A method, system and device for realizing detachment based on lisp
A de-attachment and device technology, applied in the network field, can solve the problem of blocking blacklist user flow and reducing overhead.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0051] Such as image 3 shown, including the following steps:
[0052] Step 1, the MS learns that the user is blacklisted;
[0053] Specifically, after detecting that the user is blacklisted, the network element (network element other than the UE) on the network side notifies the MS that the user is blacklisted. How the network side detects that the user is a blacklisted user is beyond the scope of this article.
[0054] In step 2, the MS deletes the mapping between the user's EID and RLOC (or the binding between EID and RLOC);
[0055] Step 3, the MS actively sends a detachment request to the device with the tunnel router function, notifying the user that it is no longer attached to the network;
[0056] The device with tunnel router function can be ETR and ITR, or lisp-MN.
[0057] Step 4: After receiving the detachment request, the device with the tunnel router function blocks the flow sent to the user and / or the flow sent by the user.
[0058] Preferably, the device w...
Embodiment 2
[0061] This embodiment is based on figure 1 The basic protocol of described lisp realizes the method of embodiment 1, such as Figure 4 As shown, it mainly includes the following steps:
[0062] Step 401: The MS learns that a certain user is a blacklisted user, and deletes the mapping between the user's EID and RLOC;
[0063] Step 402: MS sends a Map-Unregister Request (de-registration request) to ETR (the EID of the user is carried in this message), and notifies ETR that the user is no longer attached to the network;
[0064] Step 403: After the ETR receives the de-registration request message sent by the MS, it records the blacklisted user ID EID, and returns a Map-Unregister Response (de-registration response) message to the MS;
[0065] The response message indicates the success or failure of the de-registration.
[0066] Step 404: The MS sends a de-registration request to the ITR that stores the EID and RLOC mapping of the blacklisted user;
[0067] There is no fixed ...
Embodiment 1
[0071] The scheme of Embodiment 1 can also be implemented on LISP-MN (lisp-MN has the functions of ETR and ITR network elements in the lisp protocol). This embodiment is based on figure 2 Describes the basic protocols of lisp, such as Figure 5 As shown, it mainly includes the following steps:
[0072] Step 501: The MS learns that a certain user is a blacklisted user, and deletes the mapping between the user's EID and RLOC;
[0073] Step 502: The MS sends a deregistration request to the Lisp-MN that stores the EID and RLOC mapping of the blacklisted user (the EID of the user is carried in this message), and notifies the Lisp-MN that the user is no longer attached to the network;
[0074] Step 503: After the Lisp-MN receives the deregistration request message sent by the MS, the ITR function body in the Lisp-MN processes the blacklisted user to prevent the flow sent to the user and / or the flow sent by the user , Lisp-MN returns a deregistration response message to MS.
[0...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


