Method and system for home network to obtain network element information in visited network
A technology of visited network and home network, which is applied in the home network to obtain network element information in the visited network. It can solve problems such as unresolved, unable to find BPCF, unable to find V-PCRF, etc., to expand service access capabilities and improve business Experience and realize the effect of low cost
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0046] image 3 It is the attach flow chart when the UE accesses 3GPP through the DSMIPv6 protocol, such as image 3 As shown, using the technical solution in this example, the H-PCRF obtains the network identifier of the visited network where the ePDG is located, so it can smoothly realize the interaction with the V-PCRF, so as to realize the relevant admission control; specifically, the following steps are included:
[0047] In step S301, after the UE accesses the BBF access system, the BBF access system allocates a local IP address for the UE. The UE initiates an Internet Key Exchange Protocol (IKEv2, Internet Key Exchange) tunnel establishment process, and uses an Extensible Authentication Protocol (EAP, Extensible Authentication Protocol) for authentication. Due to the roaming scenario, the ePDG interacts with the AAA Server through the AAA Proxy (or, the AAA Server further interacts with the HSS) to complete EAP authentication. During the EAP authentication process, th...
Embodiment 2
[0061] Figure 4 It is a handover flow chart when UE accesses 3GPP through DSMIPv6 protocol, such as Figure 4 As shown, using the technical solution in this example, the H-PCRF obtains the network identifier of the visited network where the ePDG is located, so it can smoothly realize the interaction with the V-PCRF, so as to realize the relevant admission control; specifically, the following steps are included:
[0062] Step S401, the UE accesses the 3GPP core network through the E-UTRAN, and establishes a PDN connection;
[0063] Step S402, after discovering the BBF, the UE decides to initiate a handover;
[0064] Step S403, after the UE accesses the BBF access system, the BBF access system allocates a local IP address for the UE. The UE initiates the IKEv2 tunnel establishment process and uses EAP for authentication. Due to the roaming scenario, the ePDG interacts with the AAA Server through the AAA Proxy (the AAA Server further interacts with the HSS) to complete EAP au...
Embodiment 3
[0082] Figure 5 It is the attach flow chart when UE accesses 3GPP through PMIPv6 protocol, such as Figure 5 As shown, using the technical solution in this example, the H-PCRF obtains the network identifier of the visited network where the ePDG is located, so it can smoothly realize the interaction with the V-PCRF, so as to realize the relevant admission control; the specific process steps are as follows:
[0083] In step S501, after the UE accesses the BBF access system, the BBF access system allocates a local IP address for the UE. The UE initiates the IKEv2 tunnel establishment process and uses EAP for authentication. Due to the roaming scenario, the ePDG interacts with the AAA Server through the AAA Proxy (the AAA Server further interacts with the HSS) to complete EAP authentication. In this process, the ePDG sends the network identifier VPLMN ID of the visited network it is located to the AAA Server through the AAA Proxy, and the AAA Server saves the VPLMN ID and / or fu...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 