The present invention relates to a solution for handling roaming subscribers and in particular for handling operator specific policies.
Simple and cost efficient means for providing and controlling Quality of Service (QoS) are important for wireless operators. This has been one of the main drivers behind the evolution of the QoS architecture in Evolved Packet System (EPS). EPS is designed for leverage of services from different providers and over different access types to mobile terminals.
One of the main goals for operator control is that he can control subscribers in their use of network resources. This is crucial not at least with the introduction of mobile broadband where resource control becomes important. While policy control is a built in feature in the home operator's network, there is lack of functionality in the visited operator's network to achieve the same level of functionality. The currently known network architecture, e.g. as seen in 3GPP Rel-8 model, give full control over services and subscribers to the home operator, while the visited operator lacks this tools. It is fair to argue that the same level of control needs to be available to visited operators as the visited subscriber uses resources in the visited network. With Rel-8 network architecture home operators can rule over resources in the visited network. In order to give control and the necessary tools to the network owner changes to the defined architecture are needed.
The main problems network owner face with visited subscribers in a GTP based EPC is:
This means the network owner has very limited control over resource usage by visited subscribers (only the RAN can limit the usage based on cell resources). All other kind of control is in the hand of the home operators. It may be questioned how much home operators are concerned over resource usage in the competitors network.
Rel-8 architecture defines a model where the home operators have full control over requested and used network resources. From an operator to operator business perspective the current architecture doesn't fulfill the basic needs for controlling the network operators own resources.
It is therefore an object of the present invention to provide solutions that mitigates at least some of the aforementioned problems.
The present invention enhances the Evolved Packet Core (EPC) architecture and adds functionality enabling full control over visited subscribers by a network owner. The present invention provides the network owner control over allocation and usage of its network resources. This is achieved by adding policy control functions to a serving gateway (S-GW). This S-GW is the first node visited traffic passes, thus the entity in the network that may intercept bearer signalling and control resource usage. In the basic scenario all functionality to control visiting subscribers may be added to the S-GW and locally handled in the S-GW. This would require configuration of roaming agreements in the S-GW and enforcement of policies. Based on UE identity, e.g. IMSI analysis, or Packet Data Network Gateway (P-GW) address the S-GW may apply policy roles for a particular roaming partner. The policies apply on both control plan during bearer establishment e.g. reject bearer procedure and user plan e.g. block services, limit bandwidth.
In a more advanced network the basic architecture may be extended with a Policy and Charging Rules Function entity (PCRF) connected to the S-GW. Instead of having the roaming agreements handled locally in the S-GW they may be handled in the PCRF. That way one may take advantage of Policy and Charging Control (PCC) functionally and policy infrastructure e.g. PCRF, Subscription Profile Repository (SPR), and other policy and charging features.
Information sent between the S-GW and PCRF only concerns visited subscribers. In contrast, home routed subscribers are already terminated in either PCRF or P-GW. Examples of the data that may be used by the PCRF are QoS parameters, bandwidth usage, packet filters and/or Public Land Mobile Network (PLMN) related data. The PCRF may link the data to the pre-configured rules for the roaming partner. By capturing the data and make it available to the policy control the network owner gains control over visited subscribers and may enforce roaming agreements on a fine grade level (QoS class identifier (QCI), bitrates, service access, etc). It gives the level of functionality to network owners needed to protect their resources from unwanted usage and enforces business related action on subscribers from its competitors.
This is provided in a number of aspects according to the present invention, in which a first is a method in a serving gateway, for handling visited subscribers in a wireless communication network. The method may comprise the steps of:
The method may further comprise a step of transmitting an authentication request to a policy and charging rules function entity, i.e. PCRF, and further a step of communicating from the PCRF a request for obtaining information about roaming operator specific policies to a database. The policy rules may for instance comprise at least one of block a service, limit communication bandwidth, and reject connection.
The policy rule may be related to an aggregate maximum bit rate, i.e. AMBR, which is controlled locally by the serving gateway.
Another aspect of the present invention is provided, an infrastructure node in a wireless communication network. The infrastructure node may comprise:
The processor is arranged to execute instruction sets stored in the memory for:
Yet another aspect of the present invention is provided, a system in a wireless communication network infrastructure is provided comprising an infrastructure node as described above and a separate policy and charging function entity.
With the present invention two main scenarios different benefits and features may be seen in the following:
Basic scenario:
Enhanced Scenario:
The architecture according to the present invention thus allows network owners to gain control over visited subscribers. It gives full control over requested and used network resources to the network owner, which is not possible in the known architecture.
In summary, the present invention:
These and other aspects of the invention will be apparent from and elucidated with reference to the embodiments described hereinafter.
In the following the invention will be described in a non-limiting way and in more detail with reference to exemplary embodiments illustrated in the enclosed drawings, in which:
In
In this example the UE 110 belongs to an operator not in charge of the network 100 the UE is connected to, thus the network is to be considered as a Visited Public Land Mobile Network 109 (VPLMN) and the UE belongs to a Home PLMN 108 (HPLMN). In the HPLMN a Packet Data Network Gateway 102 (P-GW) is in charge of handling control signaling and connectivity issues for the UE. A PCRF 103 is connected to the P-GW in order to handle authentication and policy and charging issues in the HPLMN. Furthermore, the P-GW acts as a gateway to Operator offered IP services.
The S-GW of the VPLMN is in communication with the P-GW in the HPLMN.
The UE communicates wirelessly with a radio access network node, e.g. an eNodeB using any suitable radio communication mode/protocol, for instance by using transmitting data on a modulated carrier signal which may be demodulated at a receiving side.
The core of the invention is to add policy control functionality to the visited network for a UE of another operator. The Serving Gateway S-GW may identify control plan signalling (e.g. bearer signalling) coming from other PLMN's. The S-GW may be arranged to identify a home network by analysing call flow. Examples of parameters that may be used for home network identification are UE or user identification data, e.g. International Mobile Subscriber identity (IMSI), or a P-GW address, e.g. an IP or Domain Name Server (DNS) address of the P-GW.
In this enhanced scenario, if the subscriber is identified as visited, the S-GW may relay necessary parameters (typically QoS parameters) to the PCRF for authorization. The PCRF has access to roaming related data (e.g. via the SPR) allowing differentiated handling of roaming partners. For example, operators with tight business relation to the visited network operator may be handled differently from competitors to the visited network operator. The architecture is open in that respect that it does not limit the options the network operator have in differentiation of business relations. The PCRF decides on roaming policies for how the visited subscriber is to be handled. Details on the roaming policies are not further defined here, but the system may support PCRF internal and external access to information sources. The main target for policy decision is normally QoS related actions but other policies may be applicable, e.g. service connectivity or rejection, or bandwidth provisions. Example of policy decisions are change of bit rates (local AMBR) or reject of QCI for the visited subscriber. The authorized parameters are sent from the PCRF to the S-GW. The S-GW applies the authorized parameters to the policy enforcement function. Different services may be affected by the policy rules, such as for instance web browsing, streaming media, broadcasting media, email, gaming, video conferencing, IP telephony, voice, file transfer, and geographical positioning.
The connection to the PCRF 104 is optional and in another embodiment illustrated in
It should be noted and appreciated by the skilled person that in
The main functions of the present invention are executed in the serving gateway S-GW 101, 201. The S-GW may comprise a processing device 300 as seen in
When a UE desired to set up a bearer in a visited network, a signal is transmitted to the P-GW of the home network which in turn transmits a bearer request to the S-GW of the visited network. PCRF data may be transmitted on this bearer request from the P-GW to the S-GW which in turn may use it internally or relay this information to the PCRF and/or further to the SPR. PCRF data may comprise bit rate, filter characteristics, QoS, or similar communication related information.
In the enhanced scenario, the S-GW may dynamically control the resource allocations for a UE or for customers to different operators. For instance it may be of interest to provide more resources and better quality to preferred partners and reduced resources and quality to competitor's customers. The resource allocations may be controlled dynamically and thus changed over time as the resource availability changes. Thus, the network operator receiving visited users may control the resources locally instead of depending on the home network operator for each user.
The enhanced scenario may also be dynamically controlled on a time or event basis, i.e. during certain time of day different operators may acquire different quality of service or service access; similarly different events in the network may also be used for deciding on what QoS or service types that is available for operators. This adds significant levels of flexibility to the network configuration and resource allocation of the visited network.
The architecture of the present invention supports enforcement of a local Aggregate Maximum Bit Rate (AMBR) in the S-GW. The local AMBR need not be signalled to any other node outside the visited network, but define an upper limit of bandwidth the visited subscriber is allowed to use in the visited network. By this, network owners may restrict the used bandwidth locally in the S-GW. It doesn't require any interaction with Mobility Management Entity (MME) or P-GW but may be handled locally in the S-GW. Since AMBR defines the upper limit of bandwidth usage there is no restriction on the lower limit. The network owner may thus put rules into place for local enforcement of AMBR, which differs from the rules provided in the home network.
401. Controlling attaching UE for visited or home subscriber. This may be performed as discussed above using analysis of IMSI or P-GW address for the UE.
402. Authenticating the UE using appropriate protocol methods using locally stored policy and charging control information for roaming operators.
403. Determining policy and charging rules for the UE based on the home operator of the UE—using a database with rules for roaming operators. This database may be stored locally in the S-GW or stored separately, for instance in relation to a separate PCRF entity as discussed above for the enhanced scenario.
404. Enforcing the policy and charging rules in the S-GW, e.g. rejecting or accepting the UE. Accepting the UE may be with modified QoS as discussed earlier in this document.
501. Bearer request is sent to the S-GW 101 of the visited network from the P-GW 102 of a home network of the UE.
502. S-GW analyses the source of the request by inspecting the bearer request:
503. PCRF makes an authorization of the request:
504. The PRCF may communicate with the SPR in the authorization procedure. The SPR may keep a database with roaming operator specific information related to the PCRF authorization process.
505. PCRF sends en authorization response message to the S-GW:
506. S-GW node enforces authorization response and installs policy rules:
507. S-GW continues in the call flow by transmitting a bearer request to the MME 106
508. MME responses to S-GW with a bearer response.
509. S-GW responses to P-GW with a bearer response.
By the solution according to the present invention, it is possible to gain local control over several different types of problems and/or features for a visiting UE, the following use cases are addressed:
It should be noted that the word “comprising” does not exclude the presence of other elements or steps than those listed and the words “a” or “an” preceding an element do not exclude the presence of a plurality of such elements. It should further be noted that any reference signs do not limit the scope of the claims, that the invention may be at least in part implemented by means of both hardware and software, and that several “means” or “units” may be represented by the same item of hardware.
The above mentioned and described embodiments are only given as examples and should not be limiting to the present invention. Other solutions, uses, objectives, and functions within the scope of the invention as claimed in the below described patent claims should be apparent for the person skilled in the art.
DB Database
EPC Evolved Packet Core
EPS Evolved Packet System
PCRF Policy and Charging Rules Function
PDN Packet Data Network
PDP Packet Data Protocol
P-GW Packet data network Gateway
RAN Radio Access Network
SGSN Serving GPRS Support Node
S-GW Serving Gateway
SPR Subscription Profile Repository
3GPP TS 23.401 “GPRS enhancements for E-UTRAN access”
3GPP TS 23.203 “Policy and Charging Control Architecture”
Filing Document | Filing Date | Country | Kind | 371c Date |
---|---|---|---|---|
PCT/EP2009/056808 | 6/3/2009 | WO | 00 | 11/29/2011 |