WO2017173667A1 - 一种管理方法及装置 - Google Patents
一种管理方法及装置 Download PDFInfo
- Publication number
- WO2017173667A1 WO2017173667A1 PCT/CN2016/078913 CN2016078913W WO2017173667A1 WO 2017173667 A1 WO2017173667 A1 WO 2017173667A1 CN 2016078913 W CN2016078913 W CN 2016078913W WO 2017173667 A1 WO2017173667 A1 WO 2017173667A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- affinity
- information
- rule
- management unit
- target object
- Prior art date
Links
- 238000007726 management method Methods 0.000 title claims abstract description 266
- 238000000034 method Methods 0.000 claims abstract description 61
- 238000004891 communication Methods 0.000 claims description 37
- 238000012545 processing Methods 0.000 claims description 18
- 230000009471 action Effects 0.000 claims description 8
- 230000006870 function Effects 0.000 description 57
- 230000008569 process Effects 0.000 description 23
- 230000009849 deactivation Effects 0.000 description 18
- 238000010586 diagram Methods 0.000 description 11
- 238000005516 engineering process Methods 0.000 description 10
- 238000013461 design Methods 0.000 description 7
- 230000003993 interaction Effects 0.000 description 4
- 238000012423 maintenance Methods 0.000 description 4
- 230000003213 activating effect Effects 0.000 description 2
- 230000008878 coupling Effects 0.000 description 2
- 238000010168 coupling process Methods 0.000 description 2
- 238000005859 coupling reaction Methods 0.000 description 2
- 230000010354 integration Effects 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 230000002093 peripheral effect Effects 0.000 description 2
- 238000004458 analytical method Methods 0.000 description 1
- 238000004590 computer program Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 238000000802 evaporation-induced self-assembly Methods 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/02—Standardisation; Integration
- H04L41/0233—Object-oriented techniques, for representation of network management data, e.g. common object request broker architecture [CORBA]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/08—Configuration management of networks or network elements
- H04L41/0893—Assignment of logical groups to network elements
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/455—Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
- G06F9/45533—Hypervisors; Virtual machine monitors
- G06F9/45558—Hypervisor-specific management and integration aspects
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/08—Configuration management of networks or network elements
- H04L41/0803—Configuration setting
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/08—Configuration management of networks or network elements
- H04L41/0803—Configuration setting
- H04L41/0806—Configuration setting for initial configuration or provisioning, e.g. plug-and-play
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/08—Configuration management of networks or network elements
- H04L41/0895—Configuration of virtualised networks or elements, e.g. virtualised network function or OpenFlow elements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/12—Discovery or management of network topologies
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/40—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks using virtualisation of network functions or resources, e.g. SDN or NFV entities
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/455—Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
- G06F9/45533—Hypervisors; Virtual machine monitors
- G06F9/45558—Hypervisor-specific management and integration aspects
- G06F2009/45595—Network integration; Enabling network access in virtual machine instances
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/08—Configuration management of networks or network elements
- H04L41/0894—Policy-based network configuration management
Definitions
- the present invention relates to the field of communications, and in particular, to a management method and apparatus in the field of Network Function Virtualization (NFV) technology, such as a management method and apparatus based on affinity information.
- NFV Network Function Virtualization
- NFV technology is based on massive and normalized servers and switches, and implements various network functions (such as virtual operations, virtual wide area networks, and virtual application access routers) through software to reduce costs and accelerate service deployment and resource flexibility. , build an innovative ecological chain.
- a computer is virtualized into multiple virtual logical computers, namely virtual machines (VMs).
- VMs virtual machines
- a virtual machine generally uses a server physical network port, a virtual network card, and a virtual switch connected to the switch in the chassis or the top switch to perform data communication with the outside of the server.
- NFV technology By borrowing the information technology (Information Technology, IT) virtualization technology, NFV technology enables many types of network devices to be incorporated into industry standards. For example, network devices such as services, switching, and storage can be deployed in data centers or network nodes. . NFV technology implements various network functions in software and can run these network functions on industry-standard servers. It can also migrate, instantiate, redeploy, etc. these network functions as needed, and does not need to install new ones. device of. That is, the virtualized network function (VNF) can be generated by the NFV technology. Network Service (NS) can be implemented between multiple VNFs.
- VNFD Virtualized Network Function Descriptor
- NSD Network Service Descriptor
- the embodiment of the invention provides a management method and device, so as to implement effective management of a network service unit or a virtual network function unit.
- an embodiment of the present invention provides a management method, where the method includes: the second management unit acquires affinity information, where the affinity information is used to configure affinity between the target object and other objects, and/or Anti-affinity, or affinity and/or anti-affinity for configuring a sub-object of the target object with other objects; the second management unit sends a management request to the first management unit, the management request carrying the pro And information; the first management unit receives the management request sent by the second management unit and manages the target object according to the affinity information.
- the first management unit may be used to manage virtual resources of the target object; the second management unit may be used to manage services of the target object.
- the target object may be a network service unit or a virtual network functional unit. For example, when the target object is a network business unit, the child object of the target object may be a virtual network functional unit.
- the first management unit After receiving the management request carrying the affinity information, the first management unit can effectively manage the target object according to the affinity information. Further, the solution of the embodiment of the present invention can implement affinity and/or anti-affinity between network elements in all stages of the management process. For example, the network element can be implemented in a deployment phase and a maintenance phase in the management process. Affinity and/or anti-affinity between.
- the affinity information described above includes at least one of the following:
- the affinity information may be an affinity deactivation indication information, where the affinity deactivation indication information is used to indicate that the first management unit ignores the first affinity rule related to the target object in the process of managing the target object.
- the first affinity rule may be an affinity rule preset in the first management unit.
- the affinity information may be a second affinity rule, and the second affinity rule includes at least one of rule indication information, affinity object identifier, and range indication information.
- the second affinity rule may be an affinity rule obtained by the second management unit according to the configuration requirement.
- the affinity information described above may be affinity constraint information for indicating constraints of affinity and/or anti-affinity associated with the target object.
- affinity constraint information for indicating constraints of affinity and/or anti-affinity associated with the target object.
- the rule indication information may be used to indicate that the second affinity rule is an affinity rule and/or an anti-affinity rule.
- the affinity object identifier may be used to identify an action object of the second affinity rule, where the affinity object includes an identifier of the network service instance, an identifier of the network service descriptor, an identifier of the virtual network function instance, or an identifier of the virtual network function descriptor. At least one of them to describe affinity and anti-affinity between network elements in a variety of ways.
- the above range indication information may be used to indicate the scope of application of the second affinity rule, for example, a data center or the like. It can be seen that, in the solution of the embodiment of the present invention, the affinity and/or the anti-affinity between the network elements can be described in various manners, and the implementation is more flexible.
- the first management unit receives the management request sent by the second management unit, and manages the target object according to the affinity information.
- the management process may include: determining, according to the affinity information, the management target object. a third affinity rule for managing the required information; deploying the target object according to a third affinity rule of the management requirement information; and determining a fourth affinity rule of the corresponding virtual resource according to the third rule of the management requirement information;
- a virtual resource is configured for deploying the target object according to a fourth affinity rule of the virtual resource.
- the foregoing management request further carries a descriptor identifier of the target object, which is an identifier of the network service descriptor or an identifier of the virtual network function descriptor, so that the first management unit determines the management according to the descriptor identifier of the target object.
- the management requirements information required by the target object is an identifier of the network service descriptor or an identifier of the virtual network function descriptor.
- the foregoing management request is a lifecycle management request, and the life cycle management of the network service or the virtual network function can be implemented by the foregoing method.
- the embodiment of the present invention provides a management device, which can implement the functions performed by the first management unit in the foregoing method instance, and the functions can be implemented by using hardware or by executing corresponding software by hardware.
- the hardware or software includes one or more modules corresponding to the above functions.
- the apparatus includes a processor and a transceiver configured to support the apparatus to perform the corresponding functions of the above methods.
- the transceiver is used to support communication between the device and other network elements.
- the apparatus can also include a memory for coupling with the processor that retains the program instructions and data necessary for the apparatus.
- the embodiment of the present invention provides a management device, which can implement the functions performed by the second management unit in the foregoing method instance, and the functions can be implemented by using hardware or by executing corresponding software by hardware.
- the hardware or software includes one or more modules corresponding to the above functions.
- the apparatus includes a processor and a transceiver configured to support the apparatus to perform the corresponding functions of the above methods.
- the transceiver is used to support communication between the device and other network elements.
- the apparatus can also include a memory for coupling with the processor that retains the program instructions and data necessary for the apparatus.
- an embodiment of the present invention provides a communication system, where the system includes the apparatus that can implement the functions of the first management unit and the apparatus that can implement the functions of the second management unit.
- an embodiment of the present invention provides a computer storage medium for storing the foregoing A computer software instruction for a management unit that includes a program designed to perform the above aspects.
- an embodiment of the present invention provides a computer storage medium for storing computer software instructions used by the second management unit, which includes a program designed to execute the above aspects.
- the affinity information is acquired by the second management unit, and the management request for carrying the affinity information is sent to the first management unit; the second management unit receives the first management unit. After the management request is sent, the target object is managed according to the affinity information carried in the management request, thereby implementing effective management of the network service unit or the virtual network functional unit.
- the solution of the embodiment of the present invention can implement affinity and/or anti-affinity between network elements in all stages of management, and describe affinity and/or inverse between network elements in various manners. Affinity makes the realization of affinity and/or anti-affinity between network elements more flexible.
- FIG. 1 is a schematic diagram of a possible network architecture according to an embodiment of the present invention
- FIG. 2 is a schematic diagram of communication of a management method according to an embodiment of the present invention.
- FIG. 3 is a schematic diagram of communication of another management method according to an embodiment of the present invention.
- FIG. 4 is a schematic diagram of communication according to still another management method according to an embodiment of the present invention.
- FIG. 5 is a schematic structural diagram of a first management unit according to an embodiment of the present disclosure.
- FIG. 5B is a schematic structural diagram of another first management unit according to an embodiment of the present disclosure.
- FIG. 6 is a schematic structural diagram of a second management unit according to an embodiment of the present disclosure.
- FIG. 6B is a schematic structural diagram of another second management unit according to an embodiment of the present invention.
- the network architecture and the service scenario described in the embodiments of the present invention are for the purpose of more clearly illustrating the technical solutions of the embodiments of the present invention, and are not limited to the technical solutions provided by the embodiments of the present invention.
- Evolution and implementation of new business scenarios, implementation of the present invention The technical solutions provided by the examples are equally applicable to similar technical problems.
- the NFV-based network architecture mainly includes: Operation Support System (OSS)/Business Support System (BSS), Element Manager (EM) unit, and virtualized network.
- Function (VNF) unit NFV Infrastructure (NFVI) unit, NFV Orchestrator (NFVO) unit, Virtual Network Function Management (VNF Manager, VNFM) unit and virtualization infrastructure Management (Virtualised Infrastructure Manager, VIM) unit.
- VNF Operation Support System
- BSS Business Support System
- EM Element Manager
- VNF Function
- NFVI NFV Infrastructure
- NFVO NFV Orchestrator
- VNF Manager Virtual Network Function Management
- VIM Virtualised Infrastructure Manager
- OSS/BSS is a support system for the integration and information resource sharing of telecom operators. It is mainly composed of network management, system management, billing, business, accounting and customer services, while the system passes through a unified information bus. Organically integrated. OSS/BSS can help operators determine the development direction of the system while helping them to develop their own operational support systems. It can also help users to formulate system integration standards and improve and improve users' business levels. The OSS/BSS is used in the NFV-based network architecture to make necessary modifications and adjustments to the lifecycle management (eg, instantiation, etc.) of each network element.
- the EM unit is used to manage some of the VNF units.
- the NFVI unit is a collective term for all hardware devices and software components in an environment with the ability to deploy network function virtualization.
- An NFVI unit can be deployed across several physical sites (eg, data center operations) where the network providing data connections to these physical sites is also considered part of the NFVI unit.
- the NFVO unit can be used to manage the life cycle of the NS, coordinate the lifecycle management of the NS, coordinate the lifecycle management of the VNF (requires support from the VNFM), and coordinate the management of various resources of the NFVI unit (requires VIM support) to ensure Optimized configuration of all types of resources and connections required.
- life cycle management refers to the management of instantiation, maintenance and termination of VNF units or NS units.
- the VNFM unit is responsible for the lifecycle management of the VNF.
- the VIM unit is responsible for controlling and managing the computing resources, storage resources, and network resources of the NFVI unit.
- the VIM can be deployed to the infrastructure domain of the underlying network operator (eg, NFVI access point/service offering point).
- the network architecture shown in FIG. 1 above may include a part of a 3rd Generation Partnership Project (3GPP) system and a part of a NFV Management and Orchestration (NFV MANO) system.
- 3GPP system The parts mainly include the OSS/BSS and EM units shown in FIG. 1.
- the parts of the NFV MANO (also abbreviated as MANO) system mainly include the NFVO unit, the VNFM unit and the VIM unit shown in FIG. 1. Informational interactions can be established between portions of the 3GPP system and portions of the MANO system.
- affinity and anti-affinity can also be understood as: if multiple VNF units can exist in the same area (such as data center, etc.), then these VNF units are said to have affinity; If multiple VNF units are not present in the same region, then these VNF units are said to have anti-affinity.
- low-loss requires that the interacting network elements are deployed in the same or similar physical areas, that is, there is affinity between the interacting network elements.
- high-availability requires that the primary network element and the standby network element cannot be deployed. The same physical area, that is, the primary network element and the standby network element have anti-affinity.
- the network element is a soft and hard machine, and the affinity and/or anti-affinity between the network elements can be implemented within the 3GPP system.
- the NFV-based network architecture software and hardware are separated, and related information of the network element is managed by a part of the 3GPP system, and related information of the resource element of the network element is managed by a part of the MANO system, in order to implement the network element.
- affinity and/or anti-affinity there is a need to establish an interaction of information about affinity and/or anti-affinity between portions of the 3GPP system and portions of the MANO system.
- the traditional network element virtual It is a VNF unit with corresponding functions.
- an embodiment of the present invention provides a management method, and an apparatus and system based on the method, in order to implement effective management of a network service unit or a virtual network function unit.
- the second management unit sends a management request of the target object to the first management unit, where the management request carries affinity information, and the affinity information is used to configure affinity between the target object and other objects and/or Or anti-affinity, or for configuring affinity and/or anti-affinity between the sub-object of the target object and other objects; the first management unit manages the target object according to the affinity information.
- the target object may be an NS unit or a VNF unit.
- the child object of the NS is a VNF unit.
- the first management unit is one end that receives the management request, and may be, for example, the NFVO unit or the VNFM unit in FIG. 1;
- the second management unit is one end that sends a management request, and may be, for example, the OSS in FIG. /BSS or EM unit.
- the first management unit may be used to manage virtual resources of the target object, and the second management unit may be used to manage services of the target object.
- the solution of the embodiment of the present invention can be applied to the NFV-based network architecture shown in FIG. 1.
- the solution of the embodiment of the present invention can implement the interaction of the affinity information between the part of the 3GPP system and the part of the MANO system, thereby effectively managing target. Further, the solution provided by the embodiment of the present invention can implement affinity and/or anti-affinity between different network elements in all stages of management.
- FIG. 2 shows a method for managing affinity information based on an embodiment of the present invention.
- the method shown in Figure 2 can be applied to the network architecture shown in Figure 1, wherein the first management unit can be an NFVO unit, and the second management unit can be an OSS/BSS, and the first management unit and the second management unit can be The communication may be performed through the OS-Ma-nfvo interface; or the first management unit may be a VNFM unit, and the second management unit may be an EM unit, and the first management unit and the second management unit may be connected through the Ve-Vnfm-em interface. Communication.
- the second management unit obtains affinity information for configuring affinity and/or anti-affinity between the target object and other objects, or for configuring sub-objects of the target object with other Affinity and/or anti-affinity between objects.
- affinity information does not preclude the affinity information from being used for configuring the affinity and/or anti-affinity between the target object and other objects, and for configuring the child of the target object.
- affinity and/or anti-affinity between an object and other objects does not preclude the affinity information from being used for configuring the affinity and/or anti-affinity between the target object and other objects, and for configuring the child of the target object.
- the second management unit before the second management unit acquires the affinity information, it also determines the target object to be managed.
- the target object may be an NS unit or a VNF unit.
- the second management unit may determine that a certain NS unit is the target object among the plurality of NS units, or may be in multiple VNF units. Determine a VNF unit as the above target object.
- the second management unit may first determine whether the target object is an NS unit or a VNF unit; when determining to be an NS unit, the second management unit determines, in the plurality of NS units, an NS unit as a target.
- the affinity information may include at least one of: affinity deactivation indication information; affinity constraint information, the affinity constraint information is used to indicate affinity and/or anti-affinity associated with the target object.
- the second affinity rule includes at least one of rule indication information, affinity object identifier, and range indication information.
- the affinity information includes the affinity deactivation indication information, where the affinity deactivation indication information is used to indicate that the first management unit ignores the target object in the process of managing the target object.
- First affinity rule specifies an object having affinity and/or anti-affinity with the target object, and ignoring the first affinity rule associated with the target object can be understood as ignoring affinity with the target object. And/or anti-affinity objects.
- the foregoing target object may be a first virtual network functional unit (which may be described as VNF1)
- the first affinity rule associated with the target object may be: VNF 1 and a second virtual network functional unit.
- VNF 2 (Can be described as VNF 2) has affinity, and VNF 1 has anti-affinity with a third virtual network functional unit (which can be described as VNF 3).
- VNF 3 a third virtual network functional unit
- the affinity deactivation indication information may be used to instruct the first management unit to ignore the VNF 1 related An affinity rule that ignores the affinity of VNF1 to VNF 2 and the anti-affinity of VNF1 to VNF 3.
- the first affinity rule related to the target object can be ignored in an emergency, and the management operation of the first management network element can be simplified, thereby quickly performing the target object. Deploy or maintain to improve management efficiency.
- the affinity information is the deactivation indication information
- the affinity information may cause the first management unit to use the first affinity rule. Configured to be inactive or in a deactivated state.
- the affinity information includes the affinity constraint information described above, the affinity constraint information being used to indicate a constraint of affinity and/or anti-affinity associated with the target object,
- the constraint can be the degree of reliability, the length of the delay, and the like.
- the second management unit requires a first virtual network function instance (which may be described as VNF instance 1) based on a first virtual network function descriptor (which may be described as VNFD1), and a second virtual network function instance (which may be described as a VNF)
- VNF instance 1 a first virtual network function instance
- VNFD1 a first virtual network function descriptor
- VNF 2 a second virtual network function instance
- VNF instance 3 a second virtual network function instance
- VNF instance 4 which can be described as VNF instance 4
- the affinity constraint information can be used for Indicates that VNF instance 1, VNF instance 2, VNF instance 3, and VNF instance 4 need to be deployed in different physical areas or data centers as much as possible.
- the affinity information is a second affinity rule
- the second affinity rule includes at least one of rule indication information, affinity object identifier, and range indication information.
- the rule indication information may be used to indicate that the second affinity rule is an affinity rule and/or an anti-affinity rule.
- the affinity object identifier can be used to indicate the action object of the second affinity rule, for example, it can be understood that the affinity object identifier can indicate which objects have affinity and/or anti-affinity, or the affinity object identifier It can indicate which objects need to be constrained by affinity and/or anti-affinity.
- the affinity object identification may include an identification of an instance of the affinity object and/or an identification of a descriptor of the affinity object, eg, the affinity object identification may include an identification of a network service instance, an identification of a network service descriptor, a virtual network function instance At least one of an identifier or an identifier of a virtual network function descriptor.
- the affinity object may be the above target object, may be a unit related to the target object, or may be another unit.
- the affinity object may be the NS unit, or may be a VNF unit associated with the NS unit, or may be other units.
- the affinity object identifier may include at least one of an identifier of the network service instance, an identifier of the network service descriptor, an identifier of the virtual network function instance, or an identifier of the virtual network function descriptor.
- the affinity object identifier includes an identification of the virtual network function instance and/or an identification of the virtual network function descriptor.
- the range indication information may be used to indicate the scope of application of the second affinity rule, for example, the scope of application may be a physical area, a data center, or the like.
- the affinity and anti-affinity between network elements can be described by the VNFD included in the NSD or VNFD. It can be understood that the identifier of the VNFD is used to indicate the affinity and anti-affinity constraints. VNFD or Virtual Link Descriptor (VLD) identifiers of all instances.
- VNFD or Virtual Link Descriptor (VLD) identifiers of all instances.
- the affinity and/or anti-parity between network elements can only be described based on the granularity of VNFD.
- sexuality has certain limitations.
- the affinity information may be based on the granularity of the VNFD or the granularity of the NSD, or may be based on the granularity of the NS instance or the granularity of the VNF instance. Therefore, the solution of the embodiment of the present invention.
- the affinity and/or anti-affinity between network elements can be described in various ways, and the implementation is more flexible.
- the second management unit sends a management request to the first management unit, the management request carrying the affinity information.
- the management request may further carry an identifier of the descriptor of the target object.
- the identifier of the descriptor of the target object may be an identifier of the network service descriptor or an identifier of the virtual network function descriptor.
- the second management unit may send a management request to the first management unit through a communication interface between the first management unit and the second management unit.
- the communication interface between the first management unit and the second management unit may be an OS-Ma-nfvo interface or a Ve-Vnfm-em interface.
- the management request may be a lifecycle management request, and the lifecycle management request may be used for lifecycle management of the target object; or the management request may be other types of management requests.
- some or all of the above affinity information may also be preset in the first management unit.
- at least one of the affinity deactivation indication information, the second affinity rule, or the affinity constraint information is preset in the first management unit.
- the first management unit receives the management request sent by the second management unit and manages the target object according to the affinity information.
- the process by which the first management unit manages the target object according to the affinity information may include the following four parts:
- the first part determines a third affinity rule for managing the management requirement information required by the target object according to the affinity information.
- the affinity information may include an identifier of a descriptor of the target object, and the first part may include the following two steps:
- the first management unit searches for the descriptor of the target object according to the descriptor identifier of the target object, and parses the descriptor of the target object, and determines management requirement information required for managing the target object. If the target object is an NS, the corresponding NSD is searched according to the NSD ID of the NS, and the NSD is parsed. Since each NSD includes multiple VNFDs, the process of parsing the NSD is to analyze which VNFDs and combinations of deployment specifications are available under the NSD. The management requirement information required for managing the NS is determined according to the analysis result.
- the management requirement information of the NS includes multiple VNF instance requirement information, and the VNF instance requirement information includes a VNFD ID and a deployment specification corresponding to the VNFD ID. If the target object is The VNF searches for the corresponding VNFD according to the VNFD ID of the VNF, and parses the VNFD to determine instance demand information of the VNF.
- the first management unit determines a third affinity rule for managing the demand information based on the affinity information. If the target object is an NS, determining, according to the VNFD in each VNF instance requirement information in the plurality of VNF instance requirement information and/or the affinity rule and/or the affinity information in the NSD corresponding to the NS in the NFV network architecture, respectively An affinity rule for each VNF instance requirement information, that is, an object that has affinity and/or anti-affinity with each VNF instance requirement information, respectively.
- the target object is a VNF, determining an affinity rule of the VNF instance requirement information according to the VNFD corresponding to the VNF and/or an affinity rule associated with the VNFD in the NSF, that is, determining affinity with the VNF instance requirement information, and / or anti-affinity objects.
- the second part the first management unit deploys the target object according to the third affinity rule of the management requirement information. For example, if the target object is an NS, the VNF instantiation is deployed or requested according to the affinity rule of each VNF instance requirement information; if the target object is a VNF, the VNF is instantiated according to the affinity rule of the VNF instance requirement information.
- the third part the first management unit determines a fourth affinity rule of the corresponding virtual resource according to the third affinity rule of the management requirement information. For example, the first management unit converts the third affinity rule that manages the demand information into a fourth affinity rule of the corresponding virtual resource; and, for example, the first management unit generates a corresponding virtual according to the third affinity rule of the management requirement information.
- a fourth affinity rule of the resource for example, the first management unit may search for a fourth affinity rule of the corresponding virtual resource according to the third affinity rule of the management requirement information.
- the virtual resource may be a computing resource, a network resource, a storage resource, or the like on the virtual machine.
- the same VNF instance can be deployed on multiple virtual machines, or multiple VNF instances can be deployed on one virtual machine. Therefore, when the affinity object is a VNF instance, the foregoing fourth affinity rule for managing the requirement information is converted into a fourth affinity rule of the corresponding virtual resource, which can be understood as converting the affinity rule between the affinity objects into Affinity rules between virtual machines that store VNF instances.
- VNF instance 1 has a reverse affinity with VNF instance 2, and the virtual machine corresponding to VNF instance 1 is VM1, and the virtual machine corresponding to VNF instance 2 is VM2, the first between VNF instance 1 and VNF instance 2
- the amphipathic rule is converted into a fourth affinity rule between the virtual machine 1 and the virtual machine 2, that is, the virtual machine 1 and the virtual machine 2 also have a reverse affinity.
- the fourth part the first management unit configures the virtual resource for the deployment target object according to the fourth affinity rule of the virtual resource.
- the target object is a VNF instance
- configuring a virtual resource for the deployment target object can be understood as determining which virtual machine the instantiated VNF instance exists on, and which resources on the virtual machine are used.
- the fourth affinity rule of the virtual resource is virtual machine 1 and virtual machine 2 Having a reverse affinity, the VNF instance 1 and the VNF instance 2 are respectively requested to configure virtual resources according to the reverse affinity between the virtual machine 1 and the virtual machine 2.
- the second management unit acquires affinity information for configuring affinity and/or anti-affinity between the target object and other sub-objects, or for configuring the target object. Affinity and/or anti-affinity between the child object and other child objects; the second management unit sends a management request carrying the affinity information to the first management unit; the second management unit according to the affinity in the management request Information is managed on the target object to enable efficient management of network business units or virtual network functional units. Further, the solution of the embodiment of the present invention can implement affinity and/or anti-affinity between network elements in all stages of management, and describe affinity and/or inverse between network elements in various manners. Affinity makes the realization of affinity and/or anti-affinity between network elements more flexible.
- FIG. 3 illustrates another method for managing affinity based information provided by an embodiment of the present invention.
- the same or similar content as the method shown in FIG. 2 can be referred to the detailed description of FIG. 2, and details are not described herein.
- the solution shown in Figure 3 can be applied to the following application scenarios: OSS/BSS needs to create an NS instance 2, based on the service management requirements (for example, service delay, low loss) in the scenario.
- NS instance 2 an instance based on a second virtual network function descriptor (which may be described as VNFD 2) is required to be in the same physical area as the existing first virtual network function instance (which may be described as VNF instance 1).
- the premise of the implementation of the embodiment of the present invention is that the NSD of the NS instance 2 and the related VNFD have been sent by the OSS/BSS to the NFVO, and the NFVO uploads the NSD and the related VNFD to the corresponding directory.
- the embodiment of the present invention introduces a management method based on affinity information based on NS instantiation in NS lifecycle management, and other NS lifecycle management is similar to this embodiment. The method shown in Fig. 3 will be described below.
- the OSS/BSS obtains affinity information that is used to configure affinity and/or anti-affinity between the target NS and other objects.
- the affinity information can also be used to configure affinity and/or anti-affinity between the sub-object VNF unit of the target NS and other objects.
- OSS/BSS is based on a need to instantiate an NS with the NS as the target NS.
- the OSS/BSS acquires and determines affinity information for configuring affinity and/or anti-affinity between the target NS and other objects, or determines a sub-object between the VNF unit and other objects for configuring the target NS
- affinity information required for instantiation of the target NS is obtained and determined.
- the affinity information may include at least one of: affinity deactivation indication information; affinity constraint information, and the affinity constraint information is used to indicate affinity and/or anti-target related to the target object. a constraint of affinity; a second affinity rule, the second affinity rule comprising at least one of rule indication information, affinity object identifier, and range indication information.
- the OSS/BSS sends an instantiation request for the target NS to the NFVO, the instantiation request carrying the affinity information described above.
- the instantiation request may also carry the descriptor identifier of the target NS, that is, the NSD ID.
- the OSS/BSS sends an instantiation request of the target NS to the NFVO through the OS-Ma-nfvo interface between the OSS/BSS and the NFVO on the premise that the affinity information is determined.
- affinity information may also be preset in the NFVO.
- affinity deactivation indication information For example, at least one of the above-described affinity deactivation indication information, second affinity rule, or affinity constraint information is preset in the NFVO.
- the NFVO determines a plurality of VNF instance requirement information required for instantiation of the target NS based on the instantiation request of the target NS.
- the NFVO receives an instantiation request for the target NS and determines a plurality of VNF instance requirement information required for instantiation of the target NS based on the target NSD ID.
- the NFVO searches for the target NSD in the network according to the target NSD ID, and parses the target NSD, and analyzes multiple VNF instance requirement information under the target NSD.
- a VNF instance requirement information includes a VNFD ID and a deployment specification corresponding to the VNFD ID.
- NFVO or VNFM can instantiate the VNF based on a VNF instance requirement information.
- the NFVO determines a third affinity rule for each VNF instance requirement information in the plurality of VNF instance requirement information based on the affinity information.
- the NFVO determines a third affinity rule for each VNF instance requirement information in the plurality of VNF instance requirement information according to the affinity deactivation information.
- the NFVO parses the affinity constraint information, and determines a third affinity rule for each VNF instance requirement information in the plurality of VNF instance requirement information according to the affinity constraint information.
- the NFVO is configured according to the VNFD in each VNF instance requirement information in the VNF instance requirement information and/or the first affinity associated with the target NS in the NFV network architecture.
- the rules and/or the second affinity rules described above determine a third affinity rule for each of the VNF instance requirements information, respectively.
- NFVO finds whether there is a certain VNF in the above first affinity rule Affinity and/or anti-affinity of the instance requirement information, if present, determining affinity and/or anti-affinity of the VNF instance requirement information according to the first affinity rule; if not, then Finding and determining the affinity and/or anti-affinity of the VNF instance requirement information in the second parent rule; if the first affinity rule and the second affinity rule are unable to determine the affinity of the VNF instance requirement information For the sex and/or anti-affinity, the third affinity rule of the VNF instance requirement information is determined according to the VNFD corresponding to the VNF instance requirement information.
- the NFVO instantiates the target NS based on the third affinity rule for each VNF instance requirement information.
- the NFVO instantiates the target NS according to a third affinity rule for each of the VNF instance requirement information.
- the NFVO determines a fourth affinity rule for the corresponding virtual resource based on a third affinity rule for each VNF instance requirement information.
- the NFVO determines a fourth affinity rule for the corresponding virtual resource according to a third affinity rule of each VNF instance requirement information, eg, the NFVO converts the third affinity rule of each VNF instance requirement information into a corresponding a fourth affinity rule of the virtual resource; for example, the NFVO generates a fourth affinity rule of the corresponding virtual resource according to a third affinity rule of each VNF instance requirement information; and, for example, the NFVO is configured according to each VNF instance
- the third affinity rule of the requirement information finds a fourth affinity rule of the corresponding virtual resource.
- the virtual resource may be a computing resource, a network resource, a storage resource, or the like on the virtual machine. It should be noted that the same VNF instance can be deployed on multiple virtual machines, or one virtual machine can deploy multiple VNF instances.
- the fourth affinity rule converted to the corresponding virtual resource that is, converted into an affinity rule between the virtual machines.
- NFVO allocates virtual resources to the VIM for the instantiation request of the target NS.
- the NFVO allocates a virtual resource to the VIM for the instantiation request of the target NS according to the fourth affinity rule of the virtual resource and the VNFD corresponding to each VNF instance requirement information, that is, requests the VIM to allocate the instantiated VNF instance. virtual machine.
- the NFVO sends a VNF instantiation request to the VNFM, the VNF instantiation request including a VNFD ID corresponding to each VNF instance requirement information and a fourth affinity rule for each VNF instance requirement information.
- the NFVO sends a VNF instantiation request to the VNFM, and the VNFM instantiates a plurality of VNF instances according to the VNF instantiation request, thereby implementing instantiation of the target NS.
- the VNF instantiation request includes a VNFD ID corresponding to each VNF instance requirement information and a fourth affinity rule of each VNF instance requirement information.
- the VNFM determines a fourth affinity rule for the corresponding virtual resource based on a third affinity rule for each VNF instance requirement information.
- the VNFM receives the VNF instantiation request sent by the NFVO, and performs VNF instantiation according to the affinity rule of each VNF instance requirement information to instantiate multiple VNF instances.
- the VNFM determines a fourth affinity rule of the corresponding virtual resource according to the third affinity rule of each VNF instance requirement information, that is, determines an affinity rule between the virtual machines.
- the VNFM configures virtual resources for the instantiation request of the target NS.
- the VNFM sends a request to the VIM according to the fourth affinity rule of the virtual resource and the VNFD corresponding to each VNF instance requirement information, to configure the virtual resource for the instantiation request of the target NS, that is, requesting the VIM to be instantiated.
- the VNF instance allocates virtual machines.
- 306-307 and 308-310 are two parallel schemes, and only one of them can be executed, that is, 306-307 or 308-310 is executed, and which scheme is determined by NFVO, which is not performed here. limited.
- the affinity information is transmitted through the communication interface between the OSS/BSS and the NFVO, so as to implement effective management of the network service unit.
- the solution of the embodiment of the present invention can implement affinity and/or anti-affinity between network elements in both the deployment phase and the maintenance phase, and the communication interface can be based on the VNF instance granularity, the NS instance granularity,
- the affinity information of the VNF instance group granularity, the VNFD granularity, and the NSD granularity makes the affinity and/or anti-affinity between the network elements more flexible.
- FIG. 4 shows still another method for managing affinity information according to an embodiment of the present invention.
- the same or similar content as the method shown in FIG. 2 or FIG. 3 can be referred to the detailed description of FIG. 2 or FIG. 3, and details are not described herein.
- the solution shown in Figure 3 can be applied to the following application scenarios: EM needs to create a VNF instance. Based on the service management requirements (for example, reliability) in the scenario, the newly created VNF instance needs to be the same as the existing one.
- An example of a virtual network function (which can be described as VNF instance 1) is in a different physical area.
- the premise of the implementation of the embodiment of the present invention is that the VNFD corresponding to the VNF instance has been sent to the NFVO by the OSS/BSS, and the NFVO uploads the VNFD to the corresponding directory.
- Embodiments of the present invention are based on VNF in VNF lifecycle management Instantiation introduces the management method based on affinity information, and other VNF lifecycle management is similar to this embodiment. The method shown in Fig. 4 will be described below.
- the EM obtains affinity information that is used to configure affinity and/or anti-affinity between the target VNF and other objects.
- EM is based on a need to instantiate a VNF that targets the VNF.
- the EM acquires and determines affinity information for configuring affinity and/or anti-affinity between the target VNF and other objects, in the embodiment of the invention, obtaining and determining the required for the target VNF to be instantiated Affinity information.
- the affinity information may include at least one of: affinity deactivation indication information; affinity constraint information, the affinity constraint information is used to indicate affinity and/or anti-affinity associated with the target VNF.
- the second affinity rule includes at least one of rule indication information, affinity object identifier, and range indication information.
- the EM sends an instantiation request for the target VNF to the VNFM, the instantiation request carrying the affinity information described above.
- the instantiation request may also carry a descriptor identifier of the target VNF, that is, a VNFD ID.
- the EM sends an instantiation request of the target VNF to the VNFM through the Ve-Vnfm-em interface between the EM and the VNFM on the premise that the affinity information is determined.
- some or all of the above affinity information may also be preset in the VNFM.
- at least one of the above-described affinity deactivation indication information, second affinity rule, or affinity constraint information is preset in the VNFM.
- the VNFM determines instance demand information for the target VNF based on the instantiation request of the target VNF.
- the VNFM receives an instantiation request for the target VNF and determines target VNF instance demand information based on the target VNFDID.
- the VNFM looks up the target VNFD in the network according to the target VNFD ID and parses the target VNFD.
- the VNFM searches for the corresponding target NSD according to the target VNFD, and searches for the first affinity rule in the target NSD related to the target VNF.
- the VNFM sends a query request to the NFVO requesting the NFVO to look up the first affinity rule associated with the target VNF in the target NSD.
- the VNFM determines a third affinity rule for the target VNF instance requirement information based on the affinity information.
- the VNFM determines a third affinity rule for the target VNF instance requirement information based on the affinity deactivation information.
- the VNFM parses the affinity constraint information, and determines a third affinity rule of the target VNF instance requirement information according to the affinity constraint information.
- the VNFM determines the target VNF instance requirement information according to the target VNFD and/or the first affinity rule related to the target VNF in the target NSD and/or the second affinity rule.
- the third affinity rule determines whether there is affinity and/or anti-affinity of the target VNF instance requirement information in the first affinity rule related to the target VNF in the target NSD, and if yes, determines the target according to the first affinity rule Affinity and/or anti-affinity of the VNF instance requirement information; if not present, finding and determining the affinity and/or anti-affinity of the target VNF instance requirement information in the second affinity rule; If both the affinity rule and the second affinity rule cannot determine the affinity and/or anti-affinity of the target VNF instance requirement information, the third affinity rule of the target VNF instance requirement information is determined according to the target VNFD.
- the VNFM instantiates the target VNF according to a third affinity rule of the target VNF instance requirement information.
- the VNFM instantiates the target VNF according to a third affinity rule of the target VNF instance requirement information to instantiate the target VNF instance.
- the VNFM determines a fourth affinity rule for the corresponding virtual resource based on a third affinity rule of the target VNF instance requirement information.
- the VNFM determines a fourth affinity rule of the corresponding virtual resource according to a third affinity rule of the target VNF instance requirement information, for example, the VNFM determines a corresponding virtual resource by using a third affinity rule of the target VNF instance requirement information.
- the fourth affinity rule for example, the VNFM searches for a fourth affinity rule of the corresponding virtual resource according to the third affinity rule of the target VNF instance requirement information.
- the virtual resource may be a computing resource, a network resource, a storage resource, or the like on the virtual machine. It should be noted that the same VNF instance can be deployed on multiple virtual machines, or one virtual machine can deploy multiple VNF instances.
- the fourth affinity rule converted to the corresponding virtual resource that is, converted into an affinity rule between the virtual machines.
- the VNFM configures virtual resources for instantiation requests for the target VNF.
- the VNFM sends a request to the VIM according to the fourth affinity rule of the virtual resource and the target VNFD to configure the virtual resource for the instantiation request of the target VNF, ie, requesting the VIM to allocate the virtual machine to the instantiated target VNF instance.
- the VNFM sends a resource request to the NFVO, the resource request including a fourth affinity rule for the virtual resource.
- the VNFM sends a resource request to the NFVO, the resource request including a fourth affinity rule for the virtual resource.
- the VNFM does not directly request the virtual resource to the VIM, but requests the virtual resource to be configured by the NFVO to the VIM.
- the NFVO configures the virtual resource to the VIM for the instantiation request of the target VNF based on the resource request.
- the NFVO receives the resource request sent by the VNFM, and configures the virtual resource to the VIM for the instantiation request of the target VNF according to the fourth affinity rule of the virtual resource in the resource request, that is, requests the VIM as the instantiated target VNF.
- the instance allocates a virtual machine.
- 406-407 and 406, 408, and 409 are two parallel schemes, and only one of them may be executed, that is, 406-407 or 406, 408, and 409 are executed, and which scheme is specifically determined by the VNFM. There is no limit here.
- the process of instantiating the VNF is taken as an example, and the affinity information is transmitted through the communication interface between the EM and the VNFM to implement effective management of the virtual network functional unit.
- the solution of the embodiment of the present invention can implement affinity and/or anti-affinity between network elements in both the deployment phase and the maintenance phase, and the communication interface can deliver the VNF instance granularity and the VNF instance group granularity.
- the affinity information of the VNFD granularity makes the affinity and/or anti-affinity between the network elements more flexible.
- each network element for example, the first management unit, the second management unit, and the like, in order to implement the above functions, includes hardware structures and/or software modules corresponding to each function.
- the present invention can be implemented in a combination of hardware or hardware and computer software in combination with the elements and algorithm steps of the various examples described in the embodiments disclosed herein. Whether a function is implemented in hardware or computer software to drive hardware depends on the specific application and design constraints of the solution. A person skilled in the art can use different methods for implementing the described functions for each particular application, but such implementation should not be considered to be beyond the scope of the present invention.
- the embodiment of the present invention may apply to the first management unit, the second management unit, etc. according to the foregoing method example.
- the division of the line function module for example, can divide each function module for each function, or integrate two or more functions into one processing module.
- the above integrated modules can be implemented in the form of hardware or in the form of software functional modules. It should be noted that the division of the module in the embodiment of the present invention is schematic, and is only a logical function division, and the actual implementation may have another division manner.
- FIG. 5A shows a possible structural diagram of the first management unit involved in the above embodiment.
- the first management unit 500 includes a processing module 502 and a communication module 503.
- the processing module 502 is configured to perform control management on the actions of the first management unit.
- the processing module 502 is configured to support the first management unit to perform the process 203 in FIG. 2, the processes 303, 304, 305, 306, 307 in FIG. And 308, processes 403, 404, 405, 406, 407, and 408 in FIG. 4 and/or other processes for the techniques described herein.
- the communication module 503 is for supporting communication between the first management unit and the second management unit or other network entity, such as communication with the NFVO unit or VNFM unit shown in FIG.
- the first management unit may further include a storage module 501 for storing program codes and data of the first management unit.
- the processing module 502 can be a processor or a controller, and can be, for example, a central processing unit (CPU), a general-purpose processor, a digital signal processor (DSP), and an application-specific integrated circuit (Application-Specific). Integrated Circuit (ASIC), Field Programmable Gate Array (FPGA) or other programmable logic device, transistor logic device, hardware component, or any combination thereof. It is possible to implement or carry out the various illustrative logical blocks, modules and circuits described in connection with the present disclosure.
- the processor may also be a combination of computing functions, for example, including one or more microprocessor combinations, a combination of a DSP and a microprocessor, and the like.
- the communication module 503 can be a transceiver, a transceiver circuit or a communication interface, etc., for example, can be an OS-Ma-nfvo interface or a Ve-Vnfm-em interface as described above.
- the storage module 501 can be a memory.
- the first management unit involved in the embodiment of the present invention may be the first management unit shown in FIG. 5B.
- the first management unit 510 includes a processor 512, a transceiver 513, and a memory 511.
- the first management unit 510 may further include a bus 514.
- the transceiver 513, the processor 512, and the memory 511 may be connected to each other through a bus 514.
- the bus 514 may be a Peripheral Component Interconnect (PCI) bus or an Extended Industry Standard Architecture (abbreviated). EISA) bus and so on.
- PCI Peripheral Component Interconnect
- EISA Extended Industry Standard Architecture
- the bus 514 can be divided into an address bus, a data bus, a control bus, and the like.
- the diagram 5B is represented by only one thick line, but does not mean that there is only one bus or one type of bus.
- FIG. 6A shows a possible structural diagram of the second management unit involved in the above embodiment.
- the second management unit 600 includes a processing module 602 and a communication module 603.
- the processing module 602 is configured to perform control management on the actions of the second management unit.
- the processing module 602 is configured to support the second management unit to perform the processes 201 and 202 in FIG. 2, the processes 301 and 302 in FIG. 3, in FIG. Processes 401 and 402 and/or other processes for the techniques described herein.
- the communication module 603 is for supporting communication between the second management unit and the first management unit or other network entity, such as communication with the OSS/BSS unit or EM unit shown in FIG.
- the second management unit may further include a storage module 601 for storing program codes and data of the second management unit.
- the processing module 602 can be a processor or a controller, for example, a central processing unit (CPU), a general-purpose processor, a digital signal processor (DSP), and an application-specific integrated circuit (Application-Specific). Integrated Circuit (ASIC), Field Programmable Gate Array (FPGA) or other programmable logic device, transistor logic device, hardware component, or any combination thereof. It is possible to implement or carry out the various illustrative logical blocks, modules and circuits described in connection with the present disclosure.
- the processor may also be a combination of computing functions, for example, including one or more microprocessor combinations, a combination of a DSP and a microprocessor, and the like.
- the communication module 603 can be a transceiver, a transceiver circuit or a communication interface, etc., for example, can be an OS-Ma-nfvo interface or a Ve-Vnfm-em interface as described above.
- the storage module 601 can be a memory.
- the first management unit involved in the embodiment of the present invention may be the second management unit shown in FIG. 6B.
- the first management unit 610 includes a processor 612, a transceiver 613, and a memory 611.
- the first management unit 610 may further include a bus 614.
- the transceiver 613, the processor 612, and the memory 611 may be connected to each other through a bus 614.
- the bus 614 may be a peripheral component interconnection standard bus or an extended industry standard structure bus or the like.
- the bus 614 can be divided into an address bus, a data bus, a control bus, and the like. For ease of representation, only one thick line is shown in Figure 6B, but it does not mean that there is only one bus or one type of bus.
- the steps of the method or algorithm described in connection with the disclosure of the embodiments of the present invention may be implemented in a hardware manner, or may be implemented by a processor executing software instructions.
- the software instructions may be composed of corresponding software modules, which may be stored in a random access memory (RAM), a flash memory, a read only memory (ROM), an erasable programmable read only memory ( Erasable Programmable ROM, EPROM), electrically erasable programmable Read only memory (Electrically EPROM, EEPROM), registers, hard disk, removable hard disk, read-only optical disk (CD-ROM) or any other form of storage medium known in the art.
- An exemplary storage medium is coupled to the processor to enable the processor to read information from, and write information to, the storage medium.
- the storage medium can also be an integral part of the processor.
- the processor and the storage medium can be located in an ASIC.
- the ASIC can be located in a core network interface device.
- the processor and the storage medium may also exist as discrete components in the core network interface device.
- the functions described in the embodiments of the present invention may be implemented in hardware, software, firmware, or any combination thereof.
- the functions may be stored in a computer readable medium or transmitted as one or more instructions or code on a computer readable medium.
- Computer readable media includes both computer storage media and communication media including any medium that facilitates transfer of a computer program from one location to another.
- a storage medium may be any available media that can be accessed by a general purpose or special purpose computer.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Computer And Data Communications (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
Description
Claims (27)
- 一种管理方法,其特征在于,包括:第一管理单元接收第二管理单元发送的目标对象的管理请求,所述管理请求携带亲和信息,所述亲和信息用于配置所述目标对象与其他对象之间的亲和性和/或反亲和性,或者用于配置所述目标对象的子对象与其他对象之间的亲和性和/或反亲和性;所述第一管理单元根据所述亲和信息对所述目标对象进行管理。
- 根据权利要求1所述的方法,其特征在于,所述亲和信息包括以下情形中的至少一种:所述亲和信息为亲和去激活指示信息,所述亲和去激活指示信息用于指示所述第一管理单元在对所述目标对象进行管理的过程中忽略与所述目标对象相关的第一亲和规则;所述亲和信息为第二亲和规则,所述第二亲和规则包括规则指示信息、亲和对象标识、范围指示信息中的至少一种;所述亲和信息为亲和约束信息,所述亲和约束信息用于指示与所述目标对象相关的亲和性和/或反亲和性的约束条件。
- 根据权利要求2所述的方法,其特征在于,所述规则指示信息用于指示所述第二亲和规则为亲和性规则和/或反亲和性规则。
- 根据权利要求2或3所述的方法,其特征在于,所述亲和对象标识用于标识所述第二亲和规则的作用对象,其中,所述亲和对象标识包括网络业务实例的标识、网络业务描述符的标识、虚拟网络功能实例的标识或虚拟网络功能描述符的标识中的至少一种。
- 根据权利要求2至4中任一项所述的方法,其特征在于,所述范围指示信息用于指示所述第二亲和规则的适用范围。
- 根据权利要求1至5中任一项所述的方法,其特征在于,所述第一管理单元根据所述亲和信息对所述目标对象进行管理,包括:所述第一管理单元根据所述亲和信息确定管理所述目标对象所需的管理需求信息的第三亲和规则;所述第一管理单元根据所述管理需求信息的第三亲和规则对所述目标对象进行部署;所述第一管理单元根据所述管理需求信息的第三规则确定对应的虚拟资源的第四亲和规则;所述第一管理单元根据所述虚拟资源的第四亲和规则为部署所述目标对象配置虚拟资源。
- 根据权利要求1至6中任一项所述的方法,其特征在于,所述目标对象为网络业务单元或虚拟网络功能单元。
- 一种管理方法,其特征在于,包括:第二管理单元获取亲和信息,所述亲和信息用于配置所述目标对象与其他对象之间的亲和性和/或反亲和性,或者用于配置所述目标对象的子对象与其他对象之间的亲和性和/或反亲和性;所述第二管理单元向第一管理单元发送所述目标对象的管理请求,所述管理请求携带所述亲和信息,以使得所述第一管理单元根据所述亲和信息对所述目标对象进行管理。
- 根据权利要求8所述的方法,其特征在于,所述亲和信息包括以下情形中的至少一种:所述亲和信息为亲和去激活指示信息,所述亲和去激活指示信息用于指示所述第一管理单元在对所述目标对象进行管理的过程中忽略与所述目标对象相关的第一亲和规则;所述亲和信息为第二亲和规则,所述第二亲和规则包括规则指示信息、亲和对象标识、范围指示信息中的至少一种;所述亲和信息为亲和约束信息,所述亲和约束信息用于指示与所述目标对象相关的亲和性和/或反亲和性的约束条件。
- 根据权利要求9所述的方法,其特征在于,所述规则指示信息用于指示所述第二亲和规则为亲和性规则和/或反亲和性规则。
- 根据权利要求9或10所述的方法,其特征在于,所述亲和对象标识用于标识所述第二亲和规则的作用对象,其中,所述亲和对象标识包括网络业务实例的标识、网络业务描述符的标识、虚拟网络功能实例的标识或虚拟网络功能描述符的标识中的至少一种。
- 根据权利要求9至11中任一项所述的方法,其特征在于,所述范围指示信息用于指示所述第二亲和规则的适用范围。
- 根据权利要求8至12中任一项所述的方法,其特征在于,所述目标对象为网络业务单元或虚拟网络功能单元。
- 一种第一管理单元,其特征在于,包括:处理模块和通信模块,所述处理模块用于通过所述通信模块接收第二管理单元发送的目标对象的管理请求,所述管理请求携带亲和信息,所述亲和信息用于配置所述目标对象与其他对象之间的亲和性和/或反亲和性,或者用于配置所述目标对象的子对象与其他对象之间的亲和性和/或反亲和性;以及用于根据所述亲和信息对所述目标对象进行管理。
- 根据权利要求14的第一管理单元,其特征在于,所述亲和信息包括以下情形中的至少一种:所述亲和信息为亲和去激活指示信息,所述亲和去激活指示信息用于指示所述第一管理单元在对所述目标对象进行管理的过程中忽略与所述目标对象相关的第一亲和规则;所述亲和信息为第二亲和规则,所述第二亲和规则包括规则指示信息、亲和对象标识、范围指示信息中的至少一种;所述亲和信息为亲和约束信息,所述亲和约束信息用于指示与所述目标对象相关的亲和性和/或反亲和性的约束条件。
- 根据权利要求15所述的第一管理单元,其特征在于,所述规则指示信息用于指示所述第二亲和规则为亲和性规则和/或反亲和性规则。
- 根据权利要求15或16所述的第一管理单元,其特征在于,所述亲和对象标识用于标识所述第二亲和规则的作用对象,其中,所述亲和对象标识包括网络业务实例的标识、网络业务描述符的标识、虚拟网络功能实例的标识或虚拟网络功能描述符的标识中的至少一种。
- 根据权利要求15至17中任一项所述的第一管理单元,其特征在于,所述范围指示信息用于指示所述第二亲和规则的适用范围。
- 根据权利要求14至18中任一项所述的第一管理单元,其特征在于,所述处理模块具体用于根据所述亲和信息确定管理所述目标对象所需的管理需求信息的第三亲和规则;以及根据所述管理需求信息的第三亲和规则对所述目标对象进行部署;以及根据所述管理需求信息的第三规则确定对应的虚拟资源的第四亲和规则;以及根据所述虚拟资源的第四亲和规则为部署所述目标对 象配置虚拟资源。
- 根据权利要求14至19中任一项所述第一管理单元,其特征在于,所述目标对象为网络业务单元或虚拟网络功能单元。
- 一种第二管理单元,其特征在于,包括:处理模块和通信模块,所述处理模块用于获取亲和信息,所述亲和信息用于配置所述目标对象与其他对象之间的亲和性和/或反亲和性,或者用于配置所述目标对象的子对象与其他对象之间的亲和性和/或反亲和性;以及用于通过所述通信模块向第一管理单元发送所述目标对象的管理请求,所述管理请求携带所述亲和信息,以使得所述第一管理单元根据所述亲和信息对所述目标对象进行管理。
- 根据权利要求21所述的第二管理单元,其特征在于,所述亲和信息包括以下情形中的至少一种:所述亲和信息为亲和去激活指示信息,所述亲和去激活指示信息用于指示所述第一管理单元在对所述目标对象进行管理的过程中忽略与所述目标对象相关的第一亲和规则;所述亲和信息为第二亲和规则,所述第二亲和规则包括规则指示信息、亲和对象标识、范围指示信息中的至少一种;所述亲和信息为亲和约束信息,所述亲和约束信息用于指示与所述目标对象相关的亲和性和/或反亲和性的约束条件。
- 根据权利要求22所述的第二管理单元,其特征在于,所述规则指示信息用于指示所述第二亲和规则为亲和性规则和/或反亲和性规则。
- 根据权利要求22或23所述的第二管理单元,其特征在于,所述亲和对象标识用于标识所述第二亲和规则的作用对象,其中,所述亲和对象标识包括网络业务实例的标识、网络业务描述符的标识、虚拟网络功能实例的标识或虚拟网络功能描述符的标识中的至少一种。
- 根据权利要求22至24中任一项所述的第二管理单元,其特征在于,所述范围指示信息用于指示所述第二亲和规则的适用范围。
- 根据权利要求21至25中任一项所述的第二管理单元,其特征在于,所述目标对象为网络业务单元或虚拟网络功能单元。
- 一种管理系统,其特征在于,包括:如权利要求14至20中任一项所述的第一管理单元以及如权利要求21至26中任一项所述的第二管理单元。
Priority Applications (8)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201680083907.6A CN108886473B (zh) | 2016-04-08 | 2016-04-08 | 一种管理方法及装置 |
JP2018552724A JP6680901B2 (ja) | 2016-04-08 | 2016-04-08 | 管理方法および装置 |
BR112018070584-5A BR112018070584B1 (pt) | 2016-04-08 | Metodo de gerenciamento, aparelho orquestrador de virtualização de funções de rede, primeiro aparelho de gerenciamento, sistema de suporte de operações ou sistema de suporte de negócios, segundo aparelho de gerenciamento e meio legível por computador | |
KR1020187032019A KR102184512B1 (ko) | 2016-04-08 | 2016-04-08 | 관리 방법 및 디바이스 |
EP16897601.7A EP3432515B1 (en) | 2016-04-08 | 2016-04-08 | Management method and device |
PCT/CN2016/078913 WO2017173667A1 (zh) | 2016-04-08 | 2016-04-08 | 一种管理方法及装置 |
US16/151,100 US11296945B2 (en) | 2016-04-08 | 2018-10-03 | Management method and apparatus |
US17/698,169 US20220210019A1 (en) | 2016-04-08 | 2022-03-18 | Management Method and Apparatus |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/CN2016/078913 WO2017173667A1 (zh) | 2016-04-08 | 2016-04-08 | 一种管理方法及装置 |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US16/151,100 Continuation US11296945B2 (en) | 2016-04-08 | 2018-10-03 | Management method and apparatus |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2017173667A1 true WO2017173667A1 (zh) | 2017-10-12 |
Family
ID=60000837
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2016/078913 WO2017173667A1 (zh) | 2016-04-08 | 2016-04-08 | 一种管理方法及装置 |
Country Status (6)
Country | Link |
---|---|
US (2) | US11296945B2 (zh) |
EP (1) | EP3432515B1 (zh) |
JP (1) | JP6680901B2 (zh) |
KR (1) | KR102184512B1 (zh) |
CN (1) | CN108886473B (zh) |
WO (1) | WO2017173667A1 (zh) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113535388A (zh) * | 2021-06-25 | 2021-10-22 | 广西综合交通大数据研究院 | 面向任务的服务功能聚合方法 |
WO2023030218A1 (zh) * | 2021-08-31 | 2023-03-09 | 华为技术有限公司 | 网络业务部署方法、nfvo以及nfv系统 |
Families Citing this family (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109213567B (zh) * | 2017-06-29 | 2022-05-13 | 华为技术有限公司 | 一种管理vnf实例化的方法和设备 |
JP2019029946A (ja) * | 2017-08-03 | 2019-02-21 | 富士通株式会社 | 通信制御装置、通信制御システム、及び通信制御方法 |
CN110324164B (zh) * | 2018-03-29 | 2020-10-16 | 华为技术有限公司 | 一种网络切片的部署方法及装置 |
CN111404716B (zh) * | 2019-01-02 | 2022-12-13 | 中国移动通信有限公司研究院 | 一种协同告警处理的方法及系统 |
US11650837B2 (en) * | 2019-04-26 | 2023-05-16 | Hewlett Packard Enterprise Development Lp | Location-based virtualization workload placement |
CN112887121B (zh) * | 2019-11-29 | 2022-08-19 | 北京华为数字技术有限公司 | 一种管理网络服务的方法、设备及系统 |
US11349774B2 (en) * | 2019-12-13 | 2022-05-31 | At&T Intellectual Property 1, L.P. | Methods, systems and computer readable media for diagnosing network function virtualization performance |
CN113918268A (zh) * | 2020-07-07 | 2022-01-11 | 华为技术有限公司 | 一种多租户管理方法及装置 |
CN115879456A (zh) * | 2021-09-26 | 2023-03-31 | 中兴通讯股份有限公司 | 资源的拓扑还原方法、装置、服务器和存储介质 |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20110246627A1 (en) * | 2010-04-01 | 2011-10-06 | International Business Machines Corporation | Data Center Affinity Of Virtual Machines In A Cloud Computing Environment |
CN104137482A (zh) * | 2014-04-14 | 2014-11-05 | 华为技术有限公司 | 一种云计算架构下的容灾数据中心配置方法及装置 |
CN104199718A (zh) * | 2014-08-22 | 2014-12-10 | 上海交通大学 | 一种基于numa高性能网络缓存资源亲和度的虚拟处理器的调度方法 |
Family Cites Families (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7562145B2 (en) * | 2003-08-28 | 2009-07-14 | International Business Machines Corporation | Application instance level workload distribution affinities |
JP6090423B2 (ja) * | 2012-03-30 | 2017-03-08 | 日本電気株式会社 | 通信システム、制御装置、通信装置、通信制御方法およびプログラム |
US9712402B2 (en) * | 2012-10-10 | 2017-07-18 | Alcatel Lucent | Method and apparatus for automated deployment of geographically distributed applications within a cloud |
US9363192B2 (en) * | 2013-10-31 | 2016-06-07 | Vmware, Inc. | Automatic remediation in a distributed computer system with multiple clusters of host computers |
EP2940968A1 (en) * | 2014-04-30 | 2015-11-04 | Hewlett-Packard Development Company, L.P. | Network infrastructure management |
US9806975B2 (en) * | 2014-06-12 | 2017-10-31 | Futurewei Technologies, Inc. | Methods and systems for managing capacity in a virtualized network |
US9742690B2 (en) * | 2014-08-20 | 2017-08-22 | At&T Intellectual Property I, L.P. | Load adaptation architecture framework for orchestrating and managing services in a cloud computing system |
US9800673B2 (en) * | 2014-08-20 | 2017-10-24 | At&T Intellectual Property I, L.P. | Service compiler component and service controller for open systems interconnection layer 4 through layer 7 services in a cloud computing system |
EP3855681A1 (en) * | 2014-09-25 | 2021-07-28 | Apple Inc. | Network functions virtualization |
EP3040860A1 (en) * | 2014-12-29 | 2016-07-06 | NTT DoCoMo, Inc. | Resource management in cloud systems |
WO2017067598A1 (en) * | 2015-10-22 | 2017-04-27 | Nokia Solutions And Networks Oy | Security mechanism for communication network including virtual network functions |
CN108369529B (zh) * | 2015-10-23 | 2022-04-08 | 瑞典爱立信有限公司 | 通过反关联规则为实例分配主机 |
KR20170056350A (ko) * | 2015-11-13 | 2017-05-23 | 한국전자통신연구원 | Nfv 자원 할당 검증 장치 |
US10356184B2 (en) * | 2016-03-31 | 2019-07-16 | Huawei Technologies Co., Ltd. | Systems and methods for service and session continuity in software defined topology management |
EP3523923A1 (en) * | 2016-10-05 | 2019-08-14 | Convida Wireless, LLC | Capability exposure for service instantiation |
-
2016
- 2016-04-08 KR KR1020187032019A patent/KR102184512B1/ko active IP Right Grant
- 2016-04-08 JP JP2018552724A patent/JP6680901B2/ja active Active
- 2016-04-08 EP EP16897601.7A patent/EP3432515B1/en active Active
- 2016-04-08 WO PCT/CN2016/078913 patent/WO2017173667A1/zh active Application Filing
- 2016-04-08 CN CN201680083907.6A patent/CN108886473B/zh active Active
-
2018
- 2018-10-03 US US16/151,100 patent/US11296945B2/en active Active
-
2022
- 2022-03-18 US US17/698,169 patent/US20220210019A1/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20110246627A1 (en) * | 2010-04-01 | 2011-10-06 | International Business Machines Corporation | Data Center Affinity Of Virtual Machines In A Cloud Computing Environment |
CN104137482A (zh) * | 2014-04-14 | 2014-11-05 | 华为技术有限公司 | 一种云计算架构下的容灾数据中心配置方法及装置 |
CN104199718A (zh) * | 2014-08-22 | 2014-12-10 | 上海交通大学 | 一种基于numa高性能网络缓存资源亲和度的虚拟处理器的调度方法 |
Non-Patent Citations (1)
Title |
---|
See also references of EP3432515A4 * |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113535388A (zh) * | 2021-06-25 | 2021-10-22 | 广西综合交通大数据研究院 | 面向任务的服务功能聚合方法 |
CN113535388B (zh) * | 2021-06-25 | 2023-09-29 | 广西综合交通大数据研究院 | 面向任务的服务功能聚合方法 |
WO2023030218A1 (zh) * | 2021-08-31 | 2023-03-09 | 华为技术有限公司 | 网络业务部署方法、nfvo以及nfv系统 |
Also Published As
Publication number | Publication date |
---|---|
EP3432515A4 (en) | 2019-01-23 |
EP3432515A1 (en) | 2019-01-23 |
CN108886473A (zh) | 2018-11-23 |
US20190036783A1 (en) | 2019-01-31 |
KR20180132818A (ko) | 2018-12-12 |
US11296945B2 (en) | 2022-04-05 |
JP6680901B2 (ja) | 2020-04-15 |
CN108886473B (zh) | 2020-09-11 |
KR102184512B1 (ko) | 2020-11-30 |
US20220210019A1 (en) | 2022-06-30 |
JP2019511887A (ja) | 2019-04-25 |
BR112018070584A2 (pt) | 2019-02-05 |
EP3432515B1 (en) | 2020-05-20 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2017173667A1 (zh) | 一种管理方法及装置 | |
US10917294B2 (en) | Network function instance management method and related device | |
EP3430512B1 (en) | Network virtualization of containers in computing systems | |
US10698717B2 (en) | Accelerator virtualization method and apparatus, and centralized resource manager | |
CN107534579B (zh) | 资源管理的系统和方法 | |
CN107431651B (zh) | 一种网络服务的生命周期管理方法及设备 | |
US9996371B2 (en) | Virtual switching method, related apparatus, and computer system | |
US11108653B2 (en) | Network service management method, related apparatus, and system | |
WO2017148249A1 (zh) | 配置资源的方法及其网络设备 | |
EP3313023A1 (en) | Life cycle management method and apparatus | |
WO2019100266A1 (zh) | 移动边缘主机服务通知方法和装置 | |
WO2017161562A1 (zh) | 网络功能虚拟化环境下应用的管理方法和装置 | |
CN109995552B (zh) | Vnf服务实例化方法及装置 | |
CN107534577B (zh) | 一种网络业务实例化的方法及设备 | |
CN109565447A (zh) | 网络功能处理方法及相关设备 | |
CN115858103B (zh) | 用于开放堆栈架构虚拟机热迁移的方法、设备及介质 | |
WO2018040042A1 (zh) | 一种告警信息上报方法及装置 | |
WO2017206092A1 (zh) | 一种生命周期管理方法及管理单元 | |
CN114428757A (zh) | 一种架构可重构的计算装置及其重构方法 | |
WO2018045540A1 (zh) | 一种生命周期管理方法及管理单元 | |
CN111581203A (zh) | 信息处理方法、装置及存储介质 | |
US20240036925A1 (en) | Lcs sdxi data plane configuration system | |
US20240036935A1 (en) | Lcs sdxi resource ownership system | |
US20240028373A1 (en) | Decoupling ownership responsibilities among users in a telecommunications cloud | |
BR112018070584B1 (pt) | Metodo de gerenciamento, aparelho orquestrador de virtualização de funções de rede, primeiro aparelho de gerenciamento, sistema de suporte de operações ou sistema de suporte de negócios, segundo aparelho de gerenciamento e meio legível por computador |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
ENP | Entry into the national phase |
Ref document number: 2018552724 Country of ref document: JP Kind code of ref document: A |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2016897601 Country of ref document: EP |
|
REG | Reference to national code |
Ref country code: BR Ref legal event code: B01A Ref document number: 112018070584 Country of ref document: BR |
|
ENP | Entry into the national phase |
Ref document number: 2016897601 Country of ref document: EP Effective date: 20181012 |
|
ENP | Entry into the national phase |
Ref document number: 20187032019 Country of ref document: KR Kind code of ref document: A |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 16897601 Country of ref document: EP Kind code of ref document: A1 |
|
ENP | Entry into the national phase |
Ref document number: 112018070584 Country of ref document: BR Kind code of ref document: A2 Effective date: 20181005 |