and sends second request message by sending module 64 to GGSN, to set up the tunnel between IAD and the GGSN; Wherein, this GGSN for IAD unite deployment GGSN or with the integrated GGSN of IAD.Thereby IAD can with bypass flow directly send to IAD unite deployment GGSN or with the integrated GGSN of IAD; By above-mentioned GGSN bypass flow is sent to home network or internet again, realized the function of IAD support data bypass; And the foregoing description has been realized pass-through service is chargeed and/or the function of Lawful intercept.
Fig. 7 is the structural representation of IAD embodiment one of the present invention, and the IAD in the present embodiment can be realized the flow process that the present invention is embodiment illustrated in fig. 4, and is as shown in Figure 7, and this IAD can comprise: message sink module 71 and message transmission module 72.
Wherein, message sink module 71 is used to receive first request message that SGSN sends, and this first request message carries the APN of sign pass-through service; This first request message is that SGSN receives first request message that subscriber equipment sends, and confirms that Access Point Name in this first request message is called transmission after the APN that identify pass-through service;
Message transmission module 72 is used for sending second request message to GGSN, and this second request message carries the APN of sign pass-through service.In the present embodiment, like no specified otherwise, GGSN for IAD unite deployment GGSN or with the integrated GGSN of IAD, as shown in Figure 8, the GGSN 85 among Fig. 8 be with IAD unite deployment GGSN or with the integrated GGSN of IAD.Wherein, the GGSN that unites deployment with IAD comprises and the direct-connected GGSN of IAD, perhaps, and the GGSN that is connected through router or switch with IAD.
In the present embodiment, message sink module 71 is used to also to receive that GGSN sends and the second request message corresponding response message;
Message transmission module 72 also is used for above-mentioned response message is sent to SGSN, so that set up the tunnel between IAD and the above-mentioned GGSN; Further, also being convenient to this GGSN charges and/or Lawful intercept to pass-through service.
In the present embodiment, the tunnel between IAD and the GGSN is a direct tunnel (Directtunnel), and promptly through this tunnel, IAD can directly send to GGSN with bypass flow, and bypass flow does not need to pass through SGSN again like this.
In the foregoing description, message sink module 71 receives after first request message of SGSN transmission, and message transmission module 72 is sent second request message to GGSN, to set up the tunnel between IAD and the GGSN; Wherein, first request message is that SGSN confirms that Access Point Name in first request message sends after being called the APN that identifies pass-through service, GGSN for IAD unite deployment GGSN or with the integrated GGSN of IAD.Thereby IAD can with bypass flow directly send to IAD unite deployment GGSN or with the integrated GGSN of IAD; By above-mentioned GGSN bypass flow is sent to home network or internet again, realized the function of IAD support data bypass; And the foregoing description has been realized pass-through service is chargeed and/or the function of Lawful intercept.
Fig. 8 is the sketch map of the system embodiment one of data bypass of the present invention, and as shown in Figure 8, the system of this data bypass can comprise: UE 81, AP 82, AG 83, SGSN 84, a GGSN 85 and the 2nd GGSN 86.
Wherein, a GGSN 85 for AG 83 unite deployment GGSN or with the integrated GGSN of AG 83; Wherein, the GGSN that unites deployment with IAD comprises and the direct-connected GGSN of IAD, perhaps, and the GGSN that is connected through router or switch with IAD; The 2nd GGSN 86 is the GGSN in the core net.
In the present embodiment, UE 81, AP 82, AG 83, SGSN 84, a GGSN 85 and the 2nd GGSN 86 can adopt Fig. 2 of the present invention, Fig. 3 or flow process embodiment illustrated in fig. 5 to carry out alternately.Wherein, AG 83 can realize through the present invention network equipment or the present invention's IAD shown in Figure 7 shown in Figure 6; SGSN 84 can realize through the present invention's network equipment shown in Figure 6.
Need to prove that Fig. 1 of the present invention~content embodiment illustrated in fig. 5 also can be used as replenishing of Fig. 6 of the present invention, Fig. 7 and content embodiment illustrated in fig. 8.
It will be appreciated by those skilled in the art that accompanying drawing is the sketch map of a preferred embodiment, module in the accompanying drawing or flow process might not be that embodiment of the present invention is necessary.
It will be appreciated by those skilled in the art that the module in the device among the embodiment can be distributed in the device of embodiment according to the embodiment description, also can carry out respective change and be arranged in the one or more devices that are different from present embodiment.The module of the foregoing description can be merged into a module, also can further split into a plurality of submodules.
What should explain at last is: above embodiment is only in order to explaining technical scheme of the present invention, but not to its restriction; Although with reference to previous embodiment the present invention has been carried out detailed explanation, those of ordinary skill in the art is to be understood that: it still can be made amendment to the technical scheme that aforementioned each embodiment put down in writing, and perhaps part technical characterictic wherein is equal to replacement; And these are revised or replacement, do not make the spirit and the scope of the essence disengaging various embodiments of the present invention technical scheme of relevant art scheme.