GB2577526A - Network slice management - Google Patents

Network slice management Download PDF

Info

Publication number
GB2577526A
GB2577526A GB1815774.3A GB201815774A GB2577526A GB 2577526 A GB2577526 A GB 2577526A GB 201815774 A GB201815774 A GB 201815774A GB 2577526 A GB2577526 A GB 2577526A
Authority
GB
United Kingdom
Prior art keywords
network
network slice
slice
communication
network communication
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
GB1815774.3A
Other versions
GB2577526B (en
GB201815774D0 (en
Inventor
Corston-Petrie Andrew
Brown Ruth
Hart Jonathan
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
British Telecommunications PLC
Original Assignee
British Telecommunications PLC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by British Telecommunications PLC filed Critical British Telecommunications PLC
Priority to GB1815774.3A priority Critical patent/GB2577526B/en
Publication of GB201815774D0 publication Critical patent/GB201815774D0/en
Publication of GB2577526A publication Critical patent/GB2577526A/en
Application granted granted Critical
Publication of GB2577526B publication Critical patent/GB2577526B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/60Scheduling or organising the servicing of application requests, e.g. requests for application data transmissions using the analysis and optimisation of the required network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0803Configuration setting
    • H04L41/0813Configuration setting characterised by the conditions triggering a change of settings
    • H04L41/0816Configuration setting characterised by the conditions triggering a change of settings the condition being an adaptation, e.g. in response to network events
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0896Bandwidth or capacity management, i.e. automatically increasing or decreasing capacities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0896Bandwidth or capacity management, i.e. automatically increasing or decreasing capacities
    • H04L41/0897Bandwidth or capacity management, i.e. automatically increasing or decreasing capacities by horizontal or vertical scaling of resources, or by migrating entities, e.g. virtual resources or entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/40Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks using virtualisation of network functions or resources, e.g. SDN or NFV entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/50Network service management, e.g. ensuring proper service fulfilment according to agreements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/08Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/20Arrangements for monitoring or testing data switching networks the monitoring system or the monitored elements being virtualised, abstracted or software-defined entities, e.g. SDN or NFV
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/60Scheduling or organising the servicing of application requests, e.g. requests for application data transmissions using the analysis and optimisation of the required network resources
    • H04L67/63Routing a service request depending on the request content or context
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W28/00Network traffic management; Network resource management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W28/00Network traffic management; Network resource management
    • H04W28/16Central resource management; Negotiation of resources or communication parameters, e.g. negotiating bandwidth or QoS [Quality of Service]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/50Service provisioning or reconfiguring
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/18Selecting a network or a communication service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/50Network service management, e.g. ensuring proper service fulfilment according to agreements
    • H04L41/5003Managing SLA; Interaction between SLA and QoS
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/16Threshold monitoring
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/70Services for machine-to-machine communication [M2M] or machine type communication [MTC]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/90Services for handling of emergency or hazardous situations, e.g. earthquake and tsunami warning systems [ETWS]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Environmental & Geological Engineering (AREA)
  • Quality & Reliability (AREA)
  • Computer Security & Cryptography (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

Managing traffic amongst network slices of a telecommunications network. A user equipment UE is allocated to a first network slice 310. Network communications form the UE are processed, the suitability of the first network slice to process communications are monitored. A second network slice suitable for processing network communications is identified. In response to identifying a lack of suitability of the first network slice to process communications 330, communications are redirected to the second network slice whilst the UE remains allocated to the first network slice 360. Network communications may be redirected to the second network slice before being received by the first network slice. Suitability of the first network slice to process network communications may be based on processing resources, concurrent users being over a threshold or identification of an ongoing or future reconfiguration. The first network slice may be continuously monitored after redirection of communications to a second network slice, and redirection of communications may cease if the first network slice becomes suitable for processing network communications. Suitability of the second network slice may comprise measuring network performance of the second slice and assessing whether network performance passes a threshold.

Description

Network Slice Management
Field of Invention
The present invention relates to a method of, and to a telecommunications network for, managing network traffic, and in particular to managing traffic amongst network slices of the telecommunications network.
Background
Network slicing is a method of virtualising a network so as to create multiple logical networks within a single physical network. This is typically undertaken to offer differentiated service models, which might include varying performance and/or stability characteristics within a network, and it is supported by the fact that network slices are isolated from one another other during operation. As a result, high traffic or a large number of users on one slice is unable negatively to affect other network slices.
For example, network slices may be configured to provide specialised functions, including: exclusively serving emergency services (which demands, at least, reliability); enhanced Mobile Broadband (eMBB); and Massive Machine Type Communications (MMTC).
A network will adapt network slices to suit network conditions and to optimise utilisation of individual network slices. To ensure constant availability of resources as network slices' resources are consumed, scaling occurs. If a network slice reaches a threshold utilisation the creation of additional slice resources may be triggered so as to cope with high network loads; this is typically achieved by 'scaling up' or by 'scaling out' a network slice.
The allocation of new processing resources to a network slice (via scaling) can take a matter of minutes, and typically around 2 to 10 minutes. However, during such scaling new users may be prevented from joining the slice or potential network congestion may be experienced by users.
It is an aim of the present invention at least to alleviate some of the aforementioned problems.
Statements of Invention
According to a first aspect of the present invention, there is provided a method of managing network traffic in a telecommunications network, the telecommunications network having a plurality of network slices and a User Equipment (UE), wherein the UE is -optionally, initially -allocated to a first network slice for processing a network communication from the UE, the method comprising the steps of: monitoring a suitability of the first network slice to process the network communication; identifying a second network slice that is suitable for processing the network communication; and in response to identifying a lack of suitability of the first network slice to process the network communication, redirecting the network communication to the second network slice whilst the UE remains allocated to (or registered with) the first network slice.
Optionally, the telecommunications network has a plurality of UEs.
As used herein, the term "is suitable" in reference to identifying the second network slice for processing the network communication, preferably connotes a network slice that is currently suitable or is expected to become suitable.
As used herein, the term "allocated" with reference to the allocation of the UE to the first network slice, preferably connotes: the identification or selection of the first network slice as a suitable network slice with which to register the UE, but where the UE has not yet -but is to be -registered with the first network slice; where the UE is registering with the first network slice; and/or where the UE is already registered with the first network slice.
Optionally, the network communication is: a data packet; a part thereof; a plurality of data packets; and/or a data session. The network communication may be an attach request or may follow an attach request.
Preferably, the network communication is redirected to the second network slice before being received by the first network slice, and more preferably, before any part of the network communication is received and/or processed by the first network slice or before all of the network communication is received and/or processed by the first network slice.
Preferably, the method further comprises the steps of identifying the second network slice in response to identifying a lack of suitability of the first network slice.
Preferably, the first (and/or second) network slice is suitable to process the network communication if the first (and/or second) network slice has, or will have, sufficient excess available processing resources to process the network communication. The method may therefore further comprise the step of determining the processing resources available on the first and/or second network slice/s.
Preferably, the first (and/or second) network slice is suitable to process the network communication if the first (and/or second) network slice has, or will have, a number of concurrent users that is below a threshold. The method may therefore further comprise the step of determining the number of concurrent users on the first and/or second network slice/s.
Preferably, the first (and/or second) network slice is suitable to process the network communication if the first (and/or second) network slice has a network performance that is, or will be, beyond (or above) a threshold. The method may therefore further comprise the step of determining the network performance of the first and/or second network slice/s. The network performance may be determined by measuring: latency, jitter, bandwidth, packet error rate and/or Round-Trip Time (RTT). The network performance threshold may be dependent on the type of network communication.
Preferably, the first (and/or second) network slice is suitable to process the network communication if an absence of any ongoing and/or future reconfiguration associated with the first (and/or second) network slice is identified. The method may therefore further comprise the step of identifying ongoing and/or (scheduled) future reconfiguration of the first and/or second network slice/s. Optionally, the reconfiguration is a: re-starting; scaling (up, down and/or out); closing; and/or opening of the first network slice.
Optionally, identifying the first (and/or second) network slice as being unsuitable to process the network communication triggers the first network slice to reconfigure.
Preferably, identifying the second network slice is performed in response to identifying the first network slice as being unsuitable.
Preferably, the network communication would cause, if processed by the first network slice, or does cause, the first network slice to become unsuitable for processing the network communication. Optionally, the registration of the UE to the first network slice would cause the first network slice to become unsuitable for processing the network communication. In which case, the network communication may cause re-configuration of the first network slice.
Preferably, the method further comprises the steps of: continuing to monitor the suitability of the first network slice to process the network communication after redirecting the network communication to the second network slice; and in response to identifying that the first network slice is suitable to process the network communication, ceasing to redirect the network communication to the second network slice (thereby to allow the first network slice to process the network communication).
Preferably, the second network slice has substantially the same configuration and/or network performance as the first network slice, when the first network slice is suitable for processing the network communication. The second network slice may therefore be configured for the same purpose as the first network slice, wherein the purposes may be a specialised function, such as eMBB, emergency services communications, Ultra Reliable, Low Latency Communications (URLLCs), etc. Optionally, the second network slice is a network slice that has the closest matching configuration and/or network performance to that of the first network slice. Optionally, the second network slice is identified in dependence on the amount of excess processing resources available and similarity of configuration to the first network slice.
Preferably, the second network slice is configured to process the network communication in a manner that is no worse than the first network slice, when the first network slice is suitable for processing the network communication. More preferably, this is when: network efficiency (cost, or other resource); network performance; Quality of Service; and/or Quality of Experience associated with processing the network communication are no worse.
Optionally, the first network slice is a network slice that is most preferred by the telecommunications network for processing the network communication, when the first network slice is suitable for handling said network communication. Optionally, the first network slice is a network slice that is preferred over the second network slice by the telecommunications network for processing the network communication, when the first network slice is suitable for handling said network communication. Preference of a network slice by the network may be dependent on: network efficiency (cost, or other resource); network performance metrics; Quality of Service; and/or Quality of Experience.
Preferably, identifying the second network slice further comprises the steps of: measuring network performance of the second network slice; and assessing whether the network performance surpasses a threshold. Alternatively, the second network slice may be preselected.
A single given network slice of the telecommunications network may be (simultaneously or sequentially) the first network slice in a first iteration of the method and the second network slice in a second iteration of the method. A network communication may therefore be redirected to a single network slice from another network slice and, simultaneously, another network communication may be redirected from said single network slice to yet another network slice.
Optionally, redirecting the network communication to the second network slice is implemented in a core of the telecommunications network, and more preferably, only in the core. Preferably, the network communication has yet to be received by a core of the telecommunications network.
The telecommunications network may be a mobile cellular network and/or a fixed-line network.
According to another aspect of the invention, there is provided a telecommunications network for managing network traffic, the telecommunications network comprising: a first network slice and a second network slice (provided, for example, by a processor), and the UE being -optionally, initially -allocated to the first network slice for processing a network communication from the UE; a processor for monitoring a suitability of the first network slice to process the network communication and for identifying a second network slice that is suitable for processing the network communication; and a controller for redirecting the network communication to the second network slice, whilst the UE remains allocated to (or registered with) the first network slice, in response to identifying a lack of suitability of the first network slice to process the network communication. Optionally, the processor and the controller are arranged in a core of the telecommunications network.
According to yet another aspect of the invention, there is provided a computer-readable storage medium comprising instructions that, when executed by a processor associated with a telecommunications network, causes the telecommunication network to perform the aforesaid method.
The invention extends to any novel aspects or features described and/or illustrated herein. The invention extends to methods and/or apparatus substantially as herein described and/or as illustrated with reference to the accompanying drawings. The invention also provides a computer program and a computer program product for carrying out any of the methods described herein and/or for embodying any of the apparatus features described herein, and a computer readable medium having stored thereon a program for carrying out any of the methods described herein and/or for embodying any of the apparatus features described herein.
The invention also provides a signal embodying a computer program for carrying out any of the methods described herein and/or for embodying any of the apparatus features described herein, a method of transmitting such a signal, and a computer product having an operating system which supports a computer program for carrying out any of the methods described herein and/or for embodying any of the apparatus features described herein.
Any apparatus feature as described herein may also be provided as a method feature, and vice versa. As used herein, means plus function features may be expressed alternatively in terms of their corresponding structure, such as a suitably programmed processor and associated memory.
Any feature in one aspect of the invention may be applied to other aspects of the invention, in any appropriate combination. In particular, method aspects may be applied to apparatus aspects, and vice versa. Furthermore, any, some and/or all features in one aspect can be applied to any, some and/or all features in any other aspect, in any appropriate combination. It should also be appreciated that particular combinations of the various features described and defined in any aspects of the invention can be implemented and/or supplied and/or used independently.
In this specification the word 'or' can be interpreted in the exclusive or inclusive sense unless stated otherwise.
Furthermore, features implemented in hardware may generally be implemented in software, and vice versa. Any reference to software and hardware features herein should be construed accordingly.
The invention extends to a method of managing network traffic and a telecommunications network as described herein and/or substantially as illustrated with reference to the accompanying drawings. The present invention is now described, purely by way of example, with reference to the accompanying diagrammatic drawings, in which: Figure 1 shows a schematic diagram of an exemplary telecommunications network; Figure 2 shows a portion of the network; and Figures 3, 4 and 5 outline processes for managing network slices within the network.
Specific Description
Figure 1 is a schematic diagram of an exemplary telecommunications network 100.
The network 100 is shown as a mobile cellular network comprising User Equipment (UE) 110 (e.g. in the form of a mobile cellular device, laptop or tablet) that is configured to utilise the telecommunications network 100 by accessing a Radio Access Network (RAN) 115, as provided by RAN access points 120 (e.g. in the form of a macro-, micro-, pico-or femto-cell site). In turn, the RAN access points 120 are connected to a core network 125.
The network 100 operates in accordance with, for example, 5G technology. Accordingly, in this example, the core network 125 comprises the following functional components: * Network Slice Selection Function (NSSF) 130; * AUthentication Server Function (AUSF) 135; * Unified Data Management (UDM) 140; * Access and mobility Management Function (AMF) 145; * Session Management Function (SMF) 150; * Policy Control function (PCF) 155; * Application Function (AF) 160; * User Plane Function (UPF) 165; and * Data Network (DN) 175.
By means of the aforementioned functional components of the core network 125, the network 100 provides and manages a plurality of network slices. In particular, the NSSF 130 is configured to identify and to select a suitable network slice for the UE 110, and then to communicate that selection in order to help ensure that the UE is registered with the selected network slice.
The aforementioned functional components are configured to redirect network traffic internally amongst network slices when a given network slice is temporarily unsuitable for processing a given network communication.
In more detail, Figure 2 illustrates the components of the core network 125 that are responsible for redirecting network traffic amongst network slices.
Within the network core 125, there is provided a Network Slice Manager (NSM) 210-1, which is in communication with the User Plane Function (UPF) 165 for network slices 220. The NSM triggers reconfiguration of the network slices 220, and in particular triggers redirection of network communications amongst the network slices 220. A network slice orchestrator (not shown) effects the (re-)configuration (e.g. triggered by the NSM) of the network slices 220 so as to manage the processing resources of the network slices, and therefore to fulfil the demands of services utilising the network slices.
As part of the NSM 210-1, an Assurance Function (AsFn) 210-2 is provided that ascertains the performance of network slices 220; that is, whether individual network slices are operating and are performing sufficiently. For example, the AsFn measures: processing unit consumption; number of concurrent users; and/or performance metrics (including, for example, latency, bandwidth, jitter, error rate and/or round-trip delay time).
In the normal course of operation of the network, the UE is allocated to, and registered with, a primary network slice 220-1. The primary network slice 220-1 is the most preferred network slice, when performing as required, for processing network communications from a given UE, and it is selected, not least, in dependence on: a prescribed selection; the type of UE; the type of network communication from the UE; time; and/or the service agreement between the mobile network operator of the core network 125 and the UE.
The NSM 210-1 receives from -and/or retrieves from a database 230 populated by -the AsFn 210-2 data regarding the operation and performance of the primary network slice 220-1. If the primary network slice 220-1 is not suitable for processing a network communication from the UE, then network traffic from the UE is redirected to an alternative -partner -network slice 220-2; this occurs whilst the UE is registering with the primary network slice 220-1 and/or whilst the UE remains registered with the primary network slice 220-1.
Figure 3, outlines in more detail a process 300 by which a network communication is redirected to a partner slice. In a first step 310, a network communication from the UE 110 is received by the network 100. The network communication is, for example, an attach request for attaching to the network. Once the (or part of the) network communication has been received by the network, the NSSF 130 identifies a primary network slice onto which to allocate the UE. Registration of the UE with the primary network slice is subsequently triggered, and registration follows 320.
At a given moment, the identified primary network slice 220-1 may not be suitable for processing a network communication from the UE. This may be for a variety of reasons, including: an existing processing capacity breach; an insufficiency of excess available processing resources to process the network communication; downtime in the network slice; scaling (out, up and/or down) of the primary network slice in order to increase processing resources of the network slice; creation or restarting of the primary network slice without it yet fully operating; removal of the primary network slice; and/or other reconfiguring of the primary network slice. Accordingly, a determination 330 is made whether the primary network slice is (or will be within an acceptable period of time, for example by the time that the UE is registered) suitable for processing the network communication from the UE 110; this is determined by the AsFn.
If it is ascertained that the primary network slice 220-1 is not operating or performing sufficiently (e.g. because it is scaling), this is communicated to the NSM 210-1 (e.g. from the AsFn, or by having the NSM access the database 230), which in step 340 triggers the NSSF to identify the partner network slice 220-2.
Once identified, and its suitability (current or expected) to handle the network communication from the UE 110 has been confirmed by the AsFn 210-2, the NSSF communicates the identity of the partner network slice to the NSM, which subsequently instructs the UPF 165 internally to redirect the network communication associated with the UE 110 from the primary network slice to the partner network slice 350.
In effect, the NSM thereby prevents the primary network slice 220-1 from having to process the network communication, and the partner network slice lends its processing resources to assist the primary network slice. As a result, the primary network slice is protected (for example, if it is overloaded and/or scaling) and prevents or helps reduce network congestion as experienced by the UE 100 and/or by existing UEs already registered with the primary network slice 220-1.
After the network communication has been redirected to the partner network slice, the process then reiterates to evaluate anew whether the primary network slice is now (or now will be) suitable for processing the (ongoing) network communication 330. If so, then the NSM abolishes the redirection of the network communication and instead routes -as in the normal course of events -the network communication through the primary network slice 360.
It will be appreciated that the partner network slice is available to change with each loop of the process 300, since a previously-identified partner network slice may no longer be suitable to process a subsequent network communication. Accordingly, a primary network slice may become a partner network slice, and vice versa, over different iterations of process 300.
Figure 4 is a diagram illustrating signalling between the UE and the components of the network so as to perform the process 300 as show in, and as described with reference to, Figure 3.
In a first signalling process 410, the UE 100 sends a network communication to the network 100 via the RAN 120. The AMF 145 receives and processes the network communication in order to establish a connection with the UE; this is performed, for example as outlined in the 3rd Generation Partnership Project (3GGP) Technical Specification 23.502, version 15.2.0, section 4.3.2.2, the contents of which are hereby incorporated by reference.
Once the UE has registered with the network 100, and a Protocol Data Unit (PDU) session is established, the NSSF identifies the primary network slice, onto which the UE is registered. Where it is established (by the AsFn 210-2) that the primary network slice is not suitable for handling network communications from the UE, the NSM triggers the NSSF to identify the partner network slice and subsequently triggers the UPF 150 to redirect the network communication from the primary network slice to the partner network slice 420 (having been identified by the NSSF).
Once the AsFn identifies that the primary network slice is suitable for handling the network communication, the NSM triggers the UPF to cease the redirection so as to route the network communication, as normal, through the primary network slice 430.
Advantageously, and as best shown in Figure 4, the process of redirecting network communications amongst network slices is transparent to the UE; that is, the UE remains attached to the primary network slice, and so the process requires no further signalling with the UE, thereby reducing signalling overhead within the network (not least, network slice admission control signals between the RAN and the UE).
The effect of the redirection is to loan processing resources from one network slice to another; this can alternatively be achieved by directly reallocating processing resources between network slices (for example, as outlined in a co-pending patent application filed by this same applicant under Applicant's reference A33738, the contents of which are hereby incorporated by reference). However, redirection of a network communication is less complex to establish -and to revert from -than actual reallocation of processing resources between network slices. In addition, the effective loaning of processing resources by redirecting a network communication as outlined above is more resource-efficient than actual reallocation of processing resources amongst network slices, since only functional resources are 'loaned'; that is, only a UPF is 'loaned' rather than an entire network slice.
Figure 5 shows, in more detail, a process 500 by which the network communication from the UE is redirected to the partner network slice when the primary network slice is unsuitable because it is scaling.
In a first step, slice scaling (up, down or out) of the primary network slice is identified (responsively or anticipatorily) 510. The network 100 then queries whether the UE is already connected to the primary network slice 515. If so, the UE is allowed to remain on the primary network slice (in order to help reduce disruption to the scaling primary network slice), the network further queries whether the UE is active and responsive 525. If not, and the UE is a new UE, it is registered with an alternative network slice (which may be the partner network slice, for example as outlined in a co-pending patent application filed by this same applicant under Applicant's reference A33733, the contents of which are hereby incorporated by reference).
If the UE is already connected to the primary network slice, but if the UE is not active and responsive, for network efficiency, the UE is ignored 530, and query 525 is repeated to identify whether the UE subsequently becomes active (e.g. by using a UPF resource).
If the UE is active and responsive, the NSSF identifies a suitable partner network slice for the UE 535, and the NSM instructs the UPF internally to redirect the network communication of the UE to the identified partner network slice 540, and the redirection is subsequently established 545.
Steps 510 to 545 all occur whilst the primary network slice has been triggered to scale and/or is currently scaling. Once the primary network slice has scaled 550 (and/or the level of utilisation of the network slice decreases as a proportion of its total capacity), the network queries whether the primary network slice is suitable for handling the UE (as performed by the AsFn) 555. If not, the redirection remains until the UE is disconnected or de-registers 565 (or the UE is re-registered with an alternative network slice. If so, the NSM is informed of the suitability of the primary network slice (by the AsFn, and optionally the NSSF) and therefore triggers the UPF to terminate the redirection 565.
When identifying a partner network slice, the NSSF identifies a network slice that is a most appropriate alternative to the primary network slice; that is, a network slice having the same -or a substantially similar -configuration and performance, including in relation to: latency; jitter; bandwidth; availability of processing resources; Quality of Service; Service Level Agreement; type/specialisation of network slice (e.g. Ultra-Reliable Low-Latency Communications, Mobile Broadband and enhanced, and Massive Machine Type Communications); and services available on a given network slice (e.g. Voice-over-WiFiRTM calling).
In order to maintain a minimum standard of service, rules governing the selection of the partner network slice are utilised, including restrictions that the partner network slice performs no worse than the primary network slice (when it is deemed to be operating as required, for example by the AsFn).
Alternative and modifications The network 100 shown in, and described with reference to, Figure 1, is a mobile cellular network. However, it will be appreciated that the aforementioned is available to be implemented as part of any network that utilises network slicing, and more generally as part of any network utilising virtualisation to segregate network resources, including fixed line, local area, and wide area networks. In such examples, the process of managing network resources as described above is performed by functional components of such networks that are analogous to those of the network 100.
In one alternative, the UPF 165 associated with the network slices 220 alerts the NSM 210-1 and/or the AsFn 210-2 when the first network slice is no longer suitable.
The identification of the partner network slice is available to be conducted at any stage in the processes described above, in particular: prior to the UE registering with the primary network slice; after the UE registers with the primary network slice; and/or once the primary network slice is deemed unsuitable for processing the network communication.
In one example, the partner network slice is identified for a specific primary network slice (and therefore applies to all UEs that would register with a given primary network slice). In another example, the partner network slice is identified for a specific UE (that is, on a 'per-UE' basis).
It will be appreciated that abolishing the redirection of the network communication to the primary network slice from the partner network slice is optional, and in certain circumstances it may be preferable to retain redirection, not least to reduce the processing overhead of implementing a further redirection.
Each feature disclosed in the description, and (where appropriate) the claims and drawings may be provided independently or in any appropriate combination.
Reference numerals appearing in the claims are by way of illustration only and shall have no limiting effect on the scope of the claims.

Claims (23)

  1. CLAIMS1. A method of managing network traffic in a telecommunications network, the telecommunications network having a plurality of network slices and a User Equipment (UE), wherein the UE is allocated to a first network slice for processing a network communication from the UE, the method comprising the steps of: monitoring a suitability of the first network slice to process the network communication; identifying a second network slice that is suitable for processing the network communication; and in response to identifying a lack of suitability of the first network slice to process the network communication, redirecting the network communication to the second network slice whilst the UE remains allocated to the first network slice.
  2. 2. A method according to Claim 1, wherein the network communication is redirected to the second network slice before being received by the first network slice.
  3. 3. A method according to Claim 1 or 2, further comprising the steps of identifying the second network slice in response to identifying a lack of suitability of the first network slice.
  4. 4. A method according to any preceding claim, wherein the first network slice is suitable to process the network communication if it has, or will have, sufficient excess available processing resources to process the network communication.
  5. 5. A method according to any preceding claim, wherein the first network slice is suitable to process the network communication if the first network slice has, or will have, a number of concurrent users that is below a threshold.
  6. 6. A method according to any preceding claim, wherein the first network slice is suitable to process the network communication if the network performance of the first network slice is, or will be, beyond a threshold.
  7. 7. A method according to any preceding claim, wherein the first network slice is suitable to process the network communication if an absence of any ongoing and/or future reconfiguration of the first network slice is identified.
  8. 8. A method according to Claim 7, wherein the reconfiguration is a: re-starting; scaling; closing; and/or opening of the first network slice.
  9. 9. A method according to any preceding claim, wherein identifying a lack of suitability of the first network to process the network communication triggers the first network slice to reconfigure.
  10. 10. A method according to any preceding claim, further comprising the steps of identifying the second network slice in response to identifying a lack of suitability of the first network to process the network communication.
  11. 11. A method according to any preceding claim, wherein the network communication would cause, if processed by the first network slice, or does cause, the first network slice to become unsuitable for processing the network communication.
  12. 12. A method according to any preceding claim, further comprising the steps of: continuing to monitor the suitability of the first network slice to process the network communication after redirecting the network communication to the second network slice; and in response to identifying that the first network slice is suitable to process the network communication, ceasing to redirect the network communication to the second network slice.
  13. 13. A method according to any preceding claim, wherein the second network slice has substantially the same configuration as the first network slice, when the first network slice is suitable for processing the network communication.
  14. 14. A method according to any preceding claim, wherein the network performance of the second network slice is no worse than the network performance of the first network slice, when the first network slice is suitable for processing the network communication.
  15. 15. A method according to any preceding claim, wherein the first network slice is a network slice that is preferred by the telecommunications network over the second network slice for processing the network communication, when the first network slice is suitable for handling the network communication.
  16. 16. A method according to any preceding claim, wherein identifying the second network slice further comprises the steps of: measuring network performance of the second network slice; and assessing whether the network performance surpasses a threshold.
  17. 17. A method according to any preceding claim, wherein a single given network slice of the telecommunications network is, in a first iteration of the method, the first network slice and, in a second iteration of the method, is the second network slice.
  18. 18. A method according to any preceding claim, wherein redirecting the network communication to the second network slice is implemented in a core of the telecommunications network.
  19. 19. A method according to any preceding claim, wherein the telecommunications network is a mobile cellular network.
  20. 20. A method according to any preceding claim, wherein the telecommunications network is a fixed-line network.
  21. 21. A telecommunications network for managing network traffic, the telecommunications network comprising: a first network slice and a second network slice, and the UE being allocated to the first network slice for processing a network communication from the UE; a processor for monitoring a suitability of the first network slice to process the network communication and for identifying a second network slice that is suitable for processing the network communication; and a controller for redirecting the network communication to the second network slice, whilst the UE remains allocated to the first network slice, in response to identifying a lack of suitability of the first network slice to process the network communication.
  22. 22. A telecommunications network according to Claim 21, wherein the processor and the controller are arranged in a core of the telecommunications network.
  23. 23. A computer-readable storage medium comprising instructions that, when executed by a processor associated with a telecommunications network, causes the telecommunication network to perform the method according to any of Claims 1 to 20.
GB1815774.3A 2018-09-27 2018-09-27 Network slice management Active GB2577526B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
GB1815774.3A GB2577526B (en) 2018-09-27 2018-09-27 Network slice management

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
GB1815774.3A GB2577526B (en) 2018-09-27 2018-09-27 Network slice management

Publications (3)

Publication Number Publication Date
GB201815774D0 GB201815774D0 (en) 2018-11-14
GB2577526A true GB2577526A (en) 2020-04-01
GB2577526B GB2577526B (en) 2021-02-24

Family

ID=64108977

Family Applications (1)

Application Number Title Priority Date Filing Date
GB1815774.3A Active GB2577526B (en) 2018-09-27 2018-09-27 Network slice management

Country Status (1)

Country Link
GB (1) GB2577526B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115134869A (en) * 2021-03-29 2022-09-30 华为技术有限公司 Access control method and device for network slice

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2017177364A1 (en) * 2016-04-11 2017-10-19 Telefonaktiebolaget Lm Ericsson (Publ) Method and apparatus for communication over network slices in wireless communication systems

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2017177364A1 (en) * 2016-04-11 2017-10-19 Telefonaktiebolaget Lm Ericsson (Publ) Method and apparatus for communication over network slices in wireless communication systems

Also Published As

Publication number Publication date
GB2577526B (en) 2021-02-24
GB201815774D0 (en) 2018-11-14

Similar Documents

Publication Publication Date Title
CN110972193B (en) Slice information processing method and device
US11212181B2 (en) Cloud zone network analytics platform
US11196803B2 (en) Edge cloud broker and method therein for allocating edge cloud resources
US11665635B2 (en) Network slice management
US20220039002A1 (en) Network slice management
CA3100862C (en) Apparatus and method for determining background traffic transfer policy
US8977886B2 (en) Method and apparatus for rapid disaster recovery preparation in a cloud network
CN110572377B (en) Data forwarding method, plug-in and domain name server
US20180067841A1 (en) Method and apparatus for determining a performance impact by a software upgrade of a mobile user endpoint device
US20220086044A1 (en) Analyzing and configuring workload distribution in slice-based networks to optimize network performance
EP3857978B1 (en) Network slice redirection management
US20190319845A1 (en) Resource adjustment method, apparatus, and system
US20220104127A1 (en) Method and apparatus for power management in a wireless communication system
CN110771122A (en) Method and network node for enabling a content delivery network to handle unexpected traffic surges
GB2577527A (en) Network slice management
GB2577526A (en) Network slice management
US20230103816A1 (en) Hybrid Cloud Cellular Network Routing
US20220191716A1 (en) Updating Record of Border Cells
GB2577525A (en) Network slice management
US11271859B2 (en) Method and apparatus for realizing intelligent traffic scheduling, computer readable storage medium thereof and computer device
WO2024024106A1 (en) Control of timing for starting prediction of network load
EP4413712A1 (en) Hybrid cloud cellular network routing
WO2023167965A1 (en) External service integration with cellular networks