Method, apparatus and system for handling node failure

ABSTRACT

Embodiments of the present invention provide a method, an apparatus and a system for handling node failure. The method for handling node failure includes: sending, by an intermediate node, a context processing request message to a remote node when detecting that a first node occurs a failure, where the context processing request message is used to instruct the remote node to delete context information associated with the first node and the intermediate node; and deleting the context information associated with the first node and the intermediate node, by the remote node, according to the request message. The technical solution can enable the remote node to process the context information associated with the first node in time

CROSS-REFERENCE TO RELATED APPLICATIONS

This application is a continuation of International Application No.PCT/CN2010/070383, filed on Jan. 27, 2010, which is hereby incorporatedby reference in its entirety.

FIELD OF THE INVENTION

The present invention relates to the field of network communicationstechnologies, and in particular, a technology for handling node failure.

BACKGROUND OF THE INVENTION

In a network such as a General Packet Radio Service (General PacketRadio Service, GPRS) network, an Internet Protocol (Internet Protocol,IP) network or an Evolved Packet Core (Evolved Packet Core, EPC)network, in the case that a first node and a second node are neighboringnodes, if the second node detects that the first node occurs a failure,the second node needs to process context information associated with thefirst node, for example, the second node deletes the context informationassociated with the first node or sets the context informationassociated with the first node be invalid. The case that the second nodedetects that the first node occurs a failure may be that the second nodedetects that the first node is reset, or the second node detects thepath to the first node is faulty, or the second node detects that thefirst node is unreachable.

During the implementation of the present invention, the inventors findthat, in the case that the first node and the second node are notneighboring nodes, if the first node occurs a failure, the second nodecannot perceive the failure of the first node, so that the second nodedoes not process the context information associated with the first node.The context information in the second node wastes network resources, andalso may cause a potential risk of exception to the network.

SUMMARY OF THE INVENTION

Embodiments of the present invention provide a method, an apparatus anda system for handling node failure, which can enable a remote node toprocess context information associated with a first node and anintermediate node in time, so as to save network resources, andeliminate the potential risk to the network caused by the contextinformation in the remote node.

A method for handling node failure provided in an embodiment of thepresent invention includes:

detecting, by an intermediate node, that a first node occurs a failure,where the failure of the first node includes the following: the firstnode is reset, a path between the intermediate node and the first nodeis faulty, or the first node is unreachable; and

sending, by the intermediate node, a context processing request messagecarrying an identifier of the first node and an identifier of theintermediate node to a remote node, where the context processing requestmessage is used to instruct the remote node to delete contextinformation associated with the first node and the intermediate node orset the context information associated with the first node and theintermediate node be invalid.

Another method for handling node failure provided in an embodiment ofthe present invention includes:

receiving, by a remote node, a context processing request message sentby an intermediate node and carrying an identifier of a first node andan identifier of an intermediate node, where the context processingrequest message is a message sent by the intermediate node when theintermediate node detects that a first node occurs a failure, where thefailure of the first node includes the following: the first node isreset, a path between the intermediate node and the first node isfaulty, or the first node is unreachable; and

deleting context information associated with the first node and theintermediate node or setting the context information associated with thefirst node and the intermediate node be invalid, by the remote node,according to the identifier of the first node and the identifier of theintermediate node carried in the message.

An apparatus for handling node failure provided in an embodiment of thepresent invention includes:

a detection module, configured to detect that a first node occurs afailure, where the failure of the first node includes the following: thefirst node is reset, a path between the intermediate node and the firstnode is faulty, or the first node is unreachable; and

a first processing module, configured to send a context processingrequest message carrying an identifier of the first node and anidentifier of the intermediate node to a remote node, where the contextprocessing request message is used to instruct the remote node to deletecontext information associated with the first node and the intermediatenode or set the context information associated with the first node andthe intermediate node be invalid.

Another apparatus for handling node failure provided in an embodiment ofthe present invention includes:

a receiving module, configured to receive a context processing requestmessage sent by an intermediate node and carrying an identifier of afirst node and an identifier of the intermediate node, where the contextprocessing request message is a message sent by the intermediate nodewhen the intermediate node detects that the first node occurs a failure,where the failure of the first node includes the following: the firstnode is reset, a path between the intermediate node and the first nodeis faulty, or the first node is unreachable; and

a second processing module, configured to delete context informationassociated with the first node and the intermediate node or set thecontext information associated with the first node and the intermediatenode be invalid, according to the identifier of the first node and theidentifier of the intermediate node carried in the message.

A system for handling node failure provided in an embodiment of thepresent invention includes:

a first node, connected to a remote node through an intermediate node;

the intermediate node, configured to detect that the first node occurs afailure, and send a context processing request message carrying anidentifier of the first node and an identifier of the intermediate nodeto the remote node, where the failure of the first node includes thefollowing: the first node is reset, a path between the intermediate nodeand the first node is faulty, or the first node is unreachable; and

the remote node, configured to receive the context processing requestmessage, and delete context information associated with the first nodeand the intermediate node or set the context information associated withthe first node and the intermediate node be invalid, according to theidentifier of the first node and the identifier of the intermediate nodecarried in the message.

It can be known from the above technical solutions that, when detectingthat a first node occurs a failure, an intermediate node sends a contextprocessing request message to a remote node, so that the remote node canobtain that the first node occurs a failure in time, and accordingly theremote node can delete context information associated with the firstnode and the intermediate node or set the context information associatedwith the first node and the intermediate node be invalid in timeaccording to an identifier of the first node and an identifier of theintermediate node carried in the message, so as to save networkresources, and eliminate the potential risk to the network caused by thecontext information in the remote node, thereby improving the stabilityof the network.

BRIEF DESCRIPTION OF THE DRAWINGS

To illustrate the technical solutions according to the embodiments ofthe present invention or in the prior art more clearly, the accompanyingdrawings required for describing the embodiments or the prior art areintroduced below briefly. Apparently, the accompanying drawings in thefollowing descriptions show merely some of the embodiments of thepresent invention, and persons skilled in the art can obtain otherdrawings according to the accompanying drawings without creativeefforts.

FIG. 1 is a flowchart of a method for handling node failure according toEmbodiment 1 of the present invention;

FIG. 2 is a flowchart of a method for handling node failure according toEmbodiment 2 of the present invention;

FIG. 3 is a flowchart of a method for handling node failure according toEmbodiment 3 of the present invention;

FIG. 4 is a flowchart of a method for handling reset of an access nodeaccording to Embodiment 4 of the present invention;

FIG. 5 is a flowchart of a method for handling reset of a data gatewayaccording to Embodiment 5 of the present invention;

FIG. 6 is a flowchart of a method for handling path fault to an accessnode or unreachability of the access node according to Embodiment 6 ofthe present invention;

FIG. 7 is a flowchart of a method for handling path fault to a datagateway or unreachability of the data gateway according to Embodiment 7of the present invention;

FIG. 8 is a flowchart of a method for handling path failure to an accessnode or unreachability of the access node according to Embodiment 8 ofthe present invention;

FIG. 9 is a flowchart of a method for handling path fault to a datagateway or unreachability of the data gateway according to Embodiment 9of the present invention;

FIG. 10 is a schematic flowchart of obtaining a CSID according toEmbodiment 10 of the present invention;

FIG. 11 is a schematic flowchart of obtaining a CSID according toEmbodiment 11 of the present invention;

FIG. 12 is a schematic flowchart of obtaining a CSID according toEmbodiment 12 of the present invention;

FIG. 13 is a schematic flowchart of obtaining a CSID according toEmbodiment 13 of the present invention;

FIG. 14 is a schematic diagram of an apparatus for handling node failureaccording to Embodiment 14 of the present invention;

FIG. 15 is a schematic diagram of an apparatus for handling node failureaccording to Embodiment 15 of the present invention; and

FIG. 16 is a schematic diagram of a system for handling node failureaccording to Embodiment 16 of the present invention.

DETAILED DESCRIPTION OF THE EMBODIMENTS

The specific implementation processes of the method, apparatus andsystem for handling node failure of the present invention are describedbelow with examples. It is obvious that the embodiments to be describedbelow are only a part rather than all of the embodiments of the presentinvention. All other embodiments obtained by persons skilled in the artbased on the embodiments of the present invention without creativeefforts shall fall within the protection scope of the present invention.

Embodiment 1: Method for handling node failure. In this embodiment, afirst node and a remote node are connected through an intermediate node.The first node, the remote node and the intermediate node may be networkelements in a next generation mobile communication network (for example,evolved packet exchange Evolved Packet System network, that is, EPSnetwork), or network elements in an Internet Protocol (InternetProtocol, IP) network.

Specifically, the intermediate node may include a Serving Gateway(serving gateway, SGW), a Mobile Access Gateway (mobile access gateway,MAG) or a Foreign Agent (foreign agent, FA). In the case that the firstnode includes a Mobility Management Entity (mobility management entity,MME), a Serving General Packet Radio Service Support Node (GPRS servicesupport node, SGSN), an Access Gateway (access gateway, A-GW) or anevolved Packet Data Gateway (evolved packet data gateway, ePDG), theremote node may include a Packet Data Network Gateway (packet datanetwork gateway, PGW), a Local Mobility Anchor (local mobility anchor,LMA) or a Home Agent (home agent, HA); in the case that the first nodeincludes a packet data network gateway, a local mobility anchor or anHA, the remote node may include a mobility management entity, a GPRSservice support node, an A-GW or an evolved packet data gateway.Specific network application scenarios are listed as follows:

Network application scenario 1: The first node is an MME, theintermediate node is an SGW, and the remote node is a PG.

Network application scenario 2: The first node is an MME, theintermediate node is an MAG, and the remote node is an LMA.

Network application scenario 3: The first node is an SGSN, theintermediate node is an SGW, and the remote node is a PGW.

Network application scenario 4: The first node is an A-GW or ePDG, theintermediate node is an MAG, and the remote node is an LMA.

Network application scenario 5: The first node is an A-GW or ePDG, theintermediate node is an SGW, and the remote node is a PGW.

Network application scenario 6: The first node is an A-GW or ePDG, theintermediate node is an FA, and the remote node is an HA.

In the six network application scenarios listed above, the first nodeand the remote node are interchangeable in each application scenario. Inthe following embodiments, the specific network application scenariosare not repeatedly described.

The process of the method of Embodiment 1 is shown in FIG. 1.

In FIG. 1, S100: The intermediate node detects that the first nodeoccurs a failure. Here, the failure of the first node indicates that theaccess to the first node is abnormal, and the failure of the first nodemay be caused by the case that the first node is abnormal or theconnection between the intermediate node and the first node is abnormal.Here, the failure of the first node may include the following: the firstnode is reset, a path between the intermediate node and the first nodeis faulty, or the first node is unreachable. In an actual network, thefailure of the first node may also include other cases except the abovethree cases, and this embodiment does not limit the specific case of thefailure of the first node.

The intermediate node may detect that the first node occurs a failure byusing existing ways, the way of detecting that the first node occurs afailure varies with different networks, and this embodiment does notlimit the specific implementation process of detecting that the firstnode occurs a failure.

S110: When detecting that the first node occurs a failure, theintermediate node sends a context processing request message to theremote node. The context processing request message is used to instructthe remote node to process context information associated with the firstnode and the intermediate node, for example, delete the contextinformation associated with the first node and the intermediate node inthe remote node or set the context information associated with the firstnode and the intermediate node in the remote node be invalid. Here, theinvalidation operation is, for example, setting an invalid tag in thecontext information.

The context processing request message sent by the intermediate node tothe remote node carries deletion/invalidation location information, andthe deletion/invalidation location information is used by the remotenode to delete context information corresponding to thedeletion/invalidation location information or set the contextinformation corresponding to the deletion/invalidation locationinformation be invalid. For example, the remote node determines contextinformation to be deleted or set be invalid from the context informationstored by the remote node according to the deletion/invalidationlocation information carried in the context processing request message.

The deletion/invalidation location information may include an identifierof the first node and an identifier of the intermediate node. That is,the intermediate node carries the identifier of the first node and theidentifier of the intermediate node in the context processing requestmessage, and sends the context processing request message to the remotenode, and after receiving the context processing request message, theremote node deletes context information corresponding to the identifierof the first node and the identifier of the intermediate node or setsthe context information corresponding to the identifier of the firstnode and the identifier of the intermediate node be invalid, forexample, the remote node searches stored context information for contextinformation matching the identifier of the first node and the identifierof the intermediate node carried in the message, and deletes the foundmatching context information or sets the found matching contextinformation be invalid; for another example, the remote node directlyindexes corresponding context information through the identifier of thefirst node and the identifier of the intermediate node, and the remotenode deletes the found context information or sets the found contextinformation be invalid. Here, the identifier of the first node and theidentifier of the intermediate node may be IP address identifiers, ornon IP address identifiers.

The deletion/invalidation location information may also include anidentifier of the first node, an identifier of the intermediate node, aPDN Connection Set Identifier (packet data network connection setidentifier, CSID) mask of the first node and a first match word. Thatis, the intermediate node obtains the first match word according to thestored CSID mask of the first node and a CSID that is assigned by thefirst node (that is, a CSID of the first node) in the contextinformation associated with the first node, for example, theintermediate node may obtain the first match word by performing the ANDoperation of the CSID mask of the first node and the CSID that isassigned by the first node, and then the intermediate node carries theidentifier of the first node, the identifier of the intermediate node,the CSID mask of the first node and the first match word in a contextprocessing request message, and sends the context processing requestmessage to the remote node. After receiving the context processingrequest message, the remote node obtains a second match word, by using aCSID of the first node in context information corresponding to theidentifier of the first node and the identifier of the intermediate nodecarried in the message and the CSID mask of the first node carried inthe message, for example, the remote node obtains the second match wordby performing the AND operation of the CSID mask of the first nodecarried in the message and the CSID assigned by the first node in thecontext information stored by the remote node and associated with thefirst node and the intermediate node, and the remote node deletes thecontext information with the first match word and the second match wordbeing the same or sets the context information with the first match wordand the second match word being the same be invalid. It should be notedthat, the way for the intermediate node to obtain the first match wordshould be the same as the way for the remote node to obtain the secondmatch word. In addition, the CSID mask of the first node stored by theintermediate node may be a CSID mask of the first node obtained by theintermediate node from a message sent by the first node in a process ofinitial communication with the first node.

A specific example of S110 is that, after detecting reset of the firstnode, the intermediate node sends a context processing request messagecarrying an identifier of the intermediate node and an identifier of thefirst node to the remote node, so as to instruct the remote node todelete context information corresponding to the identifier of the firstnode and the identifier of the intermediate node in the contextprocessing request message or set the context information correspondingto the identifier of the first node and the identifier of theintermediate node in the context processing request message be invalid.Here, the identifier of the intermediate node and the identifier of thefirst node may both be IP address identifiers, or non IP addressidentifiers. The context information corresponding to the identifier ofthe first node and the identifier of the intermediate node is contextinformation associated with the first node and the intermediate node.

Another specific example of S110 is that, after detecting that the pathof a connection to the first node is faulty or the first node isunreachable, the intermediate node sends a context processing requestmessage to the remote node, where the message carries an identifier ofthe intermediate node and an IP address of the first node, so as toinstruct the remote node to delete context information corresponding tothe IP address of the first node and the identifier of the intermediatenode in the message or set the context information corresponding to theIP address of the first node and the identifier of the intermediate nodein the message be invalid. Here, the identifier of the intermediate nodemay be an IP address identifier, or a non IP address identifier.

A third specific example of S110 is that, after detecting that the pathof a connection to the first node is faulty or the first node isunreachable, the intermediate node sends a context processing requestmessage to the remote node, where the message carries an identifier ofthe intermediate node, an identifier of the first node, a CSID mask ofthe first node and the first match word, so as to instruct the remotenode to delete context information corresponding to the identifier ofthe intermediate node, the identifier of the first node, the CSID maskof the first node and the first match word in the message or set thecontext information corresponding to the identifier of the intermediatenode, the identifier of the first node, the CSID mask of the first nodeand the first match word in the message be invalid. Here, the identifierof the intermediate node may be an IP address of the intermediate node,or a non IP address identifier, and the identifier of the first node maybe a non IP address identifier.

In this embodiment, the context information in the remote node may beembodied in different specific forms according to different specificnetwork device forms of the remote node, for example, the contextinformation in the remote node may include Packet Data NetworkConnection Context (packet data network connection context information,PDN connection context information), User Equipment Context (userequipment context information, UE context information), Packet DataPacket Context (packet data packet context information, PDP contextinformation), Binding Cache Entry (binding cache entry, BCE) or BindingUpdate List Entry (binding update list entry, BULE), and this embodimentdoes not limit the specific content included by the context informationin the remote node.

S120: The intermediate node deletes the context information associatedwith the first node or sets the context information associated with thefirst node be invalid.

The intermediate node may delete the context information associated withthe first node immediately after sending the context processing requestmessage, or delete the context information associated with the firstnode after sending the context processing request message and receivinga response packet (that is, context processing response message)returned by the remote node in response to the request message. Theresponse packet may be a response packet indicating successful deletionor invalidation, or a response packet indicating failed deletion orinvalidation.

In this embodiment, the context information in the intermediate node maybe embodied in different specific forms according to different specificnetwork device forms of the intermediate node, for example, the contextinformation in the intermediate node may include PDN connection contextinformation, UE context information, PDP context information, bindingcache entry or binding update list entry, and this embodiment does notlimit the specific content included by the context information in theintermediate node.

In Embodiment 1, when detecting that the first node occurs a failure,the intermediate node sends the context processing request message tothe remote node, so that the remote node may delete the contextinformation associated with the first node and the intermediate node orset the context information associated with the first node and theintermediate node be invalid, so as to prevent the case that, if thefirst node occurs a failure, the remote node still uses the storedcontext information associated with the first node and the intermediatenode as valid context information, and further prevent the case that theremote node maintains a large amount of context information associatedwith the first node and the intermediate node, thereby eliminating thepotential risk to the network caused by inconsistency of contextinformation in the remote node, the intermediate node, and the firstnode, and improving the stability of the network.

Embodiment 2: Method for handling node failure. In this embodiment, afirst node and a remote node are connected through an intermediate node.The first node, the remote node and the intermediate node may be networkelements in a next generation mobile communication network, or networkelements in an IP network. Specifically, the intermediate node mayinclude a serving gateway, a mobile access gateway or an FA. In the casethat the first node includes a mobility management entity, a GPRSservice support node, an A-GW or an evolved packet data gateway, theremote node may include a packet data network gateway, a local mobilityanchor or an HA; in the case that the first node includes a packet datanetwork gateway, a local mobility anchor or an HA, the remote node mayinclude a mobility management entity, a GPRS service support node, anA-GW or an evolved packet data gateway.

The process of the method of Embodiment 2 is shown in FIG. 2.

In FIG. 2, S200: The remote node receives a context processing requestmessage sent by the intermediate node. The context processing requestmessage is a message sent by the intermediate node when the intermediatenode detects that the first node occurs a failure. Here, the failure ofthe first node includes the following: the first node is reset, a pathbetween the intermediate node and the first node is faulty, or the firstnode is unreachable.

S210: The remote node deletes context information associated with thefirst node and the intermediate node or sets the context informationassociated with the first node and the intermediate node be invalid.

The context processing request message received by the remote nodecarries deletion/invalidation location information. The remote node maydelete context information or set t he context information be invalidaccording to the deletion/invalidation location information carried inthe message, that is, the remote node deletes context informationcorresponding to the deletion/invalidation location information carriedin the message or sets context information corresponding to thedeletion/invalidation location information carried in the message beinvalid.

The deletion/invalidation location information may include an identifierof the first node and an identifier of the intermediate node, or mayinclude an identifier of the first node, an identifier of theintermediate node, a CSID mask of the first node and a first match word.

In the case that the deletion/invalidation location information includesan identifier of the first node and an identifier of the intermediatenode, the remote node may delete context information corresponding tothe identifier of the first node and the identifier of the intermediatenode or set the context information corresponding to the identifier ofthe first node and the identifier of the intermediate node be invalid.For example, the remote node may search stored context information forthe context information corresponding to the identifier of the firstnode and the identifier of the intermediate node carried in the contextprocessing request message, and delete the found context information orset the found context information be invalid; for another example, theremote node may directly index corresponding context information throughthe identifier of the first node and the identifier of the intermediatenode, and delete the found context information or set the found contextinformation be invalid.

In the case that the deletion/invalidation location information includesan identifier of the first node, an identifier of the intermediate node,a CSID mask of the first node and the first match word, the remote nodemay obtain a second match word by using a CSID of the first node incontext information corresponding to the identifier of the first nodeand the identifier of the intermediate node carried in the contextprocessing request message and the CSID mask of the first node carriedin the context processing request message. For example, the remote nodeobtains the second match word by performing the AND operation of theCSID mask of the first node and the CSID of the first node, and theremote node deletes the context information with the first match wordand the second match word being the same or sets the context informationwith the first match word and the second match word being the same beinvalid. If the first match word and the second match word are not thesame, the context information is not deleted or set be invalid. Itshould be noted that, if the remote node stores a plurality of pieces ofcontext information corresponding to the identifier of the first nodeand the identifier of the intermediate node, the remote node shouldperform, for each piece of context information, the above process ofobtaining the second match word and deleting the context informationwith the match words being the same or setting the context informationwith the match words being the same be valid.

Optionally, after the remote node deletes the context informationassociated with the first node and the intermediate node or sets thecontext information associated with the first node and the intermediatenode be invalid, the remote node may further return a response packet(that is, context processing response message) to the intermediate node,where the response packet is used to notify the intermediate nodewhether the remote node successfully deletes the context informationassociated with the first node and the intermediate node or sets thecontext information associated with the first node and the intermediatenode be invalid.

In Embodiment 2, after the remote node receives the context processingrequest message sent by the intermediate node when detecting that thefirst node occurs a failure, the remote node may delete the contextinformation associated with the first node and the intermediate node orset the context information associated with the first node and theintermediate node be invalid, so as to prevent the case that, if thefirst node occurs a failure, the remote node still uses the storedcontext information associated with the first node and the intermediatenode as valid context information, and further prevent the case that theremote node maintains a large amount of context information associatedwith the first node and the intermediate node, thereby eliminating thepotential risk to the network caused by inconsistency of contextinformation in the remote node, the first node, and intermediate node,and improving the stability of the network.

Embodiment 3: Method for handling node failure. The process of themethod is shown in FIG. 3.

In FIG. 3, the intermediate node may be an SGW, an MAG or an FA. Thefirst node may be an MME, an SGSN, an A-GW, a PGW, an LMA, an ePDG or anHA. If the first node is an MME, an SGSN, an A-GW or an ePDG, the remotenode may be a PGW, an LMA or an HA, and if the first node is a PGW, anLMA or an HA, the remote node may be an MME, an SGSN, an A-GW or anePDG.

S300: The intermediate node detects that the first node is reset, a pathbetween the intermediate node and the first node is faulty, or the firstnode is unreachable.

In the case that the interface protocol between the first node and theintermediate node is a GPRS Tunneling Protocol (GPRS tunneling protocol,GTP), a specific example that the intermediate node detects reset of thefirst node is as follows: The intermediate node receives a GTP messagesent by the first node, and if a count value of a restart countercarried in the GTP message is different from a count value of a restartcounter of the first node in the intermediate node, for example, thecount value of the restart counter carried in the GTP message is largerthan the count value of the restart counter of the first node in theintermediate node, the intermediate node detects that the first node isreset; otherwise, the intermediate node detects that the first node isnot reset. Here, the GTP message may be a path management message or atunnel management message. This embodiment does not limit the specificform of the GTP message.

In the case that the interface protocol between the first node and theintermediate node is a Proxy Mobile IP (proxy mobile IP, PMIP), aspecific example that the intermediate node detects reset of the firstnode is as follows: The intermediate node receives a heartbeat responsemessage sent by the first node, and if a count value of a restartcounter carried in the heartbeat response message is different from acount value of a restart counter of the first node in the intermediatenode (for example, the count value of the restart counter carried in theheartbeat response message is larger than the count value of the restartcounter of the first node in the intermediate node), the intermediatenode detects that the first node is reset; otherwise, the intermediatenode detects that the first node is not reset.

In the case that the interface protocol between the first node and theintermediate node is the GTP, a specific example that the intermediatenode detects that a path between the intermediate node and the firstnode occurs a failure is as follows: The intermediate node sends an echorequest message to the first node, and if the intermediate node does notreceive an echo response message returned by the first node within thelast message retransmission time, the intermediate node detects that apath between the intermediate node and the first node occurs a failure;otherwise, the first node determines that the path between theintermediate node and the first node is normal.

In the case that the interface protocol between the first node and theintermediate node is the PMIP, a specific example that the intermediatenode detects that the first node is unreachable is as follows: Theintermediate node sends a heartbeat request message to the first node,and if the number of heartbeat response messages which are returned bythe first node and not received by the intermediate node exceeds apre-configured maximum allowable number of missing heartbeat messages,the intermediate node detects that the first node is unreachable;otherwise, the intermediate node detects that the first node isreachable.

S310: The intermediate node sends a deletion request message to theremote node, where the deletion request message is a context processingrequest message, and this embodiment does not limit the specific form ofthe context processing request message.

A first specific example of S310 is that, in the case that theintermediate node detects that the first node is reset and restarted,the intermediate node carries an identifier of the first node (forexample, IP address of the first node, or non-IP address identifier ofthe first node) and an identifier of the intermediate node (for example,IP address of the intermediate node, or non-IP address identifier of theintermediate node) in the deletion request message, and sends thedeletion request message to the remote node.

A second specific example of S310 is that, in the case that theintermediate node detects that a path between the intermediate node andthe first node is faulty or detects that the first node is unreachable,and context information in the remote node includes a first node IPaddress, the intermediate node carries the first node IP address and anidentifier of the intermediate node (for example, IP address of theintermediate node, or non-IP address identifier of the intermediatenode) in the deletion request message, and sends the deletion requestmessage to the remote node.

A third specific example of S310 is that, in the case that theintermediate node detects that a path between the intermediate node andthe first node is faulty or detects that the first node is unreachable,and an identifier of the first node included in context information inthe remote node is a non IP address identifier of the first node, theintermediate node obtains a first match word through a CSID mask of thefirst node and a CSID of the first node that is in context informationassociated with the first node in the intermediate node, for example,the intermediate node obtains the first match word by performing the ANDoperation of the CSID mask of the first node and the CSID of the firstnode, and the intermediate node carries the non IP address identifier ofthe first node, an identifier of the intermediate node (for example, IPaddress of the intermediate node, or non-IP address identifier of theintermediate node), the CSID mask of the first node, and the first matchword in the deletion request message, and sends the deletion requestmessage to the remote node.

In the case that the interface protocol between the intermediate nodeand the remote node is the GTP, the deletion request message in S310 mayspecifically include a Delete Bearer Request (delete bearer request)message, a Delete PDN Connection Set Request (delete PDN connection setrequest) message or a Delete Session Request (delete session request)message. In the case that the interface protocol between theintermediate node and the remote node is the PMIP, the deletion requestmessage in S310 may include a Binding Revocation Indication (bindingrevocation indication, BRI) message. This embodiment does not limit thespecific form of the deletion request message.

S320: After receiving the deletion request message, the remote nodeprocesses context information according to the deletion request message,and returns a deletion response message to the intermediate node. Thedeletion response message carries a cause value indicating successfuldeletion or failed deletion.

Specifically, for the first specific example in S310, in S320, theremote node deletes PDN connection context information, PDP contextinformation, UE context information, Binding Cache Entry (binding cacheentry, BCE) or Binding Update List Entry (binding update list entry,BULE) corresponding to an identifier of the first node and an identifierof the intermediate node, for example, the remote node searches storedPDN connection context information, PDP context information, UE contextinformation, BCE or BULE for PDN connection context information, PDPcontext information, UE context information, BCE or BULE correspondingto the identifier of the first node and the identifier of theintermediate node in the message, that is, the remote node searches thestored PDN connection context information, UE context information, PDPcontext information, BCE or BULE for PDN connection context information,PDP context information, UE context information, BCE or BULE thatincludes the identifier of the first node and the identifier of theintermediate node in the message, and the remote node deletes the foundPDN connection context information, PDP context information, UE contextinformation, BCE or BULE; for another example, the remote node directlyindexes corresponding PDN connection context information, PDP contextinformation, UE context information, BCE or BULE through the identifierof the first node and the identifier of the second node, and deletes thefound PDN connection context information, PDP context information, UEcontext information, BCE or BULE.

For the second specific example in S310, in S320, the remote nodedeletes UE context information, PDP context information, PDN connectioncontext information, BCE or BULE corresponding to the first node IPaddress and an identifier of the intermediate node, for example, theremote node searches UE context information, PDP context information,PDN connection context information, BCE or BULE for UE contextinformation, PDP context information, PDN connection contextinformation, BCE or BULE corresponding to the first node IP address andthe identifier of the intermediate node in the message, for example,searches the UE context information, PDP context information, PDNconnection context information, BCE or BULE for UE context information,PDP context information, PDN connection context information, BCE or BULEthat includes the first node IP address and the identifier of theintermediate node in the message, and the remote node deletes the foundUE context information, PDP context information, PDN connection contextinformation, BCE or BULE.

For the third specific example in S310, in S320, the remote node obtainsthe second match word through a CSID of the first node included in PDNconnection context information, PDP context information, UE contextinformation, BCE or BULE corresponding to the identifier of the firstnode and the identifier of the intermediate node in the message and theCSID mask of the first node carried in the message, for example, theremote node obtains the second match word by performing the ANDoperation of the CSID mask of the first node and the CSID of the firstnode, and the remote node deletes the PDN connection contextinformation, PDP context information, UE context information, BCE orBULE with the first match word and the second match word being the same.It should be noted that, the method for the remote node to use the CSIDof the first node and the CSID mask of the first node to obtain thesecond match word should be the same as the method for the intermediatenode to obtain the first match word, the above AND operation is anexample only, and the first match word and the second match word mayalso be obtained in other ways.

In the case that the interface protocol between the intermediate nodeand the remote node is the GTP, corresponding to the deletion requestmessage in S310, the deletion response message in S320 may specificallyinclude a Delete Bearer Response (delete bearer response) message, aDelete PDN Connection Set Response (delete PDN connection set response)message or a Delete Session Response (delete session response) message.In the case that the interface protocol between the intermediate nodeand the remote node is the PMIP, corresponding to the deletion requestmessage in S310, the deletion response message in S320 may specificallyinclude a Binding Revocation Acknowledgement (binding revocationacknowledgement, BRI) message. This embodiment does not limit thespecific form of the deletion response message.

In addition, Embodiment 3 is described with an example of deleting PDNconnection context information, PDP context information, UE contextinformation, BCE or BULE, and if it needs to set PDN connection contextinformation, PDP context information, UE context information, BULE orBCE be invalid, rather than delete PDN connection context information,PDP context information, UE context information, BULE or BCE, it onlyneeds to replace the deletion operation in this embodiment with aninvalidation operation. The invalidation operation is, for example,setting an invalid identifier for the PDN connection contextinformation, PDP context information, UE context information, BULE orBCE.

Embodiment 4: Method for handling reset of an access node. In thisembodiment, an access node (that is, a first node) may include an MME,an SGSN, an A-GW or an ePDG, a serving gateway (that is, an intermediatenode) may include an SGW, an MAG or an FA, and a data gateway (that is,a remote node) may include a PGW, an LMA or an HA.

The process of the method of Embodiment 4 is shown in FIG. 4.

S400: The serving gateway detects reset and restart of the access node.

Specifically, if the interface protocol between the access node and theserving gateway is the GTP, the serving gateway may detect reset andrestart of the access node through a count value of a restart countercarried in a received GTP message (for example, a path managementmessage or a tunnel management message) and a count value of a restartcounter of the access node in the serving gateway. In addition, if theserving gateway detects reset and restart of the access node, theserving gateway should use the restart counter carried in the GTPmessage to update the locally stored restart counter of the access node.

If the interface protocol between the access node and the servinggateway is the PMIP, the serving gateway may detect reset and restart ofthe access node through a count value of a restart counter carried in areceived heartbeat response message and a count value of a restartcounter of the access node in the serving gateway. In addition, if theserving gateway detects reset and restart of the access node, theserving gateway should use the count value of the restart countercarried in the heartbeat response message to update the locally storedrestart counter.

S410: The serving gateway sends a deletion request message to the datagateway, where the deletion request message carries an identifier of theaccess node and an identifier of the serving gateway. The identifier ofthe access node and the identifier of the serving gateway may both be IPaddress or non IP address identifiers, and a non IP address identifiercan still uniquely identify a node.

In the case that the interface protocol between the serving gateway andthe data gateway is the GTP, the deletion request message sent by theserving gateway may be a delete bearer request message, a delete PDNconnection set request message or a delete session request message. Inthe case that the interface protocol between the serving gateway and thedata gateway is the PMIP, the deletion request message sent by theserving gateway may be a binding revocation indication message.

S420: After the data gateway receives the deletion request message sentby the serving gateway, the data gateway deletes PDN connection contextinformation or BCE corresponding to the identifier of the access nodeand the identifier of the serving gateway. For example, the data gatewayuses the identifier of the access node and the identifier of the servinggateway carried in the deletion request message to search in PDNconnection context information or BCE, so as to obtain PDN connectioncontext information or BCE corresponding to the identifier of the accessnode and the identifier of the serving gateway carried in the message,and the data gateway deletes the found PDN connection contextinformation or BCE corresponding to the identifier of the access nodeand the identifier of the serving gateway. For another example, the datagateway directly indexes corresponding PDN connection contextinformation or BCE through the identifier of the access node and theidentifier of the serving gateway, and the data gateway deletes thefound PDN connection context information or BCE. The data gatewayreturns a deletion response message to the serving gateway, where thedeletion response message carries a cause value, and the cause valuecarried in the deletion response message may indicate whether the PDNconnection context information or BCE associated with the access nodeand the serving gateway is successfully deleted.

In the case that the interface protocol between the data gateway and theserving gateway is the GTP, corresponding to the deletion requestmessage sent by the serving gateway, the deletion response message sentby the data gateway may be a delete bearer response message, a deletePDN connection set response message or a delete session responsemessage. In the case that the interface protocol between the datagateway and the serving gateway is the PMIP, corresponding to thedeletion request message sent by the serving gateway, the deletionresponse message sent by the data gateway may be a binding revocationacknowledgement message.

In addition, Embodiment 4 is described with an example of deleting PDNconnection context information or BCE, and if it needs to set PDNconnection context information or BCE be invalid, rather than delete PDNconnection context information or BCE, it only needs to replace thedeletion operation in this embodiment with an invalidation operation.The invalidation operation is, for example, setting an invalididentifier for PDN connection context information or BCE.

It should be noted that, if in Embodiment 4, the data gateway isconnected to the access node through a plurality of serving gateways,for example, the data gateway is connected to the access node through aserving gateway 1, and the data gateway is also connected to the accessnode through a serving gateway 2, each serving gateway connected to theaccess node sends a deletion request message to the data gateway afterthe access node is reset, so that the data gateway may delete allcontext information stored therein and associated with the access nodeor set all context information stored therein and associated with theaccess node be invalid.

Embodiment 5: Method for handling reset of a data gateway. In thisembodiment, a data gateway (that is, a first node) may include a PGW, anLMA or an HA, a serving gateway (that is, an intermediate node) mayinclude an SGW, an MAG or an FA, and an access node (that is, a remotenode) may include an MME, an SGSN, an A-GW or an ePDG.

The process of the method of Embodiment 5 is shown in FIG. 5.

S500: The serving gateway detects reset and restart of the data gateway.

Specifically, if the interface protocol between the data gateway and theserving gateway is the GTP, the serving gateway may detect reset andrestart of the data gateway through the count value of a restart countercarried in a received GTP message (for example, a path managementmessage or a tunnel management message) and the count value of a restartcounter of the data gateway in the serving gateway. In addition, if theserving gateway detects reset and restart of the data gateway, theserving gateway should use the count value of the restart countercarried in the GTP message to update the locally stored restart counterof the data gateway.

If the interface protocol between the data gateway and the servinggateway is the PMIP, the serving gateway may detect reset and restart ofthe data gateway through the count value of a restart counter carried ina received heartbeat response message and the count value of a restartcounter of the data gateway in the serving gateway. In addition, if theserving gateway detects reset and restart of the data gateway, theserving gateway should use the count value of the restart countercarried in the heartbeat response message to update the locally storedrestart counter of the data gateway.

S510: The serving gateway sends a deletion request message to the accessnode, where the deletion request message carries an identifier of thedate gateway and an identifier of the serving gateway. The identifier ofthe date gateway and the identifier of the serving gateway may both beIP address or non IP address identifiers, and a non IP addressidentifier can still uniquely identify a node.

In the case that the interface protocol between the serving gateway andthe access node is the GTP, the deletion request message sent by theserving gateway may be a delete bearer request message, a delete PDNconnection set request message or a delete session request message. Inthe case that the interface protocol between the serving gateway and theaccess node is the PMIP, the deletion request message sent by theserving gateway may be a binding revocation indication message.

S520: After receiving the deletion request message sent by the servinggateway, the access node deletes PDN connection context information,BULE, UE context information or PDP context information corresponding tothe identifier of the date gateway and the identifier of the servinggateway. For example, the access node uses the identifier of the dategateway and the identifier of the serving gateway carried in thedeletion request message to search in PDN connection contextinformation, BULE, UE context or PDP context information, so as toobtain PDN connection context information, BULE, UE context or PDPcontext corresponding to the identifier of the date gateway and theidentifier of the serving gateway carried in the message, and the accessnode deletes the found PDN connection context information, BULE, UEcontext or PDP context information corresponding to the identifier ofthe date gateway and the identifier of the serving gateway. The accessnode returns a deletion response message to the serving gateway, wherethe deletion response message carries a cause value, and the cause valuecarried in the deletion response message may indicate whether the accessnode successfully deletes the PDN connection context information, BULE,UE context or PDP context information associated with the data gatewayand the serving gateway.

In the case that the interface protocol between the access node and theserving gateway is the GTP, corresponding to the deletion requestmessage sent by the serving gateway, the deletion response message sentby the access node may be a delete bearer response message, a delete PDNconnection set response message or a delete session response message. Inthe case that the interface protocol between the access node and theserving gateway is the PMIP, corresponding to the deletion requestmessage sent by the serving gateway, the deletion response message sentby the access node may be a binding revocation acknowledgement message.

Likewise, Embodiment 5 is described with an example of deleting PDNconnection context information, BULE, UE context or PDP context, and ifit needs to set PDN connection context information, BULE, UE context orPDP context be invalid, rather than delete PDN connection contextinformation, BULE, UE context or PDP context, it only needs to replacethe deletion operation in this embodiment with an invalidationoperation. The invalidation operation is, for example, setting aninvalid identifier for PDN connection context information, BULE, UEcontext information or PDP context information.

It should be noted that, if in Embodiment 5, the access node isconnected to the data gateway through a plurality of serving gateways,for example, the access node is connected to the data gateway through aserving gateway 1, and the access node is also connected to the datagateway through a serving gateway 2, each serving gateway connected tothe data gateway sends a deletion request message to the access nodeafter the data gateway is reset, so that the access node may delete allcontext information stored therein and associated with the data gatewayor set all context information stored therein and associated with thedata gateway be invalid.

Embodiment 6: Method for handling a fault of a path between a servinggateway and an access node or unreachability of the access node. In thisembodiment, an access node (that is, a first node) may include an MME,an SGSN, an A-GW or an ePDG, a serving gateway (that is, an intermediatenode) may include an SGW, an MAG or an FA, and a data gateway (that is,a remote node) may include a PGW, an LMA or an HA.

The process of the method of Embodiment 6 is shown in FIG. 6.

S600: The serving gateway detects that a path between the servinggateway and the access node is faulty or that the access node isunreachable.

Specifically, if the interface protocol between the access node and theserving gateway is the GTP, the serving gateway may send an echo requestmessage, and detect that a path between the serving gateway and theaccess node is faulty according to a received echo response message. Forexample, if the serving gateway does not receive an echo responsemessage sent by the access node within the last message retransmissiontime, the serving gateway detects that the path between the servinggateway and the access node is faulty.

If the interface protocol between the access node and the servinggateway is the PMIP, the serving gateway may send a heartbeat requestmessage, and detect that the access node is unreachable according to areceived heartbeat response message. For example, if the number ofheartbeat response messages not received by the serving gateway exceedsa pre-configured maximum allowable number of missing heartbeat messages,the serving gateway detects that the access node is unreachable.

S610: The serving gateway sends a deletion request message to the datagateway, where the deletion request message carries an access node IPaddress and an identifier of the serving gateway. The identifier of theserving gateway may be an IP address or non IP address identifier of theserving gateway, and the non IP address identifier of the servinggateway can still uniquely identify the serving gateway.

In the case that the interface protocol between the serving gateway andthe data gateway is the GTP, the deletion request message sent by theserving gateway may be a delete bearer request message, a delete PDNconnection set request message or a delete session request message. Inthe case that the interface protocol between the serving gateway and thedata gateway is the PMIP, the deletion request message sent by theserving gateway may be a binding revocation indication message.

It should be noted that, if a Fully qualified PDN Connection SetIdentifier (fully qualified PDN connection set identifier, FQ-CSID)assigned by the access node in PDN connection context information, UEcontext information, BCE or BULE in the serving gateway includes theaccess node IP address, the serving gateway carries the access node IPaddress in the deletion request message.

S620: After receiving the deletion request message sent by the servinggateway, the data gateway deletes context information corresponding tothe access node IP address and the identifier of the serving gateway,for example, the data gateway uses the access node IP address and theidentifier of the serving gateway carried in the deletion requestmessage to search in PDN connection context information or BCE, so as toobtain PDN connection context information or BCE corresponding to theaccess node IP address and the identifier of the serving gateway carriedin the message, and the data gateway deletes the found PDN connectioncontext information or BCE corresponding to the access node IP addressand the identifier of the serving gateway. The data gateway returns adeletion response message to the serving gateway, where the deletionresponse message carries a cause value, and the cause value carried inthe deletion response message may indicate whether the data gatewaysuccessfully deletes the PDN connection context information or BCEassociated with the access node and the serving gateway.

In the case that the interface protocol between the data gateway and theserving gateway is the GTP, corresponding to the deletion requestmessage sent by the serving gateway, the deletion response message sentby the data gateway may be a delete bearer response message, a deletePDN connection set response message or a delete session responsemessage. In the case that the interface protocol between the datagateway and the serving gateway is the PMIP, corresponding to thedeletion request message sent by the serving gateway, the deletionresponse message sent by the data gateway may be a binding revocationacknowledgement message.

In addition, Embodiment 6 is described with an example of deleting PDNconnection context information or BCE, and if it needs to set PDNconnection context information or BCE be invalid, rather than delete PDNconnection context information or BCE, it only needs to replace thedeletion operation in this embodiment with an invalidation operation.The invalidation operation is, for example, setting an invalididentifier for PDN connection context information or BCE.

Embodiment 7: Method for handling a fault of a path between a servinggateway and a data gateway or unreachability of the data gateway. Inthis embodiment, a data gateway (that is, a first node) may include aPGW, an LMA or an HA, a serving gateway (that is, an intermediate node)may include an SGW, an MAG or an FA, and an access node (that is, aremote node) may include an MME, an SGSN, an A-GW or an ePDG.

The process of the method of Embodiment 7 is shown in FIG. 7.

S700: The serving gateway detects that a path between the servinggateway and the data gateway is faulty or that the data gateway isunreachable.

Specifically, if the interface protocol between the data gateway and theserving gateway is the GTP, the serving gateway may send an echo requestmessage, and detect that a path between the serving gateway and the datagateway is faulty according to a received echo response message. Forexample, if the serving gateway does not receive an echo responsemessage sent by the data gateway within the last message retransmissiontime, the serving gateway detects that the path between the servinggateway and the data gateway is faulty.

If the interface protocol between the data gateway and the servinggateway is the PMIP, the serving gateway may send a heartbeat requestmessage, and detect that the data gateway is unreachable according to areceived heartbeat response message. For example, if the number ofheartbeat response messages not received by the serving gateway exceedsa pre-configured maximum allowable number of missing heartbeat messages,the serving gateway detects that the data gateway is unreachable.

S710: The serving gateway sends a deletion request message to the accessnode, where the deletion request message carries a data gateway IPaddress and an identifier of the serving gateway. The identifier of theserving gateway may be an IP address or non IP address identifier of theserving gateway, and the non IP address identifier of the servinggateway can still uniquely identify the serving gateway.

In the case that the interface protocol between the serving gateway andthe access node is the GTP, the deletion request message sent by theserving gateway may be a delete bearer request message, a delete PDNconnection set request message or a delete session request message. Inthe case that the interface protocol between the serving gateway and theaccess node is the PMIP, the deletion request message sent by theserving gateway may be a binding revocation indication message.

S720: After receiving the deletion request message sent by the servinggateway, the access node deletes context information corresponding tothe identifier of the serving gateway and the data gateway IP address,for example, the access node uses the data gateway IP address and theidentifier of the serving gateway carried in the deletion requestmessage to search in stored PDN connection context information, BULE,PDP context information or UE context information, so as to obtain PDNconnection context information, BULE, PDP context information or UEcontext information corresponding to the data gateway IP address and theidentifier of the serving gateway carried in the message, and the accessnode deletes the found PDN connection context information, BULE, PDPcontext information or UE context information corresponding to the datagateway IP address and the identifier of the serving gateway. The accessnode returns a deletion response message to the serving gateway, wherethe deletion response message carries a cause value, and the cause valuecarried in the deletion response message may indicate whether the accessnode successfully deletes the PDN connection context information, BULE,PDP context information or UE context information associated with thedata gateway and the serving gateway.

In the case that the interface protocol between the access node and theserving gateway is the GTP, corresponding to the deletion requestmessage sent by the serving gateway, the deletion response message sentby the access node may be a delete bearer response message, a delete PDNconnection set response message or a delete session response message. Inthe case that the interface protocol between the access node and theserving gateway is the PMIP, corresponding to the deletion requestmessage sent by the serving gateway, the deletion response message sentby the access node may be a binding revocation acknowledgement message.

In addition, Embodiment 7 is described with an example of deleting PDNconnection context information, BULE, PDP context information or UEcontext information in the access node, and if it needs to set PDNconnection context information, BULE, PDP context information or UEcontext information in the access node be invalid, rather than deletePDN connection context information, PDP context information, UE contextinformation or BULE, it only needs to replace the deletion operation inthis embodiment with an invalidation operation. The invalidationoperation is, for example, setting an invalid identifier for PDNconnection context information, BULE, PDP context information or UEcontext information.

Embodiment 8: Method for handling a fault of a path between a servinggateway and an access node or unreachability of the access node. In thisembodiment, an access node (that is, a first node) may include an MME,an SGSN, an A-GW or an ePDG, a serving gateway (that is, an intermediatenode) may include an SGW, an MAG or an FA, and a data gateway (that is,a remote node) may include a PGW, an LMA or an HA.

The process of the method of Embodiment 8 is shown in FIG. 8.

S800: The serving gateway detects that a path between the servinggateway and the access node is faulty or that the access node isunreachable.

Specifically, if the interface protocol between the access node and theserving gateway is the GTP, the serving gateway may send an echo requestmessage, and detect that a path between the serving gateway and theaccess node is faulty according to a received echo response message. Forexample, if the serving gateway does not receive an echo responsemessage sent by the access node within the last message retransmissiontime, the serving gateway detects that the path between the servinggateway and the access node is faulty.

If the interface protocol between the access node and the servinggateway is the PMIP, the serving gateway may send a heartbeat requestmessage, and detect that the access node is unreachable according to areceived heartbeat response message. For example, if the number ofheartbeat response messages not received by the serving gateway exceedsa pre-configured maximum allowable number of missing heartbeat messages,the serving gateway detects that the access node is unreachable.

S810: The serving gateway obtains a first match word through a CSID ofthe access node in PDN connection context information, UE contextinformation or BCE corresponding to the access node and a CSID mask ofthe access node in the serving gateway, for example, the serving gatewayobtains the first match word by performing the AND operation of the CSIDmask of the access node and the CSID of the access node, and the servinggateway carries an identifier of the access node, an identifier of theserving gateway, the CSID mask of the access node and the first matchword in a deletion request message, and sends the deletion requestmessage to the data gateway. The identifier of the access node carriedin the deletion request message is a non IP address identifier of theaccess node. The identifier of the serving gateway carried in thedeletion request message may be an IP address or non IP addressidentifier of the serving gateway, and the non IP address identifier ofthe serving gateway can still uniquely identify the serving gateway.

In the case that the interface protocol between the serving gateway andthe data gateway is the GTP, the deletion request message sent by theserving gateway may be a delete bearer request message, a delete PDNconnection set request message or a delete session request message. Inthe case that the interface protocol between the serving gateway and thedata gateway is the PMIP, the deletion request message sent by theserving gateway may be a binding revocation indication message.

S820: After receiving the deletion request message sent by the servinggateway, the data gateway obtains a second match word through a CSID ofthe access node and the CSID mask of the access node, in which the CSIDof the access node is included in PDN connection context information orBCE corresponding to the identifier of the access node and theidentifier of the serving gateway carried in the message, and the CSIDmask of the access node is carried in the deletion request message, forexample, the data gateway obtains the second match word by performingthe AND operation of the CSID mask of the access node and the CSID ofthe access node. The data gateway deletes the PDN connection contextinformation or BCE with the first match word and the second match wordbeing the same.

Then, the data gateway returns a deletion response message to theserving gateway, where the deletion response message carries a causevalue, and the cause value carried in the deletion response message mayindicate whether the data gateway successfully deletes the PDNconnection context information or BCE associated with the access nodeand the serving gateway.

In the case that the interface protocol between the data gateway and theserving gateway is the GTP, corresponding to the deletion requestmessage sent by the serving gateway, the deletion response message sentby the data gateway may be a delete bearer response message, a deletePDN connection set response message or a delete session responsemessage. In the case that the interface protocol between the datagateway and the serving gateway is the PMIP, corresponding to thedeletion request message sent by the serving gateway, the deletionresponse message sent by the data gateway may be a binding revocationacknowledgement message.

In addition, Embodiment 8 is described with an example of deleting PDNconnection context information or BCE in the data gateway, and if itneeds to set PDN connection context information or BCE in the datagateway be invalid, rather than delete PDN connection contextinformation or BCE, it only needs to replace the deletion operation inthis embodiment with an invalidation operation. The invalidationoperation is, for example, setting an invalid identifier for PDNconnection context information or BCE.

Embodiment 9: Method for handling a fault of a path between a servinggateway and a data gateway or unreachability of the data gateway. Inthis embodiment, a data gateway (that is, a first node) may include aPGW, an LMA or an HA, a serving gateway (that is, an intermediate node)may include an SGW, an MAG or an FA, and an access node (that is, aremote node) may include an MME, an SGSN, an A-GW or an ePDG.

The process of the method of Embodiment 9 is shown in FIG. 9.

S900: The serving gateway detects that a path between the servinggateway and the data gateway is faulty or that the data gateway isunreachable.

Specifically, if the interface protocol between the data gateway and theserving gateway is the GTP, the serving gateway may send an echo requestmessage, and detect that a path between the serving gateway and the datagateway is faulty according to a received echo response message. Forexample, if the serving gateway does not receive an echo responsemessage sent by the data gateway within the last message retransmissiontime, the serving gateway detects that the path between the servinggateway and the data gateway is faulty.

If the interface protocol between the data gateway and the servinggateway is the PMIP, the serving gateway may send a heartbeat requestmessage, and detect that the data gateway is unreachable according to areceived heartbeat response message. For example, if the number ofheartbeat response messages not received by the serving gateway exceedsa pre-configured maximum allowable number of missing heartbeat messages,the serving gateway detects that the data gateway is unreachable.

S910: The serving gateway obtains a first match word through a CSID ofthe data gateway included in PDN connection context information, UEcontext information, BCE or BULE corresponding to the data gateway and aCSID mask of the data gateway in the serving gateway, for example, theserving gateway obtains the first match word by performing the ANDoperation of the CSID mask of the data gateway and the CSID of the datagateway, and the serving gateway carries an identifier of the dategateway, an identifier of the serving gateway, the CSID mask of the datagateway and the first match word in a deletion request message, andsends the deletion request message to the access node. The identifier ofthe date gateway carried in the deletion request message is a non IPaddress identifier of an access node. The identifier of the servinggateway carried in the deletion request message may be an IP address ornon IP address identifier of the serving gateway, and the non IP addressidentifier of the serving gateway can still uniquely identify theserving gateway.

In the case that the interface protocol between the serving gateway andthe access node is the GTP, the deletion request message sent by theserving gateway may be a delete bearer request message, a delete PDNconnection set request message or a delete session request message. Inthe case that the interface protocol between the serving gateway and theaccess node is the PMIP, the deletion request message sent by theserving gateway may be a binding revocation indication message.

S920: After receiving the deletion request message sent by the servinggateway, the access node obtains a second match word, through a CSID ofthe data gateway and the CSID mask of the data gateway, which the CSIDof the data gateway is included in PDN connection context information,BULE, PDP context information or UE context information corresponding tothe identifier of the date gateway and the identifier of the servinggateway carried in the message, and the CSID mask of the data gateway iscarried in the deletion request message, for example, the access nodeobtains the second match word by performing the AND operation of theCSID mask of the data gateway and the CSID of the data gateway. Theaccess node deletes the PDN connection context information, BULE, PDPcontext information or UE context information with the first match wordand the second match word being the same.

Then, the access node returns a deletion response message to the servinggateway, where the deletion response message carries a cause value, andthe cause value carried in the deletion response message may indicatewhether the access node successfully deletes the PDN connection contextinformation, BULE, PDP context information or UE context informationassociated with the data gateway and the serving gateway.

In the case that the interface protocol between the access node and theserving gateway is the GTP, corresponding to the deletion requestmessage sent by the serving gateway, the deletion response message sentby the access node may be a delete bearer response message, a delete PDNconnection set response message or a delete session response message. Inthe case that the interface protocol between the access node and theserving gateway is the PMIP, corresponding to the deletion requestmessage sent by the serving gateway, the deletion response message sentby the access node may be a binding revocation acknowledgement message.

In addition, Embodiment 9 is described with an example where the accessnode deletes PDN connection context information, BULE, PDP contextinformation or UE context information, and if the access node needs toset PDN connection context information, BULE, PDP context information orUE context information be invalid, rather than delete PDN connectioncontext information, BULE, PDP context information or UE contextinformation, it only needs to replace the deletion operation in thisembodiment with an invalidation operation. The invalidation operationis, for example, setting an invalid identifier for PDN connectioncontext information, BULE, PDP context information or UE contextinformation.

In the embodiments involving CSID masks described above, theintermediate node needs to store a CSID mask of the first node, theintermediate node may store the CSID mask of the first node in a messagesent by the first node in a process of initial communication with thefirst node, that is, the first node sends the CSID mask of the firstnode to the intermediate node through a message in a process of initialcommunication with the intermediate node. Specific examples of theprocess of storing the CSID mask of the first node by the intermediatenode may be as described in the following embodiments.

Embodiment 10: Method for storing a CSID mask of the access node by aserving gateway. The method is shown in FIG. 10.

In FIG. 10, S1000: When an access node communicates with a servinggateway for the first time, the access node carries a CSID mask of theaccess node in an initial message, and sends the initial message to theserving gateway.

S1010: The serving gateway receives the initial message, stores the CSIDmask of the access node carried in the initial message, and sends atrigger message to the access node.

Embodiment 11: Method for storing a CSID mask of the access node by aserving gateway. The process of the method is shown in FIG. 11.

In FIG. 11, S1100: A serving gateway sends an initial message to anaccess node.

S 1110: If the access node communicates with the serving gateway for thefirst time, the access node carries a CSID mask of the access node in atrigger message, and sends the trigger message to the serving gateway.The serving gateway receives the trigger message, and the servinggateway stores the CSID mask of the access node carried in the triggermessage.

In Embodiments 10 and 11, if the interface protocol between the accessnode and the serving gateway is the GTP, the initial message may includean echo request message, a Create Bearer Request (create bearerrequest), a Create Session Request (create session request) message, ora Command (command) type message. Correspondingly, the trigger messagemay include an echo response message, a Create Bearer Response (createbearer response) or a Create Session Response (create session response)message. If the interface protocol between the access node and theserving gateway is the PMIP, the initial message may include a ProxyBinding Update (proxy binding update, PBU) message or a heartbeatrequest message. Correspondingly, the trigger message may include aProxy Binding Acknowledgement (proxy binding acknowledgement, PBA) or aheartbeat response message.

Embodiment 12: Method for storing a CSID mask of the data gateway by aserving gateway. The process of the method is shown in FIG. 12.

In FIG. 12, S1200: When a data gateway communicates with a servinggateway for the first time, the data gateway carries a CSID mask of thedata gateway in an initial message, and sends the initial message to theserving gateway.

S1210: The serving gateway receives the initial message, stores the CSIDmask of the data gateway carried in the initial message, and sends atrigger message to the data gateway.

Embodiment 13: Method for storing a CSID mask of the data gateway by aserving gateway. The method is shown in FIG. 13.

In FIG. 13, S1300: A serving gateway sends an initial message to a datagateway.

S1310: If the data gateway communicates with the serving gateway for thefirst time, the data gateway carries a CSID mask of the data gateway ina trigger message, and sends the trigger message to the serving gateway.The serving gateway receives the trigger message, and the servinggateway stores the CSID mask of the data gateway carried in the triggermessage.

In Embodiments 12 and 13, if the interface protocol between the datagateway and the serving gateway is the GTP, the initial message mayinclude an echo request message, a Create Bearer Request (create bearerrequest), a Create Session Request (create session request) message, ora Command (command) type message. Correspondingly, the trigger messagemay include an echo response message, a Create Bearer Response (createbearer response) message or a Create Session Response (create sessionresponse). If the interface protocol between the data gateway and theserving gateway is the PMIP, the initial message may include a ProxyBinding Update (proxy binding update, PBU) message or a heartbeatrequest message. Correspondingly, the trigger message may include aProxy Binding Acknowledgement (proxy binding acknowledgement, PBA) or aheartbeat response message.

Embodiment 14: Apparatus for handling node failure. The apparatus may bean intermediate node, and the intermediate node may be a network elementin a next generation mobile communication network, or a network elementin an IP network. The intermediate node may include a serving gateway, amobile access gateway or an FA. The intermediate node is respectivelyconnected to a first node and a remote node, that is, the first node andthe remote node performs information interaction through theintermediate node. In the case that the first node includes a mobilitymanagement entity, a GPRS service support node, an A-GW or an evolvedpacket data gateway, the remote node may include a packet data networkgateway, a local mobility anchor or an HA; in the case that the firstnode includes a packet data network gateway, a local mobility anchor oran HA, the remote node may include a mobility management entity, a GPRSservice support node, an A-GW or an evolved packet data gateway. Thestructure of the apparatus in this embodiment is shown in FIG. 14.

The apparatus for handling node failure shown in FIG. 14 includes adetection module 1400 and a first processing module 1410. Optionally,the apparatus may further include a CSID mask obtaining module 1420.

The detection module 1400 is configured to detect that the first nodeoccurs a failure. Here, the failure of the first node represents thataccess to the first node is abnormal, and the failure of the first nodemay be caused by an anomaly of the first node, or an abnormal connectionbetween the intermediate node and the first node. Here, the failure ofthe first node may include the following: the first node is reset, apath between the intermediate node and the first node is faulty, or thefirst node is unreachable. In an actual network, the failure of thefirst node may also include other cases except the above three cases,and this embodiment does not limit the specific case included by thefailure of the first node.

The detection module 1400 may detect that the first node occurs afailure by adopting existing modes, and the mode of detecting by thedetection module 1400 that the first node occurs a failure varies withdifferent networks, for example, the failure of the first node isdetected through restart counters, echo messages or heartbeat messagesdescribed in the above embodiments. This embodiment does not limit thespecific implementation process of detecting by the detection module1400 that the first node occurs a failure.

The first processing module 1410 is configured to send a contextprocessing request message to the remote node, where the contextprocessing request message is used to instruct the remote node to deletecontext information associated with the first node and the intermediatenode or set the context information associated with the first node andthe intermediate node be invalid. The context processing request messagesent by the first processing module 1410 to the remote node carriesdeletion/invalidation location information, and thedeletion/invalidation location information is used by the remote node todelete context information corresponding to the deletion/invalidationlocation information or set the context information corresponding to thedeletion/invalidation location information.

The deletion/invalidation location information may include an identifierof the first node and an identifier of the intermediate node. That is,the first processing module 1410 carries an identifier of the first nodeand an identifier of the intermediate node in the context processingrequest message, and sends the context processing request message to theremote node, and after receiving the context processing request message,the remote node deletes context information corresponding to theidentifier of the first node and the identifier of the intermediatenode, or sets the context information corresponding to the identifier ofthe first node and the identifier of the intermediate node be invalid,for example, the remote node searches stored context information forcontext information matching the identifier of the first node and theidentifier of the intermediate node carried in the message, and deletesthe found matching context information or sets the found matchingcontext information be invalid. Here, the identifier of the first nodeand the identifier of the intermediate node may be IP addressidentifiers, or non IP address identifiers.

The deletion/invalidation location information may also include anidentifier of the first node, an identifier of the intermediate node, aCSID mask of the first node and a first match word. At this time, thefirst processing module 1410 may include a match word sub-module 1411and a sending sub-module 1412.

The match word sub-module 1411 is configured to obtain a first matchword according to a first node packet data network connection setidentifier CSID mask and a CSID of the first node in the contextinformation associated with the first node, where the first match wordis used to be compared with a match word obtained by the remote nodeaccording to the CSID mask of the first node in the context processingrequest message and a CSID of the first node in context information, inwhich the context information is stored in the remote node andcorresponds to the identifier of the first node information and theidentifier of the intermediate node information, so that the remote nodedetermines that context information with the comparison result beingthat the match words are the same needs to be deleted or set be invalid.That is, the match word sub-module 1411 obtains the first match wordaccording to the CSID mask of the first node and the CSID of the firstnode in the context information, for example, obtains the first matchword through calculation according to the CSID mask of the first nodeand the CSID of the first node, and then, the match word sub-module 1411carries the identifier of the first node, the identifier of theintermediate node, the CSID mask of the first node and the first matchword in the context processing request message, and sends the contextprocessing request message to the remote node. After receiving thecontext processing request message, the remote node obtains a secondmatch word through a CSID mask of the first node carried in the messageand a CSID of the first node in context information, in which thecontext information corresponds to the identifier of the first node andthe identifier of the intermediate node carried in the message, and theremote node deletes the context information with the first match wordand the second match word being the same or sets the context informationwith the first match word and the second match word being the same beinvalid. It should be noted that, the way for the match word sub-module1411 to obtain the first match word should be the same as the way forthe remote node to obtain the second match word. In addition, the CSIDmask of the first node in the intermediate node may be a CSID mask ofthe first node obtained by the CSID mask obtaining module 1420.

The sending sub-module 1412 is configured to carry the identifier of thefirst node, the identifier of the intermediate node, the CSID mask ofthe first node and the first match word obtained by the match wordsub-module 1411 in the context processing request message, and send thecontext processing request message to the remote node.

It should be noted that, the first processing module 1410 may alsodelete the context information associated with the first node in theintermediate node or set the context information associated with thefirst node in the intermediate node be invalid. For example, the firstprocessing module 1410 uses the identifier of the first node to searchin stored context information, and deletes the found contextinformation. The first processing module 1410 may perform the abovedeletion or invalidation operation after sending the context processingrequest message to the remote node, or perform the above deletion orinvalidation operation after the intermediate node receives a contextprocessing response message of the remote node.

The CSID mask obtaining module 1420 is configured to store the CSID maskof the first node carried in a message sent by the first node in aprocess of initial communication between the intermediate node and thefirst node. For example, the CSID mask obtaining module 1420 stores theCSID mask of the first node carried in an initial message or a triggermessage received by the apparatus. The details are as described above inEmbodiments 10 to 13, and will not be described herein again.

In Embodiment 14, when the detection module 1400 detects that the firstnode occurs a failure, the first processing module 1410 s ends thecontext processing request message to the remote node, so that theremote node may delete the context information associated with the firstnode and the intermediate node or set the context information associatedwith the first node and the intermediate node be invalid, so as toprevent the case that, if the first node occurs a failure, the remotenode still uses the stored context information associated with the firstnode and the intermediate node as valid context information, and furtherprevent the case that the remote node maintains a large amount ofcontext information associated with the first node and the intermediatenode, thereby eliminating the potential risk to the network caused byinconsistency of context information in the remote node and theintermediate node and first node, and improving the stability of thenetwork.

Embodiment 15: Apparatus for handling node failure. The apparatus may bea remote node, and the remote node may be a network element in a nextgeneration mobile communication network, or a network element in an IPnetwork. In the case that the first node includes a mobility managemententity, a GPRS service support node, an A-GW or an evolved packet datagateway, the remote node may include a packet data network gateway, alocal mobility anchor or an HA; in the case that the first node includesa packet data network gateway, a local mobility anchor or an HA, theremote node may include a mobility management entity, a GPRS servicesupport node, an A-GW or an evolved packet data gateway.

The apparatus for handling node failure shown in FIG. 15 includes areceiving module 1500 and a second processing module 1510.

The receiving module 1500 is configured to receive a context processingrequest message sent by an intermediate node, where the contextprocessing request message is a message sent by the intermediate nodewhen the intermediate node detects that a first node occurs a failure,where the failure of the first node includes the following: the firstnode is reset, a path between the intermediate node and the first nodeis faulty, or the first node is unreachable.

The context processing request message received by the receiving module1500 carries deletion/invalidation location information, and the secondprocessing module 1510 in the remote node may delete correspondingcontext information or set the corresponding context information beinvalid, according to the deletion/invalidation location informationcarried in the message. The deletion/invalidation location informationmay include an identifier of the first node and an identifier of theintermediate node.

The second processing module 1510 is configured to delete contextinformation associated with the first node and the second node in theremote node or set the context information associated with the firstnode and the second node in the remote node be invalid, according to theidentifier of the first node and the identifier of the intermediate nodecarried in the context processing request message received by thereceiving module 1500. The context information in the remote node may beembodied in different forms, and the details are as described in theabove embodiments, and will not be described herein again. In addition,the second processing module 1510 may further return a contextprocessing response message to the intermediate node, so as to notifythe intermediate node whether the context information associated withthe first node and the intermediate node is successfully deleted or setbe invalid.

In the case that the deletion/invalidation location information includesan identifier of the first node, an identifier of the intermediate node,a CSID mask of the first node and a first match word, the secondprocessing module 1510 may include a comparison sub-module 1511 and aprocessing sub-module 1512.

The comparison sub-module 1511 is configured to perform match wordcomparison, where the match word comparison includes: obtaining a secondmatch word according to a CSID of the first node in context informationthat is stored in the remote node and corresponds to the identifier ofthe first node and the identifier of the intermediate node, and the CSIDmask of the first node in the message, and comparing the obtained secondmatch word with the first match word in the message.

The processing sub-module 1512 is configured to delete the contextinformation with the first match word and the second match word beingthe same or set the context information with the first match word andthe second match word being the same be invalid.

For example, the comparison sub-module 1511 searches the contextinformation stored by the remote node for the context informationcorresponding to the identifier of the first node and the identifier ofthe intermediate node carried in the context processing request message,and obtains a second match word through calculation according to a CSIDof the first node in the found context information and the CSID mask ofthe first node carried in the context processing request message; thecomparison sub-module 1511 compares the second match word obtainedthrough calculation with the first match word carried in the contextprocessing request message, and if the first match word and the secondmatch word are the same, the processing sub-module 1512 deletes thecontext information found by the comparison sub-module 1511 or sets thecontext information found by the comparison sub-module 1511 be invalid;otherwise, the processing sub-module 1512 does not delete the contextinformation found by the comparison sub-module 1511 or set the contextinformation found by the comparison sub-module 1511 be invalid. Itshould be noted that, the comparison sub-module 1511 finds a pluralityof pieces of context information, the comparison sub-module 1511 and theprocessing sub-module 1512 should perform, for each piece of contextinformation, the process of obtaining the match word and performing acorresponding operation according to the comparison result.

In Embodiment 15, after the receiving module 1500 receives the contextprocessing request message sent by the intermediate node when detectingthat the first node occurs a failure, the second processing module 1510may delete the context information associated with the first node or setthe context information associated with the first node be invalid, so asto prevent the case that, if the first node occurs a failure, the remotenode still uses the stored context information associated with the firstnode and the intermediate node as valid context information, and furtherprevent the case that the remote node maintains a large amount ofcontext information associated with the first node and the intermediatenode, thereby eliminating the potential risk to the network caused byinconsistency of context information in the remote node, the first node,and intermediate node, and improving the stability of the network.

Embodiment 16: System for handling node failure. The structure of thesystem is shown in FIG. 16.

The system in FIG. 16 includes a first node 1600, an intermediate node1610 and a remote node 1620. It should be noted that, although FIG. 16shows that the numbers of the first node 1600 and the remote node 1620connected to the first node 1610 are both 1, yet in an actual network, aplurality of first nodes 1600 may be connected to the intermediate node1610, and a plurality of remote nodes 1620 may be connected to theintermediate node 1610.

The first node 1600 is connected to the remote node 1620 through theintermediate node 1610. The first node 1600 may send a message carryinga CSID mask of the first node to the intermediate node 1610. The messagemay be an initial message or a trigger message.

The intermediate node 1610 is configured to detect that the first nodeoccurs a failure, and send a context processing request message carryingan identifier of the first node and an identifier of the intermediatenode to the remote node 1620, where the failure of the first nodeincludes the following: the first node is reset, a path between theintermediate node and the first node is faulty, or the first node isunreachable; and the context processing request message is used forrequesting the remote node to delete context information associated withthe first node and the second node or set the context informationassociated with the first node and the second node be invalid. Thecontext processing request message sent by the intermediate node 1610 tothe remote node 1620 may further carry a CSID mask of the first node anda first match word. The intermediate node 1610 may store the CSID maskof the first node carried in a message (for example, an initial messageor a trigger message) transmitted from the first node 1600 in a processof initial communication with the first node 1600.

The intermediate node 1610 may further delete context information or setthe context information be invalid which the context information is inthe intermediate node 1610 and associated with the first node 1600 whendetecting that the first node 1600 occurs a failure. The intermediatenode 1610 may delete the context information or set the contextinformation be invalid wherein the context information is in theintermediate node 1610 and associated with the first node 1600 aftersending the context processing request message to the remote node 1620.The intermediate node 1610 may also delete the context information orset the context information be invalid wherein the context informationis in the intermediate node 1610 and associated with the first node 1600after receiving a context processing response message sent by the remotenode 1620. The context information in the intermediate node 1610 may beembodied in different forms, and the details are as described in theabove embodiments, and will not be described herein again.

The remote node 1620 is configured to receive the context processingrequest message sent by the intermediate node 1610, and delete contextinformation associated with the first node and the intermediate node orset the context information associated with the first node and theintermediate node be invalid, according to the identifier of the firstnode and the identifier of the intermediate node carried in the message.Optionally, after performing the deletion or invalidation operation, theremote node 1620 may send a context processing response message to theintermediate node 1610, so as to notify the intermediate node 1610whether the context information associated with the first node and theintermediate node is successfully deleted or set be invalid. The contextinformation in the remote node 1620 may be embodied in different forms,and the details are as described in the above embodiments, and will notbe described herein again.

In a specific example, the remote node 1620 may search for correspondingcontext information according to an identifier of the first node and anidentifier of the intermediate node carried in the context processingrequest message, and directly delete the found context information orset the found context information be invalid. In the case that thecontext processing request message received by the remote node 1620carries the CSID mask of the first node and the first match word, theremote node 1620 obtains a second match word according to a CSID of thefirst node in context information in the remote node 1620 and the CSIDmask of the first node in the message, in which the context informationcorresponds to the identifier of the first node and the identifier ofthe intermediate node, and deletes the context information with thematch words being the same or sets the context information with thematch words being the same be invalid.

It should be noted that, if a plurality of pieces of context informationis associated with the identifier of the first node and the identifierof the intermediate node, the remote node 1620 performs, for each pieceof context information, the above process of obtaining the second matchword and deleting the context information with the match words being thesame or setting the context information with the match words being thesame be valid.

The structures of the intermediate node 1610 and the remote node 1620may be as described above in Embodiments 14 and 15, and the details willnot be described herein again.

In Embodiment 16, the intermediate node 1610 sends the contextprocessing request message to the remote node 1620 when detecting thatthe first node 1600 occurs a failure, so that the remote node 1620 maydelete the context information associated with the first node 1600 andthe intermediate node 1610 or set the context information associatedwith the first node 1600 and the intermediate node 1610 be invalid, soas to prevent the case that, if the first node 1600 occurs a failure,the remote node 1620 still uses the stored context informationassociated with the first node 1600 and the intermediate node 1610 asvalid context information, and further prevent the case that the remotenode 1620 maintains a large amount of context information associatedwith the first node 1600 and the intermediate node 1610, therebyeliminating the potential risk to the network caused by inconsistency ofcontext information in the remote node 1620 and the first node 1600 andintermediate node 1610, and improving the stability of the network.

Through the above description of the embodiments, it is clear to personsskilled in the art that the present invention may be accomplishedthrough software plus a necessary hardware platform, or definitely mayalso be accomplished through hardware only, but in most cases, thepresent invention is preferably implemented through the former method.Based on this, all or part of the technical solutions of the presentinvention that make contributions to the prior art may be embodied inthe form of a software product. The software product may be configuredto execute the processes of the methods described above. The computersoftware product may be stored in a storage medium, for example, aROM/RAM, a magnetic disk or an optical disk, and contain severalinstructions to instruct a computer device (for example, a personalcomputer, a server, or a network device) to perform the method describedin the embodiments of the present invention or in some parts of theembodiments.

Although the present invention has been described through embodiments,it is known to persons skilled in the art that various modifications andvariations can be made without departing from the spirit of the presentinvention, and it is intended that the appended claims of the presentinvention cover such modifications and variations.

1. A method for handling node failure, comprising: detecting, by anintermediate node, that a first node occurs a failure, wherein thefailure of the first node comprises: the first node is reset, a pathbetween the intermediate node and the first node is faulty, or the firstnode is unreachable; and sending, by the intermediate node, a contextprocessing request message carrying an identifier of the first node andan identifier of the intermediate node to a remote node, wherein thecontext processing request message is used to instruct the remote nodeto delete context information associated with the first node and theintermediate node or set the context information associated with thefirst node and the intermediate node be invalid.
 2. The method accordingto claim 1, wherein the context processing request message furthercomprises a packet data network connection set identifier (CSID) mask ofthe first node and a first match word; and the sending, by theintermediate node, the context processing request message carrying theidentifier of the first node and the identifier of the intermediate nodeto the remote node comprises: obtaining, by the intermediate node, thefirst match word according to the CSID mask of the first node and a CSIDof the first node in the context information associated with the firstnode; sending, by the intermediate node, the context processing requestmessage to the remote node, wherein the context processing requestmessage carries the identifier of the first node, the identifier of theintermediate node, the CSID mask of the first node and the first matchword; wherein the CSID mask of the first node is used by the remote nodeto obtain a second match word, according to the CSID of the first nodein context information and the CSID mask of the first node, wherein thecontext information corresponds to the identifier of the first node andthe identifier of the intermediate node in the context processingrequest message, so that the remote node deletes context informationwith the first match word and the second match word being the same orsets the context information with the first match word and the secondmatch word being the same be invalid.
 3. The method according to claim2, further comprising: obtaining and storing, by the intermediate node,the CSID mask of the first node from a message sent by the first node ina process of initial communication between the intermediate node and thefirst node.
 4. A method for handling node failure, comprising:receiving, by a remote node, a context processing request messagecarrying an identifier of a first node and an identifier of theintermediate node, wherein the context processing request message is amessage sent by the intermediate node when the intermediate node detectsthat the first node occurs a failure, wherein the failure of the firstnode includes the following: the first node is reset, a path between theintermediate node and the first node is faulty, or the first node isunreachable; and deleting context information associated with the firstnode and the intermediate node or setting the context informationassociated with the first node and the intermediate node be invalid, bythe remote node, according to the identifier of the first node and theidentifier of the intermediate node carried in the message.
 5. Themethod according to claim 4, wherein the context processing requestmessage further comprises a packet data network connection setidentifier CSID mask of the first node and a first match word; and thedeleting context information associated with the first node and theintermediate node or setting the context information associated with thefirst node and the intermediate node be invalid, by the remote node,according to the identifier of the first node and the identifier of theintermediate node carried in the message comprises: deleting contextinformation with match words being the same or setting the contextinformation with match words being the same be invalid, by the remotenode, according to the identifier of the first node, the identifier ofthe intermediate node, the CSID mask of the first node and the firstmatch word carried in the context processing request message, whereinthe match words being the same comprises the first match word in themessage and a second match word obtained by the remote node being thesame, and the second match word is obtained according to a CSID of thefirst node in context information, wherein the context information isassociated with the identifier of the first node and the identifier ofthe intermediate node, and the CSID mask of the first node in themessage.
 6. An apparatus for handling node failure, comprising: adetection module, configured to detect that a first node occurs afailure, wherein the failure of the first node comprises the following:the first node is reset, a path between the intermediate node and thefirst node is faulty, or the first node is unreachable; and a firstprocessing module, configured to send a context processing requestmessage carrying an identifier of the first node and an identifier ofthe intermediate node to a remote node, wherein the context processingrequest message is used to instruct the remote node to delete contextinformation associated with the first node and the intermediate node orset the context information associated with the first node and theintermediate node be invalid.
 7. The apparatus according to claim 6,wherein the first processing module comprises: a match word sub-module,configured to obtain a first match word according to a packet datanetwork connection set identifier CSID mask of the first node and a CSIDof the first node in the context information associated with the firstnode, wherein the CSID mask of the first node is used by the remote nodeto obtain a second match word according to the CSID of the first node incontext information and the CSID mask of the first node, wherein thecontext information corresponds to the identifier of the first node andthe identifier of the intermediate node in the context processingrequest message, so that the remote node deletes the context informationwith the first match word and the second match word being the same orsets the context information with the first match word and the secondmatch word being the same be invalid; and a sending sub-module,configured to send the context processing request message to the remotenode, wherein the context processing request message carries theidentifier of the first node, the identifier of the intermediate node,the CSID mask of the first node and the first match word.
 8. Theapparatus according to claim 7, further comprising: a CSID maskobtaining module, configured to obtain and store the CSID mask of thefirst node from a message sent by the first node in a process of initialcommunication between the intermediate node and the first node.
 9. Anapparatus for handling node failure, comprising: a receiving module,configured to receive a context processing request message carrying anidentifier of a first node and an identifier of the intermediate node,wherein the context processing request message is a message sent by theintermediate node when the intermediate node detects that the first nodeoccurs a failure, wherein the failure of the first node includes thefollowing: the first node is reset, a path between the intermediate nodeand the first node is faulty, or the first node is unreachable; and asecond processing module, configured to delete context informationassociated with the first node and the intermediate node or set thecontext information associated with the first node and the intermediatenode be invalid, according to the identifier of the first node and theidentifier of the intermediate node carried in the message.
 10. Theapparatus according to claim 9, wherein the context processing requestmessage further carries a CSID mask of the first node and a first matchword, and the second processing module comprises: a comparisonsub-module, configured to obtain a second match word according to a CSIDof the first node in context information and the CSID mask of the firstnode, wherein the context information corresponds to the identifier ofthe first node and the identifier of the intermediate node, and comparethe first match word and the second match word; and a processingsub-module, configured to delete the context information with the matchwords being the same or set the context information with the match wordsbeing the same be invalid.
 11. A system for handling node failure,comprising: a first node, connected to a remote node through anintermediate node; the intermediate node, configured to detect failureof the first node, and send a context processing request messagecarrying an identifier of the first node and an identifier of theintermediate node to the remote node, wherein the failure of the firstnode comprises the following: the first node is reset, a path betweenthe intermediate node and the first node is faulty, or the first node isunreachable; and the remote node, configured to receive the contextprocessing request message, and delete context information associatedwith the first node and the intermediate node or set context informationassociated with the first node and the intermediate node be invalid,according to the identifier of the first node and the identifier of theintermediate node carried in the message.
 12. A computer programproduct, comprising computer program code, which, when executed by acomputer unit, will cause the computer unit to perform all the steps ofclaim
 1. 13. A computer program product, comprising computer programcode, which, when executed by a computer unit, will cause the computerunit to perform all the steps of claim 4.