CN110278584A - Switch the methods, devices and systems of user's veil member - Google Patents

Switch the methods, devices and systems of user's veil member Download PDF

Info

Publication number
CN110278584A
CN110278584A CN201810208474.3A CN201810208474A CN110278584A CN 110278584 A CN110278584 A CN 110278584A CN 201810208474 A CN201810208474 A CN 201810208474A CN 110278584 A CN110278584 A CN 110278584A
Authority
CN
China
Prior art keywords
veil member
user
network element
session
veil
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201810208474.3A
Other languages
Chinese (zh)
Other versions
CN110278584B (en
Inventor
孙德奎
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Technologies Co Ltd
Original Assignee
Huawei Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co Ltd filed Critical Huawei Technologies Co Ltd
Priority to CN201810208474.3A priority Critical patent/CN110278584B/en
Priority to PCT/CN2019/075462 priority patent/WO2019174440A1/en
Publication of CN110278584A publication Critical patent/CN110278584A/en
Application granted granted Critical
Publication of CN110278584B publication Critical patent/CN110278584B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/14Session management
    • H04L67/148Migration or transfer of sessions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

This application provides a kind of methods, devices and systems for switching user's veil member, this method is applied in Ethernet session context, this method comprises: session management network element determines that user's veil member of Ethernet session needs gravity treatment, wherein, need gravity treatment user's veil member be the Ethernet session source user veil member;The session management network element sends packet check instruction to the first network element, packet check instruction is used to indicate first network element and notifies the session management network element when detecting the downlink message of the Ethernet session, which includes target user's veil member or intermediate user veil member;The session management network element receives the first notification information from first network element;The session management network element sends the second notification information to the source user veil member, which is used to indicate source user veil member release resource, can be realized the switching of user's veil member in Ethernet session context.

Description

Switch the methods, devices and systems of user's veil member
Technical field
This application involves the communications fields, and more particularly, to a kind of method, apparatus for switching user's veil member and are System.
Background technique
In 5th generation (5th Generation, 5G) network, in addition to support network protocol (Internet Protocol, IP the session of ethernet type is also supported in) protocol Data Unit (Protocol Data Unit, PDU) session of type.Its In, ether is an IP layers of protocol layer below.Wherein, for the PDU session of IP type, what is transmitted in mobile network is IP report Text.Session for ethernet type, what is transmitted in mobile network is ether network packet.
Due to the mobility of terminal, 5G network can switch anchor point user plane functions equipment (User Plane for terminal Function, UPF).Under IP session context, control plane gateway realizes anchor point by distributing different IP address for terminal device The switching of UPF.But under ethernet type session context, the medium access of terminal controls (Media Access Control, MAC) address remains constant, if the method for continuing to use the distribution address in IP session context cannot achieve Ethernet The switching of anchor point UPF in session context.Therefore, it needs to propose that a kind of scheme realizes the anchor point UPF in Ethernet session context Switching.
Summary of the invention
The application provides a kind of methods, devices and systems for switching user's veil member, can be realized Ethernet session context In user's veil member switching.
In a first aspect, providing a kind of method for switching user's veil member, the method is applied to Ethernet session context In, which comprises session management network element determines that user's veil member of Ethernet session needs gravity treatment, wherein needs gravity treatment User's veil member can be understood as the source user veil member of the Ethernet session;Then, session management network element is to the first network element Packet check instruction is sent, in order to which announcement session manages net to the first network element when detecting the downlink message of the Ethernet session Member.Optionally, the first network element includes target user's veil member or intermediate user veil member, which is for ether User's veil member of net session gravity treatment.Then, session management network element receives the first notification information that the first network element is sent, to obtain Know that the first network element has been detected by the downlink message of the Ethernet session.Finally, session management network element is sent out to source user veil member Send the second notification information so that source user veil member discharge resource, i.e., follow-up business message will by target user's veil member come Transmission.The variation that terminal in the realization switching method of IP address needs to perceive IP address is distributed in IP session context, and at this Apply not needing in embodiment realizing switching using the method for distributing IP address in IP session context, whole process does not need end The cooperation at end can be realized the seamless switching of user's veil member, it can also be ensured that the continuity of business.
Optionally, if the Ethernet session corresponds to multiple media access control MAC Address, the packet check instruction tool Body is used to indicate first network element and notifies the session management when detecting the corresponding downlink message of the multiple MAC Address Network element.
With reference to first aspect, in one possible implementation, first network element is target user's veil member, Wherein, the packet check instruction is specifically used for indicating target user's veil member in the case where detecting the Ethernet session The session management network element is notified when row message.Therefore, session management network element to target user's veil member downward message by examining Instruction is surveyed, so that target user's veil member announcement session managed network element when detecting the downlink message of the Ethernet session.
Optionally, this method further include: session management network element determines target user's veil member.Therefore, session management network element Suitable target user's veil member can be selected for terminal.
Optionally, this method further include: session management network element sends first routing rule to target user's veil member, described First routing rule is used to indicate target user's veil member and the uplink message from the Ethernet session is sent to number According to network.Further, the first routing rule is also used to indicate that target user's veil member is received from the data The downlink message of the Ethernet session of network and source user veil member.Therefore, session management network element is by target User's veil member issues first routing rule, allow target user's veil member based on first routing rule content carry out with The too transmission of the uplink and downlink message of net session.
Optionally, the method also includes: session management network elements sends the first tunnel information to access network node, and described the One tunnel information establishes the tunnel between target user's veil member for the access network node;The session management net Member sends the second tunnel information to the source user veil member, and second tunnel information is for establishing the source user veil member To the tunnel of target user's veil member.Therefore, session management network element by access network node send the first tunnel information, Access network node is enabled to establish the tunnel between target user's veil member, and, by being sent to source user veil member Second tunnel information, enable source user veil member establish the source user veil member to target user's veil member tunnel Road.
With reference to first aspect, in alternatively possible implementation, first network element is intermediate user veil member, In, the packet check instruction is specifically used for indicating that the intermediate user veil member is being detected from target user's veil The session management network element is notified when the downlink message of the Ethernet session of member.Therefore, session management network element passes through in Between user's veil member downward message detection instruction so that intermediate user veil member is in the downlink message for detecting the Ethernet session When announcement session managed network element.
Optionally, this method further include: session management network element determines intermediate user veil member.Therefore, session management network element Suitable intermediate user veil member can be selected according to the position of terminal.
Optionally, this method further include: session management network element determines target user's veil member.Therefore, session management network element Suitable target user's veil member can be selected for terminal.
Optionally, the method also includes: the session management network elements sends the second tunnel to the intermediate user veil member By rule, the second routing rule is used to indicate the intermediate user veil member and sends out the uplink message of the Ethernet session Give target user's veil member.Further, the second routing rule is also used to indicate the intermediate user veil member Receive the downlink message of the Ethernet session from the source user veil member and target user's veil member.Therefore, Session management network element allows intermediate user veil member to be based on the by issuing second routing rule to intermediate user veil member The content of two routing rules carries out the transmission of the uplink and downlink message of Ethernet session.
Optionally, tunnel is sent to the intermediate user veil member the method also includes: the session management network element to believe Breath, the tunnel information include letter needed for the intermediate user veil member establishes the tunnel between source user veil member Breath, information needed for the intermediate user veil member establishes the tunnel between target user's veil member and it is described in Between user's veil member establish and the access network node between tunnel needed for information.Therefore, session management network element pass through to Intermediate user veil member sends tunnel information, and intermediate user veil member is enabled to establish the tunnel between source user veil member Tunnel between road, with target user's veil member, and the tunnel between access network node.
Second aspect, provides a kind of method for switching user's veil member, and the method is applied to Ethernet session context In, which comprises session management network element determines that user's veil member of Ethernet session needs gravity treatment, wherein needs gravity treatment User's veil member be the Ethernet session source user veil member;Then, session management network element determines intermediate user veil Member, and routing rule is sent to intermediate user veil member, so that intermediate user veil member is by the uplink report of the Ethernet session Text is sent to target user's veil member, and receives the Ethernet meeting from source user veil member and target user's veil member The downlink message of words, wherein target user's veil member is user's veil member for the Ethernet session gravity treatment.In this Shen Please be in embodiment, session management network element is by issuing routing rule to intermediate user veil member, so that intermediate user veil member base Corresponding uplink and downlink operation is carried out in routing rule, helps to realize the switching of user's veil member in Ethernet session context.
Optionally, tunnel is sent to the intermediate user veil member the method also includes: the session management network element to believe Breath, the tunnel information include letter needed for the intermediate user veil member establishes the tunnel between source user veil member Breath, information needed for the intermediate user veil member establishes the tunnel between target user's veil member and it is described in Between user's veil member establish and the access network node between tunnel needed for information.Therefore, session management network element pass through to Intermediate user veil member sends tunnel information, and intermediate user veil member is enabled to establish the tunnel between source user veil member Tunnel between road, with target user's veil member, and the tunnel between access network node.
In conjunction with second aspect, in one possible implementation, the method also includes: the session management network element to The intermediate user veil member sends packet check instruction, in order to which intermediate NE is in the downlink report for detecting the Ethernet session Announcement session managed network element when literary.
Optionally, if the Ethernet session corresponds to multiple media access control MAC Address, the packet check instruction tool Body is used to indicate the intermediate user veil member and notifies the meeting when detecting the corresponding downlink message of the multiple MAC Address Talk about managed network element.
The third aspect, provides a kind of method for switching user's veil member, and the method is applied to Ethernet session context In, which comprises session management network element determines that user's veil member of Ethernet session needs gravity treatment, wherein needs gravity treatment User's veil member be the Ethernet session source user veil member;Then, session management network element determines target user's veil Member, wherein target user's veil member is user's veil member for Ethernet session gravity treatment, and sends road to target user's veil member By rule, so that the uplink message from the Ethernet session is sent to data network, Yi Jijie by target user's veil member The downlink message of the Ethernet session from data network and source user veil member is received, so that target user's veil member is based on routing Rule carries out corresponding uplink and downlink operation, helps to realize the switching of user's veil member in Ethernet session context.
Optionally, the method also includes: session management network elements sends the first tunnel information to access network node, and described the One tunnel information establishes the tunnel between target user's veil member for the access network node;The session management net Member sends the second tunnel information to the source user veil member, and second tunnel information is for establishing the source user veil member To the tunnel of target user's veil member.Therefore, session management network element by access network node send the first tunnel information, Access network node is enabled to establish the tunnel between target user's veil member, and, by being sent to source user veil member Second tunnel information, enable source user veil member establish the source user veil member to target user's veil member tunnel Road.
In conjunction with the third aspect, in one possible implementation, the method also includes: session management network elements to target User's veil member sends packet check instruction, so that target user's veil member is when detecting the downlink message of the Ethernet session Announcement session managed network element.
Optionally, if the Ethernet session corresponds to multiple media access control MAC Address, the packet check instruction tool Body is used to indicate target user's veil member and notifies the meeting when detecting the corresponding downlink message of the multiple MAC Address Talk about managed network element.
Fourth aspect, provides a kind of method for switching user's veil member, and the method is applied to Ethernet session context In, which comprises the first network element receives the packet check instruction from session management network element, and the packet check instruction is used The session management network element is notified when detecting the downlink message of Ethernet session in instruction first network element;Then, One network element sends the first notification information to session management network element when detecting the downlink message of Ethernet session, so that session pipe Reason network element learns that the first network element has been detected by the downlink message of Ethernet session, so that session management network element can notify Source user veil member discharge resource, in order to realize Ethernet session user's veil member switching.
Optionally, if the Ethernet session corresponds to multiple media access control MAC Address, the packet check instruction tool Body is used to indicate first network element and notifies the session management when detecting the corresponding downlink message of the multiple MAC Address Network element.
In conjunction with fourth aspect, in one possible implementation, first network element is target user's veil member, Wherein, the packet check instruction is specifically used for indicating target user's veil member in the case where detecting the Ethernet session The session management network element is notified when row message.Therefore, the report that target user's veil member is issued by receiving session management network element Text detection instruction, in order to the announcement session managed network element when detecting the downlink message of the Ethernet session.
Optionally, the from the session management network element is received the method also includes: target user's veil member One routing rule, the first routing rule is used to indicate target user's veil member will be from the upper of the Ethernet session Row message is sent to data network;Target user's veil member is based on the first routing rule, will come from the Ethernet The uplink message of session is sent to the data network.Therefore, target user's veil member can be based on first routing rule, to The above-mentioned processing mode of the execution of the too uplink message of net session.
Further, the first routing rule is also used to indicate that target user's veil member is received from the data The downlink message of the Ethernet session of network and source user veil member;Target user's veil member is based on the first via By rule, the downlink message of the Ethernet session from the data network and source user veil member is received.Therefore, Target user's veil member can be based on first routing rule, to the above-mentioned processing mode of the execution of the downlink message of Ethernet session.
In conjunction with fourth aspect, in alternatively possible implementation, first network element is intermediate user veil member, In, the packet check instruction is specifically used for indicating that the intermediate user veil member is being detected from target user's veil The session management network element is notified when the downlink message of the Ethernet session of member.Therefore, intermediate user veil member is by connecing The packet check instruction that session management network element issues is received, in order to the notice when detecting the downlink message of the Ethernet session Session management network element.
Optionally, this method further include: the intermediate user veil member receives second from the session management network element Routing rule, the second routing rule are used to indicate the intermediate user veil member for the uplink from the Ethernet session Message is sent to target user's veil member;The intermediate user veil member is based on the second routing rule, will it is described with The uplink message of too net session is sent to target user's veil member.Therefore, intermediate user veil member can be based on the second tunnel By rule, to the above-mentioned processing mode of the execution of the uplink message of Ethernet session.
Further, the second routing rule is also used to indicate that the intermediate user veil member is received from source use The downlink message of the Ethernet session of family veil member and target user's veil member.Therefore, intermediate user veil member can To be based on second routing rule, to the above-mentioned processing mode of the execution of the downlink message of Ethernet session.
Optionally, the method also includes: the intermediate user veil member receives the tunnel from the session management network element Road information, the tunnel information include that the intermediate user veil member is established needed for the tunnel between source user veil member Information, information needed for the intermediate user veil member establishes the tunnel between target user's veil member, Yi Jisuo State information needed for intermediate user veil member establishes the tunnel between the access network node;The intermediate user veil primitive root According to the tunnel information, tunnel is established with the source user veil member, establishes tunnel, Yi Jiyu with target user's veil member The access network node establishes tunnel.Therefore.The tunnel information that intermediate user veil member is sent by session management network element, can The tunnel between source user veil member is established, with the tunnel between target user's veil member, and and access network node Between tunnel.
5th aspect, provides a kind of method for switching user's veil member, and the method is applied to Ethernet session context In, which comprises intermediate user veil member receives the routing rule from session management network element, is then based on routing rule Content then is executed and is operated to the uplink and downlink of Ethernet session, specific i.e. for uplink: the uplink message of Ethernet session is sent out Give target user's veil member;For downlink: receiving the institute from the source user veil member and target user's veil member The downlink message for stating Ethernet session helps to realize the switching of user's veil member in Ethernet session context.
Optionally, the method also includes: intermediate user veil members to receive the tunnel information from session management network element, institute Stating tunnel information includes information needed for the intermediate user veil member establishes the tunnel between source user veil member, institute State information and the intermediate user needed for intermediate user veil member establishes the tunnel between target user's veil member Information needed for veil member establishes the tunnel between the access network node.Therefore, intermediate user veil member can be based on being somebody's turn to do Tunnel information establishes the tunnel between source user veil member, and the tunnel between target user's veil member, and with connect Tunnel between network access node.
In conjunction with the 5th aspect, in one possible implementation, the method also includes: intermediate user veil member passes through The packet check instruction from session management network element is received, packet check instruction is then based on and is detecting Ethernet session Announcement session managed network element when downlink message.
Optionally, if the Ethernet session corresponds to multiple media access control MAC Address, the packet check instruction tool Body is used to indicate the intermediate user veil member and notifies the meeting when detecting the corresponding downlink message of the multiple MAC Address Talk about managed network element.
6th aspect, provides a kind of method for switching user's veil member, and the method is applied to Ethernet session context In, which comprises target user's veil member receives the routing rule from session management network element, is then based on routing rule Content then is executed and is operated to the uplink and downlink of Ethernet session, specific i.e. for uplink: by from described in access network node with The uplink message of too net session is sent to data network;For downlink: receiving and come from the data network and the source user face The downlink message of the Ethernet session of network element, helps to realize the switching of user's veil member in Ethernet session context.
In conjunction with the 6th aspect, in one possible implementation, the method also includes: target user's veil member receives Packet check instruction from session management network element is then based on packet check instruction in the downlink for detecting Ethernet session Announcement session managed network element when message.
Optionally, if the Ethernet session corresponds to multiple media access control MAC Address, the packet check instruction tool Body is used to indicate target user's veil member and notifies the meeting when detecting the corresponding downlink message of the multiple MAC Address Talk about managed network element.
7th aspect provides a kind of device for switching user's veil member, which can be session management network element, can also To be chip.The device is with session management network element in possible implementation any in realization either side or either side Function.The function can also execute corresponding software realization by hardware realization by hardware.The hardware or software include One or more modules corresponding with above-mentioned function.
Eighth aspect provides a kind of device for switching user's veil member, which can be intermediate user veil member, It can be chip.The device is with intermediate user veil in possible implementation any in realization either side or either side The function of member.The function can also execute corresponding software realization by hardware realization by hardware.The hardware or software Including one or more modules corresponding with above-mentioned function.
9th aspect provides a kind of device for switching user's veil member, which can be target user's veil member, It can be chip.The device is with target user's veil in possible implementation any in realization either side or either side The function of member.The function can also execute corresponding software realization by hardware realization by hardware.The hardware or software Including one or more modules corresponding with above-mentioned function.
Tenth aspect, provides a kind of device, which includes processor, memory and transceiver.Processor and storage Device is connected with transceiver.For storing instruction, processor is used for the control in processor for executing the instruction, transceiver to memory System is lower to be communicated with other network elements.When the processor executes the instruction of memory storage, the execution is so that the device executes In any of the above-described aspect or either side in any possible implementation session management network element method.It should be noted that The memory can integrate in processor, be also possible to independently of except processor.
On the one hand tenth, provides a kind of device, which includes processor, memory and transceiver.Processor with deposit Reservoir is connected with transceiver.For storing instruction, processor is used for for executing the instruction, transceiver in processor memory Control is lower to be communicated with other network elements.When the processor executes the instruction of memory storage, the execution is so that the device is held In any of the above-described aspect of row or either side in any possible implementation intermediate user veil member method.It needs to illustrate It is that the memory can integrate in processor, is also possible to independently of except processor.
12nd aspect, provides a kind of device, which includes processor, memory and transceiver.Processor with deposit Reservoir is connected with transceiver.For storing instruction, processor is used for for executing the instruction, transceiver in processor memory Control is lower to be communicated with other network elements.When the processor executes the instruction of memory storage, the execution is so that the device is held In any of the above-described aspect of row or either side in any possible implementation target user's veil member method.It needs to illustrate It is that the memory can integrate in processor, is also possible to independently of except processor.
13rd aspect, provides a kind of system for switching user's veil member, and the system is applied to Ethernet session field Jing Zhong, the system comprises: session management network element, for determining that user's veil member of Ethernet session needs gravity treatment, wherein need Want gravity treatment user's veil member be the Ethernet session source user veil member;The session management network element is also used to One network element sends packet check instruction, and the packet check instruction is used to indicate first network element and is detecting the Ethernet The session management network element is notified when the downlink message of session, wherein first network element include target user veil member or in Between user veil member, target user's veil member is user's veil member for the Ethernet session gravity treatment;First net Member, for sending the first notification information to the session management network element, first notification information is used for the session management Network element notifies first network element to detect the downlink message of the Ethernet session;The session management network element is also used to, to The source user veil member sends the second notification information, and second notification information is used to indicate the source user veil member release Resource.
In one possible implementation, session management network element can be the session pipe in the 7th aspect or the tenth aspect Manage network element.Correspondingly, the first network element can be the intermediate user veil member in above-mentioned eighth aspect or the tenth one side, alternatively, First network element is also possible to target user's veil member in above-mentioned 9th aspect or the 12nd aspect.
Fourteenth aspect provides a kind of computer readable storage medium, which has journey Sequence, the program make session management network element execute session in any possible implementation in any of the above-described aspect or either side The method of managed network element.
15th aspect, provides a kind of computer readable storage medium, which has journey Sequence, the program execute intermediate user veil member in any of the above-described aspect or either side in any possible implementation Between user's veil member method.
16th aspect, provides a kind of computer readable storage medium, which has journey Sequence, the program make target user's veil member execute in any of the above-described aspect or either side mesh in any possible implementation The method for marking user's veil member.
17th aspect, provides a kind of communication chip, wherein instruction is stored with, when it runs on a computing device When, so that the communication chip executes the method in any possible implementation of any of the above-described aspect.
18th aspect, provides a kind of computer program product comprising instruction, when running on computers, so that Computer executes the method in any of the above-described aspect or its any possible implementation.
Detailed description of the invention
Fig. 1 is the schematic diagram using a kind of system architecture of the embodiment of the present application.
Fig. 2 is a scene figure using the embodiment of the present application.
Fig. 3 is the schematic block diagram using the communication equipment of the embodiment of the present application.
Fig. 4 is the schematic flow chart of the method for switching user's veil member of the application one embodiment.
Fig. 5 is the schematic diagram of an example of mac learning principle.
Fig. 6 is the schematic diagram using an example of the method for switching user's veil member of the embodiment of the present application.
Fig. 7 is the schematic diagram using another example of the method for switching user's veil member of the embodiment of the present application.
Fig. 8 is the schematic block diagram using the device of switching user's veil member of the application one embodiment.
Fig. 9 is the schematic block diagram using the device of switching user's veil member of another embodiment of the application.
Figure 10 is the schematic block diagram using the device of switching user's veil member of the application another embodiment.
Figure 11 is the schematic block diagram using the device of switching user's veil member of another embodiment of the application.
Specific embodiment
Below in conjunction with attached drawing, the technical solution in the application is described.
The technical solution of the embodiment of the present application can be applied to various communication systems, such as: global system for mobile telecommunications (Global System of Mobile communication, GSM) system, CDMA (Code Division Multiple Access, CDMA) system, wideband code division multiple access (Wideband Code Division Multiple Access, WCDMA) system System, General Packet Radio Service (General Packet Radio Service, GPRS), long term evolution (Long Term Evolution, LTE) system, LTE frequency division duplex (Frequency Division Duplex, FDD) system, LTE time division duplex (Time Division Duplex, TDD), Universal Mobile Communication System (Universal Mobile Telecommunication System, UMTS), global interconnection inserting of microwave (Worldwide Interoperability For Microwave Access, WiMAX) communication system, following the 5th generation (5th Generation, the 5G) system, future The vehicle connection that other systems or new wireless (New Radio, NR), vehicle to all (Vehicle to everything, V2X) are communicated Net system etc..
Fig. 1 is the schematic diagram using a kind of system architecture of the embodiment of the present application.As shown in Figure 1, the system 100 includes: Session management network element 101 and the first network element 102.Optionally, first network element 102 includes target user's veil member or intermediate use Family veil member.The system 100 can be used for executing the method for switching user's veil member in the embodiment of the present application.
In one possible implementation, session management network element 101 is used to determine user's veil member of Ethernet session Need gravity treatment, wherein need gravity treatment user's veil member be the Ethernet session source user veil member;The session management Network element 101 is also used to send packet check instruction to first network element 102, and packet check instruction is used to indicate described the One network element notifies the session management network element when detecting the downlink message of the Ethernet session, wherein first packet Target user's veil member or intermediate user veil member are included, target user's veil member is the use for the Ethernet session gravity treatment Family veil member;First network element 102 sends the first notification information, the first notice letter to the session management network element 101 Breath to the session management network element 101 for notifying first network element 102 to detect the downlink message of the Ethernet session; The session management network element 101 sends the second notification information to the source user veil member, and second notification information is for referring to Show the source user veil member release resource.
Alternatively, session management network element 101 determines user's veil of Ethernet session in alternatively possible implementation Member needs gravity treatment, wherein need gravity treatment user's veil member be the Ethernet session source user veil member;The session pipe It manages network element 101 and determines target user's veil member, target user's veil member is the user face for the Ethernet session gravity treatment Network element;The session management network element 101 sends routing rule to target user's veil member, and the routing rule is used to indicate Uplink message from the Ethernet session is sent to data network by target user's veil member, and is used to indicate institute It states target user's veil member and receives the message from the data network and the source user veil member.
Alternatively, session management network element 101 determines user's veil of Ethernet session in alternatively possible implementation Member needs gravity treatment, wherein need gravity treatment user's veil member be the Ethernet session source user veil member;The session pipe It manages network element 101 and determines target user's veil member, target user's veil member is the user face for the Ethernet session gravity treatment Network element;The session management network element 101 sends routing rule to target user's veil member, and the routing rule is used to indicate Message from the terminal is sent to data network by target user's veil member, and is used to indicate the target user Veil member receives the message from the data network and the source user veil member.
It should be noted that the session management network element 101 and the first network element 102 etc. in Fig. 1 are only a name, name pair Network element or equipment itself do not constitute restriction.In 5G network and following other networks (such as 6G network), session management net Equipment corresponding to member 101 and the first network element 102 or equipment are also possible to other names, and the embodiment of the present application does not make this to have Body limits.For example, the session management network element 101 is it is also possible to be replaced by SMF functional entity, the first network element is possible to be replaced For UPF functional entity, wireless access network (Radio Access Network, RAN) equipment or branch node (Branch Point, BP), source user veil member is described collectively herein it is also possible to be replaced by UPF functional entity, no longer superfluous below It states.
Optionally, the session management network element 101 in above system 100 and the first network element 102 can be one independent respectively Network element, be also possible to be realized jointly by multiple network elements, can also be used as a functional module in a network element, the application is real It applies example and this is not especially limited.
It is understood that above-mentioned function is either network element in hardware device, is also possible in dedicated hardware The virtualization instantiated in the software function or platform (for example, cloud platform) of upper permission.
Terminal (Terminal) in the embodiment of the present application can refer to user equipment (User Equipment, UE), access Terminal, V2X communication in terminal, subscriber unit, subscriber station, movement station, mobile station, remote station, remote terminal, mobile device, User terminal, terminal device, wireless telecom equipment, user agent or user apparatus.Terminal can also be cellular phone, wireless electricity Words, session initiation protocol (Session Initiation Protocol, SIP) phone, wireless local loop (Wireless Local Loop, WLL) it stands, personal digital assistant (Personal Digital Assistant, PDA), there is wireless communication function Can handheld device, calculate equipment or be connected to radio modem other processing equipments, mobile unit, wearable set It is standby, Public Land Mobile Network network (the Public Land of terminal device or the following evolution in the following 5G network Mobile Network, PLMN) in terminal device etc., the embodiment of the present application does not limit this.Terminal can also include V2X On board unit (On Board Unit, OBU) in equipment, for example, vehicle or vehicle.
Terminal in the embodiment of the present application is wirelessly connected with wireless access network RAN equipment, wireless access network Equipment is connect by wirelessly or non-wirelessly mode with equipment of the core network.Equipment of the core network can be independent with wireless access network equipment Different physical equipments is also possible to for the logic function of the function of equipment of the core network and wireless access network equipment being integrated in same On a physical equipment, the function that part equipment of the core network is integrated on a physical equipment and partial wireless access can also be The function of net equipment.Terminal can be fixed position, be also possible to moveable.
Wireless access network equipment is the access device that terminal is wirelessly linked into the mobile communication system, can be with It is base station NodeB, the base station (gNodeB, gNB) in evolved base station eNodeB, 5G mobile communication system, future mobile communications The access node etc. in base station or Wireless Fidelity (Wireless Fidelity, WiFi) system in system, can also be cloud without Wireless controller or the access net under line access network (Cloud Radio Access Network, CRAN) scene are set It is standby to be drilled for relay station, access point, mobile unit, wearable device and the network equipment in future 5G network or future Into PLMN network in the network equipment etc., embodiments herein is to particular technique used by wireless access network equipment and tool Body equipment form is without limitation.
Equipment of the core network is more for example including mobile management entity (Mobility Management Entity, MME), broadcast Service centre (Broadcast Multicast Service Center, BMSC) etc. is broadcast, or also may include in 5G system Corresponding function entity, such as core network control surface (Control Plane, CP) or user face (User Plan, UP) network function It can wait, for example, session management network function (Session Management NF, SMF), access and mobile management function to ps domain (Access and Mobility Management Function, AMF) etc..Wherein, core network control surface it can be appreciated that Core network control surface function (control plane function, CPF) entity.
V2X communication refers to: vehicle can by communicated between vehicle and vehicle (Vehicle to Vehicle, V2V) or Person's vehicle is communicated with roadside infrastructure between (Vehicle to Infrastructure, V2I) or vehicle and pedestrian Communicate (Vehicle to Pedestrian, V2P) or vehicle and network communication (Vehicle to Network, V2N) etc. Mode to obtain traffic information in time or receives information.By taking the most common V2V and V2I as an example: vehicle is communicated by V2V, can be with By the speed of itself, driving direction, specific location or the information such as emergency brake whether is stepped on and are broadcast to surrounding vehicles, surrounding vehicle By obtain the category information, allow driver preferably to perceive traffic condition, sentence in advance to be made to unsafe condition It is disconnected, and then evacuation is made in time.Optionally, V2I is communicated, other than the interaction of above-mentioned security information, roadside infrastructure The access etc. of all kinds of information on services and data network, the functions such as non-parking charge, in-car entertainment all pole can also be provided for vehicle The earth improves traffic intelligence.V2X is generally communicated into used network and is known as car networking.
Wireless access network equipment and terminal can be deployed in land, including indoor or outdoors, hand-held or vehicle-mounted;It can also be with It is deployed on the water surface;It can also dispose on skyborne aircraft, balloon and artificial satellite.Embodiments herein is to wireless access The application scenarios of net equipment and terminal are without limitation.
Embodiments herein can be adapted for downlink message transmission, be readily applicable to uplink message transmission, can be with Message transmissions suitable for device-to-device (Device to Device, D2D).Need exist for being described collectively: message can To be data, alternatively, being also possible to signal, this is not construed as limiting.Downlink message is transmitted, sending device is wireless access network (relay device is used to downlink message being transmitted to wireless access network equipment, so that wireless access network is set for equipment or relay device It is standby that downlink message is sent to terminal), corresponding receiving device is terminal.Uplink message to be transmitted, sending device is terminal, Corresponding receiving device can be wireless access network equipment or relay device, and (relay device is for uplink message to be transmitted to wirelessly Access network equipment).For the message transmissions of D2D, sending device is terminal, and corresponding receiving device is also terminal.The application's Embodiment to the transmission direction of message without limitation.
It can be by authorizing frequency spectrum (licensed between wireless access network equipment and terminal and between terminal and terminal Spectrum it) is communicated, can also be by exempting from that frequency spectrum (unlicensed spectrum) is authorized to be communicated, it can also be same When by authorization frequency spectrum and exempt from authorize frequency spectrum communicated.Between wireless access network equipment and terminal and between terminal and terminal It can be communicated, can also be carried out by the frequency spectrum of 6GHz or more by 6G megahertzs of (gigahertz, GHz) frequency spectrum below Communication, can also be communicated using the frequency spectrum of 6GHz frequency spectrum below and 6GHz or more simultaneously.Embodiments herein is to nothing Used frequency spectrum resource is without limitation between line access equipment and terminal.
Optionally, system 100 shown in FIG. 1 can be applied to 5G network and other following possible networks, the application Embodiment is not especially limited this.
Wherein, system 100 shown in FIG. 1 is applied to 5G network, then as shown in Fig. 2, for example, above-mentioned session management network element 101 can be the SMF 202 in 5G, and the first network element 102 can be the UPF 208 in 5G.Optionally, the terminal that front occurs can Think that the UE 209 in 5G, data network can be the DN 207 in 5G.
Fig. 2 shows a scene figures of application the embodiment of the present application.As shown in Fig. 2, the system 200 includes: session pipe Reason function device (Session Management Function, SMF) 202 (can correspond to the session management network element in Fig. 1 101), user plane functions equipment (User Plane Function, UPF) 208 (can correspond to the first network element 102 in Fig. 1). Optionally, system 200 further include: AMF 201, wireless access network RAN203, authentication server function device (Authentication Server Function, AUSF) 204, uniform data management equipment (Unified Data Management, UDM) 205,206, data network policy control functions equipment (Policy Control function, PCF) (Data Network, DN) 207,209, application function (Application user equipment (User Equipment, UE) Function, AF) 210.Wherein, UE 209 is connect by N1 interface with AMF 201, and UE 209 passes through wireless heterogeneous networks (Radio Resource Control, RRC) agreement is connect with RAN 203;RAN 203 is connect by N2 interface with AMF 201, RAN 203 is connect by N3 interface with UPF 208;It is connected between multiple UPF 208 by N9 interface, UPF 208 is connect by N6 Mouth is connect with DN 207, meanwhile, UPF 208 is connect by N4 interface with SMF 202;SMF 202 passes through N7 interface and PCF 206 Connection, SMF 202 are connect by N20 interface with UDM 205, meanwhile, SMF 202 is connect by N11 interface with AMF 201;It is more It is connected between a AMF 201 by N14 interface, AMF 201 is connect by N8 interface with UDM 205, and AMF 201 is connect by N12 Mouth is connect with AUSF 204, meanwhile, AMF 201 is connect by N15 interface with PCF 206;AUSF 204 by N13 interface with The connection of UDM 205.AMF 201 and SMF 202 obtains user contracting data from UDM 205 by N8 and N20 interface respectively, passes through N15 and N7 interface is from 206 acquisition strategy data of PCF;AF 210 is connect by N5 interface with PCF 206.SMF 202 passes through N4 Interface Controller UPF 208.Specifically, data network DN 207 may include exchange network and server.
Optionally, the UE 209 in Fig. 2 can be applicable to relaying Relay UE scene.For example, if being in UE 209 Relay UE, then may be connect behind UE 209 one or more distal end Remote UE (including the Remote UE1 in Fig. 2, Remote UE2 ... Remote UEn), i.e., the one or more Remote UE and Relay UE have communication connection relationship.
It should be noted that the interface name between each network element in Fig. 2 is an example, interface in specific implementation Name may be other names, and the embodiment of the present application is not especially limited this.
It should be noted that the name for each network element (such as SMF 202, AF210, UPF208 etc.) for including in Fig. 2 is only It is a name, name does not constitute restriction to the function of network element itself.It is above-mentioned each in 5G network and following other networks A network element is also possible to other names, and the embodiment of the present application is not especially limited this.For example, in 6G network, it is above-mentioned each The term in 5G can be continued to use some or all of in a network element, it is also possible to which other names, etc. carry out unified say herein It is bright, it repeats no more below.
The specific work process and beneficial effect of network element may refer in hereafter embodiment of the method in Fig. 1 and Fig. 2 system Description.
Fig. 3 shows the signal of the communication equipment 300 (or device of switching user's veil member) using the embodiment of the present application Property block diagram.Session management network element 101 in above-mentioned Fig. 1, the first network element 102 (including target user's veil member or intermediate user face Network element) or source user veil member can be realized by the mode of the communication equipment in Fig. 3.
As shown in figure 3, the communication equipment 300 includes: processor 301, memory 302 and transceiver 303.Optionally, it receives Hair device 303 also may include receiver and transmitter, and receiver is for realizing receive capabilities, and transmitter is for realizing transmission function Can, this is not construed as limiting.
It is communicated with each other between processor 301, memory 302 and transceiver 303 by internal connecting path, transmitting control And/or message.
It is understood that computer equipment 300 can also include other devices, such as input dress although not showing that It sets, output device, battery etc..
Optionally, in some embodiments, memory 302 can store holding for the method for executing the embodiment of the present application Row instruction.Processor 301 can execute the instruction stored in memory 302 and complete in conjunction with other hardware (such as transceiver 303) The step of method shown below executes, specific work process and beneficial effect may refer to the description in hereafter embodiment of the method.
The method that above-mentioned the embodiment of the present application discloses can be applied in processor, or be realized by processor.Processor It may be a kind of IC chip, the processing capacity with signal.During realization, each step of above method embodiment It can be completed by the integrated logic circuit of the hardware in processor or the instruction of software form.Above-mentioned processor can be General processor, digital signal processor (Digital Signal Processor, DSP), specific integrated circuit (Application Specific Integrated Circuit, ASIC), field programmable gate array (Field Programmable Gate Array, FPGA) either other programmable logic device, discrete gate or transistor logic, Discrete hardware components can also be System on Chip/SoC (system on chip, SoC), can also be central processing unit (central Processor unit, CPU), it can also be network processing unit (network processor, NP), can also be digital signal Processing circuit (digital signal processor, DSP), can also be microcontroller (micro controller Unit, MCU), it can also be programmable controller (programmable logic device, PLD) or other integrated chips. It may be implemented or execute disclosed each method, step and the logic diagram in the embodiment of the present application.General processor can be Microprocessor or the processor are also possible to any conventional processor etc..The method in conjunction with disclosed in the embodiment of the present application Step can be embodied directly in hardware decoding processor and execute completion, or with the hardware and software module group in decoding processor Conjunction executes completion.Software module can be located at random access memory, flash memory, read-only memory, programmable read only memory or electricity In the storage medium of this fields such as erasable programmable memory, register maturation.The storage medium is located at memory, processor The step of reading the information in memory, completing the above method in conjunction with its hardware.
It is appreciated that the memory in the embodiment of the present application can be volatile memory or nonvolatile memory, or It may include both volatile and non-volatile memories.Wherein, nonvolatile memory can be read-only memory (Read- Only Memory, ROM), programmable read only memory (Programmable ROM, PROM), the read-only storage of erasable programmable Device (Erasable PROM, EPROM), electrically erasable programmable read-only memory (Electrically EPROM, EEPROM) or Flash memory.Volatile memory can be random access memory (Random Access Memory, RAM), be used as external high Speed caching.By exemplary but be not restricted explanation, the RAM of many forms is available, such as static random access memory (Static RAM, SRAM), dynamic random access memory (Dynamic RAM, DRAM), Synchronous Dynamic Random Access Memory (Synchronous DRAM, SDRAM), double data speed synchronous dynamic RAM (Double Data Rate SDRAM, DDR SDRAM), enhanced Synchronous Dynamic Random Access Memory (Enhanced SDRAM, ESDRAM), synchronized links Dynamic random access memory (Synchlink DRAM, SLDRAM) and direct rambus random access memory (Direct Rambus RAM, DR RAM).It should be noted that the memory of system and method described herein be intended to include but be not limited to these and The memory of any other suitable type.
Above-mentioned communication equipment 300 can be a general purpose computing device either dedicated computing machine equipment.? In the specific implementation, communication equipment 300 can be desktop computer, portable computer, network server, palm PC (Personal Digital Assistant, PDA), cell phone, tablet computer, wireless terminal device, communication equipment, embedded device or have The equipment of similar structures in Fig. 3.The embodiment of the present application does not limit the type of communication equipment 300.
Fig. 4 shows the schematic flow chart of the method 400 of switching user's veil member of the application one embodiment.It is described Method 400 is applied in Ethernet session context, as shown in figure 4, the method 400 includes:
S410, session management network element determine that user's veil member of Ethernet session needs gravity treatment, wherein need the use of gravity treatment Family veil member is the source user veil member of the Ethernet session.
It specifically, is the scene of Ethernet session for conversation type, session management network element can be with decision Ethernet session User veil first (such as anchor point UPF) need gravity treatment.Session management network element is the original of Ethernet session gravity treatment user veil member It is many because having, such as can be one or more in following: movement has occurred in terminal, optimizes the transmission path of message, application Gravity treatment instruction that side network element or PCF are sent etc., but it is also not necessarily limited to these.For example, being passed in the moving process of terminal in order to optimize Defeated path, overcomes a wide range of mobile bring path detour problem, and session management network element can be with decision by the Ethernet meeting of terminal User's veil member of words is switched to target user's veil member from source user veil member, to adapt to the communication requirement of terminal.
Here, in Ethernet session context, terminal is passed through in source user veil member and data network using MAC Address Server realizes communication.
S420, the session management network element send packet check instruction to the first network element, so that the reception of the first network element comes from The packet check of session management network element indicates.Packet check instruction be used to indicate first network element detect it is described with Too the downlink message of net session when notify the session management network element, wherein first network element includes target user veil member Or intermediate user veil member, target user's veil member are user's veil members for the Ethernet session gravity treatment.
Optionally, if the Ethernet session corresponds to multiple media access control MAC Address, the packet check instruction tool Body is used to indicate first network element and notifies the session management when detecting the corresponding downlink message of the multiple MAC Address Network element.
Optionally, first network element can be target user's veil member, be also possible to intermediate user veil member.It is optional Ground, in the case where the first network element is that intermediate user veil is first, intermediate user veil member can be binding node, and (for example RAN is set It is standby) or branch node BP.
Optionally, if the first network element is target user's veil member, target user's veil member is based on the packet check and refers to Show, the session management network element is notified when detecting the downlink message of the Ethernet session.
Optionally, if the first network element is intermediate user veil member, intermediate user veil member is based on the packet check and refers to Show, the session management network element is notified when detecting the downlink message of the Ethernet session.
S430, first network element send the first notification information, first notification information to the session management network element For notifying first network element to detect the downlink message of the Ethernet session to the session management network element.Accordingly, The session management network element receives first notification information from first network element.
For example, target user's veil member is the case where detecting the downlink message for the Ethernet session for being sent to terminal Under, Xiang Suoshu session management network element sends the first notification information.For another example, intermediate user veil member is being detected from target use In the case where the downlink message of the Ethernet session of family veil member, Xiang Suoshu session management network element sends the first notice letter Breath.
Further, session management network element determines the Layer2 switching of data network after receiving above-mentioned first notification information Target user's veil member is had converged to, then sends the second notification information to the source user veil member.
Alternatively, optionally, session management network element does not issue detection instruction to the first network element, but opens first timer, In the overdue situation of first timer, the second notification information is issued to source user veil member, so that source user veil member discharges Resource.
S440, the session management network element send the second notification information, second notice to the source user veil member Information is used to indicate the source user veil member release resource.Accordingly, the source user veil member, which receives, comes from the session Second notification information of managed network element, and discharge resource.Optionally, the resource of the source user veil member release includes tunnel The information such as road resource or routing rule, the embodiment of the present application are not construed as limiting this.
Alternatively, optionally, session management network element does not need to send the second notification information to source user veil member, is receiving the In the case where one notification information, a timer (such as second timer) is opened, when second timer expires, source of release is used The resource of family veil member.Here, the purpose for opening second timer is: switching user's veil member for terminal and sets aside some time, makes It obtains Ethernet session and realizes seamless switching.
Specifically, session management network element determines that user's veil member of Ethernet session needs gravity treatment, wherein need gravity treatment User's veil member be the Ethernet session source user veil member, then send packet check instruction to the first network element, make It obtains the first network element and notifies the session management network element when detecting the downlink message of the Ethernet session.First network element is being examined The first notification information is sent to session management network element when measuring the downlink message of the Ethernet session.Session management network element is being received To after the first notification information, the second notification information can be sent to source user veil member, so that source user veil member discharges as early as possible Resource.In this way, the method for switching user's veil member of the embodiment of the present application, session management network element are not needed through Ethernet session MAC Address continue to use the scheme for switching user's veil member in IP session context, but by downward message detection instruction, and receiving The second notification information is sent to source user veil member when to the first notification information from the first network element, to realize Ethernet session The switching of user's veil member in scene.Terminal and server in the realization switching method of IP address is distributed in IP session context Need to perceive the variation of IP address, the method for switching user's veil member of the embodiment of the present application is not needed through user's veil member IP address realize the switching of user's veil member, but session management network element executes the switching of user's veil member.Session management Network element by target user veil member or the detection instruction of intermediate user veil member downward message so that target user's veil member or Intermediate user veil member after the downlink message for detecting Ethernet session to the first notification information of session management reported by network elements, from And session management network element sends the information of release resource to source user veil member, on the one hand, do not need terminal and server and appoint What cooperates, and the seamless switching of terminal and server unaware may be implemented;On the other hand, industry during switching user's veil member Business is continuously, to will not influence the normal communication of business.
The situation that the first network element is target user's veil member or intermediate user veil member is described more fully below.
Situation one:
First network element is target user's veil member, wherein the packet check instruction is specifically used for instruction institute It states target user's veil member and notifies the session management network element when detecting the downlink message of the Ethernet session.
In situation one, target user's veil member during the switching user veil of Ethernet session context is first from close Key effect.In other words, intermediate user veil member can not be needed in situation one, (do not need the situation of intermediate user veil member Can be understood as target user's veil member and the conjunction of intermediate user veil member set), session management network element issues packet check instruction Give target user veil member so that target user's veil member reported when detecting the downlink message of the Ethernet session it is described Session management network element.
Optionally, in situation one, the method 400 further include: the session management network element determines the target user Veil member.
For example, session management network element can be according to position selection target user's veil of terminal.For example, if terminal Path detour also will cause, then session management network element can be by source user veil member and server communication after moving The nearest selection target user veil member of terminal, to realize the communication of terminal and server.Alternatively, session management network element can be based on Other factors selection target user veil member, such as factors, the embodiment of the present application such as load of source user veil member do not make this It limits.
Further, session management network element can notify target user's veil member to establish user face resource.Specifically for example, meeting Words managed network element issues user face to target user's veil member and establishes message, and the user face establishes message and is used to indicate the mesh Mark user's veil member establishes user face resource;Accordingly, target user's veil member sends response message to session management network element, should Response message indicates that target user's veil member completes the foundation of user face.Optionally, the packet check instruction can be carried on The user face is established in message, is also possible to individually issue, the embodiment of the present application is not construed as limiting this.
Optionally, message is established in the user face can also carry letter needed for target user's veil member establishes tunnel Breath, can specifically include: information needed for establishing the source user veil member to the tunnel between target user's veil member, Information needed for establishing the tunnel between target user's veil member and access network equipment.Optionally, the user face is established Message can also include other content, for example, service quality (Quality of Service, Qos) is regular, the letter such as charging regulation Breath, the embodiment of the present application are not construed as limiting this.
Optionally, in situation one, the method 400 further include:
The session management network element sends first routing rule, the first routing rule to target user's veil member It is used to indicate target user's veil member and the uplink message from the Ethernet session is sent to data network.It is optional Ground, the first routing rule are also used to indicate that target user's veil member is received and use from the data network and the source The downlink message of the Ethernet session of family veil member.Optionally, the first routing rule can be carried on the user Face is established in message, is also possible to individually issue, the embodiment of the present application is not construed as limiting this.
Accordingly, target user's veil member receives the first routing rule from the session management network element.It is described Target user's veil member is sent to the number according to the first routing rule, by the uplink message from the Ethernet session According to network, and receive the downlink message of the Ethernet session from the data network and source user veil member.
It should be noted that the uplink message of the Ethernet session is i.e.: the uplink message of the Ethernet session of terminal.Into The case where one step, there are multiple MAC Address for Ethernet session, the terminal is Relay terminal.That is, this Shen Please embodiment can also be applied to Fig. 2 in Relay UE scene.Specifically that is, multiple Remote UE pass through the PDU of Relay UE Session accesses network, therefore the PDU session for Relay UE, corresponding multiple MAC Address are respectively each Remote UE MAC Address.
Specifically, session management network element can issue first routing rule to target user's veil member, wherein the first via Target user's veil member is indicated to the uplink message of Ethernet session and the treatment principle of downlink message by rule.For upper The uplink message of the Ethernet session of terminal can be sent to data network by row, target user's veil member;For Downlink, target user's veil member receive the Ethernet session from the data network and source user veil member Downlink message, it is possible to further which the downlink message of the received Ethernet session is sent to terminal.
Optionally, above-mentioned data network can be the DN 207 in Fig. 2 in 5G.The data network be mobile network it Outer public network, for example with the server of UE communication etc., be respectively positioned in data network.The data network by N6 interface with User's veil member connects (for example the DN 207 in Fig. 2 is connected with UPF 208), it is believed that N6 interface has phase at user's veil member The forward rule information answered, when the uplink message of the Ethernet session reaches user's veil member, user's veil member can root Message is sent to data network according to the forward rule, a certain server that can be specifically sent in data network Deng.It should be understood that data network may evolve into other terms with similar functions or effect in future network (such as 6G), but It is equally applicable to the scheme of the embodiment of the present application, this is not construed as limiting.Optionally, the data network may include exchange network And server, this is not construed as limiting.
Optionally, the first routing rule in specific implementation can be there are many implementation.For example, the first via is by advising It then may include filtering rule and forward rule, wherein filtering rule for being filtered to received message, use by forward rule It is forwarded in filtered message.That is object of the filtering rule for specifying forward rule to be applicable in, such as filtering rule Indicate that corresponding message is the uplink message of the Ethernet session sent from access network node (such as RAN), forwarding rule It is then that the corresponding message of filtering rule is transmitted to data network.It should be understood that as long as the rule that session management network element issues has The function or effect of above-mentioned first routing rule, each fall within the protection scope of the embodiment of the present application.
Optionally, in situation one, the method 400 further include:
The session management network element sends the first tunnel information to access network node, and first tunnel information is for described Access network node establishes the tunnel between target user's veil member.Accordingly, the access network node is according to described One tunnel information establishes the tunnel (bidirectional tunnel) between target user's veil member.In this way, target user's veil member can To receive the end from the access network node by the tunnel between the access network node and target user's veil member The uplink message of the Ethernet session at end.
The session management network element sends the second tunnel information to the source user veil member, and second tunnel information is used In establishing the source user veil member to the tunnel of target user's veil member.Accordingly, the source user veil member according to Second tunnel information establishes the source user veil member to the tunnel (unidirectional tunnel) of target user's veil member.This In, target user's veil member can be come from by the source user veil member to the tunnel of target user's veil member, reception The downlink message of the Ethernet session of source user veil member.
Further, session management network element is also based on above-mentioned first tunnel information and the second tunnel information, to ether The message transmissions path of net session is updated.
Therefore, in above situation one, session management network element is indicated by detecting to target user's veil member downward message, So that target user's veil member reports session management network element when detecting the downlink message of Ethernet session, help to realize with The switching or gravity treatment of user's veil member too in net session context.
Situation two:
First network element is intermediate user veil member, wherein the packet check instruction, which has, to be used to indicate in described Between user's veil member notify institute when detecting the downlink message of the Ethernet session from target user's veil member State session management network element.
In situation two, intermediate user veil member during the switching user veil of Ethernet session context is first from close Key effect.Intermediate user veil member and target user's veil member can coexist (alternatively, it can be appreciated that target user's veil member It is set with the non-conjunction of intermediate user veil member).Packet check instruction is handed down to intermediate user veil member by session management network element, so that in Between user's veil member the session management network element is reported when detecting the downlink message of the Ethernet session.
Optionally, there may also be the session management network elements to determine target user's veil member in situation two.Specifically Mode may refer to the description in situation one, for sake of simplicity, not repeating here.
Optionally, the session management network element is also based on terminal location and determines intermediate user veil member, specifically can be with Referring to the method for determining intermediate user veil member in the prior art.
Optionally, in situation two, the method 400 further include:
The session management network element sends second routing rule, the second routing rule to the intermediate user veil member It is used to indicate the intermediate user veil member and the uplink message of the Ethernet session is sent to target user's veil member. Optionally, the second routing rule be also used to indicate the intermediate user veil member receive from the source user veil member and The downlink message of the Ethernet session of target user's veil member.
Accordingly, the intermediate user veil member receives the second routing rule from the session management network element.It is described The uplink message of the Ethernet session is sent to the target and used by intermediate user veil member according to the second routing rule Family veil member, and receive the downlink of the Ethernet session from the source user veil member and target user's veil member Message.
Here, the explanation of the uplink message of the Ethernet session may refer to the description in situation one, for sake of simplicity, this In do not repeat.
Specifically, session management network element can issue second routing rule to intermediate user veil member, wherein the second tunnel Intermediate user veil member is indicated to the uplink message of Ethernet session and the treatment principle of downlink message by rule.For upper The uplink message of the Ethernet session of terminal can be sent to the target user face by row, the intermediate user veil member Network element;For downlink, the intermediate user veil member is received from the source user veil member and target user's veil member The Ethernet session downlink message, it is possible to further by the downlink message of the received Ethernet session send To terminal.
Optionally, the second routing rule in specific implementation can be there are many implementation.For example, secondary route is advised It then may include filtering rule and forward rule.Here, the description of filtering rule and forward rule may refer in situation one Description, for sake of simplicity, which is not described herein again.It should be understood that as long as the rule that session management network element issues has above-mentioned secondary route The function or effect of rule, each fall within the protection scope of the embodiment of the present application.
Optionally, in situation two, the method 400 further include:
The session management network element sends tunnel information to the intermediate user veil member, and the tunnel information includes described Information needed for intermediate user veil member establishes the tunnel between source user veil member, the intermediate user veil member are built Information needed for tunnel between vertical and described target user's veil member and intermediate user veil member foundation connect with described Information needed for tunnel between network access node.Accordingly, the intermediate user veil member receives the tunnel information.In described Between user's veil member according to the tunnel information, tunnel is established with the source user veil member, with target user's veil member Tunnel is established, and establishes tunnel with the access network node.
Further, session management network element is also based on above-mentioned tunnel information, to the message transmissions road of Ethernet session Diameter is updated, and specifically may refer to the prior art.
Optionally, the session management network element can send release message to intermediate user veil member, which uses In instruction intermediate user veil member release resource (including tunnel resource, routing rule etc.).Accordingly, intermediate user veil primitive root The resource occupied according to release message release intermediate user veil member.
Therefore, in above situation two, session management network element is indicated by detecting to intermediate user veil member downward message, So that intermediate user veil member reports session management network element when detecting the downlink message of Ethernet session, help to realize with The switching or gravity treatment of user's veil member too in net session context.Further, by by the message of the Ethernet session of terminal It is transmitted directly to target user's veil member, so that two layers of forwarding in data network converge to rapidly the first (industry of target user's veil Business message can trigger two layers of forwarding and quickly update).
(including above situation one and situation two) in the embodiment of the present application, due in subsequent process, the Ethernet of terminal The uplink message of session is to be sent to server by target user's veil member.Based on mac learning principle, handed in data network Exchange opportunity in switching network executes mac learning (for example updating MAC forwarding table), in this way, server is sent to the message of terminal, Two layers of net exchange network will be sent to target user's veil member according to updated MAC forwarding table, so that the needle of data network Target user is converged to rapidly to the transmission path (being primarily referred to as downlink transmission path, the i.e. path of server to terminal) of terminal Veil member.
In order to facilitate the understanding of those skilled in the art, some processes of mac learning principle being related to are described below.Ethernet In scene, the interchanger of the basic principle of message forwarding inquires local mac forwarding table according to the target MAC (Media Access Control) address of message.Wherein, It may include target MAC (Media Access Control) address and corresponding port information in MAC forwarding table.Mac learning principle is introduced below with reference to Fig. 5. As shown in Figure 5, comprising: node 1 (address MAC1), node 2 (address MAC2) and node 3 (address MAC3), Yi Jijiao It changes planes 1 and (is connect by the port 1 of interchanger 1 with node 1, connect by the port 2 of interchanger 1 with the port 4 of interchanger 2, led to The port 3 for crossing interchanger 1 is connect with the port 6 of interchanger 3), interchanger 2 (is connected by the corresponding port 5 of interchanger 2 with node 2 Connect) and interchanger 3 (being connect by the corresponding port 7 of interchanger 3 with node 3).It should be understood that the port for introducing respective switch is compiled Number only to facilitate description, not to the embodiment of the present application constitute limit.MAC in original state, all interchangers turns It delivers as sky, node 1 sends message (ether network packet or data message) to node 2, wherein the source address of data packet is MAC1, destination address are MAC2 (it should be understood that being only illustrated so that destination address is MAC2 as an example here, not to the application Embodiment, which is constituted, to be limited, for example, destination address is also possible to MAC3, at this point it is possible to when using similar to destination address as MAC2 Processing mode carry out mac learning).The message reaches interchanger 1.The MAC forwarding table of interchanger 1 is sky, therefore does not have MAC2 Corresponding MAC records (i.e. the target MAC (Media Access Control) address of message).Interchanger 1 executes following two step: step 1, forwarding in MAC Increase MAC1 (the source MAC of message) relevant record in table, (this step is the base of mac learning to the corresponding port-for-port 1 of MAC1 Plinth, principle it is to be understood that interchanger 1 from the port of interchanger 11 have received source address be MAC1 message, then it is subsequent such as The destination address that fruit has message is MAC1, then can be reached by the port 1 of interchanger 1, therefore interchanger 1 receives destination address It for the message of MAC1, should issue from the port of interchanger 11, according to the connection relationship in figure, be issued from the port of interchanger 11, Node 1 can be reached);Step 2, broadcasting packet, concrete mode are to replicate to message, and the message of duplication is passed through port 2 and port 3 issue, interchanger 2 and interchanger 3 receive the message that interchanger 1 is sent, mac learning be first carried out, and MAC1 is corresponding Record be stored in respective MAC forwarding table (the same step 1) of concrete operations, then broadcasting packet, message may finally reach node 2.If subsequent node 2 or node 3 have message to be sent to node 1 (it is MAC1 that performance, which is purpose MAC), due to three interchangers All there is the record of MAC1, therefore interchanger is not necessarily to broadcasting packet, is directly forwarded by inquiring MAC forwarding table.It is logical Cross above-mentioned process, it is believed that the message that interchanger is issued according to node 1 has learnt two paths, specifically i.e.: interchanger 2- > Interchanger 1- > node 1;Interchanger 3- > interchanger 1- > node 1.
Optionally, for MAC forwarding table there is also refresh activity, the basis that MAC forwarding table updates is still that above-mentioned mac learning is former Reason.For example, if subsequent switch 1 receives the report of node 1 from other ports (such as the port 8 of interchanger 1, figure in be not drawn into) Text, interchanger 1 will execute the update of MAC forwarding table, be port 8 by the corresponding port modifications of MAC1, it may be assumed that be successfully received destination Location is the message of MAC1, is issued from port 8.The MAC forwarding table refreshing principle of other interchangers is identical as interchanger 1, herein not It repeats again.
It should be understood that the example in Fig. 5 is only illustratively described mac learning principle, the embodiment of the present application is not constituted It limits.
Hereinbefore, session management network element is indicated by detecting to the first network element downward message, so that the first network element is being examined Announcement session managed network element when measuring the downlink message of Ethernet session.Further, session management network element is subsequent to the first net Member issues routing rule, so that the first network element executes receiving or sending for message according to routing rule.It should be noted that at this Apply for the transmitting sequence that packet check instruction and routing rule can not be limited in embodiment.That is, session management network element Routing rule first can be sent to the first network element (including target user's veil member or intermediate user veil member), so that the first network element According to receiving or sending (before the first network element can be referred to based on the corresponding movement of routing rule execution for routing rule execution message The description of text, does not repeat here), help to realize the switching of user's veil member.In the case where session management network element is to the first network element After sending out routing rule, further, session management network element can also give the detection instruction of the first network element downward message.
The method that the embodiment of the present application is described in detail below in conjunction with the example in Fig. 6 and Fig. 7.It should be understood that Fig. 6 and Fig. 7 Example be intended merely to facilitate those skilled in the art understand that the embodiment of the present application, does not really want the embodiment of the present application being limited to example The concrete scene shown.Those skilled in the art are according to the example of Fig. 6 and Fig. 7, it is clear that can carry out the modification or change of various equivalences Change, such modification or variation are also fallen into the range of the embodiment of the present application.In following example, session management network element with For SMF, by taking UPF1 as an example, target user's veil member is source user veil member with (R) AN by taking UPF2 as an example, with access network node Example, by taking data network includes exchange network and server as an example, terminal is uniformly illustrated here by taking UE as an example.Optionally, scheme Example in 6 can also include AMF.In example in figure 6 and figure 7, UE by UPF1 and server realize uplink (UL) or The communication of downlink (DL) data (data).Fig. 6 is illustrated so that the first network element is UPF2 as an example, as shown in Figure 6, comprising:
601, SMF determine the Ethernet session gravity treatment UPF needed for UE.For example, can be UE gravity treatment based on the movement of UE UPF。
602, SMF, which initiate user face to UPF2, establishes message.Optionally, user face, which is established in message, can carry message inspection Instruction is surveyed, the packet check instruction is used to indicate UPF2 and notifies SMF in the downlink message for the Ethernet session for detecting UE. Optionally, it can also include routing rule in message that user face, which is established, which is used to indicate UPF2 and comes from received (R) uplink message of the UE of AN is sent directly to exchange network, and receives the downlink message of the UE from UPF1.
603, SMF send UPF gravity treatment notice to (R) AN.It optionally, include that information is established in tunnel in UPF gravity treatment notice. The tunnel that information is established for (R) AN between UPF2 is established in the tunnel.Specifically, SMF sends UPF gravity treatment notice (i.e. to AMF AMF plays transfer);AMF sends UPF gravity treatment notice to (R) AN.
604, SMF, which down forward tunnel to UPF1 transmission, establishes notice.It includes being used for that this, which down forwards tunnel and establishes notice, Information needed for establishing the tunnel between UPF1 to UPF2.
After step 604, the uplink message of the Ethernet session is sent to DN by UPF2.In exchange network, meeting The mac learning process for executing exchange network, specifically, the downlink message that DN is sent to UE can issue UPF1 before step 604. Here it is described collectively, the message in present application example can be data, be not construed as limiting to this.After this step, accordingly Interchanger receive the uplink message of UE, it is found that the message of the Ethernet session is from UPF2, then interchanger updates MAC Table is practised, is the port being connect with UPF2 by the corresponding port modifications of terminal address in mac learning table.Subsequent switch receives in this way When downlink message, according to the mac learning table, so that it may which downlink message is issued UPF2.
605, UPF2 send message arrival notice (being equivalent to the first notification information above) to SMF, which reaches logical Know the downlink message for detecting Ethernet session to SMF notice UPF2.
606, SMF send release notice (being equivalent to the second notification information above) to UPF1, which notifies for referring to Show that UPF1 discharges resource.
Therefore, in the example of fig. 6, SMF is indicated by detecting to UPF2 downward message, so that UPF2 is detecting ether SMF is notified when the downlink message of net session.
Fig. 7 be by the first network element be intermediate user veil member I-UPF for be illustrated, as shown in fig. 7, comprises:
701, SMF determine the Ethernet session gravity treatment UPF needed for UE.For example, can be UE gravity treatment based on the movement of UE UPF。
702, SMF, which initiate user face to UPF2, establishes message.Optionally, user face, which is established in message, can carry message inspection Instruction is surveyed, the packet check instruction is specifically used for instruction UPF2 notice in the downlink message for the Ethernet session for detecting UE SMF.Optionally, user face, which is established in message, to include routing rule, which is used to indicate UPF2 will be received The uplink message of UE from (R) AN is sent directly to exchange network, and receives the downlink message of the UE from UPF1.
703, SMF, which send N3UPF (the specific intermediate UPF accessed by N3 interface) to I-UPF, establishes message, should N3UPF, which establishes message and is used to indicate I-UPF, establishes user face resource.Wherein, which, which establishes message, can carry packet check Instruction, packet check instruction are specifically used for instruction I-UPF and report SMF when detecting the downlink message of Ethernet session.It can Selection of land, it can also include routing rule which, which establishes message, which is used to indicate I-UPF for Ethernet session Uplink message is sent to UPF2, and receives the downlink message of the Ethernet session from UPF1 and UPF2.Optionally, should It can also include tunnel information that N3UPF, which establishes message, which includes that I-UPF is established needed for the tunnel between UPF1 Information, information needed for I-UPF establishes the tunnel between UPF2 and I-UPF are established needed for the tunnel between (R) AN Information.
704, execution route updates.
Specifically, SMF is interacted with UPF1, in order to establish the tunnel between UPF1 and I-UPF;SMF and UPF2 It interacts, in order to establish the tunnel between UPF2 and I-UPF;SMF is interacted with (R) AN, in order to establish (R) AN with Tunnel between I-UPF.
After step 704, in exchange network, need to carry out the mac learning and MAC forwarding table renewal process of Layer2 switching (description after may refer to the associated description of mac learning principle above, such as above-mentioned steps 604) is specific that is, DN is sent to UE's Downlink message can issue UPF1 (specifically, downlink message is sent to UE by I-UPF by UPF1).After this step, accordingly Interchanger receive the uplink message of UE, it is found that the message of the Ethernet session is that (specifically I-UPF is received from I-UPF UPF2's), then interchanger updates mac learning table, is to connect with I-UPF by the corresponding port modifications of terminal address in mac learning table The port connect.When subsequent switch receives downlink message in this way, according to the mac learning table, so that it may which downlink message is issued I- Received downlink message can be sent to UPF2 by UPF, further, I-UPF.
Then, following scheme one or scheme two can also be performed.For example, being taken if the N3UPF in step 703 is established in message Band packet check indicates, then can carry into execution a plan one;Alternatively, if the user face in step 702, which is established in message, carries message inspection Instruction is surveyed, then can carry into execution a plan two.
Scheme one: 7501, I-UPF receive the downlink message of the Ethernet session of UPF2 transmission.
7502, I-UPF send notification information 1 to SMF.The notification information 1 is used to detect ether to SMF notice I-UPF The downlink message of net session.
Scheme two: 7501, UPF2 receive the downlink message of the Ethernet session of UE.
7502, UPF2 send notification information 2 to SMF.The notification information 2 is used to detect Ethernet to SMF notice UPF2 The downlink message of session.
After executing above scheme one or scheme two, step 706 can be executed, SMF sends release notice to UPF1, should Release notice is used to indicate UPF1 release resource.
Therefore, in the example of fig. 7, SMF by I-UPF downward message detect indicate so that I-UPF detect with Too the downlink message of net session when notify SMF.Alternatively, SMF is indicated by detecting to UPF2 downward message, so that UPF2 is being detected To Ethernet session downlink message when notify SMF.
It should be understood that each scheme of the embodiment of the present application can be applied in combination, and each term occurred in embodiment Explanation or explanation can refer to or explain mutually in various embodiments, this is not construed as limiting.
The method that switching user's veil member according to the embodiment of the present application is described in detail above in association with Fig. 1 to Fig. 7.Below Fig. 8 to Figure 11 description will be combined according to the device of switching user's veil member of the embodiment of the present application.It should be understood that embodiment of the method institute The technical characteristic of description is equally applicable to following Installation practice.
Fig. 8 shows the schematic block diagram of the device 800 of switching user's veil member according to the embodiment of the present application.It is optional Ground, the specific form of described device 800 can be the chip in general purpose computing device or general purpose computing device, and the application is real It applies example and this is not construed as limiting.Described device 800 is session management network element, and described device is applied in Ethernet session context, institute Stating device 800 includes:
Determining module 810, for determining that user's veil member of Ethernet session needs gravity treatment, wherein need the use of gravity treatment Family veil member is the source user veil member of the Ethernet session;
Transceiver module 820, for sending packet check instruction to the first network element, the packet check instruction is used to indicate institute It states the first network element and notifies the session management network element when detecting the downlink message of the Ethernet session, wherein described One network element includes target user's veil member or intermediate user veil member, and target user's veil member is for the Ethernet session User's veil member of gravity treatment;
The transceiver module 820 is also used to receive the first notification information from first network element, first notice Information is used to notify first network element to detect the downlink message of the Ethernet session to the session management network element;
The transceiver module 820 is also used to send the second notification information, second notice to the source user veil member Information is used to indicate the source user veil member release resource.
Optionally, if the Ethernet session corresponds to multiple media access control MAC Address, the packet check instruction tool Body is used to indicate first network element and notifies the session management when detecting the corresponding downlink message of the multiple MAC Address Network element.
In one possible implementation, first network element is target user's veil member, the packet check Described in indicating that be specifically used for instruction target user's veil member notifies when detecting the downlink message of the Ethernet session Session management network element.
Optionally, the determining module 810 is also used to: determining target user's veil member.
Optionally, the transceiver module 820 is also used to:
First routing rule is sent to target user's veil member, the first routing rule is used to indicate the target Uplink message from the Ethernet session is sent to data network by user's veil member.
Optionally, the transceiver module 820 is also used to:
To access network node send the first tunnel information, first tunnel information for the access network node establish with Tunnel between target user's veil member;
The second tunnel information is sent to the source user veil member, second tunnel information is for establishing the source user Veil member is to the tunnel of target user's veil member.
In one possible implementation, first network element is intermediate user veil member, wherein the packet check Instruction is specifically used for indicating that the intermediate user veil member is detecting the Ethernet from target user's veil member The session management network element is notified when the downlink message of session.
Optionally, the transceiver module 820 is also used to:
Second routing rule is sent to the intermediate user veil member, the second routing rule is used to indicate the centre The uplink message of the Ethernet session is sent to target user's veil member by user's veil member.
Optionally, the transceiver module 820 is also used to:
Tunnel information is sent to the intermediate user veil member, the tunnel information includes that the intermediate user veil member is built Information needed for tunnel between the vertical and described source user veil member, the intermediate user veil member are established and the target user Information needed for tunnel between veil member and the intermediate user veil member establish the tunnel between the access network node Information needed for road.
Alternatively, another embodiment can also be performed in described device 800, specifically i.e.:
Determining module 810, for determining that user's veil member of Ethernet session needs gravity treatment, wherein need the use of gravity treatment Family veil member is the source user veil member of the Ethernet session;
The determining module 810 is also used to determine intermediate user veil member;
Transceiver module 820, for sending routing rule to the intermediate user veil member, the routing rule is used to indicate The uplink message of the Ethernet session is sent to target user's veil member by the intermediate user veil member, and is used to indicate The intermediate user veil member receives the Ethernet meeting from the source user veil member and target user's veil member The downlink message of words, wherein target user's veil member is user's veil member for the Ethernet session gravity treatment.
Alternatively, another embodiment can also be performed in described device 800, specifically i.e.:
Determining module 810, for determining that user's veil member of Ethernet session needs gravity treatment, wherein need the use of gravity treatment Family veil member is the source user veil member of the Ethernet session;
The determining module 810, be also used to determine target user's veil member, target user's veil member be for it is described with Too user's veil member of net session gravity treatment;
Transceiver module 820, for sending routing rule to target user's veil member, the routing rule is used to indicate Uplink message from the Ethernet session is sent to data network by target user's veil member, and is used to indicate institute State the downlink that target user's veil member receives the Ethernet session from the data network and source user veil member Message.
Implement it should be understood that can correspond to preceding method according to the device 800 of switching user's veil member of the embodiment of the present application The method of session management network element in example, and above and other management operation and/or function of the modules in device 800 point Not in order to realize the corresponding steps of the method for session management network element in preceding method embodiment, therefore preceding method also may be implemented Beneficial effect in embodiment, for sake of simplicity, not repeating here.
It should also be understood that in the present embodiment, device 800 is presented in the form of functional module.Here " module " can To refer to application-specific integrated circuit ASIC, circuit, processor and memory, the collection for executing one or more softwares or firmware program At logic circuit and/or other device of above-mentioned function can be provided.In a simple embodiment, the technology of this field Personnel are contemplated that device 800 can use form shown in Fig. 3.Determining module 810 can pass through processor shown in Fig. 3 301 and memory 302 realize.Transceiver module 820 can be realized by transceiver 303 shown in Fig. 3.Specifically, processing Device is realized by executing the computer program stored in memory.Optionally, when described device 800 is chip, then receiving It sends out the function of module 820 and/or realizes that process can also be realized by pin or circuit etc..Optionally, the memory is Storage unit in the chip, such as register, caching etc., the storage unit can also be in the computer equipment Positioned at the storage unit of the chip exterior, as Fig. 3 memory 302.Those of ordinary skill in the art may be aware that knot Each exemplary unit and algorithm steps for closing the embodiments described herein description, can be with electronic hardware or computer The combination of software and electronic hardware is realized.These functions are implemented in hardware or software actually, depend on technical side The specific application and design constraint of case.Professional technician can carry out each specific application to come using distinct methods real Existing described function, but this realization is it is not considered that exceed scope of the present application.
Fig. 9 shows the schematic block diagram of the device 900 of switching user's veil member according to the embodiment of the present application.It is optional Ground, the specific form of described device 900 can be the chip in general purpose computing device or general purpose computing device, and the application is real It applies example and this is not construed as limiting.Described device 900 is the first network element, and described device is applied in Ethernet session context, the dress Setting 900 includes:
Receiving module 910, for receiving the packet check instruction from session management network element, the packet check instruction is used The session management network element is notified when detecting the downlink message of Ethernet session in instruction first network element, wherein institute Stating the first network element includes target user veil member or intermediate user veil member, wherein target user's veil member be described User's veil member of Ethernet session gravity treatment;
Sending module 920, for sending the first notification information to the session management network element, first notification information is used In notifying first network element to detect the downlink message of the Ethernet session to the session management network element.
In one possible implementation, first network element is target user's veil member, the packet check Described in indicating that be specifically used for instruction target user's veil member notifies when detecting the downlink message of the Ethernet session Session management network element.
Optionally, if the Ethernet session corresponds to multiple media access control MAC Address, the packet check instruction tool Body is used to indicate target user's veil member and notifies the meeting when detecting the corresponding downlink message of the multiple MAC Address Talk about managed network element.
Optionally, the receiving module 910 is also used to:
The first routing rule from the session management network element is received, the first routing rule is used to indicate the mesh It marks user's veil member and the uplink message from the Ethernet session is sent to data network;
Correspondingly, the sending module 920 is also used to: being based on the first routing rule, the Ethernet meeting will be come from The uplink message of words is sent to the data network.
Further, the first routing rule is also used to indicate that target user's veil member is received from the data The downlink message of the Ethernet session of network and source user veil member;The transceiver module 910 is also used to based on institute First routing rule is stated, the downlink report of the Ethernet session from the data network and source user veil member is received Text.
In one possible implementation, first network element is intermediate user veil member, wherein the packet check Instruction is specifically used for indicating that the intermediate user veil member is detecting the Ethernet from target user's veil member The session management network element is notified when the downlink message of session.
Optionally, the receiving module 910 is also used to:
The second routing rule from the session management network element is received, the second routing rule is used to indicate in described Between user's veil member the uplink message from the Ethernet session is sent to target user's veil member;
Correspondingly, the sending module 920 is also used to: the second routing rule is based on, by the Ethernet session Uplink message is sent to target user's veil member.
Further, the second routing rule is also used to indicate that the intermediate user veil member is received from source use The downlink message of the Ethernet session of family veil member and target user's veil member;The transceiver module 910 is also used to, Based on the second routing rule, the Ethernet from the source user veil member and target user's veil member is received The downlink message of session.
Optionally, the receiving module 910 is also used to:
The tunnel information from the session management network element is received, the tunnel information includes the intermediate user veil member Information needed for establishing the tunnel between source user veil member, the intermediate user veil member is established to be used with the target Information needed for tunnel between the veil member of family and the intermediate user veil member are established between the access network node Information needed for tunnel;
Described device 900 further include:
Module (not shown) is established, for establishing tunnel with the source user veil member according to the tunnel information, Tunnel is established with target user's veil member, and establishes tunnel with the access network node.
Implement it should be understood that can correspond to preceding method according to the device 900 of switching user's veil member of the embodiment of the present application The method of session management network element in example, and above and other management operation and/or function of the modules in device 900 point Not for the corresponding steps for realizing the method for the first network element in preceding method embodiment, therefore preceding method implementation also may be implemented Beneficial effect in example, for sake of simplicity, not repeating here.
It should also be understood that in the present embodiment, device 900 is presented in the form of functional module.Here " module " can To refer to application-specific integrated circuit ASIC, circuit, processor and memory, the collection for executing one or more softwares or firmware program At logic circuit and/or other device of above-mentioned function can be provided.In a simple embodiment, the technology of this field Personnel are contemplated that device 900 can use form shown in Fig. 3.Determining module 910 can pass through processor shown in Fig. 3 301 and memory 302 realize.Receiving module 910 and sending module 920 can be by transceivers 303 shown in Fig. 3 come real It is existing.Specifically, transceiver 303 can specifically include receiver (can correspond to receiving module 910) and transmitter and (can correspond to send out Send module 920).Specifically, processor is realized by executing the computer program stored in memory.Optionally, when described When device 900 is chip, then the function and/or realization process of receiving module 910 and sending module 920 can also pass through pin Or circuit etc. is realized.Optionally, the memory is the storage unit, such as register, caching etc. in the chip, described Storage unit can also be the storage unit positioned at the chip exterior in the computer equipment, as Fig. 3 memory 302.Those of ordinary skill in the art may be aware that unit described in conjunction with the examples disclosed in the embodiments of the present disclosure and Algorithm steps can be realized with the combination of electronic hardware or computer software and electronic hardware.These functions are actually with hard Part or software mode execute, the specific application and design constraint depending on technical solution.Professional technician can be with Each specific application is used different methods to achieve the described function, but this realization is it is not considered that exceed this Shen Range please.
Figure 10 shows the schematic block diagram of the device 1000 of switching user's veil member according to the embodiment of the present application.It is optional Ground, the specific form of described device 1000 can be the chip in general purpose computing device or general purpose computing device, the application Embodiment is not construed as limiting this.Described device 1000 is intermediate user veil member, and described device is applied to Ethernet session context In, described device 1000 includes:
Receiving module 1010, for receiving the routing rule from session management network element, the routing rule is used to indicate The uplink message of Ethernet session is sent to target user's veil member by the intermediate user veil member, and is used to indicate described The downlink of the Ethernet session of the intermediate user veil member reception from source user veil member and target user's veil member Message;
The uplink message of the Ethernet session is sent to institute for being based on the routing rule by sending module 1020 Target user's veil member is stated, and receives the Ethernet meeting from the source user veil member and target user's veil member The downlink message of words.
Optionally, the receiving module 1010 is also used to receive the packet check instruction from session management network element, then Based on packet check instruction announcement session managed network element when detecting the downlink message of Ethernet session.
Optionally, if the Ethernet session corresponds to multiple media access control MAC Address, the packet check instruction tool Body is used to indicate the intermediate user veil member and notifies the meeting when detecting the corresponding downlink message of the multiple MAC Address Talk about managed network element.
Implement it should be understood that can correspond to preceding method according to the device 1000 of switching user's veil member of the embodiment of the present application The method of session management network element in example, and above and other management operation and/or function of the modules in device 1000 Respectively in order to realize the corresponding steps of the method for intermediate user veil member in preceding method embodiment, therefore also may be implemented aforementioned Beneficial effect in embodiment of the method, for sake of simplicity, not repeating here.
It should also be understood that in the present embodiment, device 1000 is presented in the form of functional module.Here " module " can To refer to application-specific integrated circuit ASIC, circuit, processor and memory, the collection for executing one or more softwares or firmware program At logic circuit and/or other device of above-mentioned function can be provided.In a simple embodiment, the technology of this field Personnel are contemplated that device 1000 can use form shown in Fig. 3.Receiving module 1010 and sending module 1020 can pass through Transceiver 303 shown in Fig. 3 is realized.Specifically, transceiver 303, which can specifically include receiver, (can correspond to receiving module And transmitter (can correspond to sending module 1020) 1010).Specifically, processor is by executing the computer stored in memory Program is realized.Optionally, when described device 1000 is chip, then the function of receiving module 1010 and sending module 1020 And/or realize that process can also be realized by pin or circuit etc..Optionally, the memory is the storage in the chip Unit, such as register, caching etc., the storage unit, which can also be in the computer equipment, is located at the chip exterior Storage unit, as Fig. 3 memory 302.Those of ordinary skill in the art may be aware that in conjunction with disclosed herein Each exemplary unit and algorithm steps of embodiment description, can be with electronic hardware or computer software and electronic hardware In conjunction with realizing.These functions are implemented in hardware or software actually, depending on technical solution specific application and set Count constraint condition.Professional technician can use different methods to achieve the described function each specific application, But this realization is it is not considered that exceed scope of the present application.
Figure 11 shows the schematic block diagram of the device 1100 of switching user's veil member according to the embodiment of the present application.It is optional Ground, the specific form of described device 1100 can be the chip in general purpose computing device or general purpose computing device, the application Embodiment is not construed as limiting this.Described device 1100 is target user's veil member, and described device is applied to Ethernet session context In, described device 1100 includes:
Receiving module 1110, for receiving the routing rule from session management network element, the routing rule is used to indicate Uplink message from Ethernet session is sent to data network by target user's veil member, and is used to indicate the mesh Mark the downlink message that user's veil member receives the Ethernet session from the data network and source user veil member;
Sending module 1120, for being based on the routing rule, by the Ethernet session from access network node Uplink message is sent to data network, and receives the Ethernet meeting from the data network and source user veil member The downlink message of words.
Optionally, the receiving module 1110 is also used to receive the packet check instruction from session management network element, then Based on packet check instruction announcement session managed network element when detecting the downlink message of Ethernet session.
Optionally, if the Ethernet session corresponds to multiple media access control MAC Address, the packet check instruction tool Body is used to indicate target user's veil member and notifies the meeting when detecting the corresponding downlink message of the multiple MAC Address Talk about managed network element.
Implement it should be understood that can correspond to preceding method according to the device 1100 of switching user's veil member of the embodiment of the present application The method of session management network element in example, and above and other management operation and/or function of the modules in device 1100 Respectively in order to realize the corresponding steps of the method for target user's veil member in preceding method embodiment, therefore also may be implemented aforementioned Beneficial effect in embodiment of the method, for sake of simplicity, not repeating here.
It should also be understood that in the present embodiment, device 1100 is presented in the form of functional module.Here " module " can To refer to application-specific integrated circuit ASIC, circuit, processor and memory, the collection for executing one or more softwares or firmware program At logic circuit and/or other device of above-mentioned function can be provided.In a simple embodiment, the technology of this field Personnel are contemplated that device 1100 can use form shown in Fig. 3.Determining module 1110 can pass through processor shown in Fig. 3 301 and memory 302 realize.Receiving module 1110 and sending module 1120 can be by transceivers 303 shown in Fig. 3 come real It is existing.Specifically, transceiver 303 can specifically include receiver (can correspond to receiving module 1110) and transmitter and (can correspond to Sending module 1120).Specifically, processor is realized by executing the computer program stored in memory.Optionally, work as institute When to state device 1100 be chip, then the function of receiving module 1110 and sending module 1120 and/or realizing that process can also lead to Pin or circuit etc. are crossed to realize.Optionally, the memory is the storage unit in the chip, such as register, caching Deng, the storage unit can also be the storage unit positioned at the chip exterior in the computer equipment, as Fig. 3 Memory 302.Those of ordinary skill in the art may be aware that described in conjunction with the examples disclosed in the embodiments of the present disclosure Unit and algorithm steps can be realized with the combination of electronic hardware or computer software and electronic hardware.These functions are studied carefully Unexpectedly it is implemented in hardware or software, the specific application and design constraint depending on technical solution.Professional technique people Member can use different methods to achieve the described function each specific application, but this realization is it is not considered that super Scope of the present application out.
" project includes at least one of following: the meaning of A, B and C " statement, such as nothing for being similar to of occurring in the application It illustrates, it can be any of following for typically referring to the project: A;B;C;A and B;A and C;B and C;A, B and C;A and A;A, A and A;A, A and B;A, A and C, A, B and B;A, C and C;B and B, B, B and B, B, B and C, C and C;C, C and C and other A, B and The combination of C.It is that totally 3 elements carry out the optional entry of for example bright project with A, B and C above, when being expressed as " project Including at least one of following: A, B ... ... and when X ", i.e., when there is more multielement in expression, then the project can fit Entry can also be obtained according to aforementioned rule.Further, in the embodiment of the present application, " multiple " can be understood as " extremely It is two few ";" multinomial " can be understood as " at least two ".
It should also be understood that magnitude of the sequence numbers of the above procedures are not meant to execute in the various embodiments of the application Sequence it is successive, the execution of each process sequence should be determined by its function and internal logic, the reality without coping with the embodiment of the present application It applies process and constitutes any restriction.
It should also be understood that the number " first " occurred in the embodiment of the present application, " second ", are intended merely to distinguish different pairs As for example, different " notification information " is distinguished, alternatively, different " routing rule " etc. is distinguished, not to the embodiment of the present application structure At restriction.
Those of ordinary skill in the art may be aware that list described in conjunction with the examples disclosed in the embodiments of the present disclosure Member and algorithm steps can be realized with the combination of electronic hardware or computer software and electronic hardware.These functions are actually It is implemented in hardware or software, the specific application and design constraint depending on technical solution.Professional technician Each specific application can be used different methods to achieve the described function, but this realization is it is not considered that exceed Scope of the present application.
It is apparent to those skilled in the art that for convenience and simplicity of description, the system of foregoing description, The specific work process of device and unit, can refer to corresponding processes in the foregoing method embodiment, and details are not described herein.
In several embodiments provided herein, it should be understood that disclosed systems, devices and methods, it can be with It realizes by another way.For example, the apparatus embodiments described above are merely exemplary, for example, the unit It divides, only a kind of logical function partition, there may be another division manner in actual implementation, such as multiple units or components It can be combined or can be integrated into another system, or some features can be ignored or not executed.Another point, it is shown or The mutual coupling, direct-coupling or communication connection discussed can be through some interfaces, the indirect coupling of device or unit It closes or communicates to connect, can be electrical property, mechanical or other forms.
The unit as illustrated by the separation member may or may not be physically separated, aobvious as unit The component shown may or may not be physical unit, it can and it is in one place, or may be distributed over multiple In network unit.It can select some or all of unit therein according to the actual needs to realize the mesh of this embodiment scheme 's.
It, can also be in addition, each functional unit in each embodiment of the application can integrate in one processing unit It is that each unit physically exists alone, can also be integrated in one unit with two or more units.
It, can be with if the function is realized in the form of SFU software functional unit and when sold or used as an independent product It is stored in a computer readable storage medium.Based on this understanding, the technical solution of the application is substantially in other words The part of the part that contributes to existing technology or the technical solution can be embodied in the form of software products, the meter Calculation machine software product is stored in a storage medium, including some instructions are used so that a computer equipment (can be a People's computer, server or network equipment etc.) execute each embodiment the method for the application all or part of the steps. And storage medium above-mentioned includes: that USB flash disk, mobile hard disk, read-only memory (Read-Only Memory, ROM), arbitrary access are deposited The various media that can store program code such as reservoir (Random Access Memory, RAM), magnetic or disk.
The above, the only specific embodiment of the application, but the protection scope of the application is not limited thereto, it is any Those familiar with the art within the technical scope of the present application, can easily think of the change or the replacement, and should all contain Lid is within the scope of protection of this application.Therefore, the protection scope of the application should be based on the protection scope of the described claims.

Claims (39)

1. a kind of method for switching user's veil member, which is characterized in that the method is applied in Ethernet session context, described Method includes:
Session management network element determines that user's veil member of Ethernet session needs gravity treatment, wherein needs user's veil member of gravity treatment It is the source user veil member of the Ethernet session;
The session management network element sends packet check instruction to the first network element, and packet check instruction is used to indicate described the One network element notifies the session management network element when detecting the downlink message of the Ethernet session, wherein first net Member includes target user's veil member or intermediate user veil member, and target user's veil member is for the Ethernet session gravity treatment User veil member;
The session management network element receives the first notification information from first network element, first notification information be used for The session management network element notifies first network element to detect the downlink message of the Ethernet session;
The session management network element sends the second notification information to the source user veil member, and second notification information is for referring to Show the source user veil member release resource.
2. the method according to claim 1, wherein first network element is target user's veil member, institute Packet check instruction is stated to be specifically used for indicating target user's veil member in the downlink message for detecting the Ethernet session Session management network element described in Shi Tongzhi.
3. according to the method described in claim 2, it is characterized in that, the method also includes:
The session management network element determines target user's veil member.
4. according to the method in claim 2 or 3, which is characterized in that the method also includes:
The session management network element sends first routing rule to target user's veil member, and the first routing rule is used for Indicate that target user's veil member will be sent to data network from the uplink message of the Ethernet session.
5. according to the method described in claim 4, it is characterized in that, the first routing rule is also used to indicate that the target is used The downlink message of the Ethernet session of the veil member reception in family from the data network and source user veil member.
6. method according to claim 4 or 5, which is characterized in that the method also includes:
The session management network element sends the first tunnel information to access network node, and first tunnel information is used for the access Net node establishes the tunnel between target user's veil member;
The session management network element sends the second tunnel information to the source user veil member, and second tunnel information is for building The source user veil member is found to the tunnel of target user's veil member.
7. the method according to claim 1, wherein first network element is intermediate user veil member, wherein institute Packet check instruction is stated to be specifically used for indicating that the intermediate user veil member is being detected from target user's veil member The session management network element is notified when the downlink message of the Ethernet session.
8. the method according to the description of claim 7 is characterized in that the method also includes:
The session management network element sends second routing rule to the intermediate user veil member, and the second routing rule is used for Indicate that the uplink message of the Ethernet session is sent to target user's veil member by the intermediate user veil member.
9. according to the method described in claim 8, it is characterized in that, the second routing rule is also used to indicate the intermediate use The downlink report of the Ethernet session of the veil member reception in family from the source user veil member and target user's veil member Text.
10. method according to claim 8 or claim 9, which is characterized in that the method also includes:
The session management network element sends tunnel information to the intermediate user veil member, and the tunnel information includes the centre Information needed for user's veil member establishes the tunnel between source user veil member, the intermediate user veil member establish with Information needed for tunnel between target user's veil member and the intermediate user veil member are established and the access net Information needed for tunnel between node.
11. method according to any one of claim 1 to 10, which is characterized in that if Ethernet session correspondence is more A media access control MAC Address, packet check instruction be specifically used for indicating first network element detect it is described more The session management network element is notified when the corresponding downlink message of a MAC Address.
12. a kind of method for switching user's veil member, which is characterized in that the method is applied in Ethernet session context, institute The method of stating includes:
Session management network element determines that user's veil member of Ethernet session needs gravity treatment, wherein needs user's veil member of gravity treatment It is the source user veil member of the Ethernet session;
The session management network element determines intermediate user veil member;
The session management network element sends routing rule to the intermediate user veil member, and the routing rule is used to indicate described The uplink message of the Ethernet session is sent to target user's veil member by intermediate user veil member, and is used to indicate described Intermediate user veil member receives the Ethernet session from the source user veil member and target user's veil member Downlink message, wherein target user's veil member is user's veil member for the Ethernet session gravity treatment.
13. a kind of method for switching user's veil member, which is characterized in that the method is applied in Ethernet session context, institute The method of stating includes:
Session management network element determines that user's veil member of Ethernet session needs gravity treatment, wherein needs user's veil member of gravity treatment It is the source user veil member of the Ethernet session;
The session management network element determines target user's veil member, and target user's veil member is for the Ethernet session weight User's veil member of choosing;
The session management network element sends routing rule to target user's veil member, and the routing rule is used to indicate described Uplink message from the Ethernet session is sent to data network by target user's veil member, and is used to indicate the mesh Mark the downlink message that user's veil member receives the Ethernet session from the data network and source user veil member.
14. a kind of method for switching user's veil member, which is characterized in that the method is applied in Ethernet session context, institute The method of stating includes:
First network element receives the packet check instruction from session management network element, and packet check instruction is used to indicate described the One network element notifies the session management network element when detecting the downlink message of Ethernet session, wherein the first network element packet Include target user's veil member or intermediate user veil member, wherein target user's veil member is for the Ethernet session weight User's veil member of choosing;
First network element sends the first notification information to the session management network element, and first notification information is used for described Session management network element notifies first network element to detect the downlink message of the Ethernet session.
15. according to the method for claim 14, which is characterized in that first network element is target user's veil member, The packet check instruction is specifically used for indicating target user's veil member in the downlink report for detecting the Ethernet session The session management network element is notified when literary.
16. according to the method for claim 15, which is characterized in that the method also includes:
Target user's veil member receives the first routing rule from the session management network element, the first routing rule It is used to indicate target user's veil member and the uplink message from the Ethernet session is sent to data network;
Target user's veil member is based on the first routing rule, will send from the uplink message of the Ethernet session To the data network.
17. according to the method for claim 14, which is characterized in that first network element is intermediate user veil member, wherein The packet check instruction is specifically used for indicating that the intermediate user veil member is being detected from target user's veil member The Ethernet session downlink message when notify the session management network element.
18. according to the method for claim 17, which is characterized in that the method also includes:
The intermediate user veil member receives the second routing rule from the session management network element, the second routing rule It is used to indicate the intermediate user veil member and the uplink message from the Ethernet session is sent to the target user face Network element;
The intermediate user veil member is based on the second routing rule, and the uplink message of the Ethernet session is sent to institute State target user's veil member.
19. according to the method for claim 18, which is characterized in that the method also includes:
The intermediate user veil member receives the tunnel information from the session management network element, and the tunnel information includes described Information needed for intermediate user veil member establishes the tunnel between source user veil member, the intermediate user veil member are built Information needed for tunnel between vertical and described target user's veil member and intermediate user veil member foundation connect with described Information needed for tunnel between network access node;
The intermediate user veil member establishes tunnel according to the tunnel information, with the source user veil member, with the target User's veil member establishes tunnel, and establishes tunnel with the access network node.
20. a kind of method for switching user's veil member, which is characterized in that the method is applied in Ethernet session context, institute The method of stating includes:
Intermediate user veil member receives the routing rule from session management network element, and the routing rule is used to indicate the centre The uplink message of Ethernet session is sent to target user's veil member by user's veil member, and is used to indicate the intermediate user The downlink message of the Ethernet session of the veil member reception from source user veil member and target user's veil member;
The intermediate user network element is based on the routing rule, and the uplink message of the Ethernet session is sent to the target User's veil member, and receive under the Ethernet session from the source user veil member and target user's veil member Row message.
21. a kind of method for switching user's veil member, which is characterized in that the method is applied in Ethernet session context, institute The method of stating includes:
Target user's veil member receives the routing rule from session management network element, and the routing rule is used to indicate the target Uplink message from Ethernet session is sent to data network by user's veil member, and is used to indicate the target user face The downlink message of the Ethernet session of the network element reception from the data network and source user veil member;
Target user's veil member is based on the routing rule, by the uplink of the Ethernet session from access network node Message is sent to data network, and receives the Ethernet session from the data network and source user veil member Downlink message.
22. a kind of device for switching user's veil member, which is characterized in that described device is applied in Ethernet session context, institute Stating device is session management network element, and described device includes:
Determining module, for determining that user's veil member of Ethernet session needs gravity treatment, wherein need user's veil member of gravity treatment It is the source user veil member of the Ethernet session;
Transceiver module, for sending packet check instruction to the first network element, the packet check instruction is used to indicate described first Network element notifies the session management network element when detecting the downlink message of the Ethernet session, wherein first network element Including target user's veil member or intermediate user veil member, target user's veil member is for the Ethernet session gravity treatment User's veil member;
The transceiver module, is also used to receive the first notification information from first network element, and first notification information is used In notifying first network element to detect the downlink message of the Ethernet session to the session management network element;
The transceiver module is also used to send the second notification information to the source user veil member, and second notification information is used Resource is discharged in the instruction source user veil member.
23. device according to claim 22, which is characterized in that first network element is target user's veil member, The packet check instruction is specifically used for indicating target user's veil member in the downlink report for detecting the Ethernet session The session management network element is notified when literary.
24. device according to claim 23, which is characterized in that the transceiver module is also used to:
First routing rule is sent to target user's veil member, the first routing rule is used to indicate the target user Uplink message from the Ethernet session is sent to data network by veil member.
25. device according to claim 24, which is characterized in that the transceiver module is also used to:
To access network node send the first tunnel information, first tunnel information for the access network node establish with it is described Tunnel between target user's veil member;
The second tunnel information is sent to the source user veil member, second tunnel information is for establishing the source user veil Member arrives the tunnel of target user's veil member.
26. device according to claim 22, which is characterized in that first network element is intermediate user veil member, wherein The packet check instruction is specifically used for indicating that the intermediate user veil member is being detected from target user's veil member The Ethernet session downlink message when notify the session management network element.
27. device according to claim 26, which is characterized in that the transceiver module is also used to:
Second routing rule is sent to the intermediate user veil member, the second routing rule is used to indicate the intermediate user The uplink message of the Ethernet session is sent to target user's veil member by veil member.
28. the device according to claim 26 or 27, which is characterized in that the transceiver module is also used to:
Send tunnel information to the intermediate user veil member, the tunnel information include the intermediate user veil member establish with Information needed for tunnel between the source user veil member, the intermediate user veil member are established and target user's veil Information needed for tunnel between member and the intermediate user veil member establish the tunnel institute between the access network node The information needed.
29. a kind of device for switching user's veil member, which is characterized in that described device is applied in Ethernet session context, institute Stating device is session management network element, and described device includes:
Determining module, for determining that user's veil member of Ethernet session needs gravity treatment, wherein need user's veil member of gravity treatment It is the source user veil member of the Ethernet session;
The determining module is also used to determine intermediate user veil member;
Transceiver module, for sending routing rule to the intermediate user veil member, the routing rule is used to indicate in described Between user's veil member the uplink message of the Ethernet session is sent to target user veil member, and be used to indicate in described Between user's veil member receive the Ethernet session from the source user veil member and target user's veil member under Row message, wherein target user's veil member is user's veil member for the Ethernet session gravity treatment.
30. a kind of device for switching user's veil member, which is characterized in that described device is applied in Ethernet session context, institute Stating device is session management network element, and described device includes:
Determining module, for determining that user's veil member of Ethernet session needs gravity treatment, wherein need user's veil member of gravity treatment It is the source user veil member of the Ethernet session;
The determining module is also used to determine target user's veil member, and target user's veil member is for the Ethernet meeting Talk about user's veil member of gravity treatment;
Transceiver module, for sending routing rule to target user's veil member, the routing rule is used to indicate the mesh It marks user's veil member and the uplink message from the Ethernet session is sent to data network, and be used to indicate the target The downlink message of the Ethernet session of user's veil member reception from the data network and source user veil member.
31. a kind of device for switching user's veil member, which is characterized in that described device is applied in Ethernet session context, institute Stating device is the first network element, and described device includes:
Receiving module, for receiving the packet check instruction from session management network element, the packet check instruction is used to indicate First network element notifies the session management network element when detecting the downlink message of Ethernet session, wherein described first Network element includes target user's veil member or intermediate user veil member, wherein target user's veil member is for the Ethernet User's veil member of session gravity treatment;
Sending module, for sending the first notification information to the session management network element, first notification information is used for institute Stating session management network element notifies first network element to detect the downlink message of the Ethernet session.
32. device according to claim 31, which is characterized in that first network element is target user's veil member, The packet check instruction is specifically used for indicating target user's veil member in the downlink report for detecting the Ethernet session The session management network element is notified when literary.
33. device according to claim 32, which is characterized in that the receiving module is also used to:
The first routing rule from the session management network element is received, the first routing rule is used to indicate the target and uses Uplink message from the Ethernet session is sent to data network by family veil member;
Correspondingly, the sending module is also used to: the first routing rule is based on, by the uplink from the Ethernet session Message is sent to the data network.
34. device according to claim 31, which is characterized in that first network element is intermediate user veil member, wherein The packet check instruction is specifically used for indicating that the intermediate user veil member is being detected from target user's veil member The Ethernet session downlink message when notify the session management network element.
35. device according to claim 34, which is characterized in that the receiving module is also used to:
The second routing rule from the session management network element is received, the second routing rule is used to indicate the intermediate use Uplink message from the Ethernet session is sent to target user's veil member by family veil member;
Correspondingly, the sending module is also used to: the second routing rule is based on, by the uplink message of the Ethernet session It is sent to target user's veil member.
36. device according to claim 35, which is characterized in that the receiving module is also used to:
The tunnel information from the session management network element is received, the tunnel information includes that the intermediate user veil member is established Information needed for tunnel between the source user veil member, the intermediate user veil member are established and the target user face Information needed for tunnel between network element and the intermediate user veil member establish the tunnel between the access network node Required information;
Described device further include:
Module is established, for tunnel being established with the source user veil member, with the target user face according to the tunnel information Network element establishes tunnel, and establishes tunnel with the access network node.
37. a kind of device for switching user's veil member, which is characterized in that described device is applied in Ethernet session context, institute Stating device is intermediate user veil member, and described device includes:
Receiving module, for receiving the routing rule from session management network element, the routing rule is used to indicate the centre The uplink message of Ethernet session is sent to target user's veil member by user's veil member, and is used to indicate the intermediate user The downlink message of the Ethernet session of the veil member reception from source user veil member and target user's veil member;
The uplink message of the Ethernet session is sent to the target and used by sending module for being based on the routing rule Family veil member, and receive the downlink of the Ethernet session from the source user veil member and target user's veil member Message.
38. a kind of device for switching user's veil member, which is characterized in that described device is applied in Ethernet session context, institute Stating device is target user's veil member, and described device includes:
Receiving module, for receiving the routing rule from session management network element, the routing rule is used to indicate the target Uplink message from Ethernet session is sent to data network by user's veil member, and is used to indicate the target user face The downlink message of the Ethernet session of the network element reception from the data network and source user veil member;
Sending module, for being based on the routing rule, by the uplink message of the Ethernet session from access network node It is sent to data network, and receives the downlink of the Ethernet session from the data network and source user veil member Message.
39. a kind of system for switching user's veil member, which is characterized in that the system is applied in Ethernet session context, institute The system of stating includes:
Session management network element, for determining that user's veil member of Ethernet session needs gravity treatment, wherein need the user face of gravity treatment Network element is the source user veil member of the Ethernet session;
The session management network element is also used to send packet check instruction to the first network element, and the packet check instruction is for referring to Show that first network element notifies the session management network element when detecting the downlink message of the Ethernet session, wherein institute Stating the first network element includes target user's veil member or intermediate user veil member, and target user's veil member is for the Ethernet User's veil member of session gravity treatment;
First network element, for sending the first notification information to the session management network element, first notification information is used for First network element is notified to detect the downlink message of the Ethernet session to the session management network element;
The session management network element is also used to, and Xiang Suoshu source user veil member sends the second notification information, the second notice letter Breath is used to indicate the source user veil member release resource.
CN201810208474.3A 2018-03-14 2018-03-14 Method, device and system for switching user plane network element Active CN110278584B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201810208474.3A CN110278584B (en) 2018-03-14 2018-03-14 Method, device and system for switching user plane network element
PCT/CN2019/075462 WO2019174440A1 (en) 2018-03-14 2019-02-19 Method for switching user plane network element, device, and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810208474.3A CN110278584B (en) 2018-03-14 2018-03-14 Method, device and system for switching user plane network element

Publications (2)

Publication Number Publication Date
CN110278584A true CN110278584A (en) 2019-09-24
CN110278584B CN110278584B (en) 2020-12-15

Family

ID=67908672

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810208474.3A Active CN110278584B (en) 2018-03-14 2018-03-14 Method, device and system for switching user plane network element

Country Status (2)

Country Link
CN (1) CN110278584B (en)
WO (1) WO2019174440A1 (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2021104484A1 (en) * 2019-11-29 2021-06-03 华为技术有限公司 Communication method, apparatus and system
CN112969209A (en) * 2021-02-20 2021-06-15 腾讯科技(深圳)有限公司 Switching control method and device of service server, electronic equipment and storage medium
WO2021136212A1 (en) * 2019-12-31 2021-07-08 华为技术有限公司 Routing configuration method and device
CN113973269A (en) * 2020-07-23 2022-01-25 华为技术有限公司 Data transmission method, device and system
CN113973050A (en) * 2020-07-23 2022-01-25 华为技术有限公司 Route configuration method and device
WO2023116568A1 (en) * 2021-12-21 2023-06-29 华为技术有限公司 Switching method, communication apparatus, and communication system
WO2024114229A1 (en) * 2022-11-28 2024-06-06 中兴通讯股份有限公司 Network resource release method, network element, communications system, and storage medium

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116033494A (en) * 2021-10-26 2023-04-28 华为技术有限公司 Indication information transmission method, message transmission method and related devices
CN115002016B (en) * 2022-05-17 2023-08-22 阿里云计算有限公司 Message processing system, method, device and storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104853338A (en) * 2014-02-14 2015-08-19 中国移动通信集团广东有限公司 Business continuing method, device, and mobile switching center / visitor location register
US20170288972A1 (en) * 2016-03-31 2017-10-05 Huawei Technologies Co., Ltd. Systems and methods for service and session continuity in software defined topology management
WO2018006017A1 (en) * 2016-07-01 2018-01-04 Idac Holdings, Inc. Methods for supporting session continuity on per-session basis
CN107548127A (en) * 2016-06-23 2018-01-05 北京三星通信技术研究有限公司 The method and apparatus for supporting data transfer

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101841836A (en) * 2009-03-19 2010-09-22 华为技术有限公司 Switching optimization method, switching device and system
CN109121170B (en) * 2017-06-26 2021-04-20 华为技术有限公司 Session management method, device, equipment and system
CN108337705B (en) * 2018-01-31 2020-08-28 中国联合网络通信集团有限公司 User plane reselection method and device

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104853338A (en) * 2014-02-14 2015-08-19 中国移动通信集团广东有限公司 Business continuing method, device, and mobile switching center / visitor location register
US20170288972A1 (en) * 2016-03-31 2017-10-05 Huawei Technologies Co., Ltd. Systems and methods for service and session continuity in software defined topology management
CN107548127A (en) * 2016-06-23 2018-01-05 北京三星通信技术研究有限公司 The method and apparatus for supporting data transfer
WO2018006017A1 (en) * 2016-07-01 2018-01-04 Idac Holdings, Inc. Methods for supporting session continuity on per-session basis

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
HUAWEI, HISILICON: "TS 23.502: Clarification of Xn based HO", 《SA WG2 MEETING #124,S2-178811》 *
INTERDIGITAL: "23.502: Correction of figures 4.9.1.1.2-1 and 4.9.1.1.3-1", 《SA WG2 MEETING #122,S2-174384》 *

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2021104484A1 (en) * 2019-11-29 2021-06-03 华为技术有限公司 Communication method, apparatus and system
WO2021136212A1 (en) * 2019-12-31 2021-07-08 华为技术有限公司 Routing configuration method and device
CN113973269A (en) * 2020-07-23 2022-01-25 华为技术有限公司 Data transmission method, device and system
CN113973050A (en) * 2020-07-23 2022-01-25 华为技术有限公司 Route configuration method and device
WO2022017527A1 (en) * 2020-07-23 2022-01-27 华为技术有限公司 Data transmission method, apparatus and system
CN113973050B (en) * 2020-07-23 2024-08-27 华为技术有限公司 Route configuration method and device
CN112969209A (en) * 2021-02-20 2021-06-15 腾讯科技(深圳)有限公司 Switching control method and device of service server, electronic equipment and storage medium
WO2023116568A1 (en) * 2021-12-21 2023-06-29 华为技术有限公司 Switching method, communication apparatus, and communication system
WO2024114229A1 (en) * 2022-11-28 2024-06-06 中兴通讯股份有限公司 Network resource release method, network element, communications system, and storage medium

Also Published As

Publication number Publication date
CN110278584B (en) 2020-12-15
WO2019174440A1 (en) 2019-09-19

Similar Documents

Publication Publication Date Title
CN110278584A (en) Switch the methods, devices and systems of user's veil member
WO2021223507A1 (en) Communication method and apparatus, and chip
CN105027664B (en) Grouped data in the wireless communication system using WLAN connects
CN110383886A (en) Method and apparatus for changing between the system in wirelessly communicating
US9271165B2 (en) Method for establishing connection by HNB
CN108702810A (en) The method and apparatus that the cell particular procedure or mobile process of the NR for being sliced based on network are executed in wireless communication system
CN102869116B (en) Local network and method for establishing connection between local gateway and home base station
CN108605383A (en) The method and apparatus that the cell standardising process of the NR for being sliced based on network is executed in wireless communication system
CN108924884A (en) Communication means and communication equipment
CN110383867A (en) Terminal installation, core network device and communication control method
CN109996306A (en) Communication means and communication equipment
KR20200126003A (en) Session context conversion
CN107005886A (en) WIFI enhancings with LTE IP anchor points
CN104255046A (en) Customizable mobile broadband network system, and method for customizing mobile broadband network
CN108432334A (en) The communication means of terminal installation, MME, the communication means of terminal installation and MME
CN107105458B (en) A kind of information processing method and device
CN105376739A (en) Network authentication method and system
CN109996303A (en) A kind of method and communication entity of system switching
CN109842640A (en) The method, apparatus and communication system of switching server
CN110519172B (en) Wireless communication method and apparatus
CN103220721B (en) Wireless access capability report method and base station, policy control method and system
WO2023011049A1 (en) Communication method and apparatus
CN102868997B (en) Local gateway information processing method and device
CN109041144A (en) A kind of Inter-System Information exchange method, wireless communication system and user equipment
CN109429366A (en) A kind of PDU conversation processing method and equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant