Monitoring system, apparatus and method in IP network

A technology of network equipment and IP network, which is applied in the field of communication, can solve problems such as the impact of existing functions of network elements, and achieve the effects of improving networking flexibility, having mobility, and reducing transformation and impact

Inactive Publication Date: 2008-05-14
HUAWEI TECH CO LTD
View PDF0 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0025] In the prior art, in order to realize monitoring, it is necessary to develop software parts supporting the monitoring function for Radius Sever, network equipment (such as Router, PDSN) and other equipment, so as to interact with LIG to realize monitoring, but the monitoring function is integrated into the existing Radius In Sever, Router, and PDSN, the existing functions of these network elements will be affected

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Monitoring system, apparatus and method in IP network
  • Monitoring system, apparatus and method in IP network
  • Monitoring system, apparatus and method in IP network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0060] In conjunction with the foregoing embodiments, the first embodiment of the present invention provides a monitoring system in an IP network. In this embodiment, the network device is a router. With reference to FIGS. 3 and 4 , the specific working process of the monitoring system is as follows:

[0061] The Radius server receives the user's authentication and accounting request message forwarded by the router, and performs authentication and accounting for the user;

[0062] The LIG sends a monitoring command to the filtering rule processing module of Analysis TAP, and the monitoring command carries information related to setting monitoring filtering rules;

[0063] The filtering rule processing module receives the monitoring command issued by the LIG, and sets the monitoring filtering rule according to the relevant information of the setting monitoring filtering rule carried by the monitoring command, wherein the monitoring command issued by the LIG includes the filterin...

Embodiment 2

[0073] In combination with the above-mentioned embodiments, the second embodiment of the present invention provides another monitoring system in an IP network. The difference from the first embodiment is that the monitoring system of this embodiment further includes: a message analysis unit Radius TAP, the monitoring system The specific working process is as follows:

[0074] The Radius server receives the user's authentication and charging request message forwarded by the network device router, and performs authentication and charging for the user;

[0075] Radius TAP, intercepting the Radius message that the router and the Radius server interacts and analyzing, determining the monitoring target and obtaining the address information of the monitoring target, specifically, the Radius message includes: the authentication request message sent by the user equipment to the Radius server and the Radius server sending The authentication response message returned by the user;

[007...

Embodiment 3

[0086] At the same time, the third embodiment of the present invention also provides a method for realizing monitoring in an IP network, and the specific process is as shown in Figure 5:

[0087] Step 1. The user equipment UE initiates a login, and sends a request message Radius Access Request to the router Router requesting to log in to the remote dial-in user authentication server;

[0088] Step 2, the router receives the request message, and sends an authentication request message to the Radius server;

[0089] Step 3, the analysis unit Radius TAP intercepts the authentication request message, and through analysis, it is known that the user information carried in the message is consistent with the monitoring target user information pre-configured in the Radius TAP, then it is determined that the user equipment is the monitoring target, And send an authentication request IRI message Access Request IRI to the legal interception gateway LIG;

[0090] Specifically, the user in...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention discloses a sniffer system, an audiomonitor and a monitoring method in an IP network so as to reduce the transform and influence caused to the prior network element. The system of the embodiment of the invention comprises the processes that: an analysis unit Analysis TAP is used for intercepting the data message that the user equipment receives or sends through a network equipment; the monitoring filtration rule is set according to the monitoring command that the legal monitoring gateway LIG sends down and the data message is resolved and filtered according to the filtration rule, and the data message after being filtered is reported to the LIG; the network equipment is wherein a packet access node which accesses the user equipment and the LIG is used for sending down the monitoring command to the Analysis TAP. The related information for setting the monitoring filtration rule is carried in the monitoring command and the data message that the Analysis TAP reports is forwarded to a monitoring center MC so as to implement the monitoring.

Description

technical field [0001] The invention relates to the communication field, in particular to a monitoring system, device and method in an IP network. Background technique [0002] Lawful Interception (LI, Lawful Interception) means that the Law Enforcement Agency (LEA, Law Enforcement Agency) is approved by the corresponding authorizing authority (Authorizing Authority), according to the relevant national laws and public communication network industry norms on the Public Telecommunications Network (PTN, Public Telecommunications Network) Law enforcement acts of monitoring communication services. [0003] The lawful interception system of data communication in the existing IP network is as shown in Figure 1, and the interception system comprises lawful interception gateway (LIG, Lawful Interception Gateway), monitoring center (MC, Monitoring Center), Radius server, network equipment, wherein, network equipment can It is a router, a packet data service node (PDSN, Packet Data Se...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/26H04L12/56H04L29/06G06F17/30
Inventor 金黄哲
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products