Method for performing strategy identification and control by using user service identification (USID)

A user service and identification technology, applied in the field of mobile communication, can solve the problems of consumption, consumption of resources, multi-computing and storage resources, etc., and achieve the effect of saving computing resources, reducing workload, and network intelligence

Inactive Publication Date: 2013-08-14
BEIJING UNIV OF POSTS & TELECOMM
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0011] High-cost QoS implementation: Since all network elements must participate in negotiation and authorization, each network element must maintain and store entries in the USID mapping table, and the number of entries will increase with the number of data flows it supports. Larger and larger, it will consume a lot of computing and storage resources
[0012] The root of the above problem is that the existing QoS information can only depend on the establishment of the bearer, and is bound to the identification number of the bearer
Moreover, for each one-time QoS bearer, resources (such as time, storage space or computing resources) are consumed in the whole process from establishment, maintenance to deletion between the user terminal and each network element in the existing technology

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for performing strategy identification and control by using user service identification (USID)
  • Method for performing strategy identification and control by using user service identification (USID)
  • Method for performing strategy identification and control by using user service identification (USID)

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments.

[0041] As an all-IP system, EPS adopts IP protocol in all network elements. Compared with the traditional IPv4, IPv6 has many advantages, including rich address resources, enhanced mobile functions and extended QoS features. For all network elements in the EPS, it is very simple to set the USID in IPv6; and it will solve the crosslayer (crosslayer) problem in the existing EPS system. QoS and billing information are collected at the IP layer, rather than at the GPRS tunnel protocol layer, radio bearer control layer and mobile IP layer.

[0042] The method of the present invention using USID to implement policy identification and control in EPS is to replace the bearer identification with the flow label field in the IPv6 data packet header, that is,...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method for performing strategy identification and control by using user service identification (USID) in an evolved packet system. In the method, a loading identifier is replaced by a flow label in an IPv6 data packet head, namely the flow label is used as the USID for identifying the quality of service (QoS) grade set quintuple and a charging rule of each data stream in the EPS; a corresponding USID for identifying the security grade of the data stream QoS is generated by searching a self-reconfigured policy and charging control (PCC) rule and a USID mapping table after a policy and charging rule function (PCRF) of each network element judges that a request object obtains a PCC rule including a certain QoS grade set and charging; because each network element in the system abides by an internet protocol (IP) and can identify the USID, and uplink and downlink network elements of each data stream are preconfigured with the PCC rule and the USID mapping table, QoS consultation and authentication can be executed simply and intelligently, the QoS is provided conveniently and flexibly, and a transmission strategy and a charging control can be executed at the same time. The method for performing strategy identification and control by using the USID enhances the function of network memorizing QoS information, enables the network to be more intelligent and has relatively great advantages in the aspects of improving the network efficiency, reducing the network load and the like.

Description

technical field [0001] The invention relates to a method for implementing policy identification and control using a User Service Identification (USID) in an EPS (Evolved Packet System), and belongs to the technical field of mobile communication. Background technique [0002] The EPS network is a model for future mobile network development specified by 3GPP, and consists of an access network and a core network EPC. Among them, the access network includes user terminal UE and evolved packet base station eNodeB, EPC includes mobility management entity MME in negotiation phase, serving gateway SGW in transmission phase and gateway PDN-GW in packet data network. Except for MME, other network elements are closely related to the implementation of QoS mechanism. [0003] In EPS, many important applications require QoS to provide support, such as audio telephony, video conferencing, and high-definition television. These applications drive many research institutions to explore relat...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04W4/24H04W28/16H04W28/24
Inventor 黄小红马严杨葳罗莎胡林孙琼
Owner BEIJING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products