CN105103125B - The acquisition methods and NFV devices of clock interrupt signal - Google Patents
The acquisition methods and NFV devices of clock interrupt signal Download PDFInfo
- Publication number
- CN105103125B CN105103125B CN201480000618.6A CN201480000618A CN105103125B CN 105103125 B CN105103125 B CN 105103125B CN 201480000618 A CN201480000618 A CN 201480000618A CN 105103125 B CN105103125 B CN 105103125B
- Authority
- CN
- China
- Prior art keywords
- vnf
- clock
- address
- hardware
- nfvo
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/46—Multiprogramming arrangements
- G06F9/48—Program initiating; Program switching, e.g. by interrupt
- G06F9/4806—Task transfer initiation or dispatching
- G06F9/4812—Task transfer initiation or dispatching by interrupt, e.g. masked
- G06F9/4825—Interrupt from clock, e.g. time of day
Landscapes
- Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Synchronisation In Digital Transmission Systems (AREA)
Abstract
The present invention provides a kind of acquisition methods and NFV functional entitys of clock interrupt signal, including:NFV functional entitys are according to VNFD description informations, determine VNF tick interrupt accuracy requirement, then, NFV functional entitys are according to tick interrupt accuracy requirement, hardware clock address is determined for VNF, identified hardware clock address is finally sent to VNF, VNF can access hardware clock according to the hardware clock address of acquisition, and obtain clock interrupt signal.Client operating system software clock interrupt signal of the technical scheme without producing virtual machine by virtual machine call bottom hardware clock interrupt signal, software clock interrupt signal is supplied to clock signal transmission processes of the VNF for the scheduling of VNF configuration processors again, so as to avoid the delay of clock signal and delay jitter, the promptness that interrupt signal performs is ensure that, and ensures that program is dispatched in time.
Description
Technical field
The present invention relates to the communication technology, more particularly to a kind of acquisition methods of clock interrupt signal and NFV functional entitys.
Background technology
With the data of intelligent terminal and support 3rd generation mobile communication technology (the 3rd-Generation, abbreviation 3G)
The fast development of card/notebook computer, interior exponentially type increases in the past few years for mobile Internet business.Increasingly increase to deal with
Long data traffic, operators propose network function virtualization (Network Functions Virtualization, letter
Claim NFV) concept, NFV main design thought is that hardware platform use generic server, on server operation virtualize soft
Part simultaneously generates virtual machine, and various network elements are operated among virtual machine in the form of software.Using this framework, operator will safeguard
One unified virtual platform, and different network elements will be operated on virtual platform in the form of virtual machine, increase net newly
The upgrading of member or network element is then presented as the importing of new virtual machine or the change of software version in virtual machine.It is simultaneously as virtual
Change technology shields the difference of bottom physical platform, will be readily solved across the hardware resource sharing problem of producer.Also, utilize void
The characteristics such as plan machine dynamic migration, dynamic generation, with reference to the intelligent management to virtual platform, net is realized according to the change of portfolio
The dynamic capacity-expanding of member, capacity reducing, so as to realize the utilization more efficient to hardware resource.
In the prior art, in NFV virtual environment, clock interrupt signal caused by bottom hardware, it is desirable to provide to virtual
Machine, virtualization network function (Virtualized Network are transferred to by virtual machine simulation softward clock interrupt signal
Function, abbreviation VNF), and this process be able to can not ensure to be dispatched in time due to the software clock simulation program of virtual machine
The clock signal for causing virtual network function to obtain postpones, so as to cause program not dispatched in time.Particularly with nothing
Application much higher to real-time and clock accuracy requirement or network function, this delay meeting of clock signal in gauze network
Processing of the network function to business is influenceed, reduces network performance.
The content of the invention
The embodiment of the present invention provides a kind of acquisition methods and NFV functional entitys of clock interrupt signal, has solved due to adjusting
Delay and the delay jitter of caused clock signal with bottom hardware clock interrupt signal.
First aspect present invention provides a kind of acquisition methods of clock interrupt signal, including:
Network function virtualizes description letter of the NFV functional entitys in virtual network function requirement description file VNFD
Breath, it is determined that virtualization network function VNF tick interrupt accuracy requirement;
The NFV functional entitys determine hardware clock address according to the tick interrupt accuracy requirement for the VNF;
The address of the hardware clock is sent to the VNF by the NFV functional entitys, so that the VNF is according to
The address of hardware clock accesses the hardware clock to obtain clock interrupt signal.
In the first possible implementation of first aspect, the NFV functional entitys are that network function virtualizes layout
Device NFVO or virtual network function manager VNFM.
With reference to the first possible implementation of first aspect, in second of possible implementation of first aspect, institute
NFV functional entitys are stated according to the tick interrupt accuracy requirement, before determining hardware clock address for the VNF, in addition to:
The NFV functional entitys determine whether the VNF needs directly to access according to VNF tick interrupt accuracy requirement
Hardware clock;
If it is determined that the NFVO or VNFM needs directly to access hardware clock, then the NFVO or VNFM are that the VNF is true
Determine hardware clock address.
With reference to the first possible implementation of first aspect, in the third possible implementation of first aspect, institute
Tick interrupt accuracy requirement of the NFV functional entitys according to VNF is stated, hardware clock address is determined for the VNF, specifically includes:
The NFVO or VNFM send inquiry request to clock address manager, and the VNF is carried in the inquiry request
Identification information and the VNF mapping physical equipment identification information;
The NFVO or VNFM receive the hardware clock address that the clock address manager returns.
With reference to the third possible implementation of first aspect, in the 4th kind of possible implementation of first aspect, institute
After stating the hardware clock address that NFV functional entitys receive the clock address manager return, in addition to:
The NFVO or VNFM receive the VNF of the clock address manager return to the hardware clock address
Access cycle and access duration.
With reference to the first possible implementation of first aspect, in the 5th kind of possible implementation of first aspect, institute
The information of storage hardware clock on NFV functional entitys is stated, the NFV functional entitys are according to VNF tick interrupt accuracy requirement
The VNF determines hardware clock address, specifically includes:
For the NFVO according to the information of the hardware clock of storage, determine that the VNF can be accessed directly is described hard
Part clock address.
With reference to the 5th kind of possible implementation of first aspect, in the 6th kind of possible implementation of first aspect, institute
Information of the NFV functional entitys according to the hardware clock of storage is stated, when determining the hardware that the NFV can be accessed directly
After clock address, in addition to:
The NFVO determines the VNF to the access cycle of the hardware clock address and accesses duration.
With reference to the 4th kind of first aspect or the 6th kind of possible implementation, the 7th kind in first aspect may realization side
In formula, after the address of the hardware clock is sent to the VNF by the NFV functional entitys, in addition to:
The VNF is sent to the VNF by the NFVO to the access cycle of the hardware clock address and access duration.
With reference to the first possible implementation of first aspect, in the 8th kind of possible implementation of first aspect, institute
NFV functional entitys are stated according to the tick interrupt accuracy requirement, before determining hardware clock address for the VNF, in addition to:
The NFVO is according to the tick interrupt accuracy requirement of the VNF, it is determined that meeting the virtualization of the VNF demands resource
Infrastructure manager VIM;
The NFVO sends resource reservation request to the VIM;
The NFVO receives the resource reservation result that the VIM is returned, and physical equipment is carried in the resource reservation result
Mark.
With reference to the 8th kind of possible implementation of first aspect, in the 9th kind of possible implementation of first aspect, institute
State NFVO and receive the resource reservation result that the VIM is returned, after the mark that physical equipment is carried in the resource reservation result,
Also include:
The VNFM asks the VIM to create and start virtual machine.
With reference to the 8th kind of first aspect or the 9th kind of possible implementation, the tenth kind in first aspect may realization side
In formula, the resource reservation result includes:The hardware clock address;
The NFV functional entitys are that the VNF determines hardware clock address, are specifically included:
The NFVO obtains the hardware clock address from the resource reservation result.
With reference to the tenth kind of possible implementation of first aspect, in a kind of the tenth possible implementation of first aspect,
Also include in the resource reservation result:The VNF is to the access cycle of the hardware clock address and accesses duration.
With reference to the tenth kind of possible implementation of first aspect, in the 12nd kind of possible implementation of first aspect,
After the NFV functional entitys obtain the hardware clock address from the resource reservation result, in addition to:
The NFVO determines the VNF to the access cycle of the hardware clock address and accesses duration.
Second aspect of the present invention provides a kind of network function virtualization NFV functional entitys, including:
First determining module, for according to VNFD description informations, determining VNF tick interrupt accuracy requirement;
Second determining module, for according to the tick interrupt accuracy requirement, hardware clock address to be determined for the VNF;
Sending module, for the address of the hardware clock to be sent into the VNF, so that the VNF is according to described hard
The address of part clock accesses the hardware clock to obtain clock interrupt signal.
In second of possible implementation of second aspect, the NFV functional entitys are NFVO or VNFM.
With reference to the first possible implementation of second aspect, in second of possible implementation of second aspect, go back
Including:
3rd determining module, in second determining module according to the tick interrupt accuracy requirement, be the VNF
Before determining hardware clock address, according to VNF tick interrupt accuracy requirement, determine whether the VNF needs directly to access firmly
Part clock;
Second determining module is additionally operable to, however, it is determined that the NFVO or VNFM need directly access hardware clock, then for
The VNF determines hardware clock address.
With reference to the first possible implementation of second aspect, in the third possible implementation of second aspect, institute
Sending module is stated to be specifically used for:
Send inquiry request to clock address manager, carry in the inquiry request VNF identification information and
The identification information of the physical equipment of the VNF mappings;
The NFV functional entitys also include:First receiving module, the institute returned for receiving the clock address manager
State hardware clock address.
With reference to the third possible implementation of second aspect, in the 4th kind of possible implementation of second aspect, institute
The first receiving module is stated, is additionally operable to when second determining module receives the hardware that the clock address manager returns
After clock address, receive the VNF that the clock address manager returns to the access cycle of the hardware clock address and
Access duration.
With reference to the first possible implementation of second aspect, in the 5th kind of possible implementation of second aspect, institute
It is the NFVO to state NFV functional entitys, then the NFVO also includes:
Memory module, the information for storage hardware clock;
Second determining module is specific:According to the information of the hardware clock of storage, determine that the VNF can be direct
The hardware clock address accessed.
With reference to the 5th kind of possible implementation of second aspect, in the 6th kind of possible implementation of second aspect, institute
It is the NFVO to state NFV functional entitys, then the NFVO also includes:
4th determining module, for according to second determining module determine that the NFV can access directly it is described hard
After part clock address, the VNF is determined to the access cycle of the hardware clock address and accesses duration.
With reference to the 4th kind of second aspect or the 6th kind of possible implementation, the 7th kind in second aspect may realization side
In formula, the NFV functional entitys are the NFVO, then the sending module, are additionally operable to send out by the address of the hardware clock
After giving the VNF, the VNF is sent to the VNF to the access cycle of the hardware clock address and access duration.
With reference to the first possible implementation of second aspect, in the 8th kind of possible implementation of second aspect, institute
It is the NFVO to state NFV functional entitys, then the NFVO also includes:
5th determining module, for, according to the tick interrupt accuracy requirement, being determined in the second determining module for the VNF
Before hardware clock address, according to the tick interrupt accuracy requirement of the VNF, it is determined that meeting the VIM of the VNF demands resource;
The sending module is additionally operable to:Resource reservation request is sent to the VIM;
Also include the second receiving module, the resource reservation result returned for receiving the VIM, the resource reservation result
The middle mark for carrying physical equipment.
With reference to the 8th kind of possible implementation of second aspect, in the 9th kind of possible implementation of second aspect, institute
It is the VNFM to state NFV functional entitys, then the VNFM also includes:Also include:Request module, for determining mould the described 5th
Block receives the resource reservation result that the VIM is returned, after the mark that physical equipment is carried in the resource reservation result, request
The VIM creates and started virtual machine.
With reference to the 8th kind of second aspect or the 9th kind of possible implementation, the tenth kind in second aspect may realization side
In formula, the NFV functional entitys are the NFVO, and the resource reservation result includes:The hardware clock address;
Second determining module is specifically used for:The hardware clock address is obtained from the resource reservation result.
With reference to the tenth kind of possible implementation of second aspect, in a kind of the tenth possible implementation of second aspect,
Also include in the resource reservation result:The VNF is to the access cycle of the hardware clock address and accesses duration.
With reference to the tenth kind of possible implementation of second aspect, in the 12nd kind of possible implementation of second aspect,
The NFV functional entitys are the NFVO, then the NFVO also includes:
6th determining module, for obtaining the hardware from the resource reservation result according to second determining module
After clock address, the VNF is determined to the access cycle of the hardware clock address and accesses duration.
Third aspect present invention provides a kind of network function virtualization NFV functional entitys, including:Processor and memory,
The memory storage execute instruction, when the acquisition system operation of the clock interrupt signal, the processor is deposited with described
Communicated between reservoir, execute instruction described in the computing device causes the acquisition system of the clock interrupt signal to perform as weighed
Profit requires the method described in 1~13 any one.
The embodiments of the invention provide a kind of acquisition methods of clock interrupt signal and NFV functional entitys, NFV functional entitys
According to VNFD description informations, VNF tick interrupt accuracy requirement is determined, then, NFV functional entitys are according to tick interrupt precision need
Ask, determine hardware clock address for VNF, identified hardware clock address is finally sent to VNF, VNF can be according to acquisition
Hardware clock address access hardware clock, and obtain clock interrupt signal.During without by virtual machine call bottom hardware
Clock interrupt signal and produce the client operating system software clock interrupt signal of virtual machine, then software clock interrupt signal is provided
The clock signal transmission process of VNF configuration processors scheduling is supplied to VNF, is trembled so as to avoid the delay of clock signal and delay
It is dynamic, the promptness that interrupt signal performs is ensure that, and ensure that program is dispatched in time.
Brief description of the drawings
In order to illustrate more clearly about the embodiment of the present invention or technical scheme of the prior art, below will be to embodiment or existing
There is the required accompanying drawing used in technology description to be briefly described, it should be apparent that, drawings in the following description are this hairs
Some bright embodiments, for those of ordinary skill in the art, without having to pay creative labor, can be with
Other accompanying drawings are obtained according to these accompanying drawings.
Fig. 1 is the flow chart of the acquisition methods for the clock interrupt signal that the embodiment of the present invention one provides;
Fig. 2 is the flow chart one of the acquisition methods for the clock interrupt signal that the embodiment of the present invention two provides;
Fig. 3 is the framework and interface diagram one of the acquisition methods for the clock interrupt signal that the embodiment of the present invention two provides;
Fig. 4 is the framework and interface diagram two of the acquisition methods for the clock interrupt signal that the embodiment of the present invention two provides;
Fig. 5 is the framework and interface diagram three of the acquisition methods for the clock interrupt signal that the embodiment of the present invention two provides;
Fig. 6 is the framework and interface diagram four of the acquisition methods for the clock interrupt signal that the embodiment of the present invention two provides;
Fig. 7 is the acquisition methods flowchart 2 for the clock interrupt signal that the embodiment of the present invention two provides;
Fig. 8 is the acquisition methods flow chart for the clock interrupt signal that the embodiment of the present invention three provides;
Fig. 9 is the framework and interface diagram one of the acquisition methods for the clock interrupt signal that the embodiment of the present invention three provides;
Figure 10 is the framework and interface diagram two of the acquisition methods for the clock interrupt signal that the embodiment of the present invention three provides;
Figure 11 is the acquisition methods flow chart for the clock interrupt signal that the embodiment of the present invention four provides;
Figure 12 is the framework and interface diagram one of the acquisition methods for the clock interrupt signal that the embodiment of the present invention four provides;
Figure 13 is the framework and interface diagram two of the acquisition methods for the clock interrupt signal that the embodiment of the present invention four provides;
Figure 14 is the structural representation that a kind of network function that the embodiment of the present invention five provides virtualizes NFV functional entitys
One;
Figure 15 is the structural representation that a kind of network function that the embodiment of the present invention five provides virtualizes NFV functional entitys
Two;
Figure 16 is the structural representation that a kind of network function that the embodiment of the present invention five provides virtualizes NFV functional entitys
Three;
Figure 17 is the structural representation that a kind of network function that the embodiment of the present invention five provides virtualizes NFV functional entitys
Four;
Figure 18 is the structural representation that a kind of network function that the embodiment of the present invention five provides virtualizes NFV functional entitys
Five;
Figure 19 is the structural representation that a kind of network function that the embodiment of the present invention five provides virtualizes NFV functional entitys
Six;
Figure 20 is the structural representation that a kind of network function that the embodiment of the present invention five provides virtualizes NFV functional entitys
Seven;
Figure 21 is the structural representation that a kind of network function that the embodiment of the present invention five provides virtualizes NFV functional entitys
Eight;
Figure 22 show a kind of schematic diagram of network function virtualization NFV functional entitys of the offer of the embodiment of the present invention six.
Embodiment
To make the purpose of the embodiment of the present invention:Technical scheme and advantage are clearer, below in conjunction with the embodiment of the present invention
In accompanying drawing, the technical scheme in the embodiment of the present invention is clearly and completely described, it is clear that described embodiment is
Part of the embodiment of the present invention, rather than whole embodiments.Based on the embodiment in the present invention, those of ordinary skill in the art
The every other embodiment obtained under the premise of creative work is not made, belongs to the scope of protection of the invention.
Fig. 1 is the acquisition methods flow chart for the clock interrupt signal that the embodiment of the present invention one provides, as shown in figure 1, the party
Method includes:
Step 101:Network function virtualizes NFV functional entitys according to virtual network function requirement description file
(Virtualized Network Function Descriptor, abbreviation VNFD) description information, determine VNF tick interrupt
Accuracy requirement;
Wherein, NFV functional entitys can be that network function virtualizes composer (Network Function
Virtualized Orchestrator, abbreviation NFVO) or virtual network function manager (Virtualized Network
Function Manager, abbreviation VNFM).The information of VNFD descriptions specifically includes matches somebody with somebody to VNF deployment behaviors and operation behavior
Put, wherein deployment behavior includes but is not limited to the deployed environment of VNF requirements, in particular to VNF virtualizes basis to network function
The demand of facility (Network Function Virtualized Infrastructure, abbreviation NFVI) resource, such as virtual machine
Number, virtual machine map (image) number, the computing resource needed and storage resource etc..Operation behavior is mainly VNF Life Cycles
Behavior during period management, including but not limited to VNF topology, the function of starting and close, matched with VNF life cycle events
Property script etc..
VNFD is to be sent to NFVO by third party entity during VNF loads (on-boarding), is carried by NFVO
It is sent in NFV catalogues storehouse, NFVO reads VNFD when needing from NFV catalogues storehouse.
Here third party entity can be entity or the service provider that any one represents VNF providers
An entity in management domain.
VNF tick interrupt precision refers to VNF to the frequency of tick interrupt and the demand of frequency stability.
Step 102:NFV functional entitys determine hardware clock address according to tick interrupt accuracy requirement for VNF;
Specifically, NFV functional entitys can determine whether VNF needs directly according to VNF tick interrupt accuracy requirement first
Hardware clock is asked in receiving, if it is determined that VNF needs directly to access hardware clock, then as a kind of feasible embodiment, NFVO
Or VNFM can send inquiry request to clock address manager, carry VNF identification information in the inquiry request and VNF reflects
The identification information for the physical equipment penetrated, the addressable hardware of VNF that then NFVO or VNFM reception clock address manager returns
Clock address, and VNF access the access cycle of hardware clock and access duration.
As another feasible embodiment, the upper information that can also prestore hardware clock of NFVO, so as to NFVO
The hardware clock address that VNF can be accessed directly can be determined directly according to the information of the hardware clock of storage, can be with
VNF is further determined that to the access cycle of hardware clock and accesses duration.
Wherein, the hardware clock address manager can be business support system/OSS (Business
Support system/Operation support system, abbreviation OSS/BSS), NFVO, VNFM or virtualization basis
Infrastructure manager (Virtualized Infrastructure Manager, abbreviation VIM) etc., the present invention does not limit it.
Step 103:The address of hardware clock is sent to VNF by NFV functional entitys, so that ground of the VNF according to hardware clock
Location accesses hardware clock to obtain clock interrupt signal.
The hardware clock address and the visit of hardware clock that NFV functional entitys return to the clock address manager received
Ask the cycle and access duration and be sent to VNF, then VNF is obtained in clock according to the addressable hardware clock address received
Break signal.
The acquisition methods of clock interrupt signal provided by the invention, NFV functional entitys according to VNFD description informations, it is determined that
VNF tick interrupt accuracy requirement, then, NFV functional entitys determine hardware clock according to tick interrupt accuracy requirement for VNF
Address, is finally sent to VNF by identified hardware clock address, and VNF can access hard according to the hardware clock address of acquisition
Part clock, and obtain clock interrupt signal.It is virtual without being produced by virtual machine call bottom hardware clock interrupt signal
The client operating system software clock interrupt signal of machine, then it is supplied to VNF to be adjusted for VNF configuration processors software clock interrupt signal
The clock signal transmission process of degree, so as to avoid the delay of clock signal and delay jitter, it ensure that interrupt signal performs
Promptness, and ensure that program is dispatched in time.
Fig. 2 is the acquisition methods flow chart one for the clock interrupt signal that the embodiment of the present invention two provides, as shown in Fig. 2 this
In the implement scene that embodiment provides, clock address manager is safeguarded by OSS/BSS systems or clock address server, and
And asked from NFVO to clock address manager tranmitting data register address lookup, this method includes:
Step 200:Increase VNF in VNFD to the requirement description of tick interrupt precision, by VNF loading procedures, by the
VNFD is sent to NFVO by tripartite's entity, VNFD is submitted in VNF catalogues by NFVO, so that NFVO and VNFM can be obtained
VNF synchronisation requirement.
Wherein, third party entity can be the entity or service provider's pipe that any one represents VNF providers
Manage an entity in domain.
VNFD is the configuration template of a description VNF deployment and operation behavior, specifically includes and disposes behavior and operation to VNF
The description of behavior configuration, wherein deployment behavior includes but is not limited to the deployed environment of VNF requirements, in particular to VNF provides to NFVI
The demand in source, such as virtual machine number, virtual machine map (image) number, the computing resource needed and storage resource etc..Operation row
To be mainly the behavior in VNF life cycle management process, including but not limited to VNF topologys, start and close, with VNF life
Function script of periodic event matching etc..
Step 201:NFVO receives the instantiation VNF of trigger Sender transmissions request.
The request is used to instantiate a new VNF;
Wherein, Sender can be OSS, Element management system (Element Management System, abbreviation EMS),
VNFM。
Step 202:The validity of the request for the instantiation VNF that the Sender that NFVO checkings receive is sent;
Wherein, validity refers to the legitimacy of VNF requests, and including but not limited to Sender legitimacy and instantiation is asked
The legitimacy of itself, specifically, Sender legitimacy, which refers to whether Sender is authorized to, sends the request;Instantiation request is originally
The legitimacy of body refers to whether the security parameter that the request carries can prove that the request is legal, is not distorted by third party
's.
Step 203:NFVO reads VNFD from VNF catalogues, including reads demands of the VNF to tick interrupt.
Step 204:NFVO generates a VNF example item, and the example item of generation is increased into " NFV examples (NFV
Instances) " in database.
It is real to VNF according to the VNF examples item that VNF examples item is specifically used for the NFVO and/or VNFM between VNF example runtimes
The relevant information of example is inquired about and safeguarded.The relevant information of VNF examples specifically refers to NFVI resources, the VNF that VNF examples use
The running status of virtual machine corresponding to example, performance etc..
Step 205a:NFVO submits instantiation parameter to VNFM.
Instantiating parameter includes the related parameter of the application parameter related to non-application, wherein referring to using related parameter
The parameter of the application correlation operated on VNF, such as the handling capacity of VNF and/or the virtual machine business to be met for disposing VNF, net
The parameters such as network bandwidth;The related parameter of non-application refers to the configuration parameter related to VNF deployment behaviors and operation behavior, is specifically
Refer to demands of the VNF to NFVI resources and the restriction and description to behavior in VNF life cycle management process.Instantiate parameter and
VNFD is used for the resource to disposing VNF together and VNF instantiation process carries out requirement description and demand limits.
Step 205b-205c:VNFM obtains VNFD and test case parameter, if desired can be to instantiating parameter
Carry out some modifications.
Specifically refer to, when the VNF instantiation parameters and the demand information and/or NFVO described in VNFD that are pre-seted in VNFM
Submit to VNFM instantiation parameter it is inconsistent when, VNFM can modify to inconsistent instantiation parameter.
In step 203, NFVO is possible to directly read the increased phase to tick interrupt requirement description in VNFD
Information is closed, VNFM can parse tick interrupt demand from VNFD, be sent to NFVO in this step.
Step 206a:NFVO selects a VIM for thinking that the resource of meet demand can be provided to VNF.
" NFVI resources (NFVI resource) " database includes the record to NFVI server-capabilities, specifically includes
The resource description that NFVI servers can provide, including all resources, the resource, remaining available that provides that can be provided
Resource and resource etc. is reserved.
NFVO is according to " record in NFVI resource " databases, the NFVI services of selection one VIM, the VIM management
The ability of device disclosure satisfy that VNF demand.Here demand is specifically referred in demand and instantiation parameter described in VNFD
The demand of restriction.
Step 206b:NFVO to VIM send resource reservation request, wherein not only include VNF to calculate, store and network provide
The demand in source, in addition to (whether VNF needs directly to access in hardware clock equipment acquisition clock demands of the VNF to tick interrupt
It is disconnected).
Step 206c:VIM checks the state of managed resource, returns to resource reservation result.Wherein, VIM is except considering
The state of calculating, storage and Internet resources, it is also contemplated that the state of the clockwork resource managed, if clockwork loads
It is larger, step 206d can be performed, that is, returns to resource reservation and is unsuccessfully indicated to NFVO, NFVO re-executes step 200-206c,
Until selecting suitable VIM.
Step 207a:If VNF need using directly access hardware clock equipment by the way of obtain tick interrupt NFVO to
Clock address manager sends inquiry request, and VNF identity number (Identity, abbreviation ID) is carried in inquiry request,
ID (one or more may be included) information of the physical equipment of mapping.
Step 207b-207c:Clock address manager can be accessed directly hard according to inquiry request, local search VNF
Part clock address, and confirm VNF access rights, NFVO is returned result to, as a result includes the address of hardware clock, also may be used
To access the configuration information in the cycle of hardware clock and duration including VNF.
Step 208:NFVO sends VNF instantiation requests to VNFM, wherein carrying corresponding VIM mark (such as unified money
Source finger URL (Uniform Resource Locator, abbreviation URL etc.) and hardware clock address and configuration information instruction.
Optionally, NFVO can also configure cycle and the duration that VNF accesses hardware clock in this step.
Step 209a-209b:VNFM requests VIM is that VNF distributes resource.
Step 210a-210b:VNFM asks VIM to create and start virtual machine, including installation software program package according to VNFD,
Perform and start shell script, send configuration data, and virtual machine is connected to network etc..
Step 211:The hardware clock address that VNFM instructions VNF can be accessed directly, access cycle and duration.
Step 212:VNF accesses hardware clock according to VNFM instruction, obtains hardware clock interrupt, program is adjusted
Degree.
Step 213:VNFM returns to VNF and instantiates result to NFVO.
Step 214a-214b:The VNF instantiation results that NFVO returns according to VNFM carry out resource status renewal.
Step 215:NFVO renewal " NFV Instances " and " NFVI resource " databases.
Step 216:NFVO returns to VNF and instantiates result to Sender.
Clock address manager in the present embodiment safeguarded by OSS/BSS systems or clock address server, specifically
, can be the EMS in OSS/BSS systems to safeguard, and can be connected between clock module and hardware by interface, such as scheme
Shown in 3, can also integrated clock module within hardware, as shown in figure 4, or clock address manager by clock address server
To safeguard, wherein state and the address of each clock module/equipment in network are responsible for and safeguarded to clock module server.
And can be connected between clock module and hardware by interface, as shown in figure 5, can also integrated clock module within hardware,
As shown in Figure 6.
The acquisition methods of clock interrupt signal provided in an embodiment of the present invention, NFV functional entitys according to VNFD description informations,
VNF tick interrupt accuracy requirement is determined, then, NFV functional entitys determine hardware according to tick interrupt accuracy requirement for VNF
Clock address, is finally sent to VNF by identified hardware clock address, and VNF can visit according to the hardware clock address of acquisition
Hardware clock is asked, and obtains clock interrupt signal.Without being produced by virtual machine call bottom hardware clock interrupt signal
The client operating system software clock interrupt signal of virtual machine, then it is supplied to VNF to perform journey for VNF software clock interrupt signal
The clock signal transmission process of sequence scheduling, so as to avoid the delay of clock signal and delay jitter, ensure that interrupt signal
The promptness of execution, and ensure that program is dispatched in time.
Fig. 7 is the acquisition methods flowchart 2 for the clock interrupt signal that the embodiment of the present invention two provides, as shown in fig. 7, this
In the implement scene that embodiment provides, clock address manager is safeguarded by OSS/BSS systems or clock address server, and
And asked from VNFM to clock address manager tranmitting data register address lookup, this method includes:
Step 300:Increase VNF in VNFD to the requirement description of tick interrupt precision, by VNF loading procedures, by the
VNFD is sent to NFVO by tripartite's entity, VNFD is submitted in VNF catalogues by NFVO, so that NFVO and VNFM can be obtained
VNF synchronisation requirement.
Wherein, third party entity can be entity or the service provider that any one represents VNF providers
An entity in management domain.
VNFD refers to the configuration template of a description VNF deployment and operation behavior, specifically includes and disposes behavior and behaviour to VNF
Make behavior configuration description, wherein deployment behavior include but is not limited to VNF requirement deployed environment, in particular to VNF to NFVI
The demand of resource, such as virtual machine number, virtual machine map (image) number, the computing resource needed and storage resource etc..Operation
Behavior is mainly the behavior in VNF life cycle management process, including but not limited to VNF topologys, starts and closes, given birth to VNF
Order function script of periodic event matching etc..
Step 301:NFVO receives the instantiation VNF of Sender transmissions request.
The request is used to instantiate a new VNF;
Wherein, Sender can be OSS, EMS, VNFM.
Step 302:The validity of the request for the instantiation VNF that the Sender that NFVO checkings receive is sent.
Wherein, validity refers to the legitimacy of VNF requests, and including but not limited to Sender legitimacy and instantiation is asked
The legitimacy of itself, specifically, Sender legitimacy, which refers to whether Sender is authorized to, sends the request;Instantiation request is originally
The legitimacy of body refers to whether the security parameter that the request carries can prove that the request is legal, is not distorted by third party
's.
Step 303:NFVO reads VNFD from VNF catalogues, including reads demands of the VNF to tick interrupt.
Step 304:NFVO generates a VNF example item, and the example item of generation is increased into " NFV Instances " numbers
According in storehouse.
Wherein, it is right according to the VNF example items to be specifically used for the NFVO and/or VNFM between VNF example runtimes for VNF examples item
The relevant information of VNF examples is inquired about and safeguarded.The relevant information of VNF examples specifically refers to the NFVI moneys that VNF examples use
The running status of virtual machine, performance etc. corresponding to source, VNF examples.
Step 305a:NFVO submits instantiation parameter to VNFM.
Wherein, instantiating parameter includes the related parameter of the application parameter related to non-application, wherein using related ginseng
Number refers to operate in the parameter of the application correlation on VNF, such as handling up for VNF and/or deployment VNF the virtual machine business to be met
The parameters such as amount, network bandwidth;The related parameter of non-application refers to the configuration parameter related to VNF deployment behaviors and operation behavior,
Specifically refer to restrictions and description of the VNF to the demand of NFVI resources and to behavior in VNF life cycle management process.Instantiation
Parameter and VNFD are used for the resource to disposing VNF together and VNF instantiation process carries out requirement description and demand limits.
Step 305b-305c:VNFM obtains VNFD and test case parameter, if desired can be to instantiating parameter
Carry out some modifications.
Specifically refer to, when the VNF instantiation parameters and the demand information and/or NFVO described in VNFD that are pre-seted in VNFM
Submit to VNFM instantiation parameter it is inconsistent when, VNFM can modify to inconsistent instantiation parameter.
In step 303, NFVO is possible to directly read the increased phase to tick interrupt requirement description in VNFD
Information is closed, VNFM can parse tick interrupt demand from VNFD, be sent to NFVO in this step.
Step 306a:NFVO selects a VIM for thinking that meet demand resource can be provided to VNF.
Wherein, " NFVI resource " databases include the record to NFVI server-capabilities, specifically include NFVI clothes
The resource description that can provide of business device, including can provide all resources, provide resource, remaining available resource with
And resource etc. is reserved.
NFVO is according to " record in NFVI resource " databases, the NFVI services of selection one VIM, the VIM management
The ability of device disclosure satisfy that VNF demand.Here demand is specifically referred in demand and instantiation parameter described in VNFD
The demand of restriction.
Step 306b:NFVO to VIM send resource reservation request, wherein not only include VNF to calculate, store and network provide
The demand in source, in addition to (whether VNF needs directly to access in hardware clock equipment acquisition clock demands of the VNF to tick interrupt
It is disconnected).
Step 306c:VIM checks the state of managed resource, returns to resource reservation result.Wherein, VIM is except considering
The state of calculating, storage and Internet resources, it is also contemplated that the state of the clockwork resource managed, if clockwork loads
It is larger, step 306d can be performed, that is, returns to resource reservation and is unsuccessfully indicated to NFVO, NFVO re-executes step 300-306c,
Until selecting suitable VIM.
Step 307:NFVO sends VNF instantiation requests to VNFM, wherein carrying corresponding VIM mark (such as URL).
Step 308a-308b:VNFM asks VIM to distribute resource to VNF.
Step 309a-309b:VNFM asks VIM to create and start virtual machine, including installation software program package according to VNFD,
Perform and start shell script, send configuration data, and VM is connected to network etc..
Step 310a:If VNF needs to obtain tick interrupt using by the way of directly access hardware clock equipment, VNFM to
Clock address manager sends inquiry request, carries VNF ID, the ID (may include one or more) of the physical equipment of mapping
Information.
VNFM also needs to the address to NFVO request clock address managers, is inquired about to be sent to clock address manager
Request;
Or in step 307, NFVO carries clock address manager when sending VNF instantiation requests to VNFM
Address.
Step 310b-310c:The hardware clock that clock address manager can be accessed directly according to request local search VNF
Address, and confirm VNF access rights, return result to VNFM, as a result include the address of hardware clock, can also wrap
Include VNF and access the cycle of hardware clock and the configuration information of duration.
Step 311:The hardware clock address that VNFM instructions VNF can be accessed directly, access cycle and duration.
Optionally, VNFM can also configure cycle and the duration that VNF accesses hardware clock in this step.
Step 312:VNF accesses hardware clock according to VNFM instruction, obtains hardware clock interrupt, program is adjusted
Degree.
Step 313:VNFM returns to VNF and instantiates result to NFVO.
Step 314a-314b:The VNF instantiation results that NFVO returns according to VNFM carry out resource status renewal.
Step 315:NFVO renewal " NFV Instances " and " NFVI resource " databases.
Step 316:NFVO returns to VNF and instantiates result to Sender.
Clock address manager in the present embodiment safeguarded by OSS/BSS systems or clock address server, specifically
, can be the EMS in OSS/BSS systems to safeguard, and can be connected between clock module and hardware by interface, such as scheme
Shown in 3, can also integrated clock module within hardware, as shown in figure 4, or clock address manager by clock address server
To safeguard, wherein state and the address of each clock module/equipment in network are responsible for and safeguarded to clock module server.
And can be connected between clock module and hardware by interface, as shown in figure 5, can also integrated clock module within hardware,
As shown in Figure 6.
The acquisition methods of clock interrupt signal provided in an embodiment of the present invention, NFV functional entitys according to VNFD description informations,
VNF tick interrupt accuracy requirement is determined, then, NFV functional entitys determine hardware according to tick interrupt accuracy requirement for VNF
Clock address, is finally sent to VNF by identified hardware clock address, and VNF can visit according to the hardware clock address of acquisition
Hardware clock is asked, and obtains clock interrupt signal.Without being produced by virtual machine call bottom hardware clock interrupt signal
The client operating system software clock interrupt signal of virtual machine, then it is supplied to VNF to perform journey for VNF software clock interrupt signal
The clock signal transmission process of sequence scheduling, so as to avoid the delay of clock signal and delay jitter, ensure that interrupt signal
The promptness of execution, and ensure that program is dispatched in time.
Fig. 8 is the acquisition methods flow chart for the clock interrupt signal that the embodiment of the present invention three provides, as shown in figure 8, this reality
In the implement scene for applying example offer, clock address manager is safeguarded that this method includes by NFVO:
Step 400:Increase VNF in VNFD to the requirement description of tick interrupt precision, by VNF loading procedures, by the
VNFD is sent to NFVO by tripartite's entity, and VNFD is submitted in VNF catalogues by NFVO, so that NFVO and VNFM obtains VNF's
Synchronisation requirement.
Wherein, third party entity can be entity or the service provider that any one represents VNF providers
An entity in management domain.
VNFD refers to the configuration template of a description VNF deployment and operation behavior, specifically includes and disposes behavior and behaviour to VNF
Make behavior configuration description, wherein deployment behavior include but is not limited to VNF requirement deployed environment, in particular to VNF to NFVI
The demand of resource, such as virtual machine number, virtual machine map (image) number, the computing resource needed and storage resource etc..Operation
Behavior is mainly the behavior in VNF life cycle management process, including but not limited to VNF topologys, starts and closes, given birth to VNF
Order function script of periodic event matching etc..
Step 401:NFVO receives the instantiation VNF of Sender transmissions request.
The request is used to instantiate a new VNF;
Wherein, Sender can be OSS, EMS, VNFM.
Step 402:The validity of the request for the instantiation VNF that the Sender that NFVO checkings receive is sent;
Wherein, validity refers to the legitimacy of VNF requests, and including but not limited to Sender legitimacy and instantiation is asked
The legitimacy of itself, specifically, Sender legitimacy, which refers to whether Sender is authorized to, sends the request;Instantiation request is originally
The legitimacy of body refers to whether the security parameter that the request carries can prove that the request is legal, is not distorted by third party
's.
Step 403:NFVO reads VNFD from VNF catalogues.Including reading demands of the VNF to tick interrupt.
Step 404:NFVO generates a VNF example item, and the example item of generation is increased into " NFV Instances " numbers
According in storehouse.
Wherein, it is right according to the VNF example items to be specifically used for the NFVO and/or VNFM between VNF example runtimes for VNF examples item
The relevant information of VNF examples is inquired about and safeguarded.The relevant information of VNF examples specifically refers to the NFVI moneys that VNF examples use
The running status of virtual machine, performance etc. corresponding to source, VNF examples.
Step 405a:NFVO submits instantiation parameter to VNFM.
Wherein, instantiating parameter includes the related parameter of the application parameter related to non-application, wherein using related ginseng
Number refers to operate in the parameter of the application correlation on VNF, such as handling up for VNF and/or deployment VNF the virtual machine business to be met
The parameters such as amount, network bandwidth;The related parameter of non-application refers to the configuration parameter related to VNF deployment behaviors and operation behavior,
Specifically refer to restrictions and description of the VNF to the demand of NFVI resources and to behavior in VNF life cycle management process.Instantiation
Parameter and VNFD are used for the resource to disposing VNF together and VNF instantiation process carries out requirement description and demand limits.
Step 405b-405c:VNFM obtains VNFD and test case parameter, if desired can be to instantiating parameter
Carry out some modifications.
Specifically refer to, when the VNF instantiation parameters and the demand information and/or NFVO described in VNFD that are pre-seted in VNFM
Submit to VNFM instantiation parameter it is inconsistent when, VNFM can modify to inconsistent instantiation parameter.
In step 403, NFVO is possible to directly read the increased phase to tick interrupt requirement description in VNFD
Information is closed, VNFM can parse tick interrupt demand from VNFD, be sent to NFVO in this step.
Step 406a:NFVO selects a VIM for thinking that meet demand resource can be provided to VNF.
Wherein, " NFVI resource " databases include the record to NFVI server-capabilities, specifically include NFVI clothes
The resource description that can provide of business device, including can provide all resources, provide resource, remaining available resource with
And resource etc. is reserved.
NFVO is according to " record in NFVI resource " databases, the NFVI services of selection one VIM, the VIM management
The ability of device disclosure satisfy that VNF demand.Here demand is specifically referred in demand and instantiation parameter described in VNFD
The demand of restriction.
Step 406b:NFVO to VIM send resource reservation request, wherein not only include VNF to calculate, store and network provide
The demand in source, in addition to (whether VNF needs directly to access in hardware clock equipment acquisition clock demands of the VNF to tick interrupt
It is disconnected).
Step 406c:VIM checks the state of managed resource, returns to resource reservation result.Wherein, VIM is except considering
The state of calculating, storage and Internet resources, it is also contemplated that the state of the clockwork resource managed, if clockwork loads
It is larger, step 406d can be performed, that is, returns to resource reservation and is unsuccessfully indicated to NFVO, NFVO re-executes step 400-406c,
Until selecting suitable VIM.
Step 407:If VNF needs to obtain tick interrupt, NFVO roots by the way of hardware clock equipment is directly accessed
The ID of physical equipment in the resource reservation result returned according to VIM, the ground for the hardware clock that local search VNF can be accessed directly
Location, and confirm VNF access rights.Cycle and duration that VNF accesses hardware clock are configured simultaneously.
Step 408:NFVO sends VNF instantiation requests to VNFM, wherein carry corresponding VIM mark (such as URL) with
And hardware clock address and configuration information instruction.
Step 409a-409b:VNFM asks VIM to distribute resource to VNF.
Step 410a-410b:VNFM asks VIM to create and start virtual machine, including installation software program package according to VNFD,
Perform and start shell script, send configuration data, and VM is connected to network etc..
Step 411:The hardware clock address that VNFM instructions VNF can be accessed directly, access cycle and duration.
Step 412:VNF accesses hardware clock according to VNFM instruction, obtains hardware clock interrupt, program is adjusted
Degree.
Step 413:VNFM returns to VNF and instantiates result to NFVO.
Step 414a-414b:The VNF instantiation results that NFVO returns according to VNFM carry out resource status renewal.
Step 415:NFVO renewal " NFV Instances " and " NFVI resource " databases.
Step 416:NFVO returns to VNF and instantiates result to Sender.
Clock address manager in the present embodiment safeguarded by NFVO, and clock address manager module and hardware it
Between can be connected by interface, as shown in figure 9, can also integrated clock address manager module within hardware, as shown in Figure 10.
The acquisition methods of clock interrupt signal provided by the invention, NFV functional entitys according to VNFD description informations, it is determined that
VNF tick interrupt accuracy requirement, then, NFV functional entitys local search are that VNF determines hardware clock address, then by institute
The hardware clock address of determination is sent to VNF, and VNF can access hardware clock according to the hardware clock address of acquisition, and obtain
Clock interrupt signal.Without producing the guest operation system of virtual machine by virtual machine call bottom hardware clock interrupt signal
System software clock interrupt signal, then it is supplied to VNF to be passed for the clock signal of VNF configuration processors scheduling software clock interrupt signal
Defeated process, so as to avoid the delay of clock signal and delay jitter, the promptness that interrupt signal performs is ensure that, and ensure
Program is dispatched in time.
Figure 11 is the acquisition methods flow chart for the clock interrupt signal that the embodiment of the present invention four provides, as shown in figure 11, this
In the implement scene that embodiment provides, clock address manager is safeguarded that this method includes by VIM:
Step 500:Increase VNF in VNFD to the requirement description of tick interrupt precision, by VNF loading procedures, by the
VNFD is sent to NFVO by tripartite's entity, VNFD is submitted in VNF catalogues by NFVO, so that NFVO and VNFM can be obtained
VNF synchronisation requirement.
Wherein, third party entity can be entity or the service provider that any one represents VNF providers
An entity in management domain.
VNFD refers to the configuration template of a description VNF deployment and operation behavior, specifically includes and disposes behavior and behaviour to VNF
Make behavior configuration description, wherein deployment behavior include but is not limited to VNF requirement deployed environment, in particular to VNF to NFVI
The demand of resource, such as virtual machine number, virtual machine map (image) number, the computing resource needed and storage resource etc..Operation
Behavior is mainly the behavior in VNF life cycle management process, including but not limited to VNF topologys, starts and closes, given birth to VNF
Order function script of periodic event matching etc..
Step 501:NFVO receives the instantiation VNF of Sender transmissions request.
The request is used to instantiate a new VNF;
Wherein, Sender can be OSS, EMS, VNFM.
Step 502:The validity of NFVO checking requests.
Wherein, validity refers to the legitimacy of VNF requests, and including but not limited to Sender legitimacy and instantiation is asked
The legitimacy of itself, specifically, Sender legitimacy, which refers to whether Sender is authorized to, sends the request;Instantiation request is originally
The legitimacy of body refers to whether the security parameter that the request carries can prove that the request is legal, is not distorted by third party
's.
Step 503:NFVO reads VNFD from VNF catalogues, wherein, including read demands of the VNF to tick interrupt.
Step 504:NFVO generates a VNF example item, and the example item of generation is increased into " NFV Inastances "
In database.
Wherein, it is right according to the VNF example items to be specifically used for the NFVO and/or VNFM between VNF example runtimes for VNF examples item
The relevant information of VNF examples is inquired about and safeguarded.The relevant information of VNF examples specifically refers to the NFVI moneys that VNF examples use
The running status of virtual machine, performance etc. corresponding to source, VNF examples.
Step 505a:NFVO submits instantiation parameter to VNFM.
Wherein, instantiating parameter includes the related parameter of the application parameter related to non-application, wherein using related ginseng
Number refers to operate in the parameter of the application correlation on VNF, such as handling up for VNF and/or deployment VNF the virtual machine business to be met
The parameters such as amount, network bandwidth;The related parameter of non-application refers to the configuration parameter related to VNF deployment behaviors and operation behavior,
Specifically refer to restrictions and description of the VNF to the demand of NFVI resources and to behavior in VNF life cycle management process.Instantiation
Parameter and VNFD are used for the resource to disposing VNF together and VNF instantiation process carries out requirement description and demand limits.
Step 505b-505c:VNFM test cases parameter simultaneously obtains VNFD, can also be as needed to instantiating parameter
Carry out some modifications.
Specifically refer to, when the VNF instantiation parameters and the demand information and/or NFVO described in VNFD that are pre-seted in VNFM
Submit to VNFM instantiation parameter it is inconsistent when, VNFM can modify to inconsistent instantiation parameter.
In step 503, NFVO is possible to directly read the increased phase to tick interrupt requirement description in VNFD
Information is closed, VNFM can parse tick interrupt demand from VNFD, be sent to NFVO in this step.
Step 506a:NFVO selects a VIM that meet demand resource can be provided to VNF;
Wherein, " NFVI resource " databases include the record to NFVI server-capabilities, specifically include NFVI clothes
The resource description that can provide of business device, including can provide all resources, provide resource, remaining available resource with
And resource etc. is reserved.
NFVO is according to " record in NFVI resource " databases, the NFVI services of selection one VIM, the VIM management
The ability of device disclosure satisfy that VNF demand.Here demand is specifically referred in demand and instantiation parameter described in VNFD
The demand of restriction.
Step 506b:NFVO sends resource reservation to the selected VIM that meet demand resource can be provided to VNF please
Ask, wherein not only include VNF to calculating, store and the demand of Internet resources, in addition to VNF is to the demand of tick interrupt, can be with
Whether need directly to access hardware clock equipment acquisition tick interrupt for VNF.
Step 506c:VIM checks the state of managed resource, returns to resource reservation result.
Wherein, if VNF needs to obtain tick interrupt, resource reservation knot by the way of hardware clock equipment is directly accessed
Fruit includes the address information of hardware clock and VNF accesses cycle and the duration configuration information of hardware clock.VIM except
Consider the state of calculating, storage and Internet resources, it is also contemplated that the state of the clockwork resource managed, if clockwork
Load larger, can perform step 506d, return to resource reservation and be unsuccessfully indicated to NFVO, NFVO re-executes step 500-
506c, until selecting suitable VIM.
Step 507:NFVO configurations VNF accesses cycle and the duration of hardware clock.
If VIM has been configured and has returned relevant configuration information in step 506c, without carrying out this step, directly hold
Row step 508.
Step 508:NFVO sends VNF instantiation requests to VNFM, wherein carrying corresponding VIM mark (such as URL)
And hardware clock address and configuration information instruction.
Step 509a-509b:VNFM asks VIM to distribute resource to VNF.
Step 510a-510b:VNFM asks VIM to create and start virtual machine, including installation software program package according to VNFD,
Perform and start shell script, send configuration data, and VM is connected to network etc..
Step 511:The hardware clock address that VNFM instructions VNF can be accessed directly, access cycle and duration.
Step 512:VNF accesses hardware clock according to VNFM instruction, obtains hardware clock interrupt, and program is adjusted
Degree.
Step 513:VNFM returns to VNF and instantiates result to NFVO.
Step 514a-514b:NFVO carries out resource status renewal.
Step 515:NFVO renewal " NFV Instances " and " NFVI resource " databases.
Step 516:NFVO returns to VNF and instantiates result to Sender.
Clock address manager in the present embodiment safeguarded by VIM, and clock address manager module and hardware it
Between can be connected by interface, as shown in figure 12, can also integrated clock address manager module within hardware, such as Figure 13 institutes
Show.
The acquisition methods of clock interrupt signal provided by the invention, NFV functional entitys according to VNFD description informations, it is determined that
VNF tick interrupt accuracy requirement, and select that the VIM of resource can be provided, VIM returns to hardware clock address and with confidence
Breath, VNF can access hardware clock according to the hardware clock address of acquisition, and obtain clock interrupt signal.Without passing through void
Plan machine calls bottom hardware clock interrupt signal and produces the client operating system software clock interrupt signal of virtual machine, then will be soft
Part clock interrupt signal is supplied to the clock signal transmission process that VNF supplies VNF configuration processors to dispatch, so as to avoid clock signal
Delay and delay jitter, ensure that the promptness that interrupt signal performs, and ensure that program is dispatched in time.
Figure 14 is the structural representation that a kind of network function that the embodiment of the present invention five provides virtualizes NFV functional entitys,
As shown in figure 14, the NFV functional entitys that the present embodiment provides specifically include:
First determining module 101, for according to VNFD description informations, determining VNF tick interrupt accuracy requirement;
Second determining module 102, for according to the tick interrupt accuracy requirement, be the VNF with determining hardware clock
Location;
Sending module 103, for the address of the hardware clock to be sent into the VNF, so that the VNF is according to
The address of hardware clock accesses the hardware clock to obtain clock interrupt signal.
Specifically, the NFV functional entitys are NFVO or VNFM.
As shown in figure 15, for above-mentioned NFV functional entitys, it can further include:
3rd determining module 104, for, according to the tick interrupt accuracy requirement, being in second determining module 102
Before the VNF determines hardware clock address, according to VNF tick interrupt accuracy requirement, determine whether the VNF needs directly
Access hardware clock;
Optionally, second determining module 102 is additionally operable to, however, it is determined that the NFVO or VNFM need directly to access hardware
Clock, then determine hardware clock address for the VNF.
Optionally, the sending module is specifically used for:
Send inquiry request to clock address manager, carry in the inquiry request VNF identification information and
The identification information of the physical equipment of the VNF mappings;
As shown in figure 16, for above-mentioned NFV functional entitys, it can further include:
First receiving module 105, the hardware clock address returned for receiving the clock address manager.
Optionally, the first receiving module 105 is additionally operable to receive the clock address management in second determining module 102
After the hardware clock address that device returns, when receiving the VNF of the clock address manager return to the hardware
The access cycle of clock address and access duration.
As shown in figure 17, it is the NFVO for above-mentioned NFV functional entitys, the NFV functional entitys, it can also enter
One step includes:Memory module 106, the information for storage hardware clock;
Wherein, second determining module 102 is specifically used for the letter of the hardware clock stored according to memory module 106
Breath, determines the hardware clock address that the VNF can be accessed directly.
As shown in figure 18, it is the NFVO for above-mentioned NFV functional entitys, the NFV functional entitys, it can also enter
One step includes:4th determining module 107, for determining what the NFV can be accessed directly according to second determining module 102
After the hardware clock address, the VNF is determined to the access cycle of the hardware clock address and accesses duration.
Optionally, sending module 103, it is additionally operable to after the address of the hardware clock is sent into the VNF, by institute
State VNF and the VNF is sent to the access cycle of the hardware clock address and access duration.
As shown in figure 19, it is the NFVO for above-mentioned NFV functional entitys, the NFV functional entitys, it can also enter
One step includes:
5th determining module 108, in the second determining module 102 according to the tick interrupt accuracy requirement, be described
Before VNF determines hardware clock address, according to the tick interrupt accuracy requirement of the VNF, it is determined that meeting the VNF demands resource
VIM;
Further, the sending module 103 is additionally operable to send resource reservation request to the VIM;
Also include the second receiving module 109, the resource reservation result returned for receiving the VIM, the resource reservation
As a result the middle mark for carrying physical equipment.
As shown in figure 20, it is the VNFM for above-mentioned NFV functional entitys, the NFV functional entitys, it can also enter
One step includes:
Request module 110, for receiving the resource reservation result of the VIM returns, institute in the 5th determining module 108
After stating the mark for carrying physical equipment in resource reservation result, the VIM is asked to create and start virtual machine.
Further, the NFV functional entitys are the NFVO, and the resource reservation result includes:During the hardware
Clock address;
Second determining module 102 is specifically used for:The hardware clock address is obtained from the resource reservation result.
Further, also include in the resource reservation result:Access cycles of the VNF to the hardware clock address
With access duration.
As shown in figure 21, it is the NFVO for above-mentioned NFV functional entitys, the NFV functional entitys, the NFVO is also
It may further include:
6th determining module 111, for obtaining institute from the resource reservation result according to second determining module 102
After stating hardware clock address, the VNF is determined to the access cycle of the hardware clock address and accesses duration.
The NFV functional entitys that the present embodiment provides, it is the acquisition methods of clock interrupt signal provided in an embodiment of the present invention
Execution equipment, it performs the detailed process of the acquisition methods of clock interrupt signal and can be found in side shown in Fig. 1, Fig. 2 to Figure 13
Associated description in method embodiment, will not be repeated here.
Figure 22 show a kind of structural representation of network function virtualization NFV functional entitys provided by the invention, such as schemes
Shown in 22, the NFV functional entitys that the present embodiment provides include:Processor 21 and memory 22.Memory 22 stores execute instruction,
Communicated between processor 21 and memory 22, processor 21 calls the execute instruction in memory 22, for performing following operation:
According to VNFD description informations, VNF tick interrupt accuracy requirement is determined;
According to the tick interrupt accuracy requirement, hardware clock address is determined for the VNF;
The address of the hardware clock is sent to the VNF, so that the VNF visits according to the address of the hardware clock
The hardware clock is asked to obtain clock interrupt signal.
The NFV functional entitys are NFVO or VNFM.
Optionally, processor 21 is according to the tick interrupt accuracy requirement, for the VNF determine hardware clock address it
Before, in addition to:
According to VNF tick interrupt accuracy requirement, determine whether the VNF needs directly to access hardware clock;
If it is determined that the NFVO or VNFM needs directly to access hardware clock, then hardware clock address is determined for the VNF.
Further, processor 21 determines hardware clock address according to VNF tick interrupt accuracy requirement for the VNF,
Specifically include:
Send inquiry request to clock address manager, carry in the inquiry request VNF identification information and
The identification information of the physical equipment of the VNF mappings;
Receive the hardware clock address that the clock address manager returns.
Further, after processor 21 receives the hardware clock address that the clock address manager returns, also
Including:
The processor 21 receives visits of the VNF of the clock address manager return to the hardware clock address
Ask the cycle and access duration.
Optionally, can be with the information of storage hardware clock, in clock of the processor 21 according to VNF on processor 21
Disconnected accuracy requirement, hardware clock address is determined for the VNF, is specifically included:
The processor 21 determines the institute that the VNF can be accessed directly according to the information of the hardware clock of storage
State hardware clock address.
Further, processor 21 determines that the NFV can be accessed directly according to the information of the hardware clock of storage
The hardware clock address after, in addition to:
The processor 21 determines the VNF to the access cycle of the hardware clock address and accesses duration.
Further, after the address of the hardware clock is sent to the VNF by processor 21, in addition to:
The VNF is sent to described by the processor 21 to the access cycle of the hardware clock address and access duration
VNF。
Optionally, processor 21 is according to the tick interrupt accuracy requirement, for the VNF determine hardware clock address it
Before, in addition to:
The processor 21 is according to the tick interrupt accuracy requirement of the VNF, it is determined that meeting the VNF demands resource
VIM;
The processor 21 sends resource reservation request to the VIM;
The processor 21 receives the resource reservation result that the VIM is returned, and physics is carried in the resource reservation result
The mark of equipment.
Further, the processor 21 receives the resource reservation result that the VIM is returned, in the resource reservation result
After the mark for carrying physical equipment, in addition to:
The processor 21 asks the VIM to create and start virtual machine.
Further, the resource reservation result includes:The hardware clock address;
The processor 21 is that the VNF determines hardware clock address, is specifically included:The NFVO is from the resource reservation
As a result it is middle to obtain the hardware clock address.
Further, also include in the resource reservation result:Access cycles of the VNF to the hardware clock address
With access duration.
Further, after the processor 21 obtains the hardware clock address from the resource reservation result, also
Including:
The processor 21 determines the VNF to the access cycle of the hardware clock address and accesses duration.
NFV functional entitys provided in an embodiment of the present invention, it can be used for the technical scheme for performing above method embodiment, its
Implementing principle and technical effect are similar, and here is omitted.
One of ordinary skill in the art will appreciate that:Realizing all or part of step of above method embodiment can pass through
Programmed instruction related hardware is completed, and foregoing program can be stored in a computer read/write memory medium, the program
Upon execution, the step of execution includes above method embodiment;And foregoing storage medium includes:Read-only storage (Read-
Only Memory, ROM), random access memory (Random Access Memory, RAM), magnetic disc or CD etc. are various can be with
The medium of store program codes.
Finally it should be noted that:Various embodiments above is merely illustrative of the technical solution of the present invention, rather than its limitations;To the greatest extent
The present invention is described in detail with reference to foregoing embodiments for pipe, it will be understood by those within the art that:Its according to
The technical scheme described in foregoing embodiments can so be modified, either which part or all technical characteristic are entered
Row equivalent substitution;And these modifications or replacement, the essence of appropriate technical solution is departed from various embodiments of the present invention technology
The scope of scheme.
Claims (27)
- A kind of 1. acquisition methods of clock interrupt signal, it is characterised in that including:Network function virtualizes description information of the NFV functional entitys in virtual network function requirement description file VNFD, really Surely network function VNF tick interrupt accuracy requirement is virtualized;The NFV functional entitys determine hardware clock address according to the tick interrupt accuracy requirement for the VNF;The address of the hardware clock is sent to the VNF by the NFV functional entitys, so that the VNF is according to the hardware The address of clock accesses the hardware clock to obtain clock interrupt signal.
- 2. according to the method for claim 1, it is characterised in that the NFV functional entitys are that network function virtualizes layout Device NFVO or virtual network function manager VNFM.
- 3. according to the method for claim 2, it is characterised in that the NFV functional entitys are according to the tick interrupt precision Demand, before determining hardware clock address for the VNF, in addition to:The NFV functional entitys determine whether the VNF needs directly to access hardware according to VNF tick interrupt accuracy requirement Clock;If it is determined that the NFVO or VNFM needs directly to access hardware clock, then the NFVO or VNFM are that the VNF determines hard Part clock address.
- 4. according to the method for claim 2, it is characterised in that the NFV functional entitys are according to VNF tick interrupt precision Demand, hardware clock address is determined for the VNF, is specifically included:The NFVO or VNFM send inquiry request to clock address manager, and the mark of the VNF is carried in the inquiry request Know the identification information of the physical equipment of information and VNF mappings;The NFVO or VNFM receive the hardware clock address that the clock address manager returns.
- 5. according to the method for claim 4, it is characterised in that the NFV functional entitys receive the clock address management After the hardware clock address that device returns, in addition to:The NFVO or VNFM receive access of the VNF of the clock address manager return to the hardware clock address Cycle and access duration.
- 6. according to the method for claim 2, it is characterised in that the information of storage hardware clock on the NFV functional entitys, The NFV functional entitys determine hardware clock address for the VNF, specifically included according to VNF tick interrupt accuracy requirement:The NFVO is according to the information of the hardware clock of storage, when determining the hardware that the VNF can be accessed directly Clock address.
- 7. according to the method for claim 6, it is characterised in that when the NFV functional entitys are according to the hardware of storage The information of clock, after determining the hardware clock address that the NFV can be accessed directly, in addition to:The NFVO determines the VNF to the access cycle of the hardware clock address and accesses duration.
- 8. the method according to claim 5 or 7, it is characterised in that the NFV functional entitys are by the ground of the hardware clock Location is sent to after the VNF, in addition to:The VNF is sent to the VNF by the NFVO to the access cycle of the hardware clock address and access duration.
- 9. according to the method for claim 2, it is characterised in that the NFV functional entitys are according to the tick interrupt precision Demand, before determining hardware clock address for the VNF, in addition to:The NFVO is according to the tick interrupt accuracy requirement of the VNF, it is determined that meeting the virtualization basis of the VNF demands resource Infrastructure manager VIM;The NFVO sends resource reservation request to the VIM;The NFVO receives the resource reservation result that the VIM is returned, and the mark of physical equipment is carried in the resource reservation result Know.
- 10. according to the method for claim 9, it is characterised in that the NFVO receives the resource reservation knot that the VIM is returned Fruit, after the mark that physical equipment is carried in the resource reservation result, in addition to:The VNFM asks the VIM to create and start virtual machine.
- 11. the method according to claim 9 or 10, it is characterised in that the resource reservation result includes:The hardware Clock address;The NFV functional entitys are that the VNF determines hardware clock address, are specifically included:The NFVO obtains the hardware clock address from the resource reservation result.
- 12. according to the method for claim 11, it is characterised in that also include in the resource reservation result:Described VNF pairs The access cycle of the hardware clock address and access duration.
- 13. according to the method for claim 11, it is characterised in that the NFV functional entitys are from the resource reservation result After the middle acquisition hardware clock address, in addition to:The NFVO determines the VNF to the access cycle of the hardware clock address and accesses duration.
- 14. a kind of network function virtualizes NFV devices, it is characterised in that including:First determining module, for according to VNFD description informations, determining VNF tick interrupt accuracy requirement;Second determining module, for according to the tick interrupt accuracy requirement, hardware clock address to be determined for the VNF;Sending module, for the address of the hardware clock to be sent into the VNF, during so that the VNF is according to the hardware The address of clock accesses the hardware clock to obtain clock interrupt signal.
- 15. NFV devices according to claim 14, it is characterised in that the NFV devices are NFVO or VNFM.
- 16. NFV devices according to claim 15, it is characterised in that also include:3rd determining module, for, according to the tick interrupt accuracy requirement, being determined in second determining module for the VNF Before hardware clock address, according to VNF tick interrupt accuracy requirement, when determining whether the VNF needs directly to access hardware Clock;Second determining module is additionally operable to, however, it is determined that the NFVO or VNFM need directly to access hardware clock, then to be described VNF determines hardware clock address.
- 17. NFV devices according to claim 15, it is characterised in that the sending module is specifically used for:Inquiry request is sent to clock address manager, the identification information of the VNF and described is carried in the inquiry request The identification information of the physical equipment of VNF mappings;The NFV devices also include:First receiving module, during for receiving the hardware that the clock address manager returns Clock address.
- 18. NFV devices according to claim 17, it is characterised in that first receiving module, be additionally operable to described After two determining modules receive the hardware clock address that the clock address manager returns, the clock address pipe is received Manage access cycles and access duration of the VNF of device return to the hardware clock address.
- 19. NFV devices according to claim 15, it is characterised in that the NFV devices are the NFVO, then described NFVO also includes:Memory module, the information for storage hardware clock;Second determining module is specific:According to the information of the hardware clock of storage, determine that the VNF can be accessed directly The hardware clock address.
- 20. NFV devices according to claim 19, it is characterised in that the NFV devices are the NFVO, then described NFVO also includes:4th determining module, during for determining the hardware that the NFV can be accessed directly according to second determining module After clock address, the VNF is determined to the access cycle of the hardware clock address and accesses duration.
- 21. the NFV devices according to claim 18 or 20, it is characterised in that the NFV devices are the NFVO, then institute Sending module is stated, is additionally operable to after the address of the hardware clock is sent into the VNF, by the VNF to the hardware The access cycle of clock address and access duration are sent to the VNF.
- 22. NFV devices according to claim 15, it is characterised in that the NFV devices are the NFVO, then described NFVO also includes:5th determining module, for, according to the tick interrupt accuracy requirement, hardware being determined for the VNF in the second determining module Before clock address, according to the tick interrupt accuracy requirement of the VNF, it is determined that meeting the VIM of the VNF demands resource;The sending module is additionally operable to:Resource reservation request is sent to the VIM;Also include the second receiving module, for receiving the resource reservation result of the VIM returns, taken in the resource reservation result Mark with physical equipment.
- 23. NFV devices according to claim 22, it is characterised in that the NFV devices are the VNFM, then described VNFM also includes:Also include:Request module, for receiving the resource reservation knot of the VIM returns in the 5th determining module Fruit, after the mark that physical equipment is carried in the resource reservation result, the VIM is asked to create and start virtual machine.
- 24. the NFV devices according to claim 22 or 23, it is characterised in that the NFV devices are the NFVO, described Resource reservation result includes:The hardware clock address;Second determining module is specifically used for:The hardware clock address is obtained from the resource reservation result.
- 25. NFV devices according to claim 24, it is characterised in that also include in the resource reservation result:It is described VNF is to the access cycle of the hardware clock address and accesses duration.
- 26. NFV devices according to claim 24, it is characterised in that the NFV devices are the NFVO, then described NFVO also includes:6th determining module, for obtaining the hardware clock from the resource reservation result according to second determining module After address, the VNF is determined to the access cycle of the hardware clock address and accesses duration.
- 27. a kind of network function virtualizes NFV devices, it is characterised in that including:Processor and memory, the memory are deposited Execute instruction is stored up, when the acquisition system operation of the clock interrupt signal, is communicated between the processor and the memory, Execute instruction described in the computing device causes the acquisition system of the clock interrupt signal to perform such as claim 1~13 times Method described in one.
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/CN2014/071929 WO2015117278A1 (en) | 2014-02-10 | 2014-02-10 | Method for obtaining clock interruption signal, and nfv functional entity |
Publications (2)
Publication Number | Publication Date |
---|---|
CN105103125A CN105103125A (en) | 2015-11-25 |
CN105103125B true CN105103125B (en) | 2017-12-05 |
Family
ID=53777121
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201480000618.6A Active CN105103125B (en) | 2014-02-10 | 2014-02-10 | The acquisition methods and NFV devices of clock interrupt signal |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN105103125B (en) |
WO (1) | WO2015117278A1 (en) |
Families Citing this family (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105700961B (en) * | 2016-02-29 | 2019-03-08 | 华为技术有限公司 | Business container creation method and device |
CN112256343B (en) * | 2016-05-10 | 2022-05-10 | 华为技术有限公司 | Software loading method, equipment and system |
EP3476080A4 (en) * | 2016-06-23 | 2019-11-13 | Intel IP Corporation | Device and method for nfv life cycle management |
CN109257240B (en) * | 2017-07-12 | 2021-02-23 | 上海诺基亚贝尔股份有限公司 | Method and device for monitoring performance of virtualized network functional unit |
CN110333843B (en) * | 2019-04-19 | 2023-03-24 | 中科创达(重庆)汽车科技有限公司 | Method and device for realizing high-precision timer of virtual machine and electronic equipment |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101043253A (en) * | 2006-06-26 | 2007-09-26 | 华为技术有限公司 | Process for obtaining high-precision time |
CN103139809A (en) * | 2011-12-02 | 2013-06-05 | 中兴通讯股份有限公司 | Clock synchronization method and device |
CN103491129A (en) * | 2013-07-05 | 2014-01-01 | 华为技术有限公司 | Service node configuration method and service node pool logger and system |
CN103561124A (en) * | 2013-10-29 | 2014-02-05 | 上海华为技术有限公司 | Base station data configuring method and device |
-
2014
- 2014-02-10 WO PCT/CN2014/071929 patent/WO2015117278A1/en active Application Filing
- 2014-02-10 CN CN201480000618.6A patent/CN105103125B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101043253A (en) * | 2006-06-26 | 2007-09-26 | 华为技术有限公司 | Process for obtaining high-precision time |
CN103139809A (en) * | 2011-12-02 | 2013-06-05 | 中兴通讯股份有限公司 | Clock synchronization method and device |
CN103491129A (en) * | 2013-07-05 | 2014-01-01 | 华为技术有限公司 | Service node configuration method and service node pool logger and system |
CN103561124A (en) * | 2013-10-29 | 2014-02-05 | 上海华为技术有限公司 | Base station data configuring method and device |
Non-Patent Citations (1)
Title |
---|
Network Functions Virtualization;Virtualization Requirements;etsi;《ETSI GS NFV》;20131031;第7-11页 * |
Also Published As
Publication number | Publication date |
---|---|
CN105103125A (en) | 2015-11-25 |
WO2015117278A1 (en) | 2015-08-13 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20230325237A1 (en) | Methods and apparatus to automate deployments of software defined data centers | |
CN109194506B (en) | Block chain network deployment method, platform and computer storage medium | |
CN112119374B (en) | Selectively providing mutual transport layer security using alternate server names | |
US11301287B2 (en) | Pattern-based orchestration of cloud provisioning tasks at runtime | |
US11321130B2 (en) | Container orchestration in decentralized network computing environments | |
US9971593B2 (en) | Interactive content development | |
CN110023905A (en) | Network programmable logic service provider | |
CN105103125B (en) | The acquisition methods and NFV devices of clock interrupt signal | |
US20180157512A1 (en) | Apparatus and methods to incorporate external system to approve deployment provisioning | |
US20140136712A1 (en) | Cloud resources as a service multi-tenant data model | |
US20190342391A1 (en) | Requesting storage performance models for a configuration pattern of storage resources to deploy at a client computing environment | |
Munteanu et al. | Multi-cloud resource management: cloud service interfacing | |
EP3042310A1 (en) | Providing recursively-generated instantiated computing resource in a multi-tenant environment | |
CN114341847B (en) | Correspondence of external operations to containers with abrupt events | |
US10353752B2 (en) | Methods and apparatus for event-based extensibility of system logic | |
US11880296B2 (en) | Generating a test cluster for testing a container orchestration system | |
US11886921B2 (en) | Serverless runtime container allocation | |
US11243868B2 (en) | Application containerization based on trace information | |
El-Omari | Cloud IoT as a crucial enabler: a survey and taxonomy | |
CN113722114A (en) | Data service processing method and device, computing equipment and storage medium | |
Muzumdar et al. | Navigating the Docker Ecosystem: A Comprehensive Taxonomy and Survey | |
CN115774742A (en) | Data storage newly-increased method, device, equipment, medium and product of private cloud | |
Bavier et al. | Planetignite: A self-assembling, lightweight, infrastructure-as-a-service edge cloud | |
CN115935380A (en) | Automatic encryption system for data in container | |
CN112698840B (en) | Architecture system for realizing service for bank cloud platform |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |