Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and system of data routing

A data routing and data row technology, applied in the field of data routing methods and systems, can solve problems such as packet discarding and failure to identify fixed network private IP addresses

Inactive Publication Date: 2012-09-26
ZTE CORP
View PDF3 Cites 24 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0028] However, if Figure 4 As shown, in the RG routing mode, there are mainly the following problems in the prior art: Taking the EAP message between the RG and X-MAG as an example, after each network element obtains the necessary information through the control message, when there is downlink data passing through When X-MAG forwards to BNG / BRAS, because the destination IP of the data message is the IP allocated by the mobile network, and BNG / BRAS cannot recognize the private IP address outside the fixed network, it will discard the message

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system of data routing
  • Method and system of data routing
  • Method and system of data routing

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0077] In this process, when the RG is in the routing mode, taking the GRE tunnel as an example, the RG and X-MAG communicate the dynamic negotiation information of the GRE tunnel through the EAP authentication message exchange, including: GRE Key, and trigger the X-MAG to send the mobile core The network element initiates the PMIP / GTP tunnel establishment process. The GRE tunnel is just one of the tunnel types, and it can also be applied to other types of dynamic negotiation of Layer 3 tunnels that require the cooperation of control signaling.

[0078] Such as Figure 5 As shown, this process specifically includes:

[0079]Step 501: PPP negotiation and authentication process between RG and BNG / BRAS; and optionally, DHCP negotiation process between UE and RG. During DHCP negotiation, RG assigns an IP address to UE, usually a private network IP. The BNG / BRAS may initiate the establishment of a fixed network policy session with the Broadband Policy Control Function (BPCF).

...

Embodiment 2

[0103] The difference between this process and the first embodiment is that the RG and X-MAG use DHCP messages or PMIP messages to transmit tunnel negotiation information, and at the same time trigger X-MAG to initiate a PMIP tunnel establishment process to mobile core network elements.

[0104] Such as Figure 6 As shown, the process of this embodiment mainly includes:

[0105] Step 601: UE, RG and BNG / BRAS perform fixed network IP address allocation process interaction; if the UE is a mobile terminal, then the UE and RG complete the PPP LCP negotiation and EAP authentication process.

[0106] Step 602: After completing the EAP authentication, the UE sends a PPP IPCP request message to the RG.

[0107] Step 603: After the RG receives the PPP IPCP request message, if the UE is a mobile terminal user, it constructs a DHCP discovery or PBU message locally and sends it to the X-MAG. The message needs to be extended to carry downlink GRE Key information.

[0108] Among them, the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method and a system for data routing. When a piece of user equipment (UE) is accessed into a mobile core network through a dependable fixed network, the method comprises: sending a tunnel establishment request to a mobile access gateway through a routing gateway (RG) and carrying the downlink information of tunnel negotiation after the UE is accessed into the RG; replying a response of tunnel establishment and carrying the uplink information of tunnel negotiation after the tunnel establishment request is received by the mobile access gateway; finishing the tunnel establishment with the mobile access gateway through a dynamic negotiation after the response of the tunnel establishment is received by the RG; and packaging and forwarding the data message of the UE via the tunnel established between the RG and the mobile access gateway, when a business is accessed through the mobile core network by the UE. According to the method and the system of the invention, the establishment of the tunnel and the adoption of packaging the data message by the tunnel help to prevent the data message from being discarded by a broadband network gateway / broadband remote access server (BNG / BRAS).

Description

technical field [0001] The invention relates to the technical field of mobile communication, in particular to a data routing method and system. Background technique [0002] The Evolved Packet System (EPS) of the 3rd Generation Partnership Project (referred to as 3GPP) mainly consists of the Evolved Universal Terrestrial Radio Access Network (referred to as E-UTRAN), Mobility Management Entity (MME for short), Serving Gateway (S-GW for short), Packet Data Network Gateway (P-GW for short) and home users Server (Home Subscriber Server, HSS for short). [0003] EPS supports intercommunication with non-3GPP systems, wherein intercommunication with non-3GPP systems is realized through S2a / b / c interfaces, and P-GW serves as the anchor point between 3GPP and non-3GPP systems. In the EPS system architecture diagram, non-3GPP system access is divided into untrusted non-3GPP access and trusted non-3GPP access. Among them, the untrusted non-3GPP access needs to be connected to the P...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W40/02H04W40/24
CPCH04W76/022H04L65/1003H04L29/06272H04L65/1043H04L29/0619H04W76/12
Inventor 刘国燕毕以峰宗在峰周晓云霍玉臻
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products