WO2017019018A1 - Mise a l'échelle automatique de fonction de réseau virtualisée sur la base de notifications de croisement de seuil léger - Google Patents

Mise a l'échelle automatique de fonction de réseau virtualisée sur la base de notifications de croisement de seuil léger Download PDF

Info

Publication number
WO2017019018A1
WO2017019018A1 PCT/US2015/042271 US2015042271W WO2017019018A1 WO 2017019018 A1 WO2017019018 A1 WO 2017019018A1 US 2015042271 W US2015042271 W US 2015042271W WO 2017019018 A1 WO2017019018 A1 WO 2017019018A1
Authority
WO
WIPO (PCT)
Prior art keywords
threshold
network function
virtualized network
vnf
performance management
Prior art date
Application number
PCT/US2015/042271
Other languages
English (en)
Inventor
Anatoly ANDRIANOV
Gyula Bodog
Original Assignee
Nokia Solutions And Networks Oy
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nokia Solutions And Networks Oy filed Critical Nokia Solutions And Networks Oy
Priority to PCT/US2015/042271 priority Critical patent/WO2017019018A1/fr
Publication of WO2017019018A1 publication Critical patent/WO2017019018A1/fr

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/455Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
    • G06F9/45533Hypervisors; Virtual machine monitors
    • G06F9/45558Hypervisor-specific management and integration aspects
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/455Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
    • G06F9/45533Hypervisors; Virtual machine monitors
    • G06F9/45558Hypervisor-specific management and integration aspects
    • G06F2009/45575Starting, stopping, suspending or resuming virtual machine instances

Definitions

  • Network Functions Virtualization can refer to an approach that adds new capabilities to communications networks and may require a new set of management and orchestration functions to be added to the current model of operations, administration, maintenance and provisioning.
  • NFV Network Functions Virtualization
  • NF Network Function
  • NFV can decouple software implementations of Network Functions from the computation, storage, and networking resources they use.
  • the virtualization can insulate the Network Functions from those resources through a virtualization layer.
  • the virtualization principle cab stimulate a multi-vendor ecosystem in which the different components of network function virtualization infrastructure (NFVI), virtualized network function (VNF) software, and NFV management and orchestration (NFV-MANO) architectural framework entities can follow different lifecycles, for example on procurement, upgrading, and so on. This flexibility may require interoperable standardized interfaces and proper resource abstraction among them.
  • NFVI network function virtualization infrastructure
  • VNF virtualized network function
  • NFV-MANO NFV management and orchestration
  • VNF management Management and orchestration aspects of a VNF include traditional Fault Management, Configuration Management, Accounting Management, Performance Management, and Security Management (FCAPS), but the focus in European Telecommunications Standards Institute (ETSI) NFV is on the newer aspect introduced by NFV.
  • ETSI European Telecommunications Standards Institute
  • the decoupling of network functions from the physical infrastructure that those functions use, can result in a new set of management functions focused on the creation and lifecycle management of the needed virtualized resources for the VNF, which can be collectively referred to as VNF management.
  • VNF management functions can be responsible for the VNF's lifecycle management including operations such as the following: instantiating VNF, including creating a VNF using the VNF on-boarding artefacts; scaling VNF, including increase in or reduction to the capacity of the VNF; updating and/or upgrading VNF, including support of VNF software and/or configuration changes of various complexity; and terminating VNF, including release of VNF-associated NFVI resources and return it to NFVI resource pool.
  • the deployment and operational behavior requirements of each VNF can be captured in a deployment template, and stored during the VNF on- boarding process in a catalogue, for future use.
  • the deployment template describes the attributes and requirements necessary to realize such a VNF and captures, in an abstracted manner, the requirements to manage its lifecycle.
  • VNF Virtualized Network Function
  • LCM Virtualized Network Function Lifecycle Management
  • Autoscaling decisions may be based on the values of monitoring parameters such as Virtualized Resources (VR) consumption.
  • VNFM may keep track of the VR performance measurements (PM) and when particular measurement reaches particular level or a combination of measurements reaches set of predefined values, VNFM may decide that a scaling is needed and trigger the corresponding LCM operation.
  • PM VR performance measurements
  • making scaling decisions based only on the V consumption may be sub- optimal, and even wrong in some cases, because such an approach ignores the application behavior of the VNF.
  • a method can include receiving at least one performance management counter.
  • the method can also include determining if at least one predefined threshold of the at least one performance management counter has been crossed.
  • the method can further include, when it is determined that the threshold has been crossed, reporting the threshold crossing to a virtualized network function manager.
  • the notification of the at least one predefined threshold to the virtualized network function manager can be configured to avoid providing application details of a corresponding application to the virtualized network function manager.
  • a method can include receiving a notification that a threshold crossing has occurred with respect to at least one predefined threshold of at least one management counter.
  • the method can also include checking a virtualized network function descriptor to determine a lifecycle management action based on the notification.
  • the method can further include performing the lifecycle management action responsive to the threshold crossing.
  • a method can include identifying, for at least one performance measurement or composite key performance indicator, at least one threshold.
  • the threshold can be configured to reflect a change in application behavior.
  • the method can also include instructing a network element to monitor the at least one performance measurement or composite key performance indicator using the threshold.
  • An apparatus in certain embodiments, can include at least one processor and at least one memory including computer program code.
  • the at least one memory and the computer program code can be configured to, with the at least one processor, cause the apparatus at least to perform any of the preceding methods.
  • a non-transitory computer- readable medium can be encoded with instructions that, when executed in hardware, perform a method.
  • the method can be any of the preceding methods.
  • a computer program product can be encoded with instructions for performing a process.
  • the process can be any of the preceding methods.
  • Figure 1 illustrates a sequence diagram showing the VR PM data flow and application PM data flow between elements, according to certain embodiments.
  • Figure 2 illustrates a method that may be performed by an element manager, according to certain embodiments.
  • Figure 3 illustrates a method that may be performed by a VNFM, according to certain embodiments.
  • FIG. 4 illustrates a system according to certain embodiments.
  • Certain embodiments are applicable to ETSI NFV defined MANO architecture. More particularly, in certain embodiments application specific behavior can be hinted to the VNFM to be used in autoscaling decisions, but without increasing the VNFM complexity and without exposing too much proprietary knowledge of VNF application details to the VNFM.
  • Certain embodiments may provide the VNFM with application level knowledge to select the appropriate PMs and set the appropriate thresholds for notifications to be generated. Certain embodiments may provide these and/or other benefits based on lightweight threshold notifications.
  • certain embodiments provide a method for VNF autoscaling decisions based on the lightweight threshold crossing notifications. More particularly, certain embodiments expose just enough information about the performance state of a VNF application to support the autoscaling decisions at the VNFM without requiring any knowledge about VNF application behavior, application performance profile or VNF application internal architecture.
  • a first stream can include detailed information about V consumption, such as VR PMs.
  • This stream may, for example, be provided by the Virtualized Infrastructure Manager (VIM) as described in the ETSI NFV IFA006 and IF AO 10 specifications.
  • VIM Virtualized Infrastructure Manager
  • the second stream may be notifications about VNF application state, such as lightweight threshold crossing notifications. These notifications may be provided by the EM or, in certain cases, by the VNF itself. Furthermore, in certain embodiments, notification providing by the VNF may be independent of EM deployment.
  • the VR consumption may be considered a continuous stream of data, although in practice this stream may be implemented in the form of periodic PM jobs.
  • the VNFM may monitor the resource consumption on a single dimensional graph or a multi-dimensional surface.
  • the VNFM can make scaling decisions when VR utilization/consumption reaches a pre-defined region.
  • VNFM may decide the most appropriate VR PMs based on machine learning algorithms or based on a specification provided by the VNF vendor. In either of these cases, VNFM may select the desired VR PMs, create the corresponding PM jobs on the VIM(s) controlling the relevant NFVI, and monitor the PM data.
  • the application level lightweight threshold crossing can be under full control of the VNF provider.
  • the VNF provider can select an existing application level PM or can create a composite application level key performance indicator (KPI). This selection and/or creation can be based on the VNF provider's proprietary knowledge of the VNF application behavior and architecture.
  • KPI application level key performance indicator
  • the VNF provider may select the important, from the provider's perspective, values of these PMs/KPIs.
  • the decision of which are important may be based for example, on the application behavior, such as that observed in other deployments or lab environment.
  • the decision may likewise be based on a proprietary VNF application performance profile.
  • the selected application level PM/KPI may indicate the VNF application load level and selected values may represent green, yellow, and red areas of a performance gauge. The transitions from green to yellow and from yellow to red can happen when the selected application PM/KPI crosses the pre-defined threshold(s).
  • the semantics of selected PMs/KPIs, the number of pre-defined thresholds and their specific values can be proprietary and can be maintained secretly by the VNF provider. In certain embodiments, there may be only one threshold per PM/KPI and two states, such as active/inactive, crossed/not crossed, or true/false. VNFM is not required to know the thresholds and their values. Thus the VNFM can avoid the burden of application level knowledge or application awareness.
  • VNF can expose a lightweight notifications interface allowing VNFM to know the state of each of these anonymous application level indicators and be notified whenever the state of a particular indicator changes. These notifications of changes can be referred to as lightweight threshold crossing notifications.
  • the notifications can be considered anonymous if, for example, they conceal the basis for the notifications, such as if the actual semantics are unknown to the VNFM.
  • Examples of such anonymous notifications include, for example, the following: indicator A, state green; indicator B, state green; indicator C, state yellow; or indicator D, state true.
  • the VNF provider may specify the desired VNFM LCM operation behavior based on the combination of exposed indicators and their states. For example, the VNF provider may specify that a particular behavior is to occur upon some anonymous condition being met. An example of this behavior being specified through anonymous conditions being met can be, for example, when an indicator A is set to "true” and indicator B is set to "red", the VNF component XYZ can be specified to be scaled-up. This is simply one example of such condition setting, and should not be taken as limiting.
  • the set of the indicators and their values mapped to the desired LCM operations may be part of the VNF package metadata and may, for example, be contained in a virtualized network function descriptor (VNFD).
  • VNFD virtualized network function descriptor
  • the combination of the anonymous indicators with lightweight threshold crossing notifications and the map describing the desired LCM operations behavior may permit VNFM to make autoscaling decisions while maintaining certain level of flexibility based on monitored VR PMs. Moreover, such autoscaling decisions may be optimal from the application perspective.
  • a first use case may be simple VNFM autoscaling.
  • VNFM may not need any sophisticated monitoring of VR PMs and may base all autoscaling decisions only on the lightweight threshold notifications as specified by the VNF provider in the VNF metadata.
  • the autoscaling decisions may be sub-optimal from the VR utilization perspective, but they ensure optimal VNF application performance, for example avoiding overloaded conditions.
  • a second use case may be sophisticated VNFM autoscaling.
  • VNFM can take into account the lightweight threshold crossing notifications, ensuring that application performance remains unaffected. Additionally, the VNFM can keep track of the actual V PMs, identifying opportunities for optimal VR utilization.
  • Implementation of various embodiments can include various parts.
  • a VNF provider can identify important application PMs or composite KPIs. This identification can be based on the knowledge the VNF provider has of application performance profile and internal architecture.
  • the VNF provider can identify the significant thresholds. For example, the VNF provider can identify at least one threshold per PM/KPI. Crossing these thresholds can indicate significant changes in application behavior, for example, particular VNF component performance state. The semantics of selected PMs/KPIs and the actual values of the identified thresholds do not need to be disclosed by the VNF provider.
  • the VNF provider can create a map of desired LCM operations with indicators and their states, such as selected PMs/KPIs and threshold crossed/not crossed.
  • the VNF provider can document this map in VNF metadata, for example, in VNFD.
  • the mapping to desired LCM operations is optional.
  • the VNF provider may decide to just indicate the important thresholds from VNF application behavior perspective and leave the actual LCM operation decisions to the VNFM.
  • the number of specified indicators, the number of states per indicator and level of detail in desired LCM operation mapping may depend on the complexity of VNF and provider's knowledge of an application performance profile.
  • both the VNF provider and the VNFM vendor can implement an interface for the VNF to inform VNFM about current states of indicators and notify the VNFM whenever these states change.
  • the states can be considered changed when any of the thresholds are crossed in either direction.
  • the VNFM vendor can implement the autoscaling decision logic of the VFNM based on the application performance indicators and their states. Certain embodiments may simply follow the map of indicator states to the desired LCM operations as specified by the VNF provider. More complex implementations may consider the V PMs and try to achieve optimal VR utilization while still satisfying the VNF provider's specifications. In practice, such implementation may be considered a switch between different VR PM surfaces based on the combination of application performance indicator values or a policy (policy-like) rule-set of indicator values vs. LCM operations with or without consideration of VR PMs.
  • FIG. 1 illustrates a sequence diagram showing the VR PM data flow and application PM data flow between elements, according to certain embodiments.
  • an EM can create an application PM job with the VNF, which can result in the VNF providing application PM counter collection and periodic or aperiodic reporting of the result of such collection.
  • the EM can determine whether a threshold has been crossed and can report such threshold crossing to a VNFM, such as a notification of PM counter A crossing a threshold.
  • the VNFM can create a VR PM job with a VIM, yielding collection and periodic or aperiodic reporting of the VR PM to the VNFM.
  • the VNFM can check VNFD to determine what LCM operation is mapped to a threshold crossing of this kind for counter A.
  • the VNFM can do the mapped operation according to the VNFD.
  • FIG. 2 illustrates a method that may be performed by an element manager, according to certain embodiments.
  • an EM can create an application PM job.
  • the application PM counters can be reported by a VNF to the EM.
  • the EM can check whether any predefined PM counter's threshold has been crossed. If not, monitoring of the counters reported by VNF can continue. If a threshold has been crossed, then at 240 the EM can send a threshold crossing notification to a VNFM.
  • FIG 3 illustrates a method that may be performed by a VNFM, according to certain embodiments.
  • a method can include, at 310, the VNFM creating a V PM job.
  • the VR PM counters can be reported to the VNFM.
  • the VNFM can, at 330, correlate the VR PM to one or more VNF/VNFC instance(s).
  • the VNFM can determine whether a threshold crossing notification has been received. If not, the VNFM can continue to correlate VR PM counters to VNF/VNFC instance(s).
  • the VNFM can check VNFD for a required LCM action. If there is no required action, then the VNFM can simply do nothing. Otherwise, the VNFM can execute the required LCM action as defined in VNFD, at 360.
  • Figure 4 illustrates a system according to certain embodiments of the invention.
  • a system may include multiple devices, such as, for example, at least one EM 410, at least one VNFM 420, and at least one network element 430, which may be any virtualized function or other device.
  • Each of these devices may include at least one processor, respectively indicated as 414, 424, and 434.
  • At least one memory can be provided in each device, and indicated as 415, 425, and 435, respectively.
  • the memory may include computer program instructions or computer code contained therein.
  • the processors 414, 424, and 434 and memories 415, 425, and 435, or a subset thereof, can be configured to provide means corresponding to the various blocks of Figures 2 and 3.
  • transceivers 416, 426, and 436 can be provided, and each device may also include an antenna, respectively illustrated as 417, 427, and 437.
  • antenna 437 can illustrate any form of communication hardware, without requiring a conventional antenna.
  • Transceivers 416, 426, and 436 can each, independently, be a transmitter, a receiver, or both a transmitter and a receiver, or a unit or device that is configured both for transmission and reception.
  • Processors 414, 424, and 434 can be embodied by any computational or data processing device, such as a central processing unit (CPU), application specific integrated circuit (ASIC), or comparable device.
  • the processors can be implemented as a single controller, or a plurality of controllers or processors.
  • Memories 415, 425, and 435 can independently be any suitable storage device, such as a non-transitory computer-readable medium.
  • a hard disk drive (HDD), random access memory (RAM), flash memory, or other suitable memory can be used.
  • the memories can be combined on a single integrated circuit as the processor, or may be separate from the one or more processors.
  • the computer program instructions stored in the memory and which may be processed by the processors can be any suitable form of computer program code, for example, a compiled or interpreted computer program written in any suitable programming language.
  • the memory and the computer program instructions can be configured, with the processor for the particular device, to cause a hardware apparatus such as EM 410, VNFM 420, and network element 430, to perform any of the processes described herein (see, for example, Figures 2 and 3). Therefore, in certain embodiments, a non-transitory computer-readable medium can be encoded with computer instructions that, when executed in hardware, perform a process such as one of the processes described herein. Alternatively, certain embodiments of the invention can be performed entirely in hardware.
  • Figure 4 illustrates a system including a EM, VNFM, and network element
  • embodiments of the invention may be applicable to other configurations, and configurations involving additional elements.
  • Certain embodiments can have various benefits and/or advantages. For example, certain embodiments can address the issue of LCM triggering at the generic VNFM enabling it with necessary application level knowledge supporting the LCM decisions. At the same time, certain embodiments can provide an appropriate level of separation between the application management and virtualization aspects management.
  • VNFM VNF Manager
  • VNFD Virtualized Network Function Descriptor NF - Network Function

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

Selon l'invention, différents systèmes de communication peuvent bénéficier d'une mise à l'échelle appropriée. Par exemple, une certaine mise à l'échelle automatique de fonction de réseau virtualisée peut bénéficier de l'utilisation appropriée de notifications de croisement de seuil léger. Un procédé peut consister à recevoir au moins un dispositif de mesure de gestion de performances. Le procédé peut également consister à déterminer si au moins un seuil prédéfini du ou des dispositifs de mesure de gestion de performances a ou non été dépassé. Le procédé consiste en outre, lorsqu'il est déterminé que le seuil a été dépassé, à rapporter le croisement de seuil à un gestionnaire de fonction de réseau virtualisée. La notification du ou des seuils prédéfinis au gestionnaire de fonction de réseau virtualisée peut être configurée pour éviter la fourniture de détails d'application d'une application correspondante au gestionnaire de fonction de réseau virtualisée.
PCT/US2015/042271 2015-07-27 2015-07-27 Mise a l'échelle automatique de fonction de réseau virtualisée sur la base de notifications de croisement de seuil léger WO2017019018A1 (fr)

Priority Applications (1)

Application Number Priority Date Filing Date Title
PCT/US2015/042271 WO2017019018A1 (fr) 2015-07-27 2015-07-27 Mise a l'échelle automatique de fonction de réseau virtualisée sur la base de notifications de croisement de seuil léger

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/US2015/042271 WO2017019018A1 (fr) 2015-07-27 2015-07-27 Mise a l'échelle automatique de fonction de réseau virtualisée sur la base de notifications de croisement de seuil léger

Publications (1)

Publication Number Publication Date
WO2017019018A1 true WO2017019018A1 (fr) 2017-02-02

Family

ID=57884833

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2015/042271 WO2017019018A1 (fr) 2015-07-27 2015-07-27 Mise a l'échelle automatique de fonction de réseau virtualisée sur la base de notifications de croisement de seuil léger

Country Status (1)

Country Link
WO (1) WO2017019018A1 (fr)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10826789B2 (en) 2018-12-27 2020-11-03 At&T Intellectual Property I, L.P. Adjusting triggers for automatic scaling of virtual network functions
US10841821B2 (en) 2019-02-01 2020-11-17 Hcl Technologies Limited Node profiling based on combination of performance management (PM) counters using machine learning techniques
US10972405B2 (en) 2018-01-12 2021-04-06 Metaswitch Networks Ltd. Scaling network functions
US11271835B2 (en) 2019-05-10 2022-03-08 Cisco Technology, Inc. Composite key performance indicators for network health monitoring
US11388109B2 (en) 2019-12-05 2022-07-12 At&T Intellectual Property I, L.P. Hierarchical capacity management in a virtualization environment

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130139160A1 (en) * 2007-12-31 2013-05-30 Netapp, Inc. System and method for automatic storage load balancing in virtual server environments
US20140337837A1 (en) * 2013-05-13 2014-11-13 Vmware, Inc. Automated scaling of applications in virtual data centers
US20150026348A1 (en) * 2011-10-05 2015-01-22 Amazon Technologies, Inc. Reactive auto-scaling of capacity

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130139160A1 (en) * 2007-12-31 2013-05-30 Netapp, Inc. System and method for automatic storage load balancing in virtual server environments
US20150026348A1 (en) * 2011-10-05 2015-01-22 Amazon Technologies, Inc. Reactive auto-scaling of capacity
US20140337837A1 (en) * 2013-05-13 2014-11-13 Vmware, Inc. Automated scaling of applications in virtual data centers

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10972405B2 (en) 2018-01-12 2021-04-06 Metaswitch Networks Ltd. Scaling network functions
US10826789B2 (en) 2018-12-27 2020-11-03 At&T Intellectual Property I, L.P. Adjusting triggers for automatic scaling of virtual network functions
US11356336B2 (en) 2018-12-27 2022-06-07 At&T Intellectual Property I, L.P. Adjusting triggers for automatic scaling of virtual network functions
US11671332B2 (en) 2018-12-27 2023-06-06 At&T Intellectual Property I, L.P. Adjusting triggers for automatic scaling of virtual network functions
US10841821B2 (en) 2019-02-01 2020-11-17 Hcl Technologies Limited Node profiling based on combination of performance management (PM) counters using machine learning techniques
US11271835B2 (en) 2019-05-10 2022-03-08 Cisco Technology, Inc. Composite key performance indicators for network health monitoring
US11611496B2 (en) 2019-05-10 2023-03-21 Cisco Technology, Inc. Composite key performance indicators for network health monitoring
US11388109B2 (en) 2019-12-05 2022-07-12 At&T Intellectual Property I, L.P. Hierarchical capacity management in a virtualization environment

Similar Documents

Publication Publication Date Title
EP3570494B1 (fr) Cadre d'opérations automatisées intelligentes pour gestion de réseau, de service et d'expérience client
EP3119034B1 (fr) Procédé, dispositif et système de traitement de défauts sur la base d'une virtualisation d'une fonction de réseau
US10630565B2 (en) Overload management for internet of things (IoT) gateways
US10425449B2 (en) Classifying internet-of-things (IOT) gateways using principal component analysis
CN105934916B (zh) 向所部署装置编制和管理服务
US10530864B2 (en) Load balancing internet-of-things (IOT) gateways
WO2017019018A1 (fr) Mise a l'échelle automatique de fonction de réseau virtualisée sur la base de notifications de croisement de seuil léger
US9588833B2 (en) Information processing system monitoring apparatus, monitoring method, and monitoring program
US20180234519A1 (en) Managing device profiles in the internet-of-things (iot)
US20170346676A1 (en) Alarm correlation in network function virtualization environment
US10686837B2 (en) Method and device for customizing security service
CN104360878B (zh) 一种应用软件部署的方法及装置
US20170339007A1 (en) Alarm information processing method, related device, and system
US10791030B2 (en) Policy transmission method and apparatus in NFV system
US20130173965A1 (en) Fault tracing system and method for remote maintenance
US10944838B2 (en) Control device, resource manager and methods thereof
JP7038629B2 (ja) 機器状態監視装置及びプログラム
WO2017018435A1 (fr) Dispositif de surveillance de ressources, système de gestion de fonction de réseau virtuel, procédé de surveillance de ressources, et programme associé
KR20210058468A (ko) 지능형 에지 네트워킹의 인공지능 운용자 지원 시스템 장치 및 방법
KR20200063343A (ko) Trvn 인프라구조의 운용 관리 장치 및 방법
EP4377848A1 (fr) Gestion liée à la confiance de pipelines d'apprentissage automatique ou d'intelligence artificielle
EP3593495B1 (fr) Procédé d'intensification de défaillance dans un environnement nfv
Kontoudis et al. A statistical approach to virtual server resource management
WO2017157903A1 (fr) Rétablissement de fonction de réseau virtualisé de bout en bout
CN110417568B (zh) Nfv策略协商方法及系统

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 15899813

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 15899813

Country of ref document: EP

Kind code of ref document: A1