WO2023030218A1 - Network service deployment method, nfvo, and nfv system - Google Patents

Network service deployment method, nfvo, and nfv system Download PDF

Info

Publication number
WO2023030218A1
WO2023030218A1 PCT/CN2022/115397 CN2022115397W WO2023030218A1 WO 2023030218 A1 WO2023030218 A1 WO 2023030218A1 CN 2022115397 W CN2022115397 W CN 2022115397W WO 2023030218 A1 WO2023030218 A1 WO 2023030218A1
Authority
WO
WIPO (PCT)
Prior art keywords
vnf
deployment
nfvo
identifier
affinity
Prior art date
Application number
PCT/CN2022/115397
Other languages
French (fr)
Chinese (zh)
Inventor
李世涛
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Publication of WO2023030218A1 publication Critical patent/WO2023030218A1/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0894Policy-based network configuration management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/40Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks using virtualisation of network functions or resources, e.g. SDN or NFV entities

Definitions

  • the embodiment of the present application relates to the field of communication technologies, and in particular to a network service deployment method, NFVO and NFV system.
  • Network function virtualization uses general-purpose hardware devices and virtualization technologies to carry the network functions of dedicated devices in traditional networks, thereby reducing the expensive cost of deploying dedicated devices.
  • a virtualized network service (network service, NS) in NFV may include several virtualized network function modules (virtualized network function, VNF).
  • a tenant can initiate one or more NS creation requirements to the mobile network operator. Multiple NSs of the same tenant can also share or isolate resources according to the needs of the tenant, or share or isolate part of them.
  • the mobile network operator can upload the nested network service deployment template (network service descriptor, NSD) to the network functions virtualization orchestrator (network functions virtualization orchestrator, NFVO) according to the needs of the tenants, so that NFVO can deploy multiple NSs according to the nested NSD template. Isolated or shared deployments.
  • VNFs For resource saving or security considerations, some VNFs need to be deployed on different nodes, and some nodes need to be deployed on the same node.
  • tenants have partial VNF isolation requirements between different NSs, the above method can only meet the NS level. Due to the above isolation or sharing requirements, the isolation between some VNFs of different NSs cannot be achieved.
  • the embodiment of the present application provides a network service deployment method, NFVO and NFV system, so as to realize resource isolation or shared deployment among VNFs of different NSs.
  • the first aspect of the embodiment of the present application provides a network service deployment method, the method includes: the network function virtualization orchestrator NFVO acquires the first virtualized network function VNF associated with the first deployment strategy, and the first virtualized network function VNF associated with the second deployment strategy Two VNFs, the first VNF belongs to the first network service NS, the second VNF belongs to the second NS, the first NS and the second NS are different NSs, and the first deployment strategy and the second deployment strategy include the same user ID and deployment task ID, the user ID is used to indicate which tenant the corresponding VNF belongs to, and the deployment task ID corresponds to which specific deployment task the VNF belongs to.
  • the second deployment strategy also includes a first ID, which is used to indicate the affinity or Anti-affinity: NFVO determines whether the first VNF and the second VNF share resources for deployment according to the first identifier. In this way, NFVO can perceive whether the VNFs of different NSs of the same user are deployed with shared resources or isolated deployments according to the deployment strategy, thus making the deployment of VNFs more flexible.
  • a first ID which is used to indicate the affinity or Anti-affinity
  • the first NS is the deployed NS
  • the second NS is the NS to be deployed
  • the network function virtualization orchestrator NFVO acquires the first virtualized network function VNF associated with the first deployment policy
  • the network function virtualization orchestrator NFVO acquires the first virtualized network function VNF associated with the first deployment policy
  • the network function virtualization orchestrator NFVO acquires the first virtualized network function VNF associated with the first deployment policy
  • the second VNF associated with the second deployment strategy it also includes: NFVO receives an update message sent by the operation and business support system OSS/BSS, the update message is used to update the deployment strategy of the first NS, and the update message includes the first deployment strategy;
  • NFVO Obtain the first deployment policy from the update message.
  • the deployed first NS by sending an update message to the NFVO to provide the NFVO with the first deployment strategy of the first NS, so that there is no need to formulate a deployment strategy for resource sharing or isolation for the first NS when deploying the first NS,
  • formulating the first deployment policy according to the deployment requirements of the second NS can improve the flexibility of formulating the first deployment policy.
  • the first NS is the deployed NS
  • the second NS is the NS to be deployed
  • the network function virtualization orchestrator NFVO acquires the first virtualized network function VNF associated with the first deployment policy
  • the network function virtualization orchestrator NFVO acquires the first virtualized network function VNF associated with the first deployment policy
  • the network function virtualization orchestrator NFVO acquires the first virtualized network function VNF associated with the first deployment policy
  • it also includes: NFVO receives the first network service description template NSD file corresponding to the first NS uploaded by OSS/BSS, and the first NSD file includes the first deployment strategy;
  • NFVO receives from the first NSD Get the first deployment policy in the file.
  • the deployment policy can be carried in the NSD file, so that NFVO can perceive the deployment requirements of the corresponding NS when parsing the NSD file.
  • the network function virtualization orchestrator NFVO before the network function virtualization orchestrator NFVO obtains the first virtualized network function VNF associated with the first deployment strategy and the second VNF associated with the second deployment strategy, it further includes: NFVO receiving the OSS/ The request message sent by the BSS for instructing instantiation of the second NS, the request message includes the second deployment strategy; the NFVO obtains the second deployment strategy from the request message.
  • the network function virtualization orchestrator NFVO before the network function virtualization orchestrator NFVO obtains the first virtualized network function VNF associated with the first deployment strategy and the second VNF associated with the second deployment strategy, it further includes: NFVO receiving the OSS/ The request message sent by the BSS for instructing instantiation of the second NS, the request message includes the second deployment strategy; the NFVO obtains the second deployment strategy from the request message.
  • the network function virtualization orchestrator NFVO before the network function virtualization orchestrator NFVO obtains the first virtualized network function VNF associated with the first deployment strategy and the second VNF associated with the second deployment strategy, it further includes: NFVO receiving the OSS/ The second NSD file corresponding to the second NS uploaded by the BSS, the second NSD file includes the second deployment strategy; the NFVO obtains the second deployment strategy from the second NSD file.
  • the deployment policy can be carried in the NSD file, so that NFVO can perceive the deployment requirements of the corresponding NS when parsing the NSD file.
  • both the first NS and the second NS are NS to be deployed
  • the network function virtualization orchestrator NFVO acquires the first virtualized network function VNF associated with the first deployment policy, and the second deployment policy Before the associated second VNF, it includes: NFVO receives the first NSD file corresponding to the first NS uploaded by OSS/BSS and the second NSD file corresponding to the second NS, the first NSD file includes the first deployment strategy, and the second NSD file The second deployment strategy is included; the NFVO acquires the first deployment strategy from the first NSD file, and the second deployment strategy from the second NSD file.
  • the extended NSD file can carry the first deployment strategy and the second deployment strategy, so that NFVO can perceive the resources of the first NS and the second NS when parsing the NSD file Isolated or shared deployment requirements, so as to deploy the first VNF and the second VNF according to the deployment requirements.
  • the first deployment strategy and the second deployment strategy may also be carried in the request message for instantiating the first NS and the second NS sent by the OSS/BSS to the NFVO.
  • the second deployment strategy further includes a second identifier, and the second identifier is used to indicate an application scope of the second deployment strategy.
  • the second identifier includes a user scope identifier, a physical node scope identifier and a virtual node scope identifier.
  • the NFVO determining whether the first VNF and the second VNF share resources according to the first identifier includes: NFVO according to the affinity
  • the identifier and the user scope identifier determine that the first VNF and the second VNF are deployed in the same user resource pool.
  • NFVO determines whether the first VNF and the second VNF share resources for deployment according to the first identifier Including: NFVO determines that the first VNF and the second VNF are deployed on the same physical node according to the affinity ID and the physical node range ID, or determines that the first VNF and the second VNF are deployed on different physical nodes according to the anti-affinity ID and the physical node range ID. node.
  • NFVO determines whether the first VNF and the second VNF share resource deployment according to the first identifier Including: NFVO determines that the first VNF and the second VNF are deployed on the same virtual node according to the affinity identifier and the virtual node scope identifier, or determines that the first VNF and the second VNF are deployed on different virtual nodes according to the anti-affinity identifier and the virtual node scope identifier. node.
  • the first deployment strategy further includes the same first identifier and/or second identifier as the second deployment strategy.
  • the method further includes: the NFVO receives a request message for instantiating the second NS sent by the OSS/BSS; and the NFVO sends a request message for instantiating the second NS to the virtualization function manager VNFM in response to the request message.
  • An indication message where the indication message includes the location information of the instantiated second VNF, and the location information is allocated to the second VNF after the NFVO determines whether the first VNF and the second VNF share resources for deployment.
  • the NFVO instructs the VNFM to deploy the VNFs according to the deployment requirements of the tenants, so as to complete the deployment of the second NS.
  • the second aspect of the embodiment of the present application provides a network service deployment method, the method includes: the operation and service support system OSS/BS sends the first deployment strategy and the second deployment strategy to the network function virtualization orchestrator NFVO; Whether the first deployment policy and the second deployment policy include the same user ID and deployment task ID; if yes, NFVO obtains the first virtualized network function VNF associated with the first deployment policy, and the second VNF associated with the second deployment policy , the first VNF belongs to the first network service NS, and the second VNF belongs to the second NS; NFVO determines whether the first VNF and the second VNF share resources according to the first identifier in the second deployment policy, wherein the first identifier is used for Indicates the affinity or anti-affinity of the resource.
  • the method further includes: the OSS/BS sends a request message for instantiating the second NS to the NFVO; and the NFVO sends an instruction to instantiate the second VNF to the virtualized network function manager VNFM in response to the request message message, the indication message includes the location information of instantiating the second VNF, and the location information is allocated for the second VNF after the NFVO determines whether the first VNF and the second VNF share resource deployment; the VNFM instantiates the second VNF at the node corresponding to the location information according to the indication message Second VNF.
  • the third aspect of the embodiment of the present application provides a network function virtualization orchestrator NFVO, which is characterized in that the NFVO includes: an acquisition module, configured to acquire the first virtualized network function VNF associated with the first deployment policy, and the second The second VNF associated with the deployment policy, the first VNF belongs to the first network service NS, the second VNF belongs to the second NS, the first deployment policy and the second deployment policy include the same user ID and deployment task ID, and the second deployment policy also It includes a first identification, the first identification is used to indicate resource affinity or anti-affinity; a determining module is used to determine whether the first VNF and the second VNF share resources according to the first identification.
  • the NFVO further includes: a receiving module, configured to receive an update message sent by the operation and business support system OSS/BSS, the update message is used to update the deployment strategy of the first NS, and the update message includes the first Deployment strategy; an acquisition module, also used to obtain the first deployment strategy from the update message.
  • a receiving module configured to receive an update message sent by the operation and business support system OSS/BSS, the update message is used to update the deployment strategy of the first NS, and the update message includes the first Deployment strategy
  • an acquisition module also used to obtain the first deployment strategy from the update message.
  • the NFVO also includes: a receiving module, configured to receive the first network service description template NSD file corresponding to the first NS uploaded by the OSS/BSS, and the first NSD file includes the first deployment strategy; The module is further configured to obtain the first deployment policy from the first NSD file.
  • the receiving module is further configured to receive a request message sent by the OSS/BSS for instructing instantiation of the second NS, and the request message includes the second deployment strategy; the obtaining module is also configured to request Get the second deployment policy from the message.
  • the receiving module is also used to receive the second NSD file corresponding to the second NS uploaded by the OSS/BSS, and the second NSD file includes the second deployment strategy; Get the second deployment strategy from the NSD file.
  • the NFVO also includes: a receiving module, configured to receive the first NSD file corresponding to the first NS and the second NSD file corresponding to the second NS uploaded by the OSS/BSS, the first NSD file includes The first deployment strategy and the second NSD file include the second deployment strategy; the obtaining module is also used to obtain the first deployment strategy from the first NSD file and the second deployment strategy from the second NSD file.
  • the second deployment strategy further includes a second identifier, and the second identifier is used to indicate an application scope of the second deployment strategy.
  • the first identifier is an affinity identifier
  • the second identifier is a user-scope identifier
  • the determining module is specifically configured to: determine that the first VNF and the second VNF are deployed on the same site according to the affinity identifier and the user-scope identifier.
  • User resource pool is specifically configured to: determine that the first VNF and the second VNF are deployed on the same site according to the affinity identifier and the user-scope identifier.
  • the first identifier is an affinity identifier or an anti-affinity identifier
  • the second identifier is a physical node range identifier
  • the determining module is specifically configured to: determine the first VNF according to the affinity identifier and the physical node range identifier
  • the second VNF is deployed on the same physical node, or the first VNF and the second VNF are deployed on different physical nodes as determined according to the anti-affinity identifier and the physical node range identifier.
  • the first identifier is an affinity identifier or an anti-affinity identifier
  • the second identifier is a virtual node range identifier
  • the determining module is specifically configured to: determine the first VNF according to the affinity identifier and the virtual node range identifier
  • the second VNF is deployed on the same virtual node, or the first VNF and the second VNF are deployed on different virtual nodes as determined according to the anti-affinity identifier and the virtual node range identifier.
  • the first deployment strategy further includes the same first identifier and/or second identifier as the second deployment strategy.
  • the NFVO further includes: a receiving module, configured to receive a request message for instantiating the second NS sent by the OSS/BSS; a sending module, configured to send the instantiated second NS to the VNFM in response to the request message.
  • An indication message of the VNF where the indication message is used to indicate whether the second VNF is instantiated in the same resource pool/physical node/virtual node as the first VNF.
  • the fourth aspect of the embodiment of the present application provides a NFVO
  • the NFVO includes: a processor, a memory, and a transceiver, wherein the memory stores program codes, and the processor invokes the program codes stored in the memory, so that the network service deployment device executes the above-mentioned The network service deployment method in the first aspect and any possible implementation manner thereof.
  • the fifth aspect of the embodiment of the present application provides a network function virtualization NFV system, which is characterized in that the system includes an operation and business support system OSS/BSS and the above third or fourth aspect and any possible implementation thereof NFVO in: OSS/BSS is used to send to NFVO the first deployment policy and the second deployment policy including the user ID and the deployment task ID, the second deployment policy also includes the first ID, and the first ID is used to indicate the affinity of resources Or anti-affinity, the first deployment strategy is associated with the first VNF, and the second NS is associated with the second VNF; NFVO is used to determine whether the first VNF and the second VNF share resources for deployment according to the first identifier in the second deployment strategy.
  • OSS/BSS is used to send to NFVO the first deployment policy and the second deployment policy including the user ID and the deployment task ID
  • the second deployment policy also includes the first ID
  • the first ID is used to indicate the affinity of resources Or anti-affinity
  • the first deployment strategy is associated with the first VNF
  • the system further includes a virtualized network function manager VNFM; NFVO is further configured to send an indication message to the VNFM to instantiate a second VNF, the indication message includes location information for deploying the second VNF, and the location information is The NFVO determines whether the first VNF and the second VNF share resources and allocates them to the second VNF after deployment; the VNFM is used to instantiate the second VNF on the node corresponding to the location information according to the indication message.
  • VNFM virtualized network function manager
  • FIG. 1 is a schematic structural diagram of an NFV system 100 provided in an embodiment of the present application.
  • FIG. 2 is a schematic flowchart of a first embodiment of a network service deployment method provided by an embodiment of the present application
  • Figure 3 is a schematic diagram of the first NSD file provided by the application.
  • FIG. 4 is a schematic diagram of the second NSD file provided by the present application.
  • FIG. 5 is a schematic flowchart of a second embodiment of a network service deployment method provided by an embodiment of the present application.
  • FIG. 6 is a schematic flowchart of a third embodiment of a network service deployment method provided by an embodiment of the present application.
  • Figure 7 is a schematic diagram of the nested NSD file provided by the present application.
  • FIG. 8 is a schematic diagram of the first NSD file corresponding to NSD-1 in the nested NSD file provided by the present application;
  • Fig. 9 is a schematic diagram of a second NSD file corresponding to NSD-2 in a nested NSD file
  • FIG. 10 is a schematic structural diagram of an embodiment of NFVO provided by the embodiment of the present application.
  • FIG. 11 is a schematic structural diagram of another embodiment of NFVO provided by the embodiment of the present application.
  • the embodiment of the present application provides a network service deployment method, NFVO and NFV system, which are used to improve the flexibility of resource isolation or sharing during network service deployment.
  • Network function virtualization (network function virtualization, NFV), through the use of general-purpose hardware devices and virtualization technology, to carry the functions of special equipment in traditional networks, thereby reducing the expensive cost of deploying special equipment.
  • NFV network function virtualization
  • a party that can receive a virtualization request and perform virtualization processing on corresponding services according to the request is generally called a virtualization service provider, and a party that initiates a virtualization request is generally called a service requester.
  • the virtualized network service in NFV is called a network service (NS), such as an IP multimedia subsystem (IP multimedia subsystem, IMS) network service, or a 5G core network network.
  • NS network service
  • IP multimedia subsystem IP multimedia subsystem
  • VNF virtualized network function
  • the service requester first needs to submit the service description (network service descriptor, NSD) to the service provider, also known as the NS deployment template, which mainly describes the topology of the service and the included
  • VNFD is also called the deployment template of VNF, which contains virtual deployment unit (virtualization deployment unit, VDU), connection point template (connection point descriptor, CPD), virtual connection template (virtual link descriptor, VLD) and other information, where VDU can Represents a virtual machine with application software installed.
  • VDU virtualization deployment unit
  • CPD connection point template
  • VLD virtual connection template
  • VDU can Represents a virtual machine with application software installed.
  • the description of VDU will include the description of all virtual resources of the virtual machine.
  • CPD represents the connection information on the virtual machine, such as virtual network card information, including IP address or MAC Address and other information
  • VLD describes the virtual network connection requirements between VDUs, including connection type, bandwidth and other information.
  • VNFD also includes the external connection point VnfExtCpd of this VNF, and this VnfExtCpd is connected with NsVld, so as to realize the connection between VNFs.
  • FIG. 1 is a schematic structural diagram of an NFV system 100 provided in an embodiment of the present application.
  • the NFV system 100 includes an operation support system and a business support system (operations support system and business support system, OSS/BSS) 101 of a mobile network, a network functions virtualization orchestrator (network functions virtualization orchestrator, NFVO) 102, and a virtual network function manager (VNF manager, VNFM) 103, virtual infrastructure manager (virtual infrastructure management, VIM) 104, network functions virtualization infrastructure (network functions virtualization infrastructure, NFVI) 105, equipment management system (equipment management, EM) 106 and multiple A VNF107 and other functional components.
  • OSS/BSS operations support system and business support system
  • VNF manager virtualization orchestrator
  • VNFM virtual network function manager
  • VIM virtual infrastructure management
  • network functions virtualization infrastructure network functions virtualization infrastructure
  • EM equipment management system
  • multiple A VNF107 and other functional components.
  • NFVO102 is mainly responsible for handling the lifecycle management of virtualization services, as well as the allocation and scheduling of virtual infrastructure and virtual resources in NFVI105.
  • NFVO102 can communicate with one or more VNFM103 to execute resource-related requests, send configuration information to VNFM103, and collect status information of VNF107.
  • NFVO 102 may also communicate with VIM 104 to perform resource allocation, and/or reserve exchange virtualization hardware resource configuration and status information.
  • VNFM103 is responsible for lifecycle management of one or more VNFs, such as instantiating, updating, querying, scaling, and terminating VNF107.
  • VNFM103 can communicate with VNF to complete VNF107 life cycle management and exchange configuration and status information.
  • NFV is the infrastructure layer of NFV, which includes a hardware resource layer and/or a virtualization layer to establish a virtualized environment, deploy, manage and implement VNF107.
  • the hardware resource layer and/or the virtualization layer are used to provide VNFs with virtualized resources, such as virtual machines and other forms of virtual containers.
  • the hardware resource layer includes computing hardware, storage hardware, and network hardware. As an implementation manner, resources of computing hardware and storage hardware may be gathered together.
  • the virtualization layer in NFVI105 abstracts hardware resources and decouples VNF107 from the underlying hardware resource layer.
  • the virtualization layer includes virtual computing obtained by abstracting computing hardware, virtual storage obtained by abstracting storage hardware, and virtual network obtained by abstracting network hardware.
  • VIM104 controlling and managing the interaction between VNF107 and computing hardware, storage hardware, network hardware, virtual computing, virtual storage, and virtual network.
  • VIM 104 performs resource management functions, including managing infrastructure resources, allocation (such as adding resources to virtual containers) and running functions (such as collecting NFVI 105 fault information).
  • VNFM103 and VIM104 can communicate with each other, request resource allocation, and exchange virtualized hardware resource configuration and status information.
  • EM106 is a system used to configure and manage equipment in traditional telecommunication systems. In NFV system 100, EM106 can also be used to configure and manage VNF107, and initiate life cycle management such as instantiation of new VNF107 to VNFM103 operate.
  • OSS/BSS101 supports various end-to-end telecommunication services.
  • the management functions supported by OSS include: network configuration, service provision, fault management, etc.
  • BSS handles orders, payment, income, etc., and supports product management, order management, revenue management and customer management.
  • OSS/BSS101 can submit network construction requirements to OSS/BSS101, such as requirements for network bandwidth, delay, and geographical location, and OSS/BSS101 will generate corresponding deployments based on user requirements Policy, to instruct the NFV system 100 to complete the deployment of the NS according to the information in the deployment policy.
  • OSS/BSS101 a customer in an industry can also be regarded as a tenant, and network resources between different tenants can be shared or isolated according to requirements.
  • the same tenant can initiate one or more NS creation requirements to OSS/BSS101.
  • the tenant There may be a requirement for resource isolation; and in order to improve resource utilization, tenants may also have a requirement for resource sharing among multiple NSs of the same tenant.
  • resource sharing or isolation may be complete sharing or isolation between VNFs 107 of different NSs, or partial VNF sharing or partial VNF isolation.
  • OSS/BSS101 According to the resource isolation or sharing requirements of tenants for different NSs, OSS/BSS101 generates corresponding deployment policies, and each deployment policy is associated with at least one VNF107 in NS, and OSS/BSS101 sends the deployment policy to NFVO102. NFVO102 compares the parameters in different deployment strategies to determine whether the associated VNF107 needs isolation or shared resource deployment.
  • the deployment policy includes a user ID, a deployment task ID, and a first ID.
  • the user identifier is the unique identifier of the tenant in the NFV system, and is used to indicate which tenant the associated VNF 107 belongs to.
  • the deployment task identifier is used to identify a specific deployment task. If the user IDs and deployment task IDs in different deployment policies are the same, it means that these deployment policies belong to the same deployment task of the same tenant, and the VNFs 107 associated with these deployment policies need to isolate resource deployment or share resource deployment.
  • the first identifier is used to indicate the affinity or anti-affinity of the resource, and the first identifier may be an affinity identifier or an anti-affinity identifier.
  • the first identifier is an affinity identifier
  • the VNF107 associated with the same deployment task of the same tenant can share resource deployment;
  • the first identifier is an anti-affinity identifier
  • the VNF107 associated with the same deployment task of the same tenant Resource deployment needs to be isolated.
  • the deployment strategy may further include a second identifier, and the second identifier is used to indicate the application scope of the deployment strategy.
  • the second identifier may specifically be a user-scoped identifier, a physical node-scoped identifier, or a virtual node-scoped identifier.
  • the first identifier and the second identifier jointly indicate at which resource level the VNFs 107 under the same deployment task are isolated or shared.
  • NFVO102 determines the second deployment policy with the same user ID and deployment task ID according to the user ID and deployment task ID in the second deployment policy, obtains the first VNF in the first NS associated with the first deployment policy, and the second deployment policy Second, deploy the second VNF in the second NS associated with the policy.
  • the first VNF is any one of at least one VNF in the first NS
  • the second VNF is any one of at least one VNF in the second NS. Further determine whether the first VNF and the second VNF are deployed on common resources according to the first identifier and the second identifier:
  • the NFVO 102 determines that the first VNF and the second VNF are deployed in the same user resource pool.
  • the user resource pool is the physical resource and/or virtual resource allocated for the tenant corresponding to the user ID in the NFV system for the tenant to carry out business, and the resources in the user resource pool of the tenant are not shared with other tenants.
  • the NFVO 102 determines that the first VNF and the second VNF are deployed on the same physical node.
  • the NFVO 102 determines that the first VNF and the second VNF are deployed on the same virtual node.
  • the NFVO 102 determines that the first VNF and the second VNF are deployed on different physical nodes.
  • the NFVO 102 determines that the first VNF and the second VNF are deployed on different virtual nodes.
  • NFVO 102 can obtain the deployment strategy associated with each VNF 107, and then obtain other VNFs 107 belonging to the same deployment task according to the deployment strategy based on the above method, so as to determine the Whether there is a requirement for resource isolation or sharing, and determine which VNF107 resources are isolated or shared.
  • the first deployment strategy is associated with two first VNFs
  • the second deployment strategy is associated with three second VNFs
  • the user identifier and deployment task identifier in the first deployment strategy and the second deployment strategy are the same
  • the first identifier is Anti-affinity ID
  • the second ID is a physical node range ID
  • the five VNFs need to be isolated from each other, that is, they are deployed on five different physical nodes
  • the first ID is an affinity ID
  • the second ID is When the physical node range is identified, the five VNFs need to be deployed on the same physical node.
  • VNF 107 When a certain VNF 107 is associated with at least two deployment policies at the same time, that is, when the VNF 107 and at least two VNFs 107 have deployment requirements respectively, the VNF 107 needs to meet these deployment requirements at the same time during deployment. For example, after analyzing the deployment strategy, NFVO102 determines that the first VNF and the second VNF need to be deployed on separate physical nodes, and the first VNF and the third VNF in the third NS need to be deployed on the same physical node. Then, when allocating deployment resources, NFVO102 It must be satisfied that the first VNF and the second VNF are deployed on different physical nodes, and at the same time, the first VNF and the third VNF are deployed on the same physical node.
  • the NFVO102 After determining the deployment requirements of the VNF107 to be deployed, the NFVO102 sends an instruction message to the virtualization function manager VNFM103 to instantiate the VNF107 to be deployed.
  • the indication message includes instantiated location information of the second VNF to be deployed, and the location information is allocated to the second VNF after the NFVO 102 determines whether the first VNF and the second VNF share resources for deployment.
  • the location information may be a specific physical node or virtual node.
  • the location information may include Deploy the physical node or virtual node of the first VNF to instruct the VNFM103 to deploy the second VNF on the physical node or virtual node where the first VNF is located.
  • the location information can also be used to constrain the location range when the VNFM103 instantiates the second VNF.
  • the location information includes a requirement to exclude the physical node or virtual node where the first VNF is deployed, so as to instruct the VNFM103 to deploy the second VNF on a node other than the physical node or virtual node where the first VNF is located.
  • the location information may further include geographic location information, that is, which province, city, or district the second VNF is deployed in.
  • this application provides the following embodiments, so that VNFO can perceive the deployment requirements of NS, and then allocate resources for VNF 107 in NS according to the deployment requirements.
  • FIG. 2 is a schematic flowchart of a first embodiment of a network service deployment method provided in an embodiment of the present application.
  • the first NS is the NS that has been deployed earlier
  • the second NS is the NS to be deployed. This embodiment includes the following steps:
  • the OSS/BSS determines to deploy the first NS for the tenant Z according to the first requirement of the tenant Z.
  • the first requirement includes the network function desired by the tenant Z and the geographical location of the network function.
  • the OSS/BSS determines the quantity of the first VNF and the geographical location where the first VNF is deployed according to the quantity and geographical location of the network functions in the first requirement, and generates the first NSD file of the first NS.
  • tenant Z needs to establish a network and provide services for city B (such as Internet of Vehicles service or electric power service), where the control part of the network is located in central city A, and the edge server that provides transmission services for end users is located in city B, then OSS/BSS It is determined that the first NS deployed for tenant Z includes two first VNFs (VNF1 and VNF2), wherein VNF1 is located in city A as a control server, and VNF2 is located in city B as an edge server.
  • VNF1 and VNF2 two first VNFs
  • the OSS/BSS uploads the first NSD file to the NFVO, where the first NSD file includes the first deployment strategy.
  • This implementation expands the NSD file, adding a user ID field (tenantId) and a deployment task ID field (deploymentId) to the deployment policy.
  • the first NS includes two VNFs (VNF1 and VNF2), as shown in FIG. 3 , which is a schematic diagram of the first NSD file provided by this application.
  • a group is a deployment strategy
  • an NSD file may include at least one deployment strategy
  • a deployment strategy may be associated with at least one VNF.
  • an NSD file can include 1 deployment strategy, 2 deployment strategies, 4 deployment strategies, 5 deployment strategies or more, and a VNF can also be associated with 1, 3 or more deployment strategies The association is specifically adjusted according to requirements, which is not limited in this application.
  • the affinityOrAntiAffinityGroupId field defines the deployment strategy associated with the VNF.
  • VNF1 is associated with two first deployment strategies (group_1, group_3)
  • VNF2 is also associated with two first deployment strategies (group_2, group_3).
  • affinityOrAntiAffinity is a first identification field, which is used to define a first identification, and the first identification may be affinity (ie, affinity identification) or AntiAffinity (ie, anti-affinity identification). This field is specifically used to indicate whether the VNF associated with the deployment policy is affinity (shared) or AntiAffinity (isolated).
  • Scope is the second identification field, which defines the application scope of the deployment policy.
  • the second identifier may be a user-wide identifier (tenant), a physical node-wide identifier (NFVI_NODE) or a virtual node-wide identifier (VM).
  • tenant is a newly added Scope parameter in this application.
  • the combination of the first identifier and the second identifier can determine which scope affinity or anti-affinity the VNF associated with the deployment policy is. For example, when the first identifier is affinity (affinity identifier) and the second identifier is tenant, it indicates that the NFVO allocates resources for the VNF associated with the deployment policy from the user resource pool of the tenant. Exemplarily, both VNF1 and VNF2 are associated with group3, indicating that VNF1 and VNF2 need to be deployed in the same user resource pool.
  • each parameter in the first deployment strategy may not be assigned a value. That is, the affinityOrAntiAffinityGroupId, Scope, tenantId, and deploymentId in group1, group2, and group3 are all empty. It is also possible to only assign values to Scope and tenantId in group3, while other groups and other groups are not assigned values.
  • the NFVO returns an upload success response to the OSS/BSS.
  • the OSS/BSS initiates a request to the NFVO to create the first NS instance ID of the first NS, and the request includes the file identifier of the first NSD file.
  • the NFVO returns the first NS instance ID created for the first NS to the OSS/BSS.
  • the NFVO determines the first NSD file whose instance ID is to be created according to the file identifier, so as to associate the created first NS instance ID with the first NS.
  • the first NS instance ID is used to uniquely identify the first NS. If the message carries the first NS instance ID during the subsequent message exchange between the NFVO and the OSS/BSS, it can be determined according to the first NS instance ID that the message acts on the first NS.
  • the OSS/BSS sends a first request message for instantiating the first NS to the NFVO.
  • the first request message carries the first NS instance ID.
  • the first request message is used to instruct the NFVO to trigger the first VNF instantiation process in the first NS.
  • the deployment geographic location information of the first VNF may also be carried in the first request message.
  • VNF1 is located in city A
  • VNF2 is located in city B.
  • the first request message also carries the deploymentId and tenant_id information assigned to each group.
  • the allocation information in this embodiment is as follows:
  • tenantId tenant-A
  • tenantId tenant-A
  • tenantId tenant-A
  • the NFVO determines the first VNF that needs to be instantiated according to the first request message and the first NSD file.
  • the NFVO sends an instruction message for instantiating the first VNF to the VNFM.
  • VNFM needs to initiate a resource authorization request to NFVO respectively, and NFVO carries the user resource pool information for allocating resources in the authorization reply message. Since both VNF1 and VNF2 are associated with group_3, they need to be deployed in In the same user resource pool, the user resource pool information carried in the authorization response messages that NFVO replies to VNFM respectively is the same.
  • the NFVO applies to the VIM for creating the first VL instance included in the first NSD file.
  • the VNFM returns to the NFVO a response that the first VNF instance is created successfully.
  • VIM returns to the NFVO a response that the first VL instance is created successfully.
  • the NFVO returns a first NS creation success response to the OSS/BSS.
  • the OSS/BSS determines to deploy a second NS for the tenant Z according to the second requirement of the tenant Z.
  • the second requirement includes the network function desired by the tenant Z and the geographical location of the network function.
  • the OSS/BSS determines the quantity of the second VNF and the geographical location where the second VNF is deployed according to the quantity and geographical location of the network functions in the second requirement, and generates the second NSD file of the second NS.
  • the second NSD file can use the same file as the first NSD file.
  • the second NSD file may also adopt a file different from the first NSD file.
  • tenant Z expects to deploy a new network, which requires the network control part to be located in central city A, the edge server that provides data caching to be located in city B, and some network functions located in central city A do not require isolation, from resource utilization In terms of rate, the part deployed by the tenant in the central city can be shared.
  • the OSS/BSS determines that the second NS deployed for the tenant includes two second VNFs (VNF3 and VNF4).
  • the OSS/BSS uploads a second NSD file to the NFVO, where the second NSD file includes the second deployment strategy.
  • FIG. 4 is a schematic diagram of the second NSD file provided by the present application.
  • the OSS/BSS sends a second request message for instantiating the second NS to the NFVO.
  • the second request message carries the deployment task identifier assigned to the second NS, the first identifier and the second identifier of the user representation.
  • the allocation information of the second deployment strategy is as follows:
  • the NFVO executes the process of instantiating the second VNF according to the second request message and the second NSD file.
  • NFVO searches other stored deployment policies for a deployment policy with the same user ID and deployment task ID, and determines that the first deployment policy and the second deployment policy include the same The user ID and deployment task ID for .
  • the NFVO acquires the first VNF associated with the first deployment strategy, the second VNF associated with the second deployment strategy, and the first identifier in the second deployment strategy. Determine whether the first VNF and the second VNF are deployed with shared resources or deployed with isolated resources according to the first identifier.
  • group_3 with the same tenantId and deploymentId is found according to tenantId: tenant-A and deploymentId: ID-xyz, that is, group_3 of the first NS is the same as group_c of the second NS.
  • tenantId tenant-A
  • deploymentId ID-xyz
  • group_3 of the first NS is the same as group_c of the second NS.
  • VNF3 and VNF4 associated with group_c and VNF1 and VNF2 associated with group_3 need to meet the same deployment policy.
  • affinityOrAntiAffinity and scope information of group_c it is confirmed that VNF1, VNF2, VNF3 and VNF4 all belong to the same tenant, and the resources all belong to the same user resource pool.
  • the second deployment strategy is group_a
  • find group_1 with the same tenantId and deploymentId according to tenantId: tenant-A and deploymentId: ID-123 that is, group_1 of the first NS is the same as group_a of the second NS
  • group_1 is deployed
  • the associated VNF1 and the VNF3 associated with group_c need to meet the same deployment policy.
  • the policy of group_c is the affinity of scope as VM, that is, the VNF3 associated with group_c and the VNF1 associated with group_1 can be deployed in a virtual machine (VM), that is, VNF3 can be shared with VNF1 The same VNF instance.
  • VM virtual machine
  • NFVO does not need to initiate a new VNF3 instantiation process, and judges whether the resources on the VNF1 instance in the first NS meet the requirements of VNF3, and if so, directly allocates the VNF1 instance to the second NS. If the resources on the VNF1 instance are insufficient to meet the requirements of VNF3, the capacity of VNF_1 will be expanded and then allocated to the second NS.
  • group_2 with the same tenantId and deploymentId is found according to tenantId: tenant-A and deploymentId: ID-ABC, that is, group_2 of the first NS is the same as group_b of the second NS.
  • tenant-A and deploymentId ID-ABC
  • group_2 of the first NS is the same as group_b of the second NS.
  • VNF2 associated with group_2 and VNF4 associated with group_b must meet the same deployment policy.
  • affinityOrAntiAffinity and scope information of group_b confirm that the policy of group_b is the anti-affinity scope of NFVI-NODE, that is, the VNF4 associated with group_b and the VNF2 associated with group_2 need to be isolated and deployed on physical machines (NFVI-NODE).
  • NFVO initiates the instantiation process of VNF4 to VNFM, and instructs VNFM to deploy the user resource pool information of VNF4 instance as in step 208, but the physical machine selected for deployment is different from the VNF2 deployed on the first NS.
  • VNFVO allocates resources for the VNF in accordance with these deployment strategies. For example, VNF2 is associated with group2 and group3, VNF4 is associated with groupb and groupc, group2 is the same as groupb, and group3 is the same as groupc, then VNF2 and VNF4 must be deployed in the same user resource pool and must be deployed on different physical nodes requirements.
  • the location and the remaining resources in the user resource pool can be used to allocate resources to these VNFs, which may be deployed on the same physical node or virtual node, or may be deployed on different physical nodes or different virtual nodes.
  • the NFVO sends an indication message for instantiating the second VNF to the VNFM, and the indication message carries the location information of the second VNF.
  • the instruction message carries location information such as city B information, user resource pool information, and information on nodes not shared with VNF2, so that VNFM selects qualified physical nodes to deploy VNF4 based on these information.
  • NFVO can perceive the deployment requirements of tenants based on these parameters, so as to complete the deployment of network services according to the deployment requirements, so that VNFs between different NSs can flexibly isolate resource deployment or share resource deployment, improving network service security and resource utilization.
  • FIG. 5 is a schematic flowchart of a second embodiment of a network service deployment method provided in an embodiment of the present application.
  • the difference from the first embodiment of the network service deployment method is that in this embodiment, the timing and carrier of the first deployment policy sent by the OSS/BSS to the NFVO are different.
  • This embodiment includes the following steps:
  • Steps 301-312 are similar to steps 201-212. The difference is that in this embodiment, there is no need to expand the NSD template, that is, there is no need to update the NSD file. There is no user identification field and deployment task identification field in the first NSD file. The second identifier also has no user scope identifier. In the first request message, there is no need to assign a user ID and a deployment task ID to the first NS.
  • the OSS/BSS chooses to deploy the second NS to provide services for the tenant Z according to the second requirement.
  • the OSS/BSS sends an update message to the NFVO, where the update message is used to add the first deployment policy to the first NS.
  • the first deployment strategy may have the following two application scenarios:
  • the first deployment strategy can be a deployment strategy at the NS level, which instructs the first NS to isolate or share resources with other NSs.
  • Each VNF in the first NS is associated with the first deployment strategy, which can be applied to A scenario where all VNFs in the second NS need to isolate or share resources from all VNFs in the first NS.
  • the specific content of the first deployment strategy is as follows:
  • NS_1_id is the first NS instance ID, and the meanings of other parameters are as explained in the first embodiment, so they are not repeated here, and are used here to associate the first NS with the first deployment strategy. That is, a second deployment strategy is defined, which is an anti-affinity feature whose scope is nfvi-node (physical node scope), and whose object is the entire first NS (NS_1) instance.
  • the first deployment strategy can also be a deployment strategy at the VNF level, that is, the first deployment strategy can only be associated with some VNFs in the first NS, and only limit the resource isolation or sharing of the associated VNFs. It is applied to a scenario where some second VNFs need to be isolated or shared with some first VNF resources.
  • the specific content of each first deployment strategy is as follows:
  • VNF_1_id is the instance ID of VNF1
  • VNF_2_id is the instance ID of VNF2, which are allocated by NFVO.
  • VNF_1_id is used to associate the first VNF with the first deployment strategy
  • VNF_2_id is used to associate the second VNF with the second deployment strategy.
  • the OSS/BSS uploads the second NSD file of the second NS to the NFVO.
  • the second NSD file does not update and expand the NSD file, that is, the second NSD file does not include user identification fields, deployment task fields, and the like.
  • the OSS/BSS sends a second request message for instantiating the second NS to the NFVO, where the second request message carries the second deployment policy.
  • the second request message contains the second deployment strategy.
  • the first identifier, second identifier, user identifier, and deployment task identifier in the second deployment strategy are the same as those in the first deployment strategy, indicating that the deployment of the second NS is the same as that of the first NS.
  • the tenant's requirement is that the second NS is isolated from the physical machine of the first NS, that is, each second VNF in the second NS is not deployed on a physical machine with any first VNF in the first NS, then the first
  • the details of the second deployment strategy are as follows:
  • the NFVO determines according to the first deployment strategy and the second deployment strategy that the first NS instance and the second NS instance need physical machine isolation. Since the tenantId of the first deployment strategy and the second deployment strategy are both tenant-A, it means that the first NS and the second NS belong to the same tenant and need to be deployed in the same user resource pool.
  • each second deployment strategy is as follows:
  • the number of deployment strategies carried in the second request message may also be adjusted according to actual needs.
  • the second request message may also include the following second deployment strategy:
  • the NFVO executes the process of instantiating the second VNF according to the second request message and the second NSD file.
  • This step is similar to step 216, that is, by matching the first deployment strategy and the second deployment strategy with the same user identifier and deployment task identifier, and then determining the first deployment strategy and the second deployment strategy according to the first identifier and the second identifier Whether resource sharing or resource isolation between associated VNFs is omitted here.
  • the physical nodes deployed by all the second VNFs are different from the physical nodes deployed by all the first VNFs.
  • VNF1 and VNF3 are deployed on virtual machine nodes, and VNF2 and VNF4 are deployed on isolated physical nodes.
  • the OSS/BSS obtains the requirements of the tenants, then generates the first deployment strategy of the first NS, and sends the first deployment strategy of the first NS to NFVO, so that the first deployment strategy And the formulation of the second deployment strategy is more flexible.
  • OSS/BSS can provide the first deployment strategy to NFVO through the first NSD file as a carrier, and provide the second strategy to NFVO through the second request message as a carrier, that is, steps 201 to 212, and steps Steps 313 to 321 are combined as one embodiment.
  • OSS/BSS can also provide the first deployment strategy to NFVO through the update message as the carrier, and provide the second strategy to NFVO through the second NSD file as the carrier, that is, steps 301 to 312, and steps 212 to 218 are combined as an embodiment . This application is not limited to this.
  • FIG. 6 is a schematic flowchart of a third embodiment of a network service deployment method provided in an embodiment of the present application.
  • the tenant needs to deploy at least two NSs, that is, both the first NS and the second NS are NSs to be deployed.
  • this embodiment It is achieved through the following steps:
  • OSS/BSS uses nested NSD files to deploy a network for tenant Z according to at least two network requirements of tenant Z.
  • the nested NSD file contains NSD file identifiers of two NSD files, and the NSD file corresponding to each NSD file identifier is used to deploy an NS.
  • FIG. 7 is a schematic diagram of a nested NSD file provided by this application.
  • the nested NSD file contains two NSD file identifiers, namely NSD-1 and NSD-2.
  • the first NSD file corresponding to NSD-1 and the second NSD file corresponding to NSD-2 are used to deploy the two networks required by the tenant, among which VNF1 in the first NS and VNF3 in the second NS need to be deployed In the central city A, it is deployed on the same physical machine; VNF2 in the first NS is deployed in city B, and VNF4 in the second NS is deployed in city C, and they are isolated from each other.
  • the first NSD file corresponding to NSD-1 in the nested NSD file includes the content shown in Figure 8
  • the second NSD file corresponding to NSD-2 in the nested NSD file includes the content shown in Figure 9 content.
  • FIG. 8 is a schematic diagram of a first NSD file corresponding to NSD-1 in the nested NSD files provided by the present application
  • FIG. 9 is a schematic diagram of a second NSD file corresponding to NSD-2 in the nested NSD files.
  • the deployment policy used to indicate that the associated VNF is deployed in the tenant's resource pool (including the deployment policy of the user scope identifier, that is, the deployment policy whose scope is tenant, such as group_3, group_c), due to the application of the deployment policy
  • the scope is all VNFs of the tenant, not only some VNFs of the tenant, and the deployment task ID in all deployment policies can be empty.
  • the deployment task ID in the deployment strategy may not be empty, and this application does not limit this.
  • the first deployment strategy and the second deployment strategy have the same first identifier and second identifier in addition to the same user identifier and deployment task identifier.
  • first deployment strategy and the second deployment strategy have the same user ID and deployment task ID
  • only one of the first deployment strategy and the second deployment strategy may have the first ID and the second ID. This application is not limited.
  • the OSS/BSS uploads the nested NSD file, the first NSD file and the second NSD file to the NFVO, and applies to the NFVO for the first NS instance ID of the first NS and the second NS instance ID of the second NS instance.
  • Steps 402-405 are similar to steps 202 to 205, so details will not be repeated here.
  • the OSS/BSS sends a first request message for instantiating the first NS and the second NS to the NFVO.
  • the NFVO executes a process of instantiating the second VNF according to the first request message and the nested NSD file, the first NSD file, and the second NSD file.
  • NFVO compares at least one first deployment strategy in the first NSD file and at least one second deployment strategy in the second NSD file, and determines the first deployment strategy and the second deployment strategy with the same user ID and deployment task ID. Policy, to determine whether the associated first VNF and the second VNF share resource deployment.
  • NFVO obtains and parses the nested NSD file, obtains the first NSD file according to the first NSD file identifier in the nested NSD file, and obtains the second NSD file according to the second NSD file.
  • NFVO determines that the affinityOrAntiAffinity in group_3 in the first NSD file and group_c in the second NSD file are both AFFINITY, the scope is both tenant and the tenantID is tenant-A, then determine the VNF1 and VNF2 associated with group_3 and the VNF associated with group_c Both VNF3 and VNF4 are deployed in the same user resource pool.
  • group_1 in the first NSD file and group_a in the second NSD file have the same tenantId and deploymentId, thus indicating that group_a and group_1 have the same deployment strategy, and their associated objects VNF1 and VNF3 need to follow the same deployment strategy.
  • the affinityOrAntiAffinity in group_a and group_1 is AFFINITY, and the scope is NFVI-NODE, that is, VNF1 and VNF3 have affinity on physical nodes and need to be deployed on the same physical node.
  • group_2 in the first NSD file and group_b in the second NSD file have the same tenantId and deploymentId, thus indicating that group_2 and group_b have the same deployment strategy, and their associated objects VNF2 and VNF4 need to follow the same deployment strategy deployment strategy.
  • the affinityOrAntiAffinity in group_2 and group_b is AntiAffinity, and the scope is NFVI-NODE, that is, VNF2 and VNF4 are anti-affinities of physical nodes, and need to be deployed on different physical nodes.
  • the NFVO may first send an instruction message to the VNFM to instantiate the first VNF to complete the deployment of the first NS, and receive the physical node or virtual node information returned by the VNFM to deploy the first VNF. Then according to the affinity and anti-affinity relationship determined by the associated deployment strategy between the second VNF and the first VNF, the NFVO sends an instruction message to instantiate the second VNF to the VNFM, and the instruction message carries the physical node or virtual node information of the first VNF , so that the VNFM deploys the second VNF on the same physical node or virtual node, or on different physical nodes or virtual nodes.
  • the NFVO may first instruct the VNFM to complete the deployment of the VNF1 and VNF2 in the first NS according to the first NSD file, and obtain the physical nodes on which the VNF1 and VNF2 are deployed. Then instruct the VNFM to complete the deployment of VNF3 and VNF4 according to the second NSD file.
  • VNF3 may be deploying VNF3, according to the physical node where the deployed VNF1 is located, it is provided to the VNFM to complete the deployment of VNF3, so as to realize the common physical machine deployment of VNF1 and VNF3.
  • VNF4 When deploying VNF4, according to the physical node where the deployed VNF2 is located, provide it to VNFM and instruct VNFM to use different physical nodes to complete the deployment of VNF4, so as to realize the isolated deployment of physical nodes of VNF2 and VNF4.
  • Steps 408-411 are similar to steps 209-212 and will not be repeated here.
  • the corresponding deployment strategy is uploaded to NFVO by means of nested NSD, so that NFVO can use the user identifier, deployment task identifier, first identifier, and second Identify and determine the deployment requirements among the VNFs of multiple NSs, so as to allocate resources for the VNFs in these NSs according to the deployment requirements, and complete the deployment of NSs.
  • the NSD file may not be expanded, that is, the first deployment strategy and the second deployment strategy are not carried in the NSD file, but the OSS/BSS requests the instantiation of the first NS and the second NS.
  • the message carries the first deployment strategy and the second deployment strategy. For details, refer to the update message or the format of the deployment strategy in the second request message in the second embodiment of the network service deployment method, so details are not repeated here.
  • FIG. 10 is a schematic structural diagram of an embodiment of NFVO provided by the embodiment of the present application.
  • NFVO500 includes:
  • the obtaining module 501 is configured to obtain a first virtualized network function VNF associated with the first deployment strategy and a second VNF associated with the second deployment strategy, the first VNF belongs to the first network service NS, and the second VNF belongs to the second NS,
  • the first deployment strategy and the second deployment strategy include the same user identifier and deployment task identifier, and the second deployment strategy further includes a first identifier, and the first identifier is used to indicate resource affinity or anti-affinity.
  • a determining module 502 configured to determine whether the first VNF and the second VNF are deployed on the same resource according to the first identifier.
  • NFVO500 also includes a receiving module 503, configured to receive an update message sent by the operation and business support system OSS/BSS, the update message is used to update the deployment strategy of the first NS, and the update message includes the first deployment strategy .
  • the acquiring module 501 is also configured to acquire the first deployment strategy from the update message.
  • NFVO500 further includes a receiving module 503, configured to receive a first network service description template NSD file corresponding to the first NS uploaded by the OSS/BSS, and the first NSD file includes the first deployment strategy.
  • the acquiring module 501 is further configured to acquire the first deployment strategy from the first NSD file.
  • the receiving module 503 is further configured to receive a request message sent by the OSS/BSS for instructing instantiation of the second NS, where the request message includes the second deployment strategy.
  • the acquiring module 501 is further configured to acquire the second deployment policy from the request message.
  • the receiving module 503 is further configured to receive a second NSD file corresponding to the second NS uploaded by the OSS/BSS, where the second NSD file includes the second deployment strategy.
  • the acquiring module 501 is further configured to acquire the second deployment policy from the second NSD file.
  • the receiving module 503 is configured to receive the first NSD file corresponding to the first NS and the second NSD file corresponding to the second NS uploaded by the OSS/BSS, the first NSD file includes the first deployment strategy, the second NSD file The second NSD file includes the second deployment policy.
  • the acquiring module 501 is also configured to acquire the first deployment strategy from the first NSD file and the second deployment strategy from the second NSD file.
  • the second deployment strategy further includes a second identifier, and the second identifier is used to indicate the scope of application of the second deployment strategy.
  • the first identifier is an affinity identifier
  • the second identifier is a user-scope identifier
  • the determination module 502 is specifically configured to determine that the first VNF and the second VNF are deployed on the same user according to the affinity identifier and the user-scope identifier. resource pool.
  • the first identifier is an affinity identifier or an anti-affinity identifier
  • the second identifier is a physical node range identifier
  • the determining module 502 is specifically configured to determine the first VNF and The second VNF is deployed on the same physical node, or it is determined according to the anti-affinity identifier and the physical node range identifier that the first VNF and the second VNF are deployed on different physical nodes.
  • the first identifier is an affinity identifier or an anti-affinity identifier
  • the second identifier is a virtual node range identifier
  • the determination module 02 is specifically configured to determine the first VNF and The second VNF is deployed on the same virtual node, or it is determined according to the anti-affinity identifier and the virtual node range identifier that the first VNF and the second VNF are deployed on different virtual nodes.
  • the first deployment strategy further includes the same first identifier and/or second identifier as the second deployment strategy.
  • the receiving module 503 is configured to receive a request message for instantiating the second NS sent by the OSS/BSS.
  • NFVO500 also includes a sending module 504, configured to send an indication message of instantiating a second VNF to the VNFM in response to the request message, where the indication message is used to indicate whether the second VNF is instantiated in the same resource pool/physical node/virtual node as the first VNF .
  • FIG. 11 is a schematic structural diagram of another embodiment of NFVO provided by the embodiment of the present application.
  • the NFVO 600 may include one or more processors 601, a memory 602, and a transceiver 603, and the memory 602 stores one or more application programs or data.
  • the transceiver 603 is used to send and receive messages with the transceivers of the OSS/BSS and the VNFM.
  • the processor 601 may be one or more chips, or one or more integrated circuits.
  • the processor 601 may be one or more field-programmable gate array (field-programmable gate array, FPGA), application specific integrated circuit (ASIC), system chip (system on chip, SoC), central processing Central processor unit (CPU), network processor (network processor, NP), digital signal processing circuit (digital signal processor, DSP), microcontroller (micro controller unit, MCU), programmable logic device (programmable logic device , PLD) or other integrated chips, or any combination of the above chips or processors, etc.
  • field-programmable gate array field-programmable gate array
  • ASIC application specific integrated circuit
  • SoC system on chip
  • CPU central processing Central processor unit
  • network processor network processor
  • DSP digital signal processing circuit
  • microcontroller microcontroller
  • programmable logic device programmable logic device
  • PLD programmable logic device
  • Memory 602 may be volatile storage or persistent storage.
  • the program stored in the memory 602 may include one or more modules, and each module may include a series of instructions to operate on the server.
  • the processor 601 may be configured to communicate with the memory 602 , and execute a series of instruction operations in the memory 602 on the NFVO 600 .
  • the processor 601 may execute the operations performed by the NFVO in the foregoing embodiments shown in FIGS. 2 to 4 , and details are not described here again.
  • the disclosed system, device and method can be implemented in other ways.
  • the device embodiments described above are only illustrative.
  • the division of the units is only a logical function division. In actual implementation, there may be other division methods.
  • multiple units or components can be combined or May be integrated into another system, or some features may be ignored, or not implemented.
  • the mutual coupling or direct coupling or communication connection shown or discussed may be through some interfaces, and the indirect coupling or communication connection of devices or units may be in electrical, mechanical or other forms.
  • the integrated unit is realized in the form of a software function unit and sold or used as an independent product, it can be stored in a computer-readable storage medium.
  • the technical solution of the present application is essentially or part of the contribution to the prior art or all or part of the technical solution can be embodied in the form of a software product, and the computer software product is stored in a storage medium , including several instructions to make a computer device (which may be a personal computer, a server, or a network device, etc.) execute all or part of the steps of the methods described in the various embodiments of the present application.
  • the aforementioned storage media include: U disk, mobile hard disk, read-only memory (ROM, read-only memory), random access memory (RAM, random access memory), magnetic disk or optical disc, etc., which can store program codes. .

Abstract

Disclosed in embodiments of the present application are a network service deployment method, a network function virtualization orchestrator (NFVO), and an NFV system, for use in improving the flexibility of resource isolation or sharing during network service deployment. The method in the embodiments of the present application comprises: an NFVO obtaining a first virtualized network function (VNF) associated with a first deployment policy and a second VNF associated with a second deployment policy, the first VNF and the second VNF belonging to different NSs, the first deployment policy and the second deployment policy comprising the same user identifier and deployment task identifier, the second deployment policy further comprising a first identifier, and the first identifier being used for indicating the affinity or anti-affinity of a resource; and the NFVO determining, according to the first identifier, whether the first VNF and the second VNF are in common resource deployment.

Description

网络业务部署方法、NFVO以及NFV系统Network service deployment method, NFVO and NFV system
本申请要求于2021年8月31日提交中国专利局、申请号为202111017188.7、发明名称为“网络业务部署方法、NFVO以及NFV系统”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。This application claims the priority of the Chinese patent application with the application number 202111017188.7 and the title of the invention "Network Service Deployment Method, NFVO and NFV System" filed with the China Patent Office on August 31, 2021, the entire contents of which are incorporated herein by reference Applying.
技术领域technical field
本申请实施例涉及通信技术领域,特别涉及一种网络业务部署方法、NFVO以及NFV系统。The embodiment of the present application relates to the field of communication technologies, and in particular to a network service deployment method, NFVO and NFV system.
背景技术Background technique
网络功能虚拟化(network function virtualization,NFV),通过使用通用的硬件设备及虚拟化技术,来承载传统网络中专用设备的网络功能,从而降低因为部署专用设备带来的昂贵成本。NFV中虚拟化的网络业务(network service,NS)中可以包含若干个虚拟化网络功能模块(virtualised network function,VNF)。Network function virtualization (network function virtualization, NFV) uses general-purpose hardware devices and virtualization technologies to carry the network functions of dedicated devices in traditional networks, thereby reducing the expensive cost of deploying dedicated devices. A virtualized network service (network service, NS) in NFV may include several virtualized network function modules (virtualized network function, VNF).
租户可以向移动网络运营商发起一个或多个NS创建的需求,同一个租户的多个NS之间,根据租户的需求也可以资源共享或隔离,或者部分共享,部分隔离。移动网络运营商可以根据租户需求向网络功能虚拟化编排器(network functions virtualisation orchestrator,NFVO)上传嵌套网络业务部署模板(network service descriptor,NSD),以使NFVO根据嵌套NSD模板将多个NS隔离或共享部署。A tenant can initiate one or more NS creation requirements to the mobile network operator. Multiple NSs of the same tenant can also share or isolate resources according to the needs of the tenant, or share or isolate part of them. The mobile network operator can upload the nested network service deployment template (network service descriptor, NSD) to the network functions virtualization orchestrator (network functions virtualization orchestrator, NFVO) according to the needs of the tenants, so that NFVO can deploy multiple NSs according to the nested NSD template. Isolated or shared deployments.
出于节省资源或安全性的考虑,有些VNF需要部署在不同的节点,有些节点需要部署在同一节点上,当租户有不同NS之间的部分VNF隔离需求时,上述方法只能满足NS这个层次上的隔离或共享需求,无法实现不同NS的部分VNF之间的隔离。For resource saving or security considerations, some VNFs need to be deployed on different nodes, and some nodes need to be deployed on the same node. When tenants have partial VNF isolation requirements between different NSs, the above method can only meet the NS level. Due to the above isolation or sharing requirements, the isolation between some VNFs of different NSs cannot be achieved.
发明内容Contents of the invention
本申请实施例提供了一种网络业务部署方法、NFVO以及NFV系统,以实现不同的NS的VNF之间的资源隔离或共享部署。The embodiment of the present application provides a network service deployment method, NFVO and NFV system, so as to realize resource isolation or shared deployment among VNFs of different NSs.
本申请实施例第一方面提供了一种网络业务部署方法,该方法包括:网络功能虚拟化编排器NFVO获取第一部署策略关联的第一虚拟化网络功能VNF,以及第二部署策略关联的第二VNF,第一VNF属于第一网络业务NS,第二VNF属于第二NS,第一NS和第二NS为不同的NS,第一部署策略和第二部署策略包括相同的用户标识和部署任务标识,用户标识用于指示对应的VNF属于哪一租户,部署任务标识对应的VNF属于哪一个具体的部署任务,第二部署策略还包括第一标识,第一标识用于指示资源的亲和或反亲和;NFVO根据第一标识确定第一VNF与第二VNF是否共资源部署。如此,NFVO根据部署策略能够感知同一用户的不同的NS的VNF之间是共享资源部署,还是隔离部署,从而使得VNF的部署更加灵活。The first aspect of the embodiment of the present application provides a network service deployment method, the method includes: the network function virtualization orchestrator NFVO acquires the first virtualized network function VNF associated with the first deployment strategy, and the first virtualized network function VNF associated with the second deployment strategy Two VNFs, the first VNF belongs to the first network service NS, the second VNF belongs to the second NS, the first NS and the second NS are different NSs, and the first deployment strategy and the second deployment strategy include the same user ID and deployment task ID, the user ID is used to indicate which tenant the corresponding VNF belongs to, and the deployment task ID corresponds to which specific deployment task the VNF belongs to. The second deployment strategy also includes a first ID, which is used to indicate the affinity or Anti-affinity: NFVO determines whether the first VNF and the second VNF share resources for deployment according to the first identifier. In this way, NFVO can perceive whether the VNFs of different NSs of the same user are deployed with shared resources or isolated deployments according to the deployment strategy, thus making the deployment of VNFs more flexible.
在一些可能实现的实施方式中,第一NS为已部署的NS,第二NS为待部署的NS,网络功能虚拟化编排器NFVO获取第一部署策略关联的第一虚拟化网络功能VNF,以及第二部署策略关联的第二VNF之前,还包括:NFVO接收运营和业务支持系统OSS/BSS发送的更新消息,更新消息用于更新第一NS的部署策略,更新消息包括第一部署策略;NFVO从更新消息中获取 第一部署策略。对于已部署的第一NS,通过向NFVO发送更新消息以向NFVO提供第一NS的第一部署策略,从而无需在部署第一NS时为第一NS制定用于资源共享或隔离的部署策略,在部署第二NS时,根据第二NS的部署需求制定第一部署策略,能够提高制定第一部署策略的灵活性。In some possible implementation manners, the first NS is the deployed NS, the second NS is the NS to be deployed, and the network function virtualization orchestrator NFVO acquires the first virtualized network function VNF associated with the first deployment policy, and Before the second VNF associated with the second deployment strategy, it also includes: NFVO receives an update message sent by the operation and business support system OSS/BSS, the update message is used to update the deployment strategy of the first NS, and the update message includes the first deployment strategy; NFVO Obtain the first deployment policy from the update message. For the deployed first NS, by sending an update message to the NFVO to provide the NFVO with the first deployment strategy of the first NS, so that there is no need to formulate a deployment strategy for resource sharing or isolation for the first NS when deploying the first NS, When deploying the second NS, formulating the first deployment policy according to the deployment requirements of the second NS can improve the flexibility of formulating the first deployment policy.
在一些可能实现的实施方式中,第一NS为已部署的NS,第二NS为待部署的NS,网络功能虚拟化编排器NFVO获取第一部署策略关联的第一虚拟化网络功能VNF,以及第二部署策略关联的第二VNF之前,还包括:NFVO接收OSS/BSS上传的第一NS对应的第一网络业务描述模板NSD文件,第一NSD文件包括第一部署策略;NFVO从第一NSD文件中获取第一部署策略。通过扩展NSD模板,使NSD文件中能够携带部署策略,从而NFVO解析NSD文件时能够感知对应的NS的部署要求。In some possible implementation manners, the first NS is the deployed NS, the second NS is the NS to be deployed, and the network function virtualization orchestrator NFVO acquires the first virtualized network function VNF associated with the first deployment policy, and Before the second VNF associated with the second deployment strategy, it also includes: NFVO receives the first network service description template NSD file corresponding to the first NS uploaded by OSS/BSS, and the first NSD file includes the first deployment strategy; NFVO receives from the first NSD Get the first deployment policy in the file. By extending the NSD template, the deployment policy can be carried in the NSD file, so that NFVO can perceive the deployment requirements of the corresponding NS when parsing the NSD file.
在一些可能实现的实施方式中,网络功能虚拟化编排器NFVO获取第一部署策略关联的第一虚拟化网络功能VNF,以及第二部署策略关联的第二VNF之前,还包括:NFVO接收OSS/BSS发送的用于指示实例化第二NS的请求消息,请求消息中包括第二部署策略;NFVO从请求消息中获取第二部署策略。通过在请求消息中携带第二部署策略,能够提高制定和获取第二部署策略的灵活性。In some possible implementation manners, before the network function virtualization orchestrator NFVO obtains the first virtualized network function VNF associated with the first deployment strategy and the second VNF associated with the second deployment strategy, it further includes: NFVO receiving the OSS/ The request message sent by the BSS for instructing instantiation of the second NS, the request message includes the second deployment strategy; the NFVO obtains the second deployment strategy from the request message. By carrying the second deployment strategy in the request message, the flexibility of formulating and acquiring the second deployment strategy can be improved.
在一些可能实现的实施方式中,网络功能虚拟化编排器NFVO获取第一部署策略关联的第一虚拟化网络功能VNF,以及第二部署策略关联的第二VNF之前,还包括:NFVO接收OSS/BSS上传的第二NS对应的第二NSD文件,第二NSD文件包括第二部署策略;NFVO从第二NSD文件中获取第二部署策略。通过扩展NSD模板,使NSD文件中能够携带部署策略,从而NFVO解析NSD文件时能够感知对应的NS的部署要求。In some possible implementation manners, before the network function virtualization orchestrator NFVO obtains the first virtualized network function VNF associated with the first deployment strategy and the second VNF associated with the second deployment strategy, it further includes: NFVO receiving the OSS/ The second NSD file corresponding to the second NS uploaded by the BSS, the second NSD file includes the second deployment strategy; the NFVO obtains the second deployment strategy from the second NSD file. By extending the NSD template, the deployment policy can be carried in the NSD file, so that NFVO can perceive the deployment requirements of the corresponding NS when parsing the NSD file.
在一些可能实现的实施方式中,第一NS和第二NS均为待部署的NS,网络功能虚拟化编排器NFVO获取第一部署策略关联的第一虚拟化网络功能VNF,以及第二部署策略关联的第二VNF之前,包括:NFVO接收OSS/BSS上传的第一NS对应的第一NSD文件和第二NS对应的第二NSD文件,第一NSD文件包括第一部署策略,第二NSD文件包括第二部署策略;NFVO从第一NSD文件中获取第一部署策略,以及从第二NSD文件第二部署策略。在第一NS和第二NS需要一同部署时,则可以在扩展的NSD文件中携带第一部署策略和第二部署策略,从而NFVO解析NSD文件时能够感知对第一NS和第二NS的资源隔离或共享的部署要求,以根据部署要求进行第一VNF和第二VNF的部署。In some possible implementations, both the first NS and the second NS are NS to be deployed, and the network function virtualization orchestrator NFVO acquires the first virtualized network function VNF associated with the first deployment policy, and the second deployment policy Before the associated second VNF, it includes: NFVO receives the first NSD file corresponding to the first NS uploaded by OSS/BSS and the second NSD file corresponding to the second NS, the first NSD file includes the first deployment strategy, and the second NSD file The second deployment strategy is included; the NFVO acquires the first deployment strategy from the first NSD file, and the second deployment strategy from the second NSD file. When the first NS and the second NS need to be deployed together, the extended NSD file can carry the first deployment strategy and the second deployment strategy, so that NFVO can perceive the resources of the first NS and the second NS when parsing the NSD file Isolated or shared deployment requirements, so as to deploy the first VNF and the second VNF according to the deployment requirements.
在一些可能的实施方式中,第一部署策略和第二部署策略还可以携带于OSS/BSS向NFVO发送的实例化第一NS和第二NS的请求消息中。In some possible implementation manners, the first deployment strategy and the second deployment strategy may also be carried in the request message for instantiating the first NS and the second NS sent by the OSS/BSS to the NFVO.
在一些可能实现的实施方式中,第二部署策略还包括第二标识,第二标识用于指示第二部署策略的应用范围。第二标识包括用户范围标识、物理节点范围标识和虚拟节点范围标识。In some possible implementation manners, the second deployment strategy further includes a second identifier, and the second identifier is used to indicate an application scope of the second deployment strategy. The second identifier includes a user scope identifier, a physical node scope identifier and a virtual node scope identifier.
在一些可能实现的实施方式中,当第一标识为亲和标识,第二标识为用户范围标识时,NFVO根据第一标识确定第一VNF与第二VNF是否共资源部署包括:NFVO根据亲和标识和用户范围标识确定第一VNF与第二VNF部署于同一用户资源池。In some possible implementations, when the first identifier is an affinity identifier and the second identifier is a user-scope identifier, the NFVO determining whether the first VNF and the second VNF share resources according to the first identifier includes: NFVO according to the affinity The identifier and the user scope identifier determine that the first VNF and the second VNF are deployed in the same user resource pool.
在一些可能实现的实施方式中,当第一标识为亲和标识或反亲和标识,第二标识为物理节点范围标识时,NFVO根据第一标识确定第一VNF与第二VNF是否共资源部署包括:NFVO根据亲和标识和物理节点范围标识确定第一VNF与第二VNF部署于同一物理节点,或根据反亲 和标识和物理节点范围标识确定第一VNF和第二VNF部署于不同的物理节点。In some possible implementations, when the first identifier is an affinity identifier or an anti-affinity identifier, and the second identifier is a physical node range identifier, NFVO determines whether the first VNF and the second VNF share resources for deployment according to the first identifier Including: NFVO determines that the first VNF and the second VNF are deployed on the same physical node according to the affinity ID and the physical node range ID, or determines that the first VNF and the second VNF are deployed on different physical nodes according to the anti-affinity ID and the physical node range ID. node.
在一些可能实现的实施方式中,当第一标识为亲和标识或反亲和标识,第二标识为虚拟节点范围标识时,NFVO根据第一标识确定第一VNF与第二VNF是否共资源部署包括:NFVO根据亲和标识和虚拟节点范围标识确定第一VNF与第二VNF部署于同一虚拟节点,或根据反亲和标识和虚拟节点范围标识确定第一VNF和第二VNF部署于不同的虚拟节点。In some possible implementations, when the first identifier is an affinity identifier or an anti-affinity identifier, and the second identifier is a virtual node range identifier, NFVO determines whether the first VNF and the second VNF share resource deployment according to the first identifier Including: NFVO determines that the first VNF and the second VNF are deployed on the same virtual node according to the affinity identifier and the virtual node scope identifier, or determines that the first VNF and the second VNF are deployed on different virtual nodes according to the anti-affinity identifier and the virtual node scope identifier. node.
在一些可能实现的实施方式中,第一部署策略还包括与第二部署策略相同的第一标识和/或第二标识。In some possible implementation manners, the first deployment strategy further includes the same first identifier and/or second identifier as the second deployment strategy.
在一些可能实现的实施方式中,该方法还包括:NFVO接收OSS/BSS发送的实例化第二NS的请求消息;NFVO响应于请求消息,向虚拟化功能管理器VNFM发送实例化第二VNF的指示消息,指示消息包括实例化第二VNF的位置信息,位置信息为NFVO确定第一VNF与第二VNF是否共资源部署后为第二VNF分配的。NFVO根据第一部署策略和第二部署策略确定第一NS和第二NS中的VNF的部署要求后,指示VNFM按照租户的部署要求进行VNF的部署,以完成第二NS的部署。In some possible implementations, the method further includes: the NFVO receives a request message for instantiating the second NS sent by the OSS/BSS; and the NFVO sends a request message for instantiating the second NS to the virtualization function manager VNFM in response to the request message. An indication message, where the indication message includes the location information of the instantiated second VNF, and the location information is allocated to the second VNF after the NFVO determines whether the first VNF and the second VNF share resources for deployment. After determining the deployment requirements of the VNFs in the first NS and the second NS according to the first deployment strategy and the second deployment strategy, the NFVO instructs the VNFM to deploy the VNFs according to the deployment requirements of the tenants, so as to complete the deployment of the second NS.
本申请实施例第二方面提供了一种网络业务部署方法,该方法包括:运营和业务支持系统OSS/BS向网络功能虚拟化编排器NFVO发送第一部署策略和第二部署策略;NFVO判断第一部署策略和第二部署策略是否包括相同的用户标识和部署任务标识;若为是,则NFVO获取第一部署策略关联的第一虚拟化网络功能VNF,以及第二部署策略关联的第二VNF,第一VNF属于第一网络业务NS,第二VNF属于第二NS;NFVO根据第二部署策略中的第一标识确定第一VNF与第二VNF是否共资源部署,其中,第一标识用于指示资源的亲和或反亲和。The second aspect of the embodiment of the present application provides a network service deployment method, the method includes: the operation and service support system OSS/BS sends the first deployment strategy and the second deployment strategy to the network function virtualization orchestrator NFVO; Whether the first deployment policy and the second deployment policy include the same user ID and deployment task ID; if yes, NFVO obtains the first virtualized network function VNF associated with the first deployment policy, and the second VNF associated with the second deployment policy , the first VNF belongs to the first network service NS, and the second VNF belongs to the second NS; NFVO determines whether the first VNF and the second VNF share resources according to the first identifier in the second deployment policy, wherein the first identifier is used for Indicates the affinity or anti-affinity of the resource.
在一些可能实现的实施方式中,该方法还包括:OSS/BS向NFVO发送实例化第二NS的请求消息;NFVO响应于请求消息向虚拟化网络功能管理器VNFM发送实例化第二VNF的指示消息,指示消息包括实例化第二VNF的位置信息,位置信息为NFVO确定第一VNF与第二VNF是否共资源部署后为第二VNF分配的;VNFM根据指示消息在位置信息对应的节点实例化第二VNF。In some possible implementation manners, the method further includes: the OSS/BS sends a request message for instantiating the second NS to the NFVO; and the NFVO sends an instruction to instantiate the second VNF to the virtualized network function manager VNFM in response to the request message message, the indication message includes the location information of instantiating the second VNF, and the location information is allocated for the second VNF after the NFVO determines whether the first VNF and the second VNF share resource deployment; the VNFM instantiates the second VNF at the node corresponding to the location information according to the indication message Second VNF.
本申请实施例第三方面提供了一种网络功能虚拟化编排器NFVO,其特征在于,该NFVO包括:获取模块,用于获取第一部署策略关联的第一虚拟化网络功能VNF,以及第二部署策略关联的第二VNF,第一VNF属于第一网络业务NS,第二VNF属于第二NS,第一部署策略和第二部署策略包括相同的用户标识和部署任务标识,第二部署策略还包括第一标识,第一标识用于指示资源的亲和或反亲和;确定模块,用于根据第一标识确定第一VNF与第二VNF是否共资源部署。The third aspect of the embodiment of the present application provides a network function virtualization orchestrator NFVO, which is characterized in that the NFVO includes: an acquisition module, configured to acquire the first virtualized network function VNF associated with the first deployment policy, and the second The second VNF associated with the deployment policy, the first VNF belongs to the first network service NS, the second VNF belongs to the second NS, the first deployment policy and the second deployment policy include the same user ID and deployment task ID, and the second deployment policy also It includes a first identification, the first identification is used to indicate resource affinity or anti-affinity; a determining module is used to determine whether the first VNF and the second VNF share resources according to the first identification.
在一些可能实现的实施方式中,该NFVO还包括:接收模块,用于接收运营和业务支持系统OSS/BSS发送的更新消息,更新消息用于更新第一NS的部署策略,更新消息包括第一部署策略;获取模块,还用于从更新消息中获取第一部署策略。In some possible implementations, the NFVO further includes: a receiving module, configured to receive an update message sent by the operation and business support system OSS/BSS, the update message is used to update the deployment strategy of the first NS, and the update message includes the first Deployment strategy; an acquisition module, also used to obtain the first deployment strategy from the update message.
在一些可能实现的实施方式中,该NFVO还包括:接收模块,用于接收OSS/BSS上传的第一NS对应的第一网络业务描述模板NSD文件,第一NSD文件包括第一部署策略;获取模块,还用于从第一NSD文件中获取第一部署策略。In some possible implementations, the NFVO also includes: a receiving module, configured to receive the first network service description template NSD file corresponding to the first NS uploaded by the OSS/BSS, and the first NSD file includes the first deployment strategy; The module is further configured to obtain the first deployment policy from the first NSD file.
在一些可能实现的实施方式中,接收模块,还用于接收OSS/BSS发送的用于指示实例化第二NS的请求消息,请求消息中包括第二部署策略;获取模块,还用于从请求消息中获取第 二部署策略。In some possible implementations, the receiving module is further configured to receive a request message sent by the OSS/BSS for instructing instantiation of the second NS, and the request message includes the second deployment strategy; the obtaining module is also configured to request Get the second deployment policy from the message.
在一些可能实现的实施方式中,接收模块,还用于接收OSS/BSS上传的第二NS对应的第二NSD文件,第二NSD文件包括第二部署策略;获取模块,还用于从第二NSD文件中获取第二部署策略。In some possible implementations, the receiving module is also used to receive the second NSD file corresponding to the second NS uploaded by the OSS/BSS, and the second NSD file includes the second deployment strategy; Get the second deployment strategy from the NSD file.
在一些可能实现的实施方式中,该NFVO还包括:接收模块,用于接收OSS/BSS上传的第一NS对应的第一NSD文件和第二NS对应的第二NSD文件,第一NSD文件包括第一部署策略,第二NSD文件包括第二部署策略;获取模块,还用于从第一NSD文件中获取第一部署策略,以及从第二NSD文件第二部署策略。In some possible implementations, the NFVO also includes: a receiving module, configured to receive the first NSD file corresponding to the first NS and the second NSD file corresponding to the second NS uploaded by the OSS/BSS, the first NSD file includes The first deployment strategy and the second NSD file include the second deployment strategy; the obtaining module is also used to obtain the first deployment strategy from the first NSD file and the second deployment strategy from the second NSD file.
在一些可能实现的实施方式中,第二部署策略还包括第二标识,第二标识用于指示第二部署策略的应用范围。In some possible implementation manners, the second deployment strategy further includes a second identifier, and the second identifier is used to indicate an application scope of the second deployment strategy.
在一些可能实现的实施方式中,第一标识为亲和标识,第二标识为用户范围标识,确定模块具体用于:根据亲和标识和用户范围标识确定第一VNF与第二VNF部署于同一用户资源池。In some possible implementations, the first identifier is an affinity identifier, and the second identifier is a user-scope identifier, and the determining module is specifically configured to: determine that the first VNF and the second VNF are deployed on the same site according to the affinity identifier and the user-scope identifier. User resource pool.
在一些可能实现的实施方式中,第一标识为亲和标识或反亲和标识,第二标识为物理节点范围标识,确定模块具体用于:根据亲和标识和物理节点范围标识确定第一VNF与第二VNF部署于同一物理节点,或根据反亲和标识和物理节点范围标识确定第一VNF和第二VNF部署于不同的物理节点。In some possible implementations, the first identifier is an affinity identifier or an anti-affinity identifier, and the second identifier is a physical node range identifier, and the determining module is specifically configured to: determine the first VNF according to the affinity identifier and the physical node range identifier The second VNF is deployed on the same physical node, or the first VNF and the second VNF are deployed on different physical nodes as determined according to the anti-affinity identifier and the physical node range identifier.
在一些可能实现的实施方式中,第一标识为亲和标识或反亲和标识,第二标识为虚拟节点范围标识,确定模块具体用于:根据亲和标识和虚拟节点范围标识确定第一VNF与第二VNF部署于同一虚拟节点,或根据反亲和标识和虚拟节点范围标识确定第一VNF和第二VNF部署于不同的虚拟节点。In some possible implementations, the first identifier is an affinity identifier or an anti-affinity identifier, and the second identifier is a virtual node range identifier, and the determining module is specifically configured to: determine the first VNF according to the affinity identifier and the virtual node range identifier The second VNF is deployed on the same virtual node, or the first VNF and the second VNF are deployed on different virtual nodes as determined according to the anti-affinity identifier and the virtual node range identifier.
在一些可能实现的实施方式中,第一部署策略还包括与第二部署策略相同的第一标识和/或第二标识。In some possible implementation manners, the first deployment strategy further includes the same first identifier and/or second identifier as the second deployment strategy.
在一些可能实现的实施方式中,该NFVO还包括:接收模块,用于接收OSS/BSS发送的实例化第二NS的请求消息;发送模块,用于响应于请求消息向VNFM发送实例化第二VNF的指示消息,指示消息用于指示第二VNF是否与第一VNF实例化于同一资源池/物理节点/虚拟节点。In some possible implementations, the NFVO further includes: a receiving module, configured to receive a request message for instantiating the second NS sent by the OSS/BSS; a sending module, configured to send the instantiated second NS to the VNFM in response to the request message. An indication message of the VNF, where the indication message is used to indicate whether the second VNF is instantiated in the same resource pool/physical node/virtual node as the first VNF.
本申请实施例第四方面提供一种NFVO,该NFVO包括:处理器、存储器和收发器,其中,存储器存储有程序代码,处理器调用存储器中存储的程序代码,使得网络业务部署设备执行如上述第一方面及其任一种可能的实现方式中的网络业务部署方法。The fourth aspect of the embodiment of the present application provides a NFVO, the NFVO includes: a processor, a memory, and a transceiver, wherein the memory stores program codes, and the processor invokes the program codes stored in the memory, so that the network service deployment device executes the above-mentioned The network service deployment method in the first aspect and any possible implementation manner thereof.
本申请实施例第五方面提供一种网络功能虚拟化NFV系统,其特征在于,系统包括运营和业务支持系统OSS/BSS和如上述第三方面或第四方面及其任一种可能的实现方式中的NFVO;OSS/BSS用于向NFVO发送包括用户标识和部署任务标识的第一部署策略和第二部署策略,第二部署策略还包括第一标识,第一标识用于指示资源的亲和或反亲和,第一部署策略与第一VNF关联,第二NS与第二VNF关联;NFVO用于根据第二部署策略中的第一标识确定第一VNF与第二VNF是否共资源部署。The fifth aspect of the embodiment of the present application provides a network function virtualization NFV system, which is characterized in that the system includes an operation and business support system OSS/BSS and the above third or fourth aspect and any possible implementation thereof NFVO in: OSS/BSS is used to send to NFVO the first deployment policy and the second deployment policy including the user ID and the deployment task ID, the second deployment policy also includes the first ID, and the first ID is used to indicate the affinity of resources Or anti-affinity, the first deployment strategy is associated with the first VNF, and the second NS is associated with the second VNF; NFVO is used to determine whether the first VNF and the second VNF share resources for deployment according to the first identifier in the second deployment strategy.
在一些可能的实现方式中,该系统还包括虚拟化网络功能管理器VNFM;NFVO还用于向VNFM发送实例化第二VNF的指示消息,指示消息包括部署第二VNF的位置信息,位置信息为 NFVO确定第一VNF与第二VNF是否共资源部署后为第二VNF分配的;VNFM用于根据指示消息在位置信息对应的节点实例化第二VNF。In some possible implementations, the system further includes a virtualized network function manager VNFM; NFVO is further configured to send an indication message to the VNFM to instantiate a second VNF, the indication message includes location information for deploying the second VNF, and the location information is The NFVO determines whether the first VNF and the second VNF share resources and allocates them to the second VNF after deployment; the VNFM is used to instantiate the second VNF on the node corresponding to the location information according to the indication message.
附图说明Description of drawings
图1为本申请实施例提供的一种NFV系统100的架构示意图;FIG. 1 is a schematic structural diagram of an NFV system 100 provided in an embodiment of the present application;
图2为本申请实施例提供的网络业务部署方法第一实施例的流程示意图;FIG. 2 is a schematic flowchart of a first embodiment of a network service deployment method provided by an embodiment of the present application;
图3为本申请提供的第一NSD文件的示意图;Figure 3 is a schematic diagram of the first NSD file provided by the application;
图4为本申请提供的第二NSD文件的示意图;Figure 4 is a schematic diagram of the second NSD file provided by the present application;
图5为本申请实施例提供的网络业务部署方法第二实施例的流程示意图;FIG. 5 is a schematic flowchart of a second embodiment of a network service deployment method provided by an embodiment of the present application;
图6为本申请实施例提供的网络业务部署方法第三实施例的流程示意图;FIG. 6 is a schematic flowchart of a third embodiment of a network service deployment method provided by an embodiment of the present application;
图7为本申请提供的嵌套NSD文件示意图;Figure 7 is a schematic diagram of the nested NSD file provided by the present application;
图8为本申请提供的嵌套NSD文件中的NSD-1对应的第一NSD文件的示意图;8 is a schematic diagram of the first NSD file corresponding to NSD-1 in the nested NSD file provided by the present application;
图9为嵌套NSD文件中的NSD-2对应的第二NSD文件的示意图;Fig. 9 is a schematic diagram of a second NSD file corresponding to NSD-2 in a nested NSD file;
图10为本申请实施例提供的NFVO一实施例的结构示意图;FIG. 10 is a schematic structural diagram of an embodiment of NFVO provided by the embodiment of the present application;
图11为本申请实施例提供的NFVO另一实施例的结构示意图。FIG. 11 is a schematic structural diagram of another embodiment of NFVO provided by the embodiment of the present application.
具体实施方式Detailed ways
本申请实施例提供了一种网络业务部署方法、NFVO以及NFV系统,用于提高网络业务部署时资源隔离或共享的灵活性。The embodiment of the present application provides a network service deployment method, NFVO and NFV system, which are used to improve the flexibility of resource isolation or sharing during network service deployment.
网络功能虚拟化(network function virtualization,NFV),通过使用通用的硬件设备及虚拟化技术,来承载传统网络中专用设备的功能,从而降低因为部署专用设备带来的昂贵成本。通过软硬件解耦,使网络设备功能不再依赖于专用硬件。同时利用云计算的特点,使资源可以充分灵活共享,实现新业务的快速开发和部署,并基于实际业务需求进行自动部署、弹性伸缩、故障隔离和自愈等。能够接收虚拟化请求,并根据请求对相应业务进行虚拟化处理的一方,一般称为虚拟化业务的提供方,发起虚拟化请求的一方一般称为业务请求方。Network function virtualization (network function virtualization, NFV), through the use of general-purpose hardware devices and virtualization technology, to carry the functions of special equipment in traditional networks, thereby reducing the expensive cost of deploying special equipment. Through the decoupling of software and hardware, the functions of network equipment are no longer dependent on dedicated hardware. At the same time, by utilizing the characteristics of cloud computing, resources can be fully and flexibly shared, and rapid development and deployment of new services can be realized, and automatic deployment, elastic scaling, fault isolation, and self-healing can be performed based on actual business needs. A party that can receive a virtualization request and perform virtualization processing on corresponding services according to the request is generally called a virtualization service provider, and a party that initiates a virtualization request is generally called a service requester.
NFV中虚拟化的网络业务称为一个网络业务(network service,NS),比如一个IP多媒体子系统(IP multimedia subsystem,IMS)网络业务,或一个5G核心网网络。一个NS中还可以包含若干个虚拟化网络功能模块(virtualised network function,VNF)。一个NS在进行虚拟化部署时,业务请求方首先需要向业务提供方提交该业务的描述信息(network service descriptor,NSD),也称作NS部署模板,主要描述了该业务的拓扑结构以及包含的每个VNF的VNF描述信息(VNF descriptor,VNFD),其中在拓扑结构信息中使用虚拟化连接信息(network service virtual link descriptor,NsVld)来描述VNF之间的连接,目前采用连接类型,带宽等信息来表示。VNFD也称作VNF的部署模板,其中包含的虚拟部署单元(virtualisation deployment unit,VDU),连接点模板(connection point descriptor,CPD),虚拟连接模板(virtual link descriptor,VLD)等信息,其中VDU可以代表一个安装了应用软件的虚拟机,在VDU的描述中会包含对该虚拟机的所有虚拟资源的需求描述,CPD代表虚拟机上的连接信息,比如可以是虚拟网卡信息,包含IP地址或MAC地址等信息,VLD描述VDU之间的虚拟网络连接需求,包含连接类型,带宽等信息。VNFD还包含该VNF的外部 连接点VnfExtCpd,该VnfExtCpd同NsVld连接,从而实现VNF之间的连接。The virtualized network service in NFV is called a network service (NS), such as an IP multimedia subsystem (IP multimedia subsystem, IMS) network service, or a 5G core network network. One NS may also include several virtualized network function modules (virtualized network function, VNF). When an NS is deployed in virtualization, the service requester first needs to submit the service description (network service descriptor, NSD) to the service provider, also known as the NS deployment template, which mainly describes the topology of the service and the included The VNF description information (VNF descriptor, VNFD) of each VNF, in which the virtual connection information (network service virtual link descriptor, NsVld) is used in the topology information to describe the connection between VNFs. Currently, the connection type, bandwidth and other information are used To represent. VNFD is also called the deployment template of VNF, which contains virtual deployment unit (virtualization deployment unit, VDU), connection point template (connection point descriptor, CPD), virtual connection template (virtual link descriptor, VLD) and other information, where VDU can Represents a virtual machine with application software installed. The description of VDU will include the description of all virtual resources of the virtual machine. CPD represents the connection information on the virtual machine, such as virtual network card information, including IP address or MAC Address and other information, VLD describes the virtual network connection requirements between VDUs, including connection type, bandwidth and other information. VNFD also includes the external connection point VnfExtCpd of this VNF, and this VnfExtCpd is connected with NsVld, so as to realize the connection between VNFs.
如图1所示,图1为本申请实施例提供的一种NFV系统100的架构示意图。NFV系统100包括移动网络的运营支持系统和业务支持系统(operations support system and business support system,OSS/BSS)101、网络功能虚拟化编排器(network functions virtualisation orchestrator,NFVO)102、虚拟网络功能管理器(VNF manager,VNFM)103、虚拟基础设施管理器(virtual infrastructure management,VIM)104、网络功能虚拟化基础设施(network functions virtualization infrastructure,NFVI)105、设备管理系统(equipment management,EM)106和多个VNF107等功能部件。As shown in FIG. 1 , FIG. 1 is a schematic structural diagram of an NFV system 100 provided in an embodiment of the present application. The NFV system 100 includes an operation support system and a business support system (operations support system and business support system, OSS/BSS) 101 of a mobile network, a network functions virtualization orchestrator (network functions virtualization orchestrator, NFVO) 102, and a virtual network function manager (VNF manager, VNFM) 103, virtual infrastructure manager (virtual infrastructure management, VIM) 104, network functions virtualization infrastructure (network functions virtualization infrastructure, NFVI) 105, equipment management system (equipment management, EM) 106 and multiple A VNF107 and other functional components.
NFVO102,主要负责处理虚拟化业务的生命周期管理,以及虚拟基础设施及NFVI105中虚拟资源的分配和调度等。NFVO102可以与一个或多个VNFM103通信,以执行资源相关请求,发送配置信息给VNFM103,收集VNF107的状态信息。另外,NFVO102也可与VIM104通信,执行资源分配,和/或预留交换虚拟化硬件资源配置和状态信息。NFVO102 is mainly responsible for handling the lifecycle management of virtualization services, as well as the allocation and scheduling of virtual infrastructure and virtual resources in NFVI105. NFVO102 can communicate with one or more VNFM103 to execute resource-related requests, send configuration information to VNFM103, and collect status information of VNF107. In addition, NFVO 102 may also communicate with VIM 104 to perform resource allocation, and/or reserve exchange virtualization hardware resource configuration and status information.
VNFM103,负责一个或多个VNF的生命周期管理,比如实例化(instantiating),更新(updating),查询,弹性伸缩(scaling),终止(terminating)VNF107。VNFM103可以与VNF通信以完成VNF107生命周期管理及交换配置和状态信息。在NFV系统100中VNFM103可以有多个,负责对不同类型的VNF107进行生命周期管理。VNFM103 is responsible for lifecycle management of one or more VNFs, such as instantiating, updating, querying, scaling, and terminating VNF107. VNFM103 can communicate with VNF to complete VNF107 life cycle management and exchange configuration and status information. There may be multiple VNFMs 103 in the NFV system 100, which are responsible for lifecycle management of different types of VNFs 107.
NFV即NFV的基础设施层,包含硬件资源层和/或虚拟化层,以建立虚拟化环境、部署、管理及实现VNF107。硬件资源层和/或虚拟化层用于为VNF提供虚拟化资源,如虚拟机和其他形式的虚拟容器。硬件资源层包括计算硬件,存储硬件和网络硬件等。作为一种实施方式,计算硬件和存储硬件的资源可以集中在一起。NFVI105中的虚拟化层抽象硬件资源,解耦VNF107与底层的硬件资源层。虚拟化层包括抽象计算硬件得到的虚拟计算,抽象存储硬件得到的虚拟存储和抽象网络硬件得到的虚拟网络。NFV is the infrastructure layer of NFV, which includes a hardware resource layer and/or a virtualization layer to establish a virtualized environment, deploy, manage and implement VNF107. The hardware resource layer and/or the virtualization layer are used to provide VNFs with virtualized resources, such as virtual machines and other forms of virtual containers. The hardware resource layer includes computing hardware, storage hardware, and network hardware. As an implementation manner, resources of computing hardware and storage hardware may be gathered together. The virtualization layer in NFVI105 abstracts hardware resources and decouples VNF107 from the underlying hardware resource layer. The virtualization layer includes virtual computing obtained by abstracting computing hardware, virtual storage obtained by abstracting storage hardware, and virtual network obtained by abstracting network hardware.
VIM104,控制和管理VNF107与计算硬件、存储硬件、网络硬件、虚拟计算、虚拟存储、虚拟网络的交互。例如VIM104执行资源管理功能,包括管理基础设施资源、分配(例如增加资源给虚拟容器)及运行功能(例如收集NFVI105故障信息)。VNFM103及VIM104可以相互通信,请求资源分配,交换虚拟化硬件资源配置和状态信息。VIM104, controlling and managing the interaction between VNF107 and computing hardware, storage hardware, network hardware, virtual computing, virtual storage, and virtual network. For example, VIM 104 performs resource management functions, including managing infrastructure resources, allocation (such as adding resources to virtual containers) and running functions (such as collecting NFVI 105 fault information). VNFM103 and VIM104 can communicate with each other, request resource allocation, and exchange virtualized hardware resource configuration and status information.
EM106,是传统电信系统中用于对设备进行配置,管理的系统,在NFV系统100中,EM106也可以用于对VNF107进行配置和管理,以及向VNFM103发起新的VNF107的实例化等生命周期管理操作。EM106 is a system used to configure and manage equipment in traditional telecommunication systems. In NFV system 100, EM106 can also be used to configure and manage VNF107, and initiate life cycle management such as instantiation of new VNF107 to VNFM103 operate.
OSS/BSS101,支持各种端到端电信业务。OSS支持的管理功能包括:网络配置,业务提供,故障管理等。BSS处理订单,付费,收入等,支持产品管理,订单管理,收益管理及客户管理。OSS/BSS101 supports various end-to-end telecommunication services. The management functions supported by OSS include: network configuration, service provision, fault management, etc. BSS handles orders, payment, income, etc., and supports product management, order management, revenue management and customer management.
垂直行业的客户,比如电力公司或者车联网企业,可以向OSS/BSS101提出建网需求,比如提出对网络带宽、时延和地理位置等方面的需求,由OSS/BSS101根据用户需求生成相应的部署策略,以指示NFV系统100根据部署策略中的信息完成该NS的部署。对于OSS/BSS101来说,一个行业的客户也可以看成是一个租户,不同的租户之间根据需求,网络资源可以共享也可以隔离。Customers in vertical industries, such as power companies or Internet of Vehicles companies, can submit network construction requirements to OSS/BSS101, such as requirements for network bandwidth, delay, and geographical location, and OSS/BSS101 will generate corresponding deployments based on user requirements Policy, to instruct the NFV system 100 to complete the deployment of the NS according to the information in the deployment policy. For OSS/BSS101, a customer in an industry can also be regarded as a tenant, and network resources between different tenants can be shared or isolated according to requirements.
同一个租户可以向OSS/BSS101发起一个或多个创建NS的需求,为了降低物理机或虚拟 机宕机的影响,提高网络业务的安全性和可用性,同一个租户的多个NS之间,租户可能有资源隔离的需求;而为了提高资源利用率,同一个租户的多个NS之间,租户还可能有资源共享的需求。具体而言,当租户需要创建新的第二NS时,可能第二NS与已在先部署的第一NS之间的有资源共享或隔离需求;租户需要创建多个新的第二NS时,多个第二NS之间有资源共享或隔离需求。租户还可能有与其他租户的NS资源隔离的需求。其中,资源的共享或隔离可以是不同NS的VNF107之间的完全共享或隔离,也可以是部分VNF共享或部分VNF隔离。The same tenant can initiate one or more NS creation requirements to OSS/BSS101. In order to reduce the impact of physical machine or virtual machine downtime and improve the security and availability of network services, between multiple NSs of the same tenant, the tenant There may be a requirement for resource isolation; and in order to improve resource utilization, tenants may also have a requirement for resource sharing among multiple NSs of the same tenant. Specifically, when a tenant needs to create a new second NS, there may be resource sharing or isolation requirements between the second NS and the previously deployed first NS; when a tenant needs to create multiple new second NSs, There is a resource sharing or isolation requirement among multiple second NSs. Tenants may also need to be isolated from NS resources of other tenants. Wherein, resource sharing or isolation may be complete sharing or isolation between VNFs 107 of different NSs, or partial VNF sharing or partial VNF isolation.
针对租户对于不同NS的资源隔离或共享需求,OSS/BSS101生成相应的部署策略,每一部署策略关联NS中的至少一个VNF107,OSS/BSS101向NFVO102发送部署策略。NFVO102通过比对不同的部署策略中的参数,从而确定与之关联的VNF107之间是否需要隔离或共享资源部署。According to the resource isolation or sharing requirements of tenants for different NSs, OSS/BSS101 generates corresponding deployment policies, and each deployment policy is associated with at least one VNF107 in NS, and OSS/BSS101 sends the deployment policy to NFVO102. NFVO102 compares the parameters in different deployment strategies to determine whether the associated VNF107 needs isolation or shared resource deployment.
具体地,本申请实施例中,部署策略包括用户标识、部署任务标识和第一标识。其中,用户标识为租户在NFV系统中的唯一标识,用于指示关联的VNF107属于哪一租户。部署任务标识用于标识一个具体的部署任务。若不同的部署策略中的用户标识和部署任务标识二者均相同,则说明这些部署策略属于同一租户的同一部署任务,与这些部署策略关联的VNF107之间需要互相隔离资源部署或共享资源部署。Specifically, in this embodiment of the application, the deployment policy includes a user ID, a deployment task ID, and a first ID. Wherein, the user identifier is the unique identifier of the tenant in the NFV system, and is used to indicate which tenant the associated VNF 107 belongs to. The deployment task identifier is used to identify a specific deployment task. If the user IDs and deployment task IDs in different deployment policies are the same, it means that these deployment policies belong to the same deployment task of the same tenant, and the VNFs 107 associated with these deployment policies need to isolate resource deployment or share resource deployment.
同一租户的同一部署任务所关联的VNF107之间是隔离资源部署还是共享资源部署依据第一标识而定。第一标识用于指示资源的亲和或反亲和,第一标识可以为亲和标识或反亲和标识。当第一标识为亲和标识时,同一租户的同一部署任务所关联的VNF107之间可以共资源部署;当第一标识为反亲和标识时,同一租户的同一部署任务所关联的VNF107之间需要隔离资源部署。Whether the VNFs 107 associated with the same deployment task of the same tenant are isolated resource deployment or shared resource deployment depends on the first identifier. The first identifier is used to indicate the affinity or anti-affinity of the resource, and the first identifier may be an affinity identifier or an anti-affinity identifier. When the first identifier is an affinity identifier, the VNF107 associated with the same deployment task of the same tenant can share resource deployment; when the first identifier is an anti-affinity identifier, the VNF107 associated with the same deployment task of the same tenant Resource deployment needs to be isolated.
部署策略中还可以包括第二标识,第二标识用于指示部署策略的应用范围。第二标识具体可以为用户范围标识、物理节点范围标识或虚拟节点范围标识。第一标识和第二标识共同指示同一部署任务下的VNF107之间具体在哪种资源层面上隔离或共享。The deployment strategy may further include a second identifier, and the second identifier is used to indicate the application scope of the deployment strategy. The second identifier may specifically be a user-scoped identifier, a physical node-scoped identifier, or a virtual node-scoped identifier. The first identifier and the second identifier jointly indicate at which resource level the VNFs 107 under the same deployment task are isolated or shared.
具体地,NFVO102根据第二部署策略中的用户标识和部署任务标识确定存在相同用户标识和部署任务标识的第二部署策略,获取第一部署策略关联的第一NS中的第一VNF,以及第二部署策略关联的第二NS中的第二VNF。其中,第一VNF为第一NS中的至少一个VNF中的任一个,第二VNF为第二NS中的至少一个VNF中的任一个。进一步根据第一标识和第二标识确定第一VNF和第二VNF是否共资源部署:Specifically, NFVO102 determines the second deployment policy with the same user ID and deployment task ID according to the user ID and deployment task ID in the second deployment policy, obtains the first VNF in the first NS associated with the first deployment policy, and the second deployment policy Second, deploy the second VNF in the second NS associated with the policy. Wherein, the first VNF is any one of at least one VNF in the first NS, and the second VNF is any one of at least one VNF in the second NS. Further determine whether the first VNF and the second VNF are deployed on common resources according to the first identifier and the second identifier:
当第一部署策略和/或第二部署策略中的第一标识为亲和标识,第二标识为用户范围标识时,NFVO102确定第一VNF和第二VNF部署于同一用户资源池。其中,用户资源池为NFV系统中为用户标识对应的租户划分的用于该租户开展业务的物理资源和/或虚拟资源等,该租户的用户资源池中的资源不与其他租户共享。When the first identifier in the first deployment strategy and/or the second deployment strategy is an affinity identifier and the second identifier is a user scope identifier, the NFVO 102 determines that the first VNF and the second VNF are deployed in the same user resource pool. Wherein, the user resource pool is the physical resource and/or virtual resource allocated for the tenant corresponding to the user ID in the NFV system for the tenant to carry out business, and the resources in the user resource pool of the tenant are not shared with other tenants.
当第一部署策略和/或第二部署策略中的第一标识为亲和标识,第二标识为物理节点范围标识时,NFVO102确定第一VNF和第二VNF部署于同一物理节点。When the first identifier in the first deployment strategy and/or the second deployment strategy is an affinity identifier and the second identifier is a physical node range identifier, the NFVO 102 determines that the first VNF and the second VNF are deployed on the same physical node.
当第一部署策略和/或第二部署策略中的第一标识为亲和标识,第二标识为虚拟节点范围标识时,NFVO102确定第一VNF和第二VNF部署于同一虚拟节点。When the first identifier in the first deployment strategy and/or the second deployment strategy is an affinity identifier and the second identifier is a virtual node range identifier, the NFVO 102 determines that the first VNF and the second VNF are deployed on the same virtual node.
当第一部署策略和/或第二部署策略中的第一标识为反亲和标识,第二标识为物理节点范围标识时,NFVO102确定第一VNF和第二VNF部署于不同的物理节点。When the first identifier in the first deployment strategy and/or the second deployment strategy is an anti-affinity identifier and the second identifier is a physical node range identifier, the NFVO 102 determines that the first VNF and the second VNF are deployed on different physical nodes.
当第一部署策略和/或第二部署策略中的第一标识为反亲和标识,第二标识为虚拟节点范围标识时,NFVO102确定第一VNF和第二VNF部署于不同的虚拟节点。When the first identifier in the first deployment strategy and/or the second deployment strategy is an anti-affinity identifier and the second identifier is a virtual node range identifier, the NFVO 102 determines that the first VNF and the second VNF are deployed on different virtual nodes.
需要说明的是,当待部署的NS中存在多个VNF107时,NFVO102可以获取每一VNF107关联的部署策略,再根据部署策略基于上述的方法获取其他属于同一部署任务的VNF107,以确定每一VNF是否存在资源隔离或共享的要求,以及确定与哪些VNF107资源隔离或共享。It should be noted that when there are multiple VNFs 107 in the NS to be deployed, NFVO 102 can obtain the deployment strategy associated with each VNF 107, and then obtain other VNFs 107 belonging to the same deployment task according to the deployment strategy based on the above method, so as to determine the Whether there is a requirement for resource isolation or sharing, and determine which VNF107 resources are isolated or shared.
需要说明的是,当某一部署策略关联了至少两个VNF107时,则这些VNF107之间均需要遵照相同的部署规则。例如第一部署策略关联了两个第一VNF,第二部署策略关联了3个第二VNF,且第一部署策略和第二部署策略中的用户标识和部署任务标识相同,若第一标识为反亲和标识,第二标识为物理节点范围标识,那么这5个VNF之间需要互相隔离,即分别部署在5个不同的物理节点上;若第一标识为亲和标识,第二标识为物理节点范围标识时,那么这5个VNF需要部署在同一个物理节点上。It should be noted that when a certain deployment policy is associated with at least two VNFs 107, these VNFs 107 need to follow the same deployment rules. For example, the first deployment strategy is associated with two first VNFs, and the second deployment strategy is associated with three second VNFs, and the user identifier and deployment task identifier in the first deployment strategy and the second deployment strategy are the same, if the first identifier is Anti-affinity ID, the second ID is a physical node range ID, then the five VNFs need to be isolated from each other, that is, they are deployed on five different physical nodes; if the first ID is an affinity ID, the second ID is When the physical node range is identified, the five VNFs need to be deployed on the same physical node.
而当某一VNF107同时与至少两个部署策略关联时,即该VNF107与至少两个VNF107分别有部署要求时,该VNF107在部署时需同时满足这些部署要求。例如,NFVO102经过对部署策略的分析,确定第一VNF与第二VNF需要物理节点隔离部署,第一VNF又与第三NS中的第三VNF需要共物理节点部署,则NFVO102在分配部署资源时需满足第一VNF和第二VNF部署在不同的物理节点,同时第一VNF和第三VNF部署在同一物理节点。When a certain VNF 107 is associated with at least two deployment policies at the same time, that is, when the VNF 107 and at least two VNFs 107 have deployment requirements respectively, the VNF 107 needs to meet these deployment requirements at the same time during deployment. For example, after analyzing the deployment strategy, NFVO102 determines that the first VNF and the second VNF need to be deployed on separate physical nodes, and the first VNF and the third VNF in the third NS need to be deployed on the same physical node. Then, when allocating deployment resources, NFVO102 It must be satisfied that the first VNF and the second VNF are deployed on different physical nodes, and at the same time, the first VNF and the third VNF are deployed on the same physical node.
NFVO102确定待部署的VNF107的部署要求后,向虚拟化功能管理器VNFM103发送实例化该待部署的VNF107的指示消息。指示消息包括实例化该待部署的第二VNF的位置信息,位置信息为NFVO102确定所述第一VNF与所述第二VNF是否共资源部署后为所述第二VNF分配的。其中,位置信息可以为具体的物理节点或虚拟节点,例如,在第一VNF已经部署,且第一VNF和第二VNF有共物理节点或虚拟节点的部署要求的情况下,位置信息中可以包括部署第一VNF的物理节点或虚拟节点,以指示VNFM103将第二VNF部署在第一VNF所在的物理节点或虚拟节点上。位置信息也可以为用于约束VNFM103实例化第二VNF时的位置范围,例如,在第一VNF已经部署,且第一VNF和第二VNF有物理节点或虚拟节点的隔离部署要求的情况下,位置信息包括排除第一VNF所部署的物理节点或虚拟节点的要求,以指示VNFM103将第二VNF部署在第一VNF所在的物理节点或虚拟节点之外的其他节点上。位置信息进一步还可以包括地理位置信息,即将第二VNF部署在哪个省、市或区等。After determining the deployment requirements of the VNF107 to be deployed, the NFVO102 sends an instruction message to the virtualization function manager VNFM103 to instantiate the VNF107 to be deployed. The indication message includes instantiated location information of the second VNF to be deployed, and the location information is allocated to the second VNF after the NFVO 102 determines whether the first VNF and the second VNF share resources for deployment. Wherein, the location information may be a specific physical node or virtual node. For example, when the first VNF has been deployed, and the first VNF and the second VNF have a common physical node or virtual node deployment requirement, the location information may include Deploy the physical node or virtual node of the first VNF to instruct the VNFM103 to deploy the second VNF on the physical node or virtual node where the first VNF is located. The location information can also be used to constrain the location range when the VNFM103 instantiates the second VNF. For example, when the first VNF has been deployed, and the first VNF and the second VNF have requirements for isolated deployment of physical nodes or virtual nodes, The location information includes a requirement to exclude the physical node or virtual node where the first VNF is deployed, so as to instruct the VNFM103 to deploy the second VNF on a node other than the physical node or virtual node where the first VNF is located. The location information may further include geographic location information, that is, which province, city, or district the second VNF is deployed in.
基于上述的NFV系统100,根据租户的不同需求情况,本申请提供如下实施例,使VNFO能够感知NS的部署需求,进而根据部署需求为NS中的VNF107分配资源。Based on the above NFV system 100, according to different requirements of tenants, this application provides the following embodiments, so that VNFO can perceive the deployment requirements of NS, and then allocate resources for VNF 107 in NS according to the deployment requirements.
如图2所示,图2为本申请实施例提供的网络业务部署方法第一实施例的流程示意图。本实施例中,第一NS为已在先部署的NS,第二NS为待部署的NS。本实施例包括如下步骤:As shown in FIG. 2 , FIG. 2 is a schematic flowchart of a first embodiment of a network service deployment method provided in an embodiment of the present application. In this embodiment, the first NS is the NS that has been deployed earlier, and the second NS is the NS to be deployed. This embodiment includes the following steps:
201:OSS/BSS根据租户Z的第一需求确定为租户Z部署第一NS。201: The OSS/BSS determines to deploy the first NS for the tenant Z according to the first requirement of the tenant Z.
第一需求中,包括租户Z期望的网络功能以及网络功能所在的地理位置。OSS/BSS根据第一需求中网络功能的数量以及地理位置确定第一VNF的数量以及部署第一VNF的地理位置,生成第一NS的第一NSD文件。The first requirement includes the network function desired by the tenant Z and the geographical location of the network function. The OSS/BSS determines the quantity of the first VNF and the geographical location where the first VNF is deployed according to the quantity and geographical location of the network functions in the first requirement, and generates the first NSD file of the first NS.
例如,租户Z需要建立网络需要为城市B提供服务(比如车联网服务或者电力服务),其中网络的控制部分位于中心城市A,为终端用户提供传输服务的边缘服务器在城市B,那么OSS/BSS确定为租户Z部署的第一NS中包括两个第一VNF(VNF1和VNF2),其中VNF1作为控 制服务器位于城市A,VNF2作为边缘服务器位于城市B。For example, tenant Z needs to establish a network and provide services for city B (such as Internet of Vehicles service or electric power service), where the control part of the network is located in central city A, and the edge server that provides transmission services for end users is located in city B, then OSS/BSS It is determined that the first NS deployed for tenant Z includes two first VNFs (VNF1 and VNF2), wherein VNF1 is located in city A as a control server, and VNF2 is located in city B as an edge server.
202:OSS/BSS向NFVO上传第一NSD文件,第一NSD文件中包括第一部署策略。202: The OSS/BSS uploads the first NSD file to the NFVO, where the first NSD file includes the first deployment strategy.
本实施对NSD文件做了拓展,在部署策略中增加了用户标识字段(tenantId)和部署任务标识字段(deploymentId)。This implementation expands the NSD file, adding a user ID field (tenantId) and a deployment task ID field (deploymentId) to the deployment policy.
示例性的,本实施例继续以第一NS包括两个VNF(VNF1和VNF2)为例进行说明,如图3所示,图3为本申请提供的第一NSD文件的示意图。其中,一个group即为一个部署策略,一个NSD文件中可以包括至少一个部署策略,一个部署策略可以与至少一个VNF关联。可以理解,针对NSD文件内容,本申请实施例只给出了同本申请相关部分的描述,其他同本专利不相关的部分在此没有体现;并且,VNF和部署策略的数量仅作为示例,不作为对本申请的限制,一个NSD文件中可以包括1个部署策略、2个部署策略、4个部署策略、5个部署策略或者更多,一个VNF也可以与1个、3个或者更多部署策略关联,具体根据需求调整,对此本申请不做限制。Exemplarily, this embodiment continues to take the example that the first NS includes two VNFs (VNF1 and VNF2), as shown in FIG. 3 , which is a schematic diagram of the first NSD file provided by this application. Wherein, a group is a deployment strategy, an NSD file may include at least one deployment strategy, and a deployment strategy may be associated with at least one VNF. It can be understood that for the content of the NSD file, the embodiment of the present application only gives a description of the relevant parts of the present application, and other parts that are not relevant to the present patent are not reflected here; and the number of VNFs and deployment strategies is only used as an example, not As a limitation to this application, an NSD file can include 1 deployment strategy, 2 deployment strategies, 4 deployment strategies, 5 deployment strategies or more, and a VNF can also be associated with 1, 3 or more deployment strategies The association is specifically adjusted according to requirements, which is not limited in this application.
其中,affinityOrAntiAffinityGroupId字段定义与该VNF关联的部署策略。例如,VNF1关联了两个第一部署策略(group_1,group_3),VNF2也关联了两个第一部署策略(group_2,group_3)。Among them, the affinityOrAntiAffinityGroupId field defines the deployment strategy associated with the VNF. For example, VNF1 is associated with two first deployment strategies (group_1, group_3), and VNF2 is also associated with two first deployment strategies (group_2, group_3).
affinityOrAntiAffinity为第一标识字段,用于定义第一标识,第一标识可以为affinity(即亲和标识)或AntiAffinity(即反亲和标识)。该字段具体用于指示该部署策略关联的VNF是affinity(共享)还是AntiAffinity(隔离)。affinityOrAntiAffinity is a first identification field, which is used to define a first identification, and the first identification may be affinity (ie, affinity identification) or AntiAffinity (ie, anti-affinity identification). This field is specifically used to indicate whether the VNF associated with the deployment policy is affinity (shared) or AntiAffinity (isolated).
Scope即第二标识字段,定义该部署策略的应用范围。第二标识可以为用户范围标识(tenant)、物理节点范围标识(NFVI_NODE)或虚拟节点范围标识(VM)。tenant为本申请新增的Scope参数。第一标识和第二标识结合可以确定该部署策略关联的VNF是哪种范围上的亲和或反亲和。例如,第一标识为affinity(亲和标识),第二标识为tenant时,指示NFVO从租户的用户资源池中为该部署策略关联的VNF分配资源。示例性的,VNF1和VNF2都关联了group3,说明VNF1和VNF2需要部署在同一用户资源池。Scope is the second identification field, which defines the application scope of the deployment policy. The second identifier may be a user-wide identifier (tenant), a physical node-wide identifier (NFVI_NODE) or a virtual node-wide identifier (VM). tenant is a newly added Scope parameter in this application. The combination of the first identifier and the second identifier can determine which scope affinity or anti-affinity the VNF associated with the deployment policy is. For example, when the first identifier is affinity (affinity identifier) and the second identifier is tenant, it indicates that the NFVO allocates resources for the VNF associated with the deployment policy from the user resource pool of the tenant. Exemplarily, both VNF1 and VNF2 are associated with group3, indicating that VNF1 and VNF2 need to be deployed in the same user resource pool.
本步骤上传的第一NSD文件中,第一部署策略中的各参数可以不赋值。即group1、group2和group3中的affinityOrAntiAffinityGroupId、Scope、tenantId和deploymentId均为空。也可以仅group3中的Scope、tenantId赋值,而其他group和其他group均不赋值。In the first NSD file uploaded in this step, each parameter in the first deployment strategy may not be assigned a value. That is, the affinityOrAntiAffinityGroupId, Scope, tenantId, and deploymentId in group1, group2, and group3 are all empty. It is also possible to only assign values to Scope and tenantId in group3, while other groups and other groups are not assigned values.
203:NFVO向OSS/BSS返回上传成功响应。203: The NFVO returns an upload success response to the OSS/BSS.
204:OSS/BSS向NFVO发起创建第一NS的第一NS实例ID请求,请求中包含已经第一NSD文件的文件标识。204: The OSS/BSS initiates a request to the NFVO to create the first NS instance ID of the first NS, and the request includes the file identifier of the first NSD file.
205:NFVO向OSS/BSS返回为第一NS创建的第一NS实例ID。205: The NFVO returns the first NS instance ID created for the first NS to the OSS/BSS.
NFVO根据文件标识确定要创建实例ID的第一NSD文件,以将创建的第一NS实例ID与第一NS关联起来。第一NS实例ID用于唯一标识第一NS。后续NFVO与OSS/BSS消息往来的过程中若消息中携带第一NS实例ID,则能够根据第一NS实例ID确定该消息作用于第一NS。The NFVO determines the first NSD file whose instance ID is to be created according to the file identifier, so as to associate the created first NS instance ID with the first NS. The first NS instance ID is used to uniquely identify the first NS. If the message carries the first NS instance ID during the subsequent message exchange between the NFVO and the OSS/BSS, it can be determined according to the first NS instance ID that the message acts on the first NS.
206:OSS/BSS向NFVO发送实例化第一NS的第一请求消息。206: The OSS/BSS sends a first request message for instantiating the first NS to the NFVO.
其中,第一请求消息携带第一NS实例ID。第一请求消息用于指示NFVO触发第一NS中的第一VNF实例化流程。Wherein, the first request message carries the first NS instance ID. The first request message is used to instruct the NFVO to trigger the first VNF instantiation process in the first NS.
在第一请求消息中还可以携带第一VNF的部署地理位置信息。例如VNF1位于城市A, VNF2位于城市B。The deployment geographic location information of the first VNF may also be carried in the first request message. For example, VNF1 is located in city A, and VNF2 is located in city B.
由于步骤202中未给第一部署策略赋值。本步骤中,第一请求消息中还携带每一group分配deploymentId和tenant_id信息。具体地,在本实施例中分配信息如下:Because no value is assigned to the first deployment policy in step 202 . In this step, the first request message also carries the deploymentId and tenant_id information assigned to each group. Specifically, the allocation information in this embodiment is as follows:
group_1:group_1:
tenantId:tenant-AtenantId: tenant-A
deploymentId:ID-123deploymentId: ID-123
group_2:group_2:
tenantId:tenant-AtenantId: tenant-A
deploymentId:ID-ABCdeploymentId:ID-ABC
group_3:group_3:
tenantId:tenant-AtenantId: tenant-A
deploymentId:ID-xyzdeploymentId:ID-xyz
由于在创建第一NS时,对于未来租户是否继续创建NS,以及创建新的NS中的VNF与第一NS中那些VNF资源隔离,或哪些VNF资源共享尚不清楚,因此其他参数本步骤中暂不分配,从而使租户创建第二NS时能够灵活地实现租户的隔离或共享需求。When the first NS is created, it is not clear whether future tenants will continue to create NS, and whether the VNF in the new NS is isolated from those VNF resources in the first NS, or which VNF resources are shared, so other parameters are temporarily used in this step. No allocation, so that tenants can flexibly realize the isolation or sharing requirements of tenants when they create the second NS.
207:NFVO根据第一请求消息以及第一NSD文件,确定需要实例化的第一VNF。207: The NFVO determines the first VNF that needs to be instantiated according to the first request message and the first NSD file.
208:NFVO向VNFM发送实例化第一VNF的指示消息。208: The NFVO sends an instruction message for instantiating the first VNF to the VNFM.
示例性的,VNFM在实例化VNF1和VNF2的过程中,分别需要向NFVO发起资源授权请求,NFVO在授权回复消息中携带分配资源的用户资源池信息,由于VNF1和VNF2都关联group_3,需要部署在同一个用户资源池中,所以NFVO在向VNFM分别回复的授权响应消息中所带用户资源池信息一样。Exemplarily, in the process of instantiating VNF1 and VNF2, VNFM needs to initiate a resource authorization request to NFVO respectively, and NFVO carries the user resource pool information for allocating resources in the authorization reply message. Since both VNF1 and VNF2 are associated with group_3, they need to be deployed in In the same user resource pool, the user resource pool information carried in the authorization response messages that NFVO replies to VNFM respectively is the same.
209:NFVO向VIM申请创建包含在第一NSD文件里的第一VL实例。209: The NFVO applies to the VIM for creating the first VL instance included in the first NSD file.
210:VNFM向NFVO返回第一VNF实例创建成功响应。210: The VNFM returns to the NFVO a response that the first VNF instance is created successfully.
211:VIM向NFVO返回第一VL实例创建成功响应。211: The VIM returns to the NFVO a response that the first VL instance is created successfully.
212:NFVO向OSS/BSS返回第一NS创建成功响应。212: The NFVO returns a first NS creation success response to the OSS/BSS.
213:OSS/BSS根据租户Z的第二需求确定为租户Z部署一个第二NS。213: The OSS/BSS determines to deploy a second NS for the tenant Z according to the second requirement of the tenant Z.
第二需求中,包括租户Z期望的网络功能以及网络功能所在的地理位置。The second requirement includes the network function desired by the tenant Z and the geographical location of the network function.
OSS/BSS根据第二需求中网络功能的数量以及地理位置确定第二VNF的数量以及部署第二VNF的地理位置,生成第二NS的第二NSD文件。第二NSD文件可采用与第一NSD文件相同的文件。当然,第二NSD文件也可采用与第一NSD文件不同的文件。The OSS/BSS determines the quantity of the second VNF and the geographical location where the second VNF is deployed according to the quantity and geographical location of the network functions in the second requirement, and generates the second NSD file of the second NS. The second NSD file can use the same file as the first NSD file. Certainly, the second NSD file may also adopt a file different from the first NSD file.
示例性的,租户Z期望部署一个新的网络,其中要求网络控制部分位于中心城市A,提供数据缓存的边缘服务器在城市B,并且位于中心城市A的部分网络功能对隔离没有需求,从资源利用率角度,该租户在中心城市部署的部分可以共享。OSS/BSS确定为该租户部署的第二NS中包括两个第二VNF(VNF3和VNF4)。Exemplarily, tenant Z expects to deploy a new network, which requires the network control part to be located in central city A, the edge server that provides data caching to be located in city B, and some network functions located in central city A do not require isolation, from resource utilization In terms of rate, the part deployed by the tenant in the central city can be shared. The OSS/BSS determines that the second NS deployed for the tenant includes two second VNFs (VNF3 and VNF4).
214:OSS/BSS向NFVO上传第二NSD文件,第二NSD文件中包括第二部署策略。214: The OSS/BSS uploads a second NSD file to the NFVO, where the second NSD file includes the second deployment strategy.
示例性的,如图4所示,图4为本申请提供的第二NSD文件的示意图。Exemplarily, as shown in FIG. 4, FIG. 4 is a schematic diagram of the second NSD file provided by the present application.
215,OSS/BSS向NFVO发送实例化第二NS的第二请求消息。215. The OSS/BSS sends a second request message for instantiating the second NS to the NFVO.
根据第二NSD文件和租户需求,第二请求消息中携带针对第二NS所分配的部署任务标识、用户表示第一标识和第二标识。According to the second NSD file and the requirements of the tenant, the second request message carries the deployment task identifier assigned to the second NS, the first identifier and the second identifier of the user representation.
示例性的,第二部署策略分配信息如下:Exemplarily, the allocation information of the second deployment strategy is as follows:
Figure PCTCN2022115397-appb-000001
Figure PCTCN2022115397-appb-000001
216:NFVO根据第二请求消息和第二NSD文件,执行实例化第二VNF的流程。216: The NFVO executes the process of instantiating the second VNF according to the second request message and the second NSD file.
具体地,NFVO根据第二部署策略中的用户标识和部署任务标识,在存储的其他部署策略查找具有相同的用户标识和部署任务标识的部署策略,确定第一部署策略和第二部署策略包括相同的用户标识和部署任务标识。Specifically, according to the user ID and deployment task ID in the second deployment policy, NFVO searches other stored deployment policies for a deployment policy with the same user ID and deployment task ID, and determines that the first deployment policy and the second deployment policy include the same The user ID and deployment task ID for .
NFVO获取第一部署策略关联的第一VNF,第二部署策略关联的第二VNF,以及第二部署策略中的第一标识。根据第一标识确定第一VNF和第二VNF是共资源部署还是隔离资源部署。The NFVO acquires the first VNF associated with the first deployment strategy, the second VNF associated with the second deployment strategy, and the first identifier in the second deployment strategy. Determine whether the first VNF and the second VNF are deployed with shared resources or deployed with isolated resources according to the first identifier.
示例性的,当第二部署策略为group_c时,根据tenantId:tenant-A和deploymentId:ID-xyz查找到具有相同tenantId和deploymentId的group_3,即第一NS的group_3与第二NS的group_c相同,在部署时group_c关联的VNF3、VNF4和group_3关联的VNF1、VNF2需要满足相同的部署策略。进一步地,根据group_c的affinityOrAntiAffinity和scope信息确认VNF1、VNF2、VNF3和VNF4都属于同一个租户,资源都要属于相同的用户资源池。Exemplarily, when the second deployment strategy is group_c, group_3 with the same tenantId and deploymentId is found according to tenantId: tenant-A and deploymentId: ID-xyz, that is, group_3 of the first NS is the same as group_c of the second NS. During deployment, VNF3 and VNF4 associated with group_c and VNF1 and VNF2 associated with group_3 need to meet the same deployment policy. Further, according to the affinityOrAntiAffinity and scope information of group_c, it is confirmed that VNF1, VNF2, VNF3 and VNF4 all belong to the same tenant, and the resources all belong to the same user resource pool.
当第二部署策略为group_a时,根据tenantId:tenant-A和deploymentId:ID-123查找到具有相同的tenantId和deploymentId的group_1,即第一NS的group_1与第二NS的group_a相同,在部署时group_1关联的VNF1和group_c关联的VNF3需要满足相同的部署策略。进一步地,根据group_c的affinityOrAntiAffinity和scope信息确认group_c的策略是scope为VM的亲和性,即group_c相关联的VNF3和group_1关联的VNF1可以共虚拟机(VM)部署,也即VNF3可以于VNF1共享同一个VNF实例。则NFVO不需要发起新的VNF3实例化流程,并判断第一NS内的VNF1实例上的资源是否满足VNF3的需求,如果满足,直接将该VNF1实例分配给第二NS。如果VNF1实例上资源不足VNF3的需求,则对VNF_1进行扩容操 作,再分配给第二NS。When the second deployment strategy is group_a, find group_1 with the same tenantId and deploymentId according to tenantId: tenant-A and deploymentId: ID-123, that is, group_1 of the first NS is the same as group_a of the second NS, and group_1 is deployed The associated VNF1 and the VNF3 associated with group_c need to meet the same deployment policy. Further, according to the affinityOrAntiAffinity and scope information of group_c, it is confirmed that the policy of group_c is the affinity of scope as VM, that is, the VNF3 associated with group_c and the VNF1 associated with group_1 can be deployed in a virtual machine (VM), that is, VNF3 can be shared with VNF1 The same VNF instance. Then NFVO does not need to initiate a new VNF3 instantiation process, and judges whether the resources on the VNF1 instance in the first NS meet the requirements of VNF3, and if so, directly allocates the VNF1 instance to the second NS. If the resources on the VNF1 instance are insufficient to meet the requirements of VNF3, the capacity of VNF_1 will be expanded and then allocated to the second NS.
当第二部署策略为group_b时,针对group_2,根据tenantId:tenant-A和deploymentId:ID-ABC查找到具有相同的tenantId和deploymentId的group_2,即第一NS的group_2与第二NS的group_b相同,在部署时group_2关联的VNF2和group_b关联的VNF4需要满足相同的部署策略。进一步地,根据group_b的affinityOrAntiAffinity和scope信息确认group_b的策略是scope为NFVI-NODE的反亲和性,即group_b相关联的VNF4和group_2关联的VNF2需要物理机(NFVI-NODE)隔离部署。则NFVO向VNFM发起VNF4的实例化流程,其中向VNFM指示部署VNF4实例的用户资源池信息同步骤208中一样,但部署选择的物理机同部署第一NS的VNF2不同。When the second deployment strategy is group_b, for group_2, group_2 with the same tenantId and deploymentId is found according to tenantId: tenant-A and deploymentId: ID-ABC, that is, group_2 of the first NS is the same as group_b of the second NS. During deployment, VNF2 associated with group_2 and VNF4 associated with group_b must meet the same deployment policy. Further, according to the affinityOrAntiAffinity and scope information of group_b, confirm that the policy of group_b is the anti-affinity scope of NFVI-NODE, that is, the VNF4 associated with group_b and the VNF2 associated with group_2 need to be isolated and deployed on physical machines (NFVI-NODE). Then NFVO initiates the instantiation process of VNF4 to VNFM, and instructs VNFM to deploy the user resource pool information of VNF4 instance as in step 208, but the physical machine selected for deployment is different from the VNF2 deployed on the first NS.
当一VNF关联有两个及以上的部署策略时,NFVO同时遵照这些部署策略为该VNF分配资源。例如,VNF2与group2和group3关联,VNF4与groupb和groupc关联,group2与groupb相同,group3与groupc相同,则VNF2与VNF4既要满足部署在同一用户资源池,又要满足部署与不同的物理节点上的要求。When a VNF is associated with two or more deployment strategies, NFVO allocates resources for the VNF in accordance with these deployment strategies. For example, VNF2 is associated with group2 and group3, VNF4 is associated with groupb and groupc, group2 is the same as groupb, and group3 is the same as groupc, then VNF2 and VNF4 must be deployed in the same user resource pool and must be deployed on different physical nodes requirements.
对于用户标识和部署任务标识中有至少一者不同的部署策略之间,它们关联的VNF之间即无资源隔离的要求,也无资源共享的要求,NFVO在分配资源时,根据租户要求的地理位置以及用户资源池中的剩余资源为这些VNF分配资源即可,可能会部署到同一物理节点或虚拟节点,也有可能部署到不同的物理节点或不同的虚拟节点。For deployment strategies with at least one different user ID and deployment task ID, there is no requirement for resource isolation or resource sharing between their associated VNFs. The location and the remaining resources in the user resource pool can be used to allocate resources to these VNFs, which may be deployed on the same physical node or virtual node, or may be deployed on different physical nodes or different virtual nodes.
NFVO向VNFM发送实例化第二VNF的指示消息,指示消息中携带第二VNF的位置信息。示例性的,NFVO指示部署VNF4时,指示消息中携带城市B的信息、用户资源池信息以及不与VNF2共节点的信息等位置信息,从而VNFM根据这些信息选择符合条件的物理节点部署VNF4。The NFVO sends an indication message for instantiating the second VNF to the VNFM, and the indication message carries the location information of the second VNF. Exemplarily, when NFVO instructs VNF4 to be deployed, the instruction message carries location information such as city B information, user resource pool information, and information on nodes not shared with VNF2, so that VNFM selects qualified physical nodes to deploy VNF4 based on these information.
217-220:第二VNF和第二VL创建完成,完成第二NS的部署。217-220: the creation of the second VNF and the second VL is completed, and the deployment of the second NS is completed.
具体参照步骤209-212,在此不再赘述。For details, refer to steps 209-212, which will not be repeated here.
本实施例中,通过在NSD文件中增加用户标识、部署任务标识、第一标识和第二标识,使得NFVO能够基于这些参数感知租户的部署要求,从而根据根据部署要求完成网络业务的部署,使得不同NS之间的VNF能够灵活地隔离资源部署或者共享资源部署,提高网络业务的安全性以及资源的利用率。In this embodiment, by adding the user ID, deployment task ID, first ID, and second ID in the NSD file, NFVO can perceive the deployment requirements of tenants based on these parameters, so as to complete the deployment of network services according to the deployment requirements, so that VNFs between different NSs can flexibly isolate resource deployment or share resource deployment, improving network service security and resource utilization.
如图5所示,图5为本申请实施例提供的网络业务部署方法第二实施例的流程示意图。与网络业务部署方法第一实施例区别的是,本实施例OSS/BSS向NFVO发送第一部署策略的时机和载体不同。本实施例包括如下步骤:As shown in FIG. 5 , FIG. 5 is a schematic flowchart of a second embodiment of a network service deployment method provided in an embodiment of the present application. The difference from the first embodiment of the network service deployment method is that in this embodiment, the timing and carrier of the first deployment policy sent by the OSS/BSS to the NFVO are different. This embodiment includes the following steps:
301-312:创建第一NS。301-312: Create the first NS.
步骤301-312类似步骤201-212,不同的是,本实施例中,无需对NSD模板扩展,即不需要对NSD文件做更新,第一NSD文件中没有用户标识字段和部署任务标识字段,第二标识也无用户范围标识。第一请求消息中也不需要为第一NS分配用户标识和部署任务标识。Steps 301-312 are similar to steps 201-212. The difference is that in this embodiment, there is no need to expand the NSD template, that is, there is no need to update the NSD file. There is no user identification field and deployment task identification field in the first NSD file. The second identifier also has no user scope identifier. In the first request message, there is no need to assign a user ID and a deployment task ID to the first NS.
313:OSS/BSS根据租户Z的第二需求,选择部署第二NS为其提供服务。313: The OSS/BSS chooses to deploy the second NS to provide services for the tenant Z according to the second requirement.
314:OSS/BSS向NFVO发送更新消息,更新消息用于为第一NS添加第一部署策略。314: The OSS/BSS sends an update message to the NFVO, where the update message is used to add the first deployment policy to the first NS.
本实施例中,第一部署策略可以有如下两种应用场景:In this embodiment, the first deployment strategy may have the following two application scenarios:
应用场景1:第一部署策略可以为NS层面上的部署策略,即指示第一NS整体与其他NS 资源隔离或共享,第一NS中的每一VNF均与第一部署策略关联,可应用于第二NS中的所有VNF需要与第一NS中的所有VNF互相资源隔离或共享的场景。Application Scenario 1: The first deployment strategy can be a deployment strategy at the NS level, which instructs the first NS to isolate or share resources with other NSs. Each VNF in the first NS is associated with the first deployment strategy, which can be applied to A scenario where all VNFs in the second NS need to isolate or share resources from all VNFs in the first NS.
示例性的,第一部署策略为NS层面上的部署策略时,第一部署策略具体内容如下:Exemplarily, when the first deployment strategy is a deployment strategy on the NS level, the specific content of the first deployment strategy is as follows:
Figure PCTCN2022115397-appb-000002
Figure PCTCN2022115397-appb-000002
其中,NS_1_id为第一NS实例ID,其他参数含义如第一实施例中所解释的,故在此不再赘述,此处用于关联第一NS和第一部署策略。即定义了一个第二部署策略,是scope为nfvi-node(物理节点范围)的反亲和特性,对象是整个第一NS(NS_1)实例。Wherein, NS_1_id is the first NS instance ID, and the meanings of other parameters are as explained in the first embodiment, so they are not repeated here, and are used here to associate the first NS with the first deployment strategy. That is, a second deployment strategy is defined, which is an anti-affinity feature whose scope is nfvi-node (physical node scope), and whose object is the entire first NS (NS_1) instance.
应用场景2:第一部署策略还可以为VNF层面上的部署策略,即第一部署策略可以只与第一NS中的部分VNF关联,且只限制与之关联的VNF的资源隔离或共享,可以应用于部分第二VNF需要与部分第一VNF资源隔离或共享的场景。Application Scenario 2: The first deployment strategy can also be a deployment strategy at the VNF level, that is, the first deployment strategy can only be associated with some VNFs in the first NS, and only limit the resource isolation or sharing of the associated VNFs. It is applied to a scenario where some second VNFs need to be isolated or shared with some first VNF resources.
示例性的,第一部署策略为VNF层面上的部署策略时,若更新消息中包括两个第一部署策略,每一第一部署策略具体内容如下:Exemplarily, when the first deployment strategy is a deployment strategy on the VNF level, if the update message includes two first deployment strategies, the specific content of each first deployment strategy is as follows:
Figure PCTCN2022115397-appb-000003
Figure PCTCN2022115397-appb-000003
其中,VNF_1_id为VNF1的实例ID,VNF_2_id为VNF2的实例ID,为NFVO分配的。VNF_1_id用于关联第一VNF和第一部署策略,VNF_2_id用于关联第二VNF和第二部署策略。Among them, VNF_1_id is the instance ID of VNF1, and VNF_2_id is the instance ID of VNF2, which are allocated by NFVO. VNF_1_id is used to associate the first VNF with the first deployment strategy, and VNF_2_id is used to associate the second VNF with the second deployment strategy.
315:OSS/BSS向NFVO上传第二NS的第二NSD文件。315: The OSS/BSS uploads the second NSD file of the second NS to the NFVO.
本实施例中,第二NSD文件中也未对NSD文件进行更新和拓展,即第二NSD文件中不包括用户标识字段、部署任务字段等。In this embodiment, the second NSD file does not update and expand the NSD file, that is, the second NSD file does not include user identification fields, deployment task fields, and the like.
316:OSS/BSS向NFVO发送实例化第二NS的第二请求消息,第二请求消息中携带第二部署策略。316: The OSS/BSS sends a second request message for instantiating the second NS to the NFVO, where the second request message carries the second deployment policy.
第二请求消息中包含第二部署策略,第二部署策略中的第一标识、第二标识、用户标识和部署任务标识均与第一部署策略中相同,表示第二NS的部署同第一NS遵守相同的部署策略。The second request message contains the second deployment strategy. The first identifier, second identifier, user identifier, and deployment task identifier in the second deployment strategy are the same as those in the first deployment strategy, indicating that the deployment of the second NS is the same as that of the first NS. Follow the same deployment strategy.
示例性的,若租户的需求是第二NS与第一NS物理机隔离,即第二NS中的每一个第二 VNF不与第一NS中的任一第一VNF共物理机部署,则第二部署策略具体内容如下:Exemplarily, if the tenant's requirement is that the second NS is isolated from the physical machine of the first NS, that is, each second VNF in the second NS is not deployed on a physical machine with any first VNF in the first NS, then the first The details of the second deployment strategy are as follows:
Figure PCTCN2022115397-appb-000004
Figure PCTCN2022115397-appb-000004
NFVO根据第一部署策略和第二部署策略确定第一NS实例和第二NS实例需要物理机隔离。由于第一部署策略和第二部署策略的tenantId都是tenant-A,说明第一NS和第二NS属于相同的租户,需要在相同的用户资源池中部署。The NFVO determines according to the first deployment strategy and the second deployment strategy that the first NS instance and the second NS instance need physical machine isolation. Since the tenantId of the first deployment strategy and the second deployment strategy are both tenant-A, it means that the first NS and the second NS belong to the same tenant and need to be deployed in the same user resource pool.
示例性的,若租户的需求是VNF1与第二NS中的VNF3共虚拟节点部署,VNF2与第二NS中的VNF4隔离物理节点部署,则每一第二部署策略的内容分别如下:Exemplarily, if the tenant's requirement is that VNF1 and VNF3 in the second NS are deployed on a common virtual node, and VNF2 and VNF4 in the second NS are deployed on separate physical nodes, then the content of each second deployment strategy is as follows:
Figure PCTCN2022115397-appb-000005
Figure PCTCN2022115397-appb-000005
第二请求消息携带的部署策略数量也可以根据实际需求调整。示例性的,当VNF3和VNF4也有物理节点隔离的需求时,第二请求消息中还可以包括如下的第二部署策略:The number of deployment strategies carried in the second request message may also be adjusted according to actual needs. Exemplarily, when VNF3 and VNF4 also require physical node isolation, the second request message may also include the following second deployment strategy:
Figure PCTCN2022115397-appb-000006
Figure PCTCN2022115397-appb-000006
317:NFVO根据第二请求消息以及第二NSD文件,执行实例化第二VNF的流程。317: The NFVO executes the process of instantiating the second VNF according to the second request message and the second NSD file.
本步骤与步骤216类似,即通过匹配到具有相同的用户标识和部署任务标识的第一部署策略和第二部署策略,再根据第一标识和第二标识确定第一部署策略和第二部署策略关联的 VNF之间是否资源共享或资源隔离,故在此不再赘述。This step is similar to step 216, that is, by matching the first deployment strategy and the second deployment strategy with the same user identifier and deployment task identifier, and then determining the first deployment strategy and the second deployment strategy according to the first identifier and the second identifier Whether resource sharing or resource isolation between associated VNFs is omitted here.
示例性的,在应用场景1的情况下,所有第二VNF部署的物理节点与所有第一VNF部署的物理节点均不同。Exemplarily, in the case of application scenario 1, the physical nodes deployed by all the second VNFs are different from the physical nodes deployed by all the first VNFs.
示例性的,在应用场景2的情况下,VNF1和VNF3共虚拟机节点部署,VNF2和VNF4的物理节点隔离部署。Exemplarily, in the case of application scenario 2, VNF1 and VNF3 are deployed on virtual machine nodes, and VNF2 and VNF4 are deployed on isolated physical nodes.
318-321:第二VNF和第二VL创建完成,完成第二NS的部署。318-321: the creation of the second VNF and the second VL is completed, and the deployment of the second NS is completed.
具体参照步骤209-212,在此不再赘述。For details, refer to steps 209-212, which will not be repeated here.
本实施例中,通过在部署第二NS时OSS/BSS获取租户的需求后再生成第一NS的第一部署策略,并向NFVO发送第一NS的第一部署策略,从而使第一部署策略和第二部署策略的制定更加灵活。In this embodiment, when the second NS is deployed, the OSS/BSS obtains the requirements of the tenants, then generates the first deployment strategy of the first NS, and sends the first deployment strategy of the first NS to NFVO, so that the first deployment strategy And the formulation of the second deployment strategy is more flexible.
在一些其他的实施方式中,OSS/BSS可以通过第一NSD文件作为载体向NFVO提供第一部署策略,通过第二请求消息作为载体向NFVO提供第二策略,即步骤201至步骤212,以及步骤313至步骤321合并作为一个实施例。OSS/BSS还可以通过更新消息作为载体向NFVO提供第一部署策略,通过第二NSD文件作为载体向NFVO提供第二策略,即步骤301至步骤312,以及步骤212至步骤218合并作为一个实施例。对此本申请不做限制。In some other implementations, OSS/BSS can provide the first deployment strategy to NFVO through the first NSD file as a carrier, and provide the second strategy to NFVO through the second request message as a carrier, that is, steps 201 to 212, and steps Steps 313 to 321 are combined as one embodiment. OSS/BSS can also provide the first deployment strategy to NFVO through the update message as the carrier, and provide the second strategy to NFVO through the second NSD file as the carrier, that is, steps 301 to 312, and steps 212 to 218 are combined as an embodiment . This application is not limited to this.
如图6所示,图6为本申请实施例提供的网络业务部署方法第三实施例的流程示意图。本实施例中,租户有部署至少两个NS的需求,即第一NS和第二NS均为待部署的NS,对于如何实现两个待部署的NS之间的资源隔离或共享,本实施例通过如下步骤实现:As shown in FIG. 6 , FIG. 6 is a schematic flowchart of a third embodiment of a network service deployment method provided in an embodiment of the present application. In this embodiment, the tenant needs to deploy at least two NSs, that is, both the first NS and the second NS are NSs to be deployed. As for how to implement resource isolation or sharing between the two NSs to be deployed, this embodiment It is achieved through the following steps:
401:OSS/BSS根据租户Z的至少两个网络需求,使用嵌套NSD文件为租户Z部署网络。401: OSS/BSS uses nested NSD files to deploy a network for tenant Z according to at least two network requirements of tenant Z.
本实施例中以租户的网络需求为2个进行举例说明。In this embodiment, two network requirements of tenants are taken as an example for illustration.
其中嵌套NSD文件中包含2个NSD文件的NSD文件标识,每一NSD文件标识对应的NSD文件用来部署一个NS。The nested NSD file contains NSD file identifiers of two NSD files, and the NSD file corresponding to each NSD file identifier is used to deploy an NS.
示例性的,如图7所示,图7为本申请提供的嵌套NSD文件示意图。Exemplarily, as shown in FIG. 7, FIG. 7 is a schematic diagram of a nested NSD file provided by this application.
如图7所示,即嵌套NSD文件(NSD-3)内包含2个NSD文件标识,即NSD-1和NSD-2。根据租户需求,NSD-1对应的第一NSD文件和NSD-2对应的第二NSD文件分别用来部署租户需要的2个网络,其中第一NS中的VNF1和第二NS中的VNF3需要部署在中心城市A,而且是共物理机部署的;第一NS中的VNF2部署在城市B,第二NS中的VNF4部署在城市C,它们彼此隔离。针对该需求,嵌套NSD文件中的NSD-1对应的第一NSD文件包括如图8所示的内容,嵌套NSD文件中的NSD-2对应的第二NSD文件包括如图9所示的内容。图8为本申请提供的嵌套NSD文件中的NSD-1对应的第一NSD文件的示意图,图9为嵌套NSD文件中的NSD-2对应的第二NSD文件的示意图。As shown in Figure 7, the nested NSD file (NSD-3) contains two NSD file identifiers, namely NSD-1 and NSD-2. According to the tenant's requirements, the first NSD file corresponding to NSD-1 and the second NSD file corresponding to NSD-2 are used to deploy the two networks required by the tenant, among which VNF1 in the first NS and VNF3 in the second NS need to be deployed In the central city A, it is deployed on the same physical machine; VNF2 in the first NS is deployed in city B, and VNF4 in the second NS is deployed in city C, and they are isolated from each other. In response to this requirement, the first NSD file corresponding to NSD-1 in the nested NSD file includes the content shown in Figure 8, and the second NSD file corresponding to NSD-2 in the nested NSD file includes the content shown in Figure 9 content. FIG. 8 is a schematic diagram of a first NSD file corresponding to NSD-1 in the nested NSD files provided by the present application, and FIG. 9 is a schematic diagram of a second NSD file corresponding to NSD-2 in the nested NSD files.
本申请实施例中,用于指示关联的VNF部署于租户的资源池的部署策略(包括用户范围标识的部署策略,即scope为tenant的部署策略,例如group_3、group_c),由于该部署策略的应用范围是租户的所有VNF,而不是只针对该租户的某一些VNF,所有该部署策略中的部署任务标识可以为空。当然,该部署策略中的部署任务标识也可以不为空,对此本申请不做限制。In the embodiment of this application, the deployment policy used to indicate that the associated VNF is deployed in the tenant's resource pool (including the deployment policy of the user scope identifier, that is, the deployment policy whose scope is tenant, such as group_3, group_c), due to the application of the deployment policy The scope is all VNFs of the tenant, not only some VNFs of the tenant, and the deployment task ID in all deployment policies can be empty. Of course, the deployment task ID in the deployment strategy may not be empty, and this application does not limit this.
本实施例中,第一部署策略和第二部署策略除了具有相同的用户标识和部署任务标识外,还具有相同的第一标识和第二标识。当然,第一部署策略和第二部署策略具有相同的用户标 识和部署任务标识的情况下,也可以第一部署策略和第二部署策略中只有其中一者具有第一标识和第二标识,对此本申请不做限制。In this embodiment, the first deployment strategy and the second deployment strategy have the same first identifier and second identifier in addition to the same user identifier and deployment task identifier. Of course, in the case where the first deployment strategy and the second deployment strategy have the same user ID and deployment task ID, only one of the first deployment strategy and the second deployment strategy may have the first ID and the second ID. This application is not limited.
402-405:OSS/BSS向NFVO上传嵌套NSD文件以及第一NSD文件和第二NSD文件,并向NFVO申请第一NS的第一NS实例标识和第二NS实例的第二NS实例标识。402-405: The OSS/BSS uploads the nested NSD file, the first NSD file and the second NSD file to the NFVO, and applies to the NFVO for the first NS instance ID of the first NS and the second NS instance ID of the second NS instance.
步骤402-405类似于步骤202至步骤205,故在此不再赘述。Steps 402-405 are similar to steps 202 to 205, so details will not be repeated here.
406:OSS/BSS向NFVO发送实例化第一NS和第二NS的第一请求消息。406: The OSS/BSS sends a first request message for instantiating the first NS and the second NS to the NFVO.
407:NFVO根据第一请求消息和嵌套NSD文件、第一NSD文件和第二NSD文件,执行实例化第二VNF的流程。407: The NFVO executes a process of instantiating the second VNF according to the first request message and the nested NSD file, the first NSD file, and the second NSD file.
具体地,NFVO比较第一NSD文件中的至少一个第一部署策略和第二NSD文件中的至少一个第二部署策略,从中确定具有相同用户标识和部署任务标识的第一部署策略和第二部署策略,以确定与之关联的第一VNF和第二VNF之间是否共资源部署。Specifically, NFVO compares at least one first deployment strategy in the first NSD file and at least one second deployment strategy in the second NSD file, and determines the first deployment strategy and the second deployment strategy with the same user ID and deployment task ID. Policy, to determine whether the associated first VNF and the second VNF share resource deployment.
示例性的,NFVO获取并解析嵌套NSD文件,根据嵌套NSD文件中的第一NSD文件标识获取第一NSD文件,根据第二NSD文件获取第二NSD文件。NFVO确定第一NSD文件中的group_3和第二NSD文件中的group_c中的affinityOrAntiAffinity均为AFFINITY、scope均为tenant且tenantID均为tenant-A,则确定与group_3关联的VNF1、VNF2以及与group_c关联的VNF3和VNF4均部署于同一用户资源池。Exemplarily, NFVO obtains and parses the nested NSD file, obtains the first NSD file according to the first NSD file identifier in the nested NSD file, and obtains the second NSD file according to the second NSD file. NFVO determines that the affinityOrAntiAffinity in group_3 in the first NSD file and group_c in the second NSD file are both AFFINITY, the scope is both tenant and the tenantID is tenant-A, then determine the VNF1 and VNF2 associated with group_3 and the VNF associated with group_c Both VNF3 and VNF4 are deployed in the same user resource pool.
进一步地,第一NSD文件中的group_1和第二NSD文件中的group_a具有相同的tenantId和deploymentId,从而表明group_a和group_1为相同的部署策略,其关联的对象VNF1和VNF3,在部署时需要遵循相同的亲和反亲和规则。group_a和group_1中的affinityOrAntiAffinity为AFFINITY,scope为NFVI-NODE,即VNF1和VNF3为物理节点上亲和,需要部署在同一物理节点。Further, group_1 in the first NSD file and group_a in the second NSD file have the same tenantId and deploymentId, thus indicating that group_a and group_1 have the same deployment strategy, and their associated objects VNF1 and VNF3 need to follow the same deployment strategy. Affinity and anti-affinity rules for . The affinityOrAntiAffinity in group_a and group_1 is AFFINITY, and the scope is NFVI-NODE, that is, VNF1 and VNF3 have affinity on physical nodes and need to be deployed on the same physical node.
进一步地,第一NSD文件中的group_2和第二NSD文件中的group_b,具有相同的tenantId和deploymentId,从而表明group_2与group_b为相同的部署策略,其关联的对象VNF2和VNF4在部署是需要遵循相同的部署策略。group_2与group_b中的affinityOrAntiAffinity为AntiAffinity,scope为NFVI-NODE,即VNF2和VNF4为物理节点的反亲和,需要部署在不同的物理节点上。Further, group_2 in the first NSD file and group_b in the second NSD file have the same tenantId and deploymentId, thus indicating that group_2 and group_b have the same deployment strategy, and their associated objects VNF2 and VNF4 need to follow the same deployment strategy deployment strategy. The affinityOrAntiAffinity in group_2 and group_b is AntiAffinity, and the scope is NFVI-NODE, that is, VNF2 and VNF4 are anti-affinities of physical nodes, and need to be deployed on different physical nodes.
本实施例中,NFVO可以先向VNFM发送实例化第一VNF的指示消息,以完成第一NS的部署,并接收VNFM返回的部署第一VNF的物理节点或虚拟节点信息。然后根据第二VNF与第一VNF的关联的部署策略确定的亲和反亲和关系,NFVO向VNFM发送实例化第二VNF的指示消息,指示消息中携带第一VNF的物理节点或虚拟节点信息,以使VNFM将第二VNF部署在同一物理节点或虚拟节点,或者部署在不同的物理节点或虚拟节点。In this embodiment, the NFVO may first send an instruction message to the VNFM to instantiate the first VNF to complete the deployment of the first NS, and receive the physical node or virtual node information returned by the VNFM to deploy the first VNF. Then according to the affinity and anti-affinity relationship determined by the associated deployment strategy between the second VNF and the first VNF, the NFVO sends an instruction message to instantiate the second VNF to the VNFM, and the instruction message carries the physical node or virtual node information of the first VNF , so that the VNFM deploys the second VNF on the same physical node or virtual node, or on different physical nodes or virtual nodes.
示例性的,NFVO可以先根据第一NSD文件指示VNFM完成第一NS中VNF1和VNF2的部署,并获取部署VNF1和VNF2的物理节点。再根据第二NSD文件指示VNFM完成VNF3和VNF4的部署。其中部署VNF3时,根据部署的VNF1所在的物理节点,提供给VNFM完成VNF3部署,从而实现VNF1和VNF3的共物理机部署。部署VNF4时,根据部署的VNF2所在的物理节点,提供给VNFM并指示VNFM采用不同的物理节点用来完成VNF4部署,从而实现VNF2和VNF4的物理节点隔离部署。Exemplarily, the NFVO may first instruct the VNFM to complete the deployment of the VNF1 and VNF2 in the first NS according to the first NSD file, and obtain the physical nodes on which the VNF1 and VNF2 are deployed. Then instruct the VNFM to complete the deployment of VNF3 and VNF4 according to the second NSD file. When deploying VNF3, according to the physical node where the deployed VNF1 is located, it is provided to the VNFM to complete the deployment of VNF3, so as to realize the common physical machine deployment of VNF1 and VNF3. When deploying VNF4, according to the physical node where the deployed VNF2 is located, provide it to VNFM and instruct VNFM to use different physical nodes to complete the deployment of VNF4, so as to realize the isolated deployment of physical nodes of VNF2 and VNF4.
408-411:第一VNF和第一VL,以及第二VNF和第二VL创建完成,完成第一NS和第二 NS的部署。408-411: The first VNF and the first VL, as well as the second VNF and the second VL are created, and the deployment of the first NS and the second NS is completed.
步骤408-411与步骤209-212类似,在此不再赘述。Steps 408-411 are similar to steps 209-212 and will not be repeated here.
本实施例中,对于需要一同部署的多个NS之间,通过嵌套NSD的方式向NFVO上传对应的部署策略,使NFVO根据部署策略中的用户标识、部署任务标识、第一标识和第二标识等确定多个NS的VNF之间的部署要求,从而根据部署要求为这些NS中的VNF分配资源,完成NS的部署。In this embodiment, for multiple NSs that need to be deployed together, the corresponding deployment strategy is uploaded to NFVO by means of nested NSD, so that NFVO can use the user identifier, deployment task identifier, first identifier, and second Identify and determine the deployment requirements among the VNFs of multiple NSs, so as to allocate resources for the VNFs in these NSs according to the deployment requirements, and complete the deployment of NSs.
在一些其他的实施方式中,也可以不对NSD文件进行拓展,即不在NSD文件中携带第一部署策略和第二部署策略,而是在OSS/BSS请求实例化第一NS和第二NS的请求消息中携带第一部署策略和第二部署策略,具体可参照网络业务部署方法第二实施例中的更新消息或第二请求消息中的部署策略的格式,故在此不再赘述。In some other implementations, the NSD file may not be expanded, that is, the first deployment strategy and the second deployment strategy are not carried in the NSD file, but the OSS/BSS requests the instantiation of the first NS and the second NS. The message carries the first deployment strategy and the second deployment strategy. For details, refer to the update message or the format of the deployment strategy in the second request message in the second embodiment of the network service deployment method, so details are not repeated here.
如图10所示,图10为本申请实施例提供的NFVO一实施例的结构示意图。本实施例中,NFVO500包括:As shown in FIG. 10 , FIG. 10 is a schematic structural diagram of an embodiment of NFVO provided by the embodiment of the present application. In this embodiment, NFVO500 includes:
获取模块501,用于获取第一部署策略关联的第一虚拟化网络功能VNF,以及第二部署策略关联的第二VNF,第一VNF属于第一网络业务NS,第二VNF属于第二NS,第一部署策略和第二部署策略包括相同的用户标识和部署任务标识,第二部署策略还包括第一标识,第一标识用于指示资源的亲和或反亲和。The obtaining module 501 is configured to obtain a first virtualized network function VNF associated with the first deployment strategy and a second VNF associated with the second deployment strategy, the first VNF belongs to the first network service NS, and the second VNF belongs to the second NS, The first deployment strategy and the second deployment strategy include the same user identifier and deployment task identifier, and the second deployment strategy further includes a first identifier, and the first identifier is used to indicate resource affinity or anti-affinity.
确定模块502,用于根据第一标识确定第一VNF与第二VNF是否共资源部署。A determining module 502, configured to determine whether the first VNF and the second VNF are deployed on the same resource according to the first identifier.
在一些其他的实施方式中,NFVO500还包括接收模块503,用于接收运营和业务支持系统OSS/BSS发送的更新消息,更新消息用于更新第一NS的部署策略,更新消息包括第一部署策略。获取模块501还用于从更新消息中获取第一部署策略。In some other implementation manners, NFVO500 also includes a receiving module 503, configured to receive an update message sent by the operation and business support system OSS/BSS, the update message is used to update the deployment strategy of the first NS, and the update message includes the first deployment strategy . The acquiring module 501 is also configured to acquire the first deployment strategy from the update message.
在一些其他的实施方式中,NFVO500还包括接收模块503,用于接收OSS/BSS上传的第一NS对应的第一网络业务描述模板NSD文件,第一NSD文件包括第一部署策略。获取模块501还用于从第一NSD文件中获取第一部署策略。In some other implementation manners, NFVO500 further includes a receiving module 503, configured to receive a first network service description template NSD file corresponding to the first NS uploaded by the OSS/BSS, and the first NSD file includes the first deployment strategy. The acquiring module 501 is further configured to acquire the first deployment strategy from the first NSD file.
在一些其他的实施方式中,接收模块503还用于接收OSS/BSS发送的用于指示实例化第二NS的请求消息,请求消息中包括第二部署策略。获取模块501还用于从请求消息中获取第二部署策略。In some other implementation manners, the receiving module 503 is further configured to receive a request message sent by the OSS/BSS for instructing instantiation of the second NS, where the request message includes the second deployment strategy. The acquiring module 501 is further configured to acquire the second deployment policy from the request message.
在一些其他的实施方式中,接收模块503还用于接收OSS/BSS上传的第二NS对应的第二NSD文件,第二NSD文件包括第二部署策略。获取模块501还用于从第二NSD文件中获取第二部署策略。In some other implementation manners, the receiving module 503 is further configured to receive a second NSD file corresponding to the second NS uploaded by the OSS/BSS, where the second NSD file includes the second deployment strategy. The acquiring module 501 is further configured to acquire the second deployment policy from the second NSD file.
在一些其他的实施方式中,接收模块503用于接收OSS/BSS上传的第一NS对应的第一NSD文件和第二NS对应的第二NSD文件,第一NSD文件包括第一部署策略,第二NSD文件包括第二部署策略。获取模块501还用于从第一NSD文件中获取第一部署策略,以及从第二NSD文件第二部署策略。In some other implementation manners, the receiving module 503 is configured to receive the first NSD file corresponding to the first NS and the second NSD file corresponding to the second NS uploaded by the OSS/BSS, the first NSD file includes the first deployment strategy, the second NSD file The second NSD file includes the second deployment policy. The acquiring module 501 is also configured to acquire the first deployment strategy from the first NSD file and the second deployment strategy from the second NSD file.
其中,第二部署策略还包括第二标识,第二标识用于指示第二部署策略的应用范围。Wherein, the second deployment strategy further includes a second identifier, and the second identifier is used to indicate the scope of application of the second deployment strategy.
在一些其他的实施方式中,第一标识为亲和标识,第二标识为用户范围标识,确定模块502具体用于根据亲和标识和用户范围标识确定第一VNF与第二VNF部署于同一用户资源池。In some other implementations, the first identifier is an affinity identifier, and the second identifier is a user-scope identifier, and the determination module 502 is specifically configured to determine that the first VNF and the second VNF are deployed on the same user according to the affinity identifier and the user-scope identifier. resource pool.
在一些其他的实施方式中,第一标识为亲和标识或反亲和标识,第二标识为物理节点范围标识,确定模块502具体用于根据亲和标识和物理节点范围标识确定第一VNF与第二VNF 部署于同一物理节点,或根据反亲和标识和物理节点范围标识确定第一VNF和第二VNF部署于不同的物理节点。In some other implementation manners, the first identifier is an affinity identifier or an anti-affinity identifier, and the second identifier is a physical node range identifier, and the determining module 502 is specifically configured to determine the first VNF and The second VNF is deployed on the same physical node, or it is determined according to the anti-affinity identifier and the physical node range identifier that the first VNF and the second VNF are deployed on different physical nodes.
在一些其他的实施方式中,第一标识为亲和标识或反亲和标识,第二标识为虚拟节点范围标识,确定模块02具体用于根据亲和标识和虚拟节点范围标识确定第一VNF与第二VNF部署于同一虚拟节点,或根据反亲和标识和虚拟节点范围标识确定第一VNF和第二VNF部署于不同的虚拟节点。In some other implementation manners, the first identifier is an affinity identifier or an anti-affinity identifier, and the second identifier is a virtual node range identifier, and the determination module 02 is specifically configured to determine the first VNF and The second VNF is deployed on the same virtual node, or it is determined according to the anti-affinity identifier and the virtual node range identifier that the first VNF and the second VNF are deployed on different virtual nodes.
在一些其他的实施方式中,第一部署策略还包括与第二部署策略相同的第一标识和/或第二标识。In some other implementation manners, the first deployment strategy further includes the same first identifier and/or second identifier as the second deployment strategy.
在一些其他的实施方式中,接收模块503用于接收OSS/BSS发送的实例化第二NS的请求消息。NFVO500还包括发送模块504,用于响应于请求消息向VNFM发送实例化第二VNF的指示消息,指示消息用于指示第二VNF是否与第一VNF实例化于同一资源池/物理节点/虚拟节点。In some other implementation manners, the receiving module 503 is configured to receive a request message for instantiating the second NS sent by the OSS/BSS. NFVO500 also includes a sending module 504, configured to send an indication message of instantiating a second VNF to the VNFM in response to the request message, where the indication message is used to indicate whether the second VNF is instantiated in the same resource pool/physical node/virtual node as the first VNF .
如图11所示,图11为本申请实施例提供的NFVO另一实施例的结构示意图。本实施例中,NFVO600可以包括一个或一个以上处理器601、存储器602和收发器603,该存储器602中存储有一个或一个以上的应用程序或数据。收发器603用于与OSS/BSS和VNFM的收发器之间进行消息的收发。As shown in FIG. 11 , FIG. 11 is a schematic structural diagram of another embodiment of NFVO provided by the embodiment of the present application. In this embodiment, the NFVO 600 may include one or more processors 601, a memory 602, and a transceiver 603, and the memory 602 stores one or more application programs or data. The transceiver 603 is used to send and receive messages with the transceivers of the OSS/BSS and the VNFM.
其中,所述处理器601可以是一个或多个芯片,或一个或多个集成电路。例如,处理器601可以是一个或多个现场可编程门阵列(field-programmable gate array,FPGA)、专用集成芯片(application specific integrated circuit,ASIC)、系统芯片(system on chip,SoC)、中央处理器(central processor unit,CPU)、网络处理器(network processor,NP)、数字信号处理电路(digital signal processor,DSP)、微控制器(micro controller unit,MCU),可编程控制器(programmable logic device,PLD)或其它集成芯片,或者上述芯片或者处理器的任意组合等。Wherein, the processor 601 may be one or more chips, or one or more integrated circuits. For example, the processor 601 may be one or more field-programmable gate array (field-programmable gate array, FPGA), application specific integrated circuit (ASIC), system chip (system on chip, SoC), central processing Central processor unit (CPU), network processor (network processor, NP), digital signal processing circuit (digital signal processor, DSP), microcontroller (micro controller unit, MCU), programmable logic device (programmable logic device , PLD) or other integrated chips, or any combination of the above chips or processors, etc.
存储器602可以是易失性存储或持久存储。存储在存储器602的程序可以包括一个或一个以上模块,每个模块可以包括对服务器中的一系列指令操作。更进一步地,处理器601可以设置为与存储器602通信,在NFVO600上执行存储器602中的一系列指令操作。 Memory 602 may be volatile storage or persistent storage. The program stored in the memory 602 may include one or more modules, and each module may include a series of instructions to operate on the server. Furthermore, the processor 601 may be configured to communicate with the memory 602 , and execute a series of instruction operations in the memory 602 on the NFVO 600 .
该处理器601可以执行前述图2至4所示实施例中NFVO所执行的操作,具体此处不再赘述。The processor 601 may execute the operations performed by the NFVO in the foregoing embodiments shown in FIGS. 2 to 4 , and details are not described here again.
所属领域的技术人员可以清楚地了解到,为描述的方便和简洁,上述描述的系统,装置和单元的具体工作过程,可以参考前述方法实施例中的对应过程,在此不再赘述。Those skilled in the art can clearly understand that for the convenience and brevity of the description, the specific working process of the above-described system, device and unit can refer to the corresponding process in the foregoing method embodiment, which will not be repeated here.
在本申请所提供的几个实施例中,应该理解到,所揭露的系统,装置和方法,可以通过其它的方式实现。例如,以上所描述的装置实施例仅仅是示意性的,例如,所述单元的划分,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式,例如多个单元或组件可以结合或者可以集成到另一个系统,或一些特征可以忽略,或不执行。另一点,所显示或讨论的相互之间的耦合或直接耦合或通信连接可以是通过一些接口,装置或单元的间接耦合或通信连接,可以是电性,机械或其它的形式。In the several embodiments provided in this application, it should be understood that the disclosed system, device and method can be implemented in other ways. For example, the device embodiments described above are only illustrative. For example, the division of the units is only a logical function division. In actual implementation, there may be other division methods. For example, multiple units or components can be combined or May be integrated into another system, or some features may be ignored, or not implemented. In another point, the mutual coupling or direct coupling or communication connection shown or discussed may be through some interfaces, and the indirect coupling or communication connection of devices or units may be in electrical, mechanical or other forms.
所述集成的单元如果以软件功能单元的形式实现并作为独立的产品销售或使用时,可以存储在一个计算机可读取存储介质中。基于这样的理解,本申请的技术方案本质上或者说对 现有技术做出贡献的部分或者该技术方案的全部或部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质中,包括若干指令用以使得一台计算机设备(可以是个人计算机,服务器,或者网络设备等)执行本申请各个实施例所述方法的全部或部分步骤。而前述的存储介质包括:U盘、移动硬盘、只读存储器(ROM,read-only memory)、随机存取存储器(RAM,random access memory)、磁碟或者光盘等各种可以存储程序代码的介质。If the integrated unit is realized in the form of a software function unit and sold or used as an independent product, it can be stored in a computer-readable storage medium. Based on this understanding, the technical solution of the present application is essentially or part of the contribution to the prior art or all or part of the technical solution can be embodied in the form of a software product, and the computer software product is stored in a storage medium , including several instructions to make a computer device (which may be a personal computer, a server, or a network device, etc.) execute all or part of the steps of the methods described in the various embodiments of the present application. The aforementioned storage media include: U disk, mobile hard disk, read-only memory (ROM, read-only memory), random access memory (RAM, random access memory), magnetic disk or optical disc, etc., which can store program codes. .

Claims (29)

  1. 一种网络业务部署方法,其特征在于,所述方法包括:A network service deployment method, characterized in that the method comprises:
    网络功能虚拟化编排器NFVO获取第一部署策略关联的第一虚拟化网络功能VNF,以及第二部署策略关联的第二VNF,所述第一VNF属于第一网络业务NS,所述第二VNF属于第二NS,所述第一部署策略和所述第二部署策略包括相同的用户标识和部署任务标识,所述第二部署策略还包括第一标识,所述第一标识用于指示资源的亲和或反亲和;The network function virtualization orchestrator NFVO obtains the first virtualized network function VNF associated with the first deployment strategy, and the second VNF associated with the second deployment strategy, the first VNF belongs to the first network service NS, and the second VNF Belonging to the second NS, the first deployment policy and the second deployment policy include the same user ID and deployment task ID, and the second deployment policy also includes a first ID, and the first ID is used to indicate resource affinity or anti-affinity;
    所述NFVO根据所述第一标识确定所述第一VNF与所述第二VNF是否共资源部署。The NFVO determines whether the first VNF and the second VNF are deployed on the same resource according to the first identifier.
  2. 根据权利要求1所述的方法,其特征在于,所述第一NS为已部署的NS,所述第二NS为待部署的NS,所述网络功能虚拟化编排器NFVO获取第一部署策略关联的第一虚拟化网络功能VNF,以及第二部署策略关联的第二VNF之前,还包括:The method according to claim 1, wherein the first NS is a deployed NS, the second NS is a NS to be deployed, and the network function virtualization orchestrator NFVO obtains the first deployment policy association Before the first virtualized network function VNF, and the second VNF associated with the second deployment policy, further include:
    所述NFVO接收运营和业务支持系统OSS/BSS发送的更新消息,所述更新消息用于更新所述第一NS的部署策略,所述更新消息包括所述第一部署策略;The NFVO receives an update message sent by an operation and business support system OSS/BSS, the update message is used to update the deployment strategy of the first NS, and the update message includes the first deployment strategy;
    所述NFVO从所述更新消息中获取所述第一部署策略。The NFVO acquires the first deployment policy from the update message.
  3. 根据权利要求1所述的方法,其特征在于,所述第一NS为已部署的NS,所述第二NS为待部署的NS,所述网络功能虚拟化编排器NFVO获取第一部署策略关联的第一虚拟化网络功能VNF,以及第二部署策略关联的第二VNF之前,还包括:The method according to claim 1, wherein the first NS is a deployed NS, the second NS is a NS to be deployed, and the network function virtualization orchestrator NFVO obtains the first deployment policy association Before the first virtualized network function VNF, and the second VNF associated with the second deployment policy, further include:
    所述NFVO接收OSS/BSS上传的所述第一NS对应的第一网络业务描述模板NSD文件,所述第一NSD文件包括所述第一部署策略;The NFVO receives the first network service description template NSD file corresponding to the first NS uploaded by the OSS/BSS, and the first NSD file includes the first deployment strategy;
    所述NFVO从所述第一NSD文件中获取所述第一部署策略。The NFVO obtains the first deployment policy from the first NSD file.
  4. 根据权利要求2或3所述的方法,其特征在于,所述网络功能虚拟化编排器NFVO获取第一部署策略关联的第一虚拟化网络功能VNF,以及第二部署策略关联的第二VNF之前,还包括:The method according to claim 2 or 3, wherein the network function virtualization orchestrator NFVO obtains the first virtualized network function VNF associated with the first deployment strategy, and the second VNF associated with the second deployment strategy. ,Also includes:
    所述NFVO接收所述OSS/BSS发送的用于指示实例化所述第二NS的请求消息,所述请求消息中包括所述第二部署策略;The NFVO receives a request message sent by the OSS/BSS for instructing instantiation of the second NS, where the request message includes the second deployment strategy;
    所述NFVO从所述请求消息中获取所述第二部署策略。The NFVO acquires the second deployment policy from the request message.
  5. 根据权利要求2或3所述的方法,其特征在于,所述网络功能虚拟化编排器NFVO获取第一部署策略关联的第一虚拟化网络功能VNF,以及第二部署策略关联的第二VNF之前,还包括:The method according to claim 2 or 3, wherein the network function virtualization orchestrator NFVO obtains the first virtualized network function VNF associated with the first deployment strategy, and the second VNF associated with the second deployment strategy. ,Also includes:
    所述NFVO接收所述OSS/BSS上传的所述第二NS对应的第二NSD文件,所述第二NSD文件包括所述第二部署策略;The NFVO receives a second NSD file corresponding to the second NS uploaded by the OSS/BSS, and the second NSD file includes the second deployment strategy;
    所述NFVO从所述第二NSD文件中获取所述第二部署策略。The NFVO obtains the second deployment policy from the second NSD file.
  6. 根据权利要求1所述的方法,其特征在于,所述第一NS和所述第二NS均为待部署的NS,所述网络功能虚拟化编排器NFVO获取第一部署策略关联的第一虚拟化网络功能VNF,以及第二部署策略关联的第二VNF之前,包括:The method according to claim 1, wherein both the first NS and the second NS are NSs to be deployed, and the network function virtualization orchestrator NFVO obtains the first virtualization associated with the first deployment policy. Before the network function VNF, and the second VNF associated with the second deployment policy, include:
    所述NFVO接收所述OSS/BSS上传的所述第一NS对应的第一NSD文件和所述第二NS对应的第二NSD文件,所述第一NSD文件包括所述第一部署策略,所述第二NSD文件包括所述第二部署策略;The NFVO receives the first NSD file corresponding to the first NS and the second NSD file corresponding to the second NS uploaded by the OSS/BSS, the first NSD file includes the first deployment strategy, and the The second NSD file includes the second deployment strategy;
    所述NFVO从所述第一NSD文件中获取所述第一部署策略,以及从所述第二NSD文件所述 第二部署策略。The NFVO obtains the first deployment strategy from the first NSD file, and the second deployment strategy from the second NSD file.
  7. 根据权利要求1至6中任一项所述的方法,其特征在于,所述第二部署策略还包括第二标识,所述第二标识用于指示所述第二部署策略的应用范围。The method according to any one of claims 1 to 6, wherein the second deployment strategy further includes a second identifier, and the second identifier is used to indicate an application scope of the second deployment strategy.
  8. 根据权利要求7所述的方法,其特征在于,所述第一标识为亲和标识,所述第二标识为用户范围标识,所述NFVO根据所述第一标识确定所述第一VNF与所述第二VNF是否共资源部署包括:The method according to claim 7, wherein the first identifier is an affinity identifier, the second identifier is a user scope identifier, and the NFVO determines the relationship between the first VNF and the first VNF according to the first identifier. Whether the second VNF is deployed with shared resources includes:
    所述NFVO根据所述亲和标识和所述用户范围标识确定所述第一VNF与所述第二VNF部署于同一用户资源池。The NFVO determines, according to the affinity identifier and the user range identifier, that the first VNF and the second VNF are deployed in the same user resource pool.
  9. 根据权利要求7所述的方法,其特征在于,所述第一标识为亲和标识或反亲和标识,所述第二标识为物理节点范围标识,所述NFVO根据所述第一标识确定所述第一VNF与所述第二VNF是否共资源部署包括:The method according to claim 7, wherein the first identifier is an affinity identifier or an anti-affinity identifier, the second identifier is a physical node range identifier, and the NFVO determines the Whether the first VNF and the second VNF share resource deployment includes:
    所述NFVO根据所述亲和标识和所述物理节点范围标识确定所述第一VNF与所述第二VNF部署于同一物理节点,或根据所述反亲和标识和所述物理节点范围标识确定所述第一VNF和所述第二VNF部署于不同的物理节点。The NFVO determines that the first VNF and the second VNF are deployed on the same physical node according to the affinity ID and the physical node range ID, or determines according to the anti-affinity ID and the physical node range ID The first VNF and the second VNF are deployed on different physical nodes.
  10. 根据权利要求7所述的方法,其特征在于,所述第一标识为亲和标识或反亲和标识,所述第二标识为虚拟节点范围标识,所述NFVO根据所述第一标识确定所述第一VNF与所述第二VNF是否共资源部署包括:The method according to claim 7, wherein the first identifier is an affinity identifier or an anti-affinity identifier, the second identifier is a virtual node range identifier, and the NFVO determines the Whether the first VNF and the second VNF share resource deployment includes:
    所述NFVO根据所述亲和标识和所述虚拟节点范围标识确定所述第一VNF与所述第二VNF部署于同一虚拟节点,或根据所述反亲和标识和所述虚拟节点范围标识确定所述第一VNF和所述第二VNF部署于不同的虚拟节点。The NFVO determines that the first VNF and the second VNF are deployed on the same virtual node according to the affinity ID and the virtual node range ID, or determines according to the anti-affinity ID and the virtual node range ID The first VNF and the second VNF are deployed on different virtual nodes.
  11. 根据权利要求7至10中任一项所述的方法,其特征在于,所述第一部署策略还包括与所述第二部署策略相同的所述第一标识和/或所述第二标识。The method according to any one of claims 7 to 10, wherein the first deployment strategy further includes the same first identifier and/or the second identifier as the second deployment strategy.
  12. 根据权利要求1至11中任一项所述的方法,其特征在于,所述方法还包括:The method according to any one of claims 1 to 11, further comprising:
    所述NFVO接收所述OSS/BSS发送的实例化所述第二NS的请求消息;The NFVO receives a request message for instantiating the second NS sent by the OSS/BSS;
    所述NFVO响应于所述请求消息,向虚拟化功能管理器VNFM发送实例化所述第二VNF的指示消息,所述指示消息包括实例化所述第二VNF的位置信息,所述位置信息为所述NFVO确定所述第一VNF与所述第二VNF是否共资源部署后为所述第二VNF分配的。The NFVO sends, in response to the request message, an indication message for instantiating the second VNF to the virtualization function manager VNFM, where the indication message includes location information for instantiating the second VNF, and the location information is The NFVO determines whether the first VNF and the second VNF share resources and allocate them to the second VNF after deployment.
  13. 一种网络业务部署方法,其特征在于,所述方法包括:A network service deployment method, characterized in that the method comprises:
    运营和业务支持系统OSS/BS向网络功能虚拟化编排器NFVO发送第一部署策略和第二部署策略;The operation and business support system OSS/BS sends the first deployment strategy and the second deployment strategy to the network function virtualization orchestrator NFVO;
    所述NFVO判断所述第一部署策略和所述第二部署策略是否包括相同的用户标识和部署任务标识;The NFVO judges whether the first deployment strategy and the second deployment strategy include the same user identifier and deployment task identifier;
    若为是,则所述NFVO获取所述第一部署策略关联的第一虚拟化网络功能VNF,以及所述第二部署策略关联的第二VNF,所述第一VNF属于第一网络业务NS,所述第二VNF属于第二NS;If yes, the NFVO acquires the first virtualized network function VNF associated with the first deployment strategy and the second VNF associated with the second deployment strategy, the first VNF belongs to the first network service NS, The second VNF belongs to a second NS;
    所述NFVO根据所述第二部署策略中的第一标识确定所述第一VNF与所述第二VNF是否共资源部署,所述第一标识用于指示资源的亲和或反亲和。The NFVO determines whether the first VNF and the second VNF are deployed on the same resource according to a first identifier in the second deployment policy, where the first identifier is used to indicate resource affinity or anti-affinity.
  14. 跟权利要求13所述的方法,其特征在于,所述方法还包括:The method according to claim 13, further comprising:
    所述OSS/BS向所述NFVO发送实例化所述第二NS的请求消息;The OSS/BS sends a request message for instantiating the second NS to the NFVO;
    所述NFVO响应于所述请求消息向虚拟化网络功能管理器VNFM发送实例化所述第二VNF的指示消息,所述指示消息包括实例化所述第二VNF的位置信息,所述位置信息为所述NFVO确定所述第一VNF与所述第二VNF是否共资源部署后为所述第二VNF分配的;The NFVO sends, in response to the request message, an indication message for instantiating the second VNF to the virtualized network function manager VNFM, where the indication message includes location information for instantiating the second VNF, and the location information is The NFVO determines whether the first VNF and the second VNF share resources and allocate them to the second VNF after deployment;
    所述VNFM根据所述指示消息在所述位置信息对应的节点实例化所述第二VNF。The VNFM instantiates the second VNF at the node corresponding to the location information according to the indication message.
  15. 一种网络功能虚拟化编排器NFVO,其特征在于,所述NFVO包括:A network function virtualization orchestrator NFVO is characterized in that the NFVO includes:
    获取模块,用于获取第一部署策略关联的第一虚拟化网络功能VNF,以及第二部署策略关联的第二VNF,所述第一VNF属于第一网络业务NS,所述第二VNF属于第二NS,所述第一部署策略和所述第二部署策略包括相同的用户标识和部署任务标识,所述第二部署策略还包括第一标识,所述第一标识用于指示资源的亲和或反亲和;An acquisition module, configured to acquire a first virtualized network function VNF associated with a first deployment strategy, and a second VNF associated with a second deployment strategy, the first VNF belongs to the first network service NS, and the second VNF belongs to the second VNF Two NSs, the first deployment policy and the second deployment policy include the same user ID and deployment task ID, and the second deployment policy also includes a first ID, and the first ID is used to indicate resource affinity or anti-affinity;
    确定模块,用于根据所述第一标识确定所述第一VNF与所述第二VNF是否共资源部署。A determining module, configured to determine, according to the first identifier, whether the first VNF and the second VNF are co-resource-deployed.
  16. 根据权利要求15所述的NFVO,其特征在于,所述NFVO还包括:The NFVO according to claim 15, wherein the NFVO further comprises:
    接收模块,用于接收运营和业务支持系统OSS/BSS发送的更新消息,所述更新消息用于更新所述第一NS的部署策略,所述更新消息包括所述第一部署策略;A receiving module, configured to receive an update message sent by an operation and business support system OSS/BSS, where the update message is used to update the deployment strategy of the first NS, and the update message includes the first deployment strategy;
    所述获取模块,还用于从所述更新消息中获取所述第一部署策略。The acquiring module is further configured to acquire the first deployment strategy from the update message.
  17. 根据权利要求15所述的NFVO,其特征在于,所述NFVO还包括:The NFVO according to claim 15, wherein the NFVO further comprises:
    接收模块,用于接收所述OSS/BSS上传的所述第一NS对应的第一网络业务描述模板NSD文件,所述第一NSD文件包括所述第一部署策略;A receiving module, configured to receive a first network service description template NSD file corresponding to the first NS uploaded by the OSS/BSS, where the first NSD file includes the first deployment strategy;
    所述获取模块,还用于从所述第一NSD文件中获取所述第一部署策略。The acquiring module is further configured to acquire the first deployment strategy from the first NSD file.
  18. 根据权利要求16或17所述的NFVO,其特征在于,NFVO according to claim 16 or 17, characterized in that,
    所述接收模块,还用于接收所述OSS/BSS发送的用于指示实例化所述第二NS的请求消息,所述请求消息中包括所述第二部署策略;The receiving module is further configured to receive a request message sent by the OSS/BSS for instructing instantiation of the second NS, where the request message includes the second deployment strategy;
    所述获取模块,还用于从所述请求消息中获取所述第二部署策略。The acquiring module is further configured to acquire the second deployment policy from the request message.
  19. 根据权利要求16或17所述的NFVO,其特征在于,NFVO according to claim 16 or 17, characterized in that,
    所述接收模块,还用于接收所述OSS/BSS上传的所述第二NS对应的第二NSD文件,所述第二NSD文件包括所述第二部署策略;The receiving module is further configured to receive a second NSD file corresponding to the second NS uploaded by the OSS/BSS, where the second NSD file includes the second deployment strategy;
    所述获取模块,还用于从所述第二NSD文件中获取所述第二部署策略。The acquiring module is further configured to acquire the second deployment policy from the second NSD file.
  20. 根据权利要求15所述的NFVO,其特征在于,所述NFVO还包括:The NFVO according to claim 15, wherein the NFVO further comprises:
    接收模块,用于接收所述OSS/BSS上传的所述第一NS对应的第一NSD文件和所述第二NS对应的第二NSD文件,所述第一NSD文件包括第一部署策略,所述第二NSD文件包括第二部署策略;A receiving module, configured to receive a first NSD file corresponding to the first NS and a second NSD file corresponding to the second NS uploaded by the OSS/BSS, the first NSD file includes a first deployment strategy, and the The second NSD file includes a second deployment strategy;
    所述获取模块,还用于从所述第一NSD文件中获取第一部署策略,以及从所述第二NSD文件所述第二部署策略。The acquiring module is further configured to acquire the first deployment strategy from the first NSD file, and the second deployment strategy from the second NSD file.
  21. 根据权利要求15至20中任一项所述的NFVO,其特征在于,所述第二部署策略还包括第二标识,所述第二标识用于指示所述第二部署策略的应用范围。The NFVO according to any one of claims 15 to 20, wherein the second deployment strategy further includes a second identifier, and the second identifier is used to indicate an application scope of the second deployment strategy.
  22. 根据权利要求21所述的NFVO,其特征在于,所述第一标识为亲和标识,所述第二标识为用户范围标识,所述确定模块具体用于:The NFVO according to claim 21, wherein the first identifier is an affinity identifier, the second identifier is a user range identifier, and the determining module is specifically used for:
    根据所述亲和标识和所述用户范围标识确定所述第一VNF与所述第二VNF部署于同一用 户资源池。According to the affinity identifier and the user range identifier, it is determined that the first VNF and the second VNF are deployed in the same user resource pool.
  23. 根据权利要求21所述的NFVO,其特征在于,所述第一标识为亲和标识或反亲和标识,所述第二标识为物理节点范围标识,所述确定模块具体用于:The NFVO according to claim 21, wherein the first identifier is an affinity identifier or an anti-affinity identifier, the second identifier is a physical node range identifier, and the determining module is specifically used for:
    根据所述亲和标识和所述物理节点范围标识确定所述第一VNF与所述第二VNF部署于同一物理节点,或根据所述反亲和标识和所述物理节点范围标识确定所述第一VNF和所述第二VNF部署于不同的物理节点。Determine that the first VNF and the second VNF are deployed on the same physical node according to the affinity ID and the physical node range ID, or determine that the second VNF is deployed on the same physical node according to the anti-affinity ID and the physical node range ID A VNF and the second VNF are deployed on different physical nodes.
  24. 根据权利要求21所述的NFVO,其特征在于,所述第一标识为亲和标识或反亲和标识,所述第二标识为虚拟节点范围标识,所述确定模块具体用于:The NFVO according to claim 21, wherein the first identifier is an affinity identifier or an anti-affinity identifier, and the second identifier is a virtual node range identifier, and the determining module is specifically used for:
    根据所述亲和标识和所述虚拟节点范围标识确定所述第一VNF与所述第二VNF部署于同一虚拟节点,或根据所述反亲和标识和所述虚拟节点范围标识确定所述第一VNF和所述第二VNF部署于不同的虚拟节点。Determine that the first VNF and the second VNF are deployed on the same virtual node according to the affinity ID and the virtual node range ID, or determine that the second VNF is deployed according to the anti-affinity ID and the virtual node range ID A VNF and the second VNF are deployed on different virtual nodes.
  25. 根据权利要求21至24任一项所述的NFVO,其特征在于,所述第一部署策略还包括与所述第二部署策略相同的所述第一标识和/或所述第二标识。The NFVO according to any one of claims 21 to 24, wherein the first deployment strategy further includes the same first identifier and/or the second identifier as the second deployment strategy.
  26. 根据权利要求15至25任一项所述的NFVO,其特征在于,所述NFVO还包括:The NFVO according to any one of claims 15 to 25, wherein the NFVO further comprises:
    接收模块,用于接收所述OSS/BSS发送的实例化所述第二NS的请求消息;a receiving module, configured to receive a request message sent by the OSS/BSS to instantiate the second NS;
    发送模块,用于响应于所述请求消息向VNFM发送实例化所述第二VNF的指示消息,所述指示消息用于指示所述第二VNF是否与所述第一VNF实例化于同一所述资源池/所述物理节点/所述虚拟节点。A sending module, configured to send an indication message of instantiating the second VNF to the VNFM in response to the request message, where the indication message is used to indicate whether the second VNF is instantiated in the same VNF as the first VNF Resource pool/the physical node/the virtual node.
  27. 一种网络功能虚拟化编排器NFVO,其特征在于,包括:A network function virtualization orchestrator NFVO is characterized in that it includes:
    处理器、存储器和收发器,其中,所述存储器存储有程序代码,所述处理器调用所述存储器中存储的程序代码,使得所述网络业务部署设备执行如权利要求1-12任一项所述的网络业务部署方法。A processor, a memory, and a transceiver, wherein the memory stores program codes, and the processor invokes the program codes stored in the memory, so that the network service deployment device executes the method described in any one of claims 1-12. The network service deployment method described above.
  28. 一种网络功能虚拟化NFV系统,其特征在于,所述系统包括运营和业务支持系统OSS/BSS和如权利要求15至27任一项所述的网络功能虚拟化编排器NFVO;A network function virtualization NFV system, characterized in that the system includes an operation and business support system OSS/BSS and a network function virtualization orchestrator NFVO according to any one of claims 15 to 27;
    所述OSS/BSS,用于向NFVO发送包括用户标识和部署任务标识的第一部署策略和第二部署策略,所述第二部署策略还包括第一标识,所述第一标识用于指示资源的亲和或反亲和,所述第一部署策略与第一VNF关联,所述第二NS与第二VNF关联;The OSS/BSS is configured to send a first deployment policy and a second deployment policy including a user ID and a deployment task ID to the NFVO, the second deployment policy also includes a first ID, and the first ID is used to indicate resource affinity or anti-affinity, the first deployment strategy is associated with the first VNF, and the second NS is associated with the second VNF;
    所述NFVO,用于根据所述第二部署策略中的第一标识确定所述第一VNF与所述第二VNF是否共资源部署。The NFVO is configured to determine whether the first VNF and the second VNF are deployed on the same resource according to the first identifier in the second deployment policy.
  29. 跟权利要求28所述的系统,其特征在于,所述系统还包括虚拟化网络功能管理器VNFM;The system of claim 28, further comprising a virtualized network function manager (VNFM);
    所述NFVO,还用于向所述VNFM发送实例化所述第二VNF的指示消息,所述指示消息包括部署所述第二VNF的位置信息,所述位置信息为所述NFVO确定所述第一VNF与所述第二VNF是否共资源部署后为所述第二VNF分配的;The NFVO is further configured to send an indication message for instantiating the second VNF to the VNFM, where the indication message includes location information for deploying the second VNF, and the location information determines the second VNF for the NFVO. Whether a VNF shares resources with the second VNF and is allocated to the second VNF after deployment;
    所述VNFM,用于根据所述指示消息在所述位置信息对应的节点实例化所述第二VNF。The VNFM is configured to instantiate the second VNF at the node corresponding to the location information according to the indication message.
PCT/CN2022/115397 2021-08-31 2022-08-29 Network service deployment method, nfvo, and nfv system WO2023030218A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202111017188.7A CN115733743A (en) 2021-08-31 2021-08-31 Network service deployment method, NFVO (network function virtualization) and NFV (network function virtualization) system
CN202111017188.7 2021-08-31

Publications (1)

Publication Number Publication Date
WO2023030218A1 true WO2023030218A1 (en) 2023-03-09

Family

ID=85291820

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2022/115397 WO2023030218A1 (en) 2021-08-31 2022-08-29 Network service deployment method, nfvo, and nfv system

Country Status (2)

Country Link
CN (1) CN115733743A (en)
WO (1) WO2023030218A1 (en)

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2017173667A1 (en) * 2016-04-08 2017-10-12 华为技术有限公司 Management method and device
CN108696373A (en) * 2017-04-06 2018-10-23 华为技术有限公司 Virtual resource allocation method, NFVO and system

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2017173667A1 (en) * 2016-04-08 2017-10-12 华为技术有限公司 Management method and device
CN108696373A (en) * 2017-04-06 2018-10-23 华为技术有限公司 Virtual resource allocation method, NFVO and system

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
HUAWEI: "Adding requirements for affinity and anti-affinity information", 3GPP DRAFT; S5-163201 PCR TS 28.525 ADDING REQUIREMENTS FOR AFFINITY AND ANTI-AFFINITY INFORMATION, 3RD GENERATION PARTNERSHIP PROJECT (3GPP), MOBILE COMPETENCE CENTRE ; 650, ROUTE DES LUCIOLES ; F-06921 SOPHIA-ANTIPOLIS CEDEX ; FRANCE, vol. SA WG5, no. Santa Cruz de Tenerife (Spain); 20160523 - 2016052, 17 May 2016 (2016-05-17), Mobile Competence Centre ; 650, route des Lucioles ; F-06921 Sophia-Antipolis Cedex ; France , XP051117014 *

Also Published As

Publication number Publication date
CN115733743A (en) 2023-03-03

Similar Documents

Publication Publication Date Title
CN110324164B (en) Network slice deployment method and device
US10701139B2 (en) Life cycle management method and apparatus
CN107689882B (en) Method and device for service deployment in virtual network
US10700947B2 (en) Life cycle management method and device for network service
WO2016184045A1 (en) Method and apparatus for network service capacity expansion
US11271827B2 (en) Network service life cycle management grant method and apparatus
WO2017045471A1 (en) Method and apparatus for acquiring service chain information in cloud computing system
US10397132B2 (en) System and method for granting virtualized network function life cycle management
US20210289435A1 (en) Virtualization management method and apparatus
WO2022056845A1 (en) A method of container cluster management and system thereof
US20210326306A1 (en) Method and apparatus for deploying virtualised network function
WO2023030218A1 (en) Network service deployment method, nfvo, and nfv system
WO2018014351A1 (en) Method and apparatus for resource configuration
WO2019011180A1 (en) Method and device for sending license
WO2022141293A1 (en) Elastic scaling method and apparatus
WO2023066224A1 (en) Method and apparatus for deploying container service
WO2022126389A1 (en) Method and device for establishing network connection
CN111581203B (en) Information processing method, device and storage medium
WO2021129868A1 (en) Network service instantiation method and network function virtualization orchestrator
WO2022183796A1 (en) Network service (ns) creation method and related apparatus

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 22863354

Country of ref document: EP

Kind code of ref document: A1