CN105103125B - The acquisition methods and NFV devices of clock interrupt signal - Google Patents

The acquisition methods and NFV devices of clock interrupt signal Download PDF

Info

Publication number
CN105103125B
CN105103125B CN201480000618.6A CN201480000618A CN105103125B CN 105103125 B CN105103125 B CN 105103125B CN 201480000618 A CN201480000618 A CN 201480000618A CN 105103125 B CN105103125 B CN 105103125B
Authority
CN
China
Prior art keywords
vnf
clock
address
hardware
nfvo
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201480000618.6A
Other languages
Chinese (zh)
Other versions
CN105103125A (en
Inventor
余芳
熊春山
朱雷
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Technologies Co Ltd
Original Assignee
Huawei Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co Ltd filed Critical Huawei Technologies Co Ltd
Publication of CN105103125A publication Critical patent/CN105103125A/en
Application granted granted Critical
Publication of CN105103125B publication Critical patent/CN105103125B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/46Multiprogramming arrangements
    • G06F9/48Program initiating; Program switching, e.g. by interrupt
    • G06F9/4806Task transfer initiation or dispatching
    • G06F9/4812Task transfer initiation or dispatching by interrupt, e.g. masked
    • G06F9/4825Interrupt from clock, e.g. time of day

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Synchronisation In Digital Transmission Systems (AREA)

Abstract

The present invention provides a kind of acquisition methods and NFV functional entitys of clock interrupt signal, including:NFV functional entitys are according to VNFD description informations, determine VNF tick interrupt accuracy requirement, then, NFV functional entitys are according to tick interrupt accuracy requirement, hardware clock address is determined for VNF, identified hardware clock address is finally sent to VNF, VNF can access hardware clock according to the hardware clock address of acquisition, and obtain clock interrupt signal.Client operating system software clock interrupt signal of the technical scheme without producing virtual machine by virtual machine call bottom hardware clock interrupt signal, software clock interrupt signal is supplied to clock signal transmission processes of the VNF for the scheduling of VNF configuration processors again, so as to avoid the delay of clock signal and delay jitter, the promptness that interrupt signal performs is ensure that, and ensures that program is dispatched in time.

Description

The acquisition methods and NFV devices of clock interrupt signal
Technical field
The present invention relates to the communication technology, more particularly to a kind of acquisition methods of clock interrupt signal and NFV functional entitys.
Background technology
With the data of intelligent terminal and support 3rd generation mobile communication technology (the 3rd-Generation, abbreviation 3G) The fast development of card/notebook computer, interior exponentially type increases in the past few years for mobile Internet business.Increasingly increase to deal with Long data traffic, operators propose network function virtualization (Network Functions Virtualization, letter Claim NFV) concept, NFV main design thought is that hardware platform use generic server, on server operation virtualize soft Part simultaneously generates virtual machine, and various network elements are operated among virtual machine in the form of software.Using this framework, operator will safeguard One unified virtual platform, and different network elements will be operated on virtual platform in the form of virtual machine, increase net newly The upgrading of member or network element is then presented as the importing of new virtual machine or the change of software version in virtual machine.It is simultaneously as virtual Change technology shields the difference of bottom physical platform, will be readily solved across the hardware resource sharing problem of producer.Also, utilize void The characteristics such as plan machine dynamic migration, dynamic generation, with reference to the intelligent management to virtual platform, net is realized according to the change of portfolio The dynamic capacity-expanding of member, capacity reducing, so as to realize the utilization more efficient to hardware resource.
In the prior art, in NFV virtual environment, clock interrupt signal caused by bottom hardware, it is desirable to provide to virtual Machine, virtualization network function (Virtualized Network are transferred to by virtual machine simulation softward clock interrupt signal Function, abbreviation VNF), and this process be able to can not ensure to be dispatched in time due to the software clock simulation program of virtual machine The clock signal for causing virtual network function to obtain postpones, so as to cause program not dispatched in time.Particularly with nothing Application much higher to real-time and clock accuracy requirement or network function, this delay meeting of clock signal in gauze network Processing of the network function to business is influenceed, reduces network performance.
The content of the invention
The embodiment of the present invention provides a kind of acquisition methods and NFV functional entitys of clock interrupt signal, has solved due to adjusting Delay and the delay jitter of caused clock signal with bottom hardware clock interrupt signal.
First aspect present invention provides a kind of acquisition methods of clock interrupt signal, including:
Network function virtualizes description letter of the NFV functional entitys in virtual network function requirement description file VNFD Breath, it is determined that virtualization network function VNF tick interrupt accuracy requirement;
The NFV functional entitys determine hardware clock address according to the tick interrupt accuracy requirement for the VNF;
The address of the hardware clock is sent to the VNF by the NFV functional entitys, so that the VNF is according to The address of hardware clock accesses the hardware clock to obtain clock interrupt signal.
In the first possible implementation of first aspect, the NFV functional entitys are that network function virtualizes layout Device NFVO or virtual network function manager VNFM.
With reference to the first possible implementation of first aspect, in second of possible implementation of first aspect, institute NFV functional entitys are stated according to the tick interrupt accuracy requirement, before determining hardware clock address for the VNF, in addition to:
The NFV functional entitys determine whether the VNF needs directly to access according to VNF tick interrupt accuracy requirement Hardware clock;
If it is determined that the NFVO or VNFM needs directly to access hardware clock, then the NFVO or VNFM are that the VNF is true Determine hardware clock address.
With reference to the first possible implementation of first aspect, in the third possible implementation of first aspect, institute Tick interrupt accuracy requirement of the NFV functional entitys according to VNF is stated, hardware clock address is determined for the VNF, specifically includes:
The NFVO or VNFM send inquiry request to clock address manager, and the VNF is carried in the inquiry request Identification information and the VNF mapping physical equipment identification information;
The NFVO or VNFM receive the hardware clock address that the clock address manager returns.
With reference to the third possible implementation of first aspect, in the 4th kind of possible implementation of first aspect, institute After stating the hardware clock address that NFV functional entitys receive the clock address manager return, in addition to:
The NFVO or VNFM receive the VNF of the clock address manager return to the hardware clock address Access cycle and access duration.
With reference to the first possible implementation of first aspect, in the 5th kind of possible implementation of first aspect, institute The information of storage hardware clock on NFV functional entitys is stated, the NFV functional entitys are according to VNF tick interrupt accuracy requirement The VNF determines hardware clock address, specifically includes:
For the NFVO according to the information of the hardware clock of storage, determine that the VNF can be accessed directly is described hard Part clock address.
With reference to the 5th kind of possible implementation of first aspect, in the 6th kind of possible implementation of first aspect, institute Information of the NFV functional entitys according to the hardware clock of storage is stated, when determining the hardware that the NFV can be accessed directly After clock address, in addition to:
The NFVO determines the VNF to the access cycle of the hardware clock address and accesses duration.
With reference to the 4th kind of first aspect or the 6th kind of possible implementation, the 7th kind in first aspect may realization side In formula, after the address of the hardware clock is sent to the VNF by the NFV functional entitys, in addition to:
The VNF is sent to the VNF by the NFVO to the access cycle of the hardware clock address and access duration.
With reference to the first possible implementation of first aspect, in the 8th kind of possible implementation of first aspect, institute NFV functional entitys are stated according to the tick interrupt accuracy requirement, before determining hardware clock address for the VNF, in addition to:
The NFVO is according to the tick interrupt accuracy requirement of the VNF, it is determined that meeting the virtualization of the VNF demands resource Infrastructure manager VIM;
The NFVO sends resource reservation request to the VIM;
The NFVO receives the resource reservation result that the VIM is returned, and physical equipment is carried in the resource reservation result Mark.
With reference to the 8th kind of possible implementation of first aspect, in the 9th kind of possible implementation of first aspect, institute State NFVO and receive the resource reservation result that the VIM is returned, after the mark that physical equipment is carried in the resource reservation result, Also include:
The VNFM asks the VIM to create and start virtual machine.
With reference to the 8th kind of first aspect or the 9th kind of possible implementation, the tenth kind in first aspect may realization side In formula, the resource reservation result includes:The hardware clock address;
The NFV functional entitys are that the VNF determines hardware clock address, are specifically included:
The NFVO obtains the hardware clock address from the resource reservation result.
With reference to the tenth kind of possible implementation of first aspect, in a kind of the tenth possible implementation of first aspect, Also include in the resource reservation result:The VNF is to the access cycle of the hardware clock address and accesses duration.
With reference to the tenth kind of possible implementation of first aspect, in the 12nd kind of possible implementation of first aspect, After the NFV functional entitys obtain the hardware clock address from the resource reservation result, in addition to:
The NFVO determines the VNF to the access cycle of the hardware clock address and accesses duration.
Second aspect of the present invention provides a kind of network function virtualization NFV functional entitys, including:
First determining module, for according to VNFD description informations, determining VNF tick interrupt accuracy requirement;
Second determining module, for according to the tick interrupt accuracy requirement, hardware clock address to be determined for the VNF;
Sending module, for the address of the hardware clock to be sent into the VNF, so that the VNF is according to described hard The address of part clock accesses the hardware clock to obtain clock interrupt signal.
In second of possible implementation of second aspect, the NFV functional entitys are NFVO or VNFM.
With reference to the first possible implementation of second aspect, in second of possible implementation of second aspect, go back Including:
3rd determining module, in second determining module according to the tick interrupt accuracy requirement, be the VNF Before determining hardware clock address, according to VNF tick interrupt accuracy requirement, determine whether the VNF needs directly to access firmly Part clock;
Second determining module is additionally operable to, however, it is determined that the NFVO or VNFM need directly access hardware clock, then for The VNF determines hardware clock address.
With reference to the first possible implementation of second aspect, in the third possible implementation of second aspect, institute Sending module is stated to be specifically used for:
Send inquiry request to clock address manager, carry in the inquiry request VNF identification information and The identification information of the physical equipment of the VNF mappings;
The NFV functional entitys also include:First receiving module, the institute returned for receiving the clock address manager State hardware clock address.
With reference to the third possible implementation of second aspect, in the 4th kind of possible implementation of second aspect, institute The first receiving module is stated, is additionally operable to when second determining module receives the hardware that the clock address manager returns After clock address, receive the VNF that the clock address manager returns to the access cycle of the hardware clock address and Access duration.
With reference to the first possible implementation of second aspect, in the 5th kind of possible implementation of second aspect, institute It is the NFVO to state NFV functional entitys, then the NFVO also includes:
Memory module, the information for storage hardware clock;
Second determining module is specific:According to the information of the hardware clock of storage, determine that the VNF can be direct The hardware clock address accessed.
With reference to the 5th kind of possible implementation of second aspect, in the 6th kind of possible implementation of second aspect, institute It is the NFVO to state NFV functional entitys, then the NFVO also includes:
4th determining module, for according to second determining module determine that the NFV can access directly it is described hard After part clock address, the VNF is determined to the access cycle of the hardware clock address and accesses duration.
With reference to the 4th kind of second aspect or the 6th kind of possible implementation, the 7th kind in second aspect may realization side In formula, the NFV functional entitys are the NFVO, then the sending module, are additionally operable to send out by the address of the hardware clock After giving the VNF, the VNF is sent to the VNF to the access cycle of the hardware clock address and access duration.
With reference to the first possible implementation of second aspect, in the 8th kind of possible implementation of second aspect, institute It is the NFVO to state NFV functional entitys, then the NFVO also includes:
5th determining module, for, according to the tick interrupt accuracy requirement, being determined in the second determining module for the VNF Before hardware clock address, according to the tick interrupt accuracy requirement of the VNF, it is determined that meeting the VIM of the VNF demands resource;
The sending module is additionally operable to:Resource reservation request is sent to the VIM;
Also include the second receiving module, the resource reservation result returned for receiving the VIM, the resource reservation result The middle mark for carrying physical equipment.
With reference to the 8th kind of possible implementation of second aspect, in the 9th kind of possible implementation of second aspect, institute It is the VNFM to state NFV functional entitys, then the VNFM also includes:Also include:Request module, for determining mould the described 5th Block receives the resource reservation result that the VIM is returned, after the mark that physical equipment is carried in the resource reservation result, request The VIM creates and started virtual machine.
With reference to the 8th kind of second aspect or the 9th kind of possible implementation, the tenth kind in second aspect may realization side In formula, the NFV functional entitys are the NFVO, and the resource reservation result includes:The hardware clock address;
Second determining module is specifically used for:The hardware clock address is obtained from the resource reservation result.
With reference to the tenth kind of possible implementation of second aspect, in a kind of the tenth possible implementation of second aspect, Also include in the resource reservation result:The VNF is to the access cycle of the hardware clock address and accesses duration.
With reference to the tenth kind of possible implementation of second aspect, in the 12nd kind of possible implementation of second aspect, The NFV functional entitys are the NFVO, then the NFVO also includes:
6th determining module, for obtaining the hardware from the resource reservation result according to second determining module After clock address, the VNF is determined to the access cycle of the hardware clock address and accesses duration.
Third aspect present invention provides a kind of network function virtualization NFV functional entitys, including:Processor and memory, The memory storage execute instruction, when the acquisition system operation of the clock interrupt signal, the processor is deposited with described Communicated between reservoir, execute instruction described in the computing device causes the acquisition system of the clock interrupt signal to perform as weighed Profit requires the method described in 1~13 any one.
The embodiments of the invention provide a kind of acquisition methods of clock interrupt signal and NFV functional entitys, NFV functional entitys According to VNFD description informations, VNF tick interrupt accuracy requirement is determined, then, NFV functional entitys are according to tick interrupt precision need Ask, determine hardware clock address for VNF, identified hardware clock address is finally sent to VNF, VNF can be according to acquisition Hardware clock address access hardware clock, and obtain clock interrupt signal.During without by virtual machine call bottom hardware Clock interrupt signal and produce the client operating system software clock interrupt signal of virtual machine, then software clock interrupt signal is provided The clock signal transmission process of VNF configuration processors scheduling is supplied to VNF, is trembled so as to avoid the delay of clock signal and delay It is dynamic, the promptness that interrupt signal performs is ensure that, and ensure that program is dispatched in time.
Brief description of the drawings
In order to illustrate more clearly about the embodiment of the present invention or technical scheme of the prior art, below will be to embodiment or existing There is the required accompanying drawing used in technology description to be briefly described, it should be apparent that, drawings in the following description are this hairs Some bright embodiments, for those of ordinary skill in the art, without having to pay creative labor, can be with Other accompanying drawings are obtained according to these accompanying drawings.
Fig. 1 is the flow chart of the acquisition methods for the clock interrupt signal that the embodiment of the present invention one provides;
Fig. 2 is the flow chart one of the acquisition methods for the clock interrupt signal that the embodiment of the present invention two provides;
Fig. 3 is the framework and interface diagram one of the acquisition methods for the clock interrupt signal that the embodiment of the present invention two provides;
Fig. 4 is the framework and interface diagram two of the acquisition methods for the clock interrupt signal that the embodiment of the present invention two provides;
Fig. 5 is the framework and interface diagram three of the acquisition methods for the clock interrupt signal that the embodiment of the present invention two provides;
Fig. 6 is the framework and interface diagram four of the acquisition methods for the clock interrupt signal that the embodiment of the present invention two provides;
Fig. 7 is the acquisition methods flowchart 2 for the clock interrupt signal that the embodiment of the present invention two provides;
Fig. 8 is the acquisition methods flow chart for the clock interrupt signal that the embodiment of the present invention three provides;
Fig. 9 is the framework and interface diagram one of the acquisition methods for the clock interrupt signal that the embodiment of the present invention three provides;
Figure 10 is the framework and interface diagram two of the acquisition methods for the clock interrupt signal that the embodiment of the present invention three provides;
Figure 11 is the acquisition methods flow chart for the clock interrupt signal that the embodiment of the present invention four provides;
Figure 12 is the framework and interface diagram one of the acquisition methods for the clock interrupt signal that the embodiment of the present invention four provides;
Figure 13 is the framework and interface diagram two of the acquisition methods for the clock interrupt signal that the embodiment of the present invention four provides;
Figure 14 is the structural representation that a kind of network function that the embodiment of the present invention five provides virtualizes NFV functional entitys One;
Figure 15 is the structural representation that a kind of network function that the embodiment of the present invention five provides virtualizes NFV functional entitys Two;
Figure 16 is the structural representation that a kind of network function that the embodiment of the present invention five provides virtualizes NFV functional entitys Three;
Figure 17 is the structural representation that a kind of network function that the embodiment of the present invention five provides virtualizes NFV functional entitys Four;
Figure 18 is the structural representation that a kind of network function that the embodiment of the present invention five provides virtualizes NFV functional entitys Five;
Figure 19 is the structural representation that a kind of network function that the embodiment of the present invention five provides virtualizes NFV functional entitys Six;
Figure 20 is the structural representation that a kind of network function that the embodiment of the present invention five provides virtualizes NFV functional entitys Seven;
Figure 21 is the structural representation that a kind of network function that the embodiment of the present invention five provides virtualizes NFV functional entitys Eight;
Figure 22 show a kind of schematic diagram of network function virtualization NFV functional entitys of the offer of the embodiment of the present invention six.
Embodiment
To make the purpose of the embodiment of the present invention:Technical scheme and advantage are clearer, below in conjunction with the embodiment of the present invention In accompanying drawing, the technical scheme in the embodiment of the present invention is clearly and completely described, it is clear that described embodiment is Part of the embodiment of the present invention, rather than whole embodiments.Based on the embodiment in the present invention, those of ordinary skill in the art The every other embodiment obtained under the premise of creative work is not made, belongs to the scope of protection of the invention.
Fig. 1 is the acquisition methods flow chart for the clock interrupt signal that the embodiment of the present invention one provides, as shown in figure 1, the party Method includes:
Step 101:Network function virtualizes NFV functional entitys according to virtual network function requirement description file (Virtualized Network Function Descriptor, abbreviation VNFD) description information, determine VNF tick interrupt Accuracy requirement;
Wherein, NFV functional entitys can be that network function virtualizes composer (Network Function Virtualized Orchestrator, abbreviation NFVO) or virtual network function manager (Virtualized Network Function Manager, abbreviation VNFM).The information of VNFD descriptions specifically includes matches somebody with somebody to VNF deployment behaviors and operation behavior Put, wherein deployment behavior includes but is not limited to the deployed environment of VNF requirements, in particular to VNF virtualizes basis to network function The demand of facility (Network Function Virtualized Infrastructure, abbreviation NFVI) resource, such as virtual machine Number, virtual machine map (image) number, the computing resource needed and storage resource etc..Operation behavior is mainly VNF Life Cycles Behavior during period management, including but not limited to VNF topology, the function of starting and close, matched with VNF life cycle events Property script etc..
VNFD is to be sent to NFVO by third party entity during VNF loads (on-boarding), is carried by NFVO It is sent in NFV catalogues storehouse, NFVO reads VNFD when needing from NFV catalogues storehouse.
Here third party entity can be entity or the service provider that any one represents VNF providers An entity in management domain.
VNF tick interrupt precision refers to VNF to the frequency of tick interrupt and the demand of frequency stability.
Step 102:NFV functional entitys determine hardware clock address according to tick interrupt accuracy requirement for VNF;
Specifically, NFV functional entitys can determine whether VNF needs directly according to VNF tick interrupt accuracy requirement first Hardware clock is asked in receiving, if it is determined that VNF needs directly to access hardware clock, then as a kind of feasible embodiment, NFVO Or VNFM can send inquiry request to clock address manager, carry VNF identification information in the inquiry request and VNF reflects The identification information for the physical equipment penetrated, the addressable hardware of VNF that then NFVO or VNFM reception clock address manager returns Clock address, and VNF access the access cycle of hardware clock and access duration.
As another feasible embodiment, the upper information that can also prestore hardware clock of NFVO, so as to NFVO The hardware clock address that VNF can be accessed directly can be determined directly according to the information of the hardware clock of storage, can be with VNF is further determined that to the access cycle of hardware clock and accesses duration.
Wherein, the hardware clock address manager can be business support system/OSS (Business Support system/Operation support system, abbreviation OSS/BSS), NFVO, VNFM or virtualization basis Infrastructure manager (Virtualized Infrastructure Manager, abbreviation VIM) etc., the present invention does not limit it.
Step 103:The address of hardware clock is sent to VNF by NFV functional entitys, so that ground of the VNF according to hardware clock Location accesses hardware clock to obtain clock interrupt signal.
The hardware clock address and the visit of hardware clock that NFV functional entitys return to the clock address manager received Ask the cycle and access duration and be sent to VNF, then VNF is obtained in clock according to the addressable hardware clock address received Break signal.
The acquisition methods of clock interrupt signal provided by the invention, NFV functional entitys according to VNFD description informations, it is determined that VNF tick interrupt accuracy requirement, then, NFV functional entitys determine hardware clock according to tick interrupt accuracy requirement for VNF Address, is finally sent to VNF by identified hardware clock address, and VNF can access hard according to the hardware clock address of acquisition Part clock, and obtain clock interrupt signal.It is virtual without being produced by virtual machine call bottom hardware clock interrupt signal The client operating system software clock interrupt signal of machine, then it is supplied to VNF to be adjusted for VNF configuration processors software clock interrupt signal The clock signal transmission process of degree, so as to avoid the delay of clock signal and delay jitter, it ensure that interrupt signal performs Promptness, and ensure that program is dispatched in time.
Fig. 2 is the acquisition methods flow chart one for the clock interrupt signal that the embodiment of the present invention two provides, as shown in Fig. 2 this In the implement scene that embodiment provides, clock address manager is safeguarded by OSS/BSS systems or clock address server, and And asked from NFVO to clock address manager tranmitting data register address lookup, this method includes:
Step 200:Increase VNF in VNFD to the requirement description of tick interrupt precision, by VNF loading procedures, by the VNFD is sent to NFVO by tripartite's entity, VNFD is submitted in VNF catalogues by NFVO, so that NFVO and VNFM can be obtained VNF synchronisation requirement.
Wherein, third party entity can be the entity or service provider's pipe that any one represents VNF providers Manage an entity in domain.
VNFD is the configuration template of a description VNF deployment and operation behavior, specifically includes and disposes behavior and operation to VNF The description of behavior configuration, wherein deployment behavior includes but is not limited to the deployed environment of VNF requirements, in particular to VNF provides to NFVI The demand in source, such as virtual machine number, virtual machine map (image) number, the computing resource needed and storage resource etc..Operation row To be mainly the behavior in VNF life cycle management process, including but not limited to VNF topologys, start and close, with VNF life Function script of periodic event matching etc..
Step 201:NFVO receives the instantiation VNF of trigger Sender transmissions request.
The request is used to instantiate a new VNF;
Wherein, Sender can be OSS, Element management system (Element Management System, abbreviation EMS), VNFM。
Step 202:The validity of the request for the instantiation VNF that the Sender that NFVO checkings receive is sent;
Wherein, validity refers to the legitimacy of VNF requests, and including but not limited to Sender legitimacy and instantiation is asked The legitimacy of itself, specifically, Sender legitimacy, which refers to whether Sender is authorized to, sends the request;Instantiation request is originally The legitimacy of body refers to whether the security parameter that the request carries can prove that the request is legal, is not distorted by third party 's.
Step 203:NFVO reads VNFD from VNF catalogues, including reads demands of the VNF to tick interrupt.
Step 204:NFVO generates a VNF example item, and the example item of generation is increased into " NFV examples (NFV Instances) " in database.
It is real to VNF according to the VNF examples item that VNF examples item is specifically used for the NFVO and/or VNFM between VNF example runtimes The relevant information of example is inquired about and safeguarded.The relevant information of VNF examples specifically refers to NFVI resources, the VNF that VNF examples use The running status of virtual machine corresponding to example, performance etc..
Step 205a:NFVO submits instantiation parameter to VNFM.
Instantiating parameter includes the related parameter of the application parameter related to non-application, wherein referring to using related parameter The parameter of the application correlation operated on VNF, such as the handling capacity of VNF and/or the virtual machine business to be met for disposing VNF, net The parameters such as network bandwidth;The related parameter of non-application refers to the configuration parameter related to VNF deployment behaviors and operation behavior, is specifically Refer to demands of the VNF to NFVI resources and the restriction and description to behavior in VNF life cycle management process.Instantiate parameter and VNFD is used for the resource to disposing VNF together and VNF instantiation process carries out requirement description and demand limits.
Step 205b-205c:VNFM obtains VNFD and test case parameter, if desired can be to instantiating parameter Carry out some modifications.
Specifically refer to, when the VNF instantiation parameters and the demand information and/or NFVO described in VNFD that are pre-seted in VNFM Submit to VNFM instantiation parameter it is inconsistent when, VNFM can modify to inconsistent instantiation parameter.
In step 203, NFVO is possible to directly read the increased phase to tick interrupt requirement description in VNFD Information is closed, VNFM can parse tick interrupt demand from VNFD, be sent to NFVO in this step.
Step 206a:NFVO selects a VIM for thinking that the resource of meet demand can be provided to VNF.
" NFVI resources (NFVI resource) " database includes the record to NFVI server-capabilities, specifically includes The resource description that NFVI servers can provide, including all resources, the resource, remaining available that provides that can be provided Resource and resource etc. is reserved.
NFVO is according to " record in NFVI resource " databases, the NFVI services of selection one VIM, the VIM management The ability of device disclosure satisfy that VNF demand.Here demand is specifically referred in demand and instantiation parameter described in VNFD The demand of restriction.
Step 206b:NFVO to VIM send resource reservation request, wherein not only include VNF to calculate, store and network provide The demand in source, in addition to (whether VNF needs directly to access in hardware clock equipment acquisition clock demands of the VNF to tick interrupt It is disconnected).
Step 206c:VIM checks the state of managed resource, returns to resource reservation result.Wherein, VIM is except considering The state of calculating, storage and Internet resources, it is also contemplated that the state of the clockwork resource managed, if clockwork loads It is larger, step 206d can be performed, that is, returns to resource reservation and is unsuccessfully indicated to NFVO, NFVO re-executes step 200-206c, Until selecting suitable VIM.
Step 207a:If VNF need using directly access hardware clock equipment by the way of obtain tick interrupt NFVO to Clock address manager sends inquiry request, and VNF identity number (Identity, abbreviation ID) is carried in inquiry request, ID (one or more may be included) information of the physical equipment of mapping.
Step 207b-207c:Clock address manager can be accessed directly hard according to inquiry request, local search VNF Part clock address, and confirm VNF access rights, NFVO is returned result to, as a result includes the address of hardware clock, also may be used To access the configuration information in the cycle of hardware clock and duration including VNF.
Step 208:NFVO sends VNF instantiation requests to VNFM, wherein carrying corresponding VIM mark (such as unified money Source finger URL (Uniform Resource Locator, abbreviation URL etc.) and hardware clock address and configuration information instruction.
Optionally, NFVO can also configure cycle and the duration that VNF accesses hardware clock in this step.
Step 209a-209b:VNFM requests VIM is that VNF distributes resource.
Step 210a-210b:VNFM asks VIM to create and start virtual machine, including installation software program package according to VNFD, Perform and start shell script, send configuration data, and virtual machine is connected to network etc..
Step 211:The hardware clock address that VNFM instructions VNF can be accessed directly, access cycle and duration.
Step 212:VNF accesses hardware clock according to VNFM instruction, obtains hardware clock interrupt, program is adjusted Degree.
Step 213:VNFM returns to VNF and instantiates result to NFVO.
Step 214a-214b:The VNF instantiation results that NFVO returns according to VNFM carry out resource status renewal.
Step 215:NFVO renewal " NFV Instances " and " NFVI resource " databases.
Step 216:NFVO returns to VNF and instantiates result to Sender.
Clock address manager in the present embodiment safeguarded by OSS/BSS systems or clock address server, specifically , can be the EMS in OSS/BSS systems to safeguard, and can be connected between clock module and hardware by interface, such as scheme Shown in 3, can also integrated clock module within hardware, as shown in figure 4, or clock address manager by clock address server To safeguard, wherein state and the address of each clock module/equipment in network are responsible for and safeguarded to clock module server. And can be connected between clock module and hardware by interface, as shown in figure 5, can also integrated clock module within hardware, As shown in Figure 6.
The acquisition methods of clock interrupt signal provided in an embodiment of the present invention, NFV functional entitys according to VNFD description informations, VNF tick interrupt accuracy requirement is determined, then, NFV functional entitys determine hardware according to tick interrupt accuracy requirement for VNF Clock address, is finally sent to VNF by identified hardware clock address, and VNF can visit according to the hardware clock address of acquisition Hardware clock is asked, and obtains clock interrupt signal.Without being produced by virtual machine call bottom hardware clock interrupt signal The client operating system software clock interrupt signal of virtual machine, then it is supplied to VNF to perform journey for VNF software clock interrupt signal The clock signal transmission process of sequence scheduling, so as to avoid the delay of clock signal and delay jitter, ensure that interrupt signal The promptness of execution, and ensure that program is dispatched in time.
Fig. 7 is the acquisition methods flowchart 2 for the clock interrupt signal that the embodiment of the present invention two provides, as shown in fig. 7, this In the implement scene that embodiment provides, clock address manager is safeguarded by OSS/BSS systems or clock address server, and And asked from VNFM to clock address manager tranmitting data register address lookup, this method includes:
Step 300:Increase VNF in VNFD to the requirement description of tick interrupt precision, by VNF loading procedures, by the VNFD is sent to NFVO by tripartite's entity, VNFD is submitted in VNF catalogues by NFVO, so that NFVO and VNFM can be obtained VNF synchronisation requirement.
Wherein, third party entity can be entity or the service provider that any one represents VNF providers An entity in management domain.
VNFD refers to the configuration template of a description VNF deployment and operation behavior, specifically includes and disposes behavior and behaviour to VNF Make behavior configuration description, wherein deployment behavior include but is not limited to VNF requirement deployed environment, in particular to VNF to NFVI The demand of resource, such as virtual machine number, virtual machine map (image) number, the computing resource needed and storage resource etc..Operation Behavior is mainly the behavior in VNF life cycle management process, including but not limited to VNF topologys, starts and closes, given birth to VNF Order function script of periodic event matching etc..
Step 301:NFVO receives the instantiation VNF of Sender transmissions request.
The request is used to instantiate a new VNF;
Wherein, Sender can be OSS, EMS, VNFM.
Step 302:The validity of the request for the instantiation VNF that the Sender that NFVO checkings receive is sent.
Wherein, validity refers to the legitimacy of VNF requests, and including but not limited to Sender legitimacy and instantiation is asked The legitimacy of itself, specifically, Sender legitimacy, which refers to whether Sender is authorized to, sends the request;Instantiation request is originally The legitimacy of body refers to whether the security parameter that the request carries can prove that the request is legal, is not distorted by third party 's.
Step 303:NFVO reads VNFD from VNF catalogues, including reads demands of the VNF to tick interrupt.
Step 304:NFVO generates a VNF example item, and the example item of generation is increased into " NFV Instances " numbers According in storehouse.
Wherein, it is right according to the VNF example items to be specifically used for the NFVO and/or VNFM between VNF example runtimes for VNF examples item The relevant information of VNF examples is inquired about and safeguarded.The relevant information of VNF examples specifically refers to the NFVI moneys that VNF examples use The running status of virtual machine, performance etc. corresponding to source, VNF examples.
Step 305a:NFVO submits instantiation parameter to VNFM.
Wherein, instantiating parameter includes the related parameter of the application parameter related to non-application, wherein using related ginseng Number refers to operate in the parameter of the application correlation on VNF, such as handling up for VNF and/or deployment VNF the virtual machine business to be met The parameters such as amount, network bandwidth;The related parameter of non-application refers to the configuration parameter related to VNF deployment behaviors and operation behavior, Specifically refer to restrictions and description of the VNF to the demand of NFVI resources and to behavior in VNF life cycle management process.Instantiation Parameter and VNFD are used for the resource to disposing VNF together and VNF instantiation process carries out requirement description and demand limits.
Step 305b-305c:VNFM obtains VNFD and test case parameter, if desired can be to instantiating parameter Carry out some modifications.
Specifically refer to, when the VNF instantiation parameters and the demand information and/or NFVO described in VNFD that are pre-seted in VNFM Submit to VNFM instantiation parameter it is inconsistent when, VNFM can modify to inconsistent instantiation parameter.
In step 303, NFVO is possible to directly read the increased phase to tick interrupt requirement description in VNFD Information is closed, VNFM can parse tick interrupt demand from VNFD, be sent to NFVO in this step.
Step 306a:NFVO selects a VIM for thinking that meet demand resource can be provided to VNF.
Wherein, " NFVI resource " databases include the record to NFVI server-capabilities, specifically include NFVI clothes The resource description that can provide of business device, including can provide all resources, provide resource, remaining available resource with And resource etc. is reserved.
NFVO is according to " record in NFVI resource " databases, the NFVI services of selection one VIM, the VIM management The ability of device disclosure satisfy that VNF demand.Here demand is specifically referred in demand and instantiation parameter described in VNFD The demand of restriction.
Step 306b:NFVO to VIM send resource reservation request, wherein not only include VNF to calculate, store and network provide The demand in source, in addition to (whether VNF needs directly to access in hardware clock equipment acquisition clock demands of the VNF to tick interrupt It is disconnected).
Step 306c:VIM checks the state of managed resource, returns to resource reservation result.Wherein, VIM is except considering The state of calculating, storage and Internet resources, it is also contemplated that the state of the clockwork resource managed, if clockwork loads It is larger, step 306d can be performed, that is, returns to resource reservation and is unsuccessfully indicated to NFVO, NFVO re-executes step 300-306c, Until selecting suitable VIM.
Step 307:NFVO sends VNF instantiation requests to VNFM, wherein carrying corresponding VIM mark (such as URL).
Step 308a-308b:VNFM asks VIM to distribute resource to VNF.
Step 309a-309b:VNFM asks VIM to create and start virtual machine, including installation software program package according to VNFD, Perform and start shell script, send configuration data, and VM is connected to network etc..
Step 310a:If VNF needs to obtain tick interrupt using by the way of directly access hardware clock equipment, VNFM to Clock address manager sends inquiry request, carries VNF ID, the ID (may include one or more) of the physical equipment of mapping Information.
VNFM also needs to the address to NFVO request clock address managers, is inquired about to be sent to clock address manager Request;
Or in step 307, NFVO carries clock address manager when sending VNF instantiation requests to VNFM Address.
Step 310b-310c:The hardware clock that clock address manager can be accessed directly according to request local search VNF Address, and confirm VNF access rights, return result to VNFM, as a result include the address of hardware clock, can also wrap Include VNF and access the cycle of hardware clock and the configuration information of duration.
Step 311:The hardware clock address that VNFM instructions VNF can be accessed directly, access cycle and duration.
Optionally, VNFM can also configure cycle and the duration that VNF accesses hardware clock in this step.
Step 312:VNF accesses hardware clock according to VNFM instruction, obtains hardware clock interrupt, program is adjusted Degree.
Step 313:VNFM returns to VNF and instantiates result to NFVO.
Step 314a-314b:The VNF instantiation results that NFVO returns according to VNFM carry out resource status renewal.
Step 315:NFVO renewal " NFV Instances " and " NFVI resource " databases.
Step 316:NFVO returns to VNF and instantiates result to Sender.
Clock address manager in the present embodiment safeguarded by OSS/BSS systems or clock address server, specifically , can be the EMS in OSS/BSS systems to safeguard, and can be connected between clock module and hardware by interface, such as scheme Shown in 3, can also integrated clock module within hardware, as shown in figure 4, or clock address manager by clock address server To safeguard, wherein state and the address of each clock module/equipment in network are responsible for and safeguarded to clock module server. And can be connected between clock module and hardware by interface, as shown in figure 5, can also integrated clock module within hardware, As shown in Figure 6.
The acquisition methods of clock interrupt signal provided in an embodiment of the present invention, NFV functional entitys according to VNFD description informations, VNF tick interrupt accuracy requirement is determined, then, NFV functional entitys determine hardware according to tick interrupt accuracy requirement for VNF Clock address, is finally sent to VNF by identified hardware clock address, and VNF can visit according to the hardware clock address of acquisition Hardware clock is asked, and obtains clock interrupt signal.Without being produced by virtual machine call bottom hardware clock interrupt signal The client operating system software clock interrupt signal of virtual machine, then it is supplied to VNF to perform journey for VNF software clock interrupt signal The clock signal transmission process of sequence scheduling, so as to avoid the delay of clock signal and delay jitter, ensure that interrupt signal The promptness of execution, and ensure that program is dispatched in time.
Fig. 8 is the acquisition methods flow chart for the clock interrupt signal that the embodiment of the present invention three provides, as shown in figure 8, this reality In the implement scene for applying example offer, clock address manager is safeguarded that this method includes by NFVO:
Step 400:Increase VNF in VNFD to the requirement description of tick interrupt precision, by VNF loading procedures, by the VNFD is sent to NFVO by tripartite's entity, and VNFD is submitted in VNF catalogues by NFVO, so that NFVO and VNFM obtains VNF's Synchronisation requirement.
Wherein, third party entity can be entity or the service provider that any one represents VNF providers An entity in management domain.
VNFD refers to the configuration template of a description VNF deployment and operation behavior, specifically includes and disposes behavior and behaviour to VNF Make behavior configuration description, wherein deployment behavior include but is not limited to VNF requirement deployed environment, in particular to VNF to NFVI The demand of resource, such as virtual machine number, virtual machine map (image) number, the computing resource needed and storage resource etc..Operation Behavior is mainly the behavior in VNF life cycle management process, including but not limited to VNF topologys, starts and closes, given birth to VNF Order function script of periodic event matching etc..
Step 401:NFVO receives the instantiation VNF of Sender transmissions request.
The request is used to instantiate a new VNF;
Wherein, Sender can be OSS, EMS, VNFM.
Step 402:The validity of the request for the instantiation VNF that the Sender that NFVO checkings receive is sent;
Wherein, validity refers to the legitimacy of VNF requests, and including but not limited to Sender legitimacy and instantiation is asked The legitimacy of itself, specifically, Sender legitimacy, which refers to whether Sender is authorized to, sends the request;Instantiation request is originally The legitimacy of body refers to whether the security parameter that the request carries can prove that the request is legal, is not distorted by third party 's.
Step 403:NFVO reads VNFD from VNF catalogues.Including reading demands of the VNF to tick interrupt.
Step 404:NFVO generates a VNF example item, and the example item of generation is increased into " NFV Instances " numbers According in storehouse.
Wherein, it is right according to the VNF example items to be specifically used for the NFVO and/or VNFM between VNF example runtimes for VNF examples item The relevant information of VNF examples is inquired about and safeguarded.The relevant information of VNF examples specifically refers to the NFVI moneys that VNF examples use The running status of virtual machine, performance etc. corresponding to source, VNF examples.
Step 405a:NFVO submits instantiation parameter to VNFM.
Wherein, instantiating parameter includes the related parameter of the application parameter related to non-application, wherein using related ginseng Number refers to operate in the parameter of the application correlation on VNF, such as handling up for VNF and/or deployment VNF the virtual machine business to be met The parameters such as amount, network bandwidth;The related parameter of non-application refers to the configuration parameter related to VNF deployment behaviors and operation behavior, Specifically refer to restrictions and description of the VNF to the demand of NFVI resources and to behavior in VNF life cycle management process.Instantiation Parameter and VNFD are used for the resource to disposing VNF together and VNF instantiation process carries out requirement description and demand limits.
Step 405b-405c:VNFM obtains VNFD and test case parameter, if desired can be to instantiating parameter Carry out some modifications.
Specifically refer to, when the VNF instantiation parameters and the demand information and/or NFVO described in VNFD that are pre-seted in VNFM Submit to VNFM instantiation parameter it is inconsistent when, VNFM can modify to inconsistent instantiation parameter.
In step 403, NFVO is possible to directly read the increased phase to tick interrupt requirement description in VNFD Information is closed, VNFM can parse tick interrupt demand from VNFD, be sent to NFVO in this step.
Step 406a:NFVO selects a VIM for thinking that meet demand resource can be provided to VNF.
Wherein, " NFVI resource " databases include the record to NFVI server-capabilities, specifically include NFVI clothes The resource description that can provide of business device, including can provide all resources, provide resource, remaining available resource with And resource etc. is reserved.
NFVO is according to " record in NFVI resource " databases, the NFVI services of selection one VIM, the VIM management The ability of device disclosure satisfy that VNF demand.Here demand is specifically referred in demand and instantiation parameter described in VNFD The demand of restriction.
Step 406b:NFVO to VIM send resource reservation request, wherein not only include VNF to calculate, store and network provide The demand in source, in addition to (whether VNF needs directly to access in hardware clock equipment acquisition clock demands of the VNF to tick interrupt It is disconnected).
Step 406c:VIM checks the state of managed resource, returns to resource reservation result.Wherein, VIM is except considering The state of calculating, storage and Internet resources, it is also contemplated that the state of the clockwork resource managed, if clockwork loads It is larger, step 406d can be performed, that is, returns to resource reservation and is unsuccessfully indicated to NFVO, NFVO re-executes step 400-406c, Until selecting suitable VIM.
Step 407:If VNF needs to obtain tick interrupt, NFVO roots by the way of hardware clock equipment is directly accessed The ID of physical equipment in the resource reservation result returned according to VIM, the ground for the hardware clock that local search VNF can be accessed directly Location, and confirm VNF access rights.Cycle and duration that VNF accesses hardware clock are configured simultaneously.
Step 408:NFVO sends VNF instantiation requests to VNFM, wherein carry corresponding VIM mark (such as URL) with And hardware clock address and configuration information instruction.
Step 409a-409b:VNFM asks VIM to distribute resource to VNF.
Step 410a-410b:VNFM asks VIM to create and start virtual machine, including installation software program package according to VNFD, Perform and start shell script, send configuration data, and VM is connected to network etc..
Step 411:The hardware clock address that VNFM instructions VNF can be accessed directly, access cycle and duration.
Step 412:VNF accesses hardware clock according to VNFM instruction, obtains hardware clock interrupt, program is adjusted Degree.
Step 413:VNFM returns to VNF and instantiates result to NFVO.
Step 414a-414b:The VNF instantiation results that NFVO returns according to VNFM carry out resource status renewal.
Step 415:NFVO renewal " NFV Instances " and " NFVI resource " databases.
Step 416:NFVO returns to VNF and instantiates result to Sender.
Clock address manager in the present embodiment safeguarded by NFVO, and clock address manager module and hardware it Between can be connected by interface, as shown in figure 9, can also integrated clock address manager module within hardware, as shown in Figure 10.
The acquisition methods of clock interrupt signal provided by the invention, NFV functional entitys according to VNFD description informations, it is determined that VNF tick interrupt accuracy requirement, then, NFV functional entitys local search are that VNF determines hardware clock address, then by institute The hardware clock address of determination is sent to VNF, and VNF can access hardware clock according to the hardware clock address of acquisition, and obtain Clock interrupt signal.Without producing the guest operation system of virtual machine by virtual machine call bottom hardware clock interrupt signal System software clock interrupt signal, then it is supplied to VNF to be passed for the clock signal of VNF configuration processors scheduling software clock interrupt signal Defeated process, so as to avoid the delay of clock signal and delay jitter, the promptness that interrupt signal performs is ensure that, and ensure Program is dispatched in time.
Figure 11 is the acquisition methods flow chart for the clock interrupt signal that the embodiment of the present invention four provides, as shown in figure 11, this In the implement scene that embodiment provides, clock address manager is safeguarded that this method includes by VIM:
Step 500:Increase VNF in VNFD to the requirement description of tick interrupt precision, by VNF loading procedures, by the VNFD is sent to NFVO by tripartite's entity, VNFD is submitted in VNF catalogues by NFVO, so that NFVO and VNFM can be obtained VNF synchronisation requirement.
Wherein, third party entity can be entity or the service provider that any one represents VNF providers An entity in management domain.
VNFD refers to the configuration template of a description VNF deployment and operation behavior, specifically includes and disposes behavior and behaviour to VNF Make behavior configuration description, wherein deployment behavior include but is not limited to VNF requirement deployed environment, in particular to VNF to NFVI The demand of resource, such as virtual machine number, virtual machine map (image) number, the computing resource needed and storage resource etc..Operation Behavior is mainly the behavior in VNF life cycle management process, including but not limited to VNF topologys, starts and closes, given birth to VNF Order function script of periodic event matching etc..
Step 501:NFVO receives the instantiation VNF of Sender transmissions request.
The request is used to instantiate a new VNF;
Wherein, Sender can be OSS, EMS, VNFM.
Step 502:The validity of NFVO checking requests.
Wherein, validity refers to the legitimacy of VNF requests, and including but not limited to Sender legitimacy and instantiation is asked The legitimacy of itself, specifically, Sender legitimacy, which refers to whether Sender is authorized to, sends the request;Instantiation request is originally The legitimacy of body refers to whether the security parameter that the request carries can prove that the request is legal, is not distorted by third party 's.
Step 503:NFVO reads VNFD from VNF catalogues, wherein, including read demands of the VNF to tick interrupt.
Step 504:NFVO generates a VNF example item, and the example item of generation is increased into " NFV Inastances " In database.
Wherein, it is right according to the VNF example items to be specifically used for the NFVO and/or VNFM between VNF example runtimes for VNF examples item The relevant information of VNF examples is inquired about and safeguarded.The relevant information of VNF examples specifically refers to the NFVI moneys that VNF examples use The running status of virtual machine, performance etc. corresponding to source, VNF examples.
Step 505a:NFVO submits instantiation parameter to VNFM.
Wherein, instantiating parameter includes the related parameter of the application parameter related to non-application, wherein using related ginseng Number refers to operate in the parameter of the application correlation on VNF, such as handling up for VNF and/or deployment VNF the virtual machine business to be met The parameters such as amount, network bandwidth;The related parameter of non-application refers to the configuration parameter related to VNF deployment behaviors and operation behavior, Specifically refer to restrictions and description of the VNF to the demand of NFVI resources and to behavior in VNF life cycle management process.Instantiation Parameter and VNFD are used for the resource to disposing VNF together and VNF instantiation process carries out requirement description and demand limits.
Step 505b-505c:VNFM test cases parameter simultaneously obtains VNFD, can also be as needed to instantiating parameter Carry out some modifications.
Specifically refer to, when the VNF instantiation parameters and the demand information and/or NFVO described in VNFD that are pre-seted in VNFM Submit to VNFM instantiation parameter it is inconsistent when, VNFM can modify to inconsistent instantiation parameter.
In step 503, NFVO is possible to directly read the increased phase to tick interrupt requirement description in VNFD Information is closed, VNFM can parse tick interrupt demand from VNFD, be sent to NFVO in this step.
Step 506a:NFVO selects a VIM that meet demand resource can be provided to VNF;
Wherein, " NFVI resource " databases include the record to NFVI server-capabilities, specifically include NFVI clothes The resource description that can provide of business device, including can provide all resources, provide resource, remaining available resource with And resource etc. is reserved.
NFVO is according to " record in NFVI resource " databases, the NFVI services of selection one VIM, the VIM management The ability of device disclosure satisfy that VNF demand.Here demand is specifically referred in demand and instantiation parameter described in VNFD The demand of restriction.
Step 506b:NFVO sends resource reservation to the selected VIM that meet demand resource can be provided to VNF please Ask, wherein not only include VNF to calculating, store and the demand of Internet resources, in addition to VNF is to the demand of tick interrupt, can be with Whether need directly to access hardware clock equipment acquisition tick interrupt for VNF.
Step 506c:VIM checks the state of managed resource, returns to resource reservation result.
Wherein, if VNF needs to obtain tick interrupt, resource reservation knot by the way of hardware clock equipment is directly accessed Fruit includes the address information of hardware clock and VNF accesses cycle and the duration configuration information of hardware clock.VIM except Consider the state of calculating, storage and Internet resources, it is also contemplated that the state of the clockwork resource managed, if clockwork Load larger, can perform step 506d, return to resource reservation and be unsuccessfully indicated to NFVO, NFVO re-executes step 500- 506c, until selecting suitable VIM.
Step 507:NFVO configurations VNF accesses cycle and the duration of hardware clock.
If VIM has been configured and has returned relevant configuration information in step 506c, without carrying out this step, directly hold Row step 508.
Step 508:NFVO sends VNF instantiation requests to VNFM, wherein carrying corresponding VIM mark (such as URL) And hardware clock address and configuration information instruction.
Step 509a-509b:VNFM asks VIM to distribute resource to VNF.
Step 510a-510b:VNFM asks VIM to create and start virtual machine, including installation software program package according to VNFD, Perform and start shell script, send configuration data, and VM is connected to network etc..
Step 511:The hardware clock address that VNFM instructions VNF can be accessed directly, access cycle and duration.
Step 512:VNF accesses hardware clock according to VNFM instruction, obtains hardware clock interrupt, and program is adjusted Degree.
Step 513:VNFM returns to VNF and instantiates result to NFVO.
Step 514a-514b:NFVO carries out resource status renewal.
Step 515:NFVO renewal " NFV Instances " and " NFVI resource " databases.
Step 516:NFVO returns to VNF and instantiates result to Sender.
Clock address manager in the present embodiment safeguarded by VIM, and clock address manager module and hardware it Between can be connected by interface, as shown in figure 12, can also integrated clock address manager module within hardware, such as Figure 13 institutes Show.
The acquisition methods of clock interrupt signal provided by the invention, NFV functional entitys according to VNFD description informations, it is determined that VNF tick interrupt accuracy requirement, and select that the VIM of resource can be provided, VIM returns to hardware clock address and with confidence Breath, VNF can access hardware clock according to the hardware clock address of acquisition, and obtain clock interrupt signal.Without passing through void Plan machine calls bottom hardware clock interrupt signal and produces the client operating system software clock interrupt signal of virtual machine, then will be soft Part clock interrupt signal is supplied to the clock signal transmission process that VNF supplies VNF configuration processors to dispatch, so as to avoid clock signal Delay and delay jitter, ensure that the promptness that interrupt signal performs, and ensure that program is dispatched in time.
Figure 14 is the structural representation that a kind of network function that the embodiment of the present invention five provides virtualizes NFV functional entitys, As shown in figure 14, the NFV functional entitys that the present embodiment provides specifically include:
First determining module 101, for according to VNFD description informations, determining VNF tick interrupt accuracy requirement;
Second determining module 102, for according to the tick interrupt accuracy requirement, be the VNF with determining hardware clock Location;
Sending module 103, for the address of the hardware clock to be sent into the VNF, so that the VNF is according to The address of hardware clock accesses the hardware clock to obtain clock interrupt signal.
Specifically, the NFV functional entitys are NFVO or VNFM.
As shown in figure 15, for above-mentioned NFV functional entitys, it can further include:
3rd determining module 104, for, according to the tick interrupt accuracy requirement, being in second determining module 102 Before the VNF determines hardware clock address, according to VNF tick interrupt accuracy requirement, determine whether the VNF needs directly Access hardware clock;
Optionally, second determining module 102 is additionally operable to, however, it is determined that the NFVO or VNFM need directly to access hardware Clock, then determine hardware clock address for the VNF.
Optionally, the sending module is specifically used for:
Send inquiry request to clock address manager, carry in the inquiry request VNF identification information and The identification information of the physical equipment of the VNF mappings;
As shown in figure 16, for above-mentioned NFV functional entitys, it can further include:
First receiving module 105, the hardware clock address returned for receiving the clock address manager.
Optionally, the first receiving module 105 is additionally operable to receive the clock address management in second determining module 102 After the hardware clock address that device returns, when receiving the VNF of the clock address manager return to the hardware The access cycle of clock address and access duration.
As shown in figure 17, it is the NFVO for above-mentioned NFV functional entitys, the NFV functional entitys, it can also enter One step includes:Memory module 106, the information for storage hardware clock;
Wherein, second determining module 102 is specifically used for the letter of the hardware clock stored according to memory module 106 Breath, determines the hardware clock address that the VNF can be accessed directly.
As shown in figure 18, it is the NFVO for above-mentioned NFV functional entitys, the NFV functional entitys, it can also enter One step includes:4th determining module 107, for determining what the NFV can be accessed directly according to second determining module 102 After the hardware clock address, the VNF is determined to the access cycle of the hardware clock address and accesses duration.
Optionally, sending module 103, it is additionally operable to after the address of the hardware clock is sent into the VNF, by institute State VNF and the VNF is sent to the access cycle of the hardware clock address and access duration.
As shown in figure 19, it is the NFVO for above-mentioned NFV functional entitys, the NFV functional entitys, it can also enter One step includes:
5th determining module 108, in the second determining module 102 according to the tick interrupt accuracy requirement, be described Before VNF determines hardware clock address, according to the tick interrupt accuracy requirement of the VNF, it is determined that meeting the VNF demands resource VIM;
Further, the sending module 103 is additionally operable to send resource reservation request to the VIM;
Also include the second receiving module 109, the resource reservation result returned for receiving the VIM, the resource reservation As a result the middle mark for carrying physical equipment.
As shown in figure 20, it is the VNFM for above-mentioned NFV functional entitys, the NFV functional entitys, it can also enter One step includes:
Request module 110, for receiving the resource reservation result of the VIM returns, institute in the 5th determining module 108 After stating the mark for carrying physical equipment in resource reservation result, the VIM is asked to create and start virtual machine.
Further, the NFV functional entitys are the NFVO, and the resource reservation result includes:During the hardware Clock address;
Second determining module 102 is specifically used for:The hardware clock address is obtained from the resource reservation result.
Further, also include in the resource reservation result:Access cycles of the VNF to the hardware clock address With access duration.
As shown in figure 21, it is the NFVO for above-mentioned NFV functional entitys, the NFV functional entitys, the NFVO is also It may further include:
6th determining module 111, for obtaining institute from the resource reservation result according to second determining module 102 After stating hardware clock address, the VNF is determined to the access cycle of the hardware clock address and accesses duration.
The NFV functional entitys that the present embodiment provides, it is the acquisition methods of clock interrupt signal provided in an embodiment of the present invention Execution equipment, it performs the detailed process of the acquisition methods of clock interrupt signal and can be found in side shown in Fig. 1, Fig. 2 to Figure 13 Associated description in method embodiment, will not be repeated here.
Figure 22 show a kind of structural representation of network function virtualization NFV functional entitys provided by the invention, such as schemes Shown in 22, the NFV functional entitys that the present embodiment provides include:Processor 21 and memory 22.Memory 22 stores execute instruction, Communicated between processor 21 and memory 22, processor 21 calls the execute instruction in memory 22, for performing following operation:
According to VNFD description informations, VNF tick interrupt accuracy requirement is determined;
According to the tick interrupt accuracy requirement, hardware clock address is determined for the VNF;
The address of the hardware clock is sent to the VNF, so that the VNF visits according to the address of the hardware clock The hardware clock is asked to obtain clock interrupt signal.
The NFV functional entitys are NFVO or VNFM.
Optionally, processor 21 is according to the tick interrupt accuracy requirement, for the VNF determine hardware clock address it Before, in addition to:
According to VNF tick interrupt accuracy requirement, determine whether the VNF needs directly to access hardware clock;
If it is determined that the NFVO or VNFM needs directly to access hardware clock, then hardware clock address is determined for the VNF.
Further, processor 21 determines hardware clock address according to VNF tick interrupt accuracy requirement for the VNF, Specifically include:
Send inquiry request to clock address manager, carry in the inquiry request VNF identification information and The identification information of the physical equipment of the VNF mappings;
Receive the hardware clock address that the clock address manager returns.
Further, after processor 21 receives the hardware clock address that the clock address manager returns, also Including:
The processor 21 receives visits of the VNF of the clock address manager return to the hardware clock address Ask the cycle and access duration.
Optionally, can be with the information of storage hardware clock, in clock of the processor 21 according to VNF on processor 21 Disconnected accuracy requirement, hardware clock address is determined for the VNF, is specifically included:
The processor 21 determines the institute that the VNF can be accessed directly according to the information of the hardware clock of storage State hardware clock address.
Further, processor 21 determines that the NFV can be accessed directly according to the information of the hardware clock of storage The hardware clock address after, in addition to:
The processor 21 determines the VNF to the access cycle of the hardware clock address and accesses duration.
Further, after the address of the hardware clock is sent to the VNF by processor 21, in addition to:
The VNF is sent to described by the processor 21 to the access cycle of the hardware clock address and access duration VNF。
Optionally, processor 21 is according to the tick interrupt accuracy requirement, for the VNF determine hardware clock address it Before, in addition to:
The processor 21 is according to the tick interrupt accuracy requirement of the VNF, it is determined that meeting the VNF demands resource VIM;
The processor 21 sends resource reservation request to the VIM;
The processor 21 receives the resource reservation result that the VIM is returned, and physics is carried in the resource reservation result The mark of equipment.
Further, the processor 21 receives the resource reservation result that the VIM is returned, in the resource reservation result After the mark for carrying physical equipment, in addition to:
The processor 21 asks the VIM to create and start virtual machine.
Further, the resource reservation result includes:The hardware clock address;
The processor 21 is that the VNF determines hardware clock address, is specifically included:The NFVO is from the resource reservation As a result it is middle to obtain the hardware clock address.
Further, also include in the resource reservation result:Access cycles of the VNF to the hardware clock address With access duration.
Further, after the processor 21 obtains the hardware clock address from the resource reservation result, also Including:
The processor 21 determines the VNF to the access cycle of the hardware clock address and accesses duration.
NFV functional entitys provided in an embodiment of the present invention, it can be used for the technical scheme for performing above method embodiment, its Implementing principle and technical effect are similar, and here is omitted.
One of ordinary skill in the art will appreciate that:Realizing all or part of step of above method embodiment can pass through Programmed instruction related hardware is completed, and foregoing program can be stored in a computer read/write memory medium, the program Upon execution, the step of execution includes above method embodiment;And foregoing storage medium includes:Read-only storage (Read- Only Memory, ROM), random access memory (Random Access Memory, RAM), magnetic disc or CD etc. are various can be with The medium of store program codes.
Finally it should be noted that:Various embodiments above is merely illustrative of the technical solution of the present invention, rather than its limitations;To the greatest extent The present invention is described in detail with reference to foregoing embodiments for pipe, it will be understood by those within the art that:Its according to The technical scheme described in foregoing embodiments can so be modified, either which part or all technical characteristic are entered Row equivalent substitution;And these modifications or replacement, the essence of appropriate technical solution is departed from various embodiments of the present invention technology The scope of scheme.

Claims (27)

  1. A kind of 1. acquisition methods of clock interrupt signal, it is characterised in that including:
    Network function virtualizes description information of the NFV functional entitys in virtual network function requirement description file VNFD, really Surely network function VNF tick interrupt accuracy requirement is virtualized;
    The NFV functional entitys determine hardware clock address according to the tick interrupt accuracy requirement for the VNF;
    The address of the hardware clock is sent to the VNF by the NFV functional entitys, so that the VNF is according to the hardware The address of clock accesses the hardware clock to obtain clock interrupt signal.
  2. 2. according to the method for claim 1, it is characterised in that the NFV functional entitys are that network function virtualizes layout Device NFVO or virtual network function manager VNFM.
  3. 3. according to the method for claim 2, it is characterised in that the NFV functional entitys are according to the tick interrupt precision Demand, before determining hardware clock address for the VNF, in addition to:
    The NFV functional entitys determine whether the VNF needs directly to access hardware according to VNF tick interrupt accuracy requirement Clock;
    If it is determined that the NFVO or VNFM needs directly to access hardware clock, then the NFVO or VNFM are that the VNF determines hard Part clock address.
  4. 4. according to the method for claim 2, it is characterised in that the NFV functional entitys are according to VNF tick interrupt precision Demand, hardware clock address is determined for the VNF, is specifically included:
    The NFVO or VNFM send inquiry request to clock address manager, and the mark of the VNF is carried in the inquiry request Know the identification information of the physical equipment of information and VNF mappings;
    The NFVO or VNFM receive the hardware clock address that the clock address manager returns.
  5. 5. according to the method for claim 4, it is characterised in that the NFV functional entitys receive the clock address management After the hardware clock address that device returns, in addition to:
    The NFVO or VNFM receive access of the VNF of the clock address manager return to the hardware clock address Cycle and access duration.
  6. 6. according to the method for claim 2, it is characterised in that the information of storage hardware clock on the NFV functional entitys, The NFV functional entitys determine hardware clock address for the VNF, specifically included according to VNF tick interrupt accuracy requirement:
    The NFVO is according to the information of the hardware clock of storage, when determining the hardware that the VNF can be accessed directly Clock address.
  7. 7. according to the method for claim 6, it is characterised in that when the NFV functional entitys are according to the hardware of storage The information of clock, after determining the hardware clock address that the NFV can be accessed directly, in addition to:
    The NFVO determines the VNF to the access cycle of the hardware clock address and accesses duration.
  8. 8. the method according to claim 5 or 7, it is characterised in that the NFV functional entitys are by the ground of the hardware clock Location is sent to after the VNF, in addition to:
    The VNF is sent to the VNF by the NFVO to the access cycle of the hardware clock address and access duration.
  9. 9. according to the method for claim 2, it is characterised in that the NFV functional entitys are according to the tick interrupt precision Demand, before determining hardware clock address for the VNF, in addition to:
    The NFVO is according to the tick interrupt accuracy requirement of the VNF, it is determined that meeting the virtualization basis of the VNF demands resource Infrastructure manager VIM;
    The NFVO sends resource reservation request to the VIM;
    The NFVO receives the resource reservation result that the VIM is returned, and the mark of physical equipment is carried in the resource reservation result Know.
  10. 10. according to the method for claim 9, it is characterised in that the NFVO receives the resource reservation knot that the VIM is returned Fruit, after the mark that physical equipment is carried in the resource reservation result, in addition to:
    The VNFM asks the VIM to create and start virtual machine.
  11. 11. the method according to claim 9 or 10, it is characterised in that the resource reservation result includes:The hardware Clock address;
    The NFV functional entitys are that the VNF determines hardware clock address, are specifically included:
    The NFVO obtains the hardware clock address from the resource reservation result.
  12. 12. according to the method for claim 11, it is characterised in that also include in the resource reservation result:Described VNF pairs The access cycle of the hardware clock address and access duration.
  13. 13. according to the method for claim 11, it is characterised in that the NFV functional entitys are from the resource reservation result After the middle acquisition hardware clock address, in addition to:
    The NFVO determines the VNF to the access cycle of the hardware clock address and accesses duration.
  14. 14. a kind of network function virtualizes NFV devices, it is characterised in that including:
    First determining module, for according to VNFD description informations, determining VNF tick interrupt accuracy requirement;
    Second determining module, for according to the tick interrupt accuracy requirement, hardware clock address to be determined for the VNF;
    Sending module, for the address of the hardware clock to be sent into the VNF, during so that the VNF is according to the hardware The address of clock accesses the hardware clock to obtain clock interrupt signal.
  15. 15. NFV devices according to claim 14, it is characterised in that the NFV devices are NFVO or VNFM.
  16. 16. NFV devices according to claim 15, it is characterised in that also include:
    3rd determining module, for, according to the tick interrupt accuracy requirement, being determined in second determining module for the VNF Before hardware clock address, according to VNF tick interrupt accuracy requirement, when determining whether the VNF needs directly to access hardware Clock;
    Second determining module is additionally operable to, however, it is determined that the NFVO or VNFM need directly to access hardware clock, then to be described VNF determines hardware clock address.
  17. 17. NFV devices according to claim 15, it is characterised in that the sending module is specifically used for:
    Inquiry request is sent to clock address manager, the identification information of the VNF and described is carried in the inquiry request The identification information of the physical equipment of VNF mappings;
    The NFV devices also include:First receiving module, during for receiving the hardware that the clock address manager returns Clock address.
  18. 18. NFV devices according to claim 17, it is characterised in that first receiving module, be additionally operable to described After two determining modules receive the hardware clock address that the clock address manager returns, the clock address pipe is received Manage access cycles and access duration of the VNF of device return to the hardware clock address.
  19. 19. NFV devices according to claim 15, it is characterised in that the NFV devices are the NFVO, then described NFVO also includes:
    Memory module, the information for storage hardware clock;
    Second determining module is specific:According to the information of the hardware clock of storage, determine that the VNF can be accessed directly The hardware clock address.
  20. 20. NFV devices according to claim 19, it is characterised in that the NFV devices are the NFVO, then described NFVO also includes:
    4th determining module, during for determining the hardware that the NFV can be accessed directly according to second determining module After clock address, the VNF is determined to the access cycle of the hardware clock address and accesses duration.
  21. 21. the NFV devices according to claim 18 or 20, it is characterised in that the NFV devices are the NFVO, then institute Sending module is stated, is additionally operable to after the address of the hardware clock is sent into the VNF, by the VNF to the hardware The access cycle of clock address and access duration are sent to the VNF.
  22. 22. NFV devices according to claim 15, it is characterised in that the NFV devices are the NFVO, then described NFVO also includes:
    5th determining module, for, according to the tick interrupt accuracy requirement, hardware being determined for the VNF in the second determining module Before clock address, according to the tick interrupt accuracy requirement of the VNF, it is determined that meeting the VIM of the VNF demands resource;
    The sending module is additionally operable to:Resource reservation request is sent to the VIM;
    Also include the second receiving module, for receiving the resource reservation result of the VIM returns, taken in the resource reservation result Mark with physical equipment.
  23. 23. NFV devices according to claim 22, it is characterised in that the NFV devices are the VNFM, then described VNFM also includes:Also include:Request module, for receiving the resource reservation knot of the VIM returns in the 5th determining module Fruit, after the mark that physical equipment is carried in the resource reservation result, the VIM is asked to create and start virtual machine.
  24. 24. the NFV devices according to claim 22 or 23, it is characterised in that the NFV devices are the NFVO, described Resource reservation result includes:The hardware clock address;
    Second determining module is specifically used for:The hardware clock address is obtained from the resource reservation result.
  25. 25. NFV devices according to claim 24, it is characterised in that also include in the resource reservation result:It is described VNF is to the access cycle of the hardware clock address and accesses duration.
  26. 26. NFV devices according to claim 24, it is characterised in that the NFV devices are the NFVO, then described NFVO also includes:
    6th determining module, for obtaining the hardware clock from the resource reservation result according to second determining module After address, the VNF is determined to the access cycle of the hardware clock address and accesses duration.
  27. 27. a kind of network function virtualizes NFV devices, it is characterised in that including:Processor and memory, the memory are deposited Execute instruction is stored up, when the acquisition system operation of the clock interrupt signal, is communicated between the processor and the memory, Execute instruction described in the computing device causes the acquisition system of the clock interrupt signal to perform such as claim 1~13 times Method described in one.
CN201480000618.6A 2014-02-10 2014-02-10 The acquisition methods and NFV devices of clock interrupt signal Active CN105103125B (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2014/071929 WO2015117278A1 (en) 2014-02-10 2014-02-10 Method for obtaining clock interruption signal, and nfv functional entity

Publications (2)

Publication Number Publication Date
CN105103125A CN105103125A (en) 2015-11-25
CN105103125B true CN105103125B (en) 2017-12-05

Family

ID=53777121

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201480000618.6A Active CN105103125B (en) 2014-02-10 2014-02-10 The acquisition methods and NFV devices of clock interrupt signal

Country Status (2)

Country Link
CN (1) CN105103125B (en)
WO (1) WO2015117278A1 (en)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105700961B (en) * 2016-02-29 2019-03-08 华为技术有限公司 Business container creation method and device
CN107357603B (en) * 2016-05-10 2020-10-16 华为技术有限公司 Software loading method, equipment and system
CN109314649A (en) * 2016-06-23 2019-02-05 英特尔Ip公司 Device and method for NFV life cycle management
CN109257240B (en) * 2017-07-12 2021-02-23 上海诺基亚贝尔股份有限公司 Method and device for monitoring performance of virtualized network functional unit
CN110333843B (en) * 2019-04-19 2023-03-24 中科创达(重庆)汽车科技有限公司 Method and device for realizing high-precision timer of virtual machine and electronic equipment

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101043253A (en) * 2006-06-26 2007-09-26 华为技术有限公司 Process for obtaining high-precision time
CN103139809A (en) * 2011-12-02 2013-06-05 中兴通讯股份有限公司 Clock synchronization method and device
CN103491129A (en) * 2013-07-05 2014-01-01 华为技术有限公司 Service node configuration method and service node pool logger and system
CN103561124A (en) * 2013-10-29 2014-02-05 上海华为技术有限公司 Base station data configuring method and device

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101043253A (en) * 2006-06-26 2007-09-26 华为技术有限公司 Process for obtaining high-precision time
CN103139809A (en) * 2011-12-02 2013-06-05 中兴通讯股份有限公司 Clock synchronization method and device
CN103491129A (en) * 2013-07-05 2014-01-01 华为技术有限公司 Service node configuration method and service node pool logger and system
CN103561124A (en) * 2013-10-29 2014-02-05 上海华为技术有限公司 Base station data configuring method and device

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
Network Functions Virtualization;Virtualization Requirements;etsi;《ETSI GS NFV》;20131031;第7-11页 *

Also Published As

Publication number Publication date
WO2015117278A1 (en) 2015-08-13
CN105103125A (en) 2015-11-25

Similar Documents

Publication Publication Date Title
US20230325237A1 (en) Methods and apparatus to automate deployments of software defined data centers
CN109194506B (en) Block chain network deployment method, platform and computer storage medium
CN112119374B (en) Selectively providing mutual transport layer security using alternate server names
US11301287B2 (en) Pattern-based orchestration of cloud provisioning tasks at runtime
US11321130B2 (en) Container orchestration in decentralized network computing environments
US11481239B2 (en) Apparatus and methods to incorporate external system to approve deployment provisioning
US9971593B2 (en) Interactive content development
CN104520814B (en) System and method for configuring cloud computing systems
US9619371B2 (en) Customized application performance testing of upgraded software
US10972540B2 (en) Requesting storage performance models for a configuration pattern of storage resources to deploy at a client computing environment
CN105103125B (en) The acquisition methods and NFV devices of clock interrupt signal
CN103795759B (en) The dispatching method and system of a kind of virtual machine image file
Munteanu et al. Multi-cloud resource management: cloud service interfacing
EP3042310A1 (en) Providing recursively-generated instantiated computing resource in a multi-tenant environment
US20180157542A1 (en) Methods and apparatus for event-based extensibility of system logic
US11880296B2 (en) Generating a test cluster for testing a container orchestration system
Walraven et al. PaaSHopper: Policy-driven middleware for multi-PaaS environments
US11243868B2 (en) Application containerization based on trace information
El-Omari Cloud IoT as a crucial enabler: a survey and taxonomy
US11847611B2 (en) Orchestrating and automating product deployment flow and lifecycle management
CN112698840B (en) Architecture system for realizing service for bank cloud platform
AU2022245375A1 (en) Reducing transaction aborts in execute-order-validate blockchain models
Muzumdar et al. Navigating the Docker Ecosystem: A Comprehensive Taxonomy and Survey
Sodhi et al. Appification of web applications: Architectural aspects
US20230394163A1 (en) Data cluster management

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant