Performing packet flow optimization with policy and charging control
First Claim
1. A method for wireless communication, the method comprising:
- transmitting, by a first network entity, a request from the first network entity to a second network entity to establish a policy and charging control session for a user equipment accessing the first network entity;
accessing, by the first network entity, a first plurality of policy and charging control rules that defines a criterion for detecting an encapsulated packet flow and an event trigger for reporting a detected flow;
detecting, by the first network entity, the encapsulated packet flow by performing a packet flow optimization application using the first plurality of policy and charging control rules;
transmitting an indication of the event trigger and a description of the encapsulated packet flow from the first network entity to the second network entity; and
receiving a second plurality of policy and charging control rules at the first network entity from the second network entity for the policy and charging control session based on the encapsulated packet flow.
1 Assignment
0 Petitions
Accused Products
Abstract
Policy and charging control (PCC) is a framework within a Third or Fourth Generation (3G/4G) network that allows operators to authorize and enforce policy, Quality of Service (QoS), and charging control over communication sessions by mobile devices. PCC mechanism is used to determine the type QoS based on a request received from a User Equipment (UE) or network. PCC is one important element within System Architecture Evolution (SAE) architecture to allow the network to perform policy and charging control. A mechanism is provided so that PCC can allow packet flow optimization. Thereby, the network can detect Internet Protocol (IP) flows based on operator defined criteria and can perform policy and QoS control.
-
Citations
32 Claims
-
1. A method for wireless communication, the method comprising:
-
transmitting, by a first network entity, a request from the first network entity to a second network entity to establish a policy and charging control session for a user equipment accessing the first network entity; accessing, by the first network entity, a first plurality of policy and charging control rules that defines a criterion for detecting an encapsulated packet flow and an event trigger for reporting a detected flow; detecting, by the first network entity, the encapsulated packet flow by performing a packet flow optimization application using the first plurality of policy and charging control rules; transmitting an indication of the event trigger and a description of the encapsulated packet flow from the first network entity to the second network entity; and receiving a second plurality of policy and charging control rules at the first network entity from the second network entity for the policy and charging control session based on the encapsulated packet flow. - View Dependent Claims (2, 3, 4)
-
-
5. A computer program product for wireless communication, the computer program product comprising:
-
at least one non-transitory computer readable storage medium storing computer executable instructions that, when executed by at least one processor, implement components comprising; a first set of codes for transmitting a request from a first network entity to a second network entity to establish a policy and charging control session for a user equipment accessing the first network entity; a second set of codes for accessing, by the first network entity, a first plurality of policy and charging control rules that defines a criterion for detecting an encapsulated packet flow and an event trigger for reporting a detected flow; a third set of codes for detecting, by the first network entity, the encapsulated packet flow by performing a packet flow optimization application using the first plurality of policy and charging control rules; a fourth set of codes for transmitting an indication of the event trigger and a description of the encapsulated packet flow from the first network entity to the second network entity; and a fifth set of codes for receiving a second plurality of policy and charging control rules at the first network entity from the second network entity for the policy and charging control session based on the encapsulated packet flow. - View Dependent Claims (6, 7, 8)
-
-
9. An apparatus for wireless communication, the apparatus comprising:
-
at least one processor; at least one computer readable storage medium storing computer executable instructions that, when executed by at the least one processor, implement components of a first network entity comprising; means for transmitting a request from the first network entity to a second network entity to establish a policy and charging control session for a user equipment accessing the first network entity; means for accessing a first plurality of policy and charging control rules that defines a criterion for detecting an encapsulated packet flow and an event trigger for packet detected flow; means for detecting the encapsulated packet flow by performing a packet flow optimization application using the first plurality of policy and charging control rules; means for transmitting an indication of the event trigger and a description of the encapsulated packet flow from the first network entity to the second network entity; and means for receiving a second plurality of policy and charging control rules at the first network entity from the second network entity for the policy and charging control session based on the encapsulated packet flow. - View Dependent Claims (10, 11, 12)
-
-
13. A first network entity for wireless communication, the first network entity comprising:
-
a network interface for transmitting a request from the first network entity to a second network entity to establish a policy and charging control session for a user equipment accessing the first network entity; a computing platform for accessing a first plurality of policy and charging control rules that defines a criterion for detecting an encapsulated packet flow and an event trigger for reporting a detected flow and for detecting the encapsulated packet flow by performing a packet flow optimization application using the first plurality of policy and charging control rules; and the network interface further for transmitting an indication of the event trigger and a description of the encapsulated packet flow from the first network entity to the second network entity, and for receiving a second plurality of policy and charging control rules at the first network entity from the second network entity for the policy and charging control session based on the encapsulated packet flow. - View Dependent Claims (14, 15, 16)
-
-
17. A method for wireless communication, the method comprising:
-
receiving a request from a first network entity at a second network entity to establish a policy and charging control session for a user equipment accessing the first network entity; transmitting, by the second network entity, a first plurality of policy and charging control rules for detecting an encapsulated packet flow by performing deep packet inspection; receiving, at the second network entity, an indication of a detection of the encapsulated packet flow by the first network entity; deriving, by the second network entity, a second plurality of policy and charging control rules that is based upon the encapsulated packet flow; and transmitting the second plurality of policy and charging control rules to the first network entity from the second network entity for the policy and charging control session. - View Dependent Claims (18, 19, 20)
-
-
21. A computer program product for wireless communication, the computer program product comprising:
-
at least one non-transitory computer readable storage medium storing computer executable instructions that, when executed by at least one processor, implement components comprising; a first set of codes for receiving a request from a first network entity at a second network entity to establish a policy and charging control session for a user equipment accessing the first network entity; a second set of codes for transmitting, by the second network entity, a first plurality of policy and charging control rules for detecting an encapsulated packet flow by performing deep packet inspection; a third set of codes for receiving, at the second network entity, an indication of a detection of the encapsulated packet flow by the first network entity; a fourth set of codes for deriving, by the second network entity, a second plurality of policy and charging control rules that is based upon the encapsulated packet flow; and a fifth set of codes for transmitting the second plurality of policy and charging control rules to the first network entity from the second network entity for the policy and charging control session. - View Dependent Claims (22, 23, 24)
-
-
25. An apparatus for wireless communication, the apparatus comprising:
-
at least one processor; at least one computer readable storage medium storing computer executable instructions that, when executed by at the least one processor, implement components of a second network entity comprising; means for receiving a request from a first network entity at the second network entity to establish a policy and charging control session for a user equipment accessing the first network entity; means for transmitting, by the second network entity, a first plurality of policy and charging control rules for detecting an encapsulated packet flow by performing deep packet inspection; means for receiving, at the second network entity, an indication of a detection of the encapsulated packet flow by the first network entity; means for deriving, by the second network entity, a second plurality of policy and charging control rules that is based upon the encapsulated packet flow; and means for transmitting the second plurality of policy and charging control rules to the first network entity from the second network entity for the policy and charging control session. - View Dependent Claims (26, 27, 28)
-
-
29. A second network entity for wireless communication, the second network entity comprising:
-
a network interface for receiving a request from a first network entity at the second network entity to establish a policy and charging control session for a user equipment accessing the first network entity, for transmitting a first plurality of policy and charging control rules for detecting an encapsulated packet flow by performing deep packet inspection, and for receiving an indication of a detection of the encapsulated packet flow by the first network entity; a computing platform for deriving a second plurality of policy and charging control rules that is based upon the encapsulated packet flow; and the network interface further for transmitting the second plurality of policy and charging control rules to the first network entity from the second network entity for the policy and charging control session. - View Dependent Claims (30, 31, 32)
-
Specification