CN115720376A - Resource allocation method and device, electronic equipment and readable storage medium - Google Patents

Resource allocation method and device, electronic equipment and readable storage medium Download PDF

Info

Publication number
CN115720376A
CN115720376A CN202211460772.4A CN202211460772A CN115720376A CN 115720376 A CN115720376 A CN 115720376A CN 202211460772 A CN202211460772 A CN 202211460772A CN 115720376 A CN115720376 A CN 115720376A
Authority
CN
China
Prior art keywords
slice
network slice
network
data
resource allocation
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202211460772.4A
Other languages
Chinese (zh)
Inventor
江禹
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Vivo Mobile Communication Co Ltd
Original Assignee
Vivo Mobile Communication Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Vivo Mobile Communication Co Ltd filed Critical Vivo Mobile Communication Co Ltd
Priority to CN202211460772.4A priority Critical patent/CN115720376A/en
Publication of CN115720376A publication Critical patent/CN115720376A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The application discloses a resource allocation method, a resource allocation device, electronic equipment and a readable storage medium, and belongs to the technical field of communication. The method comprises the following steps: receiving network slice information from a network side device, the network slice information including slice characteristics of at least one network slice supported by the network side device; determining a resource allocation strategy corresponding to a first network slice in at least one network slice based on the slice characteristics of the first network slice; resources are configured for the first network slice based on the resource allocation policy.

Description

Resource allocation method and device, electronic equipment and readable storage medium
Technical Field
The application belongs to the technical field of communication, and particularly relates to a slice resource configuration method and device, an electronic device and a readable storage medium.
Background
With the development of 5G network technology and the popularization of terminal applications, commercialization of a network slicing function, which is an important characteristic of the 5G network, is also being promoted. The types of the network slices are mainly low-delay slices, high-bandwidth slices and the like. The operator may adopt different strategies to implement the transmission characteristics of the corresponding slice on the network side according to the type of the slice.
Currently, in the related art, a terminal generates data during an application running process, and directly sends the generated data to a network slice corresponding to an operator network, and then, the operator network transmits data of different types of network slices by using different processing logics.
However, there is resource contention between data transmitted by the terminals, which results in data loss and thus makes the user experience unable to meet the requirement.
Disclosure of Invention
An object of the embodiments of the present application is to provide a resource allocation method, a device, an electronic device, and a readable storage medium, which can solve the problem that when a terminal transmits data, the terminal transmits the data using the same policy, so that resource contention exists between data transmitted by the terminal, and data is lost.
In a first aspect, an embodiment of the present application provides a resource allocation method, where the resource allocation method includes: receiving network slice information from a network side device, the network slice information including slice characteristics of at least one network slice supported by the network side device; determining a resource allocation strategy corresponding to a first network slice in at least one network slice based on slice characteristics of the first network slice; resources are configured for the first network slice based on the resource allocation policy.
In a second aspect, an embodiment of the present application provides a resource configuration apparatus, where the resource configuration apparatus includes: the device comprises a receiving module, a determining module and a configuration module; the receiving module is configured to receive network slice information from a network-side device, where the network slice information includes a slice feature of at least one network slice supported by the network-side device; the determining module is configured to determine a resource allocation policy corresponding to a first network slice in the at least one network slice based on a slice characteristic of the first network slice; the configuration module is configured to configure resources for the first network slice based on the resource allocation policy.
In a third aspect, embodiments of the present application provide an electronic device, which includes a processor and a memory, where the memory stores a program or instructions executable on the processor, and the program or instructions, when executed by the processor, implement the steps of the method according to the first aspect.
In a fourth aspect, embodiments of the present application provide a readable storage medium, on which a program or instructions are stored, which when executed by a processor implement the steps of the method according to the first aspect.
In a fifth aspect, an embodiment of the present application provides a chip, where the chip includes a processor and a communication interface, where the communication interface is coupled to the processor, and the processor is configured to execute a program or instructions to implement the method according to the first aspect.
In a sixth aspect, embodiments of the present application provide a computer program product, stored on a storage medium, for execution by at least one processor to implement the method according to the first aspect.
In this embodiment, a terminal may receive network slice information from a network-side device, where the network slice information includes a slice feature of at least one network slice supported by the network-side device; determining a resource allocation strategy corresponding to a first network slice in at least one network slice based on slice characteristics of the first network slice; resources are configured for the first network slice based on the resource allocation policy. Therefore, the terminal can configure appropriate slice resources for different network slices according to the slice characteristics corresponding to the network slices, so that the terminal can use different slice resource strategies to send data to the operator network, and data loss caused when the same strategy is used to send the data is avoided.
Drawings
Fig. 1 is a schematic flowchart of a resource allocation method according to an embodiment of the present application;
fig. 2 is a second schematic flowchart of a resource allocation method according to an embodiment of the present application;
fig. 3 is a third schematic flowchart of a resource allocation method according to an embodiment of the present application;
fig. 4 is a fourth flowchart illustrating a resource allocation method according to an embodiment of the present application;
fig. 5 is a system architecture diagram applied to a resource allocation method according to an embodiment of the present application;
fig. 6 is a schematic structural diagram of a resource allocation apparatus according to an embodiment of the present application;
fig. 7 is a second schematic structural diagram of a resource allocation apparatus according to an embodiment of the present application;
fig. 8 is a schematic hardware structure diagram of an electronic device according to an embodiment of the present disclosure;
fig. 9 is a second hardware structure schematic diagram of an electronic device according to an embodiment of the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be described clearly below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are some, but not all, embodiments of the present application. All other embodiments that can be derived by one of ordinary skill in the art from the embodiments given herein are intended to be within the scope of the present disclosure.
The terms first, second and the like in the description and in the claims of the present application are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It will be appreciated that the data so used may be interchanged under appropriate circumstances such that embodiments of the application are capable of operation in sequences other than those illustrated or described herein, and that the terms "first," "second," etc. are generally used in a generic sense and do not limit the number of terms, e.g., a first term can be one or more than one. In addition, "and/or" in the specification and claims means at least one of connected objects, a character "/" generally means that a preceding and succeeding related objects are in an "or" relationship.
The resource allocation method, device, electronic device and readable storage medium provided in the embodiments of the present application are described in detail below with reference to the accompanying drawings through specific embodiments and application scenarios thereof.
With the continuous development of 5G network technology and the continuous popularization of terminal applications, commercialization of a network slicing function, which is an important feature of a 5G network, is also being promoted. The network slicing means that an operator divides a network into network channels with different characteristic dimensions according to different user requirements, different network service qualities are provided on different channels, specific types of network services are provided for different users, and the fine improvement of user internet experience is realized.
The types of network slices are mainly low delay slices, high bandwidth slices, and the like. For example, low latency slices are mainly applied in game scenes, and such network slices are characterized by: the transmitted data has a low bandwidth requirement and the delay requirement is very low. The high bandwidth slice is mainly applied to an online video scene, and the network slice is characterized in that: a certain degree of delay can be tolerated at the higher bandwidth rates required. The operator selects the corresponding slice type on the network side according to the data transmitted from the terminal to the network side, and adopts a corresponding configuration strategy to realize the transmission characteristics of the corresponding slice.
Specifically, the terminal generates data during the application running process, the terminal sends the generated data to the corresponding network slice directly sent to the operator network, and then the operator network adopts different processing logics to transmit the data of different types of network slices. For example, after the terminal runs the game application APP1 or runs the video application APP2 to generate data, the data of the APP1 or APP2 sends the data of the APP1 to the network slice corresponding to the operator network by using the same slice policy, and finally, the operator network transmits the data by using the processing logic of the network side corresponding to the low-delay slice according to the data type. Or the terminal system sends the data of the APP2 to the operator network by using the same slicing strategy, and finally, the operator network transmits the data by using the processing logic of the network side corresponding to the high-bandwidth slice according to the data type.
It can be seen that there is no method for effectively ensuring slicing characteristics when application data generated by a terminal is still in the terminal before being sent to an operator network: firstly, when the terminal sends data, the terminal only sends the application data to the corresponding slices respectively, and does not identify the characteristics of the slices, and the same strategy is adopted for the transmission of the data on all types of network slices. Therefore, the data on each network slice uses the same strategy when being transmitted, so that the data compete for resources and affect each other, thereby causing data loss.
In the resource allocation method provided in the embodiment of the present application, the terminal receives network slice information from the network side device, where the network slice information includes information of slice characteristics of at least one network slice supported by the network side device, so that the terminal can determine a resource allocation policy corresponding to each network slice according to the information of the slice characteristics of the at least one network slice, and further, the terminal can allocate a corresponding slice resource to each network slice according to the resource allocation policy. Therefore, the terminal can configure appropriate corresponding slice resources for different network slices according to different slice characteristics corresponding to different network slices, so that the terminal can use different slice resource strategies to send data to the operator network, and data loss caused when the same strategy is used to send data is avoided.
An execution subject of the resource configuration method provided by the embodiment of the application may be a training device of a face recognition model, and the resource configuration device may be an electronic device (e.g., a terminal), or a functional module in the electronic device. The following describes the technical solutions provided in the embodiments of the present application, taking a terminal as an example.
An embodiment of the present application provides a resource allocation method, and fig. 1 shows a flowchart of the resource allocation method provided in the embodiment of the present application. As shown in fig. 1, the resource allocation method provided in the embodiment of the present application may include steps 201 to 203 described below.
Step 201, the terminal receives network slice information from the network side device.
In an embodiment of the present application, the network slice information includes: a slicing feature of at least one network slice supported by the network-side device.
In the embodiment of the present application, the slice features may be a low latency slice, a high bandwidth slice, a high security slice, and the like.
For example, after the terminal is attached to the core network, the network side device sends network slice information to the terminal, and the terminal may establish a slice feature mapping table according to information of slice features in the network slice information.
Illustratively, the slice characteristic mapping table is created based on information of slice characteristics of each network slice in the network slice information and stored in the terminal.
Step 202, the terminal determines a resource allocation policy corresponding to a first network slice in the at least one network slice based on the slice characteristic of the first network slice.
For example, the first network slice may be a plurality of network slices, or may be a single network slice.
Illustratively, the first network slice is any network slice of the at least one network slice.
Illustratively, the terminal receives the network slice information and configures different slice resources for network slices with different slice characteristics according to the information of the slice characteristics of the first network slice in the network slice information.
For example, as shown in fig. 2, the method for configuring different slice resources for network slices with different slice characteristics includes the following steps S1 to S4:
and S1, after the terminal is plugged in the card, the terminal can be attached to a 5G core network.
And S2, after the network attachment is successful, the network side equipment reports network slice information to the terminal, wherein the network slice information comprises the data types which can be transmitted and are supported by each network slice in the network side equipment and the characteristics of each network slice, such as high bandwidth requirement or high delay requirement.
And S3, the terminal acquires the slicing characteristics of the network slices and the data types supporting transmission by inquiring the slicing characteristic mapping table.
And S4, the terminal allocates resources for the slices according to the characteristics of the slices. For example, a higher CPU preemption authority and a shorter CPU execution time are allocated to a low-latency slice with a low latency requirement, and a higher protocol stack scheduling authority is also allocated at the same time; allocating a larger I/O buffer area for a high-bandwidth slice with high bandwidth rate requirement; and configuring a resource replacement mode, namely a hardware encryption mode and the like for the high-security slice with high security requirement.
Step 203, the terminal configures resources for a first network slice in the at least one network slice based on the resource allocation policy.
In a first possible embodiment:
optionally, in this embodiment of the present application, when the slice feature of the first network slice is a low-latency slice, in the process of "the terminal configures resources for the first network slice in at least one network slice based on the resource allocation policy" in step 203a:
step 203a, the terminal configures a high CPU right and a preset transmission duration for the first network slice, and only allows the first network slice to transmit data within the preset transmission duration.
Illustratively, the high CPU right is used to indicate that the first network slice has the highest CPU transfer right.
For example, the preset transmission duration may be set by the system or may be customized by the user.
For example, the preset transmission duration is a priority protection period of the first network slice, that is, the first network slice is prioritized and allowed to transmit data only in the priority protection period.
In a second possible embodiment:
optionally, in this embodiment of the present application, when the slice feature of the first network slice is a high bandwidth slice, in the process of "the terminal configures resources for the first network slice in the at least one network slice based on the resource allocation policy" in step 203, the step 203b is included:
and step 203b, the terminal configures an I/O cache region for the first network slice.
In an example, when the first network slice cannot transmit data, the to-be-transmitted data packet corresponding to the first network slice is stored in an I/O cache area configured for the first network slice by the terminal.
In one example, in a case that the first network slice may transmit data, the to-be-transmitted data packet corresponding to the first network slice stored in the I/O buffer is read and transmitted.
In a third possible embodiment:
optionally, in this embodiment of the present application, in the process of "the terminal configures resources for the first network slice in the at least one network slice based on the resource allocation policy" in the step 203, when the slice feature of the first network slice is a high security slice, the step 203c is included:
and 203c, before the terminal transmits the data based on the first network slice, encrypting the data transmitted by the first network slice based on a hardware encryption mode.
Illustratively, the hardware encryption scheme described above may replace the software encryption scheme in the first network slice.
In the resource allocation method provided by the embodiment of the present application, a terminal may receive network slice information from a network side device, where the network slice information includes a slice feature of at least one network slice supported by the network side device; determining a resource allocation strategy corresponding to a first network slice in at least one network slice based on the slice characteristics of the first network slice; resources are configured for the first network slice based on the resource allocation policy. Therefore, the terminal can configure appropriate corresponding slice resources for different network slices according to different slice characteristics corresponding to different network slices, so that the terminal can use different slice resource strategies to send data to an operator network, and data loss caused when the same strategy is used to send data is avoided.
Optionally, in this embodiment of the present application, the resource configuration method provided in this embodiment of the present application further includes the following steps 301 and 302:
step 301, under the condition that the terminal runs the first application, the terminal determines a target slice feature matched with a slice type corresponding to a first data packet of the first application.
For example, the first application may be any application installed in a terminal, and this is not limited in this embodiment of the application.
Illustratively, the target slice characteristic is a slice characteristic of a network slice corresponding to the first packet of the first application.
Step 302, the terminal transmits a first data packet of the first application based on the target network slice corresponding to the target slice feature.
Illustratively, the target network slice is one or more of the at least one network slice.
In one example, the network slice information obtained by the terminal may further include: the type of data matched to each network slice.
Illustratively, the target network slice matches a data type corresponding to the first data packet.
It should be noted that, when the target network slice corresponding to the first application transmits the first data packet, the used resource may be a resource configured in advance by the system; alternatively, after determining the target network slice, the system configures the corresponding resource for the target network slice based on the target slice characteristic of the target network slice.
Optionally, in an embodiment of the present application, the first data packet includes a first flag, and the first flag is used to indicate the target network slice.
Illustratively, the first marker may be a slice identifier of the target network slice.
In one example, after determining a network slice corresponding to a first packet of a first application, the terminal adds a first flag to the first packet.
Further optionally, in this embodiment of the application, the "transmitting the first data packet of the first application based on the target network slice corresponding to the target slice feature" in the step 302 includes step 302a:
step 302a, transmitting a first data packet of a first application including the first marker based on a target network slice corresponding to the target slice feature.
A scenario in which the terminal runs the first application in the embodiment of the present application will be exemplarily described below with a specific example.
Exemplarily, as shown in fig. 3, in a scenario where a terminal runs a first application, a technical solution provided in an embodiment of the present application includes the following steps A1 to A4:
step A1, when a first application in the terminal is running, the application may need to perform data transmission with the operator network. For example, when a game is played, a terminal needs to perform data transmission with a game server, and when an online video is viewed, a video file or the like needs to be downloaded from a video server.
And step A2, when the terminal sends the data generated by different applications, the data can be transmitted through different network slices. For example, data generated by a gaming application may be transmitted via low latency slices, and data generated by a video application may be transmitted via high bandwidth slices. And the terminal selects corresponding network slices for data generated by different applications according to the network slice information reported by the network side equipment for transmission.
Step A3, after the terminal selects the network slice corresponding to the data generated by the application, the system marks slice information (i.e. the first mark) of the network slice on a data packet (i.e. the first data packet) formed by the data generated by the application, and then the terminal processes the data packet accordingly according to the mark.
And step A4, after the marking is finished, the terminal processes the sending, including the processing of a network protocol stack, the sending of data and the like.
Therefore, the terminal can select the corresponding slice resource strategy to transmit data according to the slice characteristics corresponding to different application data packets, and the flexibility of slice transmission data is improved.
Illustratively, based on the above resource allocation strategy, when the slice is used to transmit data, slice resource scheduling can be directly performed.
A scenario of scheduling resources when a terminal transmits data in the embodiment of the present application will be exemplarily described below with a specific example.
Exemplarily, as shown in fig. 4, in a scenario where resource scheduling is performed when a terminal transmits data, a technical solution provided in an embodiment of the present application includes the following steps B1 to B16:
step B1, before the terminal transmits the marked data packet, the terminal will first obtain the slice information (i.e. the first mark) marked on the current data packet.
And step B2, the terminal acquires the slice characteristic information corresponding to the network slice to be used by the data packet according to the established slice characteristic mapping table.
And step B3, the terminal judges the slice characteristic information corresponding to the network slice and selects a proper resource scheduling path. Step B4 is entered if the used network slice is a low latency slice, step B11 is entered if the used network slice is a high bandwidth slice, and step B15 is entered if the used network slice is a high security slice.
Step B4, the slice resources allocated by the terminal to the low-delay slice comprise: the high CPU preemption authority can interrupt the low priority task currently in progress. Therefore, the terminal firstly acquires the priority of the task currently executed by the CPU, compares the priority with the priority of the low-delay slice, judges whether the task can be interrupted or not, and preferentially executes the sending task of the low-delay slice.
And step B5, the terminal judges the priority of the task currently executed by the CPU, if the priority of the currently executed character is lower than the sending task of the low-delay slice, the step B6 is executed, otherwise, the step B7 is executed.
And step B6, the terminal judges that the priority of the task executed by the current CPU is lower than the priority of the task of sending the low-delay slice, so that the task executed by the current CPU is temporarily interrupted, and the task of sending the low-delay slice is switched to be executed.
And step B7, the terminal judges that the priority of the task executed by the current CPU is higher than that of the sending task of the low-delay slice and cannot be interrupted, and waits for the completion of the execution of the current task.
And step B8, after the sending task of the low-delay slice obtains the CPU resource, the terminal sets the CPU protection level for the currently executed task, only the task higher than the set CPU protection level can preempt the CPU, the sending process of the current low-delay slice is interrupted, and other tasks of low level cannot preempt the CPU.
And step B9, simultaneously, after the sending task of the low-delay slice acquires the CPU resource, the terminal sets a priority protection period for the protocol stack, and in the priority protection period, only the sending task of the low-delay slice is allowed to be executed, and the sending tasks of other types of slices are waited first.
And step B10, the terminal sends the data packet to a network protocol stack for processing, and then sends the data packet to the operator core network through the network card.
And step B11, the CPU preemption authority in the slice resources distributed by the terminal for the high-bandwidth slice is lower, and the CPU resources can be obtained only after the CPU finishes executing the current task.
And step B12, the terminal judges whether the protocol stack is in the protection period of the low-delay slice sending task, if not, the step B10 is entered, and the terminal sends the data to the network protocol stack for processing. Otherwise, go to step B13.
Step B13, if the protocol stack can not process the sending task of the high bandwidth at present, the slice resources allocated for the high bandwidth slices by the terminal include: and the terminal firstly puts the data into the I/O buffer area.
And step B14, after the protection period of the protocol stack is finished and the sending task of the high-bandwidth slice can be processed, the terminal takes the data cached in the I/O buffer area, enters the step B10 and sends the data to the network protocol stack for processing.
Step B15, the data of the high security slice needs to be encrypted before being sent, so that the slice resources allocated by the terminal to the high security slice include: and resource replacement, namely, the terminal uses hardware encryption instead of software encryption to perform encryption operation on the data transmitted by the high-security slice.
And step B16, hardware encryption can provide higher encryption speed and security level, after the terminal completes data encryption, the terminal enters step B10, and the terminal sends the data to a network protocol stack for processing.
Therefore, the terminal can schedule the system resources according to the characteristics of the slices without modifying the existing slice specifications, the terminal can schedule the system resources according to the characteristics of the slices on the basis of the original specifications without active participation of users, the error rate caused by the participation and the change of the users is avoided, the implementation scheme is more intelligent, the user operation is simpler and more convenient, and the high-efficiency transmission of data is ensured.
Fig. 5 is a system architecture diagram applied to the resource allocation method according to the embodiment of the present application. As shown in fig. 5, the terminal in this embodiment of the present application includes a slice policy management module, a slice selection policy module, and a resource scheduling module.
Specifically, the core network reports all slice information supported by the network slices to the slice policy management module of the terminal, so that the slice policy management module can allocate different slice resources according to the slice characteristics of different network slices. When the terminal runs the third-party application, application data can be generated, the slice selection strategy of the terminal selects a proper network slice according to the application data generated by the third-party application, and then the resource scheduling module of the terminal can correspondingly schedule resources for transmission of the application data according to the slice characteristics of the network slice corresponding to the current application data.
Illustratively, the slicing policy management module: the system is responsible for receiving network slice information reported by a core network, establishing a mapping relation among characteristics of different network slices, and determining a corresponding resource allocation strategy according to the slice characteristics of the different network slices. For example, a priority protection period is configured for the low-latency slice, only data transmission of the low-latency slice is allowed in the priority protection period, and the high CPU preempts the right; configuring a data buffer (i.e. the I/O buffer) for the high-bandwidth slice, so that when the high-bandwidth slice is not used for receiving data in time, data loss does not occur, and the bandwidth is kept at a higher rate; and a specific encryption and decryption mode is configured for the data of the high-security slice, for example, software implementation is replaced by hardware implementation, so that higher-level security guarantee is provided.
A slice selection policy module: and selecting an appropriate slice for the data of the third-party application according to the slice information of the network slice and the request of the third-party application.
A resource scheduling module: according to the slice characteristics used when the terminal sends the data generated by the current application, allocating appropriate resources for the application: CPU execution time, CPU preemption authority, I/O buffer, protocol stack scheduling authority, slice resource replacement and the like. Therefore, the data transmitted on different slices can obtain corresponding system resources.
It should be noted that, in the resource configuration method provided in the embodiment of the present application, the execution subject may be a resource configuration device, or an electronic device, and may also be a functional module or an entity in the electronic device. In the embodiment of the present application, a resource allocation device executes a resource allocation method as an example, and the resource allocation device provided in the embodiment of the present application is described.
Fig. 6 shows a schematic diagram of a possible structure of a resource configuration apparatus involved in the embodiment of the present application. As shown in fig. 6, the resource configuration apparatus 700 may include: a receiving module 701, a determining module 702 and a configuring module 703; the receiving module 701 is configured to receive network slice information from a network side device, where the network slice information includes a slice feature of at least one network slice supported by the network side device; the determining module 702 is configured to determine, based on a slice characteristic of a first network slice in the at least one network slice, a resource allocation policy corresponding to the first network slice; the configuring module 703 is configured to configure a corresponding slice resource for each network slice based on the resource allocation policy.
Optionally, in this embodiment of the present application, with reference to fig. 6, as shown in fig. 7, the apparatus 700 further includes: a transmission module 704; the determining module 702 is configured to, when the terminal runs the first application, determine a target slice feature that matches a slice type corresponding to a first data packet of the first application; the transmitting module 704 is configured to transmit the first data packet based on a target network slice corresponding to the target slice feature, where the target network slice is included in the at least one network slice.
Optionally, in an embodiment of the present application, the network slice information further includes: the data type matched with each network slice; and the target network slice is matched with the data type corresponding to the first data packet.
Optionally, in this embodiment of the present application, the first data packet includes a first flag, where the first flag is used to indicate a target network slice; the transmitting module 704 is configured to transmit a first packet including a first tag based on a target network slice corresponding to a feature including a target slice.
Optionally, in this embodiment of the present application, when the slice feature of the first network slice is a low-latency slice, the configuration module 703 is specifically configured to configure a high CPU permission and a preset transmission duration for the first network slice, where only the first network slice is allowed to transmit data within the preset transmission duration, and the high CPU permission is used to indicate that the first network slice has a highest CPU transmission permission.
Optionally, in this embodiment of the present application, in a case that a slice feature of a first network slice is a high bandwidth slice, the configuration module 703 is specifically configured to configure an I/O cache region for the first network slice; under the condition that the first network slice can not transmit data, storing a data packet to be transmitted corresponding to the first network slice to the I/O cache region; and reading and transmitting the data package to be transmitted stored in the I/O buffer area under the condition that the first network slice can transmit data.
Optionally, in this embodiment of the application, in a case that the slice feature of the first network slice is a high security slice, the configuration module 703 is specifically configured to encrypt the data based on a hardware encryption manner before transmitting the data based on the first network slice.
In the resource configuration apparatus provided in the embodiment of the present application, the apparatus may receive network slice information from a network side device, where the network slice information includes a slice feature of at least one network slice supported by the network side device; determining a resource allocation strategy corresponding to a first network slice in at least one network slice based on slice characteristics of the first network slice; resources are configured for the first network slice based on the resource allocation policy. Therefore, the terminal can configure appropriate corresponding slice resources for different network slices according to different slice characteristics corresponding to different network slices, so that the terminal can use different slice resource strategies to send data to the operator network, and data loss caused when the same strategy is used to send data is avoided.
The resource configuration apparatus in the embodiment of the present application may be an electronic device, and may also be a component in the electronic device, such as an integrated circuit or a chip. The electronic device may be a terminal, or may be a device other than a terminal. The electronic Device may be, for example, a Mobile phone, a tablet computer, a notebook computer, a palm top computer, a vehicle-mounted electronic Device, a Mobile Internet Device (MID), an Augmented Reality (AR)/Virtual Reality (VR) Device, a robot, a wearable Device, an ultra-Mobile personal computer (UMPC), a netbook or a Personal Digital Assistant (PDA), and the like, and may also be a server, a Network Attached Storage (Network Attached Storage, NAS), a personal computer (NAS), a Television (TV), a teller machine, a self-service machine, and the like, and the embodiments of the present application are not limited in particular.
The resource configuration device in the embodiment of the present application may be a device having an operating system. The operating system may be an Android (Android) operating system, an ios operating system, or other possible operating systems, and embodiments of the present application are not limited specifically.
The resource allocation device provided in the embodiment of the present application can implement each process implemented in the method embodiments of fig. 1 to fig. 5, and is not described here again to avoid repetition.
Optionally, as shown in fig. 8, an electronic device 800 is further provided in this embodiment of the present application, and includes a processor 801 and a memory 802, where the memory 802 stores a program or an instruction that can be executed on the processor 801, and when the program or the instruction is executed by the processor 801, the steps of the embodiment of the resource allocation method are implemented, and the same technical effects can be achieved, and are not described again here to avoid repetition.
It should be noted that the electronic device in the embodiment of the present application includes the mobile electronic device and the non-mobile electronic device described above.
Fig. 9 is a schematic diagram of a hardware structure of an electronic device implementing an embodiment of the present application.
The electronic device 100 includes, but is not limited to: radio frequency unit 101, network module 102, audio output unit 103, input unit 104, sensor 105, display unit 106, user input unit 107, interface unit 108, memory 109, and processor 110.
Those skilled in the art will appreciate that the electronic device 100 may further comprise a power source (e.g., a battery) for supplying power to various components, and the power source may be logically connected to the processor 110 through a power management system, so as to implement functions of managing charging, discharging, and power consumption through the power management system. The electronic device structure shown in fig. 9 does not constitute a limitation of the electronic device, and the electronic device may include more or less components than those shown, or combine some components, or arrange different components, and thus, the description is not repeated here.
The radio frequency unit 101 is configured to receive network slice information from a network side device, where the network slice information includes a slice feature of at least one network slice supported by the network side device; the processor 110 is configured to determine a resource allocation policy corresponding to a first network slice in the at least one network slice based on a slice characteristic of the first network slice; the processor 110 is configured to configure a slice resource for each network slice based on the resource allocation policy.
Optionally, in this embodiment of the present application, the processor 110 is configured to, when the terminal runs the first application, determine a target slice feature that matches a slice type corresponding to a first data packet of the first application; the radio frequency unit 101 is configured to transmit the first data packet based on a target network slice corresponding to a target slice feature, where the target network slice is included in the at least one network slice.
Optionally, in this embodiment of the present application, the network slice information further includes: the data type matched with each network slice; and the target network slice is matched with the data type corresponding to the first data packet.
Optionally, in this embodiment of the present application, the first data packet includes a first flag, where the first flag is used to indicate a target network slice; the radio frequency unit 101 is configured to transmit a first data packet including a first tag based on a target network slice corresponding to a feature including a target slice.
Optionally, in this embodiment of the application, in a case that the slice feature of the first network slice is a low-latency slice, the processor 110 is specifically configured to configure a high CPU permission and a preset transmission duration for the first network slice, where only the first network slice is allowed to transmit data within the preset transmission duration, and the high CPU permission is used to indicate that the first network slice has a highest CPU transmission permission.
Optionally, in this embodiment of the present application, in a case that the slice feature of the first network slice is a high bandwidth slice, the processor 110 is specifically configured to configure an I/O cache area for the first network slice; under the condition that the first network slice can not transmit data, storing a data packet to be transmitted corresponding to the first network slice to the I/O cache region; and reading and transmitting the data package to be transmitted stored in the I/O buffer area under the condition that the first network slice can transmit data.
Optionally, in this embodiment of the present application, in a case that the slice feature of the first network slice is a high security slice, the processor 110 is specifically configured to encrypt the data based on a hardware encryption manner before transmitting the data based on the first network slice.
In the electronic device provided by the embodiment of the present application, the electronic device may receive network slice information from a network-side device, where the network slice information includes a slice feature of at least one network slice supported by the network-side device; determining a resource allocation strategy corresponding to a first network slice in at least one network slice based on slice characteristics of the first network slice; resources are configured for the first network slice based on the resource allocation policy. Therefore, the terminal can configure appropriate corresponding slice resources for different network slices according to different slice characteristics corresponding to different network slices, so that the terminal can use different slice resource strategies to send data to the operator network, and data loss caused when the same strategy is used to send data is avoided.
It should be understood that, in the embodiment of the present application, the input Unit 104 may include a Graphics Processing Unit (GPU) 1041 and a microphone 1042, and the Graphics Processing Unit 1041 processes image data of a still picture or a video obtained by an image capturing device (such as a camera) in a video capturing mode or an image capturing mode. The display unit 106 may include a display panel 1061, and the display panel 1061 may be configured in the form of a liquid crystal display, an organic light emitting diode, or the like. The user input unit 107 includes at least one of a touch panel 1071 and other input devices 1072. The touch panel 1071 is also referred to as a touch screen. The touch panel 1071 may include two parts of a touch detection device and a touch controller. Other input devices 1072 may include, but are not limited to, a physical keyboard, function keys (e.g., volume control keys, switch keys, etc.), a trackball, a mouse, and a joystick, which are not described in detail herein.
The memory 109 may be used to store software programs as well as various data. The memory 109 may mainly include a first storage area storing a program or an instruction and a second storage area storing data, wherein the first storage area may store an operating system, an application program or an instruction (such as a sound playing function, an image playing function, etc.) required for at least one function, and the like. Further, memory 109 may comprise volatile memory or non-volatile memory, or memory 109 may comprise both volatile and non-volatile memory. The non-volatile Memory may be a Read-Only Memory (ROM), a Programmable ROM (PROM), an Erasable PROM (EPROM), an Electrically Erasable PROM (EEPROM), or a flash Memory. The volatile Memory may be a Random Access Memory (RAM), a Static Random Access Memory (Static RAM, SRAM), a Dynamic Random Access Memory (Dynamic RAM, DRAM), a Synchronous Dynamic Random Access Memory (Synchronous DRAM, SDRAM), a Double Data Rate Synchronous Dynamic Random Access Memory (Double Data Rate SDRAM, ddr SDRAM), an Enhanced Synchronous SDRAM (ESDRAM), a Synchronous Link DRAM (SLDRAM), and a Direct bus RAM (DRRAM). Memory 109 in the embodiments of the subject application includes, but is not limited to, these and any other suitable types of memory.
Processor 110 may include one or more processing units; optionally, the processor 110 integrates an application processor, which mainly handles operations related to the operating system, user interface, application programs, etc., and a modem processor, which mainly handles wireless communication signals, such as a baseband processor. It will be appreciated that the modem processor described above may not be integrated into the processor 110.
The embodiment of the present application further provides a readable storage medium, where a program or an instruction is stored on the readable storage medium, and when the program or the instruction is executed by a processor, the program or the instruction implements each process of the embodiment of the resource configuration method, and can achieve the same technical effect, and in order to avoid repetition, details are not repeated here.
The processor is the processor in the electronic device described in the above embodiment. The readable storage medium includes a computer readable storage medium, such as a computer read only memory ROM, a random access memory RAM, a magnetic or optical disk, and the like.
The embodiment of the present application further provides a chip, where the chip includes a processor and a communication interface, the communication interface is coupled to the processor, and the processor is configured to execute a program or an instruction to implement each process of the resource configuration method embodiment, and can achieve the same technical effect, and the details are not repeated here to avoid repetition.
It should be understood that the chips mentioned in the embodiments of the present application may also be referred to as system-on-chip, system-on-chip or system-on-chip, etc.
Embodiments of the present application provide a computer program product, where the program product is stored in a storage medium, and the program product is executed by at least one processor to implement the processes of the foregoing resource allocation method embodiments, and can achieve the same technical effects, and in order to avoid repetition, details are not described here again.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrases "comprising a component of' 8230; \8230;" does not exclude the presence of another like element in a process, method, article, or apparatus that comprises the element. Further, it should be noted that the scope of the methods and apparatuses in the embodiments of the present application is not limited to performing the functions in the order illustrated or discussed, but may include performing the functions in a substantially simultaneous manner or in a reverse order based on the functions recited, e.g., the described methods may be performed in an order different from that described, and various steps may be added, omitted, or combined. In addition, features described with reference to certain examples may be combined in other examples.
Through the above description of the embodiments, those skilled in the art will clearly understand that the method of the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but in many cases, the former is a better implementation manner. Based on such understanding, the technical solutions of the present application may be embodied in the form of a computer software product, which is stored in a storage medium (such as ROM/RAM, magnetic disk, optical disk) and includes instructions for enabling a terminal (such as a mobile phone, a computer, a server, or a network device) to execute the method according to the embodiments of the present application.
While the present embodiments have been described with reference to the accompanying drawings, it is to be understood that the present embodiments are not limited to those precise embodiments, which are intended to be illustrative rather than restrictive, and that various changes and modifications may be effected therein by one skilled in the art without departing from the scope of the appended claims.

Claims (10)

1. A resource allocation method is applied to a terminal, and is characterized by comprising the following steps:
receiving network slice information from a network side device, wherein the network slice information comprises slice characteristics of at least one network slice supported by the network side device;
determining a resource allocation policy corresponding to a first network slice of the at least one network slice based on slice characteristics of the first network slice;
configuring resources for the first network slice based on the resource allocation policy.
2. The method of claim 1, further comprising:
under the condition that the terminal runs a first application, determining a target slice feature matched with a slice type corresponding to a first data packet of the first application;
and transmitting the first data packet based on a target network slice corresponding to the target slice feature, wherein the target network slice is the at least one network slice.
3. The method of claim 2, wherein the network slice information further comprises: the data type matched with each network slice;
and the target network slice is matched with the data type corresponding to the first data packet.
4. The method of claim 2 or 3, wherein the first data packet comprises a first flag indicating the target network slice;
the transmitting the first data packet based on the target network slice corresponding to the target slice feature includes:
transmitting the first data packet including the first marker based on a target network slice including the target slice feature correspondence.
5. The method of claim 1, wherein the configuring resources for the first network slice based on the resource allocation policy in the case that the slice characteristic of the first network slice is a low latency slice comprises:
configuring high CPU permission and preset transmission time for the first network slice, wherein the first network slice is only allowed to transmit data in the preset transmission time, and the high CPU permission is used for indicating that the first network slice has the highest CPU transmission permission.
6. The method of claim 1, wherein, in the case that the slice characteristic of the first network slice is a high bandwidth slice, the configuring the resources for the first network slice based on the resource allocation policy comprises:
configuring an I/O cache area for the first network slice;
under the condition that the first network slice cannot transmit data, storing a data packet to be transmitted corresponding to the first network slice to the I/O cache region;
reading and transmitting the data package to be transmitted stored in the I/O buffer area under the condition that the first network slice can transmit data.
7. The method of claim 1, wherein in the case that the slice characteristic of the first network slice is a high security slice, the configuring resources for the first network slice based on the resource allocation policy further comprises:
encrypting data based on a hardware encryption manner before transmitting the data based on the first network slice.
8. An apparatus for configuring slice resources, the apparatus comprising: the device comprises a receiving module, a determining module and a configuration module;
the receiving module is configured to receive network slice information from a network-side device, where the network slice information includes a slice feature of at least one network slice supported by the network-side device;
the determining module is configured to determine, based on the slice feature of a first network slice of the at least one network slice received by the receiving module, a resource allocation policy corresponding to the first network slice;
the configuration module is configured to configure resources for the first network slice based on the resource allocation policy determined by the determination module.
9. An electronic device comprising a processor, a memory, and a program or instructions stored on the memory and executable on the processor, the program or instructions when executed by the processor implementing the steps of the method of configuration of slice resources of any of claims 1 to 7.
10. A readable storage medium, on which a program or instructions are stored, which when executed by a processor implement the steps of the configuration method of slice resources according to any one of claims 1 to 7.
CN202211460772.4A 2022-11-17 2022-11-17 Resource allocation method and device, electronic equipment and readable storage medium Pending CN115720376A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211460772.4A CN115720376A (en) 2022-11-17 2022-11-17 Resource allocation method and device, electronic equipment and readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211460772.4A CN115720376A (en) 2022-11-17 2022-11-17 Resource allocation method and device, electronic equipment and readable storage medium

Publications (1)

Publication Number Publication Date
CN115720376A true CN115720376A (en) 2023-02-28

Family

ID=85255824

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211460772.4A Pending CN115720376A (en) 2022-11-17 2022-11-17 Resource allocation method and device, electronic equipment and readable storage medium

Country Status (1)

Country Link
CN (1) CN115720376A (en)

Similar Documents

Publication Publication Date Title
KR101784900B1 (en) Computer, control device and data processing method
CN104519458B (en) A kind of method of network connection, terminal, wireless router and system
US20180210752A1 (en) Accelerator virtualization method and apparatus, and centralized resource manager
KR101465966B1 (en) Data encryption processing apparatus and method in a cloud environment
CN109787759B (en) Data transmission method, system, device and computer readable storage medium
EP3923549A1 (en) Data downloading method and related apparatus
CN112799825A (en) Task processing method and network equipment
US20180034894A1 (en) Data Transmission Method, and Terminal
US20150012973A1 (en) Methods and apparatus for sharing a service between multiple virtual machines
CN109995876A (en) Document transmission method, device, system and computer storage medium
CN1662897A (en) Virtual terminal for mobile network interface between mobile terminal and software applications node
CN114745451A (en) Data transmission method and device, electronic equipment and computer readable medium
CN114285906B (en) Message processing method and device, electronic equipment and storage medium
US20150012654A1 (en) Methods and apparatus for sharing a physical device between multiple physical machines
US20150012918A1 (en) Methods and apparatus for sharing a physical device between multiple virtual machines
CN115720376A (en) Resource allocation method and device, electronic equipment and readable storage medium
CN110392417A (en) Power consumption management method, terminal, computer equipment and storage medium
CN116244231A (en) Data transmission method, device and system, electronic equipment and storage medium
CN105138392B (en) A kind of band width control method and electronic equipment
CN108259418A (en) A kind of system and method for function trusteeship service
US10911823B2 (en) Media information processing method, apparatus and system
US20150010015A1 (en) Methods and apparatus for sharing a service between multiple physical machines
CN110365785A (en) Enter processing method, terminal device and the storage medium of cloud data
CN108990039A (en) Data transmission method and relevant apparatus
CN110677693A (en) Android system-based encrypted video offline playing method and device and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination