Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Usage monitoring method supporting traffic detection function and usage monitoring system

A flow detection function and usage monitoring technology, applied in the transmission system, digital transmission system, telephone communication, etc., can solve the problem that the IP-CAN level usage monitoring function cannot be accurately performed, TDF cannot detect the flow information application or data flow, and monitor Control and other issues

Active Publication Date: 2012-08-01
ZTE CORP
View PDF2 Cites 45 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0018] When TDF is deployed independently, TDF may also fail to report the service data flow template corresponding to the detected application. At this time, PCRF cannot deliver the PCC rule containing the service data flow template to PCEF, so that the usage monitoring and control for this application cannot be realized.
[0019] When the existing usage monitoring control is aimed at the entire IP-CAN session, if an independent TDF is deployed, because there may be applications or data flows in the IP-CAN session that TDF cannot detect and report flow information, TDF will combine the measurement provided by PCRF And the local policy implements corresponding gating or bandwidth limitation for this type of application or data flow (that is, when the bandwidth exceeds the limit, packet loss is performed). For this type of data flow, PCEF's IP-CAN level (level) usage monitoring process The usage statistics have been done in , but they are actually blocked or redirected after passing through TDF. This part should not be included in the actual usage
This will lead to the inconsistency between the cumulative usage of PCEF and the final usage of the user
[0020] Therefore, based on the above, based on the existing technology, for the PCEF enhanced TDF or independent TDF architecture, when the PCRF cannot obtain the service data flow template, it is impossible to monitor and control the usage of this type of service data flow level
For the independent TDF architecture, when the IP-CAN-level usage monitoring function is implemented, there is a problem that the reported usage is inconsistent with the actual usage, and the IP-CAN-level usage monitoring function cannot be accurately implemented

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Usage monitoring method supporting traffic detection function and usage monitoring system
  • Usage monitoring method supporting traffic detection function and usage monitoring system
  • Usage monitoring method supporting traffic detection function and usage monitoring system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0081] Embodiment 1: The PCEF integrates the TDF function, and the TDF adopts a report request mode.

[0082] figure 2 It is a flow chart of the usage monitoring method of Embodiment 1 of the present invention, such as figure 2 As shown, the process includes the following steps:

[0083] Step 201, in the process of the UE requesting to establish an IP-CAN session, the gateway where the PCEF is located receives the IP-CAN session establishment request message, and carries the user identifier and the PDN network requested for access in the IP-CAN session establishment request message The PDN identifier.

[0084] In step 202, the PCEF sends an IP-CAN session establishment instruction message to the PCRF, and the IP-CAN session establishment instruction message carries the user identifier, the PDN identifier and the IP address (IPAddress) allocated to the UE.

[0085] In step 203, the PCRF judges that there is no subscription information of the user according to the user iden...

Embodiment 2

[0098] Embodiment 2: The TDF is independently deployed, and the TDF adopts a report request mode.

[0099] image 3 It is a flow chart of the dosage monitoring method of Embodiment 2 of the present invention, such as image 3 As shown, the process includes the following steps:

[0100] Step 301, in the process of the UE requesting to establish an IP-CAN session, the gateway where the PCEF is located receives the IP-CAN session establishment request message, and carries the user identification and the PDN network requested for access in the IP-CAN session establishment request message The PDN identifier.

[0101] In step 302, the PCEF sends an IP-CAN session establishment indication message to the PCRF, and the IP-CAN session establishment indication message carries a user identifier, a PDN identifier, and an IP address (IPAddress) allocated to the UE.

[0102] Step 303 , the PCRF judges that there is no subscription information of the user according to the user identifier, ...

Embodiment 3

[0116] Embodiment 3: The PCEF integrates the TDF function, and the TDF adopts an unsolicited reporting mode.

[0117] Figure 4 It is a flow chart of the usage monitoring method of the embodiment of the present invention, such as Figure 4 As shown, the process includes the following steps:

[0118] Step 401, in the process of the UE requesting to establish an IP-CAN session, the gateway where the PCEF is located receives the IP-CAN session establishment request message, and carries the user identifier and the PDN network requested for access in the IP-CAN session establishment request message The PDN identifier.

[0119] In step 402, the PCEF sends an IP-CAN session establishment instruction message to the PCRF, and the IP-CAN session establishment instruction message carries the user identifier, the PDN identifier and the IP address (IPAddress) assigned to the UE.

[0120] Step 403 , the PCRF judges that there is no subscription information of the user according to the us...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses two schemes of a usage monitoring method supporting a traffic detection function (TDF) and a usage monitoring system. According to one scheme, the method comprises the following steps that: a policy and charging rules function (PCRF) entity issues a usage monitoring strategy corresponding to application to a policy and control enforcement function (PCEF) entity of a traffic detection function (TDF), a PCEF entity and an independent TDF, or an independent TDF; and the PCEF entity of the integrated TDF, the PCEF entity and the independent TDF, or the independent TDF executes / execute usage monitoring according to the usage monitoring strategy. Besides, a usage monitoring unit in the system is used for enabling the PCEF, the PCEF of the integrated TDF and the independent TDF to execute the usage monitoring according to the usage monitoring strategy. According to the method and the system in the invention, usage monitoring control at a level that a PCRF can not obtain the service data flow of a service data flow template and usage detection control at an IP connectivity access network (IP-CAN) level under a TDF architecture can be realized.

Description

technical field [0001] The present invention relates to the technical field of mobile communication strategy and billing control, in particular to a usage monitoring method and system supporting Traffic Detection Function (TDF, Traffic Detection Function). Background technique [0002] Since the 3rd Generation Partnership Project Phase 7 (3GPP Release7) standard system, policy and charging functions are implemented by a policy and charging control (PCC, Policy and Charging Control) framework. The PCC architecture is a functional framework that can be applied to multiple access technologies. For example, the PCC architecture can be applied to the Terrestrial Radio Access Network (UTRAN, UMTS Terrestrial Radio Access Network) of the Universal Mobile Telecommunications System (UMTS, Universal Mobile Telecommunications System). ), Global System for Mobile Communication (GSM, Global system for Mobile Communication) / GSM Data Enhanced Evolution (EDGE) Wireless Access Network, Inter...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04W4/24H04W24/00
CPCH04L43/028H04L12/1407H04W4/24H04M15/66H04L41/5029
Inventor 吴锦花周晓云宗在峰孙默李华光
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products