Session establishment method, device and system
A technology of session establishment and sub-session, which is applied in the field of communication, can solve problems such as conflicts and unproposed solutions, and achieve the effect of improving stability
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0098] Figure 12 is a flow chart of a session conflict handling method according to Embodiment 1 of the present invention, as shown in Figure 12 As shown, the figure is based on figure 2 The architecture diagram, the attachment flow chart when UE accesses 3GPP through PMIPv6 protocol, where GTP (GPRS Tunnel Protocol) is used between ePDG and P-GW, the process includes the following steps:
[0099] Step S1202-step S1228 are consistent with step S402-step S428.
[0100]Step S1230, now the H-PCRF has not received the S9 session establishment message sent by the step S1210, so the H-PCRF judges that the user's S9 session has not been established, so the H-PCRF sends a TER message to the V-PCRF (S9 session establishment trigger message), triggering the establishment of an S9 session and at the same time establishing an S9 sub-session for EPC-routed service policy control. The message carries information such as user ID, APN, and UE local IP address.
[0101] Step S1232: The V...
Embodiment 2
[0121] Figure 13 is a flow chart of a session conflict handling method according to Embodiment 2 of the present invention, such as Figure 13 As shown, the figure is based on image 3 The architecture diagram, the attachment flow chart when UE accesses 3GPP through PMIPv6 protocol, where GTP (GPRS Tunnel Protocol) is used between ePDG and P-GW, the process includes the following steps:
[0122] In step S1302, the UE accesses the BBF access system and performs 3GPP-based access authentication. BBF AAA interacts with 3GPP AAA Server through 3GPPAAAProxy (or, AAA Server further interacts with HSS) to complete EAP authentication.
[0123] In step S1304, the UE obtains the local IP address assigned by the BBF access network.
[0124] Step S1306, when IP Edge receives the trigger and supports policy interworking with PCRF, if the local policy indicates that NSWO policy control can be provided to the user, IP Edge sends a CCR message to V-PCRF, requesting to establish an S9a* ses...
Embodiment 3
[0130] Figure 14 is a flow chart of a session conflict handling method according to Embodiment 3 of the present invention, as shown in Figure 14 As shown, the figure is based on figure 2 The architecture diagram, the attachment flow chart when the UE accesses 3GPP through the DSMIPv6 protocol, the process includes the following steps:
[0131] In step S1402, the UE accesses the BBF access system and performs 3GPP-based access authentication. BBF AAA interacts with 3GPPAAA Server through 3GPPAAAProxy (or, AAA Server further interacts with HSS) to complete EAP authentication.
[0132] In step S1404, the UE obtains the local IP address assigned by the BBF access network.
[0133] In step S1406, triggered by step S1402 or step S1404, the BPCF is notified that the UE accesses through the BBF access network.
[0134] Step S1408, when BPCF receives the trigger and supports policy interworking with PCRF, if the local policy indicates that NSWO policy control can be provided to ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


