A gateway selection method, implementation device and system
A gateway and local gateway technology, applied in the transmission system, network topology, electrical components, etc., can solve the problem that the gateway selection based on user location cannot be realized
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0071] The scenario of this embodiment is that the WLAN is connected to the EPC network through the ePDG as an untrusted 3GPP, and the S2b interface is used between the ePDG and the P-GW. The specific process of this embodiment is as figure 2 Shown:
[0072]Step 201, when a user terminal accesses through a WLAN which is an untrusted 3GPP access network, it needs to perform access authorization and authentication with the AAA Server of the core network. The role of AAAproxy is to forward the authorization authentication message to the AAA Server. After the access authorization and authentication process, the user is allowed to access the core network through the WLAN.
[0073] Step 202, the user terminal monitors the routing area identity (Routing Area Identity, RAI) or location area identity (Tracking Area Identity, TAI) in the broadcast message of the 3GPP UTRAN or E-UTRAN network covering the same coverage as the WLAN access network.
[0074] In step 203, the user termin...
Embodiment 2
[0089] The scenario of this embodiment is that the WLAN is accessed as an untrusted 3GPP, accesses the EPC network through the ePDG, and uses the S2c interface between the user terminal and the P-GW. The specific process of this embodiment is as image 3 Shown:
[0090] Step 301 , when a user terminal accesses through a WLAN that is an untrusted 3GPP access network, it needs to perform access authorization and authentication with the AAA Server of the core network. The role of AAAproxy is to forward the authorization authentication message to the AAA Server. After the access authorization and authentication process, the user is allowed to access the core network through the WLAN.
[0091] Step 302, the user terminal listens to the RAI or TAI in the broadcast message of the 3GPP UTRAN or E-UTRAN network covering the same coverage as the WLAN access network.
[0092] Step 303, the UE constructs the FQDN for ePDG selection and / or the FQDN for P-GW selection according to the re...
Embodiment 3
[0105] The scenario of this embodiment is that the WLAN is accessed as a trusted 3GPP, and the S2c interface is used between the user terminal and the P-GW. The specific process of this embodiment is as Figure 4 Shown:
[0106] Step 401 , when a user terminal accesses through a WLAN that is an untrusted 3GPP access network, it needs to perform access authorization and authentication with the AAA Server of the core network. The role of the AAA proxy is to forward the authorization authentication message to the AAA Server. After the access authorization and authentication process, the user is allowed to access the core network through the WLAN.
[0107] Step 402, the user terminal listens to the RAI or TAI in the broadcast message of the 3GPP UTRAN or E-UTRAN network covering the same coverage as the WLAN access network.
[0108] Step 403, the user terminal constructs the FQDN used for P-GW selection according to the received RAI or TAI.
[0109] Step 404, the user terminal...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


