CN110278584A - Switch the methods, devices and systems of user's veil member - Google Patents
Switch the methods, devices and systems of user's veil member Download PDFInfo
- Publication number
- CN110278584A CN110278584A CN201810208474.3A CN201810208474A CN110278584A CN 110278584 A CN110278584 A CN 110278584A CN 201810208474 A CN201810208474 A CN 201810208474A CN 110278584 A CN110278584 A CN 110278584A
- Authority
- CN
- China
- Prior art keywords
- veil member
- user
- network element
- session
- veil
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 166
- 230000005484 gravity Effects 0.000 claims abstract description 72
- 238000007726 management method Methods 0.000 description 185
- 230000006870 function Effects 0.000 description 66
- 230000015654 memory Effects 0.000 description 53
- 102100021087 Regulator of nonsense transcripts 2 Human genes 0.000 description 31
- 101710028540 UPF2 Proteins 0.000 description 31
- 238000004891 communication Methods 0.000 description 27
- 101000579423 Homo sapiens Regulator of nonsense transcripts 1 Proteins 0.000 description 17
- 102100028287 Regulator of nonsense transcripts 1 Human genes 0.000 description 17
- 230000008569 process Effects 0.000 description 17
- 230000005540 biological transmission Effects 0.000 description 16
- 238000010586 diagram Methods 0.000 description 16
- RTZKZFJDLAIYFH-UHFFFAOYSA-N Diethyl ether Chemical compound CCOCC RTZKZFJDLAIYFH-UHFFFAOYSA-N 0.000 description 13
- 101100059544 Arabidopsis thaliana CDC5 gene Proteins 0.000 description 12
- 101150115300 MAC1 gene Proteins 0.000 description 12
- 238000012545 processing Methods 0.000 description 12
- ORQBXQOJMQIAOY-UHFFFAOYSA-N nobelium Chemical compound [No] ORQBXQOJMQIAOY-UHFFFAOYSA-N 0.000 description 11
- 238000001228 spectrum Methods 0.000 description 11
- 238000001914 filtration Methods 0.000 description 7
- 230000009286 beneficial effect Effects 0.000 description 6
- 238000001514 detection method Methods 0.000 description 6
- 230000000694 effects Effects 0.000 description 6
- 101100244969 Arabidopsis thaliana PRL1 gene Proteins 0.000 description 5
- 102100039558 Galectin-3 Human genes 0.000 description 5
- 101100454448 Homo sapiens LGALS3 gene Proteins 0.000 description 5
- 101150051246 MAC2 gene Proteins 0.000 description 5
- 238000004422 calculation algorithm Methods 0.000 description 5
- 238000005516 engineering process Methods 0.000 description 5
- 238000010295 mobile communication Methods 0.000 description 5
- 230000004048 modification Effects 0.000 description 5
- 238000012986 modification Methods 0.000 description 5
- 230000001360 synchronised effect Effects 0.000 description 5
- 238000004590 computer program Methods 0.000 description 4
- 238000013461 design Methods 0.000 description 4
- 230000008859 change Effects 0.000 description 3
- 238000010168 coupling process Methods 0.000 description 3
- 238000005859 coupling reaction Methods 0.000 description 3
- 238000007689 inspection Methods 0.000 description 3
- 230000005055 memory storage Effects 0.000 description 3
- 230000008878 coupling Effects 0.000 description 2
- 238000013523 data management Methods 0.000 description 2
- 230000005611 electricity Effects 0.000 description 2
- 230000000977 initiatory effect Effects 0.000 description 2
- 230000007774 longterm Effects 0.000 description 2
- 230000004044 response Effects 0.000 description 2
- 230000003068 static effect Effects 0.000 description 2
- 238000013475 authorization Methods 0.000 description 1
- 230000002457 bidirectional effect Effects 0.000 description 1
- TZSMWSKOPZEMAJ-UHFFFAOYSA-N bis[(2-methoxyphenyl)methyl] carbonate Chemical compound COC1=CC=CC=C1COC(=O)OCC1=CC=CC=C1OC TZSMWSKOPZEMAJ-UHFFFAOYSA-N 0.000 description 1
- 210000004271 bone marrow stromal cell Anatomy 0.000 description 1
- 238000004364 calculation method Methods 0.000 description 1
- 210000004027 cell Anatomy 0.000 description 1
- 230000001413 cellular effect Effects 0.000 description 1
- 239000003795 chemical substances by application Substances 0.000 description 1
- 239000013256 coordination polymer Substances 0.000 description 1
- 230000010485 coping Effects 0.000 description 1
- 235000013399 edible fruits Nutrition 0.000 description 1
- 125000001033 ether group Chemical group 0.000 description 1
- 238000009434 installation Methods 0.000 description 1
- 230000003993 interaction Effects 0.000 description 1
- 230000035800 maturation Effects 0.000 description 1
- 230000006855 networking Effects 0.000 description 1
- 238000005192 partition Methods 0.000 description 1
- 238000000926 separation method Methods 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
- XLYOFNOQVPJJNP-UHFFFAOYSA-N water Substances O XLYOFNOQVPJJNP-UHFFFAOYSA-N 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/14—Session management
- H04L67/148—Migration or transfer of sessions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W36/00—Hand-off or reselection arrangements
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
This application provides a kind of methods, devices and systems for switching user's veil member, this method is applied in Ethernet session context, this method comprises: session management network element determines that user's veil member of Ethernet session needs gravity treatment, wherein, need gravity treatment user's veil member be the Ethernet session source user veil member;The session management network element sends packet check instruction to the first network element, packet check instruction is used to indicate first network element and notifies the session management network element when detecting the downlink message of the Ethernet session, which includes target user's veil member or intermediate user veil member;The session management network element receives the first notification information from first network element;The session management network element sends the second notification information to the source user veil member, which is used to indicate source user veil member release resource, can be realized the switching of user's veil member in Ethernet session context.
Description
Technical field
This application involves the communications fields, and more particularly, to a kind of method, apparatus for switching user's veil member and are
System.
Background technique
In 5th generation (5th Generation, 5G) network, in addition to support network protocol (Internet Protocol,
IP the session of ethernet type is also supported in) protocol Data Unit (Protocol Data Unit, PDU) session of type.Its
In, ether is an IP layers of protocol layer below.Wherein, for the PDU session of IP type, what is transmitted in mobile network is IP report
Text.Session for ethernet type, what is transmitted in mobile network is ether network packet.
Due to the mobility of terminal, 5G network can switch anchor point user plane functions equipment (User Plane for terminal
Function, UPF).Under IP session context, control plane gateway realizes anchor point by distributing different IP address for terminal device
The switching of UPF.But under ethernet type session context, the medium access of terminal controls (Media Access
Control, MAC) address remains constant, if the method for continuing to use the distribution address in IP session context cannot achieve Ethernet
The switching of anchor point UPF in session context.Therefore, it needs to propose that a kind of scheme realizes the anchor point UPF in Ethernet session context
Switching.
Summary of the invention
The application provides a kind of methods, devices and systems for switching user's veil member, can be realized Ethernet session context
In user's veil member switching.
In a first aspect, providing a kind of method for switching user's veil member, the method is applied to Ethernet session context
In, which comprises session management network element determines that user's veil member of Ethernet session needs gravity treatment, wherein needs gravity treatment
User's veil member can be understood as the source user veil member of the Ethernet session;Then, session management network element is to the first network element
Packet check instruction is sent, in order to which announcement session manages net to the first network element when detecting the downlink message of the Ethernet session
Member.Optionally, the first network element includes target user's veil member or intermediate user veil member, which is for ether
User's veil member of net session gravity treatment.Then, session management network element receives the first notification information that the first network element is sent, to obtain
Know that the first network element has been detected by the downlink message of the Ethernet session.Finally, session management network element is sent out to source user veil member
Send the second notification information so that source user veil member discharge resource, i.e., follow-up business message will by target user's veil member come
Transmission.The variation that terminal in the realization switching method of IP address needs to perceive IP address is distributed in IP session context, and at this
Apply not needing in embodiment realizing switching using the method for distributing IP address in IP session context, whole process does not need end
The cooperation at end can be realized the seamless switching of user's veil member, it can also be ensured that the continuity of business.
Optionally, if the Ethernet session corresponds to multiple media access control MAC Address, the packet check instruction tool
Body is used to indicate first network element and notifies the session management when detecting the corresponding downlink message of the multiple MAC Address
Network element.
With reference to first aspect, in one possible implementation, first network element is target user's veil member,
Wherein, the packet check instruction is specifically used for indicating target user's veil member in the case where detecting the Ethernet session
The session management network element is notified when row message.Therefore, session management network element to target user's veil member downward message by examining
Instruction is surveyed, so that target user's veil member announcement session managed network element when detecting the downlink message of the Ethernet session.
Optionally, this method further include: session management network element determines target user's veil member.Therefore, session management network element
Suitable target user's veil member can be selected for terminal.
Optionally, this method further include: session management network element sends first routing rule to target user's veil member, described
First routing rule is used to indicate target user's veil member and the uplink message from the Ethernet session is sent to number
According to network.Further, the first routing rule is also used to indicate that target user's veil member is received from the data
The downlink message of the Ethernet session of network and source user veil member.Therefore, session management network element is by target
User's veil member issues first routing rule, allow target user's veil member based on first routing rule content carry out with
The too transmission of the uplink and downlink message of net session.
Optionally, the method also includes: session management network elements sends the first tunnel information to access network node, and described the
One tunnel information establishes the tunnel between target user's veil member for the access network node;The session management net
Member sends the second tunnel information to the source user veil member, and second tunnel information is for establishing the source user veil member
To the tunnel of target user's veil member.Therefore, session management network element by access network node send the first tunnel information,
Access network node is enabled to establish the tunnel between target user's veil member, and, by being sent to source user veil member
Second tunnel information, enable source user veil member establish the source user veil member to target user's veil member tunnel
Road.
With reference to first aspect, in alternatively possible implementation, first network element is intermediate user veil member,
In, the packet check instruction is specifically used for indicating that the intermediate user veil member is being detected from target user's veil
The session management network element is notified when the downlink message of the Ethernet session of member.Therefore, session management network element passes through in
Between user's veil member downward message detection instruction so that intermediate user veil member is in the downlink message for detecting the Ethernet session
When announcement session managed network element.
Optionally, this method further include: session management network element determines intermediate user veil member.Therefore, session management network element
Suitable intermediate user veil member can be selected according to the position of terminal.
Optionally, this method further include: session management network element determines target user's veil member.Therefore, session management network element
Suitable target user's veil member can be selected for terminal.
Optionally, the method also includes: the session management network elements sends the second tunnel to the intermediate user veil member
By rule, the second routing rule is used to indicate the intermediate user veil member and sends out the uplink message of the Ethernet session
Give target user's veil member.Further, the second routing rule is also used to indicate the intermediate user veil member
Receive the downlink message of the Ethernet session from the source user veil member and target user's veil member.Therefore,
Session management network element allows intermediate user veil member to be based on the by issuing second routing rule to intermediate user veil member
The content of two routing rules carries out the transmission of the uplink and downlink message of Ethernet session.
Optionally, tunnel is sent to the intermediate user veil member the method also includes: the session management network element to believe
Breath, the tunnel information include letter needed for the intermediate user veil member establishes the tunnel between source user veil member
Breath, information needed for the intermediate user veil member establishes the tunnel between target user's veil member and it is described in
Between user's veil member establish and the access network node between tunnel needed for information.Therefore, session management network element pass through to
Intermediate user veil member sends tunnel information, and intermediate user veil member is enabled to establish the tunnel between source user veil member
Tunnel between road, with target user's veil member, and the tunnel between access network node.
Second aspect, provides a kind of method for switching user's veil member, and the method is applied to Ethernet session context
In, which comprises session management network element determines that user's veil member of Ethernet session needs gravity treatment, wherein needs gravity treatment
User's veil member be the Ethernet session source user veil member;Then, session management network element determines intermediate user veil
Member, and routing rule is sent to intermediate user veil member, so that intermediate user veil member is by the uplink report of the Ethernet session
Text is sent to target user's veil member, and receives the Ethernet meeting from source user veil member and target user's veil member
The downlink message of words, wherein target user's veil member is user's veil member for the Ethernet session gravity treatment.In this Shen
Please be in embodiment, session management network element is by issuing routing rule to intermediate user veil member, so that intermediate user veil member base
Corresponding uplink and downlink operation is carried out in routing rule, helps to realize the switching of user's veil member in Ethernet session context.
Optionally, tunnel is sent to the intermediate user veil member the method also includes: the session management network element to believe
Breath, the tunnel information include letter needed for the intermediate user veil member establishes the tunnel between source user veil member
Breath, information needed for the intermediate user veil member establishes the tunnel between target user's veil member and it is described in
Between user's veil member establish and the access network node between tunnel needed for information.Therefore, session management network element pass through to
Intermediate user veil member sends tunnel information, and intermediate user veil member is enabled to establish the tunnel between source user veil member
Tunnel between road, with target user's veil member, and the tunnel between access network node.
In conjunction with second aspect, in one possible implementation, the method also includes: the session management network element to
The intermediate user veil member sends packet check instruction, in order to which intermediate NE is in the downlink report for detecting the Ethernet session
Announcement session managed network element when literary.
Optionally, if the Ethernet session corresponds to multiple media access control MAC Address, the packet check instruction tool
Body is used to indicate the intermediate user veil member and notifies the meeting when detecting the corresponding downlink message of the multiple MAC Address
Talk about managed network element.
The third aspect, provides a kind of method for switching user's veil member, and the method is applied to Ethernet session context
In, which comprises session management network element determines that user's veil member of Ethernet session needs gravity treatment, wherein needs gravity treatment
User's veil member be the Ethernet session source user veil member;Then, session management network element determines target user's veil
Member, wherein target user's veil member is user's veil member for Ethernet session gravity treatment, and sends road to target user's veil member
By rule, so that the uplink message from the Ethernet session is sent to data network, Yi Jijie by target user's veil member
The downlink message of the Ethernet session from data network and source user veil member is received, so that target user's veil member is based on routing
Rule carries out corresponding uplink and downlink operation, helps to realize the switching of user's veil member in Ethernet session context.
Optionally, the method also includes: session management network elements sends the first tunnel information to access network node, and described the
One tunnel information establishes the tunnel between target user's veil member for the access network node;The session management net
Member sends the second tunnel information to the source user veil member, and second tunnel information is for establishing the source user veil member
To the tunnel of target user's veil member.Therefore, session management network element by access network node send the first tunnel information,
Access network node is enabled to establish the tunnel between target user's veil member, and, by being sent to source user veil member
Second tunnel information, enable source user veil member establish the source user veil member to target user's veil member tunnel
Road.
In conjunction with the third aspect, in one possible implementation, the method also includes: session management network elements to target
User's veil member sends packet check instruction, so that target user's veil member is when detecting the downlink message of the Ethernet session
Announcement session managed network element.
Optionally, if the Ethernet session corresponds to multiple media access control MAC Address, the packet check instruction tool
Body is used to indicate target user's veil member and notifies the meeting when detecting the corresponding downlink message of the multiple MAC Address
Talk about managed network element.
Fourth aspect, provides a kind of method for switching user's veil member, and the method is applied to Ethernet session context
In, which comprises the first network element receives the packet check instruction from session management network element, and the packet check instruction is used
The session management network element is notified when detecting the downlink message of Ethernet session in instruction first network element;Then,
One network element sends the first notification information to session management network element when detecting the downlink message of Ethernet session, so that session pipe
Reason network element learns that the first network element has been detected by the downlink message of Ethernet session, so that session management network element can notify
Source user veil member discharge resource, in order to realize Ethernet session user's veil member switching.
Optionally, if the Ethernet session corresponds to multiple media access control MAC Address, the packet check instruction tool
Body is used to indicate first network element and notifies the session management when detecting the corresponding downlink message of the multiple MAC Address
Network element.
In conjunction with fourth aspect, in one possible implementation, first network element is target user's veil member,
Wherein, the packet check instruction is specifically used for indicating target user's veil member in the case where detecting the Ethernet session
The session management network element is notified when row message.Therefore, the report that target user's veil member is issued by receiving session management network element
Text detection instruction, in order to the announcement session managed network element when detecting the downlink message of the Ethernet session.
Optionally, the from the session management network element is received the method also includes: target user's veil member
One routing rule, the first routing rule is used to indicate target user's veil member will be from the upper of the Ethernet session
Row message is sent to data network;Target user's veil member is based on the first routing rule, will come from the Ethernet
The uplink message of session is sent to the data network.Therefore, target user's veil member can be based on first routing rule, to
The above-mentioned processing mode of the execution of the too uplink message of net session.
Further, the first routing rule is also used to indicate that target user's veil member is received from the data
The downlink message of the Ethernet session of network and source user veil member;Target user's veil member is based on the first via
By rule, the downlink message of the Ethernet session from the data network and source user veil member is received.Therefore,
Target user's veil member can be based on first routing rule, to the above-mentioned processing mode of the execution of the downlink message of Ethernet session.
In conjunction with fourth aspect, in alternatively possible implementation, first network element is intermediate user veil member,
In, the packet check instruction is specifically used for indicating that the intermediate user veil member is being detected from target user's veil
The session management network element is notified when the downlink message of the Ethernet session of member.Therefore, intermediate user veil member is by connecing
The packet check instruction that session management network element issues is received, in order to the notice when detecting the downlink message of the Ethernet session
Session management network element.
Optionally, this method further include: the intermediate user veil member receives second from the session management network element
Routing rule, the second routing rule are used to indicate the intermediate user veil member for the uplink from the Ethernet session
Message is sent to target user's veil member;The intermediate user veil member is based on the second routing rule, will it is described with
The uplink message of too net session is sent to target user's veil member.Therefore, intermediate user veil member can be based on the second tunnel
By rule, to the above-mentioned processing mode of the execution of the uplink message of Ethernet session.
Further, the second routing rule is also used to indicate that the intermediate user veil member is received from source use
The downlink message of the Ethernet session of family veil member and target user's veil member.Therefore, intermediate user veil member can
To be based on second routing rule, to the above-mentioned processing mode of the execution of the downlink message of Ethernet session.
Optionally, the method also includes: the intermediate user veil member receives the tunnel from the session management network element
Road information, the tunnel information include that the intermediate user veil member is established needed for the tunnel between source user veil member
Information, information needed for the intermediate user veil member establishes the tunnel between target user's veil member, Yi Jisuo
State information needed for intermediate user veil member establishes the tunnel between the access network node;The intermediate user veil primitive root
According to the tunnel information, tunnel is established with the source user veil member, establishes tunnel, Yi Jiyu with target user's veil member
The access network node establishes tunnel.Therefore.The tunnel information that intermediate user veil member is sent by session management network element, can
The tunnel between source user veil member is established, with the tunnel between target user's veil member, and and access network node
Between tunnel.
5th aspect, provides a kind of method for switching user's veil member, and the method is applied to Ethernet session context
In, which comprises intermediate user veil member receives the routing rule from session management network element, is then based on routing rule
Content then is executed and is operated to the uplink and downlink of Ethernet session, specific i.e. for uplink: the uplink message of Ethernet session is sent out
Give target user's veil member;For downlink: receiving the institute from the source user veil member and target user's veil member
The downlink message for stating Ethernet session helps to realize the switching of user's veil member in Ethernet session context.
Optionally, the method also includes: intermediate user veil members to receive the tunnel information from session management network element, institute
Stating tunnel information includes information needed for the intermediate user veil member establishes the tunnel between source user veil member, institute
State information and the intermediate user needed for intermediate user veil member establishes the tunnel between target user's veil member
Information needed for veil member establishes the tunnel between the access network node.Therefore, intermediate user veil member can be based on being somebody's turn to do
Tunnel information establishes the tunnel between source user veil member, and the tunnel between target user's veil member, and with connect
Tunnel between network access node.
In conjunction with the 5th aspect, in one possible implementation, the method also includes: intermediate user veil member passes through
The packet check instruction from session management network element is received, packet check instruction is then based on and is detecting Ethernet session
Announcement session managed network element when downlink message.
Optionally, if the Ethernet session corresponds to multiple media access control MAC Address, the packet check instruction tool
Body is used to indicate the intermediate user veil member and notifies the meeting when detecting the corresponding downlink message of the multiple MAC Address
Talk about managed network element.
6th aspect, provides a kind of method for switching user's veil member, and the method is applied to Ethernet session context
In, which comprises target user's veil member receives the routing rule from session management network element, is then based on routing rule
Content then is executed and is operated to the uplink and downlink of Ethernet session, specific i.e. for uplink: by from described in access network node with
The uplink message of too net session is sent to data network;For downlink: receiving and come from the data network and the source user face
The downlink message of the Ethernet session of network element, helps to realize the switching of user's veil member in Ethernet session context.
In conjunction with the 6th aspect, in one possible implementation, the method also includes: target user's veil member receives
Packet check instruction from session management network element is then based on packet check instruction in the downlink for detecting Ethernet session
Announcement session managed network element when message.
Optionally, if the Ethernet session corresponds to multiple media access control MAC Address, the packet check instruction tool
Body is used to indicate target user's veil member and notifies the meeting when detecting the corresponding downlink message of the multiple MAC Address
Talk about managed network element.
7th aspect provides a kind of device for switching user's veil member, which can be session management network element, can also
To be chip.The device is with session management network element in possible implementation any in realization either side or either side
Function.The function can also execute corresponding software realization by hardware realization by hardware.The hardware or software include
One or more modules corresponding with above-mentioned function.
Eighth aspect provides a kind of device for switching user's veil member, which can be intermediate user veil member,
It can be chip.The device is with intermediate user veil in possible implementation any in realization either side or either side
The function of member.The function can also execute corresponding software realization by hardware realization by hardware.The hardware or software
Including one or more modules corresponding with above-mentioned function.
9th aspect provides a kind of device for switching user's veil member, which can be target user's veil member,
It can be chip.The device is with target user's veil in possible implementation any in realization either side or either side
The function of member.The function can also execute corresponding software realization by hardware realization by hardware.The hardware or software
Including one or more modules corresponding with above-mentioned function.
Tenth aspect, provides a kind of device, which includes processor, memory and transceiver.Processor and storage
Device is connected with transceiver.For storing instruction, processor is used for the control in processor for executing the instruction, transceiver to memory
System is lower to be communicated with other network elements.When the processor executes the instruction of memory storage, the execution is so that the device executes
In any of the above-described aspect or either side in any possible implementation session management network element method.It should be noted that
The memory can integrate in processor, be also possible to independently of except processor.
On the one hand tenth, provides a kind of device, which includes processor, memory and transceiver.Processor with deposit
Reservoir is connected with transceiver.For storing instruction, processor is used for for executing the instruction, transceiver in processor memory
Control is lower to be communicated with other network elements.When the processor executes the instruction of memory storage, the execution is so that the device is held
In any of the above-described aspect of row or either side in any possible implementation intermediate user veil member method.It needs to illustrate
It is that the memory can integrate in processor, is also possible to independently of except processor.
12nd aspect, provides a kind of device, which includes processor, memory and transceiver.Processor with deposit
Reservoir is connected with transceiver.For storing instruction, processor is used for for executing the instruction, transceiver in processor memory
Control is lower to be communicated with other network elements.When the processor executes the instruction of memory storage, the execution is so that the device is held
In any of the above-described aspect of row or either side in any possible implementation target user's veil member method.It needs to illustrate
It is that the memory can integrate in processor, is also possible to independently of except processor.
13rd aspect, provides a kind of system for switching user's veil member, and the system is applied to Ethernet session field
Jing Zhong, the system comprises: session management network element, for determining that user's veil member of Ethernet session needs gravity treatment, wherein need
Want gravity treatment user's veil member be the Ethernet session source user veil member;The session management network element is also used to
One network element sends packet check instruction, and the packet check instruction is used to indicate first network element and is detecting the Ethernet
The session management network element is notified when the downlink message of session, wherein first network element include target user veil member or in
Between user veil member, target user's veil member is user's veil member for the Ethernet session gravity treatment;First net
Member, for sending the first notification information to the session management network element, first notification information is used for the session management
Network element notifies first network element to detect the downlink message of the Ethernet session;The session management network element is also used to, to
The source user veil member sends the second notification information, and second notification information is used to indicate the source user veil member release
Resource.
In one possible implementation, session management network element can be the session pipe in the 7th aspect or the tenth aspect
Manage network element.Correspondingly, the first network element can be the intermediate user veil member in above-mentioned eighth aspect or the tenth one side, alternatively,
First network element is also possible to target user's veil member in above-mentioned 9th aspect or the 12nd aspect.
Fourteenth aspect provides a kind of computer readable storage medium, which has journey
Sequence, the program make session management network element execute session in any possible implementation in any of the above-described aspect or either side
The method of managed network element.
15th aspect, provides a kind of computer readable storage medium, which has journey
Sequence, the program execute intermediate user veil member in any of the above-described aspect or either side in any possible implementation
Between user's veil member method.
16th aspect, provides a kind of computer readable storage medium, which has journey
Sequence, the program make target user's veil member execute in any of the above-described aspect or either side mesh in any possible implementation
The method for marking user's veil member.
17th aspect, provides a kind of communication chip, wherein instruction is stored with, when it runs on a computing device
When, so that the communication chip executes the method in any possible implementation of any of the above-described aspect.
18th aspect, provides a kind of computer program product comprising instruction, when running on computers, so that
Computer executes the method in any of the above-described aspect or its any possible implementation.
Detailed description of the invention
Fig. 1 is the schematic diagram using a kind of system architecture of the embodiment of the present application.
Fig. 2 is a scene figure using the embodiment of the present application.
Fig. 3 is the schematic block diagram using the communication equipment of the embodiment of the present application.
Fig. 4 is the schematic flow chart of the method for switching user's veil member of the application one embodiment.
Fig. 5 is the schematic diagram of an example of mac learning principle.
Fig. 6 is the schematic diagram using an example of the method for switching user's veil member of the embodiment of the present application.
Fig. 7 is the schematic diagram using another example of the method for switching user's veil member of the embodiment of the present application.
Fig. 8 is the schematic block diagram using the device of switching user's veil member of the application one embodiment.
Fig. 9 is the schematic block diagram using the device of switching user's veil member of another embodiment of the application.
Figure 10 is the schematic block diagram using the device of switching user's veil member of the application another embodiment.
Figure 11 is the schematic block diagram using the device of switching user's veil member of another embodiment of the application.
Specific embodiment
Below in conjunction with attached drawing, the technical solution in the application is described.
The technical solution of the embodiment of the present application can be applied to various communication systems, such as: global system for mobile telecommunications (Global
System of Mobile communication, GSM) system, CDMA (Code Division Multiple
Access, CDMA) system, wideband code division multiple access (Wideband Code Division Multiple Access, WCDMA) system
System, General Packet Radio Service (General Packet Radio Service, GPRS), long term evolution (Long Term
Evolution, LTE) system, LTE frequency division duplex (Frequency Division Duplex, FDD) system, LTE time division duplex
(Time Division Duplex, TDD), Universal Mobile Communication System (Universal Mobile
Telecommunication System, UMTS), global interconnection inserting of microwave (Worldwide Interoperability
For Microwave Access, WiMAX) communication system, following the 5th generation (5th Generation, the 5G) system, future
The vehicle connection that other systems or new wireless (New Radio, NR), vehicle to all (Vehicle to everything, V2X) are communicated
Net system etc..
Fig. 1 is the schematic diagram using a kind of system architecture of the embodiment of the present application.As shown in Figure 1, the system 100 includes:
Session management network element 101 and the first network element 102.Optionally, first network element 102 includes target user's veil member or intermediate use
Family veil member.The system 100 can be used for executing the method for switching user's veil member in the embodiment of the present application.
In one possible implementation, session management network element 101 is used to determine user's veil member of Ethernet session
Need gravity treatment, wherein need gravity treatment user's veil member be the Ethernet session source user veil member;The session management
Network element 101 is also used to send packet check instruction to first network element 102, and packet check instruction is used to indicate described the
One network element notifies the session management network element when detecting the downlink message of the Ethernet session, wherein first packet
Target user's veil member or intermediate user veil member are included, target user's veil member is the use for the Ethernet session gravity treatment
Family veil member;First network element 102 sends the first notification information, the first notice letter to the session management network element 101
Breath to the session management network element 101 for notifying first network element 102 to detect the downlink message of the Ethernet session;
The session management network element 101 sends the second notification information to the source user veil member, and second notification information is for referring to
Show the source user veil member release resource.
Alternatively, session management network element 101 determines user's veil of Ethernet session in alternatively possible implementation
Member needs gravity treatment, wherein need gravity treatment user's veil member be the Ethernet session source user veil member;The session pipe
It manages network element 101 and determines target user's veil member, target user's veil member is the user face for the Ethernet session gravity treatment
Network element;The session management network element 101 sends routing rule to target user's veil member, and the routing rule is used to indicate
Uplink message from the Ethernet session is sent to data network by target user's veil member, and is used to indicate institute
It states target user's veil member and receives the message from the data network and the source user veil member.
Alternatively, session management network element 101 determines user's veil of Ethernet session in alternatively possible implementation
Member needs gravity treatment, wherein need gravity treatment user's veil member be the Ethernet session source user veil member;The session pipe
It manages network element 101 and determines target user's veil member, target user's veil member is the user face for the Ethernet session gravity treatment
Network element;The session management network element 101 sends routing rule to target user's veil member, and the routing rule is used to indicate
Message from the terminal is sent to data network by target user's veil member, and is used to indicate the target user
Veil member receives the message from the data network and the source user veil member.
It should be noted that the session management network element 101 and the first network element 102 etc. in Fig. 1 are only a name, name pair
Network element or equipment itself do not constitute restriction.In 5G network and following other networks (such as 6G network), session management net
Equipment corresponding to member 101 and the first network element 102 or equipment are also possible to other names, and the embodiment of the present application does not make this to have
Body limits.For example, the session management network element 101 is it is also possible to be replaced by SMF functional entity, the first network element is possible to be replaced
For UPF functional entity, wireless access network (Radio Access Network, RAN) equipment or branch node (Branch
Point, BP), source user veil member is described collectively herein it is also possible to be replaced by UPF functional entity, no longer superfluous below
It states.
Optionally, the session management network element 101 in above system 100 and the first network element 102 can be one independent respectively
Network element, be also possible to be realized jointly by multiple network elements, can also be used as a functional module in a network element, the application is real
It applies example and this is not especially limited.
It is understood that above-mentioned function is either network element in hardware device, is also possible in dedicated hardware
The virtualization instantiated in the software function or platform (for example, cloud platform) of upper permission.
Terminal (Terminal) in the embodiment of the present application can refer to user equipment (User Equipment, UE), access
Terminal, V2X communication in terminal, subscriber unit, subscriber station, movement station, mobile station, remote station, remote terminal, mobile device,
User terminal, terminal device, wireless telecom equipment, user agent or user apparatus.Terminal can also be cellular phone, wireless electricity
Words, session initiation protocol (Session Initiation Protocol, SIP) phone, wireless local loop (Wireless
Local Loop, WLL) it stands, personal digital assistant (Personal Digital Assistant, PDA), there is wireless communication function
Can handheld device, calculate equipment or be connected to radio modem other processing equipments, mobile unit, wearable set
It is standby, Public Land Mobile Network network (the Public Land of terminal device or the following evolution in the following 5G network
Mobile Network, PLMN) in terminal device etc., the embodiment of the present application does not limit this.Terminal can also include V2X
On board unit (On Board Unit, OBU) in equipment, for example, vehicle or vehicle.
Terminal in the embodiment of the present application is wirelessly connected with wireless access network RAN equipment, wireless access network
Equipment is connect by wirelessly or non-wirelessly mode with equipment of the core network.Equipment of the core network can be independent with wireless access network equipment
Different physical equipments is also possible to for the logic function of the function of equipment of the core network and wireless access network equipment being integrated in same
On a physical equipment, the function that part equipment of the core network is integrated on a physical equipment and partial wireless access can also be
The function of net equipment.Terminal can be fixed position, be also possible to moveable.
Wireless access network equipment is the access device that terminal is wirelessly linked into the mobile communication system, can be with
It is base station NodeB, the base station (gNodeB, gNB) in evolved base station eNodeB, 5G mobile communication system, future mobile communications
The access node etc. in base station or Wireless Fidelity (Wireless Fidelity, WiFi) system in system, can also be cloud without
Wireless controller or the access net under line access network (Cloud Radio Access Network, CRAN) scene are set
It is standby to be drilled for relay station, access point, mobile unit, wearable device and the network equipment in future 5G network or future
Into PLMN network in the network equipment etc., embodiments herein is to particular technique used by wireless access network equipment and tool
Body equipment form is without limitation.
Equipment of the core network is more for example including mobile management entity (Mobility Management Entity, MME), broadcast
Service centre (Broadcast Multicast Service Center, BMSC) etc. is broadcast, or also may include in 5G system
Corresponding function entity, such as core network control surface (Control Plane, CP) or user face (User Plan, UP) network function
It can wait, for example, session management network function (Session Management NF, SMF), access and mobile management function to ps domain
(Access and Mobility Management Function, AMF) etc..Wherein, core network control surface it can be appreciated that
Core network control surface function (control plane function, CPF) entity.
V2X communication refers to: vehicle can by communicated between vehicle and vehicle (Vehicle to Vehicle, V2V) or
Person's vehicle is communicated with roadside infrastructure between (Vehicle to Infrastructure, V2I) or vehicle and pedestrian
Communicate (Vehicle to Pedestrian, V2P) or vehicle and network communication (Vehicle to Network, V2N) etc.
Mode to obtain traffic information in time or receives information.By taking the most common V2V and V2I as an example: vehicle is communicated by V2V, can be with
By the speed of itself, driving direction, specific location or the information such as emergency brake whether is stepped on and are broadcast to surrounding vehicles, surrounding vehicle
By obtain the category information, allow driver preferably to perceive traffic condition, sentence in advance to be made to unsafe condition
It is disconnected, and then evacuation is made in time.Optionally, V2I is communicated, other than the interaction of above-mentioned security information, roadside infrastructure
The access etc. of all kinds of information on services and data network, the functions such as non-parking charge, in-car entertainment all pole can also be provided for vehicle
The earth improves traffic intelligence.V2X is generally communicated into used network and is known as car networking.
Wireless access network equipment and terminal can be deployed in land, including indoor or outdoors, hand-held or vehicle-mounted;It can also be with
It is deployed on the water surface;It can also dispose on skyborne aircraft, balloon and artificial satellite.Embodiments herein is to wireless access
The application scenarios of net equipment and terminal are without limitation.
Embodiments herein can be adapted for downlink message transmission, be readily applicable to uplink message transmission, can be with
Message transmissions suitable for device-to-device (Device to Device, D2D).Need exist for being described collectively: message can
To be data, alternatively, being also possible to signal, this is not construed as limiting.Downlink message is transmitted, sending device is wireless access network
(relay device is used to downlink message being transmitted to wireless access network equipment, so that wireless access network is set for equipment or relay device
It is standby that downlink message is sent to terminal), corresponding receiving device is terminal.Uplink message to be transmitted, sending device is terminal,
Corresponding receiving device can be wireless access network equipment or relay device, and (relay device is for uplink message to be transmitted to wirelessly
Access network equipment).For the message transmissions of D2D, sending device is terminal, and corresponding receiving device is also terminal.The application's
Embodiment to the transmission direction of message without limitation.
It can be by authorizing frequency spectrum (licensed between wireless access network equipment and terminal and between terminal and terminal
Spectrum it) is communicated, can also be by exempting from that frequency spectrum (unlicensed spectrum) is authorized to be communicated, it can also be same
When by authorization frequency spectrum and exempt from authorize frequency spectrum communicated.Between wireless access network equipment and terminal and between terminal and terminal
It can be communicated, can also be carried out by the frequency spectrum of 6GHz or more by 6G megahertzs of (gigahertz, GHz) frequency spectrum below
Communication, can also be communicated using the frequency spectrum of 6GHz frequency spectrum below and 6GHz or more simultaneously.Embodiments herein is to nothing
Used frequency spectrum resource is without limitation between line access equipment and terminal.
Optionally, system 100 shown in FIG. 1 can be applied to 5G network and other following possible networks, the application
Embodiment is not especially limited this.
Wherein, system 100 shown in FIG. 1 is applied to 5G network, then as shown in Fig. 2, for example, above-mentioned session management network element
101 can be the SMF 202 in 5G, and the first network element 102 can be the UPF 208 in 5G.Optionally, the terminal that front occurs can
Think that the UE 209 in 5G, data network can be the DN 207 in 5G.
Fig. 2 shows a scene figures of application the embodiment of the present application.As shown in Fig. 2, the system 200 includes: session pipe
Reason function device (Session Management Function, SMF) 202 (can correspond to the session management network element in Fig. 1
101), user plane functions equipment (User Plane Function, UPF) 208 (can correspond to the first network element 102 in Fig. 1).
Optionally, system 200 further include: AMF 201, wireless access network RAN203, authentication server function device
(Authentication Server Function, AUSF) 204, uniform data management equipment (Unified Data
Management, UDM) 205,206, data network policy control functions equipment (Policy Control function, PCF)
(Data Network, DN) 207,209, application function (Application user equipment (User Equipment, UE)
Function, AF) 210.Wherein, UE 209 is connect by N1 interface with AMF 201, and UE 209 passes through wireless heterogeneous networks
(Radio Resource Control, RRC) agreement is connect with RAN 203;RAN 203 is connect by N2 interface with AMF 201,
RAN 203 is connect by N3 interface with UPF 208;It is connected between multiple UPF 208 by N9 interface, UPF 208 is connect by N6
Mouth is connect with DN 207, meanwhile, UPF 208 is connect by N4 interface with SMF 202;SMF 202 passes through N7 interface and PCF 206
Connection, SMF 202 are connect by N20 interface with UDM 205, meanwhile, SMF 202 is connect by N11 interface with AMF 201;It is more
It is connected between a AMF 201 by N14 interface, AMF 201 is connect by N8 interface with UDM 205, and AMF 201 is connect by N12
Mouth is connect with AUSF 204, meanwhile, AMF 201 is connect by N15 interface with PCF 206;AUSF 204 by N13 interface with
The connection of UDM 205.AMF 201 and SMF 202 obtains user contracting data from UDM 205 by N8 and N20 interface respectively, passes through
N15 and N7 interface is from 206 acquisition strategy data of PCF;AF 210 is connect by N5 interface with PCF 206.SMF 202 passes through N4
Interface Controller UPF 208.Specifically, data network DN 207 may include exchange network and server.
Optionally, the UE 209 in Fig. 2 can be applicable to relaying Relay UE scene.For example, if being in UE 209
Relay UE, then may be connect behind UE 209 one or more distal end Remote UE (including the Remote UE1 in Fig. 2,
Remote UE2 ... Remote UEn), i.e., the one or more Remote UE and Relay UE have communication connection relationship.
It should be noted that the interface name between each network element in Fig. 2 is an example, interface in specific implementation
Name may be other names, and the embodiment of the present application is not especially limited this.
It should be noted that the name for each network element (such as SMF 202, AF210, UPF208 etc.) for including in Fig. 2 is only
It is a name, name does not constitute restriction to the function of network element itself.It is above-mentioned each in 5G network and following other networks
A network element is also possible to other names, and the embodiment of the present application is not especially limited this.For example, in 6G network, it is above-mentioned each
The term in 5G can be continued to use some or all of in a network element, it is also possible to which other names, etc. carry out unified say herein
It is bright, it repeats no more below.
The specific work process and beneficial effect of network element may refer in hereafter embodiment of the method in Fig. 1 and Fig. 2 system
Description.
Fig. 3 shows the signal of the communication equipment 300 (or device of switching user's veil member) using the embodiment of the present application
Property block diagram.Session management network element 101 in above-mentioned Fig. 1, the first network element 102 (including target user's veil member or intermediate user face
Network element) or source user veil member can be realized by the mode of the communication equipment in Fig. 3.
As shown in figure 3, the communication equipment 300 includes: processor 301, memory 302 and transceiver 303.Optionally, it receives
Hair device 303 also may include receiver and transmitter, and receiver is for realizing receive capabilities, and transmitter is for realizing transmission function
Can, this is not construed as limiting.
It is communicated with each other between processor 301, memory 302 and transceiver 303 by internal connecting path, transmitting control
And/or message.
It is understood that computer equipment 300 can also include other devices, such as input dress although not showing that
It sets, output device, battery etc..
Optionally, in some embodiments, memory 302 can store holding for the method for executing the embodiment of the present application
Row instruction.Processor 301 can execute the instruction stored in memory 302 and complete in conjunction with other hardware (such as transceiver 303)
The step of method shown below executes, specific work process and beneficial effect may refer to the description in hereafter embodiment of the method.
The method that above-mentioned the embodiment of the present application discloses can be applied in processor, or be realized by processor.Processor
It may be a kind of IC chip, the processing capacity with signal.During realization, each step of above method embodiment
It can be completed by the integrated logic circuit of the hardware in processor or the instruction of software form.Above-mentioned processor can be
General processor, digital signal processor (Digital Signal Processor, DSP), specific integrated circuit
(Application Specific Integrated Circuit, ASIC), field programmable gate array (Field
Programmable Gate Array, FPGA) either other programmable logic device, discrete gate or transistor logic,
Discrete hardware components can also be System on Chip/SoC (system on chip, SoC), can also be central processing unit (central
Processor unit, CPU), it can also be network processing unit (network processor, NP), can also be digital signal
Processing circuit (digital signal processor, DSP), can also be microcontroller (micro controller
Unit, MCU), it can also be programmable controller (programmable logic device, PLD) or other integrated chips.
It may be implemented or execute disclosed each method, step and the logic diagram in the embodiment of the present application.General processor can be
Microprocessor or the processor are also possible to any conventional processor etc..The method in conjunction with disclosed in the embodiment of the present application
Step can be embodied directly in hardware decoding processor and execute completion, or with the hardware and software module group in decoding processor
Conjunction executes completion.Software module can be located at random access memory, flash memory, read-only memory, programmable read only memory or electricity
In the storage medium of this fields such as erasable programmable memory, register maturation.The storage medium is located at memory, processor
The step of reading the information in memory, completing the above method in conjunction with its hardware.
It is appreciated that the memory in the embodiment of the present application can be volatile memory or nonvolatile memory, or
It may include both volatile and non-volatile memories.Wherein, nonvolatile memory can be read-only memory (Read-
Only Memory, ROM), programmable read only memory (Programmable ROM, PROM), the read-only storage of erasable programmable
Device (Erasable PROM, EPROM), electrically erasable programmable read-only memory (Electrically EPROM, EEPROM) or
Flash memory.Volatile memory can be random access memory (Random Access Memory, RAM), be used as external high
Speed caching.By exemplary but be not restricted explanation, the RAM of many forms is available, such as static random access memory
(Static RAM, SRAM), dynamic random access memory (Dynamic RAM, DRAM), Synchronous Dynamic Random Access Memory
(Synchronous DRAM, SDRAM), double data speed synchronous dynamic RAM (Double Data Rate
SDRAM, DDR SDRAM), enhanced Synchronous Dynamic Random Access Memory (Enhanced SDRAM, ESDRAM), synchronized links
Dynamic random access memory (Synchlink DRAM, SLDRAM) and direct rambus random access memory (Direct
Rambus RAM, DR RAM).It should be noted that the memory of system and method described herein be intended to include but be not limited to these and
The memory of any other suitable type.
Above-mentioned communication equipment 300 can be a general purpose computing device either dedicated computing machine equipment.?
In the specific implementation, communication equipment 300 can be desktop computer, portable computer, network server, palm PC (Personal
Digital Assistant, PDA), cell phone, tablet computer, wireless terminal device, communication equipment, embedded device or have
The equipment of similar structures in Fig. 3.The embodiment of the present application does not limit the type of communication equipment 300.
Fig. 4 shows the schematic flow chart of the method 400 of switching user's veil member of the application one embodiment.It is described
Method 400 is applied in Ethernet session context, as shown in figure 4, the method 400 includes:
S410, session management network element determine that user's veil member of Ethernet session needs gravity treatment, wherein need the use of gravity treatment
Family veil member is the source user veil member of the Ethernet session.
It specifically, is the scene of Ethernet session for conversation type, session management network element can be with decision Ethernet session
User veil first (such as anchor point UPF) need gravity treatment.Session management network element is the original of Ethernet session gravity treatment user veil member
It is many because having, such as can be one or more in following: movement has occurred in terminal, optimizes the transmission path of message, application
Gravity treatment instruction that side network element or PCF are sent etc., but it is also not necessarily limited to these.For example, being passed in the moving process of terminal in order to optimize
Defeated path, overcomes a wide range of mobile bring path detour problem, and session management network element can be with decision by the Ethernet meeting of terminal
User's veil member of words is switched to target user's veil member from source user veil member, to adapt to the communication requirement of terminal.
Here, in Ethernet session context, terminal is passed through in source user veil member and data network using MAC Address
Server realizes communication.
S420, the session management network element send packet check instruction to the first network element, so that the reception of the first network element comes from
The packet check of session management network element indicates.Packet check instruction be used to indicate first network element detect it is described with
Too the downlink message of net session when notify the session management network element, wherein first network element includes target user veil member
Or intermediate user veil member, target user's veil member are user's veil members for the Ethernet session gravity treatment.
Optionally, if the Ethernet session corresponds to multiple media access control MAC Address, the packet check instruction tool
Body is used to indicate first network element and notifies the session management when detecting the corresponding downlink message of the multiple MAC Address
Network element.
Optionally, first network element can be target user's veil member, be also possible to intermediate user veil member.It is optional
Ground, in the case where the first network element is that intermediate user veil is first, intermediate user veil member can be binding node, and (for example RAN is set
It is standby) or branch node BP.
Optionally, if the first network element is target user's veil member, target user's veil member is based on the packet check and refers to
Show, the session management network element is notified when detecting the downlink message of the Ethernet session.
Optionally, if the first network element is intermediate user veil member, intermediate user veil member is based on the packet check and refers to
Show, the session management network element is notified when detecting the downlink message of the Ethernet session.
S430, first network element send the first notification information, first notification information to the session management network element
For notifying first network element to detect the downlink message of the Ethernet session to the session management network element.Accordingly,
The session management network element receives first notification information from first network element.
For example, target user's veil member is the case where detecting the downlink message for the Ethernet session for being sent to terminal
Under, Xiang Suoshu session management network element sends the first notification information.For another example, intermediate user veil member is being detected from target use
In the case where the downlink message of the Ethernet session of family veil member, Xiang Suoshu session management network element sends the first notice letter
Breath.
Further, session management network element determines the Layer2 switching of data network after receiving above-mentioned first notification information
Target user's veil member is had converged to, then sends the second notification information to the source user veil member.
Alternatively, optionally, session management network element does not issue detection instruction to the first network element, but opens first timer,
In the overdue situation of first timer, the second notification information is issued to source user veil member, so that source user veil member discharges
Resource.
S440, the session management network element send the second notification information, second notice to the source user veil member
Information is used to indicate the source user veil member release resource.Accordingly, the source user veil member, which receives, comes from the session
Second notification information of managed network element, and discharge resource.Optionally, the resource of the source user veil member release includes tunnel
The information such as road resource or routing rule, the embodiment of the present application are not construed as limiting this.
Alternatively, optionally, session management network element does not need to send the second notification information to source user veil member, is receiving the
In the case where one notification information, a timer (such as second timer) is opened, when second timer expires, source of release is used
The resource of family veil member.Here, the purpose for opening second timer is: switching user's veil member for terminal and sets aside some time, makes
It obtains Ethernet session and realizes seamless switching.
Specifically, session management network element determines that user's veil member of Ethernet session needs gravity treatment, wherein need gravity treatment
User's veil member be the Ethernet session source user veil member, then send packet check instruction to the first network element, make
It obtains the first network element and notifies the session management network element when detecting the downlink message of the Ethernet session.First network element is being examined
The first notification information is sent to session management network element when measuring the downlink message of the Ethernet session.Session management network element is being received
To after the first notification information, the second notification information can be sent to source user veil member, so that source user veil member discharges as early as possible
Resource.In this way, the method for switching user's veil member of the embodiment of the present application, session management network element are not needed through Ethernet session
MAC Address continue to use the scheme for switching user's veil member in IP session context, but by downward message detection instruction, and receiving
The second notification information is sent to source user veil member when to the first notification information from the first network element, to realize Ethernet session
The switching of user's veil member in scene.Terminal and server in the realization switching method of IP address is distributed in IP session context
Need to perceive the variation of IP address, the method for switching user's veil member of the embodiment of the present application is not needed through user's veil member
IP address realize the switching of user's veil member, but session management network element executes the switching of user's veil member.Session management
Network element by target user veil member or the detection instruction of intermediate user veil member downward message so that target user's veil member or
Intermediate user veil member after the downlink message for detecting Ethernet session to the first notification information of session management reported by network elements, from
And session management network element sends the information of release resource to source user veil member, on the one hand, do not need terminal and server and appoint
What cooperates, and the seamless switching of terminal and server unaware may be implemented;On the other hand, industry during switching user's veil member
Business is continuously, to will not influence the normal communication of business.
The situation that the first network element is target user's veil member or intermediate user veil member is described more fully below.
Situation one:
First network element is target user's veil member, wherein the packet check instruction is specifically used for instruction institute
It states target user's veil member and notifies the session management network element when detecting the downlink message of the Ethernet session.
In situation one, target user's veil member during the switching user veil of Ethernet session context is first from close
Key effect.In other words, intermediate user veil member can not be needed in situation one, (do not need the situation of intermediate user veil member
Can be understood as target user's veil member and the conjunction of intermediate user veil member set), session management network element issues packet check instruction
Give target user veil member so that target user's veil member reported when detecting the downlink message of the Ethernet session it is described
Session management network element.
Optionally, in situation one, the method 400 further include: the session management network element determines the target user
Veil member.
For example, session management network element can be according to position selection target user's veil of terminal.For example, if terminal
Path detour also will cause, then session management network element can be by source user veil member and server communication after moving
The nearest selection target user veil member of terminal, to realize the communication of terminal and server.Alternatively, session management network element can be based on
Other factors selection target user veil member, such as factors, the embodiment of the present application such as load of source user veil member do not make this
It limits.
Further, session management network element can notify target user's veil member to establish user face resource.Specifically for example, meeting
Words managed network element issues user face to target user's veil member and establishes message, and the user face establishes message and is used to indicate the mesh
Mark user's veil member establishes user face resource;Accordingly, target user's veil member sends response message to session management network element, should
Response message indicates that target user's veil member completes the foundation of user face.Optionally, the packet check instruction can be carried on
The user face is established in message, is also possible to individually issue, the embodiment of the present application is not construed as limiting this.
Optionally, message is established in the user face can also carry letter needed for target user's veil member establishes tunnel
Breath, can specifically include: information needed for establishing the source user veil member to the tunnel between target user's veil member,
Information needed for establishing the tunnel between target user's veil member and access network equipment.Optionally, the user face is established
Message can also include other content, for example, service quality (Quality of Service, Qos) is regular, the letter such as charging regulation
Breath, the embodiment of the present application are not construed as limiting this.
Optionally, in situation one, the method 400 further include:
The session management network element sends first routing rule, the first routing rule to target user's veil member
It is used to indicate target user's veil member and the uplink message from the Ethernet session is sent to data network.It is optional
Ground, the first routing rule are also used to indicate that target user's veil member is received and use from the data network and the source
The downlink message of the Ethernet session of family veil member.Optionally, the first routing rule can be carried on the user
Face is established in message, is also possible to individually issue, the embodiment of the present application is not construed as limiting this.
Accordingly, target user's veil member receives the first routing rule from the session management network element.It is described
Target user's veil member is sent to the number according to the first routing rule, by the uplink message from the Ethernet session
According to network, and receive the downlink message of the Ethernet session from the data network and source user veil member.
It should be noted that the uplink message of the Ethernet session is i.e.: the uplink message of the Ethernet session of terminal.Into
The case where one step, there are multiple MAC Address for Ethernet session, the terminal is Relay terminal.That is, this Shen
Please embodiment can also be applied to Fig. 2 in Relay UE scene.Specifically that is, multiple Remote UE pass through the PDU of Relay UE
Session accesses network, therefore the PDU session for Relay UE, corresponding multiple MAC Address are respectively each Remote UE
MAC Address.
Specifically, session management network element can issue first routing rule to target user's veil member, wherein the first via
Target user's veil member is indicated to the uplink message of Ethernet session and the treatment principle of downlink message by rule.For upper
The uplink message of the Ethernet session of terminal can be sent to data network by row, target user's veil member;For
Downlink, target user's veil member receive the Ethernet session from the data network and source user veil member
Downlink message, it is possible to further which the downlink message of the received Ethernet session is sent to terminal.
Optionally, above-mentioned data network can be the DN 207 in Fig. 2 in 5G.The data network be mobile network it
Outer public network, for example with the server of UE communication etc., be respectively positioned in data network.The data network by N6 interface with
User's veil member connects (for example the DN 207 in Fig. 2 is connected with UPF 208), it is believed that N6 interface has phase at user's veil member
The forward rule information answered, when the uplink message of the Ethernet session reaches user's veil member, user's veil member can root
Message is sent to data network according to the forward rule, a certain server that can be specifically sent in data network
Deng.It should be understood that data network may evolve into other terms with similar functions or effect in future network (such as 6G), but
It is equally applicable to the scheme of the embodiment of the present application, this is not construed as limiting.Optionally, the data network may include exchange network
And server, this is not construed as limiting.
Optionally, the first routing rule in specific implementation can be there are many implementation.For example, the first via is by advising
It then may include filtering rule and forward rule, wherein filtering rule for being filtered to received message, use by forward rule
It is forwarded in filtered message.That is object of the filtering rule for specifying forward rule to be applicable in, such as filtering rule
Indicate that corresponding message is the uplink message of the Ethernet session sent from access network node (such as RAN), forwarding rule
It is then that the corresponding message of filtering rule is transmitted to data network.It should be understood that as long as the rule that session management network element issues has
The function or effect of above-mentioned first routing rule, each fall within the protection scope of the embodiment of the present application.
Optionally, in situation one, the method 400 further include:
The session management network element sends the first tunnel information to access network node, and first tunnel information is for described
Access network node establishes the tunnel between target user's veil member.Accordingly, the access network node is according to described
One tunnel information establishes the tunnel (bidirectional tunnel) between target user's veil member.In this way, target user's veil member can
To receive the end from the access network node by the tunnel between the access network node and target user's veil member
The uplink message of the Ethernet session at end.
The session management network element sends the second tunnel information to the source user veil member, and second tunnel information is used
In establishing the source user veil member to the tunnel of target user's veil member.Accordingly, the source user veil member according to
Second tunnel information establishes the source user veil member to the tunnel (unidirectional tunnel) of target user's veil member.This
In, target user's veil member can be come from by the source user veil member to the tunnel of target user's veil member, reception
The downlink message of the Ethernet session of source user veil member.
Further, session management network element is also based on above-mentioned first tunnel information and the second tunnel information, to ether
The message transmissions path of net session is updated.
Therefore, in above situation one, session management network element is indicated by detecting to target user's veil member downward message,
So that target user's veil member reports session management network element when detecting the downlink message of Ethernet session, help to realize with
The switching or gravity treatment of user's veil member too in net session context.
Situation two:
First network element is intermediate user veil member, wherein the packet check instruction, which has, to be used to indicate in described
Between user's veil member notify institute when detecting the downlink message of the Ethernet session from target user's veil member
State session management network element.
In situation two, intermediate user veil member during the switching user veil of Ethernet session context is first from close
Key effect.Intermediate user veil member and target user's veil member can coexist (alternatively, it can be appreciated that target user's veil member
It is set with the non-conjunction of intermediate user veil member).Packet check instruction is handed down to intermediate user veil member by session management network element, so that in
Between user's veil member the session management network element is reported when detecting the downlink message of the Ethernet session.
Optionally, there may also be the session management network elements to determine target user's veil member in situation two.Specifically
Mode may refer to the description in situation one, for sake of simplicity, not repeating here.
Optionally, the session management network element is also based on terminal location and determines intermediate user veil member, specifically can be with
Referring to the method for determining intermediate user veil member in the prior art.
Optionally, in situation two, the method 400 further include:
The session management network element sends second routing rule, the second routing rule to the intermediate user veil member
It is used to indicate the intermediate user veil member and the uplink message of the Ethernet session is sent to target user's veil member.
Optionally, the second routing rule be also used to indicate the intermediate user veil member receive from the source user veil member and
The downlink message of the Ethernet session of target user's veil member.
Accordingly, the intermediate user veil member receives the second routing rule from the session management network element.It is described
The uplink message of the Ethernet session is sent to the target and used by intermediate user veil member according to the second routing rule
Family veil member, and receive the downlink of the Ethernet session from the source user veil member and target user's veil member
Message.
Here, the explanation of the uplink message of the Ethernet session may refer to the description in situation one, for sake of simplicity, this
In do not repeat.
Specifically, session management network element can issue second routing rule to intermediate user veil member, wherein the second tunnel
Intermediate user veil member is indicated to the uplink message of Ethernet session and the treatment principle of downlink message by rule.For upper
The uplink message of the Ethernet session of terminal can be sent to the target user face by row, the intermediate user veil member
Network element;For downlink, the intermediate user veil member is received from the source user veil member and target user's veil member
The Ethernet session downlink message, it is possible to further by the downlink message of the received Ethernet session send
To terminal.
Optionally, the second routing rule in specific implementation can be there are many implementation.For example, secondary route is advised
It then may include filtering rule and forward rule.Here, the description of filtering rule and forward rule may refer in situation one
Description, for sake of simplicity, which is not described herein again.It should be understood that as long as the rule that session management network element issues has above-mentioned secondary route
The function or effect of rule, each fall within the protection scope of the embodiment of the present application.
Optionally, in situation two, the method 400 further include:
The session management network element sends tunnel information to the intermediate user veil member, and the tunnel information includes described
Information needed for intermediate user veil member establishes the tunnel between source user veil member, the intermediate user veil member are built
Information needed for tunnel between vertical and described target user's veil member and intermediate user veil member foundation connect with described
Information needed for tunnel between network access node.Accordingly, the intermediate user veil member receives the tunnel information.In described
Between user's veil member according to the tunnel information, tunnel is established with the source user veil member, with target user's veil member
Tunnel is established, and establishes tunnel with the access network node.
Further, session management network element is also based on above-mentioned tunnel information, to the message transmissions road of Ethernet session
Diameter is updated, and specifically may refer to the prior art.
Optionally, the session management network element can send release message to intermediate user veil member, which uses
In instruction intermediate user veil member release resource (including tunnel resource, routing rule etc.).Accordingly, intermediate user veil primitive root
The resource occupied according to release message release intermediate user veil member.
Therefore, in above situation two, session management network element is indicated by detecting to intermediate user veil member downward message,
So that intermediate user veil member reports session management network element when detecting the downlink message of Ethernet session, help to realize with
The switching or gravity treatment of user's veil member too in net session context.Further, by by the message of the Ethernet session of terminal
It is transmitted directly to target user's veil member, so that two layers of forwarding in data network converge to rapidly the first (industry of target user's veil
Business message can trigger two layers of forwarding and quickly update).
(including above situation one and situation two) in the embodiment of the present application, due in subsequent process, the Ethernet of terminal
The uplink message of session is to be sent to server by target user's veil member.Based on mac learning principle, handed in data network
Exchange opportunity in switching network executes mac learning (for example updating MAC forwarding table), in this way, server is sent to the message of terminal,
Two layers of net exchange network will be sent to target user's veil member according to updated MAC forwarding table, so that the needle of data network
Target user is converged to rapidly to the transmission path (being primarily referred to as downlink transmission path, the i.e. path of server to terminal) of terminal
Veil member.
In order to facilitate the understanding of those skilled in the art, some processes of mac learning principle being related to are described below.Ethernet
In scene, the interchanger of the basic principle of message forwarding inquires local mac forwarding table according to the target MAC (Media Access Control) address of message.Wherein,
It may include target MAC (Media Access Control) address and corresponding port information in MAC forwarding table.Mac learning principle is introduced below with reference to Fig. 5.
As shown in Figure 5, comprising: node 1 (address MAC1), node 2 (address MAC2) and node 3 (address MAC3), Yi Jijiao
It changes planes 1 and (is connect by the port 1 of interchanger 1 with node 1, connect by the port 2 of interchanger 1 with the port 4 of interchanger 2, led to
The port 3 for crossing interchanger 1 is connect with the port 6 of interchanger 3), interchanger 2 (is connected by the corresponding port 5 of interchanger 2 with node 2
Connect) and interchanger 3 (being connect by the corresponding port 7 of interchanger 3 with node 3).It should be understood that the port for introducing respective switch is compiled
Number only to facilitate description, not to the embodiment of the present application constitute limit.MAC in original state, all interchangers turns
It delivers as sky, node 1 sends message (ether network packet or data message) to node 2, wherein the source address of data packet is
MAC1, destination address are MAC2 (it should be understood that being only illustrated so that destination address is MAC2 as an example here, not to the application
Embodiment, which is constituted, to be limited, for example, destination address is also possible to MAC3, at this point it is possible to when using similar to destination address as MAC2
Processing mode carry out mac learning).The message reaches interchanger 1.The MAC forwarding table of interchanger 1 is sky, therefore does not have MAC2
Corresponding MAC records (i.e. the target MAC (Media Access Control) address of message).Interchanger 1 executes following two step: step 1, forwarding in MAC
Increase MAC1 (the source MAC of message) relevant record in table, (this step is the base of mac learning to the corresponding port-for-port 1 of MAC1
Plinth, principle it is to be understood that interchanger 1 from the port of interchanger 11 have received source address be MAC1 message, then it is subsequent such as
The destination address that fruit has message is MAC1, then can be reached by the port 1 of interchanger 1, therefore interchanger 1 receives destination address
It for the message of MAC1, should issue from the port of interchanger 11, according to the connection relationship in figure, be issued from the port of interchanger 11,
Node 1 can be reached);Step 2, broadcasting packet, concrete mode are to replicate to message, and the message of duplication is passed through port
2 and port 3 issue, interchanger 2 and interchanger 3 receive the message that interchanger 1 is sent, mac learning be first carried out, and MAC1 is corresponding
Record be stored in respective MAC forwarding table (the same step 1) of concrete operations, then broadcasting packet, message may finally reach node
2.If subsequent node 2 or node 3 have message to be sent to node 1 (it is MAC1 that performance, which is purpose MAC), due to three interchangers
All there is the record of MAC1, therefore interchanger is not necessarily to broadcasting packet, is directly forwarded by inquiring MAC forwarding table.It is logical
Cross above-mentioned process, it is believed that the message that interchanger is issued according to node 1 has learnt two paths, specifically i.e.: interchanger 2- >
Interchanger 1- > node 1;Interchanger 3- > interchanger 1- > node 1.
Optionally, for MAC forwarding table there is also refresh activity, the basis that MAC forwarding table updates is still that above-mentioned mac learning is former
Reason.For example, if subsequent switch 1 receives the report of node 1 from other ports (such as the port 8 of interchanger 1, figure in be not drawn into)
Text, interchanger 1 will execute the update of MAC forwarding table, be port 8 by the corresponding port modifications of MAC1, it may be assumed that be successfully received destination
Location is the message of MAC1, is issued from port 8.The MAC forwarding table refreshing principle of other interchangers is identical as interchanger 1, herein not
It repeats again.
It should be understood that the example in Fig. 5 is only illustratively described mac learning principle, the embodiment of the present application is not constituted
It limits.
Hereinbefore, session management network element is indicated by detecting to the first network element downward message, so that the first network element is being examined
Announcement session managed network element when measuring the downlink message of Ethernet session.Further, session management network element is subsequent to the first net
Member issues routing rule, so that the first network element executes receiving or sending for message according to routing rule.It should be noted that at this
Apply for the transmitting sequence that packet check instruction and routing rule can not be limited in embodiment.That is, session management network element
Routing rule first can be sent to the first network element (including target user's veil member or intermediate user veil member), so that the first network element
According to receiving or sending (before the first network element can be referred to based on the corresponding movement of routing rule execution for routing rule execution message
The description of text, does not repeat here), help to realize the switching of user's veil member.In the case where session management network element is to the first network element
After sending out routing rule, further, session management network element can also give the detection instruction of the first network element downward message.
The method that the embodiment of the present application is described in detail below in conjunction with the example in Fig. 6 and Fig. 7.It should be understood that Fig. 6 and Fig. 7
Example be intended merely to facilitate those skilled in the art understand that the embodiment of the present application, does not really want the embodiment of the present application being limited to example
The concrete scene shown.Those skilled in the art are according to the example of Fig. 6 and Fig. 7, it is clear that can carry out the modification or change of various equivalences
Change, such modification or variation are also fallen into the range of the embodiment of the present application.In following example, session management network element with
For SMF, by taking UPF1 as an example, target user's veil member is source user veil member with (R) AN by taking UPF2 as an example, with access network node
Example, by taking data network includes exchange network and server as an example, terminal is uniformly illustrated here by taking UE as an example.Optionally, scheme
Example in 6 can also include AMF.In example in figure 6 and figure 7, UE by UPF1 and server realize uplink (UL) or
The communication of downlink (DL) data (data).Fig. 6 is illustrated so that the first network element is UPF2 as an example, as shown in Figure 6, comprising:
601, SMF determine the Ethernet session gravity treatment UPF needed for UE.For example, can be UE gravity treatment based on the movement of UE
UPF。
602, SMF, which initiate user face to UPF2, establishes message.Optionally, user face, which is established in message, can carry message inspection
Instruction is surveyed, the packet check instruction is used to indicate UPF2 and notifies SMF in the downlink message for the Ethernet session for detecting UE.
Optionally, it can also include routing rule in message that user face, which is established, which is used to indicate UPF2 and comes from received
(R) uplink message of the UE of AN is sent directly to exchange network, and receives the downlink message of the UE from UPF1.
603, SMF send UPF gravity treatment notice to (R) AN.It optionally, include that information is established in tunnel in UPF gravity treatment notice.
The tunnel that information is established for (R) AN between UPF2 is established in the tunnel.Specifically, SMF sends UPF gravity treatment notice (i.e. to AMF
AMF plays transfer);AMF sends UPF gravity treatment notice to (R) AN.
604, SMF, which down forward tunnel to UPF1 transmission, establishes notice.It includes being used for that this, which down forwards tunnel and establishes notice,
Information needed for establishing the tunnel between UPF1 to UPF2.
After step 604, the uplink message of the Ethernet session is sent to DN by UPF2.In exchange network, meeting
The mac learning process for executing exchange network, specifically, the downlink message that DN is sent to UE can issue UPF1 before step 604.
Here it is described collectively, the message in present application example can be data, be not construed as limiting to this.After this step, accordingly
Interchanger receive the uplink message of UE, it is found that the message of the Ethernet session is from UPF2, then interchanger updates MAC
Table is practised, is the port being connect with UPF2 by the corresponding port modifications of terminal address in mac learning table.Subsequent switch receives in this way
When downlink message, according to the mac learning table, so that it may which downlink message is issued UPF2.
605, UPF2 send message arrival notice (being equivalent to the first notification information above) to SMF, which reaches logical
Know the downlink message for detecting Ethernet session to SMF notice UPF2.
606, SMF send release notice (being equivalent to the second notification information above) to UPF1, which notifies for referring to
Show that UPF1 discharges resource.
Therefore, in the example of fig. 6, SMF is indicated by detecting to UPF2 downward message, so that UPF2 is detecting ether
SMF is notified when the downlink message of net session.
Fig. 7 be by the first network element be intermediate user veil member I-UPF for be illustrated, as shown in fig. 7, comprises:
701, SMF determine the Ethernet session gravity treatment UPF needed for UE.For example, can be UE gravity treatment based on the movement of UE
UPF。
702, SMF, which initiate user face to UPF2, establishes message.Optionally, user face, which is established in message, can carry message inspection
Instruction is surveyed, the packet check instruction is specifically used for instruction UPF2 notice in the downlink message for the Ethernet session for detecting UE
SMF.Optionally, user face, which is established in message, to include routing rule, which is used to indicate UPF2 will be received
The uplink message of UE from (R) AN is sent directly to exchange network, and receives the downlink message of the UE from UPF1.
703, SMF, which send N3UPF (the specific intermediate UPF accessed by N3 interface) to I-UPF, establishes message, should
N3UPF, which establishes message and is used to indicate I-UPF, establishes user face resource.Wherein, which, which establishes message, can carry packet check
Instruction, packet check instruction are specifically used for instruction I-UPF and report SMF when detecting the downlink message of Ethernet session.It can
Selection of land, it can also include routing rule which, which establishes message, which is used to indicate I-UPF for Ethernet session
Uplink message is sent to UPF2, and receives the downlink message of the Ethernet session from UPF1 and UPF2.Optionally, should
It can also include tunnel information that N3UPF, which establishes message, which includes that I-UPF is established needed for the tunnel between UPF1
Information, information needed for I-UPF establishes the tunnel between UPF2 and I-UPF are established needed for the tunnel between (R) AN
Information.
704, execution route updates.
Specifically, SMF is interacted with UPF1, in order to establish the tunnel between UPF1 and I-UPF;SMF and UPF2
It interacts, in order to establish the tunnel between UPF2 and I-UPF;SMF is interacted with (R) AN, in order to establish (R) AN with
Tunnel between I-UPF.
After step 704, in exchange network, need to carry out the mac learning and MAC forwarding table renewal process of Layer2 switching
(description after may refer to the associated description of mac learning principle above, such as above-mentioned steps 604) is specific that is, DN is sent to UE's
Downlink message can issue UPF1 (specifically, downlink message is sent to UE by I-UPF by UPF1).After this step, accordingly
Interchanger receive the uplink message of UE, it is found that the message of the Ethernet session is that (specifically I-UPF is received from I-UPF
UPF2's), then interchanger updates mac learning table, is to connect with I-UPF by the corresponding port modifications of terminal address in mac learning table
The port connect.When subsequent switch receives downlink message in this way, according to the mac learning table, so that it may which downlink message is issued I-
Received downlink message can be sent to UPF2 by UPF, further, I-UPF.
Then, following scheme one or scheme two can also be performed.For example, being taken if the N3UPF in step 703 is established in message
Band packet check indicates, then can carry into execution a plan one;Alternatively, if the user face in step 702, which is established in message, carries message inspection
Instruction is surveyed, then can carry into execution a plan two.
Scheme one: 7501, I-UPF receive the downlink message of the Ethernet session of UPF2 transmission.
7502, I-UPF send notification information 1 to SMF.The notification information 1 is used to detect ether to SMF notice I-UPF
The downlink message of net session.
Scheme two: 7501, UPF2 receive the downlink message of the Ethernet session of UE.
7502, UPF2 send notification information 2 to SMF.The notification information 2 is used to detect Ethernet to SMF notice UPF2
The downlink message of session.
After executing above scheme one or scheme two, step 706 can be executed, SMF sends release notice to UPF1, should
Release notice is used to indicate UPF1 release resource.
Therefore, in the example of fig. 7, SMF by I-UPF downward message detect indicate so that I-UPF detect with
Too the downlink message of net session when notify SMF.Alternatively, SMF is indicated by detecting to UPF2 downward message, so that UPF2 is being detected
To Ethernet session downlink message when notify SMF.
It should be understood that each scheme of the embodiment of the present application can be applied in combination, and each term occurred in embodiment
Explanation or explanation can refer to or explain mutually in various embodiments, this is not construed as limiting.
The method that switching user's veil member according to the embodiment of the present application is described in detail above in association with Fig. 1 to Fig. 7.Below
Fig. 8 to Figure 11 description will be combined according to the device of switching user's veil member of the embodiment of the present application.It should be understood that embodiment of the method institute
The technical characteristic of description is equally applicable to following Installation practice.
Fig. 8 shows the schematic block diagram of the device 800 of switching user's veil member according to the embodiment of the present application.It is optional
Ground, the specific form of described device 800 can be the chip in general purpose computing device or general purpose computing device, and the application is real
It applies example and this is not construed as limiting.Described device 800 is session management network element, and described device is applied in Ethernet session context, institute
Stating device 800 includes:
Determining module 810, for determining that user's veil member of Ethernet session needs gravity treatment, wherein need the use of gravity treatment
Family veil member is the source user veil member of the Ethernet session;
Transceiver module 820, for sending packet check instruction to the first network element, the packet check instruction is used to indicate institute
It states the first network element and notifies the session management network element when detecting the downlink message of the Ethernet session, wherein described
One network element includes target user's veil member or intermediate user veil member, and target user's veil member is for the Ethernet session
User's veil member of gravity treatment;
The transceiver module 820 is also used to receive the first notification information from first network element, first notice
Information is used to notify first network element to detect the downlink message of the Ethernet session to the session management network element;
The transceiver module 820 is also used to send the second notification information, second notice to the source user veil member
Information is used to indicate the source user veil member release resource.
Optionally, if the Ethernet session corresponds to multiple media access control MAC Address, the packet check instruction tool
Body is used to indicate first network element and notifies the session management when detecting the corresponding downlink message of the multiple MAC Address
Network element.
In one possible implementation, first network element is target user's veil member, the packet check
Described in indicating that be specifically used for instruction target user's veil member notifies when detecting the downlink message of the Ethernet session
Session management network element.
Optionally, the determining module 810 is also used to: determining target user's veil member.
Optionally, the transceiver module 820 is also used to:
First routing rule is sent to target user's veil member, the first routing rule is used to indicate the target
Uplink message from the Ethernet session is sent to data network by user's veil member.
Optionally, the transceiver module 820 is also used to:
To access network node send the first tunnel information, first tunnel information for the access network node establish with
Tunnel between target user's veil member;
The second tunnel information is sent to the source user veil member, second tunnel information is for establishing the source user
Veil member is to the tunnel of target user's veil member.
In one possible implementation, first network element is intermediate user veil member, wherein the packet check
Instruction is specifically used for indicating that the intermediate user veil member is detecting the Ethernet from target user's veil member
The session management network element is notified when the downlink message of session.
Optionally, the transceiver module 820 is also used to:
Second routing rule is sent to the intermediate user veil member, the second routing rule is used to indicate the centre
The uplink message of the Ethernet session is sent to target user's veil member by user's veil member.
Optionally, the transceiver module 820 is also used to:
Tunnel information is sent to the intermediate user veil member, the tunnel information includes that the intermediate user veil member is built
Information needed for tunnel between the vertical and described source user veil member, the intermediate user veil member are established and the target user
Information needed for tunnel between veil member and the intermediate user veil member establish the tunnel between the access network node
Information needed for road.
Alternatively, another embodiment can also be performed in described device 800, specifically i.e.:
Determining module 810, for determining that user's veil member of Ethernet session needs gravity treatment, wherein need the use of gravity treatment
Family veil member is the source user veil member of the Ethernet session;
The determining module 810 is also used to determine intermediate user veil member;
Transceiver module 820, for sending routing rule to the intermediate user veil member, the routing rule is used to indicate
The uplink message of the Ethernet session is sent to target user's veil member by the intermediate user veil member, and is used to indicate
The intermediate user veil member receives the Ethernet meeting from the source user veil member and target user's veil member
The downlink message of words, wherein target user's veil member is user's veil member for the Ethernet session gravity treatment.
Alternatively, another embodiment can also be performed in described device 800, specifically i.e.:
Determining module 810, for determining that user's veil member of Ethernet session needs gravity treatment, wherein need the use of gravity treatment
Family veil member is the source user veil member of the Ethernet session;
The determining module 810, be also used to determine target user's veil member, target user's veil member be for it is described with
Too user's veil member of net session gravity treatment;
Transceiver module 820, for sending routing rule to target user's veil member, the routing rule is used to indicate
Uplink message from the Ethernet session is sent to data network by target user's veil member, and is used to indicate institute
State the downlink that target user's veil member receives the Ethernet session from the data network and source user veil member
Message.
Implement it should be understood that can correspond to preceding method according to the device 800 of switching user's veil member of the embodiment of the present application
The method of session management network element in example, and above and other management operation and/or function of the modules in device 800 point
Not in order to realize the corresponding steps of the method for session management network element in preceding method embodiment, therefore preceding method also may be implemented
Beneficial effect in embodiment, for sake of simplicity, not repeating here.
It should also be understood that in the present embodiment, device 800 is presented in the form of functional module.Here " module " can
To refer to application-specific integrated circuit ASIC, circuit, processor and memory, the collection for executing one or more softwares or firmware program
At logic circuit and/or other device of above-mentioned function can be provided.In a simple embodiment, the technology of this field
Personnel are contemplated that device 800 can use form shown in Fig. 3.Determining module 810 can pass through processor shown in Fig. 3
301 and memory 302 realize.Transceiver module 820 can be realized by transceiver 303 shown in Fig. 3.Specifically, processing
Device is realized by executing the computer program stored in memory.Optionally, when described device 800 is chip, then receiving
It sends out the function of module 820 and/or realizes that process can also be realized by pin or circuit etc..Optionally, the memory is
Storage unit in the chip, such as register, caching etc., the storage unit can also be in the computer equipment
Positioned at the storage unit of the chip exterior, as Fig. 3 memory 302.Those of ordinary skill in the art may be aware that knot
Each exemplary unit and algorithm steps for closing the embodiments described herein description, can be with electronic hardware or computer
The combination of software and electronic hardware is realized.These functions are implemented in hardware or software actually, depend on technical side
The specific application and design constraint of case.Professional technician can carry out each specific application to come using distinct methods real
Existing described function, but this realization is it is not considered that exceed scope of the present application.
Fig. 9 shows the schematic block diagram of the device 900 of switching user's veil member according to the embodiment of the present application.It is optional
Ground, the specific form of described device 900 can be the chip in general purpose computing device or general purpose computing device, and the application is real
It applies example and this is not construed as limiting.Described device 900 is the first network element, and described device is applied in Ethernet session context, the dress
Setting 900 includes:
Receiving module 910, for receiving the packet check instruction from session management network element, the packet check instruction is used
The session management network element is notified when detecting the downlink message of Ethernet session in instruction first network element, wherein institute
Stating the first network element includes target user veil member or intermediate user veil member, wherein target user's veil member be described
User's veil member of Ethernet session gravity treatment;
Sending module 920, for sending the first notification information to the session management network element, first notification information is used
In notifying first network element to detect the downlink message of the Ethernet session to the session management network element.
In one possible implementation, first network element is target user's veil member, the packet check
Described in indicating that be specifically used for instruction target user's veil member notifies when detecting the downlink message of the Ethernet session
Session management network element.
Optionally, if the Ethernet session corresponds to multiple media access control MAC Address, the packet check instruction tool
Body is used to indicate target user's veil member and notifies the meeting when detecting the corresponding downlink message of the multiple MAC Address
Talk about managed network element.
Optionally, the receiving module 910 is also used to:
The first routing rule from the session management network element is received, the first routing rule is used to indicate the mesh
It marks user's veil member and the uplink message from the Ethernet session is sent to data network;
Correspondingly, the sending module 920 is also used to: being based on the first routing rule, the Ethernet meeting will be come from
The uplink message of words is sent to the data network.
Further, the first routing rule is also used to indicate that target user's veil member is received from the data
The downlink message of the Ethernet session of network and source user veil member;The transceiver module 910 is also used to based on institute
First routing rule is stated, the downlink report of the Ethernet session from the data network and source user veil member is received
Text.
In one possible implementation, first network element is intermediate user veil member, wherein the packet check
Instruction is specifically used for indicating that the intermediate user veil member is detecting the Ethernet from target user's veil member
The session management network element is notified when the downlink message of session.
Optionally, the receiving module 910 is also used to:
The second routing rule from the session management network element is received, the second routing rule is used to indicate in described
Between user's veil member the uplink message from the Ethernet session is sent to target user's veil member;
Correspondingly, the sending module 920 is also used to: the second routing rule is based on, by the Ethernet session
Uplink message is sent to target user's veil member.
Further, the second routing rule is also used to indicate that the intermediate user veil member is received from source use
The downlink message of the Ethernet session of family veil member and target user's veil member;The transceiver module 910 is also used to,
Based on the second routing rule, the Ethernet from the source user veil member and target user's veil member is received
The downlink message of session.
Optionally, the receiving module 910 is also used to:
The tunnel information from the session management network element is received, the tunnel information includes the intermediate user veil member
Information needed for establishing the tunnel between source user veil member, the intermediate user veil member is established to be used with the target
Information needed for tunnel between the veil member of family and the intermediate user veil member are established between the access network node
Information needed for tunnel;
Described device 900 further include:
Module (not shown) is established, for establishing tunnel with the source user veil member according to the tunnel information,
Tunnel is established with target user's veil member, and establishes tunnel with the access network node.
Implement it should be understood that can correspond to preceding method according to the device 900 of switching user's veil member of the embodiment of the present application
The method of session management network element in example, and above and other management operation and/or function of the modules in device 900 point
Not for the corresponding steps for realizing the method for the first network element in preceding method embodiment, therefore preceding method implementation also may be implemented
Beneficial effect in example, for sake of simplicity, not repeating here.
It should also be understood that in the present embodiment, device 900 is presented in the form of functional module.Here " module " can
To refer to application-specific integrated circuit ASIC, circuit, processor and memory, the collection for executing one or more softwares or firmware program
At logic circuit and/or other device of above-mentioned function can be provided.In a simple embodiment, the technology of this field
Personnel are contemplated that device 900 can use form shown in Fig. 3.Determining module 910 can pass through processor shown in Fig. 3
301 and memory 302 realize.Receiving module 910 and sending module 920 can be by transceivers 303 shown in Fig. 3 come real
It is existing.Specifically, transceiver 303 can specifically include receiver (can correspond to receiving module 910) and transmitter and (can correspond to send out
Send module 920).Specifically, processor is realized by executing the computer program stored in memory.Optionally, when described
When device 900 is chip, then the function and/or realization process of receiving module 910 and sending module 920 can also pass through pin
Or circuit etc. is realized.Optionally, the memory is the storage unit, such as register, caching etc. in the chip, described
Storage unit can also be the storage unit positioned at the chip exterior in the computer equipment, as Fig. 3 memory
302.Those of ordinary skill in the art may be aware that unit described in conjunction with the examples disclosed in the embodiments of the present disclosure and
Algorithm steps can be realized with the combination of electronic hardware or computer software and electronic hardware.These functions are actually with hard
Part or software mode execute, the specific application and design constraint depending on technical solution.Professional technician can be with
Each specific application is used different methods to achieve the described function, but this realization is it is not considered that exceed this Shen
Range please.
Figure 10 shows the schematic block diagram of the device 1000 of switching user's veil member according to the embodiment of the present application.It is optional
Ground, the specific form of described device 1000 can be the chip in general purpose computing device or general purpose computing device, the application
Embodiment is not construed as limiting this.Described device 1000 is intermediate user veil member, and described device is applied to Ethernet session context
In, described device 1000 includes:
Receiving module 1010, for receiving the routing rule from session management network element, the routing rule is used to indicate
The uplink message of Ethernet session is sent to target user's veil member by the intermediate user veil member, and is used to indicate described
The downlink of the Ethernet session of the intermediate user veil member reception from source user veil member and target user's veil member
Message;
The uplink message of the Ethernet session is sent to institute for being based on the routing rule by sending module 1020
Target user's veil member is stated, and receives the Ethernet meeting from the source user veil member and target user's veil member
The downlink message of words.
Optionally, the receiving module 1010 is also used to receive the packet check instruction from session management network element, then
Based on packet check instruction announcement session managed network element when detecting the downlink message of Ethernet session.
Optionally, if the Ethernet session corresponds to multiple media access control MAC Address, the packet check instruction tool
Body is used to indicate the intermediate user veil member and notifies the meeting when detecting the corresponding downlink message of the multiple MAC Address
Talk about managed network element.
Implement it should be understood that can correspond to preceding method according to the device 1000 of switching user's veil member of the embodiment of the present application
The method of session management network element in example, and above and other management operation and/or function of the modules in device 1000
Respectively in order to realize the corresponding steps of the method for intermediate user veil member in preceding method embodiment, therefore also may be implemented aforementioned
Beneficial effect in embodiment of the method, for sake of simplicity, not repeating here.
It should also be understood that in the present embodiment, device 1000 is presented in the form of functional module.Here " module " can
To refer to application-specific integrated circuit ASIC, circuit, processor and memory, the collection for executing one or more softwares or firmware program
At logic circuit and/or other device of above-mentioned function can be provided.In a simple embodiment, the technology of this field
Personnel are contemplated that device 1000 can use form shown in Fig. 3.Receiving module 1010 and sending module 1020 can pass through
Transceiver 303 shown in Fig. 3 is realized.Specifically, transceiver 303, which can specifically include receiver, (can correspond to receiving module
And transmitter (can correspond to sending module 1020) 1010).Specifically, processor is by executing the computer stored in memory
Program is realized.Optionally, when described device 1000 is chip, then the function of receiving module 1010 and sending module 1020
And/or realize that process can also be realized by pin or circuit etc..Optionally, the memory is the storage in the chip
Unit, such as register, caching etc., the storage unit, which can also be in the computer equipment, is located at the chip exterior
Storage unit, as Fig. 3 memory 302.Those of ordinary skill in the art may be aware that in conjunction with disclosed herein
Each exemplary unit and algorithm steps of embodiment description, can be with electronic hardware or computer software and electronic hardware
In conjunction with realizing.These functions are implemented in hardware or software actually, depending on technical solution specific application and set
Count constraint condition.Professional technician can use different methods to achieve the described function each specific application,
But this realization is it is not considered that exceed scope of the present application.
Figure 11 shows the schematic block diagram of the device 1100 of switching user's veil member according to the embodiment of the present application.It is optional
Ground, the specific form of described device 1100 can be the chip in general purpose computing device or general purpose computing device, the application
Embodiment is not construed as limiting this.Described device 1100 is target user's veil member, and described device is applied to Ethernet session context
In, described device 1100 includes:
Receiving module 1110, for receiving the routing rule from session management network element, the routing rule is used to indicate
Uplink message from Ethernet session is sent to data network by target user's veil member, and is used to indicate the mesh
Mark the downlink message that user's veil member receives the Ethernet session from the data network and source user veil member;
Sending module 1120, for being based on the routing rule, by the Ethernet session from access network node
Uplink message is sent to data network, and receives the Ethernet meeting from the data network and source user veil member
The downlink message of words.
Optionally, the receiving module 1110 is also used to receive the packet check instruction from session management network element, then
Based on packet check instruction announcement session managed network element when detecting the downlink message of Ethernet session.
Optionally, if the Ethernet session corresponds to multiple media access control MAC Address, the packet check instruction tool
Body is used to indicate target user's veil member and notifies the meeting when detecting the corresponding downlink message of the multiple MAC Address
Talk about managed network element.
Implement it should be understood that can correspond to preceding method according to the device 1100 of switching user's veil member of the embodiment of the present application
The method of session management network element in example, and above and other management operation and/or function of the modules in device 1100
Respectively in order to realize the corresponding steps of the method for target user's veil member in preceding method embodiment, therefore also may be implemented aforementioned
Beneficial effect in embodiment of the method, for sake of simplicity, not repeating here.
It should also be understood that in the present embodiment, device 1100 is presented in the form of functional module.Here " module " can
To refer to application-specific integrated circuit ASIC, circuit, processor and memory, the collection for executing one or more softwares or firmware program
At logic circuit and/or other device of above-mentioned function can be provided.In a simple embodiment, the technology of this field
Personnel are contemplated that device 1100 can use form shown in Fig. 3.Determining module 1110 can pass through processor shown in Fig. 3
301 and memory 302 realize.Receiving module 1110 and sending module 1120 can be by transceivers 303 shown in Fig. 3 come real
It is existing.Specifically, transceiver 303 can specifically include receiver (can correspond to receiving module 1110) and transmitter and (can correspond to
Sending module 1120).Specifically, processor is realized by executing the computer program stored in memory.Optionally, work as institute
When to state device 1100 be chip, then the function of receiving module 1110 and sending module 1120 and/or realizing that process can also lead to
Pin or circuit etc. are crossed to realize.Optionally, the memory is the storage unit in the chip, such as register, caching
Deng, the storage unit can also be the storage unit positioned at the chip exterior in the computer equipment, as Fig. 3
Memory 302.Those of ordinary skill in the art may be aware that described in conjunction with the examples disclosed in the embodiments of the present disclosure
Unit and algorithm steps can be realized with the combination of electronic hardware or computer software and electronic hardware.These functions are studied carefully
Unexpectedly it is implemented in hardware or software, the specific application and design constraint depending on technical solution.Professional technique people
Member can use different methods to achieve the described function each specific application, but this realization is it is not considered that super
Scope of the present application out.
" project includes at least one of following: the meaning of A, B and C " statement, such as nothing for being similar to of occurring in the application
It illustrates, it can be any of following for typically referring to the project: A;B;C;A and B;A and C;B and C;A, B and C;A and A;A,
A and A;A, A and B;A, A and C, A, B and B;A, C and C;B and B, B, B and B, B, B and C, C and C;C, C and C and other A, B and
The combination of C.It is that totally 3 elements carry out the optional entry of for example bright project with A, B and C above, when being expressed as " project
Including at least one of following: A, B ... ... and when X ", i.e., when there is more multielement in expression, then the project can fit
Entry can also be obtained according to aforementioned rule.Further, in the embodiment of the present application, " multiple " can be understood as " extremely
It is two few ";" multinomial " can be understood as " at least two ".
It should also be understood that magnitude of the sequence numbers of the above procedures are not meant to execute in the various embodiments of the application
Sequence it is successive, the execution of each process sequence should be determined by its function and internal logic, the reality without coping with the embodiment of the present application
It applies process and constitutes any restriction.
It should also be understood that the number " first " occurred in the embodiment of the present application, " second ", are intended merely to distinguish different pairs
As for example, different " notification information " is distinguished, alternatively, different " routing rule " etc. is distinguished, not to the embodiment of the present application structure
At restriction.
Those of ordinary skill in the art may be aware that list described in conjunction with the examples disclosed in the embodiments of the present disclosure
Member and algorithm steps can be realized with the combination of electronic hardware or computer software and electronic hardware.These functions are actually
It is implemented in hardware or software, the specific application and design constraint depending on technical solution.Professional technician
Each specific application can be used different methods to achieve the described function, but this realization is it is not considered that exceed
Scope of the present application.
It is apparent to those skilled in the art that for convenience and simplicity of description, the system of foregoing description,
The specific work process of device and unit, can refer to corresponding processes in the foregoing method embodiment, and details are not described herein.
In several embodiments provided herein, it should be understood that disclosed systems, devices and methods, it can be with
It realizes by another way.For example, the apparatus embodiments described above are merely exemplary, for example, the unit
It divides, only a kind of logical function partition, there may be another division manner in actual implementation, such as multiple units or components
It can be combined or can be integrated into another system, or some features can be ignored or not executed.Another point, it is shown or
The mutual coupling, direct-coupling or communication connection discussed can be through some interfaces, the indirect coupling of device or unit
It closes or communicates to connect, can be electrical property, mechanical or other forms.
The unit as illustrated by the separation member may or may not be physically separated, aobvious as unit
The component shown may or may not be physical unit, it can and it is in one place, or may be distributed over multiple
In network unit.It can select some or all of unit therein according to the actual needs to realize the mesh of this embodiment scheme
's.
It, can also be in addition, each functional unit in each embodiment of the application can integrate in one processing unit
It is that each unit physically exists alone, can also be integrated in one unit with two or more units.
It, can be with if the function is realized in the form of SFU software functional unit and when sold or used as an independent product
It is stored in a computer readable storage medium.Based on this understanding, the technical solution of the application is substantially in other words
The part of the part that contributes to existing technology or the technical solution can be embodied in the form of software products, the meter
Calculation machine software product is stored in a storage medium, including some instructions are used so that a computer equipment (can be a
People's computer, server or network equipment etc.) execute each embodiment the method for the application all or part of the steps.
And storage medium above-mentioned includes: that USB flash disk, mobile hard disk, read-only memory (Read-Only Memory, ROM), arbitrary access are deposited
The various media that can store program code such as reservoir (Random Access Memory, RAM), magnetic or disk.
The above, the only specific embodiment of the application, but the protection scope of the application is not limited thereto, it is any
Those familiar with the art within the technical scope of the present application, can easily think of the change or the replacement, and should all contain
Lid is within the scope of protection of this application.Therefore, the protection scope of the application should be based on the protection scope of the described claims.
Claims (39)
1. a kind of method for switching user's veil member, which is characterized in that the method is applied in Ethernet session context, described
Method includes:
Session management network element determines that user's veil member of Ethernet session needs gravity treatment, wherein needs user's veil member of gravity treatment
It is the source user veil member of the Ethernet session;
The session management network element sends packet check instruction to the first network element, and packet check instruction is used to indicate described the
One network element notifies the session management network element when detecting the downlink message of the Ethernet session, wherein first net
Member includes target user's veil member or intermediate user veil member, and target user's veil member is for the Ethernet session gravity treatment
User veil member;
The session management network element receives the first notification information from first network element, first notification information be used for
The session management network element notifies first network element to detect the downlink message of the Ethernet session;
The session management network element sends the second notification information to the source user veil member, and second notification information is for referring to
Show the source user veil member release resource.
2. the method according to claim 1, wherein first network element is target user's veil member, institute
Packet check instruction is stated to be specifically used for indicating target user's veil member in the downlink message for detecting the Ethernet session
Session management network element described in Shi Tongzhi.
3. according to the method described in claim 2, it is characterized in that, the method also includes:
The session management network element determines target user's veil member.
4. according to the method in claim 2 or 3, which is characterized in that the method also includes:
The session management network element sends first routing rule to target user's veil member, and the first routing rule is used for
Indicate that target user's veil member will be sent to data network from the uplink message of the Ethernet session.
5. according to the method described in claim 4, it is characterized in that, the first routing rule is also used to indicate that the target is used
The downlink message of the Ethernet session of the veil member reception in family from the data network and source user veil member.
6. method according to claim 4 or 5, which is characterized in that the method also includes:
The session management network element sends the first tunnel information to access network node, and first tunnel information is used for the access
Net node establishes the tunnel between target user's veil member;
The session management network element sends the second tunnel information to the source user veil member, and second tunnel information is for building
The source user veil member is found to the tunnel of target user's veil member.
7. the method according to claim 1, wherein first network element is intermediate user veil member, wherein institute
Packet check instruction is stated to be specifically used for indicating that the intermediate user veil member is being detected from target user's veil member
The session management network element is notified when the downlink message of the Ethernet session.
8. the method according to the description of claim 7 is characterized in that the method also includes:
The session management network element sends second routing rule to the intermediate user veil member, and the second routing rule is used for
Indicate that the uplink message of the Ethernet session is sent to target user's veil member by the intermediate user veil member.
9. according to the method described in claim 8, it is characterized in that, the second routing rule is also used to indicate the intermediate use
The downlink report of the Ethernet session of the veil member reception in family from the source user veil member and target user's veil member
Text.
10. method according to claim 8 or claim 9, which is characterized in that the method also includes:
The session management network element sends tunnel information to the intermediate user veil member, and the tunnel information includes the centre
Information needed for user's veil member establishes the tunnel between source user veil member, the intermediate user veil member establish with
Information needed for tunnel between target user's veil member and the intermediate user veil member are established and the access net
Information needed for tunnel between node.
11. method according to any one of claim 1 to 10, which is characterized in that if Ethernet session correspondence is more
A media access control MAC Address, packet check instruction be specifically used for indicating first network element detect it is described more
The session management network element is notified when the corresponding downlink message of a MAC Address.
12. a kind of method for switching user's veil member, which is characterized in that the method is applied in Ethernet session context, institute
The method of stating includes:
Session management network element determines that user's veil member of Ethernet session needs gravity treatment, wherein needs user's veil member of gravity treatment
It is the source user veil member of the Ethernet session;
The session management network element determines intermediate user veil member;
The session management network element sends routing rule to the intermediate user veil member, and the routing rule is used to indicate described
The uplink message of the Ethernet session is sent to target user's veil member by intermediate user veil member, and is used to indicate described
Intermediate user veil member receives the Ethernet session from the source user veil member and target user's veil member
Downlink message, wherein target user's veil member is user's veil member for the Ethernet session gravity treatment.
13. a kind of method for switching user's veil member, which is characterized in that the method is applied in Ethernet session context, institute
The method of stating includes:
Session management network element determines that user's veil member of Ethernet session needs gravity treatment, wherein needs user's veil member of gravity treatment
It is the source user veil member of the Ethernet session;
The session management network element determines target user's veil member, and target user's veil member is for the Ethernet session weight
User's veil member of choosing;
The session management network element sends routing rule to target user's veil member, and the routing rule is used to indicate described
Uplink message from the Ethernet session is sent to data network by target user's veil member, and is used to indicate the mesh
Mark the downlink message that user's veil member receives the Ethernet session from the data network and source user veil member.
14. a kind of method for switching user's veil member, which is characterized in that the method is applied in Ethernet session context, institute
The method of stating includes:
First network element receives the packet check instruction from session management network element, and packet check instruction is used to indicate described the
One network element notifies the session management network element when detecting the downlink message of Ethernet session, wherein the first network element packet
Include target user's veil member or intermediate user veil member, wherein target user's veil member is for the Ethernet session weight
User's veil member of choosing;
First network element sends the first notification information to the session management network element, and first notification information is used for described
Session management network element notifies first network element to detect the downlink message of the Ethernet session.
15. according to the method for claim 14, which is characterized in that first network element is target user's veil member,
The packet check instruction is specifically used for indicating target user's veil member in the downlink report for detecting the Ethernet session
The session management network element is notified when literary.
16. according to the method for claim 15, which is characterized in that the method also includes:
Target user's veil member receives the first routing rule from the session management network element, the first routing rule
It is used to indicate target user's veil member and the uplink message from the Ethernet session is sent to data network;
Target user's veil member is based on the first routing rule, will send from the uplink message of the Ethernet session
To the data network.
17. according to the method for claim 14, which is characterized in that first network element is intermediate user veil member, wherein
The packet check instruction is specifically used for indicating that the intermediate user veil member is being detected from target user's veil member
The Ethernet session downlink message when notify the session management network element.
18. according to the method for claim 17, which is characterized in that the method also includes:
The intermediate user veil member receives the second routing rule from the session management network element, the second routing rule
It is used to indicate the intermediate user veil member and the uplink message from the Ethernet session is sent to the target user face
Network element;
The intermediate user veil member is based on the second routing rule, and the uplink message of the Ethernet session is sent to institute
State target user's veil member.
19. according to the method for claim 18, which is characterized in that the method also includes:
The intermediate user veil member receives the tunnel information from the session management network element, and the tunnel information includes described
Information needed for intermediate user veil member establishes the tunnel between source user veil member, the intermediate user veil member are built
Information needed for tunnel between vertical and described target user's veil member and intermediate user veil member foundation connect with described
Information needed for tunnel between network access node;
The intermediate user veil member establishes tunnel according to the tunnel information, with the source user veil member, with the target
User's veil member establishes tunnel, and establishes tunnel with the access network node.
20. a kind of method for switching user's veil member, which is characterized in that the method is applied in Ethernet session context, institute
The method of stating includes:
Intermediate user veil member receives the routing rule from session management network element, and the routing rule is used to indicate the centre
The uplink message of Ethernet session is sent to target user's veil member by user's veil member, and is used to indicate the intermediate user
The downlink message of the Ethernet session of the veil member reception from source user veil member and target user's veil member;
The intermediate user network element is based on the routing rule, and the uplink message of the Ethernet session is sent to the target
User's veil member, and receive under the Ethernet session from the source user veil member and target user's veil member
Row message.
21. a kind of method for switching user's veil member, which is characterized in that the method is applied in Ethernet session context, institute
The method of stating includes:
Target user's veil member receives the routing rule from session management network element, and the routing rule is used to indicate the target
Uplink message from Ethernet session is sent to data network by user's veil member, and is used to indicate the target user face
The downlink message of the Ethernet session of the network element reception from the data network and source user veil member;
Target user's veil member is based on the routing rule, by the uplink of the Ethernet session from access network node
Message is sent to data network, and receives the Ethernet session from the data network and source user veil member
Downlink message.
22. a kind of device for switching user's veil member, which is characterized in that described device is applied in Ethernet session context, institute
Stating device is session management network element, and described device includes:
Determining module, for determining that user's veil member of Ethernet session needs gravity treatment, wherein need user's veil member of gravity treatment
It is the source user veil member of the Ethernet session;
Transceiver module, for sending packet check instruction to the first network element, the packet check instruction is used to indicate described first
Network element notifies the session management network element when detecting the downlink message of the Ethernet session, wherein first network element
Including target user's veil member or intermediate user veil member, target user's veil member is for the Ethernet session gravity treatment
User's veil member;
The transceiver module, is also used to receive the first notification information from first network element, and first notification information is used
In notifying first network element to detect the downlink message of the Ethernet session to the session management network element;
The transceiver module is also used to send the second notification information to the source user veil member, and second notification information is used
Resource is discharged in the instruction source user veil member.
23. device according to claim 22, which is characterized in that first network element is target user's veil member,
The packet check instruction is specifically used for indicating target user's veil member in the downlink report for detecting the Ethernet session
The session management network element is notified when literary.
24. device according to claim 23, which is characterized in that the transceiver module is also used to:
First routing rule is sent to target user's veil member, the first routing rule is used to indicate the target user
Uplink message from the Ethernet session is sent to data network by veil member.
25. device according to claim 24, which is characterized in that the transceiver module is also used to:
To access network node send the first tunnel information, first tunnel information for the access network node establish with it is described
Tunnel between target user's veil member;
The second tunnel information is sent to the source user veil member, second tunnel information is for establishing the source user veil
Member arrives the tunnel of target user's veil member.
26. device according to claim 22, which is characterized in that first network element is intermediate user veil member, wherein
The packet check instruction is specifically used for indicating that the intermediate user veil member is being detected from target user's veil member
The Ethernet session downlink message when notify the session management network element.
27. device according to claim 26, which is characterized in that the transceiver module is also used to:
Second routing rule is sent to the intermediate user veil member, the second routing rule is used to indicate the intermediate user
The uplink message of the Ethernet session is sent to target user's veil member by veil member.
28. the device according to claim 26 or 27, which is characterized in that the transceiver module is also used to:
Send tunnel information to the intermediate user veil member, the tunnel information include the intermediate user veil member establish with
Information needed for tunnel between the source user veil member, the intermediate user veil member are established and target user's veil
Information needed for tunnel between member and the intermediate user veil member establish the tunnel institute between the access network node
The information needed.
29. a kind of device for switching user's veil member, which is characterized in that described device is applied in Ethernet session context, institute
Stating device is session management network element, and described device includes:
Determining module, for determining that user's veil member of Ethernet session needs gravity treatment, wherein need user's veil member of gravity treatment
It is the source user veil member of the Ethernet session;
The determining module is also used to determine intermediate user veil member;
Transceiver module, for sending routing rule to the intermediate user veil member, the routing rule is used to indicate in described
Between user's veil member the uplink message of the Ethernet session is sent to target user veil member, and be used to indicate in described
Between user's veil member receive the Ethernet session from the source user veil member and target user's veil member under
Row message, wherein target user's veil member is user's veil member for the Ethernet session gravity treatment.
30. a kind of device for switching user's veil member, which is characterized in that described device is applied in Ethernet session context, institute
Stating device is session management network element, and described device includes:
Determining module, for determining that user's veil member of Ethernet session needs gravity treatment, wherein need user's veil member of gravity treatment
It is the source user veil member of the Ethernet session;
The determining module is also used to determine target user's veil member, and target user's veil member is for the Ethernet meeting
Talk about user's veil member of gravity treatment;
Transceiver module, for sending routing rule to target user's veil member, the routing rule is used to indicate the mesh
It marks user's veil member and the uplink message from the Ethernet session is sent to data network, and be used to indicate the target
The downlink message of the Ethernet session of user's veil member reception from the data network and source user veil member.
31. a kind of device for switching user's veil member, which is characterized in that described device is applied in Ethernet session context, institute
Stating device is the first network element, and described device includes:
Receiving module, for receiving the packet check instruction from session management network element, the packet check instruction is used to indicate
First network element notifies the session management network element when detecting the downlink message of Ethernet session, wherein described first
Network element includes target user's veil member or intermediate user veil member, wherein target user's veil member is for the Ethernet
User's veil member of session gravity treatment;
Sending module, for sending the first notification information to the session management network element, first notification information is used for institute
Stating session management network element notifies first network element to detect the downlink message of the Ethernet session.
32. device according to claim 31, which is characterized in that first network element is target user's veil member,
The packet check instruction is specifically used for indicating target user's veil member in the downlink report for detecting the Ethernet session
The session management network element is notified when literary.
33. device according to claim 32, which is characterized in that the receiving module is also used to:
The first routing rule from the session management network element is received, the first routing rule is used to indicate the target and uses
Uplink message from the Ethernet session is sent to data network by family veil member;
Correspondingly, the sending module is also used to: the first routing rule is based on, by the uplink from the Ethernet session
Message is sent to the data network.
34. device according to claim 31, which is characterized in that first network element is intermediate user veil member, wherein
The packet check instruction is specifically used for indicating that the intermediate user veil member is being detected from target user's veil member
The Ethernet session downlink message when notify the session management network element.
35. device according to claim 34, which is characterized in that the receiving module is also used to:
The second routing rule from the session management network element is received, the second routing rule is used to indicate the intermediate use
Uplink message from the Ethernet session is sent to target user's veil member by family veil member;
Correspondingly, the sending module is also used to: the second routing rule is based on, by the uplink message of the Ethernet session
It is sent to target user's veil member.
36. device according to claim 35, which is characterized in that the receiving module is also used to:
The tunnel information from the session management network element is received, the tunnel information includes that the intermediate user veil member is established
Information needed for tunnel between the source user veil member, the intermediate user veil member are established and the target user face
Information needed for tunnel between network element and the intermediate user veil member establish the tunnel between the access network node
Required information;
Described device further include:
Module is established, for tunnel being established with the source user veil member, with the target user face according to the tunnel information
Network element establishes tunnel, and establishes tunnel with the access network node.
37. a kind of device for switching user's veil member, which is characterized in that described device is applied in Ethernet session context, institute
Stating device is intermediate user veil member, and described device includes:
Receiving module, for receiving the routing rule from session management network element, the routing rule is used to indicate the centre
The uplink message of Ethernet session is sent to target user's veil member by user's veil member, and is used to indicate the intermediate user
The downlink message of the Ethernet session of the veil member reception from source user veil member and target user's veil member;
The uplink message of the Ethernet session is sent to the target and used by sending module for being based on the routing rule
Family veil member, and receive the downlink of the Ethernet session from the source user veil member and target user's veil member
Message.
38. a kind of device for switching user's veil member, which is characterized in that described device is applied in Ethernet session context, institute
Stating device is target user's veil member, and described device includes:
Receiving module, for receiving the routing rule from session management network element, the routing rule is used to indicate the target
Uplink message from Ethernet session is sent to data network by user's veil member, and is used to indicate the target user face
The downlink message of the Ethernet session of the network element reception from the data network and source user veil member;
Sending module, for being based on the routing rule, by the uplink message of the Ethernet session from access network node
It is sent to data network, and receives the downlink of the Ethernet session from the data network and source user veil member
Message.
39. a kind of system for switching user's veil member, which is characterized in that the system is applied in Ethernet session context, institute
The system of stating includes:
Session management network element, for determining that user's veil member of Ethernet session needs gravity treatment, wherein need the user face of gravity treatment
Network element is the source user veil member of the Ethernet session;
The session management network element is also used to send packet check instruction to the first network element, and the packet check instruction is for referring to
Show that first network element notifies the session management network element when detecting the downlink message of the Ethernet session, wherein institute
Stating the first network element includes target user's veil member or intermediate user veil member, and target user's veil member is for the Ethernet
User's veil member of session gravity treatment;
First network element, for sending the first notification information to the session management network element, first notification information is used for
First network element is notified to detect the downlink message of the Ethernet session to the session management network element;
The session management network element is also used to, and Xiang Suoshu source user veil member sends the second notification information, the second notice letter
Breath is used to indicate the source user veil member release resource.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810208474.3A CN110278584B (en) | 2018-03-14 | 2018-03-14 | Method, device and system for switching user plane network element |
PCT/CN2019/075462 WO2019174440A1 (en) | 2018-03-14 | 2019-02-19 | Method for switching user plane network element, device, and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810208474.3A CN110278584B (en) | 2018-03-14 | 2018-03-14 | Method, device and system for switching user plane network element |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110278584A true CN110278584A (en) | 2019-09-24 |
CN110278584B CN110278584B (en) | 2020-12-15 |
Family
ID=67908672
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810208474.3A Active CN110278584B (en) | 2018-03-14 | 2018-03-14 | Method, device and system for switching user plane network element |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN110278584B (en) |
WO (1) | WO2019174440A1 (en) |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2021104484A1 (en) * | 2019-11-29 | 2021-06-03 | 华为技术有限公司 | Communication method, apparatus and system |
CN112969209A (en) * | 2021-02-20 | 2021-06-15 | 腾讯科技(深圳)有限公司 | Switching control method and device of service server, electronic equipment and storage medium |
WO2021136212A1 (en) * | 2019-12-31 | 2021-07-08 | 华为技术有限公司 | Routing configuration method and device |
CN113973269A (en) * | 2020-07-23 | 2022-01-25 | 华为技术有限公司 | Data transmission method, device and system |
CN113973050A (en) * | 2020-07-23 | 2022-01-25 | 华为技术有限公司 | Route configuration method and device |
WO2023116568A1 (en) * | 2021-12-21 | 2023-06-29 | 华为技术有限公司 | Switching method, communication apparatus, and communication system |
WO2024114229A1 (en) * | 2022-11-28 | 2024-06-06 | 中兴通讯股份有限公司 | Network resource release method, network element, communications system, and storage medium |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN116033494A (en) * | 2021-10-26 | 2023-04-28 | 华为技术有限公司 | Indication information transmission method, message transmission method and related devices |
CN115002016B (en) * | 2022-05-17 | 2023-08-22 | 阿里云计算有限公司 | Message processing system, method, device and storage medium |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104853338A (en) * | 2014-02-14 | 2015-08-19 | 中国移动通信集团广东有限公司 | Business continuing method, device, and mobile switching center / visitor location register |
US20170288972A1 (en) * | 2016-03-31 | 2017-10-05 | Huawei Technologies Co., Ltd. | Systems and methods for service and session continuity in software defined topology management |
WO2018006017A1 (en) * | 2016-07-01 | 2018-01-04 | Idac Holdings, Inc. | Methods for supporting session continuity on per-session basis |
CN107548127A (en) * | 2016-06-23 | 2018-01-05 | 北京三星通信技术研究有限公司 | The method and apparatus for supporting data transfer |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101841836A (en) * | 2009-03-19 | 2010-09-22 | 华为技术有限公司 | Switching optimization method, switching device and system |
CN109121170B (en) * | 2017-06-26 | 2021-04-20 | 华为技术有限公司 | Session management method, device, equipment and system |
CN108337705B (en) * | 2018-01-31 | 2020-08-28 | 中国联合网络通信集团有限公司 | User plane reselection method and device |
-
2018
- 2018-03-14 CN CN201810208474.3A patent/CN110278584B/en active Active
-
2019
- 2019-02-19 WO PCT/CN2019/075462 patent/WO2019174440A1/en active Application Filing
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104853338A (en) * | 2014-02-14 | 2015-08-19 | 中国移动通信集团广东有限公司 | Business continuing method, device, and mobile switching center / visitor location register |
US20170288972A1 (en) * | 2016-03-31 | 2017-10-05 | Huawei Technologies Co., Ltd. | Systems and methods for service and session continuity in software defined topology management |
CN107548127A (en) * | 2016-06-23 | 2018-01-05 | 北京三星通信技术研究有限公司 | The method and apparatus for supporting data transfer |
WO2018006017A1 (en) * | 2016-07-01 | 2018-01-04 | Idac Holdings, Inc. | Methods for supporting session continuity on per-session basis |
Non-Patent Citations (2)
Title |
---|
HUAWEI, HISILICON: "TS 23.502: Clarification of Xn based HO", 《SA WG2 MEETING #124,S2-178811》 * |
INTERDIGITAL: "23.502: Correction of figures 4.9.1.1.2-1 and 4.9.1.1.3-1", 《SA WG2 MEETING #122,S2-174384》 * |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2021104484A1 (en) * | 2019-11-29 | 2021-06-03 | 华为技术有限公司 | Communication method, apparatus and system |
WO2021136212A1 (en) * | 2019-12-31 | 2021-07-08 | 华为技术有限公司 | Routing configuration method and device |
CN113973269A (en) * | 2020-07-23 | 2022-01-25 | 华为技术有限公司 | Data transmission method, device and system |
CN113973050A (en) * | 2020-07-23 | 2022-01-25 | 华为技术有限公司 | Route configuration method and device |
WO2022017527A1 (en) * | 2020-07-23 | 2022-01-27 | 华为技术有限公司 | Data transmission method, apparatus and system |
CN113973050B (en) * | 2020-07-23 | 2024-08-27 | 华为技术有限公司 | Route configuration method and device |
CN112969209A (en) * | 2021-02-20 | 2021-06-15 | 腾讯科技(深圳)有限公司 | Switching control method and device of service server, electronic equipment and storage medium |
WO2023116568A1 (en) * | 2021-12-21 | 2023-06-29 | 华为技术有限公司 | Switching method, communication apparatus, and communication system |
WO2024114229A1 (en) * | 2022-11-28 | 2024-06-06 | 中兴通讯股份有限公司 | Network resource release method, network element, communications system, and storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN110278584B (en) | 2020-12-15 |
WO2019174440A1 (en) | 2019-09-19 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110278584A (en) | Switch the methods, devices and systems of user's veil member | |
WO2021223507A1 (en) | Communication method and apparatus, and chip | |
CN105027664B (en) | Grouped data in the wireless communication system using WLAN connects | |
CN110383886A (en) | Method and apparatus for changing between the system in wirelessly communicating | |
US9271165B2 (en) | Method for establishing connection by HNB | |
CN108702810A (en) | The method and apparatus that the cell particular procedure or mobile process of the NR for being sliced based on network are executed in wireless communication system | |
CN102869116B (en) | Local network and method for establishing connection between local gateway and home base station | |
CN108605383A (en) | The method and apparatus that the cell standardising process of the NR for being sliced based on network is executed in wireless communication system | |
CN108924884A (en) | Communication means and communication equipment | |
CN110383867A (en) | Terminal installation, core network device and communication control method | |
CN109996306A (en) | Communication means and communication equipment | |
KR20200126003A (en) | Session context conversion | |
CN107005886A (en) | WIFI enhancings with LTE IP anchor points | |
CN104255046A (en) | Customizable mobile broadband network system, and method for customizing mobile broadband network | |
CN108432334A (en) | The communication means of terminal installation, MME, the communication means of terminal installation and MME | |
CN107105458B (en) | A kind of information processing method and device | |
CN105376739A (en) | Network authentication method and system | |
CN109996303A (en) | A kind of method and communication entity of system switching | |
CN109842640A (en) | The method, apparatus and communication system of switching server | |
CN110519172B (en) | Wireless communication method and apparatus | |
CN103220721B (en) | Wireless access capability report method and base station, policy control method and system | |
WO2023011049A1 (en) | Communication method and apparatus | |
CN102868997B (en) | Local gateway information processing method and device | |
CN109041144A (en) | A kind of Inter-System Information exchange method, wireless communication system and user equipment | |
CN109429366A (en) | A kind of PDU conversation processing method and equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |