CN114338387A - Slice configuration method and device, electronic equipment and computer readable storage medium - Google Patents

Slice configuration method and device, electronic equipment and computer readable storage medium Download PDF

Info

Publication number
CN114338387A
CN114338387A CN202111637759.7A CN202111637759A CN114338387A CN 114338387 A CN114338387 A CN 114338387A CN 202111637759 A CN202111637759 A CN 202111637759A CN 114338387 A CN114338387 A CN 114338387A
Authority
CN
China
Prior art keywords
slice
generated
target
existing
configuration information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202111637759.7A
Other languages
Chinese (zh)
Inventor
王恒
梅承力
夏旭
邢燕霞
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Telecom Corp Ltd
Original Assignee
China Telecom Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Telecom Corp Ltd filed Critical China Telecom Corp Ltd
Priority to CN202111637759.7A priority Critical patent/CN114338387A/en
Publication of CN114338387A publication Critical patent/CN114338387A/en
Pending legal-status Critical Current

Links

Images

Abstract

The invention provides a slice configuration method and device, electronic equipment and a computer readable storage medium, wherein the method comprises the following steps: acquiring a slice generation request, wherein the slice generation request carries a service level protocol required by a slice to be generated; determining whether a target slice matched with the slice to be generated exists in an existing slice set or not based on slice configuration information in the service level protocol; and if the existing slice set has a target slice matched with the slice to be generated, determining the slice to be generated based on the target slice, otherwise, newly building the slice to be generated. According to the technical scheme, the client can be served through the existing slices without newly building a slice for each client, occupation of network resources and labor time cost is reduced, slice acquisition efficiency is improved, and user experience of the client is improved.

Description

Slice configuration method and device, electronic equipment and computer readable storage medium
[ technical field ] A method for producing a semiconductor device
The present invention relates to the field of computer network technologies, and in particular, to a slice configuration method and apparatus, an electronic device, and a computer-readable storage medium.
[ background of the invention ]
The current 5G standard lifecycle management process for network slices is generally: CSMF (communication Service management function) acquires SLA (Service Level Agreement) of a target slice from AN enterprise client side, NSMF (network slice management function) translates the content carried by the SLA into network language and issues the network language to three network slice subnet management functions AN-NSSMF, TN-NSSMF and CN-NSSMF, and the three network slice sub-networks respectively generate network slices in a wireless network, a carrier network and a core network domain.
However, in the actual production process, since the network services are various and the number of users running the services is huge, generating network slices for different users consumes a lot of network resources, labor cost and time cost, and is too large in consumption and too low in efficiency.
Therefore, how to reduce the cost for generating the network slice becomes a technical problem to be solved urgently at present.
[ summary of the invention ]
The embodiment of the invention provides a slice configuration method and device, electronic equipment and a computer readable storage medium, and aims to solve the technical problems of excessive consumption and low efficiency of independently configuring network slices for a large number of users in the related art.
In a first aspect, an embodiment of the present invention provides a slice configuration method, including: acquiring a slice generation request, wherein the slice generation request carries a service level protocol required by a slice to be generated; determining whether a target slice matched with the slice to be generated exists in an existing slice set or not based on slice configuration information in the service level protocol; and if the existing slice set has a target slice matched with the slice to be generated, determining the slice to be generated based on the target slice, otherwise, newly building the slice to be generated.
In the above embodiment of the present invention, optionally, the step of determining whether there is a target slice in an existing slice set, which is matched with the slice to be generated, based on the slice configuration information in the service level agreement includes: determining cosine similarity between the slice to be generated and each existing slice based on slice configuration information in the service level protocol and slice configuration information of each existing slice in the existing slice set; selecting a maximum value from cosine similarities corresponding to all the existing slices; if the maximum value is larger than or equal to a preset similarity threshold value, determining the slice to be generated based on the target slice; and if the maximum value is smaller than a preset similarity threshold value, newly building the slice to be generated.
In the foregoing embodiment of the present invention, optionally, the slice configuration information includes: uplink bandwidth, downlink bandwidth, time delay, number of users, number of sessions, usage area, and voice support status.
In the above embodiment of the present invention, optionally, the calculating the cosine similarity includes:
Figure BDA0003442621030000021
wherein i represents any slice configuration information in the service level agreement, AiA discrete value representing the ith slice configuration information in the service level agreement, n representing the serial number of any existing slice in the existing slice set, SniA discrete value representing the ith slice configuration information of the nth existing slice in the set of existing slices, k representing the total number of slice configuration information in the service level agreement, SimnRepresenting the cosine similarity of the slice to be generated and the nth existing slice in the existing slice set.
In the above embodiment of the present invention, optionally, the step of determining the slice to be generated based on the target slice includes: if the available network resources of the target slice can cover the required network resources of the slice to be generated, setting the target slice as the slice to be generated; if the available network resources of the target slice cannot cover the required network resources of the slice to be generated, acquiring newly added network resources matched with the shortage of the available network resources for the target slice, and setting the target slice after acquiring the newly added network resources as the slice to be generated.
In the above embodiment of the present invention, optionally, the step of determining the slice to be generated based on the target slice includes: when detecting that the number of unoccupied users of the target slice is smaller than the number of required users of the slice to be generated, determining the number of difference users between the number of unoccupied users and the number of required users; sending a user permission request corresponding to the difference user number to a network element of the target slice; responding to a permission response of the network element to the user permission request, and newly adding the difference value user number for the target slice; and setting the target slice with the newly increased number of the difference users as the slice to be generated.
In the above embodiment of the present invention, optionally, before the step of determining whether there is a target slice in an existing slice set, based on slice configuration information in the service level agreement, the method further includes: detecting whether the slice generation request carries a slice sharing identifier; and allowing the service level agreement to enter the slice configuration information based on the service level agreement and determining whether the target slice matched with the slice to be generated exists in the existing slice set or not under the condition that the slice generating request carries the slice sharing identification.
In a second aspect, an embodiment of the present invention provides a slice configuration apparatus, including: the device comprises a slice generation request acquisition unit, a slice generation unit and a slice generation unit, wherein the slice generation request acquisition unit is used for acquiring a slice generation request, and the slice generation request carries a service level protocol required by a slice to be generated; the target slice matching unit is used for determining whether a target slice matched with the slice to be generated exists in the existing slice set or not based on the slice configuration information in the service level agreement; and the slice generating unit is used for determining the slice to be generated based on the target slice if the target slice matched with the slice to be generated exists in the existing slice set, and otherwise, newly building the slice to be generated.
In the above embodiment of the present invention, optionally, the target slice matching unit is configured to: determining cosine similarity between the slice to be generated and each existing slice based on slice configuration information in the service level protocol and slice configuration information of each existing slice in the existing slice set; selecting a maximum value from cosine similarities corresponding to all the existing slices; if the maximum value is larger than or equal to a preset similarity threshold value, determining the slice to be generated based on the target slice; and if the maximum value is smaller than a preset similarity threshold value, newly building the slice to be generated.
In the foregoing embodiment of the present invention, optionally, the slice configuration information includes: uplink bandwidth, downlink bandwidth, time delay, number of users, number of sessions, usage area, and voice support status.
In the above embodiment of the present invention, optionally, the method further includes: a cosine similarity calculation unit for: the cosine similarity is calculated and the cosine similarity is calculated,
Figure BDA0003442621030000041
wherein i represents any slice configuration information in the service level agreement, AiA discrete value representing the ith slice configuration information in the service level agreement, n representing the serial number of any existing slice in the existing slice set, SniA discrete value representing the ith slice configuration information of the nth existing slice in the set of existing slices, k representing the total number of slice configuration information in the service level agreement, SimnRepresenting the cosine similarity of the slice to be generated and the nth existing slice in the existing slice set.
In the above embodiment of the present invention, optionally, the target slice matching unit is configured to: if the available network resources of the target slice can cover the required network resources of the slice to be generated, setting the target slice as the slice to be generated; if the available network resources of the target slice cannot cover the required network resources of the slice to be generated, acquiring newly added network resources matched with the shortage of the available network resources for the target slice, and setting the target slice after acquiring the newly added network resources as the slice to be generated.
In the above embodiment of the present invention, optionally, the target slice matching unit is configured to: when detecting that the number of unoccupied users of the target slice is smaller than the number of required users of the slice to be generated, determining the number of difference users between the number of unoccupied users and the number of required users; sending a user permission request corresponding to the difference user number to a network element of the target slice; responding to a permission response of the network element to the user permission request, and newly adding the difference value user number for the target slice; and setting the target slice with the newly increased number of the difference users as the slice to be generated.
In the above embodiment of the present invention, optionally, the method further includes: a slice identification verification unit to: detecting whether the slice generation request carries a slice sharing identifier; and allowing the target slice matching unit to determine whether the target slice matched with the slice to be generated exists in the existing slice set or not under the condition that the slice generating request carries the slice sharing identification.
In a third aspect, an embodiment of the present invention provides an electronic device, including: at least one processor; and a memory communicatively coupled to the at least one processor; wherein the memory stores instructions executable by the at least one processor, the instructions being arranged to perform the method of any of the first aspects above.
In a fourth aspect, an embodiment of the present invention provides a computer-readable storage medium storing computer-executable instructions for performing the method flow described in any one of the first aspect.
Through the technical scheme, aiming at the technical problems that in the related technology, network slices are configured for a large number of users independently, consumption is too high, and efficiency is too low, the existing slices can serve the clients, new slices do not need to be built for each client at the next time, occupation of network resources and labor time cost is reduced, slice acquisition efficiency is improved, and user experience of the clients is facilitated to be improved.
[ description of the drawings ]
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings needed to be used in the embodiments will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without creative efforts.
FIG. 1 shows a flow diagram of a slice configuration method according to one embodiment of the invention;
FIG. 2 shows a flow diagram of a slice configuration method according to another embodiment of the invention;
FIG. 3 shows a block diagram of a slice configuration apparatus according to an embodiment of the invention;
FIG. 4 shows a block diagram of an electronic device according to an embodiment of the invention.
[ detailed description ] embodiments
For better understanding of the technical solutions of the present invention, the following detailed descriptions of the embodiments of the present invention are provided with reference to the accompanying drawings.
It should be understood that the described embodiments are only some embodiments of the invention, and not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The terminology used in the embodiments of the invention is for the purpose of describing particular embodiments only and is not intended to be limiting of the invention. As used in the examples of the present invention and the appended claims, the singular forms "a," "an," and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise.
Fig. 1 shows a flow diagram of a slice configuration method according to an embodiment of the invention.
As shown in fig. 1, a flow of a slice configuration method according to an embodiment of the present invention includes:
step 102, a slice generation request is obtained, and the slice generation request carries a service level agreement required by a slice to be generated.
It should be noted that the slices described in the context of the present application are network slices, which are equivalent to a set of virtualized network functions and can provide the client with the network services required by the client. Further, when the client needs to use the network slice, the client may send a slice generation request to the NSMF through the CSMF, where the slice generation request carries a service level agreement required by the slice to be generated, and the service level agreement specifies a service required by the client and an expected service level, in other words, service content and service level of the slice to be generated required by the client are reflected.
And step 104, determining whether a target slice matched with the slice to be generated exists in the existing slice set or not based on the slice configuration information in the service level agreement.
The service level protocol carries slice configuration information of a slice to be generated, which is required by a client, wherein the slice configuration information comprises but is not limited to a plurality of items of uplink bandwidth, downlink bandwidth, time delay, the number of users, the number of sessions, a use area and a voice support state, and the function and the attribute of the slice to be generated are reflected from a plurality of dimensions.
And 106, if the existing slice set has a target slice matched with the slice to be generated, determining the slice to be generated based on the target slice, otherwise, newly building the slice to be generated.
And matching the slice configuration information in the service level agreement with the slice configuration information of each existing slice in the existing slice set, and searching whether the existing slice set has a target slice matched with the slice to be generated. If the target slice is the same as or similar to the slice to be generated, the slice to be generated does not need to be additionally newly built, and the slice to be generated only needs to be quickly obtained on the basis of the target slice. Therefore, the client can be served by the existing slices without newly building a slice for each client, occupation of network resources and labor time cost is reduced, slice acquisition efficiency is improved, and user experience of the client is facilitated to be improved.
In addition, if the existing slice set does not have the target slice matched with the slice to be generated, the slice to be generated can be directly newly built for the client so as to meet the actual requirement of the client.
Fig. 2 shows a flow diagram of a slice configuration method according to another embodiment of the invention.
As shown in fig. 2, a flow of a slice configuration method according to another embodiment of the present invention includes:
step 202, a slice generation request is obtained, wherein the slice generation request carries a service level agreement required by a slice to be generated.
Step 204, determining cosine similarity between the slice to be generated and each existing slice based on slice configuration information in the service level agreement and slice configuration information of each existing slice in the existing slice set when it is detected that the slice generation request carries the slice sharing identifier.
Since slice sharing involves network resource sharing, closely related to network security, client consent is required to be able to boot. And the slice sharing mark indicates that slice sharing is agreed, and if the slice generation request carries the slice sharing mark, the client agrees to share the existing slice with other clients when sending the slice generation request to the NSMF through the CSMF, so that the configuration step of slice sharing can be entered. Otherwise, when the slice generation request is detected not to carry the slice sharing identifier, the client does not agree with the slice sharing, and the process is terminated.
Since the slice configuration information reflects the functions and attributes of the slices from a plurality of dimensions, the matching degree between the slice to be generated and the existing slice can be determined by calculating the cosine similarity between the slice configuration information of the slice to be generated and the slice configuration information of the existing slice.
Specifically, the way of calculating the cosine similarity includes:
Figure BDA0003442621030000081
wherein i represents any slice configuration information in the service level agreement, AiA discrete value representing the ith slice configuration information in the service level agreement, n representing the serial number of any existing slice in the existing slice set, SniA discrete value representing the ith slice configuration information of the nth existing slice in the set of existing slices, k representing the total number of slice configuration information in the service level agreement, SimnRepresenting the cosine similarity of the slice to be generated and the nth existing slice in the existing slice set.
In this way, for each existing slice, in the calculation process, the difference between each item of slice configuration information of the slice to be generated and each item of slice configuration information of the existing slice needs to be considered, so that the obtained cosine similarity can reflect the overall similarity degree of the slice to be generated and the existing slice.
Step 206, selecting a maximum value from the cosine similarities corresponding to all the existing slices, judging whether the maximum value is greater than or equal to a preset similarity threshold, if so, entering step 208, otherwise, entering step 210.
If the cosine similarity corresponding to an existing slice is the maximum value of the cosine similarities of all the existing slices, the existing slice is most similar to the required slice to be generated, and the existing slice can be determined as an object which can be taken by the client.
Step 208, determining whether the available network resource of the target slice can cover the required network resource of the slice to be generated, if so, entering step 212, otherwise, entering step 214.
Further, the predetermined similarity threshold value represents the lowest similarity of the existing slice and the to-be-generated slice when the existing slice can replace the to-be-generated slice to serve the client, and if the maximum value is greater than or equal to the predetermined similarity threshold value, the existing slice has the possibility of replacing the to-be-generated slice to serve the client.
In this case, it is necessary to further verify whether the available network resources of the target slice can cover the required network resources of the slice to be generated.
And step 210, newly building the section to be generated.
Otherwise, if the maximum value is smaller than the predetermined similarity threshold, it indicates that the existing slice does not have the possibility of replacing the slice to be generated to serve the client, and at this time, no existing slice can be used for the client, and the slice to be generated needs to be newly created for the client.
Step 212, setting the target slice as the slice to be generated.
Step 214, obtaining a newly added network resource matched with the shortage of the available network resource for the target slice, and setting the target slice obtained after obtaining the newly added network resource as the slice to be generated.
When whether the available network resources of the target slice can cover the required network resources of the slice to be generated is further checked, if the available network resources of the target slice can cover the required network resources of the slice to be generated, the available network resources of the target slice are enough to be used by the client, and the target slice can be directly set as the slice to be generated.
If the available network resources of the target slice cannot cover the required network resources of the slice to be generated, it is indicated that the available network resources of the target slice are not enough to support the use of the client, and the capacity expansion of the available network resources of the target slice is required. Specifically, a newly-added network resource matching the shortage of the available network resource may be acquired for the target slice, and the target slice after acquiring the newly-added network resource is set as the to-be-generated slice, that is, the target slice is added to the target slice as the to-be-generated slice for the network resource lacking for the client service.
In conclusion, an applicable target slice can be matched in the existing slices for the client in a cosine similarity calculation mode, and then network resources enough for serving the client are configured for the target slice, so that network slice sharing of the client is realized.
In one possible design, when it is detected that the number of unoccupied users of the target slice is smaller than the number of required users of the slice to be generated, determining the number of difference users between the number of unoccupied users and the number of required users; sending a user permission request corresponding to the difference user number to a network element of the target slice; responding to a permission response of the network element to the user permission request, and newly adding the difference value user number for the target slice; and setting the target slice with the newly increased number of the difference users as the slice to be generated.
That is to say, when the number of users of the target slice is insufficient, the user permission is requested to the network element of the target slice to purchase the number of users, so as to complete the capacity expansion of the target slice, and the requirement of the client can be effectively supported.
In one possible design, an enterprise client sends a slice generation request to the NSMF through the CSMF, the slice generation request carries the SLA of a slice to be generated, the SLA of the slice to be generated includes but is not limited to a plurality of indexes such as uplink and downlink bandwidth, time delay, the number of users, the number of sessions, a use area, whether voice is supported and the like, and a new parameter support network slice sharing is added to indicate that shared slices are supported.
After receiving the slice generation request, the NSMF quantizes the SLA, quantizes each item in the SLA into a numerical value, and then sequentially calculates the cosine similarity with the SLA of each slice in the existing slice list for sharing, so that the cosine similarity with the S-NSSAI-1001 slice is 0.9 of the maximum value.
The predetermined similarity threshold value of network slice sharing in the NSMF is 0.8, and after comparison, the cosine similarity of the S-NSSAI 1001 slice is the maximum value 0.9 which is greater than the predetermined similarity threshold value, so that the S-NSSAI 1001 slice is most similar to the to-be-generated slice required by the enterprise client, and the S-NSSAI 1001 slice can be selected as the target slice.
Then, the NSMF performs network resource check, and finds that the maximum number of users of the S-NSSAI-1001 slice is 1000 and 900 is occupied, and the number of users requested by the slice generation request sent by the CSMF to the NSMF is 200. Further, the NSMF determines that, except for the number of users, other resources such as bandwidth and time delay of the S-NSSAI slice 1001 meet the sharing requirements of the enterprise clients.
The NSMF may send a request for adding 100 users' licenses to a network element in the S-NSSAI 1001 slice, such as SMF, UPF, UDM, PCF, etc., through a network slice subnet management function, such as CN-NSSMF, etc., the network element returns that the request is successful, and the maximum number of users in the S-NSSAI 1001 slice is increased by 100.
To this end, the NSMF returns a response to the CSMF that the sharing slice generation is successful, and selects the S-NSSAI-1001 slice to serve the enterprise user.
In another possible design, an enterprise client sends a slice generation request to the NSMF through the CSMF, where the slice generation request carries an SLA of a slice to be generated, the SLA of the slice to be generated includes, but is not limited to, multiple indexes such as uplink and downlink bandwidth, time delay, the number of users, the number of sessions, a usage area, whether voice is supported, and a parameter of support network slice sharing is added to indicate that a shared slice is supported.
And after receiving the slice generation request, the NSMF quantizes the SLA, quantizes each item in the SLA into a numerical value, and then sequentially calculates the cosine similarity with the SLA of each slice in the shared existing slice list to obtain the maximum value of the cosine similarity as 0.5.
The NSMF is internally provided with a preset similarity threshold value of 0.8, and after comparison, if the maximum value of 0.5 is smaller than the preset similarity threshold value, the NSMF initiates a standard new slice creation process, and after the slice is successfully created, the NSMF adds the newly created slice into a shared slice list, which is named as S-NSSAI 1008.
To this end, the NSMF returns a response to the CSMF that the sharing slice generation is successful, and selects the S-NSSAI 1008 slice to serve the enterprise user.
Fig. 3 shows a block diagram of a slice configuration apparatus according to an embodiment of the invention.
As shown in fig. 3, a slice configuration apparatus 300 according to an embodiment of the present invention includes: a slice generation request obtaining unit 302, configured to obtain a slice generation request, where the slice generation request carries a service level agreement required by a slice to be generated; a target slice matching unit 304, configured to determine, based on slice configuration information in the service level agreement, whether a target slice matching the slice to be generated exists in an existing slice set; a slice generating unit 306, configured to determine the slice to be generated based on the target slice if the existing slice set has the target slice matched with the slice to be generated, and otherwise, create the slice to be generated.
In the above embodiment of the present invention, optionally, the target slice matching unit 304 is configured to: determining cosine similarity between the slice to be generated and each existing slice based on slice configuration information in the service level protocol and slice configuration information of each existing slice in the existing slice set; selecting a maximum value from cosine similarities corresponding to all the existing slices; if the maximum value is larger than or equal to a preset similarity threshold value, determining the slice to be generated based on the target slice; and if the maximum value is smaller than a preset similarity threshold value, newly building the slice to be generated.
In the foregoing embodiment of the present invention, optionally, the slice configuration information includes: uplink bandwidth, downlink bandwidth, time delay, number of users, number of sessions, usage area, and voice support status.
In the above embodiment of the present invention, optionally, the method further includes: a cosine similarity calculation unit for: the cosine similarity is calculated and the cosine similarity is calculated,
Figure BDA0003442621030000121
wherein i represents any slice configuration information in the service level agreement, AiA discrete value representing the ith slice configuration information in the service level agreement, n representing the serial number of any existing slice in the existing slice set, SniA discrete value representing the ith slice configuration information of the nth existing slice in the set of existing slices, k representing the total number of slice configuration information in the service level agreement, SimnRepresenting the cosine similarity of the slice to be generated and the nth existing slice in the existing slice set.
In the above embodiment of the present invention, optionally, the target slice matching unit 304 is configured to: if the available network resources of the target slice can cover the required network resources of the slice to be generated, setting the target slice as the slice to be generated; if the available network resources of the target slice cannot cover the required network resources of the slice to be generated, acquiring newly added network resources matched with the shortage of the available network resources for the target slice, and setting the target slice after acquiring the newly added network resources as the slice to be generated.
In the above embodiment of the present invention, optionally, the target slice matching unit 304 is configured to: when detecting that the number of unoccupied users of the target slice is smaller than the number of required users of the slice to be generated, determining the number of difference users between the number of unoccupied users and the number of required users; sending a user permission request corresponding to the difference user number to a network element of the target slice; responding to a permission response of the network element to the user permission request, and newly adding the difference value user number for the target slice; and setting the target slice with the newly increased number of the difference users as the slice to be generated.
In the above embodiment of the present invention, optionally, the method further includes: a slice identification verification unit to: detecting whether the slice generation request carries a slice sharing identifier; and allowing the target slice matching unit to determine whether the target slice matched with the slice to be generated exists in the existing slice set or not under the condition that the slice generating request carries the slice sharing identification.
The slice configuration apparatus 300 uses the scheme described in any of the above embodiments, and therefore, has all the technical effects described above, and is not described herein again.
FIG. 4 shows a block diagram of an electronic device according to an embodiment of the invention.
As shown in FIG. 4, an electronic device 400 of one embodiment of the invention includes at least one memory 402; and a processor 404 communicatively coupled to the at least one memory 402; wherein the memory stores instructions executable by the at least one processor 404, the instructions being configured to perform the scheme described in any of the embodiments above. Therefore, the electronic device 400 has the same technical effects as any of the above embodiments, and will not be described herein again.
The electronic device of embodiments of the present invention exists in a variety of forms, including but not limited to:
(1) mobile communication devices, which are characterized by mobile communication capabilities and are primarily targeted at providing voice and data communications. Such terminals include smart phones (e.g., iphones), multimedia phones, functional phones, and low-end phones, among others.
(2) The ultra-mobile personal computer equipment belongs to the category of personal computers, has calculation and processing functions and generally has the characteristic of mobile internet access. Such terminals include PDA, MID, and UMPC devices, such as ipads.
(3) Portable entertainment devices such devices may display and play multimedia content. Such devices include audio and video players (e.g., ipods), handheld game consoles, electronic books, as well as smart toys and portable car navigation devices.
(4) The server is similar to a general computer architecture, but has higher requirements on processing capability, stability, reliability, safety, expandability, manageability and the like because of the need of providing highly reliable services.
(5) And other electronic devices with data interaction functions.
In addition, an embodiment of the present invention provides a computer-readable storage medium, which stores computer-executable instructions for executing the method flow described in any of the above embodiments.
The technical scheme of the invention is described in detail in the above with reference to the attached drawings, and through the technical scheme of the invention, the client can be served by the existing slice without newly building a slice for each client, so that the occupation of network resources and labor time cost is reduced, the slice acquisition efficiency is improved, and the user experience of the client is facilitated to be improved.
It should be understood that the term "and/or" as used herein is merely one type of association that describes an associated object, meaning that three relationships may exist, e.g., a and/or B may mean: a exists alone, A and B exist simultaneously, and B exists alone. In addition, the character "/" herein generally indicates that the former and latter related objects are in an "or" relationship.
The word "if" as used herein may be interpreted as "at … …" or "when … …" or "in response to a determination" or "in response to a detection", depending on the context. Similarly, the phrases "if determined" or "if detected (a stated condition or event)" may be interpreted as "when determined" or "in response to a determination" or "when detected (a stated condition or event)" or "in response to a detection (a stated condition or event)", depending on the context.
In the embodiments provided in the present invention, it should be understood that the disclosed system, apparatus and method may be implemented in other ways. For example, the above-described apparatus embodiments are merely illustrative, and for example, the division of the units is only one logical division, and there may be other divisions in actual implementation, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.
In addition, functional units in the embodiments of the present invention may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, or in a form of hardware plus a software functional unit.
The integrated unit implemented in the form of a software functional unit may be stored in a computer readable storage medium. The software functional unit is stored in a storage medium and includes several instructions for causing a computer device (which may be a personal computer, a server, or a network device) or a Processor (Processor) to execute some steps of the methods according to the embodiments of the present invention. And the aforementioned storage medium includes: various media capable of storing program codes, such as a usb disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk, or an optical disk.
The above description is only for the purpose of illustrating the preferred embodiments of the present invention and is not to be construed as limiting the invention, and any modifications, equivalents, improvements and the like made within the spirit and principle of the present invention should be included in the scope of the present invention.

Claims (10)

1. A slice configuration method, comprising:
acquiring a slice generation request, wherein the slice generation request carries a service level protocol required by a slice to be generated;
determining whether a target slice matched with the slice to be generated exists in an existing slice set or not based on slice configuration information in the service level protocol;
and if the existing slice set has a target slice matched with the slice to be generated, determining the slice to be generated based on the target slice, otherwise, newly building the slice to be generated.
2. The slice configuration method according to claim 1, wherein the step of determining whether there is a target slice in the existing slice set that matches the slice to be generated based on the slice configuration information in the service level agreement comprises:
determining cosine similarity between the slice to be generated and each existing slice based on slice configuration information in the service level protocol and slice configuration information of each existing slice in the existing slice set;
selecting a maximum value from cosine similarities corresponding to all the existing slices;
if the maximum value is larger than or equal to a preset similarity threshold value, determining the slice to be generated based on the target slice;
and if the maximum value is smaller than a preset similarity threshold value, newly building the slice to be generated.
3. The slice configuration method according to claim 2,
the slice configuration information includes: uplink bandwidth, downlink bandwidth, time delay, number of users, number of sessions, usage area, and voice support status.
4. The slice allocation method according to claim 3, wherein the calculating the cosine similarity comprises:
Figure FDA0003442621020000021
wherein i represents any slice configuration information in the service level agreement, AiA discrete value representing the ith slice configuration information in the service level agreement, n representing the serial number of any existing slice in the existing slice set, SniA discrete value representing the ith slice configuration information of the nth existing slice in the set of existing slices, k representing the total number of slice configuration information in the service level agreement, SimnRepresenting the cosine similarity of the slice to be generated and the nth existing slice in the existing slice set.
5. The slice configuration method according to any one of claims 1 to 4, wherein the step of determining the slice to be generated based on the target slice comprises:
if the available network resources of the target slice can cover the required network resources of the slice to be generated, setting the target slice as the slice to be generated;
if the available network resources of the target slice cannot cover the required network resources of the slice to be generated, acquiring newly added network resources matched with the shortage of the available network resources for the target slice, and setting the target slice after acquiring the newly added network resources as the slice to be generated.
6. The slice configuration method according to claim 5, wherein the step of determining the slice to be generated based on the target slice comprises:
when detecting that the number of unoccupied users of the target slice is smaller than the number of required users of the slice to be generated, determining the number of difference users between the number of unoccupied users and the number of required users;
sending a user permission request corresponding to the difference user number to a network element of the target slice;
responding to a permission response of the network element to the user permission request, and newly adding the difference value user number for the target slice;
and setting the target slice with the newly increased number of the difference users as the slice to be generated.
7. The slice configuration method according to claim 1, wherein before the step of determining whether there is a target slice in the existing slice set that matches the slice to be generated based on the slice configuration information in the service level agreement, the method further comprises:
detecting whether the slice generation request carries a slice sharing identifier;
and allowing the service level agreement to enter the slice configuration information based on the service level agreement and determining whether the target slice matched with the slice to be generated exists in the existing slice set or not under the condition that the slice generating request carries the slice sharing identification.
8. A slice configuration apparatus, comprising:
the device comprises a slice generation request acquisition unit, a slice generation unit and a slice generation unit, wherein the slice generation request acquisition unit is used for acquiring a slice generation request, and the slice generation request carries a service level protocol required by a slice to be generated;
the target slice matching unit is used for determining whether a target slice matched with the slice to be generated exists in the existing slice set or not based on the slice configuration information in the service level agreement;
and the slice generating unit is used for determining the slice to be generated based on the target slice if the target slice matched with the slice to be generated exists in the existing slice set, and otherwise, newly building the slice to be generated.
9. An electronic device, comprising: at least one processor; and a memory communicatively coupled to the at least one processor;
wherein the memory stores instructions executable by the at least one processor, the instructions being arranged to perform the method of any of the preceding claims 1 to 7.
10. A computer-readable storage medium having stored thereon computer-executable instructions for performing the method flow of any of claims 1-7.
CN202111637759.7A 2021-12-29 2021-12-29 Slice configuration method and device, electronic equipment and computer readable storage medium Pending CN114338387A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111637759.7A CN114338387A (en) 2021-12-29 2021-12-29 Slice configuration method and device, electronic equipment and computer readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111637759.7A CN114338387A (en) 2021-12-29 2021-12-29 Slice configuration method and device, electronic equipment and computer readable storage medium

Publications (1)

Publication Number Publication Date
CN114338387A true CN114338387A (en) 2022-04-12

Family

ID=81016732

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111637759.7A Pending CN114338387A (en) 2021-12-29 2021-12-29 Slice configuration method and device, electronic equipment and computer readable storage medium

Country Status (1)

Country Link
CN (1) CN114338387A (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2017076086A1 (en) * 2015-11-02 2017-05-11 中兴通讯股份有限公司 Method, apparatus and system for opening network slicing capability
CN107317712A (en) * 2017-06-30 2017-11-03 广东工业大学 A kind of creation method and device of network section
CN109756357A (en) * 2017-11-08 2019-05-14 中兴通讯股份有限公司 A kind of network slice generation method and device and terminal
CN109788493A (en) * 2017-11-13 2019-05-21 中国移动通信有限公司研究院 Network is sliced generation method, network side equipment and terminal
CN110875827A (en) * 2018-08-31 2020-03-10 华为技术有限公司 Network slice management method and device

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2017076086A1 (en) * 2015-11-02 2017-05-11 中兴通讯股份有限公司 Method, apparatus and system for opening network slicing capability
CN107317712A (en) * 2017-06-30 2017-11-03 广东工业大学 A kind of creation method and device of network section
CN109756357A (en) * 2017-11-08 2019-05-14 中兴通讯股份有限公司 A kind of network slice generation method and device and terminal
CN109788493A (en) * 2017-11-13 2019-05-21 中国移动通信有限公司研究院 Network is sliced generation method, network side equipment and terminal
CN110875827A (en) * 2018-08-31 2020-03-10 华为技术有限公司 Network slice management method and device

Similar Documents

Publication Publication Date Title
US11759714B2 (en) Method for implementing user matching and related device
US10212217B2 (en) Method and apparatus for data transmission in a distributed storage system
CN110048879B (en) Microservice registration method, microservice registration device, electronic equipment and computer-readable storage medium
WO2014194695A1 (en) Method and server for pvp team matching in computer games
US9229762B2 (en) Host providing system and host providing method
CN106776785B (en) Data writing method and device and data processing system
CN112087487A (en) Model training task scheduling method and device, electronic equipment and storage medium
CN109688183A (en) Group control device recognition methods, device, equipment and computer readable storage medium
CN112685237A (en) Chip test data tracking query method, system and electronic equipment
CN110035128B (en) Live broadcast scheduling method and device, live broadcast system and storage medium
CN116431282A (en) Cloud virtual host server management method, device, equipment and storage medium
CN110652728A (en) Game resource management method and device, electronic equipment and storage medium
CN110706691B (en) Voice verification method and device, electronic equipment and computer readable storage medium
CN112416858A (en) Document storage method and device, electronic equipment and computer readable storage medium
CN114338387A (en) Slice configuration method and device, electronic equipment and computer readable storage medium
CN112929348B (en) Information processing method and device, electronic equipment and computer readable storage medium
CN113891323B (en) WiFi-based user tag acquisition system
CN112367244B (en) Communication method, terminal, server, and computer-readable storage medium
CN111625375A (en) Account reservation method and device, storage medium and electronic equipment
CN113098841A (en) Queuing method for logging in cloud computer, computer equipment and readable storage medium
CN113992757B (en) Storage resource sharing management method and device in heterogeneous network and related products
CN113259225B (en) Instant messaging method, server and instant messaging system
CN114297294A (en) Data access method and device in heterogeneous network and related products
CN116107738A (en) Resource allocation method and device and electronic equipment
CN115514574A (en) Application program networking behavior control method and device, electronic equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination