WO2014136058A1 - Virtual machine mobility with evolved packet core - Google Patents

Virtual machine mobility with evolved packet core Download PDF

Info

Publication number
WO2014136058A1
WO2014136058A1 PCT/IB2014/059438 IB2014059438W WO2014136058A1 WO 2014136058 A1 WO2014136058 A1 WO 2014136058A1 IB 2014059438 W IB2014059438 W IB 2014059438W WO 2014136058 A1 WO2014136058 A1 WO 2014136058A1
Authority
WO
WIPO (PCT)
Prior art keywords
subscriber
network
instance
mobility
tunnel
Prior art date
Application number
PCT/IB2014/059438
Other languages
French (fr)
Inventor
Haseeb Akhtar
Vishwamitra Nandlall
Francois Lemarchand
Original Assignee
Telefonaktiebolaget L M Ericsson (Publ)
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Telefonaktiebolaget L M Ericsson (Publ) filed Critical Telefonaktiebolaget L M Ericsson (Publ)
Priority to EP14714379.6A priority Critical patent/EP2965495A1/en
Publication of WO2014136058A1 publication Critical patent/WO2014136058A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/02Processing of mobility data, e.g. registration information at HLR [Home Location Register] or VLR [Visitor Location Register]; Transfer of mobility data, e.g. between HLR, VLR or external networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/08Protocols specially adapted for terminal emulation, e.g. Telnet
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/455Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/455Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
    • G06F9/45533Hypervisors; Virtual machine monitors
    • G06F9/45558Hypervisor-specific management and integration aspects
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/34Network arrangements or protocols for supporting network services or applications involving the movement of software or configuration parameters 
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/60Subscription-based services using application servers or record carriers, e.g. SIM application toolkits
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/455Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
    • G06F9/45533Hypervisors; Virtual machine monitors
    • G06F9/45558Hypervisor-specific management and integration aspects
    • G06F2009/4557Distribution of virtual machine instances; Migration and load balancing

Definitions

  • VIRTUAL MACHINE ' MOBILITY WITH EVOLVED PACKET CORE
  • the present disclosure generally relates to deployment of virtualized applications and cloud-based services for subscribers in a mobile communication network. More particularly, and not by way of limitation, particular embodiments of the present disclosure are directed to a system and method for controlling mobility of a subscriber-specific Virtual Machine (VM) instance (associated with a subscriber-specific VM session) from one VM to another VM using a network node in a packet-switched Core Network (CN) (such as an Evolved Packet Core (EPQ) in the mobile communication network.
  • VM Virtual Machine
  • CN packet-switched Core Network
  • EPQ Evolved Packet Core
  • Virtualized applications or cloud-based services are increasingly offered by cellu!ar service providers to their subscribers or supported by service providers in their cellular networks. These virtualized applications or cloud- based services may relate to telecommunications (e.g., wireless audio and/or video content delivery), Information Technology (IT) (e.g., remote diagnostics and troubleshooting), Internet or World Wide Web (e.g., online shopping, online gaming, streaming of audio-visual content, web surfing), etc.
  • a virtualized application is a software application that is encapsulated (i.e., isolated or K sandboxed !S ) from the underlying operating system so as to allow it to run with different user operating systems. Virtualized applications may be imported to client computers without the need of installing them.
  • FIG. 1 illustrates an exemplary Fretwork configuration 20 showing how virtualized applications and cloud-based services are currently deployed for subscribers in a mobile communication network 22
  • the mobile communication network 22 may be a cellular telephone network operated, managed, owned, or leased by a wireless/cellular service provider or operator
  • the terms "wireless network,” “mobile communication network,” “operator network,” or “carrier network” may be used interchangeably to refer to a wireless communication network, for example a DCiular network, a proprietary data communication network, a corporate-wide wireiess network, and the like, facilitating voice and/or data communication with wireless devices such as the devices 24-28.
  • the wireiess network 22 may be a dense network with a iarge number of wireiess terminals such as User Equipments or UEs operating therein. It is understood that there may be stationary devices such as Machine-to-Machine ( 2M) devices as well as mobile devices such as mobile handsets/terminals or UEs operating in the network 22.
  • 2M Machine-to-Machine
  • the mobile communication network 22 is shown to Include an Access Network (AN) portion 30 coupled to a Core Network (CN) portion 32.
  • the AN 30 may include multiple ceil sites (not shown), each under the radio coverage of a respective Base Station (BS) or Base Transceiver Station (BTS) 34-38,
  • BS Base Station
  • BTS Base Transceiver Station
  • user devices 24-26 may be under the radio coverage of the BS 34
  • the user device 27 may be under the radio coverage of the BS 35
  • the user devic 28 may be under the radio coverage of and in communication with the BS 36.
  • the term "Access Network” may include not only a Radio Access Network (RAN) portion including for example, a base station with or without a base station controller of a cellular carrier network (e.g., the network 22), but other portions as well, such as a DCluiar backhaul with or without a portion of the C 32.
  • RAN Radio Access Network
  • RAT Radio Access Technology
  • WiFi Wireiess Fidelity
  • RAN may refer to a portion, including hardware and software modules, of the servic provider's AN that facilitates voice calls, data transfers, and multimedia applications such as Internet access, online gaming, content downloads, video chat, etc. for the wireless devices 24-28.
  • the BS 34 e.g., a WiFi Access Point (AP) ⁇ is shown to be coupled to a backhaul portion that includes a Broadband Network Gateway (BNG) 38 that routes Internet Protocol (IP) traffic from/to broadband-enabled remote access devices (e.g., the devices 24-26) to/from the Internet (not shown) through the cellular operator's backbone network (including the GN 32).
  • BNG Broadband Network Gateway
  • IP Internet Protocol
  • a BNG may serve as an access gteway point for subscribers, through which they connect to a broadband network or Internet or a cloud-based service platform.
  • the subscnber(s) can access various broadband services provided by the network operator or a third party such as an Internet Service Provider (ISP).
  • the BNG 38 may aggregate traffic from various subscriber sessions from an access network, for example a fixed-IP broadband access network (not shown in FIG. 1 ), a Wireless Local Area Network (WLAN), or a Wi-Fi network, and route that traffic to the CN 32 of the service provider for further processing.
  • the access network may not be a Third Generation Partnership Project (3GPP) network.
  • 3GPP Third Generation Partnership Project
  • each of the other two base stations 35-36 in FIG. 1 are shown to be coupled to a respective Third Generation (3G) RAN or Fourth Generation (4G) RAN (collectively referred to using the reference numeral "40" in FIG. 1) that provides radio interface to corresponding wireless devices 27-28 and enables these devices to communicate with various entities in the operator's network 22 (and beyond) using device-selected RAT.
  • a common CN functionality I.e., C 32
  • each 3G or 4G RAN may have its own associated CN, and some form of interworking may be employed in the operator's network 22 to link the two RAN-spedfic core networks.
  • the base stations 34-38 may be, for example, evolved NodeBs (eNodeBs or eNBs), high power and macro-cell base stations or relay nodes, WiFi APs (Access Points), etc. These base stations may receive wireless communication from the respective wireless terminals 24-28 and other such terminals operating in the network 22, and forward the received communication to the CN 32 through the corresponding cellular backhaul or RAN portion.
  • the wireless terminals 24-28 may use suitable RATs (examples of which are provided below) to communicate with the corresponding base stations in the RANs.
  • the cellular backhaul may include functionalities of a 3G Radio Network Controller (RNC) or Base Station Controller (BSC). Portions of the backhaul such as, for example, BSCs or RNCs, together with base stations may be considered to comprise the RAN portion of the network.
  • RNC Radio Network Controller
  • BSC Base Station Controller
  • Some exemplary RANs 40 include RANs in Third Generation Partnership Project's (3GPP) Global System for Mobile communications (GSM), Universal Mobile Telecommunications System (UMTS), Long Term Evolution (LTE), and LTE Advanced (LTE-A) networks.
  • 3GPP Third Generation Partnership Project's
  • GSM Global System for Mobile communications
  • UMTS Universal Mobile Telecommunications System
  • LTE Long Term Evolution
  • LTE-A LTE Advanced
  • RANS include, for example, GERAN (GSM/EDGE RAN, where "EDGE” refers to Enhanced Data Rate for GSM Evolution systems), Universal Terrestrial Radio Access Network (UTRAN), and Evo!ved-UTRAN (E-UTRAN).
  • the corresponding RATs for these 3GPP networks are: GSM/EDGE for GERAN, UTRA for UTRAN, E- UTRA for E-UTRAN, and Wideband Code Division Multiple Access (WGDMA) based High Speed Packet Access (HSPA) for UTRAN or E-UTRAN.
  • GSM/EDGE for GERAN
  • UTRA for UTRAN
  • E- UTRA for E-UTRAN
  • WCDMA Wideband Code Division Multiple Access
  • HSPA High Speed Packet Access
  • eAN Evolution-Data Optimized
  • eAN is an exemplary RAN in 3GPP2's Code Division Multiple Access (CDMA) based systems, and its corresponding RATs are 3GPP2's CDMA based High Rate Packet Data (HRPD) or evolved HRPD (eHRPD) technologies.
  • HRPD High Rate Packet Data
  • eHRPD evolved HRPD
  • HRPD technology or Wireless Local Area Network (WLAN) technology may be used as RATs for a Worldwide interoperability for Microwave Access (WilvlAX) RAN based on Institute of Electrical and Electronics Engineers (IEEE) standards such as, for example, IEEE 802.16e and 802.16m.
  • IEEE Institute of Electrical and Electronics Engineers
  • each of the wireless devices 24-28 may be a User Equipment (UE) or a Mobile Station (MS), in case of the operator's network 22 being an HRPD network, each of the wireless devices 24-28 may be an Access Terminal (AT) (or evolved AT).
  • UE User Equipment
  • MS Mobile Station
  • AT Access Terminal
  • the wireless devices may also be referred to by various analogous terms such as a "mobile handset,” a “wireless handset,” a “terminal,” and the like.
  • each of the wireless devices may be any multi-mode mobile handset enabled, for example, by the device manufacturer or the network operator, for communications over corresponding RATs supported by associated RANs.
  • Some examples of such mobile handsets/devices include cellular telephones or data transfer equipments (e.g., a Personal Digital Assistant (PDA) or a pager), smartphones (e.g., iPhoneTM, AndroidTM phones, BlackberryTM, etc.), handheld or laptop computers, Bluetooth® devices, electronic readers, portable electronic tablets, interactive gaming units, etc.
  • PDA Personal Digital Assistant
  • the term "UE” may be primarily used as representative of ail such wireless devices, that is AT's, fvlS's, or other mobil terminals, regardless of the type of the RANs/RATs (i.e., whether a 3GPP system, a 3GPP2 system, WiFi system, etc.).
  • the Core Network (CN) 32 may provide logical, service, and control functions such as subscriber account management, billing, subscriber mobility management, and the like, as well as Internet Protocol (IP) connectivity and interconnection to other networks such as the Internet or an internet-based service network such as a Data Center (DC) 42 or entities, roaming support, etc.
  • IP Internet Protocol
  • the CN 32 is an International Mobile Teiecommunications (IMT) CN such as a Third Generation Partnership Project (3GPP) CN.
  • IMT International Mobile Teiecommunications
  • 3GPP Third Generation Partnership Project
  • the CN 32 may be, for example, another type of IMT CN such as a 3GPP2 CN (for Code Division Multiple Access (CDMA) based cellular systems), or an ETSI TISPAN (European Teiecommunications Standards Institute TIPHON (Telecommunications and Internet Protocol Harmonization over Networks) and SPAN (Services and Protocols for Advanced Networks)) C .
  • the CN 32 may be a packet-switched (or packet- based) core network, which also may be referred to herein as a "Mobile Packet Core” or "MPC.”
  • the MFC 32 may be an Evolved Packet Core (EPC) of an LTE or LTE-A network.
  • EPC Evolved Packet Core
  • MPC Mobility Control
  • EPC EPC
  • CS Circuit-Switched
  • PS Packet-Switched
  • the EPC 32 unifies these two sub-domains as a single IP domain, thereby facilitating an end-to-end all-IP (packet-based) delivery of service in the LTE network (e.g., the carrier network 22)— from mobile handsets and other terminals with embedded IP capabilities, over IP-based eNodeBs, across the EPC, and throughout the application domain (including IP Multimedia Subsystem (IMS) as well as non-IMS domains).
  • IMS IP Multimedia Subsystem
  • Some exemplary functional elements constituting the EPC 32 may include a Policy and Charging Rules Function (PCRF) 44, an Access Network Discovery and Selection Function (ANDSF) 45, a Serving GPRS Support Node (SGSN) 46 (wherein "GPRS” refers to General Packet Radio Service), an Evolved Packet Gateway (EPG) 47, a Mobility Management Entity (MME) 48, and an Online Charging System (OCS) 49.
  • PCRF Policy and Charging Rules Function
  • ANDSF Access Network Discovery and Selection Function
  • SGSN Serving GPRS Support Node
  • EPG Evolved Packet Gateway
  • MME Mobility Management Entity
  • OCS Online Charging System
  • the PCRF 44 may operate in real-time and aggregate information to and from the access network 30, operationai support systems such as the MME 48 and the OCS 49, and other sources (not shown) to support the creation of rules and then automatically making policy decisions for each subscriber active in the carrier network 22.
  • the operator may offer multiple services, Quality of Service (QoS) levels, and charging rules to its subscribers in the network 22.
  • QoS Quality of Service
  • the PCRF 44 ma enable a network operator to provide innovative service models to its subscribers and implement corresponding charging rules for services used/subscribed by the subscribers.
  • the PCRF 44 may be deployed as a stand-alone entity or may be integrated with different platforms such as billing, rating, charging, and subscriber databases.
  • the ANDSF 45 may assist a UE to discover non- 3GPP access networks—such as Wireless Fidelity networks (popularly known as "Wi-Fi” networks, such as an IEEE 802.11b Wireless Local Area Network (WLAN)) or WiMax networks— that can be used for data communications in addition to 3GPP access networks (e.g., HSPA or LTE) and to provide the UE with rules policing the connection to these networks.
  • non- 3GPP access networks such as Wireless Fidelity networks (popularly known as "Wi-Fi” networks, such as an IEEE 802.11b Wireless Local Area Network (WLAN)) or WiMax networks— that can be used for data communications in addition to 3GPP access networks (e.g., HSPA or LTE) and to provide the UE with rules policing the connection to these networks.
  • the SGSN 46 may support the GPRS functionality in the CN 32 by providing delivery of data packets from and to the (GPRS-registered) mobile stations within its geographical servic area.
  • the SGSN 46 may perform packet routing and transfer, mobility management (attach/detach and location management), logical Sink management, and authentication and charging functions.
  • the EPG 47 may function as a gateway between the PRC 32 and othe packet data networks, such as the internet, corporate intranets, and private data networks.
  • the EPG 47 may be alternatively referred to as an Evolved Packet Data Gateway (ePDG) and may function to secure the data transmission with a UE connected to the EPC 32 over an untrusted non-3GPP access.
  • the EPG 47 may be deployed with Gateway GPRS Support Node (GGSN) functionality only, as a combination of Serving Gateway (S-GW) and Packet Data Network Gateway (PDN-GW) network elements in the EPC 32, or as a combination of GGSN, S-GW, and PDN-GW network elements in the EPC 32.
  • GGSN Gateway GPRS Support Node
  • S-GW Serving Gateway
  • PDN-GW Packet Data Network Gateway
  • a GGSN is generally responsible for internetworking between a GPRS network and an external packet-switched network, such as the Internet.
  • An S-GW routes and forwards user data packets, while aiso acting as the mobility anchor for the user plane during inter-eNB handovers and as the anchor for mobility between LTE and other 3GPP technologies.
  • the S-GW may manage and store UE contexts such as, for example, parameters of the IP bearer service, network internal routing information, etc.
  • a PDN-GW (or PGW) may provide connectivity from the UE to external Paoket Data Networks (PDNs) by being the point of exit and entry of traffic for the UE.
  • PDNs Paoket Data Networks
  • a UE may have simultaneous connectivity with more than one PGW for accessing muitipie PDNs.
  • a PGW may perform policy enforcement, packet filtering for each user, charging support, packet screening, etc.
  • a PDN-GW may also act as an anchor for mobility between 3GPP and non ⁇ 3GPP technologies such as Wifv!AX and 3GPP2 based CDMA 1x and EV-DO.
  • the MME 48 may control alii control plane functions related to subscriber and session management.
  • the MME 42 may perform signaling and control functions to manage a UE's access to network connections, the assignment of network resources, and the management of the mobility states to support tracking, paging, roaming and handovers of UEs such as the UEs 24- 28,
  • the OCS 49 is a system that allows a mobile network operator to charge its customers or mobile subscribers, in real-time, based on their service usage.
  • the OCS 49 may be oriented to ail subscriber types and service types, may offer unified online charging and online control capabilities, and also may be used as a unified charging engine for ail network services, making if a core basis for convergent billing in the network 22.
  • the MPC EPC 32 may be connected to a Data Center (DC) 42, which may be an !nternet-based service platform or service network hosting multiple virtuaiized applications (shown as 58-60, 82-84, and 66-68 in F!G. 1 ) or offering cloud-based services (not shown).
  • DC Data Center
  • the DC 42 may be owned or operated by the operator of the carrier network 22.
  • the DC 42 may be owned or operated by a third party Content Provider (CP) such as Amazon.
  • CP Content Provider
  • an SGi reference point 52 may connect the EPC 32 and the mobile carrier- or operator- specific DC 42. This SGi reference point may correspond to the Gi reference point for Second Generation (2G) or 3G accesses as indicated in FIG, 1.
  • the SGi is the reference point between the EPC 32 (more specifically, in one embodiment, the EPG 47 in the EPC 32) and another Packet Data Network (PDN) (here, the carrier data center 42).
  • the packet data network may be an operator-external public or private packet data network or an intra-operator packet data network, for example for provisioning of IMS services.
  • the carrier DC 42 may deploy virtuaiized applications or cloud-based services using Virtual Machines (VMs).
  • VMs Virtual Machines
  • FIG. 1 three exemplary groups of VMs are shown using reference numerals 54-56. Each group may include three VMs, each identified by a pair of an instance of a virtuaiized application ("App") and an instance of a corresponding Operating System (OS).
  • App virtuaiized application
  • OS Operating System
  • the first group of VMs 54 includes three App-OS pairs 58-60
  • the second group of ViVIs 55 includes the other three App-OS pairs 62-64
  • the third group of ViVIs 56 includes another three App-OS pairs 66-68.
  • the App instances may be of the same virtuaiized application, for example a streaming video application, or may be instances of different virtuaiized applications, for example a streaming video application, an online shopping application, an online search engine, a remote gaming application, and the like invoked by one or more subscribers in the network 22.
  • a Virtual Machine is a software implementation of a machine (i.e., a computer) that executes programs like a physical machine.
  • a VM is a software-based, fictive computer that may be based on specifications of a hypothetical computer or emulate the computer architecture and functions of a real world computer.
  • Each VM instance can run any operating system supported by the underlying hardware.
  • users can run two or more different "guest" operating systems simultaneously, in separate "virtual" computers or VMs.
  • Virtual machines may be created using hardware virtualization that allows a VfVl to act like a real computer with an operating system. Software executed on these VMs is separated from the underlying hardware resources.
  • a computer that is running Microsoft Windovvs ® operating system may host a virtual machine that looks like a computer with a Linux ® operating system.
  • Linux-based software can be run o the virtual machine.
  • the "host” machine is the actual machine/computer on which th virtualization takes place, and the "guest” machine is the VM.
  • the words "host” and "guesf are generally used to distinguish the software that runs on the physical machine from the software that runs on the VM.
  • running multiple instances of virtual machines on shared computing resources/hardware such as the shared hardware 70-72 shown in FIG. 1 may lead to more efficient use of computing resources, both in terms of energy consumption and cost effectiveness.
  • the shared hardware 70-72 may be from a single computer or may include hardware resources from a distributed computing environment.
  • the software or firmware that creates and runs a virtual machine on the host hardware is called a "hypervisor," Virtual Machine Manager, or Virtual Machine Monitor (VMM).
  • the VM presents the guest operating systems with a virtual operating piatform and manages the execution of the guest operating systems. Multiple instances of a number of different operating systems may share the virtualized hardware resources via the hypervisor.
  • a hypervisor 74 creates and manages VM instances 58-60 on the shared hardware platform 70
  • a hypervisor 75 creates and manages VM instances 62- 64 on the shared hardware piatform 71
  • a hypervisor 76 creates and manages VIV1 instances 66-68 on the shared hardware piatform 72.
  • VXLAN Virtual extensible Local Area Network
  • VMotionTM software or the vCiderTM software from Cisco Systems**.
  • L3 data center network infrastaicture in the presence of VIV1s in a multi-tenant environment (e.g., when the data center provides services to multiple cellular operators or to multiple subscribers of a single operator) and support VM-to-VM communication.
  • inter-DC or intra-DC V mobi!iiy may be accomplished.
  • a critical deficiency in data centers today is related to VM mobility across OSS L3 boundaries.
  • the current placement of carrier DG 42 is completely separated from the carrier's mobile network 22.
  • the VM Management 78 and VM Mobility 79 functions are independent of carrier's mobile network 22.
  • a decision to move a subscriber's VM session between VMs is purely based on the hardware/software limitations of the carrier DC itself.
  • the carrier DC 42 is connected to the EPC 32 via SGi/Gi interface 52
  • the inputs from the carrier's mobtie network 22 are not considered fo the VM mobility (both intra-DC and infer-DC) even though the mobile network 22 (more specifically, the EPC 32 in the mobile network 22 ⁇ is the entity that has the most relevant information about a subscriber's mobility and account preferences. Current technology also does not address the details of how such VM mobility may be controlled using the EPC.
  • virtuaiized applications e.g., telecom apps, IT apps, web-related apps, etc.
  • Particular embodiments of the present disclosure provide for the EPC moving a subscriber's VM instance between VMs (infra-DC or infer-DC) based on the cellular network operator's policy, network load, subscriber's application requirement, subscriber's current location, subscriber's Service Level Agreement (SLA) with the operator, etc.
  • the present disclosure proposes to use GPRS Tunneling Protocol (GTP) tunnels rooted at the EPC to data center VMs to govern intra-DC and inter-DC mobility of VMs and also to tie in the mobility triggers to service provider's PCRF policies.
  • GTP GPRS Tunneling Protocol
  • each VM session for the mobile subscribers may be anchored in the EPG during the PDN session establishment (e.g., with a data center that may be an operator-external public or private packet data network or an intra-operator packet data network (e.g., for provision of IMS services)).
  • the EPG may assume the control of VM mobility for each subscriber by establishing a new GTP interface with the VMs at a DC.
  • the EPG may create a new GTP tunnel per PDN session per subscriber.
  • Respective GTP Tunnel Identifier (ID), Access Point Name (APN), subscriber ID (e.g., the International Mobile Subscriber Identity (IMS! number), subscriber-specific VM instance number, etc. may now have binding with each other within the EPG.
  • the VMs may also bind the subscriber-specific VM instance number with corresponding GTP Tunnel ID.
  • the VM mobility e.g., mobility of a subscriber-specific VM instance from one VM to another
  • the VM mobility may be triggered based on one or more of the following: (i) subscriber's location change, (11) bandwidth and/or delay requirements associated with the (vlrtuailzed) application being used by the subscriber, (iii) SLA between the subscriber and the operator, (iv) change in the loading condition of the VMs in one or more DCs, and (v) network operator's charging rules for cloud-based services.
  • the present disclosure is directed to a method for managing mobility of a subscriber-specific Virtual Machine (VM) instance from a first VM to a second VM for a mobile subscriber in a mobile communication network.
  • the VM instance is initially created in the first VM thai is implemented at a first Data Center (DC) associated with the mobile communication network.
  • the method comprises performing the following using a network node in a packet-switched Core Network (CN) in the mobile communication network: (1) anchoring a VMi session associated with the VM instance; and (ii) controlling the mobilit of the subscriber-specific V instance from the first VM to the second VM,.
  • the second VM is implemented at either the first DG or at a second DC that is different from the first DC.
  • the present disclosure is directed to a network node in a packet-switched G in a mobiie communication network for managing mobility of a subscriber-specific VM instance from a first VM to a second VM for a mobiie subscriber in the mobile communication network.
  • the VM instance is initially created in the first VM that is implemented at a first DC associated with the mobile communication network.
  • the network node is configured to perform the following: (i) anchor, in the network node, a V session associated with the VM instance; and (ii) control the mobility of the subscriber-specific VM instance from the first VM to the second VM, wherein the second VM is implemented at either the first DC or at a second DC that is different from the first DC.
  • the present disclosure is directed to a system for managing mobility of a subscriber-specific VM instance from a first VM to a second VM for a mobile subscriber in a mobile communication network.
  • the system comprises; (i) a first DC associated with the mobile communication network and implementing the first VM, wherein the VM instance is initially created at the first VM; (ii) a second DC associated with the mobile communication network, wherein the second DC is in communication with the first DC and is different from the first DC; and (iii) an Evolved Packet Core (EPC) of the mobiie communication network coupled to the first DC and the second DC, wherein the EPC is configured to perform the following; (a) anchor a VM session associated with the VM instance, and (b) control the mobility of the subscriber-specific VM instance from the first VM to the second VM, wherein the second VM is implemented at either the first DC or at the second DC.
  • EPC Evolved Packet Core
  • the EPC-based control of V mobility in certain embodiments of the present disclosure lets the subscribers use applications that require Sow latency and/or high bandwidth (e.g., multimedia streaming and real-time gaming applications) and, hence, have the best user experience that the network can provide.
  • This can provide optimization of cloud services accessed by a subscriber over a mobile connection.
  • cellular network operators can deploy virtuaSized applications in an optimized way for their mobile subscribers. The operator could optimize both for the mobile end point (i.e., a subscriber's UE) and the VM DC positions (intra-DC as well as inter-DC).
  • FIG. 1 illustrates an exemplary network configuration showing how virtualized applications and cloud-based services are currently deployed for subscribers in a mobile communication network
  • FIG. 2 is a diagram of an exemplary wireless system in which the VM mobility methodology according to the teachings of one embodiment of the present disclosure may be implemented;
  • FIG, 3 depicts an exemplary flowchart showing various steps that may be performed by a network node in an EPC to control VM mobility according to the teachings of particular embodiments of the present disclosure
  • FIG, 4 shows details of a portion of the wireless system in FIG, 2 in which the VM mobility solution according to the teachings of one embodiment of the present disclosure may be implemented;
  • FIG. 5 shows a high level sequence diagram of the initial binding between an EPG and a DC-based VM (where a subscriber-specific VM instance is created);
  • FIGs. 6A and 6B illustrate an exemplary sequence diagram (or message flow) related to a bandwidth-based VM mobility trigger according to one embodiment of the present disclosure
  • FIGs. 7A and 7B depict an exemplary message flow or sequence diagram related to latency delay- and UE location-based VM mobility trigger according to one embodiment of the present disclosure
  • FIGs. 8A through 8C illustrate exemplary configurations regarding how to provide appropriate network connectivity between an operator's core network and a data center to support the VM mobility solution, according to particular embodiments of the present disclosure.
  • FIG, 9 depicts a block diagram of an exemplary network node in a core network through which the VSV5 mobility solution according to particuiar embodiments of the present disclosure may be implemented.
  • VVI mobility or “virtual machine mobility” are primarily used to refer to mobility of a VfVS instance from one VM to another. However, these terms may also broadly refer to migration of a VM from one physical server to another depending on the context of discussion or implementation.
  • VfVS instance a VfVS instance from one VM to another.
  • VfVS instance a virtual machine mobility
  • these terms may also broadly refer to migration of a VM from one physical server to another depending on the context of discussion or implementation.
  • the discussion below is given primarily in the context of controlling mobility of a subscriber-specific VM instance, such discussion is exemplary in nature and should not be construed as limiting applicability of the solution in particular embodiments of the present disclosure to controlling mobility of VM instances only. Rather, the teachings in particular embodiments of the present disclosure may equally appiy to situations that require control of mobility of VMs or different types of VM implementations.
  • FIG, 2 is a diagram of an exemplary wireless system 85 in which the VM mobility methodology according to the teachings of one embodiment of the present disclosure may be implemented.
  • the system 85 is shown to include a cellular carrier network (or mobile communication network) 87 having a base station 89 and a Core Network (CN) 90.
  • the carrier network 87 is an LTE network
  • the base station 89 may be an eNodeB
  • the CN 90 may be a packet-switched C (i.e., an EPG).
  • Two exemplary mobile units 92-93 representing mobiie subscribers operating in the network 87 are shown to be in wireless communication via respective radio Sinks 95-96 with the carrier network 87 through the base station 89, which is interchangeably referred to herein as a "mobile communication node,” or simply a “node” of the network 87.
  • the network 87 may be operated, managed, and/or owned by a wireless service provider or operator.
  • the base station 89 may be, for example, a base station in a 3G network, or an evolved Node-B (eNodeB or eNB) when the carrier network is an LIE network, and may provide a radio interface (e.g., an RF channel) to the wireless devices 92-93 via an antenna or antenna unit 97.
  • the radio interface is depicted by the exemplary wireless links 95-96.
  • the base station 89 may be an evolved Base Transceiver Station (eBTS). Additionally, the base station 89 and the Core Network 90 may support WiFi access network technology.
  • the mobile communication node 89 may include functionalities of a 3G base station along with some or all functionalities of a 3G Radio Network Controller ( NC).
  • the base station 89 may also Include a site controller, an access point (AP), a radio tower, or any other type of radio interface device capable of operating in a wireless environment.
  • the base station 69 may be configured to implement an intra-cell or inter-cell Coordinated Multi-Point (CoMP) transmission/reception arrangement.
  • CoMP Coordinated Multi-Point
  • the communication node (or base station) 89 may also perform radio resource management (as, for example, in case of an eNodeB In an LIE system) using, for example, the channel feedback reports received from the wireless devices 92-93 operating in the network 87.
  • radio resource management as, for example, in case of an eNodeB In an LIE system
  • each of the wireiess devices 92-93 in FIG, 2 aiso may be a UE, or an MS, or an AT (or evolved AT).
  • the wireiess devices 92-93 may be any mu!ti-mode mobile handsets enabled for communications over a number of different RATs, Because examples of different types of "wireless devices" are already provided earlier under the "Background” section, such examples are not repeated herein for the sake or brevity.
  • the term "UE” may be primarily used as representative of all such wireless devices (i.e., AT's, MS's, or other mobile terminais), regardless of the type of the network 87 (i.e., whether a 3GPP network, a 3GPP2 network, a WiFi network, etc.) in which these devices are operational.
  • wireless network may be used interchangeably to refer to a wireiess communication network ⁇ e.g., a cellular network, a proprietary data communication network, a corporate-wide wireiess network, a WiFi network, etc.) facilitating voice and/or data communication with wireless devices (lik the devices 92-93),
  • the wireless network 87 may be a dense network with a large number of wireless terminals such as UEs operating therein. It is understood that there may be stationary devices such as M2M devices as well as mobile devices such as mobile handsets/terminals operating in the network 87.
  • the carrier network 87 in FIG. 2 may also include the CN 90 as a network controller coupled to the base stations in its RANs (not shown) and providing logical and control functions, for example terminal mobility management, access to externa! networks or communication entities, subscriber account management, and the like in the network 87.
  • the O 90 also may be an EPC and, hence, the earlier EPC-re!ated discussion in the "Background" section remains applicable to the EPC 90 as well and such discussion is not repeated herein for the sake of brevity.
  • the CN 90 in FIG. 2 is distinguishable from the CN 32 in FIG.
  • the CN 90 may also be configured to control VSV1 mobility as per the teachings of particular embodiments of the present disclosure (discussed in more detail later below).
  • the CN 90 may function to provide connection of the bas station 89 to other terminals (not shown) operating in the base station's radio coverage area, and also to other communication devices such as wireiine or wireless phones, computers, monitoring units, and so on or resources (e.g., an Internet website) in other voice and/or data networks (not shown) external to the carrier network 87.
  • the network controller or CN 90 may be coupled to a packet-switched network such as an IP network 98 as well as a circuit-switched network 99, such as the Public-Switched Telephone Network (PSTN), to accomplish the desired connections beyond the carrier network 87.
  • a packet-switched network such as an IP network 98 as well as a circuit-switched network 99, such as the Public-Switched Telephone Network (PSTN)
  • PSTN Public-Switched Telephone Network
  • FIG. 2 one or more data centers (two of which are indicated by reference numerals "100" and "10 in FIG. 2) associated with the carrier network 87 and communicatively coupled to it may reside in the IP network 98, which may be the Internet.
  • These data centers 100-101 may be in communication with each other, and may host vi dualized applications and may provide cloud-based services to the network's subscribers. For ease of discussion herein, only the data center 100 Is shown in subsequent figures and discussed in more detail.
  • data center 100 may be substantially similar to the DC 42 in FIG. 1 , but different from the DC 42 in that the data center 100 may no longer support the Vfvl Mobility function 79 but still accomplish VM mobility through its connection to the EPC 90 via a GPRS Tunneling Protocol (GTP) tunnel as discussed later with reference to discussion of FIG. 4.
  • GTP GPRS Tunneling Protocol
  • the operator network 87 may be a cellular telephone network, a Public Land Mobile Network (PLMN), or a non-cellular wireless network providing voice, data, or both.
  • the wireless devices 92-93 may be subscriber units in the operator network 87.
  • portions of the operator network 87 may include, independently or in combination, any of the present or future wireline or wireless communication networks such as, for example, the PSTN, an SMS based network, or a satellite-based communication link.
  • the carrier network 87 may be connected to the internet via its GW's connection to the IP network 98 or may include a portion of the Internet as part thereof.
  • the operator network 87 may include more or less or different type of functional entities than those shown in FIG. 2.
  • the CN 90 may be configured as discussed below to control VM mobility according to particular embodiments of the present disclosure.
  • the CN 90 may be configured in hardware or a combination of hardware and software to implement the VM mobility solution as discussed herein.
  • the VM mobility solution according to one embodiment of the present disclosure may be implemented through suitable programming of one or more processors in a network node of the CN 90 (e.g., the processor 235 in the CN's EPG 108 in FIG, 9).
  • the execution of the program code by the processor 235 in the EPG 108 may cause the processor to perform appropriate method steps—e.g., anchoring of a V session associated with a subscriber- specific VM instance, controlling the mobility of the VM instance from one VM to another, etc.— which are illustrated in more detail in FIGs. 3 and 5-7, discussed below.
  • appropriate method steps e.g., anchoring of a V session associated with a subscriber- specific VM instance, controlling the mobility of the VM instance from one VM to another, etc.
  • cellular networks or systems may include, for example, 3GPP or 3GPP2 standard-based systems/networks using Second Generation (2G), 3G, or Fourth Generation (4G) specifications, or non-standard based systems.
  • 2G Second Generation
  • 3G Third Generation
  • 4G Fourth Generation
  • Such systems or networks include, but not limited to, GSM networks, GPRS networks, Telecommunications industry Association/Electronic industries Ailiance (TIA EIA) interim Standard-138 (IS- 136) based Time Division u!tip!e Access (TD A) systems, WCDMA systems, VVGDMA-based HSPA systems, SGPPa's CDMA based High Rate Packet Data (HRPD) or evolved HRPD (eHRPD) systems, CDSVA2000 or TIA/EIA 5S- 2000 systems, Evolution-Data Optimized (EV-DO) systems, WilVlAX systems, international Mobile Telecommunications-Advanced (SMT ⁇ Advanced) systems (e.g., LTE Advanced systems), other Universal Terrestrial Radio Access Network (UTRAN) or Evolved UTRAN (E-UTRAN) networks, GSM/EDGE systems, Fixed Access Forum or other IP-based access networks, a nonstandard based proprietary corporate wireless network, etc. It is noted that the teachings of the present disclosure are also
  • FIG. 3 depicts an exemplary flowchart 102 showing various steps that may be performed by a network node in an EPC (e.g.., the EPC 90 in FIGs. 2 and 4) to control VM mobility according to the teachings of particular embodiments of the present disclosure.
  • that network node may be an EPG (e.g., the EPG 108 in FIG. 4).
  • EPG e.g., the EPG 108 in FIG. 4
  • a subscriber-specific VM instance is created in a first VM implemented at a first DC associated with the mobile communication network (e.g., the DC 100 associated with the network 87 In FIG.
  • the first DC may create the VM instance when a mobile subscriber "runs" a virtualized application on the subscriber's UE or invokes a cloud-based service using the UE.
  • the virtualized application or the cioud-based service may be offered, supported, or administered by a Content Provider (CP) (such as, for example, Amazon. com SM , Google ® YouTube* Netflix 5' , etc.) through the respective data center associated with the carrier's network 87.
  • CP Content Provider
  • the EPG in the EPC may become aware of the creation of the VM instance and may identify the corresponding application (e.g., a mobile gaming application, a streaming video download application, an online shopping application, etc) used by the subscriber.
  • the ERG may anchor therein a V session associated with the subscriber-specific VM instance.
  • the EPG maintains control over the mobility of the VM instance from the first VM to a second VM (which may be implemented at the first DC or at a second DC 101 that is different from the first DC) as indicated at block 106.
  • a DC-based VM mobility control as in the embodiment of FIG. 1
  • the present disclosure provides for an ERC-based VM mobility control. Additional details of anchoring of a VM session in the EPG and EPG's subsequent control of the VM mobility are provided below with reference to discussion of FIGs. 4-7.
  • FIG. 4 shows details of a portion of the wireless system 85 in FIG. 2 in which the VM mobility solution according to the teachings of one embodiment of the present disclosure may be implemented.
  • the sysiem 85 in FIG. 4 is depicted in a manner analogous to the network configuration 20 in FIG. 1— with entities having similar configurations or functionalities in these two figures being identified using the same reference numerals for the sake of simplicity and ease of discussion.
  • the earlier discussion of such entities for example UEs 24-28, the AN portion 30, PCRF 44, MME 48, groups of VMs 54-56, hypervisors 74-76, and the like, with reference to FIG. 1 remains applicable in the context of FIG. 4 and, therefore, is not reproduced in detail below.
  • wire!ess system 85 shows UEs 92-93 in FIG. 2, these UEs 92-93 may be considered as representatives of UEs 24-28 in FIGs. 1 and 4.
  • this base station 89 aiso may be considered as representative of different types of base stations such as base stations 34-36 shown in FIGs. 1 and 4.
  • the carrier network 87 is different from the carrier network 22 in FIG. 1 in that the EPC 90 in the carrier network 87 is configured to control VM; mobility as per teachings of particular embodiments of the present disclosure. No such capability exists in the EPC 32. in. FIG. 1.
  • one of the network nodes in the EPC 90 ⁇ i.e. f an EPG 108— is modified/configured to perform such VM mobiiity control.
  • the EPG 47 in FIG, 1 does not have such capability.
  • some other network node in the packet-switched CN 90 also may be similarly configured to implement the C -based VSVI mobility control solution as per particular embodiments of the present disclosure. Consequently, a VM mobility function 110 is merged with the EPG 108.
  • This VM mobiiity function 1 10 may be a modified version of the DC-based VM mobility function 79 in FiG. 1 to support the EPG-anchored GTP tunneling 1 12 (described later).
  • a modified VM management function 1 14 may be implemented in the DC 100 to support the GTP tunnel-based VM mobility solution.
  • a similar VM management function (not shown) may be implemented at the DC 101.
  • the VM management function 1 14 may be externa! to the DC 100 and, in that case, the VM Management function 114 may be shared by multiple DCs (i.e., the VM management function 114 may b In communication with DCs 100 and 101 in FIG. 2).
  • the groups of VMs 54-58, corresponding hypervlsors 74-76, and shared hardware 70-72 may remain substantially similar between the configurations in FIGs. 1 and 4. Additional details of the E PC-based VM mobility control are provided below (in FIGs. 5-7) with referenc to the configuration in FIG. 4.
  • the VM mobility function 1 10 may be merged with the EPG 108.
  • the VM mobility function 1 0 may provide a 3GPP interface to the GTP tunnel 112 (discussed later) and may enable the EPG 108 to exercise control over mobility of a subscriber-specific VM instance from one VM to another.
  • the VM mobility function 110 may not be part of the EPG 108, but may be a separate network entity or functional element in the EPC 90 communicating with the EPG 108 (or an other network node in the EPC 90 selected to tmpiemeni VM mobility controi) via a suitable 3GPP interface.
  • the EPC-based VM mobility control is facilitated via a new GTP interface/tunnel 112 between the EPG 108 and the groups of virtual machines 54-56 (and, hence, between the EPG 108 and group-specific individual VMs 58-60, 62-84, and 66-68).
  • the EPG 108 may exercise controi over VM mobility of each subscriber through this GTP tunnel 112 with the VMs in the DC 100.
  • different types of funnels or interfaces may be implemented to maintain CN's control over VM mobility.
  • GRE Generic Routing Encapsulation
  • the new GTP interface 1 12 may be used by the EPG 108 to retrieve the loading condition of individual VMs at any given instance.
  • a 3GPP2 i.e., CDMA
  • PDSN Packet Data Serving Node
  • the VM Management function 114 may perform the same function.
  • a PDSN may perform packet routing and mobility management in a CDMA network (not shown).
  • the same GTP interface/tunnel 1 12 may also exist between the EPG 108 and the VM Management function 114 as shown in FIG. 4.
  • This interface 112 may be used by the EPG 108 to instruct the VM Management function 114 to create, move, and delete a VM instance for a specific subscriber.
  • a new GTP tunnel may be created, for example by the EPG 108 in the embodiment of FIG. 4, per PDN session per subscriber.
  • the above-mentioned Mobile IP interface between a PDSN and the VM Management function 114 may fulfill the same objectives.
  • Each of the VMs i.e., VMs 58-60, 62-64, etc. in the DC 100
  • the VM Management function 114 in the DC 100 ⁇ may now create a corresponding binding between the GTP tunnel ID, which may be assigned to the GTP tunnel 112 by the EPG 108, and a VM instance number assigned by the VM hosting the subscriber-specific VM instance or by the VM Management function 114 of the subscriber-specific VM instance.
  • the GTP tunnel ID which may be assigned to the GTP tunnel 112 by the EPG 108
  • a VM instance number assigned by the VM hosting the subscriber-specific VM instance or by the VM Management function 114 of the subscriber-specific VM instance may be a single DTP tunnei ID, there may b muitiple individual bindings to this tunnei 10— each VM and the VM; management function having its own binding to the GTP tunnei ID.
  • the EPG 108 may a!so create a binding among the respective subscriber ID (e.g., the subscriber UE's IMSI number, or the UE's Mobile Subscriber Integrated Services Digital Network (MS-ISDN) number, etc.), the GTP tunnei ID, the subscriber-specific VM instance number, an APN ID of a gateway or a Packet Data Network that the subscriber UE may want to use for its PDN session, and the like.
  • the respective subscriber ID e.g., the subscriber UE's IMSI number, or the UE's Mobile Subscriber Integrated Services Digital Network (MS-ISDN) number, etc.
  • the GTP tunnei ID e.g., the subscriber UE's IMSI number, or the UE's Mobile Subscriber Integrated Services Digital Network (MS-ISDN) number, etc.
  • the GTP tunnei ID e.g., the subscriber UE's IMSI number, or the UE's
  • each mobile subscriber may have a GTP tunnei created per PDN session initiated by the subscriber.
  • the VM session of each mobile subscriber may be now anchored at the EPG 108 during the PDN session estabiishment.
  • Each VM session is associated with a respective subscriber- specific VM instance.
  • a VM session is considered "anchored" at th EPG 108 because the EPG 108 has the necessary information (e.g., information related to routing, required Quality of Service (QoS), subscriber billing/charging policy, and so on) needed to transfer the VM session (i.e., the subscriber-specific VM instance associated with the VM session) from one VM to another as discussed later below.
  • the necessary information e.g., information related to routing, required Quality of Service (QoS), subscriber billing/charging policy, and so on
  • the EPG 108 can now control the VM mobility.
  • the EPG 108 may exercise such control using the VM mobility function 110.
  • the EPG 108 may instruct the VM management function 14, for example via the GTP tunnel 112, to create, move, or delete a VM instance at a VM for a specific subscriber.
  • the EPG 108 may instruct the VM management function 114 to move, scale up (e.g., with more computing, storage, and/or networking resources than th current VM instance), or replicate the subscriber-specific VM instance from one VM to another.
  • the EPG 108 may control VM mobility by triggering VM mobility based on certain "triggers" (discussed below).
  • Triggers There are options available to the EPG 108 for identifying the virtuaiized or cloud-based application used by the subscriber (on the subscriber's UE). Such identification may be necessary to determine, for example, whether the application is a low-latency and/or high bandwidth application which requires additiona! processing resources. Such determination may further assist the EPG in making a decision as to how to hand!e the mobility of a V instance associated with that application. For example, if the application uses only audio data, that is, voice packets as opposed to bandwidth-intensive multi-media content, then no special treatment may be necessary for such an application.
  • the EPG 108 may perform the Dee Packet inspection (DPI) function within the EPG itself.
  • DPI Dee Packet inspection
  • the DP! function allows the EPG to analyze the network traffic from the subscriber UE to discover the type of the application that sent the data.
  • deep packet inspection can differentiate data such as video, audio, chat, Voice over iP (VoIP), e-mail, and Web browsing.
  • the DPI function can determine not only that the data packets contain the contents of a web page, but also which website the page is from.
  • the EPG 106 may look at the payload (of a data packet received from the subscriber UE) and get control information from it.
  • Such control information may include, for example, an App ID identifying the application being used by the subscriber UE, destination IP address such as the !P address of the carrier DC 100, payload Information (for example, type of the payload— whether a voice packet, a video packet, or a text data packet), and the like.
  • the EPG 108 may also identify the Content Provider (CP) (e.g., Verizon ® , YouTube ® Google ® , Netf!ix ® , etc.) that has contractual or service-level relation with the operator of the network 87 to provide content delivery services to operator's subscribers at one or more QoS levels.
  • CP Content Provider
  • the CP may itself send the application information to the EPG 108 via Representational State Transfer (REST)ZWeb Services interface to the EPG based on the Service Level Agreement ⁇ SLA) between the CP and the operator of the carrier network 87,
  • REST Representational State Transfer
  • ⁇ SLA Service Level Agreement
  • DPI node within the operator's network 87 may inform the EPG 108 of the identity of the application used by the subscriber via EST Web Services interface or by Hypertext Transfer Protocol (HTTP) header enrichment or by a proprietary messaging interface.
  • HTTP Hypertext Transfer Protocol
  • the VM mobility (e.g., mobility of a subscriber- specific VM instance from one VM to another VM) may be triggered by the EPG 108 or by the VM Mobility function 110 in the EPG 108 based on one or more of the following exemplary "triggers":
  • a requirement associated with a mobile application being used by the mobil subscriber (as discussed later with reference to th exemplary embodiments of FIGs. 6-7).
  • this requirement may be specified in a subscriber-specific PCRF policy associated with th mobile application.
  • the requirement may specif a radio bandwidth threshold such as the minimum bandwidth needed for the application and/or a latency delay threshold such as how much latency is tolerable for the application.
  • An SLA between the mobile subscriber and the operator of the carrier network 87 may provide for provisioning of a certain level of GoS, bandwidth, and latency delay for subscriber-selected applications.
  • VM mobility may be triggered whenever a need arises to satisfy the high bandwidth/Sow latency requirements of these applications so that the operator may continue to charge extra for these premium services.
  • VM mobility there may be other possible (VM mobility) triggers for subscriber connectivity change to alternate VM. Some examples of these triggers may include one or more of the following:
  • (I) A change in availability of hardware resources for the VM where the subscriber-specific VM instance is created. For example, hardware maintenance may prompt a change in hardware availability, thereby requiring moving the current VM instance of the subscriber application to another VM.
  • an SLA between the network operator and the owner(s) of the VMs may govern the treatment of network operator's subscribers with regard to virtuaiized applications (or cloud-based services) supported through the VMs in the DC 100
  • the SLA between the network operator and an owner of one or more VMs in the DC 100 may change, for example, when the owner of a VM reseils the VM to a Third Party Partner (3PP) (for example a service/content provider like YouTube®, Pandora ® radio, and the like), or an Over-The-Top (OTT) content provider such as Google ® , Vonage ® , or SkypeTM.
  • OTT Over-The-Top
  • Such reselling may include reselling of Content Delivery Network (CDN) caches.
  • the DC 100 and its servers or shared hardware may be part of a CDN and CDN caches may be associated with VMs hosted at the DC 100.
  • (Hi) A change in the network topology of the mobile communication network 87.
  • the owner or operator of the network 87 may change the topolog of its network 87, for example, to optimize IP transport layer to fake advantage of (geographically) closer Internet peering points or to provide for an optimized optical transport sub-layer.
  • Such topological changes may necessitate relocation of VM instances of certain subscribers to more efficiently manage network traffic over the new topology.
  • ( ⁇ ) A new service subscribed by the mobile subscriber from the operator of the mobile communication network 87. Such new service may require, for example, additional bandwidth that may not be supported by the current subscriber-specific VM instance, !n that case, VM instance relocation may be triggered by the EPG 108.
  • VM instances may be consolidated to a larger, more centralized VM at night to efficiently manage power consumption of both the VMs-the originating VM as well as the destination VM.
  • the issue of control of power consumption may also arise in the context of earlier-mentioned change in the loading condition of the VMs in one or more DCs.
  • FIGs. 5-7 illustrate some exemplary message flows or sequence diagrams related to the CN-based VM mobility control solution according to particular embodiments of the present disclosure.
  • Various network nodes or entities In these figures are shown in the context of FIG. 4.
  • the control of VM mobility is illustrated using one of the UEs (i.e., the UE 27) from FIG. 4 as an example.
  • the VM instances of other UEs in the carrier network 87 may be similarly managed/controlled.
  • the VM mobility examples in FIGs. 5-7 are illustrated using the VM groups 54 and 56 as examples only.
  • the message flows in FIGs. 5-7 equally apply to other VM groups or data centers other than the DC 100 in FIG. 4.
  • the VM mobility function 110 may configure the EPG 108 to perform various EPG-based actions depicted in FIGs. 5-7, regardless of whether the VM mobility function 10 is implemented at the EPG or elsewhere.
  • the EPG 108 itself may be configured and/or designed to perform such actions without necessarily being dependent on the VM mobility function 1 10.
  • a subscriber-specific VM instance may be symbolically represented by a large black dot, like dot 1 18 in FIG. 5, dot 145 in FIG. 6, and dots 165 and 174 in FIG. 7. FiG.
  • FIG. 5 shows a high level sequence diagram 118 of the initial binding between an EPG such as the EPG 108 in FIG, 4 and a DC-based V such as the VM 58 where a subscriber-specific VM instance 118 is created.
  • This initia! binding sequence may take place, for example, when a UE initiates its first PDN session in the carrier network 87.
  • Such UE may be considered as a "new" UE in the context of setting up the initiai binding, in the embodiment of FiG.
  • the VM Mobility function 110 is shown to be part of a Software Defined Networking Controiier (SDN GIL) 120 and not as part of the EPG 108 to illustrate how flexibly the CN-based control over S mobility may be accomplished using teachings of particular embodiments of the present disclosure. It is understood that, in one embodiment, the VM mobility function 110 may not have to be a part of the SDN controiier 120, which may already exist in the carrier network 87, but may be implemented at the EPG 108 or elsewhere in the EPC 90. in one embodiment, the SD controller 120 may be impiemented in the EPG 108 along with the VM mobility function 110, which may result in the EPG configuration similar to that shown in FIG. 4.
  • SDN GIL Software Defined Networking Controiier
  • the SDN controller 120 may be implemented anywhere in the carrier network 87 (FIG. 4) including, for example, in a node in the CN 90 other than the EPG 108 or within a node in the access network 30.
  • SDN controiier 120 is implemented with VM mobility function 110, then it may be preferable to implement it as part of the CN 90 to effectively support the CN-based VM mobility control as per teachings of particular embodiments of the present disclosure, it is understood that an SDN controller is an application in software- defined networking that manages flow control to enable intelligent networking.
  • SDN controllers are based on protocols, such as OpenFSow (OF), that allow servers to tell network switches where to send packets.
  • OF OpenFSow
  • all communications between virtualized applications may go through the SDN CTL 120, which may choose the optimal network path for application traffic.
  • network routers may implement a control plane with control information or routing tables indicating how to route a data packet, and a user plane for handling user data packets to be routed according to the control information.
  • An SDN controller may separate the control plane off the network hardware, such as the EPG 108 or other gateways/routers, and run it as software instead, thereby facilitating automated network management and making it easier to integrate and administer business applications, including virtualize applications and cloud-based services.
  • the UE 27 may initiate a PDN session and may send a session request with appropriate APN ID and Subscriber ID (for example the IMS! assigned to the UE).
  • the request may propagate through the carrier network 87 and may eventually be received at the EPG 108.
  • network entities such as the BNG 38 in FiG. 4 and a Broadband Policy Control Framework (BPCF) (not shown in FIG.
  • the EPG 106 may notify the PCRF 44 (or the BPCF for broadband clients, as the case may be) at message flow 123 that a session request is received from a new UE (here, the UE 27), the gateway (GW) from which the UE's request is received, the location of the UE 27, and the IP address ("fP@" in FiG. 5) from which the request is received.
  • the PCRF 44 may notify the SDN controller 120 of this session request from the new UE 27 and network operator's service policy such as guaranteed QoS, allocable bandwidth, the maximum threshold for latency delay, and so on applicable to this UE's subscriber, in one embodiment, through its V Mobility function 1 10, the SD controller 120 may select an existing VM service instance or request the VM Management function 114 to create a new VM service instance for the UE's PDN session, as indicated at message flow 125.
  • network operator's service policy such as guaranteed QoS, allocable bandwidth, the maximum threshold for latency delay, and so on applicable to this UE's subscriber, in one embodiment, through its V Mobility function 1 10, the SD controller 120 may select an existing VM service instance or request the VM Management function 114 to create a new VM service instance for the UE's PDN session, as indicated at message flow 125.
  • the SDN controller 120 may also request the V management function 114 for associated VM infrastructure (also referred to as "VM infra" in FIG, 5) resources such as, for example, computing resources, storage resources, and networking resources.
  • the VM management function 114 may allocate such resources to the UE 27 based on many factors such as, for example, the availability of th corresponding shared hardware. In the embodiment of F!G.
  • the VM management function 114 creates a subscriber-specific, new VM instance, for example the VIVI instance 118, at the VM 58 in the group of VMs 54 in the DC 100 in accordance with the virtual software image and network configuration requested by the SD controlier 120 (using, for example, its VM mobiiity function 110), as indicated at message flow 127.
  • the mage may specify a software to be loaded specific to the virtual application associated with the VM instance 118.
  • the networking configuration may specify the "networking" required to setup a specific VM (here, the VM 58),
  • the EPG 108 in conjunction with the VM mobiiity function 110 at the SDN CTL 120— may configure a GRE tunnel to the VMs 58-60 in the DC 100 either in parallel to the events at sequences 125 and 127, or after the conclusion of the events at sequences 125 and 127.
  • the EPG 108 may also configure VM (or VM infra) tunnei endpoints for the GRE tunnel by including GRE protocol keys or static Layer-2 Tunneling Protocol version 3 (L2TPv3) !P Security (!PSec) keys, as well as by including GRE protocol ID or static L2TPv3 ID as part of the configuration.
  • the L2TP is an OS! Layer-2 (L2, the data-link layer) tunneling protocoi used to support Virtual Private Networks (VPNs) or as part of the delivery of services by internet Service Providers (ISPs) including, for example, the DC-based content providers.
  • IPSec is often used with L2TP to secure L2TP packets by providing confidentiality, authentication, and integrity.
  • the combination of these two protocols is generally referred to as "l ⁇ TP/lPSec.”
  • additional in-band tunnel set-up mechanisms may apply.
  • the EPG 108 may setup additional or alternative tunnels to the VMs 58-60 such as, for example, the GTP tunnel 112 (shown in FIG. 4) with a corresponding Tunnel Endpoint ID (TEID) or an L2TFv3 tunnel.
  • TEID Tunnel Endpoint ID
  • L2TFv3 tunnel at least one new data plane tunnei may be now established between the EPG 108 and the DC-based VMs 58-60 as indicated at reference numeral "130.”
  • such tunnel may allow the CN-based EPG 108 to control mobility of a subscriber-specific instance from one VM to another.
  • the SDN controller 120 may instruct the EPG 108 to map subscriber access session information to the respective transport funnel (whether a G E tunnel, a GTP tunnei, etc) to the VMs 58-80.
  • Such access session information may include, for example, PDN connection information such as APN ID, and information about a Point-to- Point Protocol (PPP) session (if applicable).
  • PPP Point-to- Point Protocol
  • a PPP session may be used, for example, during dial-up cable connections to the Internet or the CP's resources at the DC 100 via a telephone modem, or during other types of broadband access including broadband access via a cellular network.
  • the access session information may also include information about a Dynamic Host Configuration Protocol (DHCP) subscriber, which may be the UE 27, for example, receiving IP addresses that are dynamically allocated using the DHCP protocol, and the like.
  • DHCP Dynamic Host Configuration Protocol
  • the EPG 108 may create a binding between the VM instance number for the subscriber-specific VM instance 118, which may have been supplied to the EPG 108 by the VM management function 1 14 through the tunnel created at message flow 130, and each of a number of other parameters such as, for example, the UE's IMSI (for the UE 27), AP ID (received at message flow 122), tunnel ID for the tunnel created at message flow 130 (which may be a GTP tunnel ID or TEID in case of the GTP tunnel 1 12 in FIG.
  • DHCP Dynamic Host Configuration Protocol
  • the EPG 108 may be now able to communicate directly to the VMs 58-60 to receive from the VM management function relevant Key Parameter Index (KPl), such as hardware failure, overload indication, memory shortage, lack of compute-processing capacity, etc., to move the UE's session to a different VM instance (as discussed below with reference to the exemplary embodiments in FIGs, 6 and 7), etc.
  • KPl Key Parameter Index
  • the EPG 108 may then set up a PDN session with the UE 27 (as indicated at message flow 133), thereby allowing the subscriber of the UE to have access to the corresponding virtualized application or cloud service,
  • FIGs, 6A and 6B illustrate an exemplary sequence diagram (or message flow) 135 reiated to a bandwidth-based VM mobility trigger according to one embodiment of the present disclosure.
  • the subscriber UE 27 initiates a video content session (e.g., via YouTube ® , Netflix ® , etc) such as, for example, a movie download or delivery of streaming audio-visual content.
  • the EPG 108 may be informed of this event (i.e., the UE's initiation of a virtualized application session) either via a Diameter protocol-based Gx message, which is used to exchange policy decisions-related information) from the PCRF 44 or from its own DPI application/function (discussed earlier), or from a direct RESTAA/eb Services notification from the relevant Content Provider (CP), or through other means. Consequently, the EPG 108 may retrieve UE's 27 policy for this video application from the PCRF 44 as indicated at referenc numeral "140". This policy may be specific to the UE's subscriber and may indicate, for example, what bandwidth and guaranteed QoS the subscriber is entitled to for this video content session application.
  • the EPG 108 may retrieve the current loading condition of the relevant VMs 58-80,
  • Thes VMs may be those VMs that support the applications for a given CP.
  • these VMs may be owned, operated, or managed by the CP, or a third party, including the operator of the network 87, through an SLA with the CP.
  • the EPG 108 may decide to move the UE-specific video content session to a different VM instance based on a number of factors such as, for example, the network operator's policy related to charging, QoS, bandwidth availability, and so on applicable to the UE/subscriber 27, the type of the current video application (e.g., bandwidth-intensive or not), current location of the UE (e.g., geographically near a Vfvl that is different from th VM 58 which is currently hosting the UE's subscriber-specific VM instance 145), loading condition of relevant VMs, and the like.
  • the EPG 108 may determine that the video application associated with the UE's VM instance requires high bandwidth, which may not be satisfied by the current VM 58.
  • the EPG 108 may instruct the VM management function 114 to move, scale up, orrepiicate the UE's VM instance to another location/VM that can satisfy the high bandwidth requirement, in response, as indicated at message f!ow 147, the VM management function 14 may move (as symbolically illustrated by arrow 148) the UE's entire session to another VM instance (here, a VM instance 149 on the different VM 80).
  • This new VM 60 may be selected by the VM management function 1 4 because it may be better equipped to handle the UE application's high bandwidth requirement.
  • the VM Management function 1 14 may return a new V instance number (for the VM instance 149 created on the new VM 60 when the subscriber-specific VM session was moved to this new VM 60) to the EPG 108.
  • the VM management function 1 14 may also update its binding between the GIF tunnel ID (of the GTP tunnel 112 between the EPG 108 and the VM Management function 1 14 as shown in FiG. 4) and this new VM instance number.
  • the VM Management function 114 may update its binding between that funnel/interface !D and the new VM instance number, as indicated at message flow 150.
  • the EPG 108 also updates its bindings between the new VM instance number and UE's IMS!, APN ID, GTP tunnel ID, etc., as indicated at biock 151 in FIG. 6B (which is a continuation of FIG. 6A).
  • the VM mobility related messaging flows in FIG. 6 may be transparent to the UE 27. Once the UE's VM instance is moved from the VM 58 to the VM 80, the UE may continue receiving high quality video at the requisite bandwidth (as noted at block 152).
  • FIGs. 7A and 7B ⁇ collectively TIG. 7" depict an exemplary message flow or sequence diagram 155 related to latency delay- and UE locationo -based VM mobility trigger according to one embodiment of the present disclosure
  • the UE 27 may initiate a delay-sensitive session such as a financial transaction session by a broker, a medical information- sharing session by an emergency responder, and the like that requires low latency delay during execution.
  • the EPG 108 may be informed of the UE's Initiation of a virtuaSized application or cloud-based service session either via a Diameter protocol-based Gx message from the PCRF 44 or from its own DPI application/functiort (discussed earlier) or from a direct REST/Web Services notification from the relevant CP (for example, a brokerage house, art emergency service network, and the like) or through other means. Consequently, the EPG 106 may retrieve UE's 27 policy for this delay- sensitive appiication from the PCRF 44 as indicated at reference numeral "160".
  • This policy may be specific to the UE's subscriber and may indicate, for example, what delay threshold and guaranteed QoS the subscriber is entitled to for this delay-sensitive application.
  • the EPG 108 may retrieve the current loading condition of the relevant VMs (e.g., the VMs 58-60 in the group of VMs 54). These VMs may be those VMs that support the applications for a given CP. As mentioned earlier with reference to FIG. 6, in one embodiment, these VMs may be owned, operated, or managed by the CP, or a third party, including the operator of the network 87, through an SLA with the CP.
  • the EPG 108 may decide to keep the UE-specific application session to the current VfVl 58 (i.e., the subscriber-specific Vfvl instance 165 at the VM 58) based on a number of factors such as, for example, the network operator's policy related to charging, QoS, latency requirements, and the like applicable to the UE/subscriber 27, the type of the current appiication (e.g., a low latency appiication or not), current location of the UE (e.g., geographically near the V 58 that is currently hosting the UE's subscriber-specific VM instance 185), loading condition of relevant VMs, and so on.
  • the network operator's policy related to charging, QoS, latency requirements, and the like applicable to the UE/subscriber 27, the type of the current appiication (e.g., a low latency appiication or not), current location of the UE (e.g., geographically near the V 58 that is currently
  • the EPG 108 may determine that the current application associated with the UE's Vfv instance 185 requires low latency delay, which may be satisfied by the current VM 58 and, hence, there may not be any need to move the UE's Vfvl instance 165.
  • the messaging flows in FIG. 7 A may be transparent to the UE 27. Once the EPG 108 determines to maintain the UE's current session at the current Vfv 58, the UE 27 may be allowed to resume its high-speed (i.e., low latency) application session (as noted at block 168).
  • the UE 27 may start, for example, a video session and move far away from its originating location suc as, for example, the location associated with UE's sessio initiation at message flow 157.
  • the UE 27 may have physically moved far away from the location where VM 58 is implemented that hosts Its Vfvl Instance 165.
  • the EPG 108 may receiv a trigger from its own application or from another network node in the EPC 90 informing the EPG 106 of the UE's geographical movement.
  • the EPG 108 may decide to move the UE's VIVI instance 65 to a Data Center (DC) that is geographicall closer to the UE's current (physical) location as noted at block 168 so as to better fulfil! the low latency delay requirement of the subscriber's delay-sensitive session. Consequently, as indicated at message flow 170, the EPG 108 may instruct the VSV Management function 114 to move the UE's current VIVI instance 165 to another location that can satisfy the low latency requirement of UE's delay-sensitive application.
  • DC Data Center
  • the VM management function 1 14 may move the UE's session to another VM 66 by creating a new subscriber-specific VM instance 174 at the VM 66, as symbolically shown by arrow 175.
  • the new VIVI 66 may be at a different physical location ("Location 8" in FIG. 7 as opposed to "Location A" of the original VM 58) which may be geographically closer to the UE's current physical location.
  • FIG, 7 I.e., FIGs.
  • the DC 100 hosts its VMs in a distributed manner ⁇ i.e, the group of VMs 54 may be at a physical location ("Location A") that is different from the physical location ("Location B") where the other group of VMs 56 is hosted.
  • the VMs at Location B may not belong to the DC 100, but may be associated with a completely different data center (e.g., the DC 101 in FIG. 2) that hosts VMs managed by the VM Management function 114. This other data center may be at a different geographical location, but may still be owned, operated, or managed by an entity or CP associated with the DC 100.
  • the new data center may be owned, operated, or managed by an entity that is different from the entity associated with the DC 100.
  • the new data center at Location B may still host VMs that support the applications that were supported by the VMs at Location A.
  • the VM Management function 114 may return a new VM instance number (for the VM instanc 174 created on the new VM 68 when the subscriber-specific VM session was moved to this new VM 66) to the ERG 108,
  • the VM management function 1 14 may also update its binding between the GTP tunnel ID (of the GTP tunnel 1 12 between the EPG 108 and the VM Management function 114 as shown In FIG, 4) and this new VM instance number, in case of any other type of tunnel or interface (e.g., L2TPv3, GRE, VXLAN, etc.) with a core network instead of, or in addition to, the GTP interface discussed here, the VM Management function 1 14 may also update its binding between that tunnel/interface ID and the new ViVI instance number.
  • any other type of tunnel or interface e.g., L2TPv3, GRE, VXLAN, etc.
  • the EPG 108 also updates its bindings between the new VM instance number and UE's SMSI, AP ID, GTP tunnel ID, etc., as indicated at block 178 in FIG, 78.
  • the VM mobiiity related messaging flows in FSG. 7 may be transparent to the UE 27. Once the UE's VM instance is moved from the VM 58 to the VM 66, the UE may continue receiving high quality video at the requisite low latency delay (as noted at block 80).
  • the VM mobility in FIG. 6 may be considered an example of an intra-DC (i.e., within the same DC 100) mobility of VMs
  • the VM mobiiity in FIG. 7 may be considered an example of an inter ⁇ DG (i.e., between two difference DCs) mobiiity of VMs when the VMs at Location-B belong to a data center that is different from the DC 100 to which the VMs at Location-A belong.
  • FIGs. 8A through 8C illustrate exemplary configurations 185, 218, and 225, respectively, regarding how to provide appropriate network connectivity between an operator's core network such as EPC 90 in FIG. 4 and a data center such as DC 100 in FIG. 4 to support the VM mobs!ity solution according to particular embodiments of the present disclosure.
  • the embodiments in FIGs. 8A-8C are mor focused on functional aspects of how such network connectivity may be provided in practice to accomplish intra-DC and inter-DC mobiiity of a VM instance.
  • the configurations in FIGs, 8A-8C may not exactly correspond with the configuration in FIG. 4.
  • the VM Management function 1 14 is not shown in.
  • FIG. 8A-8G the functionality may be accomplished through a Cloud Orchestrator 188.
  • FIGs. SA-8C the GTP tunnel 112 is shown with different tunnel endpoints in FIGs. SA-8C, that does not mean that FIGs. 8A-SC contradict FIG. 4 because of absence of a depiction of a GTP tunnel connected to the VMs 190-193 in FIGs, 8A-8C.
  • the functional layouts in FIGs, 8A-8C implement the configuration depicted in FIG. 4,
  • a Cloud Orchestrator functionality or environment, is shown to have been implemented in a distributed manne— in the carrier network 87, for example as part of an SDN controller at block 187, wherein the SDN controller may be part of the C 90 or, more specifically, a part of the EPG 108, and as a c!oud-based controller 188 for the DC 100.
  • the functionality of the Cloud Orchestrator 187 may be performed by the EPG 108.
  • the controller 188 may be implemented as part of the DC 100. !n the embodiments of FIGs. 8A-8C, both of these implementations 187-188 co-operate with each other and jointly provide the Cloud Orchestrator functionality.
  • a Cloud Orchestrator may provide an automated support for virtualization management such as, for example, management of (i) instantiation or creation of a VM, (is) decommissioning of a VM, (iii) Fault Configuration Accounting Performance Security (FCAPS) (e.g., how to account or charge for subscriber usage of VM services, how to provide security that two virtualized applications do not "see” the data of each other, how to accomplish fault tolerance), etc.
  • FCAPS Fault Configuration Accounting Performance Security
  • each of the C!oud Orchestrators 187-188 in FIGs. 8A-8C may include features of the VM Management function 114.
  • the VM management functionality also may be implemented in a distributed manner through the Cloud orchestration environment.
  • a VM may have specific requirements for network connectivity or performance.
  • a VM may require a specific Network Interface Controller (NIC) chipset, interface bandwidth (B ), specific instruction set— such as an instruction set for an Sntef 8 chipset or an Advanced Micro Devices, Inc. (AMDTM) chipset, etc.
  • NIC Network Interface Controller
  • B interface bandwidth
  • AMDTM Advanced Micro Devices, Inc.
  • the Cloud Orchestrator 188 may have to find the right target server or VIVI based on the requirement of mobility of a VM (or VM instance). Therefore, in some embodiments, the Cloud Orchestrator 186 may need appropriate network connectivity information, which may be obtained, for example, from a DC switch 195, which may be configured to receive such connectivity information through one of the routing information delivery options shown in FIGs. 8A-8C and discussed below.
  • FIGs. 8A-8C some exemplary "service" VMs 190-193 (which may be considered as representatives of the VMs in the groups of V s 54-56 in FfG. 4) in the DC 100 are shown having respective "services" or applications hosted thereon. These services or applications ar Illustrated using different symbolic representations, for example an online search service at VM 190, a World Wide Web application at VM 191 , a security firewall service at VM 192, and an online gaming application at VM 193.
  • a DC switch 195 for the DC 100 is also shown in FIGs.
  • the switch 195 may be shared by the VMs 190-193, or each VM 190-193 may implement a corresponding portion of the switch 195, for example when the switch 195 is a software switch.
  • the switch 195 may include multiple switches; however, for ease of discussion, the singular term “switch” is used herein.
  • This switch 195 may be a software (SW) or hardware (HW) switch operating under the OpenFiow (OF) protocol mentioned earlier.
  • SW software
  • HW hardware
  • OF OpenFiow
  • a "switch” is a device that channels incoming data from any of multiple Input ports (not shown) to the specific output port that will take the data towards its intended destination.
  • the destination address may require a look-up in a routing table (which may be maintained at a router such as, for example, the router 200 associated with the DC 100 in FIGs. 8A-8B or may be available at the EPG 108).
  • a routing table which may be maintained at a router such as, for example, the router 200 associated with the DC 100 in FIGs. 8A-8B or may be available at the EPG 108.
  • some new switches also called IP switches
  • the switch 195 in the DC 100 may need routing information such as a routing table to enable the switc 195 or, in some embodiments, the Cloud Orchestrator 188 to appropriately route the outgoing packets or VfVls/VM instances to their correct destinations, either via the router 200 in the embodiments of FSGs.
  • FIGs, 8A-8B may be used to convey such routing information to the DC switch 195 to populate the DC switch with appropriate routing information to manage routing of data packets as wei! as mobility of VMs/V instances.
  • DCGW Data Center Gateway
  • the routing information is conveyed from the ERG 108 to the switch 195 directly via the GTP or GRE tunnei 112 because the switch 195 may be an IP switch capabie of performing routing itself or may be part of a Vfvl that has a built-in mechanism for appropriate network connectivity (e.g., routing, load-balancing, tunnel setup, etc.).
  • Such direct connection is i!iustrated by one of the tunnel endposnts 202 "connected" to the switch 195 and the other endpoint 204 "connected" to the EPG 108.
  • the DC 100 may have switches that are capable of such native support for routing and, hence, the GTP tunnei 112 may provide a direct link between the DC switch(es) 195 and the EPG 106.
  • routing information such as a routing table for a data packet, or for the mobility of a Vfvl or Vfvl instance associated with a PDN session of the subscriber device 208 (which may represent any of the UEs 24-28 and 92-93 discussed earlier) may be directly delivered to the DC switch 195, which can then instruct the route 200 fo appropriate routing or inform the cioud orchestrator 188 for appropriate routing to support V mobility requirements.
  • the vertical dotted line 209 may symbolically represent a "boundary" or separation between the operator's carrier network 87 and the DC 100, and associaied entities such as the router 200 and DC-based cloud orchestrator 188,
  • the Cioud Orchestrator 187 may provide an Application Programming Interface (API) (symbolically shown by dotted arrow "210") to the DC-associated Cloud Orchestrator 188 to enable the Cioud Orchestrator 188 to create VMs (as symbolically indicated by dotted arrow "212") as well as “service chains” (as symbolically indicated by dotted arrow "214").
  • API Application Programming Interface
  • the EPG 108 may have certain requirements for different virtualized applications.
  • the EPG 108 may identify which subscribers should have their data traffic go through a firewall application in the DC 100 and which subscribers should not.
  • the "service chain" in the API may identify a subscriber-specific set or “chain” of services such as a firewall application, the earlier-discussed Deep Packet Inspection (DPI) function, and so on that are allowed for a subscriber's packet.
  • DPI Deep Packet Inspection
  • a subscriber-specific "service chain” may be created in the DC switch 195 to configure the switch 195 for appropriate treatment of a subscriber's packet.
  • V s or fhe switch 196 in the DC may provide a built-in mechanism for appropriate network connectivity and, hence, the routing information may be directly delivered to the switch 195 via the tunnel 1 12.
  • the configuration 218 in FIG. 8B may require creation of a software overlay (symbolically represented at reference numeral "220") that builds the required connectivity environment on top of any DC solution. In other words, only a minimum level of support from the DC 100 (including the DC switch 195) is assumed in the configuration 218 in FIG, 88.
  • a software switch overlay 220 that may be configured as a virtual switch (or "vswitch") by fhe Cloud Orchesfrator 187 (as indicated at dotted arrow 222).
  • the configuration of the vswitch may include the service chain creation aspect, which may be similar to that shown at reference numeral "214" in FIG. 8A, except that the service chain may be created by the Cloud Orchestraior 187 instead of the DC-associated Cloud Orchestrator 188.
  • the vswitch 220 may be in communication with the DC switch 195 and the router 200.
  • the second endpoint 202 of the GTP tunnel 12 may now "connect" to the router 200 (instead of the DC switch 195 directly as in the embodiment of FIG. 8A), which may receive the routing table and any other related routing information from the EPG 108 via the tunnel 1 12.
  • This routing information may be then supplied from the router 200 to the software overlay 220, which may, in turn, supply the routing information to the DC switch 195 for appropriate routing.
  • the software overlay 220 may support creation of "switch" VMs (not shown) for routing.
  • the aspect of creation of "switch" VMs at the software overlay 220 may be conveyed through the API at reference numerai "210 s as shown in FIG. SB.
  • the API may enable the Cioud Orchestrator 188 to create service V s 190-193 (as symbolically indicated by doited arrow "212") and switch VMs ⁇ as symbolically indicated by dotted arrow "223"), It is noted here that entities or actions having the same reference numerals in the configurations in FIGs. 8A and 8B are not discussed again with reference to discussion of FIG. 88. It is observed that, for simplicity of the drawing, the VM 193 is not shown in FIG. SB.
  • the configuration 225 in FIG. 8C may require creation of a hardware (HW) overlay, which is symbolically represented by reference numeral "227" and shown implemented as part of the hardware of a Data Center (DC) Gateway (GW) 228, which may be in communication with the DC switch 195.
  • the hardware switch overlay 227 may provide the required connectivity environment on top of the DC switch 195. Sn other words, like the configuration 218 in FIG. 8B, only a minimum level of support from the DC 100, including the DC switch 195, is assumed in the configuration 225 in FIG. 8C as well.
  • additional routing information to the switch 195 is supplied through the hardware switch overlay 227 that may be configured through an API (from the Cloud Orchestrator 187) as part of configuring the hardware of the DC GW 228 (as indicated at dotted arrow 230).
  • the configuration of this GW-based HW switching overlay 227 may include the service chain creation aspect, which may be similar to that shown at reference numeral "214" in FSG. 8A, except that the service chain may be created by the Cioud Orchestrator 187 instead of the DC-associated Cioud Orchestrator 188.
  • the HW GW 228 associated with the DC 100 may be configured to implement The Onion Router (TOR) software for enabling online anonymity.
  • TOR Onion Router
  • the DC GW 228 may implement the functionality of an IP edge router to transfer data between a local area network (such as, for example, a CP-specific network (not shown) that includes the DC 100) and a wide area network (e.g., the Internet or the cellular -operator s -network 87), In this embodiment, the GW 228 may sit at the periphery, or edge, of a network.
  • a local area network such as, for example, a CP-specific network (not shown) that includes the DC 100
  • a wide area network e.g., the Internet or the cellular -operator s -network 87
  • the second endpoint 202 of the GTP tunnel 1 12 may now "connect" to the GW 228, which may receive the routing table (and any other related routing information) from the EPG 108 via the tunnei 1 12. This routing information may be then supplied to the DC switch 195 through the hardware switch overlay 227. It is noted here that entities or actions having the same reference numerals in the configurations in FIGs. 8A and 8C are not discussed again with reference to discussion of FIG. SC.
  • the mobility control function such as the VM Mobility function 110 is external to the GW 228 (for example at the SD controller as shown in FIG. 5) or at another service automation function, which may be part of the Vtvl Orchestrator 187 as shown in FIG. 8C, and when GTP is used as tunnei technology, then an option is to overload existing tunnel setup mechanisms, for example the S5, S8, or S2a interfaces in LTE, to allow an existing GW such as the GW 228 to connect to the VM infrastructure at th DC 100.
  • the mobility control function such as the VM Mobility function 110 is external to the GW 228 (for example at the SD controller as shown in FIG. 5) or at another service automation function, which may be part of the Vtvl Orchestrator 187 as shown in FIG. 8C
  • an option is to overload existing tunnel setup mechanisms, for example the S5, S8, or S2a interfaces in LTE, to allow an existing GW such as the GW 228 to connect to the VM infrastructure at th DC 100.
  • FIG. 9 depicts a block diagram of an exemplary network node such as the ERG 108 in a cor network such as the EPC 90 in FIG. 4 through which the VM mobility solution according to particular embodiments of the present disclosure may be impiemented.
  • the network node 108 may be configured to anchor therein a VM session associated with a subscriber-specific VM instance of a mobile subscriber in the operator's carrier network 87.
  • the network node 108 may also control the mobility of that VM instance from one VM to another.
  • EPG-related functionalities discussed earlier with reference to FIGs. 3-8 may be performed by the network node 108.
  • the network node 108 may implement a VM Mobility function such as the VM Mobility function 110 in FIG. 4, which may configure the network nod 108 to perform these EPG-related functions.
  • the network node 108 may include a processor 235, a memory 237 coupled to the processor 235, and an interface unit 240 also coupled to the processor 235.
  • the program code for the VM Mobilit function 110 may be stored in the memory 237.
  • the processor 235 may configure the network node 108 to perform various EPG-reiated functions discussed ear!ier with reference to FIGs. 3-8.
  • the memory 237 may a!so store data and other related communications such as routing information, subscriber-specific policy information received from the PCRF 44, loading information for different V s in the DC 100, information related to a subscribers PDN session or usage of a particular virtual application/cloud based service, as well as outputs from the processing performed by the processor 235. These data or communications may be used by the processor 235 to perform various EPG-based tasks such as establishment of the GTP tunnel 112, transmission of routing information to the DC switch 195, instructing the VIV1 Management function 114 to move a VM instance from one V to another, and so on, as discussed earlier with reference to FIGs. 3-8.
  • the interface unit 240 may provide a bi-directtonai interface to enable the EPG 108 to communicate with other network nodes/entities or functions in the core network 90 and also to communicate with other entities, functions, or elements such as the VMs in the DC 100, the Vivl Management function 1 4, and the like beyond the CN 90.
  • the processor 235 may be configured in hardware or hardware and software (such as the VM Mobility function 110) to impiement EPG-specific aspects of the VM mobility solution as per teachings of particular embodiments of the present disclosure.
  • the processor 235 may be provided by the processor 235 executing instructions stored on a computer-readable data storage medium, such as the memory 137 in FIG, 9,
  • some or all aspects of the VM mobility solution provided herein may be implemented in a computer program, software, or firmware incorporated in a non-transitory computer- readable storage medium such as the memory 237 in FIG.
  • ROM Read Only Memor
  • RAM Random Access Memory
  • digital register a cache memory
  • semiconductor memory devices magnetic media such as internal hard disks, magnetic tapes and removable disks, magneto-optical media, and optical media such as CD-ROM disks and Digital Versatile Disks (DVDs).
  • the memory 237 may employ distributed data storage with without redundancy.
  • the functionality desired of the node 108 may be obtained through suitable programming of the processor 235 using the VM Mobility function 110.
  • the execution of the program code by the processor 235 may cause the processor to perform as needed to support the VM mobility solution as per the teachings of the present disclosure.
  • the EPG 108 may be referred to as "performing,” “accomplishing,” or “carrying out” ⁇ or similar such other terms) a function or a process or a message flow step, such performance may be technically accomplished in hardware and/or software as desired.
  • the network operator or a third party such as the manufacturer or supplier of the CN 90 or the EPG 108 may suitably configure the network node 108 through hardware and/or software based configuration of the processor 235 to operate as per the particular requirements of the present disclosure discussed above.
  • the processor 235 may include, by way of example, a general purpose processor, a special purpose processor, a conventional processor, a digital signal processor (DSP), a plurality of microprocessors, one or more microprocessors in association with a DSP core, a controller, a microcontroller, Application Specific Integrated Circuits (ASICs), Field Programmable Gate Arrays (FPGAs) circuits, any other type of integrated circuit (!C), and/or a state machine.
  • the processor 235 may employ distributed processing in certain embodiments.
  • network nodes in the CN 90 such as the PCRF 44, the MME 48, and so on may also be implemented by at least one processor, a memory coupled the at least one processor, and computer- readable instructions stored in the memory.
  • the computer-readable ' instructions when executed by the at least one processor, may configur the processor to implement various relevant aspects described hereinbefore.
  • Alternative embodiments of the network node 108 or any of the other nodes in the CM 90 may include additional components responsible for providing additional functionality, including any of the functionality identified above and/or any functionality necessary to support the solution as per the teachings of the present disclosure.
  • the foregoing describes a system and method for controlling mobility of a subscriber-specific VM instanc associated with a subscriber-specific VM session from one VM to another VM using a network node in a packet-switched CN such as an EPC in a mobile communication network.
  • a network node in a packet-switched CN such as an EPC in a mobile communication network.
  • the EPC or more specifically a network nod such as an EPG in the EPC, control the VM mobility for each subscriber to let the subscribers have the best user experience that the network can provide (In the context of cloud-based services or virtualized applications) and also enable the operators to deploy virtualized applications such as telecom apps, IT apps, web-related apps, and the like in an optimized way for their mobile subscribers.
  • the EPG may move a subscriber's Vfv instance between VMs (intra-DC or inter-DC) based on the cellular network operator's policy, network load, subscriber's application requirement, subscriber's current location, subscriber's SLA with the operator, etc.
  • the EPG may use GTP tunnels rooted at the EPG to data center VMs to govern intra-DC and inter-DC mobility of VMs and also to tie in the mobility triggers to service provider's PCRF policies.
  • Each VM session for the mobile subscribers may be anchored in the EPG, which may then assume the control of VM mobility for each subscriber by establishing a new GTP interface with the VMs at a DC.
  • the EPC ⁇ based control of VM mobility can provide optimization of cloud services accessed by a subscriber over a mobile connection.
  • innovative concepts described in the present application can be modified and varied over a wide range of applications. Accordingly, the scope of patented subject matter should not be limited to any of the specific exemplary teachings discussed above, but is instead defined by the following claims.

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

A system (85) and method (102) for controlling mobility of a subscriber-specific Virtual Machine (VM) instance from one VM to another VM using a network node (such as an Evolved Packet Gateway (EPG)) (108) in an Evolved Packet Core (EPC) (90) in a mobile communication network (87). The EPG may control the VM mobility for each subscriber in the context of cloud-based services or virtuaiized applications. The EPG may use GPRS Tunneling Protocol (GTP) tunnels (112) rooted at the EPG to Data Center (DC) VMs (58-60, 62-64, 66-68) to govern intra-DC and inter-DC mobility of VMs and also to tie in the mobility triggers to service provider's policies. Each VM session for the mobile subscribers is anchored in the EPG, which then assumes the control of VM mobility for each subscriber through the new GTP interface with the VMs. The EPC-based control of VM mobility can provide optimization of cloud services accessed by a subscriber over a mobile connection.

Description

VIRTUAL MACHINE': MOBILITY WITH EVOLVED PACKET CORE
CROSS-REFERENCE TO RELATED APPLICATIONS
This application claims the priority benefit under 35 U.S.C. §119(e) of U.S. Provisional Application No. 81/773,415 filed on March 6, 2013, the disclosure of which is incorporated herein by reference in its entirety.
TECHNICAL FIELD
The present disclosure generally relates to deployment of virtualized applications and cloud-based services for subscribers in a mobile communication network. More particularly, and not by way of limitation, particular embodiments of the present disclosure are directed to a system and method for controlling mobility of a subscriber-specific Virtual Machine (VM) instance (associated with a subscriber-specific VM session) from one VM to another VM using a network node in a packet-switched Core Network (CN) (such as an Evolved Packet Core (EPQ) in the mobile communication network.
BACKGROUND
Virtualized applications or cloud-based services are increasingly offered by cellu!ar service providers to their subscribers or supported by service providers in their cellular networks. These virtualized applications or cloud- based services may relate to telecommunications (e.g., wireless audio and/or video content delivery), Information Technology (IT) (e.g., remote diagnostics and troubleshooting), Internet or World Wide Web (e.g., online shopping, online gaming, streaming of audio-visual content, web surfing), etc. As is known, a virtualized application is a software application that is encapsulated (i.e., isolated or Ksandboxed!S) from the underlying operating system so as to allow it to run with different user operating systems. Virtualized applications may be imported to client computers without the need of installing them. Cloud-based services provide similar flexibility and portability across multiple users and multiple device platforms. For ease of discussion, the terms "virtualized application" and "cloud-based service" may be used interchangeably below. FIG. 1 illustrates an exemplary Fretwork configuration 20 showing how virtualized applications and cloud-based services are currently deployed for subscribers in a mobile communication network 22, The mobile communication network 22 may be a cellular telephone network operated, managed, owned, or leased by a wireless/cellular service provider or operator, in the discussion herein, the terms "wireless network," "mobile communication network," "operator network," or "carrier network" may be used interchangeably to refer to a wireless communication network, for example a ceiiular network, a proprietary data communication network, a corporate-wide wireiess network, and the like, facilitating voice and/or data communication with wireless devices such as the devices 24-28. The wireiess network 22 may be a dense network with a iarge number of wireiess terminals such as User Equipments or UEs operating therein. It is understood that there may be stationary devices such as Machine-to-Machine ( 2M) devices as well as mobile devices such as mobile handsets/terminals or UEs operating in the network 22.
!n the embodiment of FIG. 1 , the mobile communication network 22 is shown to Include an Access Network (AN) portion 30 coupled to a Core Network (CN) portion 32. The AN 30 may include multiple ceil sites (not shown), each under the radio coverage of a respective Base Station (BS) or Base Transceiver Station (BTS) 34-38, In FIG. 1, user devices 24-26 may be under the radio coverage of the BS 34, the user device 27 may be under the radio coverage of the BS 35, and the user devic 28 may be under the radio coverage of and in communication with the BS 36. In case of cellular access, the term "Access Network" may includ not only a Radio Access Network (RAN) portion including for example, a base station with or without a base station controller of a cellular carrier network (e.g., the network 22), but other portions as weil, such as a ceiluiar backhaul with or without a portion of the C 32. Different Radio Access Technology (RAT)— such as Wireiess Fidelity (WiFi) RAT— may be supported by its corresponding RAN. Generally speaking, the term "RAN" may refer to a portion, including hardware and software modules, of the servic provider's AN that facilitates voice calls, data transfers, and multimedia applications such as Internet access, online gaming, content downloads, video chat, etc. for the wireless devices 24-28.
in FIG, 1 , the BS 34 (e.g., a WiFi Access Point (AP)} is shown to be coupled to a backhaul portion that includes a Broadband Network Gateway (BNG) 38 that routes Internet Protocol (IP) traffic from/to broadband-enabled remote access devices (e.g., the devices 24-26) to/from the Internet (not shown) through the cellular operator's backbone network (including the GN 32). A BNG may serve as an access gteway point for subscribers, through which they connect to a broadband network or Internet or a cloud-based service platform. When a connection is established between a BNG and Customer Premises Equipment (CPE) (e.g., the devices 24-26), the subscnber(s) can access various broadband services provided by the network operator or a third party such as an Internet Service Provider (ISP). The BNG 38 may aggregate traffic from various subscriber sessions from an access network, for example a fixed-IP broadband access network (not shown in FIG. 1 ), a Wireless Local Area Network (WLAN), or a Wi-Fi network, and route that traffic to the CN 32 of the service provider for further processing. The access network may not be a Third Generation Partnership Project (3GPP) network. Using a BNG 38, different subscribers can be provided different cellular network services. This enables the service provider to customize the broadband package for each customer based on their needs.
On the other hand, each of the other two base stations 35-36 in FIG. 1 are shown to be coupled to a respective Third Generation (3G) RAN or Fourth Generation (4G) RAN (collectively referred to using the reference numeral "40" in FIG. 1) that provides radio interface to corresponding wireless devices 27-28 and enables these devices to communicate with various entities in the operator's network 22 (and beyond) using device-selected RAT. As shown in FIG. 1, a common CN functionality (I.e., C 32) may be shared by the 3G and 4G RANs 40. Alternatively, each 3G or 4G RAN may have its own associated CN, and some form of interworking may be employed in the operator's network 22 to link the two RAN-spedfic core networks. The base stations 34-38 may be, for example, evolved NodeBs (eNodeBs or eNBs), high power and macro-cell base stations or relay nodes, WiFi APs (Access Points), etc. These base stations may receive wireless communication from the respective wireless terminals 24-28 and other such terminals operating in the network 22, and forward the received communication to the CN 32 through the corresponding cellular backhaul or RAN portion. The wireless terminals 24-28 may use suitable RATs (examples of which are provided below) to communicate with the corresponding base stations in the RANs. in case of a Third Generation (3G) RAN, for example, the cellular backhaul (not shown) may include functionalities of a 3G Radio Network Controller (RNC) or Base Station Controller (BSC). Portions of the backhaul such as, for example, BSCs or RNCs, together with base stations may be considered to comprise the RAN portion of the network.
Some exemplary RANs 40 include RANs in Third Generation Partnership Project's (3GPP) Global System for Mobile communications (GSM), Universal Mobile Telecommunications System (UMTS), Long Term Evolution (LTE), and LTE Advanced (LTE-A) networks. These RANS include, for example, GERAN (GSM/EDGE RAN, where "EDGE" refers to Enhanced Data Rate for GSM Evolution systems), Universal Terrestrial Radio Access Network (UTRAN), and Evo!ved-UTRAN (E-UTRAN). The corresponding RATs for these 3GPP networks are: GSM/EDGE for GERAN, UTRA for UTRAN, E- UTRA for E-UTRAN, and Wideband Code Division Multiple Access (WGDMA) based High Speed Packet Access (HSPA) for UTRAN or E-UTRAN. Similarly, Evolution-Data Optimized (EV-DO) based evolved Access Network (eAN) is an exemplary RAN in 3GPP2's Code Division Multiple Access (CDMA) based systems, and its corresponding RATs are 3GPP2's CDMA based High Rate Packet Data (HRPD) or evolved HRPD (eHRPD) technologies. As another example, HRPD technology or Wireless Local Area Network (WLAN) technology may be used as RATs for a Worldwide interoperability for Microwave Access (WilvlAX) RAN based on Institute of Electrical and Electronics Engineers (IEEE) standards such as, for example, IEEE 802.16e and 802.16m. When the operator's network 22 is a 3GP network such as an LIE network, each of the wireless devices 24-28 may be a User Equipment (UE) or a Mobile Station (MS), in case of the operator's network 22 being an HRPD network, each of the wireless devices 24-28 may be an Access Terminal (AT) (or evolved AT). The wireless devices may also be referred to by various analogous terms such as a "mobile handset," a "wireless handset," a "terminal," and the like. Generally, each of the wireless devices may be any multi-mode mobile handset enabled, for example, by the device manufacturer or the network operator, for communications over corresponding RATs supported by associated RANs. Some examples of such mobile handsets/devices include cellular telephones or data transfer equipments (e.g., a Personal Digital Assistant (PDA) or a pager), smartphones (e.g., iPhone™, Android™ phones, Blackberry™, etc.), handheld or laptop computers, Bluetooth® devices, electronic readers, portable electronic tablets, interactive gaming units, etc. For the sake of simplicity, in the discussion herein, the term "UE" may be primarily used as representative of ail such wireless devices, that is AT's, fvlS's, or other mobil terminals, regardless of the type of the RANs/RATs (i.e., whether a 3GPP system, a 3GPP2 system, WiFi system, etc.).
The Core Network (CN) 32 may provide logical, service, and control functions such as subscriber account management, billing, subscriber mobility management, and the like, as well as Internet Protocol (IP) connectivity and interconnection to other networks such as the Internet or an internet-based service network such as a Data Center (DC) 42 or entities, roaming support, etc. In the embodiment of FIG. 1 , the CN 32 is an International Mobile Teiecommunications (IMT) CN such as a Third Generation Partnership Project (3GPP) CN. !n other embodiments, the CN 32 may be, for example, another type of IMT CN such as a 3GPP2 CN (for Code Division Multiple Access (CDMA) based cellular systems), or an ETSI TISPAN (European Teiecommunications Standards Institute TIPHON (Telecommunications and Internet Protocol Harmonization over Networks) and SPAN (Services and Protocols for Advanced Networks)) C . As shown in FIG. 1 , the CN 32 may be a packet-switched (or packet- based) core network, which also may be referred to herein as a "Mobile Packet Core" or "MPC." in one embodiment, the MFC 32 may be an Evolved Packet Core (EPC) of an LTE or LTE-A network. For ease of discussion, the terms "MPC" and "EPC" may be used interchangeably herein to refer to the all-IP, packet-based core network for LIE (or LTE-A). Previously, two separate and distinct core sub-domains— Circuit-Switched (CS) sub-domain for voice traffic and Packet-Switched (PS) sub-domain for data traffic— were used for separate processing and switching of mobile voice and data. However, in LTE, the EPC 32 unifies these two sub-domains as a single IP domain, thereby facilitating an end-to-end all-IP (packet-based) delivery of service in the LTE network (e.g., the carrier network 22)— from mobile handsets and other terminals with embedded IP capabilities, over IP-based eNodeBs, across the EPC, and throughout the application domain (including IP Multimedia Subsystem (IMS) as well as non-IMS domains).
Some exemplary functional elements (also interchangeably referred to herein as "network nodes" or "network entities") constituting the EPC 32 may include a Policy and Charging Rules Function (PCRF) 44, an Access Network Discovery and Selection Function (ANDSF) 45, a Serving GPRS Support Node (SGSN) 46 (wherein "GPRS" refers to General Packet Radio Service), an Evolved Packet Gateway (EPG) 47, a Mobility Management Entity (MME) 48, and an Online Charging System (OCS) 49. As is understood, one or more of these network nodes may be implemented in software only or as a combination of hardware and software. Additional network nodes of the EPC 32 are not shown in FIG. 1 for the sake of simplicity.
The PCRF 44 may operate in real-time and aggregate information to and from the access network 30, operationai support systems such as the MME 48 and the OCS 49, and other sources (not shown) to support the creation of rules and then automatically making policy decisions for each subscriber active in the carrier network 22. The operator may offer multiple services, Quality of Service (QoS) levels, and charging rules to its subscribers in the network 22. The PCRF 44 ma enable a network operator to provide innovative service models to its subscribers and implement corresponding charging rules for services used/subscribed by the subscribers. The PCRF 44 may be deployed as a stand-alone entity or may be integrated with different platforms such as billing, rating, charging, and subscriber databases.
As its name implies, the ANDSF 45 may assist a UE to discover non- 3GPP access networks— such as Wireless Fidelity networks (popularly known as "Wi-Fi" networks, such as an IEEE 802.11b Wireless Local Area Network (WLAN)) or WiMax networks— that can be used for data communications in addition to 3GPP access networks (e.g., HSPA or LTE) and to provide the UE with rules policing the connection to these networks.
The SGSN 46 may support the GPRS functionality in the CN 32 by providing delivery of data packets from and to the (GPRS-registered) mobile stations within its geographical servic area. The SGSN 46 may perform packet routing and transfer, mobility management (attach/detach and location management), logical Sink management, and authentication and charging functions.
The EPG 47 may function as a gateway between the PRC 32 and othe packet data networks, such as the internet, corporate intranets, and private data networks. The EPG 47 may be alternatively referred to as an Evolved Packet Data Gateway (ePDG) and may function to secure the data transmission with a UE connected to the EPC 32 over an untrusted non-3GPP access. The EPG 47 may be deployed with Gateway GPRS Support Node (GGSN) functionality only, as a combination of Serving Gateway (S-GW) and Packet Data Network Gateway (PDN-GW) network elements in the EPC 32, or as a combination of GGSN, S-GW, and PDN-GW network elements in the EPC 32. As is known, a GGSN is generally responsible for internetworking between a GPRS network and an external packet-switched network, such as the Internet. An S-GW routes and forwards user data packets, while aiso acting as the mobility anchor for the user plane during inter-eNB handovers and as the anchor for mobility between LTE and other 3GPP technologies. The S-GW may manage and store UE contexts such as, for example, parameters of the IP bearer service, network internal routing information, etc. A PDN-GW (or PGW) may provide connectivity from the UE to external Paoket Data Networks (PDNs) by being the point of exit and entry of traffic for the UE. A UE may have simultaneous connectivity with more than one PGW for accessing muitipie PDNs. A PGW may perform policy enforcement, packet filtering for each user, charging support, packet screening, etc. A PDN-GW may also act as an anchor for mobility between 3GPP and non~3GPP technologies such as Wifv!AX and 3GPP2 based CDMA 1x and EV-DO.
The MME 48 may control alii control plane functions related to subscriber and session management. Thus, the MME 42 may perform signaling and control functions to manage a UE's access to network connections, the assignment of network resources, and the management of the mobility states to support tracking, paging, roaming and handovers of UEs such as the UEs 24- 28,
The OCS 49 is a system that allows a mobile network operator to charge its customers or mobile subscribers, in real-time, based on their service usage. The OCS 49 may be oriented to ail subscriber types and service types, may offer unified online charging and online control capabilities, and also may be used as a unified charging engine for ail network services, making if a core basis for convergent billing in the network 22.
As shown in FIG. 1 , the MPC EPC 32 may be connected to a Data Center (DC) 42, which may be an !nternet-based service platform or service network hosting multiple virtuaiized applications (shown as 58-60, 82-84, and 66-68 in F!G. 1 ) or offering cloud-based services (not shown). In one embodiment, the DC 42 may be owned or operated by the operator of the carrier network 22. Alternatively, the DC 42 may be owned or operated by a third party Content Provider (CP) such as Amazon. comS , Google€i, YouTube€i, Netflix®, and the like, but subscribers of the carrier network 22 may be allowed access to the virtuaiized applications offered/supported by the DC 42 through appropriate service agreements between owner/operator of the DC 42 and the owner/operator of the mobile network 22. in the embodiment of FIG. 1 , an SGi reference point 52 may connect the EPC 32 and the mobile carrier- or operator- specific DC 42. This SGi reference point may correspond to the Gi reference point for Second Generation (2G) or 3G accesses as indicated in FIG, 1. The SGi is the reference point between the EPC 32 (more specifically, in one embodiment, the EPG 47 in the EPC 32) and another Packet Data Network (PDN) (here, the carrier data center 42). The packet data network may be an operator-external public or private packet data network or an intra-operator packet data network, for example for provisioning of IMS services.
The carrier DC 42 may deploy virtuaiized applications or cloud-based services using Virtual Machines (VMs). In FIG. 1 , three exemplary groups of VMs are shown using reference numerals 54-56. Each group may include three VMs, each identified by a pair of an instance of a virtuaiized application ("App") and an instance of a corresponding Operating System (OS). Thus, the first group of VMs 54 includes three App-OS pairs 58-60, the second group of ViVIs 55 includes the other three App-OS pairs 62-64, and the third group of ViVIs 56 includes another three App-OS pairs 66-68. The App instances may be of the same virtuaiized application, for example a streaming video application, or may be instances of different virtuaiized applications, for example a streaming video application, an online shopping application, an online search engine, a remote gaming application, and the like invoked by one or more subscribers in the network 22.
As is known, a Virtual Machine (VIV!) is a software implementation of a machine (i.e., a computer) that executes programs like a physical machine. Thus, a VM is a software-based, fictive computer that may be based on specifications of a hypothetical computer or emulate the computer architecture and functions of a real world computer. Each VM instance can run any operating system supported by the underlying hardware. Thus, users can run two or more different "guest" operating systems simultaneously, in separate "virtual" computers or VMs. Virtual machines may be created using hardware virtualization that allows a VfVl to act like a real computer with an operating system. Software executed on these VMs is separated from the underlying hardware resources. Thus, for example, a computer that is running Microsoft Windovvs® operating system may host a virtual machine that looks like a computer with a Linux® operating system. In that case, Linux-based software can be run o the virtual machine. In hardware viriualtzation, the "host" machine is the actual machine/computer on which th virtualization takes place, and the "guest" machine is the VM. The words "host" and "guesf are generally used to distinguish the software that runs on the physical machine from the software that runs on the VM. In a cloud computing environment where virtuafeed applications may b routinely deployed, running multiple instances of virtual machines on shared computing resources/hardware such as the shared hardware 70-72 shown in FIG. 1 may lead to more efficient use of computing resources, both in terms of energy consumption and cost effectiveness. The shared hardware 70-72 may be from a single computer or may include hardware resources from a distributed computing environment.
The software or firmware that creates and runs a virtual machine on the host hardware is called a "hypervisor," Virtual Machine Manager, or Virtual Machine Monitor (VMM). The VM presents the guest operating systems with a virtual operating piatform and manages the execution of the guest operating systems. Multiple instances of a number of different operating systems may share the virtualized hardware resources via the hypervisor. in FIG. 1 , a hypervisor 74 creates and manages VM instances 58-60 on the shared hardware platform 70, a hypervisor 75 creates and manages VM instances 62- 64 on the shared hardware piatform 71 , whereas a hypervisor 76 creates and manages VIV1 instances 66-68 on the shared hardware piatform 72.
Currently, virtual machine mobility (i.e., migration of a VM from one physical server to another) or mobility of a VM instance from one VM to another across Open Systems interconnection (OSS) Layer-3 (13) boundaries may be managed by a combination of a VM Management function 78 and a V Mobility function 79 in the carrier DC 42. These VM management and VM mobility functions may be supported using technologies like Virtual extensible Local Area Network (VXLAN) or proprietary network controller software for cloud/virtualization such as, for example, VMware59, Inc.'s VMotion™ software or the vCider™ software from Cisco Systems**. These network controller software technologies address the requirements of OS! L3 data center network infrastaicture in the presence of VIV1s in a multi-tenant environment (e.g., when the data center provides services to multiple cellular operators or to multiple subscribers of a single operator) and support VM-to-VM communication. As a result, inter-DC or intra-DC V mobi!iiy may be accomplished.
SUMMARY
A critical deficiency in data centers today is related to VM mobility across OSS L3 boundaries. As shown in FIG. 1 , the current placement of carrier DG 42 is completely separated from the carrier's mobile network 22. As a result, the VM Management 78 and VM Mobility 79 functions are independent of carrier's mobile network 22. Thus, a decision to move a subscriber's VM session between VMs (both intra-DC and inter-DC) is purely based on the hardware/software limitations of the carrier DC itself. As shown at reference numeral "60" in FIG. 1 , although the carrier DC 42 is connected to the EPC 32 via SGi/Gi interface 52, the inputs from the carrier's mobtie network 22 are not considered fo the VM mobility (both intra-DC and infer-DC) even though the mobile network 22 (more specifically, the EPC 32 in the mobile network 22} is the entity that has the most relevant information about a subscriber's mobility and account preferences. Current technology also does not address the details of how such VM mobility may be controlled using the EPC.
It is therefore desirable to have inputs from a carriers mobile network when moving a subscriber's VM instance between VMs (inter-DC or intra-DC). More specifically, given the EPC's knowledge of subscribers preferences and roaming. It is desirable to have the EPC in the carrier's network— and not an external/remote data center— control the VM mobiiity for each subscriber to let the subscribers have the best user experience that the network can provide (in the context of cloud-based services or virtuaiized applications) and also enable the operators to deplo virtuaiized applications (e.g., telecom apps, IT apps, web-related apps, etc.) in an optimized way for their mobile subscribers.
Particular embodiments of the present disclosure provide for the EPC moving a subscriber's VM instance between VMs (infra-DC or infer-DC) based on the cellular network operator's policy, network load, subscriber's application requirement, subscriber's current location, subscriber's Service Level Agreement (SLA) with the operator, etc. In one embodiment, the present disclosure proposes to use GPRS Tunneling Protocol (GTP) tunnels rooted at the EPC to data center VMs to govern intra-DC and inter-DC mobility of VMs and also to tie in the mobility triggers to service provider's PCRF policies.
In one embodiment, each VM session for the mobile subscribers may be anchored in the EPG during the PDN session establishment (e.g., with a data center that may be an operator-external public or private packet data network or an intra-operator packet data network (e.g., for provision of IMS services)). The EPG may assume the control of VM mobility for each subscriber by establishing a new GTP interface with the VMs at a DC. The EPG may create a new GTP tunnel per PDN session per subscriber. Respective GTP Tunnel Identifier (ID), Access Point Name (APN), subscriber ID (e.g., the International Mobile Subscriber Identity (IMS!) number), subscriber-specific VM instance number, etc., may now have binding with each other within the EPG. The VMs, on the other hand, may also bind the subscriber-specific VM instance number with corresponding GTP Tunnel ID. In particular embodiments, the VM mobility (e.g., mobility of a subscriber-specific VM instance from one VM to another) may be triggered based on one or more of the following: (i) subscriber's location change, (11) bandwidth and/or delay requirements associated with the (vlrtuailzed) application being used by the subscriber, (iii) SLA between the subscriber and the operator, (iv) change in the loading condition of the VMs in one or more DCs, and (v) network operator's charging rules for cloud-based services.
In one embodiment, the present disclosure is directed to a method for managing mobility of a subscriber-specific Virtual Machine (VM) instance from a first VM to a second VM for a mobile subscriber in a mobile communication network. The VM instance is initially created in the first VM thai is implemented at a first Data Center (DC) associated with the mobile communication network. The method comprises performing the following using a network node in a packet-switched Core Network (CN) in the mobile communication network: (1) anchoring a VMi session associated with the VM instance; and (ii) controlling the mobilit of the subscriber-specific V instance from the first VM to the second VM,. wherein the second VM is implemented at either the first DG or at a second DC that is different from the first DC.
!rt another embodiment, the present disclosure is directed to a network node in a packet-switched G in a mobiie communication network for managing mobility of a subscriber-specific VM instance from a first VM to a second VM for a mobiie subscriber in the mobile communication network. The VM instance is initially created in the first VM that is implemented at a first DC associated with the mobile communication network. The network node is configured to perform the following: (i) anchor, in the network node, a V session associated with the VM instance; and (ii) control the mobility of the subscriber-specific VM instance from the first VM to the second VM, wherein the second VM is implemented at either the first DC or at a second DC that is different from the first DC.
In a further embodiment, the present disclosure is directed to a system for managing mobility of a subscriber-specific VM instance from a first VM to a second VM for a mobile subscriber in a mobile communication network. The system comprises; (i) a first DC associated with the mobile communication network and implementing the first VM, wherein the VM instance is initially created at the first VM; (ii) a second DC associated with the mobile communication network, wherein the second DC is in communication with the first DC and is different from the first DC; and (iii) an Evolved Packet Core (EPC) of the mobiie communication network coupled to the first DC and the second DC, wherein the EPC is configured to perform the following; (a) anchor a VM session associated with the VM instance, and (b) control the mobility of the subscriber-specific VM instance from the first VM to the second VM, wherein the second VM is implemented at either the first DC or at the second DC.
Thus, the EPC-based control of V mobility in certain embodiments of the present disclosure lets the subscribers use applications that require Sow latency and/or high bandwidth (e.g., multimedia streaming and real-time gaming applications) and, hence, have the best user experience that the network can provide. This can provide optimization of cloud services accessed by a subscriber over a mobile connection. Thus, cellular network operators can deploy virtuaSized applications in an optimized way for their mobile subscribers. The operator could optimize both for the mobile end point (i.e., a subscriber's UE) and the VM DC positions (intra-DC as well as inter-DC).
BRIEF DESCRIPTION OF THE DRAWINGS
In the following section, the present disclosure will be described with reference to exemplary embodiments illustrated In the figures, in which:
FIG. 1 illustrates an exemplary network configuration showing how virtualized applications and cloud-based services are currently deployed for subscribers in a mobile communication network;
FIG. 2 is a diagram of an exemplary wireless system in which the VM mobility methodology according to the teachings of one embodiment of the present disclosure may be implemented;
FIG, 3 depicts an exemplary flowchart showing various steps that may be performed by a network node in an EPC to control VM mobility according to the teachings of particular embodiments of the present disclosure;
FIG, 4 shows details of a portion of the wireless system in FIG, 2 in which the VM mobility solution according to the teachings of one embodiment of the present disclosure may be implemented;
FIG. 5 shows a high level sequence diagram of the initial binding between an EPG and a DC-based VM (where a subscriber-specific VM instance is created);
FIGs. 6A and 6B illustrate an exemplary sequence diagram (or message flow) related to a bandwidth-based VM mobility trigger according to one embodiment of the present disclosure;
FIGs. 7A and 7B depict an exemplary message flow or sequence diagram related to latency delay- and UE location-based VM mobility trigger according to one embodiment of the present disclosure;
FIGs. 8A through 8C illustrate exemplary configurations regarding how to provide appropriate network connectivity between an operator's core network and a data center to support the VM mobility solution, according to particular embodiments of the present disclosure; and
FIG, 9 depicts a block diagram of an exemplary network node in a core network through which the VSV5 mobility solution according to particuiar embodiments of the present disclosure may be implemented.
DETAILED DESCRIPTIO
In the following detailed description, numerous specific details are set forth in order to provide a thorough understanding of the disclosure. However, it will be understood by those skilled in the art that the present disclosure may be practiced without these specific details, in other instances, well-known methods, procedures, components and circuits have not been described in detail so as not to obscure the present disclosure. It should be understood that the disclosure is described primarily in the context of a 3GPP (e.g., LTE) cellular telephone/data network, but it can be implemented in other forms of cellular or non-cellular wireless networks as well.
In the discussion herein, the terms "VIVI mobility" or "virtual machine mobility" are primarily used to refer to mobility of a VfVS instance from one VM to another. However, these terms may also broadly refer to migration of a VM from one physical server to another depending on the context of discussion or implementation. Thus, although the discussion below is given primarily in the context of controlling mobility of a subscriber-specific VM instance, such discussion is exemplary in nature and should not be construed as limiting applicability of the solution in particular embodiments of the present disclosure to controlling mobility of VM instances only. Rather, the teachings in particular embodiments of the present disclosure may equally appiy to situations that require control of mobility of VMs or different types of VM implementations.
FIG, 2 is a diagram of an exemplary wireless system 85 in which the VM mobility methodology according to the teachings of one embodiment of the present disclosure may be implemented. The system 85 is shown to include a cellular carrier network (or mobile communication network) 87 having a base station 89 and a Core Network (CN) 90. When the carrier network 87 is an LTE network, the base station 89 may be an eNodeB and the CN 90 may be a packet-switched C (i.e., an EPG). Two exemplary mobile units 92-93 representing mobiie subscribers operating in the network 87 are shown to be in wireless communication via respective radio Sinks 95-96 with the carrier network 87 through the base station 89, which is interchangeably referred to herein as a "mobile communication node," or simply a "node" of the network 87. The network 87 may be operated, managed, and/or owned by a wireless service provider or operator. As mentioned earlier, the base station 89 may be, for example, a base station in a 3G network, or an evolved Node-B (eNodeB or eNB) when the carrier network is an LIE network, and may provide a radio interface (e.g., an RF channel) to the wireless devices 92-93 via an antenna or antenna unit 97. The radio interface is depicted by the exemplary wireless links 95-96. On the other hand, when the carrier network 87 is a 3GPP2 s CDMA- based EV-DO network, the base station 89 may be an evolved Base Transceiver Station (eBTS). Additionally, the base station 89 and the Core Network 90 may support WiFi access network technology.
In case of a 3G carrier network 87, the mobile communication node 89 may include functionalities of a 3G base station along with some or all functionalities of a 3G Radio Network Controller ( NC). In other embodiments, the base station 89 may also Include a site controller, an access point (AP), a radio tower, or any other type of radio interface device capable of operating in a wireless environment. In one embodiment, the base station 69 may be configured to implement an intra-cell or inter-cell Coordinated Multi-Point (CoMP) transmission/reception arrangement. In addition to providing th air interface or wireless channel, as represented by wireless links 95-96 in FIG. 2, to the devices 92-93 via antenna 97, the communication node (or base station) 89 may also perform radio resource management (as, for example, in case of an eNodeB In an LIE system) using, for example, the channel feedback reports received from the wireless devices 92-93 operating in the network 87.
The wireless devices 92-93 in FIG. 2 are similar to the wireless devices 24-28 in FIG. 1 and, hence, earlier discussion of devices 24-28 remains applicable here and is not repeated herein for the sake of brevity. In summary, like the wireless devices 24-28 in FiG. 1 , each of the wireiess devices 92-93 in FIG, 2 aiso may be a UE, or an MS, or an AT (or evolved AT). Generally, the wireiess devices 92-93 may be any mu!ti-mode mobile handsets enabled for communications over a number of different RATs, Because examples of different types of "wireless devices" are already provided earlier under the "Background" section, such examples are not repeated herein for the sake or brevity. As noted earlier, for the sake of simplicity, in the discussion herein, the term "UE" may be primarily used as representative of all such wireless devices (i.e., AT's, MS's, or other mobile terminais), regardless of the type of the network 87 (i.e., whether a 3GPP network, a 3GPP2 network, a WiFi network, etc.) in which these devices are operational.
In the discussion herein, the terms "wireless network," "mobile communication network," "operator network," or "carrier network" may be used interchangeably to refer to a wireiess communication network {e.g., a cellular network, a proprietary data communication network, a corporate-wide wireiess network, a WiFi network, etc.) facilitating voice and/or data communication with wireless devices (lik the devices 92-93), The wireless network 87 may be a dense network with a large number of wireless terminals such as UEs operating therein. It is understood that there may be stationary devices such as M2M devices as well as mobile devices such as mobile handsets/terminals operating in the network 87.
Like the mobile communication network 22 in FIG. 1 , the carrier network 87 in FIG. 2 may also include the CN 90 as a network controller coupled to the base stations in its RANs (not shown) and providing logical and control functions, for example terminal mobility management, access to externa! networks or communication entities, subscriber account management, and the like in the network 87. Like the C 32 in FIG. 1 , the O 90 also may be an EPC and, hence, the earlier EPC-re!ated discussion in the "Background" section remains applicable to the EPC 90 as weil and such discussion is not repeated herein for the sake of brevity. However, the CN 90 in FIG. 2 is distinguishable from the CN 32 in FIG. 1 in that the CN 90 may also be configured to control VSV1 mobility as per the teachings of particular embodiments of the present disclosure (discussed in more detail later below). Regardless of the type of th carrier network 87, the CN 90 may function to provide connection of the bas station 89 to other terminals (not shown) operating in the base station's radio coverage area, and also to other communication devices such as wireiine or wireless phones, computers, monitoring units, and so on or resources (e.g., an Internet website) in other voice and/or data networks (not shown) external to the carrier network 87. In that regard, the network controller or CN 90 may be coupled to a packet-switched network such as an IP network 98 as well as a circuit-switched network 99, such as the Public-Switched Telephone Network (PSTN), to accomplish the desired connections beyond the carrier network 87. As shown In FIG. 2, one or more data centers (two of which are indicated by reference numerals "100" and "10 in FIG. 2) associated with the carrier network 87 and communicatively coupled to it may reside in the IP network 98, which may be the Internet. These data centers 100-101 may be in communication with each other, and may host vi dualized applications and may provide cloud-based services to the network's subscribers. For ease of discussion herein, only the data center 100 Is shown in subsequent figures and discussed in more detail. However, it is noted that the discussion of data center 100 equally applies to the DC 101 and other such data centers (not shown) that may be associated with the carrier network 87, The data center 100 may be substantially similar to the DC 42 in FIG. 1 , but different from the DC 42 in that the data center 100 may no longer support the Vfvl Mobility function 79 but still accomplish VM mobility through its connection to the EPC 90 via a GPRS Tunneling Protocol (GTP) tunnel as discussed later with reference to discussion of FIG. 4.
The operator network 87 may be a cellular telephone network, a Public Land Mobile Network (PLMN), or a non-cellular wireless network providing voice, data, or both. The wireless devices 92-93 may be subscriber units in the operator network 87. Furthermore, portions of the operator network 87 may include, independently or in combination, any of the present or future wireline or wireless communication networks such as, for example, the PSTN, an SMS based network, or a satellite-based communication link. Similarly, as also mentioned above, the carrier network 87 may be connected to the internet via its GW's connection to the IP network 98 or may include a portion of the Internet as part thereof. In one embodiment, the operator network 87 may include more or less or different type of functional entities than those shown in FIG. 2.
The CN 90 may be configured as discussed below to control VM mobility according to particular embodiments of the present disclosure. For example, in one embodiment, the CN 90 may be configured in hardware or a combination of hardware and software to implement the VM mobility solution as discussed herein. For example, when existing hardware architecture of the CN 90 cannot be modified, the VM mobility solution according to one embodiment of the present disclosure may be implemented through suitable programming of one or more processors in a network node of the CN 90 (e.g., the processor 235 in the CN's EPG 108 in FIG, 9). The execution of the program code by the processor 235 in the EPG 108 may cause the processor to perform appropriate method steps— e.g., anchoring of a V session associated with a subscriber- specific VM instance, controlling the mobility of the VM instance from one VM to another, etc.— which are illustrated in more detail in FIGs. 3 and 5-7, discussed below. Thus, in the discussion below, although the EPC 90 (and more particularly, the EPG 108 in the embodiment of FIG. 4) may be referred to as "performing," "accomplishing," or "carrying out" a function or a process, such performance may be technically accomplished in hardware and/or software as desired.
Although various examples in the discussion below are provided primarily in the context of an IP-based (i.e., packet-switched) core network such as an EPC in a 3GPP LTE system , the teachings of the present disclosure may equally apply, with suitable modifications, to core networks or functionally similar entities in a number of different Frequency Division Multiplex (FDM) and Time Division Multiplex (TDM) based cellular wireless systems or networks, as well as Frequency Division Duplex (FDD) and Time Division Duplex (TDD) wireless systems/networks. Such cellular networks or systems may include, for example, 3GPP or 3GPP2 standard-based systems/networks using Second Generation (2G), 3G, or Fourth Generation (4G) specifications, or non-standard based systems. Some examples of such systems or networks include, but not limited to, GSM networks, GPRS networks, Telecommunications industry Association/Electronic industries Ailiance (TIA EIA) interim Standard-138 (IS- 136) based Time Division u!tip!e Access (TD A) systems, WCDMA systems, VVGDMA-based HSPA systems, SGPPa's CDMA based High Rate Packet Data (HRPD) or evolved HRPD (eHRPD) systems, CDSVA2000 or TIA/EIA 5S- 2000 systems, Evolution-Data Optimized (EV-DO) systems, WilVlAX systems, international Mobile Telecommunications-Advanced (SMT~Advanced) systems (e.g., LTE Advanced systems), other Universal Terrestrial Radio Access Network (UTRAN) or Evolved UTRAN (E-UTRAN) networks, GSM/EDGE systems, Fixed Access Forum or other IP-based access networks, a nonstandard based proprietary corporate wireless network, etc. It is noted that the teachings of the present disclosure are also applicable to FDSvl variants such as, for example, Filter Bank Modulation option, as well as to multiple access schemes based on spatial division such as Spatial Division Multipl Access (SOMA).
FIG. 3 depicts an exemplary flowchart 102 showing various steps that may be performed by a network node in an EPC (e.g.., the EPC 90 in FIGs. 2 and 4) to control VM mobility according to the teachings of particular embodiments of the present disclosure. In one embodiment, that network node may be an EPG (e.g., the EPG 108 in FIG. 4). Initially, at block 104, a subscriber-specific VM instance is created in a first VM implemented at a first DC associated with the mobile communication network (e.g., the DC 100 associated with the network 87 In FIG. 2), The first DC may create the VM instance when a mobile subscriber "runs" a virtualized application on the subscriber's UE or invokes a cloud-based service using the UE. As noted earlier, the virtualized application or the cioud-based service may be offered, supported, or administered by a Content Provider (CP) (such as, for example, Amazon. comSM, Google® YouTube* Netflix5', etc.) through the respective data center associated with the carrier's network 87. The EPG in the EPC may become aware of the creation of the VM instance and may identify the corresponding application (e.g., a mobile gaming application, a streaming video download application, an online shopping application, etc) used by the subscriber. Then, at block 105, the ERG may anchor therein a V session associated with the subscriber-specific VM instance. After the VM session is anchored in the EPG, the EPG maintains control over the mobility of the VM instance from the first VM to a second VM (which may be implemented at the first DC or at a second DC 101 that is different from the first DC) as indicated at block 106. Thus, instead of a DC-based VM mobility control (as in the embodiment of FIG. 1), the present disclosure provides for an ERC-based VM mobility control. Additional details of anchoring of a VM session in the EPG and EPG's subsequent control of the VM mobility are provided below with reference to discussion of FIGs. 4-7.
FIG. 4 shows details of a portion of the wireless system 85 in FIG. 2 in which the VM mobility solution according to the teachings of one embodiment of the present disclosure may be implemented. For ease of comparison, the sysiem 85 in FIG. 4 is depicted in a manner analogous to the network configuration 20 in FIG. 1— with entities having similar configurations or functionalities in these two figures being identified using the same reference numerals for the sake of simplicity and ease of discussion. Hence, the earlier discussion of such entities, for example UEs 24-28, the AN portion 30, PCRF 44, MME 48, groups of VMs 54-56, hypervisors 74-76, and the like, with reference to FIG. 1 remains applicable in the context of FIG. 4 and, therefore, is not reproduced in detail below. Although the wire!ess system 85 shows UEs 92-93 in FIG. 2, these UEs 92-93 may be considered as representatives of UEs 24-28 in FIGs. 1 and 4. Similarly, for ease of depiction, although a single base station 89 is shown in FIG. 2 as part of the carrier network 87 of the system 85, this base station 89 aiso may be considered as representative of different types of base stations such as base stations 34-36 shown in FIGs. 1 and 4.
There are, however, certain differences between the wireless system 85 in FIG. 4 and the network configuration 20 in FIG. 1. For example, the carrier network 87 is different from the carrier network 22 in FIG. 1 in that the EPC 90 in the carrier network 87 is configured to control VM; mobility as per teachings of particular embodiments of the present disclosure. No such capability exists in the EPC 32. in. FIG. 1. Thus, in the embodiment of FfG. 4, one of the network nodes in the EPC 90~~i.e.f an EPG 108— is modified/configured to perform such VM mobiiity control. (The EPG 47 in FIG, 1 does not have such capability.) it is understood that instead of the EPG 108, some other network node in the packet-switched CN 90 also may be similarly configured to implement the C -based VSVI mobility control solution as per particular embodiments of the present disclosure. Consequently, a VM mobility function 110 is merged with the EPG 108. This VM mobiiity function 1 10 may be a modified version of the DC-based VM mobility function 79 in FiG. 1 to support the EPG-anchored GTP tunneling 1 12 (described later). In view of the new GTP tunnel 112 between the EPG 108 and V s 54-56 in the DC 100, a modified VM management function 1 14 may be implemented in the DC 100 to support the GTP tunnel-based VM mobility solution. A similar VM management function (not shown) may be implemented at the DC 101. In one embodiment, the VM management function 1 14 may be externa! to the DC 100 and, in that case, the VM Management function 114 may be shared by multiple DCs (i.e., the VM management function 114 may b In communication with DCs 100 and 101 in FIG. 2). In one embodiment, the groups of VMs 54-58, corresponding hypervlsors 74-76, and shared hardware 70-72 may remain substantially similar between the configurations in FIGs. 1 and 4. Additional details of the E PC-based VM mobility control are provided below (in FIGs. 5-7) with referenc to the configuration in FIG. 4.
In the context of FIG. 4, the following aspects describe how an EPC- based control over VM mobility may b accomplished. No specific order of implementation is implied in the presentation below.
(a) As noted earlier, the VM mobility function 1 10 may be merged with the EPG 108. In one embodiment, the VM mobility function 1 0 may provide a 3GPP interface to the GTP tunnel 112 (discussed later) and may enable the EPG 108 to exercise control over mobility of a subscriber-specific VM instance from one VM to another. In an alternative embodiment, the VM mobility function 110 may not be part of the EPG 108, but may be a separate network entity or functional element in the EPC 90 communicating with the EPG 108 (or an other network node in the EPC 90 selected to tmpiemeni VM mobility controi) via a suitable 3GPP interface.
(b) In one embodiment, the EPC-based VM mobility control is facilitated via a new GTP interface/tunnel 112 between the EPG 108 and the groups of virtual machines 54-56 (and, hence, between the EPG 108 and group-specific individual VMs 58-60, 62-84, and 66-68). In other words, the EPG 108 may exercise controi over VM mobility of each subscriber through this GTP tunnel 112 with the VMs in the DC 100. In other embodiments, different types of funnels or interfaces may be implemented to maintain CN's control over VM mobility. For example, in case of a 3GPP2 core network, a Generic Routing Encapsulation (GRE) tunnel may be used instead of the GTP tunnel discussed herein, in the embodiment of FIG. 4, the new GTP interface 1 12 may be used by the EPG 108 to retrieve the loading condition of individual VMs at any given instance. St is noted here that in case of a 3GPP2 (i.e., CDMA) based RA architecture, a new Mobile IP interface between a Packet Data Serving Node (PDSN) (not shown) and the VM Management function 114 may perform the same function. As is known, a PDSN may perform packet routing and mobility management in a CDMA network (not shown).
(c) The same GTP interface/tunnel 1 12 may also exist between the EPG 108 and the VM Management function 114 as shown in FIG. 4. This interface 112 may be used by the EPG 108 to instruct the VM Management function 114 to create, move, and delete a VM instance for a specific subscriber. Thus, in one embodiment, a new GTP tunnel may be created, for example by the EPG 108 in the embodiment of FIG. 4, per PDN session per subscriber. In case of a 3GPP2-based RAN architecture, the above-mentioned Mobile IP interface between a PDSN and the VM Management function 114 may fulfill the same objectives.
(d) Each of the VMs (i.e., VMs 58-60, 62-64, etc. in the DC 100) and the VM Management function 114 (in the DC 100} may now create a corresponding binding between the GTP tunnel ID, which may be assigned to the GTP tunnel 112 by the EPG 108, and a VM instance number assigned by the VM hosting the subscriber-specific VM instance or by the VM Management function 114 of the subscriber-specific VM instance. Thus, although there may be a single DTP tunnei ID, there may b muitiple individual bindings to this tunnei 10— each VM and the VM; management function having its own binding to the GTP tunnei ID.
(e) The EPG 108 may a!so create a binding among the respective subscriber ID (e.g., the subscriber UE's IMSI number, or the UE's Mobile Subscriber Integrated Services Digital Network (MS-ISDN) number, etc.), the GTP tunnei ID, the subscriber-specific VM instance number, an APN ID of a gateway or a Packet Data Network that the subscriber UE may want to use for its PDN session, and the like.
(f) As discussed so far, in one embodiment, each mobile subscriber may have a GTP tunnei created per PDN session initiated by the subscriber. As a result of the above-described bindings, the VM session of each mobile subscriber may be now anchored at the EPG 108 during the PDN session estabiishment. Each VM session is associated with a respective subscriber- specific VM instance. A VM session is considered "anchored" at th EPG 108 because the EPG 108 has the necessary information (e.g., information related to routing, required Quality of Service (QoS), subscriber billing/charging policy, and so on) needed to transfer the VM session (i.e., the subscriber-specific VM instance associated with the VM session) from one VM to another as discussed later below.
(g) The EPG 108 can now control the VM mobility. In one embodiment, the EPG 108 may exercise such control using the VM mobility function 110. As part of controlling the mobility of a subscriber-specific VM instance, the EPG 108 may instruct the VM management function 14, for example via the GTP tunnel 112, to create, move, or delete a VM instance at a VM for a specific subscriber. In another embodiment, the EPG 108 may instruct the VM management function 114 to move, scale up (e.g., with more computing, storage, and/or networking resources than th current VM instance), or replicate the subscriber-specific VM instance from one VM to another. In certain embodiments, the EPG 108 may control VM mobility by triggering VM mobility based on certain "triggers" (discussed below). There are options available to the EPG 108 for identifying the virtuaiized or cloud-based application used by the subscriber (on the subscriber's UE). Such identification may be necessary to determine, for example, whether the application is a low-latency and/or high bandwidth application which requires additiona! processing resources. Such determination may further assist the EPG in making a decision as to how to hand!e the mobility of a V instance associated with that application. For example, if the application uses only audio data, that is, voice packets as opposed to bandwidth-intensive multi-media content, then no special treatment may be necessary for such an application. The following are three exemplary EPG options for identifying the application used by the subscriber:
(i) To identify the application used by the subscriber, in one embodiment, the EPG 108 may perform the Dee Packet inspection (DPI) function within the EPG itself. The DP! function allows the EPG to analyze the network traffic from the subscriber UE to discover the type of the application that sent the data. In order to prioritize traffic or filter out unwanted data, deep packet inspection can differentiate data such as video, audio, chat, Voice over iP (VoIP), e-mail, and Web browsing. For example, the DPI function can determine not only that the data packets contain the contents of a web page, but also which website the page is from. Using the DP! function, the EPG 106 may look at the payload (of a data packet received from the subscriber UE) and get control information from it. Such control information may include, for example, an App ID identifying the application being used by the subscriber UE, destination IP address such as the !P address of the carrier DC 100, payload Information (for example, type of the payload— whether a voice packet, a video packet, or a text data packet), and the like. Through the DP! function, the EPG 108 may also identify the Content Provider (CP) (e.g., Verizon®, YouTube® Google®, Netf!ix®, etc.) that has contractual or service-level relation with the operator of the network 87 to provide content delivery services to operator's subscribers at one or more QoS levels.
(ii) In another embodiment, the CP may itself send the application information to the EPG 108 via Representational State Transfer (REST)ZWeb Services interface to the EPG based on the Service Level Agreement {SLA) between the CP and the operator of the carrier network 87,
(sis) In a further embodiment, other DPI node (not shown) within the operator's network 87 may inform the EPG 108 of the identity of the application used by the subscriber via EST Web Services interface or by Hypertext Transfer Protocol (HTTP) header enrichment or by a proprietary messaging interface.
[0043] In one embodiment the VM mobility (e.g., mobility of a subscriber- specific VM instance from one VM to another VM) may be triggered by the EPG 108 or by the VM Mobility function 110 in the EPG 108 based on one or more of the following exemplary "triggers":
(i) A requirement associated with a mobile application being used by the mobil subscriber (as discussed later with reference to th exemplary embodiments of FIGs. 6-7). In one embodiment, this requirement may be specified in a subscriber-specific PCRF policy associated with th mobile application. The requirement may specif a radio bandwidth threshold such as the minimum bandwidth needed for the application and/or a latency delay threshold such as how much latency is tolerable for the application.
(li) A chang in geographical location of the mobile subscriber (as discussed later with reference to the exemplary embodiment of FIG. 7).
(iii) An SLA between the mobile subscriber and the operator of the carrier network 87. Such SLA may provide for provisioning of a certain level of GoS, bandwidth, and latency delay for subscriber-selected applications.
(Iv) A change in the loading condition of the V s in one or mor DCs.
(v) The network operator's charging rules for cloud-based services. For example, applications with premium content, for example online gaming or streaming video apps, or apps dealing with real-time financial transactions, may be charged extra by the network operator. In that case, VM mobility may be triggered whenever a need arises to satisfy the high bandwidth/Sow latency requirements of these applications so that the operator may continue to charge extra for these premium services. Srt another embodiment, there may be other possible (VM mobility) triggers for subscriber connectivity change to alternate VM. Some examples of these triggers may include one or more of the following:
(I) A change in availability of hardware resources for the VM where the subscriber-specific VM instance is created. For example, hardware maintenance may prompt a change in hardware availability, thereby requiring moving the current VM instance of the subscriber application to another VM.
(ii) A change in an SLA between the operator of the mobile communication network 87 and the owner of the VM where the subscriber- specific VM instance is created. It is noted here that the owner of the DC 100 (where VMs are hosted) may be different from the operator of the DC 100. Also, there may be different owners for different VMs in the DC 100. Furthermore, the network operator may not be the owner of the VMs in the DC 100. In that case, an SLA between the network operator and the owner(s) of the VMs may govern the treatment of network operator's subscribers with regard to virtuaiized applications (or cloud-based services) supported through the VMs in the DC 100, In one embodiment, the SLA between the network operator and an owner of one or more VMs in the DC 100 may change, for example, when the owner of a VM reseils the VM to a Third Party Partner (3PP) (for example a service/content provider like YouTube®, Pandora® radio, and the like), or an Over-The-Top (OTT) content provider such as Google®, Vonage®, or Skype™. Such reselling may include reselling of Content Delivery Network (CDN) caches. In one embodiment, the DC 100 and its servers or shared hardware may be part of a CDN and CDN caches may be associated with VMs hosted at the DC 100.
(Hi) A change in the network topology of the mobile communication network 87. The owner or operator of the network 87 may change the topolog of its network 87, for example, to optimize IP transport layer to fake advantage of (geographically) closer Internet peering points or to provide for an optimized optical transport sub-layer. Such topological changes may necessitate relocation of VM instances of certain subscribers to more efficiently manage network traffic over the new topology. (ίν) A new service subscribed by the mobile subscriber from the operator of the mobile communication network 87. Such new service may require, for example, additional bandwidth that may not be supported by the current subscriber-specific VM instance, !n that case, VM instance relocation may be triggered by the EPG 108.
(v) A need to contro! power consumption, for example, of the current VM where the subscriber-specific VM instance is created and/or the VM to which the VM instance is to be moved. For example, in one embodiment, VM instances may be consolidated to a larger, more centralized VM at night to efficiently manage power consumption of both the VMs-the originating VM as well as the destination VM. The issue of control of power consumption may also arise in the context of earlier-mentioned change in the loading condition of the VMs in one or more DCs.
FIGs. 5-7 illustrate some exemplary message flows or sequence diagrams related to the CN-based VM mobility control solution according to particular embodiments of the present disclosure. Various network nodes or entities In these figures are shown in the context of FIG. 4. In FIGs, 5-7, the control of VM mobility is illustrated using one of the UEs (i.e., the UE 27) from FIG. 4 as an example. However, it is understood that the VM instances of other UEs in the carrier network 87 may be similarly managed/controlled. Also, the VM mobility examples in FIGs. 5-7 are illustrated using the VM groups 54 and 56 as examples only. The message flows in FIGs. 5-7 equally apply to other VM groups or data centers other than the DC 100 in FIG. 4. Furthermore, as noted earlier, in one embodiment, the VM mobility function 110 may configure the EPG 108 to perform various EPG-based actions depicted in FIGs. 5-7, regardless of whether the VM mobility function 10 is implemented at the EPG or elsewhere. In another embodiment, however, the EPG 108 itself may be configured and/or designed to perform such actions without necessarily being dependent on the VM mobility function 1 10. Additionally, for ease of representation, a subscriber-specific VM instance may be symbolically represented by a large black dot, like dot 1 18 in FIG. 5, dot 145 in FIG. 6, and dots 165 and 174 in FIG. 7. FiG. 5 shows a high level sequence diagram 118 of the initial binding between an EPG such as the EPG 108 in FIG, 4 and a DC-based V such as the VM 58 where a subscriber-specific VM instance 118 is created. This initia! binding sequence may take place, for example, when a UE initiates its first PDN session in the carrier network 87. Such UE may be considered as a "new" UE in the context of setting up the initiai binding, in the embodiment of FiG. 5, the VM Mobility function 110 is shown to be part of a Software Defined Networking Controiier (SDN GIL) 120 and not as part of the EPG 108 to illustrate how flexibly the CN-based control over S mobility may be accomplished using teachings of particular embodiments of the present disclosure. It is understood that, in one embodiment, the VM mobility function 110 may not have to be a part of the SDN controiier 120, which may already exist in the carrier network 87, but may be implemented at the EPG 108 or elsewhere in the EPC 90. in one embodiment, the SD controller 120 may be impiemented in the EPG 108 along with the VM mobility function 110, which may result in the EPG configuration similar to that shown in FIG. 4. However, broadly speaking, the SDN controller 120, with or without the VM mobility function 110, may be implemented anywhere in the carrier network 87 (FIG. 4) including, for example, in a node in the CN 90 other than the EPG 108 or within a node in the access network 30. In any event, if SDN controiier 120 is implemented with VM mobility function 110, then it may be preferable to implement it as part of the CN 90 to effectively support the CN-based VM mobility control as per teachings of particular embodiments of the present disclosure, it is understood that an SDN controller is an application in software- defined networking that manages flow control to enable intelligent networking. SDN controllers are based on protocols, such as OpenFSow (OF), that allow servers to tell network switches where to send packets. In one embodiment, all communications between virtualized applications (e.g., applications deployed at the DC 100) and network devices (e.g., the UE 27) may go through the SDN CTL 120, which may choose the optimal network path for application traffic. Typically, network routers may implement a control plane with control information or routing tables indicating how to route a data packet, and a user plane for handling user data packets to be routed according to the control information. An SDN controller may separate the control plane off the network hardware, such as the EPG 108 or other gateways/routers, and run it as software instead, thereby facilitating automated network management and making it easier to integrate and administer business applications, including virtualize applications and cloud-based services.
Referring now to FIG. 5, at reference numeral "122", the UE 27 may initiate a PDN session and may send a session request with appropriate APN ID and Subscriber ID (for example the IMS! assigned to the UE). The request may propagate through the carrier network 87 and may eventually be received at the EPG 108. In FIG. 5, network entities such as the BNG 38 in FiG. 4 and a Broadband Policy Control Framework (BPCF) (not shown in FIG. 4) that may support clients having non-3GPP access (e.g., WiLAN or Wi-Fi clients) and provide an interface between these clients and the 3GPP CN 90 at different stages of the PDN session are indicated through parenthesis like "(BNG)" (In the box 108 showing EPG) and "(BPCF)" (in the box 44 showing PCRF) for reference. Upon receiving the user request for a PDN session, for example through the BNG 36 in one embodiment, the EPG 106 may notify the PCRF 44 (or the BPCF for broadband clients, as the case may be) at message flow 123 that a session request is received from a new UE (here, the UE 27), the gateway (GW) from which the UE's request is received, the location of the UE 27, and the IP address ("fP@" in FiG. 5) from which the request is received. At message flow 124, the PCRF 44 (or the BPCF, as the case may be) may notify the SDN controller 120 of this session request from the new UE 27 and network operator's service policy such as guaranteed QoS, allocable bandwidth, the maximum threshold for latency delay, and so on applicable to this UE's subscriber, in one embodiment, through its V Mobility function 1 10, the SD controller 120 may select an existing VM service instance or request the VM Management function 114 to create a new VM service instance for the UE's PDN session, as indicated at message flow 125. If necessary, the SDN controller 120 (through the VM mobility function 110) may also request the V management function 114 for associated VM infrastructure (also referred to as "VM infra" in FIG, 5) resources such as, for example, computing resources, storage resources, and networking resources. In one embodiment, the VM management function 114 may allocate such resources to the UE 27 based on many factors such as, for example, the availability of th corresponding shared hardware. In the embodiment of F!G. 5, the VM management function 114 creates a subscriber-specific, new VM instance, for example the VIVI instance 118, at the VM 58 in the group of VMs 54 in the DC 100 in accordance with the virtual software image and network configuration requested by the SD controlier 120 (using, for example, its VM mobiiity function 110), as indicated at message flow 127. The mage" may specify a software to be loaded specific to the virtual application associated with the VM instance 118. The networking configuration may specify the "networking" required to setup a specific VM (here, the VM 58),
In the embodiment of FIG. 5, at message flow 128, the EPG 108— in conjunction with the VM mobiiity function 110 at the SDN CTL 120— may configure a GRE tunnel to the VMs 58-60 in the DC 100 either in parallel to the events at sequences 125 and 127, or after the conclusion of the events at sequences 125 and 127. At the message flow 126, the EPG 108 may also configure VM (or VM infra) tunnei endpoints for the GRE tunnel by including GRE protocol keys or static Layer-2 Tunneling Protocol version 3 (L2TPv3) !P Security (!PSec) keys, as well as by including GRE protocol ID or static L2TPv3 ID as part of the configuration. As is known, the L2TP is an OS! Layer-2 (L2, the data-link layer) tunneling protocoi used to support Virtual Private Networks (VPNs) or as part of the delivery of services by internet Service Providers (ISPs) including, for example, the DC-based content providers. IPSec is often used with L2TP to secure L2TP packets by providing confidentiality, authentication, and integrity. The combination of these two protocols is generally referred to as "l^TP/lPSec." As indicated at the optional message flow 129, additional in-band tunnel set-up mechanisms may apply. In other words, instead of or in addition to the GRE tunnel, which is used as an example here, the EPG 108 may setup additional or alternative tunnels to the VMs 58-60 such as, for example, the GTP tunnel 112 (shown in FIG. 4) with a corresponding Tunnel Endpoint ID (TEID) or an L2TFv3 tunnel. As a result, at least one new data plane tunnei may be now established between the EPG 108 and the DC-based VMs 58-60 as indicated at reference numeral "130." As mentioned earlier, In one embodiment, such tunnel may allow the CN-based EPG 108 to control mobility of a subscriber-specific instance from one VM to another.
After the tunnel is established at message flow 130, the SDN controller 120 may instruct the EPG 108 to map subscriber access session information to the respective transport funnel (whether a G E tunnel, a GTP tunnei, etc) to the VMs 58-80. Such access session information may include, for example, PDN connection information such as APN ID, and information about a Point-to- Point Protocol (PPP) session (if applicable). A PPP session may be used, for example, during dial-up cable connections to the Internet or the CP's resources at the DC 100 via a telephone modem, or during other types of broadband access including broadband access via a cellular network. The access session information may also include information about a Dynamic Host Configuration Protocol (DHCP) subscriber, which may be the UE 27, for example, receiving IP addresses that are dynamically allocated using the DHCP protocol, and the like. In response, as indicated at block 132, the EPG 108 may create a binding between the VM instance number for the subscriber-specific VM instance 118, which may have been supplied to the EPG 108 by the VM management function 1 14 through the tunnel created at message flow 130, and each of a number of other parameters such as, for example, the UE's IMSI (for the UE 27), AP ID (received at message flow 122), tunnel ID for the tunnel created at message flow 130 (which may be a GTP tunnel ID or TEID in case of the GTP tunnel 1 12 in FIG. 4), and so on. As a result of such binding, the EPG 108 may be now able to communicate directly to the VMs 58-60 to receive from the VM management function relevant Key Parameter Index (KPl), such as hardware failure, overload indication, memory shortage, lack of compute-processing capacity, etc., to move the UE's session to a different VM instance (as discussed below with reference to the exemplary embodiments in FIGs, 6 and 7), etc. The EPG 108 may then set up a PDN session with the UE 27 (as indicated at message flow 133), thereby allowing the subscriber of the UE to have access to the corresponding virtualized application or cloud service,
FIGs, 6A and 6B (collectively "FIG. 6") illustrate an exemplary sequence diagram (or message flow) 135 reiated to a bandwidth-based VM mobility trigger according to one embodiment of the present disclosure. At reference numeral "137", the subscriber UE 27 initiates a video content session (e.g., via YouTube®, Netflix®, etc) such as, for example, a movie download or delivery of streaming audio-visual content. As indicated at block 138, the EPG 108 may be informed of this event (i.e., the UE's initiation of a virtualized application session) either via a Diameter protocol-based Gx message, which is used to exchange policy decisions-related information) from the PCRF 44 or from its own DPI application/function (discussed earlier), or from a direct RESTAA/eb Services notification from the relevant Content Provider (CP), or through other means. Consequently, the EPG 108 may retrieve UE's 27 policy for this video application from the PCRF 44 as indicated at referenc numeral "140". This policy may be specific to the UE's subscriber and may indicate, for example, what bandwidth and guaranteed QoS the subscriber is entitled to for this video content session application. At message flow 142, the EPG 108 may retrieve the current loading condition of the relevant VMs 58-80, Thes VMs may be those VMs that support the applications for a given CP. In one embodiment, these VMs may be owned, operated, or managed by the CP, or a third party, including the operator of the network 87, through an SLA with the CP. At block 144, the EPG 108 may decide to move the UE-specific video content session to a different VM instance based on a number of factors such as, for example, the network operator's policy related to charging, QoS, bandwidth availability, and so on applicable to the UE/subscriber 27, the type of the current video application (e.g., bandwidth-intensive or not), current location of the UE (e.g., geographically near a Vfvl that is different from th VM 58 which is currently hosting the UE's subscriber-specific VM instance 145), loading condition of relevant VMs, and the like. The EPG 108 may determine that the video application associated with the UE's VM instance requires high bandwidth, which may not be satisfied by the current VM 58. As a result, at message flow 148, the EPG 108 may instruct the VM management function 114 to move, scale up, orrepiicate the UE's VM instance to another location/VM that can satisfy the high bandwidth requirement, in response, as indicated at message f!ow 147, the VM management function 14 may move (as symbolically illustrated by arrow 148) the UE's entire session to another VM instance (here, a VM instance 149 on the different VM 80). This new VM 60 may be selected by the VM management function 1 4 because it may be better equipped to handle the UE application's high bandwidth requirement. Thereafter, at message flow 150, the VM Management function 1 14 may return a new V instance number (for the VM instance 149 created on the new VM 60 when the subscriber-specific VM session was moved to this new VM 60) to the EPG 108. The VM management function 1 14 may also update its binding between the GIF tunnel ID (of the GTP tunnel 112 between the EPG 108 and the VM Management function 1 14 as shown in FiG. 4) and this new VM instance number. In case of any other type of tunnel or interface (for example L2TPv3, GRE, VXLAN, and the like) with a core network instead of, or in addition to, the GIF interface discussed here, the VM Management function 114 may update its binding between that funnel/interface !D and the new VM instance number, as indicated at message flow 150. As a result, the EPG 108 also updates its bindings between the new VM instance number and UE's IMS!, APN ID, GTP tunnel ID, etc., as indicated at biock 151 in FIG. 6B (which is a continuation of FIG. 6A). The VM mobility related messaging flows in FIG. 6 may be transparent to the UE 27. Once the UE's VM instance is moved from the VM 58 to the VM 80, the UE may continue receiving high quality video at the requisite bandwidth (as noted at block 152).
FIGs. 7A and 7B {collectively TIG. 7") depict an exemplary message flow or sequence diagram 155 related to latency delay- and UE locatio -based VM mobility trigger according to one embodiment of the present disclosure, initially, at message flow 157, the UE 27 may initiate a delay-sensitive session such as a financial transaction session by a broker, a medical information- sharing session by an emergency responder, and the like that requires low latency delay during execution. As indicated at block 158, the EPG 108 may be informed of the UE's Initiation of a virtuaSized application or cloud-based service session either via a Diameter protocol-based Gx message from the PCRF 44 or from its own DPI application/functiort (discussed earlier) or from a direct REST/Web Services notification from the relevant CP (for example, a brokerage house, art emergency service network, and the like) or through other means. Consequently, the EPG 106 may retrieve UE's 27 policy for this delay- sensitive appiication from the PCRF 44 as indicated at reference numeral "160". This policy may be specific to the UE's subscriber and may indicate, for example, what delay threshold and guaranteed QoS the subscriber is entitled to for this delay-sensitive application. At message flow 162, the EPG 108 may retrieve the current loading condition of the relevant VMs (e.g., the VMs 58-60 in the group of VMs 54). These VMs may be those VMs that support the applications for a given CP. As mentioned earlier with reference to FIG. 6, in one embodiment, these VMs may be owned, operated, or managed by the CP, or a third party, including the operator of the network 87, through an SLA with the CP. At block 164, the EPG 108 may decide to keep the UE-specific application session to the current VfVl 58 (i.e., the subscriber-specific Vfvl instance 165 at the VM 58) based on a number of factors such as, for example, the network operator's policy related to charging, QoS, latency requirements, and the like applicable to the UE/subscriber 27, the type of the current appiication (e.g., a low latency appiication or not), current location of the UE (e.g., geographically near the V 58 that is currently hosting the UE's subscriber-specific VM instance 185), loading condition of relevant VMs, and so on. The EPG 108 may determine that the current application associated with the UE's Vfv instance 185 requires low latency delay, which may be satisfied by the current VM 58 and, hence, there may not be any need to move the UE's Vfvl instance 165. The messaging flows in FIG. 7 A may be transparent to the UE 27. Once the EPG 108 determines to maintain the UE's current session at the current Vfv 58, the UE 27 may be allowed to resume its high-speed (i.e., low latency) application session (as noted at block 168).
Referring now to FIG. 7B (which is a continuation of FIG. 7 A), it is observed at block 167 that the UE 27 may start, for example, a video session and move far away from its originating location suc as, for example, the location associated with UE's sessio initiation at message flow 157. Thus, the UE 27 may have physically moved far away from the location where VM 58 is implemented that hosts Its Vfvl Instance 165. The EPG 108 may receiv a trigger from its own application or from another network node in the EPC 90 informing the EPG 106 of the UE's geographical movement. As a result, the EPG 108 may decide to move the UE's VIVI instance 65 to a Data Center (DC) that is geographicall closer to the UE's current (physical) location as noted at block 168 so as to better fulfil! the low latency delay requirement of the subscriber's delay-sensitive session. Consequently, as indicated at message flow 170, the EPG 108 may instruct the VSV Management function 114 to move the UE's current VIVI instance 165 to another location that can satisfy the low latency requirement of UE's delay-sensitive application. In response, as indicated at message flow 172, the VM management function 1 14 may move the UE's session to another VM 66 by creating a new subscriber-specific VM instance 174 at the VM 66, as symbolically shown by arrow 175. The new VIVI 66 may be at a different physical location ("Location 8" in FIG. 7 as opposed to "Location A" of the original VM 58) which may be geographically closer to the UE's current physical location. In FIG, 7 (I.e., FIGs. 7 A and 7B), if is assumed that the DC 100 hosts its VMs in a distributed manner~~i.e,, the group of VMs 54 may be at a physical location ("Location A") that is different from the physical location ("Location B") where the other group of VMs 56 is hosted. However, in another embodiment, the VMs at Location B may not belong to the DC 100, but may be associated with a completely different data center (e.g., the DC 101 in FIG. 2) that hosts VMs managed by the VM Management function 114. This other data center may be at a different geographical location, but may still be owned, operated, or managed by an entity or CP associated with the DC 100. On the other hand, the new data center may be owned, operated, or managed by an entity that is different from the entity associated with the DC 100. In any event, the new data center at Location B may still host VMs that support the applications that were supported by the VMs at Location A. Thereafter,, at message flow 177, the VM Management function 114 may return a new VM instance number (for the VM instanc 174 created on the new VM 68 when the subscriber-specific VM session was moved to this new VM 66) to the ERG 108, The VM management function 1 14 may also update its binding between the GTP tunnel ID (of the GTP tunnel 1 12 between the EPG 108 and the VM Management function 114 as shown In FIG, 4) and this new VM instance number, in case of any other type of tunnel or interface (e.g., L2TPv3, GRE, VXLAN, etc.) with a core network instead of, or in addition to, the GTP interface discussed here, the VM Management function 1 14 may also update its binding between that tunnel/interface ID and the new ViVI instance number. As a result, the EPG 108 also updates its bindings between the new VM instance number and UE's SMSI, AP ID, GTP tunnel ID, etc., as indicated at block 178 in FIG, 78. The VM mobiiity related messaging flows in FSG. 7 may be transparent to the UE 27. Once the UE's VM instance is moved from the VM 58 to the VM 66, the UE may continue receiving high quality video at the requisite low latency delay (as noted at block 80).
It is observed here that the VM mobility in FIG. 6 may be considered an example of an intra-DC (i.e., within the same DC 100) mobility of VMs, whereas the VM mobiiity in FIG. 7 may be considered an example of an inter~DG (i.e., between two difference DCs) mobiiity of VMs when the VMs at Location-B belong to a data center that is different from the DC 100 to which the VMs at Location-A belong.
FIGs. 8A through 8C (collectively TIG. 8") illustrate exemplary configurations 185, 218, and 225, respectively, regarding how to provide appropriate network connectivity between an operator's core network such as EPC 90 in FIG. 4 and a data center such as DC 100 in FIG. 4 to support the VM mobs!ity solution according to particular embodiments of the present disclosure. The embodiments in FIGs. 8A-8C are mor focused on functional aspects of how such network connectivity may be provided in practice to accomplish intra-DC and inter-DC mobiiity of a VM instance. Hence, the configurations in FIGs, 8A-8C may not exactly correspond with the configuration in FIG. 4. For example, the VM Management function 1 14 is not shown in. FIGs. 8A-8G, however, as discussed below, its functionality may be accomplished through a Cloud Orchestrator 188. Furthermore, even though the GTP tunnel 112 is shown with different tunnel endpoints in FIGs. SA-8C, that does not mean that FIGs. 8A-SC contradict FIG. 4 because of absence of a depiction of a GTP tunnel connected to the VMs 190-193 in FIGs, 8A-8C. The functional layouts in FIGs, 8A-8C implement the configuration depicted in FIG. 4,
In FIGs. 8A-8C, a Cloud Orchestrator functionality, or environment, is shown to have been implemented in a distributed manne— in the carrier network 87, for example as part of an SDN controller at block 187, wherein the SDN controller may be part of the C 90 or, more specifically, a part of the EPG 108, and as a c!oud-based controller 188 for the DC 100. Thus, in one embodiment, the functionality of the Cloud Orchestrator 187 may be performed by the EPG 108. Also, in one embodiment, the controller 188 may be implemented as part of the DC 100. !n the embodiments of FIGs. 8A-8C, both of these implementations 187-188 co-operate with each other and jointly provide the Cloud Orchestrator functionality. Hence, for ease of discussion, both of these implementations 187-188 may be singularly (and jointly) referred to as a "Cloud orchestration environment" or "Cloud Orchestrator." A Cloud Orchestrator may provide an automated support for virtualization management such as, for example, management of (i) instantiation or creation of a VM, (is) decommissioning of a VM, (iii) Fault Configuration Accounting Performance Security (FCAPS) (e.g., how to account or charge for subscriber usage of VM services, how to provide security that two virtualized applications do not "see" the data of each other, how to accomplish fault tolerance), etc. Hence, in one embodiment, each of the C!oud Orchestrators 187-188 in FIGs. 8A-8C may include features of the VM Management function 114. In other words, in particular embodiments, the VM management functionality also may be implemented in a distributed manner through the Cloud orchestration environment.
It is noted that a VM may have specific requirements for network connectivity or performance. For example, a VM may require a specific Network Interface Controller (NIC) chipset, interface bandwidth (B ), specific instruction set— such as an instruction set for an Sntef8 chipset or an Advanced Micro Devices, Inc. (AMD™) chipset, etc. Hence, the Cloud Orchestrator 188 may have to find the right target server or VIVI based on the requirement of mobility of a VM (or VM instance). Therefore, in some embodiments, the Cloud Orchestrator 186 may need appropriate network connectivity information, which may be obtained, for example, from a DC switch 195, which may be configured to receive such connectivity information through one of the routing information delivery options shown in FIGs. 8A-8C and discussed below.
in FIGs. 8A-8C, some exemplary "service" VMs 190-193 (which may be considered as representatives of the VMs in the groups of V s 54-56 in FfG. 4) in the DC 100 are shown having respective "services" or applications hosted thereon. These services or applications ar Illustrated using different symbolic representations, for example an online search service at VM 190, a World Wide Web application at VM 191 , a security firewall service at VM 192, and an online gaming application at VM 193. A DC switch 195 for the DC 100 is also shown in FIGs. 8A-8C, in one embodiment, the switch 195 may be shared by the VMs 190-193, or each VM 190-193 may implement a corresponding portion of the switch 195, for example when the switch 195 is a software switch. In one embodiment, the switch 195 may include multiple switches; however, for ease of discussion, the singular term "switch" is used herein. This switch 195 may be a software (SW) or hardware (HW) switch operating under the OpenFiow (OF) protocol mentioned earlier. In networking, a "switch" is a device that channels incoming data from any of multiple Input ports (not shown) to the specific output port that will take the data towards its intended destination. In a packet- switched wide-area network, such as the Internet, the destination address may require a look-up in a routing table (which may be maintained at a router such as, for example, the router 200 associated with the DC 100 in FIGs. 8A-8B or may be available at the EPG 108). On the other hand, some new switches (also called IP switches") may themselves be equipped to perform the routing (L3) functions, in any event, being a third party CP-based entity, the switch 195 in the DC 100 may need routing information such as a routing table to enable the switc 195 or, in some embodiments, the Cloud Orchestrator 188 to appropriately route the outgoing packets or VfVls/VM instances to their correct destinations, either via the router 200 in the embodiments of FSGs. 8A-8B or via a Data Center Gateway (DCGW) 228 in the embodiment of FIG. 8C. Therefore, the exemplary configurations in FIGs, 8A-8C may be used to convey such routing information to the DC switch 195 to populate the DC switch with appropriate routing information to manage routing of data packets as wei! as mobility of VMs/V instances.
in the embodiment of FiG. 8A, the routing information is conveyed from the ERG 108 to the switch 195 directly via the GTP or GRE tunnei 112 because the switch 195 may be an IP switch capabie of performing routing itself or may be part of a Vfvl that has a built-in mechanism for appropriate network connectivity (e.g., routing, load-balancing, tunnel setup, etc.). Such direct connection is i!iustrated by one of the tunnel endposnts 202 "connected" to the switch 195 and the other endpoint 204 "connected" to the EPG 108. In other words, the DC 100 may have switches that are capable of such native support for routing and, hence, the GTP tunnei 112 may provide a direct link between the DC switch(es) 195 and the EPG 106. As a result, routing information such as a routing table for a data packet, or for the mobility of a Vfvl or Vfvl instance associated with a PDN session of the subscriber device 208 (which may represent any of the UEs 24-28 and 92-93 discussed earlier) may be directly delivered to the DC switch 195, which can then instruct the route 200 fo appropriate routing or inform the cioud orchestrator 188 for appropriate routing to support V mobility requirements.
In FIG. 8A, the vertical dotted line 209 may symbolically represent a "boundary" or separation between the operator's carrier network 87 and the DC 100, and associaied entities such as the router 200 and DC-based cloud orchestrator 188, The Cioud Orchestrator 187 may provide an Application Programming Interface (API) (symbolically shown by dotted arrow "210") to the DC-associated Cloud Orchestrator 188 to enable the Cioud Orchestrator 188 to create VMs (as symbolically indicated by dotted arrow "212") as well as "service chains" (as symbolically indicated by dotted arrow "214"). The EPG 108 may have certain requirements for different virtualized applications. For example, the EPG 108 may identify which subscribers should have their data traffic go through a firewall application in the DC 100 and which subscribers should not. The "service chain" in the API may identify a subscriber-specific set or "chain" of services such as a firewall application, the earlier-discussed Deep Packet Inspection (DPI) function, and so on that are allowed for a subscriber's packet. Thus, a subscriber-specific "service chain" may be created in the DC switch 195 to configure the switch 195 for appropriate treatment of a subscriber's packet.
Thus, in the configuration 185 in FIG. SA, V s or fhe switch 196 in the DC may provide a built-in mechanism for appropriate network connectivity and, hence, the routing information may be directly delivered to the switch 195 via the tunnel 1 12. In contrast, the configuration 218 in FIG. 8B may require creation of a software overlay (symbolically represented at reference numeral "220") that builds the required connectivity environment on top of any DC solution. In other words, only a minimum level of support from the DC 100 (including the DC switch 195) is assumed in the configuration 218 in FIG, 88. Hence, additional routing information to the switch 195 is supplied through a software switch overlay 220 that may be configured as a virtual switch (or "vswitch") by fhe Cloud Orchesfrator 187 (as indicated at dotted arrow 222). In one embodiment, the configuration of the vswitch may include the service chain creation aspect, which may be similar to that shown at reference numeral "214" in FIG. 8A, except that the service chain may be created by the Cloud Orchestraior 187 instead of the DC-associated Cloud Orchestrator 188. The vswitch 220 may be in communication with the DC switch 195 and the router 200. In the embodiment of FIG, SB, the second endpoint 202 of the GTP tunnel 12 may now "connect" to the router 200 (instead of the DC switch 195 directly as in the embodiment of FIG. 8A), which may receive the routing table and any other related routing information from the EPG 108 via the tunnel 1 12. This routing information may be then supplied from the router 200 to the software overlay 220, which may, in turn, supply the routing information to the DC switch 195 for appropriate routing. In one embodiment, the software overlay 220 may support creation of "switch" VMs (not shown) for routing. The aspect of creation of "switch" VMs at the software overlay 220 may be conveyed through the API at reference numerai "210s as shown in FIG. SB. In one embodiment, the API may enable the Cioud Orchestrator 188 to create service V s 190-193 (as symbolically indicated by doited arrow "212") and switch VMs {as symbolically indicated by dotted arrow "223"), It is noted here that entities or actions having the same reference numerals in the configurations in FIGs. 8A and 8B are not discussed again with reference to discussion of FIG. 88. It is observed that, for simplicity of the drawing, the VM 193 is not shown in FIG. SB.
in contrast to the configuration 2 8 in FIG. 8B, where routing information is delivered to the DC switch 195 via a software switch overlay 220, the configuration 225 in FIG. 8C may require creation of a hardware (HW) overlay, which is symbolically represented by reference numeral "227" and shown implemented as part of the hardware of a Data Center (DC) Gateway (GW) 228, which may be in communication with the DC switch 195. The hardware switch overlay 227 may provide the required connectivity environment on top of the DC switch 195. Sn other words, like the configuration 218 in FIG. 8B, only a minimum level of support from the DC 100, including the DC switch 195, is assumed in the configuration 225 in FIG. 8C as well. Hence, additional routing information to the switch 195 is supplied through the hardware switch overlay 227 that may be configured through an API (from the Cloud Orchestrator 187) as part of configuring the hardware of the DC GW 228 (as indicated at dotted arrow 230). In one embodiment, the configuration of this GW-based HW switching overlay 227 may include the service chain creation aspect, which may be similar to that shown at reference numeral "214" in FSG. 8A, except that the service chain may be created by the Cioud Orchestrator 187 instead of the DC-associated Cioud Orchestrator 188. in one embodiment, the HW GW 228 associated with the DC 100 may be configured to implement The Onion Router (TOR) software for enabling online anonymity. In another embodiment, the DC GW 228 may implement the functionality of an IP edge router to transfer data between a local area network (such as, for example, a CP-specific network (not shown) that includes the DC 100) and a wide area network (e.g., the Internet or the cellular -operator s -network 87), In this embodiment, the GW 228 may sit at the periphery, or edge, of a network.
!n the embodiment of FIG. 8C, the second endpoint 202 of the GTP tunnel 1 12 may now "connect" to the GW 228, which may receive the routing table (and any other related routing information) from the EPG 108 via the tunnei 1 12. This routing information may be then supplied to the DC switch 195 through the hardware switch overlay 227. It is noted here that entities or actions having the same reference numerals in the configurations in FIGs. 8A and 8C are not discussed again with reference to discussion of FIG. SC.
it is noted here that, in one embodiment, when the mobility control function such as the VM Mobility function 110 is external to the GW 228 (for example at the SD controller as shown in FIG. 5) or at another service automation function, which may be part of the Vtvl Orchestrator 187 as shown in FIG. 8C, and when GTP is used as tunnei technology, then an option is to overload existing tunnel setup mechanisms, for example the S5, S8, or S2a interfaces in LTE, to allow an existing GW such as the GW 228 to connect to the VM infrastructure at th DC 100.
FIG. 9 depicts a block diagram of an exemplary network node such as the ERG 108 in a cor network such as the EPC 90 in FIG. 4 through which the VM mobility solution according to particular embodiments of the present disclosure may be impiemented. The network node 108 may be configured to anchor therein a VM session associated with a subscriber-specific VM instance of a mobile subscriber in the operator's carrier network 87. The network node 108 may also control the mobility of that VM instance from one VM to another. Thus, EPG-related functionalities discussed earlier with reference to FIGs. 3-8 may be performed by the network node 108. In one embodiment, the network node 108 may implement a VM Mobility function such as the VM Mobility function 110 in FIG. 4, which may configure the network nod 108 to perform these EPG-related functions.
The network node 108 may include a processor 235, a memory 237 coupled to the processor 235, and an interface unit 240 also coupled to the processor 235. In one embodiment, the program code for the VM Mobilit function 110 may be stored in the memory 237. Upon execution of that program code by the processor 235, the processor 235 may configure the network node 108 to perform various EPG-reiated functions discussed ear!ier with reference to FIGs. 3-8. The memory 237 may a!so store data and other related communications such as routing information, subscriber-specific policy information received from the PCRF 44, loading information for different V s in the DC 100, information related to a subscribers PDN session or usage of a particular virtual application/cloud based service, as well as outputs from the processing performed by the processor 235. These data or communications may be used by the processor 235 to perform various EPG-based tasks such as establishment of the GTP tunnel 112, transmission of routing information to the DC switch 195, instructing the VIV1 Management function 114 to move a VM instance from one V to another, and so on, as discussed earlier with reference to FIGs. 3-8. The interface unit 240 may provide a bi-directtonai interface to enable the EPG 108 to communicate with other network nodes/entities or functions in the core network 90 and also to communicate with other entities, functions, or elements such as the VMs in the DC 100, the Vivl Management function 1 4, and the like beyond the CN 90.
In one embodiment, the processor 235 may be configured in hardware or hardware and software (such as the VM Mobility function 110) to impiement EPG-specific aspects of the VM mobility solution as per teachings of particular embodiments of the present disclosure. Hence, some or all of the functionalities described above (for example establishment of a GTP tunnel, anchoring of a subscriber's VM session, and control of the mobility of a subscriber-specific VM instance) as being provided by the network node 108 or another network node in the CN 90 having similar functionality, may be provided by the processor 235 executing instructions stored on a computer-readable data storage medium, such as the memory 137 in FIG, 9, In one embodiment, some or all aspects of the VM mobility solution provided herein may be implemented in a computer program, software, or firmware incorporated in a non-transitory computer- readable storage medium such as the memory 237 in FIG. 9 for execution by a general purpose computer or a processor such as the processor 235 in FIG. 9. Examples of computer-readable storage media include a Read Only Memor (ROM), a Random Access Memory (RAM), a digital register, a cache memory, semiconductor memory devices, magnetic media such as internal hard disks, magnetic tapes and removable disks, magneto-optical media, and optical media such as CD-ROM disks and Digital Versatile Disks (DVDs). In certain embodiments, the memory 237 may employ distributed data storage with without redundancy.
In one embodiment, when the existing hardware architecture of the network node 108 cannot be modified, the functionality desired of the node 108 may be obtained through suitable programming of the processor 235 using the VM Mobility function 110. The execution of the program code by the processor 235 may cause the processor to perform as needed to support the VM mobility solution as per the teachings of the present disclosure. Thus, although the EPG 108 may be referred to as "performing," "accomplishing," or "carrying out" {or similar such other terms) a function or a process or a message flow step, such performance may be technically accomplished in hardware and/or software as desired. The network operator or a third party such as the manufacturer or supplier of the CN 90 or the EPG 108 may suitably configure the network node 108 through hardware and/or software based configuration of the processor 235 to operate as per the particular requirements of the present disclosure discussed above.
The processor 235 may include, by way of example, a general purpose processor, a special purpose processor, a conventional processor, a digital signal processor (DSP), a plurality of microprocessors, one or more microprocessors in association with a DSP core, a controller, a microcontroller, Application Specific Integrated Circuits (ASICs), Field Programmable Gate Arrays (FPGAs) circuits, any other type of integrated circuit (!C), and/or a state machine. The processor 235 may employ distributed processing in certain embodiments.
Like the EPG 108 in FIG. 9, other network nodes in the CN 90 such as the PCRF 44, the MME 48, and so on may also be implemented by at least one processor, a memory coupled the at least one processor, and computer- readable instructions stored in the memory. The computer-readable' instructions,, when executed by the at least one processor, may configur the processor to implement various relevant aspects described hereinbefore. Alternative embodiments of the network node 108 or any of the other nodes in the CM 90 may include additional components responsible for providing additional functionality, including any of the functionality identified above and/or any functionality necessary to support the solution as per the teachings of the present disclosure. Although features and elements are described above in particular combinations, each feature or element can be used alone without the other features and elements or in various combinations with or without other features and elements.
The foregoing describes a system and method for controlling mobility of a subscriber-specific VM instanc associated with a subscriber-specific VM session from one VM to another VM using a network node in a packet-switched CN such as an EPC in a mobile communication network. Given the EPC's knowledge of subscriber's preferences and roaming, it is beneficial to have the EPC, or more specifically a network nod such as an EPG in the EPC, control the VM mobility for each subscriber to let the subscribers have the best user experience that the network can provide (In the context of cloud-based services or virtualized applications) and also enable the operators to deploy virtualized applications such as telecom apps, IT apps, web-related apps, and the like in an optimized way for their mobile subscribers. The EPG may move a subscriber's Vfv instance between VMs (intra-DC or inter-DC) based on the cellular network operator's policy, network load, subscriber's application requirement, subscriber's current location, subscriber's SLA with the operator, etc. The EPG may use GTP tunnels rooted at the EPG to data center VMs to govern intra-DC and inter-DC mobility of VMs and also to tie in the mobility triggers to service provider's PCRF policies. Each VM session for the mobile subscribers may be anchored in the EPG, which may then assume the control of VM mobility for each subscriber by establishing a new GTP interface with the VMs at a DC. The EPC~based control of VM mobility can provide optimization of cloud services accessed by a subscriber over a mobile connection. As will be recognized by those skilled in the art, the innovative concepts described in the present application can be modified and varied over a wide range of applications. Accordingly, the scope of patented subject matter should not be limited to any of the specific exemplary teachings discussed above, but is instead defined by the following claims.

Claims

WHAT IS CLAIMED IS:
1. A method (102) for managing mobility of a subscriber-specific Virtual Machine (VM) instance from a first VM to a second VM for a mobile subscriber in a mobile communication network (87), wherein the VM instance is initially created (104) in the first VM that is implemented at a first Data Center (DC) (100) associated with the mobile communication network, and wherein the method comprises performing the following using a network node in a packet- switched Core Network (CN) (90) in the mobile communication network:
anchoring (105) a VM session associated with the VM instance; and
controlling (108) the mobility of the subscriber-specific VM instance from the first VM to the second VM, wherein the second VM is implemented at one of the following:
the first DC, and
a second DC (101 ) that is different from the first DC,
2. The method of claim 1 , wherein the network node is one of the following : an Evolved Packet Gateway (EPG); and
a Packet Data Serving Nod (PDSN).
3. The method of claim 1 , wherein the C is an Evolved Packet Core (EPC).
4. The method of claim , further comprising performing the following using the network node:
implementing a VM mobility function (110) ift the network node.
5. The method of claim 1 , wherein the anchoring of" the VM session includes performing the following using the network node:
establishing (130) a tunnel with the first and the second VMs, wherein the tunnel enables the first and the second VMs each to create a corresponding first binding between a tunnel identifier (ID) for the tunnel and a VM instance number for the VIM instance; and
creating {132} a second binding among the tunne! ID, a subscriber ID for the mobile subscriber, and the VIVI instance number.
8. The method of claim 5, wherein the tunnei is one of the following:
a General Packet Radio Service (GPRS) Tunneling Protocol {GTP) tunnei; and
a Generic Routing Encapsulation (GRE) tunnei.
7. The method of claim 5, wherein the anchoring of the VM session further includes performing the following using the network node:
establishing the tunnel with a VM management function (114), wherein the tunnel enables the VM management function to create a third binding between the tunnel ID and the VM instance number,
8. The method of claim 7, wherein the controlling of the mobility of the subscriber-specific VM instance includes:
through the VM mobility function, the network node instructing the VM management function to move, scaie up, or replicate the subscriber-specific VM instance from the first VM to the second VM.
9. The method of claim 5, wherein the controlling of the mobility of the subscriber-specific VM instanc includes performing the following using the network node:
providing routing information associated with the mobility of the subscriber-specific VM instance to a switch in the first DC via the tunnei.
10. The method of claim 9, wherein providing the routing information includes:
providing the routing information using one of the following: a software switch overlay in communication with the switch in the first DC; and
a hardware switch overlay in communication with the switch in the first
DC.
11. The method of claim 1 , wherein the controlling of the mobility of the subscriber-specific VM instance includes:
the network node triggering the mobility of the subscriber-specific Vivl instance from the first VM to the second VM based on at least one of the following:
a change in geographical location of the mobile subscriber;
a requirement in a subscriber-specific Policy and Charging Rules Function (PGRF) poiicy associated with a mobiie application being used by the mobile subscriber, wherein the requirement includes at least one of the following:
a radio bandwidth threshold,
a latency delay threshold;
a first Service Level Agreement (SLA) between the mobile subscriber and an operator of the mobile communication network;
a change in a second SLA between the operator of the mobiie communication network and an owner of the first VM;
a change in a loading condition of the first VM;
a change in network topology of the mobile communication network; a new service subscribed by the mobile subscriber from the operator of the mobile communication network;
a need to control power consumption of at least one of the first VM and the second VM; and
a change In availability of hardwar resources for the first VM.
12. A network node (108) in a packet-switched Core Network (CM) (90) in a mobile communication network (87) for managing mobility of a subscriber- specific Virtual Machine (VM) instance from a first VM to a second VM for a mobile subscriber in the mobile communication network, wherei the VM instance is initially created in the first VM that is implemented at a first Data Center (DC) (100) associated with the mobile communication network, and wherein the network node Is configured to perform the following:
anchor (105), in the network node, a VM session associated with the VM instance; and
control (106) the mobility of the subscriber-specific VM; instance from the first VM to the second VM, wherein the second VM is impiemented at one of the following:
the first DC, and
a second DC (101 ) that is different from the first DC.
13, The network node of claim 12, wherein the network node is one of the following:
an Evolved Packet Gateway (EPG); and
a Packet Data Serving Node (PDSN).
14, The network node of ciaim 12, wherein the network node is configured to perform the following to anchor the VM session:
establish (130) a tunnel with the first and the second VMis, wherein the tunnel enables the first and the second VMs each to create a corresponding first binding between a tunnei Identifier (SD) for the tunnel and a VM instance number for the VM instance;
create (132) a second binding among the funnel ID, a subscriber ID for the mobile subscriber, and the VM instance number; and
further establish the tunnei with a VM management function (1 14), wherein the tunnel enables the VM management function to create a third binding between the tunnel ID and the VM instance number.
15, The network node of claim 14, wherein the tunnel is one of the following; a General Packet Radio Service (GPRS) Tunneling Protocol (GTP) tunnel; and a Generic Routing Encapsulation (GRE) tunnel.
16. The network node of claim 14, wherein the network node is configured to implement a VM mobility function (1 10) therein, and wherein the network node is further configurecl to perform the foliowing to control the mobility of the subscriber-specific VM instance;
through the VM mobility function, instruct the VM management function to move, scale up, or replicate the subscriber-specific V instance from the first VM to the second VM.
17. The network node of claim 12, wherein the network node is configured to control the mobility of the subscriber-specific VM instance by triggering the mobility of the subscriber-specific VM instance from the first VM to the second VM based on at least one of the following:
a change in geographical location of the mobile subscriber;
a requirement in a subscriber-specific network policy associated with a mobile application being used by the mobile subscriber, wherein the requirement includes at ieast one of the foliowing:
a radio bandwidth threshold,
a latency delay threshold;
a first Service Levei Agreement (SLA.) between the mobile subscriber and an operator of the mobile communication network;
a change in a second SLA between the operator of the mobile communication network and an owner of the first VM;
a change in a loading condition of the first VM;
a change in network topology of the mobile communication network; a new service subscribed by the mobiie subscriber from the operator of the mobile communication network;
a need to control power consumption of at least one of th first VM and the second VM; and
a change in availability of hardware resources for the first VM.
18. A system (8§) for managing mobility of a subscriber-specific Virtual Machine (VM) instance from a first VM to a second VM for a mobile subscriber in a mobile communication network (87), the system comprising;
a first Data Center (DC) (100) associated with the mobiie communication network and implementing the first VM, wherein the VM instance is initially created at the first VM;
a second DC (101 ) associated with the mobile communication network, wherein the second DC is in communication with the first DC and is different from the first DC; and
an Evolved Packet Core (EPC) (90) of the mobile communication network coupled to the ftrst DC and the second DC, wherein the EPC is configured to perform the following:
anchor (105) a VM session associated with the VM instance, and control (106) the mobility of the subscriber-specific V instance from the first VM to the second VM, wherein the second VM is implemented at one of the following:
the ftrst DC, and
the second DC.
19. The system of claim 18, further comprising:
a VM management function (114) in communication with the first VM and the second VM,
wherein the EPC is configured to perform the following to anchor the VM session;
establish (130) a tunnel with the first and the second MS, wherein the tunnel enables the first and the second VMs each to create a corresponding first binding between a tunnei identifier (ID) for the tunnel and a VM instance number for the VM instance;
create (132) a second binding among the tunnel ID, a subscriber ID for the mobile subscriber, and the VM instance number; further establish the tunnel with the VM management function, wherein the tunnel enables the VM management function to create a thir binding between the tunnei ID and the VM instance number.
20. The system of claim 19, wherein the EPC is configured to implement a VM mobility function (110), and wherein the EPC is configured to perform the following to control the mobility of the subscriber-specific VM instance:
through the VM mobility function, instruct the VM management function to move, scale up, or replicate the subscriber-specific VM instance from the first VM to the second VM.
PCT/IB2014/059438 2013-03-06 2014-03-04 Virtual machine mobility with evolved packet core WO2014136058A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
EP14714379.6A EP2965495A1 (en) 2013-03-06 2014-03-04 Virtual machine mobility with evolved packet core

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
US201361773415P 2013-03-06 2013-03-06
US61/773,415 2013-03-06
US14/155,986 2014-01-15
US14/155,986 US20140259012A1 (en) 2013-03-06 2014-01-15 Virtual machine mobility with evolved packet core

Publications (1)

Publication Number Publication Date
WO2014136058A1 true WO2014136058A1 (en) 2014-09-12

Family

ID=51489565

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/IB2014/059438 WO2014136058A1 (en) 2013-03-06 2014-03-04 Virtual machine mobility with evolved packet core

Country Status (3)

Country Link
US (1) US20140259012A1 (en)
EP (1) EP2965495A1 (en)
WO (1) WO2014136058A1 (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105637918A (en) * 2014-09-22 2016-06-01 华为技术有限公司 Implementation device, method and system for mobile network flattening
US20180063877A1 (en) 2015-03-04 2018-03-01 Nec Corporation Datacenter, communication apparatus, communication method, and communication control method in a communication system
WO2018063909A1 (en) * 2016-09-30 2018-04-05 Hughes Network Systems, Llc Distributed gateways with centralized data center for high throughput satellite (hts) spot beam network
CN111093182A (en) * 2019-12-24 2020-05-01 广西东信易联科技有限公司 Network optimal resource selection system for CPE (customer premises equipment)
US10849018B2 (en) 2015-03-04 2020-11-24 Nec Corporation Datacenter, communication apparatus, communication method, and communication control method in a communication system
US11216300B2 (en) 2015-03-04 2022-01-04 Nec Corporation Datacenter, communication apparatus, communication method, and communication control method in a communication system

Families Citing this family (116)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8743885B2 (en) 2011-05-03 2014-06-03 Cisco Technology, Inc. Mobile service routing in a network environment
US9794379B2 (en) 2013-04-26 2017-10-17 Cisco Technology, Inc. High-efficiency service chaining with agentless service nodes
US9843624B1 (en) * 2013-06-13 2017-12-12 Pouya Taaghol Distributed software defined networking
US10033595B2 (en) * 2013-08-27 2018-07-24 Futurewei Technologies, Inc. System and method for mobile network function virtualization
EP2852170A1 (en) * 2013-09-18 2015-03-25 Pace Plc Secure on-premise gleaning to modify an electronic program guide (EPG)
US9693382B2 (en) * 2014-02-28 2017-06-27 Alcatel-Lucent Usa Inc. Access independent signaling and control
US9680708B2 (en) 2014-03-14 2017-06-13 Veritas Technologies Method and apparatus for cloud resource delivery
US20150281005A1 (en) * 2014-03-14 2015-10-01 Avni Networks Inc. Smart network and service elements
US20150263885A1 (en) * 2014-03-14 2015-09-17 Avni Networks Inc. Method and apparatus for automatic enablement of network services for enterprises
US9379931B2 (en) 2014-05-16 2016-06-28 Cisco Technology, Inc. System and method for transporting information to services in a network environment
US9479443B2 (en) 2014-05-16 2016-10-25 Cisco Technology, Inc. System and method for transporting information to services in a network environment
US9832168B2 (en) * 2014-07-01 2017-11-28 Cable Television Laboratories, Inc. Service discovery within multi-link networks
US9794771B2 (en) * 2014-07-31 2017-10-17 Cisco Technology, Inc. Node selection in network transitions
US10348621B2 (en) 2014-10-30 2019-07-09 AT&T Intellectual Property I. L. P. Universal customer premise equipment
US10257089B2 (en) * 2014-10-30 2019-04-09 At&T Intellectual Property I, L.P. Distributed customer premises equipment
US10417025B2 (en) * 2014-11-18 2019-09-17 Cisco Technology, Inc. System and method to chain distributed applications in a network environment
US9742807B2 (en) 2014-11-19 2017-08-22 At&T Intellectual Property I, L.P. Security enhancements for a software-defined network with network functions virtualization
US9660909B2 (en) 2014-12-11 2017-05-23 Cisco Technology, Inc. Network service header metadata for load balancing
EP3654593B1 (en) 2014-12-11 2021-11-24 AT&T Intellectual Property I, L.P. Multilayered distributed router architecture
USRE48131E1 (en) 2014-12-11 2020-07-28 Cisco Technology, Inc. Metadata augmentation in a service function chain
KR102255182B1 (en) * 2014-12-17 2021-05-24 삼성전자주식회사 A method and apparatus for receiving a mobile terminated srevice by a mobile terminal of idle mode in a communication system
WO2016095998A1 (en) 2014-12-17 2016-06-23 Telefonaktiebolaget Lm Ericsson (Publ) Methods and apparatus for relocating packet processing functions
WO2016099353A1 (en) * 2014-12-18 2016-06-23 Telefonaktiebolaget Lm Ericsson (Publ) Dynamic telecommunication network infrastructure and method
WO2016096052A1 (en) * 2014-12-19 2016-06-23 Telefonaktiebolaget Lm Ericsson (Publ) Methods and apparatus for relocating packet processing functions
WO2016112948A1 (en) * 2015-01-12 2016-07-21 Telefonaktiebolaget Lm Ericsson (Publ) Methods and apparatus for relocating packet processing functions
US11336519B1 (en) * 2015-03-10 2022-05-17 Amazon Technologies, Inc. Evaluating placement configurations for distributed resource placement
JP6477863B2 (en) * 2015-03-18 2019-03-06 日本電気株式会社 COMMUNICATION SYSTEM, COMMUNICATION DEVICE, COMMUNICATION METHOD, AND PROGRAM
US10025609B2 (en) * 2015-04-23 2018-07-17 International Business Machines Corporation Virtual machine (VM)-to-VM flow control for overlay networks
US10028317B2 (en) * 2015-05-08 2018-07-17 Federated Wireless, Inc. Policy and billing services in a cloud-based access solution for enterprise deployments
US9762402B2 (en) 2015-05-20 2017-09-12 Cisco Technology, Inc. System and method to facilitate the assignment of service functions for service chains in a network environment
US9608759B2 (en) 2015-05-21 2017-03-28 Sprint Communications Company L.P. Optical communication system with hardware root of trust (HRoT) and network function virtualization (NFV)
US9979562B2 (en) 2015-05-27 2018-05-22 Sprint Communications Company L.P. Network function virtualization requirements to service a long term evolution (LTE) network
US9396016B1 (en) * 2015-05-27 2016-07-19 Sprint Communications Company L.P. Handoff of virtual machines based on security requirements
US9996377B2 (en) * 2015-06-30 2018-06-12 International Business Machines Corporation Virtual machine migration via a mobile device
WO2017022791A1 (en) * 2015-08-04 2017-02-09 日本電気株式会社 Communication system, communication apparatus, communication method, terminal, and program
TWI562661B (en) 2015-08-27 2016-12-11 Ind Tech Res Inst Cell and method and system for bandwidth management of backhaul network of cell
US10771981B2 (en) 2015-09-06 2020-09-08 Mariana Goldhamer Virtualization and central coordination in wireless networks
US9781037B2 (en) * 2015-09-15 2017-10-03 Cisco Technology, Inc. Method and apparatus for advanced statistics collection
WO2017053301A1 (en) 2015-09-23 2017-03-30 Google Inc. Distributed software defined wireless packet core system
US11825352B2 (en) * 2015-11-30 2023-11-21 Apple Inc. Mobile-terminated packet transmission
US10193984B2 (en) * 2015-12-01 2019-01-29 Telefonaktiebolaget Lm Ericsson (Publ) Architecture for enabling fine granular service chaining
US10061603B2 (en) 2015-12-09 2018-08-28 At&T Intellectual Property I, L.P. Method and apparatus for dynamic routing of user contexts
US11044203B2 (en) 2016-01-19 2021-06-22 Cisco Technology, Inc. System and method for hosting mobile packet core and value-added services using a software defined network and service chains
WO2017142529A1 (en) * 2016-02-17 2017-08-24 Hewlett Packard Enterprise Development Lp Identifying a virtual machine hosting multiple evolved packet core (epc) components
TWI586194B (en) * 2016-03-08 2017-06-01 正文科技股份有限公司 Wireless network system with offline operation and its operation method
US11297153B2 (en) 2016-03-22 2022-04-05 At&T Mobility Ii Llc Evolved packet core applications microservices broker
US10187306B2 (en) 2016-03-24 2019-01-22 Cisco Technology, Inc. System and method for improved service chaining
US10931793B2 (en) 2016-04-26 2021-02-23 Cisco Technology, Inc. System and method for automated rendering of service chaining
US10223172B2 (en) 2016-05-10 2019-03-05 International Business Machines Corporation Object storage workflow optimization leveraging storage area network value adds
US10225343B2 (en) 2016-05-10 2019-03-05 International Business Machines Corporation Object storage workflow optimization leveraging underlying hardware, operating system, and virtualization value adds
CN107404386A (en) * 2016-05-20 2017-11-28 阿尔卡特朗讯公司 For the communication means between SDN equipment and OCS, SDN equipment, OCS
US10149193B2 (en) 2016-06-15 2018-12-04 At&T Intellectual Property I, L.P. Method and apparatus for dynamically managing network resources
US10419550B2 (en) 2016-07-06 2019-09-17 Cisco Technology, Inc. Automatic service function validation in a virtual network environment
US10218616B2 (en) 2016-07-21 2019-02-26 Cisco Technology, Inc. Link selection for communication with a service function cluster
US10320664B2 (en) 2016-07-21 2019-06-11 Cisco Technology, Inc. Cloud overlay for operations administration and management
US10225270B2 (en) 2016-08-02 2019-03-05 Cisco Technology, Inc. Steering of cloned traffic in a service function chain
US10218593B2 (en) 2016-08-23 2019-02-26 Cisco Technology, Inc. Identifying sources of packet drops in a service function chain environment
US10979890B2 (en) 2016-09-09 2021-04-13 Ibasis, Inc. Policy control framework
US10454836B2 (en) 2016-11-01 2019-10-22 At&T Intellectual Property I, L.P. Method and apparatus for dynamically adapting a software defined network
US10284730B2 (en) 2016-11-01 2019-05-07 At&T Intellectual Property I, L.P. Method and apparatus for adaptive charging and performance in a software defined network
US10505870B2 (en) 2016-11-07 2019-12-10 At&T Intellectual Property I, L.P. Method and apparatus for a responsive software defined network
US10469376B2 (en) 2016-11-15 2019-11-05 At&T Intellectual Property I, L.P. Method and apparatus for dynamic network routing in a software defined network
US10039006B2 (en) 2016-12-05 2018-07-31 At&T Intellectual Property I, L.P. Method and system providing local data breakout within mobility networks
US10264075B2 (en) * 2017-02-27 2019-04-16 At&T Intellectual Property I, L.P. Methods, systems, and devices for multiplexing service information from sensor data
US10469286B2 (en) 2017-03-06 2019-11-05 At&T Intellectual Property I, L.P. Methods, systems, and devices for managing client devices using a virtual anchor manager
US10225187B2 (en) 2017-03-22 2019-03-05 Cisco Technology, Inc. System and method for providing a bit indexed service chain
CN110036656B (en) 2017-03-30 2022-10-11 伊巴西斯公司 ESIM profile switching without SMS
US10333855B2 (en) 2017-04-19 2019-06-25 Cisco Technology, Inc. Latency reduction in service function paths
US10673751B2 (en) 2017-04-27 2020-06-02 At&T Intellectual Property I, L.P. Method and apparatus for enhancing services in a software defined network
US10212289B2 (en) 2017-04-27 2019-02-19 At&T Intellectual Property I, L.P. Method and apparatus for managing resources in a software defined network
US10819606B2 (en) 2017-04-27 2020-10-27 At&T Intellectual Property I, L.P. Method and apparatus for selecting processing paths in a converged network
US10749796B2 (en) 2017-04-27 2020-08-18 At&T Intellectual Property I, L.P. Method and apparatus for selecting processing paths in a software defined network
US10554689B2 (en) 2017-04-28 2020-02-04 Cisco Technology, Inc. Secure communication session resumption in a service function chain
US11228560B2 (en) 2017-05-04 2022-01-18 Federated Wireless, Inc. Mobility functionality for a cloud-based access system
US10257668B2 (en) 2017-05-09 2019-04-09 At&T Intellectual Property I, L.P. Dynamic network slice-switching and handover system and method
US10382903B2 (en) 2017-05-09 2019-08-13 At&T Intellectual Property I, L.P. Multi-slicing orchestration system and method for service and/or content delivery
US10644953B2 (en) 2017-06-02 2020-05-05 Federated Wireless, Inc. Cloud-based network architecture centered around a software-defined spectrum controller
US10735275B2 (en) 2017-06-16 2020-08-04 Cisco Technology, Inc. Releasing and retaining resources for use in a NFV environment
US10798187B2 (en) 2017-06-19 2020-10-06 Cisco Technology, Inc. Secure service chaining
US10524116B2 (en) * 2017-06-27 2019-12-31 Ibasis, Inc. Internet of things services architecture
US10397271B2 (en) 2017-07-11 2019-08-27 Cisco Technology, Inc. Distributed denial of service mitigation for web conferencing
US10673698B2 (en) 2017-07-21 2020-06-02 Cisco Technology, Inc. Service function chain optimization using live testing
US10070344B1 (en) 2017-07-25 2018-09-04 At&T Intellectual Property I, L.P. Method and system for managing utilization of slices in a virtual network function environment
US11063856B2 (en) 2017-08-24 2021-07-13 Cisco Technology, Inc. Virtual network function monitoring in a network function virtualization deployment
US10791065B2 (en) 2017-09-19 2020-09-29 Cisco Technology, Inc. Systems and methods for providing container attributes as part of OAM techniques
US11018981B2 (en) 2017-10-13 2021-05-25 Cisco Technology, Inc. System and method for replication container performance and policy validation using real time network traffic
US10541893B2 (en) 2017-10-25 2020-01-21 Cisco Technology, Inc. System and method for obtaining micro-service telemetry data
US10104548B1 (en) 2017-12-18 2018-10-16 At&T Intellectual Property I, L.P. Method and apparatus for dynamic instantiation of virtual service slices for autonomous machines
CN108123865B (en) * 2017-12-21 2020-07-14 新华三技术有限公司 Message processing method and device
US10721668B2 (en) * 2017-12-22 2020-07-21 International Business Machines Corporation Network virtualization of user equipment in a wireless communication network
WO2019127068A1 (en) * 2017-12-27 2019-07-04 Intel Corporation User plane apparatus for edge computing
CN111357259A (en) * 2018-01-09 2020-06-30 康维达无线有限责任公司 Adaptive control mechanism for service layer operations
US10776173B1 (en) 2018-04-30 2020-09-15 Amazon Technologies, Inc. Local placement of resource instances in a distributed system
US10666612B2 (en) 2018-06-06 2020-05-26 Cisco Technology, Inc. Service chains for inter-cloud traffic
US10779155B2 (en) * 2018-07-17 2020-09-15 At&T Intellectual Property I, L.P. Customizable and low-latency architecture for cellular core networks
US11550606B2 (en) * 2018-09-13 2023-01-10 Intel Corporation Technologies for deploying virtual machines in a virtual network function infrastructure
US11122452B2 (en) * 2019-04-15 2021-09-14 Netscout Systems, Inc System and method for load balancing of network packets received from a MME with smart filtering
US10965737B1 (en) * 2019-11-29 2021-03-30 Amazon Technologies, Inc. Cloud computing in communications service provider networks
US11418995B2 (en) 2019-11-29 2022-08-16 Amazon Technologies, Inc. Mobility of cloud compute instances hosted within communications service provider networks
US11411925B2 (en) * 2019-12-31 2022-08-09 Oracle International Corporation Methods, systems, and computer readable media for implementing indirect general packet radio service (GPRS) tunneling protocol (GTP) firewall filtering using diameter agent and signal transfer point (STP)
US11751261B2 (en) * 2020-03-06 2023-09-05 Qualcomm Incorporated Smart link management (link pooling)
CN111552244A (en) * 2020-04-23 2020-08-18 江西瑞林电气自动化有限公司 Method for solving maintenance problem of DCS (distributed control system) by using virtual technology
US11553342B2 (en) 2020-07-14 2023-01-10 Oracle International Corporation Methods, systems, and computer readable media for mitigating 5G roaming security attacks using security edge protection proxy (SEPP)
CN114124944A (en) * 2020-08-27 2022-03-01 阿里巴巴集团控股有限公司 Data processing method and device of hybrid cloud and electronic equipment
US11751056B2 (en) 2020-08-31 2023-09-05 Oracle International Corporation Methods, systems, and computer readable media for 5G user equipment (UE) historical mobility tracking and security screening using mobility patterns
US11825310B2 (en) 2020-09-25 2023-11-21 Oracle International Corporation Methods, systems, and computer readable media for mitigating 5G roaming spoofing attacks
US11832172B2 (en) 2020-09-25 2023-11-28 Oracle International Corporation Methods, systems, and computer readable media for mitigating spoofing attacks on security edge protection proxy (SEPP) inter-public land mobile network (inter-PLMN) forwarding interface
US11622255B2 (en) 2020-10-21 2023-04-04 Oracle International Corporation Methods, systems, and computer readable media for validating a session management function (SMF) registration request
US11528251B2 (en) 2020-11-06 2022-12-13 Oracle International Corporation Methods, systems, and computer readable media for ingress message rate limiting
US11770694B2 (en) 2020-11-16 2023-09-26 Oracle International Corporation Methods, systems, and computer readable media for validating location update messages
US11818570B2 (en) 2020-12-15 2023-11-14 Oracle International Corporation Methods, systems, and computer readable media for message validation in fifth generation (5G) communications networks
US11812271B2 (en) 2020-12-17 2023-11-07 Oracle International Corporation Methods, systems, and computer readable media for mitigating 5G roaming attacks for internet of things (IoT) devices based on expected user equipment (UE) behavior patterns
US11700510B2 (en) 2021-02-12 2023-07-11 Oracle International Corporation Methods, systems, and computer readable media for short message delivery status report validation
US11516671B2 (en) 2021-02-25 2022-11-29 Oracle International Corporation Methods, systems, and computer readable media for mitigating location tracking and denial of service (DoS) attacks that utilize access and mobility management function (AMF) location service
US11689912B2 (en) 2021-05-12 2023-06-27 Oracle International Corporation Methods, systems, and computer readable media for conducting a velocity check for outbound subscribers roaming to neighboring countries
US20230082301A1 (en) * 2021-09-13 2023-03-16 Guavus, Inc. MEASURING QoE SATISFACTION IN 5G NETWORKS OR HYBRID 5G NETWORKS

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2184949A1 (en) * 2007-08-13 2010-05-12 Huawei Technologies Co., Ltd. A method and an apparatus for non-access stratum message processing during handover in evolved network
US20110314155A1 (en) * 2010-06-16 2011-12-22 Juniper Networks, Inc. Virtual machine mobility in data centers

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2037652A3 (en) * 2007-06-19 2009-05-27 Panasonic Corporation Methods and apparatuses for detecting whether user equipment resides in a trusted or a non-trusted access network
US20120221700A1 (en) * 2010-08-26 2012-08-30 Kddi Corporation System, Method and Program for Telecom Infrastructure Virtualization and Management
US8750121B2 (en) * 2011-10-28 2014-06-10 Telefonaktiebolaget L M Ericsson (Publ) Addressing the large flow problem for equal cost multi-path in the datacenter
US9184981B2 (en) * 2012-03-09 2015-11-10 Futurewei Technologies, Inc. System and apparatus for distributed mobility management based network layer virtual machine mobility protocol
US9331938B2 (en) * 2012-04-13 2016-05-03 Nicira, Inc. Extension of logical networks across layer 3 virtual private networks
EP2687982A1 (en) * 2012-07-16 2014-01-22 NTT DoCoMo, Inc. Hierarchical system for managing a plurality of virtual machines, method and computer program

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2184949A1 (en) * 2007-08-13 2010-05-12 Huawei Technologies Co., Ltd. A method and an apparatus for non-access stratum message processing during handover in evolved network
US20110314155A1 (en) * 2010-06-16 2011-12-22 Juniper Networks, Inc. Virtual machine mobility in data centers

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105637918B (en) * 2014-09-22 2019-06-28 华为技术有限公司 A kind of realization device of mobile network's flattening, method and system
CN105637918A (en) * 2014-09-22 2016-06-01 华为技术有限公司 Implementation device, method and system for mobile network flattening
US10609742B2 (en) 2015-03-04 2020-03-31 Nec Corporation Datacenter, communication apparatus, communication method, and communication control method in a communication system
US10271362B2 (en) 2015-03-04 2019-04-23 Nec Corporation Datacenter, communication apparatus, communication method, and communication control method in a communication system
US20180063877A1 (en) 2015-03-04 2018-03-01 Nec Corporation Datacenter, communication apparatus, communication method, and communication control method in a communication system
US10849018B2 (en) 2015-03-04 2020-11-24 Nec Corporation Datacenter, communication apparatus, communication method, and communication control method in a communication system
US11116019B2 (en) 2015-03-04 2021-09-07 Nec Corporation Datacenter, communication apparatus, communication method, and communication control method in a communication system
US11216300B2 (en) 2015-03-04 2022-01-04 Nec Corporation Datacenter, communication apparatus, communication method, and communication control method in a communication system
US11882608B2 (en) 2015-03-04 2024-01-23 Nec Corporation Datacenter, communication apparatus, communication method, and communication control method in a communication system
WO2018063909A1 (en) * 2016-09-30 2018-04-05 Hughes Network Systems, Llc Distributed gateways with centralized data center for high throughput satellite (hts) spot beam network
US10362120B2 (en) 2016-09-30 2019-07-23 Hughes Network Systems, Llc Distributed gateways with centralized data center for high throughput satellite (HTS) spot beam network
CN111093182A (en) * 2019-12-24 2020-05-01 广西东信易联科技有限公司 Network optimal resource selection system for CPE (customer premises equipment)
CN111093182B (en) * 2019-12-24 2021-06-11 广西东信易联科技有限公司 Network optimal resource selection system for CPE (customer premises equipment)

Also Published As

Publication number Publication date
EP2965495A1 (en) 2016-01-13
US20140259012A1 (en) 2014-09-11

Similar Documents

Publication Publication Date Title
US20140259012A1 (en) Virtual machine mobility with evolved packet core
KR102130231B1 (en) Network slicing behavior
US10028083B2 (en) Mobility management
US8886209B2 (en) Long term evolution integrated radio access network system leverage proactive load balancing policy enforcement
EP3437358B1 (en) Service delivery to an user equipment (ue) using a software-defined networking (sdn) controller
US11696190B2 (en) CDMA/EVDO virtualization
US10595247B2 (en) Providing services to a roaming user equipment
US10219175B2 (en) Enhanced mobility management
WO2017124003A1 (en) Mobility management for next generation mobile network
US9781632B2 (en) Interaction and migration of EPC towards virtualized mobile backhaul/sharing of RAT (eNB, RNC, BSC)
US11418386B2 (en) Virtual network function creation system
WO2019101292A1 (en) Method and function for handling traffic for an application
US20190123978A1 (en) Intelligent network resource orchestration system and method for internet enabled device applications and services
EP2957094A2 (en) Network-controlled wtru address/anchor selection
US10536330B2 (en) Highly dynamic authorisation of concurrent usage of separated controllers
US10523584B2 (en) Software-defined socket activation
US20230246997A1 (en) Systems and methods for providing enum service activations
US9794132B2 (en) TrGw and virtualisation
US11575764B2 (en) Systems and methods for providing ENUM service activations

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 14714379

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

WWE Wipo information: entry into national phase

Ref document number: 2014714379

Country of ref document: EP