CN111065116A - Automatic deployment method and system for end-to-end slicing - Google Patents
Automatic deployment method and system for end-to-end slicing Download PDFInfo
- Publication number
- CN111065116A CN111065116A CN201911255377.0A CN201911255377A CN111065116A CN 111065116 A CN111065116 A CN 111065116A CN 201911255377 A CN201911255377 A CN 201911255377A CN 111065116 A CN111065116 A CN 111065116A
- Authority
- CN
- China
- Prior art keywords
- slice
- deployment
- network
- slicing
- networking
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 81
- 230000006855 networking Effects 0.000 claims abstract description 64
- 238000012544 monitoring process Methods 0.000 claims abstract description 40
- 230000008569 process Effects 0.000 claims abstract description 34
- 230000004913 activation Effects 0.000 claims abstract description 7
- 238000004590 computer program Methods 0.000 claims description 17
- 238000007689 inspection Methods 0.000 claims description 13
- 238000002955 isolation Methods 0.000 claims description 10
- 238000003860 storage Methods 0.000 claims description 7
- 230000001502 supplementing effect Effects 0.000 claims description 2
- 230000000007 visual effect Effects 0.000 claims description 2
- 238000013461 design Methods 0.000 abstract description 28
- 230000006870 function Effects 0.000 abstract description 19
- 238000012545 processing Methods 0.000 abstract description 10
- 238000010586 diagram Methods 0.000 description 23
- 238000005516 engineering process Methods 0.000 description 5
- 238000012423 maintenance Methods 0.000 description 4
- 230000002159 abnormal effect Effects 0.000 description 3
- 238000004891 communication Methods 0.000 description 3
- 238000009826 distribution Methods 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 230000003068 static effect Effects 0.000 description 2
- 230000003213 activating effect Effects 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 239000003086 colorant Substances 0.000 description 1
- 230000008602 contraction Effects 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 238000010295 mobile communication Methods 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 230000009467 reduction Effects 0.000 description 1
- 238000000638 solvent extraction Methods 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
- 238000012360 testing method Methods 0.000 description 1
- 238000012800 visualization Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W24/00—Supervisory, monitoring or testing arrangements
- H04W24/02—Arrangements for optimising operational condition
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/08—Configuration management of networks or network elements
- H04L41/0893—Assignment of logical groups to network elements
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The invention discloses an end-to-end slice automatic deployment method and a system, wherein the method comprises the following steps: constructing a networking resource topology according to the slicing service requirement; extracting slice configuration deployment capacity from a subnet, setting a slice deployment process, and constructing a slice deployment process model; associating the slice monitoring and strategy model to generate a network slice template; and matching a corresponding network slice template according to the order instruction, setting parameters in the network slice template, deploying the slice to enable the slice to enter an activation state, and starting monitoring and strategies. The method and the system realize the discovery of networking resources of a wireless network-a bearer network-a core network according to the area where a user is located, and design of slicing resources according to slicing service requirements; after the design is finished, slice end-to-end deployment is carried out according to user ordering, and an end-to-end slice state is monitored after the deployment is finished; the method has the advantages that the end-to-end slice deployment mode is simple to operate, efficient in processing and comprehensive in function, and slicing requirements of users can be well met.
Description
Technical Field
The present invention relates to the field of communications technologies, and in particular, to a method and a system for automatically deploying end-to-end slices.
Background
The 5G (5th Generation, fifth Generation mobile communication technology) era has come, and in the 5G era, the object of the mobile network service is no longer a pure mobile phone, but various types of devices, such as a mobile phone, a tablet, a fixed sensor, a vehicle, and the like. Application scenarios are also diversified, such as mobile broadband, large-scale internet, mission-critical internet, and the like. The requirements to be met are also diversified, such as mobility, safety, time-lapse, reliability, and the like. Just because different application scenarios have different requirements in the aspects of network function, system performance, security, user experience and the like, if the same network is used for providing services, the network is very complex and heavy, the requirement of the ultimate performance required by the application cannot be met, and meanwhile, the operation and maintenance of the network become quite complex, and the cost of network operation is increased. On the contrary, if a dedicated network is deployed to provide services according to different requirements of different service scenarios, and the network only includes functions required by the application scenario, the efficiency of the services is greatly improved, the network performance required by the application scenario can be guaranteed, the operation and maintenance of the network become simple, and the investment and operation and maintenance costs can be reduced. This is the network slicing technique, which is an example of a network slice.
In summary, slicing is the final characteristic of 5G, and how to automatically perform slice deployment and monitoring is the key technology of 5G slicing. Although the related protocol provides a development direction of the technology of network slicing, no specific scheme is provided for how to automatically deploy the network slicing.
Disclosure of Invention
In order to solve the problems, the invention provides an end-to-end slicing automatic deployment method and a system, which can find networking resources of a wireless network-a bearer network-a core network according to an area where a user is located, and design slicing resources according to slicing service requirements of the user; and designing slice deployment and calling capacity, flow, monitoring and strategies after the resources are confirmed, carrying out slice end-to-end deployment according to user ordering after the design is finished, and starting corresponding monitoring and strategies.
In an embodiment of the present invention, an end-to-end slice automation deployment method is provided, where the method includes:
acquiring slicing service requirements;
constructing a networking resource topology according to the slicing service requirement;
extracting slice configuration deployment capacity from the subnet of the networking resource topology, setting a slice deployment flow according to the slice service requirement, and constructing a slice deployment flow model;
associating a slice monitoring and strategy model in the slice deployment process model to generate a network slice template;
matching the corresponding network slice template according to the order instruction, setting parameters in the network slice template, deploying the slice according to the slice deployment flow, enabling the slice to enter an activation state and starting monitoring and strategies.
In another embodiment of the present invention, an end-to-end slicing automation deployment system is further provided, which includes:
the slicing service requirement acquisition module is used for acquiring slicing service requirements;
the networking resource topology building module is used for building a networking resource topology according to the slicing service requirement;
the slice deployment process model building module is used for extracting slice configuration deployment capacity from the subnet of the networking resource topology, setting a slice deployment process according to the slice service requirement and building a slice deployment process model;
the network slice template generation module is used for associating the slice monitoring and strategy model in the slice deployment process model to generate a network slice template;
and the slice deployment module is used for matching the corresponding network slice template according to the order instruction, setting parameters in the network slice template, deploying the slice according to the slice deployment flow, enabling the slice to enter an activation state and starting a monitoring and strategy.
In another embodiment of the present invention, a computer device is further provided, which includes a memory, a processor, and a computer program stored on the memory and executable on the processor, and the processor implements an end-to-end slice automation deployment method when executing the computer program.
In another embodiment of the present invention, a computer-readable storage medium is also presented, which stores a computer program, which when executed by a processor, implements an end-to-end slice automation deployment method.
The automatic deployment method and the system for the end-to-end slicing realize the discovery of networking resources of a wireless network-a bearer network-a core network according to the area where a user is located and the slicing resource design is carried out according to the slicing service requirement; after the design is finished, slice end-to-end deployment is carried out according to user ordering, and an end-to-end slice state is monitored after the deployment is finished; the method has the advantages that the end-to-end slice deployment mode is simple to operate, efficient in processing and comprehensive in function, and slicing requirements of users can be well met.
Drawings
Fig. 1 is a flowchart illustrating an end-to-end slice automation deployment method according to an embodiment of the present invention.
Fig. 2 is an interface diagram of a slicing service requirement according to an embodiment of the present invention.
Fig. 3 is a schematic flowchart of constructing a networking resource topology according to an embodiment of the present invention.
Fig. 4 is a schematic diagram of a networking topology according to an embodiment of the present invention.
Fig. 5 is a schematic diagram of an operation interface of a networking topology according to an embodiment of the present invention.
FIG. 6 is a schematic configuration design interface diagram of a slice deployment flow model according to an embodiment of the present invention.
FIG. 7 is a schematic interface diagram of a security design according to an embodiment of the invention.
FIG. 8 is a schematic interface diagram of a policy design according to an embodiment of the present invention.
Fig. 9 is a detailed process diagram of end-to-end slice deployment according to an embodiment of the present invention.
Fig. 10 is a schematic diagram of an end-to-end slice automatic deployment flow according to an embodiment of the present invention.
Fig. 11 is a schematic view of a visualization display interface of a deployment scenario according to an embodiment of the present invention.
Fig. 12 is a flowchart illustrating an end-to-end slice automation deployment method according to another embodiment of the present invention.
Fig. 13 is an architecture diagram of an end-to-end slicing automation deployment system according to an embodiment of the invention.
Fig. 14 is a schematic structural diagram of a computer device according to an embodiment of the present invention.
Detailed Description
The principles and spirit of the present invention will be described with reference to a number of exemplary embodiments. It is understood that these embodiments are given solely for the purpose of enabling those skilled in the art to better understand and to practice the invention, and are not intended to limit the scope of the invention in any way. Rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the disclosure to those skilled in the art.
As will be appreciated by one skilled in the art, embodiments of the present invention may be embodied as a system, apparatus, device, method, or computer program product. Accordingly, the present disclosure may be embodied in the form of: entirely hardware, entirely software (including firmware, resident software, micro-code, etc.), or a combination of hardware and software.
According to the embodiment of the invention, an end-to-end slice automatic deployment method and system are provided.
Since 3GPP only defines the general architecture of the slice and only defines the radio network and the core network, and the 5G slice relates to three professional networks, the networking and resources are complex, and it is difficult to abstract the slice into one or several templates to directly match the user requirements, the whole networking situation needs to be found according to the user access area, and the design and deployment of the slice are performed on the basis. In contrast, the method and system provided by the present invention can find the networking resources of "base station-bearer-edge/core" according to the area where the slice user is located, and design the slice resources according to the SLA requirements of the user: and determining resources required by the slice in three subnets of wireless, load bearing and edge/core, and determining whether to reuse the original resources or newly-built resources. After the resources are confirmed, slice deployment and calling capacity, flow, monitoring and strategies are designed. After the design is finished, slice end-to-end deployment is carried out according to user ordering, and slice monitoring and strategies are started after the deployment is finished.
The principles and spirit of the present invention are explained in detail below with reference to several representative embodiments of the invention.
Fig. 1 is an end-to-end slice automation deployment method according to an embodiment of the present invention. As shown in fig. 1, the method includes:
and step S101, acquiring slicing service requirements.
And step S102, constructing a networking resource topology according to the slicing service requirement.
Step S103, extracting slice configuration deployment capability from the subnet of the networking resource topology, setting a slice deployment process according to the slice service requirement, and constructing a slice deployment process model.
Step S104, associating the slice monitoring and policy model in the slice deployment process model, and generating a Network Slice Template (NST).
And S105, matching the corresponding network slice template according to the order instruction, setting parameters in the network slice template, deploying the slice according to the slice deployment flow, enabling the slice to enter an activated state and starting a monitoring and strategy.
For a clearer explanation of the above end-to-end slice automation deployment method, the following description is made with reference to specific embodiments.
In an embodiment, in combination with step S101, a slicing user proposes a slicing service requirement, as shown in fig. 2, which is an interface schematic diagram of the slicing service requirement, where the slicing service requirement includes: slice type, SLA (Service Level Agreement), security isolation Level, and coverage area. In which, as seen by way of example with reference to figure 2,
the 5G network includes three application scenarios:
eMBB (enhanced Mobile Broadband),
urrllc (Ultra Reliable & Low Latency Communication), mtc (Massive Machine Type Communication);
correspondingly, the application scenes correspond to three slice types, and eMBB is selected in the figure.
SLA includes SLA-QOS, SLA-capacity; wherein,
SLA-QOS contains the delay range (ms), bandwidth range (Mbps);
SLA-capacity contains a range of static users (ten thousand), active users (ten thousand).
The security isolation requirements include high, medium, and low, with the figure selected high.
The coverage area includes the country, province, city, district, and the user may select the country, or select a particular province, city, or district. The figure is selected nationwide.
In an embodiment, in combination with step S102, a specific process of constructing a networking resource topology may refer to fig. 3, which includes:
step S1021, generating a networking topology according with the slicing service requirement according with the coverage area;
step S1022, discovering a base station in the coverage area;
step S1023, according to the base station and the networking topology, constructing the networking resource topology of a wireless network-a bearer network-a core network;
step S1024, selecting or supplementing the networking resources in the networking resource topology according to a networking resource adjusting instruction, and determining the networking resources.
In an embodiment, through step S1021, a set of network topologies as shown in fig. 4 may be constructed, wherein the bearer network portion takes an IPRAN as an example;
as shown in fig. 4, the slicing service requirement proposed by the user includes settings of SLA, security isolation requirement, and coverage area; the SLA further includes a Quality of Service (QOS) and a capacity, the QOS specifically includes a time delay, a packet loss, and a jitter, and the capacity specifically includes a static user number and an active user number;
the wireless network management provides a base station IP, the IPRAN A equipment discovers an access IP from an access port so as to acquire a link relation between the A equipment and the base station, the IPRAN discovers an interconnection link through an LSP protocol, the A or B equipment is interconnected with CE equipment or ASBR (Autonomous System Boundary Router) IP of a cloud, and the equipment is linked in the same subnet through the port IP so as to discover a link topology between the A or B equipment and the cloud.
In the present embodiment, the terms to be explained:
AAU: active Antenna Unit, Active Antenna processing Unit;
BBU: building Base band Unite, a baseband processing unit;
CU: centralized Unit, central Unit;
DU: a Distributed Unit, a distribution Unit;
DC: data Center, Data Center;
and (3) CE equipment: customer Edge, Customer Edge;
an ER device: edge route, Edge router.
In the networking topology, the wireless network includes: AAU, BBU (CU, DU);
the bearing net comprises: a devices (a1, a2), B devices (B1, B2), ER devices (ER1, ER2), CE devices (CE 1).
The core network includes: core DC (core cloud), edge DC (edge cloud 1, edge cloud 2).
On the basis of the networking topology, as shown in fig. 5, a networking topology operation interface diagram is shown, and a networking resource topology may be constructed and networking resources may be selected and supplemented in combination with steps S1022 to S1024; all networking resources cannot be found completely, and the found networking resources cannot be used completely, so that an operator can select the resources through a graphical interface; for example, for two edge clouds (edge DC1), which level of edge cloud is selected according to latency requirements; via step S1025, networking resources may be determined.
In one embodiment, after determining the networking resources through step S1025, the slice resources of the subnet need to be determined; because the subnetworks in the networking resource topology have resources, such as a base station of a wireless network, the subnetworks have the capability of supporting QOS and subinterfaces, the bearer network has the capability of supporting L3VPN, and the core network has the capability of supporting multi-network services, and the end-to-end slice deployment capability is formed by assembling the capabilities.
Determining slicing resources of the subnet according to slicing service requirements, wherein the specific process comprises the following steps:
selecting a newly-built QOS or a multiplexing QOS at the wireless network side according to the SLA and the safety isolation requirement;
according to SLA and security isolation requirements, selecting and using L3VPN or Flexe (flexible Ethernet technology) at the side of the bearer network, and selecting and reusing the original channel or newly building a channel;
according to SLA and security isolation requirements, at the core network side, the edge cloud or the core cloud is selected to reuse original network services or newly-built network services.
After the slice resources of the subnets are determined through the selection, referring to fig. 6, executing step S103, extracting slice configuration deployment capabilities from the subnets of the networking resource topology, setting a slice deployment process according to the slice service requirements, and constructing a slice deployment process model; as shown in fig. 6, the slice deployment flow model after configuration design is: start-core NS creation-AMF opening, PCF opening, UPF opening, SMF opening-edge NS creation-UPF opening-QOS configuration-NR subterminal configuration-L3 VPN new-end.
In the present embodiment, the terms to be explained:
AMF: access and Mobility Management Function;
PCF: policy Control Function;
UPF: user Plane Function User port Function;
SMF: session Management Function, Session Management Function.
In an embodiment, on the basis of the slice deployment process model (obtained in step S103), a guarantee design and a policy design are further performed in combination with step S104. The two designs are not actually sequenced, the prior design and the subsequent strategy design are generally logically guaranteed, but the sequence does not influence the whole function.
As shown in fig. 7, an operation interface diagram designed for security is shown. In the slice deployment process model, corresponding monitoring, polling and alarming models of the sub-network are associated, monitoring, polling and alarming of a wireless network, a bearer network and a core network are set, and end-to-end index monitoring of slices is realized.
For example, in a wireless network, the following relevant settings are included:
service requirements are as follows: AAU air interface utilization rate, AAU network element performance, DU switching performance index and DU network element performance;
and (3) selecting a routing inspection group: AAU network element polling, DU network element polling and CU network element polling;
and (3) selecting a monitoring alarm group: AAU network element alarm, AAU utilization rate alarm, DU network element alarm and DU performance alarm.
In the carrying network, the following relevant settings are included:
and (3) selecting a monitoring index group: bandwidth use condition, time delay performance and network element state;
selecting an operation and maintenance inspection group: VPN tunnel inspection and A network element inspection;
and (3) selecting a monitoring alarm group: time delay overrun alarm, broadband utilization overrun alarm, A network element serious alarm and B network element serious alarm;
in DC, the following relevant settings are included:
and (3) selecting a monitoring index group: UPF session management index group, AMF registration index, AMF success rate index, SMF session establishment index and SMF session modification index;
and (3) selecting a routing inspection group: UPF network element state inspection, UPF network utilization rate inspection, AMF network element state inspection, AMF configuration backup inspection, SMF network element state inspection and SMF data backup inspection;
and (3) selecting a monitoring alarm group: UPF network element serious alarm, UPF performance alarm, AMF network element alarm, AMF performance alarm, SMF network element alarm, SMF performance alarm.
The related settings are all options, and are checked or cancelled according to needs.
Referring to fig. 8, an operation interface diagram designed for the strategy is shown. And associating a strategy model corresponding to the subnet in the slice deployment process model, wherein a slice strategy is designed in the strategy model.
Specifically, as shown in fig. 8, in the wireless network, the bearer network, the edge DC and the core DC, the policy design mainly includes: capacity expansion strategy selection and alarm dispatch strategy selection. The specific values and options can be adjusted according to the needs.
In a wireless network, capacity expansion strategy selection: with respect to the DU, an abnormal DU exceeds "80" to upgrade the transmission-related person, such as "leader", "system leader";
and selecting an alarm dispatching strategy: regarding UPF, the alarm level is such as "serious" or "urgent", and the alarm type is such as the session utilization rate exceeds the threshold value, then the alarm can be performed; the settings of the alarm dispatch policy selection of the edge DC and the core DC are the same.
In a bearer network, selecting an alarm upgrading strategy: abnormal whole ring, upgrading sending, leading and system responsible persons;
and (3) selecting an alarm dispatching strategy: with respect to device a, the alert level is severe, urgent, and the alert type link is abnormal.
In the edge DC, the expansion strategy selection comprises a UPF expansion strategy, and an expansion threshold value and a contraction threshold value can be set;
in the core DC, the expansion policy selection includes a UPF expansion policy and an AMF expansion policy, and a corresponding expansion threshold and a corresponding reduction threshold may be set.
In the above related setting, the options may be selected or cancelled according to the need, and the numerical value may be input according to the need.
After the design is completed, the slice design finally forms the NST, and generates a service package (TOSCA) for test and arrangement after receiving the service order.
In an embodiment, in conjunction with step S105, the detailed procedure of end-to-end slice deployment is shown in fig. 9, and includes:
step S1051, matching the corresponding NST according to the order instruction, manually setting or automatically distributing parameters in the NST, and generating a service package;
step S1052, arranging network resources according to the service package, assembling subnet resources and configuration according to the slice arrangement flow, and arranging slices;
and S1053, updating slice resource information in the slice deployment process, and monitoring and visually displaying the deployment condition of the subnet.
Fig. 10 is a schematic diagram of an end-to-end slice automatic deployment process according to an embodiment.
First, in step S1001, after the user subscribes, the corresponding NST is matched.
Step S1002, slice provisioning and activation, and parameter configuration are performed, including a UPF address pool of the core DC, a UPF address pool of the edge DC, and RT and RD of a VRF (Virtual Routing Forwarding).
And loading a service packet, executing step S1003, opening and activating a slice, and automatically allocating parameters, wherein the parameters include, for example, SMF/UPF IP of core DC, UPF IP of edge DC, VLAN, and the like.
Step S1004, arranging network resources; assembling subnet resources and configuration, and deploying according to a configuration flow to obtain a slice topology 1004; the detailed process in slice topology 1004 is: firstly, pulling up a core/edge VNF (virtual network architecture), then opening the core/edge VNF, and further carrying out wireless QOS configuration and VRF configuration; and finally completing the configuration of the bearing VRF.
In step S1005, the resource module is used to update the slice resource information.
And step S1006, starting slice monitoring, slice inspection and slice assignment rules through the guarantee/strategy module, and displaying relevant information to a user.
In the slice deployment process, the deployment situation of each subnet can be monitored and visually displayed, as shown in fig. 11, for example, AA company NS deploys its core DC1, edge DC1, NR QOS, NR VRF sub-port, and L3 VPN; where "start" and "NS create" have been deployed successfully, the "AMF open", "PCF open", "UPF open", "SMF open" in core DC1 are in deployment, and the others are to be deployed. In this way, the success of deployment, the middle of deployment, the waiting deployment and the failure of deployment can be distinguished by different display modes (colors, filling modes) and the like, so that the working personnel can know the deployment situation in time.
After deployment is complete, as shown in fig. 12, the method further comprises:
step S106, after the slice deployment is finished, acquiring the operation state of the slices in the subnet, automatically generating a slice topology, and monitoring, inspecting and alarming the end-to-end indexes of the slices in the slice topology; the monitored information includes: layer-by-layer information of large customer slices, topology from slice to sub-slice to VNF, topology-based slices, sub-slices and networking resources;
through the visualized slice KPI (key performance indicator), resource occupation information and detailed alarm information, the user can monitor all slices.
The end-to-end slice automatic deployment method provided by the invention can provide a visual design tool aiming at the current networking condition of 5G, automatically discover networking resources of a wireless network, a bearer network and a core network, and after the networking resources are confirmed, a molecular network carries out new establishment or multiplexing selection of slice resources, and after the slice resources are confirmed, a monitoring and strategy is designed. After the design is finished, matching with corresponding NST, realizing the automatic deployment of the wireless-bearing-core end-to-end slicing, and monitoring the end-to-end slicing state after the deployment is finished; the method has the advantages that the end-to-end slice deployment mode is simple to operate, efficient in processing and comprehensive in function, and slicing requirements of users can be well met.
It should be noted that although the operations of the method of the present invention have been described in the above embodiments and the accompanying drawings in a particular order, this does not require or imply that these operations must be performed in this particular order, or that all of the operations shown must be performed, to achieve the desired results. Additionally or alternatively, certain steps may be omitted, multiple steps combined into one step execution, and/or one step broken down into multiple step executions.
Having described the method of an exemplary embodiment of the present invention, an end-to-end slice automation deployment system of an exemplary embodiment of the present invention is next described with reference to FIG. 13.
The implementation of the end-to-end slice automation deployment system can refer to the implementation of the above method, and repeated details are omitted. The term "module," as used below, may be a combination of software and/or hardware that implements a predetermined function. Although the means described in the embodiments below are preferably implemented in software, an implementation in hardware, or a combination of software and hardware is also possible and contemplated.
Based on the same inventive concept, the present invention further provides an end-to-end slicing automation deployment system, as shown in fig. 13, the system includes:
a slicing service requirement obtaining module 1310, configured to obtain a slicing service requirement;
a networking resource topology constructing module 1320, configured to construct a networking resource topology according to the slicing service requirement;
a slice deployment process model building module 1330, configured to extract slice configuration deployment capabilities from the subnets of the networking resource topology, set a slice deployment process according to the slice service requirements, and build a slice deployment process model;
a network slice template generating module 1340, configured to associate the slice monitoring and policy model in the slice deployment process model, and generate a network slice template;
and a slice deployment module 1350, configured to match the corresponding network slice template according to the order instruction, set parameters in the network slice template, and deploy the slice according to a slice deployment flow, so that the slice enters an activation state and starts monitoring and policy.
It should be noted that although several modules of the end-to-end slice automation deployment system are mentioned in the above detailed description, such partitioning is merely exemplary and not mandatory. Indeed, the features and functionality of two or more of the modules described above may be embodied in one module according to embodiments of the invention. Conversely, the features and functions of one module described above may be further divided into embodiments by a plurality of modules.
In practical application, a user needs to provide slicing service requirements (access areas and SLAs), after receiving the slicing service requirements, the system firstly judges whether slices meeting the requirements exist, and if so, the user is migrated into the slices. Otherwise, executing a slice design flow: and automatically discovering the base stations in the area according to the access area, and discovering the wireless network, the bearer network and the edge/core DC accessed on the base stations according to the base stations. And confirming networking resources according to user SLAs on the basis of the networking resources, selecting new or reuse of slice resources by the molecular network after the networking resources are confirmed, and designing monitoring and strategies after the slice resources are confirmed. And storing the design result as NST, matching the corresponding NST after the user orders, filling external parameters and distributing the automatic parameters, and configuring, deploying and issuing each subnet according to the design flow. After the distribution is finished, monitoring and strategies are started, the slices enter an activated state, and all the slices are monitored.
Based on the aforementioned inventive concept, as shown in fig. 14, the present invention further proposes a computer apparatus 1400, comprising a memory 1410, a processor 1420 and a computer program 1430 stored on the memory 1410 and operable on the processor 1420, wherein the processor 1420 implements the aforementioned end-to-end slice automated deployment method when executing the computer program 1430.
In another embodiment of the present invention, a computer-readable storage medium is also presented, which stores a computer program, which when executed by a processor, implements an end-to-end slice automation deployment method.
The automatic deployment method and the system for the end-to-end slicing realize the discovery of networking resources of a wireless network-a bearer network-a core network according to the area where a user is located and the slicing resource design is carried out according to the slicing service requirement; after the design is finished, slice end-to-end deployment is carried out according to user ordering, and an end-to-end slice state is monitored after the deployment is finished; the method has the advantages that the end-to-end slice deployment mode is simple to operate, efficient in processing and comprehensive in function, and slicing requirements of users can be well met.
As will be appreciated by one skilled in the art, embodiments of the present invention may be provided as a method, system, or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present invention is described with reference to flowchart illustrations and/or block diagrams of methods and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
Finally, it should be noted that: the above-mentioned embodiments are only specific embodiments of the present invention, which are used for illustrating the technical solutions of the present invention and not for limiting the same, and the protection scope of the present invention is not limited thereto, although the present invention is described in detail with reference to the foregoing embodiments, those skilled in the art should understand that: any person skilled in the art can modify or easily conceive the technical solutions described in the foregoing embodiments or equivalent substitutes for some technical features within the technical scope of the present disclosure; such modifications, changes or substitutions do not depart from the spirit and scope of the embodiments of the present invention, and they should be construed as being included therein. Therefore, the protection scope of the present invention shall be subject to the protection scope of the claims.
Claims (11)
1. An end-to-end slice automation deployment method, characterized in that the method comprises:
acquiring slicing service requirements;
constructing a networking resource topology according to the slicing service requirement;
extracting slice configuration deployment capacity from the subnet of the networking resource topology, setting a slice deployment flow according to the slice service requirement, and constructing a slice deployment flow model;
associating a slice monitoring and strategy model in the slice deployment process model to generate a network slice template;
matching the corresponding network slice template according to the order instruction, setting parameters in the network slice template, deploying the slice according to the slice deployment flow, enabling the slice to enter an activation state and starting monitoring and strategies.
2. The method for automated deployment of end-to-end slicing of claim 1, wherein the obtained slicing service requirement comprises: the type of slice, service level agreement parameters, security isolation level and coverage area of the slicing service.
3. The method for automated deployment of end-to-end slicing of claim 2, wherein constructing a networking resource topology according to the slicing service requirement comprises:
generating a networking topology meeting the slicing service requirement according to the coverage area;
discovering base stations within the coverage area;
and constructing a networking resource topology of a wireless network-bearer network-core network according to the base station and the networking topology.
4. The method for automated deployment of end-to-end slicing of claim 3, wherein a networking resource topology is constructed according to the slicing service requirement, further comprising:
and selecting or supplementing the networking resources in the networking resource topology according to a networking resource adjusting instruction, and determining the networking resources.
5. The end-to-end slice automation deployment method of claim 4, further comprising after determining the networking resources, determining the networking resources
Determining slicing resources of the subnet according to the slicing service requirements; wherein, include:
selecting a newly-built QOS or a multiplexing QOS at the wireless network side according to the SLA and the safety isolation requirement;
according to SLA and security isolation requirements, selecting and using L3VPN or Flexe at the side of the bearer network, and selecting and reusing the original channel or building a new channel;
according to SLA and security isolation requirements, at the core network side, the edge cloud or the core cloud is selected to reuse original network services or newly-built network services.
6. The end-to-end slice automated deployment method of claim 1, wherein associating a slice monitoring and policy model in the slice deployment flow model to generate a network slice template comprises:
in the slice deployment flow model, correlating corresponding monitoring, routing inspection and alarm models of the sub-networks, and monitoring the indexes from end to end of the slices;
and associating a strategy model corresponding to the subnet in the slice deployment process model, wherein a slice strategy is designed in the strategy model.
7. The automatic end-to-end slice deployment method according to claim 1, wherein matching the corresponding network slice template according to an order instruction, setting parameters in the network slice template, deploying slices according to a slice deployment flow, making the slices enter an activated state and starting monitoring and policy, comprises:
matching the corresponding network slice template according to the order instruction, manually setting or automatically distributing parameters in the network slice template, and generating a service package;
arranging network resources according to the service package, assembling subnet resources and configuration according to the slice arrangement flow, and arranging the slices;
and in the slice deployment process, updating slice resource information, and monitoring and visually displaying the deployment condition of the subnet.
8. The end-to-end slice automation deployment method of claim 1, after the slice deployment is completed, further comprising:
collecting the operation state of the slices in the subnet, automatically generating a slice topology, and monitoring, inspecting and alarming the end-to-end indexes of the slices in the slice topology; the monitored information includes: layer-by-layer information of large customer slices, topology from slice to sub-slice to VNF, topology-based slices, sub-slices and networking resources;
and displaying the slice KPI, the resource occupation information and the detailed alarm information in a visual way.
9. An end-to-end slicing automation deployment system, characterized in that the system comprises:
the slicing service requirement acquisition module is used for acquiring slicing service requirements;
the networking resource topology building module is used for building a networking resource topology according to the slicing service requirement;
the slice deployment process model building module is used for extracting slice configuration deployment capacity from the subnet of the networking resource topology, setting a slice deployment process according to the slice service requirement and building a slice deployment process model;
the network slice template generation module is used for associating the slice monitoring and strategy model in the slice deployment process model to generate a network slice template;
and the slice deployment module is used for matching the corresponding network slice template according to the order instruction, setting parameters in the network slice template, deploying the slice according to the slice deployment flow, enabling the slice to enter an activation state and starting a monitoring and strategy.
10. A computer device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, wherein the processor implements the method of any one of claims 1 to 8 when executing the computer program.
11. A computer-readable storage medium, characterized in that the computer-readable storage medium stores a computer program which, when executed by a processor, implements the method of any one of claims 1 to 8.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911255377.0A CN111065116B (en) | 2019-12-10 | 2019-12-10 | Automatic deployment method and system for end-to-end slicing |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911255377.0A CN111065116B (en) | 2019-12-10 | 2019-12-10 | Automatic deployment method and system for end-to-end slicing |
Publications (2)
Publication Number | Publication Date |
---|---|
CN111065116A true CN111065116A (en) | 2020-04-24 |
CN111065116B CN111065116B (en) | 2021-03-16 |
Family
ID=70300226
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201911255377.0A Active CN111065116B (en) | 2019-12-10 | 2019-12-10 | Automatic deployment method and system for end-to-end slicing |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111065116B (en) |
Cited By (22)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111629390A (en) * | 2020-04-30 | 2020-09-04 | 北京邮电大学 | Network slice arranging method and device |
CN112235140A (en) * | 2020-10-13 | 2021-01-15 | 中移(杭州)信息技术有限公司 | Network slice management method, device, network equipment and storage medium |
CN112799680A (en) * | 2021-01-31 | 2021-05-14 | 云知声智能科技股份有限公司 | Method and equipment for accelerating AI model deployment |
CN112804086A (en) * | 2020-12-31 | 2021-05-14 | 中盈优创资讯科技有限公司 | 5G network slice end-to-end pull-through method and device |
CN112867035A (en) * | 2021-01-18 | 2021-05-28 | 中盈优创资讯科技有限公司 | One-key opening method and device for SPN (shortest Path network) network element of 5G (gigabit-capable) transmission network |
CN113014419A (en) * | 2021-02-01 | 2021-06-22 | 中盈优创资讯科技有限公司 | Automatic opening method and device for 5G carrier subnet slice |
CN113595754A (en) * | 2020-04-30 | 2021-11-02 | 中国移动通信集团北京有限公司 | Network slice management device, method, apparatus and medium |
CN113708948A (en) * | 2020-05-22 | 2021-11-26 | 亚信科技(中国)有限公司 | Slicing flow control method, device, module and computer readable medium |
CN113726586A (en) * | 2021-10-20 | 2021-11-30 | 中国联合网络通信集团有限公司 | Network slice deployment method, device, server and computer readable storage medium |
CN113965475A (en) * | 2020-07-02 | 2022-01-21 | 中国移动通信集团设计院有限公司 | Network slicing project acceptance method and system |
CN114158061A (en) * | 2020-09-08 | 2022-03-08 | 中国移动通信有限公司研究院 | Network slice management method and device and management function entity |
WO2022048571A1 (en) * | 2020-09-02 | 2022-03-10 | 中兴通讯股份有限公司 | Transport sub-slice bandwidth adjustment method and apparatus, system, and storage medium |
CN114205851A (en) * | 2021-12-27 | 2022-03-18 | 天翼物联科技有限公司 | Multi-module-based optimal 5G slice configuration system, method, device and medium |
CN114244713A (en) * | 2021-10-29 | 2022-03-25 | 国网浙江省电力有限公司嘉兴供电公司 | Resource backup method and device for power 5G network slice |
CN114268535A (en) * | 2021-12-20 | 2022-04-01 | 杭州东方通信软件技术有限公司 | 5G sliced product opening method and device |
CN114547769A (en) * | 2022-02-09 | 2022-05-27 | 中国舰船研究设计中心 | Knowledge engineering-based adaptive ship section end-cut model building method |
WO2023273804A1 (en) * | 2021-06-30 | 2023-01-05 | 中兴通讯股份有限公司 | Networking method, network management system, server and computer-readable storage medium |
CN115865695A (en) * | 2022-11-23 | 2023-03-28 | 博瑞得科技有限公司 | 5G private network resource topology generation method and device based on cross-professional data association |
CN115883369A (en) * | 2021-09-28 | 2023-03-31 | 中国移动通信集团重庆有限公司 | Network slice deployment method, system, device, equipment and readable storage medium |
WO2024001178A1 (en) * | 2022-06-27 | 2024-01-04 | 中兴通讯股份有限公司 | Communication network device deployment method and system, and storage medium |
WO2024108810A1 (en) * | 2022-11-22 | 2024-05-30 | 网络通信与安全紫金山实验室 | Intelligent slicing system data reference set generation method and apparatus, device, and medium |
CN115883369B (en) * | 2021-09-28 | 2024-10-22 | 中国移动通信集团重庆有限公司 | Network slice deployment method, system, device, equipment and readable storage medium |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN207234831U (en) * | 2017-09-18 | 2018-04-13 | 天元瑞信通信技术股份有限公司 | A kind of 5G network architectures based on edge calculations and microtomy |
CN108632058A (en) * | 2017-03-18 | 2018-10-09 | 华为技术有限公司 | The management method and device of network slice |
WO2018213991A1 (en) * | 2017-05-22 | 2018-11-29 | 华为技术有限公司 | Network slice creating method and apparatus, and communication system |
CN109120426A (en) * | 2017-06-26 | 2019-01-01 | 中兴通讯股份有限公司 | A kind of network slice management method, device and computer readable storage medium |
CN109218047A (en) * | 2017-06-30 | 2019-01-15 | 中国移动通信有限公司研究院 | Network sliced sheet processing method and device, communication system and storage medium |
-
2019
- 2019-12-10 CN CN201911255377.0A patent/CN111065116B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108632058A (en) * | 2017-03-18 | 2018-10-09 | 华为技术有限公司 | The management method and device of network slice |
WO2018213991A1 (en) * | 2017-05-22 | 2018-11-29 | 华为技术有限公司 | Network slice creating method and apparatus, and communication system |
CN109120426A (en) * | 2017-06-26 | 2019-01-01 | 中兴通讯股份有限公司 | A kind of network slice management method, device and computer readable storage medium |
CN109218047A (en) * | 2017-06-30 | 2019-01-15 | 中国移动通信有限公司研究院 | Network sliced sheet processing method and device, communication system and storage medium |
CN207234831U (en) * | 2017-09-18 | 2018-04-13 | 天元瑞信通信技术股份有限公司 | A kind of 5G network architectures based on edge calculations and microtomy |
Cited By (29)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111629390B (en) * | 2020-04-30 | 2021-07-13 | 北京邮电大学 | Network slice arranging method and device |
CN111629390A (en) * | 2020-04-30 | 2020-09-04 | 北京邮电大学 | Network slice arranging method and device |
CN113595754A (en) * | 2020-04-30 | 2021-11-02 | 中国移动通信集团北京有限公司 | Network slice management device, method, apparatus and medium |
CN113708948A (en) * | 2020-05-22 | 2021-11-26 | 亚信科技(中国)有限公司 | Slicing flow control method, device, module and computer readable medium |
CN113965475B (en) * | 2020-07-02 | 2023-09-05 | 中国移动通信集团设计院有限公司 | Network slice engineering acceptance method and system |
CN113965475A (en) * | 2020-07-02 | 2022-01-21 | 中国移动通信集团设计院有限公司 | Network slicing project acceptance method and system |
WO2022048571A1 (en) * | 2020-09-02 | 2022-03-10 | 中兴通讯股份有限公司 | Transport sub-slice bandwidth adjustment method and apparatus, system, and storage medium |
CN114158061A (en) * | 2020-09-08 | 2022-03-08 | 中国移动通信有限公司研究院 | Network slice management method and device and management function entity |
CN112235140A (en) * | 2020-10-13 | 2021-01-15 | 中移(杭州)信息技术有限公司 | Network slice management method, device, network equipment and storage medium |
CN112804086A (en) * | 2020-12-31 | 2021-05-14 | 中盈优创资讯科技有限公司 | 5G network slice end-to-end pull-through method and device |
CN112867035A (en) * | 2021-01-18 | 2021-05-28 | 中盈优创资讯科技有限公司 | One-key opening method and device for SPN (shortest Path network) network element of 5G (gigabit-capable) transmission network |
CN112867035B (en) * | 2021-01-18 | 2023-08-25 | 中盈优创资讯科技有限公司 | One-key switching method and device for SPN network element of 5G transmission network |
CN112799680A (en) * | 2021-01-31 | 2021-05-14 | 云知声智能科技股份有限公司 | Method and equipment for accelerating AI model deployment |
CN113014419A (en) * | 2021-02-01 | 2021-06-22 | 中盈优创资讯科技有限公司 | Automatic opening method and device for 5G carrier subnet slice |
WO2023273804A1 (en) * | 2021-06-30 | 2023-01-05 | 中兴通讯股份有限公司 | Networking method, network management system, server and computer-readable storage medium |
CN115883369B (en) * | 2021-09-28 | 2024-10-22 | 中国移动通信集团重庆有限公司 | Network slice deployment method, system, device, equipment and readable storage medium |
CN115883369A (en) * | 2021-09-28 | 2023-03-31 | 中国移动通信集团重庆有限公司 | Network slice deployment method, system, device, equipment and readable storage medium |
CN113726586A (en) * | 2021-10-20 | 2021-11-30 | 中国联合网络通信集团有限公司 | Network slice deployment method, device, server and computer readable storage medium |
CN114244713A (en) * | 2021-10-29 | 2022-03-25 | 国网浙江省电力有限公司嘉兴供电公司 | Resource backup method and device for power 5G network slice |
CN114244713B (en) * | 2021-10-29 | 2024-04-09 | 国网浙江省电力有限公司桐乡市供电公司 | Resource backup method and device for electric power 5G network slice |
CN114268535B (en) * | 2021-12-20 | 2024-01-19 | 杭州东方通信软件技术有限公司 | Method and device for opening 5G slice product |
CN114268535A (en) * | 2021-12-20 | 2022-04-01 | 杭州东方通信软件技术有限公司 | 5G sliced product opening method and device |
CN114205851A (en) * | 2021-12-27 | 2022-03-18 | 天翼物联科技有限公司 | Multi-module-based optimal 5G slice configuration system, method, device and medium |
CN114205851B (en) * | 2021-12-27 | 2023-10-03 | 天翼物联科技有限公司 | Multimode group optimization-based 5G slice configuration system, method, device and medium |
CN114547769B (en) * | 2022-02-09 | 2024-04-16 | 中国舰船研究设计中心 | Knowledge engineering-based self-adaptive ship profile end cutting model building method |
CN114547769A (en) * | 2022-02-09 | 2022-05-27 | 中国舰船研究设计中心 | Knowledge engineering-based adaptive ship section end-cut model building method |
WO2024001178A1 (en) * | 2022-06-27 | 2024-01-04 | 中兴通讯股份有限公司 | Communication network device deployment method and system, and storage medium |
WO2024108810A1 (en) * | 2022-11-22 | 2024-05-30 | 网络通信与安全紫金山实验室 | Intelligent slicing system data reference set generation method and apparatus, device, and medium |
CN115865695A (en) * | 2022-11-23 | 2023-03-28 | 博瑞得科技有限公司 | 5G private network resource topology generation method and device based on cross-professional data association |
Also Published As
Publication number | Publication date |
---|---|
CN111065116B (en) | 2021-03-16 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN111065116B (en) | Automatic deployment method and system for end-to-end slicing | |
CN106656801B (en) | Reorientation method, device and the Business Stream repeater system of the forward-path of Business Stream | |
CN109561033B (en) | Method and device for multicast replication in Overlay network | |
CN109842507B (en) | Network slice management method and equipment | |
US12074767B2 (en) | Data processing method and device for cooperating with an artificial intelligence management plane, electronic device, and storage medium | |
CN107613506B (en) | Automatic configuration method for north interface LTE service and north interface device | |
US20140136908A1 (en) | Fault Protection Method and Fault Protection Apparatus in a Multi-Domain Network | |
EP2804343B1 (en) | Method for mapping a network topology request to a physical network, computer program product, mobile communication system, and network configuration platform | |
CN110351141B (en) | Flexe interface management method, device and network element | |
CN109525493B (en) | Network path establishing method and device | |
CN117118886A (en) | Message forwarding method, head-end equipment, controller, equipment and storage medium | |
CN107872338B (en) | Network management system, service configuration method, service configuration request method and device | |
US8238265B2 (en) | Auto-binding SDP RSVP LSP tunnel | |
WO2016128030A1 (en) | Method and apparatus for managing a communication network | |
CN106603722B (en) | Management equipment determining method and device | |
CN111510366B (en) | Method and device for deploying network management tunnel of power communication network | |
CN101431435B (en) | Connection-oriented service configuration and management method | |
CN116192890A (en) | Novel system for opening and arranging private network in cloud under data center | |
CN115250500A (en) | Slicing analysis method of bearing network | |
CN114070746A (en) | Circuit series connection method and system for multi-type transmission network | |
CN114285778A (en) | Power dispatching data network networking safety test system and test method | |
CN105519184B (en) | Method, radio equipment controller and the wireless device of capability negotiation | |
CN108736570B (en) | Networking system of transformer substation | |
CN115051917A (en) | Method for automatically generating autonomous system AS identifier, first network equipment and system | |
US8775597B2 (en) | Technique for management of communication networks |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CP02 | Change in the address of a patent holder |
Address after: Room 702-2, No. 4811, Cao'an Highway, Jiading District, Shanghai Patentee after: CHINA UNITECHS Address before: 100872 5th floor, Renmin culture building, 59 Zhongguancun Street, Haidian District, Beijing Patentee before: CHINA UNITECHS |
|
CP02 | Change in the address of a patent holder |