WO2018090299A1 - 网络服务生命周期管理的许可方法和装置 - Google Patents
网络服务生命周期管理的许可方法和装置 Download PDFInfo
- Publication number
- WO2018090299A1 WO2018090299A1 PCT/CN2016/106288 CN2016106288W WO2018090299A1 WO 2018090299 A1 WO2018090299 A1 WO 2018090299A1 CN 2016106288 W CN2016106288 W CN 2016106288W WO 2018090299 A1 WO2018090299 A1 WO 2018090299A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- instance
- nfvo
- lcm operation
- virtual resource
- lcm
- Prior art date
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/50—Network service management, e.g. ensuring proper service fulfilment according to agreements
- H04L41/5041—Network service management, e.g. ensuring proper service fulfilment according to agreements characterised by the time relationship between creation and deployment of a service
- H04L41/5054—Automatic deployment of services triggered by the service manager, e.g. service implementation by automatic configuration of network components
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/50—Network service management, e.g. ensuring proper service fulfilment according to agreements
- H04L41/5041—Network service management, e.g. ensuring proper service fulfilment according to agreements characterised by the time relationship between creation and deployment of a service
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/455—Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
- G06F9/45533—Hypervisors; Virtual machine monitors
- G06F9/45558—Hypervisor-specific management and integration aspects
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/08—Configuration management of networks or network elements
- H04L41/0803—Configuration setting
- H04L41/0813—Configuration setting characterised by the conditions triggering a change of settings
- H04L41/082—Configuration setting characterised by the conditions triggering a change of settings the condition being updates or upgrades of network functionality
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/08—Configuration management of networks or network elements
- H04L41/0803—Configuration setting
- H04L41/0823—Configuration setting characterised by the purposes of a change of settings, e.g. optimising configuration for enhancing reliability
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/08—Configuration management of networks or network elements
- H04L41/0876—Aspects of the degree of configuration automation
- H04L41/0886—Fully automatic configuration
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/14—Network analysis or design
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/28—Restricting access to network management systems or functions, e.g. using authorisation function to access network configuration
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/34—Signalling channels for network management communication
- H04L41/342—Signalling channels for network management communication between virtual entities, e.g. orchestrators, SDN or NFV entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/40—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks using virtualisation of network functions or resources, e.g. SDN or NFV entities
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/455—Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
- G06F9/45533—Hypervisors; Virtual machine monitors
- G06F9/45558—Hypervisor-specific management and integration aspects
- G06F2009/45595—Network integration; Enabling network access in virtual machine instances
Definitions
- the embodiments of the present application relate to communication technologies, and in particular, to a method and an apparatus for permitting network service lifecycle management.
- Network Function Virtualization technology is a virtualization technology for telecom network operators in the field of Information Technology (IT).
- IT Information Technology
- the implementation of some telecommunications network functions is decoupled from software and hardware in a common cloud server, switch and memory. This technology requires the functionality of the telecommunications network to be implemented in software, running on common server hardware, and being migrated, instantiated, and deployed at different physical locations on the network as needed.
- the virtualized network service (English: Network Service, NS for short) in NFV can be implemented by several Virtualized Network Function (VNF) modules.
- VNF Virtualized Network Function
- the VNF is a software implementation of the network functions that can be deployed on the NFV infrastructure.
- the Network Function Virtualization Infrastructure contains the underlying hardware (HW) resources, which can be divided into computing hardware and storage. Hardware, network hardware, and more. Above the hardware layer is the virtualization layer, including the Host Operating System (Host OS) and the hypervisor/hypervisor (Hypervisor), running at least two virtual layers above the virtualization layer.
- Host OS Host Operating System
- Hypervisor hypervisor/hypervisor
- Machine Virtual Machine, VM
- NFVI is connected to the Virtualization Infrastructure Manager (VIM) through the Nf-Vi interface.
- the VNF is connected to the VNF Manager (VNFM) through the Ve-Vnfm interface, and the Vi-Vnfm interface is used between the VIM and the VNFM.
- VIM is connected to the Network Functions Virtualization Orchestrator (NFVO) through Or-Vi.
- NFVO Network Functions Virtualization Orchestrator
- the VNFM is connected to the NFVO through the Or-Vnfm interface, and the NFVO is connected to the OSS/BSS through the Os-Ma-nfvo interface.
- the OSS/BSS is used to initiate a network service lifecycle management request to the NFVO.
- the NFVO is responsible for orchestrating management resources according to the network service lifecycle management request initiated by the OSS/BSS, realizing the lifecycle management of the network service, and monitoring the VNF and NFVI in real time.
- VNFM is responsible for VNF lifecycle management, such as instantiation, elastic scaling, healing, and termination of VNF instances.
- VIM is responsible for managing and allocating NFVI resources and detecting the collection of NFVI operational status information.
- NFVO manages resources for its managed NS instances.
- LCM Life Cycle Management
- the VNFM in its management domain receives an operation request for Life Cycle Management (LCM) for a member VNF instance of the NS instance, the VNFM needs to first request the NFVO to perform the life on the VNF instance.
- Resource management license for periodic management operations (Granting) After NFVO agrees to permit the VNF LCM operation request, VNFM can further interact with VIM to complete resource management in the VNF LCM operation.
- an NFVO-managed virtual resource set belongs to one management domain, and different NFVO-managed virtual resource sets belong to different management domains.
- an administrative domain refers to a collection of MANO management functional entities consisting of one NFVO and one or more VNFMs within its management scope.
- Each administrative domain corresponds to a management scope of NFVO for the provision of a specific set of network services within the administrative domain.
- an administrative domain may further include one or more VIMs and one or more data centers managed by each VIM.
- each branch deploys an NFV MANO system that includes at least one NFVO to build its own management domain.
- NS1 includes NS2.
- NS1 needs to use 0 to N VNF instances and 0 to N physical network function PNF (Physical Network Function) instances, and 1 to N VNF (205) instances that NS2 needs to use. And 0 to N PNF (206) instances.
- PNF Physical Network Function
- NS1 is also called NS2, so NS1 is called Composite NS, and NS2 included by NS1 can be called Nested NS. Nested NSs are provided by administrative domains other than composite NS.
- a composite NS can contain one or more nested NSs.
- the composite NS instance can also be understood as a second NS instance, and the nested NS instance can also be understood as a first NS instance.
- the NFVO managing the composite NS and the NFVO managing the nested NS and the VNFM in the management domain to which it belongs respectively perform the resource management permission process for the VNF LCM operation, which may result in nested NS.
- the lifecycle management operations performed by the instance conflict with the lifecycle management operations objectives performed by the composite NS instance.
- the NFVO receiving the nested NS receives the OSS/BSS to send an elastic scaling operation for the nested NS instance, while the NFVO managing the composite NS is healing the composite NS instance to which the nested NS instance belongs. Operation, the healing operation requires the nested NS instance to maintain the same capacity, and other nested NS instances or failed VNF instances that are diagnosed as failed perform recovery operations after the failure.
- the application provides a network service lifecycle management permission method and device for solving the problem that the LNS management operation of the nested NS and the composite NS exists in the scenario where the composite NS and its member nested NS provide services in multiple management domains.
- the embodiment of the present application provides a network service lifecycle management permission method, which is applied to a scenario in which a composite NS and its member nested NS provide services in multiple management domains, including:
- the first network function virtualization orchestrator receives a network service lifecycle management operation request, where the NS LCM operation request carries an identifier of the first NS instance and an NS LCM operation type, where the identifier of the first NS instance is used to indicate that the LCM operation is targeted a nested NS instance, the NS LCM operation type is used to indicate a specific NS LCM operation category; the first NFVO sends a permission request to the second NFVO according to the NS LCM operation request, requesting the second NFVO to permit the first The NFVO performs virtual resource management for the NS LCM operation request for the first NS instance, the permission request carrying an identifier of the first NS instance and an NS LCM operation type; the second NFVO is according to the permission request a license response sent to the first NFVO; the first NFVO performs virtual resource management of the NS LCM operation for the first NS instance according to the license response.
- the license method of the network service lifecycle management determines, according to the permission request of the first NFVO, the LCM operation for the nested NS instance managed by the first NFVO to generate the LCM operation for the current composite NS instance for the second NFVO management
- the impact of the NS LCM operation against the first NFVO is based on the impact, ensuring the lifecycle management operations performed by the nested NS instance and the nested NS instance.
- the first NFVO sends a permission request to the second NFVO according to the NS LCM operation request, including: the first NFVO is locally obtained according to the identifier of the first NS instance.
- the stored tenant identifier acquires the identification information of the second NFVO according to the tenant identifier; the first NFVO sends a permission request to the second NFVO according to the identifier information of the second NFVO.
- This embodiment may enable the first NFVO to be quickly addressed to the second NFVO, thereby transmitting a grant request to the second NFVO.
- the first NS instance managed by the first NFVO is a constituent member of the second NS instance managed by the second NFVO.
- the license request further includes:
- the virtual resource management plan includes:
- the type, the number, and/or the location of the virtual resource actually occupied by the instance in the NS LCM operation, and/or the member VNF instance member VL instance included in the first NS instance actually occupied by the NS LCM operation The type, number, and/or location of virtual resources.
- the embodiment determines, by the first NFVO, a resource management plan for the NS LCM operation of the first NS instance before the permission request, and carries it in the permission request, so that the second NFVO can be more targeted according to the resource management plan.
- the result of the judgment is more targeted and accurate for the impact of the LCM operation of the nested NS instance managed by the first NFVO on the LCM operation of the composite NS instance currently managed for the second NFVO.
- the second NFVO further determines whether the NS LCM operation is performed on the first NS instance for the second NFVO according to at least one of the following information stored locally.
- the second NS instance has an impact:
- the second NS instance managed by the second NFVO has a running state of the member NS instance that has a dependency relationship with the first NS instance, and/or the second NS instance managed by the second NFVO has a dependency with the first NS instance.
- the second NFVO not only needs to determine the impact of the nested NS LCM operation on the composite NS instance LCM operation, but also the affinity/anti-affinity of the nested NS instance and the member VNF instance according to the member in the composite NS instance.
- the license method of the network service lifecycle management further includes: the second NFVO according to the virtual resource view of the second NS instance managed by the second NFVO and at least the information An virtual resource management plan for performing the NS LCM operation for the first NS instance;
- the license response includes a successful operation indication, and further includes a virtual resource management plan that is performed by the second NFVO to perform the NS LCM operation for the first NS instance;
- the first NFVO performs virtual resource management according to the updated virtual resource management plan for performing the NS LCM operation for the first NS instance.
- the second NFVO discriminates the nested NS according to the virtual resource view of the managed second NS instance and the affinity/anti-affinity rule of the member nested NS instance and the member VNF instance in the composite NS instance. Locating the location requirements of the resources required for the LCM operation, and adjusting the virtual resource management plan for the nested NS instance LCM operation according to the licensing policy for the second NS instance NS LCM operation, thereby reducing the first NFVO from being newly initiated Licensing requests improve the efficiency of NS LCM operations.
- the embodiment of the present application provides a network service lifecycle management permission method, including: a second NFVO receives an NS LCM operation permission request sent by a first NFVO, where the permission request carries an identifier of the first NS instance and an NS
- the second NFVO is determined according to the identifier of the first NS instance and the NS LCM operation type and the virtual resource view of the second NS instance managed by the second NFVO to determine the first NS instance.
- Whether the NS LCM operation affects the second NS instance managed by the second NFVO; transmitting a license response to the first NFVO according to the judgment result.
- the method further includes: the second NFVO further determining, according to at least one of the locally stored information, whether the NS LCM operation is performed on the first NS instance
- the second NS instance of the second NFVO management has an impact:
- the second NS instance managed by the second NFVO has a dependency relationship with the first NS instance.
- the running state of the member NS instance, and/or the running state of the member VNF instance having a dependency on the first NS instance under the second NS instance;
- a licensing policy for NS LCM operations of the second NS instance is a licensing policy for NS LCM operations of the second NS instance.
- the license request further includes: a virtual resource management plan for performing the NS LCM operation on the first NS instance, the virtual resource management The plan includes:
- the type, the number, and/or the location of the virtual resource actually occupied by the instance in the NS LCM operation, and/or the virtual resource actually occupied by the member VL instance included in the first NS instance in the NS LCM operation Type, quantity, and/or location.
- the method further includes:
- the virtual resource that performs the NS LCM operation for the first NS instance according to at least one of a virtual resource view of the second NS instance managed by the second NFVO and the locally stored information Management plan
- the license response includes a successful operation indication, and further includes a virtual resource management plan for performing the NS LCM operation for the first NS instance after the second NFVO update, to indicate that the first NFVO is according to the The updated virtual resource management plan for performing the NS LCM operation for the first NS instance performs virtual resource management.
- the embodiment of the present application provides a network function virtualization orchestrator NFVO, including: a receiving unit, a processing unit, and a sending unit that are sequentially connected, where:
- a receiving unit configured to receive an NS LCM operation request, where the NS LCM operation request carries an identifier of the first NS instance and an NS LCM operation type;
- a sending unit configured to send a permission request to the second NFVO according to the NS LCM operation request, requesting the second NFVO to permit the NFVO to perform virtual resource management for performing the NS LCM operation request for the first NS instance,
- the permission request carries an identifier of the first NS instance and an NS LCM operation type, where the first NS instance managed by the NFVO is a constituent member of a second NS instance managed by the second NFVO;
- the receiving unit is further configured to receive the second NFVO sent according to the permission request Responsive;
- a processing unit configured to perform virtual resource management for performing NS LCM operations on the first NS instance according to the license response.
- the sending unit sends a permission request to the second NFVO according to the NS LCM operation request, including:
- the sending unit obtains the stored tenant identifier from the locality according to the identifier of the first NS instance, and acquires the identifier information of the second NFVO according to the tenant identifier.
- the transmitting unit sends a permission request to the second NFVO according to the identification information of the second NFVO.
- the permission request sent by the sending unit further includes:
- the virtual resource management plan includes: adding, deleting, the NS LCM operation by referring to the current resource situation used by the first NS instance Or the type, number, and/or location of the changed virtual resource; or the type, number, and/or location of the virtual resource actually occupied by the member VNF instance included in the first NS instance in the NS LCM operation, and / or the type, number and/or location of the virtual resources actually occupied by the member VL instance included in the first NS instance in the NS LCM operation.
- the license response received by the receiving unit includes a successful operation indication
- the processing unit performs the Performing virtual resource management of the NS LCM operation by an NS instance includes: the processing unit performs virtual resource management according to a virtual resource management plan for performing NS LCM operations on the first NS instance.
- the license response received by the receiving unit includes a successful operation indication, and further includes, by the second NFVO, the The first NS instance performs a virtual resource management plan of the NS LCM operation, and the processing unit performs virtual resource management for the NS LCM operation according to the license response, including:
- the processing unit performs virtual resource management according to the updated virtual resource management plan for performing the NS LCM operation on the first NS instance.
- a network function virtualization orchestrator NFVO is provided, and the NFVO includes Connected receiving unit, processing unit and transmitting unit, wherein:
- a receiving unit configured to receive an NS LCM operation permission request sent by the first NFVO, where the permission request carries an identifier of the first NS instance and an NS LCM operation type, where the first NS instance managed by the first NFVO is the a member of the second NS instance managed by NFVO;
- a processing unit configured to determine, according to the identifier of the first NS instance, the NS LCM operation type, and the virtual resource view of the second NS instance that is managed by the NFVO, whether the NS LCM operation is performed on the first NS instance
- the NS instance of NFVO management has an impact
- a sending unit configured to send a license response to the first NFVO according to the determination result.
- the processing unit further determines, according to at least one of the locally stored information, whether the NS LCM operation on the first NS instance is generated for the NSVO managed NS instance. influences:
- a licensing policy for NS LCM operations of the second NS instance is a licensing policy for NS LCM operations of the second NS instance.
- the permission request received by the receiving unit further includes: a virtual resource management plan for performing the NS LCM operation on the first NS instance, Virtual resource management plans include:
- the processing unit is further configured to:
- the license response sent by the sending unit includes a successful operation indication, and further includes a virtual resource management plan that is performed by the NFVO to perform the NS LCM operation for the first NS instance, where And to instruct the first NFVO to perform virtual resource management according to the updated virtual resource management plan for performing the NS LCM operation on the first NS instance.
- an NFVO apparatus comprising: a memory for storing computer executable program code; a transceiver, and a processor coupled to the memory and the transceiver;
- the program code includes instructions, when the processor executes the instruction, the instruction causes the network element to perform an operation of: receiving a network service lifecycle management operation request, the NS LCM operation request carrying a first NS The identity of the instance and the type of NS LCM operation;
- an NFVO apparatus comprising a memory for storing computer executable program code, a transceiver, and a processor coupled to the memory and the transceiver;
- the program code includes instructions, when the processor executes the instruction, the instruction causes the network element to perform the following operations: receiving: receiving an NS LCM operation permission request sent by the first NFVO, the permission request carrying An instance identifier of the first NS and an NS LCM operation type;
- a computer program product comprising executable program code, wherein the program code includes instructions that, when executed by the processor, cause the network element to perform the following operations: receiving a network a service lifecycle management operation request, where the NS LCM operation request carries an identifier of the first NS instance and an NS LCM operation type;
- a computer program product comprising executable program code, wherein the program code includes instructions that, when executed by the processor, cause the network element to perform the following operations: receiving a An NS LCM operation permission request sent by the NFVO, the permission request carrying an identifier of the first NS instance and an NS LCM operation type;
- the embodiment of the present application provides a computer storage medium for storing computer software instructions for use in the NFVO, which includes a program designed to perform the above aspects.
- the method for granting nested NS lifecycle management in the embodiment of the present application implements resource management in a nested NS LCM operation and lifecycle management of a composite NS to which a nested NS belongs by using a license management mechanism between the first NFVO and the second NFVO.
- the resource management of the operation achieves the consistency of the target, and avoids the resource management performed in the nested NS LCM operation to have a negative impact on the composite NS instance.
- FIG. 1 is a network architecture diagram of an NFV-MANO application according to an embodiment of the present application
- FIG. 2 is a topological diagram of a relationship between a composite network service and a nested network service in an application scenario according to an embodiment of the present application;
- FIG. 3 is a network topology diagram in application scenario 1 according to an embodiment of the present application.
- FIG. 4 is a network topology diagram in application scenario 2 according to an embodiment of the present application.
- FIG. 5 is a flowchart of a permission method interaction of a nested network service lifecycle management based on application scenario 1 in an embodiment of the present application;
- FIG. 6 is a schematic diagram of a nested network service lifecycle management based on application scenario 2 in the embodiment of the present application; Method interaction flow chart;
- FIG. 7 is a flowchart of a permission method interaction of a nested network service instantiation operation based on application scenario 2 in the embodiment of the present application;
- FIG. 8 is a flowchart of a permission method interaction of a nested network service elastic scaling operation based on application scenario 2 in the embodiment of the present application;
- FIG. 9 is a flowchart of a permission method interaction of a nested network service termination operation based on application scenario 2 in the embodiment of the present application;
- FIG. 10 is a flowchart of a permission method interaction of a resource reservation operation in a nested network service lifecycle management based on application scenario 2 in the embodiment of the present application;
- FIG. 11 is a flow chart of interaction of a volume licensing method in a nested network service lifecycle management according to another embodiment of the present application.
- FIG. 12 is a schematic structural diagram of a NFVO function according to an embodiment of the present application.
- FIG. 13 is a schematic structural diagram of a NFVO function according to another embodiment of the present application.
- FIG. 14 is a schematic diagram of a general physical structure of an NFVO according to an embodiment of the present application.
- FIG. 15 is a schematic diagram of a general physical structure of an NFVO according to another embodiment of the present application.
- the embodiment of the present invention provides a method and a device for permitting nested network service lifecycle management, which are used to solve the technical problem of target conflict in nested network application and composite network application lifecycle management in the prior art.
- first and second are used herein for convenience of description, and are used to distinguish different NS, NS instances, VNFs, or different VNF instances, and have no technical meaning.
- the NFVO managing the composite NS is referred to as the second NFVO, and the NFVO managing the nested NS is referred to as the first NFVO.
- a vEPC network service is provided in a telecommunications carrier with a large number of users.
- the telecom operator's network has a two-level structure: a head office network and 30 regional company networks, each of which has its own management domain and is configured with an NFVO.
- the NFVO in the head office network is equivalent to the NFVO of the management NS1 in FIG. 2, that is, the second NFVO; and the NFVO in each civil company network is equivalent to the NFVO of the management NS2 in FIG. 2, that is, the first NFVO.
- the telecommunication operator determines to provide the network service vEPC from the level of the head office network, it may specify that the sub-company network of the province A provides the control plane network service that constitutes the vEPC, and the B-province network provides the user plane network service that constitutes the vEPC.
- the policy control network service that constitutes vEPC is provided by the subsidiary network of the province.
- the solution of the present application is applicable to the permission of the second NFVO to perform resource management for the first NFVO in performing a nested network service (Nested NS) lifecycle management operation in a scenario provided by the composite NS across the management domain.
- the second NFVO and the first NFVO respectively manage the virtual resource view of the composite NS and the nested NS.
- the virtual resource view is a data structure in NFVO. It is used to display the status of the virtual resource used by the NS instance. It can be expressed as the type of virtual resource occupied by each member VNF instance and member VL instance of the NS instance (computing, storage, network).
- the virtual resource location information may represent a virtual resource location association relationship of different granularity by a combination of a VIM identifier, a resource zone, and/or a host identifier.
- Scenario 1 The VIM and NFVI resources in the composite NS and the nested NS management domain are different from each other. As shown in Figure 3, the VIMs of the management domains in the scenario are different.
- the VIMs of the management domains are different from each other, between the lifecycle management of the composite NS instance and the lifecycle management of the nested NS instances, and between the lifecycle management of two different nested NS instances.
- the target virtual resource space for the resource management does not overlap with each other. Therefore, the virtual resource allocation or release of each NS instance, whether it is a composite NS instance or a nested NS instance, can be completed by the NFVO of each management domain alone, and the second NFVO is licensed. The process helps the first NFVO to discriminate the impact of the nested NS instance LCM operation on the current composite NS instance LCM operation. If an execution target conflict is formed, Then the second NFVO rejects the first NFVO to perform the nested NS instance LCM operation.
- Scenario 2 The VIM and NFVI resources in the composite NS and nested NS management domains are shared with each other, as shown in Figure 4:
- the management domain consists of one NFVO and one or more VNFMs managed by the NFVO.
- the administrative domain shares a set of identical VIMs and NFVI resources within the VIM domain.
- the second NFVO Compared with scenario 1, in the licensing process of nested NS LCM operations, the second NFVO not only determines the impact of nested NS LCM operations on the composite NS instance LCM operations, but also nests NS instances according to members in the composite NS instance.
- the affinity/anti-affinity rule of the member VNF instance discriminates the location requirement of the resource allocated by the nested NS instance LCM operation, and feeds back the suggested resource location to the first NFVO.
- the affinity/anti-affinity rule is used to determine whether two member VNF instances can be deployed in the same location virtual resource.
- the first embodiment of the present application provides a permission method based on the nested NS LCM operation in scenario 1, as shown in FIG. 5.
- the first NFVO Before the method in this embodiment is executed, the following information needs to be configured: before the sender initiates the request message for the nested NS LCM operation to the first NFVO, the first NFVO internally stores the identifier information of the tenant that invokes the nested NS instance LCM operation ( Tenant ID).
- the tenant identification information may be transmitted by the second NFVO to the first NFVO during the shelf process of the composite NS descriptor file, and the tenant identification information may be the identification information of the second NFVO, the identifier information being used for the first NFVO addressing second. NFVO.
- the second NFVO and the first NFVO respectively store the virtual resource view of the composite NS instance and the nested NS instance, and the virtual resource view of the composite NS instance does not include the virtual resource view of the nested NS instance, that is, the nested NS instance.
- the virtual resource view is not visible to the second NFVO.
- the permission method of the nested NS LCM operation of this embodiment includes the following steps:
- the sender Sender sends a request message for the nested NS LCM operation to the first NFVO, where the request message carries the identifier information of the nested NS instance and the NS LCM operation type.
- the NS LCM operation type may include, but is not limited to, NS instantiation, NS elastic scaling, NS update, NS healing, and NS termination, input in the request message.
- the parameters can be defined by reference to the ETSI NFV IFA013 protocol.
- the first NFVO addresses the second NFVO according to the tenant ID information stored therein, and sends a Grant Request to the second NFVO, where the request message carries the identifier information of the nested NS instance and is executed.
- NS LCM operation type The first NFVO addresses the second NFVO according to the tenant ID information stored therein, and sends a Grant Request to the second NFVO, where the request message carries the identifier information of the nested NS instance and is executed.
- the first NFVO stores a correspondence between the tenant identification information and the nested NS instance identification information.
- the first NFVO may search for the stored tenant identification information according to the nested NS identification information in the received nested NS LCM request, and then query the second NFVO identification information, such as an IP address, according to the second identifier, according to the second
- the identification information of the NFVO sends a permission request to the second NFVO.
- the second NFVO checks the LCM operation type of the nested NS instance in the received permission request, and determines the nested NS LCM according to the NS instance identifier and the NS LCM operation type and the virtual resource view of the NS instance managed by the second NFVO. Whether the operation has an impact on the NS instance managed by the second NFVO.
- the second NFVO determines, according to the virtual resource view of the managed NS instance, whether there is a VNF instance and/or a nested NS instance in the composite NS instance that has a dependency relationship with the nested NS instance in the LCM operation, and the VNFs. Whether the instance and the nested NS instance are performing an LCM operation with a dependency to determine whether the nested NS LCM operation has an impact on the NS instance managed by the second NFVO.
- Dependencies are used to determine the order in which virtual resources are allocated between two member instances (which can be nested NS instances or VNF instances) within a composite NS instance. For example, the allocation of resources for a nested NS instance that performs lifecycle management operations in a certain LCM operation depends on the completion of resource allocation by other member VNF instances and/or nested NS instances in the corresponding LCM operations.
- Further second NFVO may also determine whether to permit the first NFVO to perform virtual resource management for the nested NS LCM operation according to the corresponding nested NS LCM licensing policy.
- the nested NS LCM license policy indicates that when the load of the composite NS instance is light, the resource management request of all member nested NS instances can be satisfied as much as possible; if the load of the composite NS instance is heavy, the high priority is preferentially satisfied.
- the member manages the resource management request of the NS instance.
- the nested NS LCM licensing policy can be sent to the second NFVO by pre-configuration or by operating the OSS/BSS to configure policy information on the Os-Ma-nfvo interface.
- the second NFVO sends a license response to the first NFVO according to the judgment result.
- the second NFVO permits the first NFVO to perform virtual resource management corresponding to the nested NS LCM operation, and the second NFVO returns a permission response message to the first NFVO, in which the indication of successful operation is carried. If the effect is judged, then the second NFVO returns a license response message with a failure cause indication to the first NFVO.
- the first NFVO interacts with the corresponding VIM according to the permission in the license response message, and performs the pin Virtual resource management for this nested NS LCM operation.
- the first NFVO interacts with the VIM corresponding to the first NFVO according to the permission indication information in the license response message, and performs virtual resource management operations, such as allocation or release of virtual resources, for the nested NS LC operation.
- the first NFVO returns an execution result of the nested NS LCM operation to the Sender by nesting the NS LCM response message.
- the method for granting nested NS lifecycle management in the embodiment of the present application implements resource management in a nested NS LCM operation and lifecycle management of a composite NS to which a nested NS belongs by using a license management mechanism between the first NFVO and the second NFVO.
- the resource management of the operation achieves the consistency of the target, and avoids the resource management performed in the nested NS LCM operation to have a negative impact on the composite NS instance.
- Embodiment 2 of the present application provides a method for permitting a nested NS LCM operation based on the second NFVO of scenario 2, as shown in FIG. 6 :
- This embodiment describes a basic schematic process of the permission process of performing a nested NS LCM operation under scenario 2.
- the first NFVO Before the process of the embodiment is executed, the following configuration is required: before the sender initiates the request message for the nested NS LCM operation to the first NFVO, the first NFVO internally stores the identifier information of the tenant that invokes the nested NS instance LCM operation ( Tenant ID).
- the tenant identification information may be transmitted by the second NFVO to the first NFVO during the shelf process of the composite NS descriptor file, where the tenant identification information may be the identification information of the second NFVO, and the identification information is used for the first NFVO addressing.
- the second NFVO interacts.
- the second NFVO and the first NFVO respectively store the virtual resource view of the composite NS instance and the nested NS instance, and the virtual resource view of the composite NS instance includes the virtual resource view of the nested NS instance, that is, the nested NS instance.
- the virtual resource view is visible to the second NFVO.
- the embodiment includes the following steps:
- the sender Sender initiates a request message for the nested NS LCM operation to the first NFVO, where the request message carries the operation type and the identifier information of the nested NS instance.
- NS LCM operations may include, but are not limited to, NS instantiation, NS elastic scaling, NS update, NS healing, and NS termination, definition of input parameters in operations. Please refer to the ETSI NFV IFA013 agreement.
- the first NFVO addresses the second NFVO according to the tenant ID information stored therein, and initiates a permission request to the second NFVO, where the request message carries the identifier information of the nested NS instance, and the executed NS LCM operation. Type and virtual resource management plan for this NS LCM operation.
- the first NFVO determines a virtual resource management plan for the NS LCM operation according to the NS LCM operation type in the request and the virtual resource view of the nested NS instance that is internally managed. That is, according to the current virtual resource allocation of the nested NS instance, the number and location of the virtual resources that need to be added, deleted, or changed are determined, or the member VNF instance included in the nested NS instance is actually occupied by the NS LCM operation. The type, number, and/or location of virtual resources, and/or the type, number, and/or location of virtual resources that the member VL instances included in the nested NS instance actually occupy in the NS LCM operation.
- the second NFVO addressing mode refers to step 502 of FIG.
- the second NFVO determines whether the nested NS LCM operation affects other nested NS instances or NFV instances under the second NFVO management.
- the second NFVO checks the virtual resource management plan in the received permission request, and checks other member VNF instances or member nested NS instances in the composite NS instance according to the resource view of the composite NS managed by the second NFVO. Whether there is a case of performing a conflict with the nested NS instance LCM operation resource management, determining whether to permit the first NFVO to make a virtual resource management plan for the nested NS LCM operation.
- the second NFVO may be based on whether there is a VNF instance and/or a nested NS instance in the composite NS instance that has a dependency relationship with the nested NS instance in the lifecycle management operation. For example, the resource allocation of a nested NS instance performing lifecycle management operations in a certain LCM operation depends on the completion of resource allocation of other member VNF instances and/or nested NS instances in the corresponding LCM operations, and these VNFs. Whether the instance and the nested NS instance are performing an LCM operation with dependencies.
- the second NFVO may further determine whether to permit the first NFVO to authorize the virtual resource management plan for the nested NS LCM operation according to the corresponding nested NS LCM licensing policy.
- the second NFVO sends a license response to the first NFVO according to the judgment result.
- the second NFVO If permitted, the second NFVO returns a grant response message to the first NFVO, in which an indication of successful operation is carried.
- the second NFVO further updates the virtual resource view of the composite NS instance according to the virtual resource management plan. If not permitted, the second NFVO returns a license response message with a failure cause indication to the first NFVO.
- the second NFVO may further adjust the virtual resource management plan formulated by the first NFVO for the nested NS LCM operation according to at least one of the following conditions, and pass the updated virtual resource management plan through the license.
- the reply message is returned to the first NFVO.
- the resource view of the composite NS managed by the second NFVO, the state of the VNF instance execution operation in the composite NS instance and the dependency of the nested NS instance in the lifecycle management operation, and the nesting in the composite NS instance The state of the execution operation of the other nested NS instances in which the NS instance has dependencies in the lifecycle management operation and the corresponding nested NS LCM licensing policy.
- the first NFVO performs virtual resource management for the nested NS LCM operation according to the virtual resource management plan and the corresponding VIM interaction.
- step 505 of FIG. 5 For the specific implementation of this step, reference may be made to the implementation of step 505 of FIG. 5.
- the first NFVO returns an execution result of the nested NS LCM operation to the Sender by nesting the NS LCM response message.
- Embodiment 3 of the present application provides a permission method for permitting resource management in a nested NS instantiation operation based on the second NFVO of scenario 2.
- This embodiment is an embodiment of the second embodiment, and is applied to the instantiation process of the nested NS.
- the sender Sender may be an OSS/BSS, and initiates a nested NS instantiation request to the first NFVO, where the request message carries the NS instance identifier and the resource requirement description parameter.
- the nested NS instantiation request may further include a template identifier (Flavor ID) reflecting the nested NS specific topology and constraint information of the member VNF instance deployment location of the nested NS instance.
- Flavor ID a template identifier reflecting the nested NS specific topology and constraint information of the member VNF instance deployment location of the nested NS instance.
- the first NFVO addresses the second NFVO according to the nested NS instantiation request, and sends a permission request to the second NFVO.
- the first NFVO parses the input parameter in the nested NS instantiation request, and describes the resource requirement in the NS instantiation operation of the nested NS instance according to the request message, for example, the NS instantiation
- the basic requirements of the virtual resources corresponding to the level form a resource management plan for the member VNF instance and the member VL instance that constitute the nested NS instance, that is, the member VNF instance occupies resource information and the member VNF instance occupies resource information.
- the nested NS instance identifier is used to uniquely identify the nested NS instance in the first NFVO, and the NS LCM operation type is used to indicate the NS lifecycle management operation type in the license request.
- the member VNF occupied resource information includes the number of virtual resources (computing, storage, and network) required to instantiate the member VNFs of the nested NS instance, and the member VL occupied resource information includes virtual resources (networks) required for member VL instantiation. quantity.
- the resource location constraint relationship of the nested NS represents the description information defined by the resource management location in the nested NS LCM operation, which may be determined according to the affinity/anti-affinity rule between the member VNF instance and/or the member VL instance.
- the relative position is limited.
- the nested NS instantiation needs to be deployed on several adjacent hosts in the same resource zone. It may also be an absolute physical location limit that reflects the deployment of member VNF instances and/or member VL instances.
- nested NS instantiation needs to be deployed within the scope of hosts A1, A2, and A3.
- the resource location can be represented by the VIM identity, the resource zone, and/or the identity of the host.
- the second NFVO does allow the first NFVO to perform resource management of the NS instantiation operation, and sends a permission response to the first NFVO.
- the second NFVO returns a license response to the first NFVO according to the virtual resource view of the composite NS instance, the dependency of the member of the composite NS instance nested NS instance, and/or the corresponding nested NS LCM permission policy.
- the license response message carries the VIM identifier that the first NFVO needs to interact with, the identifier of the resource area and/or the host (resource location information), and the resource location information is used to indicate the type of the nested NS instance suggested by the second NFVO.
- the location of the resources required for the lifecycle management operations is used to indicate the type of the nested NS instance suggested by the second NFVO.
- the second NFVO may also carry the actual resource information allocated to the nested NS instantiation operation under each VIM in the response message, for example, the virtual resource required for the member VNF instantiation of the nested NS instance actually allocated (calculation) Number of storage, network, and number of virtual resources (networks) instantiated by member VL.
- the first NFVO interacts with the corresponding VIM according to the information provided in the license response, and completes resource management in the nested NS instance lifecycle management.
- the first NFVO interacts with the corresponding VIM according to the VIM identifier in the license response, and the identifier of the resource area and/or the host, and instantiates the virtual resource required according to the actually allocated member VNF of the nested NS instance.
- the first NFVO returns a nested NS instantiation response to the Sender, indicating completion of the nested NS instantiation operation.
- a fourth embodiment of the present application provides a method for permitting resource management in nested NS elastic scaling based on the second NFVO of scenario 2, as shown in FIG. 8.
- This embodiment is an embodiment of the second embodiment, and is applied to an elastic scalable scaling operation of a nested NS.
- the steps of this embodiment are similar to those of Embodiment 3 except that the NS LCM operation type is "NS elastic scaling" in the input parameters in steps 801 and 802.
- the member VNF occupation resource information reflects the The amount of change of the virtual resources (the number of virtual resources added or decreased) required for the elastic extension of the member VNF instance in the NS instance elastic scaling operation.
- the member VL occupation resource information reflects the elastic expansion operation of the nested NS instance. The amount of change in the virtual resources required for the member VL instance to flexibly scale.
- Embodiment 5 of the present application provides a method for permitting resource management in a nested NS termination based on the second NFVO of scenario 2, as shown in FIG. 9.
- This embodiment is an embodiment of the second embodiment, and is applied to the finalization process of the nested NS.
- the NS LCM operation type is "NS termination" in the input parameters of steps 901 and 902, and the member VNF occupies resource information, member VL occupies resource information, and nests in step 902.
- the input parameter such as the position constraint relationship of the NS is empty; only the indication with success or failure of the operation is returned in the permission response message of step 903.
- the sixth embodiment of the present application provides a method for reserving resources in a nested NS LCM based on the second NFVO of the scenario 2, as shown in FIG. 10:
- the second NFVO returns a set of resource reservation information in the grant response.
- Each resource reservation information includes an identifier of the resource reservation, and a location and quantity of the resource reservation included in the resource reservation.
- the location of the resource includes the VIM identification information that needs to be exchanged, the identification information of the resource area or the host, and the quantity of the resource indicates the value of the virtual computing, storage, and/or network resource reserved at the resource location.
- the resource reservation information may further include a VNF type or a VL type to which the resource reservation is adapted.
- the second NFVO reserves the resources to ensure that the result of the resource management is always successful.
- the first NFVO addressing The second NFVO can be implemented by the following method:
- the first NFVO When the first NFVO receives an NS instantiation request from Sender and creates and instantiates a new NS instance (nested NS instance), the corresponding second NFVO flag is left blank.
- the second NFVO instantiates a composite NS instance and acquires the nested NS instance that has been successfully instantiated by subscription to form a composite NS instance to be instantiated, the second NFVO sends a notification message to the first NFVO, indicating The second NFVO uses the nested NS instance managed by the first NFVO in the composite NS instantiation process.
- the first NFVO saves the correspondence of ⁇ nested NS instance identifier, second NFVO identifier ⁇ .
- the second NFVO When the second NFVO terminates the composite NS instance, the second NFVO sends a notification message to the first NFVO managing the nested NS instance, indicating that the first NFVO deletes the ⁇ nested NS instance identifier, the second NFVO identifier according to the notification message.
- the identifier of the second NFVO may be a tenant identifier. It should be noted that at the same time, only one second NFVO can be applied to the composite NS instance managed by the second NFVO using the nested NS instance.
- the first NFVO can find the identifier of the second NFVO according to the correspondence between the nested NS instance identifier in the nested NS LCM request and the ⁇ nested NS instance identifier, the second NFVO identifier ⁇ , thereby to the second NFVO.
- the seventh embodiment of the present application the first NFVO autonomous method for resource management in nested NS LCM operations, as shown in FIG.
- This embodiment is another form of resource management permission in the nested NS LCM operation, that is, under the authorization of the first NFVO, bulk granting is implemented through policy configuration, and the first NFVO autonomously is within the scope of authorization.
- the second NFVO does not participate in the resource management process in the nested NS LCM operation, but may subscribe to the first NFVO for the notification message in the resource management. For example: resource state changes in nested NS LCM operations, resource usage in nested NS LCM operations exceeds resource quota (Quota) of the first NFVO, and so on.
- the second NFVO updates the volume licensing policy according to the received subscription notification message, and controls the first NFVO autonomously performing resource management consistency in the nested NS LCM from the virtual resource view of the composite NS. This embodiment includes the following steps:
- the second NFVO configures a volume licensing policy to the first NFVO.
- the volume licensing policy of the second NFVO configuration includes, but is not limited to, a resource location constraint of the first NFVO for resource management (including a defined set of VIM identifiers, resource areas, or host identifiers), The resource quota of the first NFVO in a plurality of VIM domains addressable for resource management, the effective time and/or expiration time of the volume licensing process, and the like.
- the first NFVO receives the nested NS LCM request sent by the sender, where the request message carries the NS LCM operation type and the identifier information of the first NS instance.
- the first NFVO performs resource management in the nested NS LCM operation according to the volume licensing policy configuration.
- the first NFVO returns a nested NS LCM response to the sender.
- the permission method of the nested NS LCM operation in the example of the present application configures the license policy to the first NFVO in advance by the second NFVO, so that the first NFVO can perform the operation of nesting the NS LCM according to the volume license policy configuration, thereby avoiding
- the first NFVO needs to perform the interaction of the nested NS LCM permission request/response process to the second NFVO each time, which reduces the consumption of network resources and improves the resource management efficiency of the nested NS LCM operation.
- the NFVO includes: a receiving unit 1201, configured to receive a nested NS LCM operation request, where the nested NS LCM operation request carries the first NS instance identification information and NS LCM operation type;
- the sending unit 1203 is configured to send a permission request to the second NFVO according to the NS LCM operation request, requesting the second NFVO to permit the NFVO to perform virtual resource management for performing the NS LCM operation on the first NS instance, where the permission request carries Identification of the first NS instance and NS LCM operation type;
- the receiving unit 1201 is further configured to receive a license response sent by the second NFVO according to the permission request;
- the processing unit 1202 is configured to perform virtual resource management for performing the NS LCM operation on the first NS instance according to the license response.
- the sending unit 1203 obtains the stored tenant identifier locally according to the identifier of the first NS instance, obtains the identifier information of the second NFVO according to the tenant identifier, and then sends a license request to the second NFVO according to the identifier information of the second NFVO. .
- the processing unit 1202 may determine the nested NS LCM according to the local virtual resource view.
- the virtual resource management plan of the operation is transmitted to the second NFVO through the transmitting unit 1203.
- the virtual resource management plan includes: performing, according to the current resource situation used by the first NS instance, a type, a quantity, and/or a location of a virtual resource that needs to be added, deleted, or changed by the NS LCM operation; or the first NS
- the type, number, and/or location of virtual resources actually occupied by the member VNF instance included in the instance in the NS LCM operation, and/or the member VL instance included in the first NS instance in the NS LCM operation The type, number, and/or location of virtual resources actually occupied.
- the virtual resource management plan for performing the NS LCM operation for the first NS instance after the second NFVO update is further included, and the processing unit 1202 is configured according to The updated virtual resource management plan for performing the NS LCM operation for the first NS instance performs virtual resource management.
- the NFVO device may specifically be a software product, including computer instructions that, when executed by the processor, may be used to implement the steps and functions of the execution of the first NFVO as in embodiments 1-7.
- Embodiment 9 of the present application provides another NFVO device.
- the NFVO device includes:
- the receiving unit 1301 is configured to receive an NS LCM operation permission request sent by the first NFVO, where the permission request carries an identifier of the first NS instance and an NS LCM operation type;
- the processing unit 1302 is configured to determine, according to the first NS instance identifier and the NS LCM operation type, the virtual resource view of the second NS instance managed by the NFVO, whether the NS LCM operation is performed on the first NS instance, and the NFVO management is performed.
- the second NS instance has an impact;
- the sending unit 1303 is configured to send a license response to the first NFVO according to the determination result.
- the processing unit 1302 further determines, according to at least one of the following information, whether the NS LCM operation for the first NS instance has an impact on the second NS instance of the NFVO management:
- a licensing policy for NS LCM operations of the second NS instance is a licensing policy for NS LCM operations of the second NS instance.
- the permission request received by the receiving unit 1301 further includes:
- the virtual resource management plan of the NS LCM operation for the first NS instance includes: adding, deleting, the NS LCM operation by referring to the current resource situation used by the first NS instance Or the type, number, and/or location of the changed virtual resource; or the type, number, and quantity of virtual resources actually occupied by the member VNF instance and/or member VL instance included in the first NS instance in the NS LCM operation / or location.
- the processing unit 1302 may further update the virtual resource management plan for performing the NS LCM operation on the first NS instance according to the managed virtual resource view, and return to the first NFVO through the sending unit 1303.
- the NFVO device may specifically be a software product containing computer instructions that, when executed by the processor, may be used to implement the steps and functions of the execution of the second NFVO as in embodiments 1-7.
- Embodiment 10 of the present application provides a schematic structural diagram of NFVO, as shown in FIG.
- the NFVO may include one or more ports 1401 coupled to a transceiver 1403.
- the transceiver 1403 can be a transmitter, a receiver, or a combination thereof that transmits or receives data packets from other network nodes through port 1404.
- a processor 1401 is coupled to the transceiver 1403 for processing data packets.
- Processor 1401 can include one or more multi-core processors and/or memory 1402.
- the processor 1401 can be a general purpose processor, an application specific integrated circuit (ASIC), or a digital signal processor (DSP).
- ASIC application specific integrated circuit
- DSP digital signal processor
- the memory 1402 can be a non-transitory storage medium coupled to the processor 1401 for storing different types of data.
- the memory 1402 may include a read only memory (ROM), a random access memory (RAM), or other types of dynamic storage devices that can store information and instructions, and may also be a disk storage.
- Memory 1402 can be used to hold instructions that implement an NFV system or related methods. It will be appreciated that at least one of the cache and long term storage is programmed or loaded into the NFVO's processor 1401.
- the memory 1402 stores computer executable program code, wherein the The program code includes instructions that, when executed by the processor 1401, cause the network element to perform the following operations:
- NS LCM operation request carries an identifier of the first NS instance and an NS LCM operation type
- a tenth embodiment of the present application provides a schematic diagram of a structure of an NFVO.
- the NFVO may include one or more ports 1501 coupled to a transceiver 1503.
- the transceiver 1503 can be a transmitter, a receiver, or a combination thereof that transmits or receives data packets from other network nodes through port 1504.
- a processor 1501 is coupled to the transceiver 1503 for processing the data packets.
- Processor 1501 can include one or more multi-core processors and/or memory 1502.
- the processor 1501 can be a general purpose processor, an application specific integrated circuit (ASIC), or a digital signal processor (DSP).
- ASIC application specific integrated circuit
- DSP digital signal processor
- the memory 1502 stores computer executable program code, wherein the program code includes instructions that, when the processor 1501 executes the instructions, cause the network element to perform the following operations:
- the aforementioned program can be stored in a computer readable storage medium.
- the program when executed, performs the steps including the foregoing method embodiments; and the foregoing storage medium includes various media that can store program codes, such as a ROM, a RAM, a magnetic disk, or an optical disk.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Automation & Control Theory (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Devices For Checking Fares Or Tickets At Control Points (AREA)
- Maintenance And Inspection Apparatuses For Elevators (AREA)
- Indicating And Signalling Devices For Elevators (AREA)
Abstract
Description
Claims (23)
- 一种网络服务生命周期管理的许可方法,其特征在于,包括:第一网络功能虚拟化编排器(Network Function Virtualization Orchestrator,NFVO)接收网络服务(Network Service,NS)生命周期管理(Life Cycle Management,LCM)操作请求,所述NS LCM操作请求携带第一NS实例的标识和NS LCM操作类型;所述第一NFVO根据所述NS LCM操作请求向第二NFVO发送许可请求,请求所述第二NFVO准许所述第一NFVO执行针对所述第一NS实例进行所述NS LCM操作请求的虚拟资源管理,所述许可请求携带所述第一NS实例的标识和NS LCM操作类型;所述第一NFVO接收所述第二NFVO根据所述许可请求发送的许可响应;所述第一NFVO根据所述许可响应执行针对所述第一NS实例进行所述NS LCM操作的虚拟资源管理。
- 如权利要求1所述的许可方法,其特征在于,所述第一NFVO根据所述NS LCM操作请求向第二NFVO发送许可请求,包括:所述第一NFVO根据所述第一NS实例的标识从本地获取存储的租户标识,根据所述租户标识,获取所述第二NFVO的标识信息;所述第一NFVO根据所述第二NFVO的标识信息向所述第二NFVO发送许可请求。
- 如权利要求1或2所述的许可方法,其特征在于,所述第一NFVO所管理的第一NS实例是所述第二NFVO所管理的第二NS实例的组成成员。
- 如权利要求1-3任一项所述的许可方法,其特征在于,所述许可请求还包括:针对所述第一NS实例进行所述NS LCM操作的虚拟资源管理计划。
- 如权利要求4所述的许可方法,其特征在于,所述虚拟资源管理计划包括:参照所述第一NS实例所使用的当前资源情况进行所述NS LCM操作需要增加、删除或更改的虚拟资源的类型、数量和/或位置,或者,所述第一NS实例所包括的成员VNF实例在所述NS LCM操作中实际占 用的虚拟资源的类型、数量和/或位置,和/或所述第一NS实例所包括的成员VL实例在所述NS LCM操作中实际占用的虚拟资源的类型、数量和/或位置。
- 如权利要求1-5任一项所述的许可方法,其特征在于,所述方法还包括:所述第二NFVO根据所述第一NS实例的标识和NS LCM操作类型与所述第二NFVO管理的第二NS实例的虚拟资源视图判断对所述第一NS实例进行所述NS LCM操作是否对所述第二NFVO管理的第二NS实例产生影响;根据判断结果向所述第一NFVO发送许可响应。
- 如权利要求6所述的许可方法,其特征在于,所述第二NFVO进一步还根据本地存储的如下信息中至少一种判断对所述第一NS实例进行所述NS LCM操作是否对所述第二NFVO管理的第二NS实例产生影响:所述第二NFVO管理的第二NS实例下与第一NS实例存在依赖关系的成员NS实例的运行状态,和/或所述第二NFVO管理的第二NS实例下与第一NS实例存在依赖关系的成员VNF实例的运行状态;所述第二NFVO管理的第二NS实例下定义的与第一NS实例相关联的亲和性和/或反亲和性规则;针对所述第二NS实例NS LCM操作的许可策略。
- 如权利要求6或7所述的许可方法,其特征在于,所述许可响应包含成功操作指示,所述第一NFVO根据所述许可响应执行针对所述第一NS实例进行所述NS LCM操作的虚拟资源管理包括:所述第一NFVO根据针对所述第一NS实例进行所述NS LCM操作的虚拟资源管理计划执行虚拟资源管理。
- 如权利要求6或7所述的许可方法,其特征在于,所述方法还包括:所述第二NFVO根据所述第二NFVO管理的第二NS实例的虚拟资源视图与所述信息中的至少一种更新针对所述第一NS实例进行所述NS LCM操作的虚拟资源管理计划;所述许可响应包含成功操作指示,还包括由所述第二NFVO更新后的针对所述第一NS实例进行所述NS LCM操作的虚拟资源管理计划,所述第一NFVO根据所述许可响应执行针对所述第一NS实例进行所述NS LCM操作的虚拟资源管理包括:所述第一NFVO根据所述更新后的针对所述第一NS实例进行所述NS LCM操作的虚拟资源管理计划执行虚拟资源管理。
- 一种网络服务生命周期管理的许可方法,其特征在于,包括:第二NFVO接收第一NFVO发送的NS LCM操作许可请求,所述许可请求携带第一NS实例的标识和NS LCM操作类型;所述第二NFVO根据所述第一NS实例的标识和NS LCM操作类型与所述第二NFVO管理的第二NS实例的虚拟资源视图判断对所述第一NS实例进行所述NS LCM操作是否对所述第二NFVO管理的第二NS实例产生影响;根据判断结果向所述第一NFVO发送许可响应。
- 如权利要求10所述的许可方法,其特征在于,所述方法还包括:所述第二NFVO进一步还根据如下本地存储的信息中至少一种判断对所述第一NS实例进行所述NS LCM操作是否对所述第二NFVO管理的第二NS实例产生影响:所述第二NFVO管理的第二NS实例下与第一NS实例存在依赖关系的成员NS实例的运行状态,和/或所述第二NFVO管理的第二NS实例下成员VNF实例的运行状态;所述第二NFVO管理的第二NS实例下定义的与第一NS实例相关联的亲和性和/或反亲和性规则;针对所述第二NS实例的NS LCM操作的许可策略。
- 如权利要求10或11所述的许可方法,其特征在于,所述许可请求还包括:针对所述第一NS实例进行所述NS LCM操作的虚拟资源管理计划,所述虚拟资源管理计划包括:参照所述第一NS实例所使用的当前资源情况进行所述NS LCM操作需要增加、删除或更改的虚拟资源的类型、数量和/或位置,或者所述第一NS实例所包括的成员VNF实例在所述NS LCM操作中实际占用的虚拟资源的类型、数量和/或位置,和/或所述第一NS实例所包括的成员VL实例在所述NS LCM操作中实际占用的虚拟资源的类型、数量和/或位置。
- 如权利要求12所述的许可方法,其特征在于,所述方法还包括:所述第二NFVO根据所述第二NFVO管理的第二NS实例的虚拟资源视图与所述本地存储的信息中的至少一种更新针对所述第一NS实例进行所述NS LCM操作的虚拟资源管理计划;所述许可响应包含成功操作指示,还包括由所述第二NFVO更新后的针对所述第一NS实例进行所述NS LCM操作的虚拟资源管理计划,用以指示所述第一NFVO根据所述更新后的针对所述第一NS实例进行所述NS LCM操作的虚拟资源管理计划执行虚拟资源管理。
- 一种网络功能虚拟化编排器NFVO,其特征在于,包括:接收单元,用于接收NS LCM操作请求,所述NS LCM操作请求携带第一NS实例的标识和NS LCM操作类型;发送单元,用于根据所述NS LCM操作请求向第二NFVO发送许可请求,请求所述第二NFVO准许所述NFVO执行针对所述第一NS实例进行所述NS LCM操作请求的虚拟资源管理,所述许可请求携带所述第一NS实例的标识和NS LCM操作类型;所述接收单元,还用于接收所述第二NFVO根据所述许可请求发送的许可响应;处理单元,用于根据所述许可响应执行针对所述第一NS实例进行所述NS LCM操作的虚拟资源管理。
- 如权利要求14所述的网络功能虚拟化编排器,其特征在于,所述发送单元根据所述NS LCM操作请求向第二NFVO发送许可请求,包括:所述发送单元根据所述第一NS实例的标识从本地获取存储的租户标识,根据所述租户标识,获取所述所述第二NFVO的标识信息;所述发送单元根据所述第二NFVO的标识信息向所述第二NFVO发送许可请求。
- 如权利要求14或15所述的网络功能虚拟化编排器,其特征在于,所述NFVO所管理的第一NS实例是所述第二NFVO所管理的第二NS实例的组成成员。
- 如权利要求14-16任一项所述的网络功能虚拟化编排器,其特征在于,所述发送单元发送的许可请求还包括:针对所述第一NS实例进行所述NS LCM操作的虚拟资源管理计划,所述虚拟资源管理计划包括:参照所述第一NS实例所使用的当前资源情况进行所述NS LCM操作需要增加、删除或更改的虚拟资源的类型、数量和/或位置,或者,所述第一NS实例所包括的成员VNF实例在所述NS LCM操作中实际占用的虚拟资源的类型、数量和/或位置,和/或所述第一NS实例所包括的成员VL实例在所述NS LCM操作中实际占用的虚拟资源的类型、数量和/或位置。
- 如权利要求17所述的网络功能虚拟化编排器,其特征在于,所述接收单元接收的许可响应包含成功操作指示,所述处理单元根据所述许可响应执行针对所述第一NS实例进行所述NS LCM操作的虚拟资源管理包括:所述处理单元根据针对所述所述第一NS实例进行所述NS LCM操作的虚拟资源管理计划执行虚拟资源管理。
- 如权利要求17所述的网络功能虚拟化编排器,其特征在于,所述接收单元接收的许可响应包含成功操作指示,还包括由所述第二NFVO更新后的针对所述第一NS实例进行所述NS LCM操作的虚拟资源管理计划,所述处理单元根据所述许可响应执行针对所述NS LCM操作的虚拟资源管理包括:所述处理单元根据所述更新后的针对所述第一NS实例进行所述NS LCM操作的虚拟资源管理计划执行虚拟资源管理。
- 一种网络功能虚拟化编排器NFVO,其特征在于,包括:接收单元,用于接收第一NFVO发送的NS LCM操作许可请求,所述许可请求携带第一NS实例的标识和NS LCM操作类型;处理单元,用于根据所述第一NS实例的标识和NS LCM操作类型与所述NFVO管理的第二NS实例的虚拟资源视图判断对所述第一NS实例进行所述NS LCM操作是否对所述NFVO管理的第二NS实例产生影响;发送单元,用于根据判断结果向所述第一NFVO发送许可响应。
- 如权利要求20所述的网络功能虚拟化编排器,其特征在于,所述处理单元还进一步根据如下本地存储的信息中至少一种判断对所述第一NS实例进行所述NS LCM操作是否对所述NFVO管理的第二NS实例产生影响:所述NFVO管理的第二NS实例下与第一NS实例存在依赖关系的成员NS实例的运行状态,和/或所述NFVO管理的第二NS实例下成员VNF实例的运行状态;所述NFVO管理的第二NS实例下定义的与第一NS实例相关联的亲和性和/或反亲和性规则;针对所述第二NS实例的NS LCM操作的许可策略。
- 如权利要求21所述的网络功能虚拟化编排器,其特征在于,所述接 收单元接收的许可请求还包括:针对所述第一NS实例进行所述NS LCM操作的虚拟资源管理计划,所述虚拟资源管理计划包括:参照所述第一NS实例所使用的当前资源情况进行所述NS LCM操作需要增加、删除或更改的虚拟资源的类型、数量和/或位置,或者,所述第一NS实例所包括的成员VNF实例在所述NS LCM操作中实际占用的虚拟资源的类型、数量和/或位置,和/或所述第一NS实例所包括的成员VL实例在所述NS LCM操作中实际占用的虚拟资源的类型、数量和/或位置。
- 如权利要求22所述的网络功能虚拟化编排器,其特征在于,所述处理单元还用于:根据所述NFVO管理的NS实例的虚拟资源视图与所述本地存储的信息中的至少一种更新针对所述第一NS实例进行所述NS LCM操作的虚拟资源管理计划;所述发送单元发送的许可响应包含成功操作指示,还包括由所述NFVO更新后的针对所述第一NS实例进行所述NS LCM操作的虚拟资源管理计划,用以指示所述第一NFVO根据所述更新后的针对所述第一NS实例进行所述NS LCM操作的虚拟资源管理计划执行虚拟资源管理。
Priority Applications (10)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110013719.9A CN112799779A (zh) | 2016-11-17 | 2016-11-17 | 网络服务生命周期管理的许可方法和装置 |
EP16921857.5A EP3534568B1 (en) | 2016-11-17 | 2016-11-17 | Network service lifecycle management permission granting method and device |
ES16921857T ES2932756T3 (es) | 2016-11-17 | 2016-11-17 | Método y dispositivo de concesión de permisos para la gestión del ciclo de vida del servicio de red |
PCT/CN2016/106288 WO2018090299A1 (zh) | 2016-11-17 | 2016-11-17 | 网络服务生命周期管理的许可方法和装置 |
KR1020197016894A KR102272229B1 (ko) | 2016-11-17 | 2016-11-17 | 네트워크 서비스 라이프 사이클 관리 승인 방법 및 장치 |
EP22205140.1A EP4195608A1 (en) | 2016-11-17 | 2016-11-17 | Network service life cycle management grant method and apparatus |
CN201680090856.XA CN109964449B (zh) | 2016-11-17 | 2016-11-17 | 网络服务生命周期管理的许可方法和装置 |
JP2019526235A JP6738965B2 (ja) | 2016-11-17 | 2016-11-17 | ネットワークサービスライフサイクル管理許可方法及び装置 |
US16/415,840 US10911333B2 (en) | 2016-11-17 | 2019-05-17 | Network service life cycle management grant method and apparatus |
US17/146,091 US11271827B2 (en) | 2016-11-17 | 2021-01-11 | Network service life cycle management grant method and apparatus |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/CN2016/106288 WO2018090299A1 (zh) | 2016-11-17 | 2016-11-17 | 网络服务生命周期管理的许可方法和装置 |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US16/415,840 Continuation US10911333B2 (en) | 2016-11-17 | 2019-05-17 | Network service life cycle management grant method and apparatus |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2018090299A1 true WO2018090299A1 (zh) | 2018-05-24 |
Family
ID=62145941
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2016/106288 WO2018090299A1 (zh) | 2016-11-17 | 2016-11-17 | 网络服务生命周期管理的许可方法和装置 |
Country Status (7)
Country | Link |
---|---|
US (2) | US10911333B2 (zh) |
EP (2) | EP4195608A1 (zh) |
JP (1) | JP6738965B2 (zh) |
KR (1) | KR102272229B1 (zh) |
CN (2) | CN109964449B (zh) |
ES (1) | ES2932756T3 (zh) |
WO (1) | WO2018090299A1 (zh) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2021004320A1 (zh) * | 2019-07-11 | 2021-01-14 | 华为技术有限公司 | 服务资源许可管理方法和相关设备 |
CN112448833A (zh) * | 2019-09-02 | 2021-03-05 | 华为技术有限公司 | 一种多管理域的通信方法和装置 |
Families Citing this family (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11405177B2 (en) * | 2017-01-24 | 2022-08-02 | Microsoft Technology Licensing, Llc | Nested enclave identity |
BR112019025898A2 (pt) | 2017-06-09 | 2020-06-30 | Telefonaktiebolaget Lm Ericsson (Publ) | método para manter um serviço de função de rede virtual e disponibilidade e continuidade de serviço de rede, gerenciador de infraestrutura virtual, e, sistema com base em nuvem |
US11070432B2 (en) * | 2017-07-20 | 2021-07-20 | Cisco Technology, Inc. | Dynamic and customizable virtual network functions |
EP3723325B1 (en) * | 2017-12-29 | 2022-09-14 | Huawei Technologies Co., Ltd. | Network service management method, related device and system |
US11382150B2 (en) * | 2018-03-26 | 2022-07-05 | Apple Inc. | System and method of managing PNF connectivity in a network slice instance |
CN111949364A (zh) * | 2019-05-16 | 2020-11-17 | 华为技术有限公司 | 容器化vnf的部署方法和相关设备 |
US11032164B1 (en) * | 2019-05-30 | 2021-06-08 | Cox Communications, Inc. | Edge-based cloud application acceleration |
WO2021115587A1 (en) * | 2019-12-11 | 2021-06-17 | Huawei Technologies Duesseldorf Gmbh | Techniques for managing access rights to a shared network slice instance and network slice subnetwork instance |
JP7409504B2 (ja) | 2020-07-03 | 2024-01-09 | 日本電信電話株式会社 | ネットワーク仮想化システム、仮想リソース管理装置、仮想リソース管理方法およびプログラム |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2015180068A1 (zh) * | 2014-05-28 | 2015-12-03 | 华为技术有限公司 | 一种实现虚拟化网管的方法、装置及系统 |
CN105282765A (zh) * | 2014-06-30 | 2016-01-27 | 中兴通讯股份有限公司 | 一种管理配置信息的方法、设备及网元管理系统 |
CN105429780A (zh) * | 2015-10-30 | 2016-03-23 | 南京优速网络科技有限公司 | 一种虚拟化网络服务业务自动生成和动态监控的方法 |
WO2016114866A1 (en) * | 2015-01-13 | 2016-07-21 | Intel IP Corporation | Techniques for monitoring virtualized network functions or network functions virtualization infrastructure |
WO2016121736A1 (ja) * | 2015-01-27 | 2016-08-04 | 日本電気株式会社 | オーケストレータ装置、システム、仮想マシンの作成方法及びプログラム |
Family Cites Families (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101217678B (zh) * | 2007-12-28 | 2011-08-24 | 华为技术有限公司 | 一种系统升级方法、系统及装置 |
CN101552739A (zh) * | 2008-04-03 | 2009-10-07 | 北京邮电大学 | 一种网络服务流程实例生命周期管理的方法及系统 |
CN101387976B (zh) * | 2008-11-07 | 2010-06-02 | 清华大学 | 一种基于数据差异的逻辑卷快速同步方法 |
CN105429839B (zh) * | 2014-09-09 | 2019-11-19 | 中兴通讯股份有限公司 | 虚拟化网络功能vnf优化方法、装置及系统 |
CN105812171B (zh) * | 2014-12-31 | 2019-06-11 | 华为技术有限公司 | 一种虚拟化的网络功能vnf控制方法和设备 |
US9912558B2 (en) * | 2015-01-13 | 2018-03-06 | Intel IP Corporation | Techniques for monitoring virtualized network functions or network functions virtualization infrastructure |
EP3253005A4 (en) * | 2015-01-29 | 2018-01-17 | Nec Corporation | Data file registration management system, method, management device, and program |
US10263911B2 (en) * | 2015-05-01 | 2019-04-16 | Futurewei Technologies, Inc. | System and method for resource management |
CN107533484B (zh) * | 2015-05-07 | 2021-03-02 | 华为技术有限公司 | 用于动态管理虚拟网络功能描述符的系统和方法 |
CN106375101B (zh) * | 2015-07-20 | 2019-08-27 | 华为技术有限公司 | 一种生命周期管理方法及装置 |
CN107852337B (zh) * | 2015-07-23 | 2021-07-13 | 英特尔公司 | 支持网络功能虚拟化生命周期管理的网络资源模型 |
US10187324B2 (en) * | 2015-08-10 | 2019-01-22 | Futurewei Technologies, Inc. | System and method for resource management |
-
2016
- 2016-11-17 KR KR1020197016894A patent/KR102272229B1/ko active IP Right Grant
- 2016-11-17 EP EP22205140.1A patent/EP4195608A1/en active Pending
- 2016-11-17 EP EP16921857.5A patent/EP3534568B1/en active Active
- 2016-11-17 CN CN201680090856.XA patent/CN109964449B/zh active Active
- 2016-11-17 JP JP2019526235A patent/JP6738965B2/ja active Active
- 2016-11-17 ES ES16921857T patent/ES2932756T3/es active Active
- 2016-11-17 CN CN202110013719.9A patent/CN112799779A/zh active Pending
- 2016-11-17 WO PCT/CN2016/106288 patent/WO2018090299A1/zh unknown
-
2019
- 2019-05-17 US US16/415,840 patent/US10911333B2/en active Active
-
2021
- 2021-01-11 US US17/146,091 patent/US11271827B2/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2015180068A1 (zh) * | 2014-05-28 | 2015-12-03 | 华为技术有限公司 | 一种实现虚拟化网管的方法、装置及系统 |
CN105282765A (zh) * | 2014-06-30 | 2016-01-27 | 中兴通讯股份有限公司 | 一种管理配置信息的方法、设备及网元管理系统 |
WO2016114866A1 (en) * | 2015-01-13 | 2016-07-21 | Intel IP Corporation | Techniques for monitoring virtualized network functions or network functions virtualization infrastructure |
WO2016121736A1 (ja) * | 2015-01-27 | 2016-08-04 | 日本電気株式会社 | オーケストレータ装置、システム、仮想マシンの作成方法及びプログラム |
CN105429780A (zh) * | 2015-10-30 | 2016-03-23 | 南京优速网络科技有限公司 | 一种虚拟化网络服务业务自动生成和动态监控的方法 |
Non-Patent Citations (1)
Title |
---|
See also references of EP3534568A4 * |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2021004320A1 (zh) * | 2019-07-11 | 2021-01-14 | 华为技术有限公司 | 服务资源许可管理方法和相关设备 |
CN112448833A (zh) * | 2019-09-02 | 2021-03-05 | 华为技术有限公司 | 一种多管理域的通信方法和装置 |
WO2021043066A1 (zh) * | 2019-09-02 | 2021-03-11 | 华为技术有限公司 | 一种多管理域的通信方法和装置 |
CN112448833B (zh) * | 2019-09-02 | 2022-05-17 | 华为技术有限公司 | 一种多管理域的通信方法和装置 |
EP4024761A4 (en) * | 2019-09-02 | 2022-10-26 | Huawei Technologies Co., Ltd. | COMMUNICATION METHOD AND APPARATUS FOR MULTIPLE MANAGEMENT FIELDS |
JP2022546131A (ja) * | 2019-09-02 | 2022-11-02 | 華為技術有限公司 | 複数の管理領域のための通信方法及び装置 |
JP7405955B2 (ja) | 2019-09-02 | 2023-12-26 | 華為技術有限公司 | 複数の管理領域のための通信方法及び装置 |
Also Published As
Publication number | Publication date |
---|---|
KR20190084294A (ko) | 2019-07-16 |
US10911333B2 (en) | 2021-02-02 |
US11271827B2 (en) | 2022-03-08 |
ES2932756T3 (es) | 2023-01-25 |
JP2019536365A (ja) | 2019-12-12 |
KR102272229B1 (ko) | 2021-07-05 |
EP4195608A1 (en) | 2023-06-14 |
JP6738965B2 (ja) | 2020-08-12 |
US20190273668A1 (en) | 2019-09-05 |
US20210135958A1 (en) | 2021-05-06 |
EP3534568B1 (en) | 2022-11-09 |
CN109964449A (zh) | 2019-07-02 |
EP3534568A1 (en) | 2019-09-04 |
CN109964449B (zh) | 2021-01-15 |
EP3534568A4 (en) | 2019-12-11 |
CN112799779A (zh) | 2021-05-14 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2018090299A1 (zh) | 网络服务生命周期管理的许可方法和装置 | |
US10701139B2 (en) | Life cycle management method and apparatus | |
WO2018024059A1 (zh) | 一种虚拟化网络中业务部署的方法和装置 | |
CN110569101B (zh) | 管理容器服务的方法和装置 | |
EP3455728B1 (en) | Orchestrator for a virtual network platform as a service (vnpaas) | |
WO2016184045A1 (zh) | 一种网络业务扩容的方法和装置 | |
US20180191581A1 (en) | Method and Apparatus for Deploying Network Service | |
US11611481B2 (en) | Policy management method and system, and apparatus | |
CN107967140B (zh) | 软件修改的发起方法、发布元数据的方法及装置 | |
KR20180002771A (ko) | 네트워크 서비스 수명 주기 관리 방법 및 디바이스 | |
WO2017185303A1 (zh) | 一种nfv mano策略描述符的管理方法及装置 | |
CN106856438B (zh) | 一种网络业务实例化的方法、装置及nfv系统 | |
WO2017066931A1 (zh) | 网络功能虚拟化架构中证书的管理方法及装置 | |
US20210248070A1 (en) | Data transmission method and apparatus | |
EP3468105A1 (en) | Method and apparatus for arranging network resources | |
WO2019001140A1 (zh) | 一种管理vnf实例化的方法和设备 | |
CN112887121A (zh) | 一种管理网络服务的方法、设备及系统 | |
WO2016101639A1 (zh) | 负载均衡器的连接方法、业务的实例化部署方法及装置 | |
CN116724543A (zh) | 容器集群的管理方法和装置 | |
WO2018120222A1 (zh) | 一种管理vnffg的方法、装置和系统 | |
WO2018014351A1 (zh) | 一种资源配置方法及装置 | |
WO2023274014A1 (zh) | 容器集群的存储资源管理方法、装置及系统 | |
WO2023030218A1 (zh) | 网络业务部署方法、nfvo以及nfv系统 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 16921857 Country of ref document: EP Kind code of ref document: A1 |
|
ENP | Entry into the national phase |
Ref document number: 2019526235 Country of ref document: JP Kind code of ref document: A |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
ENP | Entry into the national phase |
Ref document number: 20197016894 Country of ref document: KR Kind code of ref document: A |
|
ENP | Entry into the national phase |
Ref document number: 2016921857 Country of ref document: EP Effective date: 20190530 |