Method and communication node for traffic aggregation
A technology of communication nodes and services, applied in wireless communication, digital transmission systems, electrical components, etc., can solve problems affecting standardization and product implementation, affecting WLAN networks, and high costs of WLAN networks.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
example 1
[0084] Example 1: In this solution, after service aggregation is triggered, for example, when the UE detects a WLAN network with sufficient signal strength, a new interface that can be called SWua is established as the above-mentioned aggregation interface between eNB and UE . This interface is used to carry aggregated services that need to pass through the WLAN network transparently. Figure 8 The network architecture of this example is shown in, which involves UE 800, eNB 802 and WLAN node 804. in Figure 8 The node 804 shown as "WLAN" in is basically a WLAN terminal function, such as a WLAN AP, a WLAN AC, or another appropriate node or gateway in a WLAN network, or any combination of the aforementioned WLAN nodes and functions. The aggregate interface between eNB 802 and UE 800 is denoted as 806.
example 2
[0085] Example 2: As described above, the aggregation interface SWua can be implemented as a tunnel encapsulating an aggregation frame (for example, a MAC frame, an RLC frame, or a PDCP frame). The tunnel may be based on, for example, a layer 2 tunneling protocol or a layer 3 tunneling protocol, such as:
[0086] ·Layer 3 tunnel, for example, use any of the following:
[0087] -GTP-GPRS tunnel protocol,
[0088] -GRE-general routing encapsulation, and
[0089] -IPSec-Internet protocol security.
[0090] ·Layer 2 tunnel, for example, use any of the following:
[0091] -L2TP-Layer 2 Tunneling Protocol,
[0092] -L2TPv3-Layer 2 Tunneling Protocol Version 3, and
[0093] -L2F-Layer 2 forwarding protocol.
[0094] Almost all existing UEs capable of communicating with the WLAN infrastructure support all the tunnel mechanisms and protocols mentioned above. An example of the header structure that can be used for tunnels based on GTP is as Picture 9 As shown, where PDU represents a packet data un...
example 3
[0095] Example 3: In this example, one side of the interface is terminated at the UE, and the other side is at the eNB, and the traffic is forwarded transparently through the WLAN network and non-transparently by the ePDG. This example can be applied when the existing S2b network architecture is used for non-3GPP access to EPC (as shown in FIG. 1B), so that the UE is connected to the ePDG and the service is routed to the ePDG. Part of the implementation of this interface requires a new interface between the eNB and the ePDG, so that the ePDG can forward aggregated services to and from the eNB. Picture 10 The network architecture of this example is shown in, which also involves UE 800, eNB 802 and WLAN node 804, and also adds ePDG 808. This example therefore includes the first existing aggregated "sub-interface" 806A between UE 800 and ePDG 808 (e.g., implemented as an existing secure tunnel on the SWu interface described above), and the second between ePDG 808 and eNB 802 New ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


