REUSE OF IP ADDRESSES
20230224272 · 2023-07-13
Inventors
Cpc classification
H04L61/503
ELECTRICITY
H04L2101/686
ELECTRICITY
International classification
H04L61/503
ELECTRICITY
Abstract
The present disclosure proposes network elements, methods at the network elements for facilitating reuse of IP address, a telecommunications system comprising the network elements. The method at a first network element for facilitating reuse of an IP address at multiple UEs comprising a first UE comprises: transmitting, to a second network element, a first request message associated with the first UE, the first request message comprising the IP address and a first indicator which, in conjunction with the IP address, uniquely identifies the first UE.
Claims
1-45. (canceled)
46. A method at a Session Management Function, SMF, for facilitating reuse of a private Internet Protocol, IP, address at multiple User Equipments, UEs, comprising a first UE, the method comprising: transmitting, to a Data Network-Authentication, Authorization & Accounting, DN-AAA, accounting server, a first request message associated with the first UE, the first request message comprising (i) the private IP address comprising at least one of an IPv4 address and an IPv6 prefix and (ii) a selected first 3GPP-IP-Address-Pool-Info which, in conjunction with the private IP address, uniquely identifies a Protocol Data Unit, PDU, session of the first UE, wherein the first 3GPP-IP-Address-Pool-Info indicates information on an IP address pool applicable to the private IP address; and receiving, from the DN-AAA accounting server, a first response message associated with the first UE in response to the first request message.
47. The method of claim 46, wherein the first request message is one of: an Accounting-Request START message, an Accounting-Request STOP message, an ACR Command, and an Accounting-Request Interim-Update message, and wherein the first response message is a corresponding one of: an Accounting-Response START message, an Accounting-Response STOP message, an ACA Command, and an Accounting-Response Interim-Update message.
48. The method of claim 46, wherein before the transmission of the first request message, the method further comprises: transmitting, to a DN-AAA, authentication server, a second request message associated with the first UE, the second request message comprising one or more second 3GPP-IP-Address-Pool-Infos, each of which indicates an IP address pool from which one or more private IP addresses are available to be allocated to the first UE; and receiving, from the DN-AAA authentication server, a second response message in response to the second request message, the second response message comprising a third 3GPP-IP-Address-Pool-Info which identifies an IP address pool of the one or more IP addresses pools indicated by the one or more second 3GPP-IP-Address-Pool-Infos, wherein the private IP address from the identified IP address pool is allocated to the first UE.
49. The method of claim 48, further comprising: selecting a User Plane Function, UPF, for the first UE based at least partially on the third 3GPP-IP-Address-Pool-Info.
50. The method of claim 47, wherein the second request message is an Access Request message or a Diameter-Extensible Authentication Protocol, EAP-Request, DER, message, and the second response message is a corresponding one of an Access Accept message or a Diameter-EAP-Answer, DEA, message.
51. The method of claim 46, wherein each of the first 3GPP-IP-Address-Pool-Info, the one or more second 3GPP-IP-Address-Pool-Infos, and the third 3GPP-IP-Address-Pool-Info comprises a first field uniquely identifying an IP address pool from which the private IP address is allocated to the first UE.
52. The method of claim 51, wherein each of the first 3GPP-IP-Address-Pool-Info, the one or more second 3GPP-IP-Address-Pool-Infos, and the third 3GPP-IP-Address-Pool-Info further comprises a second field indicating an IP version applicable for the IP address pool identified by the first field.
53. The method of claim 52, wherein the second field indicates one of IPv4, IPv6, or both.
54. The method of claim 51, wherein each of the first 3GPP-IP-Address-Pool-Info, the one or more second 3GPP-IP-Address-Pool-Infos, and the third 3GPP-IP-Address-Pool-Info further comprises a third field indicating the length of the first field.
55. The method of claim 46, wherein the first request message further comprises a fourth indicator identifying a network to be accessed by the first UE.
56. The method of claim 55, wherein the fourth indicator is a Called-Station-Id attribute or a customized RADIUS attribute.
57. A method at a Data Network-Authentication, Authorization & Accounting, DN-AAA, accounting server for facilitating reuse of a private Internet Protocol, IP, address at multiple User Equipments, UEs, comprising a first UE, the method comprising: receiving, from a Session Management Function, SMF, a first request message associated with the first UE, the first request message comprising (i) the private IP address comprising at least one of an IPv4 address and an IPv6 prefix and (ii) a selected first 3GPP-IP-Address-Pool-Info which, in conjunction with the private IP address, uniquely identifies a Protocol Data Unit, PDU, session of the first UE, wherein the first 3GPP-IP-Address-Pool-Info indicates information on an IP address pool applicable to the private IP address; performing processing for the first UE identified by the first 3GPP-IP-Address-Pool-Info in conjunction with the private IP address.
58. The method of claim 57, further comprising: transmitting, to the SMF, a first response message associated with the first UE based on a result of the processing.
59. The method of claim 57, wherein the first request message is one of: an Accounting-Request START message, an Accounting-Request STOP message, and an Accounting-Request Interim-Update message, ACR Command, and wherein the first response message is a corresponding one of: an Accounting-Response START message, an Accounting-Response STOP message, ACA Command, and an Accounting-Response Interim-Update message.
60. The method of claim 57, wherein the first 3GPP-IP-Address-Pool-Info comprises a first field uniquely identifying an IP address pool from which the private IP address is allocated to the first UE.
61. The method of claim 60, wherein the first 3GPP-IP-Address-Pool-Info further comprises a second field indicating an IP version applicable for the IP address pool identified by the first field.
62. The method of claim 61, wherein the second field indicates one of IPv4, IPv6, or both.
63. The method of claim 60, wherein the first 3GPP-IP-Address-Pool-Info further comprises a third field indicating the length of the first field.
64. The method of claim 57, wherein the first request message further comprises a fourth indicator identifying a network to be accessed by the first UE.
65. The method of claim 64, wherein the fourth indicator is a Called-Station-Id attribute or a customized RADIUS attribute.
Description
BRIEF DESCRIPTION OF THE DRAWINGS
[0021] The foregoing and other features of the present disclosure will become more fully apparent from the following description and appended claims, taken in conjunction with the accompanying drawings. Understanding that these drawings depict only several embodiments in accordance with the disclosure and therefore are not to be considered limiting of its scope, the disclosure will be described with additional specificity and detail through use of the accompanying drawings.
[0022]
[0023]
[0024]
[0025]
[0026]
[0027]
[0028]
[0029]
DETAILED DESCRIPTION
[0030] Hereinafter, the present disclosure is described with reference to embodiments shown in the attached drawings. However, it is to be understood that those descriptions are just provided for illustrative purpose, rather than limiting the present disclosure. Further, in the following, descriptions of known structures and techniques are omitted so as not to unnecessarily obscure the concept of the present disclosure.
[0031] Those skilled in the art will appreciate that the term “exemplary” is used herein to mean “illustrative,” or “serving as an example,” and is not intended to imply that a particular embodiment is preferred over another or that a particular feature is essential. Likewise, the terms “first”, “second”, “third”, “fourth,” and similar terms, are used simply to distinguish one particular instance of an item or feature from another, and do not indicate a particular order or arrangement, unless the context clearly indicates otherwise. Further, the term “step,” as used herein, is meant to be synonymous with “operation” or “action.” Any description herein of a sequence of steps does not imply that these operations must be carried out in a particular order, or even that these operations are carried out in any order at all, unless the context or the details of the described operation clearly indicates otherwise.
[0032] Conditional language used herein, such as “can,” “might,” “may,” “e.g.,” and the like, unless specifically stated otherwise, or otherwise understood within the context as used, is generally intended to convey that certain embodiments include, while other embodiments do not include, certain features, elements and/or states. Thus, such conditional language is not generally intended to imply that features, elements and/or states are in any way required for one or more embodiments or that one or more embodiments necessarily include logic for deciding, with or without author input or prompting, whether these features, elements and/or states are included or are to be performed in any particular embodiment. Also, the term “or” is used in its inclusive sense (and not in its exclusive sense) so that when used, for example, to connect a list of elements, the term “or” means one, some, or all of the elements in the list. Further, the term “each,” as used herein, in addition to having its ordinary meaning, can mean any subset of a set of elements to which the term “each” is applied.
[0033] The term “based on” is to be read as “based at least in part on.” The term “one embodiment” and “an embodiment” are to be read as “at least one embodiment.” The term “another embodiment” is to be read as “at least one other embodiment.” Other definitions, explicit and implicit, may be included below. In addition, language such as the phrase “at least one of X, Y and Z,” unless specifically stated otherwise, is to be understood with the context as used in general to convey that an item, term, etc. may be either X, Y, or Z, or a combination thereof.
[0034] The terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limitation of example embodiments. As used herein, the singular forms “a”, “an”, and “the” are intended to include the plural forms as well, unless the context clearly indicates otherwise. It will be further understood that the terms “comprises”, “comprising”, “has”, “having”, “includes” and/or “including”, when used herein, specify the presence of stated features, elements, and/or components etc., but do not preclude the presence or addition of one or more other features, elements, components and/or combinations thereof. It will be also understood that the terms “connect(s),” “connecting”, “connected”, etc. when used herein, just mean that there is an electrical or communicative connection between two elements and they can be connected either directly or indirectly, unless explicitly stated to the contrary.
[0035] Of course, the present disclosure may be carried out in other specific ways than those set forth herein without departing from the scope and essential characteristics of the disclosure. One or more of the specific processes discussed below may be carried out in any electronic device comprising one or more appropriately configured processing circuits, which may in some embodiments be embodied in one or more application-specific integrated circuits (ASICs). In some embodiments, these processing circuits may comprise one or more microprocessors, microcontrollers, and/or digital signal processors programmed with appropriate software and/or firmware to carry out one or more of the operations described above, or variants thereof. In some embodiments, these processing circuits may comprise customized hardware to carry out one or more of the functions described above. The present embodiments are, therefore, to be considered in all respects as illustrative and not restrictive.
[0036] Although multiple embodiments of the present disclosure will be illustrated in the accompanying Drawings and described in the following Detailed Description, it should be understood that the disclosure is not limited to the disclosed embodiments, but instead is also capable of numerous rearrangements, modifications, and substitutions without departing from the present disclosure that as will be set forth and defined within the claims.
[0037] Further, please note that although the following description of some embodiments of the present disclosure is given in the context of 5G New Radio (NR), the present disclosure is not limited thereto. In fact, as long as IP address reuse is involved, the inventive concept of the present disclosure may be applicable to any appropriate communication architecture, for example, to Global System for Mobile Communications (GSM)/General Packet Radio Service (GPRS), Enhanced Data Rates for GSM Evolution (EDGE), Code Division Multiple Access (CDMA), Wideband CDMA (WCDMA), Time Division—Synchronous CDMA (TD-SCDMA), CDMA2000, Worldwide Interoperability for Microwave Access (WiMAX), Wireless Fidelity (Wi-Fi), 4th Generation Long Term Evolution (LTE), LTE-Advance (LTE-A), or 5th Generation New Radio (5G NR), etc. Therefore, one skilled in the arts could readily understand that the terms used herein may also refer to their equivalents in any other infrastructure. For example, the term “User Equipment” or “UE” used herein may refer to a mobile device, a mobile terminal, a mobile station, a user device, a user terminal, a wireless device, a wireless terminal, or any other equivalents. For another example, the term “gNB” used herein may refer to a base station, a base transceiver station, an access point, a hot spot, a NodeB, an Evolved NodeB, a network element, or any other equivalents. Further, the term “network element” used herein may refer to a network function, a network entity, a node, a network equipment, or any other device on the network side. Further, please note that the term “indicator” used herein may refer to an attribute, a setting, a configuration, a profile, an identifier, a field, one or more bits/octets, or any data by which information of interest may be indicated directly or indirectly.
[0038] The 5G Core Network has been designed around services that are invoked using a standard Application Programming Interface (API). On the surface, the 5G architecture looks very different from the 4G Evolved Packet Core (EPC) but on close inspection, one can see the evolution from the 4G architecture to the 5G architecture.
[0039] For example, the 5G core has evolved from the 4G EPC in two steps: [0040] Control and User Plane Separation (CUPS) of the 4G EPC; and [0041] Reorganizing the 4G EPC CUPS functions into services.
[0042] CUPS
[0043] The introduction of control and user plane separation in the 4G EPC is the first step towards the 5G architecture. The Serving GateWay (SGW) and Packet Data Network (PDN) GateWay (PGW) functions were split into a control and data plane component: [0044] SGWSGW-C and SGW-U [0045] PGW
PGW-C and PGW-U
[0046] Reorganization to Services
[0047] With the separation of control and user plane functions, the split functions are reorganized into new network functions, such as Access and Mobility Function (AMF), Session Management Function (SMF), User Plane Function (UPF), etc. In general, an AMF in 5G performs most of the functions which were previously performed by a Mobility Management Entity (MME) in 4G, an SMF performs rest of the functions which were previously performed by the MME in addition to the control plane (CP) functions which were previously performed by SGW and PGW, and a UPF performs the user plane (UP) functions which were previously performed by SGW and PGW. In such a manner, the 4G EPC components have been reorganized into service-oriented functions. Therefore, any reference to a network function defined for 5G may also be applicable to a node defined for 4G or any other appropriate telecommunication technologies. For example, when “SMF” is recited in some embodiments, “PGW-C” or “SGW-C” may be equally applicable. For example, when “UPF” is recited in some embodiments, “PGW-U” or “SGW-U” may be equally applicable.
[0048]
[0049] However, the present disclosure is not limited thereto. In some other embodiments, the network 10 may comprise additional network functions, less network functions, or some variants of the existing network functions shown in
[0050] Here, some of the functions shown in
[0051] Referring to
[0064] Further, the SMF 115 may perform the session management functions that are handled by the 4G MME, SGW-C, and PGW-C. Below please find a brief list of some of its functions: [0065] Allocates IP addresses to UEs; [0066] NAS signaling for session management (SM); [0067] Sends QoS and policy information to RAN via the AMF; [0068] Downlink data notification; [0069] Select and control UPF for traffic routing; [0070] Acts as the interface for all communication related to offered user plane services; and [0071] Lawful intercept—control plane.
[0072] Further, the UPF 155 is essentially a fusion of the data plane parts of the SGW and PGW, as mentioned above. In the context of the CUPS architecture: EPC SGW-U+EPC PGW-U.fwdarw.5G UPF.
[0073] The UPF 155 may perform the following functions: [0074] Packet routing and forwarding [0075] Packet inspection and QoS handling, and the UPF may optionally integrate a Deep Packet Inspection (DPI) for packet inspection and classification; [0076] Connecting to the Internet POP (Point of Presence), and the UPF may optionally integrate the Firewall and Network Address Translation (NAT) functions; [0077] Mobility anchor for Intra RAT and Inter-RAT handovers; [0078] Lawful intercept—user plane; and [0079] Maintains and reports traffic statistics.
[0080] As shown in
[0081] As mentioned above, in order to support more IP addresses for a large amount of UEs in a large operator network, the operator may have the requirement to deploy same IP address ranges to multiple UPFs with different firewalls/NAT, for example, that shown in
[0082]
[0083] However, this deployment is only for the purpose of illustration rather than limiting of the present disclosure. In some other embodiments, the operator domain 200 may comprise more UEs, gNBs, UPFs, AMFs, SMFs, and/or DN-AAAs, or may have different configurations thereof and/or different connections therebetween.
[0084] As mentioned above, the operator would like to reuse their IP addresses for different UEs, and therefore the NAT technology is used at UPF-1 231 and UPF-2 232. For example, as shown in
[0085] However, as also mentioned above, some of the nodes in the operator domain 200 may not be aware of the presence of the NAT rules. For example, a part of the DN-AAA server 260, which is in charge of its accounting business, (below, “DN-AAA/Accounting 262”) may not be aware of the presence of the NAT rules since it may be located on the same side of the NAT as the UEs, and therefore it cannot distinguish the UE-1 211 from the UE-3 213 or the UE-2 212 from the UE-4 214 since these UEs may share a same private IP address and even a same APN/DNN.
[0086] To be specific, according to the clause 5.6.6, 3GPP TS 23.501 V16.4.0 (2020 March), the DN-AAA server 260 may be located within the operator domain 200 as shown in
[0087] Therefore, in some embodiments of the present disclosure, one or more indicators in such messages, either an existing attribute or a new attribute, may be used to enable a node in the operator domain 200 to distinguish one PDU session from another PDU session having the same IP address and APN/DNN.
[0088] In some embodiments, an existing Remote Authentication Dial In User Service (RADIUS) attribute, for example, “3GPP-IP-Address-Pool-Id” which is defined in the clause 11.3.1, 3GPP TS 29.561 V16.3.0 (2020 March), may be reused to, in conjunction with an IP address allocated to a UE, uniquely identify a PDU session of the UE or the UE itself, according to some embodiments of the present application. However, the current definition of the attribute “3GPP-IP-Address-Pool-Id” in the TS 29.561 is read as follows:
[0089] The SMF may determine an IP address pool ID based on UPF ID, S-NSSAI, DNN, and IP version as described in subclause 5.8.2.2.1 in 3GPP TS 23.501 [2] and includes the IP address pool ID within 3GPP-IP-Address-Pool-Id and send it to the DN-AAA. The DN-AAA assigns IPv6 prefix or IPv4 address from the requested IP address pool. Multiple 3GPP-IP-Address-Pool-Id sub-attributes may be sent in the RADIUS Access-Request message.
[0090] . . .
TABLE-US-00001 118 3GPP-IP- It indicates Optional Access- IpAddrPool Address- the IP address Request Pool-Id pool identifier.
[0091] Therefore, it can only be used in an Access-Request by an SMF (e.g. the SMF 250) to inform the DN-AAA/Authentication (e.g. the DN-AAA/Authentication 261) of the available IP address pools at UPFs (e.g. the UPF-1 231, the UPF-2 232), and none of the SMF and DN-AAA/Accounting (e.g. the DN-AAA/Accounting 262) may be aware of which IP address pool is selected and from which IP address pool the allocated IP address is selected by the DN-AAA/Authentication. Therefore, according to some embodiments of the present disclosure, a reuse and revise of this existing attribute is proposed, for example, it may be used in an Accounting-Request message (e.g., Accounting-Request Start, Accounting-Request Stop, Accounting-Request Interim Update) and/or an Accounting-Response message (e.g., Accounting-Response Start, Accounting-Response Stop, Accounting-Response Interim Update).
[0092] Further, according to some embodiments of the present disclosure, the attribute “3GPP-IP-Address-Pool-Id” may also be reused in an Access-Accept message, in addition to an Access-Request message, to indicate which IP address pool is selected by the DN-AAA/Authentication from the multiple IP address pools corresponding to multiple UPFs.
[0093] Furthermore, according to some embodiments of the present disclosure, this attribute may be used in other messages sent to a network function or a node if the network function or the node which cannot distinguish a PDU session from another PDU session based on IP address and/or APN/DNN only.
[0094] In such cases, the definition of the attribute may be revised as follows:
TABLE-US-00002 118 3GPP-IP- It indicates Optional Access-Request IpAddrPool Address- the IP address Access-Accept Pool-Id pool identifier. Accounting-Request START, Accounting-Request STOP, Accounting-Request Interim-Update
[0095] Further, for Access-Request or Diameter EAP Request (DER) command from the SMF to the DN-AAA server with 3GPP VSA 3GPP-Allocate-IP-Type set to value 3 (i.e. requesting both v4 and v6), the AAA server does not know which pool id corresponds to which IP version, since the N5 interface as specified in 3GPP TS 29.512 has different settings for IPv4 index and IPv6 index. In such a case, additional information for IP version in a message may be needed to distinguish one IP address pool from another with a different IP version.
[0096] Therefore, in some embodiments, a new RADIUS attribute, for example, “3GPP-IP-Address-Pool-Info” may be used to, in conjunction with an IP address allocated to a PDU session or a UE, uniquely identify the PDU session or the UE. An exemplary proposed revision to the related 3GPP standard, 3GPP TS 29.561, is given below:
Proposed Changes:
[0097]
TABLE-US-00003 *** 1st Change ***
11.3.1 General
[0098] RADIUS attributes as defined in subclause 16.4 of 3GPP TS 29.061 [5] are re-used in 5G with the following differences: [0099] SMF replaces P-GW. GGSN and PPP PDP type related description are not applicable for 5G. [0100] 5G QoS flow replaces IP-CAN bearer and PDU session replaces IP-CAN session. [0101] N6 replaces Gi/Sgi and UE replaces MS. [0102] DNN replaces APN. [0103] Detailed information needed for 5G compared to 3GPP TS 29.061 [5] is described below.
TABLE-US-00004 TABLE 11.3-1 Additional information needed for 5G compared to the RADIUS attributes defined in 3GPP TS 29.061 [5] Presence Applicable Attr # Attribute Name Description Content Requirement message 79 EAP-Message This attribute encapsulates EAP String Conditional Access-Request, message (as defined in NOTE Access-Accept, IETF RFC 3748 [6]) exchanged Access-Reject, between the SMF and DN-AAA, CoA-Request, see IETF RFC 3579 [7] for CoA-ACK, details. Disconnect-Request, Disconnect-ACK Mandatory Access-Challenge 80 Message- This attribute includes the String Conditional Access-Request, Authenticator message authenticator, see NOTE Access-Accept, IETF RFC 3579 [7] for details. Access-Reject, CoA-Request, CoA-ACK, CoA-NAK Disconnect-Request, Disconnect-ACK, Disconnect-NAK Mandatory Access-Challenge NOTE: Shall be present if EAP is used.
TABLE-US-00005 TABLE 11.3-2 Different information needed for 5G compared to the RADIUS VSA defined in subclause 16.4.7 of 3GPP TS 29.061 [5] Sub-attr # Sub-attribute Name Differences 1 3GPP-IMSI Re-used. 2 3GPP-Charging-Id Re-used. 3 3GPP-PDP-Type Re-used. For SMF, this sub-attribute represents PDU session type and only the values “0”, “2”, “3”, “5” and “6” are applicable. 4 3GPP-CG-Address Re-used. 5 3GPP-GPRS-Negotiated- Re-used. For SMF, it uses the format for Release indicator value QoS-Profile “15” as defined in 3GPP TS 29.061 [5]. 6 3GPP-SGSN-Address Re-used. It includes AMF IPv4 address. 7 3GPP-GGSN-Address Re-used. It includes (home) SMF control plane IPv4 address. 8 3GPP-IMSI-MCC-MNC Re-used. 9 3GPP-GGSN-MCC-MNC Re-used. MCC and MNC of the network the (home) SMF belongs to. 10 3GPP-NSAPI Re-used. It identifies QFI with value range 0-255. 11 3GPP-Session-Stop-Indicator Re-used. 12 3GPP-Selection-Mode Re-used. SMF maps the selection mode value from the enumeration value of DnnSelectionMode in 3GPP TS 29.502 [40]. 13 3GPP-Charging- Re-used. Characteristics 14 3GPP-CG-Ipv6-Address Re-used. 15 3GPP-SGSN-Ipv6-Address Re-used. It includes AMF IPv6 address. 16 3GPP-GGSN-Ipv6-Address Re-used. It includes (home) SMF control plane IPv6 address. 17 3GPP-Ipv6-DNS-Servers Re-used. 18 3GPP-SGSN-MCC-MNC Re-used. MCC and MNC of the network the AMF belongs to 19 3GPP-Teardown-Indicator Re-used. 20 3GPP-IMEISV Re-used. 21 3GPP-RAT-Type Re-used. For SMF, it uses the sub-attribute definition for P-GW and only the values “3”, “7” and “51” are applicable. 22 3GPP-User-Location-Info Re-used. For SMF, only the values “128”, “129”, “130”, “135” and “136” of Geographic Location Type are applicable. 23 3GPP-MS-TimeZone Re-used. 24 3GPP-CAMEL-Charging-Info Not applicable. 25 3GPP-Packet-Filter Re-used. 26 3GPP-Negotiated-DSCP Re-used. 27 3GPP-Allocate-IP-Type Re-used. 28 External-Identifier Re-used. 29 TWAN-Identifier Not applicable. 30 3GPP-User-Location- Re-used. Info-Time 31 3GPP-Secondary-RAT-Usage Not applicable. 110 3GPP-Notification Added. 111 3GPP-UE-MAC-Address Added. 112 3GPP-Authorization- Added. Reference 113 3GPP-Policy-Reference Added. 114 3GPP-Session-AMBR Added. 115 3GPP-NAI Added. 116 3GPP-Session-AMBR-v2 Added. 117 3GPP-Supported-Features Added. 118 3GPP-IP-Address-Pool-Info Added. NOTE: 5G specific RADIUS VSAs are numbered from 110.
110—3GPP-Notification
[0104]
TABLE-US-00006 Bits Octets 8 7 6 5 4 3 2 1 1 3GPP type = 110 2 3GPP Length = 3 3 Spare ACC AUTH
3GPP Type: 110
Length: 3
[0105] Octet 3 is Octet String type.
For bit 1 AUTH,
[0106] if the value of AUTH is set to “1”, and there is IPv4 address and/or IPv6 prefix change (not allocated/de-allocated by the DN-AAA itself) and the PDU session is not terminated, the SMF shall send Access-Request message to the DN-AAA with GPSI in Calling-Station-Id or External-Identifier attribute and IP address in: [0107] 1) Framed-IP-Address and Framed-Ipv6-Prefix, if both IPv4 address and IPv6 prefix(es) exist for the PDU session; or [0108] 2) Framed-IP-Address, if only IPv4 address exists for the PDU session; or [0109] 3) Framed-Ipv6-Prefix, if only IPv6 prefix(es) exists for the PDU session. [0110] For Ethernet PDU session, if there is UE MAC address change, the SMF shall send Access-Request message to the DN-AAA with GPSI in Calling-Station-Id or External-Identifier attribute and the complete list of used UE MAC addresses in the 3GPP-UE-MAC-Address attribute. [0111] if the value is set to “0”, the SMF may notify authentication DN-AAA with the UE address and GPSI based on local configuration.
For bit 2 ACC,
[0112] if the value is set to “1”, and there is IPv4 address and/or IPv6 prefix change (not allocated/de-allocated by the DN-AAA itself) and the PDU session is not terminated, the SMF shall send Accounting-Request Interim-Update message to the DN-AAA with GPSI in Calling-Station-Id or External-Identifier attribute and IP address in: [0113] 1) Framed-IP-Address and Framed-Ipv6-Prefix, if both IPv4 address and IPv6 prefix(es) exist for the PDU session; or [0114] 2) Framed-IP-Address, if only IPv4 address exists for the PDU session; or [0115] 3) Framed-Ipv6-Prefix, if only IPv6 prefix(es) exists for the PDU session. [0116] For Ethernet PDU session, if there is UE MAC address change, the SMF shall send Accounting-Request Interim-Update message to the DN-AAA with GPSI in Calling-Station-Id or External-Identifier attribute and the complete list of used UE MAC addresses in the 3GPP-UE-MAC-Address attribute. [0117] if the value is set to “0”, the SMF may notify accounting DN-AAA with the UE address and GPSI based on local configuration.
111—3GPP-UE-MAC-Address
[0118]
TABLE-US-00007 Bits Octets 8 7 6 5 4 3 2 1 1 3GPP type = 111 2 3GPP Length = 8 3-10 MAC Address (octet string)
3GPP Type: 111
Length: 8
[0119] It is sent from the DN-AAA to authorize UE MAC addresses. Multiple 3GPP-MAC-Address sub-attributes (maximum 16) may be sent in one RADIUS CoA or Access-Accept message. The DN-AAA shall always provide the full list of allowed MAC addresses, and SMF shall replace the existing list with the newly received one. When omitted, there is no restriction and all UE MAC addresses are permitted for the Ethernet PDU session.
When sending from the SMF to the DN-AAA, it indicates UE MAC addresses in use. Multiple 3GPP-MAC-Address sub-attributes may be sent in one RADIUS Access-Request or Accounting-Request Interim-Update message.
MAC address is Octet String type.
112—3GPP-Authorization-Reference
[0120]
TABLE-US-00008 Bits Octets 8 7 6 5 4 3 2 1 1 3GPP type = 112 2 3GPP Length = m 3-m Authorization Data Reference (octet string)
3GPP Type: 112
Length: m
[0121] Authorization Data Reference: Octet String. It is sent from the DN-AAA to refer to the local authorization data in the SMF.
113—3GPP-Policy-Reference
[0122]
TABLE-US-00009 Bits Octets 8 7 6 5 4 3 2 1 1 3GPP type = 113 2 3GPP Length = m 3-m Policy Data Reference (octet string)
3GPP Type: 113
Length: m
[0123] Policy Data Reference: Octet String. It is sent from the DN-AAA and used by the SMF to retrieve the SM or QoS policy data from the PCF.
114—3GPP-Session-AMBR
[0124]
TABLE-US-00010 Bits Octets 8 7 6 5 4 3 2 1 1 3GPP type = 114 2 3GPP Length = m 3-m Session AMBR (octet string)
3GPP Type: 114
Length: m
[0125] Session AMBR: Octet String. It is sent from the DN-AAA to authorize the PDU Session AMBR. The encoding is defined as BitRate in 3GPP TS 29.571 [39].
115—3GPP-NAI
[0126]
TABLE-US-00011 Bits Octets 8 7 6 5 4 3 2 1 1 3GPP type = 115 2 3GPP Length = m 3-m NAI (octet string)
3GPP Type: 115
Length: m
[0127] NAI: Octet String. It shall be formatted according to subclause 14.3 of
3GPP TS 23.003 [28] that describes an NAI.
116—3GPP-Session-AMBR-v2
[0128]
TABLE-US-00012 Bits Octets 8 7 6 5 4 3 2 1 1 3GPP type = 116 2 3GPP Length = m 3 Spare DL UL 4-5 UL Session-AMBR length (octet string) 6-m UL Session-AMBR (octet string) (m + 1)-(m + 2) DL Session-AMBR length (octet string) (m + 3)-n .sup. DL Session-AMBR (octet string)
3GPP Type: 116
Length: m
[0129] Octet 3 is Octet String type.
Bit 1 UL and bit 2 DL indicate if the corresponding UL and DL Session-AMBR shall be present in a respective field or not. If one of these bits is set to “0”, the corresponding field shall not be present at all.
UL/DL Session AMBR: Octet String. It is sent from the DN-AAA to authorize the PDU Session AMBR. The encoding is defined as BitRate in 3GPP TS 29.571 [39].
If the feature eSessionAMBR is supported and if applicable, the DN-AAA shall send this VSA; otherwise, the DN-AAA shall send the VSA 3GPP-Session-AMBR.
117—3GPP-Supported-Features
[0130]
TABLE-US-00013 Bits Octets 8 7 6 5 4 3 2 1 1 3GPP type = 117 2 3GPP Length = m 3-6 Vendor ID (octet string) 7-10 Feature List ID (octet string) 11-14 Feature List (octet string)
3GPP Type: 117
Length: m
[0131] This VSA may be present in the Access-Request (initial one) message and either the Access-Challenge (initial one) or the Access-Accept message. If present, this VSA informs the destination entity about the features that the origin entity requires to successfully complete the message exchange. The Vendor ID, Feature List ID and Feature List are encoded according to 3GPP TS 29.229 [41]. See clause 12.4.1 for more detailed information regarding the general principle of the feature negotiation with the difference that RADIUS terms replace Diameter terms. The table 12.4.1-1 defines the features applicable to the RADIUS N6 interfaces for the feature lists with a Feature-List-ID of 1.
118—3GPP-IP-Address-Pool-Info
[0132]
TABLE-US-00014 Bits Octets 8 7 6 5 4 3 2 1 1 3GPP type = 118 2 3GPP Length = m 3 Spare IP version 4-5 IP address pool id length (octet string) 6-m IP address pool id (octet string)
3GPP Type: 118
Length: m
[0133] Octet 3 is Octet String type.
[0134] For bit 1 and bit 2 IP version: [0135] if the value is set to “0”, it indicates the IP address pool id is applicable for both IPv4 and IPv6; [0136] if the value is set to “1”, it indicates the IP address pool id is applicable for IPv4; [0137] if the value is set to “2” it indicates the IP address pool id is applicable for IPv6; and [0138] value “3” is reserved.
The SMF may determine an IP address pool ID based on UPF ID, S-NSSAI, DNN, and IP version as described in subclause 5.8.2.2.1 in 3GPP TS 23.501 [2] and includes the IP address pool ID within 3GPP-IP-Address-Pool-Info and send it to the DN-AAA. The DN-AAA assigns IPv6 prefix or IPv4 address from the requested IP address pool. Multiple 3GPP-IP-Address-Pool-Info sub-attributes may be sent in the RADIUS Access-Request message. The DN-AAA shall include the selected IP address pool in the 3GPP-IP-Address-Pool-Info sub-attribute of the RADIUS Access-Accept message. For accounting, if Framed-IP-Address or Framed-Ipv6-Prefix attribute is included in RADIUS Accounting-Request (START/Interim-Update/STOP), the SMF shall also include the 3GPP-IP-Address-Pool-Info sub-attribute.
Table 11.3-3 describes the sub-attributes of the 3GPP Vendor-Specific attribute described above in different RADIUS messages.
TABLE-US-00015 TABLE 11.3-3 List of the 3GPP Vendor-Specific sub-attributes for N6 Associated attribute Sub-attr Presence (Location of # Sub-attribute Name Description Requirement Sub-attr) Applicability 110 3GPP-Notification It includes all Optional Access-Accept notifications that the DN-AAA wants to receive from the SMF. 111 3GPP-UE-MAC- It is sent from the DN- Optional Access-Request, Address AAA to authorize UE Access-Response, MAC addresses, or it Accounting-Request indicates UE MAC Interim-Update, addresses in use when Change-of- sending from the SMF Authorization to the DN-AAA. 112 3GPP-Authorization- It is sent from the DN- Optional Access-Accept, Reference AAA to refer to the local Change-of- authorization data in Authorization the SMF. 113 3GPP-Policy- It is sent from the DN- Optional Access-Accept, Reference AAA and used by the Change-of- SMF to retrieve the SM Authorization or QoS policy data from the PCF. 114 3GPP-Session-AMBR It is sent from the DN- Optional Access-Accept, AAA to authorize the Change-of- PDU Session AMBR. Authorization 115 3GPP-NAI The Network Access Optional Access-Request, Identifier identifying the Accounting-Request UE. START, Accounting-Request STOP, Accounting-Request Interim-Update 116 3GPP-Session- It is sent from the DN- Optional Access-Accept, eSession AMBR-V2 AAA to authorize the Change-of- AMBR PDU Session AMBR, it Authorization includes separate session AMBR for UL and DL. 117 3GPP-Supported- It indicates the Optional Access-Request, Features supported features as Access-Accept, specified in Access-Challenge, clause 12.4.1. Accounting-Request START, Accounting- Response START 118 3GPP-IP-Address- It indicates the IP Optional Access-Request, IpAddrPool Pool-Info address pool identifier. Access-Accept, Accounting-Request START, Accounting-Request STOP, Accounting-Request Interim-Update
RADIUS attributes related to the DN-AAA initiated re-authorization and authentication challenge are described in the following subclauses.
***Next Change***
12.4.0 General
[0139] Table 12.4-1 lists the Diameter AVPs re-used by the N6 reference point from existing Diameter Applications, reference to the respective specifications and a short description of the usage within the N6 reference point.
TABLE-US-00016 TABLE 12.4-1 N6 re-used Diameter AVPs AVP Flag rules (NOTE 1) Attribute AVP Section Value Type Should Must May Name Code defined (NOTE 2) Must May not not Encr. Applicability 3GPP-IMSI 1 3GPP TS UTF8String V P M Y 29.061 [5] (NOTE 3) 3GPP- 2 3GPP TS OctetString V P M Y Charging-Id 29.061 [5] (NOTE 3) 3GPP-PDP- 3 3GPP TS Enumerated V P M Y Type 29.061 [5] (NOTE 3) 3GPP-CG- 4 3GPP TS OctetString V P M Y Address 29.061 [5] (NOTE 3) 3GPP- 5 3GPP TS UTF8String V P M Y GPRS- 29.061 [5] Negotiated- (NOTE 3) QoS-Profile 3GPP- 6 3GPP TS OctetString V P M Y SGSN- 29.061 [5] Address (NOTE 3) 3GPP- 7 3GPP TS OctetString V P M Y GGSN- 29.061 [5] Ad dress (NOTE 3) 3GPP-IMSI- 8 3GPP TS UTF8String V P M Y MCC-MNC 29.061 [5] (NOTE 3) 3GPP- 9 3GPP TS UTF8String V P M Y GGSN- 29.061 [5] MCC-MNC (NOTE 3) 3GPP- 10 3GPP TS OctetString V P M Y NSAPI 29.061 [5] (NOTE 3) 3GPP- 12 3GPP TS UTF8String V P M Y Selection- 29.061 [5] Mode (NOTE 3) 3GPP- 13 3GPP TS UTF8String V P M Y Charging- 29.061 [5] Characteristics (NOTE 3) 3GPP-CG- 14 3GPP TS OctetString V P M Y Ipv6- 29.061 [5] Address (NOTE 3) 3GPP- 15 3GPP TS OctetString V P M Y SGSN-Ipv6- 29.061 [5] Address (NOTE 3) 3GPP- 16 3GPP TS OctetString V P M Y GGSN- 29.061 [5] Ipv6- (NOTE 3) Address 3GPP-Ipv6- 17 3GPP TS OctetString V P M Y DNS- 29.061 [5] Servers (NOTE 3) 3GPP- 18 3GPP TS UTF8String V P M Y SGSN- 29.061 [5] MCC-MNC (NOTE 3) 3GPP- 20 3GPP TS OctetString V P M Y IMEISV 29.061 [5] (NOTE 3) 3GPP-RAT- 21 3GPP TS OctetString V P M Y Type 29.061 [5] (NOTE 3) 3GPP- 22 3GPP TS OctetString V P M Y User- 29.061 [5] Location- (NOTE 3) Info 3GPP-MS- 23 3GPP TS OctetString V P M Y TimeZone 29.061 [5] (NOTE 3) 3GPP- 25 3GPP TS OctetString V P M Y Packet- 29.061 [5] Filter (NOTE 3) 3GPP- 26 3GPP TS OctetString V P M Y Negotiated- 29.061 [5] DSCP (NOTE 3) 3GPP- 27 3GPP TS OctetString V P M Y Allocate- 29.061 [5] IP-Type (NOTE 3) External- 28 3GPP TS OctetString V P M Y Identifier 29.061 [5] (NOTE 3) 3GPP- 30 3GPP TS OctetString V P M Y User- 29.061 [5] Location- (NOTE 3) Info-Time 3GPP- 110 11.3.1 OctetString V P M Y Notification 3GPP-UE- 111 11.3.1 OctetString V P M Y MAC- Address 3GPP- 112 11.3.1 OctetString V P M Y Authorization- Reference 3GPP- 113 11.3.1 OctetString V P M Y Policy- Reference 3GPP- 114 11.3.1 OctetString V P M Y Session- AMBR 3GPP-NAI 115 11.3.1 OctetString V P M Y 3GPP- 116 11.3.1 OctetString V P M Y eSessionABMR Session- AMBR-v2 3GPP-IP- 118 11.3.1 OctetString V P M Y IpAddrPool Address- Pool-Info Supported- 628 3GPP TS Grouped V M N Features 29.229 [41] (NOTE 1): The AVP header bit denoted as ‘M’, indicates whether support of the AVP is required. The AVP header bit denoted as ‘V’, indicates whether the optional Vendor-ID field is present in the AVP header. For further details, see IETF RFC 6733 [24]. (NOTE 2): The value types are defined in IETF RFC 6733 [24]. (NOTE 3): The use of Radius VSA as a Diameter vendor AVP is described in Diameter NASREQ (IETF RFC 7155 [23]) and the P flag may be set. (NOTE 1): Attribute 3GPP-CAMEL-Charging-Info (24), TWAN-Identifier (29) and 3GPP-Secondary-RAT-Usage (31) are not applicable for 5G in the present specification. (NOTE 2): Table 11.3-2 lists the differences between the RADIUS VSAs used in 5G and the VSAs defined in subclause 16.4.7 of 3GPP TS 29.061 [5].
***Next Change***
12.6.1 General
[0140] This clause describes the N6 Diameter messages.
The relevant AVPs that are of use for the N6 interface are detailed in this subclause.
Other Diameter AVPs as defined in IETF RFC 4072 [25] and IETF RFC 7155 [23], even if their AVP flag rules are marked with “M”, are not required for being compliant with the current specification.
Diameter messages as defined in subclause 16.4 of 3GPP TS 29.061 [5] are re-used in 5G with the following differences: [0141] SMF replaces GGSN/P-GW. [0142] 5G QoS flow replaces IP-CAN/EPS bearer and PDU session replaces IP-CAN session. [0143] N6 replaces Gi/Sgi.
[0144] NOTE: N6 re-used and specific AVPs are specified in subclause 12.3 and subclause 12.4. [0145] 3GPP-NAI AVP may be included in the AAR and ACR command. [0146] Multiple 3GPP-IP-Address-Pool-Infold AVPs may be included in the AAR command and one or two 3GPP-IP-Address-Pool-Info AVPs may be included in the AAA and ACR command. [0147] Multiple 3GPP-UE-MAC-Address AVPs may be included in the AAR and ACR command. [0148] Acct-Application-Id AVP shall be included in the ACR and ACA command as specified in IETF RFC 7155 [23]. [0149] Additional Diameter messages needed for 5G compared to the 3GPP TS 29.061 [5] are described in the following subclauses. [0150] Multiple Supported-Features AVPs may be included in the ACR and ACA command.
***Next Change***
12.6.2 DER Command
[0151] The DER command, defined in IETF RFC 4072 [25], is indicated by the Command-Code field set to 268 and the ‘R’ bit set in the Command Flags field. It is sent by the SMF to the DN-AAA server upon reception of an initial access request (e.g. Nsmf_PDUSession_CreateSMContext) message for a given DNN to request user authentication and authorization.
The relevant AVPs that are of use for the N6 interface are detailed in the ABNF description below. Other valid AVPs for this command are not used for N6 purposes and should be ignored by the receiver or processed according to the relevant specifications. The bold marked AVPs in the message format indicate new optional AVPs for N6, or modified existing AVPs.
Message Format:
[0152]
TABLE-US-00017 <Diameter-EAP-Request> ::= < Diameter Header: 268, REQ, PXY > < Session-Id > { Auth-Application-Id } { Origin-Host } { Origin-Realm } { Destination-Realm } { Auth-Request-Type } [ Destination-Host ] [ NAS-Port ] [ NAS-Port-Id ] [ NAS-Port-Type ] [ Origin-State-Id ] [ Port-Limit ] [ User-Name ] { EAP-Payload } [ EAP-Key-Name ] [ Service-Type ] [ Authorization-Lifetime ] [ Auth-Grace-Period ] [ Auth-Session-State ] [ Callback-Number ] [ Called-Station-Id ] [ Calling-Station-Id ] [ Originating-Line-Info ] [ Connect-Info ] * [ Framed-Compression ] [ Framed-Interface-Id ] [ Framed-IP-Address ] * [ Framed-Ipv6-Prefix ] * [ Delegated-Ipv6-Prefix ] [ Framed-IP-Netmask ] [ Framed-MTU ] [ Framed-Protocol ] * [ Tunneling ] * [ Proxy-Info ] * [ Route-Record ] [ External-Identifier ] [ 3GPP-IMSI ] [ 3GPP-NAI ] * [ 3GPP-UE-MAC-Address ] [ 3GPP-Charging-ID ] [ 3GPP-PDP-Type ] [ 3GPP-CG-Address ] [ 3GPP-GPRS-Negotiated-QoS-Profile ] [ 3GPP-SGSN-Address ] [ 3GPP-GGSN-Address ] [ 3GPP-IMSI-MCC-MNC ] [ 3GPP-GGSN-MCC-MNC ] [ 3GPP-NSAPI ] [ 3GPP-Selection-Mode ] [ 3GPP-Charging-Characteristics ] [ 3GPP-CG-Ipv6-Address ] [ 3GPP-SGSN-Ipv6-Address ] [ 3GPP-GGSN-Ipv6-Address ] [ 3GPP-SGSN-MCC-MNC ] [ 3GPP-User-Location-Info ] [ 3GPP-RAT-Type ] [ 3GPP-Negotiated-DSCP ] [ 3GPP-Allocate-IP-Type ] [ TWAN-Identifier ] * [ 3GPP-IP-Address-Pool-Info] * [ Supported-Features ] * [ AVP ]
***Next Change***
12.6.3 DEA Command
[0153] The DEA command, defined in IETF RFC 4072 [25], is indicated by the Command-Code field set to 268 and the ‘R’ bit cleared in the Command Flags field. It is sent by the DN-AAA server to the SMF in response to the DER command.
The relevant AVPs that are of use for the N6 interface are detailed in the ABNF description below. Other valid AVPs for this command are not used for N6 purposes and should be ignored by the receiver or processed according to the relevant specifications. The bold marked AVPs in the message format indicate new optional AVPs for N6, or modified existing AVPs.
Message Format:
[0154]
TABLE-US-00018 <Diameter-EAP-Answer> ::= < Diameter Header: 268, PXY > < Session-Id > { Auth-Application-Id } { Auth-Request-Type } { Result-Code } { Origin-Host } { Origin-Realm } [ User-Name ] [ EAP-Payload ] [ EAP-Reissued-Payload ] [ EAP-Master-Session-Key ] [ EAP-Key-Name ] [ Multi-Round-Time-Out ] [ Accounting-EAP-Auth-Method ] [ Service-Type ] * [ Class ] [ Acct-Interim-Interval ] [ Error-Message ] [ Error-Reporting-Host ] [ Failed-AVP ] [ Idle-Timeout ] [ Authorization-Lifetime ] [ Auth-Grace-Period ] [ Auth-Session-State ] [ Re-Auth-Request-Type ] [ Session-Timeout ] * [ Reply-Message ] [ Origin-State-Id ] * [ Filter-Id ] [ Port-Limit ] [ Callback-Id ] [ Callback-Number ] * [ Framed-Compression ] [ Framed-Interface-Id ] [ Framed-IP-Address ] * [ Framed-Ipv6-Prefix ] [ Framed-Ipv6-Pool ] * [ Framed-Ipv6-Route ] * [ Delegated-Ipv6-Prefix ] [ Framed-IP-Netmask ] * [ Framed-Route ] [ Framed-Pool ] [ Framed-IPX-Network ] [ Framed-MTU ] [ Framed-Protocol ] [ Framed-Routing ] * [ NAS-Filter-Rule ] * [ QoS-Filter-Rule ] * [ Tunneling ] * [ Redirect-Host ] [ Redirect-Host-Usage ] [ Redirect-Max-Cache-Time ] * [ Proxy-Info ] * [ External-Identifier ] [ 3GPP-Ipv6-DNS-Servers ] [ 3GPP-Notification ] 0*16 [ 3GPP-UE-MAC-Address ] [ 3GPP-Authorization-Reference ] [ 3GPP-Policy-Reference ] [ 3GPP-Session-AMBR ] [ 3GPP-Session-AMBR-v2 ] 0*2 [ 3GPP-IP-Address-Pool-Info] * [ Supported-Features ] * [ AVP ]
***End of Changes***
[0155] Please note that the terms “indicator” and “attribute” may be interchangeably used herein.
[0156] Next, some specific embodiments of the present disclosure in which the above attribute is used will be explained with reference to
[0157]
[0158] As shown in
[0159] Step S301. A PDU Session Establishment Request is transmitted from the UE-1 211 to the AMF 240, in which a new PDU session ID may be generated and included by the UE-1 211. The UE-1 211 may initiate the UE Requested PDU Session Establishment procedure by the transmission of a NAS message containing a PDU Session Establishment Request within the N1 SM container.
[0160] Step S302. The AMF 240 may select an SMF (e.g. the SMF 250) for the UE-1 211's PDU Session Establishment Request, for example, based on the parameters comprised in the message and/or configurations/policies stored locally or externally (e.g. at UDM or PCF).
[0161] Step S303. An Nsmf_PDUSession_CreateSMContext Request message is transmitted from the AMF 240 to the selected SMF 250 to request the SMF 250 to be associated for the PDU session to be created.
[0162] Step S304. The SMF 250 may retrieve or update the Session Management Subscription data from UDM, which is not shown in
[0163] Step S305. An Nsmf_PDUSession_CreateSMContext Response message may be transmitted from the SMF 250 to the AMF 240 in response to the request message in step S303. If the SMF 250 received the Nsmf_PDUSession_CreateSMContext Request in step S303 and the SMF 250 is able to process the PDU Session establishment request, the SMF 250 may create an SM context and responds to the AMF 240 by providing an SM Context ID. On the other hand, when the SMF 250 decides to not accept to establish a PDU Session, the SMF 250 may reject the UE request via NAS SM signalling including a relevant SM rejection cause by responding to the AMF 240 with Nsmf_PDUSession_CreateSMContext Response. The SMF 250 may also indicate to the AMF 240 that the PDU Session ID is to be considered as released, and the PDU Session Establishment procedure may be stopped.
[0164] Step S306. The SMF 250 decides that a secondary authentication/authorization is to be performed, and therefore an Access Request message may be transmitted from the SMF 250 to the DN-AAA/Authentication 261. As mentioned earlier, one or more 3GPP-IP-Address-Pool-Infos attributes indicating one or more available IP address pools may be included in the Access Request message such that the DN-AAA/Authentication 261 is enabled to select one of them and allocate, to the UE-1 211, an IP address from the selected IP address pool.
[0165] Step S307. An Access-Accept message may be transmitted from the DN-AAA/Authentication 261 to the SMF 250 to indicate its selection of the IP address pool (or its corresponding UPF 231), for example, by the selected 3GPP-IP-Address-Pool-Info attribute. Further, some optional steps may be performed, for example, PCF selection/SM policy association establishment or modification. Since these steps are not directly related to the embodiments of the present disclosure, the description thereof is omitted for simplicity.
[0166] Step S308. The SMF 250 may select a UPF (e.g. the UPF 231) as the anchor of this PDU Session based on the received 3GPP-IP-Address-Pool-Info attribute included in the Access Accept message. Further, if Request Type indicates “initial request”, the SMF 250 may initiate an N4 Session Establishment procedure with the selected UPF 231, otherwise it initiates an N4 Session Modification procedure with the selected UPF 231.
[0167] Step S309. An Namf_Communication_N1N2MessageTransfer message may be transmitted from the SMF 250 to the AMF 240 to inform the AMF 240 of various parameters, such as the allocated IP address (an IPv4 address, a IPv6 prefix, or both), QoS parameters, etc.
[0168] Step S310. An N2 PDU Session Request may be transmitted from the AMF 240 to (R)AN, which is not shown in
[0169] After that, a PDU session is successfully established for the UE-1 211, and UE-1 211 may communicate its uplink/downlink data with the Internet 295 via the firewall/NAT at the selected UPF 231, as shown in
[0170]
[0171] At steps S401 and S402, the SMF 250 successfully obtains information necessary for the subsequent steps from the DN-AAA/Authentication 261, such as, the selected 3GPP-IP-Address-Pool-Info and the allocated IPv4 address/IPv6 prefix, as shown in
[0172] After that, at step S403, the SMF 250 may transmit an Accounting-Request Start message (or to be specific, an Accounting-Request message with the attribute “Acct-Status-Type” set to be 1) to the DN-AAA/Accounting 262 to start accounting service for the PDU session (e.g. the PDU session established for the UE-1 211). The Accounting-Request Start message may comprise the information obtained at the step S402, such as, the selected 3GPP-IP-Address-Pool-Info and the allocated IPv4 address/IPv6 prefix. In some embodiments, the message may further comprise information or attribute for identifying the target network, such as, “Called-Station-Id”, which indicates the target network to be accessed, i.e. APN/DNN.
[0173] At step S404, upon receipt of the Accounting-Request Start message comprising the selected 3GPP-IP-Address-Pool-Info and the allocated IPv4 address/IPv6 prefix, the DN-AAA/Accounting 262 may now correctly identify the PDU session or the UE, even if a same IPv4 address/IPv6 prefix and a same APN/DNN are used by different PDU sessions or UEs. Therefore, the DN-AAA/Accounting 262 may respond to the SMF 250 with an Accounting-Response Start message (or to be specific, an Accounting-Response message with the attribute “Acct-Status-Type” set to be 1) to indicate that the accounting service for the PDU session is started.
[0174] Later, the AMF 240 and the SMF 250 may exchange messages at steps S405 and S406, such as Namf_Communication_N1N2MessageTransfer or Nsmf_PDUSession_UpdateSMContext, and therefore the AMF 240 is notified of a successful establishment of the PDU session, and later an update of the accounting service for the PDU session may be triggered.
[0175] In such a case, at step S407, the SMF 250 may transmit an Accounting-Request Interim Update message (or to be specific, an Accounting-Request message with the attribute “Acct-Status-Type” set to be 3) to the DN-AAA/Accounting 262 to update accounting service for the PDU session. Similarly, the Accounting-Request Interim Update message may also comprise the information obtained at the step S402, such as, the selected 3GPP-IP-Address-Pool-Info and the allocated IPv4 address/IPv6 prefix. In some embodiments, the message may further comprise information or attribute for identifying the target network, such as, “Called-Station-Id”.
[0176] At step S408, upon receipt of the Accounting-Request Interim Update message comprising the selected 3GPP-IP-Address-Pool-Info and the allocated IPv4 address/IPv6 prefix, the DN-AAA/Accounting 262 may now correctly identify the PDU session or the UE, even if a same IPv4 address/IPv6 prefix and a same APN/DNN are used by different PDU sessions or UEs. Therefore, the DN-AAA/Accounting 262 may respond to the SMF 250 with an Accounting-Response Interim Update message (or to be specific, an Accounting-Response message with the attribute “Acct-Status-Type” set to be 3) to indicate that the accounting service for the PDU session is updated.
[0177] Later, the AMF 240 may transmit a message to the SMF 250 at steps S409, such as Nsmf_PDUSession_ReleaseSMContext, and therefore a release of the accounting service for the PDU session is triggered.
[0178] In such a case, at step S410, the SMF 250 may transmit an Accounting-Request Stop message (or to be specific, an Accounting-Request message with the attribute “Acct-Status-Type” set to be 2) to the DN-AAA/Accounting 262 to stop the accounting service for the PDU session. Similarly, the Accounting-Request Stop message may also comprise the information obtained at the step S402, such as, the selected 3GPP-IP-Address-Pool-Info and the allocated IPv4 address/IPv6 prefix. In some embodiments, the message may further comprise information or attribute for identifying the target network, such as, “Called-Station-Id”.
[0179] At step S411, upon receipt of the Accounting-Request Stop message comprising the selected 3GPP-IP-Address-Pool-Info and the allocated IPv4 address/IPv6 prefix, the DN-AAA/Accounting 262 may now correctly identify the PDU session or the UE, even if a same IPv4 address/IPv6 prefix and a same APN/DNN are used by different PDU sessions or UEs. Therefore, the DN-AAA/Accounting 262 may respond to the SMF 250 with an Accounting-Response Stop message (or to be specific, an Accounting-Response message with the attribute “Acct-Status-Type” set to be 2) to indicate that the accounting service for the PDU session is stopped.
[0180] After that, the PDU session for the UE-1 211 may be terminated and resources allocated to this PDU session may be released.
[0181] Therefore, from the above description with reference to
[0182]
[0183] The method 500 may begin at step S510 where a first request message associated with the first UE may be transmitted to a second network element. In some embodiments, the first request message may comprise the IP address and a first indicator which, in conjunction with the IP address, uniquely identifies the first UE.
[0184] In some embodiments, the method 500 may further comprise a step S520 where a first response message associated with the first UE may be received from the second network element in response to the first request message. In some embodiments, the second network element may be a part of an Authentication, Authorization and Accounting (AAA) server for accounting. In some embodiments, the first request message may be one of: an Accounting-Request START message, an Accounting-Request STOP message, and an Accounting-Request Interim-Update message, and the first response message is a corresponding one of: an Accounting-Response START message, an Accounting-Response STOP message, and an Accounting-Response Interim-Update message.
[0185] In some embodiments, before the step S510, the method 500 may further comprise steps of: transmitting, to a third network element, a second request message associated with the first UE, the second request message comprising one or more second indicators, each of which indicates an IP address pool from which one or more IP addresses are available to be allocated to the first UE; and receiving, from the third network element, a second response message in response to the second request message, the second response message comprising a third indicator which identifies an IP address pool of the one or more IP addresses pools indicated by the one or more second indicators, wherein the IP address from the identified IP address pool is allocated to the first UE.
[0186] In some embodiments, the method may further comprise: selecting a User Plane Function (UPF) for the first UE based at least partially on the third indicator. In some embodiments, the third network element may be a part of an AAA server for authentication. In some embodiments, the second request message may be an Access Request message or a Diameter-Extensible Authentication Protocol (EAP)-Request (DER) message, and the second response message may be a corresponding one of an Access Accept message or a Diameter-EAP-Answer (DEA) message. In some embodiments, each of the first indicator, one or more second indicators, and the third indicator may comprise a first field uniquely identifying an IP address pool from which the IP address is allocated to the first UE. In some embodiments, each of the first indicator, the one or more second indicators, and the third indicator may further comprise a second field indicating an IP version applicable for the IP address pool identified by the first field. In some embodiments, the second field may indicate one of IPv4, IPv6, or both. In some embodiments, each of the first indicator, the one or more second indicators, and the third indicator further comprises a third field indicating the length of the first field. In some embodiments, each of the first indicator, the one or more second indicators, and the third indicator may be a 3GPP-IP-Address-Pool-Id attribute, a 3GPP-IP-Address-Pool-Info attribute, or a customized Remote Authentication Dial In User Service (RADIUS) attribute. In some embodiments, the first request message may further comprise a fourth indicator identifying a network to be accessed by the first UE.
[0187] In some embodiments, the fourth indicator may be a Called-Station-Id attribute or a customized RADIUS attribute. In some embodiments, the IP address may comprise an IPv4 address, an IPv6 prefix, or both. In some embodiments, the first network element may be a Session Management Function (SMF) or a Packet Data Network (PDN) Gateway for Control Plane (PGW-C).
[0188]
[0189] The method 600 may begin at step S610 where a first request message associated with the first UE may be received from a first network element. In some embodiments, the first request message may comprise the IP address and a first indicator which, in conjunction with the IP address, uniquely identifies the first UE.
[0190] At step S620, processing for the first UE identified by the first indicator in conjunction with the IP address may be performed.
[0191] In some embodiments, the method 600 may further comprise a step of transmitting, to the first network element, a first response message associated with the first UE based on a result of the processing. In some embodiments, the second network element may be a part of an Authentication, Authorization and Accounting (AAA) server for accounting. In some embodiments, the first request message may be one of: an Accounting-Request START message, an Accounting-Request STOP message, and an Accounting-Request Interim-Update message, and the first response message may be a corresponding one of: an Accounting-Response START message, an Accounting-Response STOP message, and an Accounting-Response Interim-Update message. In some embodiments, the first indicator may comprise a first field uniquely identifying an IP address pool from which the IP address is allocated to the first UE. In some embodiments, the first indicator may further comprise a second field indicating an IP version applicable for the IP address pool identified by the first field. In some embodiments, the second field may indicate one of IPv4, IPv6, or both. In some embodiments, the first indicator further comprises a third field indicating the length of the first field. In some embodiments, the first indicator may be a 3GPP-IP-Address-Pool-Id attribute, a 3GPP-IP-Address-Pool-Info attribute, or a customized Remote Authentication Dial In User Service attribute. In some embodiments, the first request message may further comprise a fourth indicator identifying a network to be accessed by the first UE. In some embodiments, the fourth indicator may be a Called-Station-Id attribute or a customized RADIUS attribute. In some embodiments, the IP address may comprise an IPv4 address, an IPv6 prefix, or both. In some embodiments, the first network element may be a Session Management Function (SMF) or a Packet Data Network (PDN) Gateway for Control Plane (PGW-C).
[0192]
[0193] The method 700 may begin at step S710 where a second request message associated with the first UE is received from a first network element. In some embodiments, the second request message may comprise one or more second indicators, each of which indicates an IP address pool from which one or more IP addresses are available to be allocated to the first UE.
[0194] At step S720, a first IP address pool is determined, from one or more IP address pools indicated by the one or more second indicators, to be allocated to the first UE.
[0195] At step S730, a second response message comprising a third indicator which identifies the first IP address pool is transmitted to the first network element.
[0196] In some embodiments, the third network element may be a part of an AAA server for authentication. In some embodiments, the second request message may be an Access Request message or a Diameter-Extensible Authentication Protocol (EAP)-Request (DER) message, and the second response message may be a corresponding one of an Access Accept message or a Diameter-EAP-Answer (DEA) message. In some embodiments, each of the one or more second indicators and the third indicator may comprise a first field uniquely identifying the first IP address pool. In some embodiments, each of the one or more second indicators and the third indicator may further comprise a second field indicating an IP version applicable for the IP address pool identified by the first field. In some embodiments, the second field may indicate one of IPv4, IPv6, or both. In some embodiments, each of the one or more second indicators and the third indicator further comprises a third field indicating the length of the first field. In some embodiments, each of the one or more second indicators and the third indicator may be a 3GPP-IP-Address-Pool-Id attribute, a 3GPP-IP-Address-Pool-Info attribute, or a customized Remote Authentication Dial In User Service (RADIUS) attribute. In some embodiments, the IP address may comprise an IPv4 address, an IPv6 prefix, or both. In some embodiments, the first network element may be a Session Management Function (SMF) or a Packet Data Network (PDN) GateWay for Control Plane (PGW-C).
[0197] According to present disclosure, a method at a first network element (250) for facilitating reuse of an Internet Protocol (IP) address at multiple User Equipments (UEs) comprising a first UE, is provided. The method may comprise: transmitting to a second network element (262), a request message associated with the first UE, the first request message comprising an indicator which indicates information on IP address pool, wherein the information on IP address pool indicates the IP version of the IP address pool; and receiving, from the third network element (261), a response message in response to the request message, the response message comprising the indicator which indicates information on IP address pool, wherein the information on IP address pool indicates the IP version of the IP address pool. In some embodiments, the request message may be one of: Access request message, accounting request message, DER Command, AAR Command, and ACR Command; the response message may be one of: Access accept message, accounting response message, DEA message, AAA Command, and ACA Command.
[0198]
[0199] Furthermore, the arrangement 800 may comprise at least one computer program product 808 in the form of a non-volatile or volatile memory, e.g., an Electrically Erasable Programmable Read-Only Memory (EEPROM), a flash memory and/or a hard drive. The computer program product 808 comprises a computer program 810, which comprises code/computer readable instructions, which when executed by the processing unit 806 in the arrangement 800 causes the arrangement 800 and/or the network elements in which it is comprised to perform the actions, e.g., of the procedure described earlier in conjunction with
[0200] The computer program 810 may be configured as a computer program code structured in computer program modules 810A. Hence, in an exemplifying embodiment when the arrangement 800 is used in a first network element, the code in the computer program of the arrangement 800 includes: a transmission module 810A for transmitting, to a second network element, a first request message associated with the first UE, the first request message comprising the IP address and a first indicator which, in conjunction with the IP address, uniquely identifies the first UE.
[0201] Further, the computer program 810 may be configured as a computer program code structured in computer program modules 810A and 810B. Hence, in an exemplifying embodiment when the arrangement 800 is used in a second network element, the code in the computer program of the arrangement 800 includes: a reception module 810A for receiving, from a first network element, a first request message associated with the first UE, the first request message comprising the IP address and a first indicator which, in conjunction with the IP address, uniquely identifies the first UE; and a performing module 810B for performing processing for the first UE identified by the first indicator in conjunction with the IP address.
[0202] Furthermore, the computer program 810 may be configured as a computer program code structured in computer program modules 810A, 810B, and 810C. Hence, in an exemplifying embodiment when the arrangement 800 is used in a third network element, the code in the computer program of the arrangement 800 includes: a reception module 810A for receiving, from a first network element, a second request message associated with the first UE, the second request message comprising one or more second indicators, each of which indicates an IP address pool from which one or more IP addresses are available to be allocated to the first UE; a determination module 810B for determining a first IP address pool from one or more IP address pools indicated by the one or more second indicators to be allocated to the first UE; and a transmission module 810C for transmitting, to the first network element, a second response message comprising a third indicator which identifies the first IP address pool.
[0203] The computer program modules could essentially perform the actions of the flow illustrated in
[0204] Although the code means in the embodiments disclosed above in conjunction with
[0205] The processor may be a single CPU (Central processing unit), but could also comprise two or more processing units. For example, the processor may include general purpose microprocessors; instruction set processors and/or related chips sets and/or special purpose microprocessors such as Application Specific Integrated Circuit (ASICs). The processor may also comprise board memory for caching purposes. The computer program may be carried by a computer program product connected to the processor. The computer program product may comprise a computer readable medium on which the computer program is stored. For example, the computer program product may be a flash memory, a Random-access memory (RAM), a Read-Only Memory (ROM), or an EEPROM, and the computer program modules described above could in alternative embodiments be distributed on different computer program products in the form of memories within the UE.
[0206] The present disclosure is described above with reference to the embodiments thereof. However, those embodiments are provided just for illustrative purpose, rather than limiting the present disclosure. The scope of the disclosure is defined by the attached claims as well as equivalents thereof. Those skilled in the art can make various alternations and modifications without departing from the scope of the disclosure, which all fall into the scope of the disclosure.