EP3476080A2 - Device and method for nfv life cycle management - Google Patents
Device and method for nfv life cycle managementInfo
- Publication number
- EP3476080A2 EP3476080A2 EP16906493.8A EP16906493A EP3476080A2 EP 3476080 A2 EP3476080 A2 EP 3476080A2 EP 16906493 A EP16906493 A EP 16906493A EP 3476080 A2 EP3476080 A2 EP 3476080A2
- Authority
- EP
- European Patent Office
- Prior art keywords
- vnf
- request
- instance
- response
- identifier
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/50—Network service management, e.g. ensuring proper service fulfilment according to agreements
- H04L41/5041—Network service management, e.g. ensuring proper service fulfilment according to agreements characterised by the time relationship between creation and deployment of a service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/12—Discovery or management of network topologies
- H04L41/122—Discovery or management of network topologies of virtualised topologies, e.g. software-defined networks [SDN] or network function virtualisation [NFV]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/40—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks using virtualisation of network functions or resources, e.g. SDN or NFV entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/08—Configuration management of networks or network elements
- H04L41/0895—Configuration of virtualised networks or elements, e.g. virtualised network function or OpenFlow elements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/08—Configuration management of networks or network elements
- H04L41/0896—Bandwidth or capacity management, i.e. automatically increasing or decreasing capacities
Definitions
- Embodiments pertain to radio access networks. Some embodiments relate to Network Function Virtualization (NFV) in cellular networks, including Third Generation Partnership Project Long Term Evolution (3 GPP LTE) networks and LTE advanced (LTE-A) networks as well as 4th generation (4G) networks and 5th generation (5G) networks. Some embodiments relate to NFV lifecycle management.
- NFV Network Function Virtualization
- 3 GPP LTE systems including LTE and LTE- Advanced systems
- UEs user equipment
- 5G next generation wireless communication system
- 5G looks to provide a unified network/system that is able to meet vastly different and sometime conflicting performance dimensions and services driven by disparate services and applications while maintaining compatibility with legacy UEs and applications.
- NFV Network Function Virtualization
- VNFs Virtual Network Functions
- FIG. 1 is a functional diagram of a wireless network in accordance with some embodiments.
- FIG. 2 illustrates components of a communication device in accordance with some embodiments.
- FIG. 3 illustrates a block diagram of a communication device in accordance with some embodiments.
- FIG. 4 illustrates another block diagram of a communication device in accordance with some embodiments.
- FIG. 5 illustrates a NFV network management architecture in accordance with some embodiments.
- FIG. 6 illustrates a flow diagram of VNF instantiation subsequent to an on-boarding request from a network manager (NM) in accordance with some embodiments.
- FIG. 7 illustrates a flow diagram of VNF scaling in accordance with some embodiments.
- FIG. 8 illustrates a flow diagram of a VNF termination in accordance with some embodiments.
- FIG. 1 shows an example of a portion of an end-to-end network architecture of a Long Term Evolution (LTE) network with various components of the network in accordance with some embodiments.
- LTE Long Term Evolution
- an LTE network refers to both LTE and LTE Advanced (LTE-A) networks as well as other versions of LTE networks to be developed.
- the network 100 can comprise a radio access network (RAN) (e.g., as depicted, the E-UTRAN or evolved universal terrestrial radio access network) 101 and core network 120 (e.g., shown as an evolved packet core (EPC)) coupled together through an SI interface 1 15.
- RAN radio access network
- EPC evolved packet core
- the core network 120 can include a mobility management entity (MME) 122, serving gateway (serving GW) 124, and packet data network gateway (PDN GW) 126.
- the RAN 101 can include evolved node Bs (eNBs) 104 (which can operate as base stations) for communicating with user equipment (UE) 102.
- the eNBs 104 can include macro eNBs 104a and low power (LP) eNBs 104b.
- the eNBs 104 and UEs 102 can employ the techniques as described herein.
- the MME 122 can be similar in function to the control plane of legacy Serving GPRS Support Nodes (SGSN).
- the MME 122 can manage mobility aspects in access such as gateway selection and tracking area list management.
- the serving GW 124 can terminate the interface toward the RAN 101, and route data packets between the RAN 101 and the core network 120.
- the serving GW 124 can be a local mobility anchor point for inter-eNB handovers and also can provide an anchor for inter-3GPP mobility. Other responsibilities can include lawful intercept, charging, and some policy enforcement.
- the serving GW 124 and the MME 122 can be implemented in one physical node or separate physical nodes.
- the PDN GW 126 can terminate a SGi interface toward the packet data network (PDN).
- the PDN GW 126 can route data packets between the EPC 120 and the external PDN, and can perform policy enforcement and charging data collection.
- the PDN GW 126 can also provide an anchor point for mobility devices with non-LTE access.
- the external PDN can be any kind of IP network, as well as an IP Multimedia Subsystem (IMS) domain.
- IMS IP Multimedia Subsystem
- the PDN GW 126 and the serving GW 124 can be implemented in a single physical node or separate physical nodes.
- the eNBs 104 can terminate the air interface protocol and can be the first point of contact for a UE 102.
- an eNB 104 can fulfill various logical functions for the RAN 101 including, but not limited to, RNC (radio network controller functions) such as radio bearer management, uplink and downlink dynamic radio resource management and data packet scheduling, and mobility
- RNC radio network controller functions
- UEs 102 can be configured to communicate orthogonal frequency division multiplexed (OFDM) communication signals with an eNB 104 over a multicarrier communication channel in accordance with an OFDMA communication technique.
- the OFDM signals can comprise a plurality of orthogonal sub carriers.
- the SI interface 115 can be the interface that separates the RAN 101 and the EPC 120. It can be split into two parts: the Sl-U, which can carry traffic data between the eNBs 104 and the serving GW 124, and the Sl-MME, which can be a signaling interface between the eNBs 104 and the MME 122.
- the X2 interface can be the interface between eNBs 104.
- the X2 interface can comprise two parts, the X2-C and X2-U.
- the X2-C can be the control plane interface between the eNBs 104
- the X2-U can be the user plane interface between the eNBs 104.
- LP cells 104b can be typically used to extend coverage to indoor areas where outdoor signals do not reach well, or to add network capacity in areas with dense usage.
- the cells of different sizes can operate on the same frequency band, or can operate on different frequency bands with each cell operating in a different frequency band or only cells of different sizes operating on different frequency bands.
- LP eNB refers to any suitable relatively LP eNB for implementing a smaller cell (smaller than a macro cell) such as a femtocell, a picocell, or a microcell.
- Femtocell eNBs can be typically provided by a mobile network operator to its residential or enterprise customers.
- a femtocell can be typically the size of a residential gateway or smaller and generally connect to a broadband line.
- the femtocell can connect to the mobile operator's mobile network and provide extra coverage in a range of typically 30 to 50 meters.
- a LP eNB 104b might be a femtocell eNB since it is coupled through the PDN GW 126.
- a picocell can be a wireless communication system typically covering a small area, such as in-building (offices, shopping malls, train stations, etc.), or more recently in-aircraft.
- a picocell eNB can generally connect through the X2 link to another eNB such as a macro eNB through its base station controller (BSC)
- BSC base station controller
- LP eNB can be implemented with a picocell eNB since it can be coupled to a macro eNB 104a via an X2 interface.
- Picocell eNBs or other LP eNBs LP eNB 104b can incorporate some or all functionality of a macro eNB LP eNB 104a. In some cases, this can be referred to as an access point base station or enterprise femtocell.
- the core network 120 can also contain a Policy and Charging Rules Function (PCRF) (not shown) and a Home location register (HLR) (not shown).
- PCRF Policy and Charging Rules Function
- HLR Home location register
- the PCRF can determine policy rules in the network core and accesses subscriber databases and other specialized functions, such as a charging system, in a centralized manner.
- the PCRF can aggregate information to and from the network, OSSs, and other sources, making policy decisions for each network subscriber active.
- the HLR is a central database that contains details of each subscriber that is authorized to use the core network 120.
- FIG. 2 illustrates components of a UE in accordance with some embodiments. At least some of the components shown can be used in the UE 102 (or e B 104 or FV entity) shown in FIG. 1.
- the UE 200 and other components can be configured to use the synchronization signals as described herein.
- the UE 200 can be one of the UEs 102 shown in FIG. 1 and can be a stationary, non-mobile device or can be a mobile device.
- the UE 200 can include application circuitry 202, baseband circuitry 204, Radio Frequency (RF) circuitry 206, front-end module (FEM) circuitry 208 and one or more antennas 210, coupled together at least as shown. At least some of the baseband circuitry 204, RF circuitry 206, and FEM circuitry 208 can form a transceiver.
- other network elements such as the eNB can contain some or all of the components shown in FIG. 2.
- Other of the network elements, such as the MME can contain an interface, such as the SI interface, to communicate with the eNB over a wired connection regarding the UE.
- the application circuitry 202 can include one or more application processors.
- the application circuitry 202 can include circuitry such as, but not limited to, one or more single-core or multi-core processors.
- the processor(s) can include any combination of general- purpose processors and dedicated processors (e.g., graphics processors, application processors, etc.).
- the processors can be coupled with and/or can include memory/storage and can be configured to execute instructions stored in the memory/storage to enable various applications
- the baseband circuitry 204 can include circuitry such as, but not limited to, one or more single-core or multi-core processors.
- the baseband circuitry 204 can include one or more baseband processors and/or control logic to process baseband signals received from a receive signal path of the RF circuitry 206 and to generate baseband signals for a transmit signal path of the RF circuitry 206.
- Baseband circuitry 204 can interface with the application circuitry 202 for generation and processing of the baseband signals and for controlling operations of the RF circuitry 206.
- the baseband circuitry 204 can include a second generation (2G) baseband circuitry 204a, third generation (3G) baseband circuitry 204b, fourth generation (4G) baseband circuitry 204c, and/or other baseband circuitry 204d for other existing generations, generations in development or to be developed in the future (e.g., fifth generation (5G), 5G, etc.).
- the baseband circuitry 204 e.g., one or more of baseband circuitry 204a-d
- the radio control functions can include, but are not limited to, signal modulation/demodulation, encoding/decoding, radio
- modulation/demodulation circuitry of the baseband circuitry 204 can include FFT, precoding, and/or constellation mapping/demapping functionality.
- encoding/decoding circuitry of the baseband circuitry 204 can include convolution, tail-biting convolution, turbo, Viterbi, and/or Low Density Parity Check (LDPC) encoder/decoder functionality.
- LDPC Low Density Parity Check
- the baseband circuitry 204 can include elements of a protocol stack such as, for example, elements of an evolved universal terrestrial radio access network (EUTRAN) protocol including, for example, physical (PHY), media access control (MAC), radio link control (RLC), packet data convergence protocol (PDCP), and/or radio resource control (RRC) elements.
- EUTRAN evolved universal terrestrial radio access network
- a central processing unit (CPU) 204e of the baseband circuitry 204 can be configured to run elements of the protocol stack for signaling of the PHY, MAC, RLC, PDCP and/or RRC layers.
- the baseband circuitry can include one or more audio digital signal processor(s) (DSP) 204f.
- DSP audio digital signal processor
- the audio DSP(s) 204f can be include elements for compression/decompression and echo cancellation and can include other suitable processing elements in other embodiments.
- Components of the baseband circuitry can be suitably combined in a single chip, a single chipset, or disposed on a same circuit board in some embodiments.
- some or all of the constituent components of the baseband circuitry 204 and the application circuitry 202 can be implemented together such as, for example, on a system on a chip (SOC).
- SOC system on a chip
- the baseband circuitry 204 can provide for communication compatible with one or more radio technologies.
- the baseband circuitry 204 can support communication with an evolved universal terrestrial radio access network (EUTRAN) and/or other wireless metropolitan area networks (WMAN), a wireless local area network (WLAN), a wireless personal area network (WPAN).
- EUTRAN evolved universal terrestrial radio access network
- WMAN wireless metropolitan area networks
- WLAN wireless local area network
- WPAN wireless personal area network
- multi-mode baseband circuitry Embodiments in which the baseband circuitry 204 is configured to support radio communications of more than one wireless protocol.
- the device can be configured to operate in accordance with communication standards or other protocols or standards, including Institute of Electrical and Electronic Engineers (IEEE) 802.16 wireless technology (WiMax), IEEE 802.11 wireless technology (WiFi) including IEEE 802.11 ad, which operates in the 60 GHz millimeter wave spectrum, various other wireless technologies such as global system for mobile communications (GSM), enhanced data rates for GSM evolution (EDGE), GSM EDGE radio access network (GERAN), universal mobile telecommunications system (UMTS), UMTS terrestrial radio access network (UTRAN), or other 2G, 3G, 4G, 5G, etc. technologies either already developed or to be developed.
- RF circuitry 206 can enable communication with wireless networks using modulated electromagnetic radiation through a non-solid medium.
- the RF circuitry 206 can include switches, filters, amplifiers, etc. to facilitate the communication with the wireless network.
- RF circuitry 206 can include a receive signal path which can include circuitry to down-convert RF signals received from the FEM circuitry 208 and provide baseband signals to the baseband circuitry 204.
- RF circuitry 206 can also include a transmit signal path which can include circuitry to up-convert baseband signals provided by the baseband circuitry 204 and provide RF output signals to the FEM circuitry 208 for transmission.
- the RF circuitry 206 can include a receive signal path and a transmit signal path.
- the receive signal path of the RF circuitry 206 can include mixer circuitry 206a, amplifier circuitry 206b and filter circuitry 206c.
- the transmit signal path of the RF circuitry 206 can include filter circuitry 206c and mixer circuitry 206a.
- RF circuitry 206 can also include synthesizer circuitry 206d for synthesizing a frequency for use by the mixer circuitry 206a of the receive signal path and the transmit signal path.
- the mixer circuitry 206a of the receive signal path can be configured to down-convert RF signals received from the FEM circuitry 208 based on the synthesized frequency provided by synthesizer circuitry 206d.
- the amplifier circuitry 206b can be configured to amplify the down-converted signals and the filter circuitry 206c can be a low-pass filter (LPF) or band-pass filter (BPF) configured to remove unwanted signals from the down-converted signals to generate output baseband signals.
- LPF low-pass filter
- BPF band-pass filter
- Output baseband signals can be provided to the baseband circuitry 204 for further processing.
- the output baseband signals can be zero-frequency baseband signals, although this is not a requirement.
- mixer circuitry 206a of the receive signal path can comprise passive mixers, although the scope of the embodiments is not limited in this respect.
- the mixer circuitry 206a of the transmit signal path can be configured to up-convert input baseband signals based on the synthesized frequency provided by the synthesizer circuitry 206d to generate RF output signals for the FEM circuitry 208.
- the baseband signals can be provided by the baseband circuitry 204 and can be filtered by filter circuitry 206c.
- the filter circuitry 206c can include a low-pass filter (LPF), although the scope of the embodiments is not limited in this respect.
- the mixer circuitry 206a of the receive signal path and the mixer circuitry 206a of the transmit signal path can include two or more mixers and can be arranged for quadrature downconversion and/or upconversion respectively.
- the mixer circuitry 206a of the receive signal path and the mixer circuitry 206a of the transmit signal path can include two or more mixers and can be arranged for image rejection (e.g., Hartley image rejection). In some embodiments, the mixer circuitry 206a of the receive signal path and the mixer circuitry 206a can be arranged for direct downconversion and/or direct
- the mixer circuitry 206a of the transmit signal path can be configured for super-heterodyne operation.
- the output baseband signals and the input baseband signals can be analog baseband signals, although the scope of the embodiments is not limited in this respect.
- the output baseband signals and the input baseband signals can be digital baseband signals.
- the RF circuitry 206 can include analog-to-digital converter (ADC) and digital-to-analog converter (DAC) circuitry and the baseband circuitry 204 can include a digital baseband interface to communicate with the RF circuitry 206.
- ADC analog-to-digital converter
- DAC digital-to-analog converter
- a separate radio IC circuitry can be provided for processing signals for each spectrum, although the scope of the embodiments is not limited in this respect.
- the synthesizer circuitry 206d can be a fractional -N synthesizer or a fractional N/N+l synthesizer, although the scope of the embodiments is not limited in this respect as other types of frequency synthesizers can be suitable.
- synthesizer circuitry 206d can be a delta-sigma synthesizer, a frequency multiplier, or a synthesizer comprising a phase-locked loop with a frequency divider.
- the synthesizer circuitry 206d can be configured to synthesize an output frequency for use by the mixer circuitry 206a of the RF circuitry 206 based on a frequency input and a divider control input.
- the synthesizer circuitry 206d can be a fractional N/N+l synthesizer.
- frequency input can be provided by a voltage controlled oscillator (VCO), although that is not a requirement.
- VCO voltage controlled oscillator
- Divider control input can be provided by either the baseband circuitry 204 or the application circuitry 202 depending on the desired output frequency.
- a divider control input e.g., N
- N can be determined from a look-up table based on a channel indicated by the application circuitry 202.
- Synthesizer circuitry 206d of the RF circuitry 206 can include a divider, a delay-locked loop (DLL), a multiplexer and a phase accumulator.
- the divider can be a dual modulus divider (DMD) and the phase accumulator can be a digital phase accumulator (DP A).
- the DMD can be configured to divide the input signal by either N or N+l (e.g., based on a carry out) to provide a fractional division ratio.
- the DLL can include a set of cascaded, tunable, delay elements, a phase detector, a charge pump and a D-type flip-flop.
- the delay elements can be configured to break a VCO period up into Nd equal packets of phase, where Nd is the number of delay elements in the delay line.
- Nd is the number of delay elements in the delay line.
- synthesizer circuitry 206d can be configured to generate a carrier frequency as the output frequency, while in other embodiments, the output frequency can be a multiple of the carrier frequency (e.g., twice the carrier frequency, four times the carrier frequency) and used in conjunction with quadrature generator and divider circuitry to generate multiple signals at the carrier frequency with multiple different phases with respect to each other.
- the output frequency can be a LO frequency (fLO).
- the RF circuitry 206 can include an IQ/polar converter.
- FEM circuitry 208 can include a receive signal path which can include circuitry configured to operate on RF signals received from one or more antennas 210, amplify the received signals and provide the amplified versions of the received signals to the RF circuitry 206 for further processing.
- FEM circuitry 208 can also include a transmit signal path which can include circuitry configured to amplify signals for transmission provided by the RF circuitry 206 for transmission by one or more of the one or more antennas 210.
- the FEM circuitry 208 can include a TX/RX switch to switch between transmit mode and receive mode operation.
- the FEM circuitry can include a receive signal path and a transmit signal path.
- the receive signal path of the FEM circuitry can include a low-noise amplifier (LNA) to amplify received RF signals and provide the amplified received RF signals as an output (e.g., to the RF circuitry 206).
- LNA low-noise amplifier
- the transmit signal path of the FEM circuitry 208 can include a power amplifier (PA) to amplify input RF signals (e.g., provided by RF circuitry 206), and one or more filters to generate RF signals for subsequent transmission (e.g., by one or more of the one or more antennas 210.
- PA power amplifier
- the UE 200 can include additional elements such as, for example, memory/storage, display, camera, sensor, and/or input/output (I/O) interface as described in more detail below.
- the UE 200 described herein can be part of a portable wireless communication device, such as a personal digital assistant (PDA), a laptop or portable computer with wireless communication capability, a web tablet, a wireless telephone, a smartphone, a wireless headset, a pager, an instant messaging device, a digital camera, an access point, a television, a medical device (e.g., a heart rate monitor, a blood pressure monitor, etc.), or other device that can receive and/or transmit information wirelessly.
- PDA personal digital assistant
- a laptop or portable computer with wireless communication capability such as a personal digital assistant (PDA), a laptop or portable computer with wireless communication capability, a web tablet, a wireless telephone, a smartphone, a wireless headset, a pager, an instant messaging device, a digital camera, an access point, a television, a medical
- the UE 200 can include one or more user interfaces designed to enable user interaction with the system and/or peripheral component interfaces designed to enable peripheral component interaction with the system.
- the UE 200 can include one or more of a keyboard, a keypad, a touchpad, a display, a sensor, a non-volatile memory port, a universal serial bus (USB) port, an audio jack, a power supply interface, one or more antennas, a graphics processor, an application processor, a speaker, a microphone, and other I/O components.
- the display can be an LCD or LED screen including a touch screen.
- the sensor can include a gyro sensor, an accelerometer, a proximity sensor, an ambient light sensor, and a positioning unit.
- the positioning unit can communicate with components of a positioning network, e.g., a global positioning system (GPS) satellite.
- GPS global positioning system
- the antennas 210 can comprise one or more directional or omnidirectional antennas, including, for example, dipole antennas, monopole antennas, patch antennas, loop antennas, microstrip antennas or other types of antennas suitable for transmission of RF signals.
- the antennas 210 can be effectively separated to take advantage of spatial diversity and the different channel characteristics that can result.
- the UE 200 is illustrated as having several separate functional elements, one or more of the functional elements can be combined and can be implemented by combinations of software-configured elements, such as processing elements including digital signal processors (DSPs), and/or other hardware elements.
- DSPs digital signal processors
- some elements can comprise one or more microprocessors, DSPs, field-programmable gate arrays (FPGAs), application specific integrated circuits (ASICs), radio- frequency integrated circuits (RFICs) and combinations of various hardware and logic circuitry for performing at least the functions described herein.
- the functional elements can refer to one or more processes operating on one or more processing elements.
- Embodiments can be implemented in one or a combination of hardware, firmware and software. Embodiments can also be implemented as instructions stored on a computer-readable storage medium, which can be read and executed by at least one processor to perform the operations described herein.
- a computer-readable storage medium can include any non-transitory mechanism for storing information in a form readable by a machine (e.g., a computer).
- a computer-readable storage medium can include read-only memory (ROM), random-access memory (RAM), magnetic disk storage media, optical storage media, flash-memory devices, and other storage devices and media.
- Some embodiments can include one or more processors and can be configured with instructions stored on a computer-readable storage medium.
- FIG. 3 is a block diagram of a communication device in accordance with some embodiments.
- the device can be a UE or eNB, for example, such as the UE 102 or e B 104 shown in FIG. 1 that can be configured to track the UE as described herein, or an Element Manager (EM) 532, a Network Manager (NM) 542, a VNF Manager (VNFM) 550 or other entities described with respect to FIG. 5.
- the physical layer circuitry 302 can perform various encoding and decoding functions that can include formation of baseband signals for transmission and decoding of received signals.
- the communication device 300 can also include medium access control layer (MAC) circuitry 304 for controlling access to the wireless medium.
- MAC medium access control layer
- the communication device 300 can also include processing circuitry 306, such as one or more single-core or multi-core processors, and memory 308 arranged to perform the operations described herein.
- the physical layer circuitry 302, MAC circuitry 304 and processing circuitry 306 can handle various radio control functions that enable communication with one or more radio networks compatible with one or more radio technologies.
- the radio control functions can include signal modulation, encoding, decoding, radio frequency shifting, etc.
- communication can be enabled with one or more of a WMAN, a WLAN, and a WPAN.
- the communication device 300 can be configured to operate in accordance with 3 GPP standards or other protocols or standards, including WiMax, WiFi, WiGig, GSM, EDGE, GERAN, UMTS, UTRAN, or other 3G, 3G, 4G, 5G, etc. technologies either already developed or to be developed.
- the communication device 300 can include transceiver circuitry 312 to enable communication with other external devices wirelessly and interfaces 314 to enable wired communication with other external devices.
- the transceiver circuitry 312 can perform various transmission and reception functions such as conversion of signals between a baseband range and a Radio Frequency (RF) range.
- RF Radio Frequency
- the antennas 301 can comprise one or more directional or omnidirectional antennas, including, for example, dipole antennas, monopole antennas, patch antennas, loop antennas, microstrip antennas or other types of antennas suitable for transmission of RF signals.
- the antennas 301 can be effectively separated to take advantage of spatial diversity and the different channel characteristics that can result.
- the communication device 300 is illustrated as having several separate functional elements, one or more of the functional elements can be combined and can be implemented by combinations of software-configured elements, such as processing elements including DSPs, and/or other hardware elements.
- processing elements including DSPs, and/or other hardware elements.
- some elements can comprise one or more microprocessors, DSPs, FPGAs, ASICs, REICs and
- the functional elements can refer to one or more processes operating on one or more processing elements.
- Embodiments can be implemented in one or a combination of hardware, firmware and software.
- Embodiments can also be implemented as instructions stored on a computer-readable storage medium, which can be read and executed by at least one processor to perform the operations described herein.
- FIG. 4 illustrates another block diagram of a communication device in accordance with some embodiments.
- the communication device 400 can operate as a standalone device or can be connected (e.g., networked) to other communication devices.
- the communication device 400 can operate in the capacity of a server communication device, a client communication device, or both in server-client network environments.
- the communication device 400 can act as a peer communication device in peer- to-peer (P2P) (or other distributed) network environment.
- P2P peer- to-peer
- communication device 400 can be a UE, e B, PC, a tablet PC, a STB, a PDA, a mobile telephone, a smart phone, a web appliance, a network router, switch or bridge, or any communication device capable of executing instructions (sequential or otherwise) that specify actions to be taken by that communication device.
- communication device shall also be taken to include any collection of communication devices that individually or jointly execute a set (or multiple sets) of instructions to perform any one or more of the methodologies discussed herein, such as cloud computing, software as a service (SaaS), other computer cluster configurations.
- Examples, as described herein, can include, or can operate on, logic or a number of components, modules, or mechanisms.
- Modules are tangible entities (e.g., hardware) capable of performing specified operations and can be configured or arranged in a certain manner.
- circuits can be arranged (e.g., internally or with respect to external entities such as other circuits) in a specified manner as a module.
- the whole or part of one or more computer systems (e.g., a standalone, client or server computer system) or one or more hardware processors can be configured by firmware or software (e.g., instructions, an application portion, or an application) as a module that operates to perform specified operations.
- the software can reside on a communication device readable medium.
- the software when executed by the underlying hardware of the module, causes the hardware to perform the specified operations.
- module is understood to encompass a tangible entity, be that an entity that is physically constructed, specifically configured (e.g., hardwired), or temporarily (e.g., transitorily) configured (e.g., programmed) to operate in a specified manner or to perform part or all of any operation described herein.
- each of the modules need not be instantiated at any one moment in time.
- the modules comprise a general-purpose hardware processor configured using software
- the general-purpose hardware processor can be configured as respective different modules at different times.
- Software can accordingly configure a hardware processor, for example, to constitute a particular module at one instance of time and to constitute a different module at a different instance of time.
- Communication device 400 can include a hardware processor 402 (e.g., a central processing unit (CPU), a graphics processing unit (GPU), a hardware processor core, or any combination thereof), a main memory 404 and a static memory 406, some or all of which can communicate with each other via an interlink (e.g., bus) 408.
- the communication device 400 can further include a display unit 410, an alphanumeric input device 412 (e.g., a keyboard), and a user interface (UI) navigation device 414 (e.g., a mouse).
- the display unit 410, input device 412 and UI navigation device 414 can be a touch screen display.
- the communication device 400 can additionally include a storage device (e.g., drive unit) 416, a signal generation device 418 (e.g., a speaker), a network interface device 420, and one or more sensors 421, such as a global positioning system (GPS) sensor, compass, accelerometer, or other sensor.
- the communication device 400 can include an output controller 428, such as a serial (e.g., universal serial bus (USB), parallel, or other wired or wireless (e.g., infrared (IR), near field communication (NFC), etc.) connection to communicate or control one or more peripheral devices (e.g., a printer, card reader, etc.).
- a serial e.g., universal serial bus (USB), parallel, or other wired or wireless (e.g., infrared (IR), near field communication (NFC), etc.) connection to communicate or control one or more peripheral devices (e.g., a printer, card reader, etc.).
- the storage device 416 can include a communication device readable medium 422 that stores one or more sets of data structures or instructions 424 (e.g., software) embodying or utilized by any one or more of the techniques or functions described herein.
- the instructions 424 can also reside, completely or at least partially, within the main memory 404, within static memory 406, or within the hardware processor 402 during execution thereof by the communication device 400.
- one or any combination of the hardware processor 402, the main memory 404, the static memory 406, or the storage device 416 can constitute communication device readable media.
- the term "communication device readable medium” can include a single medium or multiple media (e.g., a centralized or distributed database, and/or associated caches and servers) configured to store the one or more instructions 424.
- the term "communication device readable medium” can include any medium that is capable of storing, encoding, or carrying instructions for execution by the communication device 400 and that cause the communication device 400 to perform any one or more of the techniques of the present disclosure, or that is capable of storing, encoding or carrying data structures used by or associated with such instructions.
- Non-limiting communication device readable medium examples can include solid-state memories, and optical and magnetic media.
- communication device readable media can include: non-volatile memory, such as semiconductor memory devices (e.g., Electrically Programmable Read-Only Memory (EPROM), Electrically Erasable Programmable Read- Only Memory (EEPROM)) and flash memory devices; magnetic disks, such as internal hard disks and removable disks; magneto-optical disks; Random Access Memory (RAM); and CD-ROM and DVD-ROM disks.
- non-volatile memory such as semiconductor memory devices (e.g., Electrically Programmable Read-Only Memory (EPROM), Electrically Erasable Programmable Read- Only Memory (EEPROM)) and flash memory devices
- magnetic disks such as internal hard disks and removable disks
- magneto-optical disks Random Access Memory (RAM); and CD-ROM and DVD-ROM disks.
- communication device readable media can include non- transitory communication device readable media.
- communication device readable media can include communication device readable media that is not a transitory propagating signal.
- the instructions 424 can further be transmitted or received over a communications network 426 using a transmission medium via the network interface device 420 utilizing any one of a number of transfer protocols (e.g., frame relay, internet protocol (IP), transmission control protocol (TCP), user datagram protocol (UDP), hypertext transfer protocol (HTTP), etc.).
- transfer protocols e.g., frame relay, internet protocol (IP), transmission control protocol (TCP), user datagram protocol (UDP), hypertext transfer protocol (HTTP), etc.
- Example communication networks can include a local area network (LAN), a wide area network (WAN), a packet data network (e.g., the Internet), mobile telephone networks (e.g., cellular networks), Plain Old Telephone (POTS) networks, and wireless data networks (e.g., Institute of Electrical and Electronics Engineers (IEEE) 802.11 family of standards known as Wi-Fi®, IEEE 802.16 family of standards known as WiMax®), IEEE 802.15.4 family of standards, a Long Term Evolution (LTE) family of standards, a Universal Mobile Telecommunications System (UMTS) family of standards, peer-to-peer (P2P) networks, among others.
- LAN local area network
- WAN wide area network
- POTS Plain Old Telephone
- wireless data networks e.g., Institute of Electrical and Electronics Engineers (IEEE) 802.11 family of standards known as Wi-Fi®, IEEE 802.16 family of standards known as WiMax®
- IEEE 802.15.4 family of standards e.g., Institute of Electrical and Electronics Engineers (IEEE
- the network interface device 420 can include one or more physical jacks (e.g., Ethernet, coaxial, or phone jacks) or one or more antennas to connect to the communications network 426.
- the network interface device 420 can include a plurality of antennas to wirelessly communicate using at least one of single-input multiple-output (SFMO), MFMO, or multiple-input single-output (MISO) techniques.
- SFMO single-input multiple-output
- MISO multiple-input single-output
- the network interface device 420 can wirelessly communicate using Multiple User MFMO techniques.
- transmission medium shall be taken to include any intangible medium that is capable of storing, encoding or carrying instructions for execution by the communication device 400, and includes digital or analog
- the network and components shown in FIGS. 1-4 can be implemented in hardware or software or a combination thereof.
- the network can be wholly or partially implemented using network virtualization.
- Network virtualization has started to be used in various types of networks, particularly in server deployments and data centers.
- Virtual Network Functions are software implementations of network functions such as the MME, HLR, SGW, PGW or PCRF.
- VNFs can be deployed on a Network Function Virtualization (NFV) infrastructure (NFVI), which can include both hardware and software components of the network environment. NFV can thus virtualize separate network node functions into connected blocks that create communication services and exhibit public land mobile network (PLMN)-system behavior.
- PLMN public land mobile network
- the network operator can deploy VNFs on the NFVI to provide enhanced flexibility for network resource utilization, among others.
- actual resources can be dynamically allocated, updated, and deallocated based on the functionality desired.
- the hardware can support virtual machines (VMs) having multiple operating systems and individualized amounts and types of virtualized resources.
- VMs virtual machines
- the NFVI can, as other equipment, have a life cycle that includes creation, modification and deletion. NFV life cycle management can enable operators to instantiate or terminate VNFs on the fly according to demand. This can accordingly provide a great deal of flexibility in modification of the network to scale network capacity.
- IRP Integration Reference Point
- OSS Operations Support Systems
- the IRP Manager can refer and access IRP Agents in various instantiations, such as an Element Manager (EM) or Network Manager (NM).
- the IRP Manager can manage the networks via Configuration Management (CM) functions - Create, Delete, and Modify operations.
- CM Configuration Management
- the CM functions can enable the IRP Manager to create, delete, or modify an Information Object Class (IOC) representing various behaviors or functions of the network elements.
- IOC Information Object Class
- legacy create, delete or modify functions can be used to respectively instantiate, terminate or update the VNF in order to support VNF lifecycle management functions.
- the legacy Network Resource Model (NRM) already defined in the 3 GPP standard can be reused to minimize the impact to legacy systems, and can also be used in the NFV work item.
- FIG. 5 illustrates a NFV network management architecture in accordance with some embodiments.
- the NFV network management architecture 500 shown in FIG. 5 illustrates one embodiment of the manner in which NVF life cycle management can be supported by the 3 GPP management system.
- the NFV network management architecture 500 can include a number of elements (each of which can contain physical and/or virtualized components), including a Network Virtualization Function Infrastructure (NVFI) 510, Network elements (NEs) 590, Virtual Network Functions (VNFs) 520, a Domain Manager (DM) 530, an Element Manager (EM) 532, a Network Manager (NM) 542, and a NFV Management and Orchestration (NFV-MANO) 580,
- the NFV-MANO 580 can comprise a Virtualized Infrastructure Manager (VFM) 540, a VNF Manager (VNFM) 550, and a Network Function
- the NM 542 can be contained in an Operations Support System/Business Support System (OSS/BSS) 520, with the DM 530 and NM 542 forming the 3GPP management system 514.
- OSS/BSS Operations Support System/Business Support System
- the NFV network management architecture 500 can be
- the NFV network management architecture 500 can include one or more physical devices and/or one or more applications hosted on a distributed computing platform, a cloud computing platform, a centralized hardware system, a server, a computing device, and/or an external network-to-network interface device, among others.
- the virtualized resource performance measurement can include, for example, latency, jitter, bandwidth, packet loss, nodal connectivity, compute, network, and/or storage resources, accounting, fault and/or security measurements.
- the elements of the NFV network management architecture 500 can thus be contained in one or more of the devices shown in FIGS. 1-4 or other devices.
- the NEs 590 can comprise physical network functions (PNF) including both hardware such as processors, antennas, amplifiers, transmit and receive chains, as well as software.
- the VNFs 520 can be instantiated in one or more servers.
- Each of the VNFs 520, DM 530 and the NEs 590 can contain an EM 522, 532, 592.
- the NFV Management and Orchestration (NFV-MANO) 580 can manage the NFVI 510.
- the NFV-MANO 580 can orchestrate the instantiation of network services, and the allocation of resources used by the VNFs 520.
- the NFV-MANO 580 can, along with the OSS/BSS 540, be used by external entities to deliver various NFV business benefits.
- the OSS/BSS 540 can include the collection of systems and management applications that a service provider (such as a telephone operator or telecommunications company) use to operate their business: management of customers, ordering, products and revenues - for example, payment or account transactions, as well as telecommunications network components and supporting processes including network component configuration, network service provisioning and fault handling.
- the NFV-MANO 580 can create or terminate a VNF 520, increase or decrease the VNF capacity, or update or upgrade software and/or configuration of a VNF.
- the NFV- MANO 580 can include a Virtualized Infrastructure Manager (VFM) 570, a VNF Manager (VNFM) 550 and a NFV Orchestrator (NFVO) 560.
- VFM Virtualized Infrastructure Manager
- VNFM VNF Manager
- NFVO NFV Orchestrator
- the NFV-MANO 580 can have access to various data repositories including network services, VNFs available, NFV instances and NFVI resources with which to determine resource allocation.
- the VFM 540 can control and manage the NFVI resources via Nf- Vi reference points within the infrastructure sub-domain.
- the VFM 540 can further collect and forward performance measurements and events to the VNFM 550 via Vi-VNFM and to the NFVO 560 via Or-Vi reference points.
- the NFVO 560 can be responsible for managing new VNFs and other network services, including lifecycle management of different network services, which can include VNF instances, global resource management, validation and authorization of NFVI resource requests and policy management for various network services.
- the NFVO 560 can coordinate VNFs 520 as part of network services that jointly realize a more complex function, including joint instantiation and configuration, configuring required connections between different VNFs 520, and managing dynamic changes of the configuration.
- the NFVO 560 can provide this orchestration through an OS-Ma-NFVO reference point with the NM 542.
- the VNFM 550 can orchestrate NFVI resources via the VFM 540 and provide overall coordination and adaptation for configuration and event reporting between the VFM 520 and the EMs and NMs.
- the former can involve discovering available services, managing virtualized resource availability/allocation/release and providing virtualized resource fault/performance management.
- the latter can involve lifecycle management that can include instantiating a VNF, scaling and updating the VNF instances, and terminating the network service, releasing the NFVI resources for the service to the NFVI resource pool to be used by other services.
- the VNFM 550 can be responsible for the lifecycle management of the VNFs 520 via the Ve-VNFM-VNF reference point and can interface to EMs 522, 532 through the Ve- VNFM— EM reference point.
- the VNFM 550 can be assigned the management of a single VNF 520, or the management of multiple VNFs 520 of the same type or of different types. Thus, although only one VNFM 550 is shown in FIG. 5, different VNFMs 550 can be associated with the different VNFs 520 for performance measurement and other responsibilities.
- the VNFM 550 can provide a number of VNF functionalities, including instantiation (and configuration if required by the VNF deployment template), software update/upgrade, modification, scaling out/in and up/down, collection of NFVI performance measurement results and faults/events information and correlation to VNF instance-related events/faults, healing, termination, lifecycle management change notification, integrity management, and event reporting.
- the VIM 540 can be responsible for controlling and managing the FVI compute, storage and network resources, usually within one operator's Infrastructure Domain.
- the VIM 540 can be specialized in handling a certain type of NFVI resource (e.g. compute-only, storage-only, networking-only), or can be capable of managing multiple types of NFVI resources.
- the VFM 540 can, among others, orchestrate the
- NFVI resources including the optimization of such resources usage
- the NVTI 510 can itself contain various virtualized and non- virtualized resources. These can include a plurality of virtual machines (VMs) 512 that can provide computational abilities (CPU), one or more memories 514 that can provide storage at either block or file-system level and one or more networking elements 516 that can include networks, subnets, ports, addresses, links and forwarding rules to ensure intra- and inter- VNF connectivity.
- VMs virtual machines
- CPU computational abilities
- memories 514 that can provide storage at either block or file-system level
- networking elements 516 can include networks, subnets, ports, addresses, links and forwarding rules to ensure intra- and inter- VNF connectivity.
- Each VNF 520 can provide a network function that is decoupled from infrastructure resources (computational resources, networking resources, memory) used to provide the network function. Although not shown, the VNFs 520 can be chained with other VNFs 520 and/or other physical network function to realize a network service. The virtualized resources can provide the VNFs 520 with desired resources. Resource allocation in the NFVI 510 can simultaneously meet numerous
- the VNFs 520 can be managed by one or more EMs 532.
- the EM can provide functions for management of virtual or physical network elements, depending on the instantiation.
- the EM can manage individual network elements and network elements of a subnetwork, which can include relations between the network elements.
- the EM 522 of a VNF 520 can be responsible for configuration for the network functions provided by a VNF 520, fault management for the network functions provided by the VNF 520, accounting for the usage of VNF functions, and collecting performance measurement results for the functions provided by the VNF 520.
- the EMs 532 (whether in a VNF 520 or NE 590) can be managed by the NM 542 of the OSS/BSS 540 through Itf-N reference points.
- the NM 542 can provide functions with the responsibility for the management of a network, mainly as supported by the EM 532 but can also involve direct access to the network elements.
- the NM 542 can connect and disconnect VNF external interfaces to physical network function interfaces at the request of the NFVO 560.
- the references points between the NFV-MANO 580 and the functional blocks of the system can include an Os-Ma-NFVO between the NM 542 and NFVO 560, a Ve-VNFM-EM between the EM 522, 532 and the VNFM 550, a Ve-VNFM-VNF between a VNF 520 and the VNFM 550, a Nf-Vi between the NFVI 510 and the VFM 570, an Or- VNFM between the NFVO 560 and the VNFM 550, an Or-Vi between the NFVO 560 and the VFM 570, and a Vi-VNFM between the VFM 570 and the VNFM 550.
- An Or-Vi interface can implement the VNF software image management interface and interfaces for the management of virtualized resources, their catalogue, performance and failure on the Or-Vi reference point.
- An Or-Vnfm interface can implement a virtualized resource management interface on the Or-Vnfm reference point.
- a Ve-Vnfm interface can implement a virtualized resource performance/fault management on the Ve-Vnfm reference point.
- FIG. 6 illustrates a flow diagram of VNF instantiation subsequent to an on-boarding request from a network manager (NM) 620 in accordance with some embodiments.
- the operations shown in FIG. 6 can be performed by the various elements shown in FIGS. 1-5.
- the operations generally illustrate the manner in which the NM 620 can request the NFVO 630 on-board a VNF package.
- the NM 620 can then request the EM 610 instantiate on-boarded VNF packages through further communication with a VNFM 640.
- the NM 620 requests on-boarding of a VNF package.
- the NM can request on-boarding by sending an onboard VNF package request message (e.g., an OnboardVnfPackageRequest) to the NFVO 630.
- the onboard VNF package request message can be provided over an interface at least somewhat similar to the Os-Ma-nfvo interface shown in FIG. 5.
- the message can include an information element (e.g., vnfPackagePath), which is the uniform resource location (URL) indicating where the VNF package can be obtained, to on-board the VNF package.
- vnfPackagePath is the uniform resource location (URL) indicating where the VNF package can be obtained, to on-board the VNF package.
- the VNF package can include information elements, such as a VNF package ID vnfPackageld, a VNF descriptor vnfd, information about VNF package artifacts that are software images (e.g., softwarelmage), an operational state of the on-boarded instance of the VNF package (e.g., operational State, which can include whether the on-boarded instance of the VNF package is enabled or disabled), and the usage state of the on-boarded instance of the VNF package (e.g., usageState, which can include whether the on-boarded instance of the VNF package is in use or not in use).
- Other information can also be included, such as product names, provider names, software versions, error checking parameters such as checksums, other user data, and information regarding other artifacts (e.g., information regarding VNF package artifacts that are not software images).
- the NFVO 630 can provide a notification of VNF package on-boarding in a notification message (e.g.,
- the onboarding notification can be provided over an interface at least somewhat similar to the Os-Ma-nfvo interface as shown in FIG. 5.
- the onboarding notification message can include an identifier of the VNF package that has been onboarded (e.g., vnfPackageld or vnfdld). Other information can be included in the notification.
- the notification can include information held by the NFVO 630 about the specific on-boarded VNF package.
- the VNF operational State should be in "enabled" state.
- the NM 620 can determine that creation of a new VNF is desired.
- the VNF to be created can be a MME, HLR, SGW, PGW, or PCRF, for example.
- the NM 620 can transmit a request to the EM 610 (of the DM) via an Itf-N reference point to create or instantiate a new VNF.
- the request can contain a descriptor retrieved from the VNF package obtained in operation 2.
- the request can include a vnfDescriptorld to identify the VNF descriptor.
- the EM 610 having received the request to instantiate the VNF, can provide, to VNFM 620, a request to create a VNF identifier, the request including a VNF descriptor identifier.
- the request can include a message (e.g., Create VnfRequest).
- the EM 610 can transmit this request to the VNFM 640 via a reference point such as the Ve-Vnfm- em interface shown in FIG. 5.
- the request can identify the VNF descriptor by including, for example, the vnfDescriptorld from operation 3 or other similar descriptor.
- a result of this operation can be the creation of a VNF instance identifier and an associated instance of an information element (e.g., Vnflnfo) identified by that identifier, in the NOT-INSTANTIATED state without instantiating the VNF or performing other lifecycle operations.
- the VNFM can create a VNF instance identifier to be used in subsequent lifecycle operations, including, for example instantiation operations.
- the method continues to operation 5.
- the EM 610 can receive a response to the request, the response including an instance identifier (e.g., vnflnstanceld) to indicate creation of an instance of a VNF information element.
- the response can be provided in an acknowledgement (e.g.,
- the EM 610 can provide a request to instantiate the VNF subsequent to receiving the response of operation 5.
- the request to instantiate the VNF can include the instance identifier (e.g., vnflnstanceld) and can be provided to the VNFM 640.
- the request can include a message such as Instantiate VnfRequest.
- the request can include other input parameters such as an identifier of the VNF deployment flavor (DF) to be instantiated (e.g., flavourld), and an identifier of the instantiate level of the DF to be instantiated (e.g., instantiationLevelld).
- Other parameters can include information about an external virtual link to connect the VNF to (e.g., extVirtualLink), information about external virtual links that are managed by other entities other than the VNFM 640 (e.g.,
- the request to instantiate the VNF can be provided using a Ve-Vnfm-em reference point
- the EM 610 can receive a response to the request to instantiate the VNF subsequent to providing the request of operation 6.
- the response can include a lifecycle operation occurrence identifier (e.g., lifecycleOperationOccurrenceld) of a VNF instance.
- the response of operation 7 can be received from the VNFM 640 and can include an Instantiate VnfResponse message or similar message.
- the VNFM 640 can send an indication of a change to the VNF lifecycle to the EM 610.
- This indication can include a VnfLifecycleChangeNotification message.
- VnfLifecycleChangeNotification message can include an identifier of the VNF instance affected (vnflnstanceld), the lifecycle operation expressed as a text string, an identifier of the VNF lifecycle operation occurrence associated to the notification (e.g., lifecycleOperationOccurrenceld), or other parameters.
- the EM 610 can notify the NM 620 of the result of VNF instantiation.
- This notification can include an identificator of the corresponding VNF instance (e.g., vnflnstanceld).
- embodiments can also provide operations for scaling procedures.
- VNF resources in terms of CPU core and memory can be hardcoded in image flavor settings, or VNF resources can be otherwise predetermined. Accordingly, V Fs can be provisioned for typical usage or maximum usage. When VNFs are provisioned for typical usage, service disruption can occur when loads exceed the provisioned capacity, and this can result in deteriorations in user experience. When VNFs are provisioned for maximum usage, however, resources can be wasted or underutilized during normal system load.
- Embodiments therefore provide for scaling after VNFs have been provisioned, created, instantiated, etc. to expand or contract a VNF instance.
- FIG. 7 illustrates a flow diagram of VNF scaling in accordance with some embodiments.
- the operations shown in FIG. 7 can be performed by the various elements shown in FIGS. 1-5.
- Various entities can request scaling.
- an NM 620 can provide scaling requests to trigger a scaling process.
- an NM can send a request to an EM 610 for scaling.
- the request can include an identifier (e.g., vnflnstanceld) of the VNF instance to be scaled.
- the EM 610 passes along this request to the VNFM 640 using, for example, a ScaleVnfRequest message.
- the request (e.g., a scale request, ScaleVnfRequest or ScaleVnfToLevelRequest) can include parameters such as an identifier (e.g., vnflnstanceld) of the VNF instance to which the scaling request is related.
- the request can include the type of the scale operation requested (e.g., scale out or scale in).
- the set of types support can vary in different embodiments.
- the request can include an identifier (e.g., aspectld) of the aspect of the VNF that is requested to be scaled.
- a VNF can be designed to provide static capacity such as database nodes and dynamic capacity such as query processing nodes.
- static capacity aspect could be scaled by adding database nodes
- dynamic capacity could be scaled by adding query processing nodes.
- the request can also include the number of scaling steps to be executed as part of a scaling operation. The number of steps will be a positive integer, and can have a default value (e.g., 1).
- a VNF provider can indicate or provide a predetermined indication of whether multiple steps at a time are supported.
- the request can include an identifier (e.g., instantiationLevelld) of the target instantiation level of the current DF to which the VNF is requested to be scaled.
- a parameter e.g., scalelnfo
- a VNF provider can indicate whether the VNF supports scaling to that level.
- the scalelnfo parameter, or the instantiationLevelld identifier can be provided, but both cannot be provided simultaneously.
- Other parameters e.g., parameters specific to the VNF being scaled
- These parameters or other parameters of a VNF provider can provide an indication of whether multiple steps at a time are supported.
- the VNFM 640 sends a response to operation 2.
- the response can include a message (e.g., a scale response or
- ScaleVnfResponse which can include the identifier of the VNF lifecycle operation occurrence (e.g., lifecycleOperationOccurrenceld).
- the VNFM 640 can send further notifications (e.g., a
- VnfLifecycleChangeNotification information element to indicate the result of VNF scaling, when the VNF scaling operation is completed.
- the VNF will have been scaled according to the request.
- appropriate error information can be provided in a result (e.g., the result provided in operation 5).
- the EM 610 can send a response to the NM 620.
- the response can include an attribute such as the identifier of the VNF instance (e.g., vnflnstanceld) and a status to indicate the result of the scaling.
- FIG. 8 illustrates a flow diagram of a VNF termination in accordance with some embodiments.
- the operations shown in FIG. 8 can be performed by the various elements shown in FIGS. 1-5. It is assumed that EM 610 has subscribed to receive the VNF lifecycle change notification from VNFM 640.
- the VNF instance identifier (e.g., vnflnstanceld) will be deleted after the VNF termination.
- a NM 620 can send a request to the EM 610 to terminate a VNF.
- the NM 620 can request this termination subsequent to determining that the VNF instance is not needed, for example.
- the VNF to be deleted can be a MME, HLR, SGW, PGW, or PCRF, for example.
- the NM 620 can transmit the request to the EM 610 via an Itf-N reference point.
- the request can contain a new attribute that indicates the type of the instantiation to be deleted, an identifie of the instance (e.g., vnflnstanceld) or other information.
- the EM 810 can send a termination request (e.g., Terminate VnfRequest) to VNFM 640.
- the termination request can include instance identification (e.g., vnflnstanceld) to terminate the respective VNF instance. Terminating the VNF instance may not delete the instance associated with vnflnstanceld in some embodiments.
- the VNFM 640 sends a response (e.g., a termination response, or Terminate VnfResponse) to the EM 610.
- the response can include an identifier of the VNF lifecycle operation occurrence (e.g., lifecy cl eOp erati onOccurrenceld) .
- the VNFM 640 can send a notification (e.g., a Notify message) to the EM 610.
- the notification message can include a lifecycle change notification (e.g., VnfLifecycleChangeNotification).
- the VNFM 640 can send a notification (e.g., a Notify message) to the EM 610.
- the notification message can include a lifecycle change notification (e.g., VnfLifecycleChangeNotification).
- the VNF instance has been terminated and resources used by the VNF have been released.
- appropriate error information is provided in the "result" Lifecycle Change Notification.
- the ME 610 sends a response to the NM 620.
- the response can include the instance identifier (e.g., vnflnstanceld) and a status to indicate the result of the VNF termination for the corresponding VNF instance.
- Example 1 a computer-readable storage medium that stores instructions for execution by one or more processors of an element manager (EM), the one or more processors to configure the EM to: provide, to a virtual network function (VNF) manager (VNFM), a request to create a VNF identifier, the request including a VNF descriptor identifier; receive a response to the request, the response including an instance identifier to indicate creation of an instance of a VNF information element; provide a request to instantiate the VNF subsequent to receiving the response, the request to instantiate the VNF including the instance identifier; and receive a response to the request to instantiate the VNF subsequent to providing the request, the response including a lifecycle operation occurrence identifier of a VNF instance.
- VNF virtual network function
- VNFM virtual network function manager
- Example 2 the subject matter of Example 1 can optionally include wherein the one or more processors further configure the EM to: provide the request to instantiate the VNF using a Ve-Vnfm-em reference point.
- Example 3 the subject matter of Example 1 can optionally include wherein the one or more processors further configure the EM to: provide a termination request to terminate the VNF instance subsequent to determining that the VNF instance is not needed, the termination request including the instance identifier; and receive, in response to the termination request, a termination response that includes the lifecycle operation occurrence identifier of the VNF instance, and an indication that VNF termination has started.
- Example 4 the subject matter of Example 1 can optionally include wherein the one or more processors configure the EM to: provide a scale request to expand or contract the VNF instance, the scale request including the instance identifier of the VNF instance to be scaled; and receive, in response to the scale request, a scale response that includes the lifecycle operation occurrence identifier of the VNF instance to be scaled, and an indication that VNF scaling has started.
- Example 5 the subject matter of Example 4 can optionally include wherein the scale request includes a level to which to scale the VNF instance.
- Example 6 the subject matter of Example 1 can optionally include wherein the request to instantiate the VNF further includes a flavor identifier (flavourld) to identify a deployment flavor of the VNF and an external virtual link (extVirtualLink) to which the VNF is to be connected to.
- a flavor identifier (flavourld) to identify a deployment flavor of the VNF
- an external virtual link (extVirtualLink) to which the VNF is to be connected to.
- Example 7 the subject matter of Example 1 can optionally include wherein the one or more processors configure the EM to: provide a result of VNF instantiation to a network manager (NM) subsequent to receiving the response to the request to instantiate the VNF.
- NM network manager
- Example 8 is an apparatus (for example a computer, communication device, or portion thereof, or an element of a virtualization network, or an element manager (EM)), the apparatus comprising: memory to store data; and processing circuitry to: provide, to a virtual network function (VNF) manager (VNFM), a request to create a VNF identifier, the request including a VNF descriptor identifier; receive a response to the request, the response including an instance identifier to indicate creation of an instance of a VNF information element; provide a request to instantiate the VNF subsequent to receiving the response, the request to instantiate the VNF including the instance identifier; and receive a response to the request to instantiate the VNF subsequent to providing the request, the response including a lifecycle operation occurrence identifier of the VNF.
- VNF virtual network function
- VNFM virtual network function manager
- Example 9 the subject matter of Example 8 can optionally include wherein the processing circuitry provides the request to instantiate the VNF using a Ve-Vnfm-em reference point.
- the processing circuitry is further configured to: provide a termination request to terminate the VNF instance subsequent to determining that the VNF instance is not needed, the termination request including the instance identifier; and receive, in response to the termination request, a termination response that includes the lifecycle operation occurrence identifier of the VNF instance, and an indication that VNF termination has started.
- Example 11 the subject matter of Example 8 can optionally include wherein the processing circuitry is further configured to: provide a scale request to expand or contract the VNF instance, the scale request including the instance identifier of the VNF instance to be scaled; and receive, in response to the scale request, a scale response that includes the lifecycle operation occurrence identifier of the VNF instance to be scaled, and an indication that VNF scaling has started.
- Example 12 the subject matter of Example 11 can optionally include wherein the scale request includes a level to which to scale the VNF instance.
- Example 13 the subject matter of Example 8 can optionally include wherein the processing circuitry is configured to: receive the VNF descriptor identifier within a request from a network manager (NM).
- NM network manager
- Example 14 the subject matter of Example 8 can optionally include wherein the request to instantiate the VNF further includes a flavor identifier (flavourld) to identify a deployment flavor of the VNF and an external virtual link (extVirtualLink) to which the VNF is to be connected to.
- a flavor identifier (flavourld) to identify a deployment flavor of the VNF
- an external virtual link (extVirtualLink) to which the VNF is to be connected to.
- Example 15 the subject matter of Example 8 can optionally include wherein the processing circuitry is configured to:
- NM network manager
- Example 16 the subject matter of Example 8 can optionally include an interface configured to communicate with one or more physical components external to the apparatus.
- Example 17 is an apparatus (e.g., a network manager (NM)) comprising: processing circuitry arranged to: provide, to a Network
- NFVO Function Virtualization orchestrator
- VNF virtual network function
- vnfPackagePath which is a uniform resource location (URL) indicating where the VNF can be obtained; and receive a response to the request, the response including an identifier of a VNF instance that has been onboarded.
- URL uniform resource location
- Example 18 the subject matter of Example 17 can optionally include wherein the processing circuitry is further configured to: provide the identifier of the VNF instance to an element manager (EM) within a request to instantiate the VNF; and receive a response to the request to instantiate the VNF, the response including a result of VNF instantiation.
- EM element manager
- Example 19 the subject matter of Example 18 can optionally include wherein the processing circuitry is further configured to provide, through an Itf-n interface to the EM, a request to terminate the VNF, the request to terminate including the identifier of the VNF instance.
- Example 20 is an apparatus for an element of a virtualization network or of a data center (e.g., an apparatus for a virtual network function (VNF) manager (VNFM)), the apparatus comprising: memory; and processing circuitry to: decode a request to create a VNF identifier, the request including a VNF descriptor identifier; provide a response to the request, the response including an instance identifier to indicate creation of an instance of a VNF information element; decode a request to instantiate the VNF subsequent to receiving the response, the request to instantiate the VNF including the instance identifier; and provide a response to the request to instantiate the VNF subsequent to providing the request, the response including a lifecycle operation occurrence identifier of a VNF instance.
- VNF virtual network function
- Example 21 the subject matter of Example 20 can optionally include wherein the processing circuitry is further configured to: decode a termination request to terminate the VNF instance, the termination request including the instance identifier; and provide, in response to the termination request, a termination response that includes the lifecycle operation occurrence identifier of the VNF instance, and an indication that VNF termination has started.
- Example 22 the subject matter of Example 20 can optionally include wherein the processing circuitry is further configured to: decode a scale request to expand or contract the VNF instance, the scale request including the identifier of the VNF instance to be scaled; and provide, in response to the scale request, a scale response that includes the lifecycle operation occurrence identifier of the VNF instance to be scaled, and an indication that VNF scaling has started.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
- Techniques For Improving Reliability Of Storages (AREA)
Abstract
Description
Claims
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US201662353976P | 2016-06-23 | 2016-06-23 | |
PCT/US2016/068973 WO2017222595A2 (en) | 2016-06-23 | 2016-12-28 | Device and method for nfv life cycle management |
Publications (2)
Publication Number | Publication Date |
---|---|
EP3476080A2 true EP3476080A2 (en) | 2019-05-01 |
EP3476080A4 EP3476080A4 (en) | 2019-11-13 |
Family
ID=60783305
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP16906493.8A Withdrawn EP3476080A4 (en) | 2016-06-23 | 2016-12-28 | Device and method for nfv life cycle management |
Country Status (3)
Country | Link |
---|---|
EP (1) | EP3476080A4 (en) |
CN (1) | CN109314649A (en) |
WO (1) | WO2017222595A2 (en) |
Families Citing this family (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11418386B2 (en) | 2018-03-06 | 2022-08-16 | At&T Intellectual Property I, L.P. | Virtual network function creation system |
WO2019174000A1 (en) * | 2018-03-15 | 2019-09-19 | 华为技术有限公司 | Method and apparatus for service management |
US10608907B2 (en) | 2018-05-11 | 2020-03-31 | At&T Intellectual Property I, L.P. | Open-loop control assistant to guide human-machine interaction |
US11533777B2 (en) | 2018-06-29 | 2022-12-20 | At&T Intellectual Property I, L.P. | Cell site architecture that supports 5G and legacy protocols |
US10728826B2 (en) | 2018-07-02 | 2020-07-28 | At&T Intellectual Property I, L.P. | Cell site routing based on latency |
CN109714239B (en) * | 2018-12-27 | 2021-04-27 | 新华三技术有限公司 | Management message issuing method, VNFM (virtual network management frequency) equipment and server |
CN111628921B (en) * | 2019-02-27 | 2021-07-20 | 华为技术有限公司 | Message processing method, message forwarding device and message processing device |
CN116686264A (en) * | 2020-12-30 | 2023-09-01 | 华为技术有限公司 | Elastic expansion method and device |
Family Cites Families (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8464250B1 (en) * | 2004-09-23 | 2013-06-11 | Transcontinental Events, Llc | System and method for on-demand cloning of virtual machines |
US7877485B2 (en) * | 2005-12-02 | 2011-01-25 | International Business Machines Corporation | Maintaining session states within virtual machine environments |
EP2224858B1 (en) | 2007-10-25 | 2016-10-26 | Smith & Nephew, Inc. | Anchor assembly |
US9363182B2 (en) * | 2011-01-20 | 2016-06-07 | Nec Corporation | Communication system, control device, policy management device, communication method, and program |
US9838265B2 (en) * | 2013-12-19 | 2017-12-05 | Amdocs Software Systems Limited | System, method, and computer program for inter-module communication in a network based on network function virtualization (NFV) |
KR101954314B1 (en) * | 2014-01-17 | 2019-03-05 | 노키아 솔루션스 앤드 네트웍스 게엠베하 운트 코. 카게 | Controlling of communication network comprising virtualized network functions |
CN104811328B (en) * | 2014-01-27 | 2018-08-10 | 新华三技术有限公司 | virtual network resource management method and device |
CN105103125B (en) * | 2014-02-10 | 2017-12-05 | 华为技术有限公司 | The acquisition methods and NFV devices of clock interrupt signal |
CN104219127B (en) * | 2014-08-30 | 2018-06-26 | 华为技术有限公司 | A kind of creation method and equipment of virtual network example |
KR102398401B1 (en) * | 2014-09-25 | 2022-05-13 | 애플 인크. | Network functions virtualization |
CN105577381B (en) * | 2014-10-24 | 2020-03-31 | 中兴通讯股份有限公司 | Certificate management method and device under virtualization |
CN105634782B (en) * | 2014-11-06 | 2019-03-01 | 华为技术有限公司 | A kind of method and network element management device instantiating VNF |
US11327787B2 (en) * | 2016-08-17 | 2022-05-10 | Apple Inc. | Using a managed object operation to control a lifecycle management operation |
-
2016
- 2016-12-28 EP EP16906493.8A patent/EP3476080A4/en not_active Withdrawn
- 2016-12-28 CN CN201680086927.9A patent/CN109314649A/en active Pending
- 2016-12-28 WO PCT/US2016/068973 patent/WO2017222595A2/en unknown
Also Published As
Publication number | Publication date |
---|---|
EP3476080A4 (en) | 2019-11-13 |
CN109314649A (en) | 2019-02-05 |
WO2017222595A2 (en) | 2017-12-28 |
WO2017222595A3 (en) | 2018-02-22 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10965564B2 (en) | Devices and methods of using network function virtualization and virtualized resources performance data to improve performance | |
US20240007902A1 (en) | Mobile-terminated packet transmission | |
US10892957B2 (en) | Managing physical network function instances in a network service instance | |
CN110637477B (en) | System, method and apparatus for legacy system fallback in a cellular communication system | |
EP3482602B1 (en) | Systems, methods and devices for control-user plane separation for 5g radio access networks | |
US10924943B2 (en) | Instantiation and management of physical and virtualized network functions of a radio access network node | |
US11122453B2 (en) | Systems, methods and devices for measurement configuration by a secondary node in EN-DC | |
EP3476080A2 (en) | Device and method for nfv life cycle management | |
US20200110627A1 (en) | Centralized unit and distributed unit connection in a virtualized radio access network | |
US20220330035A1 (en) | Management of GNB in Network Functions Virtualization Framework | |
WO2018031057A1 (en) | Device and method for managing virtualized ran | |
US20210360729A1 (en) | Devices for per-cc measurement gap configuration | |
US20240080653A1 (en) | Devices and Methods for UE-Specific RAN-CN Associations | |
EP3437254B1 (en) | Device and method for nfv life cycle management using configuration management functions | |
EP3453131B1 (en) | User equipment (ue) and methods for reception of packets on a split radio bearer | |
US10862599B2 (en) | Systems and methods for applying 4Rx capable UE tests to an 8Rx capable UE | |
WO2017196388A1 (en) | Mamp and lwip enhancements for concatenation and segmentation | |
WO2017096531A1 (en) | Software defined network switch and evolved node-b (enb) for multiple bearer connectivity |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE INTERNATIONAL PUBLICATION HAS BEEN MADE |
|
PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: REQUEST FOR EXAMINATION WAS MADE |
|
17P | Request for examination filed |
Effective date: 20181121 |
|
AK | Designated contracting states |
Kind code of ref document: A2 Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR |
|
AX | Request for extension of the european patent |
Extension state: BA ME |
|
DAV | Request for validation of the european patent (deleted) | ||
DAX | Request for extension of the european patent (deleted) | ||
A4 | Supplementary search report drawn up and despatched |
Effective date: 20191011 |
|
RIC1 | Information provided on ipc code assigned before grant |
Ipc: H04L 12/24 20060101AFI20191007BHEP |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: EXAMINATION IS IN PROGRESS |
|
17Q | First examination report despatched |
Effective date: 20200825 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: EXAMINATION IS IN PROGRESS |
|
RAP1 | Party data changed (applicant data changed or rights of an application transferred) |
Owner name: APPLE INC. |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: EXAMINATION IS IN PROGRESS |
|
REG | Reference to a national code |
Ref country code: DE Ref legal event code: R079 Free format text: PREVIOUS MAIN CLASS: H04L0012240000 Ipc: H04L0041504100 |
|
GRAP | Despatch of communication of intention to grant a patent |
Free format text: ORIGINAL CODE: EPIDOSNIGR1 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: GRANT OF PATENT IS INTENDED |
|
RIC1 | Information provided on ipc code assigned before grant |
Ipc: H04L 41/40 20220101ALN20220927BHEP Ipc: H04L 41/122 20220101ALN20220927BHEP Ipc: H04L 41/0896 20220101ALN20220927BHEP Ipc: H04L 41/5041 20220101AFI20220927BHEP |
|
INTG | Intention to grant announced |
Effective date: 20221011 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE APPLICATION IS DEEMED TO BE WITHDRAWN |
|
18D | Application deemed to be withdrawn |
Effective date: 20230222 |