WO2020199807A1 - Method for supporting network slices, network management and control system, and storage medium - Google Patents

Method for supporting network slices, network management and control system, and storage medium Download PDF

Info

Publication number
WO2020199807A1
WO2020199807A1 PCT/CN2020/077003 CN2020077003W WO2020199807A1 WO 2020199807 A1 WO2020199807 A1 WO 2020199807A1 CN 2020077003 W CN2020077003 W CN 2020077003W WO 2020199807 A1 WO2020199807 A1 WO 2020199807A1
Authority
WO
WIPO (PCT)
Prior art keywords
user context
network
control system
context
management
Prior art date
Application number
PCT/CN2020/077003
Other languages
French (fr)
Chinese (zh)
Inventor
陈丽萍
Original Assignee
中兴通讯股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中兴通讯股份有限公司 filed Critical 中兴通讯股份有限公司
Publication of WO2020199807A1 publication Critical patent/WO2020199807A1/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W28/00Network traffic management; Network resource management
    • H04W28/16Central resource management; Negotiation of resources or communication parameters, e.g. negotiating bandwidth or QoS [Quality of Service]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0893Assignment of logical groups to network elements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W28/00Network traffic management; Network resource management

Definitions

  • the embodiments of the present application relate to the field of communication technologies, for example, to a method for supporting network slicing, a network management and control system, and a storage medium.
  • the 5th Generation mobile communication system (G), as the main direction of the development of the new generation of information and communication, will enable information to break through the limitations of time and space, provide an excellent interactive experience, and bring users immersive information feast. 5G will bring diversified application forms, and there are huge differences in the requirements of different services in terms of bandwidth, delay, reliability, security, and operating billing.
  • the personalized requirements of multiple services are also a huge challenge for operators. Operators hope to build multiple dedicated, virtualized, and isolated logical networks on a physical network to meet the different network capabilities of different services. Requirements, the concept of network slicing came into being, and these mutually isolated logical networks are called network slicing. Correspondingly, operators hope that the transport network can support personalized bearers for different customers and different services on a single network.
  • This application provides a method, network management and control system, and storage medium for supporting network slicing, which can support customized services for different users and different businesses, and realize support for 5G network slicing.
  • An embodiment of the present application provides a method for supporting network slicing, including: a network management and control system receives a request message for instructing to create a user context, the request message carrying at least a constraint condition of the user context to be created; the network management and control system Create the user context.
  • An embodiment of the present application also provides a method for supporting network slicing, including: the application side sends a request message for instructing the creation of a user context to the network management and control system, and the request message carries at least the constraint condition of the user context to be created; The application side receives a first confirmation message sent by the network management and control system, where the first confirmation message carries the user context information created by the network management and control system.
  • An embodiment of the present application also provides a network management and control system, including: a receiving unit configured to receive a request message for instructing to create a user context, the request message carrying at least a constraint condition of the user context to be created; a control unit, configuration To create the user context.
  • the embodiment of the present application also provides a computer-readable storage medium that stores a computer program, and when the computer program is executed, the method for supporting network slicing provided above is implemented.
  • the network management and control system creates the user context after receiving the request message for instructing the creation of the user context; wherein, the request message carries at least the constraint conditions of the user context to be created.
  • the network management and control system can independently manage different users and different services of users by creating user contexts, so as to support 5G network slicing, so as to meet the individual needs of different users.
  • FIG. 1 is a schematic diagram of an application scenario of an exemplary embodiment of this application
  • FIG. 2 is a flowchart of a method for supporting network slicing provided by an embodiment of the application
  • FIG. 3 is a schematic diagram of a process of creating a user context provided by an exemplary embodiment of this application
  • FIG. 4 is a schematic diagram of a process of creating a user context provided by another exemplary embodiment of this application.
  • FIG. 5 is an application example diagram of the method for supporting network slicing provided by an embodiment of this application.
  • Fig. 6 is a schematic diagram of a user context deletion process provided by an exemplary embodiment of this application.
  • FIG. 7 is a schematic diagram of a user context deletion process provided by another exemplary embodiment of this application.
  • FIG. 8 is a schematic diagram of a user context update process provided by an exemplary embodiment of this application.
  • FIG. 9 is a schematic diagram of a user context update process provided by another exemplary embodiment of this application.
  • FIG. 10 is a flowchart of another method for supporting network slicing according to an embodiment of this application.
  • FIG. 11 is a schematic diagram of a network management and control system provided by an exemplary embodiment of this application.
  • Fig. 12 is a schematic diagram of an apparatus for supporting network slicing provided by an exemplary embodiment of this application.
  • Fig. 1 is a schematic diagram of an application scenario of an exemplary embodiment of this application.
  • the network management and control system 102 may include at least one of the following: a software-defined network (SDN, Software Defined Network) controller, an intelligent optical network (ASON, Automatically Switched Optical Network) system, a network element management system (EMS, Element Management System, Network Management System (NMS, Network Management System), Integrated Management and Control (MCC) system.
  • SDN Software Defined Network
  • ASON Automatically Switched Optical Network
  • EMS Element Management System
  • NMS Network Management System
  • MCC Integrated Management and Control
  • the scope of management and control of the network management and control system 102 may include, but is not limited to, L0 to L2 layer transport network equipment, L2, L3 switches, and routing equipment.
  • the SDN controller is used for centralized control of the network to realize the decoupling of the control plane and the forwarding plane, making the physical network open and programmable, and supporting the innovation of various new network architectures and new services in the future;
  • the ASON system is used for Distributed control of the transmission network, general control plane functions include network topology and resource unified management, network abstraction, path calculation, strategy management and other functions;
  • EMS and NMS mainly complete the alarm management, configuration management, performance management, and calculation of the transmission network. Cost management and security management, as well as the management of control plane control functions.
  • the integrated management and control system can include a series of management and control components, including the functions of the above-mentioned SDN controller, ASON system, EMS, and NMS.
  • SDN controller Control plane components including client context (Client Context), service context (Server Context), administrator context (Administrator Context or Administrative Context), etc. can all be introduced into the integrated management and control system.
  • the functions of the network management and control system 102 may be implemented by a single device, or may be implemented by a device cluster. However, this application is not limited to this.
  • the application side 100 may include one of the following: the application side of the network management and control system (for example, the 3rd Generation Partnership Project (3rd Generation Partnership Project, 3GPP) management system), and the end user.
  • the application side of the network management and control system for example, the 3rd Generation Partnership Project (3rd Generation Partnership Project, 3GPP) management system
  • 3rd Generation Partnership Project 3rd Generation Partnership Project, 3GPP
  • this application is not limited to this.
  • Fig. 2 is a flowchart of a method for supporting network slicing provided by an embodiment of the application. As shown in Figure 2, the method for supporting network slicing provided in this embodiment may include the following steps:
  • the network management and control system receives a request message for instructing to create a user context; wherein the request message at least carries a constraint condition of the user context to be created.
  • the network management and control system creates a user context.
  • the network management and control system can create user contexts on demand, so as to realize independent management of different users and different services of users, so as to support 5G network slicing.
  • the network management and control system can create the user context according to the constraint conditions of the user context carried in the request message.
  • the constraint conditions may include at least: virtual network constraint conditions; accordingly, S202 may include: providing a management and control interface for network resources; according to the virtual network constraint conditions, allocating a virtual network formed based on available resources to User context.
  • the process of creating a user context includes a process of establishing a component of the user context and a process of allocating resources to the user context; the resource allocation process is performed based on the constructed user context components.
  • the resource allocation process may include: providing a management and control interface for network resources on the constructed user context component; and according to virtual network constraints, allocating a virtual network formed based on available resources to the user context component.
  • the user can establish a corresponding connection service on the provided network resources through the management and control interface to achieve support for 5G network slicing, thereby meeting the individual needs of different users .
  • the method of this embodiment may further include: the network management and control system assigns an identifier to the user context. For example, before or after allocating resources to the user context, assign an identifier to the user context.
  • the user context can be assigned a unique identifier in the network management and control system. In this way, it is convenient to distinguish each user context in the network management and control system.
  • the constraint condition may further include: management and control interface information; wherein, providing a management and control interface for network resources may include: creating a management and control interface on the established user context according to the management and control interface information.
  • the constraint conditions may include: user level or user role; the network management and control system may provide a management and control interface corresponding to the user level or user role according to the user level or user role.
  • the network management and control system may include: an administrator context; accordingly, according to virtual network constraints, allocating a virtual network formed based on available resources to the user context may include: when used to instruct to create a user context
  • the request message instructs to create the initial user context.
  • the administrator context abstracts the virtual network from the available resources according to the virtual network constraints, and assigns the virtual network to the user context.
  • the network management and control system can create an administrator context at startup. It should be noted that the aforementioned initial user context refers to a user context that needs to be created through the administrator context of the network management and control system.
  • the network management and control system can support providing virtual network resources to different users on demand, so as to meet the individual needs of different users.
  • the virtual network constraint conditions may include at least network topology constraints; accordingly, the administrator context abstracts the virtual network from available resources according to the virtual network constraint conditions, and assigns the virtual network to the user context. Including: the administrator context queries the available resources from the resource database; when there is a virtual network that meets the network topology constraints in the available resources, the administrator context directly assigns the virtual network to the user context; when there is no available resource that meets the network topology constraints Virtual network, for the nodes and links that can provide the required resources in the available resources, the corresponding resources are directly allocated to the virtual network built.
  • the administrator When there is no link between the nodes in the available resources that meets the network topology constraints, the administrator The context triggers the establishment of connections between nodes, abstracts and aggregates the established connections to form a virtual link, and forms a virtual network with the virtual link and directly allocated resources, and allocates the virtual network to the user context.
  • the virtual network when there is a virtual network that meets the network topology constraints in the available resources, the virtual network is directly assigned to the created user context; when there is no virtual network that meets the network topology constraints in the available resources, the network topology constraints are met in the available resources Part of the resources are allocated to the virtual network, and another part of the resources meeting the network topology constraints is obtained by establishing connections and abstract aggregation to form a virtual link. Based on the two parts of the resources, the virtual network is formed, and the virtual network is allocated to the user context.
  • the network management and control system may further include: Network Call Controller (NCC) and Connection Controller (CC, Connection Controller); accordingly, the administrator context triggers the establishment of connections between nodes, It may include: the administrator context sends a call request to the network call controller, the network call controller converts the call request into a connection request and sends the connection request to the connection controller, and then the connection controller establishes a corresponding connection according to the connection request; Or, the administrator context directly sends a connection request to the connection controller, and then the connection controller establishes a connection according to the connection request.
  • NCC Network Call Controller
  • CC Connection Controller
  • the network management and control system may include: an existing user context; accordingly, according to virtual network constraints, assigning a virtual network formed based on available resources to the created user context may include: The request message instructing to create a user context instructs to create an embedded or recursive user context in the existing user context, then the existing user context is in the virtual network of the existing user context, and the virtual network constraint conditions will be met The resources are allocated to the embedded or recursive user context of the existing user context.
  • the network management and control system can support the provision of virtual network resources for different services of users on demand, so as to meet the individual needs of users.
  • creating an embedded or recursive user context means creating a user context related to an existing user context.
  • the existing user context can create an embedded user context or a recursive user context.
  • the request message for instructing to create a user context may also carry an identifier of an existing user context, which is used to instruct to create an embedded or recursive user context in the existing user context.
  • the request message for instructing to create a user context may also carry user namespace rules; accordingly, the method of this embodiment may further include: according to user namespace rules and local namespace rules, The constraints of the user context are converted from the user namespace to the local namespace.
  • the constraint condition of the user context may be converted according to the user namespace rule and the local namespace rule before the constraint condition of the user context is used.
  • the above-mentioned user context information created by S202 may include at least: the identifier of the user context, the network resource corresponding to the user context, and the management and control interface of the network resource; wherein, the network resource may include at least one of the following One: Virtual network resources, physical network resources.
  • the network resources corresponding to the user context can include virtual network resources, physical network resources, or virtual network resources and physical network resources formed through aggregation and abstraction during the creation of the user context; An interface for management and control of network resources, for example, establishing business connections for slices of a certain type of service.
  • the above-mentioned user context information created by S202 may include: the identifier of the user context, the network resource corresponding to the user context, the management and control interface of the network resource, the user namespace rule, and the policy configured by the user.
  • the user name space rules are used for components in the network management and control system to convert between the user name space and the local name space of the network management and control system; user configuration strategies can include, but are not limited to, protection and restoration strategies, user roles, and corresponding Permissions.
  • the method of this embodiment may further include: the network management and control system sends a first confirmation message, where the first confirmation message carries the user context information created in S202.
  • the user context information carried in the first confirmation message may at least include: an identifier of the user context, a virtual network resource of the user context, and a management and control interface created on the user context.
  • the method of this embodiment may further include: the network management and control system sends the user context information created in S202 according to user namespace rules and local namespace rules Convert from local namespace to user namespace.
  • the method of this embodiment may further include: the network management and control system receives a request message for instructing to update the user context, and the request message carries the identifier of the user context to be updated and the required information. Updated information; the network management and control system updates the corresponding user context according to the request message for instructing to update the user context; the network management and control system sends a second confirmation message, and the second confirmation message carries the updated user context information.
  • the updated user context information may include: the identifier of the user context, the virtual network resource of the updated user context, and the updated management and control interface.
  • the network management and control system updates the user context according to the request message for instructing to update the user context, which may include: when a service exists on the virtual network of the user context to be updated, the service is migrated; The updated information updates the virtual network of the user context; restores the service to the updated virtual network.
  • the method of this embodiment may further include: the network management and control system receives a request message for instructing to delete the user context, the request message carrying the identifier of the user context to be deleted; the network management and control system According to the request message for instructing to delete the user context, delete the corresponding user context; the network management and control system sends a third confirmation message, which is used to indicate that the corresponding user context has been deleted.
  • the network management and control system deletes the corresponding user context according to the request message for instructing to delete the user context, which may include: when the user context to be deleted is the initially created user context, then the network management and control system
  • the administrator context triggers the release of the virtual links contained in the virtual network of the user context, and updates the resource database; when the user context to be deleted is an embedded or recursive user context of an existing user context, the existing user context in the network management and control system
  • Some user contexts delete embedded or recursive user context information and update the resource database.
  • the method for supporting network slicing can provide virtual network resources and management and control interfaces to different users and different services of users on demand through the life cycle management of user contexts, so that users can access the resources provided through the management and control interfaces. Establish corresponding service connections on the Internet to support 5G network slicing, so as to meet the individual needs of different users.
  • FIG. 3 is a schematic diagram of a process of creating a user context provided by an exemplary embodiment of this application.
  • this exemplary embodiment describes the process of creating a user context (Client Context) for a new user by the administrator context (Administrator Context) of the network management and control system.
  • this exemplary embodiment includes the following processes:
  • an administrator context is established by default; the administrator has the highest management authority, and the administrator context can be visible to all resources in the management domain of the network management and control system.
  • the administrator context of the network management and control system receives a request message sent from the application side for instructing to create a user context; the request message may carry a constraint condition of the user context to be created; wherein the constraint condition may include a virtual network constraint condition , User policies, management and control interface information, user namespace rules; virtual network constraints can include but are not limited to: network topology constraints, service types, isolation requirements, bandwidth capacity, service level parameters. However, this application is not limited to this.
  • the administrator context of the network management and control system creates a user context according to the above request message.
  • a unique identifier within the scope of the network management and control system may be assigned to the user context before or after the resource is assigned to the user context.
  • the management and control interface can be created for the user in the user context according to the management and control interface information carried in the request message.
  • the administrator context of the network management and control system abstracts the virtual network based on the available resources based on the virtual network constraint conditions carried in the request message, and assigns the virtual network to the user context.
  • the virtual network is abstractly formed on the basis of available resources, which may include the following process:
  • the administrator context queries available resources from a resource database (RDB, Resource Database).
  • RDB Resource Database
  • the virtual network when there is a virtual network that satisfies the network topology constraints in the available resources, the virtual network is directly assigned to the user context.
  • the administrator context sends a call request to the Network Call Controller (NCC) (S304b in Figure 3); the network call controller converts the call request into a connection request and sends it to the connection A controller (CC, Connection Controller) requests to establish a corresponding connection (S304c in FIG. 3), the established connection can be used as a virtual link between nodes, and the connection controller can interact with the RDB to save connection information.
  • NCC Network Call Controller
  • CC Connection Controller
  • the administrator context abstracts and aggregates the established connections as needed to form a virtual link, and forms a virtual network together with the directly allocated resources, and allocates the virtual network to the user context.
  • the administrator context can convert the network topology constraints from the user namespace to the local namespace according to the user namespace rules and the local namespace rules.
  • the administrator context can implement the conversion of network topology constraints from the user namespace to the local namespace through other components (for example, Directory Service or new components).
  • the administrator context of the network management and control system sends a confirmation message (corresponding to the aforementioned first confirmation message) to the application side, and the confirmation message carries information about the newly created user context.
  • the information of the newly created user context may include at least: the identifier of the user context, the network resources (including virtual network resources or physical network resources) that the user can use, information about the management and control interface provided for the user, User namespace rules, user configuration strategies.
  • the user name space rules can be configured according to the user name space rules carried in the request message in S302; the user configuration policy can be configured according to the user policy carried in the request message in S302; the user context identifier and the control interface provided for the user Information and network resources available to users can be obtained through S303.
  • the network resources that users can use can include the above-mentioned virtual network or physical network resources formed through aggregation and abstraction;
  • the management and control interface provided for users refers to the interface that users can use to manage and control the available network resources, such as
  • the slices of service types establish business connections;
  • user namespace rules are used for components in the network management and control system to convert between the user namespace and the local namespace of the network management and control system;
  • user configuration strategies include but are not limited to protection and recovery strategies, users Roles and corresponding permissions.
  • FIG. 4 is a schematic diagram of a process of creating a user context provided by another exemplary embodiment of this application. As shown in FIG. 4, this exemplary embodiment describes a process in which a user administrator of a network management and control system creates an embedded or recursive user context for a new service. As shown in Fig. 4, this exemplary embodiment includes the following processes:
  • the administrator context of the network management and control system establishes the user context of the user, and configures the administrator information of the user.
  • the user context of the network management and control system receives a request message sent by the application-side administrator for instructing the creation of the user context, and the request message may carry the identifier of the existing user context and the constraint conditions of the user context to be created;
  • the constraint conditions can include at least virtual network constraint conditions, user policies, and management and control interface information; virtual network constraint conditions can include, but are not limited to: network topology constraints, service types, isolation requirements, bandwidth capacity, and service level parameters.
  • the user administrator context C0 creates an embedded or recursive user context C1 (or C2) component according to the above request message, and assigns the embedded or recursive user context C1 a unique identifier in the network management and control system; where , Can create a management and control interface for the user on the embedded or recursive user context C1 component according to the management and control interface information.
  • the user context allocates corresponding resources to the embedded or recursive user context C1 component according to the virtual network constraint conditions, and saves the relevant resource information in the RDB.
  • S405 The user context of the network management and control system sends a confirmation message (corresponding to the above-mentioned first confirmation message) to the application side, and the confirmation message carries the information of the newly built embedded or recursive user context C1.
  • the information of the newly created user context C1 may include at least: the identifier of the user context C1, the network resources (including virtual network resources) that the user can use, the information of the management and control interface provided for the user, and the user configuration Strategy.
  • FIG. 5 is a diagram of an application example for supporting network slicing provided by an embodiment of this application.
  • This exemplary embodiment illustrates that in a scenario that supports 5G end-to-end (E2E, End-to-End) slicing, a 5G E2E slicing management system (for example, a 3GPP management system) is based on TAPI (Transport Application Programming Interface). ) Interact with the network management and control system to create user contexts for operators of 5G E2E slices.
  • E2E End-to-End
  • TAPI Transport Application Programming Interface
  • this exemplary embodiment includes the following process:
  • the 5G E2E slice management system sends a request message for instructing the creation of a user context to the network management and control system through TAPI;
  • the request message can be a new message for instructing the creation of a user context, or can be operated through an extended TAPI interface (for example, Use the virtual network service request message) to trigger the network management and control system to create a user context for the 5G E2E slice management system;
  • the request message can carry user context constraints, for example, carry service access point information (corresponding to the aforementioned network topology constraints) , Management interface information, service level requirements, bandwidth capacity, etc.
  • the processing procedure of the network management and control system after receiving the request message can refer to S303 to S305 in the embodiment shown in FIG. 3, and therefore will not be repeated here.
  • the 5G E2E slice management system sends a connection service request to the user context, and establishes an L2 or L3VPN (Virtual Private Network, virtual private network) on the virtual network provided by the user context to provide connection services for specific 5G network slice instances.
  • L2 or L3VPN Virtual Private Network, virtual private network
  • the user context triggers the connection controller to establish a corresponding connection according to the connection service request, and configures the nodes and links included in the connection.
  • the edge node that provides the connection needs to connect the 5G network slice instance and the virtual network.
  • the mapping relationship is configured.
  • the 5G operator After the network management system establishes the corresponding user context for the operator of 5G E2E slices, if the 5G operator wants to carry 5G E2E slices of different service types through different resources, the 5G operator’s
  • the user context can create different embedded or recursive user contexts for 5G E2E slices of different service types according to the request. Based on the resources provided by the virtual network of the user context of the 5G operator, different embedded or Recursive user context allocation of resources.
  • the request message sent by the 5G E2E slice management system received by the user context of the 5G operator is consistent with the description of S501 in this exemplary embodiment, and the user context of the 5G operator is
  • the processing procedure after the request message is the same as the procedure from S403 to S405 in the embodiment shown in FIG. 4, and will not be repeated here.
  • Fig. 6 is a schematic diagram of a user context deletion process provided by an exemplary embodiment of this application. As shown in Figure 6, this exemplary embodiment describes a process in which the administrator of the network management and control system deletes the user context. As shown in Fig. 6, this exemplary embodiment includes the following processes:
  • the administrator context of the network management and control system receives a request message sent from the application side for instructing to delete the user context, and the request message carries an identification (ID) of the user context to be deleted.
  • ID an identification
  • the administrator context of the network management and control system deletes the user context.
  • S602 may include the following steps:
  • the administrator context sends a call release to the network call controller (NCC) or a connection release request to the connection controller (CC), triggering the NCC, CC, and link resource management (LRM) components to be virtual
  • NCC network call controller
  • CC connection controller
  • LRM link resource management
  • S602b The administrator context interacts with the RDB to delete information related to the user context, including deleting the information of the released link, and updating the status of other resources.
  • the administrator context deletes the user context.
  • the administrator context of the network management and control system sends a feedback message (corresponding to the aforementioned third confirmation message) to the application side, where the feedback message is used to indicate to the application side that the user context has been deleted.
  • Fig. 7 is a schematic diagram of a user context deletion process provided by another exemplary embodiment of the application. As shown in FIG. 7, this exemplary embodiment describes a process in which the user administrator of the network management and control system deletes the user context. As shown in FIG. 7, this exemplary embodiment includes the following processes:
  • the user context of the network management and control system receives a request message sent from the application side for instructing to delete the embedded user context, and the request message carries the ID of the embedded or recursive user context to be deleted.
  • the user context deletes the embedded or recursive user context (for example, the user context C1).
  • S702 may include the following steps:
  • the user administrator context C0 interacts with the RDB to instruct to delete the information related to the embedded or recursive user context C1, and update the state of the occupied resources.
  • the user administrator context C0 deletes the embedded or recursive user context C1.
  • the user context of the network management and control system feeds back a message (corresponding to the aforementioned third confirmation message) to the application side, which confirms that the embedded or recursive user context C1 has been deleted.
  • Fig. 8 is a schematic diagram of a user context update process provided by an exemplary embodiment of this application. As shown in FIG. 8, this exemplary embodiment describes a process in which the administrator of the network management and control system updates the user context. As shown in Fig. 8, this exemplary embodiment includes the following processes:
  • the administrator context of the network management and control system receives a request message from the application side that instructs to update the user context.
  • the request message carries the ID of the user context to be updated and the information that needs to be updated, such as network topology constraints, bandwidth capacity .
  • the administrator context of the network management and control system updates user context information.
  • S802 may include the following steps:
  • the administrator context determines the node and link to update the resource according to the information that needs to be updated, and sends at least one of the call establishment and release request to the NCC, or sends at least one of the connection establishment and release request to the CC as required One item; before determining the node and link of the resource to be updated, according to the information that needs to be updated, the user administrator context may need to calculate the route through the routing controller (RC, Routing Controller) to further clarify the need to add or delete resource of.
  • RC Routing Controller
  • the administrator context interacts with the RDB, updates the user context information, saves the newly established call or connection information, and allocates it to the virtual network in the user context, and updates the resource status for the released resources.
  • the administrator context needs to migrate the services before S802a, and then restore the services to the updated virtual network after S802b.
  • the administrator context of the network management and control system sends a confirmation message (corresponding to the aforementioned second confirmation message) to the application side, and the confirmation message carries updated user context information (including virtual network information).
  • Fig. 9 is a schematic diagram of a user context update process provided by another exemplary embodiment of the application. As shown in FIG. 9, this exemplary embodiment describes a process in which a user administrator of the network management and control system updates the user context. As shown in FIG. 9, this exemplary embodiment includes the following processes:
  • the user context of the network management and control system receives a request message sent from the application side for instructing to update the embedded or recursive user context, and the request message carries the ID of the user context to be updated and the information that needs to be updated.
  • the user context updates the embedded or recursive user context (for example, the user context C1); which may include: S902a, the user administrator context C0 interacts with the RDB to obtain resources available to the user, and adds New resources or delete unnecessary nodes and links, and save relevant information in RDB, associate the newly allocated resources to the virtual network of the embedded or recursive user context C1, or update the status of the released resources ;
  • the user administrator context may need to calculate the route through the routing controller (RC) to determine the resources that need to be added or deleted .
  • RC routing controller
  • the user context feeds back a message (corresponding to the aforementioned second confirmation message) to the application side, which confirms that the embedded or recursive user context C1 has been updated, and carries the updated user context information.
  • FIG. 10 is a flowchart of another method for supporting network slicing according to an embodiment of the application. As shown in FIG. 10, the method for supporting network slicing provided by this exemplary embodiment includes:
  • the application side sends a request message for instructing to create a user context to the network management and control system, where the request message at least carries a constraint condition of the user context to be created.
  • the application side receives a first confirmation message returned by the network management and control system, where the first confirmation message carries the user context information created by the network management and control system.
  • the user context information created by the network management and control system may include at least: the identifier of the user context, the network resource corresponding to the user context, and the management and control interface of the network resource; wherein, the network resource may include at least one of the following One: Virtual network resources, physical network resources.
  • the user context information created by the network management and control system may include: the identifier of the user context, the network resource corresponding to the user context, the management and control interface of the network resource, the user namespace rule, and the policy configured by the user.
  • this application is not limited to this.
  • the method of this embodiment may further include: the application side sends a request message for instructing to update the user context to the network management and control system, the request message carrying the identifier of the user context to be updated and Information that needs to be updated; the application side receives a second confirmation message sent by the network management and control system, and the second confirmation message carries updated user context information.
  • the method of this embodiment may further include: the application side sends a request message for instructing to delete the user context to the network management and control system, the request message carrying an identifier of the user context to be deleted;
  • the application side receives a third confirmation message sent by the network management and control system, where the third confirmation message is used to indicate to the application side that the user context to be deleted has been deleted.
  • FIG. 11 is a schematic diagram of a network management and control system provided by an embodiment of this application.
  • the network management and control system provided in this embodiment includes: a receiving unit 1101, configured to receive a request message for instructing to create a user context, and the request message carries at least constraints of the user context to be created; a control unit 1102 , Configured to create a user context.
  • the restriction conditions may include at least: virtual network restriction conditions; the control unit 1102 may be configured to create user contexts in the following manner: provide a management and control interface for network resources; according to the virtual network restriction conditions, based on available resources The formed virtual network is assigned to the user context.
  • control unit 1102 may also be configured to assign an identifier to the user context.
  • control unit 1102 may include an administrator context; the control unit 1102 may be configured to allocate a virtual network formed based on available resources to the user context according to virtual network constraints in the following manner: when the request message indicates to create In the initial user context, the administrator context abstracts the available resources to form a virtual network based on the constraints of the virtual network, and assigns the virtual network to the user context.
  • control unit 1102 may include an existing user context; the control unit 1102 may be configured to allocate a virtual network formed based on available resources to the user context according to virtual network constraints in the following manner: when the request message Instruct to create an embedded or recursive user context in the existing user context, then the existing user context is in the virtual network of the existing user context, and resources that meet the constraints of the virtual network are allocated to the existing user context.
  • the embedded or recursive user context of the user context may include an existing user context; the control unit 1102 may be configured to allocate a virtual network formed based on available resources to the user context according to virtual network constraints in the following manner: when the request message Instruct to create an embedded or recursive user context in the existing user context, then the existing user context is in the virtual network of the existing user context, and resources that meet the constraints of the virtual network are allocated to the existing user context.
  • the embedded or recursive user context of the user context may include an existing user context; the control unit 1102 may be configured to allocate a virtual network formed based
  • the request message for instructing to create a user context may also carry an identifier of an existing user context, which is used to instruct to create an embedded or recursive user context in the existing user context.
  • the network management and control system may further include: a sending unit 1103 configured to send a first confirmation message, where the first confirmation message carries user context information created by the network management and control system.
  • the user context information carried in the first confirmation message may include at least: an identifier of the user context, a network resource corresponding to the user context, and a management and control interface of the network resource; the network resource includes at least one of the following : Virtual network resources, physical network resources.
  • the receiving unit 1101 may be further configured to receive a request message for instructing to update the user context, the request message carrying the identifier of the user context to be updated and the information to be updated;
  • the control unit 1102 may also It is configured to update the user context according to a request message for instructing to update the user context;
  • the sending unit 1103 may also be configured to send a second confirmation message, the second confirmation message carrying updated user context information.
  • the receiving unit 1101 may be further configured to receive a request message for instructing to delete the user context, the request message carrying an identifier of the user context to be deleted; the control unit 1102 may also be configured to indicate The request message for deleting the user context is to delete the user context; the sending unit 1103 may also be configured to send a third confirmation message, which is used to indicate that the user context to be deleted has been deleted.
  • FIG. 12 is a schematic diagram of an apparatus for supporting network slicing provided by an embodiment of the application.
  • the apparatus for supporting network slicing provided in this embodiment can be set on the application side and includes: a receiving unit 1201 and a sending unit 1202; wherein, the sending unit 1202 is configured to send instructions to the network management and control system for creating user context
  • the request message contains at least the constraint conditions of the user context to be created;
  • the receiving unit 1201 is configured to receive the first confirmation message sent by the network management and control system, and the first confirmation message carries the user context information created by the network management and control system .
  • the user context information carried in the first confirmation message may at least include: an identifier of the user context, a virtual network resource of the user context, and a management and control interface created on the user context.
  • the sending unit 1202 may be further configured to send a request message for instructing to update the user context to the network management and control system, the request message carrying the identifier of the user context to be updated and the information to be updated; the receiving unit 1201 may also be configured to receive a second confirmation message sent by the network management and control system, where the second confirmation message carries updated user context information.
  • the sending unit 1202 may be further configured to send a request message for instructing to delete the user context to the network management and control system, the request message carrying the identifier of the user context to be deleted; the receiving unit 1201 may also be configured to receive A third confirmation message sent by the network management and control system, where the third confirmation message is used to indicate to the application side that the user context has been deleted.
  • the network management and control system can independently manage different users and different services of users according to their needs by managing user contexts, and dynamically allocate and manage network resources according to user needs, so as to meet different users or different services Individual needs.
  • an embodiment of the present application also provides a computer-readable storage medium that stores a computer program, and when the computer program is executed, the steps of the method for supporting network slicing are realized, such as the steps shown in FIG.
  • Such software may be distributed on a computer-readable medium, and the computer-readable medium may include a computer storage medium (or non-transitory medium) and a communication medium (or transitory medium).
  • the term computer storage medium includes volatile and non-volatile memory implemented in any method or technology for storing information (such as computer-readable instructions, data structures, program modules, or other data). Flexible, removable and non-removable media.
  • Computer storage media include but are not limited to Random Access Memory (RAM), Read-Only Memory (ROM), Electrically Programmable Read-Only Memory, EEPROM, Flash memory or other storage technologies, compact Disk-ROM (CD-ROM), Digital Versatile Disc (DVD) or other optical disk storage, magnetic cassettes, magnetic tapes, disk storage or other magnetic storage devices, Or any other medium that can be used to store desired information and that can be accessed by a computer.
  • communication media usually include computer-readable instructions, data structures, program modules, or transmissions such as carrier waves or other Mechanisms and the like modulate other data in the data signal, and can include any information delivery medium.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Quality & Reliability (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

Disclosed are a method for supporting network slices, a network management and control system, and a storage medium. The method for supporting network slices comprises: a network management and control system receives a request message used for indicating the creation of a user context, where the request message carries a constraint for a user context to be created; and the network management and control system creates the user context.

Description

支持网络切片的方法、网络管控系统及存储介质Method for supporting network slicing, network management and control system and storage medium
本申请要求在2019年03月29日提交中国专利局、申请号为201910251373.9的中国专利申请的优先权,该申请的全部内容通过引用结合在本申请中。This application claims the priority of a Chinese patent application filed with the Chinese Patent Office with an application number of 201910251373.9 on March 29, 2019. The entire content of this application is incorporated into this application by reference.
技术领域Technical field
本申请实施例涉及通信技术领域,例如涉及一种支持网络切片的方法、网络管控系统及存储介质。The embodiments of the present application relate to the field of communication technologies, for example, to a method for supporting network slicing, a network management and control system, and a storage medium.
背景技术Background technique
第五代移动通信系统(the 5th Generation mobile communication system,5G)作为新一代信息通信发展的主要方向,将使信息突破时空限制,提供极佳的交互体验,为用户带来身临其境的信息盛宴。5G将带来多元化的应用形态,不同业务在带宽、时延、可靠性、安全、运营计费等方面的需求也存在巨大差异。多业务的个性化需求对于运营商而言也是巨大的挑战,运营商希望能够在一个物理网络上构建多个专用的、虚拟化的、互相隔离的逻辑网络,来满足不同业务对网络能力的不同要求,由此网络切片的概念应运而生,这些相互隔离的逻辑网络即为网络切片。相应地,运营商希望传送网能够在一张网络上支持不同客户及不同业务的个性化承载。The 5th Generation mobile communication system (5G), as the main direction of the development of the new generation of information and communication, will enable information to break through the limitations of time and space, provide an excellent interactive experience, and bring users immersive information feast. 5G will bring diversified application forms, and there are huge differences in the requirements of different services in terms of bandwidth, delay, reliability, security, and operating billing. The personalized requirements of multiple services are also a huge challenge for operators. Operators hope to build multiple dedicated, virtualized, and isolated logical networks on a physical network to meet the different network capabilities of different services. Requirements, the concept of network slicing came into being, and these mutually isolated logical networks are called network slicing. Correspondingly, operators hope that the transport network can support personalized bearers for different customers and different services on a single network.
发明内容Summary of the invention
本申请提供了一种支持网络切片的方法、网络管控系统及存储介质,可以支持不同用户及不同业务的定制服务,实现对5G网络切片的支持。This application provides a method, network management and control system, and storage medium for supporting network slicing, which can support customized services for different users and different businesses, and realize support for 5G network slicing.
本申请实施例提供一种支持网络切片的方法,包括:网络管控系统接收用于指示创建用户上下文的请求消息,所述请求消息中至少携带待创建的用户上下文的约束条件;所述网络管控系统创建所述用户上下文。An embodiment of the present application provides a method for supporting network slicing, including: a network management and control system receives a request message for instructing to create a user context, the request message carrying at least a constraint condition of the user context to be created; the network management and control system Create the user context.
本申请实施例还提供一种支持网络切片的方法,包括:应用侧向网络管控系统发送用于指示创建用户上下文的请求消息,所述请求消息中至少携带待创建的用户上下文的约束条件;所述应用侧接收所述网络管控系统发送的第一确认消息,所述第一确认消息中携带所述网络管控系统创建的用户上下文的信息。An embodiment of the present application also provides a method for supporting network slicing, including: the application side sends a request message for instructing the creation of a user context to the network management and control system, and the request message carries at least the constraint condition of the user context to be created; The application side receives a first confirmation message sent by the network management and control system, where the first confirmation message carries the user context information created by the network management and control system.
本申请实施例还提供一种网络管控系统,包括:接收单元,配置为接收用于指示创建用户上下文的请求消息,所述请求消息中至少携带待创建的用户上下文的约束条件;控制单元,配置为创建所述用户上下文。An embodiment of the present application also provides a network management and control system, including: a receiving unit configured to receive a request message for instructing to create a user context, the request message carrying at least a constraint condition of the user context to be created; a control unit, configuration To create the user context.
本申请实施例还提供一种计算机可读存储介质,存储有计算机程序,所述计算机程序被执行时实现上述提供的支持网络切片的方法。The embodiment of the present application also provides a computer-readable storage medium that stores a computer program, and when the computer program is executed, the method for supporting network slicing provided above is implemented.
在本申请实施例中,网络管控系统在接收到用于指示创建用户上下文的请求消息后,创建用户上下文;其中,请求消息中至少携带待创建的用户上下文的约束条件。网络管控系统可以通过创建用户上下文,按需对不同用户以及用户的不同业务进行独立管理,以实现对5G网络切片的支持,从而满足不同用户的个性化需求。In the embodiment of the present application, the network management and control system creates the user context after receiving the request message for instructing the creation of the user context; wherein, the request message carries at least the constraint conditions of the user context to be created. The network management and control system can independently manage different users and different services of users by creating user contexts, so as to support 5G network slicing, so as to meet the individual needs of different users.
附图说明Description of the drawings
图1为本申请一示例性实施例的应用场景的示意图;FIG. 1 is a schematic diagram of an application scenario of an exemplary embodiment of this application;
图2为本申请实施例提供的一种支持网络切片的方法的流程图;2 is a flowchart of a method for supporting network slicing provided by an embodiment of the application;
图3为本申请一示例性实施例提供的用户上下文的创建过程的示意图;FIG. 3 is a schematic diagram of a process of creating a user context provided by an exemplary embodiment of this application;
图4为本申请另一示例性实施例提供的用户上下文的创建过程的示意图;FIG. 4 is a schematic diagram of a process of creating a user context provided by another exemplary embodiment of this application;
图5为本申请实施例提供的支持网络切片的方法的应用示例图;FIG. 5 is an application example diagram of the method for supporting network slicing provided by an embodiment of this application;
图6为本申请一示例性实施例提供的用户上下文的删除过程的示意图;Fig. 6 is a schematic diagram of a user context deletion process provided by an exemplary embodiment of this application;
图7为本申请另一示例性实施例提供的用户上下文的删除过程的示意图;FIG. 7 is a schematic diagram of a user context deletion process provided by another exemplary embodiment of this application;
图8为本申请一示例性实施例提供的用户上下文的更新过程的示意图;FIG. 8 is a schematic diagram of a user context update process provided by an exemplary embodiment of this application;
图9为本申请另一示例性实施例提供的用户上下文的更新过程的示意图;FIG. 9 is a schematic diagram of a user context update process provided by another exemplary embodiment of this application;
图10为本申请实施例提供的另一种支持网络切片的方法的流程图;FIG. 10 is a flowchart of another method for supporting network slicing according to an embodiment of this application;
图11为本申请一示例性实施例提供的一种网络管控系统的示意图;FIG. 11 is a schematic diagram of a network management and control system provided by an exemplary embodiment of this application;
图12为本申请一示例性实施例提供的一种支持网络切片的装置的示意图。Fig. 12 is a schematic diagram of an apparatus for supporting network slicing provided by an exemplary embodiment of this application.
具体实施方式detailed description
下文中将结合附图对本申请的实施例进行详细说明。Hereinafter, the embodiments of the present application will be described in detail with reference to the drawings.
在附图的流程图示出的步骤可以在诸如一组计算机可执行指令的计算机系统中执行。并且,虽然在流程图中示出了逻辑顺序,但是在某些情况下,可以以不同于此处的顺序执行所示出或描述的步骤。The steps shown in the flowchart of the drawings may be executed in a computer system such as a set of computer-executable instructions. And, although a logical sequence is shown in the flowchart, in some cases, the steps shown or described may be performed in a different order than here.
图1为本申请一示例性实施例的应用场景的示意图。如图1所示,网络管控系统102可以包括以下至少之一:软件定义网络(SDN,Software Defined Network)控制器、智能光网络(ASON,Automatically Switched Optical Network)系统、网元管理系统(EMS,Element Management System)、网络管理系统(NMS, Network Management System)、管控一体化(MCC)系统。网络管控系统102所管理和控制的范围可以包括但不限于L0至L2层传送网设备,L2、L3交换机及路由设备。Fig. 1 is a schematic diagram of an application scenario of an exemplary embodiment of this application. As shown in FIG. 1, the network management and control system 102 may include at least one of the following: a software-defined network (SDN, Software Defined Network) controller, an intelligent optical network (ASON, Automatically Switched Optical Network) system, a network element management system (EMS, Element Management System, Network Management System (NMS, Network Management System), Integrated Management and Control (MCC) system. The scope of management and control of the network management and control system 102 may include, but is not limited to, L0 to L2 layer transport network equipment, L2, L3 switches, and routing equipment.
SDN控制器用于网络的集中式控制,实现了控制面和转发面的解耦,使得物理网络具有了开放、可编程特征,支持未来各种新型网络体系结构和新型业务的创新;ASON系统用于传送网的分布式控制,通用的控制平面功能包括网络拓扑和资源统一管理、网络抽象、路径计算、策略管理等功能;EMS和NMS主要是完成传送网的告警管理、配置管理、性能管理、计费管理和安全管理以及控制面控制功能的管理。管控一体化系统可以包括一系列管理和控制的组件,范围上包括了上述的SDN控制器、ASON系统、EMS和NMS的功能,这些功能可以通过不同的组件来实现;比如,SDN控制器中的控制面组件,包括用户上下文(Client Context)、服务上下文(Server Context)、管理员上下文(Administrator Context or Administrative Context)等都可以引入到管控一体化系统中。The SDN controller is used for centralized control of the network to realize the decoupling of the control plane and the forwarding plane, making the physical network open and programmable, and supporting the innovation of various new network architectures and new services in the future; the ASON system is used for Distributed control of the transmission network, general control plane functions include network topology and resource unified management, network abstraction, path calculation, strategy management and other functions; EMS and NMS mainly complete the alarm management, configuration management, performance management, and calculation of the transmission network. Cost management and security management, as well as the management of control plane control functions. The integrated management and control system can include a series of management and control components, including the functions of the above-mentioned SDN controller, ASON system, EMS, and NMS. These functions can be implemented by different components; for example, the SDN controller Control plane components, including client context (Client Context), service context (Server Context), administrator context (Administrator Context or Administrative Context), etc. can all be introduced into the integrated management and control system.
在一示例性实施例中,网络管控系统102的功能可以由单个设备实现,或者可以由设备集群实现。然而,本申请对此并不限定。In an exemplary embodiment, the functions of the network management and control system 102 may be implemented by a single device, or may be implemented by a device cluster. However, this application is not limited to this.
如图1所示,应用侧100可以包括以下之一:网络管控系统的应用端(比如,第三代合作计划(3rd Generation Partnership Project,3GPP)管理系统)、最终用户。然而,本申请对此并不限定。As shown in FIG. 1, the application side 100 may include one of the following: the application side of the network management and control system (for example, the 3rd Generation Partnership Project (3rd Generation Partnership Project, 3GPP) management system), and the end user. However, this application is not limited to this.
图2为本申请实施例提供的一种支持网络切片的方法的流程图。如图2所示,本实施例提供的支持网络切片的方法可以包括以下步骤:Fig. 2 is a flowchart of a method for supporting network slicing provided by an embodiment of the application. As shown in Figure 2, the method for supporting network slicing provided in this embodiment may include the following steps:
S201、网络管控系统接收用于指示创建用户上下文的请求消息;其中,该请求消息中至少携带待创建的用户上下文的约束条件。S201. The network management and control system receives a request message for instructing to create a user context; wherein the request message at least carries a constraint condition of the user context to be created.
S202、网络管控系统创建用户上下文。S202. The network management and control system creates a user context.
本实施例中,网络管控系统可以按需创建用户上下文,从而实现对不同的用户以及用户的不同业务进行独立管理,以支持5G网络切片。In this embodiment, the network management and control system can create user contexts on demand, so as to realize independent management of different users and different services of users, so as to support 5G network slicing.
在本实施例中,网络管控系统接收到用于指示创建用户上下文的请求消息后,可以根据请求消息中携带的用户上下文的约束条件,创建用户上下文。In this embodiment, after receiving the request message for instructing the creation of the user context, the network management and control system can create the user context according to the constraint conditions of the user context carried in the request message.
在一示例性实施例中,约束条件至少可以包括:虚拟网络约束条件;相应地,S202可以包括:提供对网络资源的管控接口;根据虚拟网络约束条件,将基于可用资源形成的虚拟网络分配给用户上下文。需要说明的是,在本实施例中,创建用户上下文的过程包括用户上下文的组件建立过程以及对用户上下文进行资源分配的过程;资源分配过程基于构建的用户上下文的组件进行。其中, 资源分配过程可以包括:在构建的用户上下文的组件上提供对网络资源的管控接口;以及根据虚拟网络约束条件,将基于可用资源形成的虚拟网络分配给用户上下文的组件。In an exemplary embodiment, the constraint conditions may include at least: virtual network constraint conditions; accordingly, S202 may include: providing a management and control interface for network resources; according to the virtual network constraint conditions, allocating a virtual network formed based on available resources to User context. It should be noted that, in this embodiment, the process of creating a user context includes a process of establishing a component of the user context and a process of allocating resources to the user context; the resource allocation process is performed based on the constructed user context components. Wherein, the resource allocation process may include: providing a management and control interface for network resources on the constructed user context component; and according to virtual network constraints, allocating a virtual network formed based on available resources to the user context component.
本示例性实施例中,基于网络管控系统创建的用户上下文,用户可以通过管控接口在所提供的网络资源上建立相应的连接服务,实现对5G网络切片的支持,从而满足不同用户的个性化需求。In this exemplary embodiment, based on the user context created by the network management and control system, the user can establish a corresponding connection service on the provided network resources through the management and control interface to achieve support for 5G network slicing, thereby meeting the individual needs of different users .
在一示例性实施例中,本实施例的方法还可以包括:网络管控系统给用户上下文分配标识。比如,在给用户上下文分配资源之前或之后,给用户上下文分配标识。其中,可以给用户上下文分配网络管控系统内唯一的标识。如此一来,便于区分网络管控系统内的各个用户上下文。In an exemplary embodiment, the method of this embodiment may further include: the network management and control system assigns an identifier to the user context. For example, before or after allocating resources to the user context, assign an identifier to the user context. Among them, the user context can be assigned a unique identifier in the network management and control system. In this way, it is convenient to distinguish each user context in the network management and control system.
在一示例性实施例中,约束条件还可以包括:管控接口信息;其中,提供对网络资源的管控接口可以包括:根据管控接口信息,在所建的用户上下文上创建管控接口。然而,本申请对此并不限定。在其他实现方式中,约束条件可以包括:用户等级或用户角色;网络管控系统可以根据用户等级或用户角色,提供与用户等级或用户角色对应的管控接口。In an exemplary embodiment, the constraint condition may further include: management and control interface information; wherein, providing a management and control interface for network resources may include: creating a management and control interface on the established user context according to the management and control interface information. However, this application is not limited to this. In other implementations, the constraint conditions may include: user level or user role; the network management and control system may provide a management and control interface corresponding to the user level or user role according to the user level or user role.
在一示例性实施例中,网络管控系统可以包括:管理员上下文;相应地,根据虚拟网络约束条件,将基于可用资源形成的虚拟网络分配给用户上下文,可以包括:当用于指示创建用户上下文的请求消息指示创建初始的用户上下文,管理员上下文根据虚拟网络约束条件,从可用资源抽象形成虚拟网络,并将该虚拟网络分配给用户上下文。其中,网络管控系统可以在启动时创建管理员上下文。需要说明的是,上述初始的用户上下文指需要通过网络管控系统的管理员上下文创建的用户上下文。在本示例性实施例中,网络管控系统可以支持给不同用户按需提供虚拟网络资源,从而满足不同用户的个性化需求。In an exemplary embodiment, the network management and control system may include: an administrator context; accordingly, according to virtual network constraints, allocating a virtual network formed based on available resources to the user context may include: when used to instruct to create a user context The request message instructs to create the initial user context. The administrator context abstracts the virtual network from the available resources according to the virtual network constraints, and assigns the virtual network to the user context. Among them, the network management and control system can create an administrator context at startup. It should be noted that the aforementioned initial user context refers to a user context that needs to be created through the administrator context of the network management and control system. In this exemplary embodiment, the network management and control system can support providing virtual network resources to different users on demand, so as to meet the individual needs of different users.
在本示例性实施例中,虚拟网络约束条件可以至少包括网络拓扑约束;相应地,管理员上下文根据虚拟网络约束条件,从可用资源抽象形成虚拟网络,并将该虚拟网络分配给用户上下文,可以包括:管理员上下文从资源数据库中查询可用资源;当可用资源中存在满足网络拓扑约束的虚拟网络,管理员上下文将该虚拟网络直接分配给用户上下文;当可用资源中不存在满足网络拓扑约束的虚拟网络,对于可用资源中能提供所需资源的节点和链路,直接分配相应的资源给所建的虚拟网络,在可用资源中的节点之间没有满足网络拓扑约束的链路时,管理员上下文触发在节点之间建立连接,将所建立的连接抽象聚合形成虚拟链路,并将虚拟链路与直接分配的资源形成虚拟网络,并将该虚拟网络分配给用户上下文。换言之,当可用资源中存在满足网络拓扑约束的虚拟网络,则直接分配该虚拟网络给创建的用户上下文;当可用资源中不存在满足网络拓 扑约束的虚拟网络,则将可用资源中满足网络拓扑约束的部分资源分配给虚拟网络,并通过建立连接并抽象聚合形成虚拟链路得到满足网络拓扑约束的另外部分资源,基于两部分资源形成虚拟网络,并分配该虚拟网络给用户上下文。In this exemplary embodiment, the virtual network constraint conditions may include at least network topology constraints; accordingly, the administrator context abstracts the virtual network from available resources according to the virtual network constraint conditions, and assigns the virtual network to the user context. Including: the administrator context queries the available resources from the resource database; when there is a virtual network that meets the network topology constraints in the available resources, the administrator context directly assigns the virtual network to the user context; when there is no available resource that meets the network topology constraints Virtual network, for the nodes and links that can provide the required resources in the available resources, the corresponding resources are directly allocated to the virtual network built. When there is no link between the nodes in the available resources that meets the network topology constraints, the administrator The context triggers the establishment of connections between nodes, abstracts and aggregates the established connections to form a virtual link, and forms a virtual network with the virtual link and directly allocated resources, and allocates the virtual network to the user context. In other words, when there is a virtual network that meets the network topology constraints in the available resources, the virtual network is directly assigned to the created user context; when there is no virtual network that meets the network topology constraints in the available resources, the network topology constraints are met in the available resources Part of the resources are allocated to the virtual network, and another part of the resources meeting the network topology constraints is obtained by establishing connections and abstract aggregation to form a virtual link. Based on the two parts of the resources, the virtual network is formed, and the virtual network is allocated to the user context.
在本示例性实施例中,网络管控系统还可以包括:网络呼叫控制(NCC,Network Call Controller)和连接控制器(CC,Connection Controller);相应地,管理员上下文触发在节点之间建立连接,可以包括:管理员上下文给网络呼叫控制器发送呼叫请求,由网络呼叫控制器将呼叫请求转换为连接请求并将连接请求发送给连接控制器,然后由连接控制器根据连接请求建立对应的连接;或者,管理员上下文直接给连接控制器发送连接请求,然后由连接控制器根据连接请求建立连接。In this exemplary embodiment, the network management and control system may further include: Network Call Controller (NCC) and Connection Controller (CC, Connection Controller); accordingly, the administrator context triggers the establishment of connections between nodes, It may include: the administrator context sends a call request to the network call controller, the network call controller converts the call request into a connection request and sends the connection request to the connection controller, and then the connection controller establishes a corresponding connection according to the connection request; Or, the administrator context directly sends a connection request to the connection controller, and then the connection controller establishes a connection according to the connection request.
在一示例性实施例中,网络管控系统可以包括:已有的用户上下文;相应地,根据虚拟网络约束条件,将基于可用资源形成的虚拟网络分配给创建的用户上下文,可以包括:当用于指示创建用户上下文的请求消息指示在该已有的用户上下文内创建内嵌或递归的用户上下文,则该已有的用户上下文在该已有的用户上下文的虚拟网络中,将满足虚拟网络约束条件的资源分配给该已有的用户上下文的内嵌或递归的用户上下文。在本示例性实施例中,网络管控系统可以支持给用户的不同业务按需提供虚拟网络资源,从而满足用户个性化需求。需要说明的是,创建内嵌或递归的用户上下文均表示创建与已有的用户上下文相关的用户上下文。根据实际应用场景的不同,已有的用户上下文可以创建内嵌的用户上下文或递归的用户上下文。In an exemplary embodiment, the network management and control system may include: an existing user context; accordingly, according to virtual network constraints, assigning a virtual network formed based on available resources to the created user context may include: The request message instructing to create a user context instructs to create an embedded or recursive user context in the existing user context, then the existing user context is in the virtual network of the existing user context, and the virtual network constraint conditions will be met The resources are allocated to the embedded or recursive user context of the existing user context. In this exemplary embodiment, the network management and control system can support the provision of virtual network resources for different services of users on demand, so as to meet the individual needs of users. It should be noted that creating an embedded or recursive user context means creating a user context related to an existing user context. Depending on the actual application scenario, the existing user context can create an embedded user context or a recursive user context.
在一示例性实施例中,用于指示创建用户上下文的请求消息还可以携带已有的用户上下文的标识,用于指示在该已有的用户上下文内创建内嵌或递归的用户上下文。In an exemplary embodiment, the request message for instructing to create a user context may also carry an identifier of an existing user context, which is used to instruct to create an embedded or recursive user context in the existing user context.
在一示例性实施例中,用于指示创建用户上下文的请求消息中还可以携带用户命名空间规则;相应地,本实施例的方法还可以包括:根据用户命名空间规则和本地命名空间规则,将用户上下文的约束条件从用户命名空间转换到本地命名空间。在本示例性实施例中,可以在使用用户上下文的约束条件之前,根据用户命名空间规则和本地命名空间规则,对用户上下文的约束条件进行转换。In an exemplary embodiment, the request message for instructing to create a user context may also carry user namespace rules; accordingly, the method of this embodiment may further include: according to user namespace rules and local namespace rules, The constraints of the user context are converted from the user namespace to the local namespace. In this exemplary embodiment, the constraint condition of the user context may be converted according to the user namespace rule and the local namespace rule before the constraint condition of the user context is used.
在一示例性实施例中,上述通过S202创建的用户上下文的信息可以至少包括:用户上下文的标识、该用户上下文对应的网络资源、该网络资源的管控接口;其中,网络资源可以包括以下至少之一:虚拟网络资源、物理网络资源。其中,用户上下文对应的网络资源可以包括在用户上下文的创建过程中,经过聚合抽象形成的虚拟网络资源、物理网络资源、或者虚拟网络资源和物理网络 资源;管控接口指用户用来对可使用的网络资源进行管理和控制的接口,比如,为某种服务类型的切片建立业务连接。In an exemplary embodiment, the above-mentioned user context information created by S202 may include at least: the identifier of the user context, the network resource corresponding to the user context, and the management and control interface of the network resource; wherein, the network resource may include at least one of the following One: Virtual network resources, physical network resources. Among them, the network resources corresponding to the user context can include virtual network resources, physical network resources, or virtual network resources and physical network resources formed through aggregation and abstraction during the creation of the user context; An interface for management and control of network resources, for example, establishing business connections for slices of a certain type of service.
在一示例性实施例中,上述通过S202创建的用户上下文的信息可以包括:用户上下文的标识、该用户上下文对应的网络资源、该网络资源的管控接口、用户命名空间规则、用户配置的策略。其中,用户命名空间规则,用于网络管控系统内的组件对用户命名空间和网络管控系统的本地命名空间之间进行转换;用户配置的策略可以包括但不限于保护恢复策略、用户角色及对应的权限。In an exemplary embodiment, the above-mentioned user context information created by S202 may include: the identifier of the user context, the network resource corresponding to the user context, the management and control interface of the network resource, the user namespace rule, and the policy configured by the user. Among them, the user name space rules are used for components in the network management and control system to convert between the user name space and the local name space of the network management and control system; user configuration strategies can include, but are not limited to, protection and restoration strategies, user roles, and corresponding Permissions.
在一示例性实施例中,在S202之后,本实施例的方法还可以包括:网络管控系统发送第一确认消息,其中,第一确认消息中携带通过S202创建的用户上下文的信息。例如,第一确认消息中携带的用户上下文的信息至少可以包括:该用户上下文的标识、该用户上下文的虚拟网络资源、在该用户上下文上创建的管控接口。In an exemplary embodiment, after S202, the method of this embodiment may further include: the network management and control system sends a first confirmation message, where the first confirmation message carries the user context information created in S202. For example, the user context information carried in the first confirmation message may at least include: an identifier of the user context, a virtual network resource of the user context, and a management and control interface created on the user context.
在一示例性实施例中,网络管控系统发送第一确认消息之前,本实施例的方法还可以包括:网络管控系统根据用户命名空间规则和本地命名空间规则,将通过S202创建的用户上下文的信息从本地命名空间转换到用户命名空间。In an exemplary embodiment, before the network management and control system sends the first confirmation message, the method of this embodiment may further include: the network management and control system sends the user context information created in S202 according to user namespace rules and local namespace rules Convert from local namespace to user namespace.
在一示例性实施例中,在S202之后,本实施例的方法还可以包括:网络管控系统接收用于指示更新用户上下文的请求消息,该请求消息中携带待更新的用户上下文的标识以及所需更新的信息;网络管控系统根据用于指示更新用户上下文的请求消息,更新相应的用户上下文;网络管控系统发送第二确认消息,第二确认消息中携带更新后的用户上下文的信息。比如,更新后的用户上下文的信息可以包括:用户上下文的标识、更新后的用户上下文的虚拟网络资源、更新后的管控接口。In an exemplary embodiment, after S202, the method of this embodiment may further include: the network management and control system receives a request message for instructing to update the user context, and the request message carries the identifier of the user context to be updated and the required information. Updated information; the network management and control system updates the corresponding user context according to the request message for instructing to update the user context; the network management and control system sends a second confirmation message, and the second confirmation message carries the updated user context information. For example, the updated user context information may include: the identifier of the user context, the virtual network resource of the updated user context, and the updated management and control interface.
在本示例性实施例中,网络管控系统根据用于指示更新用户上下文的请求消息,更新用户上下文,可以包括:当待更新的用户上下文的虚拟网络上存在业务,将该业务迁移;根据所需更新的信息,更新用户上下文的虚拟网络;将该业务恢复到更新后的虚拟网络上。In this exemplary embodiment, the network management and control system updates the user context according to the request message for instructing to update the user context, which may include: when a service exists on the virtual network of the user context to be updated, the service is migrated; The updated information updates the virtual network of the user context; restores the service to the updated virtual network.
在一示例性实施例中,在S202之后,本实施例的方法还可以包括:网络管控系统接收用于指示删除用户上下文的请求消息,该请求消息携带待删除的用户上下文的标识;网络管控系统根据用于指示删除用户上下文的请求消息,删除相应的用户上下文;网络管控系统发送第三确认消息,第三确认消息用于指示相应的用户上下文已删除。In an exemplary embodiment, after S202, the method of this embodiment may further include: the network management and control system receives a request message for instructing to delete the user context, the request message carrying the identifier of the user context to be deleted; the network management and control system According to the request message for instructing to delete the user context, delete the corresponding user context; the network management and control system sends a third confirmation message, which is used to indicate that the corresponding user context has been deleted.
在本示例性实施例中,网络管控系统根据用于指示删除用户上下文的请求消息,删除相应的用户上下文,可以包括:当待删除的用户上下文为初始创建 的用户上下文,则网络管控系统内的管理员上下文触发释放该用户上下文的虚拟网络所包含的虚拟链路,并更新资源数据库;当待删除的用户上下文为已有用户上下文的内嵌或递归的用户上下文,则网络管控系统内的已有的用户上下文删除内嵌或递归的用户上下文的信息,并更新资源数据库。In this exemplary embodiment, the network management and control system deletes the corresponding user context according to the request message for instructing to delete the user context, which may include: when the user context to be deleted is the initially created user context, then the network management and control system The administrator context triggers the release of the virtual links contained in the virtual network of the user context, and updates the resource database; when the user context to be deleted is an embedded or recursive user context of an existing user context, the existing user context in the network management and control system Some user contexts delete embedded or recursive user context information and update the resource database.
本实施例提供的支持网络切片的方法,可以通过对用户上下文的生命周期管理来给不同用户以及用户的不同业务按需提供虚拟网络资源和管控接口,以便用户可以通过管控接口在所提供的资源上建立相应的服务连接,实现对5G网络切片的支持,从而满足不同用户的个性化需求。The method for supporting network slicing provided in this embodiment can provide virtual network resources and management and control interfaces to different users and different services of users on demand through the life cycle management of user contexts, so that users can access the resources provided through the management and control interfaces. Establish corresponding service connections on the Internet to support 5G network slicing, so as to meet the individual needs of different users.
图3为本申请一示例性实施例提供的用户上下文的创建过程的示意图。如图3所示,本示例性实施例描述网络管控系统的管理员上下文(Administrator Context)为新用户创建用户上下文(Client Context)的过程。如图3所示,本示例性实施例包括以下过程:FIG. 3 is a schematic diagram of a process of creating a user context provided by an exemplary embodiment of this application. As shown in FIG. 3, this exemplary embodiment describes the process of creating a user context (Client Context) for a new user by the administrator context (Administrator Context) of the network management and control system. As shown in Fig. 3, this exemplary embodiment includes the following processes:
S301、网络管控系统初始启动后,默认建立管理员上下文;管理员具有最高的管理权限,管理员上下文可以对网络管控系统的管理域内的所有资源可见。S301. After the network management and control system is initially started, an administrator context is established by default; the administrator has the highest management authority, and the administrator context can be visible to all resources in the management domain of the network management and control system.
S302、网络管控系统的管理员上下文接收到应用侧发送的用于指示创建用户上下文的请求消息;该请求消息中可以携带待创建的用户上下文的约束条件;其中,约束条件可以包括虚拟网络约束条件、用户策略、管控接口信息、用户命名空间规则;虚拟网络约束条件可以包括但不限于:网络拓扑约束、服务类型、隔离要求、带宽容量、服务水平等级参数。然而,本申请对此并不限定。S302. The administrator context of the network management and control system receives a request message sent from the application side for instructing to create a user context; the request message may carry a constraint condition of the user context to be created; wherein the constraint condition may include a virtual network constraint condition , User policies, management and control interface information, user namespace rules; virtual network constraints can include but are not limited to: network topology constraints, service types, isolation requirements, bandwidth capacity, service level parameters. However, this application is not limited to this.
S303、网络管控系统的管理员上下文根据上述请求消息,创建用户上下文。S303. The administrator context of the network management and control system creates a user context according to the above request message.
本示例性实施例中,可以在给用户上下文分配资源之前或之后,给用户上下文分配网络管控系统范围内的唯一标识(Identifier,ID)。In this exemplary embodiment, a unique identifier (Identifier, ID) within the scope of the network management and control system may be assigned to the user context before or after the resource is assigned to the user context.
可以根据请求消息中携带的管控接口信息,在用户上下文上为用户创建管控接口。The management and control interface can be created for the user in the user context according to the management and control interface information carried in the request message.
网络管控系统的管理员上下文根据请求消息中携带的虚拟网络约束条件,在可用资源基础上抽象形成虚拟网络,并将虚拟网络分配给用户上下文。在本示例性实施例中,根据虚拟网络约束条件,在可用资源基础上抽象形成虚拟网络,可以包括以下过程:The administrator context of the network management and control system abstracts the virtual network based on the available resources based on the virtual network constraint conditions carried in the request message, and assigns the virtual network to the user context. In this exemplary embodiment, according to the constraints of the virtual network, the virtual network is abstractly formed on the basis of available resources, which may include the following process:
S304a、管理员上下文从资源数据库(RDB,Resource Database)中查询可用资源。S304a. The administrator context queries available resources from a resource database (RDB, Resource Database).
其中,当可用资源中存在满足网络拓扑约束的虚拟网络,则直接将该虚拟网络分配给用户上下文。Among them, when there is a virtual network that satisfies the network topology constraints in the available resources, the virtual network is directly assigned to the user context.
当可用资源中不存在满足网络拓扑约束的虚拟网络,则对于可用资源中能提供所需资源的节点和链路,直接分配相应的资源给所建的虚拟网络,若节点之间没有满足网络拓扑约束需求的链路时,管理员上下文给网络呼叫控制器(NCC,Network Call Controller)发送呼叫请求(如图3中的S304b);网络呼叫控制器将呼叫请求转换成连接请求,并发送给连接控制器(CC,Connection Controller)请求建立相应的连接(如图3中的S304c),所建的连接可以作为节点之间的虚拟链路,连接控制器可以与RDB交互保存连接信息。When there is no virtual network that satisfies the network topology constraints in the available resources, for the nodes and links that can provide the required resources in the available resources, the corresponding resources are directly allocated to the virtual network to be built. If the nodes do not meet the network topology When constraining the required link, the administrator context sends a call request to the Network Call Controller (NCC) (S304b in Figure 3); the network call controller converts the call request into a connection request and sends it to the connection A controller (CC, Connection Controller) requests to establish a corresponding connection (S304c in FIG. 3), the established connection can be used as a virtual link between nodes, and the connection controller can interact with the RDB to save connection information.
管理员上下文根据需要将所建立的连接进行抽象聚合形成虚拟链路,并与直接分配的资源一起形成虚拟网络,并将虚拟网络分配给用户上下文。The administrator context abstracts and aggregates the established connections as needed to form a virtual link, and forms a virtual network together with the directly allocated resources, and allocates the virtual network to the user context.
在上述建立虚拟网络的过程之前,管理员上下文可以根据用户命名空间规则和本地命名空间规则,将网络拓扑约束从用户命名空间转换到本地命名空间。示例性地,管理员上下文可以通过其他组件(比如,目录服务(Directory Service)或新的组件)来实现将网络拓扑约束从用户命名空间转换到本地命名空间。Before the above process of establishing a virtual network, the administrator context can convert the network topology constraints from the user namespace to the local namespace according to the user namespace rules and the local namespace rules. Exemplarily, the administrator context can implement the conversion of network topology constraints from the user namespace to the local namespace through other components (for example, Directory Service or new components).
S305、网络管控系统的管理员上下文给应用侧发送确认消息(对应上述的第一确认消息),该确认消息中携带新创建的用户上下文的信息。S305. The administrator context of the network management and control system sends a confirmation message (corresponding to the aforementioned first confirmation message) to the application side, and the confirmation message carries information about the newly created user context.
在本示例性实施例中,新创建的用户上下文的信息至少可以包括:用户上下文的标识、用户可使用的网络资源(包括虚拟网络资源或物理网络资源)、为用户提供的管控接口的信息、用户命名空间规则、用户配置的策略。In this exemplary embodiment, the information of the newly created user context may include at least: the identifier of the user context, the network resources (including virtual network resources or physical network resources) that the user can use, information about the management and control interface provided for the user, User namespace rules, user configuration strategies.
用户命名空间规则可以根据S302中的请求消息携带的用户命名空间规则配置得到;用户配置的策略可以根据S302中的请求消息携带的用户策略配置得到;用户上下文的标识、为用户提供的管控接口的信息以及用户可使用的网络资源可以通过S303得到。The user name space rules can be configured according to the user name space rules carried in the request message in S302; the user configuration policy can be configured according to the user policy carried in the request message in S302; the user context identifier and the control interface provided for the user Information and network resources available to users can be obtained through S303.
用户可使用的网络资源可以包括上述经过聚合抽象形成的虚拟网络或物理网络资源;为用户提供的管控接口是指用户可以用来对可使用的网络资源进行管理和控制的接口,比如为某种服务类型的切片建立业务连接;用户命名空间规则,用于网络管控系统内组件对用户命名空间和网络管控系统的本地命名空间之间进行转换;用户配置的策略包括但不限于保护恢复策略、用户角色及对应的权限。The network resources that users can use can include the above-mentioned virtual network or physical network resources formed through aggregation and abstraction; the management and control interface provided for users refers to the interface that users can use to manage and control the available network resources, such as The slices of service types establish business connections; user namespace rules are used for components in the network management and control system to convert between the user namespace and the local namespace of the network management and control system; user configuration strategies include but are not limited to protection and recovery strategies, users Roles and corresponding permissions.
图4为本申请另一示例性实施例提供的用户上下文的创建过程的示意图。如图4所示,本示例性实施例描述网络管控系统的用户管理员为新服务创建内嵌的或递归的用户上下文的过程。如图4所示,本示例性实施例包括以下过程:FIG. 4 is a schematic diagram of a process of creating a user context provided by another exemplary embodiment of this application. As shown in FIG. 4, this exemplary embodiment describes a process in which a user administrator of a network management and control system creates an embedded or recursive user context for a new service. As shown in Fig. 4, this exemplary embodiment includes the following processes:
S401、根据图3所示流程,网络管控系统的管理员上下文建立用户的用户上下文,并配置用户的管理员信息。S401. According to the process shown in FIG. 3, the administrator context of the network management and control system establishes the user context of the user, and configures the administrator information of the user.
S402、网络管控系统的用户上下文接收到应用侧管理员发送的用于指示创建用户上下文的请求消息,该请求消息中可以携带已有的用户上下文的标识、待创建的用户上下文的约束条件;其中,约束条件至少可以包括虚拟网络约束条件、用户策略、管控接口信息;虚拟网络约束条件可以包括但不限于:网络拓扑约束、服务类型、隔离要求、带宽容量、服务水平等级参数。S402: The user context of the network management and control system receives a request message sent by the application-side administrator for instructing the creation of the user context, and the request message may carry the identifier of the existing user context and the constraint conditions of the user context to be created; where The constraint conditions can include at least virtual network constraint conditions, user policies, and management and control interface information; virtual network constraint conditions can include, but are not limited to: network topology constraints, service types, isolation requirements, bandwidth capacity, and service level parameters.
S403、用户管理员上下文C0根据上述的请求消息,创建内嵌的或递归的用户上下文C1(或C2)组件,并给内嵌的或递归的用户上下文C1分配网络管控系统内的唯一标识;其中,可以根据管控接口信息,在内嵌的或递归的用户上下文C1组件上为用户创建管控接口。S403. The user administrator context C0 creates an embedded or recursive user context C1 (or C2) component according to the above request message, and assigns the embedded or recursive user context C1 a unique identifier in the network management and control system; where , Can create a management and control interface for the user on the embedded or recursive user context C1 component according to the management and control interface information.
S404、用户上下文在所分配的虚拟网络的可用资源中,根据虚拟网络约束条件,给该内嵌的或递归的用户上下文C1组件分配相应的资源,并将相关资源信息保存到RDB中。S404: Among the available resources of the allocated virtual network, the user context allocates corresponding resources to the embedded or recursive user context C1 component according to the virtual network constraint conditions, and saves the relevant resource information in the RDB.
S405、网络管控系统的用户上下文给应用侧发送确认消息(对应上述的第一确认消息),该确认消息中携带新建的内嵌的或递归的用户上下文C1的信息。S405: The user context of the network management and control system sends a confirmation message (corresponding to the above-mentioned first confirmation message) to the application side, and the confirmation message carries the information of the newly built embedded or recursive user context C1.
在本示例性实施例中,新创建的用户上下文C1的信息可以至少包括:用户上下文C1的标识、用户可使用的网络资源(包括虚拟网络资源)、为用户提供的管控接口的信息、用户配置的策略。In this exemplary embodiment, the information of the newly created user context C1 may include at least: the identifier of the user context C1, the network resources (including virtual network resources) that the user can use, the information of the management and control interface provided for the user, and the user configuration Strategy.
图5为本申请实施例提供的支持网络切片的一种应用示例图。本示例性实施例说明在支持5G端对端(E2E,End-to-End)切片的场景下,5G E2E切片管理系统(比如,3GPP管理系统)基于TAPI(Transport Application Programming Interface,传输应用编程接口)和网络管控系统交互,为5G E2E切片的运营商创建用户上下文。FIG. 5 is a diagram of an application example for supporting network slicing provided by an embodiment of this application. This exemplary embodiment illustrates that in a scenario that supports 5G end-to-end (E2E, End-to-End) slicing, a 5G E2E slicing management system (for example, a 3GPP management system) is based on TAPI (Transport Application Programming Interface). ) Interact with the network management and control system to create user contexts for operators of 5G E2E slices.
如图5所示,本示例性实施例包括如下过程:As shown in FIG. 5, this exemplary embodiment includes the following process:
S501、5G E2E切片管理系统通过TAPI给网络管控系统发送用于指示创建用户上下文的请求消息;该请求消息可以是新的用于指示创建用户上下文的消息,或者可以通过扩展TAPI接口操作(比如,使用虚拟网络服务请求消息)来触发网络管控系统为5G E2E切片管理系统创建用户上下文;该请求消息可以携带用户上下文的约束条件,比如,携带服务接入点的信息(对应上述的网络拓扑约束)、管理接口信息、服务水平等级要求、带宽容量等。S501, the 5G E2E slice management system sends a request message for instructing the creation of a user context to the network management and control system through TAPI; the request message can be a new message for instructing the creation of a user context, or can be operated through an extended TAPI interface (for example, Use the virtual network service request message) to trigger the network management and control system to create a user context for the 5G E2E slice management system; the request message can carry user context constraints, for example, carry service access point information (corresponding to the aforementioned network topology constraints) , Management interface information, service level requirements, bandwidth capacity, etc.
S502、网络管控系统在接收到请求消息后的处理过程可以参照图3所示实施例的S303至S305,故于此不再赘述。In S502, the processing procedure of the network management and control system after receiving the request message can refer to S303 to S305 in the embodiment shown in FIG. 3, and therefore will not be repeated here.
S503、5G E2E切片管理系统给用户上下文发送连接服务请求,在用户上下文提供的虚拟网络上建立L2或L3VPN(Virtual Private Network,虚拟专用网络), 用于为特定的5G网络切片实例提供连接服务。S503, the 5G E2E slice management system sends a connection service request to the user context, and establishes an L2 or L3VPN (Virtual Private Network, virtual private network) on the virtual network provided by the user context to provide connection services for specific 5G network slice instances.
S504、用户上下文根据连接服务请求,触发连接控制器建立相应的连接,并对连接包含的节点和链路进行配置,在提供连接的边缘节点需要对5G网络切片实例和虚拟网络上所建立连接的映射关系进行配置。S504. The user context triggers the connection controller to establish a corresponding connection according to the connection service request, and configures the nodes and links included in the connection. The edge node that provides the connection needs to connect the 5G network slice instance and the virtual network. The mapping relationship is configured.
在本示例性实施例中,在网络管控系统为5G E2E切片的运营商建立相应的用户上下文后,如果5G运营商希望将不同服务类型的5G E2E切片通过不同的资源来承载,5G运营商的用户上下文可以根据请求为不同服务类型的5G E2E切片创建不同的内嵌的或递归的用户上下文,在5G运营商的用户上下文的虚拟网络所提供的资源基础上根据需求为不同的内嵌的或递归的用户上下文分配资源。在这种场景下,若采用TAPI,5G运营商的用户上下文接收到5G E2E切片管理系统发送的请求消息和本示例性实施例中S501的描述一致,而且,5G运营商的用户上下文在接收到该请求消息后的处理过程与图4所示实施例中的S403至S405的过程一致,在此不再赘述。In this exemplary embodiment, after the network management system establishes the corresponding user context for the operator of 5G E2E slices, if the 5G operator wants to carry 5G E2E slices of different service types through different resources, the 5G operator’s The user context can create different embedded or recursive user contexts for 5G E2E slices of different service types according to the request. Based on the resources provided by the virtual network of the user context of the 5G operator, different embedded or Recursive user context allocation of resources. In this scenario, if TAPI is used, the request message sent by the 5G E2E slice management system received by the user context of the 5G operator is consistent with the description of S501 in this exemplary embodiment, and the user context of the 5G operator is The processing procedure after the request message is the same as the procedure from S403 to S405 in the embodiment shown in FIG. 4, and will not be repeated here.
图6为本申请一示例性实施例提供的用户上下文的删除过程的示意图。如图6所示,本示例性实施例描述网络管控系统的管理员删除用户上下文的过程。如图6所示,本示例性实施例包括如下过程:Fig. 6 is a schematic diagram of a user context deletion process provided by an exemplary embodiment of this application. As shown in Figure 6, this exemplary embodiment describes a process in which the administrator of the network management and control system deletes the user context. As shown in Fig. 6, this exemplary embodiment includes the following processes:
S601、网络管控系统的管理员上下文接收到应用侧发送的用于指示删除用户上下文的请求消息,该请求消息中携带待删除的用户上下文的标识(ID)。S601: The administrator context of the network management and control system receives a request message sent from the application side for instructing to delete the user context, and the request message carries an identification (ID) of the user context to be deleted.
S602、网络管控系统的管理员上下文删除用户上下文。S602. The administrator context of the network management and control system deletes the user context.
S602可以包括如下步骤:S602 may include the following steps:
S602a、管理员上下文给网络呼叫控制器(NCC)发送呼叫释放或给连接控制器(CC)发送连接释放的请求,触发NCC、CC、链路资源管理(LRM)组件将为该用户上下文的虚拟网络所建立的虚拟链路释放,包括被抽象聚合的所有连接。S602a. The administrator context sends a call release to the network call controller (NCC) or a connection release request to the connection controller (CC), triggering the NCC, CC, and link resource management (LRM) components to be virtual The virtual link established by the network is released, including all connections that are abstractly aggregated.
S602b、管理员上下文与RDB交互删除用户上下文相关的信息,包括删除所释放链路的信息,更新其他资源的状态。S602b: The administrator context interacts with the RDB to delete information related to the user context, including deleting the information of the released link, and updating the status of other resources.
S602c、管理员上下文删除用户上下文。S602c. The administrator context deletes the user context.
S603、网络管控系统的管理员上下文给应用侧发送反馈消息(对应上述的第三确认消息),该反馈消息用于向应用侧指示用户上下文已经删除。S603. The administrator context of the network management and control system sends a feedback message (corresponding to the aforementioned third confirmation message) to the application side, where the feedback message is used to indicate to the application side that the user context has been deleted.
图7为本申请另一示例性实施例提供的用户上下文的删除过程的示意图。如图7所示,本示例性实施例描述网络管控系统的用户管理员删除用户上下文的过程。如图7所示,本示例性实施例包括如下过程:Fig. 7 is a schematic diagram of a user context deletion process provided by another exemplary embodiment of the application. As shown in FIG. 7, this exemplary embodiment describes a process in which the user administrator of the network management and control system deletes the user context. As shown in FIG. 7, this exemplary embodiment includes the following processes:
S701、网络管控系统的用户上下文接收到应用侧发送的用于指示删除内嵌的用户上下文的请求消息,该请求消息中携带待删除的内嵌的或递归的用户上下文的ID。S701: The user context of the network management and control system receives a request message sent from the application side for instructing to delete the embedded user context, and the request message carries the ID of the embedded or recursive user context to be deleted.
S702、用户上下文删除内嵌的或递归的用户上下文(比如,用户上下文C1)。S702. The user context deletes the embedded or recursive user context (for example, the user context C1).
S702可以包括如下步骤:S702 may include the following steps:
S702a、用户管理员上下文C0与RDB交互指示删除内嵌的或递归的用户上下文C1相关的信息,更新所占用资源的状态。S702a: The user administrator context C0 interacts with the RDB to instruct to delete the information related to the embedded or recursive user context C1, and update the state of the occupied resources.
S702b、用户管理员上下文C0删除内嵌的或递归的用户上下文C1。S702b. The user administrator context C0 deletes the embedded or recursive user context C1.
S703、网络管控系统的用户上下文给应用侧反馈消息(对应上述的第三确认消息),该消息确认内嵌的或递归的用户上下文C1已经删除。S703. The user context of the network management and control system feeds back a message (corresponding to the aforementioned third confirmation message) to the application side, which confirms that the embedded or recursive user context C1 has been deleted.
图8为本申请一示例性实施例提供的用户上下文的更新过程的示意图。如图8所示,本示例性实施例描述网络管控系统的管理员更新用户上下文的过程。如图8所示,本示例性实施例包括如下过程:Fig. 8 is a schematic diagram of a user context update process provided by an exemplary embodiment of this application. As shown in FIG. 8, this exemplary embodiment describes a process in which the administrator of the network management and control system updates the user context. As shown in Fig. 8, this exemplary embodiment includes the following processes:
S801、网络管控系统的管理员上下文接收到应用侧发送的指示更新用户上下文的请求消息,该请求消息中携带待更新的用户上下文的ID及所需要更新的信息,比如,网络拓扑约束、带宽容量。S801. The administrator context of the network management and control system receives a request message from the application side that instructs to update the user context. The request message carries the ID of the user context to be updated and the information that needs to be updated, such as network topology constraints, bandwidth capacity .
S802、网络管控系统的管理员上下文更新用户上下文的信息。S802. The administrator context of the network management and control system updates user context information.
S802可以包括如下步骤:S802 may include the following steps:
S802a、管理员上下文根据需要更新的信息,确定要更新资源的节点和链路,并按需求给NCC发送呼叫建立和释放请求中的至少一项,或给CC发送连接建立和释放请求中的至少一项;在确定要更新的资源的节点和链路前,根据需要更新的信息,用户管理员上下文可能需要先通过路由控制器(RC,Routing Controller)进行算路来进一步明确所需要增加或删除的资源。S802a. The administrator context determines the node and link to update the resource according to the information that needs to be updated, and sends at least one of the call establishment and release request to the NCC, or sends at least one of the connection establishment and release request to the CC as required One item; before determining the node and link of the resource to be updated, according to the information that needs to be updated, the user administrator context may need to calculate the route through the routing controller (RC, Routing Controller) to further clarify the need to add or delete resource of.
S802b、管理员上下文与RDB交互,更新用户上下文的信息,保存新建立的呼叫或连接的信息,并将其分配给用户上下文中的虚拟网络,对于释放的资源,更新资源状态。S802b. The administrator context interacts with the RDB, updates the user context information, saves the newly established call or connection information, and allocates it to the virtual network in the user context, and updates the resource status for the released resources.
若虚拟网络上存在业务,则管理员上下文在S802a之前需要将业务迁移,在S802b之后再将业务恢复到更新后的虚拟网络上。If there are services on the virtual network, the administrator context needs to migrate the services before S802a, and then restore the services to the updated virtual network after S802b.
S803、网络管控系统的管理员上下文给应用侧发送确认消息(对应上述的第二确认消息),该确认消息中携带更新后的用户上下文的信息(包括虚拟网络的信息)。S803. The administrator context of the network management and control system sends a confirmation message (corresponding to the aforementioned second confirmation message) to the application side, and the confirmation message carries updated user context information (including virtual network information).
图9为本申请另一示例性实施例提供的用户上下文的更新过程的示意图。 如图9所示,本示例性实施例描述网络管控系统的用户管理员更新用户上下文的过程。如图9所示,本示例性实施例包括如下过程:Fig. 9 is a schematic diagram of a user context update process provided by another exemplary embodiment of the application. As shown in FIG. 9, this exemplary embodiment describes a process in which a user administrator of the network management and control system updates the user context. As shown in FIG. 9, this exemplary embodiment includes the following processes:
S901、网络管控系统的用户上下文接收到应用侧发送的用于指示更新内嵌的或递归的用户上下文的请求消息,该请求消息中携带待更新的用户上下文的ID和需要更新的信息。S901: The user context of the network management and control system receives a request message sent from the application side for instructing to update the embedded or recursive user context, and the request message carries the ID of the user context to be updated and the information that needs to be updated.
S902、用户上下文更新内嵌的或递归的用户上下文(比如,用户上下文C1);其中,可以包括:S902a、用户管理员上下文C0与RDB交互获取该用户可用的资源,根据需要更新的信息,增加新的资源或删除不需要的节点和链路,并在RDB中保存相关的信息,将新分配的资源关联到该内嵌的或递归的用户上下文C1的虚拟网络,或更新被释放资源的状态;在增加新的资源或删除不需要的节点和链路前,根据需要更新的信息,用户管理员上下文可能需要先通过路由控制器(RC)进行算路,来确定所需要增加或删除的资源。S902. The user context updates the embedded or recursive user context (for example, the user context C1); which may include: S902a, the user administrator context C0 interacts with the RDB to obtain resources available to the user, and adds New resources or delete unnecessary nodes and links, and save relevant information in RDB, associate the newly allocated resources to the virtual network of the embedded or recursive user context C1, or update the status of the released resources ; Before adding new resources or deleting unnecessary nodes and links, according to the information that needs to be updated, the user administrator context may need to calculate the route through the routing controller (RC) to determine the resources that need to be added or deleted .
S903、用户上下文给应用侧反馈消息(对应上述的第二确认消息),该消息确认内嵌的或递归的用户上下文C1已经更新,并携带更新后的用户上下文的信息。S903. The user context feeds back a message (corresponding to the aforementioned second confirmation message) to the application side, which confirms that the embedded or recursive user context C1 has been updated, and carries the updated user context information.
图10为本申请实施例提供的另一种支持网络切片的方法的流程图。如图10所示,本示例性实施例提供的支持网络切片的方法,包括:FIG. 10 is a flowchart of another method for supporting network slicing according to an embodiment of the application. As shown in FIG. 10, the method for supporting network slicing provided by this exemplary embodiment includes:
S1001、应用侧向网络管控系统发送用于指示创建用户上下文的请求消息,所述请求消息中至少携带待创建的用户上下文的约束条件。S1001. The application side sends a request message for instructing to create a user context to the network management and control system, where the request message at least carries a constraint condition of the user context to be created.
S1002、应用侧接收网络管控系统返回的第一确认消息,第一确认消息中携带网络管控系统创建的用户上下文的信息。S1002. The application side receives a first confirmation message returned by the network management and control system, where the first confirmation message carries the user context information created by the network management and control system.
在一示例性实施例中,网络管控系统创建的用户上下文的信息可以至少包括:该用户上下文的标识、该用户上下文对应的网络资源、网络资源的管控接口;其中,网络资源可以包括以下至少之一:虚拟网络资源、物理网络资源。In an exemplary embodiment, the user context information created by the network management and control system may include at least: the identifier of the user context, the network resource corresponding to the user context, and the management and control interface of the network resource; wherein, the network resource may include at least one of the following One: Virtual network resources, physical network resources.
在一示例性实施例中,网络管控系统创建的用户上下文的信息可以包括:该用户上下文的标识、该用户上下文对应的网络资源、网络资源的管控接口、用户命名空间规则、用户配置的策略。然而,本申请对此并不限定。In an exemplary embodiment, the user context information created by the network management and control system may include: the identifier of the user context, the network resource corresponding to the user context, the management and control interface of the network resource, the user namespace rule, and the policy configured by the user. However, this application is not limited to this.
在一示例性实施例中,在S1002之后,本实施例的方法还可以包括:应用侧向网络管控系统发送用于指示更新用户上下文的请求消息,该请求消息携带待更新的用户上下文的标识以及所需更新的信息;应用侧接收网络管控系统发送的第二确认消息,该第二确认消息中携带更新后的用户上下文的信息。In an exemplary embodiment, after S1002, the method of this embodiment may further include: the application side sends a request message for instructing to update the user context to the network management and control system, the request message carrying the identifier of the user context to be updated and Information that needs to be updated; the application side receives a second confirmation message sent by the network management and control system, and the second confirmation message carries updated user context information.
在一示例性实施例中,在S1002之后,本实施例的方法还可以包括:应用侧向网络管控系统发送用于指示删除用户上下文的请求消息,该请求消息携带 待删除的用户上下文的标识;应用侧接收网络管控系统发送的第三确认消息,第三确认消息用于向应用侧指示该待删除的用户上下文已删除。In an exemplary embodiment, after S1002, the method of this embodiment may further include: the application side sends a request message for instructing to delete the user context to the network management and control system, the request message carrying an identifier of the user context to be deleted; The application side receives a third confirmation message sent by the network management and control system, where the third confirmation message is used to indicate to the application side that the user context to be deleted has been deleted.
图11为本申请实施例提供的一种网络管控系统的示意图。如图11所示,本实施例提供的网络管控系统包括:接收单元1101,配置为接收用于指示创建用户上下文的请求消息,请求消息中至少携带待创建的用户上下文的约束条件;控制单元1102,配置为创建用户上下文。FIG. 11 is a schematic diagram of a network management and control system provided by an embodiment of this application. As shown in FIG. 11, the network management and control system provided in this embodiment includes: a receiving unit 1101, configured to receive a request message for instructing to create a user context, and the request message carries at least constraints of the user context to be created; a control unit 1102 , Configured to create a user context.
在一示例性实施例中,约束条件至少可以包括:虚拟网络约束条件;控制单元1102可以配置为通过以下方式创建用户上下文:提供对网络资源的管控接口;根据虚拟网络约束条件,将基于可用资源形成的虚拟网络分配给该用户上下文。In an exemplary embodiment, the restriction conditions may include at least: virtual network restriction conditions; the control unit 1102 may be configured to create user contexts in the following manner: provide a management and control interface for network resources; according to the virtual network restriction conditions, based on available resources The formed virtual network is assigned to the user context.
在一示例性实施例中,控制单元1102还可以配置为给用户上下文分配标识。In an exemplary embodiment, the control unit 1102 may also be configured to assign an identifier to the user context.
在一示例性实施例中,控制单元1102可以包括管理员上下文;控制单元1102可以配置为通过以下方式根据虚拟网络约束条件,将基于可用资源形成的虚拟网络分配给用户上下文:当请求消息指示创建初始的用户上下文,管理员上下文根据虚拟网络约束条件,从可用资源抽象形成虚拟网络,并将该虚拟网络分配给用户上下文。In an exemplary embodiment, the control unit 1102 may include an administrator context; the control unit 1102 may be configured to allocate a virtual network formed based on available resources to the user context according to virtual network constraints in the following manner: when the request message indicates to create In the initial user context, the administrator context abstracts the available resources to form a virtual network based on the constraints of the virtual network, and assigns the virtual network to the user context.
在一示例性实施例中,控制单元1102可以包括已有的用户上下文;控制单元1102可以配置为通过以下方式根据虚拟网络约束条件,将基于可用资源形成的虚拟网络分配给用户上下文:当请求消息指示在该已有的用户上下文内创建内嵌或递归的用户上下文,则该已有的用户上下文在该已有的用户上下文的虚拟网络中,将满足虚拟网络约束条件的资源分配给该已有的用户上下文的内嵌或递归的用户上下文。In an exemplary embodiment, the control unit 1102 may include an existing user context; the control unit 1102 may be configured to allocate a virtual network formed based on available resources to the user context according to virtual network constraints in the following manner: when the request message Instruct to create an embedded or recursive user context in the existing user context, then the existing user context is in the virtual network of the existing user context, and resources that meet the constraints of the virtual network are allocated to the existing user context. The embedded or recursive user context of the user context.
在一示例性实施例中,用于指示创建用户上下文的请求消息还可以携带已有的用户上下文的标识,用于指示在该已有的用户上下文内创建内嵌或递归的用户上下文。In an exemplary embodiment, the request message for instructing to create a user context may also carry an identifier of an existing user context, which is used to instruct to create an embedded or recursive user context in the existing user context.
在一示例性实施例中,如图11所示,网络管控系统还可以包括:发送单元1103,配置为发送第一确认消息,第一确认消息中携带网络管控系统创建的用户上下文的信息。In an exemplary embodiment, as shown in FIG. 11, the network management and control system may further include: a sending unit 1103 configured to send a first confirmation message, where the first confirmation message carries user context information created by the network management and control system.
在一示例性实施例中,第一确认消息中携带的用户上下文的信息可以至少包括:该用户上下文的标识、该用户上下文对应的网络资源、网络资源的管控接口;网络资源包括以下至少之一:虚拟网络资源、物理网络资源。In an exemplary embodiment, the user context information carried in the first confirmation message may include at least: an identifier of the user context, a network resource corresponding to the user context, and a management and control interface of the network resource; the network resource includes at least one of the following : Virtual network resources, physical network resources.
在一示例性实施例中,接收单元1101还可以配置为接收用于指示更新用户上下文的请求消息,该请求消息携带待更新的用户上下文的标识以及所需更新 的信息;控制单元1102,还可以配置为根据用于指示更新用户上下文的请求消息,更新该用户上下文;发送单元1103还可以配置为发送第二确认消息,第二确认消息中携带更新后的用户上下文的信息。In an exemplary embodiment, the receiving unit 1101 may be further configured to receive a request message for instructing to update the user context, the request message carrying the identifier of the user context to be updated and the information to be updated; the control unit 1102 may also It is configured to update the user context according to a request message for instructing to update the user context; the sending unit 1103 may also be configured to send a second confirmation message, the second confirmation message carrying updated user context information.
在一示例性实施例中,接收单元1101还可以配置为接收用于指示删除用户上下文的请求消息,该请求消息携带待删除的用户上下文的标识;控制单元1102,还可以配置为根据用于指示删除用户上下文的请求消息,删除该用户上下文;发送单元1103,还可以配置为发送第三确认消息,该第三确认消息用于指示该待删除的用户上下文已删除。In an exemplary embodiment, the receiving unit 1101 may be further configured to receive a request message for instructing to delete the user context, the request message carrying an identifier of the user context to be deleted; the control unit 1102 may also be configured to indicate The request message for deleting the user context is to delete the user context; the sending unit 1103 may also be configured to send a third confirmation message, which is used to indicate that the user context to be deleted has been deleted.
关于本实施例的网络管控系统的相关说明可以参照上述方法实施例的描述,故于此不再赘述。For the relevant description of the network management and control system of this embodiment, reference may be made to the description of the foregoing method embodiment, so it is not repeated here.
图12为本申请实施例提供的一种支持网络切片的装置的示意图。如图12所示,本实施例提供的支持网络切片的装置可以设置在应用侧,包括:接收单元1201和发送单元1202;其中,发送单元1202配置为向网络管控系统发送用于指示创建用户上下文的请求消息,该请求消息中至少携带待创建的用户上下文的约束条件;接收单元1201配置为接收网络管控系统发送的第一确认消息,第一确认消息中携带网络管控系统创建的用户上下文的信息。比如,第一确认消息中携带的用户上下文的信息至少可以包括:该用户上下文的标识、该用户上下文的虚拟网络资源、在该用户上下文上创建的管控接口。FIG. 12 is a schematic diagram of an apparatus for supporting network slicing provided by an embodiment of the application. As shown in FIG. 12, the apparatus for supporting network slicing provided in this embodiment can be set on the application side and includes: a receiving unit 1201 and a sending unit 1202; wherein, the sending unit 1202 is configured to send instructions to the network management and control system for creating user context The request message contains at least the constraint conditions of the user context to be created; the receiving unit 1201 is configured to receive the first confirmation message sent by the network management and control system, and the first confirmation message carries the user context information created by the network management and control system . For example, the user context information carried in the first confirmation message may at least include: an identifier of the user context, a virtual network resource of the user context, and a management and control interface created on the user context.
在一示例性实施例中,发送单元1202还可以配置为向网络管控系统发送用于指示更新用户上下文的请求消息,该请求消息携带待更新的用户上下文的标识以及所需更新的信息;接收单元1201还可以配置为接收网络管控系统发送的第二确认消息,该第二确认消息中携带更新后的用户上下文的信息。In an exemplary embodiment, the sending unit 1202 may be further configured to send a request message for instructing to update the user context to the network management and control system, the request message carrying the identifier of the user context to be updated and the information to be updated; the receiving unit 1201 may also be configured to receive a second confirmation message sent by the network management and control system, where the second confirmation message carries updated user context information.
在一示例性实施例中,发送单元1202还可以配置为向网络管控系统发送用于指示删除用户上下文的请求消息,该请求消息携带待删除的用户上下文的标识;接收单元1201还可以配置为接收网络管控系统发送的第三确认消息,第三确认消息用于向应用侧指示该用户上下文已删除。In an exemplary embodiment, the sending unit 1202 may be further configured to send a request message for instructing to delete the user context to the network management and control system, the request message carrying the identifier of the user context to be deleted; the receiving unit 1201 may also be configured to receive A third confirmation message sent by the network management and control system, where the third confirmation message is used to indicate to the application side that the user context has been deleted.
综上所述,网络管控系统可以通过管理用户上下文对不同的用户及用户的不同业务根据需求进行独立管理,并根据用户的需求进行网络资源的动态分配和管理控制,从而满足不同用户或不同业务的个性化需求。In summary, the network management and control system can independently manage different users and different services of users according to their needs by managing user contexts, and dynamically allocate and manage network resources according to user needs, so as to meet different users or different services Individual needs.
此外,本申请实施例还提供一种计算机可读存储介质,存储有计算机程序,该计算机程序被执行时实现上述支持网络切片的方法的步骤,比如图2或图10所示的步骤。In addition, an embodiment of the present application also provides a computer-readable storage medium that stores a computer program, and when the computer program is executed, the steps of the method for supporting network slicing are realized, such as the steps shown in FIG.
本领域普通技术人员可以理解,上文中所公开方法中的全部或某些步骤、 系统、装置中的功能模块/单元可以被实施为软件、固件、硬件及其适当的组合。在硬件实施方式中,在以上描述中提及的功能模块/单元之间的划分不一定对应于物理组件的划分;例如,一个物理组件可以具有多个功能,或者一个功能或步骤可以由若干物理组件合作执行。某些组件或所有组件可以被实施为由处理器,如数字信号处理器或微处理器执行的软件,或者被实施为硬件,或者被实施为集成电路,如专用集成电路。这样的软件可以分布在计算机可读介质上,计算机可读介质可以包括计算机存储介质(或非暂时性介质)和通信介质(或暂时性介质)。如本领域普通技术人员公知的,术语计算机存储介质包括在用于存储信息(诸如计算机可读指令、数据结构、程序模块或其他数据)的任何方法或技术中实施的易失性和非易失性、可移除和不可移除介质。计算机存储介质包括但不限于随机存取存储器(Random Access Memory,RAM)、只读存储器(Read-Only Memory ROM)、电可擦除可编程只读存储器(Electrically Electrically Programmable Read-Only Memory,EEPROM、闪存或其他存储器技术、光盘只读存储器(Compact Disk-ROM,CD-ROM)、数字多功能盘(Digital Versatile Disc,DVD)或其他光盘存储、磁盒、磁带、磁盘存储或其他磁存储装置、或者可以用于存储期望的信息并且可以被计算机访问的任何其他的介质。此外,本领域普通技术人员公知的是,通信介质通常包含计算机可读指令、数据结构、程序模块或者诸如载波或其他传输机制之类的调制数据信号中的其他数据,并且可包括任何信息递送介质。A person of ordinary skill in the art can understand that all or some of the steps, functional modules/units in the system, and apparatus in the methods disclosed above can be implemented as software, firmware, hardware, and appropriate combinations thereof. In hardware implementations, the division between functional modules/units mentioned in the above description does not necessarily correspond to the division of physical components; for example, one physical component may have multiple functions, or one function or step may consist of several physical components. The components are executed cooperatively. Some or all components may be implemented as software executed by a processor, such as a digital signal processor or a microprocessor, or as hardware, or as an integrated circuit, such as an application specific integrated circuit. Such software may be distributed on a computer-readable medium, and the computer-readable medium may include a computer storage medium (or non-transitory medium) and a communication medium (or transitory medium). As is well known to those of ordinary skill in the art, the term computer storage medium includes volatile and non-volatile memory implemented in any method or technology for storing information (such as computer-readable instructions, data structures, program modules, or other data). Flexible, removable and non-removable media. Computer storage media include but are not limited to Random Access Memory (RAM), Read-Only Memory (ROM), Electrically Programmable Read-Only Memory, EEPROM, Flash memory or other storage technologies, compact Disk-ROM (CD-ROM), Digital Versatile Disc (DVD) or other optical disk storage, magnetic cassettes, magnetic tapes, disk storage or other magnetic storage devices, Or any other medium that can be used to store desired information and that can be accessed by a computer. In addition, as is well known to those of ordinary skill in the art, communication media usually include computer-readable instructions, data structures, program modules, or transmissions such as carrier waves or other Mechanisms and the like modulate other data in the data signal, and can include any information delivery medium.

Claims (34)

  1. 一种支持网络切片的方法,包括:A method to support network slicing includes:
    网络管控系统接收用于指示创建用户上下文的请求消息,其中,所述请求消息中携带待创建的用户上下文的约束条件;The network management and control system receives a request message for instructing to create a user context, where the request message carries a constraint condition of the user context to be created;
    所述网络管控系统创建所述用户上下文。The network management and control system creates the user context.
  2. 根据权利要求1所述的方法,其中,所述约束条件包括:虚拟网络约束条件;The method according to claim 1, wherein the constraint conditions comprise: virtual network constraints;
    所述网络管控系统创建所述用户上下文,包括:The creation of the user context by the network management and control system includes:
    所述网络管控系统提供对网络资源的管控接口;The network management and control system provides a management and control interface for network resources;
    所述网络管控系统根据所述虚拟网络约束条件,将基于可用资源形成的虚拟网络分配给所述用户上下文。The network management and control system allocates a virtual network formed based on available resources to the user context according to the virtual network constraint condition.
  3. 根据权利要求2所述的方法,其中,所述约束条件还包括:管控接口信息;The method according to claim 2, wherein the constraint condition further comprises: management and control interface information;
    所述网络管控系统提供对网络资源的管控接口,包括:The network management and control system provides a management and control interface for network resources, including:
    所述网络管控系统根据所述管控接口信息,在所述用户上下文上创建管控接口。The network management and control system creates a management and control interface on the user context according to the management and control interface information.
  4. 根据权利要求2所述的方法,其中,所述网络管控系统包括:管理员上下文;The method according to claim 2, wherein the network management and control system comprises: an administrator context;
    所述根据所述虚拟网络约束条件,将基于可用资源形成的虚拟网络分配给所述用户上下文,包括:The allocating a virtual network formed based on available resources to the user context according to the virtual network constraint condition includes:
    在所述请求消息指示创建初始的用户上下文的情况下,所述管理员上下文根据所述虚拟网络约束条件,从可用资源抽象形成虚拟网络,并将所述虚拟网络分配给所述用户上下文。In the case where the request message indicates to create an initial user context, the administrator context abstracts the available resources to form a virtual network according to the virtual network constraint conditions, and allocates the virtual network to the user context.
  5. 根据权利要求4所述的方法,其中,所述虚拟网络约束条件包括网络拓扑约束;The method according to claim 4, wherein the virtual network constraint conditions include network topology constraints;
    所述管理员上下文根据所述虚拟网络约束条件,从可用资源抽象形成虚拟网络,并将所述虚拟网络分配给所述用户上下文,包括:The administrator context abstracts the available resources to form a virtual network according to the virtual network constraint conditions, and allocates the virtual network to the user context, including:
    所述管理员上下文从资源数据库中查询可用资源;The administrator context queries the available resources from the resource database;
    在所述可用资源中存在满足所述网络拓扑约束的虚拟网络的情况下,所述管理员上下文将所述虚拟网络直接分配给所述用户上下文;In the case that there is a virtual network that satisfies the network topology constraints among the available resources, the administrator context directly allocates the virtual network to the user context;
    在所述可用资源中不存在满足所述网络拓扑约束的虚拟网络的情况下,对 于所述可用资源中提供所需资源的节点和链路,直接分配相应的资源给所建的虚拟网络,在节点之间没有满足所述网络拓扑约束的链路的情况下,所述管理员上下文触发在所述节点之间建立连接,将所建立的连接抽象聚合形成虚拟链路,并将所述虚拟链路与直接分配的资源形成虚拟网络,将所述虚拟网络分配给所述用户上下文。In the case that there is no virtual network that satisfies the network topology constraints in the available resources, for the nodes and links that provide the required resources in the available resources, the corresponding resources are directly allocated to the virtual network to be built, and In the case that there are no links between nodes that meet the constraints of the network topology, the administrator context triggers the establishment of a connection between the nodes, abstractly aggregates the established connections to form a virtual link, and combines the virtual link The route and the directly allocated resources form a virtual network, and the virtual network is allocated to the user context.
  6. 根据权利要求5所述的方法,其中,所述网络管控系统还包括:网络呼叫控制器、连接控制器;The method according to claim 5, wherein the network management and control system further comprises: a network call controller and a connection controller;
    所述管理员上下文触发在所述节点之间建立连接,包括:The administrator context triggering the establishment of a connection between the nodes includes:
    所述管理员上下文给所述网络呼叫控制器发送呼叫请求,由所述网络呼叫控制器将所述呼叫请求转换成连接请求并将所述连接请求发送给所述连接控制器,由所述连接控制器根据所述连接请求建立对应的连接;或者,所述管理员上下文给所述连接控制器发送连接请求,由所述连接控制器根据所述连接请求建立对应的连接。The administrator context sends a call request to the network call controller, and the network call controller converts the call request into a connection request and sends the connection request to the connection controller. The controller establishes a corresponding connection according to the connection request; or, the administrator context sends a connection request to the connection controller, and the connection controller establishes a corresponding connection according to the connection request.
  7. 根据权利要求2所述的方法,其中,所述网络管控系统包括:已有的用户上下文;The method according to claim 2, wherein the network management and control system comprises: existing user context;
    所述根据所述虚拟网络约束条件,将基于可用资源形成的虚拟网络分配给所述用户上下文,包括:The allocating a virtual network formed based on available resources to the user context according to the virtual network constraint condition includes:
    在所述请求消息指示在所述已有的用户上下文内创建内嵌或递归的用户上下文的情况下,所述已有的用户上下文在所述已有的用户上下文的虚拟网络中,将满足所述虚拟网络约束条件的资源分配给所述已有的用户上下文的内嵌或递归的用户上下文。In the case that the request message instructs to create an embedded or recursive user context in the existing user context, the existing user context will satisfy all requirements in the virtual network of the existing user context. The resources of the virtual network constraint conditions are allocated to the embedded or recursive user context of the existing user context.
  8. 根据权利要求1所述的方法,还包括:The method according to claim 1, further comprising:
    所述网络管控系统给所述用户上下文分配标识。The network management and control system assigns an identifier to the user context.
  9. 根据权利要求1所述的方法,其中,所述用于指示创建用户上下文的请求消息还携带已有的用户上下文的标识,用于指示在所述已有的用户上下文内创建内嵌或递归的用户上下文。The method according to claim 1, wherein the request message for instructing to create a user context also carries an identifier of an existing user context, and is used to instruct to create an embedded or recursive user context in the existing user context. User context.
  10. 根据权利要求1所述的方法,其中,所述用于指示创建用户上下文的请求消息还携带用户命名空间规则;The method according to claim 1, wherein the request message for instructing to create a user context also carries user namespace rules;
    所述方法还包括:根据所述用户命名空间规则和本地命名空间规则,将所述用户上下文的约束条件从用户命名空间转换到本地命名空间。The method further includes: converting the constraint condition of the user context from the user name space to the local name space according to the user name space rule and the local name space rule.
  11. 根据权利要求1所述的方法,在所述网络管控系统创建所述用户上下文之后,还包括:The method according to claim 1, after the network management and control system creates the user context, further comprising:
    所述网络管控系统发送第一确认消息,其中,所述第一确认消息中携带所述网络管控系统创建的用户上下文的信息。The network management and control system sends a first confirmation message, where the first confirmation message carries the user context information created by the network management and control system.
  12. 根据权利要求11所述的方法,在所述网络管控系统发送第一确认消息之前,还包括:The method according to claim 11, before the network management and control system sends the first confirmation message, further comprising:
    所述网络管控系统根据用户命名空间规则和本地命名空间规则,将所述网络管控系统创建的用户上下文的信息从本地命名空间转换到用户命名空间。The network management and control system converts the user context information created by the network management and control system from the local name space to the user name space according to the user name space rules and the local name space rules.
  13. 根据权利要求1、11或12所述的方法,其中,所述网络管控系统创建的用户上下文的信息包括:所述用户上下文的标识、所述用户上下文对应的网络资源、所述网络资源的管控接口;The method according to claim 1, 11 or 12, wherein the user context information created by the network management and control system includes: an identifier of the user context, a network resource corresponding to the user context, and management and control of the network resource interface;
    所述网络资源包括以下至少之一:虚拟网络资源、物理网络资源。The network resources include at least one of the following: virtual network resources and physical network resources.
  14. 根据权利要求13所述的方法,其中,所述网络管控系统创建的用户上下文的信息还包括:用户命名空间规则、用户配置的策略。The method according to claim 13, wherein the user context information created by the network management and control system further comprises: user namespace rules and user-configured policies.
  15. 根据权利要求1所述的方法,还包括:The method according to claim 1, further comprising:
    所述网络管控系统接收用于指示更新用户上下文的请求消息,其中,所述请求消息携带待更新的用户上下文的标识以及所需更新的信息;The network management and control system receives a request message for instructing to update the user context, where the request message carries an identifier of the user context to be updated and information to be updated;
    所述网络管控系统根据所述用于指示更新用户上下文的请求消息,更新所述待更新的用户上下文;The network management and control system updates the user context to be updated according to the request message for instructing to update the user context;
    所述网络管控系统发送第二确认消息,其中,所述第二确认消息中携带更新后的用户上下文的信息。The network management and control system sends a second confirmation message, where the second confirmation message carries updated user context information.
  16. 根据权利要求15所述的方法,其中,所述网络管控系统根据所述用于指示更新用户上下文的请求消息,更新所述待更新的用户上下文,包括:The method according to claim 15, wherein the network management and control system updates the user context to be updated according to the request message for instructing to update the user context, comprising:
    在所述待更新的用户上下文的虚拟网络上存在业务的情况下,将所述业务迁移;Migrating the service when there is a service on the virtual network of the user context to be updated;
    根据所述所需更新的信息,更新所述待更新的用户上下文的虚拟网络;Update the virtual network of the user context to be updated according to the required update information;
    将所述业务恢复到更新后的虚拟网络上。Restore the service to the updated virtual network.
  17. 根据权利要求1所述的方法,还包括:The method according to claim 1, further comprising:
    所述网络管控系统接收用于指示删除用户上下文的请求消息,其中,所述请求消息携带待删除的用户上下文的标识;The network management and control system receives a request message for instructing to delete a user context, where the request message carries an identifier of the user context to be deleted;
    所述网络管控系统根据所述用于指示删除用户上下文的请求消息,删除所述待删除的用户上下文;The network management and control system deletes the user context to be deleted according to the request message for instructing to delete the user context;
    所述网络管控系统发送第三确认消息,其中,所述第三确认消息用于指示 所述待删除的用户上下文已删除。The network management and control system sends a third confirmation message, where the third confirmation message is used to indicate that the user context to be deleted has been deleted.
  18. 根据权利要求17所述的方法,其中,所述网络管控系统根据所述用于指示删除用户上下文的请求消息,删除所述待删除的用户上下文,包括:The method according to claim 17, wherein the network management and control system deletes the user context to be deleted according to the request message for instructing to delete the user context, comprising:
    在所述待删除的用户上下文为初始的用户上下文的情况下,所述网络管控系统内的管理员上下文触发释放所述待删除的用户上下文的虚拟网络所包含的虚拟链路,并更新资源数据库;In the case that the user context to be deleted is the initial user context, the administrator context in the network management and control system triggers the release of virtual links included in the virtual network of the user context to be deleted, and updates the resource database ;
    在所述待删除的用户上下文为已有用户上下文的内嵌或递归的用户上下文的情况下,所述网络管控系统内的所述已有的用户上下文删除所述内嵌或递归的用户上下文的信息,并更新资源数据库。In the case that the user context to be deleted is an embedded or recursive user context of an existing user context, the existing user context in the network management and control system deletes the embedded or recursive user context Information and update the resource database.
  19. 根据权利要求1所述的方法,其中,所述网络管控系统包括以下至少之一:软件定义网络SDN控制器、智能光网络ASON系统、网元管理系统EMS、网络管理系统NMS、管控一体化MCC系统。The method according to claim 1, wherein the network management and control system comprises at least one of the following: a software-defined network SDN controller, an intelligent optical network ASON system, a network element management system EMS, a network management system NMS, and an integrated management and control MCC system.
  20. 一种支持网络切片的方法,包括:A method to support network slicing includes:
    应用侧向网络管控系统发送用于指示创建用户上下文的请求消息,其中,所述请求消息中携带待创建的用户上下文的约束条件;The application side sends a request message for instructing to create a user context to the network management and control system, where the request message carries the constraint condition of the user context to be created;
    所述应用侧接收所述网络管控系统发送的第一确认消息,所述第一确认消息中携带所述网络管控系统创建的用户上下文的信息。The application side receives a first confirmation message sent by the network management and control system, where the first confirmation message carries the user context information created by the network management and control system.
  21. 根据权利要求20所述的方法,其中,所述网络管控系统创建的用户上下文的信息包括:所述用户上下文的标识、所述用户上下文对应的网络资源、所述网络资源的管控接口;The method according to claim 20, wherein the information of the user context created by the network management and control system comprises: an identifier of the user context, a network resource corresponding to the user context, and a management and control interface of the network resource;
    所述网络资源包括以下至少之一:虚拟网络资源、物理网络资源。The network resources include at least one of the following: virtual network resources and physical network resources.
  22. 根据权利要求21所述的方法,其中,所述网络管控系统创建的用户上下文的信息还包括:用户命名空间规则、用户配置的策略。The method according to claim 21, wherein the user context information created by the network management and control system further comprises: user namespace rules and user-configured policies.
  23. 根据权利要求20所述的方法,还包括:The method according to claim 20, further comprising:
    所述应用侧向所述网络管控系统发送用于指示更新用户上下文的请求消息,其中,所述请求消息携带待更新的用户上下文的标识以及所需更新的信息;Sending, by the application side, a request message for instructing to update the user context to the network management and control system, where the request message carries an identifier of the user context to be updated and information to be updated;
    所述应用侧接收所述网络管控系统发送的第二确认消息,其中,所述第二确认消息中携带更新后的用户上下文的信息。The application side receives a second confirmation message sent by the network management and control system, where the second confirmation message carries updated user context information.
  24. 根据权利要求20所述的方法,还包括:The method according to claim 20, further comprising:
    所述应用侧向所述网络管控系统发送用于指示删除用户上下文的请求消息,其中,所述请求消息携带待删除的用户上下文的标识;Sending, by the application side, a request message for instructing to delete the user context to the network management and control system, where the request message carries an identifier of the user context to be deleted;
    所述应用侧接收所述网络管控系统发送的第三确认消息,其中,所述第三确认消息用于指示所述待删除的用户上下文已删除。The application side receives a third confirmation message sent by the network management and control system, where the third confirmation message is used to indicate that the user context to be deleted has been deleted.
  25. 一种网络管控系统,包括:A network management and control system, including:
    接收单元,配置为接收用于指示创建用户上下文的请求消息,其中,所述请求消息中携带待创建的用户上下文的约束条件;A receiving unit, configured to receive a request message for instructing to create a user context, wherein the request message carries a constraint condition of the user context to be created;
    控制单元,配置为创建所述用户上下文。The control unit is configured to create the user context.
  26. 根据权利要求25所述的网络管控系统,其中,所述约束条件至少包括:虚拟网络约束条件;The network management and control system according to claim 25, wherein the restriction conditions include at least: virtual network restriction conditions;
    所述控制单元是配置为通过以下方式创建所述用户上下文:提供对网络资源的管控接口;根据所述虚拟网络约束条件,将基于可用资源形成的虚拟网络分配给所述用户上下文。The control unit is configured to create the user context in the following manner: providing a management and control interface for network resources; according to the virtual network constraint condition, assign a virtual network formed based on available resources to the user context.
  27. 根据权利要求25所述的网络管控系统,其中,所述控制单元还配置为给所述用户上下文分配标识。The network management and control system according to claim 25, wherein the control unit is further configured to assign an identifier to the user context.
  28. 根据权利要求26所述的网络管控系统,其中,所述控制单元包括管理员上下文;所述控制单元是配置为通过以下方式根据所述虚拟网络约束条件,将基于可用资源形成的虚拟网络分配给所述用户上下文:The network management and control system according to claim 26, wherein the control unit includes an administrator context; the control unit is configured to allocate a virtual network formed based on available resources to the virtual network based on the virtual network constraint conditions in the following manner The user context:
    在所述请求消息指示创建初始的用户上下文的情况下,所述管理员上下文根据所述虚拟网络约束条件,从可用资源抽象形成虚拟网络,并将所述虚拟网络分配给所述用户上下文。In the case where the request message indicates to create an initial user context, the administrator context abstracts the available resources to form a virtual network according to the virtual network constraint conditions, and allocates the virtual network to the user context.
  29. 根据权利要求26所述的网络管控系统,其中,所述控制单元包括已有的用户上下文;所述控制单元是配置为通过以下方式根据所述虚拟网络约束条件,将基于可用资源形成的虚拟网络分配给所述用户上下文:The network management and control system according to claim 26, wherein the control unit includes an existing user context; the control unit is configured to form a virtual network based on available resources according to the constraints of the virtual network in the following manner Assigned to the user context:
    在所述请求消息指示在所述已有的用户上下文内创建内嵌或递归的用户上下文的情况下,所述已有的用户上下文在所述已有的用户上下文的虚拟网络中,将满足所述虚拟网络约束条件的资源分配给所述已有的用户上下文的内嵌或递归的用户上下文。In the case that the request message instructs to create an embedded or recursive user context in the existing user context, the existing user context will satisfy all requirements in the virtual network of the existing user context. The resources of the virtual network constraint conditions are allocated to the embedded or recursive user context of the existing user context.
  30. 根据权利要求25所述的网络管控系统,其中,所述网络管控系统还包括:发送单元,配置为发送第一确认消息,其中,所述第一确认消息中携带所述网络管控系统创建的用户上下文的信息。The network management and control system according to claim 25, wherein the network management and control system further comprises: a sending unit configured to send a first confirmation message, wherein the first confirmation message carries a user created by the network management and control system Contextual information.
  31. 根据权利要求25或30所述的网络管控系统,其中,所述网络管控系统创建的用户上下文的信息包括:所述用户上下文的标识、所述用户上下文对应的网络资源、所述网络资源的管控接口;The network management and control system according to claim 25 or 30, wherein the user context information created by the network management and control system includes: the identifier of the user context, the network resource corresponding to the user context, and the management and control of the network resource interface;
    所述网络资源包括以下至少之一:虚拟网络资源、物理网络资源。The network resources include at least one of the following: virtual network resources and physical network resources.
  32. 根据权利要求30所述的网络管控系统,其中,所述接收单元,还配置为接收用于指示更新用户上下文的请求消息,其中,所述请求消息携带待更新的用户上下文的标识以及所需更新的信息;The network management and control system according to claim 30, wherein the receiving unit is further configured to receive a request message for instructing to update the user context, wherein the request message carries the identifier of the user context to be updated and the required update Information;
    所述控制单元,还配置为根据所述用于指示更新用户上下文的请求消息,更新所述待更新的用户上下文;The control unit is further configured to update the user context to be updated according to the request message for instructing to update the user context;
    所述发送单元,还配置为发送第二确认消息,其中,所述第二确认消息中携带更新后的用户上下文的信息。The sending unit is further configured to send a second confirmation message, wherein the second confirmation message carries updated user context information.
  33. 根据权利要求30或32所述的网络管控系统,其中,所述接收单元,还配置为接收用于指示删除用户上下文的请求消息,其中,所述请求消息携带待删除的用户上下文的标识;The network management and control system according to claim 30 or 32, wherein the receiving unit is further configured to receive a request message for instructing to delete a user context, wherein the request message carries an identifier of the user context to be deleted;
    所述控制单元,还配置为根据所述用于指示删除用户上下文的请求消息,删除所述待删除的用户上下文;The control unit is further configured to delete the user context to be deleted according to the request message for instructing to delete the user context;
    所述发送单元,还配置为发送第三确认消息,其中,所述第三确认消息用于指示所述待删除的用户上下文已删除。The sending unit is further configured to send a third confirmation message, where the third confirmation message is used to indicate that the user context to be deleted has been deleted.
  34. 一种计算机可读存储介质,存储有计算机程序,所述计算机程序被执行时实现如权利要求1至24中任一项所述的支持网络切片的方法。A computer-readable storage medium storing a computer program, which when executed, implements the method for supporting network slicing according to any one of claims 1 to 24.
PCT/CN2020/077003 2019-03-29 2020-02-27 Method for supporting network slices, network management and control system, and storage medium WO2020199807A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201910251373.9 2019-03-29
CN201910251373.9A CN111757390A (en) 2019-03-29 2019-03-29 Method for supporting network slicing and network management and control system

Publications (1)

Publication Number Publication Date
WO2020199807A1 true WO2020199807A1 (en) 2020-10-08

Family

ID=72664448

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2020/077003 WO2020199807A1 (en) 2019-03-29 2020-02-27 Method for supporting network slices, network management and control system, and storage medium

Country Status (2)

Country Link
CN (1) CN111757390A (en)
WO (1) WO2020199807A1 (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115550131A (en) * 2021-06-30 2022-12-30 中兴通讯股份有限公司 Fault processing method, device, storage medium and electronic device

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2017170122A1 (en) * 2016-04-01 2017-10-05 Nec Corporation LOAD CONTROL FROM CONTROL PLANE CIoT EPS OPTIMISATION
CN107347205A (en) * 2016-05-05 2017-11-14 电信科学技术研究院 A kind of network section system of selection, apparatus and system
CN108713327A (en) * 2015-12-29 2018-10-26 瑞典爱立信有限公司 Network node for realizing the communication in communication network and the method that executes within network nodes
CN109479335A (en) * 2016-07-05 2019-03-15 三星电子株式会社 Method and apparatus for specifying attach process and mobility and paging to support in data communication network

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108713327A (en) * 2015-12-29 2018-10-26 瑞典爱立信有限公司 Network node for realizing the communication in communication network and the method that executes within network nodes
WO2017170122A1 (en) * 2016-04-01 2017-10-05 Nec Corporation LOAD CONTROL FROM CONTROL PLANE CIoT EPS OPTIMISATION
CN107347205A (en) * 2016-05-05 2017-11-14 电信科学技术研究院 A kind of network section system of selection, apparatus and system
CN109479335A (en) * 2016-07-05 2019-03-15 三星电子株式会社 Method and apparatus for specifying attach process and mobility and paging to support in data communication network

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
"ITU-T Standard G.7702, Architecture for SDN control of transport networks; G.7702 (03/18)", SERIES G: TRANSMISSION SYSTEMS AND MEDIA, DIGITAL SYSTEMS AND NETWORKS DATA OVER TRANSPORT-GENERIC ASPECTS-TRANSPORT NETWORK CONTROL ASPECTS RECOMMENDATION, no. G.7702 (03/18), 16 March 2018 (2018-03-16), pages 1 - 44, XP044243395 *
ANONYMOUS: "ONF TR -526 Applying SDN Architecture to 5G Slicing, Issue 1", OPEN NETWORKING FOUNDATION, 30 April 2016 (2016-04-30), pages 1 - 19, XP055746837 *

Also Published As

Publication number Publication date
CN111757390A (en) 2020-10-09

Similar Documents

Publication Publication Date Title
CN112911525B (en) Message and system for influencing service route by application function
US10601656B2 (en) Network element upgrade method and device
WO2018028581A1 (en) Statement regarding federally sponsored research or development
US9999030B2 (en) Resource provisioning method
US10051527B2 (en) Systems and methods for evolved packet core cluster and session handling
WO2016107418A1 (en) Allocation method, apparatus and system for cloud network communication path
CN110896371B (en) Virtual network equipment and related method
US20140280864A1 (en) Methods of Representing Software Defined Networking-Based Multiple Layer Network Topology Views
US20150172115A1 (en) Mapping virtual network elements to physical resources in a telco cloud environment
US20170142024A1 (en) Orchestrating physical and virtual resources for delivering digital contents
CN109995641B (en) Information processing method, computing node and storage medium
CN103731307B (en) A kind of for multiple services standardized data face dynamic reconfiguration method
WO2015172362A1 (en) Network function virtualization network system, data processing method and device
CN115380513A (en) Network management system for federated multi-site logical networks
WO2015139310A1 (en) Service allocation method and related device
CN112368979B (en) Communication device, method and system
US9344360B2 (en) Technique for managing an allocation of a VLAN
US10462048B2 (en) Virtual cluster establishment method and network device
WO2019129033A1 (en) Transport network subslice management method and device
JP2016116184A (en) Network monitoring device and virtual network management method
WO2020199807A1 (en) Method for supporting network slices, network management and control system, and storage medium
JP5436597B2 (en) Virtual network infrastructure control system and method
CN116319963A (en) Service management method, system, terminal equipment and storage medium
CN105307130A (en) Resource allocation method and resource allocation system
CN113965938A (en) Slicing service system and slicing service processing method

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 20783612

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 24/02/2022)

122 Ep: pct application non-entry in european phase

Ref document number: 20783612

Country of ref document: EP

Kind code of ref document: A1